Authors
|
Title
|
Hassan S. A. Arafat, David Bremner, Kenneth B. Kent, Julian Wang |
Load Stall Minimization |
Jonas R. Schoenauer, David Bremner, Kenneth B. Kent, Julian Wang |
Detection and Mitigation of Load Stalls on AArch64 |
Nancy Chahal, Kenneth B. Kent, Joran Siu, Michael Dawson |
Towards An Efficient Autoscaling Decision for Cloud Applications |
Joannah Nanjekye , David Bremner, Aleksandar Micic |
Eclipse OMR Garbage Collection for Meta tracing JIT based Dynamic Languages |
Georgiy Krylov, Gerhard W. Dueck, Kenneth B. Kent, Younes Manton |
Calling Functions Dynamically Generated By Eclipse OMR JitBuilder |
Subhabrata Rana, Fatemeh Khoda Parast, Kenneth B. Kent, Brett Kelly |
CephVault : A Secure Key Management System for Ceph |
Connor Wilson, Alex McInnis, Scott Bateman |
Tailoring Intro to Programming: Using the User Type Hexad |
Shubham Verma, Kenneth B. Kent, Marius Pirvu |
Implementation of Array Bytecodes in MicroJIT |
Shermin Khosravi, David Bremner |
Linear Programs Size Reduction via Feature Sharing in Sparktope Compiler |
Saumya Verma, Sudip Chatterjee |
Effecient SQL Query Compilation Using JIT Compilers |
Chenghao Xu, Wei Song |
Intelligent Mobile Crowdsensing with Deep Reinforcement Learning |
Geetesh More, Supriyo Ray, Kenneth Kent |
On-chip Database Acceleration with FPGA |
Harpreet Kaur, Kenneth B. Kent, Marius Pirvu |
Method Invocation in Templated JIT Compiler |
Md Mazder Rahman and Gerhrad W. Dueck |
Optimization of Quantum Circuits |
Jérémy Robichaud,Paul Cook |
WaCadie: A Web Corpus of Acadian French |
Ethan Eddy, Erik Scheme, Scott Bateman |
A Framework and Call to Action for the Future Development of EMG-Based Input in HCI |
Navid Jafarof, Kennet B. Kent |
Heterogeneous Logic Implementation for Adders in VTR |
Alireza Azadi, Kenneth B. Kent |
Open Hardware Development With Incremental Synthesis |
Dakota Staples, Saqib Hakak, Paul Cook |
A Comparison of Machine Learning Algorithms for Multilingual Phishing Detection |
Pouya Pournasir, Daniel J. Rea |
”J.A.C.K.A.L”: Your social AI Companion in robotic teleoperation |
Yantao Yu, Xin Zeng, Xiaoping Xue, Jingxiao Ma |
LSTM-based IDS for VANETs: A Time Series Classification Approach to False Message Detection |
Muhammad Zubair, Saqib Hakak |
Deep Fake Analysis in Compressed Videos |
Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari |
Hardening The Substation’s Security Posture By Utilizing Trust |
Raghuraman Swaminathan, Paul Cook |
Token-level Identification of Multiword Expressions using Pre-trained Multilingual Language Models |
Atah Nuh Mih, Hung Cao |
EdgeAI for Defect Detection using Transfer Learning Techniques in the Context of Smart Manufacturing |
Simran Dadhich, Hung Cao |
Developing an IoT prototype for Climate Data Acquisition using Arduino |
Vishnu Prasanth. RongXing Lu |
Dynamic key Management for privacy in Aging in place |
Asfia Kawnine, Hung Cao |
Towards A Performance Evaluation for Federated Averaging on Edge Devices |
Avinaba Mistry, Bilal Husain, Dane Sheppard, Gaia Noseworthy, Jarod Kelly, Robert Santacruz, Sanjeev Seahra, Suprio Ray |
Individual level agent based contagion simulator |
Sean Lalla, Rongxing Lu, Yunguo Guan, Songnian Zhang |
Improving Decision Tree Privacy with Bloom Filters |