| Author | Title | 
|---|
| Wang, Linxinyi | A Case Study in Data Engineering on the Companies House | 
| Vupparapalli, Nithya | Accelerating an HTTP Benchmark Tool with io_uring | 
| Mao, Renjie | Acceleration of Training for Mixture-of-Experts Models | 
| Low, Ian | A Comparative Study of Audio Compression Algorithms and | 
| Gupta, Umer | Adapting Sequential Recommender Systems to Predict User | 
| Weiss, Paulina | Adaptive Learning and Control in Dynamic Environments | 
| Hebbar, Athmika | A Data-Driven Approach to Understanding User Behaviour for | 
| Zheng, Jiyuan | Adversarial synchronization with collusion amongst | 
| Govindarajan Saravanarajan, Nikila | Aerial Mapping of Renewables | 
| Brea Carreras, Manuel | A Framework for Modular Syntax and Proofs in Agda | 
| Teh, Minsuan | Algorithms for Computing Clearing Payments in Financial | 
| Zhou, Yaru | A Neural Network Model for Multisensory Integration and | 
| Doran, James | An Investigation into the Distillation of Code Intelligence | 
| Zhang, Qiuyun | Artistic Visualisation of Trends in the VIS Arts Program | 
| Chen, Aidi | A study of the adoption of encrypted SNI solutions on the | 
| Yang, Yijun | A Unified Adapted-based Framework towards Unbiased and | 
| Alsalman, Safa | A User-Centric Tool for Generating Academic Profiles using | 
| Wong, Thomas | Automating Theory Repair in First Order Logic | 
| Ary, Johanes | Benchmarking Datalog System for Recursive Data Analytics | 
| Jabrane, Wassim | Benchmarking Large Language AI Models for Machine | 
| McCreadie, Callum | Beyond Association: Short-Term Causal Effects of | 
| Ari, Andi | Building Cyber Security Datasets and Tools for Anomaly | 
| Hu, Zhanghao | Causal and Temporal Inference in Visual Question Generation | 
| Domínguez Sanz, Rodrigo | Census-Independent Population Estimation with Low | 
| Milad, Laura | Comparison of Deep Learning mutual information estimators | 
| Sanni, Mardhiyah | Computationally Efficient Methods for Jointly Generating | 
| Scholes, Jeffrey | Computational Modelling of Childhood Trauma (cPTSD) | 
| Zhou, Yuxuan | Data Orchestration in Connection to Stock Fundamentals | 
| Miao, Shuren | Decentralization Analysis on Cardano by Parsing Full-nodes | 
| Yi, Josh | Deep Learning-Driven Approaches for Uncertainty-Aware WiFi | 
| Li, Yantong | Detecting Go Concurrency Bugs: Which Tool Performs Best? | 
| Wong, Kin Hei | Distortion in Real World Settings | 
| You, Jin | Educational Game Helping Hearing-Impaired People Improve | 
| Chakravarty, Abhirup | Empirical Analysis of the Effect of Context in the Task of | 
| Speggiorin, Alessandro | Empowering Search Engines: Exploring Transformer-Based | 
| Al Marzooqi, Suhail | Enhancing Cryptographic Performance on Raspberry Pi 4: | 
| Davidson, Kiera | Evaluating inverse reinforcement learning methods in | 
| Wu, Chenzhi | Evaluating Java Parallel Libraries on Divide and Conquer | 
| Desblancs, Mika | Evaluating the Effects of Temporary Twitter Suspensions of | 
| Chrysopoulos, Miltiadis | Explaining AuctionGym Policies with Gradient Based | 
| Jain, Radhikesh | Explaining the auction gym doubly robust bidding estimator | 
| Chen, Junhan | Extending Tcpdump To Support The Homa Transport Layer | 
| Sebire, Izzy | Faithfulness and Content Selection in Long-Input | 
| Provan-Bessell, Benjamin | Fault Classification in 3D Objects with Missing Parts using | 
| Xu, Junjie | Fine-tuning Large Language Models for Non-autoregressive | 
| Cardona Polo, Miguel | Forecasting Spanish Elections by predicting the Political | 
