EWU Digital Commons

Home > College, Department, or Program > CSTEM > Computer Science > Theses

Computer Science Masters Thesis Collection

Theses/dissertations from 2023 2023.

A hierarchical approach to improve the ant colony optimization algorith , Bryan J. Fischer

From Tic-tac-toe to AlphaGo: a survey of algorithms used in various games , Mathew T. Godon

Temporally consistent FastDVDNet: an overlap loss implementation for FastDVDNet , Michael J. Henderson

Multimodal game-based learning in Post-Secondary Education , Nathan A. Vanos

Theses/Dissertations from 2022 2022

Towards Cloud-Based cost-effective serverless information system , Isaac C. Angle

Modeling document classification to automate mental health diagnosis , William M. Tadlock

Theses/Dissertations from 2021 2021

Password-less two-factor authentication using scannable barcodes on a mobile device , Grant M. Callant II

Intrusion detection for industrial control systems , Kurt Lamon

Theses/Dissertations from 2020 2020

Data entry voice assistant for healthcare providers , Sajad Hussain M Alhamada

Comparison of the tally numbering system to traditional arithmetic systems in field programmable gate arrays , Robert Paul Shredow

Using Blockchain for Digital Card Game , Raymond A. Swannack

Theses/Dissertations from 2019 2019

Relaxed mental state detection using the Emotiv Epoc and Adaptive Threshold Algorithms , Olin L. Anderson

Detecting and mapping real-time Influenza-like illness using Twitter stream data , Elisha D. Brunette

The application of cloud resources to terrain data visualization , Gregory J. Larrick

Theses/Dissertations from 2018 2018

A practical and efficient algorithm for the k-mismatch shortest unique substring finding problem , Daniel Robert Allen

DETERMINING VULNERABILITY USING ATTACK GRAPHS: AN EXPANSION OF THE CURRENT FAIR MODEL , Beth M. Anderson

The application of GPU to molecular communication studies , Tobias J. Cain

Improving Aerial Package Delivery Through Simulation of Hazard Detection, Mapping, and Regulatory Compliance , Kevin Chumbley

GPU accelerated risk quantification , Forrest L. Ireland

Evaluating a Cluster of Low-Power ARM64 Single-Board Computers with MapReduce , Daniel McDermott

Glyph based segmentation of Chinese calligraphy characters in the "Collected Characters" stele. , David A. McInnis

Theses/Dissertations from 2017 2017

CLOUD LIVE VIDEO TRANSFER , Ryan Babcock

GENE EXPRESSION PROSPECTIVE SIMULATION AND ANALYSIS USING DATA MINING AND IMMERSIVE VIRTUAL REALITY VISUALIZATION , Joshua Cotes

Theses/Dissertations from 2016 2016

Near real-time early cancer detection using a graphics processing unit , Jason Helms

Analysis of algorithms to create profitable trades in the stock market , Nicholas P. Klinger

Dynamically parallel CAMSHIFT: GPU accelerated object tracking in digital video , Matthew J. Perry

USING CONVOLUTIONAL NEURAL NETWORKS FOR FINE GRAINED IMAGECLASSIFICATION OF ACUTE LYMPHOBLASTIC LEUKEMIA , Richard K. Sipes

Character extraction from ancient Chinese stele using discrete cosine transform , Toshiaki Ueno

Theses/Dissertations from 2015 2015

ECS: Educational Communication System , Nasmah Alnaimi

The geo-secure system: a secure system for data access based on geographical data , Fawaz J. Alruwaili

Heartbeat location assistance for electrocardiograms , Sarah Bass

Indirect association rule mining for crime data analysis , Riley Englin

Modeling and rendering of fluid flows using the Lennard-Jones potential , Nicholas J. LeFave

Multi-drug association rule mining on graphics processing unit , Jesse Scholer

Theses/Dissertations from 2014 2014

A study of kNN using ICU multivariate time series data , Admir Djulovic

Artificial Frequency Match Neuron Implemented with Digital Logic , David J. Ellis

Bridging the detection gap: a study on a behavior-based approach using malware techniques , Geancarlo Palavicini

3D Image Acquisition System for Facial Recognition , James E. Pearson

Divide and Conquer G-Buffer Ray Tracing , Daniel Stokes

Improving the performance of skeletal mesh animations in the Blender game engine , Mitchell Stokes

MINING MULTI-GRANULAR MULTIVARIATE MEDICAL MEASUREMENTS , Conrad Sykes

Theses/Dissertations from 2013 2013

Alsafeer software for teaching computer literacy , Zieb Rabie Alqahtani

Wireless electronic scoring of kendo competition matches using an embedded system , Edward B. Hogan

Using phishing to test social engineering awareness of financial employees , Rebecca M. Long

GPU ray tracing with CUDA , Thomas A. Pitkin

Ray traced rendering using GPGPU devices , Coby Soss

Theses/Dissertations from 2012 2012

Windows security sandbox framework , Kyle P. Gwinnup

Micro unmanned aerial vehicle video surveillance platform quadrocopter aircraft , Michael John Skadan

WiFiPoz -- an accurate indoor positioning system , Xiaoyi Ye

SSVEP-based brain computer interface using the Emotiv EPOC , Brian J. Zier

Theses/Dissertations from 2010 2010

Bittorrent vulnerable to layer-7 packet injection , Stephen L. Heath

Masquerade detection using fortified naive Bayes , Eric Salsbury

Theses/Dissertations from 2009 2009

Raising security awareness among higher education recipients , Chun-I Lin

On refactoring , Kaleb P. Pederson

Word prediction in assistive technologies for Aphasia rehabilitation in using Systemic Functional Grammar , Christopher T. Sorna

Novel visualization scheme for reasoning with uncertainty , Kyle A. Springer

Theses/Dissertations from 2008 2008

Tor latency attach verification and analysis , Ronnie Hoeflin

GPU programming: developing realistic water effects with OpenGL and GLSL , Joshua G. Slider

Theses/Dissertations from 2006 2006

Visualization of logic programming , Michael D. Henry

Theses/Dissertations from 2005 2005

Construction of efficient indexes from Fuzzy Clusters: preliminary study , Sean M. Drexler

Navigation agents and traffic simulation , Bart Hunking

Web-based fuzzy expert system: EWU optimal advisor , Nasser A. Rafi

Theses/Dissertations from 2003 2003

Intrusion detection, intelligent agents, and soft computing , Patrick Miller

Source code security analysis and fuzzy logic , Alexander Moskalyuk

Theses/Dissertations from 2002 2002

Support vector machines, N-gram kernels, and text classification , John Mill

Theses/Dissertations from 2001 2001

Solid object model advanced operations , Robert L. Throop

Theses/Dissertations from 2000 2000

Interactive 3D model display in Java 3D , Keqiu Chen

Theses/Dissertations from 1998 1998

Subdivision, and rfefinement of non-uniform rational B-spline curves and surfaces in 3-D , Bill E. La Rue

Theses/Dissertations from 1995 1995

A transputer based prototype for a fuzzy logic controller with tuning and simulation capabilities , Marshall Ryan Weddle

Theses/Dissertations from 1994 1994

Visualizing medical data using direct volume rendering , Bryce R. Hein

Industrial control via a state language implementation on the transputer architecture , Ted Preston VanderWeyst

A cellular method for modeling solid features in volume data , Jeff Wolkenhauer

Theses/Dissertations from 1993 1993

Hybrid coding with enhanced RDC and Huffman compression algorithms , Wilhelm J. Jenner

Implementation of a digital control system analysis program using the z-transform , Kristine L. Rudin

Subtyping and inheritance in a metamodel of abstractions , Gavin Vess

Theses/Dissertations from 1992 1992

Left ventricular boundary detection in digitized cardiac images , Albertine L. Marie Alm

High level user interface for a parallel operating system , Terry Conkright

Hybrid dictionary/statistical text compression algorithms , Michael E. Piotrowski

A study of using backpropagation and a new neural net algorithm for edge detecting in binary images , Jun Tian

Theses/Dissertations from 1990 1990

Visual parallel programming via petri nets , David Glenn Passey

Theses/Dissertations from 1988 1988

An iconic approach to parallel design , Elizabeth Stevens

Theses/Dissertations from 1986 1986

Conversion form structured programming to an object-oriented programming structure , Daryl Edward Krauter

Advanced Search

  • Notify me via email or RSS
  • Colleges, Departments, and Programs
  • Disciplines

Author Corner

  • EWU Libraries
  • Contact EWU Libraries

509.359.7888 | Email

Home | About | FAQ | My Account | Contact | Accessibility | EWU Libraries | EWU Home

Privacy Copyright

ScholarWorks

Home > Engineering > Computer Science > Computer Science Graduate Projects

Computer Science Graduate Projects and Theses

Theses/dissertations from 2023 2023.

High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal

Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan

Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah

Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker

Fake News Detection Using Narrative Content and Discourse , Hongmin Kim

Anomaly Detection Using Graph Neural Network , Bishal Lakha

Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola

Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George

Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten

Theses/Dissertations from 2022 2022

Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck

Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones

Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi

Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee

Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn

Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy

Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane

Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda

Hate Speech Detection Using Textual and User Features , Rohan Raut

Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib

Characterization and Mitigation of False Information on the Web , Anu Shrestha

Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez

Theses/Dissertations from 2021 2021

Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen

Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar

Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green

Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz

Modeling Real and Fake News Sharing in Social Networks , Abishai Joy

Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy

Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton

Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts

A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar

Actors for the Internet of Things , Arjun Shukla

Theses/Dissertations from 2020 2020

Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black

Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke

Polyhedral+Dataflow Graphs , Eddie C. Davis

Improving Spellchecking for Children: Correction and Design , Brody Downs

A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake

Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung

Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi

Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi

Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill

Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin

Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli

A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips

Theses/Dissertations from 2019 2019

Edge-Assisted Workload-Aware Image Processing System , Anil Acharya

MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick

Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman

Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas

A Hybrid Model to Detect Fake News , Indhumathi Gurunathan

Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris

UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani

Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh

Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar

Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan

Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo

Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury

Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya

BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran

FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota

Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader

Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla

Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian

Theses/Dissertations from 2018 2018

Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya

Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah

Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri

Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour

Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha

Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton

Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira

Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa

Theses/Dissertations from 2017 2017

Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella

Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli

CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly

Predicting Friendship Strength in Facebook , Nitish Dhakal

Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi

Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley

Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala

Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes

A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal

Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki

Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li

The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship

Towards Automatic Repair of XACML Policies , Shuai Peng

Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma

Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez

Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright

Theses/Dissertations from 2016 2016

Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.

