(Mark 72)
(Mark 75)
(Mark 91)
(Mark 85)
(Mark 85)
(Mark 85)
(Mark 91)
(Mark 85)
(Mark 75)
This dissertation achieved a mark of 84:
.
LUBS5530 Enterprise
|
MSc Sustainability
|
|
|
. |
The following outstanding dissertation example PDFs have their marks denoted in brackets. (Mark 70) (Mark 78) |
About the university, research at cambridge.
Sign in with Raven
The dissertation should be written for a technically competent reader who is not necessarily familiar with the particular aspects of Computer Science involved. Better grades will arise from clarity and ease of reading, good pictures, clear explanation, minimal jargon and appropriate use of equations. Writing a dissertation requires planning and time. You should allow at least four weeks for the task.
Dissertation PDF files must be
The main body of the dissertation, running from the first page of the introduction until the last page of the conclusions, shall not exceed 40 pages nor exceed 12,000 words in length (including tables and footnotes). Students should ensure the main body of their dissertation (page 3 onwards) as well as any appendices do not contain direct personal identifiers (i.e. their name or their CRSID).
Examiners and Assessors are permitted to judge your work only through study of your dissertation, although they will require your original source code to be available for them to refer to in cases where clarification is needed.
To facilitate the assessment process, the Examiners require the top-level structure of the dissertation to be strictly as follows:
Table of contents.
Project proposal.
It is not the intention of the Examiners to constrain writers too greatly. Although the layout of the Cover Sheet and the arrangement of the Proforma are tightly specified, the organisation and length of each of the five chapters are allowed to vary considerably from one dissertation to another. Further details are given below.
The single cover page contains
Your project title must be the same as the title approved by your Project Checkers on your project proposal. If you want to change the title you should first discuss this with your supervisor. If your supervisor is in agreement you will need to request a change by contacting the Teaching Administration Manager with a brief explanation for the reasons behind the change ([email protected]). This will be approved by the Teaching Administration Manager and Chair of Examiners.
All dissertations must include an anti-plagiarism declaration immediately before the Proforma. The declaration must have exactly the following syntax:
I, [Name] of [College], being a candidate for Part II of the Computer Science Tripos, hereby declare that this dissertation and the work described in it are my own work, unaided except as may be specified below, and that the dissertation does not contain material that has already been used to any substantial extent for a comparable purpose. [In preparation of this dissertation I did not use text from AI-assisted platforms generating natural language answers to user queries, including but not limited to ChatGPT. / The project required the use of AI-assisted platform [name] in section [number], and such use is acknowledged in the text.] (use either of these sentences as appropriate) [I am content for my dissertation to be made available to the students and staff of the University.]
Signed [signature]
Date [date]
Further guidance relating to the use of AI-assisted tools can be found on the exams guidance web page .
You may either include a scanned copy of your signature or type your full name in place of a handwritten signature.
The University drafted the wording, which is similar to that relating to dissertations in a wide range of subjects; thus the "unaided except as may be specified below" clause merits some explanation:
The Department would like past dissertations to be made available for teaching purposes and for your references. These will be accessed on the Computer Science departmental website under Raven password protection. You should include the last sentence of the declaration if you are willing for your dissertation to be accessed for these purposes; otherwise you may remove it. Note: If in the future you would like your dissertation removed from the departmental website, you can request this by contacting the Student Admin office at [email protected].
The single proforma page is a preface that immediately follows the declaration of originality. The proforma page, as well as all subsequent pages of the dissertation should not include direct personal identifiers such as your name or CRSID. The Proforma must be arranged thus:
It is quite in order for the Proforma to point out how ambitious the original aims were and how the work completed represents the triumphant consequence of considerable effort against a background of unpredictable disasters. The substantiation of these claims will follow in the rest of the dissertation.
Student Administration will ask students to resubmit any dissertation which does not include the relevant cover page, declaration and proforma. If such a resubmission occurs after the deadline this will result in a late submission penalty.
This should list the contents in some sensible way.
The introduction should explain the principal motivation for the project and show how the work fits into the broad area of surrounding computer science and give a brief survey of previous related work. It should generally be unnecessary to quote at length from technical papers or textbooks. If a simple bibliographic reference is insufficient, consign any lengthy quotation to an appendix.
Principally, this chapter should describe the work which was undertaken before code was written, hardware built or theories worked on. It should show how the project proposal was further refined and clarified, so that the implementation stage could go smoothly rather than by trial and error.
Throughout this chapter and indeed the whole dissertation, it is essential to demonstrate that a proper professional approach was employed.
The nature of this chapter will vary greatly from one dissertation to another but, underlining the professional approach, this chapter will very likely include a section headed "Requirements Analysis" and refer to appropriate software engineering techniques used in the dissertation. The chapter will also cite any new programming languages and systems which had to be learnt and will mention complicated theories or algorithms which required understanding.
It is essential to declare the starting point. This states any existing codebase or materials that your project builds on. The text here can commonly be identical to the text in your proposal, but it may enlarge on it or report variations. For instance, the true starting point may have turned out to be different from that declared in the proposal and such discrepancies must be explained.
This chapter should describe what was actually produced: the programs which were written, the hardware which was built or the theory which was developed. Any design strategies that looked ahead to the testing stage should be described in order to demonstrate a professional approach was taken.
Descriptions of programs may include fragments of high-level code but large chunks of code are usually best left to appendices or omitted altogether. Analogous advice applies to circuit diagrams or detailed steps in a machine-checked proof.
The implementation chapter should include a section labelled "Repository Overview". The repository overview should be around one page in length and should describe the high-level structure of the source code found in your source code repository. It should describe whether the code was written from scratch or if it built on an existing project or tutorial. Making effective use of powerful tools and pre-existing code is often laudable, and will count to your credit if properly reported. Nevertheless, as in the rest of the dissertation, it is essential to draw attention to the parts of the work which are not your own.
It should not be necessary to give a day-by-day account of the progress of the work but major milestones may sometimes be highlighted with advantage.
