Skip to Content
Browse by Collection
Browse by Project Center
Explore, Discover, Share
Remove constraint Unit: Computer Science
« Previous |
Sort by relevance
date uploaded ▼
date uploaded ▲
date modified ▼
date modified ▲
Number of results to display per page
100 per page
View results as:
Leveraging Auxiliary Data from Similar Problems to Improve Automatic Open Response Sco...
Improving Automated Assessment for Student Open-responses in Mathematics
Modern Computer Science Approaches in Biology: From Predicting Molecular Functions to ...
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
Human-In-The-Loop Person Re-Id for Sensitive Datasets
Searching for Contextual Subtasks for Semantic Segmentation
ClinicalICDBERT: Predicting Re-Admission Risk from Clinical Notes, Vital Signs and ICD...
Artistic Reflection Through Co-Creative Support Tool Curation
Residential Network Security: Using Software-defined Networking to Inspect and Label T...
Redesigning Deep Neural Networks for Resource-Efficient Inference
Understanding Internal Feature Development in Deep Convolutional Neural Networks for T...
Automatic Emotion Detection in Text Messages using Supervised Learning
Towards Instantaneous Mental Health Screening From Voice Using Machine and Deep Learning
HDR-Like Image Generation to Mitigate Adverse Wound Illumination Using Deep Bi-directi...
Making Sense of Human-generated Spatial-temporal Data from Urban Environment
Rethink Lighting Estimation for 3D Vision-enabled Mobile Augmented Reality
Detecting Evasive Multiprocess Ransomware
Speech-based Traumatic Brain Injury (TBI) Assessment using Deep Learning Methods with ...
Text Representations of Math Tutorial Videos for Clustering, Retrieval, and Learning G...
Examining Student Effort on Hint through Response Time Decomposition
Improvement on Hint and Explanation Crowdsourcing Method for an Online Learning Platform
Protecting Model Confidentiality for Machine Learning as a Service
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations
Disrupting Attacker Value Propositions in Residential Networks
Concurrent Deep Learning Workloads on NVIDIA GPUs
Applying Reinforcement Learning Based Tutor Strategy Recommendation Service To The ASS...
Improving Feedback Recommendation in Intelligent Tutoring Systems using NLP
Learning Deep Social Interactions to Identify Positive Classroom Climate
Behavior Detectors to Support Feedback Generation using Problem-Solving Action Data
PEGASUS: Powerful, Expressive, Graphical Analyzer for the Single-Use Server
Appjudicator: Enhancing Android Network Analysis through UI Monitoring
Smartphone TBI Sensing using Deep Embedded Clustering and Extreme Boosted Outlier Dete...
Predicting TBI by using Smartphone-sensed mobility patterns, gait and balance
MIC-TOK: A Musical Live Coding Environment for Constrained Input
Traumatic Brain Injury (TBI) detection and bioscore generation for ailment monitoring ...
The Effects of Latency and Game Device on Moving Target Selection
Application of Function Matching Techniques to Determine Libraries in Embedded Firmware
Decoding Cognitive States from fNIRS Neuroimaging Data Using Machine Learning
SIFT: A Deep Network for Irregularly-Sampled Multivariate Time Series
The Influence of Automated Narrative Feedback on Student-Designed Gamified Research
Developing Automated Audio Assessment Tools for a Chinese Language Course
Attention-based Deep Learning Models for Text Classification and their Interpretability
Ranking for Decision Making: Fairness and Usability
Contextual Outlier Detection from Heterogeneous Data Sources
Development of a Data-Grounded Theory of Program Design in HTDP
Single-Use Servers: A Generalized Design for Eliminating the Confused Deputy Problem i...
Live Performance and Emotional Analysis of MathSpring Intelligent Tutor System Students
Unsupervised Semantic Segmentation through Cross-Instance Representation Similarity
Towards Better Kernel and Network Monitoring of Software Actions
Improving Model Performance with Robust PCA
The effect of prompted self-revision on student performance in the context of open-end...
Alloy-Guided Verification of Cooperative Autonomous Driving Behavior
Detecting Various Types of Malicious Users at One Sitting in Online Social Networks
Time Series Data Analytics
Deep Learning Approach to Trespass Detection using Video Surveillance Data
Pointwise and Instance Segmentation for 3D Point Cloud
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Applica...
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defense...
Boosting Gene Expression Clustering with System-Wide Biological Information and Deep L...
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
Quantifying, Modeling and Managing How People Interact with Visualizations on the Web
Sequential Data Mining and its Applications to Pharmacovigilance
Robot-Enhanced ABA Therapy: Exploring Emerging Artificial Intelligence Embedded System...
Deep Learning on Graph-structured Data
Secure Key Agreement for Wearable Medical Devices
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
How's My Network - Incentives and Impediments of Home Network Measurements
Anomaly Handling in Visual Analytics
Exploiting Flow Relationships to Improve the Performance of Distributed Applications
WHITE - Achieving Fair Bandwidth Allocation with Priority Dropping Based On Round Trip...
Deep Learning on Attributed Sequences
Event stream analytics
Pattern Mining and Sense-Making Support for Enhancing the User Experience
Recurring Query Processing on Big Data
Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable M...
Exploring Host-based Software Defined Networking and its Applications
Evaluating Clustering Techniques over Big Data in Distributed Infrastructures
Why did they cite that?
Refining Prerequisite Skill Structure Graphs Using Randomized Controlled Trials
Towards Personalized Learning using Counterfactual Inference for Randomized Controlled...
Ballistocardiography-based Authentication using Convolutional Neural Networks
vU-net: edge detection in time-lapse fluorescence live cell images based on convolutio...
Automatic Eye-Gaze Following from 2-D Static Images: Application to Classroom Observat...
Improving User Interface and User Experience of MathSpring Intelligent Tutoring System...
Outlier Detection In Big Data
Feasibility Study on Smart Cloud Commuting with Shared Autonomous Vehicles
Scalable User Assignment in Power Grids: A Data Driven Approach
Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks
Improvements on Trained Across Multiple Experiments (TAME), a New Method for Treatment...
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
Control-flow Integrity for Real-time Embedded Systems
Theory and Practice: Improving Retention Performance through Student Modeling and Syst...
Software-defined Networking: Improving Security for Enterprise and Home Networks
Performance Evaluation of QUIC protocol under Network Congestion
A Prediction Model Uses the Sequence of Attempts and Hints to Better Predict Knowledge...
Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
Affective Motivational Collaboration Theory
Pivot-based Data Partitioning for Distributed k Nearest Neighbor Mining
Tutoring Students with Adaptive Strategies
Limit your search
Adamjee, Merzia Naeem
Adams, Daniel Alan
Adjei, Seth Akonor
Agbaji, Unekwuojo Esther
Agu, Emmanuel O.
Alvarez, Sergio A.
Baker, Ryan Shaun
Beck, Joseph E.
Agu, Emmanuel O.
Alvarez, Sergio A.
Worcester Polytechnic Institute