Search Constraints
Search Results
Select an image to start the slideshow
The Wisdom of Crowds as a Model for Trust and Security in Peer Groups
1 of 14
Trade-offs Between Energy and Security in Wireless Networks
2 of 14
The Byzantine Agreement Protocol Applied to Security
3 of 14
Continuous Query Processing on Spatio-Temporal Data Streams
4 of 14
Clutter-Based Dimension Reordering in Multi-Dimensional Data Visualization
5 of 14
Optimal Load Balancing in a Beowulf Cluster
6 of 14
Multi Camera Stereo and Tracking Patient Motion for SPECT Scanning Systems
7 of 14
Rijndael Circuit Level Cryptanalysis
8 of 14
Remote Execution for 3D Graphics
9 of 14
Development and Application of Semi-automated ITK Tools Development and Application of Semi-automated ITK Tools for the Segmentation of Brain MR Images
10 of 14
Exploratory Visualization of Data with Variable Quality
11 of 14
A Modular Model Checking Algorithm for Cyclic Feature Compositions
12 of 14
Towards Teachers Quickly Creating Tutoring Systems
13 of 14
Overcoming Limitations in Computer Worm Models
14 of 14