Search Constraints
« Previous |
1 - 10 of 12
|
Next »
Search Results
Select an image to start the slideshow
Logic For Exploit Detection: Utilizing Proof Search for Exploitability Detection in Compact Software Systems
1 of 10
Building Infrastructure Support for Organizational Security: An Approach to Network Monitoring, Threat Detection, and Incident Response
2 of 10
Mobile Paralinguistic Health Assessment from Speech: Energy-Efficient and Privacy-Preserving Neural Network Models
3 of 10
Abstractions for Third-Party Extensibility of Educational Programming Environments
4 of 10
MiseEnPlace : Fine- and Coarse-grained Approaches for Mobile-Oriented Deep Learning Inference
5 of 10
Effects of Digital Jury Moderation on the Polarization of Social Media Users
6 of 10
Visual Analytics for Smartphone Health Phenotyping
7 of 10
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
8 of 10
Improving Automated Assessment for Student Open-responses in Mathematics
9 of 10
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
10 of 10