ScholarWorks
Home > Engineering > Computer Science > Computer Science Graduate Projects
Computer Science Graduate Projects and Theses
Theses/dissertations from 2023 2023.
High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal
Evaluating Learning Geometric Concepts to Generate Predicate Abstract Domains in Static Program Analysis , Patrick Chadbourne
Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan
Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah
Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker
Fake News Detection Using Narrative Content and Discourse , Hongmin Kim
Anomaly Detection Using Graph Neural Network , Bishal Lakha
Robust Digital Nucleic Acid Memory , Golam Md Mortuza
Risk Assessment and Solutions for Two Domains: Election Procedures and Privacy Disclosure Prevention for Users , Kamryn DeAnn Parker
Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola
Fair Layouts in Information Access Systems: Provider-Side Group Fairness in Ranking Beyond Ranked Lists , Amifa Raj
Virtual Curtain: A Communicative Fine-Grained Privacy Control Framework for Augmented Reality , Aakash Shrestha
Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George
Transformer Reinforcement Learning Approach to Attack Automatic Fake News Detectors , Chandler Underwood
Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten
Theses/Dissertations from 2022 2022
Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck
Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones
Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi
Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee
Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn
Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy
Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda
Hate Speech Detection Using Textual and User Features , Rohan Raut
Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib
Characterization and Mitigation of False Information on the Web , Anu Shrestha
Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez
Theses/Dissertations from 2021 2021
Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen
Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar
Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green
Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz
Modeling Real and Fake News Sharing in Social Networks , Abishai Joy
Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy
Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton
Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts
A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar
Actors for the Internet of Things , Arjun Shukla
Theses/Dissertations from 2020 2020
Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black
Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke
Polyhedral+Dataflow Graphs , Eddie C. Davis
Improving Spellchecking for Children: Correction and Design , Brody Downs
A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake
Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung
Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi
Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi
Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill
Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin
Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli
A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips
Theses/Dissertations from 2019 2019
Edge-Assisted Workload-Aware Image Processing System , Anil Acharya
MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick
Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman
Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas
A Hybrid Model to Detect Fake News , Indhumathi Gurunathan
Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris
UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani
Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh
Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar
Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan
Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo
Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury
Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya
BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran
FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota
Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader
Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla
Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian
Theses/Dissertations from 2018 2018
Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya
Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah
Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri
Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour
Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha
Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton
Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira
Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa
Theses/Dissertations from 2017 2017
Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella
Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli
CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly
Predicting Friendship Strength in Facebook , Nitish Dhakal
Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi
Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley
Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala
Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes
A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal
Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki
Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li
The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship
Towards Automatic Repair of XACML Policies , Shuai Peng
Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma
Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez
Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright
Theses/Dissertations from 2016 2016
Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.
When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic
Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh
Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt
Towards Multipurpose Readability Assessment , Ion Madrazo
Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson
CEST: City Event Summarization using Twitter , Deepa Mallela
Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami
Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas
- Collections
- Disciplines
- SelectedWorks Gallery
- Albertsons Library
- Division of Research
- Graduate College
Advanced Search
- Notify me via email or RSS
Author Corner
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
- Emergency Info
- Directories
- UR Self-Service
- Academic Calendars & Schedules
- Find a Person
- Search Classes & Build Schedule
- Future Grad Students
- Professional Programs
- MSc (Thesis Route)
- MSc (Project Route)
- MSc (Data Science)
- MSc (Human-Centred Computing)
- MSc (Course Route)
- Thesis Approval & Defence Procedures
- FGSR Regulations
- Course Descriptions
- Most Recent Course Syllabi
- Course Timetable
- Financial Support
- Graduate Program FAQ
- Undergraduate
- Classes & Labs
Thesis Examples
Latex Example (shortened M.Sc. with urthesis.sty) (ZIP)
Latex Example (complete M.Sc. with no .sty) (ZIP)
How to Write a M.Sc. Thesis
The following guide to writing an M.Sc. thesis was prepared by Howard Hamilton and Brien Maguire, based on previous guides by Alan Mackworth (University of British Columbia) and Nick Cercone (Simon Fraser University), with their permission.
Quick Guide to the M.Sc. Thesis
An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria:
- Original research results are explained clearly and concisely.
- The thesis explains a novel exploratory implementation or a novel empirical study whose results will be of interest to the Computer Science community in general and to a portion of the Computer Science community in particular, e.g., Artificial Intelligence, Computational Complexity, etc.
- Novel implementation techniques are outlined, generalized, and explained.
- Theoretical results are obtained, explained, proven, and (worst, best, average) case analysis is performed where applicable.
- The implementation of a practical piece of nontrivial software whose availability could have some impact on the Computer Science community. Examples are a distributed file system for a mobile computing environment and a program featuring the application of artificial intelligence knowledge representation and planning techniques to intelligent computer assisted learning software.
Writing an acceptable thesis can be a painful and arduous task, especially if you have not written much before. A good methodology to follow, immediately upon completion of the required courses, is to keep a paper or electronic research notebook and commit to writing research oriented notes in it every day. From time to time, organize or reorganize your notes under headings that capture important categories of your thoughts. This journal of your research activities can serve as a very rough draft of your thesis by the time you complete your research. From these notes to a first M.Sc. thesis draft is a much less painful experience than to start a draft from scratch many months after your initial investigations. To help structure an M.Sc. thesis, the following guide may help.
One Formula for an M.Sc. Thesis for Computer Science
Chapter 1 Introduction: This chapter contains a discussion of the general area of research which you plan to explore in the thesis. It should contain a summary of the work you propose to carry out and the motivations you can cite for performing this work. Describe the general problem that you are working towards solving and the specific problem that you attempt to solve in the thesis. For example, the general problem may be finding an algorithm to help an artificial agent discover a path in a novel environment, and the specific problem may be evaluating the relative effectiveness and efficiency of five particular named approaches to finding the shortest path in a graph where each node is connected to at most four neighbours, with no knowledge of the graph except that obtained by exploration. This chapter should also explain the motivations for solving each of the general problem and your specific problem. The chapter should end with a guide to the reader on the composition and contents of the rest of the thesis, chapter by chapter. If there are various paths through the thesis, these should also be explained in Chapter 1.
Chapter 2 Limited Overview of the Field: This chapter contains a specialized overview of that part of a particular field in which you are doing M.Sc. thesis research, for example, paramodulation techniques for automated theorem proving or bubble figure modelling strategies for animation systems. The survey should not be an exhaustive survey but rather should impose some structure on your field of research endeavour and carve out your niche within the structure you impose. You should make generous use of illustrative examples and citations to current research.
Chapter 3 My Theory/Solution/Algorithm/Program: This chapter outlines your proposed solution to the specific problem described in Chapter 1. The solution may be an extension to, an improvement of, or even a disproof of someone else's theory / solution / method / ...).
Chapter 4 Description of Implementation or Formalism: This chapter describes your implementation or formalism. Depending on its length, it may be combined with Chapter 3. Not every thesis requires an implementation. Prototypical implementations are common and quite often acceptable although the guiding criterion is that the research problem must be clearer when you've completed your task than it was when you started!
Chapter 5 Results and Evaluation: This chapter should present the results of your thesis. You should choose criteria by which to judge your results, for example, the adequacy, coverage, efficiency, productiveness, effectiveness, elegance, user friendliness, etc., and then clearly, honestly and fairly adjudicate your results according to fair measures and report those results. You should repeat, whenever possible, these tests against competing or previous approaches (if you are clever you will win hands down in such comparisons or such comparisons will be obviated by system differences). The competing or previous approaches you compare against must have been introduced in Chapter 2 (in fact that may be the only reason they actively appear in Chapter 2) and you should include pointers back to Chapter 2. Be honest in your evaluations. If you give other approaches the benefit of the doubt every time, and develop a superior technique, your results will be all the more impressive.
Chapter 6 Conclusions: This chapter should summarize the achievements of your thesis and discuss their impact on the research questions you raised in Chapter 1. Use the distinctive phrasing "An original contribution of this thesis is" to identify your original contributions to research. If you solved the specific problem described in Chapter 1, you should explicitly say so here. If you did not, you should also make this clear. You should indicate open issues and directions for further or future work in this area with your estimates of relevance to the field, importance and amount of work required.
References Complete references for all cited works. This should not be a bibliography of everything you have read in your area.
Appendices include technical material (program listings, output, graphical plots of data, detailed tables of experimental results, detailed proofs, etc.) which would disrupt the flow of the thesis but should be made available to help explain or provide details to the curious reader.
- Privacy & Terms of Use
- Contact U of R
- Campus Maps
- U of R Home
- For Faculty and Staff
- City of Regina
Senior Thesis
A senior thesis is more than a big project write-up. It is documentation of an attempt to contribute to the general understanding of some problem of computer science, together with exposition that sets the work in the context of what has come before and what might follow. In computer science, some theses involve building systems, some involve experiments and measurements, some are theoretical, some involve human subjects, and some do more than one of these things. Computer science is unusual among scientific disciplines in that current faculty research has many loose ends appropriate for undergraduate research.
Senior thesis projects generally emerge from collaboration with faculty. Students looking for senior thesis projects should tell professors they know, especially professors whose courses they are taking or have taken, that they are looking for things to work on. See the page on CS Research for Undergrads . Ideas often emerge from recent papers discussed in advanced courses. The terms in which some published research was undertaken might be generalized, relaxed, restricted, or applied in a different domain to see if changed assumptions result in a changed solution. Once a project gets going, it often seems to assume a life of its own.
To write a thesis, students may enroll in Computer Science 91r one or both terms during their senior year, under the supervision of their research advisor. Rising seniors may wish to begin thinking about theses over the previous summer, and therefore may want to begin their conversations with faculty during their junior spring—or even try to stay in Cambridge to do summer research.
An information session for those interested in writing a senior thesis is held towards the end of each spring semester. Details about the session will be posted to the [email protected] email list.
Students interested in commercializing ideas in their theses may wish to consult Executive Dean Fawwaz Habbal about patent protection. See Harvard’s policy for information about ownership of software written as part of your academic work.
Thesis Supervisor
You need a thesis supervisor. Normally this is a Harvard Computer Science faculty member. Joint concentrators (and, in some cases, non-joint concentrators) might have a FAS/SEAS Faculty member from a different field as their thesis supervisor. Exceptions to the requirement that the thesis supervisor is a CS or FAS/SEAS faculty member must be approved by the Director of Undergraduate Studies. For students whose advisor is not a Harvard CS faculty member, note that at least one of your thesis readers must be a Harvard CS faculty member, and we encourage you to talk with this faculty member regularly to help ensure that your thesis is appropriately relevant for Harvard Computer Science.
It’s up to you and your supervisor how frequently you meet and how engaged the supervisor is in your thesis research. However, we encourage you to meet with your supervisor at least several times during the Fall and Spring, and to agree on deadlines for initial results, chapter outlines, drafts, etc.
Thesis Readers
The thesis is evaluated by the thesis readers: the thesis supervisor and at least one other reader. Thesis readers must include at least one Harvard CS faculty member/affiliate . Ordinarily all readers are teaching faculty members of the Faculty of Arts and Sciences or SEAS who are generally familiar with the research area.
The student is responsible for finding the thesis readers, but you can talk with your supervisor for suggestions of possible readers.
Exceptions to these thesis reader requirements must be approved by the Directors of Undergraduate Studies.
For joint concentrators, the other concentration may have different procedures for thesis readers; if you have any questions or concerns about thesis readers, please contact the Directors of Undergraduate Studies.
Senior Thesis Seminar
Computer Science does not have a Senior Thesis seminar course.
However, we do run an informal optional series of Senior Thesis meetings in the Fall to help with the thesis writing process, focused on topics such as technical writing tips, work-shopping your senior thesis story, structure of your thesis, and more. Pay attention to your email in the Fall for announcements about this series of meetings.
The thesis should contain an informative abstract separate from the body of the thesis. This abstract should clearly state what the contribution of the thesis is–which parts are expository, whether there are novel results, etc. We also recommend the thesis contain an introduction that is at most 5 pages in length that contains an “Our contributions” section which explains exactly what the thesis contributed, and which sections in the thesis these are elaborated on. At the degree meeting, the Committee on Undergraduate Studies in Computer Science will review the thesis abstract, the reports from the three readers and the student’s academic record; it will have access to the thesis. The readers (and student) are told to assume that the Committee consists of technical professionals who are not necessarily conversant with the subject matter of the thesis so their reports (and abstract) should reflect this audience.
The length of the thesis should be as long as it needs to be to present its arguments, but no longer!
There are no specific formatting guidelines. For LaTeX, some students have used this template in the past . It is set up to meet the Harvard PhD Dissertation requirements, so it is meeting requirements that you as CS Senior Thesis writers don’t have.
Thesis Timeline for Seniors
(The timeline below is for students graduating in May. For off-cycle students, the same timeline applies, but offset by one semester. The thesis due date for March 2025 graduates is Friday November 22, 2024 at 2pm. The thesis deadline for May 2025 graduates is Friday March 28th at 2pm.
Please be aware that students writing a joint thesis must meet the requirements of both departments—so if there are two different due dates for the thesis, you are expected to meet the earlier date.
Senior Fall (or earlier) Find a thesis supervisor, and start research.
October/November/December Start writing.
