Search Constraints
Search Results
Select an image to start the slideshow
User-Perspective Augmented Reality Magic Lenses
1 of 94
A Quantitative Investigation into the Design Trade-offs in Decision Support Systems
2 of 94
Automata-based Model Counting String Constraint Solver for Vulnerability Analysis
3 of 94
Measurement-driven Wireless Network Design
4 of 94
Understanding the Real World through the Analysis of User Behavior and Topics in Online Social Media
5 of 94
Representation learning on unstructured data
6 of 94
Combating attacks and abuse in large online communities
7 of 94
Mining Disparate Sources for Question Answering
8 of 94
Efficient deformations using custom coordinate systems
9 of 94
Novel network architectures for cloud-based applications
10 of 94
Opinion detection, sentiment analysis and user attribute detection from online text data
11 of 94
Analysis and improvements of the AKS algorithm
12 of 94
Are we using the crypto we want? : TLS cipher-suite negotiation and its discontents
13 of 94
Governance of cloud-hosted web applications
14 of 94
Memory page stability and its application to memory deduplication
15 of 94
Using workload prediction and federation to increase cloud utilization
16 of 94
Modeling and Calibrating the Distributed Camera
17 of 94
Information Reliability on the Social Web Models and Applications in Intelligent User Interfaces
18 of 94
Mining clinical data for trauma patients
19 of 94
Data model verification via theorem proving
20 of 94
Detecting the stealthy distribution of malicious and abusive content online
21 of 94
Mining and Managing Large-Scale Temporal Graphs
22 of 94
Understanding and Engaging Online Audiences
23 of 94
Contextualizing Network Security
24 of 94
Querying Large-scale Knowledge Graphs
25 of 94
Efficient Similarity Search with Cache-Conscious Data Traversal
26 of 94
Scalable automated evasive malware analysis
27 of 94
Configurable and Sound Static Analysis of JavaScript : Techniques and Applications
28 of 94
Analyzing and Defending Against Evolving Web Threats
29 of 94
Management of data and collaboration for business processes
30 of 94
Throughput and Delay on the Packet Switched Internet (A Cross-Disciplinary Approach)
31 of 94
Connecting text with knowledge
32 of 94
Optimizing JavaScript Engines for Modern-day Workloads
33 of 94
Programming Environments for Children : Creating a Language that Grows with you
34 of 94
Efficient Parallel Optimizations for All Pairs Similarity Search
35 of 94
Collocated data deduplication for virtual machine backup in the cloud
36 of 94
Stochastic Modeling of System Function in a Network of Biological Oscillators
37 of 94
Accelerated Algorithms for Stochastic Simulation of Chemically Reacting Systems
38 of 94
Automatic Model Reductions for Stochastic Simulation
39 of 94
On the validity of geosocial mobility traces
40 of 94
Advanced automated web application vulnerability analysis
41 of 94
Computing Volumes and Convex Hulls : Variations and Extensions
42 of 94
Estimating Confidences for Classifier Decisions using Extreme Value Theory
43 of 94
Analyzing and Processing Big Real Graphs
44 of 94
Improving Location Accuracy And Network Capacity In Mobile Networks
45 of 94
Elasticity primitives for database as a service
46 of 94
A visual analysis toolkit for microscopic image mosaics of retinal astrocytes
47 of 94
Enabling wide-scale computer science education through improved automated assessment tools
48 of 94
Scalable graph algorithms in a high-level language using primitives inspired by linear algebra
49 of 94
Analysis and verification of web application data models
50 of 94
Interactive remote collaboration using augmented reality
51 of 94
Geometric Pursuit Evasion
52 of 94
Modular wireless networks for infrastructure-challenged environments
53 of 94
Resource-efficient wireless systems for emerging wireless networks
54 of 94
Automatic Detection and Repair of Input Validation and Sanitization Bugs
55 of 94
Stepping Up the Cybersecurity Game : Protecting Online Services from Malicious Activity
56 of 94
Uncovering Interesting Attributed Anomalies in Large Graphs
57 of 94
Designing reliable modern memory systems
58 of 94
Visualizing information flow at the hardware level
59 of 94
Sketch Practically Anywhere: Capturing, Recognizing, and Interacting with Physical Ink Using Commodity Hardware
60 of 94
Re-architecting Internet Access and Wireless Networks for Rural Developing Regions
61 of 94
Mixed Reality Simulation
62 of 94
Spatial Stochastic Simulation of Biochemical Systems
63 of 94
Graph-Based Transductive Learning for Visual Classification and Retrieval
64 of 94
Toward the Effective Management of Data Uncertainty through the Exploitation of Spatial Relationships
65 of 94
Network Design in the Big-Data Age
66 of 94
Jarhead - Analyzing and Detecting Malicious Java Applets
67 of 94
Towards Querying and Mining of Large-Scale Networks
68 of 94
Designing Information Flow Secure Hardware
69 of 94
Chaperone Interactions in the Endoplasmic Reticulum of Yeast
70 of 94
Designing reliable networks-on-chip at the end of traditional cmos scaling
71 of 94
Towards Enabling Better Understanding and Performance for Managed Languages
72 of 94
Wide-Area Visual Modeling and Tracking for Mobile Augmented Reality
73 of 94
Managing and Mining Biological Images
74 of 94
Querying Patterns in High-Dimensional Heterogenous Datasets
75 of 94
Adaptive Multiscale Algorithms and Software for Stochastic Simulation of Biochemical Systems
76 of 94
Operationalizing Place: Discovering, reasoning about, and exploring place knowledge from descriptions
77 of 94
Big Data Challenges and Opportunities: Information Diffusion, User Behavior, and Informational Trends in Online Social Networks
78 of 94
Mining and Modeling of Large and Time-Evolving Graphs
79 of 94
Bridging Social and Semantic Computing -- Design and Evaluation of User Interfaces for Hybrid Systems
80 of 94
Automated Configuration and Deployment of Applications in Heterogeneous Cloud Environments
81 of 94
Battling Spam and Sybils on the Social Web
82 of 94
Interaction Methods for Large Scale Graph Visualization Systems --- Using Manipulation to Aid Discovery
83 of 94
Energy-efficient Large-scale Computing
84 of 94
Towards Practical Privacy-Preserving Internet Services
85 of 94
Beyond simple relations: Mining and search in temporal, composite and semantic graphs
86 of 94
Querying and Mining Chemical Databases for Drug Discovery
87 of 94
Composition Context Photography
88 of 94
Approximation Algorithms for Problems on Networks and Streams of Data
89 of 94
Adaptive and Resource-Efficient Rural Area Wireless Networks
90 of 94
Combinatorial and Geometric Optimization over Stochastic Data
91 of 94
Scalable and Elastic Transactional Data Stores for Cloud Computing Platforms
92 of 94
Defending Against Malicious Software
93 of 94
Accurate Characterization of Stochastic Rare Events in Biochemical Systems
94 of 94