Search Constraints
Filtering by:
Unit
Computer Science
Remove constraint Unit: Computer Science
Collections
Masters Theses
Remove constraint Collections: Masters Theses
« Previous |
1 - 100 of 286
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Accelerating Software Development Through Integrated Domain-Driven Program Synthesis
1 of 100
Abstractions for Third-Party Extensibility of Educational Programming Environments
2 of 100
Epsilon Optimal Path Planning for Active Vision for Grasping
3 of 100
Using Visualization to Counteract Discounting
4 of 100
Homotopy Type Theory for Sewn Quilts
5 of 100
Beyond Typosquatting: An In-depth Look at Package Confusability
6 of 100
Calendar Visualizations of Money Earlier or Later Questions
7 of 100
Help or Hinder? Evaluating Fairness Metrics and Algorithms in Visualization Systems for Consensus Ranking
8 of 100
Leveraging Android OS to Secure Diverse Devices in Residential Networks
9 of 100
Mitigating Temporal Memory Safety Errors in the Linux Kernel
10 of 100
Memory Efficient Shadow Stacks for Real-Time Embedded Systems
11 of 100
Programming Abstractions for GPU-Accelerated Agent-Based Simulations
12 of 100
Towards Mental Workload Time Series Classification and Interpretation for Real-Time Feedback in Brain-Computer Interfacing Video Games
13 of 100
Learning From Small Samples: A Machine Learning Model of Belief Polarization
14 of 100
Toward Improving Effectiveness of Crowdsourced, On-Demand Assistance From Authors in Online Learning Platforms
15 of 100
Probablement, Likely, Wahrscheinlich? A Cross-Language Study of the Verbalization of Probabilities through Data Visualizations
16 of 100
Effects of Digital Jury Moderation on the Polarization of Social Media Users
17 of 100
Defect Characterization and Classification for Metal Additive Manufacturing Process Optimization Using Machine Learning
18 of 100
The Learning and Communication Complexity of Subsequence Containment
19 of 100
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
20 of 100
Improving Automated Assessment for Student Open-responses in Mathematics
21 of 100
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
22 of 100
Human-In-The-Loop Person Re-Id for Sensitive Datasets
23 of 100
Searching for Contextual Subtasks for Semantic Segmentation
24 of 100
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD Codes using BERT Models
25 of 100
Artistic Reflection Through Co-Creative Support Tool Curation
26 of 100
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directional Retinex and Exposure Fusion
27 of 100
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
28 of 100
Detecting Evasive Multiprocess Ransomware
29 of 100
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with Limited Labeled Data
30 of 100
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning Gain Prediction
31 of 100
Examining Student Effort on Hint through Response Time Decomposition
32 of 100
Protecting Model Confidentiality for Machine Learning as a Service
33 of 100
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
34 of 100
Disrupting Attacker Value Propositions in Residential Networks
35 of 100
Concurrent Deep Learning Workloads on NVIDIA GPUs
36 of 100
Applying Reinforcement Learning Based Tutor Strategy Recommendation Service To The ASSISTments
37 of 100
Improving Feedback Recommendation in Intelligent Tutoring Systems using NLP
38 of 100
Learning Deep Social Interactions to Identify Positive Classroom Climate
39 of 100
Behavior Detectors to Support Feedback Generation using Problem-Solving Action Data
40 of 100
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
41 of 100
Appjudicator: Enhancing Android Network Analysis through UI Monitoring
42 of 100
Smartphone TBI Sensing using Deep Embedded Clustering and Extreme Boosted Outlier Detection
43 of 100
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
44 of 100
MIC-TOK: A Musical Live Coding Environment for Constrained Input
45 of 100
Traumatic Brain Injury (TBI) detection and bioscore generation for ailment monitoring using smartphone sensor data
46 of 100
The Effects of Latency and Game Device on Moving Target Selection
47 of 100
Application of Function Matching Techniques to Determine Libraries in Embedded Firmware
48 of 100
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
49 of 100
The Influence of Automated Narrative Feedback on Student-Designed Gamified Research
