Browse
Recent Presentations
Recent Stories
Content Topics
Updated Contents
Featured Contents
PowerPoint Templates
Create
Presentation
Article
Survey
Quiz
Lead-form
E-Book
Presentation Creator
Create stunning presentation online in just 3 steps.
Pro
Get powerful tools for managing your contents.
Login
Upload
Content Directory
Content Directory
e
experiments-with -> explore-your-kno
exploiting-local -> exploiting-subdi
Exploiting Subdivision in Modeling and Animation
Exploiting Locality in DRAM
Exploiting Locality in DRAM
Exploiting Location and Context-Awareness to Support Proactive Handover in Heterogeneous Networks
Exploiting Location and Context-Awareness to Support Proactive Handover in Heterogeneous Networks
Exploiting Low-Rank Structure in Computing Matrix Powers with Applications to Preconditioning
Exploiting Low-Rank Structure in Computing Matrix Powers with Applications to Preconditioning
Exploiting MAC layer diversity in wireless networks
Exploiting Machine Learning to Subvert Your Spam Filter
Exploiting Machine Learning to Subvert Your Spam Filter
Exploiting Market Realities to Address National Security’s High-Performance Computing Needs
Exploiting Matrix Symmetry to Improve FPGA-Accelerated Conjugate Gradient Jason D. Bakos, Krishna K. Nagar
Exploiting Memory Hierarchy Chapter 7
Exploiting Memory
Exploiting Mixed Precision: Iterative Refinement for the Solution of Linear Systems
Exploiting mobile phone technology to build energy efficient supercomputers: the Mont Blanc project
Exploiting Modelling to Improve Decision-making
Exploiting multiple scattering in CALIPSO measurements to retrieve liquid cloud properties
Exploiting Multithreaded Architectures to Improve Data Management Operations
Exploiting Multithreaded Architectures to Improve the Hash Join Operation
Exploiting MySQL 5.1 For Advanced Business Intelligence Applications
Exploiting n a ture for social justice?
Exploiting Named Entity Taggers in a Second Language
Exploiting Nanomaterial-induced Autophagy For Cancer Therapy: More Than One Way To Skin A Cat
Exploiting new Genome Data and Web Resources for the Phylogenetic Analyisis of Proteases, Substrates and Inhibitors
Exploiting New Sensors on NOAA NPP – VIIRS for Ocean Applications
Exploiting Next Generation Sequencing to investigate the genetics of
Exploiting Nonlinear Chemical Kinetics in Polymer Systems: a review
Exploiting Nonlinear Chemical Kinetics in Polymer Systems: a review
Exploiting Nonstationarity for Performance Prediction
Exploiting Nonstationarity for Performance Prediction
Exploiting NoSQL Like Never Before
Exploiting observations to seek robust responses in global precipitation
Exploiting Off-the-Shelf Virtual Memory Mechanisms to Boost Software Transactional Memory
Exploiting On-chip Memory Bandwidth in the VIRAM Compiler
Exploiting On-chip Memory Bandwidth in the VIRAM Compiler
Exploiting Ontologies for Automatic Image Annotation
Exploiting Open Functionality in SMS-Capable Cellular Networks
Exploiting Open Functionality in SMS-Capable Cellular Networks
Exploiting Open Functionality in SMS-Capable Cellular Networks
Exploiting Open Functionality in SMS-Capable Cellular Networks
Exploiting Open Functionality in SMS-Capable Cellular Networks
Exploiting Open Functionality in SMS-Capable Networks
Exploiting Open Functionality in SMS-Capable Networks
Exploiting Operation Level Parallelism through Dynamically Reconfigurable Datapahts
Exploiting Operation Level Parallelism Through Dynamically Reconfigurable Datapaths
Exploiting Opportunism in Wireless Networks
Exploiting Opportunistic Scheduling in Cellular Data Networks
Exploiting Opportunistic Scheduling in Cellular Data Networks
Exploiting Opportunistic Scheduling in Cellular Data Networks
Exploiting Page-Level Upper Bound (PLUB) for Multi-Type Nearest Neighbor (MTNN) Queries Xiaobin Ma Advisor: Shashi Shek
Exploiting Parallelism
Exploiting Parallelism on GPUs
Exploiting Parallelism
Exploiting Parallelism
Exploiting Parameter Domain Knowledge for Learning in Bayesian Networks
Exploiting Path Diversity In The Link Layer In Wireless Ad Hoc Networks
Exploiting Pearl’s Theorems for Graphical Model Structure Discovery
Exploiting Perl on Windows with OLE/COM
Exploiting PhoSim for Data Management Algorithm Development::Simulated Effects (3)
Exploiting Physical Layer Advances in Wireless Networks