All fourth year concentrators are contacted by the Office of Academic Programs and those planning to submit a senior thesis are requested to supply certain information, including name of advisor and a tentative thesis title. You may use a different title when you submit your thesis; you do not need to tell us your updated title before then. If Fall 2024 is your final term, please fill out this form . If May 2024 is your final term, please fill out this form .
Early February The student should provide the name and contact information for the readers (see above), together with assurance that they have agreed to serve.
Mid-March Thesis supervisors are advised to demand a first draft. (A common reaction of thesis readers is “This would have been an excellent first draft. Too bad it is the final thesis—it could have been so much better if I had been able to make some suggestions a couple of weeks ago.")
March 28, 2025 Thesis is due by 2:00 pm. Electronic copies in PDF format should be delivered by the student to all three readers and to [email protected] (which will forward to the Director of Undergraduate Studies) on or before that date. An electronic copy should also be submitted via the SEAS online submission tool on or before that date. SEAS will keep this electronic copy as a non-circulating backup. During this online submission process, the student will also have the option to make the electronic copy publicly available via DASH, Harvard’s open-access repository for scholarly work. Please note that the thesis will NOT be published to ProQuest. More information can be found on the SEAS Senior Thesis Submission page.
The two or three readers will receive a rating sheet to be returned to the Office of Academic Programs before the beginning of the Reading Period, together with their copy of the thesis and any remarks to be transmitted to the student.
Late May The Office of Academic Programs will send students their comments after the degree meeting to decide honors recommendations.
Thesis Extensions and Late Submissions
Thesis extensions Thesis extensions will be granted in extraordinary circumstances, such as hospitalization or grave family emergency, with the support of the thesis advisor and resident dean and the agreement of all readers. For joint concentrators, the other concentration should also support the extension. To request an extension, please have your advisor or resident dean email [email protected] , ideally several business days in advance, so that we may follow up with readers. Please note that any extension must be able to fall within our normal grading, feedback, and degree recommendation deadline, so extensions of more than a few days are usually impossible.
Late submissions Late submission of thesis work should be avoided. Work that is late will ordinarily not be eligible for thesis prizes like the Hoopes Prize. Theses submitted late will ordinarily be penalized one full level of honors (highest honors, high honors, honors, no honors) per day late or part thereof, including weekends, so a thesis submitted two days and one minute late is ordinarily ineligible to receive honors. Penalties will be waived only in extraordinary cases, such as documented medical illness or grave family emergency; students should consult with the Directors of Undergraduate Studies in that event. Missed alarm clocks, crashed computers, slow printers, corrupted files, and paper jams are not considered valid causes for extensions.
Thesis Examples
Recent thesis examples can be found on the Harvard DASH (Digital Access to Scholarship at Harvard) repository here . Examples of Mind, Brain, Behavior theses are here .
Spectral Sparsification: The Barrier Method and its Applications
- Martin Camacho, Advisor: Jelani Nelson
Good Advice Costs Nothing and it’s Worth the Price: Incentive Compatible Recommendation Mechanisms for Exploring Unknown Options
- Perry Green, Advisor: Yiling Chen
Better than PageRank: Hitting Time as a Reputation Mechanism
- Brandon Liu, Advisor: David Parkes
Tree adjoining grammar at the interfaces
- Nicholas Longenbaugh, Advisor: Stuart Shieber
SCHUBOT: Machine Learning Tools for the Automated Analysis of Schubert’s Lieder
- Dylan Nagler, Advisor: Ryan Adams
Learning over Molecules: Representations and Kernels
- Jimmy Sun, Advisor: Ryan Adams
Towards the Quantum Machine: Using Scalable Machine Learning Methods to Predict Photovoltaic Efficacy of Organic Molecules
- Michael Tingley, Advisor: Ryan Adams
Writing Your Thesis
At this page, we provide some information necessary while writing a thesis. Basically, the same rules can be applied for any other scientific paperwork. We must admit that this information collected here is neither complete nor represents it a general rule set. Nevertheless, we try to keep it up-to-date and comprehensive. If you have comments or suggestions, please drop me a short note.
Presentation Templates
- The FAU provide templates for your presentations here
LaTeX Template
- We provide a template for your thesis: Download (new 27. July 2022) .
- Please try to stick with this layout.
General Rules and Hints
- How to write an abstract
- Motivation (Why do we care?)
- Problem statement (What problem are we trying to solve?)
- Approach (How did we go about it)
- Results (What’s the answer?)
- Conclusion (What are the implications of the answer?)
- Context: make sure to link where your work fits in
- Problem: gap in knowledge, too expensive, too slow, a deficiency, superseded technology
- Strategy: the way you will address the problem
- comment on employed hardware and software
- describe methods and techniques that build the basis of your work
- review related work(!)
- start with a theoretical approach
- describe the developed system/algorithm/method from a high-level point of view
- go ahead in presenting your developments in more detail
- whatever you have done, you must comment it, compare it to other systems, evaluate it
- usually, adequate graphs help to show the benefits of your approach
- caution: each result/graph must be discussed! what’s the reason for this peak or why have you ovserved this effect
- summarize again what your paper did, but now emphasize more the results, and comparisons
- write conclusions that can be drawn from the results found and the discussion presented in the paper
- future work (be very brief, explain what, but not much how)
- all papers and articles used in the thesis must be cited (and each reference must be used in the thesis!)
- a rough number is 20 references for a bachelor thesis and 30-40 for a master’s thesis
- avoid to cite web sites
- We highly recommend to use Endnote or BibTeX for creating the references and citings
- Further information: IEEE Rules , BibTeX
- Avoid passive voice, active voice is easier to read. There is nothing wrong saying I (or we) did it
- Avoid negative sentences: write in a positive (affirmative) voice, they are easier to understand.
- Always use vector graphics for figures (PDF, EPS, …)
- Did I spell out the main points of the interpretation of results?
- Are all equations, figures, tables numbered?
- Do all graphs, tables, diagrams have descriptive captions?
- Are all axes and scale carefully chosen to show the relevant effects?
- Are all axes labelled? Do the labals include the measurement units?
- Are citations in the caption (if a graph is borrowed)?
Further reading
- Some Advice on Writing a Technical Report
- Ein sehr schöner Überblicksartikel von Henning Schulzrinne zum Aufbau eines Papers.
- Advice on Research and Writing
- Computer Science Student Resource Site
Format Requirements for Your Dissertation or Thesis
Main navigation.
The final dissertation or thesis manuscript must have a ready-for-publication appearance and standard features.
The Office of the University Registrar does not endorse or verify the accuracy of any dissertation or thesis formatting templates that may be available to you.
It is your student responsibility to make sure that the formatting meets these requirements. Introductory material, text, and appendices must all be clearly and consistently prepared and must meet all of the specifications outlined below.
Once you upload and submit your dissertation or thesis in Axess, and it has been approved by the university, the submission is considered final and no further changes are permitted.
The digital file of the dissertation or thesis, which is sent to Stanford Libraries for cataloging, must meet certain technical requirements to ensure that it can be easily accessed by readers now and into the future.
Follow the specifications outlined below.
Style and Format
Word and text divisions, style guides, content and layout, special instructions for d.m.a. students, order and content, page orientation, embedded links, supplementary material and publishing, supplementary material, scholarly reference, published papers and multiple authorship, use of copyrighted material, copyrighting your dissertation, file security and file name, stanford university thesis & dissertation publication license.
Pages should be standard U.S. letter size (8.5 x 11 inches).
In order to ensure the future ability to render the document, standard fonts must be used.
For the main text body, type size should be 10, 11, or 12 point. Smaller font sizes may be used in tables, captions, etc.
The font color must be black.
Font Families
Acceptable font styles include:
- Times New Roman (preferred)
- Courier, Courier Bold, Courier Oblique, Courier Bold-Oblique;
- Helvetica, Helvetica Bold, Helvetica Oblique, Helvetica Bold-Oblique;
- Times, Times Bold, Times Italic, Times Bold-Italic;
- Computer Modern (or Computer Modern Roman).
Note: Do not use script or ornamental fonts. Do not use proprietary fonts.
If you use mathematical or other scientific notation in your dissertation or thesis using a font other than Symbol, you must embed the font into the PDF that is submitted to the university.
Inner margins (left edge if single-sided; right edge for even-numbered pages, and left edge for odd-numbered pages if double-sided) must be 1.5 inches. All other margins must be one inch.
Pagination, headers, and/or footers may be placed within the margin, but no closer than one-half inch from the edge of the page.
For double-sided copies, 1.5 inches must be maintained as the inner margin. Margin requirements should apply to the entire document, including the title page.
The main body text of the manuscript should be one-and-a-half or double-spaced lines, except where conventional usage calls for single spacing, such as footnotes, indented quotations, tables, appendices, etc.
Words should be divided correctly at the end of a line and may not be divided from one page to the next. Use a standard dictionary to determine word division.
Avoid short lines that end a paragraph at the top of a page, and any heading or subheading at the bottom of a page that is not followed by text.
The dissertation and thesis must be in English.
Language Exceptions for Dissertations Only
Approval for writing the dissertation in another language is normally granted only in cases where the other language or literature in that language is also the subject of the discipline.
Exceptions are granted by the school dean upon submission of a written request from the chair of your major department. Approval is routinely granted for dissertations in the Division of Literature, Cultures, and Languages within department specifications.
Prior to submitting in Axess, you must send a copy of the approval letter (or email message chain) from the department dean to [email protected]
Dissertations written in another language must include an extended summary in English (usually 15 to 20 pages in length). In this case, you should upload your English summary as a supplemental file, during Step 4 of the online submission process.
Select a standard style approved by your department or dissertation advisor and use it consistently.
Some reliable style guides are:
- K.A. Turabian’s A Manual for Writers of Term Papers,
- Theses and Dissertations (University of Chicago Press), and
- the MLA Handbook for Writers of Research Papers, Theses, and Dissertations (Modern Language Association).
If you are a student in the Doctor of Musical Arts program, you may submit musical scores formatted at 11 x 17 inches in size.
If you are submitting a performance as your dissertation, submit the audio file in WAV format as a supplemental file.
Note: The maximum file size accepted for submission is 100 MB. If a performance recording exceeds the maximum file size, break the file into multiple files and submit the parts individually as supplemental files.
Your dissertation or thesis must contain the following sections. All sections must be included in a single digital file for upload.
- Title Page — The format must be followed exactly. View these title page examples for Ph.D. Dissertation and this title page sample for an Engineer Thesis . Use uppercase letters. The title of the dissertation or thesis should be a meaningful description of the content of the manuscript. Use word substitutes for formulas, symbols, superscripts, subscripts, Greek letters, etc. The month and year must be the actual month and year in which you submit your dissertation or thesis electronically to the university. (Note: A student who submits in Autumn quarter is conferred his/her degree in the following calendar year.)
- Copyright Page — The dissertation or thesis PDF uploaded in Axess should not contain a copyright page. The copyright page will be created automatically by the online submission system and inserted into the file stored by Stanford Libraries.
- Signature Page — The dissertation or thesis PDF uploaded in Axess should also not contain a signature page. The submission process has moved away from ink-signatures, so a digital facsimile of the signature page will be created automatically by the online submission system and inserted into the dissertation or thesis in its final format stored by Stanford Libraries.
- Abstract — An abstract may be included in the preliminary section of the dissertation or thesis. The abstract in the body of the dissertation or thesis follows the style used for the rest of the manuscript and should be placed following the signature page. There is no maximum permissible length for the abstract in the dissertation or thesis. Dissertation authors must enter an abstract using the online submission form for uploading the digital dissertation or thesis file to the library. This abstract, which will be indexed for online searching, must be formatted in plain text (no HTML or special formatting). It should be a pithy and succinct version of the abstract included in the dissertation or thesis itself.
- Preface, an Acknowledgment, or a Dedication. This is optional.
- Table of Contents – Include page references.
- List of Tables – Include titles and page references. This list is optional.
- List of Illustrations – Include titles and page references. This list is optional
- Introduction/Main body – Include suitable, consistent headings for the larger divisions and more important sub-divisions.
- Appendices. This is optional.
- Bibliography or List of References.
Except for the title page, which counts as 'i' but is not physically numbered, each page of the manuscript, including all blank pages, pages between chapters, pages with text, photographs, tables, figures, maps, or computer code must be assigned a number.
Consistent placement of pagination, at least one-half inch from the paper’s edge, should be used throughout the manuscript.
Follow these pagination instructions exactly:
- For the preliminary pages, use small Roman numerals (e.g., iv, v, vi).
- The title page is not physically numbered, but counts as page i.
- Keep in mind that a copyright page ii and augmented signature page iii (based off your student record) will automatically be inserted to your manuscript during submission. This means you must ensure to remove pages ii and iii from your dissertation or thesis.
- Failing to remove pages ii and iii is most common formatting mistake: you must remove your copyright page ii and signature page iii from the pdf file before you submit your dissertation or thesis, and begin pagination on your abstract with page number "iv". If the document is formatted for double-sided printing with each section starting on the right page, then pagination will begin on a blank page (page"iv") and the Abstract should be numbered as page "v", and so forth.
