A Detection Tool for Traffic Objects
|
2022 |
Li, Jiashu |
Security & Privacy Comparison of NextCloud vs Dropbox: A Survey
|
2022 |
Olaosebikan, Ayodeji |
A Scrum Tool with Support for Cost Estimation
|
2022 |
Feng, Xingzhan |
Applications of Block-Chain Technologies to Enhance the Security of Intrusion Detection/Prevention Systems: A Review
|
2022 |
Ndri, Anna |
Raytracer and Scene Description Language in the Rust Programming Language
|
2022 |
Franks, Zander |
Wireless Security: Learning by Hacking with Software Defined Radios
|
2022 |
Ham, Michael |
Internet of Strings: Introducing Routing Concepts to Kids
|
2022 |
Cronin, Kyle |
Where is it? Exercises Locating Items in a File System
|
2022 |
Steinmetz, Erik |
An Introduction to Blockchain Development
|
2022 |
Weller, Joseph |
Literature Review of Assessment of High Impact Practices in General Education Courses Using Text Mining and Natural Language Processing
|
2022 |
Chavan, Shubham |
Car Accidents Severity Prediction in the USA Using Machine Learning Techniques
|
2022 |
Avachat, Shweta |
Programming Unplugged: A Computer-less Introduction to Programming
|
2022 |
Larson, Amy |
Nifty Assignment - An Adaptable Framework for Developing Students Written and Oral Communication Skills
|
2022 |
Fine, Benjamin T. |
Developing a CS Teacher Prep Program
|
2022 |
East, J. Philip |
An Android App for Detecting Sleep and Pausing Media
|
2022 |
Goodwin, Carter |
Learning by Teaching: Creating an Educational Video on the “Muddiest” Topic
|
2022 |
Al-Haj, Saeed |
Developing an Exploratory Study of Beginners’ Interactions with Clojure
|
2022 |
Seung, Jeong Ha |
How We Have Applied Grading For Equity: An Experience Report
|
2022 |
Berns, Andrew |
Music Generation Using an LSTM
|
2022 |
Conner, Michael |
Machine learning approach for optimizing healthcare Supply Chain
|
2022 |
Rajput, Anurag |