Search Constraints
Search Results
Select an image to start the slideshow
Mining graph patterns in software development from code repositories
1 of 32
MIRA: A Tool for Monitoring Internet Routing Anomalies
2 of 32
Efficiency Analysis of Partner Organizations: Poverty Stoplight
3 of 32
CS: MQP: DS: MQP: Kyumin Lee: Developing a Wildlife Crime Media Aggregator
4 of 32
Sales Training and Swaption Pricing under New Regulatory Environment
5 of 32
Feature Recognition from Aerial Images Using Machine Learning
6 of 32
Bank of America Quartz WorldMap Infrastructure Monitoring
7 of 32
FinTech Project B23 - Micronotes - Process Automation & Data Matching
8 of 32
Fidelity: AI Based Anomaly Detection
9 of 32
FinTech Project B23 - Enhancing Investment Management - Data Science
10 of 32
Mobile Reporting Application
11 of 32
Cyber Security Network Anomaly Detection and Visualization
12 of 32
Lehman Brothers global risk reporting -- Business Objects in New York and London
13 of 32
FinTech Project B21 - Angelo Gordon - Migration Patterns
14 of 32
Feature Recognition from Aerial Imaging
15 of 32
Modeling and Analysis of COVID-19 using Mathematical and Data Analytic Methods
16 of 32
Process Mining the Credit Suisse Advisory Process
17 of 32
Performing Binary Classification of Contests Profitability for Draftkings
18 of 32
Arco IT GmbH User Interface and Machine Learning MQP
19 of 32
Big Data Analytics and Tactical Decision Making
20 of 32
Barclays Mobile Reporting Application
21 of 32
Simulations and ML for parachute guidance
22 of 32
Loan Data Governance
23 of 32
Evaluating the Robustness and Feasibility of Integer Programming and Dynamic Programming in Aircraft Sequencing Optimization
24 of 32
Risk Reporting Techniques
25 of 32
Exploration of unit distance graphs
26 of 32
Player Performance Prediction Automation for DraftKings
27 of 32
Evaluating the Robustness and Feasibility of Integer Programming and Dynamic Programming in Aircraft Sequencing Optimization
28 of 32
Enterprise Architecture Phase II
29 of 32
Model checking for role-based access control
30 of 32
The LTV Homomorphic Encryption Scheme and Implementation in Sage
31 of 32
The Global Reports Monitor Enhancements
32 of 32