Gangs beyond borders: California and the fight against transnational crime - have recommendations become reality?
PDF
Assessing software maintainability in systems by leveraging fuzzy methods and linguistic analysis
PDF
Addressing uncertainty in Stackelberg games for security: models and algorithms
PDF
Data privacy in deep learning using trusted hardware
PDF
Collaborative detection and filtering of DDoS attacks in ISP core networks
PDF
Human adversaries in security games: integrating models of bounded rationality and fast algorithms
PDF
Analysis and countermeasures of worm propagations and interactions in wired and wireless networks
PDF
The human element: addressing human adversaries in security domains
PDF
Strategic support for philanthropic fundraising: a needs analysis of development officers in higher education
PDF
Data-driven optimization for indoor localization
PDF
Girls in cybersecurity: an evaluation study
PDF
A protocol framework for attacker traceback in wireless multi-hop networks
PDF
On scheduling, timeliness and security in large scale distributed computing
PDF
Employment rates upon MBA graduation: An evaluation study
PDF
Cross-strait diplomatic poaching: the role and motivation of PRC-led diplomatic poaching in contemporary cross-strait relations
PDF
Fairness in natural language generation
PDF
Evaluation of daylighting circadian effects: Integrating non-visual effects of lighting in the evaluation of daylighting designs
PDF
Enabling energy efficient and secure execution of concurrent kernels on graphics processing units
PDF
Thwarting adversaries with unpredictability: massive-scale game-theoretic algorithms for real-world security deployments
PDF
Trusted grid and P2P computing with security binding and reputation aggregation
PDF
Neural creative language generation
PDF
Model-driven situational awareness in large-scale, complex systems
PDF
Software quality understanding by analysis of abundant data (SQUAAD): towards better understanding of life cycle software qualities
PDF
Novel and efficient schemes for security and privacy issues in smart grids
PDF
An intelligent tutoring system’s approach for negotiation training
PDF
of 109 
 For more images, please select "images" in the filters.
51 - 100 of 5419
of 109 
Standard Filters