Exploiting Pocket PC
Exploiting Postdominance for Speculative Parallelization
Exploiting Predicate Structure for Efficient Reachability Detection
Exploiting Preference Queries for Searching Learning Resources
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations
Exploiting Product Life-Cycle Support (PLCS)
Exploiting Program Hotspots and Code Sequentiality for Instruction Cache Leakage Management
Exploiting Prolific Types for Memory Management and Optimizations
Exploiting Protein Cage Dynamics to Engineer Active Nanostructures
Exploiting Protein Cage Dynamics to Engineer Active Nanostructures
Exploiting Proximity Feature in Statistical Translation Models for Information Retrieval
Exploiting Pseudo-schedules to Guide Data Dependence Graph Partitioning
Exploiting Random Walks for Learning
Exploiting Reducibility in Unsupervised Dependency Parsing
Exploiting Relational Structure to Understand Publication Patterns in High-Energy Physics
Exploiting Relational Structure to Understand Publication Patterns in High-Energy Physics
Exploiting Relationships for Object Consolidation
Exploiting Relevance Feedback in Knowledge Graph Search
Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand
Exploiting Route Redundancy via Structured Peer to Peer Overlays
Exploiting Route Redundancy via Structured Peer to Peer Overlays
Exploiting Route Redundancy via Structured Peer to Peer Overlays
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Exploiting SCADA Systems
Exploiting SCI in the MultiOS management system
Exploiting scientific data in the domain of ‘omics
Exploiting Search to Grow Your Brand
Exploiting Segmentation for Robust 3D Object Matching
Exploiting self-organisation in techno-social systems
Exploiting self-organisation in techno-social systems
Exploiting self-organisation in techno-social systems
在基于文献的发现中探索使用语义关系 Exploiting Semantic Relations for Literature-Based Discovery
Exploiting semantic technologies to build an application ontology
Exploiting semantic technologies to build an application ontology
Exploiting Semantic Web and Knowledge Management Technologies for E-learning
Exploiting Semantic Web for Open Source Software Development Opportunities and Challenges
Exploiting Semantics and Speculation for Improving the Performance of Read-only Transactions
CS186: Introduction to Database Systems
Exploiting Semantics with Structured Queries
Exploiting Sequential Locality for Fast Disk Accesses
Exploiting SIMD parallelism with the CGiS compiler framework
Exploiting Similarity for Multi-Source Downloads Using File Handprints
Exploiting Similarity of Subqueries for Complex Query Optimization [1]
Exploiting Simple Hierarchies for Unsupervised Human Behavior Analysis
Exploiting Social Context for Review Quality Prediction
Exploiting Social Interactions in Mobile Systems
Exploiting Social Networks for your Institute
Exploiting Sociological Orbits in Mobile Users’ Mobility Pattern
Exploiting Software: How To Break Code
Exploiting Software: How To Break Code
Exploiting Sparse Markov and Covariance Structure in Multiresolution Models
Exploiting Spatial Locality in Data Caches using Spatial Footprints
Exploiting Spatial Locality to Improve Disk Efficiency in Virtualized Environments
Exploiting Spatial Parallelism in Ethernet-based Cluster Interconnects
Exploiting Spatiotemporal Correlations in Environmental Monitoring Networks
Exploiting Special Collections: using digital methods to enhance research and learning potential
Exploiting spectral anisotropy in membrane studies
Exploiting spin effects to unravel the structure of NP at a future LC
Exploiting State Information to Support QoS in Software-Defined WSNs
Exploiting Statistical Dependencies in Sparse Representations
Exploiting Store Locality through Permission Caching in Software DSMs
Exploiting Streams in Instruction and Data Address Trace Compression
Exploiting Structural and Comparative Genomics to Reveal Protein Functions
Exploiting Structural and Comparative Genomics to Reveal Protein Functions
Exploiting Structural and Comparative Genomics to Reveal Protein Functions
Exploiting Structure in Symmetry Detection for CNF
Exploiting Structure in Symmetry Detection for CNF
Exploiting Structured Ontology to Organize Scattered Online Opinions
Browse slideshows:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9