This is where Assessors will be looking for signs of success and for evidence of thorough and systematic evaluation. Sample output, tables of timings and photographs of workstation screens, oscilloscope traces or circuit boards may be included. Care should be employed to take a professional approach throughout. For example, a graph that does not indicate confidence intervals will generally leave a professional scientist with a negative impression. As with code, voluminous examples of sample output are usually best left to appendices or omitted altogether.
There are some obvious questions which this chapter will address. How many of the original goals were achieved? Were they proved to have been achieved? Did the program, hardware, or theory really work?
Assessors are well aware that large programs will very likely include some residual bugs. It should always be possible to demonstrate that a program works in simple cases and it is instructive to demonstrate how close it is to working in a really ambitious case.
This chapter is likely to be very short and it may well refer back to the Introduction. It might offer a reflection on the lessons learned and explain how you would have planned the project if starting again with the benefit of hindsight.
It is common, but not mandatory, to have a bibliography. Attention should be given to correct and consistent formatting.
It is common, but not mandatory, to have one or more appendices. Assessors like to see some sample code or example circuit diagrams, and appendices are the sensible places to include such items. Accordingly, software and hardware projects should incorporate appropriate appendices. Note that the 12,000 word limit does not include material in the appendices, but only in extremely unusual circumstances may appendices exceed 10-15 pages. If you feel that such unusual circumstances might apply to you you should ask your Director of Studies and Supervisor to discuss this with the Chairman of Examiners. Appendices should appear between the bibliography and the project proposal.
An index is optional.
A copy of the original project proposal must be included at the very end of the dissertation.
Department of Computer Science and Technology University of Cambridge William Gates Building 15 JJ Thomson Avenue Cambridge CB3 0FD
Study here Research News Jobs How to get here About the department
Website privacy policy
© 2024 University of Cambridge
Home > Arts and Sciences > Computer Science > COMPUTERSCIENCEETD
Theses/dissertations from 2024 2024.
Low-Rank Matrix And Tensor Models For Data Science Applications , Jeremy Moulton Myers
Learning-Based Sensing For Solving Health-Related Problems , Minglong Sun
Exploring Transient Execution Vulnerabilities, Side-Channel Attacks, And Defenses , Tao Zhang
Appearance Driven Reflectance Modeling , James Christopher Bieron
Domain-Specific Optimization For Machine Learning System , Yu Chen
Intelligent Software Tooling For Improving Software Development , Nathan Allen Cooper
Amsel Criteria Based Computer Vision For Bacterial Vaginosis Diagnosis , Daniel Edwards Highland
Learning-Based Ubiquitous Sensing For Solving Real-World Problems , Woosub Jung
Recoverable Memory Bank For Class-Incremental Learning , Jiangtao Kong
A Reevaluation Of Why Crypto-Detectors Fail: A Systematic Revaluation Of Cryptographic Misuse Detection Techniques , Scott Marsden
Achieving Real-Time Dnn Execution On Mobile Devices With Compiler Optimizations , Wei Niu
Matfusion: A Generative Diffusion Model For Svbrdf Capture , Samuel Lee Sartor
A Comprehensive Study Of Bills Of Materials For Software Systems , Trevor Stalnaker
Program Analysis For Software Engineers And Students , Jialiang Tan
Efficient Parallelization Of Irregular Applications On Gpu Architectures , Qihan Wang
Exploring Software Licensing Issues Faced By Legal Practitioners , Nathan James Wintersgill
Flexible And Robust Iterative Methods For The Partial Singular Value Decomposition , Steven Goldenberg
Techniques For Accelerating Large-Scale Automata Processing , Hongyuan Liu
Enabling Practical Evaluation Of Privacy Of Commodity-Iot , Sunil Manandhar
Exploring Multi-Level Parallelism For Graph-Based Applications Via Algorithm And System Co-Design , Zhen Peng
Communication And Computation Efficient Deep Learning , Zeyi Tao
Practical Gpgpu Application Resilience Estimation And Fortification , Lishan Yang
On Supporting Android Software Developers And Testers , Carlos Eduardo Bernal Cardenas
Data-Driven Reflectance Estimation Under Natural Lighting , Victoria Cooper
Rethinking Cache Hierarchy And Interconnect Design For Next-Generation Gpus , Mohamed Assem Abd ElMohsen Ibrahim
Low-Overhead Techniques For Secure And Reliable Gpu Computing , Gurunath Kadam
Revisiting Isolation For System Security And Efficiency In The Era Of Internet Of Things , Lele Ma
Epidemic Spread Modeling For Covid-19 Using Hard Data , Anna Schmedding
Performance Optimization With An Integrated View Of Compiler And Application Knowledge , Ruiqin Tian
High-Dimensional Machine Learning Models In Fintech , Qiong Wu
Distributed Byzantine Tolerant Machine Learning , Qi Xia
Combining Performance Profiling And Modeling For Accuracy And Efficiency , Hao Xu
Single Image Direct-Global Illumination Separation , Zhaoliang Duan
