<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Exploiting hosted payload opportunities: Surrey´s lessons learned from OTB and other missions
2
Exploiting hubs for self-adaptive secondary re-ranking in bug report duplicate detection
3
Exploiting human actions and object context for recognition tasks
4
Exploiting human cooperation in human-centered robot navigation
5
Exploiting human state information to improve GPS sampling
6
Exploiting human steering models for path prediction
7
Exploiting Hybrid Analysis in Solving Electrical Networks
8
Exploiting hybrid channel information for downlink multi-user MIMO scheduling
9
Exploiting hybrid measurements for network troubleshooting
10
Exploiting hybrid models for spectrum access: Building on the capabilities of geolocation databases
11
Exploiting Hybrid SPM-Cache Architectures to Reduce Energy Consumption for Embedded Computing
12
Exploiting hyperbolic functions to increase linearity in low-voltage floating-gate transconductance amplifiers
13
Exploiting hypergraph partitioning for efficient Boolean satisfiability
14
Exploiting hyperlinks for automatic information discovery on the WWW
15
Exploiting Hyper-Loop Parallelism in Vectorization to Improve Memory Performance on CUDA GPGPU
16
Exploiting Hyperspectral Hypertemporal Imagery with Feature Clustering for Invasive Species Detection
17
Exploiting hypertext valuation links for business decision making: a portfolio management illustration
18
Exploiting Hyponymy in Extracting Relations and Enhancing Ontologies
19
Exploiting hysteresis in a CMOS buffer
20
Exploiting Hysteresys in MCML Circuits
21
Exploiting I/Q Imbalance in Direct Conversion Transceivers for Improving the Performance of a V-BLAST OFDM System
22
Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency
23
Exploiting idle cycles for algorithm level re-computing
24
Exploiting idle resources for reducing SER of microprocessor functional units
25
Exploiting ILP in page-based intelligent memory
26
Exploiting ILP, DLP, TLP, and MPI to accelerate matrix multiplication on Xeon processors
27
Exploiting ILP, TLP, and DLP with the polymorphous TRIPS architecture
28
Exploiting ILP, TLP, and DLP with the polymorphous trips architecture
29
Exploiting image formation knowledge for motion analysis
30
Exploiting Image Local and Nonlocal Consistency for Mixed Gaussian-Impulse Noise Removal
31
Exploiting image processing locality in cache pre-fetching
32
Exploiting image structural similarity for single image rain removal
33
Exploiting Implementation Diversity and Partial Connection of Routers in Application-Specific Network-on-Chip Topology Synthesis
34
Exploiting implicit affective labeling for image recommendations
35
Exploiting Implicit Information From Data for Linear Macromodeling
36
Exploiting implicit user feedback in interactive video retrieval
37
Exploiting imprecise constraints in particle filtering based target tracking
38
Exploiting incrementality in SAT-based search for multiple equivalence-preserving transformations in combinational circuits
39
Exploiting independence for co-channel interference cancellation and symbol detection in multiuser digital communications
40
Exploiting Independence in Design of Web Service Composition
41
Exploiting independence measures in dual spaces with application to atrial f-wave extraction in the ECG
42
Exploiting independence to cancel interferences due to adjacent cells in a DS-CDMA cellular system
43
Exploiting independent state for network intrusion detection
44
Exploiting Indifference for Customization of Partial Order Skylines
45
Exploiting industrial robotics
46
Exploiting inertia of wind turbines in power network frequency control: A model predictive control approach
47
Exploiting information centric networking to build an attacker-controlled content delivery network
48
Exploiting information content and semantics to accurately compute similarity of GO-based annotated entities
49
Exploiting information content in relative motion
50
Exploiting Information Geometry to Improve the Convergence of Nonparametric Active Contours
51
Exploiting information geometry to improve the convergence of nonparametric active contours
52
Exploiting Information Geometry to Improve the Convergence Properties of Variational Active Contours
53
Exploiting information in the biomolecular domain: reaching out to medicine
54
Exploiting Information Relationships for Access Control
55
Exploiting information theory for adaptive mobility and resource management in future cellular networks
56
Exploiting inherent information redundancy to manage transient errors in NoC routing arbitration
57
Exploiting Inherent Parallelisms for Accelerating Linear Hough Transform
58
Exploiting inherent regularity in control of multilegged robot locomotion by evolving neural fields
59
Exploiting Inherent Task-Based Parallelism in Object-Oriented Programming
60
Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems
61
Exploiting in-network functions enabling SDN for evolving future internet architecture
62
Exploiting input cyclostationarity for blind channel identification in OFDM systems
63
Exploiting input information in a model reduction algorithm for massively coupled parasitic networks
64
Exploiting Input Parameter Uncertainty for Reducing Datapath Precision of SPICE Device Models
65
Exploiting input space symmetries in video deinterlacing using radial basis function networks
66
Exploiting instruction- and data-level parallelism
67
Exploiting instruction level parallelism in geometry processing for three dimensional graphics applications
68
Exploiting Instruction Level Parallelism In Processors By Caching Scheduled Groups
69
Exploiting instruction level parallelism with the DS architecture
70
Exploiting instruction redundancy for transient fault tolerance [microprocessor applications]
71
Exploiting instruction-level parallelism for integrated control-flow monitoring
72
Exploiting Instruction-level Parallelism With The Conjugate Register File Scheme
73
Exploiting Instruction-level Parallelism: The Multithreaded Approach
74
Exploiting instruction-level resource parallelism for transparent, integrated control-flow monitoring
75
Exploiting Intel TSX for fault-tolerant execution in safety-critical systems
76
Exploiting intellectual properties in ASIP designs for embedded DSP software
77
Exploiting intellectual properties with imprecise design costs for system-on-chip synthesis
78
Exploiting intelligent decision supports for model-driven biomedical system analysis
79
Exploiting intelligent systems techniques within an autonomous regional active network management system
80
Exploiting Intensive Multithreading for the Efficient Simulation of 3D Seismic Wave Propagation
81
Exploiting Inter and Intra Application Dynamism to Save Energy
82
Exploiting inter task dependencies for dynamic load balancing
83
Exploiting interaction between sensory morphology and learning
84
Exploiting interchannel correlations in multichannel compressed sensing ECG systems
85
Exploiting interclass rules for focused crawling
86
Exploiting Interest Locality for Peer-Assisted Search in UGC Video Systems
87
Exploiting interest-based proximity for content recommendation in peer-to-peer networks
88
Exploiting inter-event stream correlations between output event streams of non-preemptively scheduled tasks
89
Exploiting interference alignment for sum rate enhancement in D2D-enabled cellular networks
90
Exploiting Interference Alignment in Multi-Cell Cooperative OFDMA Resource Allocation
91
Exploiting Interference Diversity for Event-Based Spectrum Sensing
92
Exploiting interference for efficient distributed computation in cluster-based wireless sensor networks
93
Exploiting interference locality in coordinated multi-point transmission systems
94
Exploiting inter-flow redundancy: context replication in ROHC-TCP
95
Exploiting interframe correlation in spectral quantization: a study of different memory VQ schemes
96
Exploiting inter-frame correlations in compound video coding
97
Exploiting interframe redundancies in the lossless compression of 3D medical images
98
Exploiting interlayer correlation of SNR scalable video
99
Exploiting inter-layer correlations in scalable HEVC for the support of screen content videos
100
Exploiting inter-microphone agreement for hypothesis combination in distant speech recognition
101
Exploiting Internal Operation Patterns during the High-Level Synthesis of Time-Constrained Circuits
102
Exploiting Internal Parallelism of Flash-based SSDs
103
Exploiting Internet Delay Space Properties for Selecting Distinct Network Locations
104
Exploiting inter-processor data sharing for improving behavior of multi-processor SoCs
105
Exploiting inter-thread temporal locality for chip multithreading
106
Exploiting Interval Arithmetic for predicting real arrays performances — The linear case
107
Exploiting Inter-Warp Heterogeneity to Improve GPGPU Performance
108
Exploiting intracardiac and surface recording modalities for atrial signal extraction in atrial fibrillation
109
Exploiting intranet technology in facilitating knowledge management among quantity surveying´s consulting firms
110
Exploiting intra-packet dependency for fine-grained protocol format inference
111
Exploiting Intrastructure Information for Secondary Structure Prediction with Multifaceted Pipelines
112
Exploiting intrinsic fluctuations to identify model parameters
113
Exploiting Intrinsic Variability of Filamentary Resistive Memory for Extreme Learning Machine Architectures
114
Exploiting invariant structure for controlling multiple muscles in anthropomorphic legs: An inspiration from electromyography analysis of human pedaling
115
Exploiting inverter-interfaced DG for Voltage unbalance mitigation and ancillary services in distribution systems
116
Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks
117
Exploiting IoT-based sensed data in smart buildings to model its energy consumption
118
Exploiting IP Networks: Video on demand implementation IET NGN conference
119
Exploiting irregular MoS2 nanostructures for very high frequency (VHF) nanomechanical resonators with mode shape engineering and frequency control
120
Exploiting Irregular Variable Node Degree in a MIMO System
121
Exploiting Isochrony in Self-Triggered Control
122
Exploiting isomorphism for compaction and faster simulation of binary decision diagrams
123
