Search Constraints
« Previous |
21 - 40 of 94
|
Next »
Search Results
Select an image to start the slideshow
Detecting the stealthy distribution of malicious and abusive content online
1 of 20
Mining and Managing Large-Scale Temporal Graphs
2 of 20
Understanding and Engaging Online Audiences
3 of 20
Contextualizing Network Security
4 of 20
Querying Large-scale Knowledge Graphs
5 of 20
Efficient Similarity Search with Cache-Conscious Data Traversal
6 of 20
Scalable automated evasive malware analysis
7 of 20
Configurable and Sound Static Analysis of JavaScript : Techniques and Applications
8 of 20
Analyzing and Defending Against Evolving Web Threats
9 of 20
Management of data and collaboration for business processes
10 of 20
Throughput and Delay on the Packet Switched Internet (A Cross-Disciplinary Approach)
11 of 20
Connecting text with knowledge
12 of 20
Optimizing JavaScript Engines for Modern-day Workloads
13 of 20
Programming Environments for Children : Creating a Language that Grows with you
14 of 20
Efficient Parallel Optimizations for All Pairs Similarity Search
15 of 20
Collocated data deduplication for virtual machine backup in the cloud
16 of 20
Stochastic Modeling of System Function in a Network of Biological Oscillators
17 of 20
Accelerated Algorithms for Stochastic Simulation of Chemically Reacting Systems
18 of 20
Automatic Model Reductions for Stochastic Simulation
19 of 20
On the validity of geosocial mobility traces
20 of 20