Font Size: a A A
Keyword [Exploiting]
Result: 181 - 200 | Page: 10 of 10
181. Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks
182. A multiple queue replacement exploiting frequency for low level caches
183. Extensions of compressed sensing by exploiting prior knowledge
184. Exploiting program and property structure for efficient runtime monitoring
185. Enabling Entity Retrieval by Exploiting Wikipedia as a Semantic Knowledge Source
186. Probabilistic reasoning and learning on permutations: Exploiting structural decompositions of the symmetric group
187. Exploiting the physical layer to enhance wireless operation with cognitive radios
188. DOA estimation exploiting cyclostationarity based on direct data domain approach in a real environment
189. Exploiting direct-access networking in network-attached storage systems
190. Exploiting parallelism within multidimensional multirate digital signal processing systems
191. Exploring, defining, and exploiting recent store value locality
192. Exploiting sparsity, structure, and geometry for knowledge discovery
193. Exploiting Requirements Variability for Software Customization and Adaptation
194. Exploiting Parallelism in Multicore Processors through Dynamic Optimizations
195. Exploiting spatial correlation to enhance wireless security and facilitate pervasive computing
196. InforadarML: A multi-lingual information discovery tool exploiting automatic document categorization
197. Exploiting structure in combinatorial problems with applications in computational sustainability
198. Redundancy: Eliminating it, exploiting it
199. Exploiting early time scattering response using fractional Fourier transform
200. Exploiting predictable observer mobility for power-efficient sensor network communication
  <<First  <Prev  Next>  Last>>  Jump to