Exploiting Item Taxonomy for Solving Cold-Start Problem in Recommendation Making
124
Exploiting iteration-level parallelism in dataflow programs
125
Exploiting iterative learning control for input shaping, with application to a wafer stage
126
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization
127
Exploiting Java instruction/thread level parallelism with horizontal multithreading
128
Exploiting java scientific libraries with the scala language within the scalalab environment
129
Exploiting Java Through Binary Translation for Low Power Embedded Reconfigurable Systems
130
Exploiting Java-ILP on a simultaneous multi-trace instruction issue (SMTI) processor
131
Exploiting Job Response-Time Information in the Co-Design of Real-Time Control Systems
132
Exploiting JPEG Compression for Image Retrieval
133
Exploiting JPEG2000 and Jpip for Image Based Authentication
134
Exploiting Jump-Resonance Hysteresis in Silicon Auditory Front-Ends for Extracting Speaker Discriminative Formant Trajectories
135
Exploiting jump-resonance hysteresis in silicon cochlea for formant trajectory encoding
136
Exploiting just-enough parallelism when mapping streaming applications in hard real-time systems
137
Exploiting k-distance signature for Boolean matching and G-symmetry detection
138
Exploiting Knowledge Management for Supporting Multi-Band Spectrum Selection in Non-Stationary Environments
139
Exploiting knowledge management for supporting spectrum selection in Cognitive Radio networks
140
Exploiting knowledge representation in an intelligent tutoring system for English lexical errors
141
Exploiting Known Interference as Green Signal Power for Downlink Beamforming Optimization
142
Exploiting known latitudinal variations for improved limited-angle tomographic reconstruction of the plasmasphere
143
Exploiting known sound source signals to improve ICA-based robot audition in speech separation and recognition
144
Exploiting known unknowns: Scene induced cross-calibration of lidar-stereo systems
145
Exploiting label dependency and feature similarity for multi-label classification
146
Exploiting Laguerre functions to improve the feasibility/performance compromise in MPC
147
Exploiting Landscape Information to Avoid Premature Convergence in Evolutionary Search
148
Exploiting language cluster information for language pair identification
149
Exploiting large on-chip memory space through data recomputation
150
Exploiting large scale BSS technique for source recovery in massive MIMO systems
151
Exploiting large system dynamics for designing simple data center schedulers
152
Exploiting large-scale MIMO techniques for physical layer security with imperfect channel state information
153
Exploiting Latent I/O Asynchrony in Petascale Science Applications
154
Exploiting Latent I/O Asynchrony in Petascale Science Applications
155
Exploiting latent semantic information in statistical language modeling
156
Exploiting laxity for heterogeneous multiprocessor real-time scheduling
157
Exploiting LCSVC Algorithm for Expression Recognition
158
Exploiting Lean Six-Sigma Quality Tools to Improve Test and Other Processes
159
Exploiting learning technologies for World Wide Web agents
160
Exploiting level sensitive latches in wire pipelining
161
Exploiting lexical information for function tag labeling
162
Exploiting LIDAR-based features on pedestrian detection in urban scenarios
163
Exploiting limited data for parsing
164
Exploiting limited feedback in tomorrow´s wireless communication networks
165
Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming
166
Exploiting Lineage for Confidence Computation in Uncertain and Probabilistic Databases
167
Exploiting linear block codes for blind co-channel interference reduction in TDMA based wireless communication systems
168
Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation
169
Exploiting link correlation for core-based dissemination in wireless sensor networks
170
Exploiting Linked Data to Build Web Applications
171
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
172
Exploiting local and global patch rarities for saliency detection
173
Exploiting local and global scene constraints in modeling large-scale dynamic 3D scenes from aerial video
174
Exploiting local and global structures for TIMIT phone classification
175
Exploiting local auto-correlation function for fast video to reference image alignment
176
Exploiting Local Channel State Information for Random Access in Cooperative Networks
177
Exploiting Local Clouds in the Internet of Everything Environment
178
Exploiting Local Coherent Patterns for Unsupervised Feature Ranking
179
Exploiting local colour dependencies in binary tree predictive coding
180
Exploiting local connectivity of CMOL architecture for highly parallel orientation selective neuromorphic chips
181
Exploiting Local Data Uncertainty to Boost Global Outlier Detection
182
Exploiting local features from deep networks for image retrieval
183
Exploiting local logic structures to optimize multi-core SoC floorplanning
184
Exploiting local popularity to prune routing indices in peer-to-peer systems
185
Exploiting local quasiconvexity for gradient estimation in modifier-adaptation schemes
186
Exploiting local similarity for indexing paths in graph-structured data
187
Exploiting local STFT properties
188
Exploiting local structure for tracking plant cells in noisy images
189
Exploiting locality based Fourier transform for ECG signal diagnosis
190
Exploiting locality for data management in systems of limited bandwidth
191
Exploiting locality for irregular scientific codes
192
Exploiting locality for low-power design
193
Exploiting locality in the run-time parallelization of irregular loops
194
Exploiting locality of demand to improve the performance of wireless data broadcasting
195
Exploiting locality on parallel irregular problem computations
196
Exploiting locality to improve circuit-level timing speculation
197
Exploiting locality to improve leakage reduction in embedded drowsy I-caches at same area/speed
198
Exploiting Locality to Provide Adaptive Routing of Real-Time Flows in Global Internets: Abstract
199
Exploiting locality using geographic coordinates and semantic proximity in Chord
200
Exploiting locality: a flexible DSM approach
201
Exploiting localization for faster power system dynamic simulations
202
Exploiting location awareness toward improved wireless system design in cognitive radio
203
Exploiting location based social networks in business predictions
204
Exploiting Location Information for Concurrent Transmissions in Multihop Wireless Networks
205
Exploiting Location Semantics for Realizing Cross-Referencing Proactive Location-Based Services
206
Exploiting logic simulation to improve simulation-based sequential ATPG
207
Exploiting logical mobility in mobile computing middleware
208
Exploiting long-range opportunistic links to improve delivery, delay and energy consumption in wireless sensor networks
209
Exploiting long-range temporal dynamics of speech for noise-robust speaker recognition
210
Exploiting Long-Term Channel Correlation in Limited Feedback SDMA Through Channel Phase Codebook
211
Exploiting Long-Term Connectivity and Visual Motion in CRF-Based Multi-Person Tracking
212
Exploiting long-term observations for track creation and deletion in online multi-face tracking
213
Exploiting Long-Term Redundancies in Reconstructed Video
214
Exploiting long-term statistics in spatially correlated multi-user MIMO systems with quantized channel norm feedback
215
Exploiting long-term temporal dependencies in NMF using recurrent neural networks with application to source separation
216
Exploiting lookahead in parallel simulation
217
Exploiting lookahead in parallel simulation of SS7 telecommunication networks
218
Exploiting Lookahead in Synchronous Parallel Simulation
219
Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis
220
Exploiting loop-level parallelism on coarse-grained reconfigurable architectures using modulo scheduling
221
Exploiting loop-level parallelism on coarse-grained reconfigurable architectures using modulo scheduling
222
Exploiting loop-level parallelism on multi-core architectures for the wimax physical layer
223
Exploiting loop-level parallelism with the Shift Architecture
224
Exploiting loudness dynamics in stochastic models of turn-taking
225
Exploiting low drain currents for the extraction of DC MOSFET parameters
226
Exploiting Low Entropy to Reduce Wire Delay
227
Exploiting Low Level Parallelism In The Dynamic Control Of Manipulators
228
Exploiting Low-Cost Directional Antennas in 2.4 GHz IEEE 802.15.4 Wireless Sensor Networks
229
Exploiting Low-Rank Approximations of Kernel Matrices in Denoising Applications
230
Exploiting low-rank structures from cross-camera images for robust person re-identification
231
Exploiting LTE D2D communications in M2M Fog platforms: Deployment and practical issues
232
Exploiting Lustre File Joining for Effective Collective IO
233
Exploiting MAC flexibility in WiMAX for media streaming
234
Exploiting machine learning algorithms for cognitive radio
235
Exploiting machine learning for intelligent room lighting applications
236
Exploiting macrodiversity based decoder feedback for cochannel interference suppression in narrowband cellular mobile systems
237
Exploiting macrodiversity in dense multihop networks and relay channels
238
Exploiting magnitude and phase spectral information for converted speech detection
239
Exploiting Malicious Node Detection for Lifetime Extension of Sensor Networks
240
Exploiting manifold geometry in hyperspectral imagery
241
Exploiting manufacturing knowledge to support decision-making for mechanical product defect prevention
242
Exploiting map information for driver intention estimation at road intersections
243
Exploiting markov random field and an extended range linear approximation for 2D inverse scattering problems
244
Exploiting Markov random fields in Microwave tomography
245
Exploiting Massive Parallelism for IndexingMulti-Dimensional Datasets on the GPU
246
Exploiting massive PMU data analysis for LV distribution network model validation
247
Exploiting material properties to select a suitable wavelet basis for efficient rendering
248
Exploiting Matrix Symmetry to Improve FPGA-Accelerated Conjugate Gradient
249
Exploiting maximum performance of multichannel multiple access using half-duplex transceiver
250
