Skip to Content
Browse by Collection
Browse by Project Center
Explore, Discover, Share
Remove constraint Unit: Computer Science
Remove constraint Collections: Masters Theses
Remove constraint Resource type: Thesis
« Previous |
Sort by date uploaded ▼
date uploaded ▼
date uploaded ▲
date modified ▼
date modified ▲
Number of results to display per page
100 per page
View results as:
Accelerating Software Development Through Integrated Domain-Driven Program Synthesis
Abstractions for Third-Party Extensibility of Educational Programming Environments
Epsilon Optimal Path Planning for Active Vision for Grasping
Using Visualization to Counteract Discounting
Homotopy Type Theory for Sewn Quilts
Beyond Typosquatting: An In-depth Look at Package Confusability
Calendar Visualizations of Money Earlier or Later Questions
Help or Hinder? Evaluating Fairness Metrics and Algorithms in Visualization Systems fo...
Leveraging Android OS to Secure Diverse Devices in Residential Networks
Mitigating Temporal Memory Safety Errors in the Linux Kernel
Memory Efficient Shadow Stacks for Real-Time Embedded Systems
Programming Abstractions for GPU-Accelerated Agent-Based Simulations
Towards Mental Workload Time Series Classification and Interpretation for Real-Time Fe...
Learning From Small Samples: A Machine Learning Model of Belief Polarization
Toward Improving Effectiveness of Crowdsourced, On-Demand Assistance From Authors in O...
Probablement, Likely, Wahrscheinlich? A Cross-Language Study of the Verbalization of P...
Effects of Digital Jury Moderation on the Polarization of Social Media Users
Defect Characterization and Classification for Metal Additive Manufacturing Process Op...
The Learning and Communication Complexity of Subsequence Containment
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Sco...
Improving Automated Assessment for Student Open-responses in Mathematics
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
Human-In-The-Loop Person Re-Id for Sensitive Datasets
Searching for Contextual Subtasks for Semantic Segmentation
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD...
Artistic Reflection Through Co-Creative Support Tool Curation
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directi...
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
Detecting Evasive Multiprocess Ransomware
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with ...
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning G...
Examining Student Effort on Hint through Response Time Decomposition
Protecting Model Confidentiality for Machine Learning as a Service
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
Disrupting Attacker Value Propositions in Residential Networks
Concurrent Deep Learning Workloads on NVIDIA GPUs
Applying Reinforcement Learning Based Tutor Strategy Recommendation Service To The ASS...
Improving Feedback Recommendation in Intelligent Tutoring Systems using NLP
Learning Deep Social Interactions to Identify Positive Classroom Climate
Behavior Detectors to Support Feedback Generation using Problem-Solving Action Data
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
Appjudicator: Enhancing Android Network Analysis through UI Monitoring
Smartphone TBI Sensing using Deep Embedded Clustering and Extreme Boosted Outlier Dete...
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
MIC-TOK: A Musical Live Coding Environment for Constrained Input
Traumatic Brain Injury (TBI) detection and bioscore generation for ailment monitoring ...
The Effects of Latency and Game Device on Moving Target Selection
Application of Function Matching Techniques to Determine Libraries in Embedded Firmware
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
The Influence of Automated Narrative Feedback on Student-Designed Gamified Research
Developing Automated Audio Assessment Tools for a Chinese Language Course
Single-Use Servers: A Generalized Design for Eliminating the Confused Deputy Problem i...
Live Performance and Emotional Analysis of MathSpring Intelligent Tutor System Students
Unsupervised Semantic Segmentation through Cross-Instance Representation Similarity
Towards Better Kernel and Network Monitoring of Software Actions
Improving Model Performance with Robust PCA
The effect of prompted self-revision on student performance in the context of open-end...
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
Detecting Various Types of Malicious Users at One Sitting in Online Social Networks
Deep Learning Approach to Trespass Detection using Video Surveillance Data
Pointwise and Instance Segmentation for 3D Point Cloud
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Applica...
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defense...
Boosting Gene Expression Clustering with System-Wide Biological Information and Deep L...
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
Robot-Enhanced ABA Therapy: Exploring Emerging Artificial Intelligence Embedded System...
Secure Key Agreement for Wearable Medical Devices
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
Anomaly Handling in Visual Analytics
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip...
Exploring Host-based Software Defined Networking and its Applications
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
Why did they cite that?
vU-net: edge detection in time-lapse fluorescence live cell images based on convolutio...
Automatic Eye-Gaze Following from 2-D Static Images: Application to Classroom Observat...
Improving User Interface and User Experience of MathSpring Intelligent Tutoring System...
Feasibility Study on Smart Cloud Commuting with Shared Autonomous Vehicles
Scalable User Assignment in Power Grids: A Data Driven Approach
Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks
Improvements on Trained Across Multiple Experiments (TAME), a New Method for Treatment...
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
Control-flow Integrity for Real-time Embedded Systems
Performance Evaluation of QUIC protocol under Network Congestion
A Prediction Model Uses the Sequence of Attempts and Hints to Better Predict Knowledge...
Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
Pivot-based Data Partitioning for Distributed k Nearest Neighbor Mining
Framework For Robot-Assisted Doffing of Personal Protective Equipment
User Evaluation Framework for Model Finding Research
Toward Enabling Safe & Efficient Human-Robot Manipulation in Shared Workspaces
Socialoscope: Sensing User Loneliness and Its Interactions with Personality Traits
Investigating Gyroscope Sway Features, Normalization, and Personalization in Detecting...
BiRRTOpt: A COMBINED SOFTWARE FRAMEWORK FOR MOTION PLANNING APPLIED ON ATLAS ROBOT
Student Modeling From Different Aspects
High Performance Analytics in Complex Event Processing
Many-Light Real-Time Global Illumination using Sparse Voxel Octree
Learning From Demonstrations in Changing Environments: Learning Cost Functions and Con...
Collaborative Learning of Hierarchical Task Networks from Demonstration and Instruction
Systematic Vulnerability Evaluation of Interoperable Medical Device System using Attac...
Validating the Veracity of User Data Collected and Disclosed by Ad Networks
Limit your search
Adamjee, Merzia Naeem
Adams, Daniel Alan
Adjei, Seth Akonor
Agbaji, Unekwuojo Esther
Aiello, Christina Jane
Agu, Emmanuel O.
Alvarez, Sergio A.
Baker, Ryan S.
Beck, Joseph E.
Agu, Emmanuel O.
Alvarez, Sergio A.
Baker, Ryan S.
Beck, Joseph E.
Worcester Polytechnic Institute