Font Size: a A A
Keyword [Exploiting]
Result: 141 - 160 | Page: 8 of 10
141. Exploiting the Benefits of Cooperation in Wireless Networks
142. Fully exploiting XML schema constraints on tree pattern query minimization
143. Exploiting cross layer opportunities for secrecy and efficiency in wireless networks
144. Recent trends in CAD tools for microwave circuit design exploiting space mapping technology
145. Bridging the semantic gap : Image and video understanding by exploiting attributes
146. Exploiting structure to efficiently solve large scale partially observable Markov decision processes
147. Exploiting algebraic structure in space-time coding for broadband wireless access
148. Modeling and Exploiting QoS Prediction in Cloud and Service Computing
149. Exploiting Multi-Look Information for Landmine Detection in Forward Looking Infrared Video
150. Exploiting redundancy for robust sensing
151. Loop unrolling along wavefronts and wavefront based techniques for exploiting instruction and thread level parellelism
152. Mobile Healthcare - Epidemic Disease Control Exploiting Contact Information In Mobile Devices
153. Exploiting properties of CMP cache traffic in designing hybrid packet/circuit switched NoCs
154. Exploiting multi-threaded application characteristics to optimize performance and power of chip-multiprocessors
155. Exploiting Time Series Primitives to Solve Realistic Data Mining Problems
156. Exploiting node mobility for energy optimization in wireless sensor networks
157. Exploiting remotely sensed hyperspectral data via spectral band grouping for dimensionality reduction and multiclassifiers
158. Exploiting Constraints for Effective Visual Tracking in Surveillance Applications
159. Understanding, Exploiting and Shaping Individual Behavior in Crowdsourcing Markets
160. A novel scheme for the prevention of management frame attacks on wireless LANs
  <<First  <Prev  Next>  Last>>  Jump to