Exploiting maximum throughput in 3D multicore architectures with stacked NUCA cache
251
Exploiting MB level parallelism in H.264/AVC encoder for multi-core platform
252
Exploiting mechanical flexure to design tunable periodic structures
253
Exploiting Memory Access Patterns to Improve Memory Performance in Data-Parallel Architectures
254
Exploiting memory and soft-decision information in channel optimized quantization for correlated fading channels
255
Exploiting memory bank locality in multiprocessor SoC architectures
256
Exploiting memory customization in FPGA for 3D stencil computations
257
Exploiting memory hierarchies in scientific computing
258
Exploiting memory hierarchy for a Computational Fluid Dynamics accelerator on FPGAs
259
Exploiting memory in dynamic average consensus
260
Exploiting memory locality in distributed key-value stores
261
Exploiting Memory Soft Redundancy for Joint Improvement of Error Tolerance and Access Efficiency
262
Exploiting Memory-Boundedness in Energy-Efficient Hard Real-Time Scheduling
263
Exploiting Memory-Level Parallelism in Reconfigurable Accelerators
264
Exploiting memristance for low-energy neuromorphic computing hardware
265
Exploiting memristance in adaptive asynchronous spiking neuromorphic nanotechnology systems
266
Exploiting memristive device behavior for emerging digital logic and memory applications
267
Exploiting metadata for ontology-based visual exploration of weakly structured text documents
268
Exploiting Metadata Links to Support Information Retrieval in Document Management Systems
269
Exploiting method-level parallelism in single-threaded Java programs
270
Exploiting methods of comprehensive development of ocean energy for Chinese islands
271
Exploiting Metrics for Similarity-Based Semantic Web Service Discovery
272
Exploiting metropolitan optical networks for high speed interconnections at schools
273
Exploiting microarchitectural redundancy for defect tolerance
274
Exploiting microarchitectural redundancy for defect tolerance
275
Exploiting Microscopic Spectrum Opportunities in Cognitive Radio Networks
276
Exploiting Microscopic Spectrum Opportunities in Cognitive Radio Networks via Coordinated Channel Access
277
Exploiting microstructured optical fiber platform for generating temporal parabolic pulse
278
Exploiting microwave scanning radar for monitoring Icelandic volcanic eruption source parameters
279
Exploiting military OpSec through open-source vulnerabilities
280
Exploiting MIMO antennas in cooperative cognitive radio networks
281
Exploiting MIMO SAR Potentialities With Efficient Cross-Track Constellation Configurations for Improved Range Resolution
282
Exploiting mirrors for laser stripe 3D scanning
283
Exploiting mixed-mode parallelism for matrix operations on the HERA architecture through reconfiguration
284
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone´s Battery
285
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection
286
Exploiting Mobile and Wireless Technologies in Vocational Training
287
Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions
288
Exploiting mobile social behaviors for Sybil detection
289
Exploiting Mobile Technologies to Build a Knowledge Mobilization Capability: A Work System-Based Method
290
Exploiting Mobility Diversity in Sharing Wireless Access: A Game Theoretic Approach
291
Exploiting mobility for data collection in Wireless Sensor Networks with delay reduction
292
Exploiting mobility for efficient data dissemination in wireless sensor networks
293
Exploiting Mobility for Key Establishment
294
Exploiting mobility for location promotion in location-based social networks
295
Exploiting mobility for quality-maximized data collection in energy harvesting sensor networks
296
Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks
297
Exploiting mobility heterogeneity in micro-aerial vehicle deployments for environment exploration
298
Exploiting mobility in large scale ad hoc wireless networks
299
Exploiting mobility in multihop infostation networks to decrease transmit power
300
Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms
301
Exploiting Mobility Patterns to Reduce Re-Authentication Overheads in Infrastructure WLAN Networks
302
Exploiting Mobility Prediction for Dependable Service Composition in Wireless Mobile Ad Hoc Networks
303
Exploiting Modbus Protocol in Wired and Wireless Multilevel Communication Architecture
304
Exploiting model independence for parallel PCS network simulation
305
Exploiting Model Morphology for Event-Based Testing
306
Exploiting Model of Personality and Emotion of Learning Companion Agent
307
Exploiting Modified Placement and Hardwired Resources to Provide High Reliability in FPGAs
308
Exploiting MODTRAN radiation transport for atmospheric correction: The FLAASH algorithm
309
Exploiting modularity and hierarchical modularity to infer large causal gene regulatory network
310
Exploiting Module Locality to Improve Software Fault Prediction
311
Exploiting Monge structures in optimum subwindow search
312
Exploiting More Parallelism from Applications Having Generalized Reductions on GPU Architectures
313
Exploiting Morphology and Local Word Reordering in English-to-Turkish Phrase-Based Statistical Machine Translation
314
Exploiting Motion Correlations in 3-D Articulated Human Motion Tracking
315
Exploiting motion estimation resilience to approximated metrics on SIMD-capable general processors: From Atom to Nehalem
316
Exploiting motion priors in visual odometry for vehicle-mounted cameras with non-holonomic constraints
317
Exploiting MPEG-7 texture descriptors for fast H.264 mode decision
318
Exploiting MR venography segmentation for the accurate model estimation of BOLD signal
319
Exploiting Multi- and Many-core Parallelism for Accelerating Image Compression
320
Exploiting multi path routing to achieve service differentiation in sensor networks
321
Exploiting multi-agent interactions for identifying the best-payoff information source
322
Exploiting multi-agent scheme for traffic management in ATM networks
323
Exploiting Multi-agent System Technology within an Autonomous Regional Active Network Management System
324
Exploiting Multi-Antenna Diversity in Overlaid Wireless Network: Transmission Capacity Analysis
325
Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks
326
Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks
327
Exploiting Multi-Aspect SAR Data for Object Extraction
328
Exploiting multi-band transmission line interconnects to improve the efficiency of cache coherence in multiprocessor system-on-chip
329
Exploiting multicast in LTE networks for smart grids demand response
330
Exploiting multicast messages in cache-coherence protocols for NoC-based MPSoCs
331
Exploiting Multi-Channel Clustering for Power Efficiency in Sensor Networks
332
Exploiting Multichannel Diversity for Cooperative Multicast in Cognitive Radio Mesh Networks
333
Exploiting Multichannel Diversity in Cognitive Radio Networks
334
Exploiting Multi-Channel Diversity in Spectrum-Agile Networks
335
Exploiting multi-channel transmission for opportunistic access with renewable energy sources
336
Exploiting Multi-core Architectures in Clusters for Enhancing the Performance of the Parallel Bootstrap Simulation Algorithm
337
Exploiting multicore processors in PLCs using libraries for IEC 61131-3
338
Exploiting Multi-core Processors to Improve Time Predictability for Real-Time Java Computing
339
Exploiting multi-core SoC architecture for MU-MIMO schedulers
340
Exploiting multicores to optimize business process execution
341
Exploiting multi-cycle false paths in the performance optimization of sequential circuits
342
Exploiting multicycle false paths in the performance optimization of sequential logic circuits
343
Exploiting multi-evidence from multiple user’s interests to personalizing information retrieval
344
Exploiting Multi-Fractal and Chaotic Phenomena of Motion in Image Sequences: Foundations
345
Exploiting multi-grained parallelism in reconfigurable SBC architectures
346
Exploiting multihoming for low latency handoff in heterogeneous networks
347
Exploiting multi-hop connectivity for dynamic routing in VANETs
348
Exploiting Multi-level Parallelism for Homology Search using General Purpose Processors
349
Exploiting multi-level scratchpad memories for time-predictable multicore computing
350
Exploiting multi-lingual text potentialities in EBMT systems
351
Exploiting Multi-Link SCTP for Live TV Broadcasting Service
352
Exploiting multimedia components in small user interfaces
353
Exploiting Multimedia Extensions in C&#x002B;&#x002B;: A Portable Approach
354
Exploiting multimedia extensions with a data parallel language
355
Exploiting multimedia services in mobile social networks from security and privacy perspectives
356
Exploiting multimodal data fusion in robust speech recognition
357
Exploiting multi-modality and diversity for localization enhancement: WiFi & RFID usecase
358
Exploiting multipath activity using low complexity equalisation techniques for high speed wireless LANs
359
Exploiting multipath and Doppler array gains in fast-fading wireless channel
360
Exploiting Multipath Diversity in Multiple Antenna OFDM Systems With Spatially Correlated Channels
361
Exploiting multipath diversity using space-frequency linear dispersion codes in MIMO-OFDM systems
362
Exploiting multipath echoes with Capon method for high-resolution ultra-wideband radar imaging using a single omni-directional antenna
363
Exploiting multipath for blind source separation with sensor arrays
364
Exploiting multipath from airborne platforms for direction of arrival estimation
365
Exploiting multipath propagation for GMTI in urban environments
366
Exploiting multiple a priori spectral models for adaptive radar detection
367
Exploiting multiple access points diversity gain in the multi-access wireless network
368
Exploiting multiple antenna cognitive radio system for cooperative spectrum sharing
369
Exploiting Multiple Antennas for Synchronization
370
Exploiting Multiple Antennas in Cooperative Cognitive Radio Networks
371
Exploiting multiple channels for rate separation in IEEE 802.11 multi-radio wireless mesh networks
372
Exploiting multiple degrees of BP parallelism on the highly parallel computer AP1000
373
Exploiting multiple detections to learn robust brightness transfer functions in re-identification systems
374
