Search Constraints
« Previous |
1 - 10 of 12
|
Next »
Search Results
Select an image to start the slideshow
Study on the Leakage of Private User Information Via a Range of Popular Websites
1 of 10
Disjunction of Regular Timing Diagrams
2 of 10
Fexprs as the basis of Lisp function application; or, $vau: the ultimate abstraction
3 of 10
A Credit-based Home Access Point (CHAP) to Improve Application Quality on IEEE 802.11 Networks
4 of 10
CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming
5 of 10
A Unified Representation for Dialogue and Action in Computer Games: Bridging the Gap Between Talkers and Fighters
6 of 10
Trying to Reduce Gaming Behavior by Students in Intelligent Tutoring Systems
7 of 10
Testing SPECT Motion Correction Algorithms
8 of 10
Applying Causal Models to Dynamic Difficulty Adjustment in Video Games
9 of 10
Margrave: An Improved Analyzer for Access-Control and Configuration Policies
10 of 10