Browse
Recent Presentations
Recent Stories
Content Topics
Updated Contents
Featured Contents
PowerPoint Templates
Create
Presentation
Article
Survey
Quiz
Lead-form
E-Book
Presentation Creator
Create stunning presentation online in just 3 steps.
Pro
Get powerful tools for managing your contents.
Login
Upload
Content Directory
Content Directory
e
experiments-with -> explore-your-kno
exploiting-compu -> exploiting-local
Exploiting Locality in DRAM
Exploiting Computing Power of GPU for Data Mining Application
Exploiting Constituent Dependencies for Tree Kernel-based Semantic Relation Extraction
Exploiting Constructive Interference for Scalable Flooding in Wireless Networks
Exploiting Content Localities for Efficient Search in P2P Systems
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems
Exploiting Context in Dealing with Programming Errors and Exceptions
Exploiting Contextual Information from Event Logs for Personalized Recommendation
Exploiting cooperation/synergy and linkages among ESPON tools Technical meeting 16-17 May 2013
Exploiting cooperation/synergy and linkages among ESPON tools Technical meeting 16-17 May 2013
Exploiting Coordination Locales in DisPOMDPs via Social Model Shaping
Exploiting Core Criticality for Enhanced GPU Performance
Exploiting Correlated Attributes in Acquisitional Query Processing
Exploiting Criticality to Reduce Bottlenecks in Distributed Uniprocessors
Exploiting cross-modal rhythm for robot perception of objects
Exploiting Crosstalk to Speed up On-chip Buses
Exploiting Crosstalk to Speed up On-chip Buses
Exploiting crowd sourced platforms for statistical purposes Donatella Fazio, Marina Signore
Exploiting Dark Silicon for Energy Efficiency
Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration
Exploiting Data Topology in Visualization and Clustering of Self-Organizing Maps
Exploiting Data Topology in Visualization and Clustering of Self-Organizing Maps
Exploiting DCOM
Exploiting Deadline Flexibility in Grid Workflow Rescheduling
Exploiting Deferred Destruction: An Analysis of Read-Copy-Update Techniques in Operating System Kernels
Exploiting delphi /Object pascal
Exploiting Detachability
Exploiting Di-Muon Production at PANDA
Exploiting Discourse Structure for Sentiment Analysis of Text
Exploiting Disruptive Technology: GPUs for Physics
Exploiting Distributed Version Concurrency in a Transactional Memory Cluster
Exploiting diverse knowledge source via Maximum Entropy in Name Entity Recognition
Exploiting diverse knowledge source via Maximum Entropy in Name Entity Recognition
Exploiting diverse observation perspectives to get insights on the malware landscape
Exploiting Diverse Sources of Scientific Data the vision, what has been achieved and what next…
Exploiting Diversity in Wireless Networks
Exploiting Diversity in Wireless Networks
Exploiting document structure and feature hierarchy for semi-supervised domain adaptation
Exploiting document structure and feature hierarchy for semi-supervised domain adaptation
Exploiting domain and task regularities for robust named entity recognition
Exploiting domain and task regularities for robust named entity recognition
Exploiting domain and task regularities for robust named entity recognition
Exploiting Domain Knowledge with a Concurrent Hierarchical Planner
Exploiting Domain-Specific High-level Runtime Support for Parallel Code Generation
Exploiting Domain Structure for Named Entity Recognition
Exploiting Duality (Particularly the dual of SVM)
Exploiting Duality (Particularly the dual of SVM)
Exploiting Dynamic Phase Distance Mapping for Phase-based Tuning of Embedded Systems
Exploiting Dynamic Phase Distance Mapping for Phase-based Tuning of Embedded Systems
Exploiting Eager Register Release in a Redundantly Multi-threaded Processor
Exploiting ebXML Registry Semantics in the eHealth Domain *
Exploiting eCommerce to your advantage
Exploiting eCommerce to your advantage
Exploiting eCommerce to your advantage
Exploiting EGNOS in leisure activities: the WalkEGNOS project
Exploiting Emoticons in Sentiment Analysis
Exploiting Environmental Science Opportunities in the “Green Economy”
Exploiting Environmental Science Opportunities in the “Green Economy”
Exploiting Events using Options
Exploiting Exercises in order to develop Conceptual Appreciation
