Author | Title |
Newlands, Craig | A Comparison Between Particle Filter-based and Graph-based |
McDermott, Jack | ADHD Accessibility for E-Learning in Higher Education |
Mullinor, Iestyn | AI-Driven Verification of Climate-Related Claims: Automated |
Martin-Angulo Martin, Alvaro | Algorithms for Computing Clearing Payments in Financial |
Ellison, Andrew | Analysing the effect of the transport protocol in the |
Weetman, Iain | Animating String Diagrams |
Pawlikowski, Konrad | A Quantum version of coupling of Markov chains |
Seenundun, Simran | A Review of Young Adults’ Experiences Using Discussion |
Dai, Lily | A Robot-Based Simulation of Honeybee Dance Communication |
Whittome, Toby | Assessing the Impact of Board Structure on S&P 500 |
Walden, Max | Bagged Copula-GPFA: A Framework for Estimating Dynamic |
Menon, Adarsh | Bento hidden services: bringing anonymity to Bento servers |
Lavrentieva, Lisa | BIASes and BLUFFS against Reproducible Exploits |
Baldwin, Eric | BioLab: Exploring the Benefits of Gamifying Anatomy |
Karabassis, George | Building a tool for demonstrating web security |
Shrimpton, Aria | Candelabra: Efficient selection of ideal container |
Manocha, Suryansh | Causality Methods for Dementia Risk Inference |
Sokolovski, Gleb | Clash Of Sudokers: Revolutionising Engagement with a |
Szilagyi, Bence | Combining Two Hindsight Approaches in Reinforcement |
Praveen, Pranith | CommED: An Interactive 3D Commutative Diagram Creator With |
Gillespie, Thomas | Comparative Analysis of Algorithmic Approaches for Mapping |
Yin, Amy | Concurrent Games in Agda |
Andrusz, Lea | Continuing work on MarkEd: the tool for marking, moderation |
Maly, Jakub | Data-centric programming in Haskell |
Futera, Filip | Data-driven analysis of the impact of PM2.5 exposure on |
Amar, Lucas | Data Pipeline to Create a Comprehensive Dataset and |
Hashim, Ayaan | David vs. Goliath: Comparing Performance of fork() in |
Aydogan, Enes | Detecting and combatting misinformation online during |
Namukombo, Martin | Developing a Bemba Morphological analyser |
Lister, Elliot | Development of a Biophysical Model of Lower Urinary Tract |
Tudor, Tom | Development of SudoDuel: A Competitive Online Multiplayer |
Gustafsson Frennert, Jonathan | Differentiable Simulation for Self-Supervised System |
Liu, Guifu | Discriminative Coherence Evaluation with Discourse Role |
Coretchi, Armand | Divisualise! An Extensible, Interactive, Divide-and-Conquer |
Fleitas Sanchez, Josué | Dynamic Neural Architectures for Efficient Self-Supervised |
Manapoty, Bhavith | Echoes of Movement: Assessing the Viability of Radar |
Oswin, Max | Efficient Detection for Acoustic Biodiversity Monitoring |
Li, Qinyi | Efficient Pre-Training Using FractalNet for Adaptation to |
Iwanczuk, Julia | E-learning accessibility in higher education - developing |
Liu, Evan | Enhancing EMG Gesture Recognition:Overcoming Limb Positions |
Bell, Rory | Estimating Wildlife Spatial Distributions from |
Kniter, Zosia | Ethics Education in UK Computing Degrees: Current Practices |
Geng, Shikai | Evaluating perception system robustness for AV applications |
Shao, Yubo | Evaluating the Security of HTTP/2 and HTTP/3 Against |
Chen, Toni | Explanation-Driven Text Classification and its Application |
Shaw, Rhiannon | Exploring Emphasis Selection: Is it just a matter of |
Hiropedi, Andreas | ezSTEP: an online platform for training and testing machine |
Konstantinou, Demetris | Fair Allocation of Indivisible Goods: Experiments and |
Somerset, Rachel | Fair data structures for stronger performance isolation |
Bobak, Cosmo | General Game Playing with pUCT and Deep RL |
Tajali, Nickon | Generating Account Access Graphs Using Open-Source |
-, Nisiman | Generating Synthetic Data for Privacy Research |
Amonkar, Neel | HaskellQuest: a game for teaching functional programming in |
Segboer, Daniel | HaskellQuest: Can a Fun Game be Educational? |
Ozawa, Natsuhiko | Implementation of Computational Social Choice Algorithms |
