Search Constraints
« Previous |
141 - 160 of 176
|
Next »
Search Results
Select an image to start the slideshow
Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis --- Dataset
1 of 20
X-ray tomography dataset for 'Caught in the act: The mechanism of eutectic modification by trace impurities'
2 of 20
Supporting data and scripts for the paper "Variability in the location of High Frequency Oscillations during prolonged intracranial EEG recordings"
3 of 20
The University of Michigan North Campus Long-Term Vision and LIDAR Dataset
4 of 20
Magneto-inductive sensor characterization data
5 of 20
TCCIII Near-Wall Flow
6 of 20
Data for "Using sensor data to dynamically map large-scale models to site-scale forecasts: A case study using the National Water Model"
7 of 20
Computer Data from Ross Thesis
8 of 20
Data Files for Real-Time Energy Disaggregation of a Distribution Feeder's Demand
9 of 20
TCCIII Fired Full View
10 of 20
TCCIII Fired Spark Plug Region
11 of 20
TCCIII Motored Full View
12 of 20
FCAV Simulation Dataset
13 of 20
Big Ship Data: Pre- and Post-Processed Spatiotemporal Data for 2006-2014 for Great Lakes Air Temperature, Dew Point, Surface Water Temperature, and Wind Speed
14 of 20
Equilibrium configurations of hard polygons near the melting transition
15 of 20
Semantic-Based Document Retrieval Using Spatial Distributions of Concepts
16 of 20
Three-Dimensional Body Shape Manikins of Young Children for Child Restraint Design
17 of 20
A Video-Based Intervention to Improve Belt Fit
18 of 20
Simulation Parameters used in the Study titled "Efficient Estimation of Binding Free Energies between Peptides and an MHC Class II Molecule Using Coarse-Grained Molecular Dynamics Simulations with a Weighted Histogram Analysis Method"
19 of 20
Effects of Age-Associated Regional Changes in Aortic Stiffness on Human Hemodynamics Revealed by Computational Modeling
20 of 20