Search Constraints
Filtering by:
Unit
Computer Science
Remove constraint Unit: Computer Science
Collections
Masters Theses
Remove constraint Collections: Masters Theses
« Previous |
1 - 50 of 286
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Development and Application of Semi-automated ITK Tools Development and Application of Semi-automated ITK Tools for the Segmentation of Brain MR Images
1 of 50
MIC-TOK: A Musical Live Coding Environment for Constrained Input
2 of 50
Effects of Digital Jury Moderation on the Polarization of Social Media Users
3 of 50
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Application to Classroom Observation Videos
4 of 50
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
5 of 50
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
6 of 50
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defenses on Embedded Systems
7 of 50
Memory Efficient Shadow Stacks for Real-Time Embedded Systems
8 of 50
Mitigating Temporal Memory Safety Errors in the Linux Kernel
9 of 50
Epsilon Optimal Path Planning for Active Vision for Grasping
10 of 50
The Learning and Communication Complexity of Subsequence Containment
11 of 50
A Graph Theoretic Clustering Algorithm based on the Regularity Lemma and Strategies to Exploit Clustering for Prediction
12 of 50
The Effects of Latency and Game Device on Moving Target Selection
13 of 50
Concurrent Deep Learning Workloads on NVIDIA GPUs
14 of 50
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
15 of 50
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip Times
16 of 50
Improving Automated Assessment for Student Open-responses in Mathematics
17 of 50
Calendar Visualizations of Money Earlier or Later Questions
18 of 50
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
19 of 50
Human-In-The-Loop Person Re-Id for Sensitive Datasets
20 of 50
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
21 of 50
Multi-Decision Policy and Policy Combinator Specifications
22 of 50
Towards Better Kernel and Network Monitoring of Software Actions
23 of 50
Evaluating User Feedback Systems
24 of 50
Responding to Moments of Learning
25 of 50
Accelerating Software Development Through Integrated Domain-Driven Program Synthesis
26 of 50
Examining Student Effort on Hint through Response Time Decomposition
27 of 50
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
28 of 50
Searching for Contextual Subtasks for Semantic Segmentation
29 of 50
Abstractions for Third-Party Extensibility of Educational Programming Environments
30 of 50
Using Visualization to Counteract Discounting
31 of 50
Beyond Typosquatting: An In-depth Look at Package Confusability
32 of 50
Homotopy Type Theory for Sewn Quilts
33 of 50
Help or Hinder? Evaluating Fairness Metrics and Algorithms in Visualization Systems for Consensus Ranking
34 of 50
Leveraging Android OS to Secure Diverse Devices in Residential Networks
35 of 50
Programming Abstractions for GPU-Accelerated Agent-Based Simulations
36 of 50
Learning From Small Samples: A Machine Learning Model of Belief Polarization
37 of 50
Towards Mental Workload Time Series Classification and Interpretation for Real-Time Feedback in Brain-Computer Interfacing Video Games
38 of 50
Defect Characterization and Classification for Metal Additive Manufacturing Process Optimization Using Machine Learning
39 of 50
Probablement, Likely, Wahrscheinlich? A Cross-Language Study of the Verbalization of Probabilities through Data Visualizations
40 of 50
Toward Improving Effectiveness of Crowdsourced, On-Demand Assistance From Authors in Online Learning Platforms
41 of 50
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
42 of 50
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
43 of 50
Artistic Reflection Through Co-Creative Support Tool Curation
44 of 50
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD Codes using BERT Models
45 of 50
Display of Multi-Attribute Data Using a Presentation Description Language
46 of 50
A Study of Replicated and Distributed Web Content
47 of 50
Quantifying Resource Sharing, Resource Isolation and Agility for Web Applications with Virtual Machines
48 of 50
Using Network Application Behavior to Predict Performance
49 of 50
Network Performance Evaluation within the Web Browser Sandbox
50 of 50