- For the remainder of the manuscript, starting with the Introduction or Chapter 1 of the Main Body, use continuous Arabic pagination only (1, 2, 3, etc) for text, illustrations, images, appendices, and the bibliography. Remember to start with Arabic numbered page 1, as this is not a continuation of the Roman numeral numbering from the preliminary pages.
- The placement of page numbers should be consistent throughout the document.
For text, illustrations, charts, graphs, etc., printed in landscape form, the orientation should be facing away from the bound edge of the paper.
Images (color, grayscale, and monochrome) included in the dissertation or thesis should be clearly discernible both on screen and when printed. The dimensions should not exceed the size of the standard letter-size page (8.5” x 11”).
Image resolution should be 150 dots per inch (dpi), though resolutions as low as 72 dpi (and no lower) are acceptable.
The format of images embedded in the PDF should be JPEG or EPS (the format JPEG2000 is also acceptable when it is supported in future versions of the PDF format). GIF and PNG are not preferred image file formats.
Large images, including maps and charts or other graphics that require high resolution, should not be included in the main dissertation or thesis file. Instead, they can be submitted separately as supplemental files and formatted in other formats as appropriate.
Multimedia, such as audio, video, animation, etc., must not be embedded in the body of the dissertation or thesis. These media types add size and complexity to the digital file, introducing obstacles to users of the dissertation or thesis who wish to download and read (and “play back”) the content, and making it more difficult to preserve over time.
If you wish to include multimedia with your submission, upload the media separately as a stand-alone file in an appropriate media format. See Supplementary Material section below.
It is acceptable to include “live” (i.e., clickable) web URLs that link to online resources within the dissertation or thesis file. Spell out each URL in its entirety (e.g., http://www.stanford.edu ) rather than embedding the link in text (e.g., Stanford homepage ). By spelling out the URL, you improve a reader’s ability to understand and access the link reference.
Supplementary material may be submitted electronically with the dissertation or thesis. This material includes any supporting content that is useful for understanding the dissertation or thesis, but is not essential to the argument. It also covers core content in a form that can not be adequately represented or embedded in the PDF format, such as an audio recording of a musical performance.
Supplementary materials are submitted separately than the dissertation or thesis file, and are referred to as supplemental files.
A maximum of twenty supplemental files can be submitted. There are no restrictions on the file formats. The maximum file size is 1 GB.
You are encouraged to be judicious about the volume and quality of the supplemental files, and to employ file formats that are widely used by researchers generally, if not also by scholars of the discipline.
The following table outlines recommended file formats for different content types. By following these recommendations, the author is helping to ensure ongoing access to the material.
Content Type | Recommended Formats (preferred formats appear in italics) |
---|---|
Text |
|
Data Sets | Plain ASCII text with accompanying code books (as PDF or plain ASCII text) Statistical software files: DTA, SAS, SAV, POR |
Image |
|
Audio |
AIFF, MIDI, SND, MP3, QTA Note-based digital music composition files: XMA, SMF, RMID |
Video |
QuickTime, AVI, WMV |
Animation | Flash, SVG |
After uploading each supplemental file, it is important to enter a short description or label (maximum 120 characters for file name and the description). This label will be displayed to readers in a list of the contents for the entire submission.
If copyrighted material is part of the supplementary material, permission to reuse and distribute the content must be obtained from the owner of the copyright. Stanford Libraries requires copies of permission letters (in PDF format) to be uploaded electronically when submitting the files, and assumes no liability for copyright violations. View this sample permission letter .
System restrictions allow for a maximum of 10 individually uploaded permission files. If you have more than 10 permission files we recommend combining all permission letters into a single PDF file for upload.
In choosing an annotation or reference system, you should be guided by the practice of your discipline and the recommendations of your departments. In addition to the general style guides listed in the Style section above, there are specific style guides for some fields. When a reference system has been selected, it should be used consistently throughout the dissertation or thesis. The placement of footnotes is at your discretion with reading committee approval.
An important aspect of modern scholarship is the proper attribution of authorship for joint or group research. If the manuscript includes joint or group research, you must clearly identify your contribution to the enterprise in an introduction.
The inclusion of published papers in a dissertation or thesis is the prerogative of the major department. Where published papers or ready-for-publication papers are included, the following criteria must be met:
- There must be an introduction that integrates the general theme of the research and the relationship between the chapters. The introduction may also include a review of the literature relevant to the dissertation or thesis topic that does not appear in the chapters.
- Multiple authorship of a published paper should be addressed by clearly designating, in an introduction, the role that the dissertation or thesis author had in the research and production of the published paper. The student must have a major contribution to the research and writing of papers included in the dissertation or thesis.
- There must be adequate referencing of where individual papers have been published.
- Written permission must be obtained for all copyrighted materials. Letters of permission must be uploaded electronically in PDF form when submitting the dissertation or thesis.
- The published material must be reformatted to meet the university's format requirements (e.g., appropriate margins and pagination) of the dissertation. The Office of the University Registrar will approve a dissertation or thesis if there are no deviations from the normal specifications that would prevent proper dissemination and utilization of the dissertation or thesis. If the published material does not correspond to these standards, it will be necessary for you to reformat that portion of the dissertation or thesis.
- Multiple authorship has implications with respect to copyright and public release of the material. Be sure to discuss copyright clearance and embargo options with your co-authors and your advisor well in advance of preparing your thesis for submission.
If copyrighted material belonging to others is used in your dissertation or thesis or is part of your supplementary materials, you must give full credit to the author and publisher of the work in all cases, and obtain permission from the copyright owner for reuse of the material unless you have determined that your use of the work is clearly fair use under US copyright law (17 USC §107).
The statute sets out four factors that must be considered when assessing Fair Use:
- the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purpose;
- the nature of the copyrighted work;
- the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
- the effect of the use upon the potential market for or value of the copyrighted work.
The Association of American University Presses requires permission for any quotations that are reproduced as complete units (poems, letters, short stories, essays, journal articles, complete chapters or sections of books, maps, charts, graphs, tables, drawings, or other illustrative materials). You can find this guideline and other detailed information on Fair Use at http://fairuse.stanford.edu .
If you are in doubt, it is safest to obtain permission. Permission to use copyrighted material must be obtained from the owner of the copyright. Stanford Libraries requires copies of permission letters (in PDF format) to be uploaded electronically when submitting the dissertation or thesis, and assumes no liability for copyright violations. For reference, view this sample permission letter .
Copyright protection is automatically in effect from the time the work is in fixed form. A proper copyright statement consisting of the copyright symbol, the author’s name, year of degree conferral, and the phrase “All Rights Reserved” will be added automatically to the dissertation or thesis in its final form.
Registration of copyright is not required, but it establishes a public record of your copyright claim and enables copyright owners to litigate against infringement. You need not register your copyright with the U.S. Copyright Office at the outset, although registration must be made before the copyright may be enforced by litigation in case of infringement.
Early registration does have certain advantages: it establishes a public record of your copyright claim, and if registration has been made prior to the infringement of your work, or within three months after its publication, qualifies you to be awarded statutory damages and attorney fees in addition to the actual damages and profits available to you as the copyright owner (should you ever have to sue because of infringement).
For more information about copyright, see the Stanford Libraries' resource on Copyright Considerations .
For further information on Registration of Copyright, see https://www.copyright.gov/registration/ .
Do not require a password to make changes to your submitted PDF file, or apply other encryption or security measures. Password-protected files will be rejected.
The file name and description will be printed on a page added to your dissertation or thesis, so choose a file name accordingly.
Important note: File names may only consist of alphanumeric characters, hyphen, underscore, at sign, space, ampersand, and comma – before the ending period and file extension. Specifically,
- A file name cannot start with a space, period (nor contain a period), underscore, or hyphen.
- Files names must be 120 characters or less.
Here is an example of a filename that is allowed, including all of the possible characters:
- A Study of Social Media with a Focus on @Twitter Accounts, Leland Student_30AUG2023.pdf
In submitting a thesis or dissertation to Stanford, the author grants The Trustees of Leland Stanford Junior University (Stanford) the non-exclusive, worldwide, perpetual, irrevocable right to reproduce, distribute, display and transmit author's thesis or dissertation, including any supplemental materials (the Work), in whole or in part in such print and electronic formats as may be in existence now or developed in the future, to sub-license others to do the same, and to preserve and protect the Work, subject to any third-party release or display restrictions specified by Author on submission of the Work to Stanford.
Author further represents and warrants that Author is the copyright holder of the Work, and has obtained all necessary rights to permit Stanford to reproduce and distribute third-party materials contained in any part of the Work, including use of third-party images, text, or music, as well as all necessary licenses relating to any non-public, third-party software necessary to access, display, and run or print the Work. Author is solely responsible and will indemnify Stanford for any third party claims related to the Work as submitted for publication.
Author warrants that the Work does not contain information protected by the Health Insurance Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), confidentiality agreements, or contain Stanford Prohibited, Restricted or Confidential data described on the University IT website , or other data of a private nature.
Stanford is under no obligation to use, display or host the work in any way and may elect not to use the work for any reason including copyright or other legal concerns, financial resources, or programmatic need.
- Enroll & Pay
- Prospective Students
- Current Students
- Degree Programs
Example MS Thesis Outline
- describe what you trying to do
- clearly state the question being addressed
- when appropriate formulate a testable hypothesis
- Describe the motivation; who is interested in the solution.
- Summarize the results and their significance.
- Describe current understanding of the problem, existing solutions, and the barriers to these solutions.
- Review of the pertinent literature.
- Methodology: Describe the approach to addressing the problem
- Presentation of Work (Could be more than one chapter)
- Summary of results
- Recommendations: generalize conclusions to appropriate design decisions, practices and/or procedures
- Implications to existing knowledge/theory
- Implications for further study
- Future Work
- Dalhousie University Libraries
Computer Science Research Guide
- Writing & Citing
- Dal Libraries Intro
Computer Science Style Guide suggestions
Guidelines, forms & templates, academic writing handbook, academic integrity.
- ACM, APA & IEEE Examples
- Quoting & Paraphrasing
- Quick Facts
- Literature Search
- Research at Dal
Library Events
Computer science style guide suggestions.
Collect a basic set of information for each one of your references, and then format this information to match an accepted Bibliographic Style (ACM, APA or IEEE).
If writing for a specific journal/conference, you may need to adapt your references to fit with the style variation used by your specific journal/conference. Using a citation manager , or BibTex and LaTex might help you automate this process.
- Computer Science examples using ACM, APA and IEEE Shows how to write a Reference using three different styles
- ACM Citation Style and Reference Formats Examples for most common reference types formatted for ACM journals.
- ACM Word and LaTeX Templates For use in Microsoft Word or in LaTex.
- Dalhousie University APA quick style Guide This APA style guide give you a quick overview of some common APA citation methods and examples of APA references and citations. It is based on the 7th edition of the APA style
- APA Citation Style Dal Libraries page with links to many resources on using the APA citation style, including videos.
- IEEE Style Reference Guide Examples for many types of documents. See page 5 for conference abbreviations, pages 20-24 for common abbreviations, and page 20 for the many options for formatting online references.
- IEEE LaTex templates For use with LaTex.
- IEEE Standard Abbreviations Monash University guide to standard abbreviations, with links to several online tools
The Faculty of Graduate Studies is your link for meeting the graduation requiprements associated with writing a dissertation, a thesis or a project report.
- Forms & Documents (Dal resource) Start here if you are getting ready to write your Thesis, or planning for your Defence.
- Formatting your Thesis (Dal resource) Provides Checkists, Guidelines, Samples and Templates.
- Sample for a Project or Thesis (Dal resource) This sample format is for MS Word.
- Electronic Thesis Submission ( Dal resource) Describes how to submit your thesis electronically (you must use the PDF/A format) and provides a list of binding companies (to make print copies).
- Academic Integrity @ Dalhousie
- Paraphrasing Tips Online tutorial about paraphrasing
Zotero is a free tool that helps you collect, organize, cite, and share your research sources. It is a plug-in for the Firefox browser - to use it, you need to download and install it.
- Download site Open source tool comes from George Mason University
- Learn the Basics Includes a demo and how-to-use tutorials
- Quick Start User Guide Follow the Table of Contents to meet your needs
- Zotero and LaTex Guide from the University of Melbourne on managing BibTex entries with a reference management program such as Zotero.
- Zotery - Citation Management Learn more about plugins, working in groups, and creating collections in Dal Libraries' guide
- << Previous: Dal Libraries Intro
- Next: ACM, APA & IEEE Examples >>
- Last Updated: Jul 15, 2024 1:43 PM
- URL: https://dal.ca.libguides.com/csci
UKnowledge > College of Engineering > Computer Science > Theses & Dissertations
Theses and Dissertations--Computer Science
Theses/dissertations from 2024 2024.
