Font Size: a A A
Keyword [Exploiting]
Result: 161 - 180 | Page: 9 of 10
161. Exploiting prior knowledge in information processing
162. Exploiting deferred destruction: An analysis of read -copy -update techniques in operating system kernels
163. Quantifying the security risk of discovering and exploiting software vulnerabilities
164. Exploiting cloud utility models for profit and ruin
165. Exploiting network coding in different wireless networks
166. Designing novel mobile systems by exploiting sensing, user context, and crowdsourcing
167. Exploiting locality in probabilistic inference
168. Exploiting query features in language modeling approach for information retrieval
169. Exploiting shared image structure fusion in multi-modality data inversion for atherosclerotic plaque characterization
170. Exploiting spatial diversity for synchronization and decoding in MIMO communications
171. A Learning-based Approach to Exploiting Sensing Diversity in Performance Critical Sensor Networks
172. TCP in Error-Prone, Intermittent MANETs: Exploiting Codes and Multipath
173. Exploiting Low Dimensionality in Nonlinear Optics and Other Physical Systems
174. Sparse Signal Recovery Exploiting Spatiotemporal Correlation
175. Exploiting Data-Parallelism in GPUs
176. Exploiting heterogeneous multicore processors through fine-grained scheduling and low-overhead thread migration
177. Exploiting high dimensional data for signal characterization and classification in feature space
178. Learning sub-word units and exploiting contextual information for open vocabulary speech recognition
179. Exploiting Sparsity for Data Dimensionality-Reduction
180. A scalable instruction queue design for exploiting parallelism
  <<First  <Prev  Next>  Last>>  Jump to