You are here

Search results

Searching as anonymous (not verified)

250 items found in collection [showing 101 - 150]

Pages

  • CSV Spreadsheet
Towards Smart Wireless Sensing
Towards Smart Wireless Sensing
Latency Reduction Techniques for Remote Memory Access in Anemone
Latency Reduction Techniques for Remote Memory Access in Anemone
Possibilistic Hierarchical Task Networks
Possibilistic Hierarchical Task Networks
Time Parallelization Methods for the Solution of Initial Value Problems
Time Parallelization Methods for the Solution of Initial Value Problems
Building an Intelligent Assistant for Digital Forensics
Building an Intelligent Assistant for Digital Forensics
Predator and Prey Alert System
Predator and Prey Alert System
Instruction Caching in Multithreading Processors Using Guarantees
Instruction Caching in Multithreading Processors Using Guarantees
End-to-End Approachesfor Ethernet Switch Level Topology Discovery
End-to-End Approachesfor Ethernet Switch Level Topology Discovery
Secure Real-Time Conversations
Secure Real-Time Conversations
Computational Investigation of the Optimal Halton Sequence in QMC Applications
Computational Investigation of the Optimal Halton Sequence in QMC Applications
Detection Framework for Phishing Websites
Detection Framework for Phishing Websites
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Extensions and Optimizations to the Scalable, Parallel Random Number Generators Library
Optimal Linear Features for Content Based Image Retrieval and Applications
Optimal Linear Features for Content Based Image Retrieval and Applications
staDFA
staDFA
Formally Evaluating Wireless Security Protocols
Formally Evaluating Wireless Security Protocols
Interface for Collaborative Digital Forensics
Interface for Collaborative Digital Forensics
Improving IoT Security Based on Network Traffic Analytics
Improving IoT Security Based on Network Traffic Analytics
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic          Analysis
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic Analysis
Trust Management and Accountability for Internet Security
Trust Management and Accountability for Internet Security
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Optimizing Transfers of Control in the Static Pipeline Architecture
Optimizing Transfers of Control in the Static Pipeline Architecture
Sharp Restart in Walk-on-Subdomains
Sharp Restart in Walk-on-Subdomains
Multi-Criteria Decision Support System for Ph.D. Supervisor Selection
Multi-Criteria Decision Support System for Ph.D. Supervisor Selection
Block Incremental Algorithm for Computing Dominant Singular Subspaces
Block Incremental Algorithm for Computing Dominant Singular Subspaces
Design and Evaluation of Networking Techniques for the Next Generation of Interconnection Networks
Design and Evaluation of Networking Techniques for the Next Generation of Interconnection Networks
Fast and Effective Solutions to the Phase Ordering Problem
Fast and Effective Solutions to the Phase Ordering Problem
Quantifying Temporal and Spatial Localities in Storage Workloads and Transformations by Data Path Components
Quantifying Temporal and Spatial Localities in Storage Workloads and Transformations by Data Path Components
Multi-Temporal-Spectral Land Cover Classification for Remote Sensing Imagery Using Deep Learning
Multi-Temporal-Spectral Land Cover Classification for Remote Sensing Imagery Using Deep Learning
Reflection Based Framework for Automation of Parameter Variations in Simulation
Reflection Based Framework for Automation of Parameter Variations in Simulation
Exploration of Discriminatory Language in Software Artifacts and Developer Communications
Exploration of Discriminatory Language in Software Artifacts and Developer Communications
Lessons from the Human Mind
Lessons from the Human Mind
Automation of Email Analysis Using a Database
Automation of Email Analysis Using a Database
Using Social Media Data to Identify Health Risks
Using Social Media Data to Identify Health Risks
Game Based Visual-to-Auditory Sensory Substitution Training
Game Based Visual-to-Auditory Sensory Substitution Training
Spatial Approximate String Search
Spatial Approximate String Search
Scrambling Additive Lagged-Fibonacci Generators
Scrambling Additive Lagged-Fibonacci Generators
Context-Sensitive Semantic Segmentation
Context-Sensitive Semantic Segmentation
Precomputed Global Illumination of Isosurfaces
Precomputed Global Illumination of Isosurfaces
Anemone
Anemone
Enhancing Infiniband with Openflow-Style SDN Capability
Enhancing Infiniband with Openflow-Style SDN Capability
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Reliability and Security in Mobile Ad Hoc Networks
Reliability and Security in Mobile Ad Hoc Networks
Internet Computing with Matlab
Internet Computing with Matlab
Portable MPICH2 Clusters with Android Devices
Portable MPICH2 Clusters with Android Devices
SIDR
SIDR
DAGDA Decoupling Address Generation from Loads and Stores
DAGDA Decoupling Address Generation from Loads and Stores
Ramit-Rule-Based Alert Management Information Tool
Ramit-Rule-Based Alert Management Information Tool
I/O Latency in the Linux Storage Stack
I/O Latency in the Linux Storage Stack

Pages