When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic

Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh

Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt

Towards Multipurpose Readability Assessment , Ion Madrazo

Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson

CEST: City Event Summarization using Twitter , Deepa Mallela

Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami

Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas

Massively Parallel Algorithm for Solving the Eikonal Equation on Multiple Accelerator Platforms , Anup Shrestha

A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption , Srisarguru Sridhar

Dynamic Machine Level Resource Allocation to Improve Tasking Performance Across Multiple Processes , Richard Walter Thatcher

Theses/Dissertations from 2015 2015

Developing an Application for Evolutionary Search for Computational Models of Cellular Development , Nicolas Scott Cornia

Accelerated Radar Signal Processing in Large Geophysical Datasets , Ravi Preesha Geetha

Integrity Coded Databases (ICDB) – Protecting Integrity for Outsourced Databases , Archana Nanjundarao

  • Collections
  • Disciplines
  • SelectedWorks Gallery
  • Albertsons Library
  • Division of Research
  • Graduate College

Advanced Search

  • Notify me via email or RSS

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Scholars' Mine

Home > Computer Science > CompSci TDs > Masters Theses

Computer Science Masters Theses

Theses from 2024 2024.

Enabling smart healthcare applications through visible light communication networks , Jack Manhardt

Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan

Theses from 2023 2023

DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula

MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric

COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara

Theses from 2022 2022

Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga

Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong

Theses from 2021 2021

Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II

Theses from 2020 2020

On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu

Theses from 2019 2019

Advanced techniques for improving canonical genetic programming , Adam Tyler Harter

Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter

Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam

Theses from 2018 2018

Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin

CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush

Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani

Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa

Solidification rate detection through solid-liquid interface tracking , Wei Luo

Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham

Cyber-physical security of an electric microgrid , Prashanth Palaniswamy

An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla

Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy

Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti

A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang

Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang

Theses from 2017 2017

Cyber-physical security of a chemical plant , Prakash Rao Dunaka

UFace: Your universal password no one can see , Nicholas Steven Hilbert

Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco

Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti

Personalizing education with algorithmic course selection , Tyler Morrow

Decodable network coding in wireless network , Junwei Su

Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla

Theses from 2016 2016

Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar

Theses from 2015 2015

Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi

Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda

A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li

Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin

Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala

Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy

Cyber security research frameworks for coevolutionary network defense , George Daniel Rush

Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara

Theses from 2014 2014

Crime pattern detection using online social media , Raja Ashok Bolla

Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi

A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati

Access control delegation in the clouds , Pavani Gorantla

Evolving decision trees for the categorization of software , Jasenko Hosic

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar

Privacy preservation using spherical chord , Doyal Tapan Mukherjee

Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram

On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu

Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli

An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan

Theses from 2013 2013

Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu

Security analysis of a cyber physical system : a car example , Jason Madden

Efficient integrity verification of replicated data in cloud , Raghul Mukundan

Search-based model summarization , Lokesh Krishna Ravichandran

Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg

Secure design defects detection and correction , Wenquan Wang

Theses from 2012 2012

Robust evolutionary algorithms , Brian Wesley Goldman

Semantic preserving text tepresentation and its applications in text clustering , Michael Howard

Vehicle path verification using wireless sensor networks , Gerry W. Howser

Distributed and collaborative watermarking in relational data , Prakash Kumar

Theses from 2011 2011

A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle

Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount

A low-cost motion tracking system for virtual reality applications , Abhinav Chadda

Optimization of textual affect entity relation models , Ajith Cherukad Jose

MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram

A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi

An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka

Location privacy policy management system , Arej Awodha Muhammed

Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni

Theses from 2010 2010

Event detection from click-through data via query clustering , Prabhu Kumar Angajala

Population control in evolutionary algorithms , Jason Edward Cook

Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher

Multi axis slicing for rapid prototyping , Divya Kanakanala

Content based image retrieval for bio-medical images , Vikas Nahar

2-D path planning for direct laser deposition process , Swathi Routhu

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu

Theses from 2009 2009

Information flow properties for cyber-physical systems , Rav Akella

Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet

Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba

Theses from 2008 2008

Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das

Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong

A time series classifier , Christopher Mark Gore

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu

Co-optimization: a generalization of coevolution , Travis Service

Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder

Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson

Theses from 2007 2007

A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird

Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • All Authors
  • Faculty Authors

Author Corner

Useful links.

  • Library Resources

S&T logo

Thesis Locations

  • View these on map
  • View these in Google Earth

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations

Computer Science and Engineering Theses and Dissertations

Theses/dissertations from 2023 2023.

Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno

Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan

Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros

Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin

Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen

Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur

A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.

Graph Analysis on Social Networks , Shen Lu

Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera

Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo

Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi

Theses/Dissertations from 2022 2022

Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed

Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala

Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen

A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave

On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou

Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang

A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri

Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney

Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin

Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker

Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich

Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar

Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong

Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward

Theses/Dissertations from 2021 2021

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill

Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja

Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev

Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov

Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai

Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri

Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco

Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam

Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava

A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari

Theses/Dissertations from 2020 2020

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal

Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari

Composition of Atomic-Obligation Security Policies , Yan Cao Albright

Action Recognition Using the Motion Taxonomy , Maxat Alibayev

Sentiment Analysis in Peer Review , Zachariah J. Beasley

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov

Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang

Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram

PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami

Composition of Atomic-Obligation Security Policies , Danielle Ferguson

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel

The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez

Privacy-Preserving and Functional Information Systems , Thang Hoang

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi

Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam

Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha

Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath

System Support of Concurrent Database Query Processing on a GPU , Hao Li

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu

Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla

Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng

Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi

Models of Secure Software Enforcement and Development , Hernan M. Palombo

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan

Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah

Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui

Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon

Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna

Theses/Dissertations from 2019 2019

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur

Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed

Phenomena of Social Dynamics in Online Games , Essa Alhazmi

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri

Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao

Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang

A GPU-Based Framework for Parallel Spatial Indexing and Query Processing , Zhila Nouri Lewis

A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic , Trisha Mukhopadhyay

An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks , Srivarsha Polnati

Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain , John Rippetoe

Detecting Digitally Forged Faces in Online Videos , Neilesh Sambhu

Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses , Dakun Shen

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

Home > FACULTIES > Computer Science > CSD-ETD

Computer Science Department

Computer Science Theses and Dissertations

This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository

Theses/Dissertations from 2024 2024

A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani

Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy

Theses/Dissertations from 2023 2023

Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar

Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian

Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh

INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee

Algorithms and Software for Oligonucleotide Design , Qin Dong

Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani

De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han

Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley

A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He

A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh

Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani

Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu

Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li

Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li

DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li

Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai

Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad

The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi

Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam

Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi

Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat

Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul

On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi

Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza

Migration in Edge Computing , Arshin Rezazadeh

A Modified Hopfield Network for the K-Median Problem , Cody Rossiter

Predicting Network Failures with AI Techniques , Chandrika Saha

Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha

An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa

Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia

Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia

IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales

A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani

Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad

Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim

A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba

Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong

Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang

Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar

Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang

Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi

Theses/Dissertations from 2022 2022

The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt

Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy

Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez

Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu

Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte

Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell

Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch

Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh

Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost

Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie

Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka

Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling

Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan

Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti

Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida

False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito

Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford

An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson

Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem

A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid

Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma

Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi

Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis

Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg

Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang

Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang

Predicting and Modifying Memorability of Images , Mohammad Younesi

Theses/Dissertations from 2021 2021

Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed

A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar

Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani

Contrastive Learning of Auditory Representations , Haider Al-Tahan

Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi

Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak

Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman

Improving Reader Motivation with Machine Learning , Tanner A. Bohn

A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang

Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee

A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen

Exploratory Search with Archetype-based Language Models , Brent D. Davis

Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo

Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon

A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du

Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi

Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan

A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar

Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami

Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara

Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani

A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria

Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh

Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour

A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa

WesternAccelerator:Rapid Development of Microservices , Haoran Wei

A Lightweight and Explainable Citation Recommendation System , Juncheng Yin

Mitosis Detection from Pathology Images , Jinhang Zhang

Theses/Dissertations from 2020 2020

Visual Analytics of Electronic Health Records with a focus on Acute Kidney Injury , Sheikh S. Abdullah

Towards the Development of Network Service Cost Modeling-An ISP Perspective , Yasmeen Ali

  • Accessible Formats

Advanced Search

  • Notify me via email or RSS
  • Expert Gallery
  • Online Journals
  • eBook Collections
  • Reports and Working Papers
  • Conferences and Symposiums
  • Electronic Theses and Dissertations
  • Digitized Special Collections
  • All Collections
  • Disciplines

Author Corner

  • Submit Thesis/Dissertation

Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright

©1878 - 2016 Western University

St Andrews Research Repository

St Andrews University Home

  •   St Andrews Research Repository
  • Computer Science (School of)
  • Computer Science

Computer Science Masters Theses

  • Register / Login

By Issue Date Names Titles Subjects Classification Type Funder

Search within this collection:

All of our academic staff are research active, working with a team of post-graduate and post-doctoral researchers and a lively population of research students. Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems engineering, and human computer interaction.

