PDXScholar logo with slogan Access for All.

Home > School, College, or Department > MCECS > Computer Science > Dissertations and Theses

Computer Science Dissertations and Theses

Theses/dissertations from 2024 2024.

A Deep Learning Framework for Blockage Mitigation in mmWave Wireless , Ahmed Hazaa Almutairi (Dissertation)

Design and Test of Asynchronous Systems Using the Link and Joint Model , Ebelechukwu Esimai (Dissertation)

Automatic Measurement of Dialogue Engagingness in Multilingual Settings , Amila Ferron (Thesis)

Resource-constrained 2D Scene Recovery with Single-Photon Cameras , Daphne Ariadne Kurzenhauser (Thesis)

Concolic Testing for Scripting Languages , Zhe Li (Dissertation)

MmWave RAT Optimization: MAC Layer Initial Access Design and Transport Layer Integration , Suresh Srinivasan (Dissertation)

Designing for Deployable, Secure, and Generic Machine Learning Systems , Li-Yun Wang (Dissertation)

Theses/Dissertations from 2023 2023

Seeing in the Dark: Towards Robust Pedestrian Detection at Nighttime , Afnan Althoupety (Dissertation)

A Deep Hierarchical Variational Autoencoder for World Models in Complex Reinforcement Learning Environments , Sriharshitha Ayyalasomayajula (Thesis)

Toward Efficient Rendering: A Neural Network Approach , Qiqi Hou (Dissertation)

Energy Auction with Non-Relational Persistence , Michael Ramez Howard (Thesis)

Implementing a Functional Logic Programming Language via the Fair Scheme , Andrew Michael Jost (Dissertation)

Multi-Agent Deep Reinforcement Learning for Radiation Localization , Benjamin Scott Totten (Thesis)

Theses/Dissertations from 2022 2022

Using Intrinsically-Typed Definitional Interpreters to Verify Compiler Optimizations in a Monadic Intermediate Language , Dani Barrack (Thesis)

An Automated Zoom Class Session Analysis Tool to Improve Education , Jack Arlo Cannon II (Thesis)

Scaling EPA-RIMM with Multicore System Management Interrupt Handlers , Alexander K. Freed (Thesis)

Unpaired Style Transfer Conditional Generative Adversarial Network for Scanned Document Generation , David Jonathan Hawbaker (Thesis)

Toward Analyzing the Diversity of Extractive Summaries , Aaron David Hudson (Thesis)

Making Curry with Rice: An Optimizing Curry Compiler , Steven Libby (Dissertation)

Domain Knowledge as Motion-Aware Inductive Bias for Deep Video Synthesis: Two Case Studies , Long Mai (Dissertation)

Theses/Dissertations from 2021 2021

Efficient Neuromorphic Algorithms for Gamma-Ray Spectrum Denoising and Radionuclide Identification , Merlin Phillip Carson (Thesis)

Storing Intermediate Results in Space and Time: SQL Graphs and Block Referencing , Basem Ibrahim Elazzabi (Dissertation)

Automated Test Generation for Validating SystemC Designs , Bin Lin (Dissertation)

Forecasting Optimal Parameters of the Broken Wing Butterfly Option Strategy Using Differential Evolution , David Munoz Constantine (Thesis)

Situate: An Agent-Based System for Situation Recognition , Max Henry Quinn (Dissertation)

Theses/Dissertations from 2020 2020

Multiple Diagram Navigation , Hisham Benotman (Dissertation)

Smart Contract Vulnerabilities on the Ethereum Blockchain: a Current Perspective , Daniel Steven Connelly (Thesis)

Extensible Performance-Aware Runtime Integrity Measurement , Brian G. Delgado (Dissertation)

Novel View Synthesis - a Neural Network Approach , Hoang Le (Dissertation)

Exploring the Potential of Sparse Coding for Machine Learning , Sheng Yang Lundquist (Dissertation)

Workflow Critical Path: a Data-Oriented Path Metric for Holistic HPC Workflows , Daniel D. Nguyen (Thesis)

Novel View Synthesis in Time and Space , Simon Niklaus (Dissertation)

Balancing Security, Performance and Deployability in Encrypted Search , David Joel Pouliot (Dissertation)

Theses/Dissertations from 2019 2019

A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games , Naif Saeed Alzahrani (Dissertation)

Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series , Logan Blakely (Thesis)

Local Radiance , Scott Peter Britell (Dissertation)

Correct-by-Construction Typechecking with Scope Graphs , Katherine Imhoff Casamento (Thesis)

Versatile Binary-level Concolic Testing , Bo Chen (Dissertation)

Crumpled and Abraded Encryption: Implementation and Provably Secure Construction , Scott Sherlock Griffy (Thesis)

Knowing Without Knowing: Real-Time Usage Identification of Computer Systems , Leila Mohammed Hawana (Thesis)

Design and Experimental Evaluation of DeepMarket: an Edge Computing Marketplace with Distributed TensorFlow Execution Capability , Soyoung Kim (Thesis)

Localizing Little Landmarks with Transfer Learning , Sharad Kumar (Thesis)

Context-Aware Wi-Fi Infrastructure-based Indoor Positioning Systems , Huy Phuong Tran (Dissertation)

Theses/Dissertations from 2018 2018

Bounding Box Improvement with Reinforcement Learning , Andrew Lewis Cleland (Thesis)

Sensing Building Structure Using UWB Radios for Disaster Recovery , Jeong Eun Lee (Dissertation)

Annotation-Enabled Interpretation and Analysis of Time-Series Data , Niveditha Venugopal (Thesis)

EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments , Tejaswini Ajay Vibhute (Thesis)

Theses/Dissertations from 2017 2017

Improved Scoring Models for Semantic Image Retrieval Using Scene Graphs , Erik Timothy Conser (Thesis)

Refining Bounding-Box Regression for Object Localization , Naomi Lynn Dickerson (Thesis)

Fully Generic Programming Over Closed Universes of Inductive-Recursive Types , Larry Diehl (Dissertation)

Communicating at Terahertz Frequencies , Farnoosh Moshirfatemi (Dissertation)

Designing In-Headset Authoring Tools for Virtual Reality Video , Cuong Nguyen (Dissertation)

Certifying Loop Pipelining Transformations in Behavioral Synthesis , Disha Puri (Dissertation)

Power-Aware Datacenter Networking and Optimization , Qing Yi (Dissertation)

Theses/Dissertations from 2016 2016

Identifying Relationships between Scientific Datasets , Abdussalam Alawini (Dissertation)

Information Representation and Computation of Spike Trains in Reservoir Computing Systems with Spiking Neurons and Analog Neurons , Amin Almassian (Thesis)

Investigations of an "Objectness" Measure for Object Localization , Lewis Richard James Coates (Thesis)

Image Stitching: Handling Parallax, Stereopsis, and Video , Fan Zhang (Dissertation)

Theses/Dissertations from 2015 2015

Novel Methods for Learning and Adaptation in Chemical Reaction Networks , Peter Banda (Dissertation)

Post-silicon Functional Validation with Virtual Prototypes , Kai Cong (Dissertation)

Novel Cryptographic Primitives and Protocols for Censorship Resistance , Kevin Patrick Dyer (Dissertation)

Hardware/Software Interface Assurance with Conformance Checking , Li Lei (Dissertation)

Leveraging Contextual Relationships Between Objects for Localization , Clinton Leif Olson (Thesis)

The Performance of Random Prototypes in Hierarchical Models of Vision , Kendall Lee Stewart (Thesis)

Tweakable Ciphers: Constructions and Applications , Robert Seth Terashima (Dissertation)

Scalable Equivalence Checking for Behavioral Synthesis , Zhenkun Yang (Dissertation)

Theses/Dissertations from 2014 2014

The Nax Language: Unifying Functional Programming and Logical Reasoning in a Language based on Mendler-style Recursion Schemes and Term-indexed Types , Ki Yung Ahn (Dissertation)

Using Spammers' Computing Resources for Volunteer Computing , Thai Le Quy Bui (Thesis)

Towards Constructing Interactive Virtual Worlds , Francis Chang (Dissertation)

System-wide Performance Analysis for Virtualization , Deron Eugene Jensen (Thesis)

Advances in Piecewise Smooth Image Reconstruction , Ralf Juengling (Dissertation)

Interpretable Machine Learning and Sparse Coding for Computer Vision , Will Landecker (Dissertation)

Optimizing Data Movement in Hybrid Analytic Systems , Patrick Michael Leyshock (Dissertation)

Ranked Similarity Search of Scientific Datasets: An Information Retrieval Approach , Veronika Margaret Megler (Dissertation)

Using GIST Features to Constrain Search in Object Detection , Joanna Browne Solmon (Thesis)

The Role of Prototype Learning in Hierarchical Models of Vision , Michael David Thomure (Dissertation)

Theses/Dissertations from 2013 2013

Object Detection and Recognition in Natural Settings , George William Dittmar (Thesis)

Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications , Akshay Dua (Dissertation)

Equivalence Checking for High-Assurance Behavioral Synthesis , Kecheng Hao (Dissertation)

Type Classes and Instance Chains: A Relational Approach , John Garrett Morris (Dissertation)

Theses/Dissertations from 2012 2012

Using Dataflow Optimization Techniques with a Monadic Intermediate Language , Justin George Bailey (Thesis)

A Survey and Analysis of Solutions to the Oblivious Memory Access Problem , Erin Elizabeth Chapman (Thesis)

A Data-Descriptive Feedback Framework for Data Stream Management Systems , Rafael J. Fernández Moctezuma (Dissertation)

Extending Relativistic Programming to Multiple Writers , Philip William Howard (Dissertation)

The Basic Scheme for the Evaluation of Functional Logic Programs , Arthur Peters (Thesis)

The Link Between Image Segmentation and Image Recognition , Karan Sharma (Thesis)

Relativistic Causal Ordering A Memory Model for Scalable Concurrent Data Structures , Josh Triplett (Dissertation)

Theses/Dissertations from 2011 2011

Conceptual Modeling of Data with Provenance , David William Archer (Dissertation)

Low-latency Estimates for Window-Aggregate Queries over Data Streams , Amit Bhat (Thesis)

Information Processing in Two-Dimensional Cellular Automata , Martin Cenek (Dissertation)

Scalable and Efficient Tasking for Dynamic Sensor Networks , Thanh Xuan Dang (Dissertation)

On the Effect of Topology on Learning and Generalization in Random Automata Networks , Alireza Goudarzi (Thesis)

HOLCF '11: A Definitional Domain Theory for Verifying Functional Programs , Brian Charles Huffman (Dissertation)

A Functional Approach to Memory-Safe Operating Systems , Rebekah Leslie (Dissertation)

Factoring Semiprimes Using PG2N Prime Graph Multiagent Search , Keith Eirik Wilson (Thesis)

High Speed Wireless Networking for 60GHz , Candy Yiu (Dissertation)

Theses/Dissertations from 2010 2010

Extensible Scheduling in a Haskell-based Operating System , Kenneth William Graunke (Thesis)

Addressing Automated Adversaries of Network Applications , Edward Leo Kaiser (Dissertation)

An Automata-Theoretic Approach to Hardware/Software Co-verification , Juncao Li (Dissertation)

Practical Type Inference for the GADT Type System , Chuan-kai Lin (Dissertation)

Advanced Search

  • Notify me via email or RSS
  • Featured Collections
  • All Authors
  • Schools & Colleges
  • Dissertations & Theses
  • PDXOpen Textbooks
  • Conferences
  • Collections
  • Disciplines
  • Faculty Expert Gallery
  • Submit Research
  • Faculty Profiles
  • Terms of Use
  • Feedback Form

Home | About | My Account | Accessibility Statement | Portland State University

Privacy Copyright

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations

Computer Science and Engineering Theses and Dissertations

Theses/dissertations from 2024 2024.

Automatic Image-Based Nutritional Calculator App , Kejvi Cupa

Individual Behavioral Modeling Across Games of Strategy , Logan Fields

Semi-automated Cell Annotation Framework Using Deep Learning , Abhiram Kandiyana

Predicting Gender of Author Using Large Language Models (LLMs) , Satya Uday Sanku

Context-aware Affective Behavior Modeling and Analytics , Md Taufeeq Uddin

Exploring the Use of Enhanced SWAD Towards Building Learned Models that Generalize Better to Unseen Sources , Brandon M. Weinhofer

Theses/Dissertations from 2023 2023

Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno

Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan

V2V and V2I Based Safety and Platooning Algorithms for Connected and Autonomous Vehicles , Omkar Dokur

Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros

Exploring Scalability of Multimodal User Interface Design in Virtual and Augmented Reality , Sarah M. Garcia

Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin

Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen

Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur

A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.

Graph Analysis on Social Networks , Shen Lu

Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera

Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo

Secure Reconfigurable Computing Paradigms for the Next Generation of Artificial Intelligence and Machine Learning Applications , Brooks Olney

Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi

Theses/Dissertations from 2022 2022

Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed

Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala

Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen

An Internet of Medical Things (IoMT) Approach for Remote Assessment of Head and Neck Cancer Patients , Ruchitha Chinthala

A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave

On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou

Developing Reinforcement Learning Algorithms for Robots to Aim and Pour Solid Objects , Haoxuan Li

Computing Group-By and Aggregate in Massively Parallel Systems , Chengcheng Mou

Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang

A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri

Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney

Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin

Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker

Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich

Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar

Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong

Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward

Exploration of Energy Efficient Computing for Data-Intensive Applications , Md Adnan Zaman

Theses/Dissertations from 2021 2021

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill

Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja

Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev

Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov

Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai

Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri

Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco

Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam

Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava

A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari

Theses/Dissertations from 2020 2020

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal

Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari

Composition of Atomic-Obligation Security Policies , Yan Cao Albright

Action Recognition Using the Motion Taxonomy , Maxat Alibayev

Sentiment Analysis in Peer Review , Zachariah J. Beasley

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov

Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang

Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram

PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami

Composition of Atomic-Obligation Security Policies , Danielle Ferguson

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel

The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez

Privacy-Preserving and Functional Information Systems , Thang Hoang

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi

Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam

Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha

Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath

System Support of Concurrent Database Query Processing on a GPU , Hao Li

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu

Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla

Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng

Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi

Models of Secure Software Enforcement and Development , Hernan M. Palombo

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan

Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah

Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui

Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon

Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna

Theses/Dissertations from 2019 2019

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur

Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed

Phenomena of Social Dynamics in Online Games , Essa Alhazmi

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

ODU Digital Commons

Home > Colleges and Schools > Sciences > Computer Science > ETDs

Computer Science Theses & Dissertations

Theses and dissertations published by graduate students in the Department of Computer Science, College of Sciences, Old Dominion University, since Fall 2016 are available in this collection. Backfiles of all dissertations (and some theses) have also been added.

In late Fall 2025, all theses will be digitized and available here. In the meantime, consult the Library Catalog to find older items in print.

Theses/Dissertations from 2024 2024

Thesis: Study of Deep Learning Models to Classify Nasa’s Kepler Light Curves , Heena Minnich

Theses/Dissertations from 2023 2023

Dissertation: Inverse Mappers for QCD Global Analysis , Manal Almaeen

Thesis: Assessing the Prevalence and Archival Rate of URIs to Git Hosting Platforms in Scholarly Publications , Emily Escamilla

Thesis: Supporting Account-based Queries for Archived Instagram Posts , Himarsha R. Jayanetti

Dissertation: Detecting Malware With Securedeep Accelerator via Processor Side-Channel Fingerprinting for Internet of Things , Zhuoran Li

Dissertation: Tracing and Segmentation of Molecular Patterns in 3-Dimensional Cryo-ET/EM Density Maps Through Algorithmic Image Processing and Deep Learning-Based Techniques , Salim Sazzed

Dissertation: Towards Intelligent Runtime Framework for Distributed Heterogeneous Systems , Polykarpos Thomadakis

Theses/Dissertations from 2022 2022

Dissertation: Machine Learning-Based Event Generator , Yasir Alanazi

Thesis: Using Ensemble Learning Techniques to Solve the Blind Drift Calibration Problem , Devin Scott Drake

Dissertation: A Relevance Model for Threat-Centric Ranking of Cybersecurity Vulnerabilities , Corren G. McCoy

Dissertation: Evaluation of Generative Models for Predicting Microstructure Geometries in Laser Powder Bed Fusion Additive Manufacturing , Andy Ramlatchan

Thesis: TransParsCit: A Transformer-Based Citation Parser Trained on Large-Scale Synthesized Data , MD Sami Uddin

Dissertation: Towards Privacy and Security Concerns of Adversarial Examples in Deep Hashing Image Retrieval , Yanru Xiao

Theses/Dissertations from 2021 2021

Dissertation: MOVE: Mobile Observers Variants and Extensions , Ryan Florin

Dissertation: Improving Collection Understanding for Web Archives with Storytelling: Shining Light Into Dark and Stormy Archives , Shawn M. Jones

Dissertation: A Unified Framework for Parallel Anisotropic Mesh Adaptation , Christos Tsolakis

Theses/Dissertations from 2020 2020

Dissertation: MementoMap: A Web Archive Profiling Framework for Efficient Memento Routing , Sawood Alam

Dissertation: A Framework for Verifying the Fixity of Archived Web Resources , Mohamed Aturban

Thesis: Parallelization of the Advancing Front Local Reconnection Mesh Generation Software Using a Pseudo-Constrained Parallel Data Refinement Method , Kevin Mark Garner Jr.

