Search Constraints
Filtering by:
Major
Computer Science
Remove constraint Major: Computer Science
Resource type
Major Qualifying Project
Remove constraint Resource type: Major Qualifying Project
« Previous |
1 - 100 of 1,172
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Zoo Vowels
1 of 100
Zoo Vowels
2 of 100
Zoo Vowels
3 of 100
Yôkai no Kôgeki
4 of 100
WPISuite OSGi Framework Conversion
5 of 100
WPI Suite Metrics Module
6 of 100
WPI Suite Exemplar Module
7 of 100
WPI Suite Assignment Submission Module
8 of 100
WPI Student Organization Management System
9 of 100
WPI Helpdesk Employee Management System
10 of 100
World Wizards: Developing a VR World Building Application
11 of 100
World Wide Web Application Layout Tool
12 of 100
Workflow Web Application Design
13 of 100
Workflow Repository Integration with the P-GRADE Portal
14 of 100
Wonderland Task Viewer
15 of 100
Wireless Sensor Network for Monitoring Applications
16 of 100
Wireless Bandwidth Aggregation for Internet Traffic
17 of 100
Windows GUI Context Extraction
18 of 100
Windows Based FTP Server with Encryption and other Advanced Features
19 of 100
Whiskey2D, A 2D Game Creator
20 of 100
Webfoot VNC Collaboration
21 of 100
Webfoot Document View
22 of 100
Web-Based Emergent Manuscript Transcriptions
23 of 100
Waterborne Autonomous VEhicle
24 of 100
Waterborne Autonomous Vehicle
25 of 100
Washburn Shops Lab Management System
26 of 100
WanderLog Travel Application
27 of 100

WALRUS Rover MQP
28 of 100
Wall Street Project
29 of 100
Vulnerability Assessment in the Cloud
30 of 100
Visualizing Contextual Information to Prioritize Network Vulnerability Management
31 of 100
Visualizing Contextual Information for Network Vulnerability Management
32 of 100
Visualization of InsightNotes Database Annotation Management System
33 of 100
Virtutopia: A Framework for Virtual Environments
34 of 100
Virtual Machine Server Management Tools
35 of 100
Video Labeling System for Face Analysis on Classroom Videos
36 of 100
Vernal Pool Database
37 of 100
Venice Framework: A Municipal Data Object Management Framework
38 of 100
VELUM: A 3D Puzzle/Exploration Game Designed Using Crowdsourced AI Facial Analysis
39 of 100
Using Technology to Mine and Analyze Data from TRACE
40 of 100
Using Personality Traits and Chronotype for Personalized Feedback in a Sleep Web App
41 of 100
Using Mobile Devices to Customize ASSISTments Skill Builder Problem Sets
42 of 100
uSCRIPT: an AJAX-based Online Manuscript Transcription Service
43 of 100

Unseeable
44 of 100
Understanding Video Lectures in a Flipped Classroom Setting
45 of 100
Trusted Execution Development: Designing a Secure, High-Performance Remote Attestation Protocol
46 of 100
Translating Alloy to SMT-LIB
47 of 100
Trading in the Financial Market Using Data Mining
48 of 100
Trade-Capture Process Analysis: Global Credit Products and Structure Credit Trading
49 of 100
TRACT: Threat Rating and Assessment Collaboration Tool
50 of 100
TrackWiz: Visualizing Graphs of Tracks
51 of 100
Tracking Testing Framework at BAE
52 of 100
Towards the Realization of an Autonomous Blimp
53 of 100
Towards Improving Disambiguation in a Phase Interferometry System
54 of 100
Towards a Transition System Semantics for Alloy
55 of 100
Thin to Win? Network Performance Analysis of the OnLive Thin Client Game System
56 of 100
The Shogun MIDI Control System
57 of 100
The Mindful Reader: Learning-Augmented News Aggregation
58 of 100
The LTV Homomorphic Encryption Scheme and Implementation in Sage
59 of 100
The IMAGS App: An Android Application for Studying the Effects of Music on Chronic Pain
60 of 100
The Global Reports Monitor Enhancements
61 of 100
The Gateway Interface
62 of 100
The Effects of Task Intensity on Visual Attention
63 of 100
The Effect of Gesture on Collaboration with an Autonomous Robot
64 of 100
The EcoKids and the Paper Pests
65 of 100
The Eclipse JUnit Test Recorder
66 of 100
The Eclipse Grading System Plug-In
67 of 100
The Design and Implementation of Looping Constructs for Robots
68 of 100
The Big Picture: Using Desktop Imagery for Detection of Insider Threats
69 of 100
Test Selection and Prioritization for EMC
70 of 100
Teradyne CTS TPS Database
71 of 100
TAR Browser: TAR Archives as File Systems
72 of 100
Tailored Campus Event Finder
73 of 100
System Development for Health Monitoring of Structures
74 of 100
Synthesizing Mobile Games with Combinators
75 of 100
Symbolic Execution for Function Matching
76 of 100
Student Progress in ASSISTments
77 of 100
Stardust on Facebook
78 of 100
SRAM PUF Analysis and Fuzzy Extractors
79 of 100
Source Code Repository Metrics Calculation
80 of 100
Song Recommendation for Automatic Playlist Continuation
81 of 100
SolarFlare Collaborative Development Environment
82 of 100
Software Similarity Detection with Checksims: Improvements to Algorithmic Comparisons and Usability
83 of 100
Software Similarity Detection with Checksims - Canvas Support and Other Improvements to Usability
84 of 100
Software Processes at PayPal
85 of 100
Software Process Configurator, version 2
86 of 100
Software Process Configurator
87 of 100
Software Engineering Virtual Lobby
88 of 100
Software Design of a New Angelo Gordon Corporate Portal
89 of 100
Software Agitation of a Dynamically Typed Language
90 of 100
Social Tag-Based Recommendation Services
91 of 100
Social Shopping
92 of 100
SNAP Application
93 of 100
Smoking Gesture Detection in Natural Settings
94 of 100
Smart-phone-based Platform for Patient Medical Compliance
95 of 100
Smartphone Radio Application
96 of 100
SlipBuddy: A Machine Learning based Mobile Health App to Track and Prevent Overeating
97 of 100
Ski Racing Timer
98 of 100
Simulation of Early C. elegans Embryogenesis
99 of 100
Sight.js: Data Analysis in Splunk
100 of 100