Browse
Recent Presentations
Recent Stories
Content Topics
Updated Contents
Featured Contents
PowerPoint Templates
Create
Presentation
Article
Survey
Quiz
Lead-form
E-Book
Presentation Creator
Create stunning presentation online in just 3 steps.
Pro
Get powerful tools for managing your contents.
Login
Upload
Content Directory
Content Directory
d
detecting-arctic -> determining-risk
detecting-phase- -> detecting-tempor
Detecting Temperature Change
Detecting Phase Transitions on the Surface of an Individual Nanotube
Detecting Phenotype-Specific Interactions Between Biological Processes
Detecting Phishing Attacks: Theory, Cues, and Practice
Detecting Phishing in Emails
Detecting Phishing Using Machine Learning
Detecting Phrase-Level Duplication on the World Wide Web
Detecting Plagiarism in Microsoft Excel Assignments
Detecting planets by symmetry breaking
Detecting Polymorphisms in Mouse Genome
Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
Detecting Power Users Programmatically
Detecting Prefix Hijackings in the Internet with Argus
Detecting Preventing Fraud in Accounts Payable
Detecting & Preventing Misuse of Privilege (PMOP)
Detecting & Preventing Misuse of Privilege
Detecting & Preventing Misuse of Privilege
Detecting Primary Receivers for Cognitive Radio Applications
Detecting Primes
Detecting Product Review Spammers using Rating Behaviors
Detecting Promotional Content in Wikipedia
Detecting & Prosecuting Fraud 2 June 2010
Detecting Prosody Improvement in Oral Rereading
Detecting Prosody Improvement in Oral Rereading
Detecting Prostate Cancer Using MRI Data
Detecting Prostate Cancer Using MRI Data
Detecting, Protecting, Preventing, and Reporting Computer Breaches
Detecting, Protecting, Preventing, and Reporting Computer Breaches
Detecting proteins in polyacrylamide gels and on electroblot membrane
Detecting Psychoactive Drugs in the Developmental Stages of Psilocybe cyanescencs
Detecting Psychoactive Drugs in the Developmental Stages of Psilocybe cyanescencs
Detecting Radiation
Detecting Radiation
Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity
Detecting Recurrent Phase Behavior under Real-System Variability
Detecting Regions of Interest in Dynamic Scenes with Camera Motions
Detecting relic gravitational waves using pulsar timing arrays
Detecting Reputation Variations in P2P Networks
Detecting Return-to- libc Buffer Overflow Attacks Using Network Intrusion Detection Systems
Detecting robust time-delayed regulation in Mycobacterium tuberculosis
Detecting Rogue 802.11 Access Points within the Enterprise
Detecting Salient Changes in Gene Profiles
Detecting salt concentration dependence of the WNK1 kinase
Detecting “Schrödinger’s Cat” States of Light : Insights from the Retrodictive Approach
Detecting Script-to-Script Interactions in Call Processing Language
Detecting Search Engine Switching Based on User Preferences, Search Tasks, and Behavior Patterns
Detecting Search Sessions Using Document Metadata and Implicit Feedback
Detecting selection using genome scans
Detecting selection using genome scans
Detecting selection using genome scans
Detecting Selective Dropping Attacks in BGP
Detecting Semantic Cloaking on the Web
Detecting Semantic Cloaking on the Web
Detecting Sequences and Cycles of Web Pages
Detecting Sequences and Cycles of Web Pages
Detecting service violation in Internet and Mobile ad hoc networks
Detecting service violation in Internet and Mobile ad hoc networks
Detecting Shapes in Cluttered Images
Detecting Shared Congestion of Flows Via End-to-end Measurement
Detecting Shared Congestion of Flows Via End-to-end Measurement (and other inference problems)
Detecting shielded nuclear contraband using muon tomography
Detecting Signal from Data with Noise
Detecting Signal from Data with Noise
Detecting Significant Spatial Patterns of Survival from Breast and Prostate Cancer in Michigan
Detecting Similar Software Applications
Detecting Skype flows Hidden in Web Traffic
Detecting Social Spam Campaigns on Twitter
Detecting Software Modularity Violations
Detecting Software Theft via System Call Based Birthmarks
Detecting Software Theft via System Call Based Birthmarks
Detecting Spam and Spam Responses
Detecting Spam Blogs: An Adaptive Online Approach Pranam Kolari
Detecting spam in a Twitter network ( 과제 세미나 ) 2012.5.11
Detecting Spam Web Pages
Detecting Spam Web Pages
Detecting Spammers on Social Networks
Detecting Spammers on Social Networks
DETECTING SPAMMERS ON SOCIAL NETWORKS
Detecting Spammers on Social Networks
Detecting Spammers on Social Networks
Detecting Spammers on Twitter
Detecting Spammers with SNARE: Spatio -temporal Network-level Automatic Reputation Engine
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
Detecting Spatial Clustering in Matched Case-Control Studies
Detecting Speech
Detecting spelling errors in taxonomic databases
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
Detecting State Coding Conflicts in STGs Using SAT
Detecting Statistical Interactions with Additive Groves of Trees
Detecting stellar differential rotation
Detecting Stepping-Stone Intruders with Long Connection Chains
Detecting Stepping-Stone Intruders with Long Connection Chains
Detecting Subtle Changes in Structure
Detecting Subtle Changes in Structure
Detecting Subtle Changes in Structure
Detecting Subtle Sequence Signals: a Gibbs Sampling Strategy for Multiple Alignment
Detecting Supernovae with IceCube
Detecting suspicious behaviors.
Detecting Suspicious Claims : An Operational Perspective
Detecting Symbolism in Literature
Detecting SYN-Flooding Attacks
Detecting SYN Flooding Attacks
Detecting synchronization between the signals from multivariate and univariate biological data
Detecting synchronization between the signals from multivariate and univariate biological data
Detecting system
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS
Detecting Targeted Attacks Using Shadow Honeypots
Detecting temperature change
Browse slideshows:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9