Search Constraints
Filtering by:
Unit
Computer Science
Remove constraint Unit: Computer Science
Publisher
Worcester Polytechnic Institute
Remove constraint Publisher: Worcester Polytechnic Institute
Resource type
Thesis
Remove constraint Resource type: Thesis
« Previous |
1 - 50 of 267
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Human-In-The-Loop Person Re-Id for Sensitive Datasets
1 of 50
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
2 of 50
Improving Automated Assessment for Student Open-responses in Mathematics
3 of 50
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
4 of 50
Artistic Reflection Through Co-Creative Support Tool Curation
5 of 50
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD Codes using BERT Models
6 of 50
Searching for Contextual Subtasks for Semantic Segmentation
7 of 50
The Effects of Latency and Game Device on Moving Target Selection
8 of 50
Display of Multi-Attribute Data Using a Presentation Description Language
9 of 50
A Study of Replicated and Distributed Web Content
10 of 50
Quantifying Resource Sharing, Resource Isolation and Agility for Web Applications with Virtual Machines
11 of 50
Using Network Application Behavior to Predict Performance
12 of 50
Network Performance Evaluation within the Web Browser Sandbox
13 of 50
Study on the Leakage of Private User Information Via a Range of Popular Websites
14 of 50
Predicting Network Performance for Internet Activities Using a Web Browser
15 of 50
Validating the Veracity of User Data Collected and Disclosed by Ad Networks
16 of 50
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with Limited Labeled Data
17 of 50
Learning Deep Social Interactions to Identify Positive Classroom Climate
18 of 50
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning Gain Prediction
19 of 50
Concurrent Deep Learning Workloads on NVIDIA GPUs
20 of 50
Protecting Model Confidentiality for Machine Learning as a Service
21 of 50
MIC-TOK: A Musical Live Coding Environment for Constrained Input
22 of 50
Traumatic Brain Injury (TBI) detection and bioscore generation for ailment monitoring using smartphone sensor data
23 of 50
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
24 of 50
Smartphone TBI Sensing using Deep Embedded Clustering and Extreme Boosted Outlier Detection
25 of 50
Appjudicator: Enhancing Android Network Analysis through UI Monitoring
26 of 50
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
27 of 50
Behavior Detectors to Support Feedback Generation using Problem-Solving Action Data
28 of 50
Improving Feedback Recommendation in Intelligent Tutoring Systems using NLP
29 of 50
Applying Reinforcement Learning Based Tutor Strategy Recommendation Service To The ASSISTments
30 of 50
Disrupting Attacker Value Propositions in Residential Networks
31 of 50
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
32 of 50
Examining Student Effort on Hint through Response Time Decomposition
33 of 50
Detecting Evasive Multiprocess Ransomware
34 of 50
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
35 of 50
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directional Retinex and Exposure Fusion
36 of 50
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Application to Classroom Observation Videos
37 of 50
The Influence of Automated Narrative Feedback on Student-Designed Gamified Research
38 of 50
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
39 of 50
Application of Function Matching Techniques to Determine Libraries in Embedded Firmware
40 of 50
Concurrent Programming in Education: Time for a Change
41 of 50
Test First Model-Driven Development
42 of 50
Improving Model Performance with Robust PCA
43 of 50
Constructing an Authoring Tool for Intelligent Tutoring Systems with Hierarchical Domain Models
44 of 50
Tutorial Dialog in an Equation Solving Intelligent Tutoring System
45 of 50
Evaluating Predictions of Transfer and Analyzing Student Motivation
46 of 50
Using Association Rules to Guide a Search for Best Fitting Transfer Models of Student Learning
47 of 50
Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems
48 of 50
Collaborative Warrior Tutoring
49 of 50
Developing an Affordable Authoring Tool For Intelligent Tutoring Systems
50 of 50