Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 169)
'Practice' for Enhancing the Performance of a Deep Reinforcement Learning Agent
A Beginning-to-End System for Efficiently Gathering Tracking Data on Multiple Targets
A Critical, Empirical, and Reflexive Investigation of the Promise of Democratization in the Making Phenomenon
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
A Survey of Network Modeling
A User-Based Stance Analysis for Gauging Public Opinion with Stance Detection in Twitter Data
A framework for the use of wearables to enable study of stress
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
A presentation and evaluation of guided-learning activities and program visualization tool, dissav, to teach stack smashing
AI Based Realistic Multi-Hop Wireless Simulation
ANALYSIS OF OPTICAL FIBER SPECKLE PATTERNS FOR DETECTION OF IVUS CATHETER TIP IN 3D SPACE: AN INTELLIGENT SENSOR RESEARCH
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
Active Cyber Defense Planning and Orchestration
An Approach Towards an Autonomic Computing Prototype Reference Architecture
An Evidence-Based Digital Nudging In Support Of Health Misinformation Assessment  On Social Media Sites
Analysis of Respiratory Viral Material from Negative COVID-19 PCR Tests to Observe Effects of 2022-2023 "Twindemic" on University Campus
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
Art Authentication in an Untagged Art Database
Automated Classification and Mitigation of Cybersecurity Vulnerabilities