For more information please visit the School of Computer science home page.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Recent Submissions

Survey on data fragmentation issues for users .

feed

MIT Libraries home DSpace@MIT

  • DSpace@MIT Home
  • MIT Libraries

This collection of MIT Theses in DSpace contains selected theses and dissertations from all MIT departments. Please note that this is NOT a complete collection of MIT theses. To search all MIT theses, use MIT Libraries' catalog .

MIT's DSpace contains more than 58,000 theses completed at MIT dating as far back as the mid 1800's. Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded.

MIT Theses are openly available to all readers. Please share how this access affects or benefits you. Your story matters.

If you have questions about MIT theses in DSpace, [email protected] . See also Access & Availability Questions or About MIT Theses in DSpace .

If you are a recent MIT graduate, your thesis will be added to DSpace within 3-6 months after your graduation date. Please email [email protected] with any questions.

Permissions

MIT Theses may be protected by copyright. Please refer to the MIT Libraries Permissions Policy for permission information. Note that the copyright holder for most MIT theses is identified on the title page of the thesis.

Theses by Department

  • Comparative Media Studies
  • Computation for Design and Optimization
  • Computational and Systems Biology
  • Department of Aeronautics and Astronautics
  • Department of Architecture
  • Department of Biological Engineering
  • Department of Biology
  • Department of Brain and Cognitive Sciences
  • Department of Chemical Engineering
  • Department of Chemistry
  • Department of Civil and Environmental Engineering
  • Department of Earth, Atmospheric, and Planetary Sciences
  • Department of Economics
  • Department of Electrical Engineering and Computer Sciences
  • Department of Humanities
  • Department of Linguistics and Philosophy
  • Department of Materials Science and Engineering
  • Department of Mathematics
  • Department of Mechanical Engineering
  • Department of Nuclear Science and Engineering
  • Department of Ocean Engineering
  • Department of Physics
  • Department of Political Science
  • Department of Urban Studies and Planning
  • Engineering Systems Division
  • Harvard-MIT Program of Health Sciences and Technology
  • Institute for Data, Systems, and Society
  • Media Arts & Sciences
  • Operations Research Center
  • Program in Real Estate Development
  • Program in Writing and Humanistic Studies
  • Science, Technology & Society
  • Science Writing
  • Sloan School of Management
  • Supply Chain Management
  • System Design & Management
  • Technology and Policy Program

Collections in this community

Doctoral theses, graduate theses, undergraduate theses, recent submissions.

Thumbnail

The pulse amplifier in theory and experiment 

Thumbnail

Optical studies of the nature of metallic surfaces 

Thumbnail

A controlled community for Waterbury, Connecticut 

feed

PDXScholar logo with slogan Access for All.

Home > School, College, or Department > MCECS > Computer Science > Dissertations and Theses

Computer Science Dissertations and Theses

Theses/dissertations from 2024 2024.

MmWave RAT Optimization: MAC Layer Initial Access Design and Transport Layer Integration , Suresh Srinivasan (Dissertation)

Theses/Dissertations from 2023 2023

Seeing in the Dark: Towards Robust Pedestrian Detection at Nighttime , Afnan Althoupety (Dissertation)

A Deep Hierarchical Variational Autoencoder for World Models in Complex Reinforcement Learning Environments , Sriharshitha Ayyalasomayajula (Thesis)

Toward Efficient Rendering: A Neural Network Approach , Qiqi Hou (Dissertation)

Energy Auction with Non-Relational Persistence , Michael Ramez Howard (Thesis)

Implementing a Functional Logic Programming Language via the Fair Scheme , Andrew Michael Jost (Dissertation)

Multi-Agent Deep Reinforcement Learning for Radiation Localization , Benjamin Scott Totten (Thesis)

Theses/Dissertations from 2022 2022

Using Intrinsically-Typed Definitional Interpreters to Verify Compiler Optimizations in a Monadic Intermediate Language , Dani Barrack (Thesis)

An Automated Zoom Class Session Analysis Tool to Improve Education , Jack Arlo Cannon II (Thesis)

Scaling EPA-RIMM with Multicore System Management Interrupt Handlers , Alexander K. Freed (Thesis)

Unpaired Style Transfer Conditional Generative Adversarial Network for Scanned Document Generation , David Jonathan Hawbaker (Thesis)

Toward Analyzing the Diversity of Extractive Summaries , Aaron David Hudson (Thesis)

Making Curry with Rice: An Optimizing Curry Compiler , Steven Libby (Dissertation)

Domain Knowledge as Motion-Aware Inductive Bias for Deep Video Synthesis: Two Case Studies , Long Mai (Dissertation)

Theses/Dissertations from 2021 2021

Efficient Neuromorphic Algorithms for Gamma-Ray Spectrum Denoising and Radionuclide Identification , Merlin Phillip Carson (Thesis)

Storing Intermediate Results in Space and Time: SQL Graphs and Block Referencing , Basem Ibrahim Elazzabi (Dissertation)

Automated Test Generation for Validating SystemC Designs , Bin Lin (Dissertation)

Forecasting Optimal Parameters of the Broken Wing Butterfly Option Strategy Using Differential Evolution , David Munoz Constantine (Thesis)

Situate: An Agent-Based System for Situation Recognition , Max Henry Quinn (Dissertation)

Theses/Dissertations from 2020 2020

Multiple Diagram Navigation , Hisham Benotman (Dissertation)

Smart Contract Vulnerabilities on the Ethereum Blockchain: a Current Perspective , Daniel Steven Connelly (Thesis)

Extensible Performance-Aware Runtime Integrity Measurement , Brian G. Delgado (Dissertation)

Novel View Synthesis - a Neural Network Approach , Hoang Le (Dissertation)

Exploring the Potential of Sparse Coding for Machine Learning , Sheng Yang Lundquist (Dissertation)

Workflow Critical Path: a Data-Oriented Path Metric for Holistic HPC Workflows , Daniel D. Nguyen (Thesis)

Novel View Synthesis in Time and Space , Simon Niklaus (Dissertation)

Balancing Security, Performance and Deployability in Encrypted Search , David Joel Pouliot (Dissertation)

Theses/Dissertations from 2019 2019

A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games , Naif Saeed Alzahrani (Dissertation)

Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series , Logan Blakely (Thesis)

Local Radiance , Scott Peter Britell (Dissertation)

Correct-by-Construction Typechecking with Scope Graphs , Katherine Imhoff Casamento (Thesis)

Versatile Binary-level Concolic Testing , Bo Chen (Dissertation)

Crumpled and Abraded Encryption: Implementation and Provably Secure Construction , Scott Sherlock Griffy (Thesis)

Knowing Without Knowing: Real-Time Usage Identification of Computer Systems , Leila Mohammed Hawana (Thesis)

Design and Experimental Evaluation of DeepMarket: an Edge Computing Marketplace with Distributed TensorFlow Execution Capability , Soyoung Kim (Thesis)

Localizing Little Landmarks with Transfer Learning , Sharad Kumar (Thesis)

Context-Aware Wi-Fi Infrastructure-based Indoor Positioning Systems , Huy Phuong Tran (Dissertation)

Theses/Dissertations from 2018 2018

Bounding Box Improvement with Reinforcement Learning , Andrew Lewis Cleland (Thesis)

Sensing Building Structure Using UWB Radios for Disaster Recovery , Jeong Eun Lee (Dissertation)

Annotation-Enabled Interpretation and Analysis of Time-Series Data , Niveditha Venugopal (Thesis)

EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments , Tejaswini Ajay Vibhute (Thesis)

Theses/Dissertations from 2017 2017

Improved Scoring Models for Semantic Image Retrieval Using Scene Graphs , Erik Timothy Conser (Thesis)

Refining Bounding-Box Regression for Object Localization , Naomi Lynn Dickerson (Thesis)

Fully Generic Programming Over Closed Universes of Inductive-Recursive Types , Larry Diehl (Dissertation)

Communicating at Terahertz Frequencies , Farnoosh Moshirfatemi (Dissertation)

Designing In-Headset Authoring Tools for Virtual Reality Video , Cuong Nguyen (Dissertation)

Certifying Loop Pipelining Transformations in Behavioral Synthesis , Disha Puri (Dissertation)

Power-Aware Datacenter Networking and Optimization , Qing Yi (Dissertation)

Theses/Dissertations from 2016 2016

Identifying Relationships between Scientific Datasets , Abdussalam Alawini (Dissertation)

Information Representation and Computation of Spike Trains in Reservoir Computing Systems with Spiking Neurons and Analog Neurons , Amin Almassian (Thesis)

Investigations of an "Objectness" Measure for Object Localization , Lewis Richard James Coates (Thesis)

Image Stitching: Handling Parallax, Stereopsis, and Video , Fan Zhang (Dissertation)

Theses/Dissertations from 2015 2015

Novel Methods for Learning and Adaptation in Chemical Reaction Networks , Peter Banda (Dissertation)

Post-silicon Functional Validation with Virtual Prototypes , Kai Cong (Dissertation)

Novel Cryptographic Primitives and Protocols for Censorship Resistance , Kevin Patrick Dyer (Dissertation)

Hardware/Software Interface Assurance with Conformance Checking , Li Lei (Dissertation)

Leveraging Contextual Relationships Between Objects for Localization , Clinton Leif Olson (Thesis)

The Performance of Random Prototypes in Hierarchical Models of Vision , Kendall Lee Stewart (Thesis)

Tweakable Ciphers: Constructions and Applications , Robert Seth Terashima (Dissertation)

Scalable Equivalence Checking for Behavioral Synthesis , Zhenkun Yang (Dissertation)

