Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Exploiting-Open-Functionality'
Exploiting-Open-Functionality published presentations and documents on DocSlides.
Exploiting Low-Rank Structure in Computing Matrix
by pasty-toler
Powers. . with Applications . to Preconditioning...
Exploiting Common Neighborhoods to Optimize MPI Neighborhood Collectives
by alida-meadow
Seyed. H. Mirsadeghi. 1. , . Jesper. L. . Tr. Ó...
Exploiting the Circulant
by natalia-silvester
Structure of Tracking-by-detection with Kernels....
The Memory Hierarchy Cache, Main Memory, and Virtual Memory
by pasty-toler
Lecture for CPSC 5155. Edward Bosworth, Ph.D.. Co...
LogKV : Exploiting Key-Value Stores for Event Log Processing
by ellena-manuel
Zhao Cao*, Shimin Chen*, Feifei Li. #. , Min Wang...
The Value of System Aggregation in exploiting Renewable Energy Sources
by olivia-moreira
Professor . Saman. . Halgamuge. The University o...
Exploiting the past to inform the future of clinical outcome assessment
by danika-pritchard
PI: Geoff Manley, MD, PhD. Outcomes Core Lead: Mi...
Lecture 5 User Authentication
by natalia-silvester
modified from slides of . Lawrie. Brown. RFC 282...
Sreejaya Viswanathan 1 Rui
by liane-varnes
Tan. 2*. . David Yau. 1,3. 1. Advanced Digi...
Figurative language Essential Question:
by lois-ondreau
What do each of the figurative language terms on ...
Moinuddin K. Qureshi ECE, Georgia Tech
by myesha-ticknor
ISCA 2012 . Michele . Franceschini. , . Ashish....
Exploiting Dynamic Phase Distance Mapping for Phase-based T
by pasty-toler
+ . Also Affiliated with NSF Center for High-Perf...
Exploiting Parallelism
by karlyn-bohler
As we saw last week, dynamic instruction issue al...
Exploiting System Diversity in
by pamella-moone
Peer-to-Peer Publish-Subscribe Systems. Final Exa...
Automatically Exploiting Implicit
by debby-jeon
Pipeline . Parallelism from . Multiple . Dependen...
Exploiting the
by aaron
distance . and the . occurrence . of . words . fo...
Modeling and Exploiting Review Helpfulness for Summarizatio
by giovanna-bartolotta
Diane . Litman. Professor. , . Computer Science ....
Exploiting semantic annotation of content with Linked Data
by karlyn-bohler
RuSSIR Young Scientist Conference,. 24-28| 2015| ...
Matrix Profile II: Exploiting a Novel Algorithm and GPUs to
by aaron
Yan Zhu, Zachary Zimmerman, Nader . Shakibay....
Exploiting Parallelism
by debby-jeon
As we saw last week, dynamic instruction issue al...
Exploiting Metasploitable 2 with
by ellena-manuel
Metasploit. in Kali-Linux 2016. By Shain Amzovsk...
Exploiting Cost-Performance Trade-offs for
by giovanna-bartolotta
Modern Cloud Systems. Muntasir Raihan Rahman. 1. ...
1 Exploiting 3D-Stacked Memory Devices
by trish-goza
Rajeev . Balasubramonian. School of . Computing. ...
ALTER: Exploiting Breakable Dependences for Parallelization
by mitsue-stanley
Kaushik. . Rajan. Abhishek. . Udupa. William Th...
Exploiting commercial CMOS technologies for:
by alida-meadow
detection of Minimum Ionizing Particles for High ...
printf("\nYou typed [%s]\n\n", buff); return(0);
by olivia-moreira
"\x60\x52\x08\x28SEXY\x25\xfe\xbf\xbf";'` Exploit...
Joshua J. Drake
by tawny-fly
Inaugural InfoSec Southwest. March 31. st. 2012....
Computing Personalized PageRank Quickly by Exploiting Graph Structures Takanori
by marina-yarberry
acjp takiba yiwata issutokyoacjp ABSTRACT We prop...
ACE Exploiting Correlation for EnergyEfcient and Continuous Context Sensing Suman Nath Microsoft Research sumannmicrosoft
by ellena-manuel
com ABSTRACT We propose ACE Acquisitional Context ...
DECREASE CONQUER Description Decrease conquer is a general algorithm design st rategy based on exploiting the relationship between a solution to a given instance of a problem and a solution to a sma
by briana-ranney
The exploitat ion can be either topdown recursive...
Exploiting Urban Scenes for Visionaided Inertial Navigation Dimitrios G
by kittie-lecroy
Kottas and Stergios I Roumeliotis Department of C...
Exploiting Hardware Transactional Memory in MainMemory Databases Viktor Leis Alfons Kemper Thomas Neumann Fakult at f ur Informatik Technische Universit at M unchen Boltzmannstrae D Garching in
by jane-oiler
tumde Abstract So far transactional memoryalthough...
Understanding POWER Multiprocessors Susmit Sarkar Peter Sewell Jade Alglave Luc Maranget Derek Williams University of Cambridge Oxford University INRIA IBM Austin Abstract Exploiting todays multiproc
by faustina-dinatale
which in turn requires a good understanding of th...
RouteBricks Exploiting Parallelism To Scale Software Routers Mihai Dobrescu and Norbert Egi Katerina Argyraki ByungGon Chun Kevin Fall Gianluca Iannaccone Allan Knies Maziar Manesh Sylvia Ratna
by sherrill-nordquist
We propose a software router architecture that pa...
Exploiting CoarseGrained ask Data and Pipeline arallelism in Str eam Pr ograms Michael I
by natalia-silvester
Gordon illiam Thies and Saman Amarasinghe Massach...
Seeing stars Exploiting class elationships or sentiment categorization with espect to rating scales Bo ang and Lillian Lee Department of Computer Science Cornell Uni ersity Language echnologies
by conchita-marotz
g one to stars This task represents an interesting...
Exploiting Weak Connectivity for Mobile File Access Lily B
by phoebe-click
Mummert Maria R Ebling M Satyanarayanan School of...
A Practical Approach to Exploiting CoarseGrained Pipeline Parallelism in C Programs William Thies Vikram Chandrasekhar Saman Amarasinghe Computer Science and Articial Intelligence Laboratory Massachu
by sherrill-nordquist
edu Abstract The emergence of multicore processors...
Exploiting Unrelated Tasks in MultiTask Learning Bernardino RomeraParedes Andreas Argyriou Nadia BianchiBerthouze Massimiliano Pontil Dept
by giovanna-bartolotta
of Computer Science UCL Interactive Centre Univ C...
kt BLAST and kt SENSE Dynamic MRI With High Frame Rate Exploiting Spatiotemporal Correlations Jeffrey Tsao Peter Boesiger and Klaas P
by stefany-barnette
Pruessmann Dynamic images of natural objects exhi...
Load More...