You are here

Search results

Searching as anonymous (not verified)

248 items found in collection [showing 201 - 248]

Pages

  • CSV Spreadsheet
Urban Mobility Models for Vehicular Ad Hoc Networks
Urban Mobility Models for Vehicular Ad Hoc Networks
Exploration of the Spectral Histogram Representation for Face Detection
Exploration of the Spectral Histogram Representation for Face Detection
Towards Efficient Compilation of the HPjava Language for High Performance Computing
Towards Efficient Compilation of the HPjava Language for High Performance Computing
Experimental Approaches to Computational Geometric and Statistical Machine Translation Problems
Experimental Approaches to Computational Geometric and Statistical Machine Translation Problems
Improving Processor Efficiency by Statically Pipelining Instructions
Improving Processor Efficiency by Statically Pipelining Instructions
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Object Recognition Using Rapid Classification Trees
Object Recognition Using Rapid Classification Trees
Secure Communication over Container
Secure Communication over Container
Segmentation and Structure Determination in Electron Microscopy
Segmentation and Structure Determination in Electron Microscopy
Reuse of Personal Software Assets
Reuse of Personal Software Assets
Efficient XML Stream Processing and Searching
Efficient XML Stream Processing and Searching
Using De-Optimization to Re-Optimize Code
Using De-Optimization to Re-Optimize Code
Modeling and Comparison of Large-Scale Interconnect Designs
Modeling and Comparison of Large-Scale Interconnect Designs
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Towards Explainability in Machine Learning for Malware Detection
Towards Explainability in Machine Learning for Malware Detection
Modernized Version of Visual Cryptography
Modernized Version of Visual Cryptography
Testing Several Types of Random Number Generator
Testing Several Types of Random Number Generator
Time Series Analysis and Forecasting for Business Intelligence Applications
Time Series Analysis and Forecasting for Business Intelligence Applications
Machine Learning Approach for Generalizing Traffic Pattern-Based Adaptive Routing in Dragonfly Networks
Machine Learning Approach for Generalizing Traffic Pattern-Based Adaptive Routing in Dragonfly Networks
Cashtags
Cashtags
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Using a Specialized Grammar to Generate Probable Passwords
Using a Specialized Grammar to Generate Probable Passwords
Soft Error Event Monte Carlo Modeling and Simulation
Soft Error Event Monte Carlo Modeling and Simulation
Enhancing Pattern Classification with Relational Fuzzy Neural Networks and Square          BK-Products
Enhancing Pattern Classification with Relational Fuzzy Neural Networks and Square BK-Products
Evaluation of a Benchmark Suite Exposing Android System Complexities Using Region-Based Caching
Evaluation of a Benchmark Suite Exposing Android System Complexities Using Region-Based Caching
Effective Exploitation of a Large Data Register File
Effective Exploitation of a Large Data Register File
Information Hiding
Information Hiding
Sensor Systems and Signal Processing Algorithms for Wireless Applications
Sensor Systems and Signal Processing Algorithms for Wireless Applications
Plugging I/O Resource Leaks in General Purpose Real-Time Systems
Plugging I/O Resource Leaks in General Purpose Real-Time Systems
Grid Computing Infrastructure for Monte Carlo Applications
Grid Computing Infrastructure for Monte Carlo Applications
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting Spam Zombies by Monitoring Outgoing Messages
Applying Graph Neural Networks to Applications
Applying Graph Neural Networks to Applications
Topology Aware Routing Techniques for Next Generation Interconnect Networks
Topology Aware Routing Techniques for Next Generation Interconnect Networks
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Botnets, a Threat to National Security
Botnets, a Threat to National Security
Computational Transformation Between Different Symbolic Representations of BK Products of Fuzzy Relations
Computational Transformation Between Different Symbolic Representations of BK Products of Fuzzy Relations
On Lid Allocation and Assignment in Infiniband Networks
On Lid Allocation and Assignment in Infiniband Networks
Routing Algorithms for the Emerging Topologies in HPC and Data Center Networks
Routing Algorithms for the Emerging Topologies in HPC and Data Center Networks
Large-Scale Graph Computation and Summarization
Large-Scale Graph Computation and Summarization
On Exactitude in Geographic Information Science
On Exactitude in Geographic Information Science
Enhancing Anonymity of Anonymous P2P Content Sharing Systems
Enhancing Anonymity of Anonymous P2P Content Sharing Systems
Exploring Novel Burst Buffer Management on Extreme-Scale HPC Systems
Exploring Novel Burst Buffer Management on Extreme-Scale HPC Systems
Design, Implementation, and Evaluation of a Reliable Multicast Protocol for          Ethernet Switched Networks
Design, Implementation, and Evaluation of a Reliable Multicast Protocol for Ethernet Switched Networks
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Towards Ubiquitous Sensing Using Commodity WiFi
Towards Ubiquitous Sensing Using Commodity WiFi
Parallel Random Number Generation
Parallel Random Number Generation
Instant Approximate 1-Center on Road Networks via Embeddings
Instant Approximate 1-Center on Road Networks via Embeddings

Pages