Search
Selected: U

Using phonetic constraints in acoustic-to-articulatory inversion

Computer Science – Computation and Language
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using physiological measures in conjunction with other UX approaches for better understanding of the player's gameplay experiences

Computer Science – Human-Computer Interaction
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using planetary nebulae as abundance probes of galaxies

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Planetary Science to Motivate the Introductory Science Curriculum; the Solar System Collaboratory

Computer Science – Learning
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Planetlab to Implement Multicast at the Application Level

Computer Science – Distributed – Parallel – and Cluster Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Premia and Nsp for Constructing a Risk Management Benchmark for Testing Parallel Architecture

Computer Science – Computational Engineering – Finance – and Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using programmable graphics to improve zoom window anti-aliasing

Computer Science – Graphics
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Propagation for Solving Complex Arithmetic Constraints

Computer Science – Numerical Analysis
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Provenance to support Good Laboratory Practice in Grid Environments

Computer Science – Distributed – Parallel – and Cluster Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Proximity to Predict Activity in Social Networks

Computer Science – Social and Information Networks
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Pseudo-Stochastic Rational Languages in Probabilistic Grammatical Inference

Computer Science – Learning
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Quasigroups for Generating Pseudorandom Numbers

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Query Mediators for Distributed Searching in Federated Digital Libraries

Computer Science – Digital Libraries
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using rational numbers to key nested sets

Computer Science – Databases
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using raw star signals in the monitoring of GOES imager visible-channel responsivities

Computer Science – Performance
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using RDF to Model the Structure and Process of Systems

Computer Science – Artificial Intelligence
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Regression Techniques to Predict Large Data Transfers

Computer Science – Distributed – Parallel – and Cluster Computing
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Repeating Decimals As An Alternative To Prime Numbers In Encryption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Repeating Decimals As An Alternative To Prime Numbers In Encryption

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Using Rough Set and Support Vector Machine for Network Intrusion Detection

Computer Science – Learning
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.