Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Computer Sciences
Markerless Tumor Tracking Using Kalman Filter And Deep Learning, Anisha Kapoor, Mark Albert
Markerless Tumor Tracking Using Kalman Filter And Deep Learning, Anisha Kapoor, Mark Albert
Computer Science Research Seminars and Symposia
According to the Center for Disease Control, more people die from lung cancer than any other cancer in the United States. A complication that arises from lung cancer treatment, radiation therapy, is radiation pneumonitis. Radiation pneumonitis can be fatal and affects over 23% of patients.
Clime: Command Line Metrics For Git Projects, Nicholas Synovic
Clime: Command Line Metrics For Git Projects, Nicholas Synovic
Computer Science Research Seminars and Symposia
Numerous efforts in repository mining have focused
on mining repositories and reporting basic metrics. Many efforts
are focused on being able to evaluate (or score) projects based
on these metrics. Yet little attention has been given to in-
process metrics, which are a critical tool for improving software
quality as agile projects become more established projects and
require regular maintenance. We present CLIME (Command Line
Metrics), a user-installable toolset for computing a wide variety
of classical and modern process metrics, including code size,
issue spoilage, issue/defect density, productivity, and bus factor.
CLIME also includes a tool to identify projects based …
Airline Mile Finder Web Extension Development, Shane Panchot
Airline Mile Finder Web Extension Development, Shane Panchot
Computer Science Research Seminars and Symposia
In the demonstration, I will go through the development of a Firefox extension I came up with for my project in the Algorithms and Complexity course this semester. The demonstration provides an overview of the Web Extension API. It also covers the use of data structures and algorithms implemented in the project.
Establishing Trust In Vehicle-To-Vehicle Coordination: A Sensor Fusion Approach, Jakob Veselsky
Establishing Trust In Vehicle-To-Vehicle Coordination: A Sensor Fusion Approach, Jakob Veselsky
Computer Science Research Seminars and Symposia
As we add more autonomous and semi-autonomous vehicles (AVs) to our roads, their effects on passenger and pedestrian safety are becoming more important. Despite extensive testing, AVs do not always identify roadway hazards. Failures in object recognition components have already led to several fatal collisions, e.g. as a result of faults in sensors, software, or vantage point. Although a particular AV may fail, there is an untapped pool of information held by other AVs in the vicinity that could be used to identify roadway hazards before they present a safety threat.
Phishing For Fun, Madeline Moran
Phishing For Fun, Madeline Moran
Computer Science Research Seminars and Symposia
The process of a phishing experiment that will be used to investigate a possible correlation between a person thinking style and their susceptibility to phishing scams.
Cybersecurity And Threat Modeling, Kumar Setty
Cybersecurity And Threat Modeling, Kumar Setty
Computer Science Research Seminars and Symposia
An introduction to cybersecurity and threat modeling.