Theses/Dissertations from 2014 2014

The Nax Language: Unifying Functional Programming and Logical Reasoning in a Language based on Mendler-style Recursion Schemes and Term-indexed Types , Ki Yung Ahn (Dissertation)

Using Spammers' Computing Resources for Volunteer Computing , Thai Le Quy Bui (Thesis)

Towards Constructing Interactive Virtual Worlds , Francis Chang (Dissertation)

System-wide Performance Analysis for Virtualization , Deron Eugene Jensen (Thesis)

Advances in Piecewise Smooth Image Reconstruction , Ralf Juengling (Dissertation)

Interpretable Machine Learning and Sparse Coding for Computer Vision , Will Landecker (Dissertation)

Optimizing Data Movement in Hybrid Analytic Systems , Patrick Michael Leyshock (Dissertation)

Ranked Similarity Search of Scientific Datasets: An Information Retrieval Approach , Veronika Margaret Megler (Dissertation)

Using GIST Features to Constrain Search in Object Detection , Joanna Browne Solmon (Thesis)

The Role of Prototype Learning in Hierarchical Models of Vision , Michael David Thomure (Dissertation)

Theses/Dissertations from 2013 2013

Object Detection and Recognition in Natural Settings , George William Dittmar (Thesis)

Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications , Akshay Dua (Dissertation)

Equivalence Checking for High-Assurance Behavioral Synthesis , Kecheng Hao (Dissertation)

Type Classes and Instance Chains: A Relational Approach , John Garrett Morris (Dissertation)

Theses/Dissertations from 2012 2012

Using Dataflow Optimization Techniques with a Monadic Intermediate Language , Justin George Bailey (Thesis)

A Survey and Analysis of Solutions to the Oblivious Memory Access Problem , Erin Elizabeth Chapman (Thesis)

A Data-Descriptive Feedback Framework for Data Stream Management Systems , Rafael J. Fernández Moctezuma (Dissertation)

Extending Relativistic Programming to Multiple Writers , Philip William Howard (Dissertation)

The Basic Scheme for the Evaluation of Functional Logic Programs , Arthur Peters (Thesis)

The Link Between Image Segmentation and Image Recognition , Karan Sharma (Thesis)

Relativistic Causal Ordering A Memory Model for Scalable Concurrent Data Structures , Josh Triplett (Dissertation)

Theses/Dissertations from 2011 2011

Conceptual Modeling of Data with Provenance , David William Archer (Dissertation)

Low-latency Estimates for Window-Aggregate Queries over Data Streams , Amit Bhat (Thesis)

Information Processing in Two-Dimensional Cellular Automata , Martin Cenek (Dissertation)

Scalable and Efficient Tasking for Dynamic Sensor Networks , Thanh Xuan Dang (Dissertation)

On the Effect of Topology on Learning and Generalization in Random Automata Networks , Alireza Goudarzi (Thesis)

HOLCF '11: A Definitional Domain Theory for Verifying Functional Programs , Brian Charles Huffman (Dissertation)

A Functional Approach to Memory-Safe Operating Systems , Rebekah Leslie (Dissertation)

Factoring Semiprimes Using PG2N Prime Graph Multiagent Search , Keith Eirik Wilson (Thesis)

High Speed Wireless Networking for 60GHz , Candy Yiu (Dissertation)

Theses/Dissertations from 2010 2010

Extensible Scheduling in a Haskell-based Operating System , Kenneth William Graunke (Thesis)

Addressing Automated Adversaries of Network Applications , Edward Leo Kaiser (Dissertation)

An Automata-Theoretic Approach to Hardware/Software Co-verification , Juncao Li (Dissertation)

Practical Type Inference for the GADT Type System , Chuan-kai Lin (Dissertation)

Scalable event tracking on high-end parallel systems , Kathryn Marie Mohror (Dissertation)

Performance Analysis of Hybrid CPU/GPU Environments , Michael Shawn Smith (Thesis)

Theses/Dissertations from 2009 2009

Computational Techniques for Reducing Spectra of the Giant Planets in Our Solar System , Holly L. Grimes (Thesis)

Programmer Friendly Refactoring Tools , Emerson Murphy-Hill (Dissertation)

A Framework for Superimposed Applications : Techniques to Represent, Access, Transform, and Interchange Bi-level Information , Sudarshan Srivivasa Murthy (Dissertation)

Graphical User Interfaces as Updatable Views , James Felger Terwilliger (Dissertation)

Advanced Search

  • Notify me via email or RSS
  • Featured Collections
  • All Authors
  • Schools & Colleges
  • Dissertations & Theses
  • PDXOpen Textbooks
  • Conferences
  • Collections
  • Disciplines
  • Faculty Expert Gallery
  • Submit Research
  • Faculty Profiles
  • Terms of Use
  • Feedback Form

Home | About | My Account | Accessibility Statement | Portland State University

Privacy Copyright

  • Northeastern University
  • Khoury College of Computer Science
  • Computer and Information Science Theses and Dissertations
  • Computer Science Master's Theses

Computer Science Master's Theses Collection

http://hdl.handle.net/2047/D20233315

aBBRate: automating BBR congestion control attack exploration using a model-based approach.

Analysis of named entity recognition & entity linking in historical text

Annotating decision analyses using semantic web technologies

Applying EM to compute document relevance from crowdsourced pair preferences

Applying unsupervised grammar induction to OCR error correction

Argument mining for understanding media bias and misinformation

ARID: affinity representing instance descriptors.

Automated explanation of research informed consent by embodied conversational agents

Automated indexing of stories for conversational health intervention

Bias measurement in small datasets

Brown Logo

  • About Brown
  • Campus Life

Information for:

  • Current Students
  • Friends & Neighbors
  • A to Z Index
  • People Directory
  • Social@Brown
  • About the Department
  • Systems & Software
  • Socially Responsible    Computing
  • Positions / Jobs
  • Brown CS News
  • Brown CS Blog
  • Our Community
  • Grad Students
  • Ugrad Students
  • Research Links
  • Publications
  • Opportunities For    Visiting Students
  • Degree Programs
  • Computer Science
  • Cybersecurity
  • Undergraduate
  • Interdisciplinary
  • Miscellaneous
  • Course List
  • TA Program
  • Who We Are
  • Action Plan & Initiatives
  • Student Advocates
  • Data And Demographics
  • Student Groups
  • UTA Endowment
  • Home »
  • Research »
  • Publications »
  • Student Project Reports »
  • Master's

Master's Project Reports

  Chen, Catherine

Icon

  Chen, Yiwen and Ren, Jiahao

  Chernosky, Brynn

  Christou, Neophytes

  Dekle, Max

  Demetci, Pinar

  Fu, Changcheng

  Fu, Haotian

  Goktas, Denizalp

  Golovanevsky, Michal

  Howe, Wyatt

  Kaan, Ozulkulu

  Li, Shihang

  Lu, Cheng-You

  Luo, Calvin

  Maynard, Patrick

  Peng, Kathy

  Ramesh, Dev

  Ryjikov, Benjamin

  Scherick, James

  Sriram, Abhinav

  Zhou, Peisen

  Zhou, Tongyu

  Zhuo, Wang

Computer Science at Brown University Providence, Rhode Island 02912 USA Phone: 401-863-7600 Map & Directions / Contact Us

Facebook

SDSU

Department of Computer Science

  • Teaching Associates
  • Undergraduate Advisors
  • Graduate Advisors
  • Faculty Positions
  • Computer Sciences Advisory Board
  • Fall 2021 Old/New CS Major/Minor FAQs
  • Undergraduate Degree Information
  • Prospective Undergrads
  • 2021 CS Major Requirements
  • 2020 CS Major Requirements
  • 2021 CS Minor Requirements
  • 2020 CS Minor Requirements
  • M.S. in Computer Science
  • M.S. in Computer Science 2023
  • M.S. in Computer Science 2022
  • Applying to the Master’s in CS Program
  • Thesis Defense

Past Theses

  • CS Master Exams Registration: Fall 2024
  • Automata & Formal Languages
  • Data Structures & Algorithms
  • Database Management Systems
  • Intelligent Systems & Robotics
  • Operating Systems & Architecture
  • Programming Languages
  • Applying to the Program
  • Registering for Classes
  • GIS Certificate
  • Laboratories
  • CS Undergraduate Advising
  • Sciences Advising
  • Financial Aid & Scholarships
  • Scholarship Finder
  • Graduate Studies
  • Student Ability Center
  • Student Support Programs
  • Study Abroad
  • Health Resources
  • Counseling & Psychological Services
  • Employee Resources
  • Technical Services
  • Job Possibilities for CS Majors
  • Career Development
  • Clubs & Organizations
  • Cultural Centers
  • Student Council
  • ACM Chapter
  • Cyber Defense Team
  • Mechatronics Club
  • Give to the Department

Recent CS Masters Theses

The following is a list of some of the recently completed CS Masters Theses.

ScholarWorks@UMass Amherst

Home > CICS > CS > CS_DISS

Computer Science

Computer Science Department Dissertations Collection

Dissertations from 2024 2024.

