Search Constraints
« Previous |
1 - 20 of 62
|
Next »
Search Results
Select an image to start the slideshow
Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)
1 of 20
High-order numerical methods for integral fractional Laplacian: algorithm and analysis
2 of 20
Defining the Multiscale Relationship between Subject-Specific Bone Strain and Structural Adaptation in the Distal Radius of Women
3 of 20
Modeling Heterogeneous Users Behaviors in Online Systems
4 of 20
Why are some venture founders better at pivoting than others? The influence of motivation and identity on strategic change.
5 of 20
Decoding Cognitive States from fNIRS Neuroimaging Data Using Machine Learning
6 of 20
Opportunities and Challenges of LowCarbon Hydrogen via Metallic Membrane Reactors
7 of 20
Non-Submodular Combinatorial Optimization in Control Systems: Efficient Algorithms with Provable Bounds
8 of 20
Adverse Drug Event Information Extraction from Medical Narratives using Ensemble Learning & Deep Learning
9 of 20
Development of a Data-Grounded Theory of Program Design in HTDP
10 of 20
Studies on the Emergence of Order in Out-of-equilibrium Systems
11 of 20
A Modular Robotic AFO for detecting phase changes during Walking Gait
12 of 20
Improving the Performance of Dynamic Electromyogram-to-Force Models for the Hand-Wrist and Multiple Fingers
13 of 20
INTERACTIVE ROUTE-PLANNING AND MOBILE SENSING WITH A TEAM OF MULTIPLE ROBOTIC VEHICLES TO SATISFY LINEAR TEMPORAL LOGIC SPECIFICATIONS
14 of 20
Elucidating the Function of Myosin XI in Polarized Cell Growth and Investigating the Chitin-induced Calcium-mediated Immune Response in P. patens.
15 of 20
In Silico Edgetic Profiling and Network Analysis of Human Genetic Variants, with an Application to Disease Module Detection
16 of 20
Age of Information in Multi-Hop Status Update Systems: Fundamental Bounds and Scheduling Policy Design
17 of 20
Improving Ceramic Additive Manufacturing via Machine Learning-Enabled Closed-Loop Control
18 of 20
Machine Learning for Reliable Communication and Improved Tracking of Dynamical Systems
19 of 20
Revisiting Isolated and Trusted Execution via Microarchitectural Cryptanalysis
20 of 20