| Author | Title |
| Molloy, Jude | A Community-run Decentralised Loan Liquidation Scheme Based |
| Sonowal, Mrinmoy | A comparative analysis of existing comorbidity indices with |
| Wallace, Euan | A Container Driven Toolkit to Replicate Network Intrusion |
| Zhou, Emmy | Adding Copula Families to Copula-GP |
| Sinegubko, Ian | A Design of a System developed on the Blockchain-based EV |
| Liu, Kexin | Algorithms for computing clearing payments in financial |
| Dzionek, Bartosz | Alleviating the Low-Rank Softmax Bottleneck |
| Guran, Maria | A mobile phone app for drone-based lunch delivery |
| Adamson, Scott | A Multiplayer Sudoku App |
| Xu, Ziqian | Anaemia Severity Prediction From Images Using Machine |
| Scollon, Owen | Analysing Ethics Related Content in Reports Using Topic |
| Peters, Pauline | Analysis of the Association Between COPD Patients’ Health |
| Bosch Carracedo, Javier | An Analysis of the Ant Colony Optimization Parameter Space |
| Sweeney, Charlotte | An Experimental Study of Persistent Homology Dimension |
| Day, Ally | An exploration of bias and fairness in Bayesian Knowledge |
| Ricketts, Andrew | An Introduction to Higher Order Measure Theory and |
| McWilliam, Callum | An SoC Infrastructure for Embedded RISC-V Cores |
| Palmarini, Alessandro | A Recognition Compiler: Improving Inductive Program |
| Burton, Tom | Are the Calculations of Vibrational Spectra of Molecules a |
| Yuan, Jingkai | Automatic assessment of creativity in images |
| Stanton, Angus | Automating Film Trailer Generation With Deep Features |
| Skrlj, Anja | BERTopic for Topic Segmentation of Multi-Party |
| Lassila, Susanna | Coercion-Resistance in Electronic Voting |
| Pan, Jingwen | Compiling Discrete Probabilistic Programs for Vectorized |
| Lu, Peiheng | Computational modelling of cognitive flexibility behaviour |
| Daubner, David | Computational modelling of individual differences in belief |
| Cooper, Iona | Creating a Tool to Help Students on the Software Design and |
| Goh, Chang Shian | Cyclopath Edinburgh |
| Leon Villares, Antonio | Deep Contrastive Learning for Feature Representation in |
| Ortiz-Canavate Ortiz, Martin | Democratization of Large Language Models Trained on Code |
| Pitr, Michal | Deploying Switch Transformer with Triton Inference Server |
| Janto, Eric | Designing and Developing a Spaced Repetition Tool to |
| Mielinyte, Skaiste | Detecting Sockpuppet Accounts in Wikipedia: A Quantitative |
| Alberigo, Oscar | Developing an Ethics Case Study Repository for Effective |
| Florence, Scott | Double Descent for Sequence-to-Expression Models |
| Robledo Diaz, Leticia | Enhanced Anomaly Detection through Deep Feature Extraction |
| Appiah, Adwoa | Enhancing AI Ethical Reviews: A User Interface Approach |
| Balucha, Filip | Enhancing CodeNeRF Predictions Using Transfer Learning and |
| Ng, Mae | Evaluating a system for facilitating the integration of |
| Strain, Sean | Evaluating the Impact of an Automated Email Analysis System |
| Irvine, Jack | Evaluating transcription tools for Shetland dialect |
| Zelnia, Justas | Exploring Different Deck Building Algorithms in Slay the |
| Vu, Kuan Lon | Exposed amongst the Hidden: An Empirical Analysis of the |
| Thomson, James | Footstep Planning for Legged Robots using Mixed-Integer |
| Zou, Litu | Formalising Extensible Grammars in Lean 4 |
| Zhou, Zimeng | Graph Neural Network Caching in Large Scale Temporal Graphs |
| Evans, Ben | Harmonising the Senses: An Audiovisual Tool for Interactive |
| Bogomil, Eve | HaskellQuest: a game for teaching functional programming in |
