Search Constraints
Search Results
Select an image to start the slideshow
The Byzantine Agreement Protocol Applied to Security
1 of 20
Exploratory Visualization of Data with Variable Quality
2 of 20
Clutter-Based Dimension Reordering in Multi-Dimensional Data Visualization
3 of 20
Overcoming Limitations in Computer Worm Models
4 of 20
A Modular Model Checking Algorithm for Cyclic Feature Compositions
5 of 20
Software Engineering Using design RATionale
6 of 20
Development and Application of Semi-automated ITK Tools Development and Application of Semi-automated ITK Tools for the Segmentation of Brain MR Images
7 of 20
Optimal Load Balancing in a Beowulf Cluster
8 of 20
Trade-offs Between Energy and Security in Wireless Networks
9 of 20
A General Framework for Multi-Resolution Visualization
10 of 20
Rijndael Circuit Level Cryptanalysis
11 of 20
Remote Execution for 3D Graphics
12 of 20
Congestion Control for Streaming Media
13 of 20
Scalable Integration View Computation and Maintenance with Parallel, Adaptive and Grouping Techniques
14 of 20
Continuous Query Processing on Spatio-Temporal Data Streams
15 of 20
Multi Camera Stereo and Tracking Patient Motion for SPECT Scanning Systems
16 of 20
The Wisdom of Crowds as a Model for Trust and Security in Peer Groups
17 of 20
Towards Teachers Quickly Creating Tutoring Systems
18 of 20
Efficient Incremental View Maintenance for Data Warehousing
19 of 20
Incremental Maintenance Of Materialized XQuery Views
20 of 20