Search Constraints
Search Results
Select an image to start the slideshow
Scalable and Elastic Transactional Data Stores for Cloud Computing Platforms
1 of 94
Defending Against Malicious Software
2 of 94
Accurate Characterization of Stochastic Rare Events in Biochemical Systems
3 of 94
Towards Enabling Better Understanding and Performance for Managed Languages
4 of 94
Wide-Area Visual Modeling and Tracking for Mobile Augmented Reality
5 of 94
Managing and Mining Biological Images
6 of 94
Querying Patterns in High-Dimensional Heterogenous Datasets
7 of 94
Adaptive Multiscale Algorithms and Software for Stochastic Simulation of Biochemical Systems
8 of 94
Operationalizing Place: Discovering, reasoning about, and exploring place knowledge from descriptions
9 of 94
Big Data Challenges and Opportunities: Information Diffusion, User Behavior, and Informational Trends in Online Social Networks
10 of 94
Mining and Modeling of Large and Time-Evolving Graphs
11 of 94
Bridging Social and Semantic Computing -- Design and Evaluation of User Interfaces for Hybrid Systems
12 of 94
Automated Configuration and Deployment of Applications in Heterogeneous Cloud Environments
13 of 94
Battling Spam and Sybils on the Social Web
14 of 94
Interaction Methods for Large Scale Graph Visualization Systems --- Using Manipulation to Aid Discovery
15 of 94
Energy-efficient Large-scale Computing
16 of 94
Towards Practical Privacy-Preserving Internet Services
17 of 94
Beyond simple relations: Mining and search in temporal, composite and semantic graphs
18 of 94
Querying and Mining Chemical Databases for Drug Discovery
19 of 94
Composition Context Photography
20 of 94
Approximation Algorithms for Problems on Networks and Streams of Data
21 of 94
Adaptive and Resource-Efficient Rural Area Wireless Networks
22 of 94
Combinatorial and Geometric Optimization over Stochastic Data
23 of 94
Uncovering Interesting Attributed Anomalies in Large Graphs
24 of 94
Designing reliable modern memory systems
25 of 94
Visualizing information flow at the hardware level
26 of 94
Sketch Practically Anywhere: Capturing, Recognizing, and Interacting with Physical Ink Using Commodity Hardware
27 of 94
Re-architecting Internet Access and Wireless Networks for Rural Developing Regions
28 of 94
Mixed Reality Simulation
29 of 94
Spatial Stochastic Simulation of Biochemical Systems
30 of 94
Graph-Based Transductive Learning for Visual Classification and Retrieval
31 of 94
Toward the Effective Management of Data Uncertainty through the Exploitation of Spatial Relationships
32 of 94
Network Design in the Big-Data Age
33 of 94
Jarhead - Analyzing and Detecting Malicious Java Applets
34 of 94
Towards Querying and Mining of Large-Scale Networks
35 of 94
Designing Information Flow Secure Hardware
36 of 94
Chaperone Interactions in the Endoplasmic Reticulum of Yeast
37 of 94
Designing reliable networks-on-chip at the end of traditional cmos scaling
38 of 94
Efficient Parallel Optimizations for All Pairs Similarity Search
39 of 94
Collocated data deduplication for virtual machine backup in the cloud
40 of 94
Stochastic Modeling of System Function in a Network of Biological Oscillators
41 of 94
Accelerated Algorithms for Stochastic Simulation of Chemically Reacting Systems
42 of 94
Automatic Model Reductions for Stochastic Simulation
43 of 94
On the validity of geosocial mobility traces
44 of 94
Advanced automated web application vulnerability analysis
45 of 94
Computing Volumes and Convex Hulls : Variations and Extensions
46 of 94
Estimating Confidences for Classifier Decisions using Extreme Value Theory
47 of 94
Analyzing and Processing Big Real Graphs
48 of 94
Improving Location Accuracy And Network Capacity In Mobile Networks
49 of 94
Elasticity primitives for database as a service
50 of 94
A visual analysis toolkit for microscopic image mosaics of retinal astrocytes
51 of 94
Enabling wide-scale computer science education through improved automated assessment tools
52 of 94
Scalable graph algorithms in a high-level language using primitives inspired by linear algebra
53 of 94
Analysis and verification of web application data models
54 of 94
Interactive remote collaboration using augmented reality
55 of 94
Geometric Pursuit Evasion
56 of 94
Modular wireless networks for infrastructure-challenged environments
57 of 94
Resource-efficient wireless systems for emerging wireless networks
58 of 94
Automatic Detection and Repair of Input Validation and Sanitization Bugs
59 of 94
Stepping Up the Cybersecurity Game : Protecting Online Services from Malicious Activity
60 of 94
Detecting the stealthy distribution of malicious and abusive content online
61 of 94
Mining and Managing Large-Scale Temporal Graphs
62 of 94
Understanding and Engaging Online Audiences
63 of 94
Contextualizing Network Security
64 of 94
Querying Large-scale Knowledge Graphs
65 of 94
Efficient Similarity Search with Cache-Conscious Data Traversal
66 of 94
Scalable automated evasive malware analysis
67 of 94
Configurable and Sound Static Analysis of JavaScript : Techniques and Applications
68 of 94
Analyzing and Defending Against Evolving Web Threats
69 of 94
Management of data and collaboration for business processes
70 of 94
Throughput and Delay on the Packet Switched Internet (A Cross-Disciplinary Approach)
71 of 94
Connecting text with knowledge
72 of 94
Optimizing JavaScript Engines for Modern-day Workloads
73 of 94
Programming Environments for Children : Creating a Language that Grows with you
74 of 94
Representation learning on unstructured data
75 of 94
Combating attacks and abuse in large online communities
76 of 94
Mining Disparate Sources for Question Answering
77 of 94
Efficient deformations using custom coordinate systems
78 of 94
Novel network architectures for cloud-based applications
79 of 94
Opinion detection, sentiment analysis and user attribute detection from online text data
80 of 94
Analysis and improvements of the AKS algorithm
81 of 94
Are we using the crypto we want? : TLS cipher-suite negotiation and its discontents
82 of 94
Governance of cloud-hosted web applications
83 of 94
Memory page stability and its application to memory deduplication
84 of 94
Using workload prediction and federation to increase cloud utilization
85 of 94
Modeling and Calibrating the Distributed Camera
86 of 94
Information Reliability on the Social Web Models and Applications in Intelligent User Interfaces
87 of 94
Mining clinical data for trauma patients
88 of 94
Data model verification via theorem proving
89 of 94
User-Perspective Augmented Reality Magic Lenses
90 of 94
A Quantitative Investigation into the Design Trade-offs in Decision Support Systems
91 of 94
Automata-based Model Counting String Constraint Solver for Vulnerability Analysis
92 of 94
Measurement-driven Wireless Network Design
93 of 94
Understanding the Real World through the Analysis of User Behavior and Topics in Online Social Media
94 of 94