Exploring Heterogeneous Architectures With Tools And Applications , Du Shen
Understanding Performance Inefficiencies In Native And Managed Languages , Pengfei Su
Design And Analysis Of Memory Management Techniques For Next-Generation Gpus , Haonan Wang
Dietary Monitoring Through Sensing Mastication Dynamics , Shuangquan Wang
Hardware-Assisted Security Mechanisms On Arm-Based Multi-Core Processors , Shengye Wan
Wearable Technology For Healthcare And Athletic Performance , Amanda Annette Watson
Deep Learning In Software Engineering , Cody Watson
Pinpointing Software Inefficiencies With Profiling , Shasha Wen
Motion Sensors-Based Human Behavior Recognition And Analysis , Hongyang Zhao
On Cross-Series Machine Learning Models , Xiaodan Zhu
Research on Efficiency and Security for Emerging Distributed Applications , Zijiang Hao
On Enhancing Security of Password-Based Authentication , Yue Li
Improving Wifi Sensing And Networking With Channel State Information , Yongsen Ma
GPGPU Reliability Analysis: From Applications to Large Scale Systems , Bin Nie
Learning Code Transformations via Neural Machine Translation , Michele Tufano
Usability, Efficiency and Security of Personal Computing Technologies , Nancy Carter
Investigating Emerging Security Threats in Clouds and Data Centers , Xing Gao
Mixed-Weight Open Locating-Dominating Sets , Robin M. Givens
On Improving (Non)Functional Testing , Qi Luo
Automating Software Development for Mobile Computing Platforms , Kevin Patrick Moran
Exploring New Paradigms for Mobile Edge Computing , Yutao Tang
Assisting Software Developers With License Compliance , Christopher Vendome
Understanding and Enriching Randomness Within Resource-Constrained Devices , Kyle Wallace
Enhancing Usability, Security, and Performance in Mobile Computing , Shanhe Yi
Quantifying and Explaining Causal Effects of World Bank Aid Projects , Jianing Simulation Zhao
On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications , Shuai Hao
Security Enhancements in Voice Over Ip Networks , Seyed Amir Iranmanesh
Automatically Documenting Software Artifacts , Boyang Li
Data-Driven Radiometric Photo-Linearization , Han Li
An Investigation of Power Saving and Privacy Protection on Smartphones , Dachuan Liu
Enhancing Energy Efficiency and Privacy Protection of Smart Devices , Ge Peng
Enhancing Usability and Security through Alternative Authentication Methods , Nicolas Jorge Van Balen
Deep Learning Software Repositories , Martin White
Workload Prediction for Efficient Performance Isolation and System Reliability , Ji Xue
Exploiting Power for Smartphone Security and Privacy , Qing Yang
Enhancing The Sensing Capabilities of Mobile and Embedded Systems , Daniel George Graham
Methods for Estimating The Diagonal of Matrix Functions , Jesse Harrison Laeuchli
Supporting Evolution and Maintenance of android Apps , Mario Linares-Vasquez
The Impact of Surface Normals on Appearance , Kathleen Dorothy Moore
Enhancing Mobile Device System using Information from Users and Upper Layers , Dung Nguyen Tien
Security and Privacy for Ubiquitous Mobile Devices , Edmund Novak
Security Supports for Cyber-Physical System and its Communication Networks , Zhengrui Qin
Rethinking Privacy and Security Mechanisms in Online Social Networks , Xin Ruan
Protecting Web Contents Against Persistent Crawlers , Shengye Wan
Managing Micro Vms in Amazon Ec2 , Jiawei Wen
Algorithms for Large Scale Problems in Eigenvalue and Svd Computations and in Big Data Applications , Lingfei Wu
Investigating Fraudulent and Privacy Activities in Online Business. , Haitao Xu
Understanding Security Threats in Cloud , Zhang Xu
Workload Interleaving with Performance Guarantees in Data Centers , Feng Yan
Configuring and Assembling Information Retrieval based Solutions for Software Engineering Tasks. , Bogdan Dit
Enhancing Bug Reports for Mobile Apps , Kevin Patrick Moran
Providing efficient services for smartphone applications , Yifan Zhang
Enabling Parallel Execution via Principled Speculation. , Zhijia Zhao
Advancing Feedback-Driven Optimization for Modern Computing. , Mingzhou Zhou
Towards Secure, Power-Efficient and Location-Aware Mobile Computing , Hao Han
Studying and Enabling Reuse in android Mobile Apps , andrew Steven Holtzhauer
Effective Resource and Workload Management in Data Centers , Lei Lu
Matching non-uniformity for program optimizations on heterogeneous many-core systems , Bo Wu
Exploiting behavioral biometrics for user security enhancements , Nan Zheng
Real-Time High-Quality Image to Mesh Conversion for Finite Element Simulations , Panagiotis Foteinos
Translating Spatial Problems into Lumpable Markov Chains , Ruth Elizabeth Lamprecht
Tracelab: Reproducing Empirical Software Engineering Research , Evan Alexander Moritz
Network Traffic Aware Smartphone Energy Savings , andrew Joseph Pyles
Improving Security and Privacy in Online Social Networks , Wei Wei
Improving Energy Efficiency and Security for Pervasive Computing Systems , Fengyuan Xu
Detecting Abnormal Behavior in Web Applications , Zi Chu
Information Integration for Software Maintenance and Evolution. , Malcom Bernard Gethers II
Advanced Search
About scholarworks.
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
The following is a list of some of the recently completed CS Masters Theses.