Extracting Social Network Model Parameters from Social Science Literature , Isaac Batts
LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS , Shashank Gupta
TENSION CONTROL AND INTERPROXIMATION TECHNIQUES FORSHAPE DESIGN AND RGB-DEPTH SEGMENTATION RECONSTRUCTION AND MODELING , Anastasia Kazadi
Flexible Attenuation Fields: Tomographic Reconstruction From Heterogeneous Datasets , Clifford S. Parker
Theses/Dissertations from 2023 2023
Small Approximate Pareto Sets with Quality Bounds , William Bailey
Machine-Learning-Powered Cyber-Physical Systems , Enrico Casella
PERSONALIZED POINT OF INTEREST RECOMMENDATIONS WITH PRIVACY-PRESERVING TECHNIQUES , Longyin Cui
Deep Learning-Based Intrusion Detection Methods for Computer Networks and Privacy-Preserving Authentication Method for Vehicular Ad Hoc Networks , Ayesha Dina
Machine Learning Framework for Real-World Electronic Health Records Regarding Missingness, Interpretability, and Fairness , Jing Lucas Liu
Enabling DApps Data Exchange with Hardware-Assisted Secure Oracle Network , Yue Li
Improving Connectivity for Remote Cancer Patient Symptom Monitoring and Reporting in Rural Medically Underserved Regions , Esther Max-Onakpoya
A Secure and Distributed Architecture for Vehicular Cloud and Protocols for Privacy-preserving Message Dissemination in Vehicular Ad Hoc Networks , Hassan Mistareehi
Practical AI Value Alignment Using Stories , Md Sultan Al Nahian
Hard-Hearted Scrolls: A Noninvasive Method for Reading the Herculaneum Papyri , Stephen Parsons
Deep Learning Models for CT Image Standardization , Md Selim
Multi-agent Learning For Game-theoretical Problems , Kshitija Taywade
Peer-to-Peer Energy Trading in Smart Residential Environment with User Behavioral Modeling , Ashutosh Timilsina
The BASIL technique: Bias Adaptive Statistical Inference Learning Agents for Learning from Human Feedback , Jonathan Indigo Watson
Structured Attention for Image Analysis , Xin Xing
Multi-Domain Adaptation for Image Classification, Depth Estimation, and Semantic Segmentation , Yu Zhang
Theses/Dissertations from 2022 2022
Learning a Scalable Algorithm for Improving Betweenness in the Lightning Network , Vincent Davis
Don't Give Me That Story! -- A Human-Centered Framework for Usable Narrative Planning , Rachelyn Farrell
Image Geo-localization with Cross-Attention , Connor Greenwell
Smart Decision-Making via Edge Intelligence for Smart Cities , Nathaniel Hudson
Supporting Stylized Language Models Using Multi-Modality Features , Chengxi Li
Page 1 of 9
Advanced Search
- Notify me via email or RSS
Browse by Author
- Collections
- Disciplines
Author Corner
- Submit Research
New Title Here
Below. --> connect.
- Law Library
- Special Collections
- Copyright Resource Center
- Graduate School
- Scholars@UK
- We’d like your feedback
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
University of Kentucky ®
An Equal Opportunity University Accreditation Directory Email Privacy Policy Accessibility Disclosures
- Harvard Library
- Research Guides
- Faculty of Arts & Sciences Libraries
Computer Science Library Research Guide
Find dissertations and theses.
- Get Started
- How to get the full-text
- What is Peer Review?
- Find Books in the SEC Library This link opens in a new window
- Find Conference Proceedings
- Find Patents This link opens in a new window
- Find Standards
- Find Technical Reports
- Find Videos
- Ask a Librarian This link opens in a new window
Engineering Librarian
How to search for Harvard dissertations
- DASH , Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard. Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.
- Check HOLLIS, the Library Catalog, and refine your results by using the Advanced Search and limiting Resource Type to Dissertations
- Search the database ProQuest Dissertations & Theses Global Don't hesitate to Ask a Librarian for assistance.
How to search for Non-Harvard dissertations
Library Database:
- ProQuest Dissertations & Theses Global
Free Resources:
- Many universities provide full-text access to their dissertations via a digital repository. If you know the title of a particular dissertation or thesis, try doing a Google search.
Related Sites
- Formatting Your Dissertation - GSAS
- Ph.D. Dissertation Submission - FAS
- Empowering Students Before you Sign that Contract! - Copyright at Harvard Library
Select Library Titles
- << Previous: Find Conference Proceedings
- Next: Find Patents >>
- Last Updated: Feb 27, 2024 1:52 PM
- URL: https://guides.library.harvard.edu/cs
Harvard University Digital Accessibility Policy
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Proper way to format computer code included in a thesis/dissertation
I intend to include my computational model code(s) in its entirety as an appendix in my dissertation. I've gone through my university's formatting guidelines and haven't seen anything on the proper way to format the code in terms of size of font, text-wrapping, spacing, and so forth. What's the best way to do this?
When I read code, while I'd want it to be a typical font size (12 pt), I'd also want the text-wrapping to be minimal, but given the traditional margin requirements, it can be pretty tough to accomplish this. Having code trail off one line and onto the next is generally distracting.
Also, although comments in code are prevented from execution by using a character sequence like %or // or (* many compilers color-code this text to make it more easily distinguishable from executable portions of the code. Is there any way to easily make comments distinguishable when putting the code into the text of your thesis/dissertation?
- 3 Does your advisor or school have specific suggestions? If not, pseudo-code of the core algorithm is probably most appropriate for the audience (thesis examiners). You. may always upload real code to github and cite that as well as an example implementation. – user479 Commented Jul 8, 2014 at 2:52
- 2 a monospaced font...is best to use for readability — [citation needed]! – JeffE Commented Jul 8, 2014 at 7:45
- 4 Are you sure you need to "... include my computational model code(s) in its entirety as an appendix" . Consider that, it's not read by many it would be; a) a waste of your money for the extra pages, and b) wasteful of paper. Maybe you can isolate the interesting bits and pieces only? – posdef Commented Jul 8, 2014 at 10:07
- 7 @JeffE For fixed-form codes, monospaced font is a practical necessity. I admit I sometimes write Matlab code in sans serif, but that's because it is free-form. Anything indentation-sensitive or with large, hard-coded numerical arrays is much easier in monospaced font. And in dead-tree format, when it's hard to count the column numbers, a non-monospaced font could cause ambiguity in indentation-sensitive code. Reference: the practical experience of my forebears. – Moriarty Commented Jul 8, 2014 at 11:14
- 3 I understand that typesetting code in a monospaced font is a common convention. I'm disputing your claim that that convention increases readability. @Moriarty: Consistent, readable indentation and array alignment does not require a monospaced font. – JeffE Commented Jul 8, 2014 at 21:09
7 Answers 7
Monospaced with syntax coloring and an appropriate description, see e.g.
from Appendix B of arXiv:1407.2432 .
- 1 How is this typeset? By means of a LaTeX package like listing? – enthu Commented Feb 1, 2015 at 20:58
- 1 @EnthusiasticStudent You can lookup its source. I see knitrout environment, though I cannot spot a relevant package. So it seems that it is an export from knitr rather than hand-written LaTeX. – Piotr Migdal Commented Feb 2, 2015 at 9:46
There are a number of excellent LaTeX packages for typesetting code, made for just such occasions. The listings package is one good example, which includes standardized formatting for a number of languages.
It does not provide a "definitive" way to typeset code (there is no such, since there are a number of competing conventions) but its defaults provide a standard and well-recognized formatting that is entirely appropriate for academic publications. Furthermore, it can be customized to follow any unusual requirements of your institutions thesis format.
I would suggest a monospaced font, because that is the traditional method of displaying code. As a matter of putting all of your code into the appendix, I don't see why. Snippets of the relevant parts would be all you need. If you still feel the urge to include the full code, I would suggest referencing a link to the code through a Github repository instead of all of your code.
In addition, ask your advisor who the audience is. Do they have a background in programming? That would be the question to ask. If not, summarize the code, and walk the reader through the logical process of the code. Perhaps a flowchart would be useful.
If you aren't required to do it in a particular format, I'd recommend publishing the code online and using a nice LaTeX code formatting package for the parts you want to share in the print version. My personal favorite is minted . Very easy to use, beautiful formatting and coloring and no need to copy and paste anything, just use the \inputminted command.
I would argue that there are no real style guidelines, except maybe (the only one I've ever been given) not to drown your audience in lines of code, thus use excerpts and pseudo-code whenever possible.
However, to still put your code full-length on paper, you pretty much should have it readable on-screen already. You might have a little refactoring to do, if you expect people to actually read it.
- Fixed font size are traditional in source code, which is due according to Joel Spolsky to it being easier to edit (say click on a specific letter) and to distinguish typos (e.g. rn/m vs rn / m ) than when using a variable spaced fonts
- A fixed width so you never scroll horizontally while your code is on screen. This, with a correct font size, will take care of line wrapping when on paper.
- Modular code, so people know where (in which file, for example) they are : similarly to opening the interesting file, you want readers to be able to skip the pages of configuration, I/O and whatnot, to find wherever the core of your code is.
- Be consistent, as you already noted, in all conventions: naming, indentation, comments...
- include syntax Highlighting (maybe even colouring ?)
Your main options (most popular on a subjective scale of googleability) to achieve the latter are
- in LaTeX, use a listing (with a language that it understands , hopefully). You can even input code from a file directly \includecode[asm]{sched.s}
- in LaTeX, use the minted package, an alternative whose code highlighting is done with Pygments
- in MS Word, insert code in an embedded document as an "openDocument Text" object , copying your code from your usual IDE
- in any WYSIWYG on Windows, use the NppExport plugin of Notepad++ to export your code, and then copy it into your document as RTF or HTML.
- With any python interpreter, use Pygments , e.g. : pygmentize -f html main.c > main.c.html
The only guidelines I could find in the wild were on this random project report page , of rather small scale (4-6 pages), and they are rather succinct :
Format: Use [...] 11 point times font for the main text, and use 10 point courier font for computer code. [...] Yes, your code should be in the appendix, monospaced, single column. You do not have to turn in all code used in your experiment; use your best judgement. You may want to include only relevent sections of code. For example, you should not include code that someone else wrote, unless you made major modifications. If your code is 100 pages, you should not print all of it. If your code is 6 pages, then you should print all of it.
The standard is to use 10 point courier font for computer code, monospaced, single column .
You do not have to turn in all code used in your experiment; use your best judgement. You may want to include only relevant sections of code.
EDIT Usage of Courier is of my personal choice from the list of standard 10pt fonts usable for codes.
- 7 Do you have a source for this "standard"? – ff524 Commented Jul 15, 2014 at 14:22
- 1 @ff524 Yes, I primarily use LaTeX Source Code Listing which is like the standard way of writing a Computer Science thesis, especially if you presumably have more code in it. Arial/Courier are the 10pt standards used by Carnegie for publishing thesis through PQ/UMI, my preference is to use Courier. – Jerric Lyns John Commented Jul 15, 2014 at 17:29
the best way to display the salient code of the key points of your algorithm is to write good code.
“Any fool can write code that a computer can understand. Good programmers write code that humans can understand.” - Martin Fowler, Refactoring: Improving the Design of Existing Code
the code itself should be readable with meaningful choice for variable names, sufficiently divided into meaningful functions or subroutines, and with a minimum of arguments passed around. this means writing decent object-oriented or structured code and making objects or structures and using them.
i would split the code up into modules with a good comment on the top of the file describing what the callable functions do and who calls them.
You must log in to answer this question.
Not the answer you're looking for browse other questions tagged thesis code formatting ..
- Featured on Meta
- We've made changes to our Terms of Service & Privacy Policy - July 2024
- Announcing a change to the data-dump process
- Upcoming initiatives on Stack Overflow and across the Stack Exchange network...
Hot Network Questions
- DC motor pump always transports in same direction, regardless of polarity
- NDSolve gets the wrong answer! How get NDSolve to correctly solve this "stiff" equation?
- What would a planet need to have a sustained blood-based water cycle?
- An SF story where an orangutan writes a book that is published
- Converting from 1-phase to 3-phase
- How can I disable highlighting of matching symbols in expression in version 14.1?
- How can I safely cut cultured countertops containing silica?
- Jer. 46:11 — “virgin”
- Distribution after Combining Two Sets of Normal Distribution Samples
- Downloading administrative boundaries from OpenHistoricalMap
- Vanishing of principal minors implies upper triangular up to permutation
- Why isn’t this formula used at all?
- Do I have legal grounds against a book by an ex which depicts private details of my life, including some false events, without permission?
- Foundations and contradictions of Scholze's work: the category of presentable infinity categories contains itself
- Do some chemicals degrade at low temperatures?
- Research Faculty with no salary
- How to convert this date Wednesday July 31 2024 11:20 am to a short date (MM/DD/YY)?
- "between" two countries
- What is the translation of "nosebleed section" in French?
- Is this carbon fork damaged?
- How to make an operator form of Part[] to use with // (Postfix)
- RP2040 ADC calibration (schematic)
- What is the best way to close this small gap in the tile?
- Applications take a few seconds to open, but only the first time I open them
- USF Research
- USF Libraries
Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations
Computer Science and Engineering Theses and Dissertations
Theses/dissertations from 2024 2024.
Automatic Image-Based Nutritional Calculator App , Kejvi Cupa
Individual Behavioral Modeling Across Games of Strategy , Logan Fields
Semi-automated Cell Annotation Framework Using Deep Learning , Abhiram Kandiyana
Predicting Gender of Author Using Large Language Models (LLMs) , Satya Uday Sanku
Context-aware Affective Behavior Modeling and Analytics , Md Taufeeq Uddin
Exploring the Use of Enhanced SWAD Towards Building Learned Models that Generalize Better to Unseen Sources , Brandon M. Weinhofer
Theses/Dissertations from 2023 2023
Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno
Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan
Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros
Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin
Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen
Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur
A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.
