CS-E4000 - Seminar in Computer Science D, Lecture, 5.9.2022-10.12.2022
Kurssiasetusten perusteella kurssi on päättynyt 10.12.2022 Etsi kursseja: CS-E4000
Assigned topics
Suorituksen vaatimukset
Index | Student name | Student number | Assigned topics | Topic name |
1 | yejun zhang | 1001707 | TT | Efficient methods for uncertainty in Deep learning |
2 | Giancarlo Andriano | 100545339 | SH | Cryptocurrencies price predictions using effective factors |
3 | Pierre Chapeau | 100653043 | BL | Adversarial attacks and defenses |
4 | Félix Lepeltier | 100653920 | AD | Recent advances in Reinforcement Learning |
5 | Zunaira Salam | 100666755 | MK | Low Latency, Low Loss, Scalable Throughput (L4S) Protocol |
6 | Kiran Joy Kulangara | 1012275 | SS3 | Psychometry for researching usable security |
7 | Johanna Sänger | 1029161 | SS1 | Security indicators and warnings |
8 | Aaro Isomäki | 473886 | JH | Adapting Kubernetes for Fog Computing |
9 | Veli-Matti Rantanen | 480798 | CB | Computer-aided proofs for cryptography |
10 | Tarmo Asikainen | 543596 | LC | Semantic interoperability for automotive vertical |
11 | Jussi Impiö | 591946 | CB | Computer-aided proofs for cryptography |
12 | Timo Nappa | 593368 | SS3 | Psychometry for researching usable security |
13 | Jaakko Perttula | 603287 | PM2 | Service Discovery (Mechanisms) in Distributed Networked Environment |
14 | Antti Nousiainen | 648530 | MD | Container isolation beyond namespaces |
15 | Joona Ahonen | 651323 | CB | Computer-aided proofs for cryptography |
16 | Samuel Lindström | 652717 | SS2 | Usability of passwords |
17 | Anton Sulkava | 653897 | HK2 | Passive IoT solutions for 6G |
18 | Markus Tuominen | 654126 | AY | Microservices - when and how to use them |
19 | Petrus Asikainen | 654595 | CB | Computer-aided proofs for cryptography |
20 | Oskari Järvinen | 655361 | PM3 | (Semantic) Service Discovery for Fog, Edge, and Web |
21 | akshenndra garg | 661711 | LT1 | Debugging, Logging and Monitoring ML Systems: Techniques and Tools |
22 | Iiris Joutsi | 707015 | SS2 | Usability of passwords |
23 | Kerkko Karttunen | 707316 | BL | Adversarial attacks and defenses |
24 | Dennis Marttinen | 708784 | AY | Microservices - when and how to use them |
25 | Juho Pousi | 709709 | AY | Microservices - when and how to use them |
26 | Joel Rämö | 710086 | AH | Inference in human-AI interaction |
27 | Sandeep Aryal | 717911 | VH | Intent-Based Networking |
28 | Elias Peltonen | 729297 | AD | Recent advances in Reinforcement Learning |
29 | Joonas Harjumäki | 77048D | VH | Intent-Based Networking |
30 | Hung Nguyen | 827665 | CB | Computer-aided proofs for cryptography |
31 | Valentin Ionita | 994420 | MD | Container isolation beyond namespaces |
32 | Yue Wan | 996321 | AU | Misinformation classification and community detection on Twitter |
33 | Vishal Verma | 997359 | MD | Container isolation beyond namespaces |
34 | Aleksi Hirvensalo | 728719 | MD | Container isolation beyond namespaces |
35 | Ashok Dhungana | 999263 | AY | Microservices - when and how to use them |
36 | Christian Montecchiani | 100655834 | VR | Modern Generative Modelling Landscape |
37 | Nami Naziri | 100879694 | AB | A Survey on Data-Driven Animation Techniques |
38 | Tiia-Maria Hyvönen | 730079 | TH | Comparison of current Identity Management Solutions/technologies |
39 | Nicholas Saarela | 294120 | JL | Interactive global illumination algorithms based on ray tracing |
Viimeksi muutettu: torstaina 15. syyskuuta 2022, 12.56