Date | Student | Adviser | Title |
13-Dec-16 | Arpita Banerjee | Eckberg | |
08-Dec-16 | Srilaxmi Kamatam | Eckberg | |
07-Dec-16 | RASHMI AHUJA | Eckberg | |
21-Nov-16 | Prasanthi Kornepati | Eckberg | |
10-Nov-16 | Akshay Jagtap | Eckberg | |
01-Nov-16 | Ranjith Kantamneni | Eckberg | |
28-Oct-16 | Michal Pasamonik | Tarokh | |
27-Oct-16 | Rohit Kulkarni | Eckberg | |
21-Oct-16 | Akhil Gokhale | Eckberg | |
20-Oct-16 | Rituka Tuteja | Eckberg | |
19-Oct-16 | Mayur Jurani | Eckberg | |
18-Oct-16 | Kavish Ghime | Eckberg | |
13-Oct-16 | Rohan Rampuria | Eckberg | |
20-Sep-16 | Ramya Dalapathirao | Eckberg | |
3-Aug-16 | Jeffrey Sadural | Edwards | |
20-Jul-16 | Isha Gautam | Eckberg | |
14-Jul-16 | KIRTI GUPTA | Eckberg | |
5-May-16 | Bavya Kumaresan | Eckberg | |
3-May-16 | Wenjun Zhu | Whitney | |
27-Apr-16 | Savita Patil | Eckberg | |
27-Apr-16 | Samatha Gajula | Whitney | |
27-Apr-16 | Radhika Deshpande | Eckberg | |
26-Apr-16 | Tanishq Chander | Eckberg | |
22-Apr-16 | Bharat Samudrala | Eckberg | |
15-Apr-16 | Umar Quadri | Eckberg | |
14-Apr-16 | Shivangi Pyasi | Eckberg | |
13-Apr-16 | Vivek Shah | Eckberg | |
13-Apr-16 | Nagendra Balachandra | Eckberg | |
8-Apr-16 | Vipin Thakur | Eckberg | |
8-Apr-16 | Deepthi Yaramala | Eckberg | |
6-Apr-16 | Veenu Prajapat | Eckberg | |
6-Apr-16 | Shubha Ravikumar | Eckberg | |
6-Apr-16 | Riddhi Shah | Eckberg | |
6-Apr-16 | Bela Mhasavade | Eckberg | |
23-Mar-16 | Monmita Choudhury | Eckberg | |
23-Mar-16 | Chinnu Chullipparambil | Eckberg | |
22-Mar-16 | Kumar Nishant | Tarokh | |
9-Mar-16 | Preethi Prabhu | Eckberg | |
4-Mar-16 | Vignesh Ramakrishnan | Eckberg | |
3-Mar-16 | Aarti Gokhale | Wang | |
29-Feb-16 | Sunny Jagadeesh (2) | Eckberg | |
18-Feb-16 | Navya Kumar | Wang | |
10-Feb-16 | Satya Vema | Eckberg | |
9-Feb-16 | Saurabh Kalantri | Eckberg | |
8-Feb-16 | Madhura Babu | Eckberg | |
19-Jan-16 | Devang Shah | Eckberg | |
16-Dec-15 | James Bible | Eckberg | |
11-Dec-15 | Pooja Saroha | Eckberg | |
10-Dec-15 | Sunny Jagadeesh (1) | Eckberg | |
10-Dec-15 | Ritu Kamboj | Eckberg | |
10-Dec-15 | Nitish Nalwade | Eckberg | |
9-Dec-15 | Surabhi Anand | Eckberg | |
8-Dec-15 | Julian Raheema | Edwards | |
2-Dec-15 | Rajagopal Vajja | Eckberg | |
30-Nov-15 | SreeLakshmi Reddygari | Eckberg | |
23-Nov-15 | Ramya Nagaraj | Eckberg | |
16-Nov-15 | Shelly Oberoi | Eckberg | |
10-Nov-15 | Ranjana Venkataraman | Eckberg | |
9-Nov-15 | Divyashree Vijaykumar | Eckberg | |
9-Nov-15 | Deepika Urs | Eckberg | |
5-Nov-15 | Vaishnavi Balaji | Wang | |
4-Nov-15 | Anurag Dani | Eckberg | |
30-Oct-15 | Varun Penumalla | Eckberg | |
30-Oct-15 | Rakesh Thakur | Eckberg | |
30-Oct-15 | Pratik Bhatt | Eckberg | |
29-Oct-15 | Pratyusha Uddaraju | Edwards | |
28-Oct-15 | Sunil Kadiwal | Eckberg | |
27-Oct-15 | Bharath Mylarappa | Eckberg | |
26-Oct-15 | Nisha Sharma | Eckberg | |
23-Oct-15 | Sumer Pochi | Eckberg | |
23-Oct-15 | Amol Kawade | Eckberg | |
21-Oct-15 | Naitik Doshi | Eckberg | |
19-Oct-15 | Ting Guo | Vuskovic | |
19-Oct-15 | Sappidi Sowjanya | Eckberg | |
19-Oct-15 | Aditya Kappagantula | Eckberg | |
16-Oct-15 | Parmeet Singh | Eckberg | |
15-Oct-15 | Vedika Jadhav | Eckberg | |
15-Oct-15 | Shailesh Patil | Eckberg | |
13-Oct-15 | Vyshakh Babji | Eckberg | |
7-Oct-15 | Jasika Kamboj | Eckberg | |
7-Oct-15 | Sahil Agarwal | Eckberg | |
6-Oct-15 | Sunil Duddi | Eckberg | |
5-Oct-15 | Joonyoung Yu | Tarokh | |
1-Oct-15 | Priyanka Jadhav | Eckberg | |
1-Oct-15 | Ankit Ahlawat | Eckberg | |
24-Sep-15 | Aditya Nalawade | Eckberg | |
16-Sep-15 | Nikhil Gupta | Eckberg | |
15-Sep-15 | Atiehalsadat Kashanimoghaddam | Ozturk | |
12-Aug-15 | Sivanarayana Gaddam | Vuskovic | |
11-Aug-15 | Dhanya Ramdas | Riggins | |
30-Jun-15 | Nanditha Murthy | Eckberg | |
4-Jun-15 | Rishu Mishra | Stewart | |
14-May-15 | Shankara Meenkeri | Stewart | |
1-May-15 | Artee Dubey | Eckberg | |
20-Apr-15 | Salil Aggarwal | Eckberg | |
10-Apr-15 | Garima Verma | Eckberg | |
9-Apr-15 | Srinidhi Balaram | Eckberg | |
8-Apr-15 | Sumeer Tuli | Eckberg | |
8-Apr-15 | Ashok Ramachandra | Eckberg | |
3-Mar-15 | Sourabh Gupta | Eckberg | |
30-Mar-15 | Ankur Singh | Eckberg | |
20-Mar-15 | Kavya Nagaraja | Eckberg | |
12-Feb-15 | Saran Alla | Eckberg | |
12-Feb-15 | Ashwin Thilakkumar | Eckberg | |
11-Feb-15 | Sarfaraz Haque | Eckberg | |
11-Feb-15 | Anshul Gupta | Eckberg | |
26-Jan-15 | Swathi Mannepalli | Eckberg | |
15-Dec-14 | Harjinder Singh | Eckberg | |
04-Dec-14 | SHIVAM DIXIT | Eckberg | |
02-Dec-14 | Matthew Shaw | Edwards | |
25-Nov-14 | Sanket Shah | Eckberg | |
19-Nov-14 | Anupama Ranebennur | Eckberg | |
17-Nov-14 | Sudhir Phophaliya | Eckberg | |
17-Nov-14 | Mukesh Oberoi | Eckberg | |