Dissertation: Towards Dynamic Vehicular Clouds , Aida Ghazizadeh

Dissertation: Bootstrapping Web Archive Collections From Micro-Collections in Social Media , Alexander C. Nwala

Dissertation: Automatic Linear and Curvilinear Mesh Generation Driven by Validity Fidelity and Topological Guarantees , Jing Xu

Theses/Dissertations from 2019 2019

Dissertation: Expanding the Usage of Web Archives by Recommending Archived Webpages Using Only the URI , Lulwah M. Alkwai

Dissertation: Highly Accurate Fragment Library for Protein Fold Recognition , Wessam Elhefnawy

Dissertation: Scalable Parallel Delaunay Image-to-Mesh Conversion for Shared and Distributed Memory Architectures , Daming Feng

Dissertation: Aggregating Private and Public Web Archives Using the Mementity Framework , Matthew R. Kelly

Thesis: Enhancing Portability in High Performance Computing: Designing Fast Scientific Code with Longevity , Jason Orender

Thesis: Novel Use of Neural Networks to Identify and Detect Electrical Infrastructure Performance , Evan Pierre Savaria

Theses/Dissertations from 2018 2018

Dissertation: New Methods to Improve Protein Structure Modeling , Maha Abdelrasoul

Dissertation: Applying Machine Learning to Advance Cyber Security: Network Based Intrusion Detection Systems , Hassan Hadi Latheeth AL-Maksousy

Thesis: To Relive the Web: A Framework for the Transformation and Archival Replay of Web Pages , John Andrew Berlin

Thesis: Supporting Big Data at the Vehicular Edge , Lloyd Decker

Thesis: Deep Learning for Segmentation Of 3D Cryo-EM Images , Devin Reid Haslam

Dissertation: FlexStream: SDN-Based Framework for Programmable and Flexible Adaptive Video Streaming , Ibrahim Ben Mustafa

Thesis: Novel Technique for Gait Analysis Using Two Waist Mounted Gyroscopes , Ahmed Nasr

Dissertation: Leveraging Resources on Anonymous Mobile Edge Nodes , Ahmed Salem

Theses/Dissertations from 2017 2017

Dissertation: SenSys: A Smartphone-Based Framework for ITS applications , Abdulla Ahmed Alasaadi

Dissertation: ItsBlue: A Distributed Bluetooth-Based Framework for Intelligent Transportation Systems , Ahmed Awad Alghamdi

Dissertation: Finite Element Modeling Driven by Health Care and Aerospace Applications , Fotios Drakopoulos

Dissertation: Efficient Machine Learning Approach for Optimizing Scientific Computing Applications on Emerging HPC Architectures , Kamesh Arumugam Karunanithi

Thesis: Multi-GPU Accelerated High-Fidelity Simulations of Beam-Beam Effects in Particle Colliders , Naga Sai Ravi Teja Majeti

Theses/Dissertations from 2016 2016

Dissertation: Using Web Archives to Enrich the Live Web Experience Through Storytelling , Yasmin AlNoamany

Thesis: Magnopark, Smart Parking Detection Based on Cellphone Magnetic Sensor , Maryam Arab

Dissertation: Scripts in a Frame: A Framework for Archiving Deferred Representations , Justin F. Brunelle

Dissertation: Machine Learning Methods for Brain Image Analysis , Ahmed Fakhry

Dissertation: Novel Monte Carlo Methods for Large-Scale Linear Algebra Operations , Hao Ji

Dissertation: Machine Learning Methods for Medical and Biological Image Computing , Rongjian Li

Dissertation: Toward Open and Programmable Wireless Network Edge , Mostafa Uddin

Thesis: An Optimized Multiple Right-Hand Side Dslash Kernel for Intel Xeon Phi , Aaron Walden

Dissertation: Towards Aggregating Time-Discounted Information in Sensor Networks , Xianping Wang

Dissertation: A Computational Framework for Learning from Complex Data: Formulations, Algorithms, and Applications , Wenlu Zhang

Theses/Dissertations from 2015 2015

Dissertation: Efficient Algorithms for Prokaryotic Whole Genome Assembly and Finishing , Abhishek Biswas

Dissertation: De Novo Protein Structure Modeling and Energy Function Design , Lin Chen

Dissertation: High Performance Large Graph Analytics by Enhancing Locality , Naga Shailaja Dasari

Thesis: Avoiding Spoilers on Mediawiki Fan Sites Using Memento , Shawn M. Jones

Dissertation: Energy Harvesting-Aware Design for Wireless Nanonetworks , Shahram Mohrehkesh

Thesis: Parallel Two-Dimensional Unstructured Anisotropic Delaunay Mesh Generation for Aerospace Applications , Juliette Kelly Pardue

Dissertation: Detecting, Modeling, and Predicting User Temporal Intention , Hany M. SalahEldeen

Dissertation: Wireless Networking for Vehicle to Infrastructure Communication and Automatic Incident Detection , Sarwar Aziz Sha-Mohammad

Dissertation: Computational Development for Secondary Structure Detection From Three-Dimensional Images of Cryo-Electron Microscopy , Dong Si

Thesis: Mobile Cloud Computing Based Non Rigid Registration for Image Guided Surgery , Arun Brahmavar Vishwanatha

Theses/Dissertations from 2014 2014

Dissertation: Web Archive Services Framework for Tighter Integration Between the Past and Present Web , Ahmed AlSum

Dissertation: Modeling Stem Cell Population Dynamics , Samiur Arif

Dissertation: A Framework for Web Object Self-Preservation , Charles L. Cartledge

Dissertation: Document Classification in Support of Automated Metadata Extraction Form Heterogeneous Collections , Paul K. Flynn

Dissertation: Resource Allocation in Vehicular Cloud Computing , Puya Ghazizadeh

Thesis: Generating Combinatorial Objects- A New Perspective , Alexander Chizoma Nwala

Dissertation: Enhancing Understanding of Discrete Event Simulation Models Through Analysis , Kara Ann Olson

Dissertation: Scalable Reasoning for Knowledge Bases Subject to Changes , Hui Shi

Dissertation: Improving Structural Features Prediction in Protein Structure Modeling , Ashraf Yaseen

Thesis: Computational Analysis of Gene Expression and Connectivity Patterns in the Convoluted Structures of Mouse Cerebellum , Tao Zeng

Theses/Dissertations from 2013 2013

Thesis: HTTP Mailbox - Asynchronous Restful Communication , Sawood Alam

Dissertation: TDMA Slot Reservation in Cluster-Based VANETs , Mohammad Salem Almalag

Thesis: Protein Loop Length Estimation From Medium Resolution Cryoem Images , Andrew R. McKnight

Theses/Dissertations from 2012 2012

Dissertation: De Novo Protein Structure Modeling from Cryoem Data Through a Dynamic Programming Algorithm in the Secondary Structure Topology Graph , Kamal H. Al Nasr

Dissertation: FRIEND: A Cyber-Physical System for Traffic Flow Related Information Aggregation and Dissemination , Samy S. El-Tawab

Thesis: An Extensible Framework for Creating Personal Archives of Web Resources Requiring Authentication , Matthew Ryan Kelly

Thesis: Visualizing Digital Collections at Archive-It , Kalpesh Padia

Theses/Dissertations from 2011 2011

Dissertation: A Framework for Incident Detection and notification in Vehicular Ad-Hoc Networks , Mahmoud Abuelela

Dissertation: A Framework for Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks , Mohammad Hadi Arbabi

Thesis: A Probabilistic Analysis of Misparking in Reservation Based Parking Garages , Vikas G. Ashok

Thesis: A Penalty-Based Approach to Handling Cluster Sizing in Mobile Ad Hoc Networks , Ryan Florin

Dissertation: Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks , Khaled Ibrahim

Dissertation: Using the Web Infrastructure for Real Time Recovery of Missing Web Pages , Martin Klein

Theses/Dissertations from 2010 2010

Dissertation: A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks , Hady S. Abdel Salam

Thesis: Merging Schemas in a Collaborative Faceted Classification System , Jianxiang Li

Thesis: XPath-Based Template Language for Describing the Placement of Metadata within a Document , Vijay Kumar Musham

Dissertation: Providing Location Security in Vehicular Ad Hoc Networks , Gongjun Yan

Theses/Dissertations from 2009 2009

Dissertation: Algorithms for Vertex-Weighted Matching in Graphs , Mahantesh Halappanavar

Theses/Dissertations from 2008 2008

Thesis: Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods , Rabia Haq

Dissertation: Biology-Inspired Approach for Communal Behavior in Massively Deployed Sensor Networks , Kennie H. Jones

Dissertation: Biological Networks: Modeling and Structural Analysis , Emad Y. Ramadan

Dissertation: Integrating Preservation Functions Into the Web Server , Joan A. Smith

Theses/Dissertations from 2007 2007

Dissertation: FreeLib: A Self-Sustainable Peer-to-Peer Digital Library Framework for Evolving Communities , Ashraf A. Amrou

Thesis: Channel Management in Heterogeneous Cellular Networks , Mohammad Hadi Arbabi

Dissertation: Diagnosing Reading strategies: Paraphrase Recognition , Chutima Boonthum

Thesis: Investigating Real-Time Sonar Performance Predictions Using Beowulf Clustering , Charles Lane Cartledge

Dissertation: Lazy Preservation: Reconstructing Websites from the Web Infrastructure , Frank McCown

Theses/Dissertations from 2006 2006

Dissertation: Group Key Management in Wireless Ad-Hoc and Sensor Networks , Mohammed A. Moharrum

Dissertation: Template-Based Metadata Extraction for Heterogeneous Collection , Jianfeng Tang

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • Author Guidelines
  • Department of Computer Science
  • Other Digital Collections
  • ODU Libraries
  • Old Dominion University

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

UKnowledge

UKnowledge > College of Engineering > Computer Science > Theses & Dissertations

Theses and Dissertations--Computer Science

Theses/dissertations from 2024 2024.

Extracting Social Network Model Parameters from Social Science Literature , Isaac Batts

LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS , Shashank Gupta

TENSION CONTROL AND INTERPROXIMATION TECHNIQUES FORSHAPE DESIGN AND RGB-DEPTH SEGMENTATION RECONSTRUCTION AND MODELING , Anastasia Kazadi

Flexible Attenuation Fields: Tomographic Reconstruction From Heterogeneous Datasets , Clifford S. Parker

Theses/Dissertations from 2023 2023

Small Approximate Pareto Sets with Quality Bounds , William Bailey

Machine-Learning-Powered Cyber-Physical Systems , Enrico Casella

PERSONALIZED POINT OF INTEREST RECOMMENDATIONS WITH PRIVACY-PRESERVING TECHNIQUES , Longyin Cui

Deep Learning-Based Intrusion Detection Methods for Computer Networks and Privacy-Preserving Authentication Method for Vehicular Ad Hoc Networks , Ayesha Dina

Machine Learning Framework for Real-World Electronic Health Records Regarding Missingness, Interpretability, and Fairness , Jing Lucas Liu

Enabling DApps Data Exchange with Hardware-Assisted Secure Oracle Network , Yue Li

Improving Connectivity for Remote Cancer Patient Symptom Monitoring and Reporting in Rural Medically Underserved Regions , Esther Max-Onakpoya

A Secure and Distributed Architecture for Vehicular Cloud and Protocols for Privacy-preserving Message Dissemination in Vehicular Ad Hoc Networks , Hassan Mistareehi

Practical AI Value Alignment Using Stories , Md Sultan Al Nahian

Hard-Hearted Scrolls: A Noninvasive Method for Reading the Herculaneum Papyri , Stephen Parsons

Deep Learning Models for CT Image Standardization , Md Selim

Multi-agent Learning For Game-theoretical Problems , Kshitija Taywade

Peer-to-Peer Energy Trading in Smart Residential Environment with User Behavioral Modeling , Ashutosh Timilsina

The BASIL technique: Bias Adaptive Statistical Inference Learning Agents for Learning from Human Feedback , Jonathan Indigo Watson

Structured Attention for Image Analysis , Xin Xing

Multi-Domain Adaptation for Image Classification, Depth Estimation, and Semantic Segmentation , Yu Zhang

Theses/Dissertations from 2022 2022

Learning a Scalable Algorithm for Improving Betweenness in the Lightning Network , Vincent Davis

Don't Give Me That Story! -- A Human-Centered Framework for Usable Narrative Planning , Rachelyn Farrell

Image Geo-localization with Cross-Attention , Connor Greenwell

Smart Decision-Making via Edge Intelligence for Smart Cities , Nathaniel Hudson

Supporting Stylized Language Models Using Multi-Modality Features , Chengxi Li

Page 1 of 9

Advanced Search

  • Notify me via email or RSS

Browse by Author

  • Collections
  • Disciplines

Author Corner

  • Submit Research

New Title Here

Below. --> connect.

  • Law Library
  • Special Collections
  • Copyright Resource Center
  • Graduate School
  • Scholars@UK

Logo of Kentucky Research Commons

  • We’d like your feedback

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

University of Kentucky ®

An Equal Opportunity University Accreditation Directory Email Privacy Policy Accessibility Disclosures

Home > FACULTIES > Computer Science > CSD-ETD

Computer Science Department

Computer Science Theses and Dissertations

This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository

Theses/Dissertations from 2024 2024

ASSESSMENT OF AI-GENERATED IMAGES USING COMPUTATIONAL METRICS AND HUMAN CENTRIC ANALYSIS , Memoona Aziz Ms.

Approximation Algorithms for High Multiplicity Strip Packing, Thief Orienteering, and K-Median , Andrew Bloch-Hansen

A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani

Efficient Algorithms and Parallel Implementations for Power Series Multiplication , Seyed Abdol Hamid Fathi

Understanding Protein Deep Learning Models through Explainability , Zahra Fazel

Using Driver Gaze and On-Road Driving Data for Predicting Driver Maneuvers in Advanced Driving Assistance Systems , Farzan Heidari

Protein-Protein Interaction Prediction , SeyedMohsen Hosseini

Container Migration: A Perfomance Evaluation Between MIGrror AND Pre-copy , Xinwen Liang

UTILIZING MACHINE LEARNING TECHNIQUES FOR DISPERSION MEASURE ESTIMATION IN FAST RADIO BURSTS STUDIES , Hosein Rajabi

Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy

Framework for Bug Inducing Commit Prediction Using Quality Metrics , Alireza Tavakkoli Barzoki

Knowledge-grounded Natural Language Understanding of Biomedical and Clinical Literature , Xindi Wang

Theses/Dissertations from 2023 2023

Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar

Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian

Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh

INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee

Algorithms and Software for Oligonucleotide Design , Qin Dong

Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani

De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han

Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley

A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He

A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh

Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani

Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu

Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li

Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li

DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li

Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai

Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad

The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi

Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam

Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi

Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat

Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul

On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi

Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza

Migration in Edge Computing , Arshin Rezazadeh

A Modified Hopfield Network for the K-Median Problem , Cody Rossiter

Predicting Network Failures with AI Techniques , Chandrika Saha

Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha

An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa

Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia

Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia

IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales

A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani

Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad

Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim

A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba

Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong

Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang

Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar

Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang

Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi

Theses/Dissertations from 2022 2022

The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt

Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy

Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez

Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu

Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte

Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell

Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch

Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh

Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost

Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie

Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka

Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling

Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan

Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti

Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida

False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito

Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford

An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson

Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem

A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid

Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma

Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi

Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis

Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg

Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang

Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang

Predicting and Modifying Memorability of Images , Mohammad Younesi

Theses/Dissertations from 2021 2021

Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed

A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar

Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani

Contrastive Learning of Auditory Representations , Haider Al-Tahan

Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi

Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak

Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman

Improving Reader Motivation with Machine Learning , Tanner A. Bohn

A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang

Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee

A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen

Exploratory Search with Archetype-based Language Models , Brent D. Davis

Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo

Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon

A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du

Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi

Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan

A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar

Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami

Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara

  • Accessible Formats

Advanced Search

  • Notify me via email or RSS
  • Expert Gallery
  • Online Journals
  • eBook Collections
  • Reports and Working Papers
  • Conferences and Symposiums
  • Electronic Theses and Dissertations
  • Digitized Special Collections
  • All Collections
  • Disciplines

Author Corner

  • Submit Thesis/Dissertation

Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright

©1878 - 2016 Western University



Welcome to the on-line version of the UNC dissertation proposal collection. The purpose of this collection is to provide examples of proposals for those of you who are thinking of writing a proposal of your own. I hope that this on-line collection proves to be more difficult to misplace than the physical collection that periodically disappears. If you are preparing to write a proposal you should make a point of reading the excellent document The Path to the Ph.D., written by James Coggins. It includes advice about selecting a topic, preparing a proposal, taking your oral exam and finishing your dissertation. It also includes accounts by many people about the process that each of them went through to find a thesis topic. Adding to the Collection This collection of proposals becomes more useful with each new proposal that is added. If you have an accepted proposal, please help by including it in this collection. You may notice that the bulk of the proposals currently in this collection are in the area of computer graphics. This is an artifact of me knowing more computer graphics folks to pester for their proposals. Add your non-graphics proposal to the collection and help remedy this imbalance! There are only two requirements for a UNC proposal to be added to this collection. The first requirement is that your proposal must be completely approved by your committee. If we adhere to this, then each proposal in the collection serves as an example of a document that five faculty members have signed off on. The second requirement is that you supply, as best you can, exactly the document that your committee approved. While reading over my own proposal I winced at a few of the things that I had written. I resisted the temptation to change the document, however, because this collection should truely reflect what an accepted thesis proposal looks like. Note that there is no requirement that the author has finished his/her Ph.D. Several of the proposals in the collection were written by people who, as of this writing, are still working on their dissertation. This is fine! I encourage people to submit their proposals in any form they wish. Perhaps the most useful forms at the present are Postscript and HTML, but this may not always be so. Greg Coombe has generously provided LaTeX thesis style files , which, he says, conform to the 2004-2005 stlye requirements.
Many thanks to everyone who contributed to this collection!
Greg Coombe, "Incremental Construction of Surface Light Fields" in PDF . Karl Hillesland, "Image-Based Modelling Using Nonlinear Function Fitting on a Stream Architecture" in PDF . Martin Isenburg, "Compressing, Streaming, and Processing of Large Polygon Meshes" in PDF . Ajith Mascarenhas, "A Topological Framework for Visualizing Time-varying Volumetric Datasets" in PDF . Josh Steinhurst, "Practical Photon Mapping in Hardware" in PDF . Ronald Azuma, "Predictive Tracking for Head-Mounted Displays," in Postscript Mike Bajura, "Virtual Reality Meets Computer Vision," in Postscript David Ellsworth, "Polygon Rendering for Interactive Scientific Visualization on Multicomputers," in Postscript Richard Holloway, "A Systems-Engineering Study of the Registration Errors in a Virtual-Environment System for Cranio-Facial Surgery Planning," in Postscript Victoria Interrante, "Uses of Shading Techniques, Artistic Devices and Interaction to Improve the Visual Understanding of Multiple Interpenetrating Volume Data Sets," in Postscript Mark Mine, "Modeling From Within: A Proposal for the Investigation of Modeling Within the Immersive Environment" in Postscript Steve Molnar, "High-Speed Rendering using Scan-Line Image Composition," in Postscript Carl Mueller, " High-Performance Rendering via the Sort-First Architecture ," in Postscript Ulrich Neumann, "Direct Volume Rendering on Multicomputers," in Postscript Marc Olano, "Programmability in an Interactive Graphics Pipeline," in Postscript Krish Ponamgi, "Collision Detection for Interactive Environments and Simulations," in Postscript Russell Taylor, "Nanomanipulator Proposal," in Postscript Greg Turk, " Generating Textures on Arbitrary Surfaces ," in HTML and Postscript Terry Yoo, " Statistical Control of Nonlinear Diffusion ," in Postscript




Scholars' Mine

Home > Computer Science > CompSci TDs > Masters Theses

Computer Science Masters Theses

Theses from 2024 2024.