Exploiting multiple feature sets in data-driven impostor dataset selection for speaker verification
375
Exploiting multiple granularities of parallelism in a compiler
376
Exploiting multiple heterogeneous networks to reduce communication costs in parallel programs
377
Exploiting multiple levels of parallelism in OpenMP: a case study
378
Exploiting Multiple Mahalanobis Distance Metrics to Screen Outliers From Analog Product Manufacturing Test Responses
379
Exploiting multiple modalities for interactive video retrieval
380
Exploiting multiple parents in RPL to improve both the network lifetime and its stability
381
Exploiting multiple paths and diversity in wireless networks for high goodput and low latency
382
Exploiting multiple paths to express scientific queries
383
Exploiting multiple rates to maximize the throughput of wireless mesh networks
384
Exploiting multiple regeneration sequences in simulation output analysis
385
Exploiting multiple shift invariances in harmonic retrieval
386
Exploiting multiple shift invariances in multidimensional harmonic retrieval of damped exponentials
387
Exploiting multiple shift-invariances in harmonic retrieval: The incomplete data case
388
Exploiting multiple switch libraries in topology synthesis of on-chip interconnection network
389
Exploiting multiple views to support visual exploration and mining
390
Exploiting multiple wireless interfaces in smartphones for traffic offloading
391
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
392
Exploiting multiple-input multiple-output in the personal sphere
393
Exploiting Multiplicity to Teach Reliability and Maintainability in a Capstone Project
394
Exploiting multi-scale spatial structures for sparsity based single image super-resolution
395
Exploiting multisensor spectral data to improve crop residue cover estimates for management of agricultural water quality
396
Exploiting Multi-sensors for a Fuzzy Controller in the Photo Bioreactor
397
Exploiting Multi-Spatial Correlations of Motion Data in a Body Sensor Network
398
Exploiting multithreaded programming on cluster architectures
399
Exploiting multiuser diversity and MAC information for scheduling in an OFDMA wireless networks
400
Exploiting Multi-User Diversity and Multi-Hop Diversity in Dual-Hop Broadcast Channels
401
Exploiting multiuser diversity for fair scheduling in MIMO downlink networks with imperfect channel state information
402
Exploiting multiuser diversity for medium access control in wireless networks
403
Exploiting Multiuser Diversity for MIMO Cellular Systems Using Packet Scheduling and the VBLAST Receiver
404
Exploiting multiuser diversity for OFDMA next generation wireless networks
405
Exploiting multiuser diversity for spectrum sensing in cognitive radio networks
406
Exploiting Multi-User Diversity for Uplink Throughput in IEEE 802.11 WLANs
407
Exploiting Multiuser Diversity in OFDMA Systems with Limited Feedback
408
Exploiting Multiuser Diversity in OFDMA Wireless Mesh Networks by Fractional Spatial Reuse
409
Exploiting multiuser diversity in reservation random access
410
Exploiting Multiuser Diversity in Scheduling MIMO Cellular Systems
411
Exploiting Multiuser Diversity in Wireless Cooperative Networks
412
Exploiting multi-user diversity in wireless LANs with channel-aware CSMA/CA
413
Exploiting multiuser diversity through uplink scheduling
414
Exploiting multiuser diversity using multiple feedback thresholds
415
Exploiting multiuser diversity using traffic knowledge: Next generation wireless schedulers
416
Exploiting Multiuser Diversity with 1-bit Feedback for Spectrum Sharing
417
Exploiting Multiuser Diversity with Capture in Wireless Communication Networks
418
Exploiting Multiuser Diversity With Imperfect One-Bit Channel State Feedback
419
Exploiting multiuser diversity with only 1-bit feedback
420
Exploiting multiuser diversity with quality of service for heterogeneous users
421
Exploiting Multiuser Spatial Diversity in MIMOOFDM System through Uplink Scheduling
422
Exploiting multiview properties in semi-supervised video classification
423
Exploiting Mutual Awareness between Prefetchers and On-chip Networks in Multi-cores
424
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping
425
Exploiting Narrow Values for Soft Error Tolerance
426
Exploiting Narrowband Bistatic Radar Measurements for Dismount Detection and Tracking [Measurements Corner]
427
Exploiting narrow-width values for improving non-volatile cache lifetime
428
Exploiting narrow-width values for process variationtolerant 3-D microprocessors
429
Exploiting narrow-width values for thermal-aware register file designs
430
Exploiting natural contours for automatic sonar-to-video calibration
431
Exploiting natural dynamics for energy minimization using an Actuator with Adjustable Stiffness (AwAS)
432
Exploiting natural dynamics in biped locomotion using variable impedance control
433
Exploiting natural parallelism by special-purpose hardware
434
Exploiting natural redundancy in visual information
435
Exploiting navigation capabilities in hypertext/hypermedia
436
Exploiting near symmetry in multilevel logic synthesis
437
Exploiting Need of Data Mining Services in Mobile Computing Environments
438
Exploiting Negative Categories and Wikipedia Structures for Document Classification
439
Exploiting Negative Differential Resistance in Monolayer Graphene FETs for High Voltage Gains
440
Exploiting Negative Feedback Information for One-Bit Feedback Beamforming Algorithm
441
Exploiting negative quantum capacitance of carbon nanotube FETs for low power applications
442
Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area Network
443
Exploiting neighboring relationship for enhancement of AODV in hybrid wireless mesh network
444
Exploiting neighbors´ latent correlation for link prediction in complex network
445
Exploiting Network Calculus for Delay-Based Admission Control in a Sink-Tree Network
446
Exploiting Network Coding for Data Availability in Vehicular Networks: Issues and Opportunities
447
Exploiting Network Coding for Data Forwarding in Delay Tolerant Networks
448
Exploiting network coding for pseudo bidirectional relay in wireless LAN
449
Exploiting network cooperation for green communications in cognitive radio networks
450
Exploiting Network Cooperation in Green Wireless Communication
451
Exploiting network locality in a decentralized read-write peer-to-peer file system
452
Exploiting Network Parallelism for Improving Data Transfer Performance
453
Exploiting network redundancy for low-cost neural network realizations
454
Exploiting Network Structure for Active Inference in Collective Classification
455
Exploiting network topology information to mitigate ambiguities in VMP localization
456
Exploiting Network-on-Chip structural redundancy for a cooperative and scalable built-in self-test architecture
457
Exploiting Network-Topology Awareness for VM Placement in IaaS Clouds
458
Exploiting new horizons of the synergistic radar concept for new outdoor perimeter sensor applications
459
Exploiting New Interconnect Technologies in On-Chip Communication
460
Exploiting new university technologies in product innovation: an empirical of the information and communications technology industry of Canada
461
Exploiting N-Gram Location for Intrusion Detection
462
Exploiting NIC Memory for Improving Cluster-Based Webserver Performance
463
Exploiting Node Connection Regularity for DHT Replication
464
Exploiting node heterogeneity for time synchronization in low power sensor networks
465
Exploiting Node Localization for Performance Improvement of Vehicular Delay-Tolerant Networks
466
Exploiting node redundancy for maximizing wireless sensor network lifetime
467
Exploiting nonacoustic sensors for speech encoding
468
Exploiting noncircularity in backscattering communications
469
Exploiting non-critical Steiner tree branches for post-placement timing optimization
470
Exploiting non-dedicated resources for cloud computing
471
Exploiting non-determinism for reliability of mobile agent systems
472
Exploiting non-Gaussianity for signal separation
473
Exploiting non-Gaussianity in blind identification and equalisation of MIMO FIR channels
474
Exploiting nonholonomic redundancy of free-flying space robots
475
Exploiting Non-Linear Chirp and sparse deconvolution to enhance the performance of pulse-compression ultrasonic NDT
476
Exploiting Nonlinear Dynamics in Novel Measurement Strategies and Devices: From Theory to Experiments and Applications
477
Exploiting Nonlinear Dynamics to Search for the Existence of Matches in a Database
478
Exploiting nonlinearity in a Coupled-Core Fluxgate Magnetometer
479
Exploiting Non-Local Correlation via Signal-Dependent Transform (SDT)
480
Exploiting nonlocal spatiotemporal structure for video segmentation
481
Exploiting Non-Parallel Corpora for Statistical Machine Translation
482
Exploiting Non-Target Region Information for Confidence Measure Based on Bayesian Information Criterion
483
Exploiting Object Group Localization in the Internet of Things: Performance Analysis
484
Exploiting Object Hierarchy: Combining Models from Different Category Levels
485
Exploiting Object Similarity in 3D Reconstruction
486
Exploiting object technology to support product variability
487
Exploiting Object-Based Parallelism on Multi-core Multi-processor Clusters
488
Exploiting object-oriented modelling for scalable-detail studies on control for energy efficiency
489
Exploiting observation quality information to enhance the steady-state performance of incremental LMS adaptive networks
490
Exploiting observation quality information to enhance the steady-state performance of incremental LMS adaptive networks
491
Exploiting observers´ judgements for nonverbal group interaction analysis
492
Exploiting Occluding Contours for Real-Time 3D Tracking: A Unified Approach
493
Exploiting of Flickr Note and its Applications for Social Image Sharing and Search
494
Exploiting OFDM systems for covert communication
495
Exploiting off-chip memory access modes in high-level synthesis
496
Exploiting Offload Enabled Network Interfaces
497
Exploiting OLAP and data mining for augmenting e-business
498
Exploiting OLP, ILP and TLP of RCBCP
499
Exploiting omissive faults in synchronous approximate agreement
500
Exploiting on-chip inductance in high speed clock distribution networks
501
Exploiting on-chip inductance in high speed clock distribution networks