13-Nov-14 | Swathi Artham | Eckberg | |
12-Nov-14 | Vigya Lnu | Tarokh | |
12-Nov-14 | Pradeep Rana | Eckberg | |
10-Nov-14 | Ashish Konda | Eckberg | |
09-Nov-14 | Saumya Sharma | Eckberg | |
06-Nov-14 | Devi Pakala | Eckberg | |
05-Nov-14 | Vaishnavi Srinivasan | Eckberg | |
05-Nov-14 | Bharath Prakash | Eckberg | |
31-Oct-14 | Rahul Swamy | Eckberg | |
30-Oct-14 | Varsha Kota | Eckberg | |
30-Oct-14 | KanakaNethra RajahNagarajasetty | Eckberg | |
30-Oct-14 | Amruta Gaikwad | Eckberg | |
29-Oct-14 | Atul Khaire | Eckberg | |
24-Oct-14 | Priya Jayaprakash | Whitney | |
24-Oct-14 | Likhita Gonchikara | Eckberg | |
22-Oct-14 | Akshay Manathkar | Eckberg | |
21-Oct-14 | Dipal Kashipara | Eckberg | |
15-Oct-14 | Ravikanth Boppidi | Eckberg | |
02-Oct-14 | Dharmendhar Pulakunta | Eckberg | |
30-Sep-14 | AMAN GHEI | Eckberg | |
22-Sep-14 | SHRUTHI SRIKANTAIAH | Eckberg | |
28-Aug-14 | Hoda Sayyadinejad | Whitney | |
22-Aug-14 | MOUMITA CHATTERJEE | Eckberg | |
12-Aug-14 | Xiaobin Zhang | Tarokh | |
17-Jul-14 | Bhakta Shardul | Eckberg | |
11-Jun-14 | Simmerdeep Singh | Lewis | |
15-May-14 | Richard Vu | Tarokh | |
14-May-14 | Suchismita Subudhi | Eckberg | |
14-May-14 | Chintal Vashi | Whitney | |
13-May-14 | Deepika Srinath | Eckberg | |
02-May-14 | Saifuddin Tariwala | Eckberg | |
02-May-14 | Nachiket Tanksale | Eckberg | |
01-May-14 | Abhishikta Vaddineni | Whitney | |
24-Apr-14 | Sandeep Muddam | Eckberg | |
23-Apr-14 | Chetan Rokhade | Root | |
17-Apr-14 | Vijaya Bylaiah | Eckberg | |
15-Apr-14 | Ketaki Raste | Eckberg | Big Data Analytics – Hadoop Performance Analysis |
14-Apr-14 | Rashmi Dahasahasra | Root | |
14-Apr-14 | Isilay Dural | Eckberg | |
09-Apr-14 | Sameer Kathawate | Eckberg | |
27-Mar-14 | Samia Fatima | Eckberg | |
27-Mar-14 | Pallavi Mokashi | Eckberg | |
25-Mar-14 | Sushruth Chandrashekar | Eckberg | |
24-Mar-14 | Nomitha Mudireddy | Eckberg | |
24-Mar-14 | DEBOSHREE SARKAR | Riggins | |
20-Mar-14 | Manasa Rao | Eckberg | |
12-Mar-14 | Aarthie Murugavel | Root | |
21-Feb-14 | Cailiang Xu | Xie | |
27-Nov-13 | Mahmood Contractor | Eckberg | |
27-Nov-13 | Luma Zakaria | Eckberg | |
20-Nov-13 | Varun Jayakumar | Eckberg | |
20-Nov-13 | Vanya Goel | Riggins | |
20-Nov-13 | Abhiraj Pande | Eckberg | |
13-Nov-13 | Srivenkata Gantikota | Eckberg | |
08-Nov-13 | Kuang Yao | Lewis | |
13-Nov-13 | Mini Pillai | Eckberg | |
07-Nov-13 | Aditi Akalkotkar | Eckberg | |
31-Oct-13 | Krishan Sharma | Eckberg | |
29-Oct-13 | Megha Shaseendran | Stewart | |
23-Oct-13 | Shruthi Rao | Eckberg | |
10-Oct-13 | Rima Soury | Xie | |
09-Oct-13 | Shreyas Diwan | Eckberg | |
08-Oct-13 | Kishore Reddy | Eckberg | |
03-Oct-13 | Lakshmi Vijayachandran | Eckberg | |
22-Aug-13 | Swati Patel | Eckberg | |
06-Aug-13 | Ankur Bhattacharjee | Eckberg | |
05-Aug-13 | Shruti Mahajan | Tarokh | |
02-Jul-13 | Anisha Santharam | Eckberg | |
20-May-13 | Johanna Stinner-Sloan | Roch | |
16-May-13 | Atul Vijayakumar | Lewis | |
15-May-13 | Leslie Viviani | Lewis | |
9-May-13 | Priyanka Angolkar | Eckberg | |
8-May-13 | Prashasti Gehalot | Riggins | |
8-May-13 | Aparna Ghate | Eckberg | |
30-Apr-13 | Sadana Borra | Eckberg | |
30-Apr-13 | Aditi Singh | Lewis |
|
18-Apr-13 | Andrew Luxner | Edwards | |
18-Apr-13 | Anal Surti | Eckberg | |
17-Apr-13 | Lavanya Vangalkrishnakumar | Eckberg | |
17-Apr-13 | Kevin Leake | Lewis | |
15-Apr-13 | Ranjitha Shenoy | Tarokh | |
9-Apr-13 | Hitesh Chaudhary | Lewis | |
29-Mar-13 | Ashish Tandel | Tarokh | |
28-Mar-13 | Kusuma Devanga | Eckberg |
|
28-Mar-13 | Akin Gursel | Eckberg |
|
27-Mar-13 | Sudeshna Mukherjee | Eckberg |
|
20-Mar-13 | Vikram Ramanna | Sarkar |
|
4-Mar-13 | Vikas Sharma | Lewis |
|
25-Feb-13 | Kanika Maheshwari | Eckberg |
|
20-Feb-13 | Aseem Chaudhary | Eckberg |
|
7-Jan-13 | Swathi Simmula | Lewis |
|
19-Dec-12 | Smita Digambar More | Thomas |
|
12-Dec-12 | John Stronks | Lewis |
|
11-Dec-12 | Sukhdeep Kaur | Lewis |
|
10-Dec-12 | Rama Bandi | Vuskovic |
|
7-Dec-12 | Melroy D’Monty | Eckberg |
|
6-Dec-12 | Angad Manchanda | Interlando |
|
21-Nov-12 | Sirisha Jonnalagadda | Eckberg |
|
20-Nov-12 | Deepika Agarwal | Eckberg |
|
19-Nov-12 | Sheridan Wright | Edwards |
|
14-Nov-12 | Aruna Alluri | Whitney |
|
9-Nov-12 | Ravish Thakor | Marovac |
|
9-Nov-12 | Park Patel | Marovac |
|
9-Nov-12 | Aesha Thakkar | Marovac | By Third Party Authentication Server |
7-Nov-12 | Namrata Garach | Whitney |
|
6-Nov-12 | Shrutika Sutar | Eckberg |
|
5-Nov-12 | Monica Maleyanda | Eckberg |
|
31-Oct-12 | Steven Williams | Edwards |
|
25-Oct-12 | Varun Jaiswal | Lewis |
|
25-Oct-12 | Shreyas Shah | Lewis |
|
25-Oct-12 | Pratibha Atri | Eckberg |
|
24-Oct-12 | Xinhua Fahy | Xie |
|
