Search Constraints
Search Results
Select an image to start the slideshow
Representation learning on unstructured data
1 of 89
Combating attacks and abuse in large online communities
2 of 89
Mining Disparate Sources for Question Answering
3 of 89
Efficient deformations using custom coordinate systems
4 of 89
Novel network architectures for cloud-based applications
5 of 89
Opinion detection, sentiment analysis and user attribute detection from online text data
6 of 89
Analysis and improvements of the AKS algorithm
7 of 89
Are we using the crypto we want? : TLS cipher-suite negotiation and its discontents
8 of 89
Governance of cloud-hosted web applications
9 of 89
Memory page stability and its application to memory deduplication
10 of 89
Using workload prediction and federation to increase cloud utilization
11 of 89
Modeling and Calibrating the Distributed Camera
12 of 89
Information Reliability on the Social Web Models and Applications in Intelligent User Interfaces
13 of 89
Mining clinical data for trauma patients
14 of 89
Data model verification via theorem proving
15 of 89
Detecting the stealthy distribution of malicious and abusive content online
16 of 89
Mining and Managing Large-Scale Temporal Graphs
17 of 89
Understanding and Engaging Online Audiences
18 of 89
Contextualizing Network Security
19 of 89
Querying Large-scale Knowledge Graphs
20 of 89
Efficient Similarity Search with Cache-Conscious Data Traversal
21 of 89
Scalable automated evasive malware analysis
22 of 89
Configurable and Sound Static Analysis of JavaScript : Techniques and Applications
23 of 89
Analyzing and Defending Against Evolving Web Threats
24 of 89
Management of data and collaboration for business processes
25 of 89
Throughput and Delay on the Packet Switched Internet (A Cross-Disciplinary Approach)
26 of 89
Connecting text with knowledge
27 of 89
Optimizing JavaScript Engines for Modern-day Workloads
28 of 89
Programming Environments for Children : Creating a Language that Grows with you
29 of 89
Efficient Parallel Optimizations for All Pairs Similarity Search
30 of 89
Collocated data deduplication for virtual machine backup in the cloud
31 of 89
Stochastic Modeling of System Function in a Network of Biological Oscillators
32 of 89
Accelerated Algorithms for Stochastic Simulation of Chemically Reacting Systems
33 of 89
Automatic Model Reductions for Stochastic Simulation
34 of 89
On the validity of geosocial mobility traces
35 of 89
Advanced automated web application vulnerability analysis
36 of 89
Computing Volumes and Convex Hulls : Variations and Extensions
37 of 89
Estimating Confidences for Classifier Decisions using Extreme Value Theory
38 of 89
Analyzing and Processing Big Real Graphs
39 of 89
Improving Location Accuracy And Network Capacity In Mobile Networks
40 of 89
Elasticity primitives for database as a service
41 of 89
A visual analysis toolkit for microscopic image mosaics of retinal astrocytes
42 of 89
Enabling wide-scale computer science education through improved automated assessment tools
43 of 89
Scalable graph algorithms in a high-level language using primitives inspired by linear algebra
44 of 89
Analysis and verification of web application data models
45 of 89
Interactive remote collaboration using augmented reality
46 of 89
Geometric Pursuit Evasion
47 of 89
Modular wireless networks for infrastructure-challenged environments
48 of 89
Resource-efficient wireless systems for emerging wireless networks
49 of 89
Automatic Detection and Repair of Input Validation and Sanitization Bugs
50 of 89
Stepping Up the Cybersecurity Game : Protecting Online Services from Malicious Activity
51 of 89
Uncovering Interesting Attributed Anomalies in Large Graphs
52 of 89
Designing reliable modern memory systems
53 of 89
Visualizing information flow at the hardware level
54 of 89
Sketch Practically Anywhere: Capturing, Recognizing, and Interacting with Physical Ink Using Commodity Hardware
55 of 89
Re-architecting Internet Access and Wireless Networks for Rural Developing Regions
56 of 89
Mixed Reality Simulation
57 of 89
Spatial Stochastic Simulation of Biochemical Systems
58 of 89
Graph-Based Transductive Learning for Visual Classification and Retrieval
59 of 89
Toward the Effective Management of Data Uncertainty through the Exploitation of Spatial Relationships
60 of 89
Network Design in the Big-Data Age
61 of 89
Jarhead - Analyzing and Detecting Malicious Java Applets
62 of 89
Towards Querying and Mining of Large-Scale Networks
63 of 89
Designing Information Flow Secure Hardware
64 of 89
Chaperone Interactions in the Endoplasmic Reticulum of Yeast
65 of 89
Designing reliable networks-on-chip at the end of traditional cmos scaling
66 of 89
Towards Enabling Better Understanding and Performance for Managed Languages
67 of 89
Wide-Area Visual Modeling and Tracking for Mobile Augmented Reality
68 of 89
Managing and Mining Biological Images
69 of 89
Querying Patterns in High-Dimensional Heterogenous Datasets
70 of 89
Adaptive Multiscale Algorithms and Software for Stochastic Simulation of Biochemical Systems
71 of 89
Operationalizing Place: Discovering, reasoning about, and exploring place knowledge from descriptions
72 of 89
Big Data Challenges and Opportunities: Information Diffusion, User Behavior, and Informational Trends in Online Social Networks
73 of 89
Mining and Modeling of Large and Time-Evolving Graphs
74 of 89
Bridging Social and Semantic Computing -- Design and Evaluation of User Interfaces for Hybrid Systems
75 of 89
Automated Configuration and Deployment of Applications in Heterogeneous Cloud Environments
76 of 89
Battling Spam and Sybils on the Social Web
77 of 89
Interaction Methods for Large Scale Graph Visualization Systems --- Using Manipulation to Aid Discovery
78 of 89
Energy-efficient Large-scale Computing
79 of 89
Towards Practical Privacy-Preserving Internet Services
80 of 89
Beyond simple relations: Mining and search in temporal, composite and semantic graphs
81 of 89
Querying and Mining Chemical Databases for Drug Discovery
82 of 89
Composition Context Photography
83 of 89
Approximation Algorithms for Problems on Networks and Streams of Data
84 of 89
Adaptive and Resource-Efficient Rural Area Wireless Networks
85 of 89
Combinatorial and Geometric Optimization over Stochastic Data
86 of 89
Scalable and Elastic Transactional Data Stores for Cloud Computing Platforms
87 of 89
Defending Against Malicious Software
88 of 89
Accurate Characterization of Stochastic Rare Events in Biochemical Systems
89 of 89