Li, Ethan | Implementing Non-Malleable Zero Knowledge |
Carslaw, Ramsay | Implementing UNIX with Effects Handlers |
Zhang, Zhonghe | Improving Menu Localization with Culture-Aware Language |
Kim, Daniel | InfoCorpus: Generalising Hedge-Related Tasks Across |
Zhang, Shuyuan | Inverse Procedural Modeling: From Sketches to Buildings |
Murphy, Alex | Investigating Robustness of Deepfake Detectors under |
Tait, Alistair | Let's-a Go!: Building a System for Autonomous Robotic |
Drucker, Dylan | Let’s Get Cracking: Leveraging Gameplay from an |
Slater, Steven | Leveraging Large Language Models for Vulnerability |
Ward, James | Machine Learning and Metric Magnitude |
Sabockis, Neilas | Making a Game About Life With Dementia |
Sewell, Antonia | Multi-Agent modelling, powered by ProbLog |
Haussmann, Aden | Multilingual Table-to-Text Generation with Question-Answer |
Choraria, Sashank | Multi-Objective Reinforcement Learning |
Gupta, Pranav | Multi-Objective Reinforcement Learning |
Burggraaff, Niklas | Native support for bag operations in SQLite |
Zhang, Xuhan | Non-malleable Zero-Knowledge Primitives |
Eyre, Alexander | Optimising Taylor Model Computations |
Barbour, Jacob | Parallel Algorithmic Patterns in Java |
Wilson, Christopher | Parsing Commutative Diagrams |
Vu, Kuan Lon | Perception-Hacking with Uncompressed Image Transmission in |
Bitsika, Marian | Predicting Company Closing Prices: Exploring Informatics |
Zhou, Varian | Predicting Moonlighting Proteins on the Protein-Protein |
Rao, Rohan | Predicting Personal Exposure to Airborne Fine Particulate |
O'Brien, Dayyán | Prompting Numerical Commonsense Reasoning across Languages |
Boylan, Dermott | PSP over QUIC: Securing Internet Traffic While Supporting |
Takano, Yuto | Public Cloud Deployment and Monitoring of Cloud-Native |
Cooper, Daniel | PyTac: A Python Based Tool for Tactic Evaluation on Account |
Bai, Jin | Quantum Circuit Simulations Leveraging NvLink and Qubit |
Wyrwal, Kacper | Residual Deep Gaussian Processes on Hyperspheres |
Ou, Litu | Retrieval Enhanced Long Document Summarization with |
Kazamia, Marina | Self-Supervised Representation Learning for |
High, Iain | Semi-Supervised Approaches to the Video Mirror Detection |
Jiang, Yinsicheng | SR-KNN: A High-Performance Fixed-Radius KNN Search with |
Xiong, Cong | Stramash-Qemu: A Cache Coherent, Heterogeneous-ISA |
Sparrow, Paula | Students' experience with using social media for a sense of |
Aesopou, Nephele | Studying the effect of GPT-3 Technology (Copilot) on User |
Imrie, Ruby | Supporting humanitarian efforts in Afghanistan: a framework |
Bajracharya, Ojaswee | Supporting humanitarian efforts in Afghanistan: Developing |
Ferguson, Nicole | Synaptic protein protein interactions for insights into |
Joshi, Angus | Tarski Fixed Point Computation and Related Problems in |
Crampton, Chris | The Behaviour and Efficacy of Using Adiabatic Quantum |
Terranova, Alessandra | The Best of Both Worlds: Retrieval Augmented Generation for |
Zhu, Lawrence | ThermoHands: A Benchmark for 3D Hand Pose Estimation from |
Bezdek, Krystof | Tool for Teaching Web Application Exploits and Defences |
Norman, Ben | Toward a Technology to Help Children With Autism Overcome |
Margaritescu, Flori | Towards Improving Machine Learning Models for Predicting |
Morassi Del Blanco, Roberto | Trajectory planning for a differential drive robot |
Maciulis, Mantas | Trylinks 2023 |
Chalmers, Euan | UML Class Diagram Feedback Tool |
Dixon, Lloyd | Understanding the Factors That Affect Computer Science |
Leask, Callum | Using Interactive Games as a Dark Pattern Teaching Tool |
O'Sullivan, Laura | Using Large Language Models for Drug Discovery |
Bulloch, Laura | Veterinary Cardiopulmonary Arrest and Resuscitation |
McClymont, Cameron | Visualising Bias and Missing Data in the National |
Keane, Orlagh | Visualising the National Library’s Publication Data |
Lu, Zheng | Wait! What was the question again? A Self-Awareness Defense |
Clavier, Paul | WebAssembly on Embedded Platforms: Here Just-In-Time |