Search Constraints
« Previous |
361 - 380 of 387
|
Next »
Search Results
Select an image to start the slideshow
Towards Better Kernel and Network Monitoring of Software Actions
1 of 20
Overcoming Limitations in Computer Worm Models
2 of 20
Better Admission Control and Disk Scheduling for Multimedia Applications
3 of 20
Ballistocardiography-based Authentication using Convolutional Neural Networks
4 of 20
Control-flow Integrity for Real-time Embedded Systems
5 of 20
Creating Systems and Applying Large-Scale Methods to Improve Student Remediation in Online Tutoring Systems in Real-time and at Scale
6 of 20
High Performance Analytics in Complex Event Processing
7 of 20
Optimized Nested Complex Event Processing Using Continuous Caching
8 of 20
Similarity Reasoning over Semantic Context-Graphs
9 of 20
Bringing Human-Robot Interaction Studies Online via the Robot Management System
10 of 20
Order-sensitive View Maintenance of Materialized XQuery Views
11 of 20
Deterministic Object Management in Large Distributed Systems
12 of 20
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
13 of 20
Framework For Robot-Assisted Doffing of Personal Protective Equipment
14 of 20
Knowledge Triplets Derivation from Scientific Publications via Dual-Graph Resonance
15 of 20
Data-Driven Optimization of Wire Arc Directed Energy Deposition Manufacturing Conditions for Improved Bead Shape Prediction
16 of 20
Toward Improving Effectiveness of Crowdsourced, On-Demand Assistance From Authors in Online Learning Platforms
17 of 20
Effects of Digital Jury Moderation on the Polarization of Social Media Users
18 of 20
MiseEnPlace : Fine- and Coarse-grained Approaches for Mobile-Oriented Deep Learning Inference
19 of 20
Mitigating Temporal Memory Safety Errors in the Linux Kernel
20 of 20