Search Constraints
Filtering by:
Unit
Computer Science
Remove constraint Unit: Computer Science
Resource type
Thesis
Remove constraint Resource type: Thesis
« Previous |
1 - 100 of 267
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Human-In-The-Loop Person Re-Id for Sensitive Datasets
1 of 100
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
2 of 100
Improving Automated Assessment for Student Open-responses in Mathematics
3 of 100
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
4 of 100
Artistic Reflection Through Co-Creative Support Tool Curation
5 of 100
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD Codes using BERT Models
6 of 100
Searching for Contextual Subtasks for Semantic Segmentation
7 of 100
The Effects of Latency and Game Device on Moving Target Selection
8 of 100
Display of Multi-Attribute Data Using a Presentation Description Language
9 of 100
A Study of Replicated and Distributed Web Content
10 of 100
Quantifying Resource Sharing, Resource Isolation and Agility for Web Applications with Virtual Machines
11 of 100
Using Network Application Behavior to Predict Performance
12 of 100
Network Performance Evaluation within the Web Browser Sandbox
13 of 100
Study on the Leakage of Private User Information Via a Range of Popular Websites
14 of 100
Predicting Network Performance for Internet Activities Using a Web Browser
15 of 100
Validating the Veracity of User Data Collected and Disclosed by Ad Networks
16 of 100
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with Limited Labeled Data
17 of 100
Learning Deep Social Interactions to Identify Positive Classroom Climate
18 of 100
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning Gain Prediction
19 of 100
Concurrent Deep Learning Workloads on NVIDIA GPUs
20 of 100
Protecting Model Confidentiality for Machine Learning as a Service
21 of 100
MIC-TOK: A Musical Live Coding Environment for Constrained Input
22 of 100
Traumatic Brain Injury (TBI) detection and bioscore generation for ailment monitoring using smartphone sensor data
23 of 100
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
24 of 100
Smartphone TBI Sensing using Deep Embedded Clustering and Extreme Boosted Outlier Detection
25 of 100
Appjudicator: Enhancing Android Network Analysis through UI Monitoring
26 of 100
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
27 of 100
Behavior Detectors to Support Feedback Generation using Problem-Solving Action Data
28 of 100
Improving Feedback Recommendation in Intelligent Tutoring Systems using NLP
29 of 100
Applying Reinforcement Learning Based Tutor Strategy Recommendation Service To The ASSISTments
30 of 100
Disrupting Attacker Value Propositions in Residential Networks
31 of 100
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
32 of 100
Examining Student Effort on Hint through Response Time Decomposition
33 of 100
Detecting Evasive Multiprocess Ransomware
34 of 100
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
35 of 100
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directional Retinex and Exposure Fusion
36 of 100
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Application to Classroom Observation Videos
37 of 100
The Influence of Automated Narrative Feedback on Student-Designed Gamified Research
38 of 100
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
39 of 100
Application of Function Matching Techniques to Determine Libraries in Embedded Firmware
40 of 100
Concurrent Programming in Education: Time for a Change
41 of 100
Test First Model-Driven Development
42 of 100
Improving Model Performance with Robust PCA
43 of 100
Constructing an Authoring Tool for Intelligent Tutoring Systems with Hierarchical Domain Models
44 of 100
Tutorial Dialog in an Equation Solving Intelligent Tutoring System
45 of 100
Evaluating Predictions of Transfer and Analyzing Student Motivation
46 of 100
Using Association Rules to Guide a Search for Best Fitting Transfer Models of Student Learning
47 of 100
Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems
48 of 100
Collaborative Warrior Tutoring
49 of 100
Developing an Affordable Authoring Tool For Intelligent Tutoring Systems
50 of 100
Towards Teachers Quickly Creating Tutoring Systems
51 of 100
Visual Feedback for Gaming Prevention in Intelligent Tutoring Systems
52 of 100
The Common Tutor Object Platform
53 of 100
The Assistment Builder: A tool for rapid tutor development
54 of 100
Tools to help build models that predict student learning
55 of 100
Developing a Cognitive Rule-Based Tutor for the ASSISTment System
56 of 100
Measuring Student Engagement in an Intelligent Tutoring System
57 of 100
Trying to Reduce Gaming Behavior by Students in Intelligent Tutoring Systems
58 of 100
Increasing parent engagement in student learning using an Intelligent Tutoring System with Automated Messages
59 of 100
Learning the Effectiveness of Content and Methodology in an Intelligent Tutoring System
60 of 100
Responding to Moments of Learning
61 of 100
Reaching More Students: A Web-based Intelligent Tutoring System with support for Offline Access
62 of 100
A Graph Theoretic Clustering Algorithm based on the Regularity Lemma and Strategies to Exploit Clustering for Prediction
63 of 100
Leveraging Influential Factors into Bayesian Knowledge Tracing
64 of 100
An Empirical Evaluation of Student Learning by the Use of a Computer Adaptive System
65 of 100
Can a computer adaptive assessment system determine, better than traditional methods, whether students know mathematics skills?
66 of 100
Improving Educational Content: A Web-based Intelligent Tutoring System with Support for Teacher Collaboration
67 of 100
Boredom and student modeling in intelligent tutoring systems
68 of 100
Refining Learning Maps with Data Fitting Techniques
69 of 100
Enhancing Personalization Within ASSISTments
70 of 100
Student Modeling From Different Aspects
71 of 100
A Prediction Model Uses the Sequence of Attempts and Hints to Better Predict Knowledge: Better to Attempt the Problem First, Rather Than Ask for A Hint
72 of 100
Improvements on Trained Across Multiple Experiments (TAME), a New Method for Treatment Effect Detection
73 of 100
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
74 of 100
Relating Cognitive Models of Computer Games to User Evaluations of Entertainment
75 of 100
Selective Flooding for Better QoS Routing
76 of 100
WAIT: Selective Loss Recovery for Multimedia Multicast.
77 of 100
Adaptive Content-Aware Scaling for Improved Video Streaming
78 of 100
Adaptive Multimedia Content Delivery for Scalable Web Servers
79 of 100
Better Admission Control and Disk Scheduling for Multimedia Applications
80 of 100
TCP-Carson: A loss-event based Adaptive AIMD algorithm for Long-lived Flows
81 of 100
Traffic Sensitive Active Queue Management for Improved Quality of Service
82 of 100
Traffic Sensitive Quality of Service Controller
83 of 100
Measurement of Windows Streaming Media
84 of 100
Evaluating User Feedback Systems
85 of 100
Media Scaling for Power Optimization on Wireless Video Sensors
86 of 100
CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming
87 of 100
Fresh Analysis of Streaming Media Stored on the Web
88 of 100
Predicting Performance for Reading News Online from within a Web Browser Sandbox
89 of 100
Measurement and Method for Receiver Buffer Sizing in Video Streaming
90 of 100
Impact of Acknowledgments on Application Performance in 4G LTE Networks
91 of 100
Performance Evaluation of QUIC protocol under Network Congestion
92 of 100
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip Times
93 of 100
Development of an Optoelectronic Holographic Platform for Otolaryngology Applications
94 of 100
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
95 of 100
Secure Key Agreement for Wearable Medical Devices
96 of 100
Robot-Enhanced ABA Therapy: Exploring Emerging Artificial Intelligence Embedded Systems in Socially Assistive Robots for the Treatment of Autism
97 of 100
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
98 of 100
Boosting Gene Expression Clustering with System-Wide Biological Information and Deep Learning
99 of 100
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defenses on Embedded Systems
100 of 100
- « Previous
- Next »
- 1
- 2
- 3