Search Constraints
Filtering by:
Unit
Computer Science
Remove constraint Unit: Computer Science
Publisher
Worcester Polytechnic Institute
Remove constraint Publisher: Worcester Polytechnic Institute
« Previous |
1 - 50 of 383
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Accelerating Software Development Through Integrated Domain-Driven Program Synthesis
1 of 50
Using Autoencoder Feature Residuals to Improve Network Intrusion Detection
2 of 50
Abstractions for Third-Party Extensibility of Educational Programming Environments
3 of 50
Epsilon Optimal Path Planning for Active Vision for Grasping
4 of 50
Using Visualization to Counteract Discounting
5 of 50
Homotopy Type Theory for Sewn Quilts
6 of 50
Beyond Typosquatting: An In-depth Look at Package Confusability
7 of 50
Calendar Visualizations of Money Earlier or Later Questions
8 of 50
Help or Hinder? Evaluating Fairness Metrics and Algorithms in Visualization Systems for Consensus Ranking
9 of 50
Leveraging Android OS to Secure Diverse Devices in Residential Networks
10 of 50
Mitigating Temporal Memory Safety Errors in the Linux Kernel
11 of 50
Memory Efficient Shadow Stacks for Real-Time Embedded Systems
12 of 50
Programming Abstractions for GPU-Accelerated Agent-Based Simulations
13 of 50
Neural Networks Models for Multi-Attribute Assessment of Fine Grained Wound Images
14 of 50
Towards Mental Workload Time Series Classification and Interpretation for Real-Time Feedback in Brain-Computer Interfacing Video Games
15 of 50
Frequent Pattern Mining Analytics
16 of 50
Learning From Small Samples: A Machine Learning Model of Belief Polarization
17 of 50
The Impact of Latency on Players in First-person Shooter Games
18 of 50
MiseEnPlace : Fine- and Coarse-grained Approaches for Mobile-Oriented Deep Learning Inference
19 of 50
Toward Improving Effectiveness of Crowdsourced, On-Demand Assistance From Authors in Online Learning Platforms
20 of 50
Probablement, Likely, Wahrscheinlich? A Cross-Language Study of the Verbalization of Probabilities through Data Visualizations
21 of 50
Big Time Series Analytics Using a Distributed Infrastructure
22 of 50
Compositional Embeddings and Their Applications in Speaker Diarization
23 of 50
Effects of Digital Jury Moderation on the Polarization of Social Media Users
24 of 50
Defect Characterization and Classification for Metal Additive Manufacturing Process Optimization Using Machine Learning
25 of 50
Visual Analytics for Smartphone Health Phenotyping
26 of 50
The Learning and Communication Complexity of Subsequence Containment
27 of 50
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
28 of 50
Improving Automated Assessment for Student Open-responses in Mathematics
29 of 50
Modern Computer Science Approaches in Biology: From Predicting Molecular Functions to Modeling Protein Structure
30 of 50
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
31 of 50
Human-In-The-Loop Person Re-Id for Sensitive Datasets
32 of 50
Searching for Contextual Subtasks for Semantic Segmentation
33 of 50
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD Codes using BERT Models
34 of 50
Artistic Reflection Through Co-Creative Support Tool Curation
35 of 50
Residential Network Security: Using Software-defined Networking to Inspect and Label Traffic
36 of 50
Redesigning Deep Neural Networks for Resource-Efficient Inference
37 of 50
Understanding Internal Feature Development in Deep Convolutional Neural Networks for Time Series
38 of 50
Automatic Emotion Detection in Text Messages using Supervised Learning
39 of 50
Towards Instantaneous Mental Health Screening From Voice Using Machine and Deep Learning
40 of 50
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directional Retinex and Exposure Fusion
41 of 50
Making Sense of Human-generated Spatial-temporal Data from Urban Environment
42 of 50
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
43 of 50
Detecting Evasive Multiprocess Ransomware
44 of 50
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with Limited Labeled Data
45 of 50
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning Gain Prediction
46 of 50
Examining Student Effort on Hint through Response Time Decomposition
47 of 50
Improvement on Hint and Explanation Crowdsourcing Method for an Online Learning Platform
48 of 50
Protecting Model Confidentiality for Machine Learning as a Service
49 of 50
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
50 of 50