Search Constraints
« Previous |
341 - 360 of 387
|
Next »
Search Results
Select an image to start the slideshow
Formalization and Verification of Rewriting-Based Security Polices
1 of 20
Using Bandwidth Estimation to Optimize Buffer and Rate Selection for Streaming Multimedia over IEEE 802.11 Wireless Networks
2 of 20
The effect of prompted self-revision on student performance in the context of open-ended problems using Randomized Control Trials
3 of 20
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
4 of 20
Many-Light Real-Time Global Illumination using Sparse Voxel Octree
5 of 20
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
6 of 20
Affective Motivational Collaboration Theory
7 of 20
Investigating Learning in an Intelligent Tutoring System through Randomized Controlled Experiments
8 of 20
Traffic Sensitive Active Queue Management for Improved Quality of Service
9 of 20
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
10 of 20
Tutoring Students with Adaptive Strategies
11 of 20
Decoding Cognitive States from fNIRS Neuroimaging Data Using Machine Learning
12 of 20
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
13 of 20
Optimization Strategies for Data Warehouse Maintenance in Distributed Environments
14 of 20
Making Sense of Human-generated Spatial-temporal Data from Urban Environment
15 of 20
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
16 of 20
Integration of Heterogeneous Databases: Discovery of Meta-Information and Maintenance of Schema-Restructuring Views
17 of 20
Selective Flooding for Better QoS Routing
18 of 20
A Fast and Robust Image-Based Method for tracking Robot-assisted Needle Placement in Real-time MR Images
19 of 20
Incremental Maintenance Of Materialized XQuery Views
20 of 20