Search Constraints
« Previous |
61 - 80 of 290
|
Next »
Search Results
Select an image to start the slideshow
Addressing the Data Recency Problem in Collaborative Filtering Systems
1 of 20
The Byzantine Agreement Protocol Applied to Security
2 of 20
Exploratory Visualization of Data with Variable Quality
3 of 20
Clutter-Based Dimension Reordering in Multi-Dimensional Data Visualization
4 of 20
Overcoming Limitations in Computer Worm Models
5 of 20
A Modular Model Checking Algorithm for Cyclic Feature Compositions
6 of 20
Development and Application of Semi-automated ITK Tools Development and Application of Semi-automated ITK Tools for the Segmentation of Brain MR Images
7 of 20
Optimal Load Balancing in a Beowulf Cluster
8 of 20
Trade-offs Between Energy and Security in Wireless Networks
9 of 20
Rijndael Circuit Level Cryptanalysis
10 of 20
Remote Execution for 3D Graphics
11 of 20
Continuous Query Processing on Spatio-Temporal Data Streams
12 of 20
Multi Camera Stereo and Tracking Patient Motion for SPECT Scanning Systems
13 of 20
The Wisdom of Crowds as a Model for Trust and Security in Peer Groups
14 of 20
Towards Teachers Quickly Creating Tutoring Systems
15 of 20
Visual Feedback for Gaming Prevention in Intelligent Tutoring Systems
16 of 20
The Common Tutor Object Platform
17 of 20
Clutter Measurement and Reduction for Enhanced Information Visualization
18 of 20
VAMANA : A High Performance, Scalable and Cost Driven XPath Engine
19 of 20
D-CAPE: A Self-Tuning Continuous Query Plan Distribution Architecture
20 of 20