301. Comprehensive Multi-platform Collaboration Singh, Kundan; Wu, Xiaotao; Lennox, Jonathan; Schulzrinne, Henning G. 2003 Reports Computer science
302. Computational Aspects of Language Acquisition from World to Word Smadja, Frank A. 1988 Reports Computer science
303. Computational Cameras: Approaches, Benefits and Limits Nayar, Shree K. 2011 Reports Computer science
304. Computational Complexity Traub, Joseph F. 1980 Reports Computer science--MathematicsComputational complexityAlgorithmsMatrices
305. Computational complexity of continuous problems Wozniakowski, Henryk 1996 Reports Computer science
307. Computing D-Optimum Weighing Designs: Where Statistics, Combinatorics, and Computation Meet Galil, Zvi 1983 Reports Computer scienceMathematics
308. Computing Geographical Scopes of Web Resources Ding, Junyan; Gravano, Luis; Shivakumar, Narayanan 2000 Reports Computer science
309. Concept Learning in a Rich Input Domain: Generalization-Based Memory Lebowitz, Michael 1984 Reports Computer science
310. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
311. Concurrency Control in Advanced Database Applications Barghouti, Naser S.; Kaiser, Gail E. 1989 Reports Computer science
312. Concurrency Control in Rule-Based Software Development Environments Barghouti, Naser S. 1992 Reports Computer science
313. Concurrency-Oriented Optimization for Low-Power Asynchronous Systems Plana, Luis A.; Nowick, Steven M. 1996 Reports Computer science
315. Concurrent Execution of Mutually Exclusive Alternatives Smith, Jonathan M. 1989 Reports Computer science
316. Configuration Fuzzing for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
317. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
318. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning 2010 Reports Computer science
319. Connecting the Physical World with Arduino in SECE Janak, Jan; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
320. Consistency and Automation in Multi-User Rule-Based Development Environments Barghouti, Naser S.; Kaiser, Gail E. 1990 Reports Computer science
321. Constraint-based Text Generation Using Local Constraints and Argumentation to Generate a Turn in Conversation Elhadad, Michael 1990 Reports Computer science
322. Constructing Subtle Concurrency Bugs Using Synchronization-CentricSecond-Order Mutation Operators Wu, Leon Li; Kaiser, Gail E. 2011 Reports Computer science
323. Construction Through Decomposition: A Linear Time Algorithm for the N-queens Problem Abramson, Bruce; Yung, Mordechai M. 1984 Reports Computer science
324. Contributions to Information-Based Complexity, Image Understanding,and Logic Circuit Design Lee, David 1985 Reports Computer science
325. Contributions to information-based complexity, image understanding and logic circuit design. Lee, David 1985 Reports Computer science
326. Contributions to the Design of Asynchronous Macromodular Systems Plana, Luis A. 1999 Reports Computer science
327. Control in Functional Unification Grammars for Text Generation Elhadad, Michael; Robin, Jacques 1991 Reports Computer science
328. Controlling Window Protocols for Time-Constrained Communication in a Multiple Access Environment Kurose, James F.; Schwartz, Mischa; Yemini, Yechiam 1983 Reports Computer science
330. Converting from Spherical to Parabolic Coordinates Ben-Artzi, Aner 2006 Reports Computer science
331. Cooperation Between Stations in Wireless Networks Forte, Andrea G.; Schulzrinne, Henning G. 2006 Reports Computer science
332. Cooperative Transactions for Multi-User Environments Kaiser, Gail E. 1993 Reports Computer science
333. Coordinating a Robot Arm and: Multi-finger Hand Using the Quaternion Representation Roberts, Kenneth S. 1989 Reports Computer science
335. Cost and Scalability of Hardware Encryption Techniques Waksman, Adam Scott; Sethumadhavan, Lakshminarasimhan 2013 Reports Computer science
336. Cost Function Error in Asynchronous Parallel Simulated Annealing Algorithms Durand, M. D. 1989 Reports Computer science
337. Counterexamples in Optimal Quadrature Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
338. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Reports Computer science
339. Covers of Attribute Grammars and Sub-Protocol .Attribute Evaluators Farrow, Rodney 1983 Reports Computer science
340. CPU Torrent -- CPU Cycle Offloading to Reduce User Wait Time and Provider Resource Requirements Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2008 Reports Computer science
341. Creating a Story-Telling Universe Lebowitz, Michael 1983 Reports Computer scienceArtificial intelligence
342. Creating Characters in a Story-Telling Universe Lebowitz, Michael 1984 Reports Computer scienceInformation scienceLiterature
343. crep: a regular expression-matching textual corpus tool Duford, Darrin 1993 Reports Computer science
344. Cross-Dimensional Gestural Interaction Techniques for Hybrid Immersive Environments Benko, Hrvoje; Ishak, Edward W.; Feiner, Steven K. 2004 Reports Computer science
345. Cryptfs: A Stackable Vnode Level Encryption File System Badulescu, Ion; Shender, Alex; Zadok, Erez 1998 Reports Computer science
346. Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game Yung, Mordechai M. 1984 Reports Computer science
348. CUPID: A Protocol Development Environment Yemini, Yechiam; Nounou, Nihal 1983 Reports Computer science