PDXScholar logo with slogan Access for All.

Home > School, College, or Department > MCECS > Computer Science > Dissertations and Theses

Computer Science Dissertations and Theses

Theses/dissertations from 2024 2024.

Design and Test of Asynchronous Systems Using the Link and Joint Model , Ebelechukwu Esimai (Dissertation)

MmWave RAT Optimization: MAC Layer Initial Access Design and Transport Layer Integration , Suresh Srinivasan (Dissertation)

Designing for Deployable, Secure, and Generic Machine Learning Systems , Li-Yun Wang (Dissertation)

Theses/Dissertations from 2023 2023

Seeing in the Dark: Towards Robust Pedestrian Detection at Nighttime , Afnan Althoupety (Dissertation)

A Deep Hierarchical Variational Autoencoder for World Models in Complex Reinforcement Learning Environments , Sriharshitha Ayyalasomayajula (Thesis)

Toward Efficient Rendering: A Neural Network Approach , Qiqi Hou (Dissertation)

Energy Auction with Non-Relational Persistence , Michael Ramez Howard (Thesis)

Implementing a Functional Logic Programming Language via the Fair Scheme , Andrew Michael Jost (Dissertation)

Multi-Agent Deep Reinforcement Learning for Radiation Localization , Benjamin Scott Totten (Thesis)

Theses/Dissertations from 2022 2022

Using Intrinsically-Typed Definitional Interpreters to Verify Compiler Optimizations in a Monadic Intermediate Language , Dani Barrack (Thesis)

An Automated Zoom Class Session Analysis Tool to Improve Education , Jack Arlo Cannon II (Thesis)

Scaling EPA-RIMM with Multicore System Management Interrupt Handlers , Alexander K. Freed (Thesis)

Unpaired Style Transfer Conditional Generative Adversarial Network for Scanned Document Generation , David Jonathan Hawbaker (Thesis)

Toward Analyzing the Diversity of Extractive Summaries , Aaron David Hudson (Thesis)

Making Curry with Rice: An Optimizing Curry Compiler , Steven Libby (Dissertation)

Domain Knowledge as Motion-Aware Inductive Bias for Deep Video Synthesis: Two Case Studies , Long Mai (Dissertation)

Theses/Dissertations from 2021 2021

Efficient Neuromorphic Algorithms for Gamma-Ray Spectrum Denoising and Radionuclide Identification , Merlin Phillip Carson (Thesis)

Storing Intermediate Results in Space and Time: SQL Graphs and Block Referencing , Basem Ibrahim Elazzabi (Dissertation)

Automated Test Generation for Validating SystemC Designs , Bin Lin (Dissertation)

Forecasting Optimal Parameters of the Broken Wing Butterfly Option Strategy Using Differential Evolution , David Munoz Constantine (Thesis)

Situate: An Agent-Based System for Situation Recognition , Max Henry Quinn (Dissertation)

Theses/Dissertations from 2020 2020

Multiple Diagram Navigation , Hisham Benotman (Dissertation)

Smart Contract Vulnerabilities on the Ethereum Blockchain: a Current Perspective , Daniel Steven Connelly (Thesis)

Extensible Performance-Aware Runtime Integrity Measurement , Brian G. Delgado (Dissertation)

Novel View Synthesis - a Neural Network Approach , Hoang Le (Dissertation)

Exploring the Potential of Sparse Coding for Machine Learning , Sheng Yang Lundquist (Dissertation)

Workflow Critical Path: a Data-Oriented Path Metric for Holistic HPC Workflows , Daniel D. Nguyen (Thesis)

Novel View Synthesis in Time and Space , Simon Niklaus (Dissertation)

Balancing Security, Performance and Deployability in Encrypted Search , David Joel Pouliot (Dissertation)

Theses/Dissertations from 2019 2019

A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games , Naif Saeed Alzahrani (Dissertation)

Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series , Logan Blakely (Thesis)

Local Radiance , Scott Peter Britell (Dissertation)

Correct-by-Construction Typechecking with Scope Graphs , Katherine Imhoff Casamento (Thesis)

Versatile Binary-level Concolic Testing , Bo Chen (Dissertation)

Crumpled and Abraded Encryption: Implementation and Provably Secure Construction , Scott Sherlock Griffy (Thesis)

Knowing Without Knowing: Real-Time Usage Identification of Computer Systems , Leila Mohammed Hawana (Thesis)

Design and Experimental Evaluation of DeepMarket: an Edge Computing Marketplace with Distributed TensorFlow Execution Capability , Soyoung Kim (Thesis)

Localizing Little Landmarks with Transfer Learning , Sharad Kumar (Thesis)

Context-Aware Wi-Fi Infrastructure-based Indoor Positioning Systems , Huy Phuong Tran (Dissertation)

Theses/Dissertations from 2018 2018

Bounding Box Improvement with Reinforcement Learning , Andrew Lewis Cleland (Thesis)

Sensing Building Structure Using UWB Radios for Disaster Recovery , Jeong Eun Lee (Dissertation)

Annotation-Enabled Interpretation and Analysis of Time-Series Data , Niveditha Venugopal (Thesis)

EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments , Tejaswini Ajay Vibhute (Thesis)

Theses/Dissertations from 2017 2017

Improved Scoring Models for Semantic Image Retrieval Using Scene Graphs , Erik Timothy Conser (Thesis)

Refining Bounding-Box Regression for Object Localization , Naomi Lynn Dickerson (Thesis)

Fully Generic Programming Over Closed Universes of Inductive-Recursive Types , Larry Diehl (Dissertation)

Communicating at Terahertz Frequencies , Farnoosh Moshirfatemi (Dissertation)

Designing In-Headset Authoring Tools for Virtual Reality Video , Cuong Nguyen (Dissertation)

Certifying Loop Pipelining Transformations in Behavioral Synthesis , Disha Puri (Dissertation)

Power-Aware Datacenter Networking and Optimization , Qing Yi (Dissertation)

Theses/Dissertations from 2016 2016

Identifying Relationships between Scientific Datasets , Abdussalam Alawini (Dissertation)

Information Representation and Computation of Spike Trains in Reservoir Computing Systems with Spiking Neurons and Analog Neurons , Amin Almassian (Thesis)

Investigations of an "Objectness" Measure for Object Localization , Lewis Richard James Coates (Thesis)

Image Stitching: Handling Parallax, Stereopsis, and Video , Fan Zhang (Dissertation)

Theses/Dissertations from 2015 2015

Novel Methods for Learning and Adaptation in Chemical Reaction Networks , Peter Banda (Dissertation)

Post-silicon Functional Validation with Virtual Prototypes , Kai Cong (Dissertation)

Novel Cryptographic Primitives and Protocols for Censorship Resistance , Kevin Patrick Dyer (Dissertation)

Hardware/Software Interface Assurance with Conformance Checking , Li Lei (Dissertation)

Leveraging Contextual Relationships Between Objects for Localization , Clinton Leif Olson (Thesis)

The Performance of Random Prototypes in Hierarchical Models of Vision , Kendall Lee Stewart (Thesis)

Tweakable Ciphers: Constructions and Applications , Robert Seth Terashima (Dissertation)

Scalable Equivalence Checking for Behavioral Synthesis , Zhenkun Yang (Dissertation)

Theses/Dissertations from 2014 2014

The Nax Language: Unifying Functional Programming and Logical Reasoning in a Language based on Mendler-style Recursion Schemes and Term-indexed Types , Ki Yung Ahn (Dissertation)

Using Spammers' Computing Resources for Volunteer Computing , Thai Le Quy Bui (Thesis)

Towards Constructing Interactive Virtual Worlds , Francis Chang (Dissertation)

System-wide Performance Analysis for Virtualization , Deron Eugene Jensen (Thesis)

Advances in Piecewise Smooth Image Reconstruction , Ralf Juengling (Dissertation)

Interpretable Machine Learning and Sparse Coding for Computer Vision , Will Landecker (Dissertation)

Optimizing Data Movement in Hybrid Analytic Systems , Patrick Michael Leyshock (Dissertation)

Ranked Similarity Search of Scientific Datasets: An Information Retrieval Approach , Veronika Margaret Megler (Dissertation)

Using GIST Features to Constrain Search in Object Detection , Joanna Browne Solmon (Thesis)

The Role of Prototype Learning in Hierarchical Models of Vision , Michael David Thomure (Dissertation)

Theses/Dissertations from 2013 2013

Object Detection and Recognition in Natural Settings , George William Dittmar (Thesis)

Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications , Akshay Dua (Dissertation)

Equivalence Checking for High-Assurance Behavioral Synthesis , Kecheng Hao (Dissertation)

Type Classes and Instance Chains: A Relational Approach , John Garrett Morris (Dissertation)

Theses/Dissertations from 2012 2012

Using Dataflow Optimization Techniques with a Monadic Intermediate Language , Justin George Bailey (Thesis)

A Survey and Analysis of Solutions to the Oblivious Memory Access Problem , Erin Elizabeth Chapman (Thesis)

A Data-Descriptive Feedback Framework for Data Stream Management Systems , Rafael J. Fernández Moctezuma (Dissertation)

Extending Relativistic Programming to Multiple Writers , Philip William Howard (Dissertation)

The Basic Scheme for the Evaluation of Functional Logic Programs , Arthur Peters (Thesis)

The Link Between Image Segmentation and Image Recognition , Karan Sharma (Thesis)

Relativistic Causal Ordering A Memory Model for Scalable Concurrent Data Structures , Josh Triplett (Dissertation)

Theses/Dissertations from 2011 2011

Conceptual Modeling of Data with Provenance , David William Archer (Dissertation)

Low-latency Estimates for Window-Aggregate Queries over Data Streams , Amit Bhat (Thesis)

Information Processing in Two-Dimensional Cellular Automata , Martin Cenek (Dissertation)

Scalable and Efficient Tasking for Dynamic Sensor Networks , Thanh Xuan Dang (Dissertation)

On the Effect of Topology on Learning and Generalization in Random Automata Networks , Alireza Goudarzi (Thesis)

HOLCF '11: A Definitional Domain Theory for Verifying Functional Programs , Brian Charles Huffman (Dissertation)

A Functional Approach to Memory-Safe Operating Systems , Rebekah Leslie (Dissertation)

Factoring Semiprimes Using PG2N Prime Graph Multiagent Search , Keith Eirik Wilson (Thesis)

High Speed Wireless Networking for 60GHz , Candy Yiu (Dissertation)

Theses/Dissertations from 2010 2010

Extensible Scheduling in a Haskell-based Operating System , Kenneth William Graunke (Thesis)

Addressing Automated Adversaries of Network Applications , Edward Leo Kaiser (Dissertation)

An Automata-Theoretic Approach to Hardware/Software Co-verification , Juncao Li (Dissertation)

Practical Type Inference for the GADT Type System , Chuan-kai Lin (Dissertation)

Scalable event tracking on high-end parallel systems , Kathryn Marie Mohror (Dissertation)

Performance Analysis of Hybrid CPU/GPU Environments , Michael Shawn Smith (Thesis)

Theses/Dissertations from 2009 2009

Computational Techniques for Reducing Spectra of the Giant Planets in Our Solar System , Holly L. Grimes (Thesis)

Programmer Friendly Refactoring Tools , Emerson Murphy-Hill (Dissertation)

Advanced Search

  • Notify me via email or RSS
  • Featured Collections
  • All Authors
  • Schools & Colleges
  • Dissertations & Theses
  • PDXOpen Textbooks
  • Conferences
  • Collections
  • Disciplines
  • Faculty Expert Gallery
  • Submit Research
  • Faculty Profiles
  • Terms of Use
  • Feedback Form

Home | About | My Account | Accessibility Statement | Portland State University

Privacy Copyright

ODU Digital Commons

Home > Sciences > Computer Science > ETDs

Computer Science Theses & Dissertations

Theses and dissertations published by graduate students in the Department of Computer Science, College of Sciences, Old Dominion University, since Fall 2016 are available in this collection. Backfiles of all dissertations (and some theses) have also been added.

In late Fall 2023 or Spring 2024, all theses will be digitized and available here. In the meantime, consult the Library Catalog to find older items in print.

Theses/Dissertations from 2024 2024

Thesis: Study of Deep Learning Models to Classify Nasa’s Kepler Light Curves , Heena Minnich

Theses/Dissertations from 2023 2023

Dissertation: Inverse Mappers for QCD Global Analysis , Manal Almaeen

Thesis: Assessing the Prevalence and Archival Rate of URIs to Git Hosting Platforms in Scholarly Publications , Emily Escamilla

Thesis: Supporting Account-based Queries for Archived Instagram Posts , Himarsha R. Jayanetti

Dissertation: Detecting Malware With Securedeep Accelerator via Processor Side-Channel Fingerprinting for Internet of Things , Zhuoran Li

Dissertation: Tracing and Segmentation of Molecular Patterns in 3-Dimensional Cryo-ET/EM Density Maps Through Algorithmic Image Processing and Deep Learning-Based Techniques , Salim Sazzed

Dissertation: Towards Intelligent Runtime Framework for Distributed Heterogeneous Systems , Polykarpos Thomadakis

Theses/Dissertations from 2022 2022

Dissertation: Machine Learning-Based Event Generator , Yasir Alanazi

Thesis: Using Ensemble Learning Techniques to Solve the Blind Drift Calibration Problem , Devin Scott Drake

Dissertation: A Relevance Model for Threat-Centric Ranking of Cybersecurity Vulnerabilities , Corren G. McCoy

Dissertation: Evaluation of Generative Models for Predicting Microstructure Geometries in Laser Powder Bed Fusion Additive Manufacturing , Andy Ramlatchan

Thesis: TransParsCit: A Transformer-Based Citation Parser Trained on Large-Scale Synthesized Data , MD Sami Uddin

Dissertation: Towards Privacy and Security Concerns of Adversarial Examples in Deep Hashing Image Retrieval , Yanru Xiao

Theses/Dissertations from 2021 2021

Dissertation: MOVE: Mobile Observers Variants and Extensions , Ryan Florin

Dissertation: Improving Collection Understanding for Web Archives with Storytelling: Shining Light Into Dark and Stormy Archives , Shawn M. Jones

Dissertation: A Unified Framework for Parallel Anisotropic Mesh Adaptation , Christos Tsolakis

Theses/Dissertations from 2020 2020

Dissertation: MementoMap: A Web Archive Profiling Framework for Efficient Memento Routing , Sawood Alam

Dissertation: A Framework for Verifying the Fixity of Archived Web Resources , Mohamed Aturban

Thesis: Parallelization of the Advancing Front Local Reconnection Mesh Generation Software Using a Pseudo-Constrained Parallel Data Refinement Method , Kevin Mark Garner Jr.

Dissertation: Towards Dynamic Vehicular Clouds , Aida Ghazizadeh

Dissertation: Bootstrapping Web Archive Collections From Micro-Collections in Social Media , Alexander C. Nwala

Dissertation: Automatic Linear and Curvilinear Mesh Generation Driven by Validity Fidelity and Topological Guarantees , Jing Xu

Theses/Dissertations from 2019 2019

Dissertation: Expanding the Usage of Web Archives by Recommending Archived Webpages Using Only the URI , Lulwah M. Alkwai

Dissertation: Highly Accurate Fragment Library for Protein Fold Recognition , Wessam Elhefnawy

Dissertation: Scalable Parallel Delaunay Image-to-Mesh Conversion for Shared and Distributed Memory Architectures , Daming Feng

Dissertation: Aggregating Private and Public Web Archives Using the Mementity Framework , Matthew R. Kelly

Thesis: Enhancing Portability in High Performance Computing: Designing Fast Scientific Code with Longevity , Jason Orender

Thesis: Novel Use of Neural Networks to Identify and Detect Electrical Infrastructure Performance , Evan Pierre Savaria

Theses/Dissertations from 2018 2018

Dissertation: New Methods to Improve Protein Structure Modeling , Maha Abdelrasoul

Dissertation: Applying Machine Learning to Advance Cyber Security: Network Based Intrusion Detection Systems , Hassan Hadi Latheeth AL-Maksousy

Thesis: To Relive the Web: A Framework for the Transformation and Archival Replay of Web Pages , John Andrew Berlin

Thesis: Supporting Big Data at the Vehicular Edge , Lloyd Decker

Thesis: Deep Learning for Segmentation Of 3D Cryo-EM Images , Devin Reid Haslam

Dissertation: FlexStream: SDN-Based Framework for Programmable and Flexible Adaptive Video Streaming , Ibrahim Ben Mustafa

Thesis: Novel Technique for Gait Analysis Using Two Waist Mounted Gyroscopes , Ahmed Nasr

Dissertation: Leveraging Resources on Anonymous Mobile Edge Nodes , Ahmed Salem

Theses/Dissertations from 2017 2017

Dissertation: SenSys: A Smartphone-Based Framework for ITS applications , Abdulla Ahmed Alasaadi

Dissertation: ItsBlue: A Distributed Bluetooth-Based Framework for Intelligent Transportation Systems , Ahmed Awad Alghamdi

Dissertation: Finite Element Modeling Driven by Health Care and Aerospace Applications , Fotios Drakopoulos

Dissertation: Efficient Machine Learning Approach for Optimizing Scientific Computing Applications on Emerging HPC Architectures , Kamesh Arumugam Karunanithi

Thesis: Multi-GPU Accelerated High-Fidelity Simulations of Beam-Beam Effects in Particle Colliders , Naga Sai Ravi Teja Majeti

Theses/Dissertations from 2016 2016

Dissertation: Using Web Archives to Enrich the Live Web Experience Through Storytelling , Yasmin AlNoamany

Thesis: Magnopark, Smart Parking Detection Based on Cellphone Magnetic Sensor , Maryam Arab

Dissertation: Scripts in a Frame: A Framework for Archiving Deferred Representations , Justin F. Brunelle

Dissertation: Machine Learning Methods for Brain Image Analysis , Ahmed Fakhry

Dissertation: Novel Monte Carlo Methods for Large-Scale Linear Algebra Operations , Hao Ji

Dissertation: Machine Learning Methods for Medical and Biological Image Computing , Rongjian Li

Dissertation: Toward Open and Programmable Wireless Network Edge , Mostafa Uddin

Thesis: An Optimized Multiple Right-Hand Side Dslash Kernel for Intel Xeon Phi , Aaron Walden

Dissertation: Towards Aggregating Time-Discounted Information in Sensor Networks , Xianping Wang

Dissertation: A Computational Framework for Learning from Complex Data: Formulations, Algorithms, and Applications , Wenlu Zhang

Theses/Dissertations from 2015 2015

Dissertation: Efficient Algorithms for Prokaryotic Whole Genome Assembly and Finishing , Abhishek Biswas

Dissertation: De Novo Protein Structure Modeling and Energy Function Design , Lin Chen

Dissertation: High Performance Large Graph Analytics by Enhancing Locality , Naga Shailaja Dasari

Thesis: Avoiding Spoilers on Mediawiki Fan Sites Using Memento , Shawn M. Jones

Dissertation: Energy Harvesting-Aware Design for Wireless Nanonetworks , Shahram Mohrehkesh

Thesis: Parallel Two-Dimensional Unstructured Anisotropic Delaunay Mesh Generation for Aerospace Applications , Juliette Kelly Pardue

Dissertation: Detecting, Modeling, and Predicting User Temporal Intention , Hany M. SalahEldeen

Dissertation: Wireless Networking for Vehicle to Infrastructure Communication and Automatic Incident Detection , Sarwar Aziz Sha-Mohammad

Dissertation: Computational Development for Secondary Structure Detection From Three-Dimensional Images of Cryo-Electron Microscopy , Dong Si

Thesis: Mobile Cloud Computing Based Non Rigid Registration for Image Guided Surgery , Arun Brahmavar Vishwanatha

Theses/Dissertations from 2014 2014

Dissertation: Web Archive Services Framework for Tighter Integration Between the Past and Present Web , Ahmed AlSum

Dissertation: Modeling Stem Cell Population Dynamics , Samiur Arif

Dissertation: A Framework for Web Object Self-Preservation , Charles L. Cartledge

Dissertation: Document Classification in Support of Automated Metadata Extraction Form Heterogeneous Collections , Paul K. Flynn

Dissertation: Resource Allocation in Vehicular Cloud Computing , Puya Ghazizadeh

Thesis: Generating Combinatorial Objects- A New Perspective , Alexander Chizoma Nwala

Dissertation: Enhancing Understanding of Discrete Event Simulation Models Through Analysis , Kara Ann Olson

Dissertation: Scalable Reasoning for Knowledge Bases Subject to Changes , Hui Shi

Dissertation: Improving Structural Features Prediction in Protein Structure Modeling , Ashraf Yaseen

Thesis: Computational Analysis of Gene Expression and Connectivity Patterns in the Convoluted Structures of Mouse Cerebellum , Tao Zeng

Theses/Dissertations from 2013 2013

Thesis: HTTP Mailbox - Asynchronous Restful Communication , Sawood Alam

Dissertation: TDMA Slot Reservation in Cluster-Based VANETs , Mohammad Salem Almalag

Thesis: Protein Loop Length Estimation From Medium Resolution Cryoem Images , Andrew R. McKnight

Theses/Dissertations from 2012 2012

Dissertation: De Novo Protein Structure Modeling from Cryoem Data Through a Dynamic Programming Algorithm in the Secondary Structure Topology Graph , Kamal H. Al Nasr

Dissertation: FRIEND: A Cyber-Physical System for Traffic Flow Related Information Aggregation and Dissemination , Samy S. El-Tawab

Thesis: An Extensible Framework for Creating Personal Archives of Web Resources Requiring Authentication , Matthew Ryan Kelly

Thesis: Visualizing Digital Collections at Archive-It , Kalpesh Padia

Theses/Dissertations from 2011 2011

Dissertation: A Framework for Incident Detection and notification in Vehicular Ad-Hoc Networks , Mahmoud Abuelela

Dissertation: A Framework for Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks , Mohammad Hadi Arbabi

Thesis: A Probabilistic Analysis of Misparking in Reservation Based Parking Garages , Vikas G. Ashok

Thesis: A Penalty-Based Approach to Handling Cluster Sizing in Mobile Ad Hoc Networks , Ryan Florin

Dissertation: Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks , Khaled Ibrahim

Dissertation: Using the Web Infrastructure for Real Time Recovery of Missing Web Pages , Martin Klein

Theses/Dissertations from 2010 2010

Dissertation: A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks , Hady S. Abdel Salam

Thesis: Merging Schemas in a Collaborative Faceted Classification System , Jianxiang Li

Thesis: XPath-Based Template Language for Describing the Placement of Metadata within a Document , Vijay Kumar Musham

Dissertation: Providing Location Security in Vehicular Ad Hoc Networks , Gongjun Yan

Theses/Dissertations from 2009 2009

Dissertation: Algorithms for Vertex-Weighted Matching in Graphs , Mahantesh Halappanavar

Theses/Dissertations from 2008 2008

Thesis: Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods , Rabia Haq

Dissertation: Biology-Inspired Approach for Communal Behavior in Massively Deployed Sensor Networks , Kennie H. Jones

Dissertation: Biological Networks: Modeling and Structural Analysis , Emad Y. Ramadan

Dissertation: Integrating Preservation Functions Into the Web Server , Joan A. Smith

Theses/Dissertations from 2007 2007

Dissertation: FreeLib: A Self-Sustainable Peer-to-Peer Digital Library Framework for Evolving Communities , Ashraf A. Amrou

Thesis: Channel Management in Heterogeneous Cellular Networks , Mohammad Hadi Arbabi

Dissertation: Diagnosing Reading strategies: Paraphrase Recognition , Chutima Boonthum

Thesis: Investigating Real-Time Sonar Performance Predictions Using Beowulf Clustering , Charles Lane Cartledge

Dissertation: Lazy Preservation: Reconstructing Websites from the Web Infrastructure , Frank McCown

Theses/Dissertations from 2006 2006

Dissertation: Group Key Management in Wireless Ad-Hoc and Sensor Networks , Mohammed A. Moharrum

Dissertation: Template-Based Metadata Extraction for Heterogeneous Collection , Jianfeng Tang

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • Author Guidelines
  • Department of Computer Science
  • Other Digital Collections
  • ODU Libraries
  • Old Dominion University

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

  • Harvard Library
  • Research Guides
  • Faculty of Arts & Sciences Libraries

Computer Science Library Research Guide

Find dissertations and theses.

  • Get Started
  • How to get the full-text
  • What is Peer Review?
  • Find Books in the SEC Library This link opens in a new window
  • Find Conference Proceedings
  • Find Patents This link opens in a new window
  • Find Standards
  • Find Technical Reports
  • Find Videos
  • Ask a Librarian This link opens in a new window

Engineering Librarian

Profile Photo

How to search for Harvard dissertations

  • DASH , Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.  Most Ph.D. dissertations submitted from  March 2012 forward  are available online in DASH.
  • Check HOLLIS, the Library Catalog, and refine your results by using the   Advanced Search   and limiting Resource  Type   to Dissertations
  • Search the database  ProQuest Dissertations & Theses Global Don't hesitate to  Ask a Librarian  for assistance.

How to search for Non-Harvard dissertations

Library Database:

  • ProQuest Dissertations & Theses Global

Free Resources:

  • Many  universities  provide full-text access to their dissertations via a digital repository.  If you know the title of a particular dissertation or thesis, try doing a Google search.  

Related Sites

  • Formatting Your Dissertation - GSAS
  • Ph.D. Dissertation Submission  - FAS
  • Empowering Students Before you Sign that Contract!  - Copyright at Harvard Library

Select Library Titles

Cover Art

  • << Previous: Find Conference Proceedings
  • Next: Find Patents >>
  • Last Updated: Feb 27, 2024 1:52 PM
  • URL: https://guides.library.harvard.edu/cs

Harvard University Digital Accessibility Policy

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations

Computer Science and Engineering Theses and Dissertations

Theses/dissertations from 2024 2024.

