- Exploiting Locality in DRAM
- Exploiting Locality in DRAM
- Exploiting Location and Context-Awareness to Support Proactive Handover in Heterogeneous Networks
- Exploiting Location and Context-Awareness to Support Proactive Handover in Heterogeneous Networks
- Exploiting Low-Rank Structure in Computing Matrix Powers with Applications to Preconditioning
- Exploiting Low-Rank Structure in Computing Matrix Powers with Applications to Preconditioning
- Exploiting MAC layer diversity in wireless networks
- Exploiting Machine Learning to Subvert Your Spam Filter
- Exploiting Machine Learning to Subvert Your Spam Filter
- Exploiting Market Realities to Address National Security’s High-Performance Computing Needs
- Exploiting Matrix Symmetry to Improve FPGA-Accelerated Conjugate Gradient Jason D. Bakos, Krishna K. Nagar
- Exploiting Memory Hierarchy Chapter 7
- Exploiting Memory
- Exploiting Mixed Precision: Iterative Refinement for the Solution of Linear Systems
- Exploiting mobile phone technology to build energy efficient supercomputers: the Mont Blanc project
- Exploiting Modelling to Improve Decision-making
- Exploiting multiple scattering in CALIPSO measurements to retrieve liquid cloud properties
- Exploiting Multithreaded Architectures to Improve Data Management Operations
- Exploiting Multithreaded Architectures to Improve the Hash Join Operation
- Exploiting MySQL 5.1 For Advanced Business Intelligence Applications
- Exploiting n a ture for social justice?
- Exploiting Named Entity Taggers in a Second Language
- Exploiting Nanomaterial-induced Autophagy For Cancer Therapy: More Than One Way To Skin A Cat
- Exploiting new Genome Data and Web Resources for the Phylogenetic Analyisis of Proteases, Substrates and Inhibitors
- Exploiting New Sensors on NOAA NPP – VIIRS for Ocean Applications
- Exploiting Next Generation Sequencing to investigate the genetics of
- Exploiting Nonlinear Chemical Kinetics in Polymer Systems: a review
- Exploiting Nonlinear Chemical Kinetics in Polymer Systems: a review
- Exploiting Nonstationarity for Performance Prediction
- Exploiting Nonstationarity for Performance Prediction
- Exploiting NoSQL Like Never Before
- Exploiting observations to seek robust responses in global precipitation
- Exploiting Off-the-Shelf Virtual Memory Mechanisms to Boost Software Transactional Memory
- Exploiting On-chip Memory Bandwidth in the VIRAM Compiler
- Exploiting On-chip Memory Bandwidth in the VIRAM Compiler
- Exploiting Ontologies for Automatic Image Annotation
- Exploiting Open Functionality in SMS-Capable Cellular Networks
- Exploiting Open Functionality in SMS-Capable Cellular Networks
- Exploiting Open Functionality in SMS-Capable Cellular Networks
- Exploiting Open Functionality in SMS-Capable Cellular Networks
- Exploiting Open Functionality in SMS-Capable Cellular Networks
- Exploiting Open Functionality in SMS-Capable Networks
- Exploiting Open Functionality in SMS-Capable Networks
- Exploiting Operation Level Parallelism through Dynamically Reconfigurable Datapahts
- Exploiting Operation Level Parallelism Through Dynamically Reconfigurable Datapaths
- Exploiting Opportunism in Wireless Networks
- Exploiting Opportunistic Scheduling in Cellular Data Networks
- Exploiting Opportunistic Scheduling in Cellular Data Networks
- Exploiting Opportunistic Scheduling in Cellular Data Networks
- Exploiting Page-Level Upper Bound (PLUB) for Multi-Type Nearest Neighbor (MTNN) Queries Xiaobin Ma Advisor: Shashi Shek
- Exploiting Parallelism
- Exploiting Parallelism on GPUs
- Exploiting Parallelism
- Exploiting Parallelism
- Exploiting Parameter Domain Knowledge for Learning in Bayesian Networks
- Exploiting Path Diversity In The Link Layer In Wireless Ad Hoc Networks
- Exploiting Pearl’s Theorems for Graphical Model Structure Discovery
- Exploiting Perl on Windows with OLE/COM
- Exploiting PhoSim for Data Management Algorithm Development::Simulated Effects (3)
- Exploiting Physical Layer Advances in Wireless Networks
- Exploiting Pocket PC
- Exploiting Postdominance for Speculative Parallelization
- Exploiting Predicate Structure for Efficient Reachability Detection
- Exploiting Preference Queries for Searching Learning Resources
- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations
