118 results on '"Aspen Olmsted"'
Search Results
2. Examining Autonomous Vehicle Operating Systems Vulnerabilities using a Cyber-Physical Approach.
3. Assessment of fuzzy min-max neural networks for classification tasks.
4. Distributed query processing and data sharing.
5. Entity identity, performance, and storage.
6. Classification of music by composer using fuzzy min-max neural networks.
7. Modeling cloud applications for partition contingency.
8. Effects of lexicon size on solving bananagrams.
9. Considerations for OSV over Linux-based virtual machines.
10. Designing an assembly language using MIT App inventor.
11. Client side calculation of 'bacon number'.
12. Docker vs. KVM: Apache spark application performance and ease of use.
13. Classifying influenza outbreaks by analyzing and filtering Twitter data.
14. Automation of cyber-reconnaissance: A Java-based open source tool for information gathering.
15. Evaluate action primitives for human activity recognition using unsupervised learning approach.
16. Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files.
17. Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model.
18. Efficient retrieval of information from hierarchical REST requests.
19. Ethereum transaction graph analysis.
20. Long running, consistent, web service transactions.
21. Ecurrency threat modeling and hardening.
22. Founding a cybersecurity club in a higher education environment: A case study.
23. Temporal resource scheduling equity.
24. Highly available, consistent, business rule filters.
25. HeartSync: Mobile pacemaker failure detector.
26. Web Service constraint optimization.
27. High volume web service resource consumption.
28. The cost of increased transactional correctness and durability in distributed databases.
29. Detection of fake online hotel reviews.
30. shinySDM: Point and click species distribution modeling.
31. Performance vs. security: Implementing an immutable database in MySQL.
32. Low-cost detection of backdoor malware.
33. Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework.
34. Handling an organization's communication needs with a single web service.
35. Mobile multi-factor authentication.
36. Bot or not.
37. Venmo: Exposing a user's lifestyle.
38. Weighing the shopping benefits of a smarter refrigerator.
39. Database multi-factor authentication via pluggable authentication modules.
40. Meaningful sandbox data.
41. Three factor authentication.
42. Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model.
43. gLIMS: Google cloud-based laboratory information management system for NMR metabolomics.
44. Priority Based Soft-Solution for Operating System Integrity Due To Randomized Hardware Faults At The Transistor Level
45. End-to-End Call Authorization in Public Telephony
46. Examining Autonomous Vehicle Operating Systems Vulnerabilities using a Cyber-Physical Approach
47. Keynote speaker 3: Secure software engineering in the cloud.
48. Keynote speaker 3.
49. Keynote speaker 2: Secure software engineering in the cloud.
50. Coarse Grained Web Service Availability, Consistency, and Durability.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.