You are here

Search results

Searching as anonymous (not verified)

259 items found in collection [showing 1 - 50]

Pages

  • CSV Spreadsheet
Android Benchmarking for Architectural Research
Android Benchmarking for Architectural Research
Joint Vehicle Dispatching and Redeployment for Emergency Medical Services with Multi-Critic Reinforcement Learning
Joint Vehicle Dispatching and Redeployment for Emergency Medical Services with Multi-Critic Reinforcement Learning
Sparse Representations for Recognition
Sparse Representations for Recognition
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Effective and Efficient Approach for Clusterability Evaluation
Effective and Efficient Approach for Clusterability Evaluation
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Improving Processor Efficiency Through Enhanced Instruction Fetch
Improving Processor Efficiency Through Enhanced Instruction Fetch
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
Fire Ant
Fire Ant
Enhanced Security for Mobile Agent Systems
Enhanced Security for Mobile Agent Systems
Path Planning Algorithms for Autonomous Vehicles
Path Planning Algorithms for Autonomous Vehicles
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Convolutional Neural Networks for Hurricane Road Closure Probability and Tree Debris Estimation
Convolutional Neural Networks for Hurricane Road Closure Probability and Tree Debris Estimation
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Deep
Deep
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
APECS
APECS
F-Table
F-Table
Building Trusted Computer Systems via Unified Software Integrity Protection
Building Trusted Computer Systems via Unified Software Integrity Protection
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Various Approximate Methods to Measure the Uniformity of Quasirandom Sequences
Various Approximate Methods to Measure the Uniformity of Quasirandom Sequences
Small Discrete Fourier Transforms on Graphics Processors
Small Discrete Fourier Transforms on Graphics Processors
Characterization and Optimization of the I/O Software Stack in Complex Applications and Workflows
Characterization and Optimization of the I/O Software Stack in Complex Applications and Workflows
College of Arts and Sciences Application of Sampling-Based Model Predictive Control to Motion Planning for Robotic          Manipulators
College of Arts and Sciences Application of Sampling-Based Model Predictive Control to Motion Planning for Robotic Manipulators
System Architecture That Facilitates Collaboration via Handheld Devices (PDAS)
System Architecture That Facilitates Collaboration via Handheld Devices (PDAS)
Representation of Association Semantics with Annotations in a Biodiversity          Informatics System
Representation of Association Semantics with Annotations in a Biodiversity Informatics System
Understanding the Determining Factors and Their Cooperative Effects on Protein Folding
Understanding the Determining Factors and Their Cooperative Effects on Protein Folding
Deconstruction and Analysis of Email Messages
Deconstruction and Analysis of Email Messages
Knowledge Graph Based Entity Retrieval for Query Rewriting
Knowledge Graph Based Entity Retrieval for Query Rewriting
Reducing the Cost of Comparisons within Conditional Transfers of Control
Reducing the Cost of Comparisons within Conditional Transfers of Control
There & Never Back Again
There & Never Back Again
Optimizing MPI Point-to-Point Communication Performance on RDMA-Enabled SMP-CMP Clusters
Optimizing MPI Point-to-Point Communication Performance on RDMA-Enabled SMP-CMP Clusters
Multiagent Dynamic Reasoning About Belief and Trust
Multiagent Dynamic Reasoning About Belief and Trust
Hybrid Keyword Search Across Peer-to-Peer Federated Data
Hybrid Keyword Search Across Peer-to-Peer Federated Data
Algorithms for Solving Near Point Problems
Algorithms for Solving Near Point Problems
Tagless Access Buffer
Tagless Access Buffer
Future of Android with Liquid Development
Future of Android with Liquid Development
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
Parallelization of Carbon Nanotube Based Composites
Parallelization of Carbon Nanotube Based Composites
Study on Semantic Relation Representations in Neural Word Embeddings
Study on Semantic Relation Representations in Neural Word Embeddings
Platforms for Hpjava
Platforms for Hpjava
Mining on Graphs
Mining on Graphs
Automated Face Tracking and Recognition
Automated Face Tracking and Recognition
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Metrics and Techniques to Guide Software Development
Metrics and Techniques to Guide Software Development
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Reflective, 3-Dimensional Behavior Tree Approach to Vehicle Autonomy
Reflective, 3-Dimensional Behavior Tree Approach to Vehicle Autonomy
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the          Ever-Growing Databases
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the Ever-Growing Databases

Pages