Search Constraints
« Previous |
1 - 100 of 356
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Scoring
1 of 100
Improving Automated Assessment for Student Open-responses in Mathematics
2 of 100
Modern Computer Science Approaches in Biology: From Predicting Molecular Functions to Modeling Protein Structure
3 of 100
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
4 of 100
Human-In-The-Loop Person Re-Id for Sensitive Datasets
5 of 100
Searching for Contextual Subtasks for Semantic Segmentation
6 of 100
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD Codes using BERT Models
7 of 100
Artistic Reflection Through Co-Creative Support Tool Curation
8 of 100
Residential Network Security: Using Software-defined Networking to Inspect and Label Traffic
9 of 100
Redesigning Deep Neural Networks for Resource-Efficient Inference
10 of 100
Understanding Internal Feature Development in Deep Convolutional Neural Networks for Time Series
11 of 100
Automatic Emotion Detection in Text Messages using Supervised Learning
12 of 100
Towards Instantaneous Mental Health Screening From Voice Using Machine and Deep Learning
13 of 100
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directional Retinex and Exposure Fusion
14 of 100
Making Sense of Human-generated Spatial-temporal Data from Urban Environment
15 of 100
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
16 of 100
Detecting Evasive Multiprocess Ransomware
17 of 100
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with Limited Labeled Data
18 of 100
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning Gain Prediction
19 of 100
Examining Student Effort on Hint through Response Time Decomposition
20 of 100
Improvement on Hint and Explanation Crowdsourcing Method for an Online Learning Platform
21 of 100
Protecting Model Confidentiality for Machine Learning as a Service
22 of 100
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
23 of 100
Disrupting Attacker Value Propositions in Residential Networks
24 of 100
Concurrent Deep Learning Workloads on NVIDIA GPUs
25 of 100
Applying Reinforcement Learning Based Tutor Strategy Recommendation Service To The ASSISTments
26 of 100
Improving Feedback Recommendation in Intelligent Tutoring Systems using NLP
27 of 100
Learning Deep Social Interactions to Identify Positive Classroom Climate
28 of 100
Behavior Detectors to Support Feedback Generation using Problem-Solving Action Data
29 of 100
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
30 of 100
Appjudicator: Enhancing Android Network Analysis through UI Monitoring
31 of 100
Smartphone TBI Sensing using Deep Embedded Clustering and Extreme Boosted Outlier Detection
32 of 100
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
33 of 100
MIC-TOK: A Musical Live Coding Environment for Constrained Input
34 of 100
Traumatic Brain Injury (TBI) detection and bioscore generation for ailment monitoring using smartphone sensor data
35 of 100
The Effects of Latency and Game Device on Moving Target Selection
36 of 100
Application of Function Matching Techniques to Determine Libraries in Embedded Firmware
37 of 100
Decoding Cognitive States from fNIRS Neuroimaging Data Using Machine Learning
38 of 100
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
39 of 100
The Influence of Automated Narrative Feedback on Student-Designed Gamified Research
40 of 100
Developing Automated Audio Assessment Tools for a Chinese Language Course
41 of 100
Attention-based Deep Learning Models for Text Classification and their Interpretability
42 of 100
Ranking for Decision Making: Fairness and Usability
43 of 100
Contextual Outlier Detection from Heterogeneous Data Sources
44 of 100

Development of a Data-Grounded Theory of Program Design in HTDP
45 of 100
Single-Use Servers: A Generalized Design for Eliminating the Confused Deputy Problem in Networked Services
46 of 100
Live Performance and Emotional Analysis of MathSpring Intelligent Tutor System Students
47 of 100
Unsupervised Semantic Segmentation through Cross-Instance Representation Similarity
48 of 100
Towards Better Kernel and Network Monitoring of Software Actions
49 of 100
Improving Model Performance with Robust PCA
50 of 100
The effect of prompted self-revision on student performance in the context of open-ended problems using Randomized Control Trials
51 of 100
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
52 of 100
Detecting Various Types of Malicious Users at One Sitting in Online Social Networks
53 of 100
Time Series Data Analytics
54 of 100
Deep Learning Approach to Trespass Detection using Video Surveillance Data
55 of 100
Pointwise and Instance Segmentation for 3D Point Cloud
56 of 100
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Application to Classroom Observation Videos
57 of 100
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defenses on Embedded Systems
58 of 100
Boosting Gene Expression Clustering with System-Wide Biological Information and Deep Learning
59 of 100
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
60 of 100
Quantifying, Modeling and Managing How People Interact with Visualizations on the Web
61 of 100
Sequential Data Mining and its Applications to Pharmacovigilance
62 of 100
Robot-Enhanced ABA Therapy: Exploring Emerging Artificial Intelligence Embedded Systems in Socially Assistive Robots for the Treatment of Autism
63 of 100
Deep Learning on Graph-structured Data
64 of 100
Secure Key Agreement for Wearable Medical Devices
65 of 100
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
66 of 100
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
67 of 100
How's My Network - Incentives and Impediments of Home Network Measurements
68 of 100
Anomaly Handling in Visual Analytics
69 of 100
Exploiting Flow Relationships to Improve the Performance of Distributed Applications
70 of 100
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip Times
71 of 100
Deep Learning on Attributed Sequences
72 of 100
Event stream analytics
73 of 100
Pattern Mining and Sense-Making Support for Enhancing the User Experience
74 of 100
Recurring Query Processing on Big Data
75 of 100
Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable Medical Systems
76 of 100
Exploring Host-based Software Defined Networking and its Applications
77 of 100
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
78 of 100
Why did they cite that?
79 of 100
Refining Prerequisite Skill Structure Graphs Using Randomized Controlled Trials
80 of 100
Towards Personalized Learning using Counterfactual Inference for Randomized Controlled Trials
81 of 100
Ballistocardiography-based Authentication using Convolutional Neural Networks
82 of 100
vU-net: edge detection in time-lapse fluorescence live cell images based on convolutional neural networks
83 of 100
Automatic Eye-Gaze Following from 2-D Static Images: Application to Classroom Observation Video Analysis
84 of 100
Improving User Interface and User Experience of MathSpring Intelligent Tutoring System for Teachers
85 of 100
Outlier Detection In Big Data
86 of 100
Feasibility Study on Smart Cloud Commuting with Shared Autonomous Vehicles
87 of 100
Scalable User Assignment in Power Grids: A Data Driven Approach
88 of 100
Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks
89 of 100
Improvements on Trained Across Multiple Experiments (TAME), a New Method for Treatment Effect Detection
90 of 100
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
91 of 100
Control-flow Integrity for Real-time Embedded Systems
92 of 100
Theory and Practice: Improving Retention Performance through Student Modeling and System Building
93 of 100
Software-defined Networking: Improving Security for Enterprise and Home Networks
94 of 100
Performance Evaluation of QUIC protocol under Network Congestion
95 of 100
A Prediction Model Uses the Sequence of Attempts and Hints to Better Predict Knowledge: Better to Attempt the Problem First, Rather Than Ask for A Hint
96 of 100
Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
97 of 100
Affective Motivational Collaboration Theory
98 of 100
Pivot-based Data Partitioning for Distributed k Nearest Neighbor Mining
99 of 100
Tutoring Students with Adaptive Strategies
100 of 100
- « Previous
- Next »
- 1
- 2
- 3
- 4