Font Size: a A A
Keyword [Exploiting]
Result: 81 - 100 | Page: 5 of 10
81. Improving performance of wireless ad hoc multicast exploiting cross-layer approach and diversity
82. Exploiting the link structure in mining network data
83. Weakly supervised learning from multiple modalities: Exploiting video, audio and text for video understanding
84. Improving processor efficiency by exploiting common-case behaviors of memory instructions
85. A study of language models for exploiting user feedback in information retrieval
86. Understanding and exploiting the acoustic propagation delay in underwater sensor networks
87. Exploiting system diversity in peer-to-peer publish-subscribe systems
88. Exploiting regularity for defect-based test
89. Exploiting neighborhood information in wireless networks: Channel assignment and replica detection
90. Exploiting interference through algebraic structure
91. Exploiting domain and task regularities for robust named entity recognition
92. Exploiting external/domain knowledge to enhance traditional text mining using graph-based methods
93. Embracing conflicts: Exploiting inconsistencies in distributed schedules using Simple Temporal Network representations
94. Exploiting multi-core processors for the service oriented architecture paradigm: Parallel XML processing and concurrent service orchestration
95. Exploiting system call interfaces to observe attackers in virtual machines
96. High-Dimensional Data Analysis by Exploiting Low-Dimensional Models with Applications in Synchrophasor Data Analysis in Power System
97. Exploiting Motion and Defocus Blurs for Computer Visio
98. Exploiting choice: Resource sharing control in Simultaneous MultiThreading microarchitectures
99. Exploiting task-document relations in support of information retrieval in the workplace
100. Exploiting wireless broadcasting nature for high-throughput 802.11 mesh networks
  <<First  <Prev  Next>  Last>>  Jump to