CS-E400002 - Seminar in Computer Science D, Lecture, 10.1.2022-22.4.2022
This course space end date is set to 22.04.2022 Search Courses: CS-E400002
Assigned topics
Krav för slutförande
Family Name | Name | Topic |
Serkova | Elena | TJ1 : Active learning |
Rathi | Jayshree | AYJ: Microservices - when and how to use them |
Karakaş | Buket | AYJ: Microservices - when and how to use them |
Yagublu | Jeyhun | AD: Deep Reinforcement Learning and Games |
Vasudevan | Anand | TA4: Firewalls and filtering policies for small networks |
Bertocchi | Massimo | TA1: Optimizing firewall policies |
Moustafa | Mariam Moustafa | WM: Task Allocation for Vehicular Fog Computing |
Bakić | Bojana | AYJ: Microservices - when and how to use them |
Alkhafaji | Husamu Aldeen | SS2: Continuous Behavioral Authentication |
Calabrese | Matteo | TA4: Firewalls and filtering policies for small networks |
Javid | Sepehr | TA4: Firewalls and filtering policies for small networks |
Sakaoğlu | Sinan | WM: Task Allocation for Vehicular Fog Computing |
Khatiwada | Bipin | LC: Theoretical Framework for Cloud Computing Network Measurements |
Lekkala | Soumya | VH: Co-inference techniques for Edge and Fog computing |
Tengana Hurtado | Lizzy | WM: Task Allocation for Vehicular Fog Computing |
Chiarelli | Alessandro | CB: Identity-hiding key exchange |
Safargalieva | Anastasia | TA1: Optimizing firewall policies |
Jiang | Guangkai | YT: Image generation with generative models |
Henriksson | Kasper Anton Alexander | KKH: Approximation Algorithms for Clustering Problems |
Rumi Chiapella | Stefano | SS1: Biometric authentication beyond fingers and eyes |
Howard Baker | Julian Jessen | SS1: Biometric authentication beyond fingers and eyes |
Limbago | Josephus Jasper Datoy | SS2: Continuous Behavioral Authentication |
Valencia Gómez | Juan Pablo | LG: Tools and techniques for formal verification |
Zhao | Zetong | TA2: Detecting anomalies in firewall configurations |
Lasocki | Karol Jakub | SS: CNN over unordered sets |
Zhou | Zixin | WM: Task Allocation for Vehicular Fog Computing |
Sipilä | Heikki Santeri | LC: Theoretical Framework for Cloud Computing Network Measurements |
Pham Thi | Song Huong | CB: identity-hiding key exchange |
Hamid | Maryum | YT: Image generation with generative models |
Liu | Zixuan | AD: Deep Reinforcement Learning and Games |
Pohjola | Peter Otso Daniel | CB: identity-hiding key exchange |
Friman | Otso Kasperi | TA4: Firewalls and filtering policies for small networks |
Spiering | Martin | TA4: Firewalls and filtering policies for small networks |
Balassa | Ádám | LG: Tools and techniques for formal verification |
Wickström | John Felix | JH: Asymmetric multi-core scheduling |
Pekkola | Marko Tapani | AV1: Object tracking for mobile augmented reality |
Zsemberi | Dániel Balázs | NHK: Animating Virtual Characters with Deep Neural Networks |
Shchevyeva | Alena | NHK: Animating Virtual Characters with Deep Neural Networks |
Valtonen | Valtteri Matias | AV1: Object tracking for mobile augmented reality |
Ren | Kun | TA3: Layer-2 integrity protection |
Zhu | Yifan | ALJ4: Explainable Empirical Risk Minimization |
Kanerva | Sara Martina | CB: identity-hiding key exchange |
Linjama | Aapo Jukanpoika | MK:A survey of deterministic networking |
Lehtinen | Joose Erkki Juhani | TA2: Detecting anomalies in firewall configurations |
Facchini | Stefano | AA: Aalto startup ecosystem (and/ or University ecosystem for student (and/or research-based and deep tech) startups |
Suman | Dan | ALJ2: Networked Federated Learning |
Mairue | Sami Petteri | AV1: Object tracking for mobile augmented reality |
Gomes | Lendl Leo | AA: Aalto startup ecosystem (and/ or University ecosystem for student (and/or research-based and deep tech) startups |
Arte | Elias Viljami | AV1: Object tracking for mobile augmented reality |
Gupta | Suresh Sikandarprasad | AA: Aalto startup ecosystem (and/ or University ecosystem for student (and/or research-based and deep tech) startups |
Räsänen | Tommi Vilhelm | JH: Asymmetric multi-core scheduling |
Gouila | Bastien | ALJ2: Networked Federated Learning |
Pirhonen | Anton | ALJ4: Explainable Empirical Risk Minimization |
Chiarelli | Alessandro | Individual topic |
Pham | Huong | Individual topic |
Kaukiainen | Sergei | Individual topic |
Senast redigerad: fredag, 21 januari 2022, 12:55