326 - 350 of 1,006
Number of results to display per page
TitleDateTypeSetname
326Emerging trends proceedings of the 17th International Conference on Theorem Proving in Higher Order Logics: TPHOLs 20042004-08Textir_uspace
327Empirical approach to conceptual case frame acquisition1998Textir_uspace
328Empirical study of automated dictionary construction for information extraction in three domains1996Textir_uspace
329Enabling advanced visualization tools in a web-based simulation monitoring system2009-12Textir_uspace
330End-to-end eScience: integrating workflow, query, visualization, and provenance at an ocean observatory2008-12Textir_uspace
331Energy efficient radio tomographic imaging2014-01-01Textir_uspace
332Energy-efficient processor design using multiple clock domains with dynamic voltage and frequency scaling2002Textir_uspace
333Enhancing covert communications with multiple colluding receivers2010-10-06Textir_uspace
334Ensuring prolonged participation and deterring cheating behaviors in a collective2008Textir_uspace
335Error bounded approximate reparametrization of NURBS curves2000Textir_uspace
336Error bounded variable distance offset operator for free from curves and surfaces1991Textir_uspace
337Estimating performance of an ray- tracing ASIC design2006Textir_uspace
338Estimation of the parameters of an autoregressive process in the presence of additive white noise1979Textir_uspace
339ETYMA: a framework for modular systems1994Textir_uspace
340Evaluating the accuracy of size perception in real and virtual environments2012-01-01Textir_uspace
341Evaluating the potential of programmable multiprocessor cache controllers1994Textir_uspace
342Evaluation of depth of field for depth perception in DVR2013-01-01Textir_uspace
343Evolutionary teleomorphology1995Textir_uspace
344Evolving real-time systems using hierarchical scheduling and concurrency analysis2003-01-01Textir_uspace
345Explaining and evaluating the use of RDMA in high performance containers2022Textir_htoa
346Explicit and persistent knowledge in engineering drawing analysis2003-10-10Textir_uspace
347Explicit-enumeration based verification made memory-efficient1995Textir_uspace
348Exploiting altruism in social networks for friend-to-friend malware detection2014-01-01Textir_uspace
349Exploiting discontinuities in optical flow1995Textir_uspace
350Exploiting eager register release in a redundantly multi-threaded processor2006Textir_uspace
326 - 350 of 1,006