Search Constraints
« Previous |
1 - 50 of 94
|
Next »
Search Results
Select an image to start the slideshow
User-Perspective Augmented Reality Magic Lenses
1 of 50
A Quantitative Investigation into the Design Trade-offs in Decision Support Systems
2 of 50
Automata-based Model Counting String Constraint Solver for Vulnerability Analysis
3 of 50
Measurement-driven Wireless Network Design
4 of 50
Understanding the Real World through the Analysis of User Behavior and Topics in Online Social Media
5 of 50
Representation learning on unstructured data
6 of 50
Combating attacks and abuse in large online communities
7 of 50
Mining Disparate Sources for Question Answering
8 of 50
Efficient deformations using custom coordinate systems
9 of 50
Novel network architectures for cloud-based applications
10 of 50
Opinion detection, sentiment analysis and user attribute detection from online text data
11 of 50
Analysis and improvements of the AKS algorithm
12 of 50
Are we using the crypto we want? : TLS cipher-suite negotiation and its discontents
13 of 50
Governance of cloud-hosted web applications
14 of 50
Memory page stability and its application to memory deduplication
15 of 50
Using workload prediction and federation to increase cloud utilization
16 of 50
Modeling and Calibrating the Distributed Camera
17 of 50
Information Reliability on the Social Web Models and Applications in Intelligent User Interfaces
18 of 50
Mining clinical data for trauma patients
19 of 50
Data model verification via theorem proving
20 of 50
Detecting the stealthy distribution of malicious and abusive content online
21 of 50
Mining and Managing Large-Scale Temporal Graphs
22 of 50
Understanding and Engaging Online Audiences
23 of 50
Contextualizing Network Security
24 of 50
Querying Large-scale Knowledge Graphs
25 of 50
Efficient Similarity Search with Cache-Conscious Data Traversal
26 of 50
Scalable automated evasive malware analysis
27 of 50
Configurable and Sound Static Analysis of JavaScript : Techniques and Applications
28 of 50
Analyzing and Defending Against Evolving Web Threats
29 of 50
Management of data and collaboration for business processes
30 of 50
Throughput and Delay on the Packet Switched Internet (A Cross-Disciplinary Approach)
31 of 50
Connecting text with knowledge
32 of 50
Optimizing JavaScript Engines for Modern-day Workloads
33 of 50
Programming Environments for Children : Creating a Language that Grows with you
34 of 50
Efficient Parallel Optimizations for All Pairs Similarity Search
35 of 50
Collocated data deduplication for virtual machine backup in the cloud
36 of 50
Stochastic Modeling of System Function in a Network of Biological Oscillators
37 of 50
Accelerated Algorithms for Stochastic Simulation of Chemically Reacting Systems
38 of 50
Automatic Model Reductions for Stochastic Simulation
39 of 50
On the validity of geosocial mobility traces
40 of 50
Advanced automated web application vulnerability analysis
41 of 50
Computing Volumes and Convex Hulls : Variations and Extensions
42 of 50
Estimating Confidences for Classifier Decisions using Extreme Value Theory
43 of 50
Analyzing and Processing Big Real Graphs
44 of 50
Improving Location Accuracy And Network Capacity In Mobile Networks
45 of 50
Elasticity primitives for database as a service
46 of 50
A visual analysis toolkit for microscopic image mosaics of retinal astrocytes
47 of 50
Enabling wide-scale computer science education through improved automated assessment tools
48 of 50
Scalable graph algorithms in a high-level language using primitives inspired by linear algebra
49 of 50
Analysis and verification of web application data models
50 of 50