Automatic Image-Based Nutritional Calculator App , Kejvi Cupa

Individual Behavioral Modeling Across Games of Strategy , Logan Fields

Semi-automated Cell Annotation Framework Using Deep Learning , Abhiram Kandiyana

Predicting Gender of Author Using Large Language Models (LLMs) , Satya Uday Sanku

Context-aware Affective Behavior Modeling and Analytics , Md Taufeeq Uddin

Exploring the Use of Enhanced SWAD Towards Building Learned Models that Generalize Better to Unseen Sources , Brandon M. Weinhofer

Theses/Dissertations from 2023 2023

Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno

Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan

Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros

Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin

Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen

Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur

A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.

Graph Analysis on Social Networks , Shen Lu

Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera

Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo

Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi

Theses/Dissertations from 2022 2022

Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed

Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala

Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen

A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave

On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou

Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang

A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri

Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney

Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin

Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker

Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich

Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar

Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong

Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward

Theses/Dissertations from 2021 2021

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill

Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja

Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev

Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov

Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai

Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri

Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco

Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam

Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava

A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari

Theses/Dissertations from 2020 2020

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal

Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari

Composition of Atomic-Obligation Security Policies , Yan Cao Albright

Action Recognition Using the Motion Taxonomy , Maxat Alibayev

Sentiment Analysis in Peer Review , Zachariah J. Beasley

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov

Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang

Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram

PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami

Composition of Atomic-Obligation Security Policies , Danielle Ferguson

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel

The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez

Privacy-Preserving and Functional Information Systems , Thang Hoang

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi

Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam

Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha

Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath

System Support of Concurrent Database Query Processing on a GPU , Hao Li

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu

Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla

Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng

Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi

Models of Secure Software Enforcement and Development , Hernan M. Palombo

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan

Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah

Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui

Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon

Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna

Theses/Dissertations from 2019 2019

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur

Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed

Phenomena of Social Dynamics in Online Games , Essa Alhazmi

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri

Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao

Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

Home > FACULTIES > Computer Science > CSD-ETD

Computer Science Department

Computer Science Theses and Dissertations

This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository

Theses/Dissertations from 2024 2024

A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani

Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy

Theses/Dissertations from 2023 2023

Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar

Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian

Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh

INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee

Algorithms and Software for Oligonucleotide Design , Qin Dong

Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani

De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han

Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley

A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He

A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh

Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani

Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu

Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li

Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li

DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li

Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai

Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad

The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi

Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam

Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi

Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat

Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul

On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi

Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza

Migration in Edge Computing , Arshin Rezazadeh

A Modified Hopfield Network for the K-Median Problem , Cody Rossiter

Predicting Network Failures with AI Techniques , Chandrika Saha

Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha

An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa

Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia

Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia

IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales

A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani

Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad

Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim

A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba

Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong

Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang

Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar

Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang

Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi

Theses/Dissertations from 2022 2022

The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt

Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy

Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez

Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu

Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte

Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell

Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch

Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh

Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost

Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie

Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka

Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling

Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan

Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti

Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida

False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito

Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford

An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson

Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem

A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid

Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma

Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi

Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis

Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg

Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang

Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang

Predicting and Modifying Memorability of Images , Mohammad Younesi

Theses/Dissertations from 2021 2021

Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed

A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar

Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani

Contrastive Learning of Auditory Representations , Haider Al-Tahan

Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi

Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak

Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman

Improving Reader Motivation with Machine Learning , Tanner A. Bohn

A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang

Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee

A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen

Exploratory Search with Archetype-based Language Models , Brent D. Davis

Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo

Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon

A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du

Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi

Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan

A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar

Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami

Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara

Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani

A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria

Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh

Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour

A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa

WesternAccelerator:Rapid Development of Microservices , Haoran Wei

A Lightweight and Explainable Citation Recommendation System , Juncheng Yin

Mitosis Detection from Pathology Images , Jinhang Zhang

Theses/Dissertations from 2020 2020

Visual Analytics of Electronic Health Records with a focus on Acute Kidney Injury , Sheikh S. Abdullah

Towards the Development of Network Service Cost Modeling-An ISP Perspective , Yasmeen Ali

  • Accessible Formats

Advanced Search

  • Notify me via email or RSS
  • Expert Gallery
  • Online Journals
  • eBook Collections
  • Reports and Working Papers
  • Conferences and Symposiums
  • Electronic Theses and Dissertations
  • Digitized Special Collections
  • All Collections
  • Disciplines

Author Corner

  • Submit Thesis/Dissertation

Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright

©1878 - 2016 Western University

  • DSpace@MIT Home
  • MIT Libraries

This collection of MIT Theses in DSpace contains selected theses and dissertations from all MIT departments. Please note that this is NOT a complete collection of MIT theses. To search all MIT theses, use MIT Libraries' catalog .

MIT's DSpace contains more than 58,000 theses completed at MIT dating as far back as the mid 1800's. Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded.

MIT Theses are openly available to all readers. Please share how this access affects or benefits you. Your story matters.

If you have questions about MIT theses in DSpace, [email protected] . See also Access & Availability Questions or About MIT Theses in DSpace .

If you are a recent MIT graduate, your thesis will be added to DSpace within 3-6 months after your graduation date. Please email [email protected] with any questions.

Permissions

MIT Theses may be protected by copyright. Please refer to the MIT Libraries Permissions Policy for permission information. Note that the copyright holder for most MIT theses is identified on the title page of the thesis.

Theses by Department

  • Comparative Media Studies
  • Computation for Design and Optimization
  • Computational and Systems Biology
  • Department of Aeronautics and Astronautics
  • Department of Architecture
  • Department of Biological Engineering
  • Department of Biology
  • Department of Brain and Cognitive Sciences
  • Department of Chemical Engineering
  • Department of Chemistry
  • Department of Civil and Environmental Engineering
  • Department of Earth, Atmospheric, and Planetary Sciences
  • Department of Economics
  • Department of Electrical Engineering and Computer Sciences
  • Department of Humanities
  • Department of Linguistics and Philosophy
  • Department of Materials Science and Engineering
  • Department of Mathematics
  • Department of Mechanical Engineering
  • Department of Nuclear Science and Engineering
  • Department of Ocean Engineering
  • Department of Physics
  • Department of Political Science
  • Department of Urban Studies and Planning
  • Engineering Systems Division
  • Harvard-MIT Program of Health Sciences and Technology
  • Institute for Data, Systems, and Society
  • Media Arts & Sciences
  • Operations Research Center
  • Program in Real Estate Development
  • Program in Writing and Humanistic Studies
  • Science, Technology & Society
  • Science Writing
  • Sloan School of Management
  • Supply Chain Management
  • System Design & Management
  • Technology and Policy Program

Collections in this community

Doctoral theses, graduate theses, undergraduate theses, recent submissions.

Thumbnail

An Approach to Fault Management Design for the Proposed Mars Sample Return EDL and Ascent Phase Architectures 

Thumbnail

Silicon Photomultipliers as Free Space Optical Communication Sensors 

Thumbnail

Study of Cavity Geometry to Improve Optical Quality of Windows in Hypersonic Flow 

Show Statistical Information

feed

UKnowledge

UKnowledge > College of Engineering > Computer Science > Theses & Dissertations

Theses and Dissertations--Computer Science

Theses/dissertations from 2024 2024.

Extracting Social Network Model Parameters from Social Science Literature , Isaac Batts

LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS , Shashank Gupta

Flexible Attenuation Fields: Tomographic Reconstruction From Heterogeneous Datasets , Clifford S. Parker

Theses/Dissertations from 2023 2023

Small Approximate Pareto Sets with Quality Bounds , William Bailey

Machine-Learning-Powered Cyber-Physical Systems , Enrico Casella

PERSONALIZED POINT OF INTEREST RECOMMENDATIONS WITH PRIVACY-PRESERVING TECHNIQUES , Longyin Cui

Deep Learning-Based Intrusion Detection Methods for Computer Networks and Privacy-Preserving Authentication Method for Vehicular Ad Hoc Networks , Ayesha Dina

Machine Learning Framework for Real-World Electronic Health Records Regarding Missingness, Interpretability, and Fairness , Jing Lucas Liu

Enabling DApps Data Exchange with Hardware-Assisted Secure Oracle Network , Yue Li

Improving Connectivity for Remote Cancer Patient Symptom Monitoring and Reporting in Rural Medically Underserved Regions , Esther Max-Onakpoya

A Secure and Distributed Architecture for Vehicular Cloud and Protocols for Privacy-preserving Message Dissemination in Vehicular Ad Hoc Networks , Hassan Mistareehi

Practical AI Value Alignment Using Stories , Md Sultan Al Nahian

Hard-Hearted Scrolls: A Noninvasive Method for Reading the Herculaneum Papyri , Stephen Parsons

Deep Learning Models for CT Image Standardization , Md Selim

Multi-agent Learning For Game-theoretical Problems , Kshitija Taywade

Peer-to-Peer Energy Trading in Smart Residential Environment with User Behavioral Modeling , Ashutosh Timilsina

The BASIL technique: Bias Adaptive Statistical Inference Learning Agents for Learning from Human Feedback , Jonathan Indigo Watson

Structured Attention for Image Analysis , Xin Xing

Multi-Domain Adaptation for Image Classification, Depth Estimation, and Semantic Segmentation , Yu Zhang

Theses/Dissertations from 2022 2022

Learning a Scalable Algorithm for Improving Betweenness in the Lightning Network , Vincent Davis

Don't Give Me That Story! -- A Human-Centered Framework for Usable Narrative Planning , Rachelyn Farrell

Image Geo-localization with Cross-Attention , Connor Greenwell

Smart Decision-Making via Edge Intelligence for Smart Cities , Nathaniel Hudson

Supporting Stylized Language Models Using Multi-Modality Features , Chengxi Li

The Performance Optimization of ASP Solving Based on Encoding Rewriting and Encoding Selection , Liu Liu

Page 1 of 9

Advanced Search

  • Notify me via email or RSS

Browse by Author

  • Collections
  • Disciplines

Author Corner

  • Submit Research

New Title Here

Below. --> connect.

  • Law Library
  • Special Collections
  • Copyright Resource Center
  • Graduate School
  • Scholars@UK

Logo of Kentucky Research Commons

  • We’d like your feedback

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

University of Kentucky ®

An Equal Opportunity University Accreditation Directory Email Privacy Policy Accessibility Disclosures

Brown Logo

  • About Brown
  • Campus Life

Information for:

  • Current Students
  • Friends & Neighbors
  • A to Z Index
  • People Directory
  • Social@Brown
  • About the Department
  • Systems & Software
  • Socially Responsible    Computing
  • Positions / Jobs
  • Brown CS News
  • Brown CS Blog
  • Our Community
  • Grad Students
  • Ugrad Students
  • Research Links
  • Publications
  • Opportunities For    Visiting Students
  • Degree Programs
  • Computer Science
  • Cybersecurity
  • Undergraduate
  • Interdisciplinary
  • Miscellaneous
  • Course List
  • TA Program
  • Who We Are
  • Action Plan & Initiatives
  • Student Advocates
  • Data And Demographics
  • Student Groups
  • UTA Endowment
  • Home »
  • Research »
  • Publications »
  • Student Project Reports »

Idrees, Ifrah

Icon

• Stefanie A Tellex , advisor

Kumar, Indra

• Suresh Venkatasubramanian , advisor

Nguyen, Thao

Nokiz, Pegah

Ren, Yanyan

• Kathi Fisler , advisor

Rosenbloom, Leah

• Anna Lysyanskaya , advisor

Traylor, Aaron

• Ellie Pavlick , advisor

Zerveas, George

• Carsten Eickhoff , advisor

Abbatematteo, Ben - Exploiting Structure for Efficient Robotic Manipulation

• George D. Konidaris , advisor

Allen, Cameron

Corsaro, Matthew - Learning Task-Specific Grasps

Ebert, Dylan

Engel, Daniel

• Maurice P Herlihy , advisor

Ibrahim, Abdelrahman

• Sherief Reda , advisor

Kristo, Ani

Lee, Jun Ki

Lovering, Charles

Markatou, Evangelia

• Roberto Tamassia , advisor

Naseer, Usama

•Theophilus Benson, advisor

Patel, Roma

Rahimzadeh Ilkhechi, Amir

• Ugur Cetintemel , advisor

Rosen, Eric

Spiegelberg, Leonhard

• Malte Schwarzkopf , advisor

Wallace, Shaun

• Jeff Huang , advisor

Wang, Kai - Learning Autoregressive Generative Models of 3D Shapes and Scenes

• Daniel C Ritchie , advisor

Webson, Albert - Tuning Language Models to Follow Instructions

Xue, Yingjie

Zheng, Kaiyu

Computer Science at Brown University Providence, Rhode Island 02912 USA Phone: 401-863-7600 Map & Directions / Contact Us

Facebook

Scholars' Mine

Home > Computer Science > CompSci TDs > Masters Theses

Computer Science Masters Theses

Theses from 2024 2024.

Enabling smart healthcare applications through visible light communication networks , Jack Manhardt

Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan

Theses from 2023 2023

DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula

MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric

COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara

Theses from 2022 2022

Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga

Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong

Theses from 2021 2021

Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II

Theses from 2020 2020

On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu

Theses from 2019 2019

Advanced techniques for improving canonical genetic programming , Adam Tyler Harter

Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter

Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam

Theses from 2018 2018

Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin

CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush

Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani

Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa

Solidification rate detection through solid-liquid interface tracking , Wei Luo

Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham

Cyber-physical security of an electric microgrid , Prashanth Palaniswamy

An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla

Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy

Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti

A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang

Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang

Theses from 2017 2017

Cyber-physical security of a chemical plant , Prakash Rao Dunaka

UFace: Your universal password no one can see , Nicholas Steven Hilbert

Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco

Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti

Personalizing education with algorithmic course selection , Tyler Morrow

Decodable network coding in wireless network , Junwei Su

Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla

Theses from 2016 2016

Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar

Theses from 2015 2015

Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi

Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda

A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li

Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin

Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala

Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy

Cyber security research frameworks for coevolutionary network defense , George Daniel Rush

Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara

Theses from 2014 2014

Crime pattern detection using online social media , Raja Ashok Bolla

Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi

A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati

Access control delegation in the clouds , Pavani Gorantla

Evolving decision trees for the categorization of software , Jasenko Hosic

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar

Privacy preservation using spherical chord , Doyal Tapan Mukherjee

Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram

On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu

Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli

An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan

Theses from 2013 2013

Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu

Security analysis of a cyber physical system : a car example , Jason Madden

Efficient integrity verification of replicated data in cloud , Raghul Mukundan

Search-based model summarization , Lokesh Krishna Ravichandran

Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg

Secure design defects detection and correction , Wenquan Wang

Theses from 2012 2012

Robust evolutionary algorithms , Brian Wesley Goldman

Semantic preserving text tepresentation and its applications in text clustering , Michael Howard

Vehicle path verification using wireless sensor networks , Gerry W. Howser

Distributed and collaborative watermarking in relational data , Prakash Kumar

Theses from 2011 2011

A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle

Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount

A low-cost motion tracking system for virtual reality applications , Abhinav Chadda

Optimization of textual affect entity relation models , Ajith Cherukad Jose

MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram

A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi

An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka

Location privacy policy management system , Arej Awodha Muhammed

Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni

Theses from 2010 2010

Event detection from click-through data via query clustering , Prabhu Kumar Angajala

Population control in evolutionary algorithms , Jason Edward Cook

Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher

Multi axis slicing for rapid prototyping , Divya Kanakanala

Content based image retrieval for bio-medical images , Vikas Nahar

2-D path planning for direct laser deposition process , Swathi Routhu

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu

Theses from 2009 2009

Information flow properties for cyber-physical systems , Rav Akella

Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet

Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba

Theses from 2008 2008

Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das

Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong

A time series classifier , Christopher Mark Gore

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu

Co-optimization: a generalization of coevolution , Travis Service

Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder

Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson

Theses from 2007 2007

A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird

Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • All Authors
  • Faculty Authors

Author Corner

Useful links.

  • Library Resources

S&T logo

Thesis Locations

  • View these on map
  • View these in Google Earth

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

ScholarWorks

Home > Engineering > Computer Science > Computer Science Graduate Projects

Computer Science Graduate Projects and Theses

Theses/dissertations from 2023 2023.

High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal

Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan

Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah

Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker

Fake News Detection Using Narrative Content and Discourse , Hongmin Kim

Anomaly Detection Using Graph Neural Network , Bishal Lakha

Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola

Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George

Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten

Theses/Dissertations from 2022 2022

Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck

Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones

Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi

Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee

Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn

Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy

Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane

Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda

Hate Speech Detection Using Textual and User Features , Rohan Raut

Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib

Characterization and Mitigation of False Information on the Web , Anu Shrestha

Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez

Theses/Dissertations from 2021 2021

Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen

Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar

Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green

Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz

Modeling Real and Fake News Sharing in Social Networks , Abishai Joy

Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy

Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton

Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts

A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar

Actors for the Internet of Things , Arjun Shukla

Theses/Dissertations from 2020 2020

Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black

Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke

Polyhedral+Dataflow Graphs , Eddie C. Davis

Improving Spellchecking for Children: Correction and Design , Brody Downs

A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake

Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung

Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi

Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi

Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill

Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin

Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli

A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips

Theses/Dissertations from 2019 2019

Edge-Assisted Workload-Aware Image Processing System , Anil Acharya

MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick

Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman

Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas

A Hybrid Model to Detect Fake News , Indhumathi Gurunathan

Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris

UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani

Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh

Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar

Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan

Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo

Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury

Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya

BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran

FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota

Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader

Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla

Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian

Theses/Dissertations from 2018 2018

Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya

Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah

Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri

Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour

Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha

Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton

Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira

Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa

Theses/Dissertations from 2017 2017

Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella

Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli

CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly

Predicting Friendship Strength in Facebook , Nitish Dhakal

Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi

Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley

Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala

Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes

A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal

Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki

Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li

The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship

Towards Automatic Repair of XACML Policies , Shuai Peng

Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma

Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez

Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright

Theses/Dissertations from 2016 2016

Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.

When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic

Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh

Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt

Towards Multipurpose Readability Assessment , Ion Madrazo

Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson

CEST: City Event Summarization using Twitter , Deepa Mallela

Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami

Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas

Massively Parallel Algorithm for Solving the Eikonal Equation on Multiple Accelerator Platforms , Anup Shrestha

A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption , Srisarguru Sridhar

Dynamic Machine Level Resource Allocation to Improve Tasking Performance Across Multiple Processes , Richard Walter Thatcher

Theses/Dissertations from 2015 2015

Developing an Application for Evolutionary Search for Computational Models of Cellular Development , Nicolas Scott Cornia

Accelerated Radar Signal Processing in Large Geophysical Datasets , Ravi Preesha Geetha

Integrity Coded Databases (ICDB) – Protecting Integrity for Outsourced Databases , Archana Nanjundarao

  • Collections
  • Disciplines
  • SelectedWorks Gallery
  • Albertsons Library
  • Division of Research
  • Graduate College

Advanced Search

  • Notify me via email or RSS

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

  • Princeton University Doctoral Dissertations, 2011-2024

Computer Science

Issue Date Author(s)
2024
2024
2024
2024
2024
2024
2024
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023

DigitalCommons@University of Nebraska - Lincoln

Home > Computer Science > Dissertations, Theses, and Student Research

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Computer Science and Engineering, Department of

Department of computer science and engineering: dissertations, theses, and student research.

Asteroidal Sets and Dominating Targets in Graphs , Oleksiy Al-saadi

Star-Based Reachability Analysis of Binary Neural Networks on Continuous Input , Mykhailo Ivashchenko

Spatial & Temporal Agnostic Deep-Learning Based Radio Fingerprinting , Fahmida Afrin

Leveraging Aruco Fiducial Marker System for Bridge Displacement Estimation Using Unmanned Aerial Vehicles , Mohamed Aly

Sim-to-Real Reinforcement Learning Framework for Autonomous Aerial Leaf Sampling , Ashraful Islam

SC-Fuse: A Feature Fusion Approach for Unpaved Road Detection from Remotely Sensed Images , Aniruddh Saxena

Experimental Study of Linux Flightsize Estimation , Mingrui Zhang

Motif-Cluster: A Spatial Clustering Package for Repetitive Motif Binding Patterns , Mengyuan Zhou

An Empirical Study on the Classification of Python Language Features Using Eye-Tracking , Jigyasa Chauhan

BEVERS: A General, Simple, and Performant Framework for Automatic Fact Verification , Mitchell DeHaven

Characterizing and Predicting Human Visual Perception of Unmanned Aerial Vehicle Gestures , Paul Fletcher

Machine Learning-Based Device Type Classification for IoT Device Re- and Continuous Authentication , Kaustubh Gupta

Sequence-Based Bioinformatics Approaches to Predict Virus-Host Relationships in Archaea and Eukaryotes , Yingshan Li

SIMULATING SUB-THRESHOLD COMMUNICATION CHANNELS THROUGH NEURONS , Richard Maina

ConSemblEX: A Consensus-Based Transcriptome Assembly Approach that Extends ConSemble and Improves Transcriptome Assembly , Richard Mwaba

Comparative Analyses of De Novo Transcriptome Assembly Pipelines for Diploid Wheat , Natasha Pavlovikj

Attention in the Faithful Self-Explanatory NLP Models , Mostafa Rafaiejokandan

A Pipeline to Generate Deep Learning Surrogates of Genome-Scale Metabolic Models , Achilles Rasquinha

LEARNFCA: A FUZZY FCA AND PROBABILITY BASED APPROACH FOR LEARNING AND CLASSIFICATION , Suraj Ketan Samal

Symbolic NS-3 for Efficient Exhaustive Testing , Jianfei Shao

Feed Forward Neural Networks with Asymmetric Training , Archit Srivastava

Agent Based Modeling of the Spread of Social Unrest Based on Infectious Disease Spread Model , Anup Adhikari

Using Contextual Bandits to Improve Traffic Performance in Edge Network , Aziza Al Zadjali

Computational Solutions to Exosomal microRNA Biomarker Detection in Pancreatic Cancer , Thuy T. An

Aerial Flight Paths for Communication , Alisha Bevins

Towards a Machine Learning Based Generalizable Framework for Detecting COVID-19 Misinformation on Social Media , Yuanzhi Chen

Semantically Meaningful Sentence Embeddings , Rojina Deuja

Using an integrative machine learning approach to study microRNA regulation networks in pancreatic cancer progression , Roland Madadjim

Teachability And Interpretability In Reinforcement Learning , Jeevan Rajagopal

Power-over-Tether Unmanned Aerial System Leveraged for Trajectory Influenced Atmospheric Sensing , Daniel Rico

A Real-World, Hybrid Event Sequence Generation Framework for Android Apps , Jun Sun

“The Revolution Will Not Be Supervised": An Investigation of the Efficacy and Reasoning Process of Self-Supervised Representations , Atharva Tendle

Separator of Diametral Path Graphs , Cuong Than

COMPARATIVE ANALYSIS OF KMER COUNTING AND ESTIMATION TOOLS , Ankitha Vejandla

Information Extraction and Classification on Journal Papers , Lei Yu

SUFFIX TREE, MINWISE HASHING AND STREAMING ALGORITHMS FOR BIG DATA ANALYSIS IN BIOINFORMATICS , Sairam Behera

Formal Language Constraints in Deep Reinforcement Learning for Self-Driving Vehicles , Tyler Bienhoff

A Novel Spatiotemporal Prediction Method of Cumulative Covid-19 Cases , Junzhe Cai

Application of Software Engineering Principles to Synthetic Biology and Emerging Regulatory Concerns , Justin Firestone

Open Dynamic Interaction Network: a cell-phone based platform for responsive EMA , Gisela Font Sayeras

A Memory Usage Comparison Between Jitana and Soot , Yuanjiu Hu

Packet Delivery: An Investigation of Educational Video Games for Computer Science Education , Robert Lafferty

Advanced Techniques to Detect Complex Android Malware , Zhiqiang Li

Emotional Awareness During Bug Fixes – A Pilot Study , Jada O. Loro, Abigail L. Schneff, Sarah J. Oran, and Bonita Sharif

Representational Learning Approach for Predicting Developer Expertise Using Eye Movements , Sumeet Maan

An ANNs Based Failure Detection Method for ONOS SDON Controller , Shideh Yavary Mehr

INVESTIGATING FACTORS PREDICTING EFFECTIVE LEARNING IN A CS PROFESSIONAL DEVELOPMENT PROGRAM FOR K-12 TEACHERS , Patrick Morrow

An Algorithm For Building Language Superfamilies Using Swadesh Lists , Bill Mutabazi

AN EYE TRACKING REPLICATION STUDY OF A RANDOMIZED CONTROLLED TRIAL ON THE EFFECTS OF EMBEDDED COMPUTER LANGUAGE SWITCHING , Cole Peterson

Designing Shared Control Strategies for Teleoperated Robots Across Intrinsic User Qualities , Nancy Pham

Power-over-Tether UAS Leveraged for Nearly-Indefinite Meteorological Data Acquisition , Daniel Rico, Carrick Detweiler, and Francisco Muñoz-Arriola

Formal Concept Analysis Applications in Bioinformatics , Sarah Roscoe

Understanding Eye Gaze Patterns in Code Comprehension , Jonathan Saddler

Advanced Security Analysis for Emergent Software Platforms , Mohannad Alhanahnah

Analysis of Social Unrest Events using Spatio-Temporal Data Clustering and Agent-Based Modelling , Sudeep Basnet

Domain Adaptation in Unmanned Aerial Vehicles Landing using Reinforcement Learning , Pedro Lucas Franca Albuquerque

A Data-driven Approach for Detecting Stress in Plants Using Hyperspectral Imagery , Suraj Gampa

New Algorithms for Large Datasets and Distributions , Sutanu Gayen

Image Classification Using Fuzzy FCA , Niruktha Roy Gotoor

Image Processing Algorithms for Elastin Lamellae Inside Cardiovascular Arteries , Mahmoud Habibnezhad

User Privacy Leakage in Location-based Mobile Ad Services , Qicheng Lin

Formal Modeling and Analysis of a Family of Surgical Robots , Niloofar Mansoor

Dimensional Analysis of Robot Software without Developer Annotations , John-Paul W. Ore

