Search Constraints
« Previous |
41 - 60 of 74
|
Next »
Search Results
Select an image to start the slideshow
Post Lecture Review
1 of 20
Collision Identification Program (CIP)
2 of 20
Developing Models to Visualize & Analyze User Interaction for Financial Technology Websites
3 of 20
Particle Motion During Magnetron Sputter Deposition
4 of 20
Face Recognition Door Lock
5 of 20
Correlating Intended Muscle Movements with Ultrasound Imaging
6 of 20
Graph-Based Sports Rankings
7 of 20
Influence of End User Activity on Firewalling Decisions
8 of 20
Predictive Analysis
9 of 20
Database Access Point Security (DAPS)
10 of 20
ReVisIt: Enabling Passive Evaluation of Interactive Visualizations
11 of 20
Lionfish Bot 2.0
12 of 20
Applying Machine Learning for Real Time Optimization of Powder Bed Manufacturing
13 of 20
Generating Solitaire Games
14 of 20
Graceful Degradation in IoT Security
15 of 20
HerdHealth: A Mobile Health Data Aggregator for the WPI Community
16 of 20
Privacy-Preserving Annotation of Face Images through Attribute-Preserving Face Synthesis
17 of 20
A Constraint Language for Feature-Oriented Security Policies using SMT
18 of 20
Song Recommendation for Automatic Playlist Continuation
19 of 20
Various Projects in the ASSISTments Foundation
20 of 20