Search Results
2. A Personal Virtual Computer Recorder
3. Application Platforms, Routing Algorithms and Mobility Behavior in Mobile Disruption-Tolerant Networks
4. Approximation of Multiobjective Optimization Problems
5. Augmented Reality Interfaces for Procedural Tasks
6. Automatic Dialect and Accent Recognition and its Application to Speech Recognition
7. Data-Driven Programming Abstractions and Optimization for Multi-Core Platforms
8. Describable Visual Attributes for Face Images
9. Design and Analysis of Decoy Systems for Computer Security
10. Frequency Analysis and Sheared Filtering for Multidimensional Effects in Rendering
11. Graph Embedding and Nonlinear Dimensionality Reduction
12. Identification and Characterization of Events in Social Media
13. Learning with Degree-Based Subgraph Estimation
14. Minimally Invasive Solutions to Challenges Posed by Mobility Changes
15. On Black-Box Complexity and Adaptive, Universal Composability of Cryptographic Tasks
16. Quantum Algorithms and Complexity for Numerical Problems
17. Synthesis, Editing, and Rendering of Multiscale Textures
18. THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
19. Tradeoffs and Limits in Computational Imaging
20. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization
21. Advancing Multimedia: Application Sharing, Latency Measurements and User-Created Services
22. Genus Distributions of Graphs Constructed Through Amalgamations
23. Lost and Found in Translation: Cross-Lingual Question Answering with Result Translation
24. Methods for Computing Genus Distribution Using Double-Rooted Graphs
25. Modeling Narrative Discourse
26. Quantifying recent variation and relatedness in human populations
27. Record and vPlay: Problem Determination with Virtual Replay Across Heterogeneous Systems
28. Scaling up VoIP: Transport Protocols and Controlling Unwanted Communication Requests
29. Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?
30. Security Policy Definition and Enforcement in Distributed Systems
31. Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts
32. Towards Effective Masquerade Attack Detection
33. Toward Semantic Machine Translation
34. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings
35. VastMM-Tag: Semantic Indexing and Browsing of Videos for E-Learning
36. Assistive Visual Tools For Surgery
37. Computational Contributions Towards Scalable and Efficient Genome-wide Association Methodology
38. Contributions to Information-Based Complexity and to Quantum Computing
39. Correlating Visual Speaker Gestures with Measures of Audience Engagement to Aid Video Browsing
40. Discrete Differential Geometry of Thin Materials for Computational Mechanics
41. Heterogeneous Cloud Systems Based on Broadband Embedded Computing
42. Multimodal Indexing of Presentation Videos
43. Point Spread Function Engineering for Scene Recovery
44. Stable and Semantic Robotic Grasping Using Tactile Feedback
45. User Interfaces for Patient-Centered Communication of Health Status and Care Progress
46. Accelerating Similarly Structured Data
47. Acoustic-Prosodic Entrainment in Human-Human and Human-Computer Dialogue
48. Analytic Methods in Concrete Complexity
49. Exploring Societal Computing based on the Example of Privacy
50. Hybrid System Combination for Machine Translation: An Integration of Phrase-level and Sentences-level Combination Approaches
51. Methods for Inference in Graphical Models
52. Next Generation Emergency Call System with Enhanced Indoor Positioning
53. Overcoming the Intuition Wall: Measurement and Analysis in Computer Architecture
54. Population Genetics of Identity By Descent
55. Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources
56. Sound and Precise Analysis of Multithreaded Programs through Schedule Specialization and Execution Filters
57. Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication
58. Assistive Robotic Grasping
59. Computational integration of genome-wide observational and functional data in cancer
60. Defending against Return-Oriented Programming
61. Detecting Influencers in Social Media Discussions
62. Dimension Reduction for Short Text Similarity and its Applications
63. Embedded System Security: A Software-based Approach
64. Empirical Measurement of Defense in Depth
65. Exact and Approximate Methods for Machine Translation Decoding
66. From Language to the Real World: Entity-Driven Text Analytics
67. Improving System Reliability for Cyber-Physical Systems
68. Information Flow Auditing in the Cloud
69. Multi-Persona Mobile Computing
70. Multi-Structured Models for Transforming and Aligning Text
71. Multitasking on Wireless Sensor Networks
72. On Efficiency and Accuracy of Data Flow Tracking Systems
73. Private, Distributed, and Scalable Content Providers
74. Protecting Commodity Operating Systems through Strong Kernel Isolation
75. Ranking for Scalable Information Extraction
76. Social Power in Interactions: Computational Analysis and Detection of Power Relations
77. Stable Multithreading: A New Paradigm for Reliable and Secure Threads
78. Supervised Design-Space Exploration
79. Unconditional Lower Bounds in Complexity Theory
80. A Nearest-Neighbor Approach to Indicative Web Summarization
81. Characterizing and Leveraging Social Phenomena in Online Networks
82. Data-Driven Solutions to Bottlenecks in Natural Language Generation
83. Design and Optimization of Mobile Cloud Computing Systems with Networked Virtual Platforms
84. Deterministic, Mutable, and Distributed Record-Replay for Operating Systems and Database Systems
85. Dynamic Algorithms for Shortest Paths and Matching
86. Finding, Measuring, and Reducing Inefficiencies in Contemporary Computer Systems
87. GPU-Acceleration of In-Memory Data Analytics
88. Improving Content Delivery and Service Discovery in Networks
89. Making Software More Reliable by Uncovering Hidden Dependencies
90. On SIP Server Clusters and the Migration to Cloud Computing Platforms
91. On the isomorphism testing of graphs
92. Pattern Mining and Concept Discovery for Multimodal Content Analysis
93. Pivot-based Statistical Machine Translation for Morphologically Rich Languages
94. Recognition and Manipulation of Deformable Objects Using Predictive Thin Shell Modeling
95. Secure Computation Towards Practical Applications
96. Social Network Extraction from Text
97. Spectral Methods for Natural Language Processing
98. Supporting Multi-User Interaction in Co-Located and Remote Augmented Reality by Improving Reference Performance and Decreasing Physical Interference
99. Synthesizing and restructuring the conversation around the use of robots in the education and therapy of individuals with Autism Spectrum Disorders
100. The Fourth Amendment in the Digital World: How Should Computers Be Searched With Respect to the Fourth Amendment?
- « Previous
- Next »
- 1
- 2
- 3