Font Size:
a
A
A
Keyword [Exploiting]
Result: 81 - 100 | Page: 5 of 10
81.
Improving performance of wireless ad hoc multicast exploiting cross-layer approach and diversity
82.
Exploiting the link structure in mining network data
83.
Weakly supervised learning from multiple modalities: Exploiting video, audio and text for video understanding
84.
Improving processor efficiency by exploiting common-case behaviors of memory instructions
85.
A study of language models for exploiting user feedback in information retrieval
86.
Understanding and exploiting the acoustic propagation delay in underwater sensor networks
87.
Exploiting system diversity in peer-to-peer publish-subscribe systems
88.
Exploiting regularity for defect-based test
89.
Exploiting neighborhood information in wireless networks: Channel assignment and replica detection
90.
Exploiting interference through algebraic structure
91.
Exploiting domain and task regularities for robust named entity recognition
92.
Exploiting external/domain knowledge to enhance traditional text mining using graph-based methods
93.
Embracing conflicts: Exploiting inconsistencies in distributed schedules using Simple Temporal Network representations
94.
Exploiting multi-core processors for the service oriented architecture paradigm: Parallel XML processing and concurrent service orchestration
95.
Exploiting system call interfaces to observe attackers in virtual machines
96.
High-Dimensional Data Analysis by Exploiting Low-Dimensional Models with Applications in Synchrophasor Data Analysis in Power System
97.
Exploiting Motion and Defocus Blurs for Computer Visio
98.
Exploiting choice: Resource sharing control in Simultaneous MultiThreading microarchitectures
99.
Exploiting task-document relations in support of information retrieval in the workplace
100.
Exploiting wireless broadcasting nature for high-throughput 802.11 mesh networks
<<First
<Prev
Next>
Last>>
Jump to