Search Constraints
« Previous |
41 - 60 of 94
|
Next »
Search Results
Select an image to start the slideshow
Advanced automated web application vulnerability analysis
1 of 20
Computing Volumes and Convex Hulls : Variations and Extensions
2 of 20
Estimating Confidences for Classifier Decisions using Extreme Value Theory
3 of 20
Analyzing and Processing Big Real Graphs
4 of 20
Improving Location Accuracy And Network Capacity In Mobile Networks
5 of 20
Elasticity primitives for database as a service
6 of 20
A visual analysis toolkit for microscopic image mosaics of retinal astrocytes
7 of 20
Enabling wide-scale computer science education through improved automated assessment tools
8 of 20
Scalable graph algorithms in a high-level language using primitives inspired by linear algebra
9 of 20
Analysis and verification of web application data models
10 of 20
Interactive remote collaboration using augmented reality
11 of 20
Geometric Pursuit Evasion
12 of 20
Modular wireless networks for infrastructure-challenged environments
13 of 20
Resource-efficient wireless systems for emerging wireless networks
14 of 20
Automatic Detection and Repair of Input Validation and Sanitization Bugs
15 of 20
Stepping Up the Cybersecurity Game : Protecting Online Services from Malicious Activity
16 of 20
Uncovering Interesting Attributed Anomalies in Large Graphs
17 of 20
Designing reliable modern memory systems
18 of 20
Visualizing information flow at the hardware level
19 of 20
Sketch Practically Anywhere: Capturing, Recognizing, and Interacting with Physical Ink Using Commodity Hardware
20 of 20