Enabling Privacy and Trust in Edge AI Systems , Akanksha Atrey, Computer Science

Generative Language Models for Personalized Information Understanding , Pengshan Cai, Computer Science

Towards Automatic and Robust Variational Inference , Tomas Geffner, Computer Science

Multi-SLAM Systems for Fault-Tolerant Simultaneous Localization and Mapping , Samer Nashed, Computer Science

Policy Gradient Methods: Analysis, Misconceptions, and Improvements , Christopher P. Nota, Computer Science

Data to science with AI and human-in-the-loop , Gustavo Perez Sarabia, Computer Science

Question Answering By Case-Based Reasoning With Textual Evidence , Dung N. Thai, Computer Science

Dissertations from 2023 2023

An Introspective Approach for Competence-Aware Autonomy , Connor Basich, Computer Science

Foundations of Node Representation Learning , Sudhanshu Chanpuriya, Computer Science

Learning to See with Minimal Human Supervision , Zezhou Cheng, Computer Science

IMPROVING USER EXPERIENCE BY OPTIMIZING CLOUD SERVICES , Ishita Dasgupta, Computer Science

Automating the Formal Verification of Software , Emily First, Computer Science

Learning from Sequential User Data: Models and Sample-efficient Algorithms , Aritra Ghosh, Computer Science

Human-Centered Technologies for Inclusive Collection and Analysis of Public-Generated Data , Mahmood Jasim, Computer Science

Rigorous Experimentation For Reinforcement Learning , Scott M. Jordan, Computer Science

Towards Robust Long-form Text Generation Systems , Kalpesh Krishna, Computer Science

Emerging Trustworthiness Issues in Distributed Learning Systems , Hamid Mozaffari, Computer Science

TOWARDS RELIABLE CIRCUMVENTION OF INTERNET CENSORSHIP , Milad nasresfahani, Computer Science

Evidence Assisted Learning for Clinical Decision Support Systems , Bhanu Pratap Singh Rawat, Computer Science

DESIGN AND ANALYSIS OF CONTENT CACHING SYSTEMS , Anirudh Sabnis, Computer Science

Quantifying and Enhancing the Security of Federated Learning , Virat Vishnu Shejwalkar, Computer Science

Effective and Efficient Transfer Learning in the Era of Large Language Models , Tu Vu, Computer Science

Data-driven Modeling and Analytics for Greening the Energy Ecosystem , John Wamburu, Computer Science

Bayesian Structural Causal Inference with Probabilistic Programming , Sam A. Witty, Computer Science

LEARNING TO RIG CHARACTERS , Zhan Xu, Computer Science

GRAPH REPRESENTATION LEARNING WITH BOX EMBEDDINGS , Dongxu Zhang, Computer Science

Dissertations from 2022 2022

COMBINATORIAL ALGORITHMS FOR GRAPH DISCOVERY AND EXPERIMENTAL DESIGN , Raghavendra K. Addanki, Computer Science

MEASURING NETWORK INTERFERENCE AND MITIGATING IT WITH DNS ENCRYPTION , Seyed Arian Akhavan Niaki, Computer Science

Few-Shot Natural Language Processing by Meta-Learning Without Labeled Data , Trapit Bansal, Computer Science

Communicative Information Visualizations: How to make data more understandable by the general public , Alyxander Burns, Computer Science

REINFORCEMENT LEARNING FOR NON-STATIONARY PROBLEMS , Yash Chandak, Computer Science

Modeling the Multi-mode Distribution in Self-Supervised Language Models , Haw-Shiuan Chang, Computer Science

Nonparametric Contextual Reasoning for Question Answering over Large Knowledge Bases , Rajarshi Das, Computer Science

Languages and Compilers for Writing Efficient High-Performance Computing Applications , Abhinav Jangda, Computer Science

Controllable Neural Synthesis for Natural Images and Vector Art , Difan Liu, Computer Science

Probabilistic Commonsense Knowledge , Xiang Li, Computer Science

DISTRIBUTED LEARNING ALGORITHMS: COMMUNICATION EFFICIENCY AND ERROR RESILIENCE , Raj Kumar Maity, Computer Science

Practical Methods for High-Dimensional Data Publication with Differential Privacy , Ryan H. McKenna, Computer Science

Incremental Non-Greedy Clustering at Scale , Nicholas Monath, Computer Science

High-Quality Automatic Program Repair , Manish Motwani, Computer Science

Unobtrusive Assessment of Upper-Limb Motor Impairment Using Wearable Inertial Sensors , Brandon R. Oubre, Computer Science

Mixture Models in Machine Learning , Soumyabrata Pal, Computer Science

Decision Making with Limited Data , Kieu My Phan, Computer Science

Neural Approaches for Language-Agnostic Search and Recommendation , Hamed Rezanejad Asl Bonab, Computer Science

Low Resource Language Understanding in Voice Assistants , Subendhu Rongali, Computer Science

Enabling Daily Tracking of Individual’s Cognitive State With Eyewear , Soha Rostaminia, Computer Science

LABELED MODULES IN PROGRAMS THAT EVOLVE , Anil K. Saini, Computer Science

Reliable Decision-Making with Imprecise Models , Sandhya Saisubramanian, Computer Science

Data Scarcity in Event Analysis and Abusive Language Detection , Sheikh Muhammad Sarwar, Computer Science

Representation Learning for Shape Decomposition, By Shape Decomposition , Gopal Sharma, Computer Science

Metareasoning for Planning and Execution in Autonomous Systems , Justin Svegliato, Computer Science

Approximate Bayesian Deep Learning for Resource-Constrained Environments , Meet Prakash Vadera, Computer Science

ANSWER SIMILARITY GROUPING AND DIVERSIFICATION IN QUESTION ANSWERING SYSTEMS , Lakshmi Nair Vikraman, Computer Science

Dissertations from 2021 2021

Neural Approaches to Feedback in Information Retrieval , Keping Bi, Computer Science

Sociolinguistically Driven Approaches for Just Natural Language Processing , Su Lin Blodgett, Computer Science

Enabling Declarative and Scalable Prescriptive Analytics in Relational Data , Matteo Brucato, Computer Science

Neural Methods for Answer Passage Retrieval over Sparse Collections , Daniel Cohen, Computer Science

Utilizing Graph Structure for Machine Learning , Stefan Dernbach, Computer Science

Enhancing Usability and Explainability of Data Systems , Anna Fariha, Computer Science

Algorithms to Exploit Data Sparsity , Larkin H. Flodin, Computer Science

3D Shape Understanding and Generation , Matheus Gadelha, Computer Science

Robust Algorithms for Clustering with Applications to Data Integration , Sainyam Galhotra, Computer Science

Improving Evaluation Methods for Causal Modeling , Amanda Gentzel, Computer Science

SAFE AND PRACTICAL MACHINE LEARNING , Stephen J. Giguere, Computer Science

COMPACT REPRESENTATIONS OF UNCERTAINTY IN CLUSTERING , Craig Stuart Greenberg, Computer Science

Natural Language Processing for Lexical Corpus Analysis , Abram Kaufman Handler, Computer Science

Social Measurement and Causal Inference with Text , Katherine A. Keith, Computer Science

Concentration Inequalities in the Wild: Case Studies in Blockchain & Reinforcement Learning , A. Pinar Ozisik, Computer Science

Resource Allocation in Distributed Service Networks , Nitish Kumar Panigrahy, Computer Science

History Modeling for Conversational Information Retrieval , Chen Qu, Computer Science

Design and Implementation of Algorithms for Traffic Classification , Fatemeh Rezaei, Computer Science

SCALING DOWN THE ENERGY COST OF CONNECTING EVERYDAY OBJECTS TO THE INTERNET , Mohammad Rostami, Computer Science

Deep Learning Models for Irregularly Sampled and Incomplete Time Series , Satya Narayan Shukla, Computer Science

Traffic engineering in planet-scale cloud networks , Rachee Singh, Computer Science

Video Adaptation for High-Quality Content Delivery , Kevin Spiteri, Computer Science

Learning from Limited Labeled Data for Visual Recognition , Jong-Chyi Su, Computer Science

Human Mobility Monitoring using WiFi: Analysis, Modeling, and Applications , Amee Trivedi, Computer Science

Geometric Representation Learning , Luke Vilnis, Computer Science

Understanding of Visual Domains via the Lens of Natural Language , Chenyun Wu, Computer Science

Towards Practical Differentially Private Mechanism Design and Deployment , Dan Zhang, Computer Science

Audio-driven Character Animation , Yang Zhou, Computer Science

Dissertations from 2020 2020

Noise-Aware Inference for Differential Privacy , Garrett Bernstein, Computer Science

Motion Segmentation - Segmentation of Independently Moving Objects in Video , Pia Katalin Bideau, Computer Science

An Empirical Assessment of the Effectiveness of Deception for Cyber Defense , Kimberly J. Ferguson-Walter, Computer Science

Integrating Recognition and Decision Making to Close the Interaction Loop for Autonomous Systems , Richard Freedman, Computer Science

Improving Reinforcement Learning Techniques by Leveraging Prior Experience , Francisco M. Garcia, Computer Science

Optimization and Training of Generational Garbage Collectors , Nicholas Jacek, Computer Science

Understanding the Dynamic Visual World: From Motion to Semantics , Huaizu Jiang, Computer Science

Improving Face Clustering in Videos , SouYoung Jin, Computer Science

Reasoning About User Feedback Under Identity Uncertainty in Knowledge Base Construction , Ariel Kobren, Computer Science

Learning Latent Characteristics of Data and Models using Item Response Theory , John P. Lalor, Computer Science

Higher-Order Representations for Visual Recognition , Tsung-Yu Lin, Computer Science

Learning from Irregularly-Sampled Time Series , Steven Cheng-Xian Li, Computer Science

Dynamic Composition of Functions for Modular Learning , Clemens GB Rosenbaum, Computer Science

Improving Visual Recognition With Unlabeled Data , Aruni Roy Chowdhury, Computer Science

Deep Neural Networks for 3D Processing and High-Dimensional Filtering , Hang Su, Computer Science

Towards Optimized Traffic Provisioning and Adaptive Cache Management for Content Delivery , Aditya Sundarrajan, Computer Science

The Limits of Location Privacy in Mobile Devices , Keen Yuun Sung, Computer Science

ALGORITHMS FOR MASSIVE, EXPENSIVE, OR OTHERWISE INCONVENIENT GRAPHS , David Tench, Computer Science

System Design for Digital Experimentation and Explanation Generation , Emma Tosch, Computer Science

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines

Author Corner

  • Login for Faculty Authors
  • Faculty Author Gallery
  • Expert Gallery
  • University Libraries
  • Computer Science Website
  • UMass Amherst

This page is sponsored by the University Libraries.