24-Oct-12 | Sridattateja Karna | Walsh |
|
24-Oct-12 | Kashyap Ivaturi | Eckberg |
|
23-Oct-12 | Dilpreet Sandhu | Eckberg |
|
19-Oct-12 | Tejpreet Sempla | Lewis |
|
12-Oct-12 | Sudeep Sen | Lewis |
|
12-Oct-12 | Manoj Raskar | Lewis |
|
12-Oct-12 | Arvind Morwal | Lewis |
|
11-Oct-12 | Preetam Borah | Lewis | Implementation of DTW Algorithm for Application Security |
5-Oct-12 | Ankit Patel | Eckberg | For Smartphone Applications |
27-Sep-12 | Yunita | Bhattacharjee | For an AJAX Based Course Management System |
18-Sep-12 | Aditi Laddha | Eckberg |
|
15-Aug-12 | Santosh Dantuluri | Eckberg |
|
14-Aug-12 | Tushar Jadhav | Lewis |
|
13-Aug-12 | Monal Doctor | Eckberg |
|
9-Aug-12 | Parita Shah | Eckberg |
|
3-Aug-12 | Nilay Jani | Lewis |
|
1-Aug-12 | Rima Shah | Riggins |
|
31-Jul-12 | Gaurav Sharma | Eckberg |
|
10-Jul-12 | Bhavana Raghupathi | Eckberg |
|
10-Jul-12 | Paola Alvarez | Eckberg |
|
3-Jul-12 | Karuna Hotlani | Eckberg |
|
3-Jul-12 | Rahul Chaturvedi | Eckberg |
|
27-Jun-12 | Fnu Sourabh | Stewart | Tidal Forces Using XNA Programming Framework |
26-Jun-12 | Achal Shah | Lewis |
|
20-Jun-12 | Uma Kunapareddy | Lewis |
|
19-Jun-12 | Reema Shah | Eckberg | |
24-May-12 | Hetang Shah | Thomas | |
23-May-12 | Anirudh Garg | Lewis | |
23-May-12 | Devang Patel | Lewis | |
21-May-12 | Haofei Fang | Vuskovic | |
14-May-12 | Xiaohui Zeng | Eckberg | |
14-May-12 | Mithun Nanjegowda | Lewis | |
10-May-12 | Chetan Gowda | Eckberg | |
10-May-12 | Sunil Ramachandra | Eckberg | |
8-May-12 | Sarath Keerthipati | Eckberg | |
8-May-12 | Anand Bikkavilli | Eckberg | |
7-May-12 | Abhinav Dhiman | Lewis | |
7-May-12 | Sunanda Komaragiri | Lewis | |
3-May-12 | Chatura Ettigi | Lewis | |
2-May-12 | Vinay Polisetty | Lewis | |
1-May-12 | Zarana Patel | Lewis | |
27-Apr-12 | Pratima Pillarisetti | Root | |
24-Apr-12 | Sunjna Kashyap | Lewis | |
24-Apr-12 | Chaitanya Deosthale | Lewis | |
23-Apr-12 | Mohit Joshi | Lewis | |
20-Apr-12 | Vincent Stanley Dayes | Root | |
20-Apr-12 | Brian Blaine | Tarokh | |
12-Apr-12 | Rajkumar Thulasimani | Lewis | |
12-Apr-12 | Darshini Rathod | Lewis | |
11-Apr-12 | Mehul Shah | Lewis | |
10-Apr-12 | ANJALI MATHUR | Eckberg | |
4-Apr-12 | Tushar Nimbalkar | Riggins | |
2-Apr-12 | Xinhua Fahy | Xie | |
2-Apr-12 | Thomas Drudge | Valafar | |
29-Mar-12 | Prashant Dikshit | Eckberg | |
22-Mar-12 | NEHA BANSAL | Riggins | |
20-Mar-12 | Hiral Patel | Marovac | |
20-Mar-12 | Honey Walia | Beck | |
20-Mar-12 | Abhishek Sood | Stewart | |
19-Mar-12 | Avinash Vadi | Tarokh | |
19-Mar-12 | Mirza Mohammed Akram Baig | Riggins | |
12-Mar-12 | Lantian Gai | Xie | |
28-Feb-12 | Sonia Patel | Eckberg | |
21-Feb-12 | Shamal Matty | Eckberg | |
20-Feb-12 | Deepa Gopal | Bhattacharjee | |
27-Jan-12 | Daniel Bolton | Whitney | |
20-Dec-11 | Ashish Gupta | Xie | |
15-Dec-11 | Chaitra Jayaram Manjunath | Eckberg | |
15-Dec-11 | Tarini Shah | Eckberg | |
14-Dec-11 | Dravya Nataraj | Eckberg | |
8-Dec-11 | Kazi Tulip | Bhattacharjee | |
8-Dec-11 | Prashanth Govindaraj | Lewis | |
29-Nov-11 | MITHUN RANGANATH | Eckberg | |
28-Nov-11 | Sri Tulasi Peddola | Lewis | |
17-Nov-11 | Kejue Jia | Donald | |
17-Nov-11 | SACHIN JAIN | Eckberg | |
16-Nov-11 | Vivek Shah | Eckberg | |
15-Nov-11 | Davinderpaul Makkar | Lewis | |
14-Nov-11 | William King | Vuskovic | |
7-Nov-11 | Robert Rota | Lewis | |
31-Oct-11 | Rohit Gupta | Eckberg | |
31-Oct-11 | Rakhi Harkawat | Eckberg | |
28-Oct-11 | Yashodhar Patel | Lewis | |
28-Oct-11 | Abdul Abdurrab | Xie | |
27-Oct-11 | Sunil Lakhiyani | Lewis | |
27-Oct-11 | Swapnil Devikar | Lewis | |
25-Oct-11 | Swagath Manda | Eckberg | |
25-Oct-11 | Krithika Mathivanan | Eckberg | |
20-Oct-11 | Siva Krishna Hari | Bhattacharjee | |
19-Oct-11 | Ashwini Govindagoudar | Eckberg | |
10-Oct-11 | RACHANA BEDEKAR | Eckberg | |
10-Oct-11 | Pooja Shah | Eckberg | |
10-Oct-11 | Ravali Yadavalli | Eckberg | |
6-Oct-11 | Vivek Sachdeva | Eckberg | |
3-Oct-11 | Shah Sudhirbhai | Eckberg | |
22-Sep-11 | Adarsh Joshi | Lewis | |
22-Sep-11 | Arvind Karanam | Lewis | |
16-Sep-11 | Sathyanarayan Chandrashekar | Stewart | |
15-Sep-11 | Vinita Kondhalkar | Lewis | |
31-Aug-11 | Jimmie Dixon | Edwards | |
30-Aug-11 | Jonathan Tjioe | Xie | |
25-Aug-11 | CHANDRA GOPALAIAH | Eckberg |
By Issue Date Names Titles Subjects Classification Type Funder
Search within this collection:
All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems engineering, and human computer interaction.
For more information please visit the School of Computer science home page.
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Model agnostic interpretability , enhancing privacy for secure internet communications using ilnp , processing clinical guideline text for formal verification , automatic evaluation of geopolitical risk , automating inventory composition management for bulk purchasing cloud brokerage strategy .