Enabling Smart Healthcare Applications Through Visible Light Communication Networks , Jack Manhardt

Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan

Learn from the Past: using Peer Data to Improve Course Recommendations in Personalized Education , Colton Walker

Theses from 2023 2023

Dynamic Discounted Satisficing Based Driver Decision Prediction in Sequential Taxi Requests , Sree Pooja Akula

MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric

Computer Vision in Adverse Conditions: Small Objects, Low-Resoltuion Images, and Edge Deployment , Raja Sunkara

Theses from 2022 2022

Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga

Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong

Theses from 2021 2021

Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II

Theses from 2020 2020

On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu

Theses from 2019 2019

Advanced techniques for improving canonical genetic programming , Adam Tyler Harter

Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter

Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam

Theses from 2018 2018

Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin

CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush

Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani

Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa

Solidification rate detection through solid-liquid interface tracking , Wei Luo

Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham

Cyber-physical security of an electric microgrid , Prashanth Palaniswamy

An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla

Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy

Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti

A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang

Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang

Theses from 2017 2017

Cyber-physical security of a chemical plant , Prakash Rao Dunaka

UFace: Your universal password no one can see , Nicholas Steven Hilbert

Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco

Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti

Personalizing education with algorithmic course selection , Tyler Morrow

Decodable network coding in wireless network , Junwei Su

Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla

Theses from 2016 2016

Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar

Theses from 2015 2015

Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi

Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda

A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li

Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin

Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala

Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy

Cyber security research frameworks for coevolutionary network defense , George Daniel Rush

Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara

Theses from 2014 2014

Crime pattern detection using online social media , Raja Ashok Bolla

Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi

A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati

Access control delegation in the clouds , Pavani Gorantla

Evolving decision trees for the categorization of software , Jasenko Hosic

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar

Privacy preservation using spherical chord , Doyal Tapan Mukherjee

Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram

On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu

Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli

An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan

Theses from 2013 2013

Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu

Security analysis of a cyber physical system : a car example , Jason Madden

Efficient integrity verification of replicated data in cloud , Raghul Mukundan

Search-based model summarization , Lokesh Krishna Ravichandran

Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg

Secure design defects detection and correction , Wenquan Wang

Theses from 2012 2012

Robust evolutionary algorithms , Brian Wesley Goldman

Semantic preserving text tepresentation and its applications in text clustering , Michael Howard

Vehicle path verification using wireless sensor networks , Gerry W. Howser

Distributed and collaborative watermarking in relational data , Prakash Kumar

Theses from 2011 2011

A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle

Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount

A low-cost motion tracking system for virtual reality applications , Abhinav Chadda

Optimization of textual affect entity relation models , Ajith Cherukad Jose

MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram

A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi

An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka

Location privacy policy management system , Arej Awodha Muhammed

Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni

Theses from 2010 2010

Event detection from click-through data via query clustering , Prabhu Kumar Angajala

Population control in evolutionary algorithms , Jason Edward Cook

Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher

Multi axis slicing for rapid prototyping , Divya Kanakanala

Content based image retrieval for bio-medical images , Vikas Nahar

2-D path planning for direct laser deposition process , Swathi Routhu

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu

Theses from 2009 2009

Information flow properties for cyber-physical systems , Rav Akella

Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet

Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba

Theses from 2008 2008

Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das

Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong

A time series classifier , Christopher Mark Gore

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu

Co-optimization: a generalization of coevolution , Travis Service

Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder

Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson

Theses from 2007 2007

A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • All Authors
  • Faculty Authors

Author Corner

Useful links.

  • Library Resources

S&T logo

Thesis Locations

  • View these on map
  • View these in Google Earth

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

EWU Digital Commons

Home > College, Department, or Program > CSTEM > Computer Science > Theses

Computer Science Masters Thesis Collection

Theses/dissertations from 2023 2023.

A hierarchical approach to improve the ant colony optimization algorith , Bryan J. Fischer

From Tic-tac-toe to AlphaGo: a survey of algorithms used in various games , Mathew T. Godon

Temporally consistent FastDVDNet: an overlap loss implementation for FastDVDNet , Michael J. Henderson

Multimodal game-based learning in Post-Secondary Education , Nathan A. Vanos

Theses/Dissertations from 2022 2022

Towards Cloud-Based cost-effective serverless information system , Isaac C. Angle

Modeling document classification to automate mental health diagnosis , William M. Tadlock

Theses/Dissertations from 2021 2021

Password-less two-factor authentication using scannable barcodes on a mobile device , Grant M. Callant II

Intrusion detection for industrial control systems , Kurt Lamon

Theses/Dissertations from 2020 2020

Data entry voice assistant for healthcare providers , Sajad Hussain M Alhamada

Comparison of the tally numbering system to traditional arithmetic systems in field programmable gate arrays , Robert Paul Shredow

Using Blockchain for Digital Card Game , Raymond A. Swannack

Theses/Dissertations from 2019 2019

Relaxed mental state detection using the Emotiv Epoc and Adaptive Threshold Algorithms , Olin L. Anderson

Detecting and mapping real-time Influenza-like illness using Twitter stream data , Elisha D. Brunette

The application of cloud resources to terrain data visualization , Gregory J. Larrick

Theses/Dissertations from 2018 2018

A practical and efficient algorithm for the k-mismatch shortest unique substring finding problem , Daniel Robert Allen

DETERMINING VULNERABILITY USING ATTACK GRAPHS: AN EXPANSION OF THE CURRENT FAIR MODEL , Beth M. Anderson

The application of GPU to molecular communication studies , Tobias J. Cain

Improving Aerial Package Delivery Through Simulation of Hazard Detection, Mapping, and Regulatory Compliance , Kevin Chumbley

GPU accelerated risk quantification , Forrest L. Ireland

Evaluating a Cluster of Low-Power ARM64 Single-Board Computers with MapReduce , Daniel McDermott

Glyph based segmentation of Chinese calligraphy characters in the "Collected Characters" stele. , David A. McInnis

Theses/Dissertations from 2017 2017

CLOUD LIVE VIDEO TRANSFER , Ryan Babcock

GENE EXPRESSION PROSPECTIVE SIMULATION AND ANALYSIS USING DATA MINING AND IMMERSIVE VIRTUAL REALITY VISUALIZATION , Joshua Cotes

Theses/Dissertations from 2016 2016

Near real-time early cancer detection using a graphics processing unit , Jason Helms

Analysis of algorithms to create profitable trades in the stock market , Nicholas P. Klinger

Dynamically parallel CAMSHIFT: GPU accelerated object tracking in digital video , Matthew J. Perry

USING CONVOLUTIONAL NEURAL NETWORKS FOR FINE GRAINED IMAGECLASSIFICATION OF ACUTE LYMPHOBLASTIC LEUKEMIA , Richard K. Sipes

Character extraction from ancient Chinese stele using discrete cosine transform , Toshiaki Ueno

Theses/Dissertations from 2015 2015

ECS: Educational Communication System , Nasmah Alnaimi

The geo-secure system: a secure system for data access based on geographical data , Fawaz J. Alruwaili

Heartbeat location assistance for electrocardiograms , Sarah Bass

Indirect association rule mining for crime data analysis , Riley Englin

Modeling and rendering of fluid flows using the Lennard-Jones potential , Nicholas J. LeFave

Multi-drug association rule mining on graphics processing unit , Jesse Scholer

Theses/Dissertations from 2014 2014

A study of kNN using ICU multivariate time series data , Admir Djulovic

Artificial Frequency Match Neuron Implemented with Digital Logic , David J. Ellis

Bridging the detection gap: a study on a behavior-based approach using malware techniques , Geancarlo Palavicini

3D Image Acquisition System for Facial Recognition , James E. Pearson

Divide and Conquer G-Buffer Ray Tracing , Daniel Stokes

Improving the performance of skeletal mesh animations in the Blender game engine , Mitchell Stokes

MINING MULTI-GRANULAR MULTIVARIATE MEDICAL MEASUREMENTS , Conrad Sykes

Theses/Dissertations from 2013 2013

Alsafeer software for teaching computer literacy , Zieb Rabie Alqahtani

Wireless electronic scoring of kendo competition matches using an embedded system , Edward B. Hogan

Using phishing to test social engineering awareness of financial employees , Rebecca M. Long

GPU ray tracing with CUDA , Thomas A. Pitkin

Ray traced rendering using GPGPU devices , Coby Soss

Theses/Dissertations from 2012 2012

Windows security sandbox framework , Kyle P. Gwinnup

Micro unmanned aerial vehicle video surveillance platform quadrocopter aircraft , Michael John Skadan

WiFiPoz -- an accurate indoor positioning system , Xiaoyi Ye

SSVEP-based brain computer interface using the Emotiv EPOC , Brian J. Zier

Theses/Dissertations from 2010 2010

Bittorrent vulnerable to layer-7 packet injection , Stephen L. Heath

Masquerade detection using fortified naive Bayes , Eric Salsbury

Theses/Dissertations from 2009 2009

Raising security awareness among higher education recipients , Chun-I Lin

On refactoring , Kaleb P. Pederson

Word prediction in assistive technologies for Aphasia rehabilitation in using Systemic Functional Grammar , Christopher T. Sorna

Novel visualization scheme for reasoning with uncertainty , Kyle A. Springer

Theses/Dissertations from 2008 2008

Tor latency attach verification and analysis , Ronnie Hoeflin

GPU programming: developing realistic water effects with OpenGL and GLSL , Joshua G. Slider

Theses/Dissertations from 2006 2006

Visualization of logic programming , Michael D. Henry

Theses/Dissertations from 2005 2005

Construction of efficient indexes from Fuzzy Clusters: preliminary study , Sean M. Drexler

Navigation agents and traffic simulation , Bart Hunking

Web-based fuzzy expert system: EWU optimal advisor , Nasser A. Rafi

Theses/Dissertations from 2003 2003

Intrusion detection, intelligent agents, and soft computing , Patrick Miller

Source code security analysis and fuzzy logic , Alexander Moskalyuk

Theses/Dissertations from 2002 2002

Support vector machines, N-gram kernels, and text classification , John Mill

Theses/Dissertations from 2001 2001

Solid object model advanced operations , Robert L. Throop

Theses/Dissertations from 2000 2000

Interactive 3D model display in Java 3D , Keqiu Chen

Theses/Dissertations from 1998 1998

Subdivision, and rfefinement of non-uniform rational B-spline curves and surfaces in 3-D , Bill E. La Rue

Theses/Dissertations from 1995 1995

A transputer based prototype for a fuzzy logic controller with tuning and simulation capabilities , Marshall Ryan Weddle

Theses/Dissertations from 1994 1994

Visualizing medical data using direct volume rendering , Bryce R. Hein

Industrial control via a state language implementation on the transputer architecture , Ted Preston VanderWeyst

A cellular method for modeling solid features in volume data , Jeff Wolkenhauer

Theses/Dissertations from 1993 1993

Hybrid coding with enhanced RDC and Huffman compression algorithms , Wilhelm J. Jenner

Implementation of a digital control system analysis program using the z-transform , Kristine L. Rudin

Subtyping and inheritance in a metamodel of abstractions , Gavin Vess

Theses/Dissertations from 1992 1992

Left ventricular boundary detection in digitized cardiac images , Albertine L. Marie Alm

High level user interface for a parallel operating system , Terry Conkright

Hybrid dictionary/statistical text compression algorithms , Michael E. Piotrowski

A study of using backpropagation and a new neural net algorithm for edge detecting in binary images , Jun Tian

Theses/Dissertations from 1990 1990

Visual parallel programming via petri nets , David Glenn Passey

Theses/Dissertations from 1988 1988

An iconic approach to parallel design , Elizabeth Stevens

Theses/Dissertations from 1986 1986

Conversion form structured programming to an object-oriented programming structure , Daryl Edward Krauter

Advanced Search

  • Notify me via email or RSS
  • Colleges, Departments, and Programs
  • Disciplines

Author Corner

  • EWU Libraries
  • Contact EWU Libraries

509.359.7888 | Email

Home | About | FAQ | My Account | Contact | Accessibility | EWU Libraries | EWU Home

Privacy Copyright

This page is about how to turn your research (once it's done) into a readable multi-chapter document. You need to figure out what to include, how to organize it, and how to present it.

Following this advice will make me happier about reading your submitted or draft dissertation. You may find it useful even if I'm not going to read your dissertation.

Many others have written usefully on this subject , including someone in the Annals of Improbable Research . There's also advice on writing a thesis proposal . However, this page focuses on what a finished dissertation should look like. You could also skim good dissertations on the web.

What Goes Into a Dissertation?

A typical thesis will motivate why a new idea is needed, present the cool new idea, convince the reader that it's cool and new and might apply to the reader's own problems, and evaluate how well it worked. Just like a paper!

The result must be a substantial, original contribution to scientific knowledge. It signals your official entrance into the community of scholars. Treat it as an chance to make a mark, not as a 900-page-tall memorial to your graduate student life.

Beyond stapling

The cynical view is that if you've written several related papers, you staple them together to get a dissertation. That's a good first-order approximation -- you should incorporate ideas and text from your papers. But what is it missing?

First, a thesis should cohere -- ideally, it should feel like one long paper. Second, it should provide added value: there should be people who would prefer reading it to simply reading your papers. Otherwise writing it would be a meaningless exercise.

Here's what to do after stapling:

Taking Responsibility

Don't expect your advisor to be your co-author. It's your Ph.D.: you are sole author this time and the responsibility is on your shoulders. If your prose is turgid or thoughtless, misspelled or ungrammatical, oblivious or rude to related research, you're the one who looks bad.

You can do it! Your advisor and committee are basically on your side -- they're probably willing to make suggestions about content and style -- but they are not obligated to fix problems for you. They may send your dissertation back and tell you to fix it.

In the following sections, I'll start with advice about the thesis as a whole, and work downward, eventually reaching small details such as typography and citations.

Know Your Audience

First, choose your target audience. That crucial early decision will tell you what to explain, what to emphasize, and how to phrase and organize it. Checking it with your advisor might be wise.

Pretty much everything in your thesis should be relevant to your chosen audience. Think about them as you write. Ask yourself:

What does your audience already know?

You can also safely assume that your readers have some prior familiarity with your research area. Just how much familiarity, and with which topics, is a judgment call -- again, you have to decide who your intended audience is.

In practice, your audience will be somewhat mixed. Up to a point, it is possible to please both beginners and experts -- by covering background material crisply and in the service of your own story . How does that work? As you lay out the motivation for your own work, and provide notation, you'll naturally have to discuss background concepts and related work. But don't give a generic review that someone else could have written! Discuss the background in a way that motivates and clarifies your ideas. Present your detailed perspective on the intellectual landscape and where your own work sits in it -- a fresh (even opinionated) take that keeps tying back to your main themes and will be useful for both experts and beginners.

In short, be as considerate as you can to beginners without interrupting the flow of your main argument to your established colleagues. A good rule of thumb is to write at the level of the most accessible papers in the journals or conference proceedings that you read.