The Design and Implementation of AIDA: Ancient Inscription Database and Analytics System , M Parvez Rashid

LearnFCA: A Fuzzy FCA and Probability Based Approach for Learning and Classification , Suraj Ketan Samal

Scheduling and Prefetching in Hadoop with Block Access Pattern Awareness and Global Memory Sharing with Load Balancing Scheme , Sai Suman

A DATA DRIVEN APPROACH TO IDENTIFY JOURNALISTIC 5WS FROM TEXT DOCUMENTS , Venkata Krishna Mohan Sunkara

Distributed Edge Bundling for Large Graphs , Yves Tuyishime

GAINDroid: General Automated Incompatibility Notifier for Android Applications , Bruno Vieira Resende e Silva

View-Dependent Data Prefetching for Interactive Visualization of Large-Scale 3D Scientific Data , Jin Wang

Feasibility and Security Analysis of Wideband Ultrasonic Radio for Smart Home Applications , Qi Xia

Exploring Eye Tracking Data on Source Code via Dual Space Analysis , Li Zhang

Controller Evolution and Divergence: A Software Perspective , Balaji Balasubramaniam

Performance Evaluation of v-eNodeB using Virtualized Radio Resource Management , Sai Keerti Teja Boddepalli

Effectively Enforcing Minimality During Backtrack Search , Daniel J. Geschwender

Optical Wireless Data Center Networks , Abdelbaset S. Hamza

Scheduling in Mapreduce Clusters , Chen He

Supporting Diverse Customers and Prioritized Traffic in Next-Generation Passive Optical Networks , Naureen Hoque

Modelling and Visualizing Selected Molecular Communication Processes in Biological Organisms: A Multi-Layer Perspective , Aditya Immaneni

COST-EFFECTIVE TECHNIQUES FOR CONTINUOUS INTEGRATION TESTING , Jingjing Liang

GMAim: an analytical pipeline for microRNA splicing profiling using generative model , Kan Liu

Application of Cosine Similarity in Bioinformatics , Srikanth Maturu

Scaling up an Infrastructure for Controlled Experimentation with Testing Techniques , Wayne D. Motycka

Scale-Out Algorithm For Apache Storm In SaaS Environment , Ravi Kiran Puttaswamy

A Comprehensive Framework to Replicate Process-Level Concurrency Faults , Supat Rattanasuksun

Speech Emotion Recognition using Convolutional Neural Networks , Somayeh Shahsavarani

Assessing the Quality and Stability of Recommender Systems , David Shriver

Consensus Ensemble Approaches Improve De Novo Transcriptome Assemblies , Adam Voshall

EvoAlloy: An Evolutionary Approach For Analyzing Alloy Specifications , Jianghao Wang

Higher-Level Consistencies: Where, When, and How Much , Robert J. Woodward

DEPLOYING, IMPROVING AND EVALUATING EDGE BUNDLING METHODS FOR VISUALIZING LARGE GRAPHS , Jieting Wu

Reducing the Tail Latency of a Distributed NoSQL Database , Jun Wu

Detection of Plant Emergence Based on Spatio Temporal Image Sequence Analysis , Bhushit Agarwal

Investigating Diversity in Open Multiagent Team Formation , Pooja Ahuja

An Unmanned Aerial System for Prescribed Fires , Evan M. Beachly

PLANT IMAGE PROCESSING: 3D VOLUME RECONSTRUCTION, HYPERSPECTRAL INFORMATION MINING AND VISUALIZATION , Shi Cao

INVESTIGATING AGENT AND TASK OPENNESS IN ADHOC TEAM FORMATION , Bin Chen

Hierarchical Active Learning Application to Mitochondrial Disease Protein Dataset , James D. Duin

Design and Implementation of a Stand-Alone Tool for Metabolic Simulations , Milad Ghiasi Rad

Exploring the Telecommunications Properties of the Human Nervous System: Analytical Modeling and Experimental Validation of Information Flow through the Somatosensory System , Natalie Hanisch

Advanced Search

Search Help

  • Notify me via email or RSS
  • Administrator Resources
  • How to Cite Items From This Repository
  • Copyright Information
  • Collections
  • Disciplines

Author Corner

  • Guide to Submitting
  • Submit your paper or article
  • Computer Science Website

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Computer Science

  • Dissertations

University of California Dissertations

UC Library Search Logo

Individual UC Davis dissertations and masters theses are cataloged in the UC Davis Library catalog — search for “Dissertations Academic University of California Davis”

See  Finding UC Davis Theses and Dissertations  for more information on locating and accessing UC Davis titles.

Resources listed in order of breadth and centrality to dissertation searching:

UC Davis login option available

  • Open Access Theses and Dissertations This link opens in a new window OATD.org aims to be the best possible resource for finding open access graduate theses and dissertations published around the world. Metadata (information about the theses) comes from over 1000 colleges, universities, and research institutions. OATD currently indexes 2,311,795 theses and dissertations.
  • Networked Digital Library of Theses and Dissertations (NDLTD) This link opens in a new window The Networked Digital Library of Theses and Dissertations (NDLTD) is an international organization dedicated to promoting the adoption, creation, use, dissemination and preservation of electronic analogues to the traditional paper-based theses and dissertations. This website contains information about the initiative, how to set up Electronic Thesis and Dissertation (ETD) programmes, how to create and locate ETDs, and current research in digital libraries related to NDLTD and ETDs.
  • Cybertesis : tesis electrónicas en línea This link opens in a new window Cybertesis.Net is a cooperative project between the Université de Montréal, the Université de Lyon2, the University of Chile and 32 universities in Europe, Africa and Chile that allows access to more than 27,000 full text theses and dissertations. Some institutions have opted to digitize theses dating back to the 1700s. [Coverage: 1700s-present]
  • China Doctoral Dissertation & Masters’ Theses This link opens in a new window This database offers an unparalleled look into the academic research of China’s most prestigious institutions. CDMD is the most comprehensive, highest quality database of dissertations and theses from China, representing nearly 500 PhD-granting institutions and over 775 masters-granting institutions, including the Chinese Academy of Sciences, the Chinese Academy of Social Sciences, and the Chinese Academy of Agriculture, among others. The theses and dissertations are available in Chinese, with an interface in English.
  • EThOS Beta Electronic Theses Online Service Open Access to UK theses This link opens in a new window Please note: The British Library is experiencing a major technology outage as a result of a cyber-attack. Access may be limited or unavailable at this time. Register for a free account to download theses. Almost-complete index of all doctoral level theses awarded by UK universities. You can uncover the latest cutting edge research inside the pages of UK PhD theses, immediately download over 300,000 theses or order many more through the unique EThOS digitisation on demand service. Among other services, EThOS allows one to search, select and in some/many cases download the full-text of items of interest free of charge. more... less... Kept former link for future reference when service is back up: https://ethos.bl.uk/Home.do Changed link to the main home page.
  • << Previous: Citing
  • Off-Campus Access
  • Books / eBooks
  • Conference Proceedings & More
  • Google Advanced Search Techniques

Research Support

Reach out with questions via email, or schedule a research consultation.

Undergraduates and their instructors should contact:

Grad students, post-docs, faculty and researchers should contact:.

  • Researcher Services for consultation: [email protected]
  • Last Updated: Jun 18, 2024 1:18 PM
  • URL: https://guides.library.ucdavis.edu/computer-science

St Andrews Research Repository

St Andrews University Home

  •   St Andrews Research Repository
  • Computer Science (School of)
  • Computer Science

Computer Science Theses

  • Register / Login

By Issue Date Names Titles Subjects Classification Type Funder

Search within this collection:

All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems engineering, and human computer interaction.

For more information please visit the School of Computer science home page.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Recent Submissions

Processing clinical guideline text for formal verification , automatic evaluation of geopolitical risk , automating inventory composition management for bulk purchasing cloud brokerage strategy , biologically-informed interpretable deep learning techniques for bmi prediction and gene interaction detection , equivalence-preserving preprocessing of propositional logic formulae using existential graphs and implication hypergraphs .

feed

  • Locations and Hours
  • UCLA Library
  • Research Guides

Computer Science

  • Dissertations
  • Science and Engineering Library This link opens in a new window
  • Graduate Orientation Presentation

Finding UCLA Dissertations for Graduates of Specific Departments by Year

Dissertation databases.

  • Safety/MSDS Sources
  • Technical Reports
  • Data Management
  • Diverse Voices

For UCLA dissertations, search the UCLA Library Catalog :

  • Click on the Advanced Search tab
  • Enter dissertations "department name" UCLA in the search box; for example, dissertations physics UCLA
  • Keep the middle drop-down menu set at "all of these words"
  • Change the right-hand drop-down menu to "subject"
  • Sort the results by date

Full-text UC dissertations since 1996 are available from  ProQuest Dissertations and Theses . 

As of March 13, 2012, UCLA's  Graduate Division  only accepts electronic filing of theses and dissertations. Theses and dissertations filed after this date will only be accessible electronically. They can be found by searching the  UCLA Library Catalog ,  ProQuest Digital Dissertations and Theses , or  eScholarship . Authors may embargo theses or dissertations for up to two years, so the full text of recent theses and dissertations may not be available.

Non-UCLA users can obtain UCLA dissertations through  ProQuest UMI . The UCLA Library does not provide interlibrary loan service to individuals unaffiliated with UCLA. However, dissertations can be lent to institutions; see  information for borrowing institutions .

UC's open access repository. Contains books, journals, working papers, conference publications, postprints, theses, and dissertations.

  • Center for Research Libraries (CRL) Foreign Dissertations Search the CRL Catalog for dissertations already held at the Center. If a foreign dissertation is not at CRL, UCLA's Interlibrary Loan Service will request that CRL acquire it for your use. This special issue of Focus on Global Resources describes CRL's extensive collection of foreign dissertations.
  • Networked Digital Library of Theses and Dissertations This international organization promotes the adoption, creation, use, dissemination, and preservation of electronic analogues to traditional paper-based theses and dissertations in order to more effectively share knowledge.
  • British Library EThOS The British Library's electronic theses online service aims to provide a single point of access to all theses produced by UK higher education. It currently contains more than 250,000 records, with 25,000 open-access theses available for immediate download. Researchers can request theses not yet available electronically, which will be scanned and made freely available.
  • << Previous: Articles
  • Next: Patents >>
  • Last Updated: Jun 28, 2024 3:46 PM
  • URL: https://guides.library.ucla.edu/cs

University of Cambridge

Study at Cambridge

About the university, research at cambridge.

  • Undergraduate courses
  • Events and open days
  • Fees and finance
  • Postgraduate courses
  • How to apply
  • Postgraduate events
  • Fees and funding
  • International students
  • Continuing education
  • Executive and professional education
  • Courses in education
  • How the University and Colleges work
  • Term dates and calendars
  • Visiting the University
  • Annual reports
  • Equality and diversity
  • A global university
  • Public engagement
  • Give to Cambridge
  • For Cambridge students
  • For our researchers
  • Business and enterprise
  • Colleges & departments
  • Email & phone search
  • Museums & collections
  • Current students
  • Part II projects
  • Department of Computer Science and Technology

Sign in with Raven

  • People overview
  • Research staff
  • PhD students
  • Professional services staff
  • Affiliated lecturers
  • Overview of Professional Services Staff
  • Seminars overview
  • Weekly timetable
  • Wednesday seminars
  • Wednesday seminar recordings ➥
  • Wheeler lectures
  • Computer Laboratory 75th anniversary ➥
  • women@CL 10th anniversary ➥
  • Job vacancies ➥
  • Library resources ➥
  • How to get here
  • William Gates Building layout
  • Contact information
  • Department calendar ➥
  • Accelerate Programme for Scientific Discovery overview
  • Data Trusts Initiative overview
  • Pilot Funding FAQs
  • Research Funding FAQs
  • Cambridge Ring overview
  • Ring Events
  • Hall of Fame
  • Hall of Fame Awards
  • Hall of Fame - Nominations
  • The Supporters' Club overview
  • Industrial Collaboration
  • Annual Recruitment Fair overview
  • Graduate Opportunities
  • Summer internships
  • Technical Talks
  • Supporter Events and Competitions
  • How to join
  • Collaborate with Us
  • Cambridge Centre for Carbon Credits (4C)
  • Equality and Diversity overview
  • Athena SWAN
  • E&D Committee
  • Support and Development
  • Targeted funding
  • LGBTQ+@CL overview
  • Links and resources
  • Queer Library
  • women@CL overview
  • About Us overview
  • Friends of women@CL overview
  • Twentieth Anniversary of Women@CL
  • Tech Events
  • Students' experiences
  • Contact overview
  • Mailing lists
  • Scholarships
  • Initiatives
  • Dignity Policy
  • Outreach overview
  • Women in Computer Science Programme
  • Google DeepMind Research Ready programme overview
  • Accommodation and Pay
  • Application
  • Eligibility
  • Raspberry Pi Tutorials ➥
  • Wiseman prize
  • Research overview
  • Application areas
  • Research themes
  • Algorithms and Complexity
  • Computer Architecture overview
  • Creating a new Computer Architecture Research Centre
  • Graphics, Vision and Imaging Science
  • Human-Centred Computing
  • Machine Learning and Artificial Intelligence
  • Mobile Systems, Robotics and Automation
  • Natural Language Processing
  • Programming Languages, Semantics and Verification
  • Systems and Networking
  • Research groups overview
  • Computer Architecture Group overview
  • Student projects
  • Energy and Environment Group overview
  • Declaration
  • Publications
  • EEG Research Group
  • Past seminars
  • Learning and Human Intelligence Group overview
  • Quantum Computing Group
  • Technical Reports
  • Admissions information
  • Undergraduate admissions overview
  • Open days and events
  • Undergraduate course overview overview
  • Making your application
  • Admissions FAQs
  • Super curricular activities
  • MPhil in Advanced Computer Science overview
  • Applications
  • Course structure
  • Funding competitions
  • Prerequisites
  • PhD in Computer Science overview
  • Application forms
  • Research Proposal
  • Funding competitions and grants
  • Part-time PhD Degree
  • Premium Research Studentship
  • Current students overview
  • Part IB overview
  • Part IB group projects overview
  • Important dates
  • Design briefs
  • Moodle course ➥
  • Learning objectives and assessment
  • Technical considerations
  • After the project
  • Part II overview
  • Part II projects overview
  • Project suggestions
  • Project Checker groups
  • Project proposal
  • Advice on running the project
  • Progress report and presentation
  • The dissertation
  • Supervisor briefing notes
  • Project Checker briefing notes
  • Past overseer groups ➥
  • Part II Supervision sign-up
  • Part II Modules
  • Part II Supervisions overview
  • Continuing to Part III overview
  • Part III of the Computer Science Tripos
  • Overview overview
  • Information for current Masters students overview
  • Special topics
  • Part III and ACS projects overview
  • Submission of project reports
  • ACS projects overview
  • Guidance for ACS projects
  • Part III projects overview
  • Guidance for Part III projects

Preparation

  • Registration
  • Induction - Masters students
  • PhD resources overview
  • Deadlines for PhD applications
  • Protocol for Graduate Advisers for PhD students
  • Guidelines for PhD supervisors
  • Induction information overview
  • Important Dates
  • Who is here to help
  • Exemption from University Composition Fees
  • Being a research student
  • Researcher Development
  • Research skills programme
  • First Year Report: the PhD Proposal
  • Second Year Report: Dissertation Schedule
  • Third Year Report: Progress Statement
  • Fourth Year: writing up and completion overview
  • PhD thesis formatting
  • Writing up and word count
  • Submitting your dissertation
  • Papers and conferences
  • Leave to work away, holidays, and intermission
  • List of PhD students ➥
  • PAT, recycling, and Building Services
  • Freshers overview
  • Cambridge University Freshers' Events
  • Undergraduate teaching information and important dates
  • Course material 2023/24 ➥
  • Course material 2024/25 ➥
  • Exams overview
  • Examination dates
  • Examination results ➥
  • Examiners' reports ➥
  • Part III Assessment
  • MPhil Assessment
  • Past exam papers ➥
  • Examinations Guidance 2023-24
  • Marking Scheme and Classing Convention
  • Guidance on Plagiarism and Academic Misconduct
  • Purchase of calculators
  • Examinations Data Retention Policy
  • Guidance on deadlines and extensions
  • Mark Check procedure and Examination Review
  • Lecture timetables overview
  • Understanding the concise timetable
  • Supervisions overview
  • Part II supervisions overview ➥
  • Part II supervision sign-up ➥
  • Supervising in Computer Science
  • Supervisor support
  • Directors of Studies list
  • Academic exchanges
  • Advice for visiting students taking Part IB CST
  • Summer internship: Optimisation of DNN Accelerators using Bayesian Optimisation
  • UROP internships
  • Resources for students overview
  • Student SSH server
  • Online services
  • Managed Cluster Service (MCS)
  • Microsoft Software for personal use
  • Installing Linux
  • Part III and MPhil Machines
  • Transferable skills
  • Course feedback and where to find help overview
  • Providing lecture feedback
  • Fast feedback hotline
  • Staff-Student Consultative Forum
  • Breaking the silence ➥
  • Student Administration Offices
  • Intranet overview
  • New starters and visitors
  • Forms and templates
  • Building management
  • Health and safety
  • Teaching information
  • Research admin
  • Miscellaneous

The Dissertation

  • Continuing to Part III

The dissertation should be written for a technically competent reader who is not necessarily familiar with the particular aspects of Computer Science involved. Better grades will arise from clarity and ease of reading, good pictures, clear explanation, minimal jargon and appropriate use of equations. Writing a dissertation requires planning and time. You should allow at least four weeks for the task.

Dissertation PDF files must be

  • formatted for A4 paper;
  • Typeset in 12-point font with a minimum of 2 cm margins;
  • less than 15 megabytes in size;
  • (ideally) use embedded fonts.

The main body of the dissertation, running from the first page of the introduction until the last page of the conclusions, shall not exceed 40 pages nor exceed 12,000 words in length (including tables and footnotes). Students should ensure the main body of their dissertation (page 3 onwards) as well as any appendices do not contain direct personal identifiers (i.e. their name or their CRSID).

Examiners and Assessors are permitted to judge your work only through study of your dissertation, although they will require your original source code to be available for them to refer to in cases where clarification is needed.

To facilitate the assessment process, the Examiners require the top-level structure of the dissertation to be strictly as follows:

Declaration of originality

Table of contents.

  • Chapter 1: Introduction
  • Chapter 2: Preparation
  • Chapter 3: Implementation
  • Chapter 4: Evaluation
  • Chapter 5: Conclusions

Bibliography

Project proposal.

It is not the intention of the Examiners to constrain writers too greatly. Although the layout of the Cover Sheet and the arrangement of the Proforma are tightly specified, the organisation and length of each of the five chapters are allowed to vary considerably from one dissertation to another. Further details are given below.

The cover page

The single cover page contains

  • Your Name, in the extreme top right-hand corner . 
  • The Title of your Dissertation.
  • The Examination for which you are a candidate.
  • Your College and the Year in which you are submitting the Dissertation.

Your project title must be the same as the title approved by your Project Checkers on your project proposal.  If you want to change the title you should first discuss this with your supervisor.  If your supervisor is in agreement you will need to request a change by contacting the Teaching Administration Manager with a brief explanation for the reasons behind the change ([email protected]).  This will be approved by the Teaching Administration Manager and Chair of Examiners.

All dissertations must include an anti-plagiarism declaration immediately before the Proforma. The declaration must have exactly the following syntax:

I, [Name] of [College], being a candidate for Part II of the Computer Science Tripos, hereby declare that this dissertation and the work described in it are my own work, unaided except as may be specified below, and that the dissertation does not contain material that has already been used to any substantial extent for a comparable purpose. [In preparation of this dissertation I did not use text from AI-assisted platforms generating natural language answers to user queries, including but not limited to ChatGPT. / The project required the use of AI-assisted platform [name] in section [number], and such use is acknowledged in the text.] (use either of these sentences as appropriate) [I am content for my dissertation to be made available to the students and staff of the University.]

Signed [signature]

Date [date]

Further guidance relating to the use of AI-assisted tools can be found on the exams guidance web page .

You may either include a scanned copy of your signature or type your full name in place of a handwritten signature.

The University drafted the wording, which is similar to that relating to dissertations in a wide range of subjects; thus the "unaided except as may be specified below" clause merits some explanation:

  • The clause does not require acknowledgement of the project supervision or informal conversations with peers.
  • The clause is also intended to cover collaborative projects which are not now permitted in Computer Science. As such this aspect is irrelevant to Computer Science dissertations.
  • This clause aside, and notwithstanding 1 and 2, candidates are required to draw attention, in the Implementation chapter, to the parts of the work which are not their own, in accordance with the Implementation section below. Other acknowledgements should be given wherever appropriate.

The Department would like past dissertations to be made available for teaching purposes and for your references. These will be accessed on the Computer Science departmental website under Raven password protection. You should include the last sentence of the declaration if you are willing for your dissertation to be accessed for these purposes; otherwise you may remove it.  Note: If in the future you would like your dissertation removed from the departmental website, you can request this by contacting the Student Admin office at [email protected].

The proforma page

The single proforma page is a preface that immediately follows the declaration of originality. The proforma page, as well as all subsequent pages of the dissertation should not include direct personal identifiers such as your name or CRSID. The Proforma must be arranged thus:

  • Your candidate number.
  • The Title of your Project.
  • The Examination and Year.
  • Word-count for the dissertation.
  • Code line count: Number of lines of code written by the student in the final version of their software.
  • Project Originator (if this is the student please state 'The candidate').
  • Project Supervisor.
  • At most 100 words describing the original aims of the project.
  • At most 100 words summarising the work completed.
  • At most 100 words describing any special difficulties that you faced. (In most cases the special difficulties entry will say "None".)

It is quite in order for the Proforma to point out how ambitious the original aims were and how the work completed represents the triumphant consequence of considerable effort against a background of unpredictable disasters. The substantiation of these claims will follow in the rest of the dissertation.

Student Administration will ask students to resubmit any dissertation which does not include the relevant cover page, declaration and proforma. If such a resubmission occurs after the deadline this will result in a late submission penalty.

This should list the contents in some sensible way.

Introduction

The introduction should explain the principal motivation for the project and show how the work fits into the broad area of surrounding computer science and give a brief survey of previous related work. It should generally be unnecessary to quote at length from technical papers or textbooks. If a simple bibliographic reference is insufficient, consign any lengthy quotation to an appendix.

Principally, this chapter should describe the work which was undertaken before code was written, hardware built or theories worked on. It should show how the project proposal was further refined and clarified, so that the implementation stage could go smoothly rather than by trial and error.

Throughout this chapter and indeed the whole dissertation, it is essential to demonstrate that a proper professional approach was employed.

The nature of this chapter will vary greatly from one dissertation to another but, underlining the professional approach, this chapter will very likely include a section headed "Requirements Analysis" and refer to appropriate software engineering techniques used in the dissertation. The chapter will also cite any new programming languages and systems which had to be learnt and will mention complicated theories or algorithms which required understanding.

It is essential to declare the starting point. This states any existing codebase or materials that your project builds on. The text here can commonly be identical to the text in your proposal, but it may enlarge on it or report variations. For instance, the true starting point may have turned out to be different from that declared in the proposal and such discrepancies must be explained.

Implementation

This chapter should describe what was actually produced: the programs which were written, the hardware which was built or the theory which was developed. Any design strategies that looked ahead to the testing stage should be described in order to demonstrate a professional approach was taken.

Descriptions of programs may include fragments of high-level code but large chunks of code are usually best left to appendices or omitted altogether. Analogous advice applies to circuit diagrams or detailed steps in a machine-checked proof.

The implementation chapter should include a section labelled "Repository Overview". The repository overview should be around one page in length and should describe the high-level structure of the source code found in your source code repository. It should describe whether the code was written from scratch or if it built on an existing project or tutorial. Making effective use of powerful tools and pre-existing code is often laudable, and will count to your credit if properly reported. Nevertheless, as in the rest of the dissertation, it is essential to draw attention to the parts of the work which are not your own. 

It should not be necessary to give a day-by-day account of the progress of the work but major milestones may sometimes be highlighted with advantage.

This is where Assessors will be looking for signs of success and for evidence of thorough and systematic evaluation. Sample output, tables of timings and photographs of workstation screens, oscilloscope traces or circuit boards may be included. Care should be employed to take a professional approach throughout. For example, a graph that does not indicate confidence intervals will generally leave a professional scientist with a negative impression. As with code, voluminous examples of sample output are usually best left to appendices or omitted altogether.

There are some obvious questions which this chapter will address. How many of the original goals were achieved? Were they proved to have been achieved? Did the program, hardware, or theory really work?

Assessors are well aware that large programs will very likely include some residual bugs. It should always be possible to demonstrate that a program works in simple cases and it is instructive to demonstrate how close it is to working in a really ambitious case.

Conclusions

This chapter is likely to be very short and it may well refer back to the Introduction. It might offer a reflection on the lessons learned and explain how you would have planned the project if starting again with the benefit of hindsight.

It is common, but not mandatory, to have a bibliography. Attention should be given to correct and consistent formatting.

It is common, but not mandatory, to have one or more appendices. Assessors like to see some sample code or example circuit diagrams, and appendices are the sensible places to include such items. Accordingly, software and hardware projects should incorporate appropriate appendices. Note that the 12,000 word limit does not include material in the appendices, but only in extremely unusual circumstances may appendices exceed 10-15 pages. If you feel that such unusual circumstances might apply to you you should ask your Director of Studies and Supervisor to discuss this with the Chairman of Examiners. Appendices should appear between the bibliography and the project proposal.

An index is optional.

A copy of the original project proposal must be included at the very end of the dissertation.

