You are here

Search results

Searching as anonymous (not verified)

290 items found in collection [showing 51 - 100]

Pages

  • CSV Spreadsheet
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Metrics and Techniques to Guide Software Development
Metrics and Techniques to Guide Software Development
Automatic Detection and Correction of Errors in Video Tutorial Transcripts
Automatic Detection and Correction of Errors in Video Tutorial Transcripts
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Reflective, 3-Dimensional Behavior Tree Approach to Vehicle Autonomy
Reflective, 3-Dimensional Behavior Tree Approach to Vehicle Autonomy
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the          Ever-Growing Databases
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the Ever-Growing Databases
Building Tools for Forensic Analysis of Mobile and IoT Applications Using Selective Data Extraction
Building Tools for Forensic Analysis of Mobile and IoT Applications Using Selective Data Extraction
Deep Learning Based Generalization of Chan-Vese Level Sets Segmentation
Deep Learning Based Generalization of Chan-Vese Level Sets Segmentation
Parallel Similarity Join
Parallel Similarity Join
Centroidal Voronoi Tesselation of Manifolds Using the GPU
Centroidal Voronoi Tesselation of Manifolds Using the GPU
Matching Physical File Representation to Logical Access Patterns for Better Performance
Matching Physical File Representation to Logical Access Patterns for Better Performance
Study of Image Representations for Content-Based Image Retrieval
Study of Image Representations for Content-Based Image Retrieval
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software          Systems
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software Systems
Efficient and Robust Message Passing Schemes for RDMA-Enabled Clusters
Efficient and Robust Message Passing Schemes for RDMA-Enabled Clusters
Formal Security Evaluation of Ad Hoc Routing Protocols
Formal Security Evaluation of Ad Hoc Routing Protocols
Natural Language Processing by Deep Neural Networks
Natural Language Processing by Deep Neural Networks
Development of the Multisense System
Development of the Multisense System
Pyquery
Pyquery
Electronic Voting
Electronic Voting
TuLiP, a Teacher's Tool for Lesson Planning
TuLiP, a Teacher's Tool for Lesson Planning
Three-Dimensional Scene Estimation from Monocular Videos with Applications in Video Analysis
Three-Dimensional Scene Estimation from Monocular Videos with Applications in Video Analysis
Identifying and Extracting Information from Programming Video Tutorials to Support          Developer Knowledge Discovery
Identifying and Extracting Information from Programming Video Tutorials to Support Developer Knowledge Discovery
Content Markup Language Design Principles
Content Markup Language Design Principles
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control          Layer
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control Layer
Topology Aggregation for Networks with Two Additive Metrics
Topology Aggregation for Networks with Two Additive Metrics
Descriptive Post Titles as Advance Organizer
Descriptive Post Titles as Advance Organizer
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
PPDA
PPDA
Analysis of Route Choice and Activity Scheduling Dynamics in Multi-Agent Transport Simulation Environment for Efficient Network Demand Estimation
Analysis of Route Choice and Activity Scheduling Dynamics in Multi-Agent Transport Simulation Environment for Efficient Network Demand Estimation
Trust and Behavioral Intention Toward Generative Adversarial Network (GAN)-Derived Avatar Healthcare Provider (HCP) in Simulated Telehealth Setting
Trust and Behavioral Intention Toward Generative Adversarial Network (GAN)-Derived Avatar Healthcare Provider (HCP) in Simulated Telehealth Setting
Facets
Facets
Appearance-Based Classification and Recognition Using Spectral Histogram          Representations and Hierarchical Learning for OCA
Appearance-Based Classification and Recognition Using Spectral Histogram Representations and Hierarchical Learning for OCA
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Probabilistic Context-Free Grammar Based Password Cracking
Probabilistic Context-Free Grammar Based Password Cracking
Graphical Visualization of Architectural Simulators
Graphical Visualization of Architectural Simulators
Improve the Interconnection Network Architecture for Future Supercomputers
Improve the Interconnection Network Architecture for Future Supercomputers
Analyzing Password Strength & Efficient Password Cracking
Analyzing Password Strength & Efficient Password Cracking
Towards Enhanced Mobile Voice Authentication
Towards Enhanced Mobile Voice Authentication
Normal Estimation and Surface Reconstruction of Large Point Clouds
Normal Estimation and Surface Reconstruction of Large Point Clouds
Tools in Support of Electronic Crime Investigations
Tools in Support of Electronic Crime Investigations
Expert System Ruleset Portability Using the Language Abstraction for Rule-Based          Knowledge Systems (LARK) Engine
Expert System Ruleset Portability Using the Language Abstraction for Rule-Based Knowledge Systems (LARK) Engine
Dynamic, Perimeter Based, Community-Centric Access Control System
Dynamic, Perimeter Based, Community-Centric Access Control System
Effective Routing on Fat-Tree Topologies
Effective Routing on Fat-Tree Topologies
Geriatric Suite of Medical Applications for Android Powered Devices
Geriatric Suite of Medical Applications for Android Powered Devices
Improving Monte Carlo Linear Solvers Through Better Iterative Processes
Improving Monte Carlo Linear Solvers Through Better Iterative Processes
Performance Driven Optimization Tuning in Vista
Performance Driven Optimization Tuning in Vista

Pages