No notifications.
Computer science is the study of computer systems, computing technologies, data, data structures and algorithms. Computer science provides essential skills and knowledge for a wide range of computing and computer-related professions.
View All Dissertation Examples
Including full dissertations, proposals, individual dissertation chapters, and study guides for students working on their undergraduate or masters dissertation.
Dissertation Examples
A tool is developed to retrieve the tweets from Twitter using generic terms used in discussion for a disease selected....
Last modified: 1st Mar 2022
In this paper, we propose a multi-layer neural network classifier to detect falsified reports in cooperative spectrum sensing....
Last modified: 23rd Feb 2022
This paper studies possible differences between GUI testing and system testing experimentally. Specifically, we selected a SUT equipped with system tests that directly exercise the application code....
Last modified: 21st Feb 2022
Localization approaches in general require inputs from multiple sensors and a solid data fusion technique in order to achieve accurate results....
Last modified: 18th Feb 2022
This project presents the development of an algorithm for radar pulse signal acquisition and parameters interception. Radar pulse parameters extraction is an important processing stage in the electronic warfare (EW) receivers....
Last modified: 11th Jan 2022
The impacts of cloud integration warrant a careful analysis by an organization before implementation. An introduction of a disruptive technology such as cloud computing can make both definition and documentation of services, policies, and procedures unclear in a given environment....
The major purpose of this dissertation is to focus on developing a tool which detects multiple code smells and provide refactoring solutions to the code using design patterns. ...
Last modified: 30th Dec 2021
Dissertation Proposals
Automatic Sign Language recognition system could benefit millions of hearing-impaired people to communicate with the world more efficiently. This project aims to review past research in the field and apply a new technique for solving this problem....
Last modified: 21st Dec 2021
The main objective of the digital clock is to display the time digitally using 7-segment display on Artix-7 FPGA Board....
Last modified: 3rd Dec 2021
Example Research Proposals
The objective of this research is to detect hate speech on social media. For this research we created a data set collecting data from twitter....
Last modified: 1st Dec 2021
This paper sought to define the concepts of object oriented techniques in addition with the OO issues, development techniques and concepts of object oriented programming....
Last modified: 29th Nov 2021
This project is designed to use OCR to classify and identify a scanned image containing Arabic characters using two pace approaches....
Dissertation Introductions
Introduction to a dissertation aiming to reduce the research gap by developing fast, scalable iterative clustering algorithms that converges faster having higher performance with better accuracy and reduced error rate....
Last modified: 26th Nov 2021
The objective of this paper is to build a wireless gesture control robot using Arduino, accelerometer, RF transmitter and receiver module....
Last modified: 19th Nov 2021
This project aims to provide a solution based on whether implementing penetration testing tools; downloaded from third-party software can have the least issues by evaluating how we can test either of two web servers, such as Apache and IIS....
Last modified: 15th Nov 2021
This project will aim to develop a prototype Android application which will implement real-time object detection with semantic segmentation using a trained and quantized custom deep learning algorithm on the live streaming image frames receiving from the device camera....
Last modified: 10th Nov 2021
In this paper, we propose an unsupervised method which learns low-dimensional continuous vectors for transactions based on information of both singleton items and FIs....
Last modified: 25th Oct 2021
This research centres on the design and implementation of Student Project Allocation for monitoring duplication in the department of computer science at a university....
Last modified: 22nd Oct 2021
Introduction to a study which aims to compare and contrast various classification data mining algorithm techniques, as well as different feature selection scenarios....
