Search

Showing total 40 results

Search Constraints

Start Over You searched for: Topic computer algorithms Remove constraint Topic: computer algorithms Region united states Remove constraint Region: united states
40 results

Search Results

1. The ACOS XCO2 retrieval algorithm, Part 2: Global XCO2 data characterization.

2. Constructing Envelopes: How Institutional Custodians Can Tame Disruptive Algorithms.

3. professional activities.

4. Critical literacy for a posthuman world: When people read, and become, with machines.

5. Reproducibility report: Team SegFAUlt @ SCC 2016.

6. Computer Vision and Augmented Reality for Human-Centered Fatigue Crack Inspection.

7. A Novel Dynamic Adjusting Algorithm for Load Balancing and Handover Co-Optimization in LTE SON.

8. Quantitative evaluation of footwear evidence: Initial workflow for an end‐to‐end system.

9. Real-life examination timetabling.

10. Development of an Efficient Regional Four-Dimensional Variational Data Assimilation System for WRF.

11. Algorithms for Combined Inter- and Intra-Task Dynamic Voltage Scaling.

12. Efficient Image Chaotic Encryption Algorithm with No Propagation Error.

13. Real-Time Suitable Predictive Control Using SPaT Information from Automated Traffic Lights.

14. Impact of ASOS Real-Time Quality Control on Convective Gust Extremes in the USA.

15. The shaping of a national ignition campaign pulsed waveform

16. A COMPUTATIONAL APPROACH TO SITUATIONAL AWARENESS.

17. SPIRS: A Web-based image retrieval system for large biomedical databases

18. Thirty Five Years of Computer Cartograms.

19. Unregulated Algorithmic Trading: Testing the Boundaries of the European Union Algorithmic Trading Regime.

20. Modern Heuristics and Hybrid Algorithms for Engineering Problems Resolution: Preface.

21. It’s Not the Algorithm, It’s the Data.

22. Deciphering Crypto-Discourse: Articulations of Internet Freedom in Relation to The State.

23. Algorithms, bots, and political communication in the US 2016 election: The challenge of automated political communication for election law and administration.

24. ACM FORUM.

25. Unsupervised regionalization of the United States into landscape pattern types.

26. INTERVAL METHODS IN KNOWLEDGE REPRESENTATION.

27. A Kernel Testbed for Parallel Architecture, Language, and Performance Research.

28. PATENT LAW'S FUNCTIONALITY MALFUNCTION AND THE PROBLEM OF OVERBROAD, FUNCTIONAL SOFTWARE PATENTS.

29. Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard.

30. Taming the Mobile Data Deluge With Drop Zones.

31. Rumors in a Network: Who's the Culprit?

32. NIST Block Cipher Modes of Operation for Confidentiality.

33. Emergency Response Workflow Resource Requirements Modeling and Analysis.

34. A new method for class prediction based on signed-rank algorithms applied to Affymetrix microarray experiments.

35. Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features.

36. Convergent Validity of the ASAM Patient Placement Criteria Using a Standardized Computer Algorithm.

37. Radical Pruning: A Method to Construct Skeleton Radial Basis Function Networks.

38. Degrees, Designed by the NUMBERS.

39. Andrew Viterbi: The Key To Communications 40 Years Early.

40. Pricey OMS Vendor Attracts Attention.