You are here

Search results

Searching as anonymous (not verified)

267 items found in collection [showing 1 - 50]

Pages

  • CSV Spreadsheet
Effective and Efficient Approach for Clusterability Evaluation
Effective and Efficient Approach for Clusterability Evaluation
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Deep
Deep
Building Trusted Computer Systems via Unified Software Integrity Protection
Building Trusted Computer Systems via Unified Software Integrity Protection
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
F-Table
F-Table
Motion Planning Testing Environment for Robotic Skid-Steered Vehicles
Motion Planning Testing Environment for Robotic Skid-Steered Vehicles
Sparse Representations for Recognition
Sparse Representations for Recognition
Android Benchmarking for Architectural Research
Android Benchmarking for Architectural Research
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Improving Processor Efficiency Through Enhanced Instruction Fetch
Improving Processor Efficiency Through Enhanced Instruction Fetch
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
APECS
APECS
Method of Fuel Characterization for Fire Behavior Models and the Influence of Fuel          Heterogeneity on Fire Spread
Method of Fuel Characterization for Fire Behavior Models and the Influence of Fuel Heterogeneity on Fire Spread
Towards Explainability in Machine Learning for Malware Detection
Towards Explainability in Machine Learning for Malware Detection
Enhanced Security for Mobile Agent Systems
Enhanced Security for Mobile Agent Systems
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Improving Monte Carlo Linear Solvers Through Better Iterative Processes
Improving Monte Carlo Linear Solvers Through Better Iterative Processes
Performance Driven Optimization Tuning in Vista
Performance Driven Optimization Tuning in Vista
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
Analysis of Route Choice and Activity Scheduling Dynamics in Multi-Agent Transport Simulation Environment for Efficient Network Demand Estimation
Analysis of Route Choice and Activity Scheduling Dynamics in Multi-Agent Transport Simulation Environment for Efficient Network Demand Estimation
PPDA
PPDA
Appearance-Based Classification and Recognition Using Spectral Histogram          Representations and Hierarchical Learning for OCA
Appearance-Based Classification and Recognition Using Spectral Histogram Representations and Hierarchical Learning for OCA
Probabilistic Context-Free Grammar Based Password Cracking
Probabilistic Context-Free Grammar Based Password Cracking
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Dynamic, Perimeter Based, Community-Centric Access Control System
Dynamic, Perimeter Based, Community-Centric Access Control System
Normal Estimation and Surface Reconstruction of Large Point Clouds
Normal Estimation and Surface Reconstruction of Large Point Clouds
Acceleration Methods Forbayesian Network Sampling
Acceleration Methods Forbayesian Network Sampling
Trust Management in Mobile Wireless Networks
Trust Management in Mobile Wireless Networks
Time Parallelization Studies in Bio-Molecular Dynamics Simulations
Time Parallelization Studies in Bio-Molecular Dynamics Simulations
Tools in Support of Electronic Crime Investigations
Tools in Support of Electronic Crime Investigations
Improve the Interconnection Network Architecture for Future Supercomputers
Improve the Interconnection Network Architecture for Future Supercomputers
Graphical Visualization of Architectural Simulators
Graphical Visualization of Architectural Simulators
Novel Mixed Reality Interface for Effective and Efficient Human Robot Interaction with Unique Mobility Platforms
Novel Mixed Reality Interface for Effective and Efficient Human Robot Interaction with Unique Mobility Platforms
Effective Routing on Fat-Tree Topologies
Effective Routing on Fat-Tree Topologies
Geriatric Suite of Medical Applications for Android Powered Devices
Geriatric Suite of Medical Applications for Android Powered Devices
Expert System Ruleset Portability Using the Language Abstraction for Rule-Based          Knowledge Systems (LARK) Engine
Expert System Ruleset Portability Using the Language Abstraction for Rule-Based Knowledge Systems (LARK) Engine
Analyzing Password Strength & Efficient Password Cracking
Analyzing Password Strength & Efficient Password Cracking
Application Configurable Processors
Application Configurable Processors
Randomized Algorithms for Computing Low-Rank Matrix Approximation
Randomized Algorithms for Computing Low-Rank Matrix Approximation
BGP Anomalies Detection Based on Internet Numbers Allocation
BGP Anomalies Detection Based on Internet Numbers Allocation
Automated Empirical Optimization of High Performance Floating Point Kernels
Automated Empirical Optimization of High Performance Floating Point Kernels
TDMA and CDMA in Mobile Communications
TDMA and CDMA in Mobile Communications
Primitives and Schemes for Non-Atomic Information Authentication
Primitives and Schemes for Non-Atomic Information Authentication
Historical Study of the Development of Branch Predictors
Historical Study of the Development of Branch Predictors
SPRNG Gets a Normal Number Generator
SPRNG Gets a Normal Number Generator

Pages