Font Size: a A A
Keyword [Exploiting]
Result: 61 - 80 | Page: 4 of 10
61. Research On Target Location Method Of Urban Non-Line-of-Sight Blind Area
62. Compression Of Encrypted Images Exploiting Statistical Models
63. Research On Anti-copying 2-D Code Algorithm By Exploiting Illegal Channel Noise Characteristics
64. Exploiting Topic-based Adversarial Neural Network For Cross-domain Keyphrase Extraction
65. Full-Duplex Massive MIMO Heterogeneous Network Backhaul Scheme By Exploiting Non-Orthogonal Multiple Access
66. The Research On Exploiting Physical Sensing Information For Bypassing Routing Holes
67. Research On Multi-carrier Secret Map Sharing Combined With EMD Steganography
68. Developing enabling technologies for lab-on-a-chip applications by exploiting microscale fluid phenomena
69. Exploiting Thread-Level Parallelism on Reconfigurable Architectures: a Cross-Layer Approac
70. Exploiting ILP, LLP and TLP in multi-core processors using off-the-critical path reconfigurable hardware
71. Exploiting global constraints for search and propagation
72. Narrowband-MIMO and MIMO-OFDM systems: Exploiting channel statistics for efficient use of feedback
73. Exploiting Node Mobility for Wireless Sensor Networks
74. Exploiting Common Search Interests across Languages for Web Search
75. Exploiting Stochasticity in Multi-agent Systems
76. Exploiting address space contiguity to accelerate TLB miss handling
77. Exploiting hierarchical parallelism using UPC
78. Visual tracking by exploiting observations and correlations
79. Exploiting Power for Smartphone Security and Privac
80. New information processing theory and methods for exploiting sparsity in wireless systems
  <<First  <Prev  Next>  Last>>  Jump to