What do you want your audience to learn from the thesis?

You should set clear goals here. Just like a paper or a talk, your dissertation needs a point: it should tell a story. Writing the abstract and chapter 1 at the start will help you work out what that story is.

You may find that you have to do further work to really support your chosen story: more experiments, more theorems, reading more literature, etc.

What does your audience hope to get out of the thesis?

Why does anyone crack open a dissertation, anyway? I sometimes do. Especially for areas that I know less well, a dissertation is often more accessible than shorter, denser papers. It takes a more leisurely pace, provides more explicit motivation and background, and answers more of the questions that I might have.

There are other reasons I might look at your dissertation:

For students, reading high-quality dissertations is a good way to learn an area and to see what a comprehensive treatment of a problem looks like. Noah A. Smith once ran a graduate CS seminar in which the students read 8 dissertations together. Each student was also required to select and summarize yet another dissertation and write a novel research proposal based on it.

Readers with different motivations may read your thesis in different ways. The strong convention is that it's a single document that must read well from start to finish -- your committee will read it that way. But it's worth keeping other readers in mind, too. Some will skim from start to finish. Some will read only the introductory and concluding chapters (so make sure those give a strong impression of what you've done and why it's important). Some will read a single chapter in the middle, going back for definitions as needed. Some will scan or search for what they need: a definition, example, table of results, or literature review. Some will flip through to get a general sense of your work or of how you think, reading whatever catches their eye.

High-Level Organization

Once you've chosen your target audience, you should outline the structure of the thesis. Again, the convention is that the document must read well from start to finish.

The "canonical organization" is sketched by Douglas Comer near the end of his advice . Read that: you'll probably want something like it. A few further tips:

Keep your focus

Keep your focus. Length is not a virtue unless the content is actually interesting. You do have as much space as you need, but the reader doesn't have unlimited time and neither do you.

Get to the good stuff

A newspaper, like a dissertation, is a hefty chunk of reading. So it puts the most important news on page one, and leads each article with the most important part. You should try to do the same when reasonable.

Get to the interesting ideas as soon as possible. A good strategy is to make Chapter 1 an overview of your main arguments and findings. Tell your story there in a compelling way, including a taste of your results. Refer the reader to specific sections in later chapters for the pesky details. Chapter 1 should be especially accessible (use examples): make it the one chapter that everyone should read.

Include a road map

Chapter 1 traditionally ends with a "road map" to the rest of the thesis, which rapidly summarizes what the remaining chapters or sections will contain. That's useful guidance for readers who are looking for something specific and also for those who will read the whole thesis. It also exhibits in one place what an awful lot of work you've done. Here's a detailed example .

Where to put the literature review

I recommend against writing "Chapter 2: Literature Review." Such chapters are usually boring: they're plonked down like the author's obligatory list of what he or she was "supposed" to cite. They block the reader from getting to the new ideas, and can't even be contrasted with the new ideas because those haven't been presented yet.

A better plan is to discuss related literature in conjunction with your own ideas. As you motivate and present your ideas, you'll want to refer to some related work anyway.

Each chapter might have its own related work section or sections, covering work that connects to yours in different ways.

Where to define terminology and notation

Basic terminology, concepts, and notation have to be defined somewhere. But where? You can mix the following strategies:

Retail. You can define some terms or notation individually, when the reader first needs them. Then they will be well-motivated and fresh in the reader's mind. If you use them again later, you can refer back to the section where you first defined them.

Wholesale. On the other hand, there are advantages to aggregating some of your fundamental definitions into a "Definitions" section near the start of the chapter, or a chapter near the start of the dissertation:

hairy_variable_name

The downside is that such sections or chapters can seem boring and full of not-yet-motivated concepts. Unless your definitions are novel and interesting in themselves, they block the reader from getting to the new and interesting ideas. So if you write something like "Chapter 2: Preliminaries," keep it relatively concise -- the point is to get the reader oriented.

Thrift shop. Use well-known notation and terminology whenever you can, either with or without a formal definition in your thesis. The point of your thesis is not to re-invent notation or to re-present well-known material, although sometimes you may find it helpful to do so.

Make Things Easy on Your Poor Readers

Now we get down to the actual writing. A dissertation is a lot to write. But it's also an awful lot to read and digest at once! You can keep us readers turning pages and following your argument. But it's a bigger and more complicated argument than usual, so you have to be more disciplined than usual.

Break it down

Long swaths of text are like quicksand for readers (and writers!). To keep us moving without sinking, use all the devices at your disposal to break the text down into short chunks. Ironically, short chunks are more helpful in a longer document. They keep your argument tightly organized and keep the reader focused and oriented.

If a section or subsection is longer than 1 double-spaced page , consider whether you could break it down further. I'm not joking! This 1-page threshold may seem surprisingly short, but it really makes writing and reading easier. Some devices you can use:

subsectioning Split your section into subsections (or subsubsections) with meaningful titles that keep the reader oriented.

lists If you're writing a paragraph and feel like you're listing anything (e.g., advantages or disadvantages of some approach), then use an explicit bulleted list. Sometimes this might yield a list with only 2 or 3 rather long bullet points, but that's fine -- it breaks things down. ( Note: To replace the bullets with short labels, roughly as in the list you're now reading, LaTeX's itemize environment lets you write \item[my label] .)

labeled paragraphs Label a series of paragraphs within the section, as a kind of lightweight subsectioning. Your experimental design section might look like this (using the LaTeX \paragraph command):

Participants. The participants were 32 undergraduates enrolled in ... Apparatus. Each participant wore a Star Trek suit equipped with a Hasbro-brand Galactic Translator, belt model 3A ... Procedure. The subjects were seated in pairs throughout the laboratory and subjected to Vogon poetry broadcast at 3-minute intervals ... Dataset. The Vogon poetry corpus (available on request) was obtained by passing the later works of T. S. Eliot through the Systran translation system ...

footnotes Move inessential points to footnotes. If they're too long for that, you could move them into appendices or chapters near the end of the thesis. (Here's my take on footnotes .)

captions Move some discussion of figures and tables into their captions. Figures and tables should be clearly structured in the first place: e.g., graphs should have labeled axes with units. But a helpful caption provides guidance on how to interpret the figure or table and what interesting conclusions to draw from it. The figure or table should itself include helpful labels (axis

(In LaTeX, you can write \caption[short version]{long version} . The optional short version argument will be used for the "List of Tables" or "List of Figures" at the start of the thesis.)

theorems Even simple formal results can be stated as a theorem or lemma. The theorem (and proof, if included) form a nice little chunk, using the LaTeX theorem enviroment.

Breaking down equations

Long blocks of equations are even more intimidating than long swaths of text. You can break those apart, too:

Intersperse short bits of text for guidance (perhaps using LaTeX \intertext ). You might introduce line 3 of your formula with

A change of variable from x to log x now allows us to integrate by parts:

Distinguish conceptually important steps from finicky steps that just push symbols around. You can even move finicky steps to a footnote, like this:

Some algebraic manipulation 5 allows us to simplify to the following:

Use visual devices like color, boldface, underlining, boxes, or \underbrace to call attention to significant parts of a formula:

Simplify the formulas in the first place by defining intermediate quantities or adopting notational conventions (e.g., "the t subscript will be dropped when it is clear from context").

Now tie it back together

Now that you've chopped your prose into bite-sized chunks, what binds it together?

Coherent and explicit structure

Your paragraphs and chunks have to tie together into a coherent argument. Do everything you can to highlight the structure of this argument. The structure should jump out at the reader, making it possible to read straight through your text, or skim it. Else the reader will get stuck puzzling out what you meant and lose momentum.

Make sure your readers are never perplexed about the point of the paragraph they're reading. Make them want to keep turning the page because you've set up questions to which they want to know the answers. Don't make them rub their eyes in frustration or boredom and wander off to the fridge or the web browser.

So how exactly do you "highlight the structure" and "set up questions"?

Ask questions explicitly and then answer them, as I just did. This is a great device for breaking up boring prose, communicating your rhetorical goals, and making the reader think.

Explicitly refer back to previous text, as when I wrote, "So how exactly do you 'highlight the structure' and 'set up questions'?"

Use lots of transitional phrases (discourse connectives). Note that it's fine to use these across chunk boundaries; that is, feel free to start a new subsection with "For this reason, ...", picking up where the previous subsection left off.

As you come to the end of a section, remind the reader what the point was. If possible, this should lead naturally into the next section.

If a section is skippable, or chapters can be read out of order, do say so. (But don't use this as an excuse for poor organization or long distractions. Some readers tend to read straight through, and in particular, your advisor or committee may feel that they must do this.)

Lots of internal cross-references

A thesis deals with a lot of ideas at once. Readers can easily lose track. Help them out:

Each figure or table should be mentioned in the main text, so that the reader knows to go look at it. Conversely, the figure's caption may point the reader back to details in the main text (stating the section number). A caption may also refer to other figures or tables that the reader should be sure to compare.

Boldface terms that you are defining, as a textbook would. This makes the definitions easy to spot when needed. You may also want to generate an index of boldfaced terms.

Be very consistent in your terminology. Never use two terms for the same idea; never reuse one term or variable for two ideas.

Be cautious about using pronouns like "it," or other anaphors such as "this" or "this technique." With all the ideas flying around, it won't always be obvious to everyone what you're referring to. Use longer, unambiguous phrases instead, when appropriate.

Try saying "the time t " instead of just " t " or just "the time." Similarly, "the image transformation T ," "the training example x i ," etc. This style reminds the reader of which variables are connected to which concepts. You can further do this for expressions: "the total probability Σ i p i " instead of just "the total probability" or "the sum."

Feel free to lavish space where it confers extra understanding. Don't hesitate to give an example or a caveat, or repeat an earlier equation, or crisply summarize earlier work that the reader needs to understand.

Be concrete

As I read a thesis, or a long argument or construction within a thesis, I often start worrying whether I am keeping the pieces together correctly in my head. Something that has become deeply familiar and natural to you (the world expert) may be rougher going for me. If I can see some concrete demonstration of how your idea works, it helps me check and deepen my understanding.

Examples keep the reader, and you, from getting lost in a morass of abstractions. Example cases figured in your thinking; they can help the reader, too. Invented examples are okay, but using "real" examples will also show off what your methods should or can do.

Running examples greet the reader like old friends. The reader will grasp a point more quickly and completely, and remember it better, when it is applied to a familiar example rather than a new one. So if possible, devise one or two especially nice examples that you can keep revisiting to make a series of points.

Pictures serve much the same role as examples: they're concrete and they share how the ideas really look inside your head. A picture is worth at least a thousand words (= 2.5 double-spaced thesis pages).

Pseudocode is a concrete way to convey an algorithm. It is often more concise, precise, and direct than a prose description, and may be closer to your own thinking. It will also make other people much more likely to understand and adopt your methods.

Theorems , too, are concise and precise. They are also self-contained chunks, because they formally state all their assumptions. A reader sloshing through a long, complicated, contextual argument can always grab onto a theorem as an island of certainty.

Experimental results are also concrete. You don't have to wait for the experimental section: it is okay to foreshadow your experiments before you present them in full. When you are developing the theory, you can say "Indeed, we will find experimentally in section 5.6 that ..." You can even showcase an example from your experiments or give some summary statistics; these might not even show up later in the experimental section.

Commitments keep the reader anchored. As noted earlier, your dissertation should discuss alternative solutions that you rejected or are leaving to future work. That's scholarship. But make it clear from the start what you actually did and didn't do. Don't have section 2.3 chatter on about everything one could do -- that reads like a proposal, not a thesis! -- while waiting till section 4.5 or even 2.5 to reveal what you actually did.

Placing these concrete elements early is best, other things equal. Either embed them early in the section or just tell the reader early on to go look at Figure X. (If you continue the section by discussing Figure X, the reader is more likely to actually go look. Figure X or its caption can refer back to the text in turn.)

For example, consider pseudocode. Some readers prefer code to prose, and it's concise. So you may want to give pseudocode early in the section, before you ramble on about why it works. An alternative is to intersperse fragments of pseudocode with your prose explanation, as in literate programming . Of course, the pseudocode itself should also include some brief comments; where necessary these can just point to the text, as in "implements equation (5)" or "see section 3.2."

Sentences. The previous section dealt with sections and paragraphs, but how about sentences? Yours should read well. The best advice in The Elements of Style : "Omit needless words. Vigorous writing is concise." To learn how to improve your sentences, read Style: Lessons in Clarity and Grace , by Joseph M. Williams, and do the exercises. Another classic is On Writing Well , by William Zinsser.

Computers are getting exponentially faster (Moore, 1965). However, Biddle (1971) showed ...
Bandura's (1977) theory ... ... (e.g., Butcher, 1954; Baker, 1955; Candlestick-Maker, 1957, and others). The work of Minor (2001, pp. 50-75; but see also Adams, 1999; Storandt, 1997) ... According to Manning and Schütze, 1999 (henceforth M&S), ...

(Another option is the apacite package, which precisely follows the style manual of the American Psychological Association. It is nearly as flexible in its citation format, but APA style has some oddities, including lowercasing the titles of proceedings volumes. One nice thing about APA style is that if you have multiple Smiths in your bibliography, it will distinguish them where necessary, using first and middle initials. Another nice thing is the use of "&" rather than "and" in author lists; however, you can easily hack plainnat.bst to mimic this behavior.)

\usepackage[colorlinks]{ hyperref } \usepackage{ url }
\usepackage[usenames,dvipsnames,svgnames,table]{xcolor} \usepackage{soul} \newcommand{\todo}[1]{\hl{[TODO: #1]}} \todo{Either prove this or back away from the claim. I think Fermat's Last Theorem might be the key ...}
\newcommand{\todo}[1]{}
... only 58 words in the dictionary have this property. % to get that count: % perl -ne 'print if blah blah' /usr/share/dict/words | wc -l

Version control. It's probably wise to use git (or CVS or RCS or Subversion or mercurial or darcs) to keep the revision history of your dissertation files. This lets you roll back to an earlier version in case of disaster. Furthermore, if you host the repository on your cs.jhu.edu account, it will be backed up by the department.

Sharing your thesis. When you're willing to open up for comments from fellow students, your advisor, or your committee, give them a secret URL from which they can always download the latest, up-to-date release of your thesis, as well as earlier versions. (This is probably friendlier than just pointing them to your git repository.)

Keep this URL up to date with your changes. Each distinct version should bear a visible date or version number, to avoid confusion. For each new version (or on request), you should probably also supply a PDF that marks up the differences from an appropriate earlier version, using the wonderful latexdiff program (available here or as an Linux package; plays nicely with git via latexdiff-git or other scripts ) or a similar technique . (Note: If you use a makefile to build your document by running latex, gnuplot, etc., then you can also make it run latexdiff and update the URL for you.)

If you use Overleaf , just give your committee a view URL for your project. They will be able to see the PDF, visit different versions, and leave comments in the source file.

Planning Your Dissertation

Every dissertation is a little different. Talk to your advisor to draft a specific, written plan for what the thesis will contain, how it will be organized, and whom it will address. Discuss the plan with each of your committee members, who may suggest changes. They might disagree with advice on this page; find out.

As the dissertation takes shape, your plan may need some revision. Your advisor and committee may be willing to provide early feedback. But no one will want to slog through more than a version or two in detail. So ask them each how many drafts of each chapter they're willing to read, and in what state and on what schedule. Some of them nmay prefer to influence your writeup while it's still in an early, outline form. Others may prefer to wait until your prose is fairly polished and easy to read.

In addition to your advisor's goals and your committee's goals, you may have some goals of your own, e.g.,

GOOD LUCK!!! Now, download that LaTeX template , and take the first step toward filling it in today ...

Time Management

ScholarWorks

Home > Engineering > Computer Science > Computer Science Graduate Projects

Computer Science Graduate Projects and Theses

Theses/dissertations from 2023 2023.

High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal

Evaluating Learning Geometric Concepts to Generate Predicate Abstract Domains in Static Program Analysis , Patrick Chadbourne

Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan

Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah

Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker

Fake News Detection Using Narrative Content and Discourse , Hongmin Kim

Anomaly Detection Using Graph Neural Network , Bishal Lakha

Robust Digital Nucleic Acid Memory , Golam Md Mortuza

Risk Assessment and Solutions for Two Domains: Election Procedures and Privacy Disclosure Prevention for Users , Kamryn DeAnn Parker

Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola

Fair Layouts in Information Access Systems: Provider-Side Group Fairness in Ranking Beyond Ranked Lists , Amifa Raj

Virtual Curtain: A Communicative Fine-Grained Privacy Control Framework for Augmented Reality , Aakash Shrestha

Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George

Transformer Reinforcement Learning Approach to Attack Automatic Fake News Detectors , Chandler Underwood

Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten

Theses/Dissertations from 2022 2022

Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck

Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones

Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi

Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee

Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn

Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy

Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane

Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda

Hate Speech Detection Using Textual and User Features , Rohan Raut

Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib

Characterization and Mitigation of False Information on the Web , Anu Shrestha

Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez

Theses/Dissertations from 2021 2021

Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen

Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar

Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green

Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz

Modeling Real and Fake News Sharing in Social Networks , Abishai Joy

Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy

Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton

Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts

A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar

Actors for the Internet of Things , Arjun Shukla

Theses/Dissertations from 2020 2020

Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black

Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke

Polyhedral+Dataflow Graphs , Eddie C. Davis

Improving Spellchecking for Children: Correction and Design , Brody Downs

A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake

Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung

Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi

Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi

Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill

Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin

Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli

A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips

Theses/Dissertations from 2019 2019

Edge-Assisted Workload-Aware Image Processing System , Anil Acharya

MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick

Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman

Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas

A Hybrid Model to Detect Fake News , Indhumathi Gurunathan

Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris

UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani

Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh

Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar

Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan

Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo

Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury

Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya

BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran

FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota

Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader

Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla

Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian

Theses/Dissertations from 2018 2018

Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya

Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah

Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri

Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour

Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha

Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton

Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira

Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa

Theses/Dissertations from 2017 2017

Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella

Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli

CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly

Predicting Friendship Strength in Facebook , Nitish Dhakal

Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi

Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley

Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala

Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes

A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal

Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki

Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li

The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship

Towards Automatic Repair of XACML Policies , Shuai Peng

Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma

Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez

Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright

Theses/Dissertations from 2016 2016

Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.