502
Exploiting online human knowledge in Requirements Engineering
503
Exploiting online social data in ontology learning for event tracking and emergency response
504
Exploiting ontology for retrieving data behind searchable web forms
505
Exploiting OpenFlow Resources towards a Content-Centric LAN
506
Exploiting Operand Availability for Efficient Simultaneous Multithreading
507
Exploiting operating system services to efficiently checkpoint parallel applications in GENESIS
508
Exploiting operation level parallelism through dynamically reconfigurable datapaths
509
Exploiting opportunistic decode-and-forward cooperation for cognitive radio relay channels in multi-antenna cognitive radio networks
510
Exploiting Opportunistic Multiuser Detection in Decentralized Multiuser MIMO Systems
511
Exploiting Opportunistic Multiuser Detection in Decentralized Multiuser MIMO Systems
512
Exploiting opportunistic networking in the GCC
513
Exploiting Opportunistic Packet Delivery for Rate Control in 802.11 Wireless Networks
514
Exploiting opportunities in uncertainty during the early project phase
515
Exploiting optical interconnects to eliminate serial bottlenecks
516
Exploiting orbital dynamics for interstellar separated spacecraft interferometry
517
Exploiting order statistic filter in the processing of ultrasonic sensor array signals
518
Exploiting Ordinal Class Structure in Multiclass Classification: Application to Ovarian Cancer
519
Exploiting Orthogonally Dual-Polarized Antennas in Cooperative Cognitive Radio Networking
520
Exploiting OS-level mechanisms to implement mobile code security
521
Exploiting OTDM in wavelength routed networks
522
Exploiting OTDM technology in WDM networks
523
Exploiting Our Computational Surroundings for Better Mobile Collaboration
524
Exploiting Outer Loop Parallelism of Nested Loop on Coarse-Grained Reconfigurable Architectures
525
Exploiting out-of-vocabulary words for out-of-domain detection in dialog systems
526
Exploiting Overhearing: Flow-Aware Routing for Improved Lifetime in Ad Hoc Networks
527
Exploiting Overlay Path-Diversity for Scalable Reliable Multicast
528
Exploiting P300 amplitude variations can improve classification accuracy in Donchin´s BCI speller
529
Exploiting packet distribution for tuning RTS Threshold in IEEE 802.11
530
Exploiting Padding Bits for Improvement of Channel Decoder Performance
531
Exploiting Paper Contents and Citation Links to Identify and Characterise Specialisations
532
Exploiting parallel corpus for automatic extraction of multilingual names: Transliteration perspective
533
Exploiting parallel microprocessor microarchitectures with a compiler code generator
534
Exploiting Parallel Networks in Intermittently-Connected Mobile Environments
535
Exploiting parallel processing and optimal paths in a flexible manufacturing system
536
Exploiting parallelism across program execution: a unification technique and its analysis
537
Exploiting parallelism and structure to accelerate the simulation of chip multi-processors
538
Exploiting Parallelism by Data Dependency Elimination: A Case Study of Circuit Simulation Algorithms
539
Exploiting Parallelism for Energy Efficient Source Code High Performance Computing
540
Exploiting Parallelism for Improved Automation of Multidimensional Model Order Reduction
541
Exploiting parallelism in 3D object recognition using the Connection Machine
542
Exploiting Parallelism in a Switch-Level Simulation Machine
543
Exploiting Parallelism in a X-ray Tomography Reconstruction Algorithm on Hybrid Multi-GPU and Multi-core Platforms
544
Exploiting Parallelism in Double Path Adders´ Structure for Increased Throughput of Floating Point Addition
545
Exploiting parallelism in geometry processing with general purpose processors and floating-point SIMD instructions
546
Exploiting parallelism in high performance embedded system scheduling
547
Exploiting parallelism in I/O scheduling for access conflict minimization in flash-based solid state drives
548
Exploiting Parallelism in Iterative Irregular Maxflow Computations on GPU Accelerators
549
Exploiting parallelism in knowledge discovery systems to improve scalability
550
Exploiting Parallelism in Linear Algebra Kernels through Dataflow Execution
551
Exploiting parallelism in media processing using VLIW processor
552
Exploiting Parallelism in Multi-View Systems Using UML Activity Diagrams and OpenMP
553
Exploiting parallelism in routing for a hierarchical VLSI design environment
554
Exploiting parallelism in the implementation of AGNA, a persistent programming system
555
Exploiting Parallelism of MPEG-4 Decoder with Dataflow Programming on Multicore Processor
556
Exploiting Parallelism through High Level Optimization on a Heterogeneous Multicore SoC
557
Exploiting parallelism to boost data-path rate in high-speed IP/MPLS networking
558
Exploiting Parallelism Using GPUs and Other Hardware-Assisted Methods (EPHAM 2009)
559
Exploiting Parallelism with Dependence-Aware Scheduling
560
Exploiting parallelization in explicit model predictive control
561
Exploiting Parametric Power Supply and/or Temperature Variations to Improve Fault Tolerance in Digital Circuits
562
Exploiting Parity Computation Latency for On-Chip Crosstalk Reduction
563
Exploiting Part-Based Models and Edge Boundaries for Object Detection
564
Exploiting Partial Centrality of Nodes for Data Forwarding in Mobile Opportunistic Networks
565
Exploiting Partial Channel State Information for Secrecy over Wireless Channels
566
Exploiting Partial Cooperation for Source and Channel Coding in Sensor Networks
567
Exploiting partial operand knowledge
568
Exploiting partial packets in random linear codes using sparse error recovery
569
Exploiting partial reconfiguration for flexible software debugging
570
Exploiting partial symmetries in 3D magnetostatic calculations using a scalar potential formulation
571
Exploiting partial visibility in the real-time display of virtual natural environments
572
Exploiting partially defective LUTs: Why you don´t need perfect fabrication
573
Exploiting Partially Reconfigurable FPGAs for Situation-Based Reconfiguration in Wireless Sensor Networks
574
Exploiting Partially-Forgetful Memories for Approximate Computing
575
Exploiting Participatory Design in Open Innovation Factories
576
Exploiting partitioned transition relations for efficient symbolic model checking in CTL
577
Exploiting Partitioning In Asymptotic Waveform Evaluation (AWE)
578
Exploiting passive dynamics for robot throwing task
579
Exploiting Passive RFID Technology for Activity Recognition in Smart Homes
580
Exploiting passive UHF RFID in paper industry - Case study: End user
581
Exploiting Patch Similarity for SAR Image Processing: The nonlocal paradigm
582
Exploiting path diversity for low-latency and high-bandwidth with the dual-path NoC router
583
Exploiting path diversity for networked music performance in the Publish Subscribe Internet
584
Exploiting path diversity in the link layer in wireless ad hoc networks
585
Exploiting path diversity to enhance aggregating throughput for multihomed wireless devices
586
Exploiting Path Indexes to Answer Complex Queries in Ontology Repository
587
Exploiting Path Information for Syntax-Based XML Subtree Matching in RDBs
588
Exploiting path parallelism in logic programming
589
Exploiting path/location information for connection admission control in cellular networks
590
Exploiting pattern relationship for intrusion detection
591
Exploiting patterns of data magnitude for efficient image coding
592
Exploiting PCA classifiers to speaker recognition
593
Exploiting peak anisotropy for tracking through complex structures
594
Exploiting peer relations for distributed multimedia information retrieval
595
Exploiting peer´s location information for improving routing and throughput performance in DHT systems
596
Exploiting peer-to-peer state exchange for distributed medium access control
597
Exploiting Peer-to-Peer Technology for Network and Resource Management in Interactive Broadcasting Environments
598
Exploiting per user information for supercomputing workload prediction requires care
599
Exploiting perceptual quality issues in countering SIFT-based Forensic methods
600
Exploiting Performance and Cost Diversity in the Cloud
601
Exploiting Personal And Social Network Context For Event Annotation
602
Exploiting Personal Health Records in Automating Information Therapy
603
Exploiting persymmetry for CFAR detection in compound-Gaussian clutter
604
Exploiting persymmetry for CFAR detection in compound-Gaussian clutter
605
Exploiting persymmetry for Low-Rank Space Time Adaptive Processing
606
Exploiting pervasive enterprise chronicles using unstructured information management
607
Exploiting Petri net graph to model the FSM of modulo-P counter
608
Exploiting Petri nets to support fault tree based dependability analysis
609
Exploiting p-fold symmetries for faster polynomial equation solving
610
Exploiting Phase Fluctuations to Improve Machine Performance Monitoring
611
Exploiting phase fluctuations to improve temporal coherence
612
Exploiting phase inter-dependencies for faster iterative compiler optimization phase order searches
613
Exploiting phase measurements of EPC Gen2 RFID tags
614
Exploiting Phase Noise Properties in the Design of MIMO-OFDM Receivers
615
Exploiting Phase-Change Memory in Cooperative Caches
616
Exploiting phonetic and phonological similarities as a first step for robust speech recognition
617
Exploiting phonological constraints for handshape inference in ASL video
618
Exploiting Photonics in Alternative Markets
619
Exploiting photosensitive As2S3 chalcogenide glass in photonic integrated circuits
620
Exploiting Physical and Topographic Information within a Fuzzy Scheme to Map Flooded Area by SAR
621
Exploiting physical constraints: heap formation through behavioral error in a group of robots
622
Exploiting physical dynamics for concurrent control of a mobile robot
623
Exploiting Physical Inconsistencies for 3D Scene Understanding
624
Exploiting physical layer detection techniques to mitigate starvation in CSMA/CA wireless networks
625
Exploiting Physical Parallelism Using Supercomputers: Two Examples from Chemical Physics
626
Exploiting piecewise linear features: multinested and simplicial cellular neural/nonlinear networks
627
Exploiting Pipeline ADC Properties for a Reduced-Code Linearity Test Technique
