You are here

Search results

Searching as anonymous (not verified)

49 items found in collection [showing 1 - 49]
  • CSV Spreadsheet
Deep
Deep
APECS
APECS
Performance Driven Optimization Tuning in Vista
Performance Driven Optimization Tuning in Vista
Probabilistic Context-Free Grammar Based Password Cracking
Probabilistic Context-Free Grammar Based Password Cracking
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Graphical Visualization of Architectural Simulators
Graphical Visualization of Architectural Simulators
Analyzing Password Strength & Efficient Password Cracking
Analyzing Password Strength & Efficient Password Cracking
Practical Opportunistic Routing in Wireless Mesh Networks
Practical Opportunistic Routing in Wireless Mesh Networks
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of          Guaranteed Services
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of Guaranteed Services
Efficient XML Stream Processing and Searching
Efficient XML Stream Processing and Searching
Dependency Collapsing in Instruction-Level Parallel Architectures
Dependency Collapsing in Instruction-Level Parallel Architectures
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
Using De-Optimization to Re-Optimize Code
Using De-Optimization to Re-Optimize Code
Improving Processor Efficiency by Statically Pipelining Instructions
Improving Processor Efficiency by Statically Pipelining Instructions
Testing Several Types of Random Number Generator
Testing Several Types of Random Number Generator
Instant Approximate 1-Center on Road Networks via Embeddings
Instant Approximate 1-Center on Road Networks via Embeddings
Techniques to Reduce Data Cache Access Energy Usage and Load Delay Hazards
Techniques to Reduce Data Cache Access Energy Usage and Load Delay Hazards
Evaluation of a Benchmark Suite Exposing Android System Complexities Using Region-Based Caching
Evaluation of a Benchmark Suite Exposing Android System Complexities Using Region-Based Caching
Effective Exploitation of a Large Data Register File
Effective Exploitation of a Large Data Register File
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting Spam Zombies by Monitoring Outgoing Messages
Grid Computing Infrastructure for Monte Carlo Applications
Grid Computing Infrastructure for Monte Carlo Applications
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Reducing the Cost of Comparisons within Conditional Transfers of Control
Reducing the Cost of Comparisons within Conditional Transfers of Control
Small Discrete Fourier Transforms on Graphics Processors
Small Discrete Fourier Transforms on Graphics Processors
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Future of Android with Liquid Development
Future of Android with Liquid Development
Tagless Access Buffer
Tagless Access Buffer
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control          Layer
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control Layer
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Automatic Detection and Correction of Errors in Video Tutorial Transcripts
Automatic Detection and Correction of Errors in Video Tutorial Transcripts
Sender-Centric Approach to Spam and Phishing Control
Sender-Centric Approach to Spam and Phishing Control
Unified Compiler Framework for Program Analysis, Optimization, and Automatic Vectorization with Chains of Recurrences
Unified Compiler Framework for Program Analysis, Optimization, and Automatic Vectorization with Chains of Recurrences
Fast and Effective Solutions to the Phase Ordering Problem
Fast and Effective Solutions to the Phase Ordering Problem
Time Parallelization Methods for the Solution of Initial Value Problems
Time Parallelization Methods for the Solution of Initial Value Problems
Optimizing Transfers of Control in the Static Pipeline Architecture
Optimizing Transfers of Control in the Static Pipeline Architecture
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Trust Management and Accountability for Internet Security
Trust Management and Accountability for Internet Security
Portable MPICH2 Clusters with Android Devices
Portable MPICH2 Clusters with Android Devices
Internet Computing with Matlab
Internet Computing with Matlab
Computational Investigation of the Optimal Halton Sequence in QMC Applications
Computational Investigation of the Optimal Halton Sequence in QMC Applications
Instruction Caching in Multithreading Processors Using Guarantees
Instruction Caching in Multithreading Processors Using Guarantees
BGP Anomalies Detection Based on Internet Numbers Allocation
BGP Anomalies Detection Based on Internet Numbers Allocation
Automated Empirical Optimization of High Performance Floating Point Kernels
Automated Empirical Optimization of High Performance Floating Point Kernels
TIDR
TIDR
There and Back Again… a Datum's Tale
There and Back Again… a Datum's Tale
Sharp Restart in Walk-on-Subdomains
Sharp Restart in Walk-on-Subdomains
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic          Analysis
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic Analysis