When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic

Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh

Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt

Towards Multipurpose Readability Assessment , Ion Madrazo

Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson

CEST: City Event Summarization using Twitter , Deepa Mallela

Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami

Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas

  • Collections
  • Disciplines
  • SelectedWorks Gallery
  • Albertsons Library
  • Division of Research
  • Graduate College

Advanced Search

  • Notify me via email or RSS

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

  • Northeastern University
  • Khoury College of Computer Science
  • Computer and Information Science Theses and Dissertations
  • Computer Science Master's Theses

Computer Science Master's Theses Collection

http://hdl.handle.net/2047/D20233315

aBBRate: automating BBR congestion control attack exploration using a model-based approach.

Analysis of named entity recognition & entity linking in historical text

Annotating decision analyses using semantic web technologies

Applying EM to compute document relevance from crowdsourced pair preferences

Applying unsupervised grammar induction to OCR error correction

Argument mining for understanding media bias and misinformation

ARID: affinity representing instance descriptors.

Automated explanation of research informed consent by embodied conversational agents

Automated indexing of stories for conversational health intervention

Automating infant monitoring and biomedical image analysis with machine vision

Brown Logo

  • About Brown
  • Campus Life

Information for:

  • Current Students
  • Friends & Neighbors
  • A to Z Index
  • People Directory
  • Social@Brown
  • About the Department
  • Systems & Software
  • Socially Responsible    Computing
  • Positions / Jobs
  • Brown CS News
  • Brown CS Blog
  • Our Community
  • Grad Students
  • Ugrad Students
  • Research Links
  • Publications
  • Opportunities For    Visiting Students
  • Degree Programs
  • Computer Science
  • Cybersecurity
  • Undergraduate
  • Interdisciplinary
  • Miscellaneous
  • Course List
  • TA Program
  • Who We Are
  • Action Plan & Initiatives
  • Student Advocates
  • Data And Demographics
  • Student Groups
  • UTA Endowment
  • Home »
  • Research »
  • Publications »
  • Student Project Reports »

Idrees, Ifrah

Icon

• Stefanie A Tellex , advisor

Kumar, Indra

• Suresh Venkatasubramanian , advisor

Nguyen, Thao

Nokiz, Pegah

Ren, Yanyan

• Kathi Fisler , advisor

Rosenbloom, Leah

• Anna Lysyanskaya , advisor

Traylor, Aaron

• Ellie Pavlick , advisor

Zerveas, George

• Carsten Eickhoff , advisor

Abbatematteo, Ben - Exploiting Structure for Efficient Robotic Manipulation

• George D. Konidaris , advisor

Allen, Cameron

Corsaro, Matthew - Learning Task-Specific Grasps

Ebert, Dylan

Engel, Daniel

• Maurice P Herlihy , advisor

Ibrahim, Abdelrahman

• Sherief Reda , advisor

Kristo, Ani

Lee, Jun Ki

Lovering, Charles

Markatou, Evangelia

• Roberto Tamassia , advisor

Naseer, Usama

•Theophilus Benson, advisor

Patel, Roma

Rahimzadeh Ilkhechi, Amir

• Ugur Cetintemel , advisor

Rosen, Eric

Spiegelberg, Leonhard

• Malte Schwarzkopf , advisor

Wallace, Shaun

• Jeff Huang , advisor

Wang, Kai - Learning Autoregressive Generative Models of 3D Shapes and Scenes

• Daniel C Ritchie , advisor

Webson, Albert - Tuning Language Models to Follow Instructions

Xue, Yingjie

Zheng, Kaiyu

Computer Science at Brown University Providence, Rhode Island 02912 USA Phone: 401-863-7600 Map & Directions / Contact Us

Facebook

  • Locations and Hours
  • UCLA Library
  • Research Guides

Computer Science

  • Dissertations
  • Science and Engineering Library This link opens in a new window
  • Graduate Orientation Presentation

Finding UCLA Dissertations for Graduates of Specific Departments by Year

Dissertation databases.

  • Safety/MSDS Sources
  • Technical Reports
  • Data Management
  • Diverse Voices

For UCLA dissertations, search the UCLA Library Catalog :

  • Click on the Advanced Search tab
  • Enter dissertations "department name" UCLA in the search box; for example, dissertations physics UCLA
  • Keep the middle drop-down menu set at "all of these words"
  • Change the right-hand drop-down menu to "subject"
  • Sort the results by date

Full-text UC dissertations since 1996 are available from  ProQuest Dissertations and Theses . 

As of March 13, 2012, UCLA's  Graduate Division  only accepts electronic filing of theses and dissertations. Theses and dissertations filed after this date will only be accessible electronically. They can be found by searching the  UCLA Library Catalog ,  ProQuest Digital Dissertations and Theses , or  eScholarship . Authors may embargo theses or dissertations for up to two years, so the full text of recent theses and dissertations may not be available.

Non-UCLA users can obtain UCLA dissertations through  ProQuest UMI . The UCLA Library does not provide interlibrary loan service to individuals unaffiliated with UCLA. However, dissertations can be lent to institutions; see  information for borrowing institutions .

UC's open access repository. Contains books, journals, working papers, conference publications, postprints, theses, and dissertations.

  • Center for Research Libraries (CRL) Foreign Dissertations Search the CRL Catalog for dissertations already held at the Center. If a foreign dissertation is not at CRL, UCLA's Interlibrary Loan Service will request that CRL acquire it for your use. This special issue of Focus on Global Resources describes CRL's extensive collection of foreign dissertations.
  • Networked Digital Library of Theses and Dissertations This international organization promotes the adoption, creation, use, dissemination, and preservation of electronic analogues to traditional paper-based theses and dissertations in order to more effectively share knowledge.
  • British Library EThOS The British Library's electronic theses online service aims to provide a single point of access to all theses produced by UK higher education. It currently contains more than 250,000 records, with 25,000 open-access theses available for immediate download. Researchers can request theses not yet available electronically, which will be scanned and made freely available.
  • << Previous: Articles
  • Next: Patents >>
  • Last Updated: Aug 29, 2024 2:16 PM
  • URL: https://guides.library.ucla.edu/cs

University of Leeds logo

  • Study and research support
  • Academic skills

Dissertation examples

Listed below are some of the best examples of research projects and dissertations from undergraduate and taught postgraduate students at the University of Leeds We have not been able to gather examples from all schools. The module requirements for research projects may have changed since these examples were written. Refer to your module guidelines to make sure that you address all of the current assessment criteria. Some of the examples below are only available to access on campus.

  • Undergraduate examples
  • Taught Masters examples

These dissertations achieved a mark of 80 or higher:

The following two examples have been annotated with academic comments. This is to help you understand why they achieved a good 2:1 mark but also, more importantly, how the marks could have been improved.

Please read to help you make the most of the two examples.

(Mark 68)

(Mark 66)

These final year projects achieved a mark of a high first:

For students undertaking a New Venture Creation (NVC) approach, please see the following Masters level examples:

Projects which attained grades of over 70 or between 60 and 69 are indicated on the lists (accessible only by students and staff registered with School of Computer Science, when on campus).

These are good quality reports but they are not perfect. You may be able to identify areas for improvement (for example, structure, content, clarity, standard of written English, referencing or presentation quality).

The following examples have their marks and feedback included at the end of of each document.

 

 

 

 

The following examples have their feedback provided in a separate document.

 

School of Media and Communication .

The following outstanding dissertation example PDFs have their marks denoted in brackets.

(Mark 78)
(Mark 72)
(Mark 75)

(Mark 91)
(Mark 85)
(Mark 85)
(Mark 85)
(Mark 91)

(Mark 85)
(Mark 75)

This dissertation achieved a mark of 84:

.

LUBS5530 Enterprise

MSc Sustainability

 

 

.

The following outstanding dissertation example PDFs have their marks denoted in brackets.

(Mark 70)

(Mark 78)

University of Cambridge

Study at Cambridge

About the university, research at cambridge.

  • Undergraduate courses
  • Events and open days
  • Fees and finance
  • Postgraduate courses
  • How to apply
  • Postgraduate events
  • Fees and funding
  • International students
  • Continuing education
  • Executive and professional education
  • Courses in education
  • How the University and Colleges work
  • Term dates and calendars
  • Visiting the University
  • Annual reports
  • Equality and diversity
  • A global university
  • Public engagement
  • Give to Cambridge
  • For Cambridge students
  • For our researchers
  • Business and enterprise
  • Colleges & departments
  • Email & phone search
  • Museums & collections
  • Current students
  • Part II projects
  • Department of Computer Science and Technology

Sign in with Raven

  • People overview
  • Research staff
  • PhD students
  • Professional services staff
  • Affiliated lecturers
  • Overview of Professional Services Staff
  • Seminars overview
  • Weekly timetable
  • Wednesday seminars
  • Wednesday seminar recordings ➥
  • Wheeler lectures
  • Computer Laboratory 75th anniversary ➥
  • women@CL 10th anniversary ➥
  • Job vacancies ➥
  • Library resources ➥
  • How to get here
  • William Gates Building layout
  • Contact information
  • Department calendar ➥
  • Accelerate Programme for Scientific Discovery overview
  • Data Trusts Initiative overview
  • Pilot Funding FAQs
  • Research Funding FAQs
  • Cambridge Ring overview
  • Ring Events
  • Hall of Fame
  • Hall of Fame Awards
  • Hall of Fame - Nominations
  • The Supporters' Club overview
  • Industrial Collaboration
  • Annual Recruitment Fair overview
  • Graduate Opportunities
  • Summer internships
  • Technical Talks
  • Supporter Events and Competitions
  • How to join
  • Collaborate with Us
  • Cambridge Centre for Carbon Credits (4C)
  • Equality and Diversity overview
  • Athena SWAN
  • E&D Committee
  • Support and Development
  • Targeted funding
  • LGBTQ+@CL overview
  • Links and resources
  • Queer Library
  • women@CL overview
  • About Us overview
  • Friends of women@CL overview
  • Twentieth Anniversary of Women@CL
  • Tech Events
  • Students' experiences
  • Contact overview
  • Mailing lists
  • Scholarships
  • Initiatives
  • Dignity Policy
  • Outreach overview
  • Women in Computer Science Programme
  • Google DeepMind Research Ready programme overview
  • Accommodation and Pay
  • Application
  • Eligibility
  • Raspberry Pi Tutorials ➥
  • Wiseman prize
  • Research overview
  • Application areas
  • Research themes
  • Algorithms and Complexity
  • Computer Architecture overview
  • Creating a new Computer Architecture Research Centre
  • Graphics, Vision and Imaging Science
  • Human-Centred Computing
  • Machine Learning and Artificial Intelligence
  • Mobile Systems, Robotics and Automation
  • Natural Language Processing
  • Programming Languages, Semantics and Verification
  • Systems and Networking
  • Research groups overview
  • Computer Architecture Group overview
  • Student projects
  • Energy and Environment Group overview
  • Declaration
  • Publications
  • EEG Research Group
  • Past seminars
  • Learning and Human Intelligence Group overview
  • Quantum Computing Group
  • Technical Reports
  • Admissions information
  • Undergraduate admissions overview
  • Open days and events
  • Undergraduate course overview overview
  • Making your application
  • Admissions FAQs
  • Super curricular activities
  • MPhil in Advanced Computer Science overview
  • Applications
  • Course structure
  • Funding competitions
  • Prerequisites
  • PhD in Computer Science overview
  • Application forms
  • Research Proposal
  • Funding competitions and grants
  • Part-time PhD Degree
  • Premium Research Studentship
  • Current students overview
  • Part IB overview
  • Part IB group projects overview
  • Important dates
  • Design briefs
  • Moodle course ➥
  • Learning objectives and assessment
  • Technical considerations
  • After the project
  • Part II overview
  • Part II projects overview
  • Project suggestions
  • Project Checker groups
  • Project proposal
  • Advice on running the project
  • Progress report and presentation
  • The dissertation
  • Supervisor briefing notes
  • Project Checker briefing notes
  • Past Part II projects archive ➥
  • Part II Supervision sign-up
  • Part II Modules
  • Part II Supervisions overview
  • Continuing to Part III overview
  • Part III of the Computer Science Tripos
  • Overview overview
  • Information for current Masters students overview
  • Special topics
  • Part III and ACS projects overview
  • Submission of project reports
  • ACS projects overview
  • Guidance for ACS projects
  • Part III projects overview
  • Guidance for Part III projects

Preparation

  • Registration
  • Induction - Masters students
  • PhD resources overview
  • Deadlines for PhD applications
  • Protocol for Graduate Advisers for PhD students
  • Guidelines for PhD supervisors
  • Induction information overview
  • Important Dates
  • Who is here to help
  • Exemption from University Composition Fees
  • Being a research student
  • Researcher Development
  • Research skills programme
  • First Year Report: the PhD Proposal
  • Second Year Report: Dissertation Schedule
  • Third Year Report: Progress Statement
  • Fourth Year: writing up and completion overview
  • PhD thesis formatting
  • Writing up and word count
  • Submitting your dissertation
  • Papers and conferences
  • Leave to work away, holidays, and intermission
  • List of PhD students ➥
  • PAT, recycling, and Building Services
  • Freshers overview
  • Cambridge University Freshers' Events
  • Undergraduate teaching information and important dates
  • Course material 2023/24 ➥
  • Course material 2024/25 ➥
  • Exams overview
  • Examination dates
  • Examination results ➥
  • Examiners' reports ➥
  • Part III Assessment
  • MPhil Assessment
  • Past exam papers ➥
  • Examinations Guidance 2023-24
  • Marking Scheme and Classing Convention
  • Guidance on Plagiarism and Academic Misconduct
  • Purchase of calculators
  • Examinations Data Retention Policy
  • Guidance on deadlines and extensions
  • Mark Check procedure and Examination Review
  • Lecture timetables overview
  • Understanding the concise timetable
  • Supervisions overview
  • Part II supervisions overview ➥
  • Part II supervision sign-up ➥
  • Supervising in Computer Science
  • Supervisor support
  • Directors of Studies list
  • Academic exchanges
  • Advice for visiting students taking Part IB CST
  • Summer internship: Optimisation of DNN Accelerators using Bayesian Optimisation
  • UROP internships
  • Resources for students overview
  • Student SSH server
  • Online services
  • Managed Cluster Service (MCS)
  • Microsoft Software for personal use
  • Installing Linux
  • Part III and MPhil Machines
  • Transferable skills
  • Course feedback and where to find help overview
  • Providing lecture feedback
  • Fast feedback hotline
  • Staff-Student Consultative Forum
  • Breaking the silence ➥
  • Student Administration Offices
  • Intranet overview
  • New starters and visitors
  • Forms and templates
  • Building management
  • Health and safety
  • Teaching information
  • Research admin
  • Miscellaneous

The Dissertation

  • Continuing to Part III

The dissertation should be written for a technically competent reader who is not necessarily familiar with the particular aspects of Computer Science involved. Better grades will arise from clarity and ease of reading, good pictures, clear explanation, minimal jargon and appropriate use of equations. Writing a dissertation requires planning and time. You should allow at least four weeks for the task.

Dissertation PDF files must be

  • formatted for A4 paper;
  • Typeset in 12-point font with a minimum of 2 cm margins;
  • less than 15 megabytes in size;
  • (ideally) use embedded fonts.

The main body of the dissertation, running from the first page of the introduction until the last page of the conclusions, shall not exceed 40 pages nor exceed 12,000 words in length (including tables and footnotes). Students should ensure the main body of their dissertation (page 3 onwards) as well as any appendices do not contain direct personal identifiers (i.e. their name or their CRSID).

Examiners and Assessors are permitted to judge your work only through study of your dissertation, although they will require your original source code to be available for them to refer to in cases where clarification is needed.

To facilitate the assessment process, the Examiners require the top-level structure of the dissertation to be strictly as follows:

Declaration of originality

Table of contents.

  • Chapter 1: Introduction
  • Chapter 2: Preparation
  • Chapter 3: Implementation
  • Chapter 4: Evaluation
  • Chapter 5: Conclusions

Bibliography

Project proposal.

It is not the intention of the Examiners to constrain writers too greatly. Although the layout of the Cover Sheet and the arrangement of the Proforma are tightly specified, the organisation and length of each of the five chapters are allowed to vary considerably from one dissertation to another. Further details are given below.

The cover page

The single cover page contains

  • Your Name, in the extreme top right-hand corner . 
  • The Title of your Dissertation.
  • The Examination for which you are a candidate.
  • Your College and the Year in which you are submitting the Dissertation.

