Computer Science, 1988-2020
Items (Sorted by Submit Date in Descending order): 341 to 360 of 687
Issue Date | Title | Author(s) |
2010 | A Computer-Checked Proof to the Two Paths Problem | Tian, Kevin T |
2012 | Ehtisaab: A Comprehensive Approach to Tracking Corruption and Inefficiency in Resource-scarce Settings | Ul Haq, Faaez |
2009 | Boosting Signal Processing Methods for Note Onset Detection | Ye, Michael |
1999 | Biometric-Based Identification: A Foolproof Solution? | Smith, Tanya D. |
1999 | Beyond Manet | Mandelbaum, Yitzhak Chaiim |
2009 | Beating Back Babel: Creation of a Lemmatizer, Part-of-Speech Tagger, and Translator for Ancient Hebrew | Douglas, Daniel |
2005 | Autonomous Vehicle Path Planning and Arbitration | Brooks, Trevor V. |
1993 | 3D Models of Buildings | McAllister, Jonathan Tillett |
2012 | Autonomous Smartphone Object Detection for Visioin I | Smith, Kashif |
2004 | 3D Model Reconstruction from a "Sea of Images" | Battaglia, Frank |
2008 | Automating Separation Logic for Concurrent C Minor | Mansky, William |
1997 | Automating Memory Management for Standard C | Mattal, Paul |
1999 | Automated Sound Classification | Elder, Delia Corrine |
2007 | Automated Reduction of Nonstandard to Standard Analysis | Li, Tianhui |
2006 | Artificial Intelligence in Horse Racing Games | Fields, Greg |
2003 | Artificial Elegance: Creation of a Chess Playing Application based upon Alpha-Beta | Parker, Gregory |
2005 | Artifacial Intelligence: A Learning System for the Fully Automated Prediction of Facial Attributes | Bavor, Clayton; Levinson, Jesse |
2008 | Arabic-English Statistical Machine Translation with Factored Translation Models | Ledbetter, Thomas |
2005 | Approximating the Sparsest Cut | Orecchia, Lorenzo |
2010 | Applying Karnaugh Map Analysis to the Candidate Cryptographic Hash Functions of the NIST SHA-3 Competition | Ilvento, Christina |
Items (Sorted by Submit Date in Descending order): 341 to 360 of 687