Graph Analysis on Social Networks , Shen Lu
Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera
Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo
Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi
Theses/Dissertations from 2022 2022
Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed
Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala
Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen
A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave
On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou
Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang
A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri
Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney
Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin
Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker
Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich
Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar
Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong
Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward
Theses/Dissertations from 2021 2021
Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar
Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia
Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto
Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis
Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey
AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi
Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill
Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja
Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana
Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev
Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.
Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski
Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov
Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai
Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri
Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco
Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam
Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava
A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza
Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar
Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams
Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari
Theses/Dissertations from 2020 2020
Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal
Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil
Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari
Composition of Atomic-Obligation Security Policies , Yan Cao Albright
Action Recognition Using the Motion Taxonomy , Maxat Alibayev
Sentiment Analysis in Peer Review , Zachariah J. Beasley
Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov
Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang
Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram
PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami
Composition of Atomic-Obligation Security Policies , Danielle Ferguson
Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel
The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann
Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez
Privacy-Preserving and Functional Information Systems , Thang Hoang
Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January
Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi
Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam
Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha
Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath
System Support of Concurrent Database Query Processing on a GPU , Hao Li
Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu
Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li
Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla
Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng
Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi
Models of Secure Software Enforcement and Development , Hernan M. Palombo
Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos
Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul
Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan
Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah
Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui
Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah
Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu
Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon
Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna
Theses/Dissertations from 2019 2019
Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur
Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed
Phenomena of Social Dynamics in Online Games , Essa Alhazmi
A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri
Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari
Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee
A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao
Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin
Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano
Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang
Advanced Search
- Email Notifications and RSS
- All Collections
- USF Faculty Publications
- Open Access Journals
- Conferences and Events
- Theses and Dissertations
- Textbooks Collection
Useful Links
- Rights Information
- SelectedWorks
- Submit Research
Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements
Privacy Copyright
Home > FACULTIES > Computer Science > CSD-ETD
Computer Science Theses and Dissertations
This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository
Theses/Dissertations from 2024 2024
A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani
Using Driver Gaze and On-Road Driving Data for Predicting Driver Maneuvers in Advanced Driving Assistance Systems , Farzan Heidari
UTILIZING MACHINE LEARNING TECHNIQUES FOR DISPERSION MEASURE ESTIMATION IN FAST RADIO BURSTS STUDIES , Hosein Rajabi
Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy
Framework for Bug Inducing Commit Prediction Using Quality Metrics , Alireza Tavakkoli Barzoki
Theses/Dissertations from 2023 2023
Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar
Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian
Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh
INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee
Algorithms and Software for Oligonucleotide Design , Qin Dong
Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani
De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han
Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley
A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He
A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh
Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani
Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu
Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li
Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li
DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li
Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai
Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad
The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi
Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam
Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat
Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul
On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi
Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza
Migration in Edge Computing , Arshin Rezazadeh
A Modified Hopfield Network for the K-Median Problem , Cody Rossiter
Predicting Network Failures with AI Techniques , Chandrika Saha
Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha
An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa
Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia
Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia
IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales
A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani
Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad
Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim
A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba
Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong
Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang
Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar
Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang
Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi
Theses/Dissertations from 2022 2022
The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt
Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy
Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez
Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu
Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte
Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell
Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch
Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh
Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost
Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie
Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka
Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling
Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan
Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti
Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida
False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito
Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford
An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson
Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem
A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid
Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma
Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi
Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis
Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg
Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang
Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang
Predicting and Modifying Memorability of Images , Mohammad Younesi
Theses/Dissertations from 2021 2021
Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed
A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar
Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani
Contrastive Learning of Auditory Representations , Haider Al-Tahan
Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi
Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak
Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman
Improving Reader Motivation with Machine Learning , Tanner A. Bohn
A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang
Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee
A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen
Exploratory Search with Archetype-based Language Models , Brent D. Davis
Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo
Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon
A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du
Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi
Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan
A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar
Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami
Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara
Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani
A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria
Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh
Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour
A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa
WesternAccelerator:Rapid Development of Microservices , Haoran Wei
A Lightweight and Explainable Citation Recommendation System , Juncheng Yin
- Accessible Formats
Advanced Search
- Notify me via email or RSS
- Expert Gallery
- Online Journals
- eBook Collections
- Reports and Working Papers
- Conferences and Symposiums
- Electronic Theses and Dissertations
- Digitized Special Collections
- All Collections
- Disciplines
Author Corner
- Submit Thesis/Dissertation
Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright
©1878 - 2016 Western University
Home > School, College, or Department > MCECS > Computer Science > Dissertations and Theses
Computer Science Dissertations and Theses
Theses/dissertations from 2024 2024.
A Deep Learning Framework for Blockage Mitigation in mmWave Wireless , Ahmed Hazaa Almutairi (Dissertation)
Design and Test of Asynchronous Systems Using the Link and Joint Model , Ebelechukwu Esimai (Dissertation)
Automatic Measurement of Dialogue Engagingness in Multilingual Settings , Amila Ferron (Thesis)
Resource-constrained 2D Scene Recovery with Single-Photon Cameras , Daphne Ariadne Kurzenhauser (Thesis)
MmWave RAT Optimization: MAC Layer Initial Access Design and Transport Layer Integration , Suresh Srinivasan (Dissertation)
Designing for Deployable, Secure, and Generic Machine Learning Systems , Li-Yun Wang (Dissertation)
Theses/Dissertations from 2023 2023
Seeing in the Dark: Towards Robust Pedestrian Detection at Nighttime , Afnan Althoupety (Dissertation)
A Deep Hierarchical Variational Autoencoder for World Models in Complex Reinforcement Learning Environments , Sriharshitha Ayyalasomayajula (Thesis)
Toward Efficient Rendering: A Neural Network Approach , Qiqi Hou (Dissertation)
Energy Auction with Non-Relational Persistence , Michael Ramez Howard (Thesis)
Implementing a Functional Logic Programming Language via the Fair Scheme , Andrew Michael Jost (Dissertation)
Multi-Agent Deep Reinforcement Learning for Radiation Localization , Benjamin Scott Totten (Thesis)
Theses/Dissertations from 2022 2022
Using Intrinsically-Typed Definitional Interpreters to Verify Compiler Optimizations in a Monadic Intermediate Language , Dani Barrack (Thesis)
An Automated Zoom Class Session Analysis Tool to Improve Education , Jack Arlo Cannon II (Thesis)
Scaling EPA-RIMM with Multicore System Management Interrupt Handlers , Alexander K. Freed (Thesis)
Unpaired Style Transfer Conditional Generative Adversarial Network for Scanned Document Generation , David Jonathan Hawbaker (Thesis)
Toward Analyzing the Diversity of Extractive Summaries , Aaron David Hudson (Thesis)
Making Curry with Rice: An Optimizing Curry Compiler , Steven Libby (Dissertation)
Domain Knowledge as Motion-Aware Inductive Bias for Deep Video Synthesis: Two Case Studies , Long Mai (Dissertation)
Theses/Dissertations from 2021 2021
Efficient Neuromorphic Algorithms for Gamma-Ray Spectrum Denoising and Radionuclide Identification , Merlin Phillip Carson (Thesis)
Storing Intermediate Results in Space and Time: SQL Graphs and Block Referencing , Basem Ibrahim Elazzabi (Dissertation)
Automated Test Generation for Validating SystemC Designs , Bin Lin (Dissertation)
Forecasting Optimal Parameters of the Broken Wing Butterfly Option Strategy Using Differential Evolution , David Munoz Constantine (Thesis)
Situate: An Agent-Based System for Situation Recognition , Max Henry Quinn (Dissertation)
Theses/Dissertations from 2020 2020
Multiple Diagram Navigation , Hisham Benotman (Dissertation)
Smart Contract Vulnerabilities on the Ethereum Blockchain: a Current Perspective , Daniel Steven Connelly (Thesis)
Extensible Performance-Aware Runtime Integrity Measurement , Brian G. Delgado (Dissertation)
Novel View Synthesis - a Neural Network Approach , Hoang Le (Dissertation)
Exploring the Potential of Sparse Coding for Machine Learning , Sheng Yang Lundquist (Dissertation)
Workflow Critical Path: a Data-Oriented Path Metric for Holistic HPC Workflows , Daniel D. Nguyen (Thesis)
Novel View Synthesis in Time and Space , Simon Niklaus (Dissertation)
Balancing Security, Performance and Deployability in Encrypted Search , David Joel Pouliot (Dissertation)
Theses/Dissertations from 2019 2019
A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games , Naif Saeed Alzahrani (Dissertation)
Spectral Clustering for Electrical Phase Identification Using Advanced Metering Infrastructure Voltage Time Series , Logan Blakely (Thesis)
Local Radiance , Scott Peter Britell (Dissertation)
Correct-by-Construction Typechecking with Scope Graphs , Katherine Imhoff Casamento (Thesis)
Versatile Binary-level Concolic Testing , Bo Chen (Dissertation)
Crumpled and Abraded Encryption: Implementation and Provably Secure Construction , Scott Sherlock Griffy (Thesis)
Knowing Without Knowing: Real-Time Usage Identification of Computer Systems , Leila Mohammed Hawana (Thesis)
Design and Experimental Evaluation of DeepMarket: an Edge Computing Marketplace with Distributed TensorFlow Execution Capability , Soyoung Kim (Thesis)
Localizing Little Landmarks with Transfer Learning , Sharad Kumar (Thesis)
Context-Aware Wi-Fi Infrastructure-based Indoor Positioning Systems , Huy Phuong Tran (Dissertation)
Theses/Dissertations from 2018 2018
Bounding Box Improvement with Reinforcement Learning , Andrew Lewis Cleland (Thesis)
Sensing Building Structure Using UWB Radios for Disaster Recovery , Jeong Eun Lee (Dissertation)
Annotation-Enabled Interpretation and Analysis of Time-Series Data , Niveditha Venugopal (Thesis)
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments , Tejaswini Ajay Vibhute (Thesis)
Theses/Dissertations from 2017 2017
Improved Scoring Models for Semantic Image Retrieval Using Scene Graphs , Erik Timothy Conser (Thesis)
Refining Bounding-Box Regression for Object Localization , Naomi Lynn Dickerson (Thesis)
Fully Generic Programming Over Closed Universes of Inductive-Recursive Types , Larry Diehl (Dissertation)
Communicating at Terahertz Frequencies , Farnoosh Moshirfatemi (Dissertation)
Designing In-Headset Authoring Tools for Virtual Reality Video , Cuong Nguyen (Dissertation)
Certifying Loop Pipelining Transformations in Behavioral Synthesis , Disha Puri (Dissertation)
Power-Aware Datacenter Networking and Optimization , Qing Yi (Dissertation)
Theses/Dissertations from 2016 2016
Identifying Relationships between Scientific Datasets , Abdussalam Alawini (Dissertation)
Information Representation and Computation of Spike Trains in Reservoir Computing Systems with Spiking Neurons and Analog Neurons , Amin Almassian (Thesis)
Investigations of an "Objectness" Measure for Object Localization , Lewis Richard James Coates (Thesis)
Image Stitching: Handling Parallax, Stereopsis, and Video , Fan Zhang (Dissertation)
Theses/Dissertations from 2015 2015
Novel Methods for Learning and Adaptation in Chemical Reaction Networks , Peter Banda (Dissertation)
Post-silicon Functional Validation with Virtual Prototypes , Kai Cong (Dissertation)
Novel Cryptographic Primitives and Protocols for Censorship Resistance , Kevin Patrick Dyer (Dissertation)
Hardware/Software Interface Assurance with Conformance Checking , Li Lei (Dissertation)
Leveraging Contextual Relationships Between Objects for Localization , Clinton Leif Olson (Thesis)
The Performance of Random Prototypes in Hierarchical Models of Vision , Kendall Lee Stewart (Thesis)
Tweakable Ciphers: Constructions and Applications , Robert Seth Terashima (Dissertation)
Scalable Equivalence Checking for Behavioral Synthesis , Zhenkun Yang (Dissertation)
Theses/Dissertations from 2014 2014
The Nax Language: Unifying Functional Programming and Logical Reasoning in a Language based on Mendler-style Recursion Schemes and Term-indexed Types , Ki Yung Ahn (Dissertation)
Using Spammers' Computing Resources for Volunteer Computing , Thai Le Quy Bui (Thesis)
Towards Constructing Interactive Virtual Worlds , Francis Chang (Dissertation)
System-wide Performance Analysis for Virtualization , Deron Eugene Jensen (Thesis)
Advances in Piecewise Smooth Image Reconstruction , Ralf Juengling (Dissertation)
Interpretable Machine Learning and Sparse Coding for Computer Vision , Will Landecker (Dissertation)
Optimizing Data Movement in Hybrid Analytic Systems , Patrick Michael Leyshock (Dissertation)
Ranked Similarity Search of Scientific Datasets: An Information Retrieval Approach , Veronika Margaret Megler (Dissertation)
Using GIST Features to Constrain Search in Object Detection , Joanna Browne Solmon (Thesis)
The Role of Prototype Learning in Hierarchical Models of Vision , Michael David Thomure (Dissertation)
Theses/Dissertations from 2013 2013
Object Detection and Recognition in Natural Settings , George William Dittmar (Thesis)
Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications , Akshay Dua (Dissertation)
Equivalence Checking for High-Assurance Behavioral Synthesis , Kecheng Hao (Dissertation)
Type Classes and Instance Chains: A Relational Approach , John Garrett Morris (Dissertation)
Theses/Dissertations from 2012 2012
Using Dataflow Optimization Techniques with a Monadic Intermediate Language , Justin George Bailey (Thesis)
A Survey and Analysis of Solutions to the Oblivious Memory Access Problem , Erin Elizabeth Chapman (Thesis)
A Data-Descriptive Feedback Framework for Data Stream Management Systems , Rafael J. Fernández Moctezuma (Dissertation)
Extending Relativistic Programming to Multiple Writers , Philip William Howard (Dissertation)
The Basic Scheme for the Evaluation of Functional Logic Programs , Arthur Peters (Thesis)
The Link Between Image Segmentation and Image Recognition , Karan Sharma (Thesis)
Relativistic Causal Ordering A Memory Model for Scalable Concurrent Data Structures , Josh Triplett (Dissertation)
Theses/Dissertations from 2011 2011
Conceptual Modeling of Data with Provenance , David William Archer (Dissertation)
Low-latency Estimates for Window-Aggregate Queries over Data Streams , Amit Bhat (Thesis)
Information Processing in Two-Dimensional Cellular Automata , Martin Cenek (Dissertation)
Scalable and Efficient Tasking for Dynamic Sensor Networks , Thanh Xuan Dang (Dissertation)
On the Effect of Topology on Learning and Generalization in Random Automata Networks , Alireza Goudarzi (Thesis)
HOLCF '11: A Definitional Domain Theory for Verifying Functional Programs , Brian Charles Huffman (Dissertation)
A Functional Approach to Memory-Safe Operating Systems , Rebekah Leslie (Dissertation)
Factoring Semiprimes Using PG2N Prime Graph Multiagent Search , Keith Eirik Wilson (Thesis)
High Speed Wireless Networking for 60GHz , Candy Yiu (Dissertation)
Theses/Dissertations from 2010 2010
Extensible Scheduling in a Haskell-based Operating System , Kenneth William Graunke (Thesis)
Addressing Automated Adversaries of Network Applications , Edward Leo Kaiser (Dissertation)
An Automata-Theoretic Approach to Hardware/Software Co-verification , Juncao Li (Dissertation)
Practical Type Inference for the GADT Type System , Chuan-kai Lin (Dissertation)
Scalable event tracking on high-end parallel systems , Kathryn Marie Mohror (Dissertation)
Advanced Search
- Notify me via email or RSS
- Featured Collections
- All Authors
- Schools & Colleges
- Dissertations & Theses
- PDXOpen Textbooks
- Conferences
- Collections
- Disciplines
- Faculty Expert Gallery
- Submit Research
- Faculty Profiles
- Terms of Use
- Feedback Form
Home | About | My Account | Accessibility Statement | Portland State University
Privacy Copyright
EWU Digital Commons
Home > College, Department, or Program > CSTEM > Computer Science > Theses
Computer Science Masters Thesis Collection
Theses/dissertations from 2023 2023.