Your project title must be the same as the title approved by your Project Checkers on your project proposal.  If you want to change the title you should first discuss this with your supervisor.  If your supervisor is in agreement you will need to request a change by contacting the Teaching Administration Manager with a brief explanation for the reasons behind the change ([email protected]).  This will be approved by the Teaching Administration Manager and Chair of Examiners.

All dissertations must include an anti-plagiarism declaration immediately before the Proforma. The declaration must have exactly the following syntax:

I, [Name] of [College], being a candidate for Part II of the Computer Science Tripos, hereby declare that this dissertation and the work described in it are my own work, unaided except as may be specified below, and that the dissertation does not contain material that has already been used to any substantial extent for a comparable purpose. [In preparation of this dissertation I did not use text from AI-assisted platforms generating natural language answers to user queries, including but not limited to ChatGPT. / The project required the use of AI-assisted platform [name] in section [number], and such use is acknowledged in the text.] (use either of these sentences as appropriate) [I am content for my dissertation to be made available to the students and staff of the University.]

Signed [signature]

Date [date]

Further guidance relating to the use of AI-assisted tools can be found on the exams guidance web page .

You may either include a scanned copy of your signature or type your full name in place of a handwritten signature.

The University drafted the wording, which is similar to that relating to dissertations in a wide range of subjects; thus the "unaided except as may be specified below" clause merits some explanation:

  • The clause does not require acknowledgement of the project supervision or informal conversations with peers.
  • The clause is also intended to cover collaborative projects which are not now permitted in Computer Science. As such this aspect is irrelevant to Computer Science dissertations.
  • This clause aside, and notwithstanding 1 and 2, candidates are required to draw attention, in the Implementation chapter, to the parts of the work which are not their own, in accordance with the Implementation section below. Other acknowledgements should be given wherever appropriate.

The Department would like past dissertations to be made available for teaching purposes and for your references. These will be accessed on the Computer Science departmental website under Raven password protection. You should include the last sentence of the declaration if you are willing for your dissertation to be accessed for these purposes; otherwise you may remove it.  Note: If in the future you would like your dissertation removed from the departmental website, you can request this by contacting the Student Admin office at [email protected].

The proforma page

The single proforma page is a preface that immediately follows the declaration of originality. The proforma page, as well as all subsequent pages of the dissertation should not include direct personal identifiers such as your name or CRSID. The Proforma must be arranged thus:

  • Your candidate number.
  • The Title of your Project.
  • The Examination and Year.
  • Word-count for the dissertation.
  • Code line count: Number of lines of code written by the student in the final version of their software.
  • Project Originator (if this is the student please state 'The candidate').
  • Project Supervisor.
  • At most 100 words describing the original aims of the project.
  • At most 100 words summarising the work completed.
  • At most 100 words describing any special difficulties that you faced. (In most cases the special difficulties entry will say "None".)

It is quite in order for the Proforma to point out how ambitious the original aims were and how the work completed represents the triumphant consequence of considerable effort against a background of unpredictable disasters. The substantiation of these claims will follow in the rest of the dissertation.

Student Administration will ask students to resubmit any dissertation which does not include the relevant cover page, declaration and proforma. If such a resubmission occurs after the deadline this will result in a late submission penalty.

This should list the contents in some sensible way.

Introduction

The introduction should explain the principal motivation for the project and show how the work fits into the broad area of surrounding computer science and give a brief survey of previous related work. It should generally be unnecessary to quote at length from technical papers or textbooks. If a simple bibliographic reference is insufficient, consign any lengthy quotation to an appendix.

Principally, this chapter should describe the work which was undertaken before code was written, hardware built or theories worked on. It should show how the project proposal was further refined and clarified, so that the implementation stage could go smoothly rather than by trial and error.

Throughout this chapter and indeed the whole dissertation, it is essential to demonstrate that a proper professional approach was employed.

The nature of this chapter will vary greatly from one dissertation to another but, underlining the professional approach, this chapter will very likely include a section headed "Requirements Analysis" and refer to appropriate software engineering techniques used in the dissertation. The chapter will also cite any new programming languages and systems which had to be learnt and will mention complicated theories or algorithms which required understanding.

It is essential to declare the starting point. This states any existing codebase or materials that your project builds on. The text here can commonly be identical to the text in your proposal, but it may enlarge on it or report variations. For instance, the true starting point may have turned out to be different from that declared in the proposal and such discrepancies must be explained.

Implementation

This chapter should describe what was actually produced: the programs which were written, the hardware which was built or the theory which was developed. Any design strategies that looked ahead to the testing stage should be described in order to demonstrate a professional approach was taken.

Descriptions of programs may include fragments of high-level code but large chunks of code are usually best left to appendices or omitted altogether. Analogous advice applies to circuit diagrams or detailed steps in a machine-checked proof.

The implementation chapter should include a section labelled "Repository Overview". The repository overview should be around one page in length and should describe the high-level structure of the source code found in your source code repository. It should describe whether the code was written from scratch or if it built on an existing project or tutorial. Making effective use of powerful tools and pre-existing code is often laudable, and will count to your credit if properly reported. Nevertheless, as in the rest of the dissertation, it is essential to draw attention to the parts of the work which are not your own. 

It should not be necessary to give a day-by-day account of the progress of the work but major milestones may sometimes be highlighted with advantage.

This is where Assessors will be looking for signs of success and for evidence of thorough and systematic evaluation. Sample output, tables of timings and photographs of workstation screens, oscilloscope traces or circuit boards may be included. Care should be employed to take a professional approach throughout. For example, a graph that does not indicate confidence intervals will generally leave a professional scientist with a negative impression. As with code, voluminous examples of sample output are usually best left to appendices or omitted altogether.

There are some obvious questions which this chapter will address. How many of the original goals were achieved? Were they proved to have been achieved? Did the program, hardware, or theory really work?

Assessors are well aware that large programs will very likely include some residual bugs. It should always be possible to demonstrate that a program works in simple cases and it is instructive to demonstrate how close it is to working in a really ambitious case.

Conclusions

This chapter is likely to be very short and it may well refer back to the Introduction. It might offer a reflection on the lessons learned and explain how you would have planned the project if starting again with the benefit of hindsight.

It is common, but not mandatory, to have a bibliography. Attention should be given to correct and consistent formatting.

It is common, but not mandatory, to have one or more appendices. Assessors like to see some sample code or example circuit diagrams, and appendices are the sensible places to include such items. Accordingly, software and hardware projects should incorporate appropriate appendices. Note that the 12,000 word limit does not include material in the appendices, but only in extremely unusual circumstances may appendices exceed 10-15 pages. If you feel that such unusual circumstances might apply to you you should ask your Director of Studies and Supervisor to discuss this with the Chairman of Examiners. Appendices should appear between the bibliography and the project proposal.

An index is optional.

A copy of the original project proposal must be included at the very end of the dissertation.

Department of Computer Science and Technology University of Cambridge William Gates Building 15 JJ Thomson Avenue Cambridge CB3 0FD

About the department

Study here Research News Jobs How to get here About the department

Website privacy policy

Social media

Athena Swan bronze award logo

© 2024 University of Cambridge

  • Contact the University
  • Accessibility
  • Freedom of information
  • Privacy policy and cookies
  • Statement on Modern Slavery
  • Terms and conditions
  • University A-Z
  • Undergraduate
  • Postgraduate
  • Research news
  • About research at Cambridge
  • Spotlight on...

W&M ScholarWorks

Home > Arts and Sciences > Computer Science > COMPUTERSCIENCEETD

Computer Science Theses, Dissertations, and Masters Projects

Theses/dissertations from 2024 2024.

Low-Rank Matrix And Tensor Models For Data Science Applications , Jeremy Moulton Myers

Learning-Based Sensing For Solving Health-Related Problems , Minglong Sun

Exploring Transient Execution Vulnerabilities, Side-Channel Attacks, And Defenses , Tao Zhang

Theses/Dissertations from 2023 2023

Appearance Driven Reflectance Modeling , James Christopher Bieron

Domain-Specific Optimization For Machine Learning System , Yu Chen

Intelligent Software Tooling For Improving Software Development , Nathan Allen Cooper

Amsel Criteria Based Computer Vision For Bacterial Vaginosis Diagnosis , Daniel Edwards Highland

Learning-Based Ubiquitous Sensing For Solving Real-World Problems , Woosub Jung

Recoverable Memory Bank For Class-Incremental Learning , Jiangtao Kong

A Reevaluation Of Why Crypto-Detectors Fail: A Systematic Revaluation Of Cryptographic Misuse Detection Techniques , Scott Marsden

Achieving Real-Time Dnn Execution On Mobile Devices With Compiler Optimizations , Wei Niu

Matfusion: A Generative Diffusion Model For Svbrdf Capture , Samuel Lee Sartor

A Comprehensive Study Of Bills Of Materials For Software Systems , Trevor Stalnaker

Program Analysis For Software Engineers And Students , Jialiang Tan

Efficient Parallelization Of Irregular Applications On Gpu Architectures , Qihan Wang

Exploring Software Licensing Issues Faced By Legal Practitioners , Nathan James Wintersgill

Theses/Dissertations from 2022 2022

Flexible And Robust Iterative Methods For The Partial Singular Value Decomposition , Steven Goldenberg

Techniques For Accelerating Large-Scale Automata Processing , Hongyuan Liu

Enabling Practical Evaluation Of Privacy Of Commodity-Iot , Sunil Manandhar

Exploring Multi-Level Parallelism For Graph-Based Applications Via Algorithm And System Co-Design , Zhen Peng

Communication And Computation Efficient Deep Learning , Zeyi Tao

Practical Gpgpu Application Resilience Estimation And Fortification , Lishan Yang

Theses/Dissertations from 2021 2021

On Supporting Android Software Developers And Testers , Carlos Eduardo Bernal Cardenas

Data-Driven Reflectance Estimation Under Natural Lighting , Victoria Cooper

Rethinking Cache Hierarchy And Interconnect Design For Next-Generation Gpus , Mohamed Assem Abd ElMohsen Ibrahim

Low-Overhead Techniques For Secure And Reliable Gpu Computing , Gurunath Kadam

Revisiting Isolation For System Security And Efficiency In The Era Of Internet Of Things , Lele Ma

Epidemic Spread Modeling For Covid-19 Using Hard Data , Anna Schmedding

Performance Optimization With An Integrated View Of Compiler And Application Knowledge , Ruiqin Tian

High-Dimensional Machine Learning Models In Fintech , Qiong Wu

Distributed Byzantine Tolerant Machine Learning , Qi Xia

Combining Performance Profiling And Modeling For Accuracy And Efficiency , Hao Xu

Theses/Dissertations from 2020 2020

Single Image Direct-Global Illumination Separation , Zhaoliang Duan

Exploring Heterogeneous Architectures With Tools And Applications , Du Shen

Understanding Performance Inefficiencies In Native And Managed Languages , Pengfei Su

Design And Analysis Of Memory Management Techniques For Next-Generation Gpus , Haonan Wang

Dietary Monitoring Through Sensing Mastication Dynamics , Shuangquan Wang

Hardware-Assisted Security Mechanisms On Arm-Based Multi-Core Processors , Shengye Wan

Wearable Technology For Healthcare And Athletic Performance , Amanda Annette Watson

Deep Learning In Software Engineering , Cody Watson

Pinpointing Software Inefficiencies With Profiling , Shasha Wen

Motion Sensors-Based Human Behavior Recognition And Analysis , Hongyang Zhao

On Cross-Series Machine Learning Models , Xiaodan Zhu

Theses/Dissertations from 2019 2019

Research on Efficiency and Security for Emerging Distributed Applications , Zijiang Hao

On Enhancing Security of Password-Based Authentication , Yue Li

Improving Wifi Sensing And Networking With Channel State Information , Yongsen Ma

GPGPU Reliability Analysis: From Applications to Large Scale Systems , Bin Nie

Learning Code Transformations via Neural Machine Translation , Michele Tufano

Theses/Dissertations from 2018 2018

Usability, Efficiency and Security of Personal Computing Technologies , Nancy Carter

Investigating Emerging Security Threats in Clouds and Data Centers , Xing Gao

Mixed-Weight Open Locating-Dominating Sets , Robin M. Givens

On Improving (Non)Functional Testing , Qi Luo

Automating Software Development for Mobile Computing Platforms , Kevin Patrick Moran

Exploring New Paradigms for Mobile Edge Computing , Yutao Tang

Assisting Software Developers With License Compliance , Christopher Vendome

Understanding and Enriching Randomness Within Resource-Constrained Devices , Kyle Wallace

Enhancing Usability, Security, and Performance in Mobile Computing , Shanhe Yi

Quantifying and Explaining Causal Effects of World Bank Aid Projects , Jianing Simulation Zhao

Theses/Dissertations from 2017 2017

On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications , Shuai Hao

Security Enhancements in Voice Over Ip Networks , Seyed Amir Iranmanesh

Automatically Documenting Software Artifacts , Boyang Li

Data-Driven Radiometric Photo-Linearization , Han Li

An Investigation of Power Saving and Privacy Protection on Smartphones , Dachuan Liu

Enhancing Energy Efficiency and Privacy Protection of Smart Devices , Ge Peng

Enhancing Usability and Security through Alternative Authentication Methods , Nicolas Jorge Van Balen

Deep Learning Software Repositories , Martin White

Workload Prediction for Efficient Performance Isolation and System Reliability , Ji Xue

Exploiting Power for Smartphone Security and Privacy , Qing Yang

Theses/Dissertations from 2016 2016

Enhancing The Sensing Capabilities of Mobile and Embedded Systems , Daniel George Graham

Methods for Estimating The Diagonal of Matrix Functions , Jesse Harrison Laeuchli

Supporting Evolution and Maintenance of android Apps , Mario Linares-Vasquez

The Impact of Surface Normals on Appearance , Kathleen Dorothy Moore

Enhancing Mobile Device System using Information from Users and Upper Layers , Dung Nguyen Tien

Security and Privacy for Ubiquitous Mobile Devices , Edmund Novak

Security Supports for Cyber-Physical System and its Communication Networks , Zhengrui Qin

Rethinking Privacy and Security Mechanisms in Online Social Networks , Xin Ruan

Protecting Web Contents Against Persistent Crawlers , Shengye Wan

Managing Micro Vms in Amazon Ec2 , Jiawei Wen

Algorithms for Large Scale Problems in Eigenvalue and Svd Computations and in Big Data Applications , Lingfei Wu

Investigating Fraudulent and Privacy Activities in Online Business. , Haitao Xu

Understanding Security Threats in Cloud , Zhang Xu

Workload Interleaving with Performance Guarantees in Data Centers , Feng Yan

Theses/Dissertations from 2015 2015

Configuring and Assembling Information Retrieval based Solutions for Software Engineering Tasks. , Bogdan Dit

Enhancing Bug Reports for Mobile Apps , Kevin Patrick Moran

Providing efficient services for smartphone applications , Yifan Zhang

Enabling Parallel Execution via Principled Speculation. , Zhijia Zhao

Advancing Feedback-Driven Optimization for Modern Computing. , Mingzhou Zhou

Theses/Dissertations from 2014 2014

Towards Secure, Power-Efficient and Location-Aware Mobile Computing , Hao Han

Studying and Enabling Reuse in android Mobile Apps , andrew Steven Holtzhauer

Effective Resource and Workload Management in Data Centers , Lei Lu

Matching non-uniformity for program optimizations on heterogeneous many-core systems , Bo Wu

Exploiting behavioral biometrics for user security enhancements , Nan Zheng

Theses/Dissertations from 2013 2013

Real-Time High-Quality Image to Mesh Conversion for Finite Element Simulations , Panagiotis Foteinos

Translating Spatial Problems into Lumpable Markov Chains , Ruth Elizabeth Lamprecht

Tracelab: Reproducing Empirical Software Engineering Research , Evan Alexander Moritz

Network Traffic Aware Smartphone Energy Savings , andrew Joseph Pyles

Improving Security and Privacy in Online Social Networks , Wei Wei

Improving Energy Efficiency and Security for Pervasive Computing Systems , Fengyuan Xu

Theses/Dissertations from 2012 2012

Detecting Abnormal Behavior in Web Applications , Zi Chu

Information Integration for Software Maintenance and Evolution. , Malcom Bernard Gethers II

  • Collections
  • Disciplines

Advanced Search

  • Notify me via email or RSS

Author Corner

About scholarworks.

  • Honors Theses
  • W&M Libraries
  • VIMS Hargis Library
  • W&M Law School Repository
  • Research Guides

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

SDSU

Department of Computer Science

  • Teaching Associates
  • Undergraduate Advising
  • Graduate Advising
  • Faculty Positions
  • Computer Sciences Advisory Board
  • Fall 2021 Old/New CS Major/Minor FAQs
  • Undergraduate Degree Information
  • Prospective Undergrads
  • 2021 CS Major Requirements
  • 2020 CS Major Requirements
  • 2021 CS Minor Requirements
  • 2020 CS Minor Requirements
  • M.S. in Computer Science
  • M.S. in Computer Science 2023
  • M.S. in Computer Science 2022
  • Applying to the Master’s in CS Program
  • Thesis Defense

Past Theses

  • CS Master Exams Registration: Fall 2024
  • Automata & Formal Languages
  • Data Structures & Algorithms
  • Database Management Systems
  • Intelligent Systems & Robotics
  • Operating Systems & Architecture
  • Programming Languages
  • Applying to the Program
  • Registering for Classes
  • GIS Certificate
  • Laboratories
  • Sciences Advising
  • Financial Aid & Scholarships
  • Scholarship Finder
  • Graduate Studies
  • Student Ability Center
  • Student Support Programs
  • Study Abroad
  • Health Resources
  • Counseling & Psychological Services
  • Employee Resources
  • Technical Services
  • Job Possibilities for CS Majors
  • Career Development
  • Clubs & Organizations
  • Cultural Centers
  • Student Council
  • ACM Chapter
  • Cyber Defense Team
  • Mechatronics Club
  • Give to the Department

Recent CS Masters Theses

The following is a list of some of the recently completed CS Masters Theses.

