Search Constraints
Search Results
Select an image to start the slideshow
User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
1 of 3
Robust Complex Event Pattern Detection over Streams
2 of 3
Semantic Query Optimization for Processing XML Streams with Minimized Memory Footprint
3 of 3