Search Constraints
« Previous |
151 - 160 of 183
|
Next »
Search Results
Select an image to start the slideshow
Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis --- Dataset
1 of 10
X-ray tomography dataset for 'Caught in the act: The mechanism of eutectic modification by trace impurities'
2 of 10
Supporting data and scripts for the paper "Variability in the location of High Frequency Oscillations during prolonged intracranial EEG recordings"
3 of 10
The University of Michigan North Campus Long-Term Vision and LIDAR Dataset
4 of 10
Magneto-inductive sensor characterization data
5 of 10
TCCIII Near-Wall Flow
6 of 10
Data for "Using sensor data to dynamically map large-scale models to site-scale forecasts: A case study using the National Water Model"
7 of 10
Computer Data from Ross Thesis
8 of 10
Data Files for Real-Time Energy Disaggregation of a Distribution Feeder's Demand
9 of 10
TCCIII Fired Full View
10 of 10