© 2009 University of Massachusetts Amherst • Site Policies

Privacy Copyright

master thesis examples computer science

The M.S. Thesis Track

Blue CS@CU logo for MS students

The MS Thesis track is for students who want to concentrate on research in some sub-field of Computer Science.  You are required to arrange for a Computer Science Faculty member who agrees to advise the thesis and the rest of your course selection prior to selecting the track.

SUMMARY OF REQUIREMENTS

  • Complete a total of  30 points  (Courses must be at the 4000 level or above)
  • Maintain at least a  2.7  overall GPA. (No more than 1 D is permitted).
  • Complete the  Columbia Engineering Professional Development & Leadership (PDL)  requirement
  • Satisfy  breadth requirements
  • Take at least  6 points  of technical courses at the 6000 level
  • At most, up to 3 points  of your degree can be Non-CS/Non-track If they are deemed relevant to your track and sufficiently technical in nature. Submit the  Non-CS/NonTrack form  and the course syllabus to your CS Faculty Advisor for review

1. BREADTH REQUIREMENT

Visit the breadth requirement page for more information.

2. REQUIRED TRACK COURSES (9 credits)

Students must take 9 credits of COMS E6902 Thesis. The points are typically spread over multiple semesters, e.g., 3 points each for 3 semesters or 4.5 points each for 2 semesters. No more than 9 points of E6902 may be taken. Sign up for the section number of E6902 associated with your thesis advisor.

3. ELECTIVE TRACK COURSES

Students are required to complete 9 elective credits of graduate courses (4000-level or above) selected from Computer Science and/or related areas together with your faculty thesis advisor. These would normally be strongly related to your thesis topic.

Up to 3 of these points may be in COMS E6901 Projects in Computer Science.

Please note:

The  degree progress checklist should be used to keep track of your requirements. if you have questions for your track advisor or cs advising, you should have an updated checklist prepared, due to a significant overlap in course material, ms students not in the machine learning track can only take 1 of the following courses – coms 4771, coms 4721, elen 4903, ieor 4525, stat 4240, stat 4400/4241/5241 – as part of their degree requirements, the elective track courses cannot be imported from another institution., 4. general electives.

Students must complete the remaining credits of General Elective Courses at the 4000 level or above. At least three of these points must be chosen from either the Track Electives listed above or from the CS department at the 4000 level or higher.

Students may also request to use at most 3 points of Non-CS/Non-Track coursework if approved by the process listed below.

5. THESIS DEFENSE

A thesis proposal is presented to your thesis committee at least three months before your defense. Your thesis committee should have three members. Two of them must be internal, but one can be an outsider. Please bring the thesis defense form to your defense. Once completed, please submit the form to CS Advising via email: [email protected].

The thesis cannot be imported from another institution.

A publication-quality thesis document is also published as a CS department technical report. Once completed, please upload your thesis into MICE.

PROGRAM PLANNING

Please visit  the Directory of Classes  to get the updated course listings. Please also note that not all courses are offered every semester or even every year. A few courses are offered only once every two or three years or even less frequently.

Updated: 3/26/2024

Find open faculty positions here .

Computer Science at Columbia University

Upcoming events, in the news, press mentions, dean boyce's statement on amicus brief filed by president bollinger.

President Bollinger announced that Columbia University along with many other academic institutions (sixteen, including all Ivy League universities) filed an amicus brief in the U.S. District Court for the Eastern District of New York challenging the Executive Order regarding immigrants from seven designated countries and refugees. Among other things, the brief asserts that “safety and security concerns can be addressed in a manner that is consistent with the values America has always stood for, including the free flow of ideas and people across borders and the welcoming of immigrants to our universities.”

This recent action provides a moment for us to collectively reflect on our community within Columbia Engineering and the importance of our commitment to maintaining an open and welcoming community for all students, faculty, researchers and administrative staff. As a School of Engineering and Applied Science, we are fortunate to attract students and faculty from diverse backgrounds, from across the country, and from around the world. It is a great benefit to be able to gather engineers and scientists of so many different perspectives and talents – all with a commitment to learning, a focus on pushing the frontiers of knowledge and discovery, and with a passion for translating our work to impact humanity.

I am proud of our community, and wish to take this opportunity to reinforce our collective commitment to maintaining an open and collegial environment. We are fortunate to have the privilege to learn from one another, and to study, work, and live together in such a dynamic and vibrant place as Columbia.

Mary C. Boyce Dean of Engineering Morris A. and Alma Schapiro Professor

Add Event to GMail

{{title}} {{fullname}}

master thesis examples computer science

Courses This Semester

  • {{title}} ({{dept}} {{prefix}}{{course_num}}-{{section}})

University of Regina Logo

  • Emergency Info
  • Directories
  • UR Self-Service
  • Academic Calendars & Schedules

master thesis examples computer science

  • Find a Person
  • Search Classes & Build Schedule
  • Future Grad Students
  • Professional Programs
  • MSc (Thesis Route)
  • MSc (Project Route)
  • MSc (Data Science)
  • MSc (Human-Centred Computing)
  • MSc (Course Route)
  • Thesis Approval & Defence Procedures
  • FGSR Regulations
  • Course Descriptions
  • Most Recent Course Syllabi
  • Course Timetable
  • Financial Support
  • Graduate Program FAQ

Banner Image

  • Undergraduate
  • Classes & Labs

Thesis Examples

Latex Example (shortened M.Sc. with urthesis.sty)  (ZIP)

Latex Example (complete M.Sc. with no .sty)  (ZIP)

How to Write a M.Sc. Thesis

The following guide to writing an M.Sc. thesis was prepared by Howard Hamilton and Brien Maguire, based on previous guides by Alan Mackworth (University of British Columbia) and Nick Cercone (Simon Fraser University), with their permission.

Quick Guide to the M.Sc. Thesis

An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria:

  • Original research results are explained clearly and concisely.
  • The thesis explains a novel exploratory implementation or a novel empirical study whose results will be of interest to the Computer Science community in general and to a portion of the Computer Science community in particular, e.g., Artificial Intelligence, Computational Complexity, etc.
  • Novel implementation techniques are outlined, generalized, and explained.
  • Theoretical results are obtained, explained, proven, and (worst, best, average) case analysis is performed where applicable.
  • The implementation of a practical piece of nontrivial software whose availability could have some impact on the Computer Science community. Examples are a distributed file system for a mobile computing environment and a program featuring the application of artificial intelligence knowledge representation and planning techniques to intelligent computer assisted learning software.

Writing an acceptable thesis can be a painful and arduous task, especially if you have not written much before. A good methodology to follow, immediately upon completion of the required courses, is to keep a paper or electronic research notebook and commit to writing research oriented notes in it every day. From time to time, organize or reorganize your notes under headings that capture important categories of your thoughts. This journal of your research activities can serve as a very rough draft of your thesis by the time you complete your research. From these notes to a first M.Sc. thesis draft is a much less painful experience than to start a draft from scratch many months after your initial investigations. To help structure an M.Sc. thesis, the following guide may help.

One Formula for an M.Sc. Thesis for Computer Science

Chapter 1 Introduction: This chapter contains a discussion of the general area of research which you plan to explore in the thesis. It should contain a summary of the work you propose to carry out and the motivations you can cite for performing this work. Describe the general problem that you are working towards solving and the specific problem that you attempt to solve in the thesis. For example, the general problem may be finding an algorithm to help an artificial agent discover a path in a novel environment, and the specific problem may be evaluating the relative effectiveness and efficiency of five particular named approaches to finding the shortest path in a graph where each node is connected to at most four neighbours, with no knowledge of the graph except that obtained by exploration. This chapter should also explain the motivations for solving each of the general problem and your specific problem. The chapter should end with a guide to the reader on the composition and contents of the rest of the thesis, chapter by chapter. If there are various paths through the thesis, these should also be explained in Chapter 1.

Chapter 2 Limited Overview of the Field: This chapter contains a specialized overview of that part of a particular field in which you are doing M.Sc. thesis research, for example, paramodulation techniques for automated theorem proving or bubble figure modelling strategies for animation systems. The survey should not be an exhaustive survey but rather should impose some structure on your field of research endeavour and carve out your niche within the structure you impose. You should make generous use of illustrative examples and citations to current research.

Chapter 3 My Theory/Solution/Algorithm/Program: This chapter outlines your proposed solution to the specific problem described in Chapter 1. The solution may be an extension to, an improvement of, or even a disproof of someone else's theory / solution / method / ...).

Chapter 4 Description of Implementation or Formalism: This chapter describes your implementation or formalism. Depending on its length, it may be combined with Chapter 3. Not every thesis requires an implementation. Prototypical implementations are common and quite often acceptable although the guiding criterion is that the research problem must be clearer when you've completed your task than it was when you started!

Chapter 5 Results and Evaluation: This chapter should present the results of your thesis. You should choose criteria by which to judge your results, for example, the adequacy, coverage, efficiency, productiveness, effectiveness, elegance, user friendliness, etc., and then clearly, honestly and fairly adjudicate your results according to fair measures and report those results. You should repeat, whenever possible, these tests against competing or previous approaches (if you are clever you will win hands down in such comparisons or such comparisons will be obviated by system differences). The competing or previous approaches you compare against must have been introduced in Chapter 2 (in fact that may be the only reason they actively appear in Chapter 2) and you should include pointers back to Chapter 2. Be honest in your evaluations. If you give other approaches the benefit of the doubt every time, and develop a superior technique, your results will be all the more impressive.