Exploiting Exercises so as to Enrich Procedural Fluency with Conceptual Appreciation
Exploiting Fast Carry Chains of FPGAs for Designing Compressor Trees
Exploiting Fast Carry Chains of FPGAs for Designing Compressor Trees
Exploiting Fine-Grained Data Parallelism with Chip Multiprocessors and Fast Barriers
Exploiting Flash for Energy Efficient Disk Arrays
Exploiting Format String Vulnerabilities
Exploiting Format String Vulnerabilities
Exploiting Format String Vulnerabilities
Exploiting Forwarding to Improve Data Bandwidth of Instruction-Set Extensions
Exploiting FPGAs for Sensor Fusion
Exploiting Free LUT Entries to Mitigate Soft Errors in SRAM-based FPGAs
Exploiting Gene Clusters to Curate Annotations
Exploiting Genome Comparison for Gene Structure Prediction in Plants
Exploiting Genome Comparison for Gene Structure Prediction in Plants
Exploiting Geographic Dependencies for Real Estate Appraisal
Exploiting Geographic Dependencies for Real Estate Appraisal
Exploiting Geographic Dependencies for Real Estate Appraisal
Exploiting Geographical Influence for Collaborative Point-of-Interest Recommendation
Exploiting Global View for Resilience (GVR) A n Outside-In Approach to Resilience
Exploiting Graphical Structure in Decision-Making
Exploiting Gray-Box Knowledge of Buffer Cache Management
Exploiting Gray-Box Knowledge of Buffer Cache Management
Exploiting Gray-Box Knowledge of Buffer Cache Management
Exploiting Gray-Box Knowledge of Buffer Cache Management
Exploiting HDF5 Technologies to Represent Geo-Information
Exploiting Heterogeneous Architectures
Exploiting Homography in Camera-Projector Systems
Exploiting Houzz Leads Scraper For Busainess Success
Exploiting Human Knowledge Management and Human Capital
Exploiting Human Knowledge Management and Human Capital
Exploiting ICT to improve parental engagement, moving towards online reporting 16th December 2008
Exploiting Idle Communication Power to Improve Network Performance and Energy Efficiency
Exploiting Idle Communication Power to Improve Network Performance and Energy Efficiency
Exploiting Illustrations: How You Can Stand Out From the Rest
Exploiting ILP with Software Approaches
Exploiting ILP with Software Approaches
Exploiting Implicit Feedback to Identify Usage Patterns on the Desktop
Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks
Exploiting Income Statistics for Entrepreneurschip Research
Exploiting Income Statistics for Entrepreneurschip Research
Exploiting Inertial Planes for Multi-sensor 3D Data Registration
Exploiting Information Disclosure
Exploiting information: getting the most from the OU Library
Exploiting Infrastructure Resources to support Mobile Computing
Exploiting Innovation Methods in Manufacturing: A Furniture Manufacturer's experience
Exploiting Insecurity to Secure Software Update Systems Spiral 2 Year-end Project Review
Exploiting Instruction-Level Parallelism with Software Approach #1
Exploiting Instruction-Level Parallelism with Software Approaches
Exploiting Instruction-Level Parallelism with Software Approaches
Exploiting Instruction Streams To Prevent Intrusion
Exploiting Instruction Streams To Prevent Intrusion
Exploiting Inter-Class Rules for Focused Crawling
Exploiting Internal and External Semantics for the Clustering of Short Texts Using World Knowledge
Exploiting International Life Science Opportunities
Exploiting Internet Case Studies and Simulation Templates for Language Teaching and Learning
Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Dectection
Exploiting L1 Knowledge in L2/English Teaching: Teacher Education Possibilities
Exploiting Large-Scale Check-in Data to Recommend Time-Sensitive Routes
Exploiting Large Scale Web Semantics
Exploiting large scale web semantics to build end user applications
Exploiting Layer 2
Exploiting lexical information for Meeting Structuring
Exploiting Literary Texts to Enhance Critical Thinking
Exploiting Load Latency Tolerance for Relaxing Cache Design Constraints
Exploiting Load Latency Tolerance for Relaxing Cache Design Constraints
Exploiting Local Similarity for Indexing Paths in Graph-Structured Data
Exploiting locality for scalable information retrieval in peer-to-peer networks
Browse slideshows:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9