| Despinoy, Maxim | Having Fun Learning - A Hidden Component to Success |
| Kverndal, Heloïse | Identifying Inspiration between Book and Film Dialogue |
| Jindal, Sadhil | Implementation of a Blockchain-Based V2V Energy Sharing |
| Goworek, Roksana | Incorporating Nuance, Complexity, And Interpretation to |
| Manocha, Sury | Interpretable Machine Learning for Dementia Risk Prediction |
| Rooney, Tom | IrEne+: A cross-platform extension of IrEne |
| Han, Hou | Learning Object Structure from Keypoints |
| Gurung, Sraddheya | Mobile client for the E-cclesia electronic voting protocol |
| Maddipatla, Advaith | Model-Based Reinforcement Learning for Bipedal Robots |
| Wang, Jingyuan | Monitoring Bat Activity in Audio with Self-Supervised |
| Tourniaire, Patrick | Non-Monotonic Mixture Models: Enhancing the Flexibility of |
| Del Aguila Ferrandis, Juan | Nonprehensile Planar Manipulation through Reinforcement |
| Wang, Ezreal | Novice-Friendly Parallel Programming Exercises |
| O'Brien, Dayyán | Numerical Commonsense Reasoning across Languages |
| Xue, Yuqing | Optimizing Dispatching Policies for Autonomous |
| Chemenda, Maxime | Out-of-Domain, Out-of-Sight: Enhancing Query-Based Meeting |
| Purcarea, Alexandra | Parsing Heraldic Blazons |
| Fan, Qiancheng | PCS: Privacy Preserved Crowdsourcing Services Implemented |
| Prieto, Martin | Polarisation and Disagreement in Opinion Dynamics based on |
| Margaritescu, Flori | Predicting Human Estimates of Image Similarity |
| Pijanowski, Konrad | Preservation of Codd semantics in databases with SQL nulls |
| Wang, Hefan | Reinforcement Learning Racecar Local Controller |
| Fotheringham, Rory | Reproducing and Extending the Automated Synthesis of Magic |
| Jovanovic, Andrej | Rumour Detection in the Wild: A Browser Extension for |
| Royall, Copeland | Scalable and Fault Tolerant Multi-Receiver ADS-B Data |
| Robledo Diaz, Natalia | Streaming Pipeline Using Apache Kafka and GraphQL for |
| Koleoso, Muminah | Students' experience of using chat systems for social |
| Mamalouka, Phoebe | Students' experience with video conferencing systems for |
| Fu, Andy | Syntax-guided synthesis of agents for OpenAI Gym |
| Wu, Junchao | Target Scan Application |
| Duan, Wenxing | Testing the assumptions of recent quantum supremacy |
| Lindeque, Robyn | The Effects of Data Poisoning Attacks and Annotator Bias on |
| Song, Huacheng | The Impact of Factors - Size Fractions of Airborne |
| Agyekumhene, Kristin | Tool to visualise command line programming |
| Miltz, Franz | Towards Strong Relative Pseudomonads |
| Wang, Zhiyi | Towards Understanding Data Vulnerability to Membership |
| Sabnis, Jai | Trajectory generation for road vehicles using Bezier curves |
| Wen, Xiangyu | Uncertainty aware inertial navigation and indoor position |
| Marais, Marcel | Understanding and Predicting Port Congestion with Machine |
| Hanin, Vladimir | Using GUI position to improve scheduling decisions in a |
| Deeley, Connor | Using the Internal/External Temperature Difference as a |
| Kussad, Hamza | Using Variational Quantum Algorithms to Count Substructures |
| Bulloch, Laura | Veterinary Cardiopulmonary Arrest and Resuscitation |
| Jones, Gabriel | Veterinary CPR Mobile Application |
| Zhou, Yi | Video Data Condensation in Machine Understanding |
| Gustafsson Frennert, Jonathan | Visual De-Animation for Spheres on Planar Surfaces |
| Li, Ka Wing | WhiteHaul-based Spectrum Aggregation in Wi-Fi Bands |
| Parsons, Angus | Write Right: A tool to help students write proper emails |