Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Exploiting'
Exploiting published presentations and documents on DocSlides.
kt BLAST and kt SENSE Dynamic MRI With High Frame Rate Exploiting Spatiotemporal Correlations Jeffrey Tsao Peter Boesiger and Klaas P
by stefany-barnette
Pruessmann Dynamic images of natural objects exhi...
Exploiting the Circulant Structure of Trackingbydetect
by ellena-manuel
Henriques Rui Caseiro Pedro Martins and Jorge Bat...
Exploiting the Commutativity Lattice Milind Kulkarni S
by myesha-ticknor
edu Donald Nguyen Dimitrios Prountzos Xin Sui Ke...
Exploiting the Power of Stereo Condences David Pfeiffe
by stefany-barnette
pfeifferdaimlercom Stefan Gehrig Daimler AG Sindel...
Exploiting and Protecting Dynamic Code Generation Chen
by pasty-toler
edu Chao Zhang UC Berkeley chaozberkeleyedu Tielei...
Exploiting Open Functionality in SMS-Capable Cellular Networks
by mitsue-stanley
(a)SMSNetwork (b)SMSFlowFigure1:Simpliedexampleso...
Exploiting Stylistic Idiosyncrasies for Authorship Attribution ...
by pamella-moone
Moshe Koppel Jonathan Schler Dept. of Computer ...
ALTER: Exploiting Breakable Dependences for Parallelization
by kittie-lecroy
Kaushik. . Rajan. Abhishek. . Udupa. William Th...
Epidemic density adaptive Data dissemination exploiting opp
by trish-goza
vanetS. Irem Nizamoglu. Computer Science & En...
Memory Buddies: Exploiting Page Sharing for
by luanne-stotts
Smart . Colocation. in Virtualized Data Centers....
Exploiting Social Context for Review Quality Prediction
by pamella-moone
Yue Lu . University of Illinois a...
Exploiting Next Generation Sequencing to investigate the ge
by alida-meadow
of. . parsnip root disease and develop a marker ...
Exploiting VOIP Silence for
by test
WiFi. Energy Savings in Smart Phones. Andrew J. ...
The Unadorned Desk: Exploiting the Physical Space around a Display as
by min-jolicoeur
those that are in their peripheral vision. In cont...
Automatically Exploiting Cross-Invocation Parallelism Using
by tawny-fly
Jialu. Huang,. Thomas B. . Jablin. ,. Stephen R....
Concurrency Control on Relational Databases
by lindy-dunigan
Seminar: Transaction Processing (Bachelor). SS 20...
Exploring and Exploiting Clones in Elections
by myesha-ticknor
Edith. . Elkind. Nanyang. . Technological. Univ...
Exploiting IP Assets
by natalia-silvester
IP Assets Exclusivity The IP system provide...
Exploiting NoSQL Like Never Before
by marina-yarberry
c0c0n2014. About Me. Independent Security . Resea...
Exploiting the Order of Multiplier Operands: A Low-Cost Ap
by alida-meadow
for HCCA Resistance. . Poulami. ...
Collecting and exploiting library data to inform strategy
by test
: the shift to . data-driven . approaches.. SCONU...
Four recent problems exploiting fuddled men John Beasley, May 2015
by pasty-toler
of 2 - Four recent problems exploiting fuddled me...
Exploiting Headword Dependency and Predictive Clustering for Language
by min-jolicoeur
This work was done while the author was visiting ...
Exploiting Headword Dependency and Predictive Clustering for Language
by min-jolicoeur
This work was done while the author was visiting ...
Understanding and exploiting idiosyncrasy in the use of ICT devices su
by debby-jeon
Amazingly enough there always seems to be somebody...
American Economic Review 101 (August 2011): 16761706http://www.a
by celsa-spraggs
D ROGOFF: NANSH TO Exploiting the multicentury spa...
Let them sing before the LORD,
by phoebe-click
for he comes to judge the earth. . He will jud...
Exploiting Core Scrum Practices
by trish-goza
at the Program Level. Chris Waggoner, CSC - Keep ...
Decoupled Compressed Cache: Exploiting Spatial Locality for EnergyOpti
by stefany-barnette
Permission to make digital or hard copies of all o...
Reasoning Under Uncertainty:
by liane-varnes
Independence. Jim Little. Uncertainty . 3. Nov 5,...
3SOCIAL THEORY
by pamella-moone
Exploiting and Controlling the Consumer CONCLUSION...
Exploiting domain and task regularities for robust named en
by alida-meadow
Ph.D. thesis proposal. Andrew O. Arnold. Machine ...
Exploiting Asymmetric Chip Multiprocessors
by karlyn-bohler
Sam . Ganzfried. Ryan . Sukauye. Aniket Ponkshe. ...
Improving Link Quality by Exploiting Channel Diversity in W
by marina-yarberry
Manjunath D, Mun Choon Chan, and Ben Leong. Natio...
Exploiting the complementarity
by phoebe-click
s. tructure: stability analysis of contact dynami...
MATCHMAKING
by kittie-lecroy
EXPLOITING STEAM LOBBIES AND BY LUIGI AURIEMMA D...
SocialSwarm: Exploiting Distance in Social Networks for Col
by stefany-barnette
Presented by: Su Yingbin. Outline. Introduction. ...
Exploiting Remote Memory Operations to Design Efficient Rec
by natalia-silvester
P. Balaji, K. Vaidyanathan, S. Narravula, K. Savi...
Red Scarf Girl
by sherrill-nordquist
6. The Sound of Drums and Gongs. “There was a t...
Exploiting Structured Ontology to Organize Scattered Online
by tatiana-dople
Yue Lu. , . Huizhong. . Duan. , . Hongning. Wan...
Load More...