Department of Computer Science and Technology University of Cambridge William Gates Building 15 JJ Thomson Avenue Cambridge CB3 0FD

Information provided by [email protected]

Privacy policy

Social media

Athena Swan bronze award logo

© 2024 University of Cambridge

  • Contact the University
  • Accessibility
  • Freedom of information
  • Privacy policy and cookies
  • Statement on Modern Slavery
  • Terms and conditions
  • University A-Z
  • Undergraduate
  • Postgraduate
  • Research news
  • About research at Cambridge
  • Spotlight on...
  • Northeastern University
  • Khoury College of Computer Science
  • Computer and Information Science Theses and Dissertations
  • Computer Science Master's Theses

Computer Science Master's Theses Collection

http://hdl.handle.net/2047/D20233315

aBBRate: automating BBR congestion control attack exploration using a model-based approach.

Analysis of named entity recognition & entity linking in historical text

Annotating decision analyses using semantic web technologies

Applying EM to compute document relevance from crowdsourced pair preferences

Applying unsupervised grammar induction to OCR error correction

Argument mining for understanding media bias and misinformation

ARID: affinity representing instance descriptors.

Automated explanation of research informed consent by embodied conversational agents

Automated indexing of stories for conversational health intervention

Bias measurement in small datasets

Washington University Open Scholarship

Home > ENG > ENG_PROGRAMS > CSE > CSE_ETDS

Theses and Dissertations

Theses/dissertations from 2024 2024.

An Attention LSTM U-Net Model for Drosophila Melanogaster Heart Tube Segmentation , Xiangping Ouyang

Mending Trust in AI: Trust Repair Policy Interventions for Large Language Models in Visual Data Journalism , Hangxiao Zhu

Theses/Dissertations from 2023 2023

Integrative analysis of cell-free DNA liquid biopsy data , Irfan Alahi

Deep Learning for Tomographic Image Reconstruction Guided by Generative Models and Image Science , Sayantan Bhadra

Interpretable deep learning via sparse representation for protein-DNA interactions , Shane Kuei-Hsien Chu

Feature-Oriented Hardware Design , Justin Deters

Decentralized Computing for Reliable Home Automation , Rahav Dor

Injective Mapping under Constraints , Xingyi Du

Consequences and Incentives of Fair Learning , Andrew Estornell

Learning in Large Interactive Environments , Hai S. Le

TFA inference: Using mathematical modeling of gene expression data to infer the activity of transcription factors , Cynthia Ma

Learning from User Interactions and Providing Guidance in Visual Data Analysis , Shayan Monadjemi

Translating Deep Learning into Scientific Domains: Case Studies in Bioactivation, Quantum Chemistry, and Clinical Studies , Kathryn Sarullo

An Efficient Task-Parallel Platform for Interactive Applications , Kyle Singer

Models and Algorithms for Real-Time Systems , Abhishek Singh

Understanding Societal Values of ChatGPT , Yidan Tang

Throughput Optimizations for Irregular Dataflow Streaming Applications on Wide-SIMD Architectures , Stephen William Timcheck

Adversarial Patch Attacks on Deep Reinforcement Learning Algorithms , Peizhen Tong

Honesty Is Not Always the Best Policy: Defending Against Membership Inference Attacks on Genomic Data , Rajagopal Venkatesaramani

Real-time Analysis of Aerosol Size Distributions with the Fast Integrated Mobility Spectrometer (FIMS) , Daisy Wang

Feature Selection from Clinical Surveys Using Semantic Textual Similarity , Benjamin Warner

An Assistive Interface For Displaying Novice's Code History , Ruiwei Xiao

Model-based Deep Learning for Computational Imaging , Xiaojian Xu

Securing Autonomous Driving: Addressing Adversarial Attacks and Defenses , Jinghan Yang

Evaluating the Problem Solving Abilities of ChatGPT , Fankun Zeng

PathFormer: Interpretable and Powerful Graph Transformer for Gene Network Analysis , Qihang Zhao, Zehao Dong, Muhan Zhang, Philip Payne, Michael Province, Carlos Cruchaga, Tianyu Zhao, Yixin Chen, and Fuhai Li

Theses/Dissertations from 2022 2022

Tell It Slant: Investigating the Engagement, Discourse, and Popularity of Data Visualization in Online Communities , Emma Baker

A Reconfigurable FPGA Overlay Architecture for Matrix-Matrix Multiplication , Zihao Chen

Smart Sensing and Clinical Predictions with Wearables: From Physiological Signals to Mental Health , Ruixuan Dai

Dynamic Continuous Distributed Constraint Optimization Problems , Khoi Hoang

The Effects of Host-like Environmental Signals and Gene Expression on Capsule Growth in Cryptococcus neoformans , Yu Min Jung

Application of Crowdsourcing and Machine Learning to Predict Sentiments in Textual Student Feedback in Large Computer Science Classes , Robert Kasumba

Measuring the Effectiveness of Light Concentration with the Catoptric Surface , Samatha Kodali

Applying HLS to FPGA Data Preprocessing in the Advanced Particle-astrophysics Telescope , Meagan Konst

Application of Neural Networks to Predict Patient-Specific Cellular Parameters in Computational Cardiac Models , Chang Hi Lee

Scalable Software Infrastructure for the Lab and a Specific Investigation of the Yeast Transcription Factor Eds1 , Chase Mateusiak

Design & Analysis of Mixed-mode Integrated Circuit for Pulse-shape Discrimination , Bryan Orabutt

Modeling Metastasis in Breast Cancer Patients Using EHR Data, the Area Deprivation Index (ADI), and Machine Learning Models , Vishesh Patel

Speeding up the quantification of Contrast Sensitivity functions using Multidimensional Bayesian Active Learning , Shohaib Shaffiey

Integrating Physical Models and Deep Priors for Computational Imaging , Yu Sun

Human-Centered Machine Learning: Algorithm Design and Human Behavior , Wei Tang

Scheduling for High Throughput and Small Latency in Parallel and Distributed Systems , Zhe Wang

Design and Analysis of Strategic Behavior in Networks , Sixie Yu

Geometric Algorithms for Modeling Plant Roots from Images , Dan Zeng

Theses/Dissertations from 2021 2021

Using Computer Vision to Track Anatomical Structures During Cochlear Implant Surgery , Nicholas Bach

Bayesian Quadrature with Prior Information: Modeling and Policies , Henry Chai

Machine Learning in Complex Scientific Domains: Hospitalization Records, Drug Interactions, Predictive Modeling and Fairness for Class Imbalanced Data , Arghya Datta

Improving additional adversarial robustness for classification , Michael Guo

Advanced Search

  • Notify me via email or RSS
  • Submit Research to CSE Collection
  • Collections
  • Disciplines

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

California State University, San Bernardino

Home > College of Natural Sciences > COMPUTERSCI-ENGINEERING > COMPUTERSCI-ENGINEERING-ETD

Computer Science and Engineering Theses, Projects, and Dissertations

Theses/projects/dissertations from 2024 2024.

TRAFFIC ANALYSIS OF CITIES IN SAN BERNARDINO COUNTY , Sai Kalyan Ayyagari

Recommendation System using machine learning for fertilizer prediction , Durga Rajesh Bommireddy

Classification of Remote Sensing Image Data Using Rsscn-7 Dataset , Satya Priya Challa

Cultural Awareness Application , Bharat Gupta

PREDICTING HOSPITALIZATION USING ARTIFICIAL INTELLIGENCE , Sanath Hiremath

AUTOMATED BRAIN TUMOR CLASSIFIER WITH DEEP LEARNING , venkata sai krishna chaitanya kandula

TRUCK TRAFFIC ANALYSIS IN THE INLAND EMPIRE , Bhavik Khatri

Crash Detecting System Using Deep Learning , Yogesh Reddy Muddam

A SMART HYBRID ENHANCED RECOMMENDATION AND PERSONALIZATION ALGORITHM USING MACHINE LEARNING , Aswin Kumar Nalluri

Theses/Projects/Dissertations from 2023 2023

CLASSIFICATION OF LARGE SCALE FISH DATASET BY DEEP NEURAL NETWORKS , Priyanka Adapa

GEOSPATIAL WILDFIRE RISK PREDICTION USING DEEP LEARNING , Abner Alberto Benavides

HUMAN SUSPICIOUS ACTIVITY DETECTION , Nilamben Bhuva

MAX FIT EVENT MANAGEMENT WITH SALESFORCE , AKSHAY DAGWAR

MELANOMA DETECTION BASED ON DEEP LEARNING NETWORKS , Sanjay Devaraneni

Heart Disease Prediction Using Binary Classification , Virendra Sunil Devare

CLASSIFICATION OF THORAX DISEASES FROM CHEST X-RAY IMAGES , Sharad Jayusukhbhai Dobariya

WEB BASED MANAGEMENT SYSTEM FOR HOUSING SOCIETY , Likhitha Reddy Eddala

Sales and Stock Management System , Rashmika Gaddam Ms

CONTACTLESS FOOD ORDERING SYSTEM , Rishivar Kumar Goli

RESTAURANT MANAGEMENT WEBSITE , Akhil Sai Gollapudi

DISEASE OF LUNG INFECTION DETECTION USING CNN MODEL -BAYESIAN OPTIMIZATION , poojitha gutha

DATA POISONING ATTACKS ON PHASOR MEASUREMENT UNIT DATA , Rutuja Sanjeev Haridas

CRIME MAPPING ANALYSIS USING WEB APPLICATION. , Lavanya Krishnappa

A LONG-TERM FUNDS PREDICTOR BASED ON DEEP LEARNING , SHUIYI KUANG

LIVER SEGMENTATION AND LESION DETECTION IN MEDICAL IMAGES USING A DEEP LEARNING-BASED U-NET MODEL , Kaushik Mahida

PHASOR MEASUREMENT UNIT DATA VISUALIZATION , Nikhila Mandava

TWITTER POLICING , Hemanth Kumar Medisetty

TRANSACTION MANAGEMENT SYSYEM FOR A PUBLISHER , HASSAIN SHAREEF MOHAMMED JR

LOBANGU: AN OPTICAL CHARACTER RECOGNITION RECEIPT MANAGEMENT APP FOR HEALTH CENTER PHARMACIES IN THE D.R.CONGO AND SURROUNDING EASTERN AFRICAN COUNTRIES , Bénis Munganga

PREDICTIVE MODEL FOR CFPB CONSUMER COMPLAINTS , Vyshnavi Nalluri

REVIEW CLASSIFICATION USING NATURAL LANGUAGE PROCESSING AND DEEP LEARNING , Brian Nazareth

Brain Tumor Detection Using MRI Images , Mayur Patel

QUIZ WEB APPLICATION , Dipti Rathod

HYPOTHYROID DISEASE ANALYSIS BY USING MACHINE LEARNING , SANJANA SEELAM

Pillow Based Sleep Tracking Device Using Raspberry Pi , Venkatachalam Seviappan

FINSERV ANDROID APPLICATION , Harsh Piyushkumar Shah

AUTOMATED MEDICAL NOTES LABELLING AND CLASSIFICATION USING MACHINE LEARNING , Akhil Prabhakar Thota

GENETIC PROGRAMMING TO OPTIMIZE PERFORMANCE OF MACHINE LEARNING ALGORITHMS ON UNBALANCED DATA SET , Asitha Thumpati

GOVERNMENT AID PORTAL , Darshan Togadiya

GENERAL POPULATION PROJECTION MODEL WITH CENSUS POPULATION DATA , Takenori Tsuruga

LUNG LESION SEGMENTATION USING DEEP LEARNING APPROACHES , Sree Snigdha Tummala

DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING , Saranya Valleri

Machine Learning for Kalman Filter Tuning Prediction in GPS/INS Trajectory Estimation , Peter Wright

Theses/Projects/Dissertations from 2022 2022

LEARN PROGRAMMING IN VIRTUAL REALITY? A PROJECT FOR COMPUTER SCIENCE STUDENTS , Benjamin Alexander

LUNG CANCER TYPE CLASSIFICATION , Mohit Ramajibhai Ankoliya

HIGH-RISK PREDICTION FOR COVID-19 PATIENTS USING MACHINE LEARNING , Raja Kajuluri

IMPROVING INDIA’S TRAFFIC MANAGEMENT USING INTELLIGENT TRANSPORTATION SYSTEMS , Umesh Makhloga

DETECTION OF EPILEPSY USING MACHINE LEARNING , Balamurugan Murugesan

SOCIAL MOBILE APPLICATION: UDROP , Mahmoud Oraiqat

Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional and Recurrent Neural Networks , Sonia Perez-Gamboa

College of Education FileMaker Extraction and End-User Database Development , Andrew Tran

DEEP LEARNING EDGE DETECTION IN IMAGE INPAINTING , Zheng Zheng

Theses/Projects/Dissertations from 2021 2021

A General Conversational Chatbot , Vipin Nambiar

Verification System , Paras Nigam

DESKTOP APPLICATION FOR THE PUZZLE BOARD GAME “RUSH HOUR” , Huanqing Nong

Ahmedabad City App , Rushabh Picha

COMPUTER SURVEILLANCE SYSTEM USING WI-FI FOR ANDROID , Shashank Reddy Saireddy

ANDROID PARKING SYSTEM , Vishesh Reddy Sripati

Sentiment Analysis: Stock Index Prediction with Multi-task Learning and Word Polarity Over Time , Yue Zhou

Theses/Projects/Dissertations from 2020 2020

BUBBLE-IN DIGITAL TESTING SYSTEM , Chaz Hampton

FEEDBACK REVIEW SYSTEM USING SENTIMENT ANALYSIS , Vineeth Kukkamalla

WEB APPLICATION FOR MOVIE PERFORMANCE PREDICTION , Devalkumar Patel

Theses/Projects/Dissertations from 2019 2019

REVIEWS TO RATING CONVERSION AND ANALYSIS USING MACHINE LEARNING TECHNIQUES , Charitha Chanamolu

EASY EXAM , SARTHAK DABHI

EXTRACT TRANSFORM AND LOADING TOOL FOR EMAIL , Amit Rajiv Lawanghare

VEHICLE INFORMATION SYSTEM USING BLOCKCHAIN , Amey Zulkanthiwar

Theses/Projects/Dissertations from 2018 2018

USING AUTOENCODER TO REDUCE THE LENGTH OF THE AUTISM DIAGNOSTIC OBSERVATION SCHEDULE (ADOS) , Sara Hussain Daghustani

California State University, San Bernardino Chatbot , Krutarth Desai

ORGANIZE EVENTS MOBILE APPLICATION , Thakshak Mani Chandra Reddy Gudimetla

SOCIAL NETWORK FOR SOFTWARE DEVELOPERS , Sanket Prabhakar Jadhav

VIRTUALIZED CLOUD PLATFORM MANAGEMENT USING A COMBINED NEURAL NETWORK AND WAVELET TRANSFORM STRATEGY , Chunyu Liu

INTER PROCESS COMMUNICATION BETWEEN TWO SERVERS USING MPICH , Nagabhavana Narla

SENSOR-BASED HUMAN ACTIVITY RECOGNITION USING BIDIRECTIONAL LSTM FOR CLOSELY RELATED ACTIVITIES , Arumugam Thendramil Pavai

NEURAL NETWORK ON VIRTUALIZATION SYSTEM, AS A WAY TO MANAGE FAILURE EVENTS OCCURRENCE ON CLOUD COMPUTING , Khoi Minh Pham

EPICCONFIGURATOR COMPUTER CONFIGURATOR AND CMS PLATFORM , IVO A. TANTAMANGO

STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao

Theses/Projects/Dissertations from 2017 2017

CHILDREN’S SOCIAL NETWORK: KIDS CLUB , Eiman Alrashoud

MULTI-WAY COMMUNICATION SYSTEM , S. Chinnam

WEB APPLICATION FOR GRADUATE COURSE RECOMMENDATION SYSTEM , Sayali Dhumal

MOBILE APPLICATION FOR ATTENDANCE SYSTEM COYOTE-ATTENDANCE , Sindhu Hari

WEB APPLICATION FOR GRADUATE COURSE ADVISING SYSTEM , Sanjay Karrolla

Custom T-Shirt Designs , Ranjan Khadka

STUDENT CLASS WAITING LIST ENROLLMENT , AISHWARYA LACHAGARI

ANDROID MOBILE APPLICATION FOR HOSPITAL EXECUTIVES , Vihitha Nalagatla

PIPPIN MACHINE , Kiran Reddy Pamulaparthy

SOUND MODE APPLICATION , Sindhuja Pogaku

I2MAPREDUCE: DATA MINING FOR BIG DATA , Vishnu Vardhan Reddy Sherikar

COMPARING AND IMPROVING FACIAL RECOGNITION METHOD , Brandon Luis Sierra

NATURAL LANGUAGE PROCESSING BASED GENERATOR OF TESTING INSTRUMENTS , Qianqian Wang

AUTOMATIC GENERATION OF WEB APPLICATIONS AND MANAGEMENT SYSTEM , Yu Zhou

Theses/Projects/Dissertations from 2016 2016

CLOTH - MODELING, DEFORMATION, AND SIMULATION , Thanh Ho

CoyoteLab - Linux Containers for Educational Use , Michael D. Korcha

PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS , Essa Yahya M Muharish

DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP , Bir Apaar Singh Sodhi

Theses/Projects/Dissertations from 2015 2015

APPLY DATA CLUSTERING TO GENE EXPRESSION DATA , Abdullah Jameel Abualhamayl Mr.

Density Based Data Clustering , Rayan Albarakati

Developing Java Programs on Android Mobile Phones Using Speech Recognition , Santhrushna Gande

THE DESIGN AND IMPLEMENTATION OF AN ADAPTIVE CHESS GAME , Mehdi Peiravi

CALIFORNIA STATE UNIVERSITY SAN BERNARDINO WiN GPS , Francisco A. Ron

ESTIMATION ON GIBBS ENTROPY FOR AN ENSEMBLE , Lekhya Sai Sake

Advanced Search

  • Notify me via email or RSS
  • Department, Program, or Office
  • Disciplines

Author Corner

  • School of Computer Science and Engineering Website

A service of the John M. Pfau Library

Digital Commons Network

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright Acrobat Reader

Grad Coach

Research Topics & Ideas: CompSci & IT

50+ Computer Science Research Topic Ideas To Fast-Track Your Project

IT & Computer Science Research Topics

Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you’ve landed on this post, chances are you’re looking for a computer science-related research topic , but aren’t sure where to start. Here, we’ll explore a variety of CompSci & IT-related research ideas and topic thought-starters, including algorithms, AI, networking, database systems, UX, information security and software engineering.

NB – This is just the start…

The topic ideation and evaluation process has multiple steps . In this post, we’ll kickstart the process by sharing some research topic ideas within the CompSci domain. This is the starting point, but to develop a well-defined research topic, you’ll need to identify a clear and convincing research gap , along with a well-justified plan of action to fill that gap.

If you’re new to the oftentimes perplexing world of research, or if this is your first time undertaking a formal academic research project, be sure to check out our free dissertation mini-course. In it, we cover the process of writing a dissertation or thesis from start to end. Be sure to also sign up for our free webinar that explores how to find a high-quality research topic. 

Overview: CompSci Research Topics

  • Algorithms & data structures
  • Artificial intelligence ( AI )
  • Computer networking
  • Database systems
  • Human-computer interaction
  • Information security (IS)
  • Software engineering
  • Examples of CompSci dissertation & theses

Topics/Ideas: Algorithms & Data Structures

  • An analysis of neural network algorithms’ accuracy for processing consumer purchase patterns
  • A systematic review of the impact of graph algorithms on data analysis and discovery in social media network analysis
  • An evaluation of machine learning algorithms used for recommender systems in streaming services
  • A review of approximation algorithm approaches for solving NP-hard problems
  • An analysis of parallel algorithms for high-performance computing of genomic data
  • The influence of data structures on optimal algorithm design and performance in Fintech
  • A Survey of algorithms applied in internet of things (IoT) systems in supply-chain management
  • A comparison of streaming algorithm performance for the detection of elephant flows
  • A systematic review and evaluation of machine learning algorithms used in facial pattern recognition
  • Exploring the performance of a decision tree-based approach for optimizing stock purchase decisions
  • Assessing the importance of complete and representative training datasets in Agricultural machine learning based decision making.
  • A Comparison of Deep learning algorithms performance for structured and unstructured datasets with “rare cases”
  • A systematic review of noise reduction best practices for machine learning algorithms in geoinformatics.
  • Exploring the feasibility of applying information theory to feature extraction in retail datasets.
  • Assessing the use case of neural network algorithms for image analysis in biodiversity assessment

Topics & Ideas: Artificial Intelligence (AI)

  • Applying deep learning algorithms for speech recognition in speech-impaired children
  • A review of the impact of artificial intelligence on decision-making processes in stock valuation
  • An evaluation of reinforcement learning algorithms used in the production of video games
  • An exploration of key developments in natural language processing and how they impacted the evolution of Chabots.
  • An analysis of the ethical and social implications of artificial intelligence-based automated marking
  • The influence of large-scale GIS datasets on artificial intelligence and machine learning developments
  • An examination of the use of artificial intelligence in orthopaedic surgery
  • The impact of explainable artificial intelligence (XAI) on transparency and trust in supply chain management
  • An evaluation of the role of artificial intelligence in financial forecasting and risk management in cryptocurrency
  • A meta-analysis of deep learning algorithm performance in predicting and cyber attacks in schools

Research topic idea mega list

Topics & Ideas: Networking

  • An analysis of the impact of 5G technology on internet penetration in rural Tanzania
  • Assessing the role of software-defined networking (SDN) in modern cloud-based computing
  • A critical analysis of network security and privacy concerns associated with Industry 4.0 investment in healthcare.
  • Exploring the influence of cloud computing on security risks in fintech.
  • An examination of the use of network function virtualization (NFV) in telecom networks in Southern America
  • Assessing the impact of edge computing on network architecture and design in IoT-based manufacturing
  • An evaluation of the challenges and opportunities in 6G wireless network adoption
  • The role of network congestion control algorithms in improving network performance on streaming platforms
  • An analysis of network coding-based approaches for data security
  • Assessing the impact of network topology on network performance and reliability in IoT-based workspaces

Free Webinar: How To Find A Dissertation Research Topic

Topics & Ideas: Database Systems

  • An analysis of big data management systems and technologies used in B2B marketing
  • The impact of NoSQL databases on data management and analysis in smart cities
  • An evaluation of the security and privacy concerns of cloud-based databases in financial organisations
  • Exploring the role of data warehousing and business intelligence in global consultancies
  • An analysis of the use of graph databases for data modelling and analysis in recommendation systems
  • The influence of the Internet of Things (IoT) on database design and management in the retail grocery industry
  • An examination of the challenges and opportunities of distributed databases in supply chain management
  • Assessing the impact of data compression algorithms on database performance and scalability in cloud computing
  • An evaluation of the use of in-memory databases for real-time data processing in patient monitoring
  • Comparing the effects of database tuning and optimization approaches in improving database performance and efficiency in omnichannel retailing

Topics & Ideas: Human-Computer Interaction

  • An analysis of the impact of mobile technology on human-computer interaction prevalence in adolescent men
  • An exploration of how artificial intelligence is changing human-computer interaction patterns in children
  • An evaluation of the usability and accessibility of web-based systems for CRM in the fast fashion retail sector
  • Assessing the influence of virtual and augmented reality on consumer purchasing patterns
  • An examination of the use of gesture-based interfaces in architecture
  • Exploring the impact of ease of use in wearable technology on geriatric user
  • Evaluating the ramifications of gamification in the Metaverse
  • A systematic review of user experience (UX) design advances associated with Augmented Reality
  • A comparison of natural language processing algorithms automation of customer response Comparing end-user perceptions of natural language processing algorithms for automated customer response
  • Analysing the impact of voice-based interfaces on purchase practices in the fast food industry

Research Topic Kickstarter - Need Help Finding A Research Topic?

Topics & Ideas: Information Security

  • A bibliometric review of current trends in cryptography for secure communication
  • An analysis of secure multi-party computation protocols and their applications in cloud-based computing
  • An investigation of the security of blockchain technology in patient health record tracking
  • A comparative study of symmetric and asymmetric encryption algorithms for instant text messaging
  • A systematic review of secure data storage solutions used for cloud computing in the fintech industry
  • An analysis of intrusion detection and prevention systems used in the healthcare sector
  • Assessing security best practices for IoT devices in political offices
  • An investigation into the role social media played in shifting regulations related to privacy and the protection of personal data
  • A comparative study of digital signature schemes adoption in property transfers
  • An assessment of the security of secure wireless communication systems used in tertiary institutions

Topics & Ideas: Software Engineering

  • A study of agile software development methodologies and their impact on project success in pharmacology
  • Investigating the impacts of software refactoring techniques and tools in blockchain-based developments
  • A study of the impact of DevOps practices on software development and delivery in the healthcare sector
  • An analysis of software architecture patterns and their impact on the maintainability and scalability of cloud-based offerings
  • A study of the impact of artificial intelligence and machine learning on software engineering practices in the education sector
  • An investigation of software testing techniques and methodologies for subscription-based offerings
  • A review of software security practices and techniques for protecting against phishing attacks from social media
  • An analysis of the impact of cloud computing on the rate of software development and deployment in the manufacturing sector
  • Exploring the impact of software development outsourcing on project success in multinational contexts
  • An investigation into the effect of poor software documentation on app success in the retail sector

CompSci & IT Dissertations/Theses

While the ideas we’ve presented above are a decent starting point for finding a CompSci-related research topic, they are fairly generic and non-specific. So, it helps to look at actual dissertations and theses to see how this all comes together.

Below, we’ve included a selection of research projects from various CompSci-related degree programs to help refine your thinking. These are actual dissertations and theses, written as part of Master’s and PhD-level programs, so they can provide some useful insight as to what a research topic looks like in practice.

