| Title | Date | Type | ||
|---|---|---|---|---|
| 26 | Sandbox prefetching: safe run-time evaluation of aggressive prefetchers | 2014-01-01 | Text | |
| 27 | Secret key extraction using Bluetooth wireless signal strength measurements | 2014-01-01 | Text | |
| 28 | SLAMBOT: Structural health monitoring robot using lamb waves | 2014-01-01 | Text | |
| 29 | Speculatorum Oculi | 2014-01-01 | Text | |
| 30 | Strain limiting for clustered shape matching | 2014-01-01 | Text | |
| 31 | Symmetry based semantic analysis of engineering drawings | 2014-01-01 | Text | |
| 32 | Systematic debugging methods for large-scale HPC computational frameworks | 2014-01-01 | Text | |
| 33 | Target localization and autonomous navigation using wireless sensor networks -a pseudogradient algorithm approach | 2014-01-01 | Text | |
| 34 | Towards providing low-overhead data race detection for large OpenMP applications | 2014-01-01 | Text | |
| 35 | Verifying volume rendering using discretization error analysis | 2014-01-01 | Text | |
| 36 | Violating privacy through walls by passive monitoring of radio windows | 2014-01-01 | Text |