Short pages

Jump to: navigation, search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Learning to watch: using LCS for surveillance ‎[0 bytes]
  2. (hist) ‎Koppeling van commandovoeringsystemen met simulaties ‎[0 bytes]
  3. (hist) ‎Pathfinding & Enemy AI player anticipation ‎[0 bytes]
  4. (hist) ‎No longer available ‎[0 bytes]
  5. (hist) ‎(under consideration) ‎[0 bytes]
  6. (hist) ‎Bernd Brandt ‎[0 bytes]
  7. (hist) ‎Position values and cooperation in decentralised networks ‎[0 bytes]
  8. (hist) ‎Erik-Jan ‎[0 bytes]
  9. (hist) ‎" " ‎[0 bytes]
  10. (hist) ‎SPARQL Query Answering by Solving Constraint Satisfaction Problems ‎[0 bytes]
  11. (hist) ‎Anti-Theft (and anti-forget) system for personal belonging through RFIDs and Smarphones. ‎[0 bytes]
  12. (hist) ‎Security/Cryptographic Architecture For Data-Related Policies Enforcing ‎[0 bytes]
  13. (hist) ‎Event-Path Hiding in WSN ‎[0 bytes]
  14. (hist) ‎Cross Site Browsing - The Application ‎[0 bytes]
  15. (hist) ‎Android Secure Web Browsing ‎[0 bytes]
  16. (hist) ‎LORIS: a reliable, modular storage stack ‎[0 bytes]
  17. (hist) ‎Puzzle Content Generation using modern accelerators ‎[0 bytes]
  18. (hist) ‎OpenCL: Portability vs. Performance? ‎[0 bytes]
  19. (hist) ‎Rene Pool ‎[0 bytes]
  20. (hist) ‎Defining a QoS viewpoint in a SOA environment ‎[0 bytes]
  21. (hist) ‎Xz ‎[0 bytes]
  22. (hist) ‎Reverse engineering: high-level data structures ‎[0 bytes]
  23. (hist) ‎Argos as a client-side honeypot ‎[0 bytes]
  24. (hist) ‎Rene de Jong (DSM) ‎[0 bytes]
  25. (hist) ‎Distributed Model Checking of JVM Bytecode ‎[0 bytes]
  26. (hist) ‎No ‎[0 bytes]
  27. (hist) ‎Yes ‎[0 bytes]
  28. (hist) ‎Meike Wortel ‎[0 bytes]
  29. (hist) ‎Modeling endothelial cell behavior using Petri nets: interactions between VE-cadherin and VEGFR-2 during angiogenesis" ‎[0 bytes]
  30. (hist) ‎Grant Café (Linked Data project with Elsevier) ‎[0 bytes]
  31. (hist) ‎Memory Access Patterns: Applications vs. Architectures ‎[0 bytes]
  32. (hist) ‎AMD Fusion Case-studies ‎[0 bytes]
  33. (hist) ‎Performance analysis of MALI GPUs ‎[0 bytes]
  34. (hist) ‎Linking Rijksmuseum Artists with Videos from Sound and Vision ‎[0 bytes]
  35. (hist) ‎Active 2Gether Project ‎[0 bytes]
  36. (hist) ‎Gender differences in musical interests ‎[0 bytes]
  37. (hist) ‎Tell me your age and I'll tell you what you like (Valentina Maccatrozzo) ‎[0 bytes]
  38. (hist) ‎Crowdsourcing for text annotations ‎[0 bytes]
  39. (hist) ‎Gamification of text annotation ‎[0 bytes]
  40. (hist) ‎Identify the Synonyms ‎[0 bytes]
  41. (hist) ‎Linked Politics: Building a Semantic Network of Politics and what news Media write about it ‎[0 bytes]
  42. (hist) ‎Finding Semantics in Clinical Trials ‎[0 bytes]
  43. (hist) ‎Model Checking without Models ‎[0 bytes]
  44. (hist) ‎Argos-like taint analysis in Qemu tcg ‎[0 bytes]
  45. (hist) ‎Automatic Peer-to-Peer Botnet Crawler Generation ‎[0 bytes]
  46. (hist) ‎Developing a virtual coaching system for decision support and self-management ‎[0 bytes]
  47. (hist) ‎Quantifying risks associated with programming technologies (Working Title) ‎[0 bytes]
  48. (hist) ‎Rapid software and service development ‎[0 bytes]
  49. (hist) ‎The Future of Security: A Survey ‎[0 bytes]
  50. (hist) ‎Game Content Generation using GPUs ‎[0 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)