| Chen, Jingxuan | From Kernel to Permutation Estimator: Applying SHAP to | 
| Zhao, Junyin | From Standalone to Combined: Optimizing PEFT Methods for | 
| Walker, Blair | Graph-Driven Security: An Interpreter for an Account Access | 
| Alblooshi, Shamma | Harnessing Raspberry Pi's Potential for Mathematical | 
| Lee, Yu Chen | Human Activity Recognition/Monitoring and Anomaly Detection | 
yy decays with the -->| Hey, Nathaniel | Identification of highly boosted H-->yy decays with the | 
| Sahay, Amiyesh | Identifying cases of drug-harm from electronic patient | 
| Sui, Yumiao | Implementing and Evaluating Prism in the NS3 Network | 
| Liu, Chenling | Individual Animal Identification in Wildlife Images Using | 
| Wang, Li | Indoor Wi-Fi Localisation with Noisy Dataset | 
| Dolman, Samuel | Latent Diffusion Language Models | 
| Züfle, Maike | Latent Feature-Based Data Splits to Improve Generalisation | 
| Prabhakar, Ilakya | Leveraging Metadata in Ischaemic Stroke MRI Segmentation | 
| Nedelcheva, Boyana | Linking Police and Ambulance Data: Where are the Gaps? | 
| Surana, Tanish | Mirror detection in videos with unsupervised fine-tuning | 
| Li, Zeping | Modeling object co-occurrences in images | 
| Kaltenberger, Franziska | Modelling spatial modulation in the visual cortex: An | 
| Lewis, Stefan | Mood State Classification Using Time Series Data From | 
| Zhang, Zhenyu | Network analysis of cross-border banking exposures | 
| Wang, Juan | Network analysis of famous investors' portfolio - finding | 
| Yang, Jichao | NILM with Low Carbon Technologies | 
| Zhang, Linshuo | Non Intrusive Load Monitoring with Low Carbon Technologies | 
| Raje, Meghna | Object Detection in Low-Visibility Firefighting Scenarios | 
| Chobanov, Ivalin | Out-of-Distribution Dynamics Detection in Deep | 
| Li, Xiaozhou | Parallel Algorithmic Patterns in Java | 
| Liao, Xiyang | Pixel-based Auto-Regressive Language Modeling | 
| Yang, Yige | Potential benefits of explicitly preserving the locations | 
| Lam, Jonathan | Prediction of Early-Stage Start-Up Success Using Network | 
| Kyriakou, Kyriakos | Recommender Systems: looking further into the future | 
| Lin, Yunlong | Recommender Systems: looking further into the future | 
| Anandan, Kriti | Self-label correction for noisy labels in Speech Emotion | 
| Lamb, Tom | Self-Supervised Learning of Tractable Generative Models | 
| Georgiou, Gregoris | Semi-Autolabeling, Model Training and Uncertainty | 
| Sharma, Shivaz | Serving Large Mixture of Experts (MoE) models using Edge | 
| Lu, Xinyue | Simulation Engine for ML-enhanced Pairs Trading Strategies | 
| Welsh, Jamie | Spatio-Temporal Estimation of PM2.5 With Transfer Learning | 
| Rawal, Sparsh | Spoken Language Identification of Low-Resource Languages | 
| Chen, Jalen | The Application of Survival Analysis in Stock Market – A | 
| Xia, Youning | Towards Translating Graph Query Language | 
| Santosa, Rizzatama | Unveiling Decentralisation in the Algorand Blockchain: A | 
| Wang, Meitong | User Study of Tor Relay Operators' Attitudes Towards | 
| Yuan, Richard | Use the Apple M1 GPU to accelerate weather/climate/health | 
| Shen, Yaowen | Using Contrastive Generative Learning to Find Salient | 
| Zhang, Yunfei | Using Contrastive Variational Autoencoders to Disentangle | 
| Tian, Xiangyu | Using Non-parametric Stochastic Block Models to Analyze | 
| Zhang, Juekai | Visualization of Zero-Knowledge proofs that A "Child" can | 
| Tai, Yintao | Vocabulary-Free Visual Language Models |