Search Constraints
Filtering by:
Major
Computer Science
Remove constraint Major: Computer Science
Publisher
Worcester Polytechnic Institute
Remove constraint Publisher: Worcester Polytechnic Institute
Resource type
Major Qualifying Project
Remove constraint Resource type: Major Qualifying Project
« Previous |
1 - 100 of 1,331
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Zoo Vowels
1 of 100
Zoo Vowels
2 of 100
Zoo Vowels
3 of 100
Yôkai no Kôgeki
4 of 100
WPISuite OSGi Framework Conversion
5 of 100
WPI Suite Metrics Module
6 of 100
WPI Suite Exemplar Module
7 of 100
WPI Suite Assignment Submission Module
8 of 100
WPI Student Organization Management System
9 of 100
WPI Helpdesk Employee Management System
10 of 100
World Wizards: Developing a VR World Building Application
11 of 100
World Wide Web Application Layout Tool
12 of 100
Workflow Web Application Design
13 of 100
Workflow Repository Integration with the P-GRADE Portal
14 of 100
Wonderland Task Viewer
15 of 100
Wireless Sensor Network for Monitoring Applications
16 of 100
Wireless Bandwidth Aggregation for Internet Traffic
17 of 100
Windows GUI Context Extraction
18 of 100
Windows Based FTP Server with Encryption and other Advanced Features
19 of 100
Whiskey2D, A 2D Game Creator
20 of 100
Webfoot VNC Collaboration
21 of 100
Webfoot Document View
22 of 100
Web-Based Emergent Manuscript Transcriptions
23 of 100
Waterborne Autonomous VEhicle
24 of 100
Waterborne Autonomous Vehicle
25 of 100
Washburn Shops Lab Management System
26 of 100
WanderLog Travel Application
27 of 100
Wall Street Project
28 of 100
Vulnerability Assessment in the Cloud
29 of 100
Visualizing Contextual Information to Prioritize Network Vulnerability Management
30 of 100
Visualizing Contextual Information for Network Vulnerability Management
31 of 100
Visualization of InsightNotes Database Annotation Management System
32 of 100
Virtutopia: A Framework for Virtual Environments
33 of 100
Virtual Machine Server Management Tools
34 of 100
Video Labeling System for Face Analysis on Classroom Videos
35 of 100
Vernal Pool Database
36 of 100
Venice Framework: A Municipal Data Object Management Framework
37 of 100
VELUM: A 3D Puzzle/Exploration Game Designed Using Crowdsourced AI Facial Analysis
38 of 100
Using Technology to Mine and Analyze Data from TRACE
39 of 100
Using Personality Traits and Chronotype for Personalized Feedback in a Sleep Web App
40 of 100
Using Mobile Devices to Customize ASSISTments Skill Builder Problem Sets
41 of 100
uSCRIPT: an AJAX-based Online Manuscript Transcription Service
42 of 100
Understanding Video Lectures in a Flipped Classroom Setting
43 of 100
Trusted Execution Development: Designing a Secure, High-Performance Remote Attestation Protocol
44 of 100
Translating Alloy to SMT-LIB
45 of 100
Trading in the Financial Market Using Data Mining
46 of 100
Trade-Capture Process Analysis: Global Credit Products and Structure Credit Trading
47 of 100
TRACT: Threat Rating and Assessment Collaboration Tool
48 of 100
TrackWiz: Visualizing Graphs of Tracks
49 of 100
Tracking Testing Framework at BAE
50 of 100
Towards the Realization of an Autonomous Blimp
51 of 100
Towards Improving Disambiguation in a Phase Interferometry System
52 of 100
Towards a Transition System Semantics for Alloy
53 of 100
Thin to Win? Network Performance Analysis of the OnLive Thin Client Game System
54 of 100
The Shogun MIDI Control System
55 of 100
The LTV Homomorphic Encryption Scheme and Implementation in Sage
56 of 100
The IMAGS App: An Android Application for Studying the Effects of Music on Chronic Pain
57 of 100
The Global Reports Monitor Enhancements
58 of 100
The Gateway Interface
59 of 100
The Effects of Task Intensity on Visual Attention
60 of 100
The Effect of Gesture on Collaboration with an Autonomous Robot
61 of 100
The EcoKids and the Paper Pests
62 of 100
The Eclipse JUnit Test Recorder
63 of 100
The Eclipse Grading System Plug-In
64 of 100
The Design and Implementation of Looping Constructs for Robots
65 of 100
The Big Picture: Using Desktop Imagery for Detection of Insider Threats
66 of 100
Test Selection and Prioritization for EMC
67 of 100
Teradyne CTS TPS Database
68 of 100
TAR Browser: TAR Archives as File Systems
69 of 100
Tailored Campus Event Finder
70 of 100
System Development for Health Monitoring of Structures
71 of 100
Synthesizing Mobile Games with Combinators
72 of 100
Symbolic Execution for Function Matching
73 of 100
Student Progress in ASSISTments
74 of 100
Stardust on Facebook
75 of 100
SRAM PUF Analysis and Fuzzy Extractors
76 of 100
Source Code Repository Metrics Calculation
77 of 100
Song Recommendation for Automatic Playlist Continuation
78 of 100
SolarFlare Collaborative Development Environment
79 of 100
Software Similarity Detection with Checksims: Improvements to Algorithmic Comparisons and Usability
80 of 100
Software Similarity Detection with Checksims - Canvas Support and Other Improvements to Usability
81 of 100
Software Processes at PayPal
82 of 100
Software Process Configurator, version 2
83 of 100
Software Process Configurator
84 of 100
Software Engineering Virtual Lobby
85 of 100
Software Design of a New Angelo Gordon Corporate Portal
86 of 100
Software Agitation of a Dynamically Typed Language
87 of 100
Social Tag-Based Recommendation Services
88 of 100
Social Shopping
89 of 100
SNAP Application
90 of 100
Smoking Gesture Detection in Natural Settings
91 of 100
Smart-phone-based Platform for Patient Medical Compliance
92 of 100
Smartphone Radio Application
93 of 100
SlipBuddy: A Machine Learning based Mobile Health App to Track and Prevent Overeating
94 of 100
Ski Racing Timer
95 of 100
Simulation of Early C. elegans Embryogenesis
96 of 100
Sight.js: Data Analysis in Splunk
97 of 100
Shiki: A Seasonal Virtual Reality Game
98 of 100
Sequencing Content in Intelligent Tutoring Systems
99 of 100
Sequence Analysis of Search Terms
100 of 100