628
Exploiting Pipelined Encoding Process to Boost Erasure-Coded Data Archival
629
Exploiting pipelined executions in OpenMP
630
Exploiting pipelining to tolerate wire delays in a programmable-reconfigurable processor
631
Exploiting planned disconnections in mobile environments
632
Exploiting platform diversity for GoS improvement for users with different High Altitude Platform availability
633
Exploiting Platform Heterogeneity for Power Efficient Data Centers
634
Exploiting platform heterogeneity in wireless sensor networks by shifting resource-intensive tasks to dedicated processing nodes
635
Exploiting Platform Technologies for Creating Real-Time Enterprises
636
Exploiting point source approximation on detailed neuronal models to reconstruct single neuron electric field and population LFP
637
Exploiting polarimetric diversity in FM-based PCL
638
Exploiting polarimetric diversity to mitigate the effect of interferences in FM-based passive radar
639
Exploiting polarity in multiple-valued inference systems
640
Exploiting polarization for spectrum sensing in cognitive SatComs
641
Exploiting polarization-state information for cross-spectrum face recognition
642
Exploiting Polymer Photonic Crystal Fibre Uniqueness - A Simple High Resolution Pressure Sensor
643
Exploiting polymorphism in HW design: a case study in the ATM domain
644
Exploiting PONs for mobile backhaul
645
Exploiting Position Information for Synchronization in Coordinated Multipoint Transmission
646
Exploiting positive equality and partial non-consistency in the formal verification of pipelined microprocessors
647
Exploiting Postdominance for Speculative Parallelization
648
Exploiting potential energy storage for cyclic manipulation: An analysis for elastic dribbling with an anthropomorphic robot
649
Exploiting potentially dead blocks for improving data cache reliability against soft errors
650
Exploiting power budgeting in thermal-aware dynamic placement for reconfigurable systems
651
Exploiting Power-Area Tradeoffs in Behavioural Synthesis through clock and operations throughput selection
652
Exploiting power-area tradeoffs in High-Level Synthesis through dynamic functional unit allocation
653
Exploiting Power-Law Node Degree Distribution in Chord Overlays
654
Exploiting power-up delay for sequential optimization
655
Exploiting precedence relations in the schedulability analysis of distributed real-time systems
656
Exploiting prediction error in a predictive-based connectionist speech recognition system
657
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks
658
Exploiting prediction to reduce power on buses
659
Exploiting Pretended Networking for Energy Saving in Automotive Networks
660
Exploiting previous experience to constrain robot sensorimotor learning
661
Exploiting primary retransmission to improve secondary throughput by cognitive relaying with best-relay selection
662
Exploiting primary user social features for reliability-driven routing in multi-hop cognitive radio networks
663
Exploiting principal component analysis in modulation spectrum enhancement for robust speech recognition
664
Exploiting prior information in GraphSLAM
665
Exploiting prior knowledge and preferential attachment to infer biological interaction networks
666
Exploiting Prior Knowledge in Compressed Sensing Wireless ECG Systems
667
Exploiting prior knowledge in mobile visual location recognition
668
Exploiting Prior Knowledge in the Recovery of Non-Sparse Signals from Noisy Random Projections
669
Exploiting Prior Knowledge in The Recovery of Signals from Noisy Random Projections
670
Exploiting probe data to estimate the queue profile in urban networks
671
Exploiting problem characteristics in the sparse matrix approach to frequency domain analysis
672
Exploiting problem dynamics through result sharing in dataflow environments
673
Exploiting procedure level locality to reduce instruction cache misses
674
Exploiting process integration and composition in the context of active vision
675
Exploiting Process Patterns and Process Instances to Support Adaptability of Dynamic Business Processes
676
Exploiting Process Variability in Voltage/Frequency Control
677
Exploiting Process Variation and Noise in Comparators to Calibrate Interstage Gain Nonlinearity in Pipelined ADCs
678
Exploiting Process Variations and Programming Sensitivity of Phase Change Memory for Reconfigurable Physical Unclonable Functions
679
Exploiting processing gain in wireless ad hoc networks using synchronous collision resolution medium access control schemes
680
Exploiting processing locality through paging configurations in multitasked reconfigurable systems
681
Exploiting processor heterogeneity through reconfigurable interactions
682
Exploiting processor workload heterogeneity for reducing energy consumption in chip multiprocessors
683
Exploiting producer patterns and L2 cache for timely dependence-based prefetching
684
Exploiting program branch probabilities in hardware compilation
685
Exploiting program execution phases to trade power and performance for media workload
686
Exploiting program guides for contextualisation
687
Exploiting program hotspots and code sequentiality for instruction cache leakage management
688
Exploiting program microarchitecture independent characteristics and phase behavior for reduced benchmark suite simulation
689
Exploiting program semantics for efficient instrumentation of distributed event recognitions
690
Exploiting Program Semantics to Place Data in Hybrid Memory
691
Exploiting program-level masking and error propagation for constrained reliability optimization
692
Exploiting programmable bist for the diagnosis of embedded memory cores
693
Exploiting programmable network interfaces for parallel query execution in workstation clusters
694
Exploiting Programmable Temperature Compensation Devices to Manage Temperature-Induced Delay Uncertainty
695
Exploiting Proper Orthogonal Decomposition for the solution of forward and inverse ECG and EEG related biomedical problems
696
Exploiting prosodic and lexical features for tone modeling in a conditional random field framework
697
Exploiting prosodic information for Speaker Recognition
698
Exploiting Prosody Hierarchy and Dynamic Features for Pitch Modeling and Generation in HMM-Based Speech Synthesis
699
Exploiting protocol information for transmission over unknown fading channels
700
Exploiting proximal F/T measurements for the iCub active compliance
701
Exploiting Proximity in Cooperative Download of Large Files in Peer-to-Peer Networks
702
Exploiting proximity readers for statistical cleaning of unreliable RFID data
703
Exploiting Proxy-Based Transcoding to Increase the User Quality of Experience in Networked Applications
704
Exploiting Pseudo Orthogonal PN-Sequences for Ultrasonic Imaging System
705
Exploiting Pseudorandom Sequences to Enhance Noise Immunity for Air-Coupled Ultrasonic Nondestructive Testing
706
Exploiting pseudo-schedules to guide data dependence graph partitioning
707
Exploiting Psychoacoustic Properties to Achieve Transparent and Robust Audio Watermarking
708
Exploiting Psychological Factors for Interaction Style Recognition in Spoken Conversation
709
Exploiting publish/subscribe communication in wireless mesh networks for industrial scenarios
710
Exploiting pulse compression to generate an IEEE 802.15.4a-compliant UWB IR pulse with increased energy per bit
711
Exploiting punctuation semantics in continuous data streams
712
Exploiting punctuation semantics in data streams
713
Exploiting Pure Superword Level Parallelism for Array Indirections
714
Exploiting purity for atomicity
715
Exploiting Puzzle Diversity in Puzzle Selection for ESP-Like GWAP Systems
716
Exploiting PV Inverters to Support Local Voltage—A Small-Signal Model
717
Exploiting qualitative domain knowledge for learning Bayesian network parameters with incomplete data
718
Exploiting qualitative reasoning in the automated modeling of visco-elastic materials
719
Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems
720
Exploiting Quasiperiodicity in Motion Correction of Free-Breathing Myocardial Perfusion MRI
721
Exploiting query click logs for utterance domain detection in spoken language understanding
722
Exploiting quiescent states in register lifetime
723
Exploiting radar waveforms for wireless power transmission
724
Exploiting Radio Correlation and Reliability Information in Collaborative Spectrum Sensing
725
Exploiting radio hierarchies for power-efficient wireless device discovery and connection setup
726
Exploiting radio irregularity in the Internet of Things for automated people counting
727
Exploiting Radio Measurements in Wireless Mobile Networks with Advanced Signal Processing
728
Exploiting RAM for fault-tolerant functions in FPGA
729
Exploiting ramp structures for improving optical flow estimation
730
Exploiting random convolution and random subsampling for image encryption and compression
731
Exploiting random matrix theory to improve noisy low-rank matrix approximation
732
Exploiting Random Patterns of Optically Readable Materials to Ensure Authentication of Documents, Media & Substrates
733
Exploiting range migration for unambiguous velocity measurements
734
Exploiting rank deficiency for MR image reconstruction from multiple partial K-space scans
735
Exploiting Rank Idle Time for Scheduling Last-Level Cache Writeback
736
Exploiting rank-learning models to predict the diffusion of preferences on social networks
737
Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks
738
Exploiting Rateless Codes and Belief Propagation to Infer Identity of Polluters in MANET
739
Exploiting Rateless Codes in Cloud Storage Systems
740
Exploiting Rateless Coding in Structured Overlays to Achieve Data Persistence
741
Exploiting rational basis functions in iterative learning control
742
Exploiting Rauch-Tung-Striebel formulae for IMM-based smoothing of Markovian switching systems
743
Exploiting RDMA operations for Providing Efficient Fine-Grained Resource Monitoring in Cluster-based Servers
744
Exploiting Reactive Mobility for Collaborative Target Detection in Wireless Sensor Networks
745
Exploiting reality with multicast groups
746
Exploiting reality with multicast groups: a network architecture for large-scale virtual environments
747
Exploiting Real-Time EEG Analysis for Assessing Flow in Games
748
