21. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
22. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
23. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
25. Visual Surface Interpolation: A Comparison of Two Methods Boult, Terrance E. 1985 Reports Computer science
26. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
27. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
28. Valued Redundancy Pu, Calton; Leff, Avraham; Chen, Shu-Wie; Korz, Frederick; Wha, Jae M. 1989 Reports Computer science
29. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
30. Using Prosodic Features of Speech and Audio Localization in Graphical User Interfaces Olwal, Alex; Feiner, Steven K. 2003 Reports Computer science
31. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2003 Reports Computer science
32. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
33. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
35. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
36. Using Functional Independence Conditions to Optimize the Performance of Latency-Insensitive Systems Li, Cheng-Hong; Carloni, Luca 2007 Reports Computer science
37. Using Focus to Generate Complex and Simple Sentences Derr, Marcia A.; McKeown, Kathleen 1983 Reports Computer science
38. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
39. Using Density Estimation to Improve Text Categorization Sable, Carl; McKeown, Kathleen; Hatzivassiloglou, Vasileios 2002 Reports Computer science
40. Using boosting for automated planning and trading systems Creamer, German 2007 Reports Computer science