Search Constraints
« Previous |
341 - 350 of 387
|
Next »
Search Results
Select an image to start the slideshow
Formalization and Verification of Rewriting-Based Security Polices
1 of 10
Using Bandwidth Estimation to Optimize Buffer and Rate Selection for Streaming Multimedia over IEEE 802.11 Wireless Networks
2 of 10
The effect of prompted self-revision on student performance in the context of open-ended problems using Randomized Control Trials
3 of 10
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
4 of 10
Many-Light Real-Time Global Illumination using Sparse Voxel Octree
5 of 10
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
6 of 10
Affective Motivational Collaboration Theory
7 of 10
Investigating Learning in an Intelligent Tutoring System through Randomized Controlled Experiments
8 of 10
Traffic Sensitive Active Queue Management for Improved Quality of Service
9 of 10
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
10 of 10