Techniques for investing in proxy assets
Techniques for managing multiple hierarchies of data from a...
Techniques for mapping graphical user interfaces of...
Techniques for optimizing promotion delivery
Techniques for performing logic operations using quantum...
Techniques for predicting hiv viral tropism and classifying...
Techniques for program execution
Techniques for program performance analysis
Techniques for protecting financial transactions
Techniques for providing locks for file operations in a...
Techniques for reducing delta values of credit risk...
Techniques for restoring data based on contents and...
Techniques for server-controlled measurement of client-side...
Techniques for storing data based upon storage policies
Techniques for supporting application-specific access...
Techniques for trading commodities on a private trading...
Techniques to automatically identify participants for a...
Techniques to automatically syndicate content over a network
Techniques to configure radio-frequency identification readers
Techniques to manage a whiteboard for multimedia conference...