Showing 1 - 16 results of 16 for search 'Una-May O'Reilly and Erik Hemberg.', query time: 0.05s
Refine Results
-
1
Coevolutionary genetic algorithms for proactive computer network defenses by Erb Lugo, Anthony (Anthony E.)
Published 2017Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
2
Peer-to-peer network modeling for adversarial proactive cyber defenses by Garcia, Dennis Alberto
Published 2017Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
3
BeatDB v3 : a framework for the creation of predictive datasets from physiological signals by Rivera, Steven Anthony
Published 2018Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
4
Overcoming code rot in legacy software projects by Liew, Austin Jun-Yian
Published 2018Other Authors: “…Una-May O'reilly and Erik Hemberg.…”
Thesis -
5
Understanding the doer effect for computational subjects with MOOCs by Maiyuran, Jitesh (Jitesh V.)
Published 2018Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
6
Visualizing adversaries : transparent pooling approaches for decision support in cybersecurity by Prado Sánchez, Daniel
Published 2018Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
7
Two-photon calcium imaging sequence Analysis Pipeline : a method for analyzing neuronal network activity by Khouri, Raoul-Emil Roger
Published 2018Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
8
Investigating coevolutionary algorithms For expensive fitness evaluations in cybersecurity by Pertierra Arrojo, Marcos (Marcos A.)
Published 2019Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
9
Investigating coevolutionary algorithms for finding Nash equilibria in cybersecurity problems by Zhang, Linda(Linda E.)
Published 2019Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
10
Analyzing student learning trajectories in an introductory programming MOOC by Bajwa, Ayesha R.(Ayesha Raji)
Published 2019Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
11
Investigating representations of obfuscated malicious PowerShell by Holz, Carolyn J.
Published 2019Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
12
Investigating genetic programming with novelty and domain knowledge for program synthesis by Kelly, Jonathan Gregory.
Published 2019Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
13
Using machine learning for analysis of neuronal network activity by Bhavaraju, Srilaya.
Published 2021Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
14
Using distributed machine learning to predict arterial blood pressure by Emeagwali, Ijeoma
Published 2014Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
15
Simulating tax evasion using agent based modelling And evolutionary search by Badar, Osama
Published 2014Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis -
16
Computer aided tax avoidance policy analysis by Rosen, Jacob (Jacob Benjamin)
Published 2015Other Authors: “…Una-May O'Reilly and Erik Hemberg.…”
Thesis