a |
AForge | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
AForge.NET | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Android | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
Android App | Cloud Based Framework to Integrate Map, GPS, and Android Apps |
Architectural decay | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
Architectural Rationale Documentation | Documenting architectural rationale using source code annotations: An exploratory study |
architectural smell | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
architectural violation | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
architecture conformance | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
Augmented Reality | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
b |
Bayesian algorithm | Cyber Threat Discovery from Dark Web |
Big Data | Human-Centric Situational Awareness and Big Data Visualization Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
blob detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Boarder Detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Boolean operations | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
Bradley Local Thresholding | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Building Evacuation | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
c |
chin tuck against resistance | Design and Development of the CTAR All-Star |
Cloud Computing | Homomorphic Encryption and Data Security in the Cloud Cloud Based Framework to Integrate Map, GPS, and Android Apps |
clustering/grouping algorithm | Cloud Based Framework to Integrate Map, GPS, and Android Apps |
code decay | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
Creational Patterns | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics |
Cryptography | Homomorphic Encryption and Data Security in the Cloud |
Cyber Analytic | Cyber Threat Discovery from Dark Web |
cyber threat intelligence | Cyber Threat Discovery from Dark Web |
d |
Data Classification | Socio-Analyzer: A Sentiment Analysis Using Social Media Data |
Data Mining | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
data visualization | Human-Centric Situational Awareness and Big Data Visualization |
Deep Web or Darknet | Cyber Threat Discovery from Dark Web |
defect analysis | Adaptation of Orthogonal Defect Classification for Mobile Applications |
defect classification | Adaptation of Orthogonal Defect Classification for Mobile Applications |
Defect density analysis | Software Defect Density Analysis |
Defect density prediction | Software Defect Density Analysis |
design patterns | Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics |
drift | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
dynamic programming | Environmental extreme events detection: A survey |
Dysphagia | Design and Development of the CTAR All-Star |
e |
edge detection | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
educational game | Quack: A Youth-Targeted Game for English Comprehension |
Educational Modules | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
Encryption | Homomorphic Encryption and Data Security in the Cloud |
environment | A lightweight environment for 2D visual applications |
Erosion | On Architectural Decay Prediction and Detection in Real-Time Software Systems |
Event Management | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
event scheduling | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
Exploit Type | Cyber Threat Discovery from Dark Web |
Extreme Value Theory | Environmental extreme events detection: A survey |
f |
Festival | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
Finantial metrics | ROI Estimation in a Scrum Project: A case study |
free-riding | A Peer-to-Peer Reputation Evaluation System |
full stack | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
fully homomorphic | Homomorphic Encryption and Data Security in the Cloud |
Fuzzy Logic | A Peer-to-Peer Reputation Evaluation System |
g |
game theme-based learning | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
GitHub | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
Google | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
graphics | A lightweight environment for 2D visual applications |
GTI | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
h |
hacker forums | Cyber Threat Discovery from Dark Web |
Human Computer Interaction | Comparison of University Course Search Interfaces Quack: A Youth-Targeted Game for English Comprehension |
Human-Centric Approach | Human-Centric Situational Awareness and Big Data Visualization |
i |
Immersive Environment | Human-Centric Situational Awareness and Big Data Visualization |
information visualization | A lightweight environment for 2D visual applications |
ISBSG | Software Defect Density Analysis |
l |
library | A lightweight environment for 2D visual applications |
m |
machine learning | Socio-Analyzer: A Sentiment Analysis Using Social Media Data Open Source Software Survivability Prediction Using Multi Layer Perceptron Creational and Structural Patterns in a Flexible Machine Learning Framework for Medical Ultrasound Diagnostics |
machine learning classification | Cyber Threat Discovery from Dark Web |
magic | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Magic The Gathering | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
map | Cloud Based Framework to Integrate Map, GPS, and Android Apps |
Microservice | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
MLP | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
mobile application | Evaluation of Mobile Augmented Reality Application for Building Evacuation Adaptation of Orthogonal Defect Classification for Mobile Applications |
o |
OCR | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Open Source Software | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
Optical Character Recognition | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
Orthogonal Defect Classification (ODC) | Adaptation of Orthogonal Defect Classification for Mobile Applications |
Outliers | Environmental extreme events detection: A survey |
p |
P2P network | A Peer-to-Peer Reputation Evaluation System |
partially homomorphic | Homomorphic Encryption and Data Security in the Cloud |
payment processing | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
portals | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
Postgres | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
PostgreSQL | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
predicate trees | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
Project software | ROI Estimation in a Scrum Project: A case study |
q |
Quadrilateral Transformation | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
query approximation | Scalable Correlated Sampling for Join Query Estimations on Big Data |
query size estimation | Scalable Correlated Sampling for Join Query Estimations on Big Data |
r |
Rehabilitation | Design and Development of the CTAR All-Star |
reputation system | A Peer-to-Peer Reputation Evaluation System |
ROI | ROI Estimation in a Scrum Project: A case study |
s |
sampling | Scalable Correlated Sampling for Join Query Estimations on Big Data |
Scrum | ROI Estimation in a Scrum Project: A case study |
search engine | Comparison of University Course Search Interfaces |
Sentiment Analysis | Socio-Analyzer: A Sentiment Analysis Using Social Media Data |
Situational Awareness | Human-Centric Situational Awareness and Big Data Visualization |
sliding window | Environmental extreme events detection: A survey |
SMQII | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List |
software architecture | On Architectural Decay Prediction and Detection in Real-Time Software Systems Documenting architectural rationale using source code annotations: An exploratory study |
software complexity | Open Source Software Survivability Prediction Using Multi Layer Perceptron |
Software Engineering | Quack: A Youth-Targeted Game for English Comprehension |
somewhat homomorphic | Homomorphic Encryption and Data Security in the Cloud |
Source Code Annotations | Documenting architectural rationale using source code annotations: An exploratory study |
Speed Gain | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
t |
Tesseract | Utilizing Optical Character Recognition and Boarder Detection Algorithms to Identify Trading Cards |
threshold | Environmental extreme events detection: A survey |
Tree-based Algorithm | Cyber Threat Discovery from Dark Web |
u |
User Interface (UI) | Comparison of University Course Search Interfaces |
v |
vertical processing | Vertical Data Processing for Mining Big Data: A Predicate Tree Approach |
Virtual Reality | Motivational Game-Theme Based Instructional Module for Teaching Binary Tree and Linked List Human-Centric Situational Awareness and Big Data Visualization |
Vuforia | Evaluation of Mobile Augmented Reality Application for Building Evacuation |
w |
web application | ARIA 3.0: A Modern Approach to Web-based Music Festival Registration Systems |
web design | Comparison of University Course Search Interfaces |