Search Constraints
« Previous |
221 - 240 of 290
|
Next »
Search Results
Select an image to start the slideshow
Rijndael Circuit Level Cryptanalysis
1 of 20
Trade-offs Between Energy and Security in Wireless Networks
2 of 20
Optimal Load Balancing in a Beowulf Cluster
3 of 20
Development and Application of Semi-automated ITK Tools Development and Application of Semi-automated ITK Tools for the Segmentation of Brain MR Images
4 of 20
A Modular Model Checking Algorithm for Cyclic Feature Compositions
5 of 20
Overcoming Limitations in Computer Worm Models
6 of 20
Clutter-Based Dimension Reordering in Multi-Dimensional Data Visualization
7 of 20
Exploratory Visualization of Data with Variable Quality
8 of 20
The Byzantine Agreement Protocol Applied to Security
9 of 20
Addressing the Data Recency Problem in Collaborative Filtering Systems
10 of 20
Pixel Oriented Visualization in XmdvTool
11 of 20
A Hierarchy Navigation Framework: Supporting Scalable Interactive Exploration over Large Databases
12 of 20
Developing an Affordable Authoring Tool For Intelligent Tutoring Systems
13 of 20
Collaborative Warrior Tutoring
14 of 20
"Multiple Continuous Query Processing with Relative Window Predicates ""Juggler"""
15 of 20
Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems
16 of 20
SOFTVIZ... A Step Forward
17 of 20
Using Association Rules to Guide a Search for Best Fitting Transfer Models of Student Learning
18 of 20
Evaluating Predictions of Transfer and Analyzing Student Motivation
19 of 20
IFSO: A Integrated Framework For Automatic/Semi-automatic Software Refactoring and Analysis
20 of 20