Date Student Adviser Title
13-Dec-16 Arpita Banerjee Eckberg
08-Dec-16 Srilaxmi Kamatam Eckberg
07-Dec-16 RASHMI AHUJA Eckberg
21-Nov-16 Prasanthi Kornepati Eckberg
10-Nov-16 Akshay Jagtap Eckberg
01-Nov-16 Ranjith Kantamneni Eckberg
28-Oct-16 Michal Pasamonik Tarokh
27-Oct-16 Rohit Kulkarni Eckberg
21-Oct-16 Akhil Gokhale Eckberg
20-Oct-16 Rituka Tuteja Eckberg
19-Oct-16 Mayur Jurani Eckberg
18-Oct-16 Kavish Ghime Eckberg
13-Oct-16 Rohan Rampuria Eckberg
20-Sep-16 Ramya Dalapathirao Eckberg
3-Aug-16 Jeffrey Sadural Edwards
20-Jul-16 Isha Gautam Eckberg
14-Jul-16 KIRTI GUPTA Eckberg
5-May-16 Bavya Kumaresan Eckberg
3-May-16 Wenjun Zhu Whitney
27-Apr-16 Savita Patil Eckberg
27-Apr-16 Samatha Gajula Whitney
27-Apr-16 Radhika Deshpande Eckberg
26-Apr-16 Tanishq Chander Eckberg
22-Apr-16 Bharat Samudrala Eckberg
15-Apr-16 Umar Quadri Eckberg
14-Apr-16 Shivangi Pyasi Eckberg
13-Apr-16 Vivek Shah Eckberg
13-Apr-16 Nagendra Balachandra Eckberg
8-Apr-16 Vipin Thakur Eckberg
8-Apr-16 Deepthi Yaramala Eckberg
6-Apr-16 Veenu Prajapat Eckberg
6-Apr-16 Shubha Ravikumar Eckberg
6-Apr-16 Riddhi Shah Eckberg
6-Apr-16 Bela Mhasavade Eckberg
23-Mar-16 Monmita Choudhury Eckberg
23-Mar-16 Chinnu Chullipparambil Eckberg
22-Mar-16 Kumar Nishant Tarokh
9-Mar-16 Preethi Prabhu Eckberg
4-Mar-16 Vignesh Ramakrishnan Eckberg
3-Mar-16 Aarti Gokhale Wang
29-Feb-16 Sunny Jagadeesh (2) Eckberg
18-Feb-16 Navya Kumar Wang
10-Feb-16 Satya Vema Eckberg
9-Feb-16 Saurabh Kalantri Eckberg
8-Feb-16 Madhura Babu Eckberg
19-Jan-16 Devang Shah Eckberg
16-Dec-15 James Bible Eckberg
11-Dec-15 Pooja Saroha Eckberg
10-Dec-15 Sunny Jagadeesh (1) Eckberg
10-Dec-15 Ritu Kamboj Eckberg
10-Dec-15 Nitish Nalwade Eckberg
9-Dec-15 Surabhi Anand Eckberg
8-Dec-15 Julian Raheema Edwards
2-Dec-15 Rajagopal Vajja Eckberg
30-Nov-15 SreeLakshmi Reddygari Eckberg
23-Nov-15 Ramya Nagaraj Eckberg
16-Nov-15 Shelly Oberoi Eckberg
10-Nov-15 Ranjana Venkataraman Eckberg
9-Nov-15 Divyashree Vijaykumar Eckberg
9-Nov-15 Deepika Urs Eckberg
5-Nov-15 Vaishnavi Balaji Wang
 4-Nov-15 Anurag Dani  Eckberg
 30-Oct-15 Varun Penumalla  Eckberg
 30-Oct-15 Rakesh Thakur  Eckberg
 30-Oct-15 Pratik Bhatt  Eckberg
 29-Oct-15 Pratyusha Uddaraju  Edwards
 28-Oct-15 Sunil Kadiwal  Eckberg
 27-Oct-15 Bharath Mylarappa  Eckberg
 26-Oct-15 Nisha Sharma  Eckberg
 23-Oct-15 Sumer Pochi  Eckberg
 23-Oct-15 Amol Kawade  Eckberg
 21-Oct-15 Naitik Doshi  Eckberg
19-Oct-15 Ting Guo Vuskovic
19-Oct-15 Sappidi Sowjanya Eckberg
19-Oct-15 Aditya Kappagantula Eckberg
16-Oct-15 Parmeet Singh Eckberg
15-Oct-15 Vedika Jadhav Eckberg
15-Oct-15 Shailesh Patil Eckberg
13-Oct-15 Vyshakh Babji Eckberg
7-Oct-15 Jasika Kamboj Eckberg
7-Oct-15 Sahil Agarwal Eckberg
6-Oct-15 Sunil Duddi Eckberg
5-Oct-15 Joonyoung Yu Tarokh
1-Oct-15 Priyanka Jadhav Eckberg
1-Oct-15 Ankit Ahlawat Eckberg
24-Sep-15 Aditya Nalawade Eckberg
16-Sep-15 Nikhil Gupta Eckberg
15-Sep-15 Atiehalsadat Kashanimoghaddam Ozturk
12-Aug-15 Sivanarayana Gaddam Vuskovic
11-Aug-15 Dhanya Ramdas Riggins
30-Jun-15 Nanditha Murthy Eckberg
4-Jun-15 Rishu Mishra Stewart
14-May-15 Shankara Meenkeri Stewart
1-May-15 Artee Dubey Eckberg
20-Apr-15 Salil Aggarwal Eckberg
10-Apr-15 Garima Verma Eckberg
9-Apr-15 Srinidhi Balaram Eckberg
8-Apr-15 Sumeer Tuli Eckberg
8-Apr-15 Ashok Ramachandra Eckberg
3-Mar-15 Sourabh Gupta Eckberg
30-Mar-15 Ankur Singh Eckberg
20-Mar-15 Kavya Nagaraja Eckberg
12-Feb-15 Saran Alla Eckberg
12-Feb-15 Ashwin Thilakkumar Eckberg
11-Feb-15 Sarfaraz Haque Eckberg
11-Feb-15 Anshul Gupta Eckberg
26-Jan-15 Swathi Mannepalli Eckberg
15-Dec-14 Harjinder Singh Eckberg
04-Dec-14 SHIVAM DIXIT Eckberg
02-Dec-14 Matthew Shaw Edwards
25-Nov-14 Sanket Shah Eckberg
19-Nov-14 Anupama Ranebennur Eckberg
17-Nov-14 Sudhir Phophaliya Eckberg
17-Nov-14 Mukesh Oberoi Eckberg
13-Nov-14 Swathi Artham Eckberg
12-Nov-14 Vigya Lnu Tarokh
12-Nov-14 Pradeep Rana Eckberg
10-Nov-14 Ashish Konda Eckberg
09-Nov-14 Saumya Sharma Eckberg
06-Nov-14 Devi Pakala Eckberg
05-Nov-14 Vaishnavi Srinivasan Eckberg
05-Nov-14 Bharath Prakash Eckberg
31-Oct-14 Rahul Swamy Eckberg
30-Oct-14 Varsha Kota Eckberg
30-Oct-14 KanakaNethra RajahNagarajasetty  Eckberg
30-Oct-14 Amruta Gaikwad Eckberg
29-Oct-14 Atul Khaire Eckberg
24-Oct-14 Priya Jayaprakash Whitney
24-Oct-14  Likhita Gonchikara Eckberg
22-Oct-14 Akshay Manathkar Eckberg
21-Oct-14 Dipal Kashipara Eckberg
15-Oct-14 Ravikanth Boppidi Eckberg
02-Oct-14 Dharmendhar Pulakunta Eckberg
30-Sep-14 AMAN GHEI Eckberg
22-Sep-14 SHRUTHI SRIKANTAIAH Eckberg
28-Aug-14 Hoda Sayyadinejad Whitney
22-Aug-14 MOUMITA CHATTERJEE Eckberg
12-Aug-14 Xiaobin Zhang Tarokh
17-Jul-14 Bhakta Shardul Eckberg
11-Jun-14 Simmerdeep Singh Lewis
15-May-14 Richard Vu Tarokh
14-May-14 Suchismita Subudhi Eckberg
14-May-14 Chintal Vashi Whitney
13-May-14 Deepika Srinath Eckberg
02-May-14 Saifuddin Tariwala Eckberg
02-May-14 Nachiket Tanksale Eckberg
01-May-14 Abhishikta Vaddineni Whitney
24-Apr-14 Sandeep Muddam Eckberg
23-Apr-14 Chetan Rokhade Root
17-Apr-14 Vijaya Bylaiah Eckberg
15-Apr-14 Ketaki Raste Eckberg Big Data Analytics – Hadoop Performance Analysis
14-Apr-14 Rashmi Dahasahasra Root
14-Apr-14 Isilay Dural Eckberg
09-Apr-14 Sameer Kathawate Eckberg
 27-Mar-14  Samia Fatima  Eckberg
27-Mar-14 Pallavi Mokashi Eckberg
25-Mar-14 Sushruth Chandrashekar Eckberg
24-Mar-14 Nomitha Mudireddy Eckberg
24-Mar-14 DEBOSHREE SARKAR Riggins
20-Mar-14 Manasa Rao Eckberg
12-Mar-14 Aarthie Murugavel Root
 21-Feb-14  Cailiang Xu  Xie  
27-Nov-13 Mahmood Contractor Eckberg
27-Nov-13 Luma Zakaria Eckberg
20-Nov-13 Varun Jayakumar Eckberg
20-Nov-13 Vanya Goel Riggins
20-Nov-13 Abhiraj Pande Eckberg
13-Nov-13 Srivenkata Gantikota Eckberg
08-Nov-13 Kuang Yao Lewis
13-Nov-13 Mini Pillai Eckberg
07-Nov-13 Aditi Akalkotkar Eckberg
31-Oct-13 Krishan Sharma Eckberg
29-Oct-13 Megha Shaseendran Stewart
23-Oct-13 Shruthi Rao Eckberg
10-Oct-13 Rima Soury Xie
09-Oct-13 Shreyas Diwan Eckberg
08-Oct-13 Kishore Reddy Eckberg
03-Oct-13 Lakshmi Vijayachandran Eckberg
22-Aug-13 Swati Patel Eckberg
06-Aug-13 Ankur Bhattacharjee Eckberg
05-Aug-13 Shruti Mahajan Tarokh
02-Jul-13 Anisha Santharam Eckberg
20-May-13 Johanna Stinner-Sloan Roch
16-May-13 Atul Vijayakumar Lewis
15-May-13 Leslie Viviani Lewis
9-May-13 Priyanka Angolkar Eckberg
8-May-13 Prashasti Gehalot Riggins
8-May-13 Aparna Ghate Eckberg
30-Apr-13 Sadana Borra Eckberg
30-Apr-13

Aditi Singh

Lewis

18-Apr-13 Andrew Luxner Edwards
18-Apr-13 Anal Surti Eckberg
17-Apr-13 Lavanya Vangalkrishnakumar Eckberg
17-Apr-13 Kevin Leake Lewis
15-Apr-13 Ranjitha Shenoy Tarokh
9-Apr-13 Hitesh Chaudhary Lewis
29-Mar-13 Ashish Tandel Tarokh
28-Mar-13

Kusuma Devanga

Eckberg

28-Mar-13

Akin Gursel

Eckberg

27-Mar-13

Sudeshna Mukherjee

Eckberg

20-Mar-13

Vikram Ramanna

Sarkar

4-Mar-13

Vikas Sharma

Lewis

25-Feb-13

Kanika Maheshwari

Eckberg

20-Feb-13

Aseem Chaudhary

Eckberg

7-Jan-13

Swathi Simmula

 Lewis

19-Dec-12

Smita Digambar More

 Thomas

12-Dec-12

John Stronks

 Lewis

11-Dec-12

Sukhdeep Kaur

 Lewis

10-Dec-12

Rama Bandi

 Vuskovic

7-Dec-12

Melroy D’Monty

 Eckberg

6-Dec-12

Angad Manchanda

 Interlando

21-Nov-12

Sirisha Jonnalagadda

Eckberg

20-Nov-12

Deepika Agarwal

 Eckberg

19-Nov-12

Sheridan Wright

 Edwards

14-Nov-12

Aruna Alluri

 Whitney

 9-Nov-12

Ravish Thakor

 Marovac

 9-Nov-12

Park Patel

 Marovac

 9-Nov-12

Aesha Thakkar

 Marovac

By Third Party Authentication Server

 7-Nov-12

Namrata Garach

 Whitney

 6-Nov-12

Shrutika Sutar

 Eckberg

5-Nov-12

Monica Maleyanda

 Eckberg

 31-Oct-12

Steven Williams

Edwards 

 25-Oct-12

Varun Jaiswal

 Lewis

 25-Oct-12

Shreyas Shah

 Lewis

 25-Oct-12

Pratibha Atri

 Eckberg

 24-Oct-12

Xinhua Fahy

 Xie

 24-Oct-12

Sridattateja Karna

 Walsh

 24-Oct-12

Kashyap Ivaturi

 Eckberg

23-Oct-12

Dilpreet Sandhu

 Eckberg

 19-Oct-12

 Tejpreet Sempla

 Lewis

 12-Oct-12

 Sudeep Sen

 Lewis

12-Oct-12

 Manoj Raskar

 Lewis

 12-Oct-12

 Arvind Morwal

 Lewis

 11-Oct-12

 Preetam Borah

 Lewis

Implementation of DTW Algorithm for Application Security

 5-Oct-12

 Ankit Patel

 Eckberg

For Smartphone Applications

 27-Sep-12

 Yunita

 Bhattacharjee

For an AJAX Based Course Management System

 18-Sep-12

 Aditi Laddha

 Eckberg

 15-Aug-12

 Santosh Dantuluri

 Eckberg

 14-Aug-12

 Tushar Jadhav

 Lewis

 13-Aug-12

 Monal Doctor

 Eckberg

9-Aug-12

 Parita Shah

 Eckberg

3-Aug-12

Nilay Jani

Lewis

1-Aug-12

Rima Shah

Riggins

31-Jul-12

Gaurav Sharma

Eckberg 

10-Jul-12

Bhavana Raghupathi

Eckberg

10-Jul-12

Paola Alvarez

Eckberg

3-Jul-12

Karuna Hotlani

Eckberg

3-Jul-12

Rahul Chaturvedi

Eckberg

27-Jun-12

Fnu Sourabh

Stewart

Tidal Forces Using XNA Programming Framework

26-Jun-12

Achal Shah

Lewis

20-Jun-12

Uma Kunapareddy

Lewis

19-Jun-12 Reema Shah Eckberg
24-May-12 Hetang Shah Thomas
23-May-12 Anirudh Garg Lewis
23-May-12 Devang Patel Lewis
21-May-12 Haofei Fang Vuskovic
14-May-12 Xiaohui Zeng Eckberg
14-May-12 Mithun Nanjegowda Lewis
10-May-12 Chetan Gowda Eckberg
10-May-12 Sunil Ramachandra Eckberg
8-May-12 Sarath Keerthipati Eckberg
8-May-12 Anand Bikkavilli Eckberg
7-May-12 Abhinav Dhiman Lewis
7-May-12 Sunanda Komaragiri Lewis
3-May-12 Chatura Ettigi Lewis
2-May-12 Vinay Polisetty Lewis
1-May-12 Zarana Patel Lewis
27-Apr-12 Pratima Pillarisetti Root
24-Apr-12 Sunjna Kashyap Lewis
24-Apr-12 Chaitanya Deosthale Lewis
23-Apr-12 Mohit Joshi Lewis
20-Apr-12 Vincent Stanley Dayes Root
20-Apr-12 Brian Blaine Tarokh
12-Apr-12 Rajkumar Thulasimani Lewis
12-Apr-12 Darshini Rathod Lewis
11-Apr-12 Mehul Shah Lewis
10-Apr-12 ANJALI MATHUR Eckberg
4-Apr-12 Tushar Nimbalkar Riggins
2-Apr-12 Xinhua Fahy Xie
2-Apr-12 Thomas Drudge Valafar
29-Mar-12 Prashant Dikshit Eckberg
22-Mar-12 NEHA BANSAL Riggins
20-Mar-12 Hiral Patel Marovac
20-Mar-12 Honey Walia Beck
20-Mar-12 Abhishek Sood Stewart
19-Mar-12 Avinash Vadi Tarokh
19-Mar-12 Mirza Mohammed Akram Baig Riggins
12-Mar-12 Lantian Gai Xie
28-Feb-12 Sonia Patel Eckberg
21-Feb-12 Shamal Matty Eckberg
20-Feb-12 Deepa Gopal Bhattacharjee
27-Jan-12 Daniel Bolton Whitney
20-Dec-11 Ashish Gupta Xie
15-Dec-11 Chaitra Jayaram Manjunath Eckberg
15-Dec-11 Tarini Shah Eckberg
14-Dec-11 Dravya Nataraj Eckberg
8-Dec-11 Kazi Tulip Bhattacharjee
8-Dec-11 Prashanth Govindaraj Lewis
29-Nov-11 MITHUN RANGANATH Eckberg
28-Nov-11 Sri Tulasi Peddola Lewis
17-Nov-11 Kejue Jia Donald
17-Nov-11 SACHIN JAIN Eckberg
16-Nov-11 Vivek Shah Eckberg
15-Nov-11 Davinderpaul Makkar Lewis
14-Nov-11 William King Vuskovic
7-Nov-11 Robert Rota Lewis
31-Oct-11 Rohit Gupta Eckberg
31-Oct-11 Rakhi Harkawat Eckberg
28-Oct-11 Yashodhar Patel Lewis
28-Oct-11 Abdul Abdurrab Xie
27-Oct-11 Sunil Lakhiyani Lewis
27-Oct-11 Swapnil Devikar Lewis
25-Oct-11 Swagath Manda Eckberg
25-Oct-11 Krithika Mathivanan Eckberg
20-Oct-11 Siva Krishna Hari Bhattacharjee
19-Oct-11 Ashwini Govindagoudar Eckberg
10-Oct-11 RACHANA BEDEKAR Eckberg
10-Oct-11 Pooja Shah Eckberg
10-Oct-11 Ravali Yadavalli Eckberg
6-Oct-11 Vivek Sachdeva Eckberg
3-Oct-11 Shah Sudhirbhai Eckberg
22-Sep-11 Adarsh Joshi Lewis
22-Sep-11 Arvind Karanam Lewis
16-Sep-11 Sathyanarayan Chandrashekar Stewart
15-Sep-11 Vinita Kondhalkar Lewis
31-Aug-11 Jimmie Dixon Edwards
30-Aug-11 Jonathan Tjioe Xie
25-Aug-11 CHANDRA GOPALAIAH Eckberg

St Andrews Research Repository

St Andrews University Home

  •   St Andrews Research Repository
  • Computer Science (School of)
  • Computer Science

Computer Science Theses

  • Register / Login

By Issue Date Names Titles Subjects Classification Type Funder

Search within this collection:

All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems engineering, and human computer interaction.