A hierarchical approach to improve the ant colony optimization algorith , Bryan J. Fischer
From Tic-tac-toe to AlphaGo: a survey of algorithms used in various games , Mathew T. Godon
Temporally consistent FastDVDNet: an overlap loss implementation for FastDVDNet , Michael J. Henderson
Multimodal game-based learning in Post-Secondary Education , Nathan A. Vanos
Theses/Dissertations from 2022 2022
Towards Cloud-Based cost-effective serverless information system , Isaac C. Angle
Modeling document classification to automate mental health diagnosis , William M. Tadlock
Theses/Dissertations from 2021 2021
Password-less two-factor authentication using scannable barcodes on a mobile device , Grant M. Callant II
Intrusion detection for industrial control systems , Kurt Lamon
Theses/Dissertations from 2020 2020
Data entry voice assistant for healthcare providers , Sajad Hussain M Alhamada
Comparison of the tally numbering system to traditional arithmetic systems in field programmable gate arrays , Robert Paul Shredow
Using Blockchain for Digital Card Game , Raymond A. Swannack
Theses/Dissertations from 2019 2019
Relaxed mental state detection using the Emotiv Epoc and Adaptive Threshold Algorithms , Olin L. Anderson
Detecting and mapping real-time Influenza-like illness using Twitter stream data , Elisha D. Brunette
The application of cloud resources to terrain data visualization , Gregory J. Larrick
Theses/Dissertations from 2018 2018
A practical and efficient algorithm for the k-mismatch shortest unique substring finding problem , Daniel Robert Allen
DETERMINING VULNERABILITY USING ATTACK GRAPHS: AN EXPANSION OF THE CURRENT FAIR MODEL , Beth M. Anderson
The application of GPU to molecular communication studies , Tobias J. Cain
Improving Aerial Package Delivery Through Simulation of Hazard Detection, Mapping, and Regulatory Compliance , Kevin Chumbley
GPU accelerated risk quantification , Forrest L. Ireland
Evaluating a Cluster of Low-Power ARM64 Single-Board Computers with MapReduce , Daniel McDermott
Glyph based segmentation of Chinese calligraphy characters in the "Collected Characters" stele. , David A. McInnis
Theses/Dissertations from 2017 2017
CLOUD LIVE VIDEO TRANSFER , Ryan Babcock
GENE EXPRESSION PROSPECTIVE SIMULATION AND ANALYSIS USING DATA MINING AND IMMERSIVE VIRTUAL REALITY VISUALIZATION , Joshua Cotes
Theses/Dissertations from 2016 2016
Near real-time early cancer detection using a graphics processing unit , Jason Helms
Analysis of algorithms to create profitable trades in the stock market , Nicholas P. Klinger
Dynamically parallel CAMSHIFT: GPU accelerated object tracking in digital video , Matthew J. Perry
USING CONVOLUTIONAL NEURAL NETWORKS FOR FINE GRAINED IMAGECLASSIFICATION OF ACUTE LYMPHOBLASTIC LEUKEMIA , Richard K. Sipes
Character extraction from ancient Chinese stele using discrete cosine transform , Toshiaki Ueno
Theses/Dissertations from 2015 2015
ECS: Educational Communication System , Nasmah Alnaimi
The geo-secure system: a secure system for data access based on geographical data , Fawaz J. Alruwaili
Heartbeat location assistance for electrocardiograms , Sarah Bass
Indirect association rule mining for crime data analysis , Riley Englin
Modeling and rendering of fluid flows using the Lennard-Jones potential , Nicholas J. LeFave
Multi-drug association rule mining on graphics processing unit , Jesse Scholer
Theses/Dissertations from 2014 2014
A study of kNN using ICU multivariate time series data , Admir Djulovic
Artificial Frequency Match Neuron Implemented with Digital Logic , David J. Ellis
Bridging the detection gap: a study on a behavior-based approach using malware techniques , Geancarlo Palavicini
3D Image Acquisition System for Facial Recognition , James E. Pearson
Divide and Conquer G-Buffer Ray Tracing , Daniel Stokes
Improving the performance of skeletal mesh animations in the Blender game engine , Mitchell Stokes
MINING MULTI-GRANULAR MULTIVARIATE MEDICAL MEASUREMENTS , Conrad Sykes
Theses/Dissertations from 2013 2013
Alsafeer software for teaching computer literacy , Zieb Rabie Alqahtani
Wireless electronic scoring of kendo competition matches using an embedded system , Edward B. Hogan
Using phishing to test social engineering awareness of financial employees , Rebecca M. Long
GPU ray tracing with CUDA , Thomas A. Pitkin
Ray traced rendering using GPGPU devices , Coby Soss
Theses/Dissertations from 2012 2012
Windows security sandbox framework , Kyle P. Gwinnup
Micro unmanned aerial vehicle video surveillance platform quadrocopter aircraft , Michael John Skadan
WiFiPoz -- an accurate indoor positioning system , Xiaoyi Ye
SSVEP-based brain computer interface using the Emotiv EPOC , Brian J. Zier
Theses/Dissertations from 2010 2010
Bittorrent vulnerable to layer-7 packet injection , Stephen L. Heath
Masquerade detection using fortified naive Bayes , Eric Salsbury
Theses/Dissertations from 2009 2009
Raising security awareness among higher education recipients , Chun-I Lin
On refactoring , Kaleb P. Pederson
Word prediction in assistive technologies for Aphasia rehabilitation in using Systemic Functional Grammar , Christopher T. Sorna
Novel visualization scheme for reasoning with uncertainty , Kyle A. Springer
Theses/Dissertations from 2008 2008
Tor latency attach verification and analysis , Ronnie Hoeflin
GPU programming: developing realistic water effects with OpenGL and GLSL , Joshua G. Slider
Theses/Dissertations from 2006 2006
Visualization of logic programming , Michael D. Henry
Theses/Dissertations from 2005 2005
Construction of efficient indexes from Fuzzy Clusters: preliminary study , Sean M. Drexler
Navigation agents and traffic simulation , Bart Hunking
Web-based fuzzy expert system: EWU optimal advisor , Nasser A. Rafi
Theses/Dissertations from 2003 2003
Intrusion detection, intelligent agents, and soft computing , Patrick Miller
Source code security analysis and fuzzy logic , Alexander Moskalyuk
Theses/Dissertations from 2002 2002
Support vector machines, N-gram kernels, and text classification , John Mill
Theses/Dissertations from 2001 2001
Solid object model advanced operations , Robert L. Throop
Theses/Dissertations from 2000 2000
Interactive 3D model display in Java 3D , Keqiu Chen
Theses/Dissertations from 1998 1998
Subdivision, and rfefinement of non-uniform rational B-spline curves and surfaces in 3-D , Bill E. La Rue
Theses/Dissertations from 1995 1995
A transputer based prototype for a fuzzy logic controller with tuning and simulation capabilities , Marshall Ryan Weddle
Theses/Dissertations from 1994 1994
Visualizing medical data using direct volume rendering , Bryce R. Hein
Industrial control via a state language implementation on the transputer architecture , Ted Preston VanderWeyst
A cellular method for modeling solid features in volume data , Jeff Wolkenhauer
Theses/Dissertations from 1993 1993
Hybrid coding with enhanced RDC and Huffman compression algorithms , Wilhelm J. Jenner
Implementation of a digital control system analysis program using the z-transform , Kristine L. Rudin
Subtyping and inheritance in a metamodel of abstractions , Gavin Vess
Theses/Dissertations from 1992 1992
Left ventricular boundary detection in digitized cardiac images , Albertine L. Marie Alm
High level user interface for a parallel operating system , Terry Conkright
Hybrid dictionary/statistical text compression algorithms , Michael E. Piotrowski
A study of using backpropagation and a new neural net algorithm for edge detecting in binary images , Jun Tian
Theses/Dissertations from 1990 1990
Visual parallel programming via petri nets , David Glenn Passey
Theses/Dissertations from 1988 1988
An iconic approach to parallel design , Elizabeth Stevens
Theses/Dissertations from 1986 1986
Conversion form structured programming to an object-oriented programming structure , Daryl Edward Krauter
Advanced Search
- Notify me via email or RSS
- Colleges, Departments, and Programs
- Disciplines
Author Corner
- EWU Libraries
- Contact EWU Libraries
509.359.7888 | Email
Home | About | FAQ | My Account | Contact | Accessibility | EWU Libraries | EWU Home
Privacy Copyright
Home > Computer Science > CompSci TDs > Masters Theses
Computer Science Masters Theses
Theses from 2024 2024.
