Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5675
search results - page 31 / 1135
»
Exploiting Chaos for Computation
Sort
relevance
views
votes
recent
update
View
thumb
title
104
click to vote
CLUSTER
2006
IEEE
90
views
Distributed And Parallel Com...
»
more
CLUSTER 2006
»
Exploiting redundancy to boost performance in a RAID-10 style cluster-based file system
15 years 3 months ago
Download
www.eece.maine.edu
Yifeng Zhu, Hong Jiang, Xiao Qin, Dan Feng, David ...
claim paper
Read More »
92
click to vote
PERVASIVE
2006
Springer
95
views
Applied Computing
»
more
PERVASIVE 2006
»
Self-Powered Wireless Temperature Sensors Exploit RFID Technology
15 years 3 months ago
Download
autoid.mit.edu
Karn Opasjumruskit, Thaweesak Thanthipwan, Ohmmari...
claim paper
Read More »
101
click to vote
CONEXT
2010
ACM
127
views
Computer Networks
»
more
CONEXT 2010
»
Exploiting locality of interest in online social networks
15 years 1 months ago
Download
www.cs.ucsb.edu
Mike P. Wittie, Veljko Pejovic, Lara B. Deek, Kevi...
claim paper
Read More »
98
click to vote
PERCOM
2009
ACM
130
views
Computer Networks
»
more
PERCOM 2009
»
Exploiting Semantics for Event Detection Systems
16 years 4 months ago
Download
www.ics.uci.edu
Ronen Vaisenberg
claim paper
Read More »
108
Voted
WCNC
2008
IEEE
118
views
Computer Networks
»
more
WCNC 2008
»
Exploiting Phase Noise Properties in the Design of MIMO-OFDM Receivers
15 years 10 months ago
Download
wwwmns.ifn.et.tu-dresden.de
Steffen Bittner, Ernesto Zimmermann, Gerhard Fettw...
claim paper
Read More »
« Prev
« First
page 31 / 1135
Last »
Next »