  • An array-based optimization framework for query processing and data analytics (Chen, 2021)
  • Dynamic Object Partitioning and replication for cooperative cache (Asad, 2021)
  • Embedding constructural documentation in unit tests (Nassif, 2019)
  • PLASA | Programming Language for Synchronous Agents (Kilaru, 2019)
  • Healthcare Data Authentication using Deep Neural Network (Sekar, 2020)
  • Virtual Reality System for Planetary Surface Visualization and Analysis (Quach, 2019)
  • Artificial neural networks to predict share prices on the Johannesburg stock exchange (Pyon, 2021)
  • Predicting household poverty with machine learning methods: the case of Malawi (Chinyama, 2022)
  • Investigating user experience and bias mitigation of the multi-modal retrieval of historical data (Singh, 2021)
  • Detection of HTTPS malware traffic without decryption (Nyathi, 2022)
  • Redefining privacy: case study of smart health applications (Al-Zyoud, 2019)
  • A state-based approach to context modeling and computing (Yue, 2019)
  • A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks (Solomon, 2019)
  • HRSB-Tree for Spatio-Temporal Aggregates over Moving Regions (Paduri, 2019)

Looking at these titles, you can probably pick up that the research topics here are quite specific and narrowly-focused , compared to the generic ones presented earlier. This is an important thing to keep in mind as you develop your own research topic. That is to say, to create a top-notch research topic, you must be precise and target a specific context with specific variables of interest . In other words, you need to identify a clear, well-justified research gap.

Fast-Track Your Research Topic

If you’re still feeling a bit unsure about how to find a research topic for your Computer Science dissertation or research project, check out our Topic Kickstarter service.

You Might Also Like:

Research topics and ideas about data science and big data analytics

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments.

Steps on getting this project topic

Joseph

I want to work with this topic, am requesting materials to guide.

Yadessa Dugassa

Information Technology -MSc program

Andrew Itodo

It’s really interesting but how can I have access to the materials to guide me through my work?

Sorie A. Turay

That’s my problem also.

kumar

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments is in my favour. May i get the proper material about that ?

BEATRICE OSAMEGBE

BLOCKCHAIN TECHNOLOGY

Nanbon Temasgen

I NEED TOPIC

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly

Computer Science

Doctoral Dissertations

Following is a complete list of doctoral graduates of the Department of Computer Science, with their dissertation titles. Graduates of other departments or schools, whose primary adviser was a member of the Department of Computer Science, are also listed.

Advisors names are given in parentheses. Advisor affiliations are given if the advisor was not on the UNC Department of Computer Science faculty.

Clicking on the author’s name will take you to a separate page containing dissertation abstracts, where available.

Availability

UNC Libraries: Except where noted, all of the dissertations listed here are available from the libraries at UNC-Chapel Hill. Those from the most recent year will not immediately be available, however.

  • ProQuest database
  • Microfiche copies: Microforms Section of Davis Library (second floor)
  • Bound copies: Brauer Library, Phillips Hall
  • Non-circulating copies: North Carolina Collection, Wilson Library

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Ph.d. graduates.

Abram, Gregory D. (1986) “Parallel Image Generation with Anti-Aliasing and Texturing” (Henry Fuchs)

Ackerman, Jeremy D. (2002) “Application of Augmented Reality to Laparoscopic Surgery” (Henry Fuchs)

Ackermann Jr., Arthur F. (1972)  “Toward A Programming Language for Writing and Checking Mathematical Discourses” (Donald F. Stanat)

Ahn, Ilsoo (1986) “Performance Modeling and Access Methods for Temporal Database Management Systems” (Richard T. Snodgrass)

Ahuja, Vijay (1976)  “Exposure of Routed Networks to Deadlock” (Victor L. Wallace)

Aikat, Jay (2010) “An Investigation of the Effects of Modeling Application Workloads and Path Characteristics on Network Performance” (Kevin Jeffay)

Airey, John M. (1990) “Increasing Update Rates in the Building Walkthrough System with Automatic Model-Space Subdivision and Potentially Visible Set Calculations” (Frederick P. Brooks Jr.)

Alexander, Geoffrey D. (1995) “Proving First-Order Equality Theorems with Hyper-Linking” (David A. Plaisted)

Aliaga, Daniel G. (1999)  “Automatically Reducing and Bounding Geometric Complexity by Using Images” (Anselmo A. Lastra)

Allen, Bonnie Danette (2007) “Hardware Design Optimization for Human Motion Tracking Systems” (Greg Welch)

Amburn, Elton P. (1994) “Development and Evaluation of an Air-to-Air Combat Debriefing System Using a Head-Mounted Display” (Frederick P. Brooks Jr.)

Ammirato, Philip (2019) “Recognizing Fine-Grained Object Instances for Robotics Applications” (Alex Berg)

Antani, Lakulish (2013) “Interactive Sound Propogation Using Precomputation and Statistical Approximations” (Dinesh Manocha)

Arthur, Kevin (2000)  “Effects of Field of View on Performance with Head-Mounted Displays” (Frederick P. Brooks Jr.)

Austin Jr., Joseph H. (1973)  “Formal Models of Binding Processes in Control Programs” (Victor L. Wallace)

Aylward, Stephen R. (1997) “Continuous Mixture Modeling via Goodness-of-Fit Cores” (James M. Coggins)

Azuma, Ronald T. (1995) “Predictive Tracking for Augmented Reality” (Gary Bishop)

Babich, Wayne A. (1977)  “High Level Data Flow Analysis Using a Parse Tree Representation of the Program” (Medhi Jazayeri)

Bajura, Michael A. (1997) “Merging Real and Virtual Environments with Video See-Through Head-Mounted Displays” (Henry Fuchs)

Bandyopadhyay, Deepak (2006) “A Geometric Framework for Robust Neighbor Analysis of Protein Structure and Function” (Jack Snoeyink)

Banks, David C. (1993) “Interacting with Surfaces in Four Dimensions Using Computer Graphics” (Stephen M. Pizer)

Bapat, Akash (2019) “Towards High-Frequency Tracking and Fast Edge-Aware Optimization” (Jan Michael-Frahm)

Bartel, Jacob (2015) “Predictions to Ease User’s Effort in Scalable Sharing (Prasun Dewan)

Bastos, Rui (1999) “Superposition Rendering: Increased Realism for Interactive Walkthrough” (Frederick P. Brooks Jr.)

Baxter, William V. III (2004) “Physically-based Modeling Techniques for Interactive Digital Painting” (Ming Lin)

Bellovin, Steven M. (1982) “Verifiably Correct Code Generation Using Predicate Transformers” (David L. Parnas)

Bennett, Eric Paul (2007) “Computational Video Enhancement” (Leonard McMillan)

Bentley, Jon L. (1976)  “Divide and Conquer Algorithms for Closest Point Problems in Multidimensional Space” (Donald F. Stanat)

Bera, Aniket (2017) “Interactive Tracking, Prediction, and Behavior Learning of Pedestrians in Dense Crowds (Dinesh Manocha)

Bergman, Lawrence D. (1993) “VIEW–A System for Prototyping Scientific Visualizations” (Frederick P. Brooks Jr.)

Best, Andrew (2018) “Motion Planning for Multi-Agent Systems with Physics-Based and Behavior Constraints” (Dinesh Manocha)

Bethea, Darrell (2015) “WACCO & LOKO: Strong Consistency at Global Scale” (Mike Reiter)

Bhalachandra, Sridutt (2018) “Runtime Methods to Improve Energy Efficiency in Supercomputing Applications” (Allan K. Porterfield & Jan Prins)

Biagioni, Edoardo S. (1992) “Scan Directed Load Balancing” (Gyula A. Mago and Jan F. Prins)

Bishop, T. Gary (1984) “Self-Tracker: A Smart Optical Sensor on Silicon” (Henry Fuchs)

Blate, Alex (2019) “Mitigating Real-Virtual Disparities in Illumination and Dynamic Position in Optical See-Through Augmented Reality” (Henry Fuchs and Mary Whitton)

Block, Aaron (2008) “Adaptive Multiprocessor Real-Time Systems” (James Anderson)

Bokinsky, Alexandra A. (2003) “Visualization of Multiple Spatial Variables with Data-Driven Spots” (Frederick P. Brooks, Jr.)

Bollella, Gregory (1997)  “Slotted Priorities: Supporting Real-Time Computing Within General-Purpose Operating Systems” (Kevin Jeffay)

Borland, David Morrison (2007) “Flexible Occlusion Rendering for Improved Views of Three-Dimensional Medical Images” (Russell M. Taylor)

Bowen, Chris (2018) “Robots that Learn and Plan: Unifying Robot Learning and Motion Planning for Generalized Task Execution” (Ron Alterovitz)

Brandenburg, Bjoern B. (2011) “Scheduling and Locking in Multiprocessor Real-Time Operating Systems” (James H. Anderson)

Britton, Edward G. (1977)  “A Methodology for the Ergonomic Design of Interactive Computer Graphic Systems, and its Application to Crystallography” (Frederick P. Brooks Jr.)

Broadhurst, Robert Elijah (2008) “Compact Appearance in Object Populations Using Quantile Function Based Distribution Families” (Stephen Pizer)

Brown, Peter H. (2002) “Multiscale Evaluation of 3D Shape Perception in Computer Graphics” (Christina Burbeck)

Brown, Shawn (2015) “Case Studies on Optimizing Algorithms for GPU Architectures” (Jack Snoeyink)

Brownlee, Jr., Edward H. (1975)  “Lossiness in Tessellation Automata” (Stephen F. Weiss)

Burns, Eric (2007) “MACBETH: Management of Avatar Conflict By Employment of a Technique Hybrid” (Frederick P. Brooks, Jr.)

Buttelmann III, H. William (1970) “Syntax-Semantics Systems As Structure Manipulation Systems: Phrase Structure Grammars and Generalized Finite Automata” (David B. Benson)

Calandrino, John (2009) “On the Design and Implementation of a Cache-Aware Soft Real-Time Scheduler for Multicore Platforms” (James Anderson)

Cannon, Robert L. (1973)  “State Grammar Parsing” (Stephen F. Weiss)

Cao, Tian (2016) “Coupled Dictionary Learning for Image Analysis” (Marc Niethammer)

Carlson, Eric D. (1972)  “Techniques for Analysis of Generalized Data Base Management Systems” (Peter Calingaert)

Carter, Jason L. (2014) “Automatic Difficulty Detection” (Prasun Dewan)

Chadha, Ritu (1991) “Applications of Unskolemization” (David A. Plaisted)

Chan, Francis H. (1982)  (Biomedical Engineering and Mathematics, UNC-Chapel Hill) “Evaluating the Perceived Dynamic Range of A Display Device Using Pseudocolor” (Stephen M. Pizer)

Chandak, Anish (2011)  “Efficient Geometric Sound Propagation Using Visibility Culling.” (Dinesh Manocha)

Chang, Chun-Fa. (2001) “LDI Tree: A Sampling Rate Preserving and Hierarchical Data Representation for Image-Based Rendering” (Gary Bishop)

Chattopadhyay, Bipasa (2015) “Integrating Pragmatic Constraints and Behaviors Into Real-Time Scheduling Theory” (Sanjoy Baruah)

Chen, David T. (1998)  “Volume Rendering Guided by Multiscale Medial Models” (Stephen M. Pizer)

Chen, Wei Chao (2002)  “Light Field Mapping: Efficient Representation of Surface Light Fields” (Henry Fuchs)

Cheng, Wei (2015) “Toward Robust Group-Wise eQTL Mapping Via Integrating Multi-Domain Heterogeneous Data” (Wei Wang)

Chou, Chen-Rui (2013)  “Regression Learning for 2D/3D Image Registration” (Stephen M. Pizer)

Christiansen, Mikkel, Aalborg University, Denmark (2002) “The Performance of HTTP Traffic Under Random Early Detection Queue Management” ( Kevin Jeffay and Don Smith)

Chu, Heng (1994) “Semantically Guided First-Order Theorem Proving with Hyper-Linking” (David A. Plaisted)

Chung, Goopeel (2002) “Log-based Collaborative Infrastructure” (Prasun Dewan)

Chung, James Che-Ming (1993) “Intuitive Navigation in the Targeting of Radiation Therapy Treatment Beams” (Frederick P. Brooks Jr.)

Clary, Gregory (2003) “Image Sequence Classification via Anchor Primitives” (Stephen M. Pizer)

Clipp, Brian Sanderson (2010) “Multi-Camera Simultaneous Localization and Mapping” (Marc Pollefeys and Jan-MIchael Frahm)

Cochran, Robby (2015) “Symbolic Verification of Remote Client Behavior in Distributed Systems” (Mike Reiter)

Cohen, Jonathan D. (1998) “Appearance-Preserving Simplification of Polygonal Models” (Dinesh Manocha)

Coombe, Greg (2007) “Practical Surface Light Fields” (Anselmo Lastra)

Couture, Heather (2018) “Discriminative Representations for Heterogeneous Images and Multimodal Data” (Marc Niethammer)

Cromartie, Robert C. (1995) “Structure-Sensitive Contrast Enhancement: Development and Evaluation” (Stephen M. Pizer)

Crouch, Jessica Renee Crawford (2003) “Medial Techniques for Automating Finite Element Analysis” (Stephen M. Pizer)

Culver, Timothy (2000) “Computing the Medial Axis of a Polyhedron Reliably and Efficiently” (Dinesh Manocha)

Curtis, Sean (2014) “Pedestrian Velocity Obstacles: Pedestrian Simulation through Reasoning in Velocity Space” (Dinesh Manocha)

Danforth, Scott H. (1983) “DOT: A Distributed Operating System Model of a Tree-Structured Multiprocessor” (Guyla A. Mago)

Davis, Bradley Charles (2008) “Medical Image Analysis via Frechet Means of Diffeomorphisms” (Sarang C. Joshi; Stephen Pizer, committee chair)

Davis, Mark C. (1990) “A Computer for Low Context-Switch Time” (Frederick P. Brooks Jr.)

Devi, UmaMaheswari C. (2006) “Soft Real-Time Scheduling on Multiprocessors” (James Anderson)

Dou, Mingson (2015) “Enhanced 3D Capture for Room-Sized Dynamic Scenes with Commodity Depth Cameras” (Henry Fuchs)

Dunigan Jr., Thomas H. (1978)  “The Design of a Computer System with All-Electronic Files” (Frederick P. Brooks Jr.)

Dwyer, Christopher L. (2003) “Self-Assembled Computer Architecture: Design and Fabrication Theory” (Russell Taylor)

Dybvig, R. Kent (1987) “Three Implementation Models for Scheme” (Gyula A. Mago)

Eastman, Caroline M. (1977)  “A Tree Algorithm for Nearest Neighbor Searching in Document Retrieval Systems” (Stephen F. Weiss)

Eastwood, Brian (2009) “Multiple Layer Image Analysis for Video Microscopy” (Russell Taylor)

Eberly, David H. (1994) “Geometric Methods for Analysis of Ridges in N-Dimensional Images” (Stephen M. Pizer)

Elliott, Glenn (2015) “Real-Time Scheduling of GPU’s with Applications in Advanced Automotive Systems” (Jim Anderson)

Ellsworth, David A. (1996) “Polygon Rendering for Interactive Visualization on Multicomputers” (Henry Fuchs)

Erikson, Carl M. (2000)  “Hierarchical Levels of Detail to Accelerate the Rendering of Large Static and Dynamic Polygonal Environments” (Dinesh Manocha)

Erickson, Jeremy P. (2014) “Managing Tardiness Bounds and Overload in Soft Real-Time Systems” (Jim Anderson)

Faith, Rickard E. (1998)  “Debugging Programs After Structure-Changing Transformation” (Jan F. Prins)

Faulk, Stuart R.(1989) “State Determination in Hard-Embedded Systems” (David L. Parnas)

Feng, David (2010) “Visualization of Uncertain Multivariate 3D Scalar Fields” (Russell M. Taylor II)

Fisher, Nathan W. (2007) “The Multiprocessor Real-Time Scheduling of General Task Systems” (Sanjoy K. Baruah)

Fletcher, Preston Tom (2004) “Statistical Variability in Nonlinear Spaces: Application to Shape Analysis and DT-MRI” (Stephen Pizer)

Frank, Geoffrey A. (1979)  “Virtual Memory Systems for Closed Applicative Language Interpreters” (Donald F. Stanat)

Fredericksen, R. Eric (1993) “The Biological Computation of Visual Motion” (Stephen M. Pizer and Willem H. van de Grind, University of Utrecht)

Fridman, Yonatan (2004) “Extracting Branching Object Geometry via Cores” (Stephen Pizer)

Fritsch, Daniel S. (1993)  (Biomedical Engineering, UNC-Chapel Hill) “Registration of Radiotherapy Images Using Multiscale Medial Descriptions of Image Structure” (James Coggins)

Fu, Chen-Ping (2015) “Analysis of Admixed Animals Using Indirect Haplotype Information from Existing Technologies” (Leonard McMillan)

Funk, Shelby (2004) “EDF Scheduling on Heterogeneous Multiprocessors” (Sanjoy Baruah)

Furst, Jacob D. (1999)  “Height Ridges of Oriented Medialness” (Stephen M. Pizer)

Gallup, David (2010) “Efficient 3D Reconstruction of Large-Scale Urban Environments from Street-Level Video” (Marc Pollefeys and Jan-Michael Frahm)

Galoppo, Nico (2008) “Animation, Simulation, and Control of Soft Characters using Layered Representations and Simplified Physics-based Methods” (Ming Lin)

Gamblin, Todd (2009) “Scalable Performance Measurement and Analysis” (Dan Reed)

Gao, Yaozong (2016) “Accurate CT Pelvic Organ Segmentation in Image Guided Radiotherapy of Prostate Cancer” (Dinggang Shen)

Gauch, John M. (1989) “The Multiresolution Intensity Axis of Symmetry and its Application to Image Segmentation” (Stephen M. Pizer)

Gauch, Susan E. (1990) “An Expert System for Searching in Full-Text” (John B. Smith)

Gayle, Russell T. (2010) “Physics-based Sampling for Motion Planning” (Dinesh Manocha and Ming Lin)

Gill, Gennette D. (2010) “Analysis and Optimization for Pipelined Asynchronous Systems” (Montek Singh)

Glassner, Andrew S. (1988) “Algorithms for Efficient Image Synthesis” (Frederick P. Brooks Jr.)

Goddard, Stephen (1998) “On the Management of Latency in the Synthesis of Real-Time Signal Processing Systems from Processing Graphs” (Kevin Jeffay)

Golas, Abhinav (2015) “Modeling Complex Large-Scale Flow Phemomena” (Ming Lin)

Gong, Yunchao (2014) “Large-Scale Image Retrieval Using Similarity Preserving Binary Codes” (Lana Lazebnick)

Gottschalk, Stefan (2000) “Collision Queries Using Oriented Bounding Boxes” (Ming C. Lin and Dinesh Manocha)

Gotz, David. (2005) “Channel Set Adaptation: Scalable and Adaptive Streaming for Non-Linear Media” (Ketan Mayer-Patel)

Govindaraju, Naga (2004) “Efficient Visability-based Algorithms for Interactive Walkthrough, Shadow Generation, and Collision Detection” (Dinesh Manocha)

Grant, Eric D. (1991) “Constraint-Based Design by Cost Function Optimization” (Turner Whitted)

Gross, Richard R. (1985) “Using Software Technology to Specify Abstract Interfaces in VLSI Design” (Peter Calingaert)

Guan, Li (2010) “Multi-view Dynamic Scene Modeling” (Mark Pollefeys)

Guan, Sheng-Uei (1989) “A Model, Architecture, and Operating System Support for Shared Workspace Cooperation” (Hussein Abdel-Wahab)

Guo, Zhishan (2016) “Real-Time Scheduling of Mixed-Critical Workloads Upon Platforms with Uncertainties” (Sanjoy Baruah)

Gupta, Gopal (1992) “Parallel Execution of Logic Programs on Shared Memory Multiprocessors” (Bharadwaj Jayaraman)

Guy, Stephen J. (2012) “Geometric Collision Avoidance for Heterogeneous Crowd Simulation” (Ming Lin & Dinesh Manocha)

Gyllstrom, Karl A. (2009) “Enriching personal information management with document interaction histories” (David Stotts)

Hamlin, Jr., Griffith Askew (1975) “Configural application for satellite graphics”

Han, Qiong (2008) “Proper Shape Representation of Single- and Multi-Figure Anatomical Objects” (Stephen Pizer)

Han, Taisook (1990) “A New Class of Recursive Routing Algorithms on Mesh-connected Computers” (Donald F. Stanat)

Han, Xufeng (2016) “Learning with More Data and Better Models for Visual Similarity and Differentiation” (Alex Berg)

Harris, Mark Jason (2003) “Real-Time Cloud Simulation and Rendering” (Anselmo Lastra)

Heath, Lenwood S. (1985) “Algorithms for Embedding Graphs in Books” (Arnold Rosenberg, Duke University)

Heinly, Jared Scott (2015) “Toward Efficiant and Robust Large-Scale Structure-From-Motion Systems” (Jan-Michael Frahm & Enrique Dunn)

Hensley, Justin Aaron (2007) “Increasing Rendering Performance of Graphics Hardware” (Anselmo Lastra and Montek Singh)

Hernandez-Campos, Felix (2006) “Generation and Validation of Empirically-derived TCP Application Workloads” (Kevin Jeffay)

Hetzel, William C. (1976)  “An Experimental Analysis of Program Verification Methods” (Peter Calingaert)

Hillesland, Karl E. (2005) “Image Streaming to Build Image-based Models” (Anselmo Lastra)

Hirota, Gentaro (2002) “An Improved Finite Element Contact Model for Anatomical Simulations” (Henry Fuchs)

Ho, Sean (2004) “Profile Scale Spaces for Statistical Image Match in Bayesian Segmentation” (Guido Gerig)

Hoffman, Daniel M. (1984) “Trace Specification of Communications Protocols” (Richard T. Snodgrass)

Hoffman, Doug L. (1996) “Comparison of Protein Structures by Transformation into Dihedral Angle Sequences” (Raj K. Singh)

Holloway, Richard L. (1995) “Registration Errors in Augmented Reality Systems” (Frederick P. Brooks Jr.)

Holman, Philip (2004) “Implementation of Pfair-scheduled Multiprocessor Systems” (James Anderson)

Holt, James Matthew (2016) “Using the Multi-String Burrow-Wheeler Transform for High-Throughput Sequence Analysis” (Leonard McMillan)

Hong, Yi (2016) “Image and Shape Analysis for Spatiotemporal Data” (Marc Niethammer)

Hong, Junpyo (2018) “Classification of Neuroanatomical Structures Based on Non-Euclidean Geometric Properties” (Stephen M. Pizer)

Hsieh, Cheng-Hong (1989) “A Connectionist Algorithm for Image Segmentation” (Stephen M. Pizer)

Huan, Jun (Luke) (2006) “Graph-based Pattern Discovery in Protein Structures” (Jan Prins and Wei Wang)

Huang, Shunping (2015) “Correcting Reference Bias in High-Throughput Sequencing Analysis” (Wei Wang)

Hudson, Thomas C. (2004) “Adapting a Collaborative, Force-Feedback, Graphical User Interface to Best-Effort Networks” (Russell M. Taylor II and Kevin Jeffay)

Hultquist, Jeffrey P. (1995) “Interactive Numerical Flow Visualization Using Stream Surfaces” (Frederick P. Brooks Jr.)

Ichnowski, Jeffrey (2019) “Scaling Robot Motion Planning to Multi-Core Processors and the Cloud” (Ron Alterovitz)

Ilie, Dumitru Adrian (2010) “On-Line Control of Active Camera Networks” (Greg Welch)

Insko, Brent E. (2001) “Passive Haptics Significantly Enhances Virtual Environments” (Frederick P. Brooks Jr.)

Interrante, Victoria L. (1996) “Illustrating Transparency: Communicating the 3D Shape of Layered Transparent Surfaces via Texture” (Henry Fuchs and Stephen M. Pizer)

Isenburg, Martin (2004) “Compression and Streaming of Polygon Meshes” (Jack Snoeyink)

Janikow, Cezary Z. (1991) “Inductive Learning of Decision Rules from Attribute-Based Examples: A Knowledge-Intensive Genetic Algorithm Approach” (Kenneth De Jong and David A. Plaisted)

Jeong, Ja-Yeon (2009) “Estimation of Probability Distribution on Multiple Anatomical Objects and Evaluation of Statistical Shape Models” (Stephen Pizer)

Jerald, Jason (2009) “Scene-Motion Thresholds and Latency Thresholds for Head-Mounted Displays” (Frederick P. Brooks, Jr.)

Ji, Dinghuang (2017) “Data-Driven 3D Reconstruction and View Synthesis of Dynamic Scene Elements” (Jan-Michael Frahm)

Jin, Ning (2012) “Discriminative Subgraph Pattern Mining and Its Applications” (Wei Wang)

Johnson, Frankford M. (1969)  (Education, UNC-Chapel Hill) “An Experiment in the Teaching of Programming Language/One Using Computer Assisted Instruction” (Frederick P. Brooks, Jr.)

Johnson, Tyler M.(2009) “A Cooperative Approach to Continuous Calibration in Multi-Projector Displays” (Henry Fuchs)

Jolley Jr., Truman M. (1972)  “The Use of the Walsh Transform in Scintigram Enhancement” (Stephen M. Pizer)

Jones, Edward L. (1984) “Procedure-Level Program Modeling for Virtual-Memory Performance Improvement” (Peter Calingaert)

Junuzovic, Sasa (2010) “Towards Self-Optimizing Frameworks for Collaborative Systems” (Prasun Dewan)

Kabul, Ilknur Kaynar (2011) “Patient-specific Anatomical Illustration via Model-guided Texture Synthesis” (Stephen M. Pizer)

Kalarickal, George J. (1998)  “Theory of Cortical Plasticity in Vision” (Jonathan A. Marshall)

Kao, Chia-Yu (Katy) (2018) “A Deep Learning Architecture for Histology Image Classification” (Leonard McMillan)

Katz, Robert (2002) “Shape Analysis for Computer Graphics via Figural Models of Perception” (Stephen M. Pizer)

Kehs, David R. (1978)  “A Routing Network for a Machine to Execute Reduction Languages” (Gyula A. Mago)

Keyser, John. (2000) “Exact Boundary Evaluation for Curved Solids” (Dinesh Manocha)

Kiapour, Mahammadhadi (Hadi) (2015) “Large Scale Visual Recognition of Clothing, People, and Styles” (Tamara Berg)

Kilpatrick, Paul J. (1976)  “The Use of a Kinesthetic Supplement in an Interactive Graphics System” (Frederick P. Brooks Jr.)

