Skip to Content
Toggle navigation
Home
Browse
Browse by Collection
Browse by Project Center
Browse Exhibits
About
Help
Explore, Discover, Share
Search
Advanced search
Search Constraints
Start Over
Filtering by:
Unit (Department)
Computer Science
Remove constraint Unit (Department): Computer Science
« Previous
|
101
-
150
of
387
|
Next »
Sort by date uploaded ▼
relevance
date uploaded ▼
date uploaded ▲
date modified ▼
date modified ▲
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
View results as:
List
Gallery
Masonry
Slideshow
Search Results
Exploiting Flow Relationships to Improve the Performance of Distributed Applications
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip...
Deep Learning on Attributed Sequences
Event stream analytics
Pattern Mining and Sense-Making Support for Enhancing the User Experience
Recurring Query Processing on Big Data
Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable M...
Exploring Host-based Software Defined Networking and its Applications
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
Why did they cite that?
Refining Prerequisite Skill Structure Graphs Using Randomized Controlled Trials
Towards Personalized Learning using Counterfactual Inference for Randomized Controlled...
Ballistocardiography-based Authentication using Convolutional Neural Networks
vU-net: edge detection in time-lapse fluorescence live cell images based on convolutio...
Automatic Eye-Gaze Following from 2-D Static Images: Application to Classroom Observat...
Improving User Interface and User Experience of MathSpring Intelligent Tutoring System...
Outlier Detection In Big Data
Feasibility Study on Smart Cloud Commuting with Shared Autonomous Vehicles
Scalable User Assignment in Power Grids: A Data Driven Approach
Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks
Improvements on Trained Across Multiple Experiments (TAME), a New Method for Treatment...
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
Control-flow Integrity for Real-time Embedded Systems
Theory and Practice: Improving Retention Performance through Student Modeling and Syst...
Software-defined Networking: Improving Security for Enterprise and Home Networks
Performance Evaluation of QUIC protocol under Network Congestion
A Prediction Model Uses the Sequence of Attempts and Hints to Better Predict Knowledge...
Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
Affective Motivational Collaboration Theory
Pivot-based Data Partitioning for Distributed k Nearest Neighbor Mining
Tutoring Students with Adaptive Strategies
Targeted Prioritized Processing in Overloaded Data Stream Systems
Framework For Robot-Assisted Doffing of Personal Protective Equipment
User Evaluation Framework for Model Finding Research
Toward Enabling Safe & Efficient Human-Robot Manipulation in Shared Workspaces
Socialoscope: Sensing User Loneliness and Its Interactions with Personality Traits
Modes and Mechanisms of Game-like Interventions in Intelligent Tutoring Systems
Contributions to Collective Dynamical Clustering-Modeling of Discrete Time Series
Investigating Gyroscope Sway Features, Normalization, and Personalization in Detecting...
Spatial and Temporal Learning in Robotic Pick-and-Place Domains via Demonstrations and...
BiRRTOpt: A COMBINED SOFTWARE FRAMEWORK FOR MOTION PLANNING APPLIED ON ATLAS ROBOT
Student Modeling From Different Aspects
A Model-driven Visual Analytic Framework for Local Pattern Analysis
High Performance Analytics in Complex Event Processing
Many-Light Real-Time Global Illumination using Sparse Voxel Octree
Learning From Demonstrations in Changing Environments: Learning Cost Functions and Con...
Collaborative Learning of Hierarchical Task Networks from Demonstration and Instruction
Similarity Reasoning over Semantic Context-Graphs
Student Modeling within a Computer Tutor for Mathematics: Using Bayesian Networks and ...
Systematic Vulnerability Evaluation of Interoperable Medical Device System using Attac...
« Previous
Next »
1
2
3
4
5
6
7
8
Toggle facets
Limit your search
Collections
Masters Theses
290
PhD Dissertations
94
Masters Reports
2
PhD Reports
1
Year
Year range begin
–
Year range end
Current results range from
1999
to
2023
View distribution
Creator
Adamjee, Merzia Naeem
1
Adams, Daniel Alan
1
Adjei, Seth Akonor
2
Agbaji, Unekwuojo Esther
1
Ahsan, Ramoza
1
more
Creators
»
Advisor
Agu, Emmanuel O.
21
Alvarez, Sergio A.
2
Arroyo, Ivon
4
Baker, Ryan S.
1
Beck, Joseph E.
8
more
Advisors
»
Contributor
Agu, Emmanuel O.
32
Alvarez, Sergio A.
2
Ari, Ismail
1
Arrington, Catherine
1
Arroyo, Ivon
7
more
Contributors
»
Unit (Department)
Computer Science
[remove]
387
Publisher
Worcester Polytechnic Institute
387
Resource type
Thesis
290
Dissertation
94
Report
2
Phd Report
1
License
https://creativecommons.org/licenses/by/4.0/
9
https://creativecommons.org/licenses/by-nc/4.0/
4