In my task I proposed a machine learning technique for providing the solution to a Sudoku puzzle. The solver is equipped for solving the puzzle from a picture caught from any advanced camera....
The aim is to utilize the concept of machine learning and to build a model using ensemble algorithm which can be trained efficiently to detect malwares in a system....
Online opinion spamming has become a potential threat widespread. In this research project we focus on detecting the businesses that are affected by opinion spamming over time....
Last modified: 20th Oct 2021
The aim of this project is to create a user application which can map the optimum route from between multiple locations, for example, A to B then B to C using a combination of ‘Shortest Path Algorithms’ and ‘Big Data’ analytics....
Last modified: 13th Oct 2021
Removal of redundant dimensions to find clusters in N-Dimensional Data using subspace clustering....
Last modified: 7th Oct 2021
The purpose of this study is to identify whether management working in a head office are convinced about the performance appraisal system of the company....
Find dissertations and theses.
Library Database:
Free Resources:
Select Library Titles
Harvard University Digital Accessibility Policy
IMAGES
VIDEO
COMMENTS
Theses/Dissertations from 2019. PDF. A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games, Naif Saeed Alzahrani (Dissertation) PDF. Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely (Thesis) PDF.
Theses/Dissertations from 2020 PDF. Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network, Rupal Agarwal. PDF. Keyless Anti-Jamming Communication via Randomized DSSS, Ahmad Alagil. PDF. Active Deep Learning Method to Automate Unbiased Stereology Cell Counting, Saeed Alahmari ...
Theses and dissertations published by graduate students in the Department of Computer Science, College of Sciences, Old Dominion University, since Fall 2016 are available in this collection. Backfiles of all dissertations (and some theses) have also been added. In late Fall 2025, all theses will be digitized and available here.
Theses/Dissertations from 2024 PDF. Extracting Social Network Model Parameters from Social Science Literature, Isaac Batts. PDF. LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS, Shashank Gupta. PDF
Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF.
di er. This thesis focuses on an extreme version of this brittleness, adversarial examples, where even imperceptible (but carefully constructed) changes break ML models. Progress on this widely-studied topic has been limited by the following critical roadblocks which we address in this thesis. Challenge 1: Worst-case evaluation with guarantees.
CSSA Sample PhD proposals. Purpose. Welcome to the on-line version of the UNC dissertation proposal collection. The purpose of this collection is to provide examples of proposals for those of you who are thinking of writing a proposal of your own. I hope that this on-line collection proves to be more difficult to misplace than the physical ...
Computer Vision in Adverse Conditions: Small Objects, Low-Resoltuion Images, and Edge Deployment, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong
Theses/Dissertations from 2013. Alsafeer software for teaching computer literacy, Zieb Rabie Alqahtani. Wireless electronic scoring of kendo competition matches using an embedded system, Edward B. Hogan. Using phishing to test social engineering awareness of financial employees, Rebecca M. Long.
make the notation, terminology, and style consistent throughout. do keep good ideas, text, and results from your previous papers (giving credit to any co-authors) expand the text. make the text clearer, more tutorial, and more thoughtful. add more examples and intuitions to help the reader.
Suggested Order For Writing: The easiest way to build a dissertation is inside-out. Begin by writing the chapters that describe your research (3, 4, and 5 in the above outline). Collect terms as they arise and keep a definition for each. Define each technical term, even if you use it in a conventional manner.
The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...
In this thesis, we explore the use of deep-learning-based computer vision tools to automate these labor-intensive tasks. The motivation for this work is not only to accelerate established, low-throughput processes in clinical and research practice, but also to expand the qualitative toolset available to researchers to help them conceptualize ...
Executable Examples: Empowering Students to Hone Their Problem Comprehension (2.4 MB) • Shriram Krishnamurthi, advisor Yang, Fumeng Fusing visualization, virtual reality, and vision science for scientific thinking (16.0 MB) • David Laidlaw, advisor 2021 Agarwal, Archita Encrypted Distributed Storage Systems (2.3 MB) • Seny Kamara, advisor
Over 5 million dissertations and theses available in OCLC member libraries. Many theses are available electronically, at no charge, directly from the publishing institution. UCLA students, faculty, and staff can request non-UCLA dissertations via interlibrary loan. Center for Research Libraries (CRL) Foreign Dissertations.
School of Computer Science. Projects which attained grades of over 70 or between 60 and 69 are indicated on the lists (accessible only by students and staff registered with School of Computer Science, when on campus). School of Computer Science examples. School of Electronic and Electrical Engineering
The Dissertation. The dissertation should be written for a technically competent reader who is not necessarily familiar with the particular aspects of Computer Science involved. Better grades will arise from clarity and ease of reading, good pictures, clear explanation, minimal jargon and appropriate use of equations.
epicconfigurator computer configurator and cms platform, ivo a. tantamango PDF STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao
Theses/Dissertations from 2021. On Supporting Android Software Developers And Testers, Carlos Eduardo Bernal Cardenas. Data-Driven Reflectance Estimation Under Natural Lighting, Victoria Cooper. Rethinking Cache Hierarchy And Interconnect Design For Next-Generation Gpus, Mohamed Assem Abd ElMohsen Ibrahim.
04-Dec-14. SHIVAM DIXIT. Eckberg. Comprehensive Web Application for CITER (Center of Industrial Training and Engineering Research) 02-Dec-14. Matthew Shaw. Edwards. K-Means Clustering with Automatic Determination of K Using a Multi-Objective Genetic Algorithm with Applications to Microarray Gene Expression Data.
All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems ...
Dissertations on Computer Science. Computer science is the study of computer systems, computing technologies, data, data structures and algorithms. ... Dissertation Examples. The aim of this project is to create a user application which can map the optimum route from between multiple locations, for example, A to B then B to C using a ...
How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...
Published example with Co-Chairs. NOTES: No affiliation for CMU faculty ... Thesis Summary of 350 words or less, describing the thesis. This can be provided as email body content or text attachment (.txt) and is utilized for your talk announcements. ... Computer Science Department. Carnegie Mellon University. 5000 Forbes Avenue. Pittsburgh, PA ...