Chapter 6 Conclusions: This chapter should summarize the achievements of your thesis and discuss their impact on the research questions you raised in Chapter 1. Use the distinctive phrasing "An original contribution of this thesis is" to identify your original contributions to research. If you solved the specific problem described in Chapter 1, you should explicitly say so here. If you did not, you should also make this clear. You should indicate open issues and directions for further or future work in this area with your estimates of relevance to the field, importance and amount of work required.

References Complete references for all cited works. This should not be a bibliography of everything you have read in your area.

Appendices include technical material (program listings, output, graphical plots of data, detailed tables of experimental results, detailed proofs, etc.) which would disrupt the flow of the thesis but should be made available to help explain or provide details to the curious reader.

  • Privacy & Terms of Use
  • Contact U of R
  • Campus Maps
  • U of R Home
  • For Faculty and Staff
  • City of Regina
  • Harvard Library
  • Research Guides
  • Faculty of Arts & Sciences Libraries

Computer Science Library Research Guide

Find dissertations and theses.

  • Get Started
  • How to get the full-text
  • What is Peer Review?
  • Find Books in the SEC Library This link opens in a new window
  • Find Conference Proceedings
  • Find Patents This link opens in a new window
  • Find Standards
  • Find Technical Reports
  • Find Videos
  • Ask a Librarian This link opens in a new window

Engineering Librarian

Profile Photo

How to search for Harvard dissertations

  • DASH , Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.  Most Ph.D. dissertations submitted from  March 2012 forward  are available online in DASH.
  • Check HOLLIS, the Library Catalog, and refine your results by using the   Advanced Search   and limiting Resource  Type   to Dissertations
  • Search the database  ProQuest Dissertations & Theses Global Don't hesitate to  Ask a Librarian  for assistance.

How to search for Non-Harvard dissertations

Library Database:

  • ProQuest Dissertations & Theses Global

Free Resources:

  • Many  universities  provide full-text access to their dissertations via a digital repository.  If you know the title of a particular dissertation or thesis, try doing a Google search.  

Related Sites

  • Formatting Your Dissertation - GSAS
  • Ph.D. Dissertation Submission  - FAS
  • Empowering Students Before you Sign that Contract!  - Copyright at Harvard Library

Select Library Titles

Cover Art

  • << Previous: Find Conference Proceedings
  • Next: Find Patents >>
  • Last Updated: Feb 27, 2024 1:52 PM
  • URL: https://guides.library.harvard.edu/cs

Harvard University Digital Accessibility Policy

master thesis examples computer science

Master's Thesis in Computer Science

A Master's Thesis is expected to contain the following items:

  • Introduction and Motivation
  • Background of the Research Problem
  • Related Work (state of the art)
  • Problem Definition and Technical Solution
  • Evaluation of Developed Solution
  • Conclusions

In particular, the review of the state of the art should be thorough and the work performed should advance the state of the art.

Each Master's Thesis will be read and judged by a thesis committee consisting of the candidate's supervisor, a faculty member appointed by the supervisor, and a faculty member appointed by the Department through the GPD. The candidate is required to present a seminar on the thesis topic.

To register for MS Thesis (CS 699), the candidate must first obtain the approval of the GPD on the proposal.

Required Format

For more information on the format and procedure for completing the thesis, see ODU's Thesis & Dissertation Guide . Also see the guides under "Electronic Theses and Dissertations" at the Graduate School page .

Model Journal

Before you submit your thesis to ProQuest, the format must be approved by the College of Sciences . The College expects that you submit a "model journal" article along with your thesis. Your thesis format should match the journal for placement of table titles, placement of figure titles, and reference format. Your advisor may suggest a model journal, for example IEEE Transactions on Mobile Computing .

Recommended Deadlines

  • Submission of thesis to committee: six weeks prior to the last day of classes for the semester (must be at least two weeks before the defense)
  • MS thesis defense: four weeks prior to the deadline for college review
  • Include all required documents (see College of Sciences Thesis & Dissertation Review Procedures )
  • The College will follow-up with you about one week after submission
  • Any subsequent submissions to the College may be sent as PDF via email
  • Submission of approved thesis to ProQuest: see the official academic calendar for exact deadlines

Computer Science

  • Undergraduate
  • Linked Programs
  • Future Students
  • Scholarships & Financial Aid
  • Student Resources
  • Course Schedule

Department of Computer Science

3300 Engineering & Computational Sciences Building Norfolk, VA 23529

  • Frequently Asked Questions
  • Graduate Requirements
  • Graduate Advising
  • Graduate Forms
  • Graduate Scholarships
  • Join Computer Science Graduate Society
  • Alumni Updates

Enhance your college career by gaining relevant experience with the skills and knowledge needed for your future career. Discover our experiential learning opportunities.

Picture yourself in the classroom, speak with professors in your major, and meet current students.

From sports games to concerts and lectures, join the ODU community at a variety of campus events. 

Online Tesis

A list of master’s thesis topics in computer science

by Bastis Consultores | Aug 2, 2021 | Educational News | 1 comment

master thesis examples computer science

Choosing a topic for your master’s thesis is a very important step. It all depends, to a large extent, on your interests and abilities. During your studies you have surely discovered the areas of computer science that you are good at and which of them you plan to improve in the future. Before you embark on a topic search, consider the following suggestions to help you craft an initial strategy.

Suggestions when choosing a Master’s Thesis topic

First of all, you have to choose a good supervisor or academic advisor. It is very important that you collaborate with a teacher whose interests match your topic; otherwise, you will benefit little from the writing process. Ask questions and find out if previous students were satisfied with their supervision.

Introduction to Computer Science Dissertations

A master’s degree in Information and Communications Technology is designed to meet the requirements of people working as different professionals, such as academics, administrators and managers, technical staff, trainers and developers in the private or public sectors. A master’s degree in computer science combines theory and educational practice to create a learning experience that allows for the development of skills that can be applied to complicated real-world problems.

The MSc in Computer Science aims to improve knowledge of how computer systems, software and applications, as well as other forms of communication technologies, can be used to drive economic growth, improve learning capacity, encourage greater communication and socialisation and generally improve living standards.

Thinking about the subfields of computer science that interest you

When looking for a thesis topic, don’t just focus on the defended works. Again, ask your teacher to give you a list of current topics in the field of computer science that are underdeveloped. Your professors have deep experience and are aware of all directions of research conducted in their areas of scientific interest. They can suggest a great idea and help you put it into practice. Here are some ideas:

Programme structure (old and new programme structures)

Computer security (privacy and openness)

Relationships between hardware and software (adaptation of hardware to software)

Complexity theory (computational problems, mathematical questions)

Algorithms and architectures (machine learning, hardware architectures)

Artificial intelligence (computer systems capable of recognizing speech and making decisions)

Bioinformatics (modelling of human body processes)

Databases and information retrieval (collection of information and creation of easy access to it)

Multimedia (creative technologies, animation, graphics, audio)

Computational linguistics (natural language processing, machine translation, speech recognition)

You can also work in the following fields, which have been very popular in the Master’s Theses of the Pontifical Catholic University of Peru

Image Processing

Data Mining

Cloud Computing

Network Security

Service Computing [ Web Service ]

Social sensor networks

Software-defined networking

Software reengineering

Telecommunications Engineering

Text mining

Pixel per inch

Ad hoc network

Ad hoc vehicle network

Video streaming

Visual cryptography

Soft computing

Wireless body area network

No cables [Redes inalámbricas]

Wireless sensor networks

Natural language processing

Audio, voice and language processing

Brain-computer interface

Reliable and secure computing

Information security and forensics

Internet Computing

Learning technologies

Systems and cybernetics

Context-aware computing

Mobile Cloud Computing

Consider the following list of ideas according to the latest theses defended at the Technological Institute of Costa Rica

New methodologies in the teaching of computer science.

Measurement methods and software management.

Management of business processes and data.

Detection of traps in online games: a behavioral approach.

Information security and cryptography.

Real-time systems.

Route planning for tourism applications.

Data mining for environmental problems.

Real-time traffic data to model the impact of traffic accidents on the road network.

Computer-aided educational process.

Security in cloud computing.

Optical character recognition.

Search and rescue robots: movement and trajectory planning.

Computational neurobiology.

Computer DNA analysis.

Examples of topic ideas for a Master’s Thesis in Computer Science project

Taking into consideration, the ideas presented above, here are the following examples:

A study to evaluate the challenges and benefits of using robotics in the offer of services.

Artificial intelligence is being used to develop automatic robotics, such as robots used in Japan to care for older adults. This study will evaluate the challenges and benefits associated with the use of robots in the provision of services.

Impact of virtual reality systems on product promotion

Virtual reality technology has made it possible to develop a 3D environment with which people can interact as if it were a physical environment. This study will examine how the introduction of virtual reality has led to the growth of product promotion. The research will also examine the benefits in terms of costs and how the technology can be adopted in a company for use in product promotion.

Improve mobile battery life and processing power through cloud computing

The battery life of mobile phones in many of the smartphones on the market today is between two and twelve hours. This has become a major setback for the use of mobile technology, especially in areas where there are no electrical connections. This study will assess how cloud computing technology could be used to improve the battery life of mobile phones, testing the processing power of smartphones.

Integration of natural language processing in Microsoft office.

Microsoft office is very popular for its efficient services, especially in writing. However, its use is limited to people who understand the use of computers and is limited in common languages. This study will examine how natural language processing could be used to integrate indigenous language into Microsoft’s office suite.