- Exploiting Product Life-Cycle Support (PLCS)
- Exploiting Program Hotspots and Code Sequentiality for Instruction Cache Leakage Management
- Exploiting Prolific Types for Memory Management and Optimizations
- Exploiting Protein Cage Dynamics to Engineer Active Nanostructures
- Exploiting Protein Cage Dynamics to Engineer Active Nanostructures
- Exploiting Proximity Feature in Statistical Translation Models for Information Retrieval
- Exploiting Pseudo-schedules to Guide Data Dependence Graph Partitioning
- Exploiting Random Walks for Learning
- Exploiting Reducibility in Unsupervised Dependency Parsing
- Exploiting Relational Structure to Understand Publication Patterns in High-Energy Physics
- Exploiting Relational Structure to Understand Publication Patterns in High-Energy Physics
- Exploiting Relationships for Object Consolidation
- Exploiting Relevance Feedback in Knowledge Graph Search
- Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand
- Exploiting Route Redundancy via Structured Peer to Peer Overlays
- Exploiting Route Redundancy via Structured Peer to Peer Overlays
- Exploiting Route Redundancy via Structured Peer to Peer Overlays
- Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
- Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
- Exploiting SCADA Systems
- Exploiting SCI in the MultiOS management system
- Exploiting scientific data in the domain of ‘omics
- Exploiting Search to Grow Your Brand
- Exploiting Segmentation for Robust 3D Object Matching
- Exploiting self-organisation in techno-social systems
- Exploiting self-organisation in techno-social systems
- Exploiting self-organisation in techno-social systems
- 在基于文献的发现中探索使用语义关系 Exploiting Semantic Relations for Literature-Based Discovery
- Exploiting semantic technologies to build an application ontology
- Exploiting semantic technologies to build an application ontology
- Exploiting Semantic Web and Knowledge Management Technologies for E-learning
- Exploiting Semantic Web for Open Source Software Development Opportunities and Challenges
- Exploiting Semantics and Speculation for Improving the Performance of Read-only Transactions
- CS186: Introduction to Database Systems
- Exploiting Semantics with Structured Queries
- Exploiting Sequential Locality for Fast Disk Accesses
- Exploiting SIMD parallelism with the CGiS compiler framework
- Exploiting Similarity for Multi-Source Downloads Using File Handprints
- Exploiting Similarity of Subqueries for Complex Query Optimization [1]
- Exploiting Simple Hierarchies for Unsupervised Human Behavior Analysis
- Exploiting Social Context for Review Quality Prediction
- Exploiting Social Interactions in Mobile Systems
- Exploiting Social Networks for your Institute
- Exploiting Sociological Orbits in Mobile Users’ Mobility Pattern
- Exploiting Software: How To Break Code
- Exploiting Software: How To Break Code
- Exploiting Sparse Markov and Covariance Structure in Multiresolution Models
- Exploiting Spatial Locality in Data Caches using Spatial Footprints
- Exploiting Spatial Locality to Improve Disk Efficiency in Virtualized Environments
- Exploiting Spatial Parallelism in Ethernet-based Cluster Interconnects
- Exploiting Spatiotemporal Correlations in Environmental Monitoring Networks
- Exploiting Special Collections: using digital methods to enhance research and learning potential
- Exploiting spectral anisotropy in membrane studies
- Exploiting spin effects to unravel the structure of NP at a future LC
- Exploiting State Information to Support QoS in Software-Defined WSNs
- Exploiting Statistical Dependencies in Sparse Representations
- Exploiting Store Locality through Permission Caching in Software DSMs
- Exploiting Streams in Instruction and Data Address Trace Compression
- Exploiting Structural and Comparative Genomics to Reveal Protein Functions
- Exploiting Structural and Comparative Genomics to Reveal Protein Functions
- Exploiting Structural and Comparative Genomics to Reveal Protein Functions
- Exploiting Structure in Symmetry Detection for CNF
- Exploiting Structure in Symmetry Detection for CNF
- Exploiting Structured Ontology to Organize Scattered Online Opinions
- Exploiting Subdivision in Modeling and Animation