Search Results

Architecture Support for 3D Obfuscation
Article discussing research on architecture support for 3D obfuscation.
Capacity Allocations in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control
This paper discusses capacity allocation in multi-cell UMTS networks.
Capacity Allocations in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control [Presentation]
This presentation discusses user and interference models, wideband code division multiple access (WCDMA) capacity with perfect and imperfect power control, and spreading factors with numerical results.
Clutch Driven Reaction Wheel Steering Unit
Patent relating to a clutch driven reaction wheel steering unit.
Corpus-based and Knowledge-based Measures of Text Semantic Similarity
This article discusses corpus-based and knowledge-based measures of text semantic similarity.
A Corpus-based Approach to Finding Happiness
This paper discusses how to locate emotions.
Creating a Testbed for the Evaluation of Automatically Generated Back-of-the-book Indexes
This paper discusses automatic generating of back-of-the-book indexes.
Indoor Propagation Modeling at 2.4 GHZ for IEEE 802.11 Networks
This paper discusses indoor propagation modeling.
Intra-Class Competitive Assignments in CS2: A One-Year Study
This paper discusses intra-class competitive assignments in CS2.
NLP (Natural Language Processing) for NLP (Natural Language Programming)
This paper discusses Natural Language Processing (NLP).
A Non-Preemptive Scheduling Algorithm for Soft Real-Time Systems
This article discusses a non-preemptive scheduling algorithm for soft real-time systems.
Parity Assisted Decision Making for QAM Modulation
This paper discusses parity assisted decision making for QAM modulation.
Performance Enhancement by Eliminating Redundant Function Execution
This paper discusses performance enhancement by eliminating redundant function execution.
REBEL: Reconfigurable Block Encryption Logic
This paper discusses reconfigurable block encryption logic. Existing block cipher function designs have tended to deploy the secret bits in a specific and limited way. The authors generalize the role of the secret as truth tables of Boolean gates in a carefully designed logic schema.
Retention and Recruitment of Women in Computer Engineering
This presentation discusses strategies and goals for recruiting more women to Computer Science and Engineering degree (CSE) programs at the University of North Texas (UNT). It also describes a series of activities aimed at improving retention rates of women students already in our programs. Such recruitment and retention of women is critical to the country's efforts to increase the number of engineering professionals, and is a priority for the CSE Department at UNT.
Retention and Recruitment of Women in Computer Engineering
This paper describes the efforts and results of a plan for actively recruiting women students to undergraduate computer engineering programs at the University of North Texas (UNT). It also describes a series of activities aimed at improving retention rates of women students already in our programs. Such recruitment and retention of women is critical to the country's efforts to increase the number of engineering professionals, and is a priority for the Computer Science and Engineering (CSE) Department at UNT.
Secure execution environments through reconfigurable lightweight cryptographic components
This doctoral dissertation discusses secure execution environments through reconfigurable lightweight cryptographic components. The author considers the four most important dimensions of software protection.
Simulación de la dinámica de un bosque tropical en los Llanos occidentales de Venezuela
Article discussing the simulation of the dynamics of a tropical forest in the Western Llanos of Venezuela.
Simulation of Throughput in UMTS Networks with Different Spreading Factors
In this paper, the authors design and implement a local session admission control (SAC) algorithm for third-generation wireless networks which allows for the simulation of network throughput for different spreading factors and various mobility scenarios.
Technologies That Make You Smile: Adding Humor to Text-Based Applications
Article discussing technologies that make people smile and adding humor to text-based applications.
UMTS Capacity and Throughput Maximization for Different Spreading Factors
This article discusses UMTS capacity and throughput maximization for different spreading factors.
Word Sense and Subjectivity
This paper discusses word sense and subjectivity.
Back to Top of Screen