Use of big data analytics in the detection of irresponsible use of social networks

The innovation of big data analytics (BDA) has helped many companies process real-time data from multiple sources. This has made it possible to improve the decision-making procedure and monitoring processes. This study will examine how BDA could be used in a company to control irresponsible social media use.

Assessment of the effects of database security mechanisms on system performance

Security mechanisms are very important for any database because they help detect and prevent any form of cyberattack. However, some security mechanisms have overhead costs or performance issues that slow down service delivery. This study will examine how the security mechanisms of database systems affect the performance of systems.

Remember that computer science is widely used today in different fields. Its application ranges from physics and medicine to education and entertainment. You can focus on the theoretical part of a certain topic or present your ideas about the practical use of a specific program.

An overview of various business stimulation tools; assessment of its impact on student learning in tertiary business school

Information and communication technologies have greatly improved the efficiency of business processes, making the functions of the organization more effective. Multimedia advances have also provided stronger platforms for information sharing, socialization and entertainment. Business process designs and multimedia information systems are key research areas in information and communication technologies.

M-Government; benefits and outcomes of mobile government for connected societies

Multi-agent systems allow for a higher level of collaboration between multiple agents working together to achieve a common goal. Coinciding with advances in the field of artificial intelligence, multi-agent systems are moving towards a higher level of adaptability. Stimulation programs are also an important stream of intelligent computer programs that aim to work in highly complex scenarios.

Encouraging the use of e-commerce in Saudi Arabia in light of existing challenges

The growing power of the Internet, software as a service (SAAS) is a booming trend that opens up many new research opportunities.

Implications of cloud computing for the multimedia industry

With the advancement of information and communication technologies, security remains one of the biggest concerns and also an important field of research.

Interpretation of information systems security management

The security management of information systems is evaluated according to the business environment, the organizational culture, the expectations and obligations of the different roles, the meanings of the different actions and the related behavioral patterns. The results of the two case studies show that inadequate analysis, design and management of computer-based information systems affect the integrity and integrity of an organization. As a result, the likelihood of adverse events occurs increases. In such an environment, it is very likely that security measures will be ignored or inadequate for the real needs of an organization. Therefore, what is needed is consistency between computer-based information systems and the business environment in which they are integrated.

A framework for assessing the quality of customer information

This thesis addresses a widespread, significant and persistent problem in the practice of information systems: the lack of investment in the quality of information about customers. Many organizations need clear financial models to undertake investments in their information systems and related processes. However, there are no widely accepted approaches to rigorously articulate the costs and benefits of potential improvements in the quality of customer information. This can result in low-quality customer information that impacts the broader goals of the organization.

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Categories:

The most seen.

research work

Copy short link

IMAGES

  1. How to Write a Master's Thesis in Computer Science

    master thesis examples computer science

  2. Thesis Titles in Computer Science by E2Matrix Jalandhar

    master thesis examples computer science

  3. Check Our Professional Computer Science Statement of Purpose Help

    master thesis examples computer science

  4. Phd Computer Science Research Proposal : Introduction

    master thesis examples computer science

  5. (PDF) Master’s Thesis in Computing Science

    master thesis examples computer science

  6. Master Thesis Computer Science And Media

    master thesis examples computer science

VIDEO

  1. Examples of Database Management System-DBMS-Tech University Online-3

  2. Master Thesis: The Full Process For Profitable Customer Acquisition In DTC

  3. From Rejected to Defended: Our Computer Engineering Thesis Journey 🇵🇭

  4. 9th Class Computer Science Chapter 2|Logical Operators & Truth Tables Examples|Class 9 Computer Ch 2

  5. Masters in Computer Science Statement of Purpose Feedback 2022

  6. Presenting my Thesis as a Computer Science Major

COMMENTS

  1. Computer Science Masters Thesis Collection

    Theses/Dissertations from 2013. Alsafeer software for teaching computer literacy, Zieb Rabie Alqahtani. Wireless electronic scoring of kendo competition matches using an embedded system, Edward B. Hogan. Using phishing to test social engineering awareness of financial employees, Rebecca M. Long.

  2. Computer Science Graduate Projects and Theses

    The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...

  3. Computer Science Masters Theses

    COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong

  4. Computer Science and Engineering Theses and Dissertations

    Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications, Arup Kanti Dey. PDF. AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing, Hamza Elhamdadi. PDF. Automatic Detection of Vehicles in Satellite Images for Economic Monitoring, Cole Hill. PDF

  5. Computer Science Theses and Dissertations

    Theses/Dissertations from 2022. PDF. The Design and Implementation of a High-Performance Polynomial System Solver, Alexander Brandt. PDF. Defining Service Level Agreements in Serverless Computing, Mohamed Elsakhawy. PDF. Algorithms for Regular Chains of Dimension One, Juan P. Gonzalez Trochez. PDF.

  6. Computer Science Masters Theses

    Our research focuses on core themes of theoretical and practical computer science: artificial intelligence and symbolic computation, networked and distributed systems, systems engineering, and human computer interaction. For more information please visit the School of Computer science home page. This material is presented to ensure timely ...

  7. MIT Theses

    MIT's DSpace contains more than 58,000 theses completed at MIT dating as far back as the mid 1800's. Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded.

  8. Computer Science Dissertations and Theses

    Theses/Dissertations from 2019. PDF. A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games, Naif Saeed Alzahrani (Dissertation) PDF. Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series, Logan Blakely (Thesis) PDF.

  9. Sample Masters Thesis/Projects

    Sample Masters Thesis/Projects. Sample Computer Science Masters Theses. Implementation of a Cartesian Grid Incompressible Navier-Stokes Solver on Multi-GPU Desktop Platforms Using CUDA. (Julien C. Thibault, 2009) Application of Parallel CompPerforming an Unsupervised Fluoroscopic Analysis of Knee Joint Kinematics. (Renu Ramanatha, 2009)

  10. Computer Science Master's Theses

    The Digital Repository Service is a secure repository system, designed to store and share scholarly, administrative, and archival materials from the Northeastern University community. The DRS was developed by the Northeastern University Library as a tool for University faculty and staff to protect the valuable information and data that has been created as part of the University's research ...

  11. Brown CS: Master's Project Reports

    Zhang, Minrui. CS2980: Model-based Semantic Compression in Database Project Report (478.9 KB) Zhang, Shu. Column-based Database Semantic Compression and Prediction-based Query Optimization (551.8 KB) Zhong, Zhigang. Fractal Tree Implementation with Intel Hardware Supported Transactional Memory (106.1 KB)

  12. Prize-Winning Thesis and Dissertation Examples

    Award: 2017 Royal Geographical Society Undergraduate Dissertation Prize. Title: Refugees and theatre: an exploration of the basis of self-representation. University: University of Washington. Faculty: Computer Science & Engineering. Author: Nick J. Martindell. Award: 2014 Best Senior Thesis Award. Title: DCDN: Distributed content delivery for ...

  13. Past Theses

    The following is a list of some of the recently completed CS Masters Theses. Date. Student. Adviser. Title. 13-Dec-16. Arpita Banerjee. Eckberg. Study of H.264 Video Streaming over Wireless Channel using GStreamer.

  14. Computer Science Department Dissertations Collection

    Geometric Representation Learning, Luke Vilnis, Computer Science. PDF. Understanding of Visual Domains via the Lens of Natural Language, Chenyun Wu, Computer Science. PDF. Towards Practical Differentially Private Mechanism Design and Deployment, Dan Zhang, Computer Science. PDF. Audio-driven Character Animation, Yang Zhou, Computer Science

  15. The M.S. Thesis Track

    The M.S. Thesis Track. The MS Thesis track is for students who want to concentrate on research in some sub-field of Computer Science. You are required to arrange for a Computer Science Faculty member who agrees to advise the thesis and the rest of your course selection prior to selecting the track.

  16. How to Write a M.Sc. Thesis

    An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria: Original research results are explained clearly and concisely. Novel implementation techniques are outlined, generalized, and explained. Theoretical results are obtained, explained, proven, and (worst, best, average) case analysis is ...

  17. PDF Master Computer Science

    Master Computer Science Automated Regression Pipeline for Time-Series problems with Real-World applications. Name: Pedro D. Santamaria Hernandez Student ID: s2379325 Date: 31/08/2021 Specialisation: Advanced Data Analytics 1st supervisor: Prof.Dr.T.H.W.Baeck 2nd supervisor: Dr.Anna V. Kononova Master's Thesis in Computer Science

  18. Computer Science

    Specializations. Master of Science (MSc) Thesis-based in Computer Science, Software Engineering Specialization . The specialization is offered jointly through the Department of Computer Science and the Department of Electrical and Software Engineering. Wearable Technology Interdisciplinary Specialization.

  19. Computer Science Library Research Guide

    How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...

  20. How to Write a Master's Thesis in Computer Science

    There needs to a statement of (1) the problem to be studied, (2) previous work on the problem, (3) the software requirements, (4) the goals of the study, (5) an outline of the proposed work with a set of milestones, and (6) a bibliography.

  21. PDF Masters Thesis/Project Proposal

    Department of Computer Science Masters Thesis/Project Proposal When a thesis topic has been firmly established, the student should submit a thesis/project proposal. It is recommended that the student accomplish this at least one ... augmented by examples and explanations. Ideally, the presentation will have been

  22. Master's Thesis in Computer Science

    Master's Thesis in Computer Science. A Master's Thesis is expected to contain the following items: In particular, the review of the state of the art should be thorough and the work performed should advance the state of the art. Each Master's Thesis will be read and judged by a thesis committee consisting of the candidate's supervisor, a faculty ...

  23. A list of master's thesis topics in computer science

    Computer DNA analysis. Examples of topic ideas for a Master's Thesis in Computer Science project. Taking into consideration, the ideas presented above, here are the following examples: A study to evaluate the challenges and benefits of using robotics in the offer of services.