Search Constraints
Filtering by:
Major
Computer Science
Remove constraint Major: Computer Science
Collections
Major Qualifying Projects
Remove constraint Collections: Major Qualifying Projects
Publisher
Worcester Polytechnic Institute
Remove constraint Publisher: Worcester Polytechnic Institute
« Previous |
1 - 100 of 1,242
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Zoo Vowels
1 of 100
Zoo Vowels
2 of 100
Zoo Vowels
3 of 100
Yôkai no Kôgeki
4 of 100
WPISuite OSGi Framework Conversion
5 of 100
WPI Suite Metrics Module
6 of 100
WPI Suite Exemplar Module
7 of 100
WPI Suite Assignment Submission Module
8 of 100
WPI Student Organization Management System
9 of 100
WPI Helpdesk Employee Management System
10 of 100
World Wizards: Developing a VR World Building Application
11 of 100
World Wide Web Application Layout Tool
12 of 100
Workflow Web Application Design
13 of 100
Workflow Repository Integration with the P-GRADE Portal
14 of 100
Wonderland Task Viewer
15 of 100
Wireless Sensor Network for Monitoring Applications
16 of 100
Wireless Bandwidth Aggregation for Internet Traffic
17 of 100
Windows GUI Context Extraction
18 of 100
Windows Based FTP Server with Encryption and other Advanced Features
19 of 100
Whiskey2D, A 2D Game Creator
20 of 100
Webfoot VNC Collaboration
21 of 100
Webfoot Document View
22 of 100
Web-Based Emergent Manuscript Transcriptions
23 of 100
Waterborne Autonomous VEhicle
24 of 100
Waterborne Autonomous Vehicle
25 of 100
Washburn Shops Lab Management System
26 of 100
WanderLog Travel Application
27 of 100
Wall Street Project
28 of 100
Vulnerability Assessment in the Cloud
29 of 100
Visualizing Contextual Information to Prioritize Network Vulnerability Management
30 of 100
Visualizing Contextual Information for Network Vulnerability Management
31 of 100
Visualization of InsightNotes Database Annotation Management System
32 of 100
Virtutopia: A Framework for Virtual Environments
33 of 100
Virtual Machine Server Management Tools
34 of 100
Video Labeling System for Face Analysis on Classroom Videos
35 of 100
Vernal Pool Database
36 of 100
Venice Framework: A Municipal Data Object Management Framework
37 of 100
VELUM: A 3D Puzzle/Exploration Game Designed Using Crowdsourced AI Facial Analysis
38 of 100
Using Technology to Mine and Analyze Data from TRACE
39 of 100
Using Personality Traits and Chronotype for Personalized Feedback in a Sleep Web App
40 of 100
Using Mobile Devices to Customize ASSISTments Skill Builder Problem Sets
41 of 100
uSCRIPT: an AJAX-based Online Manuscript Transcription Service
42 of 100

Unseeable
43 of 100
Understanding Video Lectures in a Flipped Classroom Setting
44 of 100
Trusted Execution Development: Designing a Secure, High-Performance Remote Attestation Protocol
45 of 100
Translating Alloy to SMT-LIB
46 of 100
Trading in the Financial Market Using Data Mining
47 of 100
Trade-Capture Process Analysis: Global Credit Products and Structure Credit Trading
48 of 100
TRACT: Threat Rating and Assessment Collaboration Tool
49 of 100
TrackWiz: Visualizing Graphs of Tracks
50 of 100
Tracking Testing Framework at BAE
51 of 100
Towards the Realization of an Autonomous Blimp
52 of 100
Towards Improving Disambiguation in a Phase Interferometry System
53 of 100
Towards a Transition System Semantics for Alloy
54 of 100
Thin to Win? Network Performance Analysis of the OnLive Thin Client Game System
55 of 100
The Shogun MIDI Control System
56 of 100
The LTV Homomorphic Encryption Scheme and Implementation in Sage
57 of 100
The IMAGS App: An Android Application for Studying the Effects of Music on Chronic Pain
58 of 100
The Global Reports Monitor Enhancements
59 of 100
The Gateway Interface
60 of 100
The Effects of Task Intensity on Visual Attention
61 of 100
The Effect of Gesture on Collaboration with an Autonomous Robot
62 of 100
The EcoKids and the Paper Pests
63 of 100
The Eclipse JUnit Test Recorder
64 of 100
The Eclipse Grading System Plug-In
65 of 100
The Design and Implementation of Looping Constructs for Robots
66 of 100
The Big Picture: Using Desktop Imagery for Detection of Insider Threats
67 of 100
Test Selection and Prioritization for EMC
68 of 100
Teradyne CTS TPS Database
69 of 100
TAR Browser: TAR Archives as File Systems
70 of 100
Tailored Campus Event Finder
71 of 100
System Development for Health Monitoring of Structures
72 of 100
Synthesizing Mobile Games with Combinators
73 of 100
Symbolic Execution for Function Matching
74 of 100
Student Progress in ASSISTments
75 of 100
Stardust on Facebook
76 of 100
SRAM PUF Analysis and Fuzzy Extractors
77 of 100
Source Code Repository Metrics Calculation
78 of 100
Song Recommendation for Automatic Playlist Continuation
79 of 100
SolarFlare Collaborative Development Environment
80 of 100
Software Similarity Detection with Checksims: Improvements to Algorithmic Comparisons and Usability
81 of 100
Software Similarity Detection with Checksims - Canvas Support and Other Improvements to Usability
82 of 100
Software Processes at PayPal
83 of 100
Software Process Configurator, version 2
84 of 100
Software Process Configurator
85 of 100
Software Engineering Virtual Lobby
86 of 100
Software Design of a New Angelo Gordon Corporate Portal
87 of 100
Software Agitation of a Dynamically Typed Language
88 of 100
Social Tag-Based Recommendation Services
89 of 100
Social Shopping
90 of 100
SNAP Application
91 of 100
Smoking Gesture Detection in Natural Settings
92 of 100
Smart-phone-based Platform for Patient Medical Compliance
93 of 100
Smartphone Radio Application
94 of 100
SlipBuddy: A Machine Learning based Mobile Health App to Track and Prevent Overeating
95 of 100
Ski Racing Timer
96 of 100
Simulation of Early C. elegans Embryogenesis
97 of 100
Sight.js: Data Analysis in Splunk
98 of 100
Shiki: A Seasonal Virtual Reality Game
99 of 100
Session Capture and Replay Test Infrastructure
100 of 100