376 - 400 of 1,101
Number of results to display per page
TitleDateTypeSetname
376 Empirical approach to conceptual case frame acquisition1998Textir_uspace
377 Empirical study of automated dictionary construction for information extraction in three domains1996Textir_uspace
378 Enabling advanced visualization tools in a web-based simulation monitoring system2009-12Textir_uspace
379 End-to-end eScience: integrating workflow, query, visualization, and provenance at an ocean observatory2008-12Textir_uspace
380 Energy efficient radio tomographic imaging2014-01-01Textir_uspace
381 Energy-efficient processor design using multiple clock domains with dynamic voltage and frequency scaling2002Textir_uspace
382 Enhancing covert communications with multiple colluding receivers2010-10-06Text; Imageir_uspace
383 Ensuring prolonged participation and deterring cheating behaviors in a collective2008Textir_uspace
384 Error bounded approximate reparametrization of NURBS curves2000Textir_uspace
385 Error bounded variable distance offset operator for free from curves and surfaces1991Textir_uspace
386 Estimating performance of an ray- tracing ASIC design2006Textir_uspace
387 Estimation of the parameters of an autoregressive process in the presence of additive white noise1979Textir_uspace
388 ETYMA: a framework for modular systems1994Textir_uspace
389 Evaluating the accuracy of size perception in real and virtual environments2012-01-01Textir_uspace
390 Evaluating the potential of programmable multiprocessor cache controllers1994Textir_uspace
391 Evaluation of depth of field for depth perception in DVR2013-01-01Textir_uspace
392 Evolutionary teleomorphology1995Textir_uspace
393 Evolving real-time systems using hierarchical scheduling and concurrency analysis2003-01-01Textir_uspace
394 Explicit and persistent knowledge in engineering drawing analysis2003-10-10Textir_uspace
395 Explicit-enumeration based verification made memory-efficient1995Textir_uspace
396 Exploiting altruism in social networks for friend-to-friend malware detection2014-01-01Textir_uspace
397 Exploiting discontinuities in optical flow1995Textir_uspace
398 Exploiting eager register release in a redundantly multi-threaded processor2006Textir_uspace
399 Exploiting role-identifying nouns and expressions for information extraction2007Textir_uspace
400 Exploiting strong syntactic heuristics and co-training to learn semantic lexicons2002Textir_uspace
376 - 400 of 1,101