Computer Science, 1988-2020
Items (Sorted by Submit Date in Descending order): 161 to 180 of 685
Issue Date | Title | Author(s) |
14-Aug-2018 | Inferring Intent from Pointing with Computer Vision | Hinthorn, William |
14-Aug-2018 | New Methods for Tackling SparsityProblems in WordNet | Hammarskjold, Ryan |
14-Aug-2018 | A System for Vertical Farming Data Collection and Analysis | Zainulabadeen, Aamir |
14-Aug-2018 | Kids and Online Safety: Developing an Educational Framework | Yang, Jonathan |
14-Aug-2018 | Zero-shot Semantic Segmentation | Doshi, Rohan |
14-Aug-2018 | CryptoVest: A Cryptocurrency Investing Platform | Islam, Waqar |
14-Aug-2018 | Static Analysis of Programming Assignment Submissions in an Introductory CS Course | Salter, Joseph |
14-Aug-2018 | Automatic Punctuation of Lecture Transcripts & Student Usage Analysis of Video Lectures in Online Learning Platforms | Morkos, Ragy |
14-Aug-2018 | Profile Hidden Markov Models for the Detection of Non-Ribosomal Peptide Synthetases within Metagenomic Sequence Data | Chang, Allison |
14-Aug-2018 | A Theoretical Fugue on Computational Creativity in the Style of GEB | Tang, Alice |
14-Aug-2018 | Attack Vectors in Proof of Stake Blockchains | Victor, Bennett |
14-Aug-2018 | Processable: A Visual Assembly Debugger and Program Tracer in the Browser | Whitaker, Robert |
14-Aug-2018 | A Statistical Conception of Gerrymandering: Providing a Pipeline to the Redist Algorithm | Rivitz, William |
14-Aug-2018 | Context-Aware Algorithmic Composition in the Style of Classical Composers using Machine Learning | Toy, Nico |
14-Aug-2018 | Pantrymate: A Mobile Application to Reduce Household Food Waste | Levin, Jake |
14-Aug-2018 | TableReader: A Digital Humanities PDF Extraction Tool | Ji, Jessica |
14-Aug-2018 | Using Machine Learning to Optimize NBA Lineups | Heffernan, Harry |
14-Aug-2018 | Towards Critical Computing: a Template for Animated Documentary | Kermode, Lachlan |
14-Aug-2018 | Binge-Watching Your Way to Polarization? Measuring and Addressing Political Echo Chamber Effects on YouTube | Clark, Thomas |
14-Aug-2018 | "Alexa, Is My Information Safe?" Uncovering Privacy Vulnerabilities of the Amazon Echo via Encrypted Network Traffic Analysis | Jonsdottir, Gudrun |
Items (Sorted by Submit Date in Descending order): 161 to 180 of 685