Enabling smart healthcare applications through visible light communication networks , Jack Manhardt
Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan
Theses from 2023 2023
DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula
MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric
COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara
Theses from 2022 2022
Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga
Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong
Theses from 2021 2021
Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II
Theses from 2020 2020
On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu
Theses from 2019 2019
Advanced techniques for improving canonical genetic programming , Adam Tyler Harter
Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter
Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam
Theses from 2018 2018
Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin
CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush
Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani
Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa
Solidification rate detection through solid-liquid interface tracking , Wei Luo
Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham
Cyber-physical security of an electric microgrid , Prashanth Palaniswamy
An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla
Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy
Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti
A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang
Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang
Theses from 2017 2017
Cyber-physical security of a chemical plant , Prakash Rao Dunaka
UFace: Your universal password no one can see , Nicholas Steven Hilbert
Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco
Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti
Personalizing education with algorithmic course selection , Tyler Morrow
Decodable network coding in wireless network , Junwei Su
Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla
Theses from 2016 2016
Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels
Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar
Theses from 2015 2015
Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi
Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt
Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda
A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li
Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin
Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala
Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy
Cyber security research frameworks for coevolutionary network defense , George Daniel Rush
Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara
Theses from 2014 2014
Crime pattern detection using online social media , Raja Ashok Bolla
Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi
A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati
Access control delegation in the clouds , Pavani Gorantla
Evolving decision trees for the categorization of software , Jasenko Hosic
M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar
Privacy preservation using spherical chord , Doyal Tapan Mukherjee
Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram
On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu
Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli
An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan
Theses from 2013 2013
Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz
Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu
Security analysis of a cyber physical system : a car example , Jason Madden
Efficient integrity verification of replicated data in cloud , Raghul Mukundan
Search-based model summarization , Lokesh Krishna Ravichandran
Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg
Secure design defects detection and correction , Wenquan Wang
Theses from 2012 2012
Robust evolutionary algorithms , Brian Wesley Goldman
Semantic preserving text tepresentation and its applications in text clustering , Michael Howard
Vehicle path verification using wireless sensor networks , Gerry W. Howser
Distributed and collaborative watermarking in relational data , Prakash Kumar
Theses from 2011 2011
A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle
Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount
A low-cost motion tracking system for virtual reality applications , Abhinav Chadda
Optimization of textual affect entity relation models , Ajith Cherukad Jose
MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram
A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi
An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka
Location privacy policy management system , Arej Awodha Muhammed
Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni
Theses from 2010 2010
Event detection from click-through data via query clustering , Prabhu Kumar Angajala
Population control in evolutionary algorithms , Jason Edward Cook
Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana
EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads
Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett
Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher
Multi axis slicing for rapid prototyping , Divya Kanakanala
Content based image retrieval for bio-medical images , Vikas Nahar
2-D path planning for direct laser deposition process , Swathi Routhu
Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu
An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli
Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo
Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu
Theses from 2009 2009
Information flow properties for cyber-physical systems , Rav Akella
Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet
Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba
Theses from 2008 2008
Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das
Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong
A time series classifier , Christopher Mark Gore
An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade
Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia
PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu
Co-optimization: a generalization of coevolution , Travis Service
Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder
Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson
Theses from 2007 2007
A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird
Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj
Advanced Search
- Notify me via email or RSS
- Collections
- Disciplines
- All Authors
- Faculty Authors
Author Corner
Useful links.
- Library Resources
Thesis Locations
- View these on map
- View these in Google Earth
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
Department of Computer Science
- Teaching Associates
- Undergraduate Advising
- Graduate Advising
- Faculty Positions
- Computer Sciences Advisory Board
- Fall 2021 Old/New CS Major/Minor FAQs
- Undergraduate Degree Information
- Prospective Undergrads
- 2021 CS Major Requirements
- 2020 CS Major Requirements
- 2021 CS Minor Requirements
- 2020 CS Minor Requirements
- M.S. in Computer Science
- M.S. in Computer Science 2023
- M.S. in Computer Science 2022
- Applying to the Master’s in CS Program
- Thesis Defense
Past Theses
- CS Master Exams Registration: Fall 2024
- Automata & Formal Languages
- Data Structures & Algorithms
- Database Management Systems
- Intelligent Systems & Robotics
- Operating Systems & Architecture
- Programming Languages
- Applying to the Program
- Registering for Classes
- GIS Certificate
- Laboratories
- Sciences Advising
- Financial Aid & Scholarships
- Scholarship Finder
- Graduate Studies
- Student Ability Center
- Student Support Programs
- Study Abroad
- Health Resources
- Counseling & Psychological Services
- Employee Resources
- Technical Services
- Job Possibilities for CS Majors
- Career Development
- Clubs & Organizations
- Cultural Centers
- Student Council
- ACM Chapter
- Cyber Defense Team
- Mechatronics Club
- Give to the Department
Recent CS Masters Theses
The following is a list of some of the recently completed CS Masters Theses.
Date | Student | Adviser | Title |
13-Dec-16 | Arpita Banerjee | Eckberg | |
08-Dec-16 | Srilaxmi Kamatam | Eckberg | |
07-Dec-16 | RASHMI AHUJA | Eckberg | |
21-Nov-16 | Prasanthi Kornepati | Eckberg | |
10-Nov-16 | Akshay Jagtap | Eckberg | |
01-Nov-16 | Ranjith Kantamneni | Eckberg | |
28-Oct-16 | Michal Pasamonik | Tarokh | |
27-Oct-16 | Rohit Kulkarni | Eckberg | |
21-Oct-16 | Akhil Gokhale | Eckberg | |
20-Oct-16 | Rituka Tuteja | Eckberg | |
19-Oct-16 | Mayur Jurani | Eckberg | |
18-Oct-16 | Kavish Ghime | Eckberg | |
13-Oct-16 | Rohan Rampuria | Eckberg | |
20-Sep-16 | Ramya Dalapathirao | Eckberg | |
3-Aug-16 | Jeffrey Sadural | Edwards | |
20-Jul-16 | Isha Gautam | Eckberg | |
14-Jul-16 | KIRTI GUPTA | Eckberg | |
5-May-16 | Bavya Kumaresan | Eckberg | |
3-May-16 | Wenjun Zhu | Whitney | |
27-Apr-16 | Savita Patil | Eckberg | |
27-Apr-16 | Samatha Gajula | Whitney | |
27-Apr-16 | Radhika Deshpande | Eckberg | |
26-Apr-16 | Tanishq Chander | Eckberg | |
22-Apr-16 | Bharat Samudrala | Eckberg | |
15-Apr-16 | Umar Quadri | Eckberg | |
14-Apr-16 | Shivangi Pyasi | Eckberg | |
13-Apr-16 | Vivek Shah | Eckberg | |
13-Apr-16 | Nagendra Balachandra | Eckberg | |
8-Apr-16 | Vipin Thakur | Eckberg | |
8-Apr-16 | Deepthi Yaramala | Eckberg | |
6-Apr-16 | Veenu Prajapat | Eckberg | |
6-Apr-16 | Shubha Ravikumar | Eckberg | |
6-Apr-16 | Riddhi Shah | Eckberg | |
6-Apr-16 | Bela Mhasavade | Eckberg | |
23-Mar-16 | Monmita Choudhury | Eckberg | |
23-Mar-16 | Chinnu Chullipparambil | Eckberg | |
22-Mar-16 | Kumar Nishant | Tarokh | |
9-Mar-16 | Preethi Prabhu | Eckberg | |
4-Mar-16 | Vignesh Ramakrishnan | Eckberg | |
3-Mar-16 | Aarti Gokhale | Wang | |
29-Feb-16 | Sunny Jagadeesh (2) | Eckberg | |
18-Feb-16 | Navya Kumar | Wang | |
10-Feb-16 | Satya Vema | Eckberg | |
9-Feb-16 | Saurabh Kalantri | Eckberg | |
8-Feb-16 | Madhura Babu | Eckberg | |
19-Jan-16 | Devang Shah | Eckberg | |
16-Dec-15 | James Bible | Eckberg | |
11-Dec-15 | Pooja Saroha | Eckberg | |
10-Dec-15 | Sunny Jagadeesh (1) | Eckberg | |
10-Dec-15 | Ritu Kamboj | Eckberg | |
10-Dec-15 | Nitish Nalwade | Eckberg | |
9-Dec-15 | Surabhi Anand | Eckberg | |
8-Dec-15 | Julian Raheema | Edwards | |
2-Dec-15 | Rajagopal Vajja | Eckberg | |
30-Nov-15 | SreeLakshmi Reddygari | Eckberg | |
23-Nov-15 | Ramya Nagaraj | Eckberg | |
16-Nov-15 | Shelly Oberoi | Eckberg | |
10-Nov-15 | Ranjana Venkataraman | Eckberg | |
9-Nov-15 | Divyashree Vijaykumar | Eckberg | |
9-Nov-15 | Deepika Urs | Eckberg | |
5-Nov-15 | Vaishnavi Balaji | Wang | |
4-Nov-15 | Anurag Dani | Eckberg | |
30-Oct-15 | Varun Penumalla | Eckberg | |
30-Oct-15 | Rakesh Thakur | Eckberg | |
30-Oct-15 | Pratik Bhatt | Eckberg | |
29-Oct-15 | Pratyusha Uddaraju | Edwards | |
28-Oct-15 | Sunil Kadiwal | Eckberg | |
27-Oct-15 | Bharath Mylarappa | Eckberg | |
26-Oct-15 | Nisha Sharma | Eckberg | |
23-Oct-15 | Sumer Pochi | Eckberg | |
23-Oct-15 | Amol Kawade | Eckberg | |
21-Oct-15 | Naitik Doshi | Eckberg | |
19-Oct-15 | Ting Guo | Vuskovic | |
19-Oct-15 | Sappidi Sowjanya | Eckberg | |
19-Oct-15 | Aditya Kappagantula | Eckberg | |
16-Oct-15 | Parmeet Singh | Eckberg | |
15-Oct-15 | Vedika Jadhav | Eckberg | |
15-Oct-15 | Shailesh Patil | Eckberg | |
13-Oct-15 | Vyshakh Babji | Eckberg | |
7-Oct-15 | Jasika Kamboj | Eckberg | |
7-Oct-15 | Sahil Agarwal | Eckberg | |
6-Oct-15 | Sunil Duddi | Eckberg | |
5-Oct-15 | Joonyoung Yu | Tarokh | |
1-Oct-15 | Priyanka Jadhav | Eckberg | |
1-Oct-15 | Ankit Ahlawat | Eckberg | |
24-Sep-15 | Aditya Nalawade | Eckberg | |
16-Sep-15 | Nikhil Gupta | Eckberg | |
