Search Constraints
« Previous |
1 - 10 of 137
|
Next »
Search Results
Select an image to start the slideshow
Robust planning and scheduling using column generation
1 of 10
An end-user centred framework for data access management and security in the enterprise public cloud
2 of 10
The users’ behaviour in audio streaming services : investigations in the music and podcast domains
3 of 10
An investigation of the current loopholes in bank ABC’s cybersecurity system : supporting a more resilient and trustworthy cybersecurity system
4 of 10
Software Engineering CS993 exam papers
5 of 10
Every step is moving me up - an information behaviour study of hikers on the West Highland Way
6 of 10
Organising obscenity : a three-part exploration into the architecture of adult sites from the western world, their intimate interactions and lusty language when searching for sex
7 of 10
Fundamental components of deep learning : a category-theoretic approach
8 of 10
Quantitative Methods for Computer Science CS259 exam papers
9 of 10
Classifying tor traffic using character analysis
10 of 10