For more information please visit the School of Computer science home page.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Recent Submissions

Model agnostic interpretability , enhancing privacy for secure internet communications using ilnp , processing clinical guideline text for formal verification , automatic evaluation of geopolitical risk , automating inventory composition management for bulk purchasing cloud brokerage strategy .

feed

No notifications.

Dissertations on Computer Science

Computer science is the study of computer systems, computing technologies, data, data structures and algorithms. Computer science provides essential skills and knowledge for a wide range of computing and computer-related professions.

View All Dissertation Examples

Computer Science

Latest Computer Science Dissertations

Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.

Pandemic Disease Monitoring Tool Using Twitter Data

Dissertation Examples

A tool is developed to retrieve the tweets from Twitter using generic terms used in discussion for a disease selected....

Last modified: 1st Mar 2022

An Artificial Neural Network Approach for Detecting Spectrum Sensing Data Falsification Attacks

In this paper, we propose a multi-layer neural network classifier to detect falsified reports in cooperative spectrum sensing....

Last modified: 23rd Feb 2022

Comparing GUI Functional System Testing with Functional System Logic Testing

This paper studies possible differences between GUI testing and system testing experimentally. Specifically, we selected a SUT equipped with system tests that directly exercise the application code....

Last modified: 21st Feb 2022

A Novel Approach for Localization of Robot in Indoor Environment Using Line Sensors and Odometry

Localization approaches in general require inputs from multiple sensors and a solid data fusion technique in order to achieve accurate results....

Last modified: 18th Feb 2022

Measurement of Radar Pulse Parameters using FFT

This project presents the development of an algorithm for radar pulse signal acquisition and parameters interception. Radar pulse parameters extraction is an important processing stage in the electronic warfare (EW) receivers....

Last modified: 11th Jan 2022

Incident Handling in Cloud Computing

The impacts of cloud integration warrant a careful analysis by an organization before implementation. An introduction of a disruptive technology such as cloud computing can make both definition and documentation of services, policies, and procedures unclear in a given environment....

Detecting Multiple Code Smells and Refactoring Solutions for the Code

The major purpose of this dissertation is to focus on developing a tool which detects multiple code smells and provide refactoring solutions to the code using design patterns. ...

Last modified: 30th Dec 2021

Automatic Video-based Sign Language Recognition

Dissertation Proposals

Automatic Sign Language recognition system could benefit millions of hearing-impaired people to communicate with the world more efficiently. This project aims to review past research in the field and apply a new technique for solving this problem....

Last modified: 21st Dec 2021

Digital Clock Design with FPGA Board

The main objective of the digital clock is to display the time digitally using 7-segment display on Artix-7 FPGA Board....

Last modified: 3rd Dec 2021

Hate Speech Detection in Social Media

Example Research Proposals

The objective of this research is to detect hate speech on social media. For this research we created a data set collecting data from twitter....

Last modified: 1st Dec 2021

Concepts of Object Oriented Techniques and Programming

This paper sought to define the concepts of object oriented techniques in addition with the OO issues, development techniques and concepts of object oriented programming....

Last modified: 29th Nov 2021

Optical Character Recognition (OCR) of Arabic Characters

This project is designed to use OCR to classify and identify a scanned image containing Arabic characters using two pace approaches....

Clustering Algorithms for Big Data

Dissertation Introductions

Introduction to a dissertation aiming to reduce the research gap by developing fast, scalable iterative clustering algorithms that converges faster having higher performance with better accuracy and reduced error rate....

Last modified: 26th Nov 2021

Development of A Wireless Gesture Control Robot

The objective of this paper is to build a wireless gesture control robot using Arduino, accelerometer, RF transmitter and receiver module....

Last modified: 19th Nov 2021

How Secure are Apache & IIS Web Servers after Vulnerability Testing?

This project aims to provide a solution based on whether implementing penetration testing tools; downloaded from third-party software can have the least issues by evaluating how we can test either of two web servers, such as Apache and IIS....

Last modified: 15th Nov 2021

Project Proposal for Real-Time Object Detection with Semantic Segmentation

This project will aim to develop a prototype Android application which will implement real-time object detection with semantic segmentation using a trained and quantized custom deep learning algorithm on the live streaming image frames receiving from the device camera....

Last modified: 10th Nov 2021

Learning Transaction Embedding via Items and Frequent Itemsets

In this paper, we propose an unsupervised method which learns low-dimensional continuous vectors for transactions based on information of both singleton items and FIs....

Last modified: 25th Oct 2021

Student Project Allocation for Monitoring Duplication

This research centres on the design and implementation of Student Project Allocation for monitoring duplication in the department of computer science at a university....

Last modified: 22nd Oct 2021

Data Mining Algorithm Techniques

Introduction to a study which aims to compare and contrast various classification data mining algorithm techniques, as well as different feature selection scenarios....

Solving Sudoku Puzzle by Machine Learning

In my task I proposed a machine learning technique for providing the solution to a Sudoku puzzle. The solver is equipped for solving the puzzle from a picture caught from any advanced camera....

Malware Detection Using Machine Learning

The aim is to utilize the concept of machine learning and to build a model using ensemble algorithm which can be trained efficiently to detect malwares in a system....

Detection of Online Opinion Spam

Online opinion spamming has become a potential threat widespread. In this research project we focus on detecting the businesses that are affected by opinion spamming over time....

Last modified: 20th Oct 2021

Big Data Analytics for Optimum Route Planning

The aim of this project is to create a user application which can map the optimum route from between multiple locations, for example, A to B then B to C using a combination of ‘Shortest Path Algorithms’ and ‘Big Data’ analytics....

Last modified: 13th Oct 2021

Identifying Clusters in N-Dimensional Data

Removal of redundant dimensions to find clusters in N-Dimensional Data using subspace clustering....

Last modified: 7th Oct 2021

Analysis of Performance Appraisal System

The purpose of this study is to identify whether management working in a head office are convinced about the performance appraisal system of the company....

Popular Tags

  • Browse All Tags
  • Biomedical Science
  • Business Analysis
  • Business Strategy
  • Computer Science
  • Construction
  • Consumer Decisions
  • Criminology
  • Cultural Studies
  • Cyber Security
  • Electronics
  • Engineering
  • Environmental Science
  • Environmental Studies
  • Food And Nutrition
  • Health And Social Care
  • Human Resources
  • Information Systems
  • Information Technology
  • International Business
  • International Relations
  • International Studies
  • Mental Health
  • Pharmacology
  • Social Policy
  • Sustainability
  • Young People

Female student writing notes for her dissertation

Dissertation Writing Service

Male student researching his dissertation proposal

Dissertation Proposal Service

Student writing a dissertation topic

Topic with Titles Service

Tutor marking work

Samples of our work

  • Harvard Library
  • Research Guides
  • Faculty of Arts & Sciences Libraries

Computer Science Library Research Guide

Find dissertations and theses.

  • Get Started
  • How to get the full-text
  • What is Peer Review?
  • Find Books in the SEC Library This link opens in a new window
  • Find Conference Proceedings
  • Find Patents This link opens in a new window
  • Find Standards
  • Find Technical Reports
  • Find Videos
  • Ask a Librarian This link opens in a new window

Engineering Librarian

Profile Photo

How to search for Harvard dissertations

  • DASH , Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.  Most Ph.D. dissertations submitted from  March 2012 forward  are available online in DASH.
  • Check HOLLIS, the Library Catalog, and refine your results by using the   Advanced Search   and limiting Resource  Type   to Dissertations
  • Search the database  ProQuest Dissertations & Theses Global Don't hesitate to  Ask a Librarian  for assistance.

How to search for Non-Harvard dissertations

Library Database:

  • ProQuest Dissertations & Theses Global

Free Resources:

  • Many  universities  provide full-text access to their dissertations via a digital repository.  If you know the title of a particular dissertation or thesis, try doing a Google search.  

Related Sites

  • Formatting Your Dissertation - GSAS
  • Ph.D. Dissertation Submission  - FAS
  • Empowering Students Before you Sign that Contract!  - Copyright at Harvard Library

Select Library Titles

Cover Art

  • << Previous: Find Conference Proceedings
  • Next: Find Patents >>
  • Last Updated: Feb 27, 2024 1:52 PM
  • URL: https://guides.library.harvard.edu/cs

Harvard University Digital Accessibility Policy

IMAGES

  1. Thesis Ideas For Computer Science

    computer science dissertation example

  2. 141 Impressive Computer Science Dissertation Ideas To Use

    computer science dissertation example

  3. Thesis proposal sample computer science

    computer science dissertation example

  4. (PDF) M. Tech Computer Science Dissertation

    computer science dissertation example

  5. computer-science UC Berkeley

    computer science dissertation example

  6. How to Write a Master's Thesis in Computer Science

    computer science dissertation example

VIDEO

  1. Computer Science

  2. Bob's Project Guidelines: Writing a Dissertation in Computer Science

  3. Research Methods Workshop on Writing Good Dissertations in Computer Science

  4. Research Methods Workshop Feedback on Good Dissertations in Computer Science

  5. Kubernetes Distributed Load Testing Application

  6. MY PHD DISSERTATION PROPOSAL DEFENSE FOR MY PHD IN COMPUTER SCIENCE #phdlife

COMMENTS

  1. Computer Science Dissertations and Theses

    Theses/Dissertations from 2019. PDF. A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games, Naif Saeed Alzahrani (Dissertation) PDF. Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely (Thesis) PDF.

  2. Computer Science and Engineering Theses and Dissertations

    Theses/Dissertations from 2020 PDF. Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network, Rupal Agarwal. PDF. Keyless Anti-Jamming Communication via Randomized DSSS, Ahmad Alagil. PDF. Active Deep Learning Method to Automate Unbiased Stereology Cell Counting, Saeed Alahmari ...

  3. Computer Science Theses & Dissertations

    Theses and dissertations published by graduate students in the Department of Computer Science, College of Sciences, Old Dominion University, since Fall 2016 are available in this collection. Backfiles of all dissertations (and some theses) have also been added. In late Fall 2025, all theses will be digitized and available here.

  4. Theses and Dissertations--Computer Science

    Theses/Dissertations from 2024 PDF. Extracting Social Network Model Parameters from Social Science Literature, Isaac Batts. PDF. LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS, Shashank Gupta. PDF

  5. Computer Science Theses and Dissertations

    Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF.

  6. PDF Adversarially Robust Machine Learning With Guarantees a Dissertation

    di er. This thesis focuses on an extreme version of this brittleness, adversarial examples, where even imperceptible (but carefully constructed) changes break ML models. Progress on this widely-studied topic has been limited by the following critical roadblocks which we address in this thesis. Challenge 1: Worst-case evaluation with guarantees.

  7. CSSA Sample PhD proposals

    CSSA Sample PhD proposals. Purpose. Welcome to the on-line version of the UNC dissertation proposal collection. The purpose of this collection is to provide examples of proposals for those of you who are thinking of writing a proposal of your own. I hope that this on-line collection proves to be more difficult to misplace than the physical ...

  8. Computer Science Masters Theses

    Computer Vision in Adverse Conditions: Small Objects, Low-Resoltuion Images, and Edge Deployment, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong

  9. Computer Science Masters Thesis Collection

    Theses/Dissertations from 2013. Alsafeer software for teaching computer literacy, Zieb Rabie Alqahtani. Wireless electronic scoring of kendo competition matches using an embedded system, Edward B. Hogan. Using phishing to test social engineering awareness of financial employees, Rebecca M. Long.

  10. How to Write Up a Ph.D. Dissertation

    make the notation, terminology, and style consistent throughout. do keep good ideas, text, and results from your previous papers (giving credit to any co-authors) expand the text. make the text clearer, more tutorial, and more thoughtful. add more examples and intuitions to help the reader.

  11. How To Write A Dissertation

    Suggested Order For Writing: The easiest way to build a dissertation is inside-out. Begin by writing the chapters that describe your research (3, 4, and 5 in the above outline). Collect terms as they arise and keep a definition for each. Define each technical term, even if you use it in a conventional manner.

  12. Computer Science Graduate Projects and Theses

    The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...

  13. Computer Science Master's Theses

    In this thesis, we explore the use of deep-learning-based computer vision tools to automate these labor-intensive tasks. The motivation for this work is not only to accelerate established, low-throughput processes in clinical and research practice, but also to expand the qualitative toolset available to researchers to help them conceptualize ...

  14. Brown CS: PhD Theses

    Executable Examples: Empowering Students to Hone Their Problem Comprehension (2.4 MB) • Shriram Krishnamurthi, advisor Yang, Fumeng Fusing visualization, virtual reality, and vision science for scientific thinking (16.0 MB) • David Laidlaw, advisor 2021 Agarwal, Archita Encrypted Distributed Storage Systems (2.3 MB) • Seny Kamara, advisor

  15. Dissertations

    Over 5 million dissertations and theses available in OCLC member libraries. Many theses are available electronically, at no charge, directly from the publishing institution. UCLA students, faculty, and staff can request non-UCLA dissertations via interlibrary loan. Center for Research Libraries (CRL) Foreign Dissertations.

  16. Dissertation examples

    School of Computer Science. Projects which attained grades of over 70 or between 60 and 69 are indicated on the lists (accessible only by students and staff registered with School of Computer Science, when on campus). School of Computer Science examples. School of Electronic and Electrical Engineering

  17. The Dissertation

    The Dissertation. The dissertation should be written for a technically competent reader who is not necessarily familiar with the particular aspects of Computer Science involved. Better grades will arise from clarity and ease of reading, good pictures, clear explanation, minimal jargon and appropriate use of equations.

  18. Computer Science and Engineering Theses, Projects, and Dissertations

    epicconfigurator computer configurator and cms platform, ivo a. tantamango PDF STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao

  19. Computer Science Theses, Dissertations, and Masters Projects

    Theses/Dissertations from 2021. On Supporting Android Software Developers And Testers, Carlos Eduardo Bernal Cardenas. Data-Driven Reflectance Estimation Under Natural Lighting, Victoria Cooper. Rethinking Cache Hierarchy And Interconnect Design For Next-Generation Gpus, Mohamed Assem Abd ElMohsen Ibrahim.

  20. Past Theses

    04-Dec-14. SHIVAM DIXIT. Eckberg. Comprehensive Web Application for CITER (Center of Industrial Training and Engineering Research) 02-Dec-14. Matthew Shaw. Edwards. K-Means Clustering with Automatic Determination of K Using a Multi-Objective Genetic Algorithm with Applications to Microarray Gene Expression Data.

  21. Computer Science Theses

    All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems ...

  22. Computer Science Dissertations

    Dissertations on Computer Science. Computer science is the study of computer systems, computing technologies, data, data structures and algorithms. ... Dissertation Examples. The aim of this project is to create a user application which can map the optimum route from between multiple locations, for example, A to B then B to C using a ...

  23. Computer Science Library Research Guide

    How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...

  24. Thesis Oral Defense Process

    Published example with Co-Chairs. NOTES: No affiliation for CMU faculty ... Thesis Summary of 350 words or less, describing the thesis. This can be provided as email body content or text attachment (.txt) and is utilized for your talk announcements. ... Computer Science Department. Carnegie Mellon University. 5000 Forbes Avenue. Pittsburgh, PA ...