Search Constraints
Search Results
Select an image to start the slideshow
Mining graph patterns in software development from code repositories
1 of 32
MIRA: A Tool for Monitoring Internet Routing Anomalies
2 of 32
FinTech Project B23 - Enhancing Investment Management - Data Science
3 of 32
FinTech Project B23 - Micronotes - Process Automation & Data Matching
4 of 32
Bank of America Quartz WorldMap Infrastructure Monitoring
5 of 32
Sales Training and Swaption Pricing under New Regulatory Environment
6 of 32
CS: MQP: DS: MQP: Kyumin Lee: Developing a Wildlife Crime Media Aggregator
7 of 32
Efficiency Analysis of Partner Organizations: Poverty Stoplight
8 of 32
Feature Recognition from Aerial Images Using Machine Learning
9 of 32
Fidelity: AI Based Anomaly Detection
10 of 32
Simulations and ML for parachute guidance
11 of 32
Modeling and Analysis of COVID-19 using Mathematical and Data Analytic Methods
12 of 32
FinTech Project B21 - Angelo Gordon - Migration Patterns
13 of 32
Model checking for role-based access control
14 of 32
Lehman Brothers global risk reporting -- Business Objects in New York and London
15 of 32
Exploration of unit distance graphs
16 of 32
Feature Recognition from Aerial Imaging
17 of 32
Player Performance Prediction Automation for DraftKings
18 of 32
Arco IT GmbH User Interface and Machine Learning MQP
19 of 32
Performing Binary Classification of Contests Profitability for Draftkings
20 of 32
Barclays Mobile Reporting Application
21 of 32
Big Data Analytics and Tactical Decision Making
22 of 32
Cyber Security Network Anomaly Detection and Visualization
23 of 32
Enterprise Architecture Phase II
24 of 32
Evaluating the Robustness and Feasibility of Integer Programming and Dynamic Programming in Aircraft Sequencing Optimization
25 of 32
Evaluating the Robustness and Feasibility of Integer Programming and Dynamic Programming in Aircraft Sequencing Optimization
26 of 32
Loan Data Governance
27 of 32
Mobile Reporting Application
28 of 32
Process Mining the Credit Suisse Advisory Process
29 of 32
Risk Reporting Techniques
30 of 32
The Global Reports Monitor Enhancements
31 of 32
The LTV Homomorphic Encryption Scheme and Implementation in Sage
32 of 32