Title | Date | Type | ||
---|---|---|---|---|
26 | ![]() | Sandbox prefetching: safe run-time evaluation of aggressive prefetchers | 2014-01-01 | Text |
27 | ![]() | Secret key extraction using Bluetooth wireless signal strength measurements | 2014-01-01 | Text |
28 | ![]() | SLAMBOT: Structural health monitoring robot using lamb waves | 2014-01-01 | Text |
29 | ![]() | Speculatorum Oculi | 2014-01-01 | Text |
30 | ![]() | Strain limiting for clustered shape matching | 2014-01-01 | Text |
31 | ![]() | Symmetry based semantic analysis of engineering drawings | 2014-01-01 | Text |
32 | ![]() | Systematic debugging methods for large-scale HPC computational frameworks | 2014-01-01 | Text |
33 | ![]() | Target localization and autonomous navigation using wireless sensor networks -a pseudogradient algorithm approach | 2014-01-01 | Text |
34 | ![]() | Towards providing low-overhead data race detection for large OpenMP applications | 2014-01-01 | Text |
35 | ![]() | Verifying volume rendering using discretization error analysis | 2014-01-01 | Text |
36 | ![]() | Violating privacy through walls by passive monitoring of radio windows | 2014-01-01 | Text |