Exploiting Real-time FPGA Based Adaptive Systems Technology for Real-time Sensor Fusion in Next Generation Automotive Safety Systems
749
Exploiting real-time FPGA based adaptive systems technology for real-time sensor fusion in next generation automotive safety systems
750
Exploiting real-time switched ethernet for enhanced network recovery scheme in naval combat system
751
Exploiting receive antenna heterogeneity of downlink multiuser-MIMO in wireless networks
752
Exploiting Reception Diversity in Adaptive Packet Scheduling over Multimedia Broadcast/Multicast Networks
753
Exploiting reconfigurability for low-cost in-situ test and monitoring of digital PLLs
754
Exploiting reconfigurability for low-power control of embedded processors
755
Exploiting reconfigurability through high level synthesis
756
Exploiting reconfigurable hardware for network security
757
Exploiting reconfigurable SWP operators for multimedia applications
758
Exploiting Recurrent Paths of Vehicular Users in a Third Generation Cellular System Urban Scenario
759
Exploiting recursive parameter trajectories in speech analysis
760
Exploiting Redundancies to Enhance Schedulability in Fault-Tolerant and Real-Time Distributed Systems
761
Exploiting Redundancies to Improve Performance of LT Decoding
762
Exploiting redundancy for timeliness in TCP Boston
763
Exploiting redundancy in bit-pipelined rational arithmetic
764
Exploiting redundancy in Cartesian impedance control of UAVs equipped with a robotic arm
765
Exploiting redundancy in closed-loop inverse kinematics for dexterous object manipulation
766
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
767
Exploiting Redundancy in Minimum-Time Path Following Robot Control
768
Exploiting redundancy in resolved motion control
769
Exploiting redundancy to implement multiobjective behavior
770
Exploiting redundancy to reduce impact force
771
Exploiting redundancy to solve the Poisson equation using local information
772
Exploiting redundancy to speed up parallel systems
773
Exploiting refactoring in formal verification
774
Exploiting Reference Frame History in H.264/AVC Motion Estimation
775
Exploiting Reflection Change for Automatic Reflection Removal
776
Exploiting Reflection to Design and Manage Services for an Adaptive Resource Management System
777
Exploiting Regional Differences: A Spatially Adaptive Random Access
778
Exploiting Regular Patterns to Group Persistent Scatterers in Urban Areas
779
Exploiting regularity for inductive fault analysis
780
Exploiting regularity for low-power design
781
Exploiting Reinforcement Learning for Multiple Sink Routing in WSNs
782
Exploiting Reinforcement Learning to Profile Users and Personalize Web Pages
783
Exploiting relational capital in family businesses through Corporate Social Responsibility
784
Exploiting relative measurements for pose and time calibration of wireless sensor networks
785
Exploiting reliability for dynamic selection of classi .ers by means of genetic algorithms
786
Exploiting relocation to reduce network dimensions of resilient optical grids
787
Exploiting Repetitive Patterns for Fast Succinct Map Matching
788
Exploiting Replicated Cache Blocks to Reduce L2 Cache Leakage in CMPs
789
Exploiting replicated checkpoints for soft error detection and correction
790
Exploiting Replication for Energy-Aware Scheduling in Disk Storage Systems
791
Exploiting Representational Diversity for Time Series Classification
792
Exploiting request characteristics and internal parallelism to improve SSD performance
793
Exploiting Request Characteristics to Improve Performance of Web Services Based Business Applications
794
Exploiting research
795
Exploiting research results in ICT to extend the scope of educational activities
796
Exploiting research results in practice
797
Exploiting resistive cross-point array for compact design of physical unclonable function
798
Exploiting Resolution Proofs to Speed Up LTL Vacuity Detection for BMC
799
Exploiting resonant behavior to reduce inductive noise
800
Exploiting Resource Usage Patterns for Better Utilization Prediction
801
Exploiting Restricted Transitions in Quasi-Birth-and-Death Processes
802
Exploiting Reusable Paths in Mobile Robotics: Benefits and Challenges for Long-term Autonomy
803
Exploiting reverse correlation for the generation of virtual characters from personality traits
804
Exploiting reversibility in the complete simulation of reversible circuits
805
Exploiting RF signal attenuation for passive indoor location tracking of an object
806
Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security Literature
807
Exploiting RFID for real time accessing and translation of public advertisements
808
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
809
Exploiting rhetorical structures to improve feature-based sentiment analysis
810
Exploiting rich features for Chinese named entity recognition
811
Exploiting rich side information sources of user and items for cross domain collaborative recommendation
812
Exploiting Rich Telecom Data for Increased Monetization of Telecom Application Stores
813
Exploiting RMS time-frequency structure for data compression in emitter location systems
814
Exploiting road traffic data for Very short term load forecasting in Smart Grids
815
Exploiting robot redundancy in collision detection and reaction
816
Exploiting robot simulation techniques to succeed in entertainment industry
817
Exploiting robust direct data domain STAP for GMTI in very high resolution SAR
818
Exploiting robustness in Petri net-based closed-loop systems to accommodate control specification changes
819
Exploiting Rolling Shutter Distortions for Simultaneous Object Pose and Velocity Computation Using a Single View
820
Exploiting rolling shutter for ENF signal extraction from video
821
Exploiting rotation invariance with SVM classifier for microcalcification detection
822
Exploiting rotational symmetries for improved stacked yields in W2W 3D-SICs
823
Exploiting Rotational Symmetry for the Design of Ultra-Wideband Planar Phased Array Layouts
824
Exploiting rotational symmetry for ultra-wideband planar array design
825
Exploiting route diversity in multi-packet transmission using mutual information accumulation
826
Exploiting Route Robustness in Joint Routing and Spectrum Allocation in Multi-Hop Cognitive Radio Networks
827
Exploiting Routing Information Encoded into Backlinks to Improve Topical Crawling
828
Exploiting routing information in Wireless Sensor Networks localization
829
Exploiting routing redundancy via structured peer-to-peer overlays
830
Exploiting routing unfairness in DHT overlays
831
Exploiting RSS measurements among neighbouring devices: A matter of trust
832
Exploiting Rules and Processes for Increasing Flexibility in Service Composition
833
Exploiting ruling line artifacts in writer identification
834
Exploiting Runtime Information in the IDE
835
Exploiting run-time reconfiguration in stencil computation
836
Exploiting Rush Hours for Energy-Efficient Contact Probing in Opportunistic Data Collection
837
Exploiting safe parallelism in Wireless Sensor Networks: A generic and reconfigurable approach
838
Exploiting salient word dependency for Chinese NP identification: A study on classifier noun phrase
839
Exploiting Same Tag Bits to Improve the Reliability of the Cache Memories
840
Exploiting SAR and VHR Optical Images to Quantify Damage Caused by the 2003 Bam Earthquake
841
Exploiting satelitte image time series for monitoring ecological quality parameters of french reservoirs
842
Exploiting satisfiability modulo theories for analog layout automation
843
Exploiting SCADA system data for wind turbine performance monitoring
844
Exploiting scalable CGRA mapping of LU for energy efficiency using the Layers architecture
845
Exploiting scalar effects of MIMO detection in could base-station: Feasible scheme and universal significance
846
Exploiting scene cues for dropped object detection
847
Exploiting scene structure in video coding
848
Exploiting scientific workflows for large-scale gene expression data analysis
849
Exploiting scratch-pad memory using Presburger formulas
850
Exploiting Script-Subtitles Alignment to Scene Boundary Dectection in Movie
851
Exploiting SDR to help improve multinational military interoperability
852
Exploiting second order information to design a novel multiple expert decision combination platform for pattern classification
853
Exploiting segmentation for robust 3D object matching
854
Exploiting selection diversity and recovering spectrum loss in Wireless Sensor Networks with directional antennas
855
Exploiting Self-Information to Improve the Performance of Multi-Way Relay Channels
856
Exploiting self-interference suppression for improved spectrum awareness/efficiency in cognitive radio systems
857
Exploiting self-modification mechanism for program protection
858
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
859
Exploiting Self-Similar Traffic Analysis in network resource control: the IP over WDM networks case
860
Exploiting self-similarity for change detection
861
Exploiting Semantic and Social Technologies for Competency Management
862
Exploiting Semantic and Visual Context for Effective Video Annotation
863
Exploiting semantic associative information in topic modeling
864
Exploiting Semantic Content for Singing Voice Detection
865
Exploiting Semantic Descriptions of Products and User Profiles for Recommender Systems
866
Exploiting Semantic Knowledge in Know Best
867
Exploiting Semantic Models and Techniques to Evaluate Relevance of Human Resources in Knowledge Intensive Organizations
868
Exploiting semantic proximity in peer-to-peer content searching
869
Exploiting Semantic Query Context to Improve Search Ranking
870
Exploiting Semantics and Patterns for Verification of Orchestrated Cloud Services
871
Exploiting Semantics for Analyzing and Verifying Business Rules in Web Services Composition and Contracting
872
Exploiting semantics for event detection systems
873
Exploiting Semantics for Indoor Navigation and User-Tracking
874
Exploiting Semantics for Personalized Story Creation
875
Exploiting semantics in structured P2P systems
876
Exploiting Semi-Separable and toeplitz structure in distributed control of homogeneous systems with arbitrary boundary conditions
877
Exploiting Sender-Based Link Correlation in Wireless Sensor Networks
878
Exploiting sensing diversity for confident sensing in wireless sensor networks
