Font Size: a A A
Keyword [Exploiting]
Result: 41 - 60 | Page: 3 of 10
41. Discovering And Exploiting The Structural Pattern Of Feature Vector Generated By Bag Of Visual Words Model Based Methods For Human Action Recognition
42. Virtual Extension Of Co-arrays Exploiting Coprime Arrays For Underdetermined DOA Estimation
43. Research On Human Action Recognition Exploiting Through-wall Radar
44. Research On Exploiting Multidimensional Domain-specific Features For News Recommendation Models
45. Improving Lifetime And Performance Of SSD By Exploiting Inherent Heterogeneous And Parallelism
46. Exploiting The Multiple Streams On The MIC-based Heterogeneous Platform
47. Real-time Visual Object Tracking Exploiting Superpixel And Correlation Filter
48. Stock Market Prediction By Exploiting Microblog Sentiment Analysis
49. Recommendation Algorithms By Exploiting Rating Matrix And Review Texts
50. Hybrid Recommendation Systems Via Exploiting Temporal Dynamics?Texts And Item Correlation For Cold Start Items
51. Adaptive Transmission And Interference Coordination For FD-MIMO Systems Exploiting Three Dimensional Statistical Channel State Information
52. Register File Soft Error Masking Effect Analysis And Partial Protection Techniques Exploiting
53. Exploiting Label Relationships In Multi-label Classification
54. Research On The Exploiting Entity's Communication Management Of Public Wireless Network Service Project In A District
55. Exploiting Multi-sources Information For Location Recommendation
56. Exploiting Dependency Parsing As An Auxiliary Task To Enhance AMR Parsing
57. Exploiting Temporal And Depth Information For Multi-frame Face Anti-spoofing
58. Research On End-to-End Movie Recommender System Exploiting Visual Content
59. Downlink Transmission And Interference Coordination For FD-MIMO Systems Exploiting Statistical Channel State Information
60. Research On Vulnerability Mining And Exploiting Of ARM Trustzone
  <<First  <Prev  Next>  Last>>  Jump to