Kim, Hyo Jin (2018) “Learning Adaptive Representations for Image Retrieval” (Jan-Michael Frahm)

Kim, Namhoon (2019) “Combining Hardware Management with Mixed-Criticality Provisioning in Multicore Real-Time Systems” (Jim Anderson)

Kim, Seon Joo (2008) “Radiometric Calibration Methods from Image Sequences” (Marc Pollefeys)

Kim, Sujeong (2015) “Velocity-Spece Reasoning for Interactive Simulation of Dynamic Crowd Behaviors” (Dinesh Manocha)

Kim, Theodore W. (2006) “Physically-Based Simulation of Ice Formation” (Ming Lin)

Kim, Yong-Jik (2003) “Time Complexity Bounds for Shared-memory Mutual Exclusion” (James Anderson)

Kohli, Luv (2013) “Redirected Touching” (Frederick P. Brooks, Jr.)

Koltun, Philip L. (1982) “Evaluation of a Teaching Approach for Introductory Computer Programming” (Donald F. Stanat)

Konstantinow, George, Jr. (1983)  (Biomedical Engineering and Mathematics, UNC-Chapel Hill) “Automated Region of Interest Selection and Decontamination of Time Activity Curves From First Pass Radionuclide Angiocardiographic Data” (Stephen M. Pizer)

Kosa, Martha J. (1994) “Consistency Guarantees for Concurrent Shared Objects: Upper and Lower Bounds” (Jennifer Welch)

Koster, V. Alexis (1977)  “Execution Time and Storage Requirements of Reduction Language Programs on a Reduction Machine” (Gyula A. Mago)

Kotliar, Michael S. (1989) “The Right Stuff–Techniques for High Speed CMOS Circuit Synthesis” (Kye S. Hedlund)

Krajcevski, Pavel (2016) “Improved Encoding for Compressed Textures” (Dinesh Manocha)

Krishnan, Shankar (1997)  “Efficient and Accurate Boundary Evaluation Algorithms for Boolean Combinations of Sculptured Solids” (Dinesh Manocha)

Kum, Hye-Chung (Monica) (2004) “Approximate Mining of Consensus Sequential Patterns” (Wei Wang and Dean Duncan)

Kum, Sang-Uok (2006) “Encoding of Multiple Depth Streams” (Ketan Mayer-Patel)

Kumar, Subodh (1996) “Interactive Rendering of Parametric Spline Surfaces” (Dinesh Manocha)

Kuntz, Alan (2019) “Integrating Optimization and Sampling for Robot Motion Planning with Applications in Healthcare” (Ron Alterovitz)

Ladd, Brian C. (2000) “Lingua Graphica: A Language for Concise Expression of Graph-Based Algorithms” (John B. Smith)

Lamastra, Gerardo – Scuola Superiore Santa Anna, Italy (2000) “Operating Systems for Multimedia Applications: Monolithic Approach v. MicroKernel Approach” (Kevin Jeffay and Giorgio Buttazzo – Scuola Superiore Santa Anna)

Larsen, E. Scott (2008) “Temporal Multi-view Reconstruction using Enhanced Belief Propagation” (Henry Fuchs)

Lauterbach, Christian (2010) “Interactive Ray Tracing of Massive and Deformable Models” (Dinesh Manocha)

Le, Nguyen Tuong Long (2005)  “Investigating the Effects of Active Queue Management on the Performance of TCP Applications” (Kevin Jeffay)

Leaver-Fay, Andrew (2006) “Capturing Atomic Interactions with a Graphical Framework in Computational Protein Design” (Jack Snoeyink)

Lee, Huai-Ping (2012) “Simulation-Based Joint Estimation of Body Deformation and Elasticity Parameters for Medical Image Analysis” (Ming C. Lin)

Lee, Joohwi (2015) “Group-Wise Image Registration and Its Application to Rodent Brain Analysis” (Martin Styner)

Lee, Shie-Jue (1990) “CLIN: An Automated Reasoning System Using Clause Linking” (David A. Plaisted)

Leler, William J. (1987) “Specification and Generation of Constraint Satisfaction Systems” (Bharadwaj Jayaraman)

Leontyev, Hennadiy (2010) “Compositional Analysis Techniques For Multiprocessor Soft Real-Time Scheduling” (James Anderson)

Levoy, Marc S. (1989) “Display of Surfaces From Volume Data” (Henry Fuchs)

Levy, Joshua H. (2008)  “Refinement of Object-Based Segmentation” (Stephen M. Pizer)

Li, Haohan (2013) “Scheduling Mixed-Criticality Real-Time Systems” (Sanjoy K. Baruah)

Li, Peng (2014) “Replication and Placement for Security in Distributed Systems” (Mike Reiter)

Li, Weizi (2019) “Simulation and Learning for Urban Mobility: City-Scale Traffic and Autonomous Driving” (Ming C. Lin)

Lifshitz, Lawrence M. (1987) “Image Segmentation via Multiresolution Extrema Following” (Stephen M. Pizer)

Lin, Wei-Jyh (1991) “Boundary Estimation in Ultrasound Images” (Stephen M. Pizer)

Lincoln, Peter (2017) “Low Latency Displays for Augmented Reality” (Henry Fuchs & Greg Welch)

Lipscomb, James S. (1981) “Three-Dimensional Cues for a Molecular Computer Graphics System” (Frederick P. Brooks Jr.)

Liu, Alan Ve-Ming (1998)  “3D/2D Registration and Reconstruction in Image-Guided Surgery” (Stephen M. Pizer)

Liu, Cong (2013) “Efficient Design, Analysis, and Implementation of Complex Multiprocessor Real-Time Systems” (Jim Anderson)

Liu, Guodong (2007) “A Data-driven, Piecewise Linear Approach to Modeling Human Motions” (Leonard McMillan)

Liu, Jinze (2006) “New Clustering Approaches for Mining Salient Patterns in High Dimensional Data” (Wei Wang)

Liu, Wei (2016) “Localizing Objects Fast and Accurately” (Alex Berg)

Liu, Xiaoxiao (2010)  “Shape-correlated Statistical Modeling and Analysis for Respiratory Motion Estimation” (Stephen M. Pizer)

Liu, Yuanxin (Leo) (2008) “Computation of Delaunay and higher order triangulations, with applications to splines” (Jack Snoeyink)

Liu, Yi (2013) “Fast and Accurate Haplotype Inference with Hidden Markov Model” (Wei Wang and Yun Li)

Livingston, Mark A. (1998) “Vision-Based Tracking with Dynamic Structured Light for Video-See-Through Augmented Reality” (Henry Fuchs)

Lloyd, David Brandon (2007) “Logarithmic Perspective Shadow Maps” (Dinesh Manocha)

Lok, Benjamin Chak Lum (2002) “Interacting With Real Objects Significantly Enhances Cognitive Virtual Environment Tasks” (Frederick P. Brooks Jr)

Lorenzen, Peter Jonathan (2006)  “Multi-Modal Image Registration and Atlas Formation” (Sarang C. Joshi)

Low, Kok-Lim (2006) “View Planning for Range Acquisition of Indoor Environments” (Anselmo Lastra)

Luebke, David P. (1998) “View-Dependent Simplification of Arbitrary Polygonal Environments” (Frederick P. Brooks Jr.)

Lyu, Ilwoo (2016) “Cortical Surface Registration and Shape Analysis” (Martin Styner)

Maimone, Andrew (2015) “Computational See-Through Near-Eye Displays” (Henry Fuchs)

Majumder, Aditi (2003) “A Practical Framework to Achieve Perceptually Seamless Multi-Projector Displays” (Gregory Welch and Rick Stevens)

Mark, William R. (1999)  “Post-Rendering 3D Image Warping: Visibility, Reconstruction, and Performance for Depth-Image Warping” (Gary Bishop)

Mascarenhas, Ajith Arthur (2006)  “Time-varying Reeb Graphs: A Topological Framework Supporting the Analysis of Continuous Time-varying Data” (Jack Snoeyink)

McAllister, David F. (1972)  “Algorithms for Chebychev Approximation Over Finite Sets” (Stephen M. Pizer)

McAllister, David K. (2002) “A Generalized Surface Appearance Representation for Computer Graphics” (Anselmo Lastra)

McAnulty, Michael A. (1973)  “Computer-Aided Processing of Coronary Arterial Tree Cinearteriograms” (Donald F. Stanat)

McInroy, John W. (1978)  “A Concept-Vector Representation of the Paragraphs in a Document, Applied to Automatic Extracting” (Stephen F. Weiss)

McKenzie Jr., Leslie E. (1988) “An Algebraic Language for Query and Update of Temporal Databases” (Richard T. Snodgrass)

McMillan, Jr., Leonard (1997) “An Image-Based Approach to Three-Dimensional Computer Graphics” (Gary Bishop)

Meehan, Michael J. (2001) “Physiological Reaction as an Objective Measure of Presence in Virtual Environments” (Frederick P. Brooks Jr.)

Meenakshisundaram, Gopi (2001) “Theory and Practice of Sampling and Reconstruction of Manifolds with Boundaries” (Jack Snoeyink)

Mehra, Ravish (2015) “Efficient Techniques for Wave-Based Sound Propagation in Interactive Applications” (Dinesh Manocha)

Meng, Yu (2017) “Computational Cortical Surface Analysis for Study of Early Brain Development” (Dinggang Shen)

Menges, John E. (2009) “Concur:  An Investigation of Lightweight Migration in Support of Centralized Synchronous Distributed Collaboration” (Kevin Jeffay)

Merck, Derek L. (2010)  “Model Guided Rendering for Medical Images” (Steve Pizer & Julian Rosenman)

Merrell, Paul (2009) “Model Synthesis” (Dinesh Manocha)

Middleton, David J. (1986) “Alternative Program Representations in the FFP Machine” (Gyula A. Mago)

Miller, Dorian B. (2009) “Can we work together?” (Dave Stotts)

Miller, Swaha Das (2005) “OSHL-U: A First Order Theorem Prover Using Propositional Techniques and Semantics” (David Plaisted)

Millman, David L. (2012) “Degree-Driven Design of Geometric Algorithms for Point Location, Proximity, and Volume Calculation” (Jack Snoeyink)

Mine, Mark R. (1997) “Exploiting Proprioception in Virtual-Environment Interaction” (Frederick P. Brooks Jr.)

Mo, Qi (2015) “Efficient Light and Sound Propagation in Refractive Media Using Analytic Ray Curve Tracing” (Dinesh Manocha)

Moir, Mark S. (1996) “Efficient Object Sharing in Shared-Memory Multiprocessors” (James Anderson)

Molnar, Steven E. (1991) “Image-Composition Architectures for Real-Time Image Generation” (Henry Fuchs)

Morales, Nic (2017) “Efficient Wave-based Sound Propagation and Optimization for Computer-Aided Design” (Dinesh Manocha)

Morse, Bryan S. (1995) “Computation of Object Cores from Grey-level Images” (Stephen M. Pizer)

Mudge, J. Craig (1973)  “Human Factors in the Design of a Computer-Assisted Instruction System” (Frederick P. Brooks Jr.)

Mueller, Carl A. (2000)  “The Sort-First Architecture for Real-Time Image Generation” (Anselmo A. Lastra)

Munson, Jonathan P. (1997)  “Synchronization in Collaborative Applications” (Prasun Dewan)

Nackman, Lee R. (1982) “Three-Dimensional Shape Description Using the Symmetric Axis Transform” (Stephen M. Pizer)

Narain, Rahul (2011)  “Visual Modeling and Simulation of Multiscale Phenomena” (Ming C. Lin)

Narang, Sahil (2018) “Simulating Plausible Movement-Based Interactions Between Agents and Avatars Using Biomechanical Principles and Psychological Factors” (Dinesh Manocha)

Nashel, Andrew R. (2010)  “Rendering and Display for Multi-Viewer Tele-Immersion” (Henry Fuchs)

Navon, Jaime (2005) “Specification and Semi-Automated Verification of Coordination Protocols for Collaborative Software Systems” (David Stotts)

Neumann, Ulrich (1993) “Volume Reconstruction and Parallel Rendering Algorithms: A Comparative Analysis” (Henry Fuchs)

Newton, Ben (2017) “Efficient Topology Management and Geographic Routing in High-Capacity Continental-Scale Airborne Networks” (Kevin Jeffay)

Nie, Dong (2019) “Blurry Boundary Delineation and Adversarial Confidence Learning for Medical Image Analysis” Dinggang Shen

Nie, Xumin (1989) “Automatic Theorem Proving In Problem Reduction Formats” (David A. Plaisted)

Nomura, Kunihiko (1974)  “Stochastic Models for Systems of Multiple Integrated Processors” (Victor L. Wallace)

Oguz, Ipek (2009) “Groupwise Shape Correspondence with Local Features” (Martin Styner)

Ohbuchi, Ryutarou (1994) “Incremental Acquisition and Visualization of 3D Ultrasound Images” (Henry Fuchs)

Olano, T. Marc (1998)  “A Programmable Pipeline for Graphics Hardware” (Anselmo A. Lastra)

Oliveira Neto, Manuel Menezes de (2000) “Relief Texture Mapping” (Gary Bishop)

Oliver, Alfred P. (1969) “A Measurement of the Effectiveness of An Interactive Display System in Teaching Numerical Analysis” (Frederick P. Brooks Jr.)

O’Meara, Matthew James (2013) “A Features Analysis Tool For Assessing And Improving Computational Models In Structural Biology” (Jack Snoeyink and Brian Kuhlman)

Omojokun, Olufisayo Ayodele (2006) “Interacting with Networked Devices” (Prasun Dewan)

Omondi, Amos R. (1990) “Architecture and Implementation of a Parallel Machine for Imperative and Nondeterministic Functional Languages” (David A. Plaisted)

Ordonez-Roman, Vicente (2015) “Language and Perceptual Categorization in Computational Visual Recognition” (Tamara Berg)

Otaduy, Miguel A. (2004) “6-DoF Haptic Rendering Using Contact Levels of Detail and Haptic Textures” (Ming Lin)

Ott, David (2005) “An Open Architecture for Transport-Level Coordination in Distributed Multimedia Applications” (Ketan Mayer-Patel)

Ouh-young, Ming (1990) “Force Display in Molecular Docking” (Frederick P. Brooks Jr.)

Palmer, Daniel W. (1996) “Efficient Execution of Nested Data-Parallel Programs” (Jan F. Prins)

Pan, Feng (2009) “Efficient Algorithms in Analyzing Genomic Data” (Wei Wang)

Pan, Jia (2013) “Efficient Configuration Space Construction and Optimization” (Dinesh Manocha)

Paramasivam, Muthukrishnan (1997)  “Instance-Based First-Order Methods Using Propositional Provers” (David A. Plaisted)

Parente, Peter J. (2008) “Clique: Perceptually-based, task-oriented auditory display for GUI Applications” (Gary Bishop)

Pargas, Roy P. (1982) “Parallel Solution of Elliptic Partial Differential Equations On a Tree Machine” (Gyula A. Mago)

Park, Chonhyon (2016) “High-DOF Motion Planning in Dynamic Environments using Trajectory Optimization” (Dinesh Manocha)

Park, Eunbyung (2019) “Learning to adapt from few examples” (Alex Berg)

Parker, Erin (2004) “Analyzing the Behavior of Loop Nests in the Memory Hierarchy: Methods, Tools and Applications” (Siddhartha Chatterjee)

Parris, Mark A. (2001) “Class-Based Thresholds: Lightweight Active Router-Queue Management for Multimedia Networking” (Kevin Jeffay)

Partain, William D. (1989) “Graph Reduction Without Pointers” (Gyula A. Mago)

Patil, Sachin (2013) “Closed-Loop Planning and Control of Steerable Medical Needles” (Ron Alterovitz)

Peck, Tabitha (2010) “Redirected Free Exploration with Distractors: A Large-Scale Real-Walking Locomotion Interface” (Mary Whitton & Henry Fuchs)

Pfannenstiel, Wolf (2000)  (Technische UniversitäBerlin) “Piecewise Execution of Nested Data Parallel Programs” (S. Jaehnichen, Technische UniversitäBerlin, and Jan F. Prins)

Pool, Jeff (2012) “Energy-Precision Tradeffos in the Graphics Pipeline” (Anselmo Lastra & Montek Singh)

Popelas, Judy M. (1983) “A Case Grammar Approach to Error Correction in Computer Programs” (Peter Calingaert)

Popescu, Voicu S. (2001) “Forward Rasterization: A Reconstruction Algorithm for Image-Based Rendering” (Anselmo A. Lastra)

Pozefsky, Diane P. (1979)  “Building Efficient Pass-Oriented Attribute Grammar Evaluators” (Mehdi Jazayeri)

Pozefsky, Mark 1977)  “Programming in Reduction Languages” (Gyula A. Mago)

Prastawa, Marcelinus Widita (2007) “An MRI Segmentation Framework for Brains with Anatomical Deviations” (Guido Gerig)

Pratapa, Srihari (2019) “Efficient Random Access Compression Schemes for Image-Based Representations” (Dinesh Manocha)

Price, True (2019) “Scene Reconstruction Beyond Structure-from-Motion and Multi-view Stereo” (Jan-Michael Frahm)

Prokop, Jan S. (1969)  “An Investigation of the Effects of Computer Graphics on Executive Decision Making in an Inventory Control Environment” (Frederick P. Brooks Jr.)

Puff, Derek T. (1995)  (Biomedical Engineering, UNC-Chapel Hill) “Human vs. Vision Model Performance for Two Medical Image Estimation Tasks” (Stephen M. Pizer)

Rademacher, Pablo M. (2003) “Measuring the Perceived Visual Realism of Images” (Gary Bishop)

Raguram, Rahul (2013) “Efficient Algorithms for Robust Estimation” (Jan-Michael Frahm and Marc Pollefeys)

Raghuvanshi, Nikunj (2010) “Interactive Physically-based Sound Simulation” (Ming C. Lin)

Rajgopal, Suresh (1992) “Spatial Entropy–A Unified Attribute to Model Dynamic Communication in VLSI Circuits” (Kye S. Hedlund)

Ramamurthy, Srikanth (1997)  “A Lock-Free Approach to Object Sharing in Real-Time Systems” (James Anderson)

Randhavane, Tanmay (2019) “Social Perception of Pedestrians and Virtual Agents Using Movement Features” (Dinesh Manocha)

Raskar, Ramesh (2002) “Projector-Based Three Dimensional Graphics” (Henry Fuchs and Gregory Welch)

Rathinavel, Kishore (2019) “Volumetric and Varifocal Occlusion Augmented Reality Displays” (Henry Fuchs)

Razzaque, Sharif (2005) “Redirected Walking” (Frederick P. Brooks Jr.)

Ren, Zhimin (2014) “Real-Time Physically Based Sound Synthesis and Application in Multimodal Interaction” (Ming Lin)

Rewaskar, Sushant (2007) “Real-world Evaluation of Techniques to Mitigate Impact of Losses on TCP Performance” (Jasleen Kaur)

Rhee, Injong (1994) “Efficiency of Partial Synchrony and Resource Allocation in Distributed Systems” (Jennifer Welch)

Rheingans, Penny L. (1993) “Dynamic Explorations of Multiple Variables in a 2D Space” (Frederick P. Brooks Jr.)

Rhoades, John S. (1993) “Shaping Curved Surfaces” (Stephen M. Pizer)

Riely, James (1999) “Applications of Abstraction for Concurrent Programs” (Jan F. Prins)

Rosenthal, Michael H. (2005) “Three-dimensional Registration and Tracking of Vascular Stuctures using Calibrated Biplane Fluoroscopy” (Henry Fuchs)

Roussev, Vassil R. (2003) “Flexible Sharing of Distributed Objects Based on Programming Patterns” (Prasun Dewan)

Rudolph, David J. (1995)  (Biomedical Engineering and Mathematics, UNC-Chapel Hill) “Automatic Landmark Identification in Orthodontic Cephalometric Radiographs (Machine Vision)” (James Coggins)

Rungta, Atul (2018) “Perceptually Driven Interactive Sound Propagation for Virtual Environments” (Jan-Michael Frahm)

Saboo, Rohit R. (2011) “Atlas Diffeomorphisms via Object Models” (Stephen M. Pizer)

Sanders, Sean (2017) “Techniques for the Analysis of Modern Web Page Traffic Using Anonymized TCP/IP Headers” (Jasleen Kaur)

Sawyer, Jeanne C. (1990) “A Reference and Planning Model for Library Online Public Access Catalogs” (Stephen F. Weiss)

Schissler, Carl (2017) “Efficient Interactive Sound Propagation in Dynamic Environments” (Dinesh Manocha)

Schmitt, Charles P. (1999)  “Recognizing Moving Objects: A Neural Model of Temporal Binding in Human Vision” (Jonathan A. Marshall)

Seeger, Adam (2004) “Surface Reconstruction From AFM and SEM Images” (Russell M. Taylor II)

Sewall, Jason (2010) “Efficient, Scalable Traffic and Compressible Fluid Simulations Using Hyperbolic Models” (Ming C. Lin)

Shan, Liang (2014) “Automatic Localized Analysis of Longitudinal Cartilage Changes” (Marc Niethammer)

Shan, Yen-Ping (1990) “MoDE: An Object-Oriented User Interface Development Environment Based on the Concept of Mode” (John B. Smith)

Shannon, Karen P. (1992) “Tool Integration Via Fine-Grained Data Management” (Richard Snodgrass)

Shiriam, Alok (2007 “Design of a Scalable Available Bandwidth Information Infrastructure”

Silbermann, Frank S. K. (1989) “A Denotational Semantics Approach to Functional and Logic Programming” (Bharadwaj Jayaraman)

Singh, Abhishek (2007) “Co-scheduling Real-time Tasks and Non Real-time Tasks Using Empirical Probability Distribution of Real-time Execution Requirements” (Kevin Jeffay)

Singh, Darshan (2015) “Annotation-Free Detection of Splicing Differences Between RNA-Seq Samples” (Jan Prins)

Sinha, Sudipta N. (2008) “Silhouettes for Calibration and Reconstruction from Multiple View” (Marc Pollefeys)

Skarbez, Richard (2016) “Plausibility Illusion in Virtual Environments” (Mary Whitton & Fred Brooks)

Smith, Bruce T. (1992) “Logic Programming on an FFP Machine” (David A. Plaisted)

Smith, F. Donelson (1978)  “Models of Multiprocessing for Transaction-Oriented Computer Systems” (Frederick P. Brooks Jr.)

Smith, Jason McColm (2005) “SPQR: Formal Foundations and Practical Support for the Automated Detection of Design Patterns from Source Code” (David Stotts)

Smotherman, Mark K. (1984) “Parametric Error Analysis and Coverage Approximations in Reliability Modeling” (Kishor Trivedi, Duke University)

Snape, Jamie R. (2012) “Smooth and Collision-Free Navigation for Multiple Mobile Robots and Video Game Characters” (Dinesh Manocha)

Sneeringer, Cheryl C. (1975) “Models of Memory Management Techniques for Time-sharing Systems” (Frederick P. Brooks Jr.)

Sneeringer IV, W. James, (1975) “A Dynamic-type Programming Language that Allows Type Control” (Frederick P. Brooks Jr.)

Snow, Kevin (2014) “Identifying Code Injection and Reuse Payloads in Memory Error Exploits” (Fabian Monrose)

Srinivasan, Anand (2003) “Efficient and Flexible Fair Scheduling of Real-time Tasks on Multiprocessors” (James Anderson)

Steinhurst, Joshua Eli (2007) “Practical Photon Mapping in Hardware” (Anselmo Lastra)

Sterling, Auston (2019) “Audio-Material Modeling and Reconstruction for Multimodal Interaction” (Ming C. Lin)

Stetten, George D. (2000)  (Biomedical Engineering, UNC-Chapel Hill) “Automated Identification and Measurement of Cardiac Anatomy via Statistical Analysis of Medial Primitives” (Stephen M. Pizer)

Stone, Donald L. (1995) “Managing the Effect of Delay Jitter on the Display of Live Continuous Media” (Kevin Jeffay)

Stough, Joshua V. (2008)  “Clustering and Shifting of Regional Appearance for Deformable Model Segmentation” (Stephen M. Pizer)

Styner, Martin A. (2001) “Combined Boundary-Medial Shape Description of Variable Biological Shapes” (Guido Gerig)

Sud, Avneesh (2006) “Efficient Computation of Discrete Voronoi Diagram and Homotopy-Preserving Simplified Medial Axis of 3D Polyhedron” (Dinesh Manocha)

Surles, Mark C. (1992) “Techniques for Interactive Manipulation of Graphical Protein Models” (Frederick P. Brooks Jr.)

Takashi, Tersuya (2019) “Efficient Particle-based Viscous Fluid Simulation with Video-Guided Real-to-Virtual Parameter Transfer” (Ming Lin)

Talley, Terry M. (1997) “A Transmission Control Framework for Continuous Media” (Kevin Jeffay)

Taylor, Micah (2014) “Interactive Sound Propagation for Massive Multi-User and Dynamic Virtual Environments” (Dinesh Manocha)

Taylor II, Russell M. (1994) “The Nanomanipulator: A Virtual-Reality Interface to a Scanning Tunneling Microscope” (Frederick P. Brooks Jr.)

