- Exploiting Computing Power of GPU for Data Mining Application
- Exploiting Constituent Dependencies for Tree Kernel-based Semantic Relation Extraction
- Exploiting Constructive Interference for Scalable Flooding in Wireless Networks
- Exploiting Content Localities for Efficient Search in P2P Systems
- Exploiting Context Analysis for Combining Multiple Entity Resolution Systems
- Exploiting Context in Dealing with Programming Errors and Exceptions
- Exploiting Contextual Information from Event Logs for Personalized Recommendation
- Exploiting cooperation/synergy and linkages among ESPON tools Technical meeting 16-17 May 2013
- Exploiting cooperation/synergy and linkages among ESPON tools Technical meeting 16-17 May 2013
- Exploiting Coordination Locales in DisPOMDPs via Social Model Shaping
- Exploiting Core Criticality for Enhanced GPU Performance
- Exploiting Correlated Attributes in Acquisitional Query Processing
- Exploiting Criticality to Reduce Bottlenecks in Distributed Uniprocessors
- Exploiting cross-modal rhythm for robot perception of objects
- Exploiting Crosstalk to Speed up On-chip Buses
- Exploiting Crosstalk to Speed up On-chip Buses
- Exploiting crowd sourced platforms for statistical purposes Donatella Fazio, Marina Signore
- Exploiting Dark Silicon for Energy Efficiency
- Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration
- Exploiting Data Topology in Visualization and Clustering of Self-Organizing Maps
- Exploiting Data Topology in Visualization and Clustering of Self-Organizing Maps
- Exploiting DCOM
- Exploiting Deadline Flexibility in Grid Workflow Rescheduling
- Exploiting Deferred Destruction: An Analysis of Read-Copy-Update Techniques in Operating System Kernels
- Exploiting delphi /Object pascal
- Exploiting Detachability
- Exploiting Di-Muon Production at PANDA
- Exploiting Discourse Structure for Sentiment Analysis of Text
- Exploiting Disruptive Technology: GPUs for Physics
- Exploiting Distributed Version Concurrency in a Transactional Memory Cluster
- Exploiting diverse knowledge source via Maximum Entropy in Name Entity Recognition
- Exploiting diverse knowledge source via Maximum Entropy in Name Entity Recognition
- Exploiting diverse observation perspectives to get insights on the malware landscape
- Exploiting Diverse Sources of Scientific Data the vision, what has been achieved and what next…
- Exploiting Diversity in Wireless Networks
- Exploiting Diversity in Wireless Networks
- Exploiting document structure and feature hierarchy for semi-supervised domain adaptation
- Exploiting document structure and feature hierarchy for semi-supervised domain adaptation
- Exploiting domain and task regularities for robust named entity recognition
- Exploiting domain and task regularities for robust named entity recognition
- Exploiting domain and task regularities for robust named entity recognition
- Exploiting Domain Knowledge with a Concurrent Hierarchical Planner
- Exploiting Domain-Specific High-level Runtime Support for Parallel Code Generation
- Exploiting Domain Structure for Named Entity Recognition
- Exploiting Duality (Particularly the dual of SVM)
- Exploiting Duality (Particularly the dual of SVM)
- Exploiting Dynamic Phase Distance Mapping for Phase-based Tuning of Embedded Systems
- Exploiting Dynamic Phase Distance Mapping for Phase-based Tuning of Embedded Systems
- Exploiting Eager Register Release in a Redundantly Multi-threaded Processor
- Exploiting ebXML Registry Semantics in the eHealth Domain *
- Exploiting eCommerce to your advantage
- Exploiting eCommerce to your advantage
- Exploiting eCommerce to your advantage
- Exploiting EGNOS in leisure activities: the WalkEGNOS project
- Exploiting Emoticons in Sentiment Analysis
- Exploiting Environmental Science Opportunities in the “Green Economy”
- Exploiting Environmental Science Opportunities in the “Green Economy”
- Exploiting Events using Options
- Exploiting Exercises in order to develop Conceptual Appreciation
- Exploiting Exercises so as to Enrich Procedural Fluency with Conceptual Appreciation
- Exploiting Fast Carry Chains of FPGAs for Designing Compressor Trees
