You are here

Search results

Searching as anonymous (not verified)

288 items found in collection [showing 151 - 200]

Pages

  • CSV Spreadsheet
Exploration of Discriminatory Language in Software Artifacts and Developer Communications
Exploration of Discriminatory Language in Software Artifacts and Developer Communications
Lessons from the Human Mind
Lessons from the Human Mind
Using Social Media Data to Identify Health Risks
Using Social Media Data to Identify Health Risks
Game Based Visual-to-Auditory Sensory Substitution Training
Game Based Visual-to-Auditory Sensory Substitution Training
Spatial Approximate String Search
Spatial Approximate String Search
Scrambling Additive Lagged-Fibonacci Generators
Scrambling Additive Lagged-Fibonacci Generators
Context-Sensitive Semantic Segmentation
Context-Sensitive Semantic Segmentation
Precomputed Global Illumination of Isosurfaces
Precomputed Global Illumination of Isosurfaces
Anemone
Anemone
Enhancing Infiniband with Openflow-Style SDN Capability
Enhancing Infiniband with Openflow-Style SDN Capability
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Reliability and Security in Mobile Ad Hoc Networks
Reliability and Security in Mobile Ad Hoc Networks
Internet Computing with Matlab
Internet Computing with Matlab
Portable MPICH2 Clusters with Android Devices
Portable MPICH2 Clusters with Android Devices
SIDR
SIDR
DAGDA Decoupling Address Generation from Loads and Stores
DAGDA Decoupling Address Generation from Loads and Stores
Ramit-Rule-Based Alert Management Information Tool
Ramit-Rule-Based Alert Management Information Tool
I/O Latency in the Linux Storage Stack
I/O Latency in the Linux Storage Stack
Practical Opportunistic Routing in Wireless Mesh Networks
Practical Opportunistic Routing in Wireless Mesh Networks
Two Topics in Deep Learning Based Dialogue Systems
Two Topics in Deep Learning Based Dialogue Systems
BGP Anomalies Detection Based on Internet Numbers Allocation
BGP Anomalies Detection Based on Internet Numbers Allocation
Efficient Indexing Methods for Query Processing on Large Graphs
Efficient Indexing Methods for Query Processing on Large Graphs
Automated Empirical Optimization of High Performance Floating Point Kernels
Automated Empirical Optimization of High Performance Floating Point Kernels
TDMA and CDMA in Mobile Communications
TDMA and CDMA in Mobile Communications
Tuning and Optimization of Resource Management for Data Analytics Applications
Tuning and Optimization of Resource Management for Data Analytics Applications
Statistical Inferences for Shape Graphs and Time Series of Graphs
Statistical Inferences for Shape Graphs and Time Series of Graphs
Historical Study of the Development of Branch Predictors
Historical Study of the Development of Branch Predictors
Randomized Algorithms for Computing Low-Rank Matrix Approximation
Randomized Algorithms for Computing Low-Rank Matrix Approximation
Primitives and Schemes for Non-Atomic Information Authentication
Primitives and Schemes for Non-Atomic Information Authentication
SPRNG Gets a Normal Number Generator
SPRNG Gets a Normal Number Generator
Study on Loop Unrolling at the Assembly Code Level
Study on Loop Unrolling at the Assembly Code Level
Reduced Order Modeling for a Nonlocal Approach to Anomalous Diffusion Problems
Reduced Order Modeling for a Nonlocal Approach to Anomalous Diffusion Problems
Simple, Thread-Safe, Approximate Nearest Neighbor Algorithm
Simple, Thread-Safe, Approximate Nearest Neighbor Algorithm
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Crossing Reduction for Layered Hierarchical Graph Drawing
Crossing Reduction for Layered Hierarchical Graph Drawing
TIDR
TIDR
Core Monitors
Core Monitors
Protecting Cyberspace
Protecting Cyberspace
Towards Automating the Establishment and Evolution of Software Traceability
Towards Automating the Establishment and Evolution of Software Traceability
Tags
Tags
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Legally Resilient Signatures
Legally Resilient Signatures
Early Detection of Alzheimer's Disease Based on Volume and Intensity Changes in MRI Images
Early Detection of Alzheimer's Disease Based on Volume and Intensity Changes in MRI Images
Dependency Collapsing in Instruction-Level Parallel Architectures
Dependency Collapsing in Instruction-Level Parallel Architectures
Parameter Sensitive Feature Selection for Learning on Large Datasets
Parameter Sensitive Feature Selection for Learning on Large Datasets
Reducing the WCET of Applications on Low End Embedded Systems
Reducing the WCET of Applications on Low End Embedded Systems
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Using Probabilistic Techniques to Aid in Password Cracking Attacks
CC-MPI
CC-MPI
Using Deal.II to Solve Problems in Computational Fluid Dynamics
Using Deal.II to Solve Problems in Computational Fluid Dynamics

Pages