Taylor, Teryl (2016) “Using Context to Improve Network-Based Malware Detection” (Fabian Monrose)

Terrell, Jeffrey S. (2009) “Passive, automatic detection of network server performance anomalies in large networks” (Kevin Jeffay)

Terriberry, Timothy B. (2006) “Continuous Medial Models in Two-Sample Statistics of Shape” (Guido Gerig)

Thall, Andrew L. (2004) “Deformable Solid Modeling via Medial Sampling and Displacement Subdivision” (Stephen M. Pizer)

Thomas, Teresa A. (1988) “The Semantics of an FP Language with Infinite Objects” (Donald F. Stanat)

Tighe, Joseph (2013) “Towards Open-Universe Image Parsing with Broad Coverage” (Lana Lazebnik)

Tolle, Donald M. (1981) “Coordination of Computation in a Binary Tree of Processors: An Architectural Proposal” (Gyula A. Mago)

Tuck, Russell (1990)  (Duke University) “Porta-SIMD: An Optimally Portable SIMD Programming Language” (Frederick P. Brooks Jr.) (No UNC-Chapel Hill library copy)

Turk, Gregory (1992) “Texturing Surfaces Using Reaction-Diffusion” (Henry Fuchs)

Vallidis, Nicholas M. (2002) “WHISPER: A Spread Spectrum Approach to Occlusion in Acoustic Tracking” (Gary Bishop)

Varadhan, Gokul (2005) “Accurate Sampling Based Algorithms for Surface Extraction and Motion Planning” (Dinesh Manocha)

Varshney, Amitabh (1994) “Hierarchical Geometric Approximations” (Frederick P. Brooks Jr.)

Vicory, Jared (2016) “Learned Shape Deformations and Regional Texture-Based Appearance for TRUS Prostate Segmentation” (Stephen Pizer)

Vittayakorn, Sirion (2016) “Visual Attribute Discovery and Analysis from Web-Data” (Tamara L. Berg)

Walker II, John Q. (1991) “Automated Analysis of Computer-Generated Software Usage Protocols: An Exploratory Study” (John B. Smith)

Wang, Jeremy (2013) “Analysis and Visualization of Local Phylogenetic Structure within Species” (Leonard McMillan)

Wang, Jih-Fang (1990) “A Real-time Optical 6D Tracker for Head-mounted Display Systems” (Henry Fuchs)

Wang, Ke (2018) “Towards Efficient 3D Reconstructions from High-Resolution Satellite Imagery” (Jan-Michael Frahm)

Wang, Qian (2013) “Registration in Large-Scale Population of Brain MR Images” (Dinggang Shen)

Wang, Weibo (2015) “Detect Copy Number Variations from Read-Depth of High-Throughout Sequencing Data” (We Wang)

Wang, Xueyi (2008) “Exploring RNA and Protein 3D structures By Geometric Algorithms” (Jack Snoeyink)

Ward, Bryan (2016) “Sharing Non-Processor Resources in Multiprocessor Real-Time Systems” (Jim Anderson)

Ward, Kelly (2005) “Modeling Hair Using Levels-of-Detail” (Ming Lin)

Wei, Lei (2013) “Privacy-Preserving Regular-Expression Evaluation on Encrypted Data” (Mike Reiter)

Weigle, Christopher Charles (2006) “Displays for Exploration and Comparison of Nested or Intersecting Surfaces” (Russell M. Taylor II)

Weigle, Michele A. Clark (2003) “Investigating the Use of Synchronized Clocks in TCP Congestion Control” (Kevin Jeffay)

Welch, Gregory F. (1997) “SCAAT: Incremental Tracking with Incomplete Information” (Gary Bishop)

Welch, Joshua (2017) “Computational Methods for Inferring Transcriptome Dynamics” (Jan Prins)

Welsh, Catherine Elizabeth (2014) “Computational Tools to Aid the Design and Development of a Genetic Reference Population (Leonard McMillan)

Wendt, Jeremy (2010) “Real-Walking Models Improve Walking-In-Place Systems” (Frederick P. Brooks Jr.)

Westover, Lee A. (1991) “SPLATTING: A Parallel, Feed-Forward Volume Rendering Algorithm” (Turner Whitted)

Whitaker, Ross T. (1993) “Geometry-Limited Diffusion” (Stephen M. Pizer)

White, Andrew (2015) “Practical Analysis of Encrypted Network Traffic” (Fabian Monrose)

Whitlock, Jr., James Smith (1973) “Modeling computer systems with time-varying markov chains”

Wilkie, David (2015) “Simulating, Reconstrucing, & Routing Metropolis-Scale Traffice” (Ming Lin)

Williams Jr., E. Hollins ( 1 981) “Analysis of FFP Programs for Parallel Associative Searching” (Donald F. Stanat)

Willams, Thomas V. (1982) “A Man-Machine Interface for Interpreting Electron Density Maps” (Frederick P. Brooks Jr.)

Wilson, Andrew Thomas (2002) “Spatially Encoded Image-Space Simplifications for Interactive Walkthrough” (Dinesh Manocha)

Wright, William V. (1972)  “An Interactive Computer Graphics System for Molecular Studies” (Frederick P. Brooks Jr.)

Wu, Changchang (2011) “Geometry-driven Feature Detection for Improving Geometric Reconstruction” (Jan-Michael Frahm)

Xiao, Qiuyu (2019) “Efficient Data Protection by Noising, Masking, and Metering” (Michael Reiter)

Xu, Hao (2012) “How To Efficiently Implement an OSHL-Based Automatic theorem Prover” (David Plaisted)

Xu, Yi (2016) “Toward Robust Video Event Detection and Retrieval Under Adversarial Constraints” (Jan-Michael Frahm & Fabian Monrose)

Yakowenko, William J. (1999)  “Propositional Theorem Proving by Semantic Tree Trimming for Hardware Verification” (David A. Plaisted)

Yan, Jingyu (2009) “Articulated Non-Rigid Shape, Motion and Kinematic Chain Recovery from Video” (Marc Pollefeys)

Yang, Hua (2008) “Differential Tracking through Sampling and Linearizing the Local Appearance Manifold” (Gregory Welch)

Yang, Kecheng (2018) “Motion Planning for Multi-Agent Systems with Physics-Based and Behavior Constraints” (Dinesh Manocha)

Yang, Kecheng (2018) “Real-Time Scheduling on Asymmetric Multiprocessor Platforms” (Jim Anderson)

Yang, Ruigang (2003) “View-Dependent Pixel Coloring – A Physically-Based Approach for 2D View Synthesis” (Gregory Welch)

Yang, Shan (2017) “Image-Based Non-Rigid Body Mechanical Property Recover” (Ming Ling)

Yang, Xiao (2017) “Uncertainty Quantification, Image Synthesis and Deformation Prediction for Image Registration” (Marc Niethammer)

Yeh, Hengchin (2014) “Adaptive Modeling of Details for Physcially-based Sound Synthesis & Propogation” (Ling, Ming)

Yin, Qianwen (2017) “TCP Rapid:  From Theory to Practice” (Jasleen Kaur)

Yoo, Terry S. (1996) “Image Geometry Through Multiscale Statistics” (Stephen M. Pizer)

Yoon, Sung-Eui (2005) “Interactive Visualization and Collision Detection using Dynamic Simplification and Cache-Coherent Layouts” (Dinesh Manocha)

Yu, Licheng (2019) “Locate, Tell, Answer and Act: Connecting Vision, Language and Beyond” (Tamara Berg)

Yushkevich, Paul Alexander (2003) “Statistical Shape Characterization Using the Medial Representation” (Stephen M. Pizer)

Zarling, Raymond L. (1976)  “Numerical Solution of Nearly Decomposable Queuing Networks” (Victor L. Wallace)

Zhang, Hansong (1998)  “Effective Occlusion Culling for the Interactive Display of Arbitrary Models” (Dinesh Manocha)

Zhang, Jingdan (2009) “Object Detection and Segmentation using Discriminative Learning” (Leonard McMillan)

Zhang, Jinghe (2013) “Uncertainty-Driven Adaptive Estimation with Applications in Electrical Power Systems” (Gregory F. Welch)

Zhang, Liangjun (2009) “Efficient Motion Planning using Generalized Penetration Depth Computation” (Dinesh Manocha)

Zhang, Qi (2009) “Mining Massive Scientific Sequence Data using Block-wise” Decomposition Methods (Wei Wang)

Zhang, Yang (2019) “Efficient, Locality-Maintaining Namespace Operations in a Write-Optimized File System” (Don Porter)

Zhang, Yinqian (2014) “Cache-Based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures” (Mike Reiter)

Zhang, Zhaojun (2014) “Efficient Computational Genetics Methods for Multiparent Crosses” (Wei Wang & William Valdar)

Zhao, Qingyu (2017) “Efficient, Locality-Maintaining Namespace Operations in a Write-Optimized File System” “Surface Registration for Pharyngeal Radiation Treatment Planning” (Stephen Pizer)

Zheng, Enliang (2016) “Toward 3D Reconstruction of Statuic and Dynamic Objects” (Jan-Michael Frahm)

Zheng, Feng (2015) “Spatio-Temporal Registration in Augmented Reality” (Greg Welch)

Zheng, Yu (2014) “Locomotion Generation & Balance Control of Humanoid Robots Considering External Dynamics & Constraints” (Lin, Ming)

Zherong, Pan (2019) “Efficient Motion Planning for Deformable Objects with High Degrees of Freedom” (Dinesh Manocha)

Zhou, Yipin (2019) “Learning Beyond-pixel Mappings from Internet Videos” (Tamara L. Berg)

Zhu, Yunshan (1998)  “Efficient First-Order Semantic Deduction Techniques” (David A. Plaisted)

Zimmerman, John B. (1985) “The Effectiveness of Adaptive Contrast Enhancement” (Stephen M. Pizer)

Zimmons, Paul Michael (2004) “The Influence of Lighting Quality on Presence and Task Performance in Virtual Environments” (Frederick P. Brooks Jr.)

Ph.D. Degree Requirements

1. introduction, 2.1 ph.d. advising, 2.2 grad review, 2.3 pre-candidacy requirements.

  • 2.4 Preliminary Examination and Advancement to Candidacy

2.5 Candidacy and Dissertation Defense

2.6 graduation requirements for ph.d. students.

  • 3. Travel Grants for Ph.D. Students

4. Internships

This document is tailored for graduate students in the Computer Science Department, providing essential details on degree requirements and other important aspects of graduate study. Graduate education in the department is managed by the Associate Chair, who is also the Graduate Program Director, along with the Assistant Director and Graduate Coordinator, collectively referred to as the “Graduate Office.” 

dissertation for computer science

For information regarding campus-wide graduate study requirements, policies, and deadlines, please refer to the resources provided by the UMCP Graduate School and in the Graduate Catalog. Specific information about registration and coursework requirements for our programs can be found here .

2. Ph.D. Degree Requirements

In the Ph.D. program, every student is either assigned a faculty advisor or has mutually agreed upon an advisory relationship with a faculty member upon entering the program. The initial advisor assignment is typically based on the student's stated research interests at the time of admission. However, it's recognized that research interests may evolve, or changes in faculty capacity or interests may occur, necessitating a change in advisors. Generally, the faculty member with whom you are actively conducting your Ph.D. research should serve as your advisor. You should ideally identify your advisor by the end of your first year, but no later than the end of your second year. 

You are expected to meet with your initially assigned advisor at least once during the first semester. Following this initial meeting, you should plan for more frequent consultations to discuss your academic and research progress. 

In cases where you accept a research assistantship with a professor who is not your current advisor, that professor may become your new advisor. It's important to officially notify the Computer Science Graduate Office whenever there is a change in your advisor.

Before the commencement of any advising relationship, both you and the supervising faculty member are expected to meet to review and confirm the expectations for this relationship. This includes a summary of the nature of the required duties. To facilitate these discussions, a Statement of Mutual Expectations template can be found on the Graduate School's Forms webpage .

Every April, the Grad Review Committee reviews the progress of graduate students in the program. The findings from this review are then discussed in a faculty meeting. 

Key Focus Areas:

  • Coursework Performance: Students must maintain a minimum cumulative GPA of 3.0 for all courses taken at the University. Low grades are closely monitored.
  • Qualifying Coursework Completion: Completion of qualifying coursework is expected by the end of the fifth semester. Concerns arise for students who have not met this requirement within this timeframe.
  • Advancement to Candidacy: Advancement to candidacy is generally expected by the third or fourth year, with the latest acceptable timeline being the end of the fourth year. Any delays in achieving this milestone necessitate a departmental petition (refer to section 2.4 ). Failing to advance to candidacy by the fifth year requires a petition to the graduate school and is considered a significant concern.
  • Dissertation Defense Timeline: Defense of the dissertation is expected within two years of advancing to candidacy. A delay beyond the third year is a red flag.The Graduate School requires 12 credits of 899 doctoral dissertation research credits. In most cases, this requirement is satisfied by two semesters (fall/spring) of post-candidacy registration, in which the candidate is automatically registered for six credits of Doctoral Dissertation Research (899) per semester.
  • Petitions for Extensions: Petitions for extended time to advance to candidacy or for delayed dissertation defense must be strongly supported by the advisor. The student must provide a detailed explanation for the delay.

Students identified as not making satisfactory progress will receive direct communication from their advisor and the Graduate Office.

Students who encounter specific challenges or delays have the option to request an extension from the Graduate School. These requests should include a detailed timeline and plan of action. Support from the student’s advisor is needed before submitting your form to the Graduate Office via the submission form.

The Computer Science graduate program is structured as a two-stage program, with an expected total duration of five to six years which is a smaller duration than the time limitations set by the Graduate School's policies . In the initial "pre-candidacy" stage, students develop foundational knowledge in Computer Science ("breadth") and specialized knowledge in their research subarea ("depth"), under the mentorship of a graduate faculty advisor.

Minimum Requirements for Advancement to Candidacy

To advance to candidacy in the Computer Science graduate program, students must meet the following requirements:

  • Complete at least six MS/Ph.D. Qualifying Courses at the 600–800 level
  • Achieve a minimum of four A's (includes A- and A+) and two B's (includes B-) or above in Qualifying Courses to demonstrate mastery
  • Ensure that the Qualifying Courses cover at least four different areas. Courses that are eligible for two areas will have only one count towards degree requirements. Whichever area the student has not yet taken as part of a breadth requirement will be used by default.

In addition, students must:

  • Enroll in the Ph.D. seminar course “How to Conduct Great Research” (CMSC800) 
  • Complete two additional “Elective” graduate courses (600-800 level), which can be outside the department and do not necessarily need to be qualifying courses, but must be completed with a grade of B- or higher

Qualifying Course Designation is provided by the graduate office. For a course to be considered as qualifying, its grading must be primarily based (at least 75%) on a combination of homework, programming assignments, research projects, and exams. Among these, written exams must constitute at least 30% of the overall grade. 

* Professional master's courses do not count towards the qualifying or elective course requirements for a Ph.D. degree.

Students with previous graduate-level preparation can waive up to three courses. However, the mastery requirement of achieving 4 A’s in qualifying courses cannot be waived.

For detailed information on coursework requirements, waivers, and a list of available courses, students should refer to the program's webpage . 

2.4 Preliminary Examination and Advancing to Candidacy

The Ph.D. Preliminary Examination, required after completing coursework and before the end of the fourth year of your admission to the program, assesses your readiness for dissertation research. You and your advisor decide when you are ready to take this step. It's expected that there will be at least a one-year gap between your proposal defense and the final dissertation defense. 

The proposal defense is an oral examination to review your preparation to conduct your proposed dissertation research and your plan of research. These are described in a proposal document. Your mastery over both fundamental concepts and the research literature in three areas related to your research are also examined. This is done via a “reading list” with about 10 publications (fundamental texts or research papers) in each of these areas. The reading list must be formatted according to the bibliographic standards in your field.

The goal of the examination is for the committee to discover whether or not you understand the subject matter sufficiently well to carry out the proposed research. The proposal document must be deemed satisfactory by your advisor before release to the rest of the committee. At a minimum, it should describe your proposed research, survey relevant literature, and propose a timeline for your research. The examination covers both the proposal document and the reading list.

Composition of the Preliminary Examination Committee

The preliminary examination committee must include a minimum of two faculty members whose primary appointment is within the Computer Science department.

  • Your dissertation advisor, serving as the committee chair
  • A departmental representative from outside your research area and may be suggested by your advisor. This representative must be a tenure-track faculty member in Computer Science, within a different field committee than the committee chair (Refer to Field Committee membership details here )
  • At least one additional graduate faculty member, chosen by you and your advisor. This person could be outside the department or could be a co-advisor
  • The committee must include at least 50% CS TTK faculty representation (Refer to the FAQ page for a detailed explanation)

Inclusion of External Committee Members

For inclusion of external committee members (those not affiliated with UMD or not part of the graduate faculty), submit a request at least six weeks prior to the exam date. Your request must include a concise justification, a list of existing committee members, and a CV of the proposed external committee member. To submit this request, please complete this Google form.  External members or non-CS faculty are permitted, as long as these CS representation percentages are upheld.

Candidacy Advancement Documents

  • Oral Exam Scheduling Form
  • Action of Ph.D. Preliminary Examination Committee (to be sent to your committee directly prior to your examination)
  • Application for Admission to Candidacy

At least two weeks before the day you intend to take the exam, submit the oral exam scheduling form and share your proposal and reading list with each examination committee member. After this, a draft announcement will be prepared and sent to you and your advisor for review before it is circulated to the department. Once your proposal is received, our office will send the Action of Ph.D. Preliminary Examination Committee to your committee members. Note that your preliminary exam cannot be conducted without a submitted written proposal.

Written Proposal Document and Reading List Requirements

Your dissertation proposal document must describe your proposed dissertation research and outline the steps necessary for its completion. The proposal, which requires your advisor’s approval, should include:

  • A description of the work completed so far
  • A plan for your proposed research
  • A survey of relevant literature 
  • A proposed timeline for completing your research, along with a discussion of potential risks or assumptions
  • Reading lists that encompass basic and applied knowledge in three areas related to the proposal, with approximately 10 references each
  • Ensure all references in your proposal adhere to the formatting and style guidelines outlined in the University of Maryland Thesis and Dissertation Style Guide
  • While not mandatory, it is highly recommended that your proposal follows the Dissertation style guide. Templates are available here

Conduct of the Preliminary Examination

At least one week before the exam, the department distributes a notice of the examination, inviting all members of the department to attend as non-voting participants. The examination committee chair may invite additional non-voting participants. Unless otherwise specified in this section or exempted with approval from the Graduate Office, the protocol for attending the examination and provisions for remote participation adhere to the Graduate School's policy .

Examination Structure

The oral examination typically spans two hours and encompasses the following segments:

  • Your presentation of the dissertation proposal (about 30-45 minutes)
  • Questions and discussion of the proposal in an open forum
  • Questions and discussion of the proposal in a closed setting with the committee
  • An examination based on the reading list

During this examination, you will be expected to demonstrate a level of competence that is necessary to complete the research plan.

Subsequent to the examination, candidates will be asked to step out while the committee deliberates. The committee's determination may be a pass, fail, or a deferred decision. Your committee chair reports the outcome to the department via Adobe Sign. Should the committee defer its decision, the dissertation advisor will detail the intended measures to resolve the decision to the department. 

The committee member designated as the department representative is responsible for ensuring adherence to these procedural guidelines.

Upon passing the preliminary examination, you may proceed to "advance to candidacy." Please submit the Application for Admission to Candidacy, signed by your advisor, through the CS Graduate Form Submissions . For effective advancement from the first day of the following month, submit this form to the Graduate Office before the 24th of the current month. Following the approval from the Registrar's office, you will also be promoted to Stipend Level III.

If you are unable to propose before the end of the 4th year, please request an extension through the CS Graduate Form Submissions , providing justifications for the extension. This request must include a letter from your advisor supporting the extension and describing the circumstances that have prevented you from proposing. Additionally, the extension request must outline a plan for when you plan to propose and complete your research. 

Conducting Research as a Candidate

Upon passing the Ph.D. Preliminary Exam and advancing to candidacy, candidates will be registered by the Graduate School for CMSC 899: Doctoral Dissertation Research for six credits each fall and spring semester until the degree is awarded. Waivers of Registration may be granted only under the University's policy for Leave of Absence for Graduate Students for Childbearing, Adoption, Illness, or Dependent Care (see Graduate School’s Registration Policies ).

Candidates are expected to contribute original research to the field of computer science, articulating their findings in a dissertation. Guidance on dissertation structure is provided by the advisor, adhering to the format prescribed by the UMCP Graduate School .

*Tuition for CMSC899 is a flat rate of $1,350.00 (in-state) or $2,626.00 (out-of-state) for 6 credits. But if any 898 or below graduate level courses are taken simultaneously, those credits will be charged at the standard Graduate level Tuition and Fees scale ($828.00 per credit for residents and $1,805.00 for non-residents). For detailed information, refer to this link .

Composition of the Dissertation Committee

The dissertation committee must consist of a minimum of five members, including your advisor. All members must hold appointments as regular, adjunct, or special members of the UMCP Graduate Faculty. Essential composition requirements are:

  • A minimum of three Full Members from the Graduate Faculty
  • A minimum of two Full Members from the CS faculty (excluding affiliates)
  • One Dean's Representative who is a tenured member of the Graduate Faculty must have a tenure home different from the student’s program and that of the chair and any co-chair(s)

Note: Regardless of the affiliation of the dissertation committee's chair, the Dean's Representative cannot be from the CS department. All Regular professors (tenure-track and above) in the Computer Science Department are Full Members of the Graduate Faculty ( Graduate Faculty Categories can be found here).

Scholars from other institutions or those appointed as research faculty on this campus may be requested as committee members. Your request must include a concise justification, a list of existing committee members, and a CV of the proposed external committee member. To submit this request, please complete this Google form. Requests should be submitted at least six weeks in advance of the exam. For further information about nominating faculty for dissertation committees and due dates for the nomination form, see the Graduate Faculty Policy.

Approval of the Dissertation Committee

For the formation of the dissertation committee, submit a signed Nomination of Dissertation Committee form to the Graduate Office by the deadline stated for that semester. This action is generally required by the third week of the semester of anticipated degree completion. Any subsequent changes in the committee composition necessitate filing a revised nomination form. Once approved, committee appointments remain valid even if the approval occurs in a different semester from the defense.

Dissertation Defense Protocol

Scheduling the defense.

After your dissertation has been finalized to the satisfaction of your advisor, you are to arrange your dissertation defense. This entails submitting an oral examination scheduling form to the Computer Science Graduate Office at least two weeks prior to your intended defense date. Additionally, distribute a copy of your dissertation to every member of your dissertation committee with at least two weeks advance notice. Upon finalizing the defense details, send a Google Calendar invitation to both your committee members and the Graduate Coordinator.

Announcement

The department will issue an announcement of the defense examination to all graduate faculty members by sending an invitation to dept [-at-] cs [dot] umd [dot] edu . This invitation encourages graduate faculty to attend as non-voting participants. Additionally, the chair of the examination committee has the discretion to invite further non-voting attendees. The announcement will also be posted on talks.cs.umd.edu.

Conducting the Defense

The defense is an oral examination capped at two hours, structured as follows:

  • Public Presentation: The candidate presents the main aspects of their research, typically not exceeding 45 minutes. The audience may ask questions, but the Chair of the Dissertation Examining Committee has discretion over the relevance of questions and the time allocated for responses.
  • Formal Examination: Conducted by the Dissertation Examination Committee, this session is open to members of the Graduate Faculty and graduate students from the candidate’s program. Only the Dissertation Examining Committee may pose questions during this part. Departments may restrict attendance to only the Dissertation Examining Committee and Graduate Faculty members.
  • Final Discussion and Voting: After the formal examination, only the Dissertation Examining Committee members are permitted to attend the final discussion and vote to reach a decision on the acceptability of the defense.

For further information about procedures for oral disserataion examination, see the  Doctor of Philosophy Degree Policies.

Remote Defense

Current Graduate School policy allows for a committee member to request permission to participate in a dissertation defense remotely. Only in exceptional cases would remote participation be permitted for the student, a committee chair, and/or the Dean’s Representative. The procedure for remote participation in a PhD defense is managed by the Graduate School. To ensure timely processing, requests should be submitted at least 10 business days prior to the defense date. Further details are available on the Graduate School's website . To submit a request, the committee chair should use this link .

Post-Defense Requirements

To fulfill your degree requirements, you must:

  • Pass the oral defense
  • Implement all modifications to the dissertation as required by your committee
  • Submit the revised dissertation electronically to the Graduate School.

Be mindful that the Graduate Office will provide you with a reminder and the necessary deadline for the electronic submission of your dissertation. For detailed information regarding the dissertation defense process, refer to the UMCP Graduate Catalog .

Ph.D. candidates intending to graduate should follow this checklist for Ph.D. Students to ensure all steps and requirements are met.

Pre-Graduation Steps

During the semester you plan to graduate, ensure to complete and submit the following by the Graduate School's specified deadlines :

  • Application for Graduation : File this application through Testudo by the early semester deadline.
  • Dissertation Committee Nomination Form : This form must be submitted to the Computer Science Graduate Office using the CS Graduate Form Submissions portal

Post-Defense Documentation

After successfully defending your dissertation, promptly attend to the following:

  • All members of the committee (except the Chair of the committee) will be sent a notification 3 business days prior to the defense date indicated on the Nomination form.
  • The Chair will receive the REC form after all the members of the committee have signed off on the form.
  • Dissertation Filing: Submit your dissertation to the Graduate School, adhering to the guidelines provided here

Dissertation Embargo Option

If you wish to place an embargo on the publication of your dissertation:

  • Thesis and Dissertation Embargo Request: If desired, students have the option to place an embargo of up to two years on electronic access to their document via ProQuest's Digital Dissertations and DRUM without the need for approval from the Graduate School. You may submit a Dissertation Embargo Request via CS Graduate Form Submissions if you’d like to place an embargo that’s more than 2 years

Note that all forms are subject to strict deadlines. To avoid any delays in your graduation process, submit all documentation as per the schedules provided by the Graduate School.

Post-Dissertation Submission 

Upon the completion of your dissertation submission, ensure to follow these critical steps:

  • Surveys: Complete the Graduate School Surveys as well as the departmental survey
  • CMNS Commencement Registration: Make sure to register for the CMNS Commencement (Mid-Semester, Fall & Spring). For more information on commencement, refer to the CMNS website . 

3. Travel Grants for PhD Students

The Computer Science Department offers travel grants for Ph.D. students with expenses related to attending conferences at which their papers have been accepted. The allocation of these grants is competitive, and the Graduate Director is responsible for making the award decisions. Students may apply anytime by submitting their applications to the Graduate Office.