- Exploiting Fast Carry Chains of FPGAs for Designing Compressor Trees
- Exploiting Fine-Grained Data Parallelism with Chip Multiprocessors and Fast Barriers
- Exploiting Flash for Energy Efficient Disk Arrays
- Exploiting Format String Vulnerabilities
- Exploiting Format String Vulnerabilities
- Exploiting Format String Vulnerabilities
- Exploiting Forwarding to Improve Data Bandwidth of Instruction-Set Extensions
- Exploiting FPGAs for Sensor Fusion
- Exploiting Free LUT Entries to Mitigate Soft Errors in SRAM-based FPGAs
- Exploiting Gene Clusters to Curate Annotations
- Exploiting Genome Comparison for Gene Structure Prediction in Plants
- Exploiting Genome Comparison for Gene Structure Prediction in Plants
- Exploiting Geographic Dependencies for Real Estate Appraisal
- Exploiting Geographic Dependencies for Real Estate Appraisal
- Exploiting Geographic Dependencies for Real Estate Appraisal
- Exploiting Geographical Influence for Collaborative Point-of-Interest Recommendation
- Exploiting Global View for Resilience (GVR) A n Outside-In Approach to Resilience
- Exploiting Graphical Structure in Decision-Making
- Exploiting Gray-Box Knowledge of Buffer Cache Management
- Exploiting Gray-Box Knowledge of Buffer Cache Management
- Exploiting Gray-Box Knowledge of Buffer Cache Management
- Exploiting Gray-Box Knowledge of Buffer Cache Management
- Exploiting HDF5 Technologies to Represent Geo-Information
- Exploiting Heterogeneous Architectures
- Exploiting Homography in Camera-Projector Systems
- Exploiting Houzz Leads Scraper For Busainess Success
- Exploiting Human Knowledge Management and Human Capital
- Exploiting Human Knowledge Management and Human Capital
- Exploiting ICT to improve parental engagement, moving towards online reporting 16th December 2008
- Exploiting Idle Communication Power to Improve Network Performance and Energy Efficiency
- Exploiting Idle Communication Power to Improve Network Performance and Energy Efficiency
- Exploiting Illustrations: How You Can Stand Out From the Rest
- Exploiting ILP with Software Approaches
- Exploiting ILP with Software Approaches
- Exploiting Implicit Feedback to Identify Usage Patterns on the Desktop
- Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks
- Exploiting Income Statistics for Entrepreneurschip Research
- Exploiting Income Statistics for Entrepreneurschip Research
- Exploiting Inertial Planes for Multi-sensor 3D Data Registration
- Exploiting Information Disclosure
- Exploiting information: getting the most from the OU Library
- Exploiting Infrastructure Resources to support Mobile Computing
- Exploiting Innovation Methods in Manufacturing: A Furniture Manufacturer's experience
- Exploiting Insecurity to Secure Software Update Systems Spiral 2 Year-end Project Review
- Exploiting Instruction-Level Parallelism with Software Approach #1
- Exploiting Instruction-Level Parallelism with Software Approaches
- Exploiting Instruction-Level Parallelism with Software Approaches
- Exploiting Instruction Streams To Prevent Intrusion
- Exploiting Instruction Streams To Prevent Intrusion
- Exploiting Inter-Class Rules for Focused Crawling
- Exploiting Internal and External Semantics for the Clustering of Short Texts Using World Knowledge
- Exploiting International Life Science Opportunities
- Exploiting Internet Case Studies and Simulation Templates for Language Teaching and Learning
- Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Dectection
- Exploiting L1 Knowledge in L2/English Teaching: Teacher Education Possibilities
- Exploiting Large-Scale Check-in Data to Recommend Time-Sensitive Routes
- Exploiting Large Scale Web Semantics
- Exploiting large scale web semantics to build end user applications
- Exploiting Layer 2
- Exploiting lexical information for Meeting Structuring
- Exploiting Literary Texts to Enhance Critical Thinking
- Exploiting Load Latency Tolerance for Relaxing Cache Design Constraints
- Exploiting Load Latency Tolerance for Relaxing Cache Design Constraints
- Exploiting Local Similarity for Indexing Paths in Graph-Structured Data
- Exploiting locality for scalable information retrieval in peer-to-peer networks
- Exploiting Locality in DRAM