Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Pdf
Computational model of human behavior in security games with varying number of targets
Accelerating scientific computing applications with reconfigurable hardware
PDF
A system for trust evaluation and management leveraging trusted computing technology
PDF
Role of college program administrators in addressing gender gap in computer science
PDF
Trusted grid and P2P computing with security binding and reputation aggregation
PDF
A unified mapping framework for heterogeneous computing systems and computational grids
PDF
Models and algorithms for distributed computation in wireless sensor systems
PDF
Computer modeling of protein-peptide interface solvation
PDF
Security functional requirements analysis for developing secure software
PDF
Biopsychosocial and forensic clinical correlates of schizophrenia and homicide
PDF
Introspective resilience for exascale high-performance computing systems
PDF
Ubiquitous computing for human activity analysis with applications in personalized healthcare
PDF
Distributed indexing and aggregation techniques for peer-to-peer and grid computing
PDF
Self-assembly for discreet, fault-tolerant, and scalable computation on internet-sized distributed networks
PDF
The effects of required security on software development effort
PDF
Longitudinal analysis of peri-implant keratinized mucosa using computer imaging
PDF
Modeling the relative strength of security protocols
PDF
String matching architectures for network security on reconfigurable computers
PDF
Dynamic graph analytics for cyber systems security applications
PDF
Memorable, secure, and usable authentication secrets
PDF
Leveraging programmability and machine learning for distributed network management to improve security and performance
PDF
Behavioral signal processing: computational approaches for modeling and quantifying interaction dynamics in dyadic human interactions
PDF
Improving network security through collaborative sharing
PDF
Pdf
Keep the adversary guessing: agent security by policy randomization
Towards addressing spatio-temporal aspects in security games
PDF
of 57