You may also quote sentences from the work of others.
These must be included in quotation marks and again the relevant work must be cited.
Any illustrations that are not the work of the author of this report have been used with the explicit permission of the originator and are specifically acknowledged.
I understand that failure to do this amounts to plagiarism and will be considered grounds for failure in this project and the degree examination as a whole.
PDF Network-aware energy saving techniques in cloud data centers, Motassem Al-Tarazi PDF Situation-oriented requirements engineering, Nimanthi Atukorala PDF The construction and applications of callback control flow graphs for event-driven and framework-based mobile apps, Danilo Dominguez Perez PDF Witness generation in existential CTL model checking, Chuan Jiang PDF Nonparametric curve estimation and applications, Yu Liu PDF Taking the lab on the road and bringing the road to the lab: On using mixed-methods and virtual reality to study a location-based task, Kofi Whitney PDF Toward efficient online scheduling for large-scale distributed machine learning system, Menglu Yu PDF Medical image classification under class imbalance, Chuanhai Zhang PDF Automatic incident detection, Lakshay Ahuja PDF Enhancing users' experiences with mobile app stores: What do users see? Stull PDF The design and implementation of Candoia: A platform for building and sharing mining software repositories tools as apps, Nitin Mukesh Tiwari PDF Learning Markov Logic Network Structure by Template Constructing, Yingbei Tong PDF Computational modeling of impact and deformation, Feifei Wang PDF Execution and authentication of function queries, Guolei Yang PDF A situation-centric, knowledge-driven requirements elicitation approach, Jingwei Yang PDF Syntax errors identification from compiler error messages using ML techniques, Shubham K.
Asiri PDF Disrupting diffusion: Critical nodes in network, Preeti Bhardwaj PDF Recognition of activities of daily living, Yunfei Feng PDF A data-driven situation-aware framework for predictive analysis in smart environments, Hoda Gholami PDF Effectiveness of classification approach in recovering pairwise causal relations from data., Kristima Guha Thakurta PDF A study of interpretability mechanisms for deep networks, Apurva Dilip Kokate PDF Large-scale study of substitutability in the presence of effects, Jackson Lowell Maddox PDF Towards efficient and accountable oblivious cloud storage, Qiumao Ma PDF Improved triangle counting in graph streams: Neighborhood multi-sampling, Kiana Mousavi Hanjani PDF High performance computing applications: Inter-process communication, workflow optimization, and deep learning for computational nuclear physics, Gianina Alina Negoita PDF Data augmentation for supervised learning with generative adversarial networks, Manaswi Podduturi PDF Graph compression using heuristic-based reordering, Pavithra Rajarathinam PDF Collective program analysis, Ganesha Upadhyaya PDF Graph Track: An unsupervised graph-based cross-device tracking framework, Tianchen Zhou PDF Improving testing performance by dynamic prioritization of tests based on method invocation orders, Sriram Balasubramanian PDF Computer detection of spatial visualization in a location-based task, Georgi Iliev Batinov PDF A User Configurable B-tree Implementation as a Utility, Sheng Bi PDF Devices for safety-critical molecular programmed systems, Samuel Jay Ellis PDF A testbed for multi-robot systems, Tianshuang Gao PDF Many-to-one private set intersection, Keji Hu PDF Parity-based Data Outsourcing: Extension, Implementation, and Evaluation, Zhenbi Hu PDF Computing change of invariants to support software evolution, Ashwin Kallingal Joshy PDF Triangle counting in graph streams: Power of multi-sampling, Neeraj Kavassery Parakkat PDF Exploiting implicit belief to resolve sparse usage problem in usage-based specification mining, Samantha Syeda Khairunnesa PDF Synthesizing species trees from gene trees using the parameterized and graph-theoretic approaches, Ju Cheol Moon PDF Verification of Well-formedness in Message-Passing Asynchronous Systems modeled as Communicating Finite-State Machines, Shiva Shankar Nalla PDF Negotiation Based Resource Allocation to Control Information Diffusion, Sai Sravanthi Nudurupati PDF Flattening methods for adaptive location-based software to user abilities, Thitivatr Patanasakpinyo PDF λir : A language with intensional receive, Swarn Priya PDF A hybrid approach for selecting and optimizing graph traversal strategy for analyzing big code, Ramanathan Ramu PDF Targeted Influence Maximization In Labeled Social Networks with Non-Target Constraints, Naresh Somisetty PDF Algorithmic randomness and analysis, Donald M.
It is usual to assume that the reader is familiar with material all your fellow students will be familiar with from the taught component (so you cannot assume your reader will know anything you have covered in an optional module).
Any further material needed should be summarised and suitable references cited.
What now follows is a typical structure for a 'design and build' project.
At the end of chapter 1, you should include a brief discussion of your view of the relationship between your project, and your degree programme.