50 of 100
Developing Automated Audio Assessment Tools for a Chinese Language Course
51 of 100
Single-Use Servers: A Generalized Design for Eliminating the Confused Deputy Problem in Networked Services
52 of 100
Live Performance and Emotional Analysis of MathSpring Intelligent Tutor System Students
53 of 100
Unsupervised Semantic Segmentation through Cross-Instance Representation Similarity
54 of 100
Towards Better Kernel and Network Monitoring of Software Actions
55 of 100
Improving Model Performance with Robust PCA
56 of 100
The effect of prompted self-revision on student performance in the context of open-ended problems using Randomized Control Trials
57 of 100
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
58 of 100
Detecting Various Types of Malicious Users at One Sitting in Online Social Networks
59 of 100
Deep Learning Approach to Trespass Detection using Video Surveillance Data
60 of 100
Pointwise and Instance Segmentation for 3D Point Cloud
61 of 100
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Application to Classroom Observation Videos
62 of 100
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defenses on Embedded Systems
63 of 100
Boosting Gene Expression Clustering with System-Wide Biological Information and Deep Learning
64 of 100
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
65 of 100
Robot-Enhanced ABA Therapy: Exploring Emerging Artificial Intelligence Embedded Systems in Socially Assistive Robots for the Treatment of Autism
66 of 100
Secure Key Agreement for Wearable Medical Devices
67 of 100
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
68 of 100
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
69 of 100
Anomaly Handling in Visual Analytics
70 of 100
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip Times
71 of 100
Exploring Host-based Software Defined Networking and its Applications
72 of 100
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
73 of 100
Why did they cite that?
74 of 100
vU-net: edge detection in time-lapse fluorescence live cell images based on convolutional neural networks
75 of 100
Automatic Eye-Gaze Following from 2-D Static Images: Application to Classroom Observation Video Analysis
76 of 100
Improving User Interface and User Experience of MathSpring Intelligent Tutoring System for Teachers
77 of 100
Feasibility Study on Smart Cloud Commuting with Shared Autonomous Vehicles
78 of 100
Scalable User Assignment in Power Grids: A Data Driven Approach
79 of 100
Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks
80 of 100
Improvements on Trained Across Multiple Experiments (TAME), a New Method for Treatment Effect Detection
81 of 100
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
82 of 100
Control-flow Integrity for Real-time Embedded Systems
83 of 100
Performance Evaluation of QUIC protocol under Network Congestion
84 of 100
A Prediction Model Uses the Sequence of Attempts and Hints to Better Predict Knowledge: Better to Attempt the Problem First, Rather Than Ask for A Hint
85 of 100
Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
86 of 100
Pivot-based Data Partitioning for Distributed k Nearest Neighbor Mining
87 of 100
Framework For Robot-Assisted Doffing of Personal Protective Equipment
88 of 100
User Evaluation Framework for Model Finding Research
89 of 100
Toward Enabling Safe & Efficient Human-Robot Manipulation in Shared Workspaces
90 of 100
Socialoscope: Sensing User Loneliness and Its Interactions with Personality Traits
91 of 100
Investigating Gyroscope Sway Features, Normalization, and Personalization in Detecting Intoxication in Smartphone Users
92 of 100
BiRRTOpt: A COMBINED SOFTWARE FRAMEWORK FOR MOTION PLANNING APPLIED ON ATLAS ROBOT
93 of 100
Student Modeling From Different Aspects
94 of 100
High Performance Analytics in Complex Event Processing
95 of 100
Many-Light Real-Time Global Illumination using Sparse Voxel Octree
96 of 100
Learning From Demonstrations in Changing Environments: Learning Cost Functions and Constraints for Motion Planning
97 of 100
Collaborative Learning of Hierarchical Task Networks from Demonstration and Instruction
98 of 100
Systematic Vulnerability Evaluation of Interoperable Medical Device System using Attack Trees
99 of 100
Validating the Veracity of User Data Collected and Disclosed by Ad Networks
100 of 100
- « Previous
- Next »
- 1
- 2
- 3