The grant amounts are capped at $500 for domestic and $1000 for international travel. The conference attended should be reputable, and the student's request should be supported by their advisor. Please note that during their time in the degree program, students may only receive up to $1000 in grant funding, and this is contingent on the availability of departmental funds.

To submit your application, please fill out this form , detailing your request, and upload a combined PDF. This PDF should include a copy of your accepted paper and a statement of support from your faculty advisor (this can be in the form of an email).

Additionally, students are also encouraged to apply for funds for conference registration fees and matching travel funds through the Graduate School’s travel grants.

To process applications for these Graduate School grants, the required forms must be signed by the CS Business Office. Forms for these grants should be forwarded to reimbursements [-at-] cs [dot] umd [dot] edu for review and signature by the CS Business Office.

Graduate students may undertake paid internships during the summer months. International students should check with International Education Services (IES) for the procedures to be followed.

 
Pittsburgh, PA 15260
United States

Twitter Instagram Facebook Youtube Twitter Instagram Facebook Youtube
 
  
2024-2025 Graduate & Professional Studies Catalog
(opens a new window)

Admissions Requirements

The department is open to applications from exceptional students transitioning to graduate study in Computer Science from other undergraduate fields. Transitional students with demonstrated computing aptitude, as evidenced by outstanding grades in at least 4 of the required computer science courses noted below, may be considered for admission to the graduate program. Completed minimally a selection of courses in the following topical areas (the corresponding Pitt course numbers are indicated):

In Computer Science, one course in each of:

  • Intermediate Programming ( CMPINF 0401   )
  • Discrete Structures ( CS 0441   )
  • Information/Data Structures ( CS 0445   )
  • Computer Organization/Assembly Language ( CS 0447   )
  • Theory ( CS 1510    or CS 1511   )
  • Languages ( CS 1520    or CS 1621   )
  • Systems ( CS 1550    or CS 1651   )

In Mathematics, the following:

  • The two-course calculus sequence ( MATH 0220   , MATH 0230   )
  • A course in linear algebra ( MATH 1180    or MATH 0280   )
  • A course in probability and statistics, requiring calculus as prerequisite ( STAT 1151   , STAT 1152    )

At the time of enrollment, the student must hold a BS degree.

Degree Requirements

Course requirements.

The MS degree requires 30 credits of formal course work. The 30 credits include a total of 24 credits plus an MS thesis, CS 2000   ; or 27 credits plus an MS project, CS 2910   .

The 30 credits must include one course from each of the following foundation areas .

     Theory and Algorithms

  • CS 2150   - DESIGN & ANALYSIS OF ALGORITHMS or
  • CS 2110    - THEORY OF COMPUTATION or
  • CS 2012    - ALGORITHM DESIGN

     Architecture and Compilers

  • CS 2410    - COMPUTER ARCHITECTURE or
  • CS 2210    - COMPILER DESIGN

     Operating Systems and Networks

  • CS 2510    - COMPUTER OPERATING SYSTEMS or
  • CS 2520    - WIDE AREA NETWORKS 

     Artificial Intelligence and Database Systems

  • CS 2710     - FOUNDATIONS OF ARTIFICIAL INTELLIGENCE or
  • CS 2550    - PRINCIPLES OF DATABASE SYSTEMS

In addition to the12 credits needed to satisfy the foundation area courses, a student has to complete additional coursework based on one of the two following options:

  • Thesis Option: six credits for the MS thesis + at least 12 additional credits of graduate Department of Computer Science courses.
  • Project Option: three credits for the MS project + at least 15 additional credits of graduate Department of Computer Science courses.

General Requirements

  • All courses except the project or thesis must be taken for a letter grade.
  • The student must recieve a grade of B or better in each of the Foundation Area courses, a grade of B- or better for all other courses, and must maintain an overall average of B or better.
  • The additional coursework cannot include independent or directed study courses ( CS 2990    , CS 3000   ), MS thesis ( CS 2000   ) or project ( CS 2910   ), graduate internship ( CS 2900    ), cooperative ( CS 2905    ), or research courses ( CS 2001    , CS 2002    , CS 2003    and CS 3900   ).
  • Two CS 20XX courses are allowed as additional coursework, the remaining additional courses must be 21XX or higher.
  • One course may be taken outside the department if approved by GPEC.  The outside course will reduce by one the number of allowed CS 20XX courses.

MS degrees must be completed within four calendar years from the student’s initial registration for graduate studies. This limit applies to all students, whether full-time or part-time. Normally, full-time students will complete the degree within two years.

Copies of the thesis must be submitted to the committee at least two weeks in advance of the examination.

The project report must be submitted to the advisor at least a week in advance of the end of the term.

MS Thesis or Project

There are two options for completing the MS degree: the thesis option and the project option.

For the thesis option , the student must complete a written thesis, taking six credits of CS 2000   , which must be taken with the S/N grading option. The student’s advisor will assist them in selecting a thesis committee, to consist of at least three faculty members, at least two members must be from Computer Science (one being your advisor) and at most one from outside the department or University (all three could be from Computer Science). The committee will conduct a public oral final examination. The committee must be formed with all names sent to the graduate administrator at least four weeks before the examination date

The committee will vote on the outcome and sign a report that will be filed in the SCI Graduate Students Office. The oral examination is public and open to all members of the Computer Science Department. It must be announced to CSD via the faculty and graduate mailing lists at least one week prior to its scheduled date. The announcement must include a title, an abstract, name of advisor(s), name of committee members, date of examination, and location of examination.

Students that choose the thesis option must declare this pathway by completing the Graduate Academic Plan (Degree/Specialization) Change form, found on the School Forms webpage .

For the project option , the student must complete a Master’s project, taking three credits of CS 2910   , with the S/N grading option. Approval of a project report by the advisor is required.

Both CS 2000    and CS 2910    are closed courses, requiring approval of the faculty advisor for enrollment.

MS Internships and Co-Ops

MS students are eligible to enroll in MS Internship ( CS 2900   ) or Co-Op ( CS 2905   ) to supplement their in-class education with practical training. MS students can register at most twice for any combination of CS 2900    or CS 2905    (two internships, two Co-Ops, or one internship and one Co-Op). International students must complete two semesters of full-time study prior to qualifying for Curricular Practical Training (CPT). Note that OIS is unlikely to approve CPT authorization during the final semester of study; please talk to the graduate studies administrator or the DGS for more information regarding these issues.

Students wishing to complete an MS Internship ( CS 2900   ) or Co-Op ( CS 2905   ) as part of their MS degree must fill out a learning agreement in conjunction with their employer and their faculty advisor in the CS Department. Please note that MS Internships or Co-Ops not contributing substantively to a student’s graduate education will not be approved by the Department.

Completed Learning Agreement forms (with all signatures) should be turned in to the graduate studies administrator prior to the add/drop deadline for the term in which the Internship or the Co-Op will take place. 

Financial Support

Students whose goal is a terminal Masters degree do not receive financial support from the department. Occasionally, opportunities for financial support for part time instruction may be available. It is the responsibility of the student to watch and apply for these opportunities, when they are announced.






Close Menu Close Menu

800 S. Tucker Drive Tulsa, OK 74104

Close Always Enabled -->
    University of Tulsa
   
  Jul 02, 2024  
2024-2025 Graduate Bulletin    


2024-2025 Graduate Bulletin

Learning Outcomes

Students who complete the M.S. degree program in computer science will

  • Possess a thorough and in-depth understanding of at least three foundational areas of Computer Science including machine learning, networks and network security.
  • Have the ability to apply theoretical findings by individually implementing several large projects.
  • Demonstrate research skills and problem-solving professional behavior in project development, design, and implementation.

Requirements for admission to the Graduate School, including English proficiency, may be found in the Admission    section of this Bulletin .

Applicants to the graduate program in computer science must hold a baccalaureate degree from an accredited college or university in computer science or a related discipline. In addition, the following requirements must be met:

  • A 3.0 undergraduate G.P.A.;
  • At least 15 hours of computer science;
  • At least 15 hours of mathematics and statistics at the level of calculus and above; and
  • An acceptable score on the GRE.

Upon the recommendation of the Graduate Dean, students who fail to meet the above requirements may be admitted conditionally, pending removal of deficiencies.

Curriculum Requirements

The non-thesis option M.S. in computer science requires a total of 30 credit hours selected with approval of the graduate program advisor. Chosen coursework must meet the following requirements:

  • Minimum of 18 credit hours of computer science courses at the 7000-level or above. 
  • Maximum of 12 credit hours of 6000-level courses.
  • Maximum of 6 hours may be courses outside of computer science, at either the 6000- or 7000-level. 
  • Other courses may be selected subject to approval of the graduate program advisor.

The following courses satisfy requirements as computer science courses for the M.S. in Computer Science:

  • CYB 6013 Secure Electronic Commerce
  • CYB 7083 Security Audit and Penetration Testing
  • CYB 7143 Security Economics
  • CYB 7153 Foundations of Cyber Security
  • CYB 7163 Cyber Security Practicum
  • CYB 7173 Defensive Cyber Security Technologies
  • CYB 7183 Information System Security Engineering
  • CYB 7223 Network Security Concepts and Applications
  • CYB 7373 System Security and Cryptography
  • CYB 7443 Information System Assurance
  • CYB 7473 Network Security
  • CYB 7493 Secure System Administration

Students who have not completed equivalent undergraduate computer science courses must complete the following courses:

  • CS 1043 Introduction to Programming and Problem Solving,
  • CS 2003 Fundamentals of Algorithm and Computer Applications,
  • CS 2123 Data Structures,
  • CS 3013 Discrete Mathematics, and
  • CS 3053 Operating Systems.  

In many cases, a student with certain deficiencies can be admitted and required to take two leveling courses –  CS 6103    and  CS 6113    – to cover the deficiencies.

A student who has been fully admitted to the Graduate School should meet with the graduate program advisor of the computer science program to plan a program through to the completion of the degree requirements. This program is subject to change by mutual consent.

College of Computing

A group of people on stage with one receiving an award

College of Computing Alumna Wins ACM Dissertation Award

Tuesday, june 25, 2024, nathan deen, college of computing school of interactive computing.

A College of Computing alumna has earned the highest honor given to doctoral candidates.

Nivedita Arora received the 2024 Association for Computing Machinery (ACM) Doctoral Dissertation Award during an awards ceremony on Saturday in San Francisco. Arora, an assistant professor at Northwestern University, is the first Georgia Tech alumna to win the award, which includes a prize of $20,000.

Arora was a postdoctoral researcher at Georgia Tech’s School of Interactive Computing during the 2022-2023 academic year. She also earned her Ph.D. in computer science and her master’s in human-computer interaction from Georgia Tech.

At Northwestern, she directs the  VAK Sustainable Computing Lab , which re-envisions computing from a sustainability-first approach.

“The ACM Doctoral Dissertation Award is the most prestigious recognition for doctoral research in our field,” said Josiah Hester , an associate professor in the School of Interactive Computing who mentored Arora during her postdoc. “The award is a testament to the recipient's exceptional contributions to the field of computing, marking them as a world-class leader and innovator.”

Arora creates sustainable computational materials that harvest energy from their surrounding environments and can be responsibly disposed of at the end of their life cycles. Under the advisement of Professor Thad Starner and former Georgia Tech Professor Gregory Abowd, she won the dissertation award for her work involving interactive sticky notes.

The interactive sticky notes perform computing tasks and allow wireless communication without battery dependency. 

Through her dissertation , Sustainable Interactive Wireless Stickers: From Materials to Devices on Applications , Arora demonstrated that interactive sticky notes can capture audio, store it as memory, and relay it to another location. For example, an Amazon Alexa user can communicate commands to Alexa without being nearby.

“With rising climate change and e-waste, it is imperative to build computing technologies with a sustainability-first approach,” Arora said. “My dissertation represents this core thinking. I am honored that ACM has recognized my research on sustainable computational materials. I am extremely grateful to my advisers, collaborators, friends, and family for their support.”

Her dissertation also earned Outstanding Dissertation recognition from Georgia Tech’s College of Computing in 2023. She also won the college’s 2022 Outstanding Graduate Research Assistant Award.

Arora was a finalist in the 2022 Fast Company Design Innovation Competition. In 2021, She won the ACM Gaetano Borriello Outstanding Ubiquitous Computing Student Award and was named an EECS Rising Star and a Foley Scholar.

Recent Stories

Varun Agrawal

Robotics Student Introduces Novel Unifying Metric…

Tuesday, July 2, 2024

Students use robots in class

Empowering Teaching Excellence…

Friday, June 28, 2024

A female student wears a Meta Quest VR headset with two men behind her

Meet VAL, an AI Teammate That Can Adapt to Your Tendencies

Thursday, June 27, 2024

We are thrilled to announce Vivek Sarkar as the new Dean of the College of Computing at Georgia Tech! With a distinguished career spanning academia and industry, Sarkar's leadership promises to elevate our community to new heights. https://t.co/2mX5D46cJz pic.twitter.com/LxpLTCXWZV — Georgia Tech Computing (@gtcomputing) April 12, 2024
@GeorgiaTech 's dedication to excellence in computer science (CS) has been recognized once again, with the latest U.S. News and World Report rankings unveiling the institution at 7th place overall for graduate CS studies. https://t.co/qavNUSTb7n pic.twitter.com/BcGyGBQld8 — Georgia Tech Computing (@gtcomputing) April 10, 2024
  • Faculty/Staff
  • MyMichiganTech
  • Safety Data Sheets
  • Computing News Blog
  • Caleb Rother, Computer Science, to . . .

Caleb Rother, Computer Science, to Present Master’s Defense and PhD Research Qualifying Evaluation Talk

  • Computer Science
  • Graduate Students
  • Students of CS

dissertation for computer science

College of Computing student Caleb Rother will present his Final Oral Examination (thesis defense) for his Master of Science in Computer Science (MS Thesis Defense), and his Research Qualifying Evaluation (RQE) for his PhD in Computer Science, on Wednesday, July 10, 2024, at 11 am in Rekhi 214 and via Zoom online meeting.

The title of Rother’s talk is, “Recovering Access Control via Disk Forensics on Low-Level Flash Memory.”

Join the Zoom meeting.

Talk Abstract

In the history of access control, nearly every system designed has relied on the operating system (OS) to enforce the access control protocols. However, if the OS (and specifically root access) is compromised, there are few if any solutions that can get users back into their system efficiently. In this work, we have proposed a novel approach that allows secure and efficient rollback of file access control after an adversary compromises the OS and corrupts the access control metadata. Our key observation is that the underlying flash memory typically performs out-of-place updates. Taking advantage of this unique feature, we can extract the “stale data” specific for OS access control, by performing low-level disk forensics over the raw flash memory. This allows efficiently rolling back the OS access control to a state pre-dating the compromise. To justify the feasibility of the proposed approach, we have implemented it in a computing device using file system EXT2/EXT3 and open-sourced flash memory firmware OpenNFM. We also evaluated the potential impact of our design on the original system. Experimental results indicate that the performance of the affected drive is not significantly impacted.

  • Press Enter to activate screen reader mode.

Department of Computer Science

Acm sigplan dissertation award for benjamin bichsel.

Benjamin Bichsel, a doctoral student in the Secure, Reliable, and Intelligent Systems Lab, has been honoured with the prestigious ACM SIGPLAN John C. Reynolds Doctoral Dissertation Award in the area of programming languages. Congratulations!

  • mode_comment Number of comments

Benjamin Bichsel

Doctoral student Benjamin Bichsel has been awarded the ACM SIGPLAN  John C. Reynolds Doctoral Dissertation Award, which is presented annually to the author of an outstanding doctoral dissertation in the field of programming languages.  Bichsel's thesis "High-Level Quantum Programming" is honoured for its significant contributions to the emerging domain of quantum computing, intending to make quantum programming easier, provably safer, and more accessible. In his dissertation, the doctoral student tackles two key challenges in quantum programming: uncomputation and simulation. The thesis introduces a new, high-level quantum programming language called Silq as well as a new framework for quantum simulation, which uses abstract interpretation to trade off precision for efficiency. Overall, the thesis combines a deep insight into the nature of quantum computing with advanced programming language techniques, such as (linear) type systems and abstract interpretation. It is worth mentioning, that Benjamin Bichsel's work has already had significant impact: the Silq language is currently being used in teaching at the  University of California, Los Angeles ( UCLA) and in a textbook on quantum computing. Big congratulations!

About SIGPLAN : The ACM Special Interest Group on Programming Languages (SIGPLAN) explores programming language concepts and tools, focusing on design, implementation, practice, and theory. Its members are programming language developers, educators, implementers, researchers, theoreticians, and users.  SIGPLAN bestows awards on an annual basis to recognise service and achievements in the programming language community.

dissertation for computer science

Benjamin Bichsel is currently doing his doctorate in the Secure, Reliable, and Intelligent Systems Lab, under the supervision of Professor Martin Vechev. He also obtained his Bachelor's and Master's degrees at the Department of Computer Science from ETH Zurich.

In 2018, he received the  Willi Studer Prize for best Master’s degree in computer science, and in 2023, he was awarded the ETH Medal for his  outstanding dissertation.

More information

  • chevron_right Benjamin Bichsel
  • chevron_right Secure, Reliable, and Intelligent Systems (SRI) Lab
  • chevron_right Dissertation "High-Level Quantum Programming"
  • chevron_right Silq
  • external page call_made John C. Reynolds Doctoral Dissertation Award
  • external page call_made ACM SIGPLAN

IMAGES

  1. How to Structure a Computer Science Dissertation For a Doctoral Degree

    dissertation for computer science

  2. PhD in Computer Science Dissertation Examples

    dissertation for computer science

  3. computer science dissertation help UK

    dissertation for computer science

  4. (PDF) Systematic Literature Review in Computer Science

    dissertation for computer science

  5. (PDF) Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY

    dissertation for computer science

  6. Best Computer Science Dissertation Ideas for Your Dissertation

    dissertation for computer science

VIDEO

  1. Explainable Hypergraph Neural Networks for the Prediction of Dementia Progression

  2. Harvard CS50 2023

  3. I love Coding

  4. IE's Best Dissertation Award 2024

  5. Adventures with AI using DALL-E and Midjourney in Unity Game Engine

  6. Research Methods Workshop on Writing Good Dissertations in Computer Science

COMMENTS

  1. Computer Science Dissertations and Theses

    Theses/Dissertations from 2019. PDF. A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games, Naif Saeed Alzahrani (Dissertation) PDF. Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely (Thesis) PDF.

  2. Computer Science Theses & Dissertations

    Theses and dissertations published by graduate students in the Department of Computer Science, College of Sciences, Old Dominion University, since Fall 2016 are available in this collection. Backfiles of all dissertations (and some theses) have also been added. In late Fall 2023 or Spring 2024, all theses will be digitized and available here.

  3. DSpace

    <link rel="stylesheet" href="styles.4deef92849db6aab.css">

  4. Computer Science Library Research Guide

    How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...

  5. Computer Science and Engineering Theses and Dissertations

    Theses/Dissertations from 2020 PDF. Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network, Rupal Agarwal. PDF. Keyless Anti-Jamming Communication via Randomized DSSS, Ahmad Alagil. PDF. Active Deep Learning Method to Automate Unbiased Stereology Cell Counting, Saeed Alahmari ...

  6. Computer Science Theses and Dissertations

    Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF.

  7. MIT Theses

    MIT's DSpace contains more than 58,000 theses completed at MIT dating as far back as the mid 1800's. Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded.

  8. Theses and Dissertations--Computer Science, University of Kentucky

    Theses/Dissertations from 2024 PDF. Extracting Social Network Model Parameters from Social Science Literature, Isaac Batts. PDF. LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS, Shashank Gupta. PDF

  9. How To Write A Dissertation

    Suggested Order For Writing: The easiest way to build a dissertation is inside-out. Begin by writing the chapters that describe your research (3, 4, and 5 in the above outline). Collect terms as they arise and keep a definition for each. Define each technical term, even if you use it in a conventional manner.

  10. Brown CS: PhD Theses

    Select Problems at the Intersection of Computer Science and Economics (1.2 MB) • Amy Greenwald Rachlin, Eric Reliable Computing at the Nanoscale (17.4 MB) • John Savage 2009 Ahmad, Yanif Pulse: Database Support for Efficient Query Processing of Temporal Polynomial Models (7.4 MB) • Ugur Cetintemel Ge, Tingjian

  11. Computer Science Masters Theses

    COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong

  12. Computer Science Graduate Projects and Theses

    The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...

  13. DataSpace: Computer Science

    Explainable Mechanism Design. Thomas, Clayton. 2023. Beyond the polynomial method: Kakeya sets over finite rings and high dimensional variants. Dhar, Manik. 2023. Randomness and Quantumness in Space-Bounded Computation. Zhan, Wei. Items (Sorted by Submit Date in Descending order): 1 to 20 of 235.

  14. Department of Computer Science and Engineering: Dissertations, Theses

    Computer Science and Engineering, Department of Department of Computer Science and Engineering: Dissertations, Theses, and Student Research PhD candidates : You are welcome and encouraged to deposit your dissertation here, but be aware that

  15. Dissertations

    Full-text access to dissertations published after 1977, and citations and abstracts for earlier dissertations and theses. The official offsite dissertations repository for the U.S. Library of Congress. Contains every title in the UMI Dissertation Abstracts database. Access to works by UC campus authors is free for UC affiliates.

  16. Computer Science Theses

    All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems ...

  17. Dissertations

    Full-text UC dissertations since 1996 are available from ProQuest Dissertations and Theses . As of March 13, 2012, UCLA's Graduate Division only accepts electronic filing of theses and dissertations. Theses and dissertations filed after this date will only be accessible electronically. They can be found by searching the UCLA Library Catalog ...

  18. The Dissertation

    The Dissertation. The dissertation should be written for a technically competent reader who is not necessarily familiar with the particular aspects of Computer Science involved. Better grades will arise from clarity and ease of reading, good pictures, clear explanation, minimal jargon and appropriate use of equations.

  19. Computer Science Master's Theses

    The Digital Repository Service is a secure repository system, designed to store and share scholarly, administrative, and archival materials from the Northeastern University community. The DRS was developed by the Northeastern University Library as a tool for University faculty and staff to protect the valuable information and data that has been created as part of the University's research ...

  20. Theses and Dissertations

    Theses/Dissertations from 2023. PDF. Integrative analysis of cell-free DNA liquid biopsy data, Irfan Alahi. PDF. Deep Learning for Tomographic Image Reconstruction Guided by Generative Models and Image Science, Sayantan Bhadra. PDF. Interpretable deep learning via sparse representation for protein-DNA interactions, Shane Kuei-Hsien Chu. PDF.

  21. Computer Science and Engineering Theses, Projects, and Dissertations

    epicconfigurator computer configurator and cms platform, ivo a. tantamango PDF STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao

  22. Computer Science Research Topics (+ Free Webinar)

    Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you've landed on this post, chances are you're looking for a computer science-related research topic, but aren't sure where to start.Here, we'll explore a variety of CompSci & IT-related research ideas and topic thought-starters ...

  23. Doctoral Dissertations

    Doctoral Dissertations. Following is a complete list of doctoral graduates of the Department of Computer Science, with their dissertation titles. Graduates of other departments or schools, whose primary adviser was a member of the Department of Computer Science, are also listed.

  24. Ph.D. Degree Requirements

    Contents1. Introduction2. Ph.D. Degree Requirements2.1 Ph.D. Advising2.2 Grad Review2.3 Pre-candidacy Requirements2.4 Preliminary Examination and Advancement to Candidacy2.5 Candidacy and Dissertation Defense2.6 Graduation Requirements for Ph.D. Students3. Travel Grants for Ph.D. Students4. Internships1. IntroductionThis document is tailored for graduate students in the Computer Science ...

  25. Program: Computer Science, MS

    For the thesis option, the student must complete a written thesis, taking six credits of CS 2000 , which must be taken with the S/N grading option. The student's advisor will assist them in selecting a thesis committee, to consist of at least three faculty members, at least two members must be from Computer Science (one being your advisor ...

  26. Program: Computer Science, Non-Thesis Option, M.S.

    The non-thesis option M.S. in computer science requires a total of 30 credit hours selected with approval of the graduate program advisor. Chosen coursework must meet the following requirements: Minimum of 18 credit hours of computer science courses at the 7000-level or above. Maximum of 12 credit hours of 6000-level courses.

  27. College of Computing Alumna Wins ACM Dissertation Award

    A College of Computing alumna has earned the highest honor given to doctoral candidates. Nivedita Arora received the 2024 Association for Computing Machinery (ACM) Doctoral Dissertation Award during an awards ceremony on Saturday in San Francisco. Arora, an assistant professor at Northwestern University, is the first Georgia Tech alumna to win the award, which includes a prize of $20,000.

  28. Caleb Rother, Computer Science, to Present Master's Defense and PhD

    College of Computing student Caleb Rother will present his Final Oral Examination (thesis defense) for his Master of Science in Computer Science (MS Thesis Defense), and his Research Qualifying Evaluation (RQE) for his PhD in Computer Science, on Wednesday, July 10, 2024, at 11 am in Rekhi 214 and via Zoom online meeting.. The title of Rother's talk is, "Recovering Access Control via Disk ...

  29. ACM SIGPLAN Dissertation Award for Benjamin Bichsel

    Doctoral student Benjamin Bichsel has been awarded the ACM SIGPLAN John C. Reynolds Doctoral Dissertation Award, which is presented annually to the author of an outstanding doctoral dissertation in the field of programming languages. Bichsel's thesis "High-Level Quantum Programming" is honoured for its significant contributions to the emerging domain of quantum computing, intending to make ...

  30. Master's Thesis Defense in Computer Science: Monish Reddy Kotturu 7/1

    The Richard A. Miner School of Computer & Information Sciences, Department of Computer Science, invites you to attend a Master's Thesis defense by Monish Reddy Kotturu on "Enhancing Team Performance in Multi-Agent Multi-Armed Bandits through Optimization." Candidate name: Monish Reddy Kotturu Time: Monday, July 1, 2024 Time: 11 a.m. ET