879
Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography
880
Exploiting Sensor Spatial Correlation for Dynamic Data Driven Simulation of Wildfire
881
Exploiting sensor spatial redundancy to improve network lifetime [wireless sensor networks]
882
Exploiting Sensor Symmetries in Example-based Training for Intelligent Agents
883
Exploiting sensorimotor stochasticity for learning control of variable impedance actuators
884
Exploiting sensors on mobile phones to improve wide-area localization
885
Exploiting Sequential-Valve-Gate Molding To Control Weld Lines
886
Exploiting Service Similarity for Privacy in Location-Based Search Queries
887
Exploiting set-level non-uniformity of capacity demand to enhance CMP cooperative caching
888
Exploiting set-level write non-uniformity for energy-efficient NVM-based hybrid cache
889
Exploiting Setup–Hold-Time Interdependence in Static Timing Analysis
890
Exploiting Shading Cues in Kinect IR Images for Geometry Refinement
891
Exploiting shaft generators to improve ship efficiency
892
Exploiting shape in parallel programming
893
Exploiting shape memory to study the effect of change in fiber alignment on cancer cell motility
894
Exploiting shaper context to improve performance bounds of Ethernet AVB networks
895
Exploiting shared scratch pad memory space in embedded multiprocessor systems
896
Exploiting shift invariance to obtain a high payload in digital image watermarking
897
Exploiting short channel effects and multi-Vt technology for increased robustness and reduced energy consumption, with application to a 16-bit subthreshold adder implemented in 65 nm CMOS
898
Exploiting short query expansion for images retrieval
899
Exploiting short-lived variables in superscalar processors
900
Exploiting short-range cooperation for energy efficient vertical handover operations
901
Exploiting side information for efficient multicast transmission in multicarrier wireless networks
902
Exploiting side information in distance dependent Chinese restaurant processes for data clustering
903
Exploiting side information in locality preserving projection
904
Exploiting signal and noise statistics for fixed point FFT design optimization in OFDM systems
905
Exploiting signal flow and logic dependency in standard cell placement
906
Exploiting Signal Nongaussianity and Nonlinearity for Performance Assessment of Adaptive Filtering Algorithms: Qualitative Performance of Kalman Filter
907
Exploiting signal sparseness for reduced-rate sampling
908
Exploiting signal strength detection and collision cancellation for tag identification in RFID systems
909
Exploiting Signal Subspace Invariance to Resolve Non-Stationary, Non-Orthogonal Sensor Array Signals in Correlated Noise Fields
910
Exploiting Signal Subspaces to Reduce Mean-Squared Error in Subband Adaptive Filtering
911
Exploiting signal unobservability for efficient translation to CNF in formal verification of microprocessors
912
Exploiting SIMD computers for general purpose computation
913
Exploiting SIMD extensions for linear image processing with OpenCL
914
Exploiting similarities for robot perception
915
Exploiting similarity and experience in decision making
916
Exploiting similarity in adjacent slices for compressed sensing MRI
917
Exploiting similarity metrics and case-bases for knowledge sharing between case-based reasoners
918
Exploiting simple hierarchies for unsupervised human behavior analysis
919
Exploiting Simulation Slack to Improve Parallel Simulation Speed
920
Exploiting simultaneous usage of different wireless interfaces for security and mobility
921
Exploiting simultaneously masked linear prediction in a WI speech coder
922
Exploiting Single SISO Impulse Responses to Predict the Capacity of Correlated MIMO Channels
923
Exploiting sinh and tanh shaped ultra low-voltage floating-gate transconductance amplifiers to reduce harmonic distortion
924
Exploiting Sink Mobility for Maximizing Sensor Networks Lifetime
925
Exploiting Sink Mobility to Maximize Lifetime in 3D Underwater Sensor Networks
926
Exploiting SIP for botnet communication
927
Exploiting skewed state probabilities for low power state assignment
928
Exploiting skips in periodic tasks for enhancing aperiodic responsiveness
929
Exploiting Slack Time in Dynamically Reconfigurable Processor Architectures
930
Exploiting SLAM to improve feature matching
931
Exploiting sleep-and-wake strategies in the Gnutella network
932
Exploiting Slepian-Wolf codes in wireless user cooperation
933
Exploiting Small World Properties for Message Forwarding in Delay Tolerant Networks
934
Exploiting Small-scale Cogeneration in Energy-related Markets
935
Exploiting Smalltalk modules in a customizable programming environment
936
Exploiting smart antennas for spatial reuse and multiplexing in wireless mesh networks
937
Exploiting smart antennas in wireless mesh networks using contention access
938
Exploiting social information for dynamic tuning in cluster based WiFi localization
939
Exploiting Social Media for Stock Market Prediction with Factorization Machine
940
Exploiting Social Media with Tensor Decomposition for Pharmacovigilance
941
Exploiting Social Networks for Large-Scale Human Behavior Modeling
942
Exploiting Social Networks for the Prediction of Social and Civil Unrest: A Cloud Based Framework
943
Exploiting social preferences for congestion control in opportunistic networks
944
Exploiting social relations for query expansion and result ranking
945
Exploiting Social Relationship to Enable Efficient Replica Allocation in Ad-hoc Social Networks
946
Exploiting social relationships for free-riders detection in minimum-delay P2P scalable video streaming
947
Exploiting social software to build open source communities
948
Exploiting Social Tagging in a Web 2.0 Recommender System
949
Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case
950
Exploiting Social Trust Assisted Reciprocity (STAR) Toward Utility-Optimal Socially-Aware Crowdsensing
951
Exploiting social-interest interactions on user clustering and content dissemination in device-to-device communications
952
Exploiting socio-physical network interactions via a utility-based framework for resource management in mobile social networks
953
Exploiting Soft Redundancy for Error-Resilient On-Chip Memory Design
954
Exploiting soft systems methodology (SSM) and knowledge types to facilitate knowledge capture issues in a Web Site environment
955
Exploiting software pipelining for network-on-chip architectures
956
Exploiting soil moisture information for adaptive error control in wireless underground sensor networks
957
Exploiting solid state ultrasonic motors for robotics
958
Exploiting source non stationary and coloration in blind source separation
959
Exploiting Space and Time Coherence in Grid-Based Sorting
960
Exploiting space diversity and Dynamic Voltage Frequency Scaling in multiplane Network-on-Chips
961
Exploiting Space Syntax for Deployable Mobile Opportunistic Networking
962
Exploiting Space–Time–Frequency Diversity With MIMO–OFDM for Underwater Acoustic Communications
963
Exploiting Space-Time Correlations in an RFID Tag Field for Localization and Tracking
964
Exploiting spare resources of in-order SMT processors executing hard real-time threads
965
Exploiting Sparse Dynamics For Bandwidth Reduction In Cooperative Sensing Systems
966
Exploiting Sparse User Activity in Multiuser Detection
967
Exploiting sparseness in deep neural networks for large vocabulary speech recognition
968
Exploiting sparseness of backing-off language models for efficient look-ahead in LVCSR
969
Exploiting sparsity and co-occurrence structure for action unit recognition
970
Exploiting Sparsity and Rank Deficiency for MR Image Reconstruction From Multiple Partial K-Space Scans
971
Exploiting sparsity and rank-deficiency in dynamic MRI reconstruction
972
Exploiting sparsity during the detection of high-order QAM signals in large dimension MIMO systems
973
Exploiting Sparsity for Multiple Relay Selection with Relay Gain Control in Large AF Relay Networks
974
Exploiting Sparsity for Real Time Video Labelling
975
Exploiting sparsity in adaptive filters
976
Exploiting sparsity in dense optical flow
977
Exploiting sparsity in feed-forward active noise control with adaptive Douglas-Rachford splitting
978
Exploiting Sparsity in Hyperspectral Image Classification via Graphical Models
979
Exploiting sparsity in remote sensing and earth observation: Theory, applications and future trends
980
Exploiting Sparsity in SDP Relaxations of the OPF Problem
981
Exploiting sparsity in stranded hidden Markov models for automatic speech recognition
982
Exploiting sparsity in the discrete mechanics and optimal control method with application to human motion planning
983
Exploiting Sparsity in the Matrix-Dilation Approach to Robust Semidefinite Programming
984
Exploiting sparsity in the sum-of-squares approximations to robust semidefinite programs
985
Exploiting sparsity of relay-assisted cognitive radio networks
986
Exploiting spatial and temporal dependencies to enhance fault diagnosis: Application to railway track circuits
987
Exploiting spatial and temporal locality for seamless vertical handover
988
Exploiting Spatial and Temporal Parallelism in the Multithreaded Node Architecture Implemented on Superscalar RISC Processors
989
Exploiting spatial and wavelength information in dual-frequency SAR mapping of human settlements and their surrounding environment in the Amazons
990
Exploiting spatial architectures for edit distance algorithms
991
Exploiting spatial consistency for object classification and pose estimation
992
Exploiting Spatial Context in Image Region Labelling Using Fuzzy Constraint Reasoning
993
Exploiting spatial correlation features for SAR image analysis
994
Exploiting Spatial Correlation for Improving Coverage in Sensor Networks
995
Exploiting Spatial Correlation in a three dimensional Wireless Sensor Network
996
Exploiting spatial correlation towards an energy efficient clustered aggregation technique (CAG) [wireless sensor network applications]
997
Exploiting spatial degrees of freedom in MIMO cognitive radio systems
998
Exploiting spatial dimension in cognitive radios and networks
999
Exploiting Spatial Dimension in Spectrum Sensing Using a Sector Antenna: A Ray Tracer Based Analysis
1000
Exploiting spatial diversity in cooperative copper units
بازگشت