15-Sep-15 | Atiehalsadat Kashanimoghaddam | Ozturk | |
12-Aug-15 | Sivanarayana Gaddam | Vuskovic | |
11-Aug-15 | Dhanya Ramdas | Riggins | |
30-Jun-15 | Nanditha Murthy | Eckberg | |
4-Jun-15 | Rishu Mishra | Stewart | |
14-May-15 | Shankara Meenkeri | Stewart | |
1-May-15 | Artee Dubey | Eckberg | |
20-Apr-15 | Salil Aggarwal | Eckberg | |
10-Apr-15 | Garima Verma | Eckberg | |
9-Apr-15 | Srinidhi Balaram | Eckberg | |
8-Apr-15 | Sumeer Tuli | Eckberg | |
8-Apr-15 | Ashok Ramachandra | Eckberg | |
3-Mar-15 | Sourabh Gupta | Eckberg | |
30-Mar-15 | Ankur Singh | Eckberg | |
20-Mar-15 | Kavya Nagaraja | Eckberg | |
12-Feb-15 | Saran Alla | Eckberg | |
12-Feb-15 | Ashwin Thilakkumar | Eckberg | |
11-Feb-15 | Sarfaraz Haque | Eckberg | |
11-Feb-15 | Anshul Gupta | Eckberg | |
26-Jan-15 | Swathi Mannepalli | Eckberg | |
15-Dec-14 | Harjinder Singh | Eckberg | |
04-Dec-14 | SHIVAM DIXIT | Eckberg | |
02-Dec-14 | Matthew Shaw | Edwards | |
25-Nov-14 | Sanket Shah | Eckberg | |
19-Nov-14 | Anupama Ranebennur | Eckberg | |
17-Nov-14 | Sudhir Phophaliya | Eckberg | |
17-Nov-14 | Mukesh Oberoi | Eckberg | |
13-Nov-14 | Swathi Artham | Eckberg | |
12-Nov-14 | Vigya Lnu | Tarokh | |
12-Nov-14 | Pradeep Rana | Eckberg | |
10-Nov-14 | Ashish Konda | Eckberg | |
09-Nov-14 | Saumya Sharma | Eckberg | |
06-Nov-14 | Devi Pakala | Eckberg | |
05-Nov-14 | Vaishnavi Srinivasan | Eckberg | |
05-Nov-14 | Bharath Prakash | Eckberg | |
31-Oct-14 | Rahul Swamy | Eckberg | |
30-Oct-14 | Varsha Kota | Eckberg | |
30-Oct-14 | KanakaNethra RajahNagarajasetty | Eckberg | |
30-Oct-14 | Amruta Gaikwad | Eckberg | |
29-Oct-14 | Atul Khaire | Eckberg | |
24-Oct-14 | Priya Jayaprakash | Whitney | |
24-Oct-14 | Likhita Gonchikara | Eckberg | |
22-Oct-14 | Akshay Manathkar | Eckberg | |
21-Oct-14 | Dipal Kashipara | Eckberg | |
15-Oct-14 | Ravikanth Boppidi | Eckberg | |
02-Oct-14 | Dharmendhar Pulakunta | Eckberg | |
30-Sep-14 | AMAN GHEI | Eckberg | |
22-Sep-14 | SHRUTHI SRIKANTAIAH | Eckberg | |
28-Aug-14 | Hoda Sayyadinejad | Whitney | |
22-Aug-14 | MOUMITA CHATTERJEE | Eckberg | |
12-Aug-14 | Xiaobin Zhang | Tarokh | |
17-Jul-14 | Bhakta Shardul | Eckberg | |
11-Jun-14 | Simmerdeep Singh | Lewis | |
15-May-14 | Richard Vu | Tarokh | |
14-May-14 | Suchismita Subudhi | Eckberg | |
14-May-14 | Chintal Vashi | Whitney | |
13-May-14 | Deepika Srinath | Eckberg | |
02-May-14 | Saifuddin Tariwala | Eckberg | |
02-May-14 | Nachiket Tanksale | Eckberg | |
01-May-14 | Abhishikta Vaddineni | Whitney | |
24-Apr-14 | Sandeep Muddam | Eckberg | |
23-Apr-14 | Chetan Rokhade | Root | |
17-Apr-14 | Vijaya Bylaiah | Eckberg | |
15-Apr-14 | Ketaki Raste | Eckberg | Big Data Analytics – Hadoop Performance Analysis |
14-Apr-14 | Rashmi Dahasahasra | Root | |
14-Apr-14 | Isilay Dural | Eckberg | |
09-Apr-14 | Sameer Kathawate | Eckberg | |
27-Mar-14 | Samia Fatima | Eckberg | |
27-Mar-14 | Pallavi Mokashi | Eckberg | |
25-Mar-14 | Sushruth Chandrashekar | Eckberg | |
24-Mar-14 | Nomitha Mudireddy | Eckberg | |
24-Mar-14 | DEBOSHREE SARKAR | Riggins | |
20-Mar-14 | Manasa Rao | Eckberg | |
12-Mar-14 | Aarthie Murugavel | Root | |
21-Feb-14 | Cailiang Xu | Xie | |
27-Nov-13 | Mahmood Contractor | Eckberg | |
27-Nov-13 | Luma Zakaria | Eckberg | |
20-Nov-13 | Varun Jayakumar | Eckberg | |
20-Nov-13 | Vanya Goel | Riggins | |
20-Nov-13 | Abhiraj Pande | Eckberg | |
13-Nov-13 | Srivenkata Gantikota | Eckberg | |
08-Nov-13 | Kuang Yao | Lewis | |
13-Nov-13 | Mini Pillai | Eckberg | |
07-Nov-13 | Aditi Akalkotkar | Eckberg | |
31-Oct-13 | Krishan Sharma | Eckberg | |
29-Oct-13 | Megha Shaseendran | Stewart | |
23-Oct-13 | Shruthi Rao | Eckberg | |
10-Oct-13 | Rima Soury | Xie | |
09-Oct-13 | Shreyas Diwan | Eckberg | |
08-Oct-13 | Kishore Reddy | Eckberg | |
03-Oct-13 | Lakshmi Vijayachandran | Eckberg | |
22-Aug-13 | Swati Patel | Eckberg | |
06-Aug-13 | Ankur Bhattacharjee | Eckberg | |
05-Aug-13 | Shruti Mahajan | Tarokh | |
02-Jul-13 | Anisha Santharam | Eckberg | |
20-May-13 | Johanna Stinner-Sloan | Roch | |
16-May-13 | Atul Vijayakumar | Lewis | |
15-May-13 | Leslie Viviani | Lewis | |
9-May-13 | Priyanka Angolkar | Eckberg | |
8-May-13 | Prashasti Gehalot | Riggins | |
8-May-13 | Aparna Ghate | Eckberg | |
30-Apr-13 | Sadana Borra | Eckberg | |
30-Apr-13 | Aditi Singh | Lewis |
|
18-Apr-13 | Andrew Luxner | Edwards | |
18-Apr-13 | Anal Surti | Eckberg | |
17-Apr-13 | Lavanya Vangalkrishnakumar | Eckberg | |
17-Apr-13 | Kevin Leake | Lewis | |
15-Apr-13 | Ranjitha Shenoy | Tarokh | |
9-Apr-13 | Hitesh Chaudhary | Lewis | |
29-Mar-13 | Ashish Tandel | Tarokh | |
28-Mar-13 | Kusuma Devanga | Eckberg |
|
28-Mar-13 | Akin Gursel | Eckberg |
|
27-Mar-13 | Sudeshna Mukherjee | Eckberg |
|
20-Mar-13 | Vikram Ramanna | Sarkar |
|
4-Mar-13 | Vikas Sharma | Lewis |
|
25-Feb-13 | Kanika Maheshwari | Eckberg |
|
20-Feb-13 | Aseem Chaudhary | Eckberg |
|
7-Jan-13 | Swathi Simmula | Lewis |
|
19-Dec-12 | Smita Digambar More | Thomas |
|
12-Dec-12 | John Stronks | Lewis |
|
11-Dec-12 | Sukhdeep Kaur | Lewis |
|
10-Dec-12 | Rama Bandi | Vuskovic |
|
7-Dec-12 | Melroy D’Monty | Eckberg |
|
6-Dec-12 | Angad Manchanda | Interlando |
|
21-Nov-12 | Sirisha Jonnalagadda | Eckberg |
|
20-Nov-12 | Deepika Agarwal | Eckberg |
|
19-Nov-12 | Sheridan Wright | Edwards |
|
14-Nov-12 | Aruna Alluri | Whitney |
|
9-Nov-12 | Ravish Thakor | Marovac |
|
9-Nov-12 | Park Patel | Marovac |
|
9-Nov-12 | Aesha Thakkar | Marovac | By Third Party Authentication Server |
7-Nov-12 | Namrata Garach | Whitney |
|
6-Nov-12 | Shrutika Sutar | Eckberg |
|
5-Nov-12 | Monica Maleyanda | Eckberg |
|
31-Oct-12 | Steven Williams | Edwards |
|
25-Oct-12 | Varun Jaiswal | Lewis |
|
25-Oct-12 | Shreyas Shah | Lewis |
|
25-Oct-12 | Pratibha Atri | Eckberg |
|
24-Oct-12 | Xinhua Fahy | Xie |
|
24-Oct-12 | Sridattateja Karna | Walsh |
|
24-Oct-12 | Kashyap Ivaturi | Eckberg |
|
23-Oct-12 | Dilpreet Sandhu | Eckberg |
|
19-Oct-12 | Tejpreet Sempla | Lewis |
|
12-Oct-12 | Sudeep Sen | Lewis |
|
12-Oct-12 | Manoj Raskar | Lewis |
|
12-Oct-12 | Arvind Morwal | Lewis |
|
11-Oct-12 | Preetam Borah | Lewis | Implementation of DTW Algorithm for Application Security |
5-Oct-12 | Ankit Patel | Eckberg | For Smartphone Applications |
27-Sep-12 | Yunita | Bhattacharjee | For an AJAX Based Course Management System |
18-Sep-12 | Aditi Laddha | Eckberg |
|
15-Aug-12 | Santosh Dantuluri | Eckberg |
|
14-Aug-12 | Tushar Jadhav | Lewis |
|
13-Aug-12 | Monal Doctor | Eckberg |
|
9-Aug-12 | Parita Shah | Eckberg |
|
3-Aug-12 | Nilay Jani | Lewis |
|
1-Aug-12 | Rima Shah | Riggins |
|
31-Jul-12 | Gaurav Sharma | Eckberg |
|
10-Jul-12 | Bhavana Raghupathi | Eckberg |
|
10-Jul-12 | Paola Alvarez | Eckberg |
|
3-Jul-12 | Karuna Hotlani | Eckberg |
|
3-Jul-12 | Rahul Chaturvedi | Eckberg |
|
27-Jun-12 | Fnu Sourabh | Stewart | Tidal Forces Using XNA Programming Framework |
26-Jun-12 | Achal Shah | Lewis |
|
20-Jun-12 | Uma Kunapareddy | Lewis |
|
19-Jun-12 | Reema Shah | Eckberg | |
24-May-12 | Hetang Shah | Thomas | |
23-May-12 | Anirudh Garg | Lewis | |
23-May-12 | Devang Patel | Lewis | |
21-May-12 | Haofei Fang | Vuskovic | |
14-May-12 | Xiaohui Zeng | Eckberg | |
14-May-12 | Mithun Nanjegowda | Lewis | |
10-May-12 | Chetan Gowda | Eckberg | |
10-May-12 | Sunil Ramachandra | Eckberg | |
8-May-12 | Sarath Keerthipati | Eckberg | |
8-May-12 | Anand Bikkavilli | Eckberg | |
7-May-12 | Abhinav Dhiman | Lewis | |
7-May-12 | Sunanda Komaragiri | Lewis | |
3-May-12 | Chatura Ettigi | Lewis | |
2-May-12 | Vinay Polisetty | Lewis | |
1-May-12 | Zarana Patel | Lewis | |
27-Apr-12 | Pratima Pillarisetti | Root | |
24-Apr-12 | Sunjna Kashyap | Lewis | |
24-Apr-12 | Chaitanya Deosthale | Lewis | |
23-Apr-12 | Mohit Joshi | Lewis | |
20-Apr-12 | Vincent Stanley Dayes | Root | |
20-Apr-12 | Brian Blaine | Tarokh | |
12-Apr-12 | Rajkumar Thulasimani | Lewis | |
12-Apr-12 | Darshini Rathod | Lewis | |
11-Apr-12 | Mehul Shah | Lewis | |
10-Apr-12 | ANJALI MATHUR | Eckberg | |
4-Apr-12 | Tushar Nimbalkar | Riggins | |
2-Apr-12 | Xinhua Fahy | Xie | |
2-Apr-12 | Thomas Drudge | Valafar | |
29-Mar-12 | Prashant Dikshit | Eckberg | |
22-Mar-12 | NEHA BANSAL | Riggins | |
20-Mar-12 | Hiral Patel | Marovac | |
20-Mar-12 | Honey Walia | Beck | |
20-Mar-12 | Abhishek Sood | Stewart | |
19-Mar-12 | Avinash Vadi | Tarokh | |
19-Mar-12 | Mirza Mohammed Akram Baig | Riggins | |
12-Mar-12 | Lantian Gai | Xie | |
28-Feb-12 | Sonia Patel | Eckberg | |
21-Feb-12 | Shamal Matty | Eckberg | |
20-Feb-12 | Deepa Gopal | Bhattacharjee | |
27-Jan-12 | Daniel Bolton | Whitney | |
20-Dec-11 | Ashish Gupta | Xie | |
15-Dec-11 | Chaitra Jayaram Manjunath | Eckberg | |
15-Dec-11 | Tarini Shah | Eckberg | |
14-Dec-11 | Dravya Nataraj | Eckberg | |
8-Dec-11 | Kazi Tulip | Bhattacharjee | |
8-Dec-11 | Prashanth Govindaraj | Lewis | |
29-Nov-11 | MITHUN RANGANATH | Eckberg | |
28-Nov-11 | Sri Tulasi Peddola | Lewis | |
17-Nov-11 | Kejue Jia | Donald | |
17-Nov-11 | SACHIN JAIN | Eckberg | |
16-Nov-11 | Vivek Shah | Eckberg | |
15-Nov-11 | Davinderpaul Makkar | Lewis | |
14-Nov-11 | William King | Vuskovic | |
7-Nov-11 | Robert Rota | Lewis | |
31-Oct-11 | Rohit Gupta | Eckberg | |
31-Oct-11 | Rakhi Harkawat | Eckberg | |
28-Oct-11 | Yashodhar Patel | Lewis | |
28-Oct-11 | Abdul Abdurrab | Xie | |
27-Oct-11 | Sunil Lakhiyani | Lewis | |
27-Oct-11 | Swapnil Devikar | Lewis | |
25-Oct-11 | Swagath Manda | Eckberg | |
25-Oct-11 | Krithika Mathivanan | Eckberg | |
20-Oct-11 | Siva Krishna Hari | Bhattacharjee | |
19-Oct-11 | Ashwini Govindagoudar | Eckberg | |
10-Oct-11 | RACHANA BEDEKAR | Eckberg | |
10-Oct-11 | Pooja Shah | Eckberg | |
10-Oct-11 | Ravali Yadavalli | Eckberg | |
6-Oct-11 | Vivek Sachdeva | Eckberg | |
3-Oct-11 | Shah Sudhirbhai | Eckberg | |
22-Sep-11 | Adarsh Joshi | Lewis | |
22-Sep-11 | Arvind Karanam | Lewis | |
16-Sep-11 | Sathyanarayan Chandrashekar | Stewart | |
15-Sep-11 | Vinita Kondhalkar | Lewis | |
31-Aug-11 | Jimmie Dixon | Edwards | |
30-Aug-11 | Jonathan Tjioe | Xie | |
25-Aug-11 | CHANDRA GOPALAIAH | Eckberg |
IMAGES
VIDEO
COMMENTS
The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...
Template for Papers in CS Abstract Introduction Background - Related work - Definitions and notation Main contributions Evaluation - Experiments - Related work Conclusions References Appendices
Writing a Computer Science Thesis Tobias Pfandzelter, Martin Grambow, Trever Schirmer, and David Bermbach Scalable Software Systems Research Group
The following guide to writing an M.Sc. thesis was prepared by Howard Hamilton and Brien Maguire, based on previous guides by Alan Mackworth (University of British Columbia) and Nick Cercone (Simon Fraser University), with their permission.
-2- Ferworn Rev: November 8, 2022 2 Traditional or "5 Chapter" Thesis The following sections discuss the core parts of this type of thesis with the goal of allowing you to form your thoughts around writing a document whose form is well-
William D. Shoaff Department of Computer Sciences Florida Institute of Technology Melbourne, Florida 32901. August 21, 2001. French translation by Mary Orban. Estonian translation by Paula Nuculescu. Lativian translation by Simona Auglis Contents
Senior Thesis A senior thesis is more than a big project write-up. It is documentation of an attempt to contribute to the general understanding of some problem of computer science, together with exposition that sets the work in the context of what has come before and what might follow.
At this page, we provide some information necessary while writing a thesis. Basically, the same rules can be applied for any other scientific paperwork. We must admit that this information collected…
Department of Computer Science Rutgers, The State University of New Jersey 110 Frelinghuysen Road Piscataway, NJ 08854-8019 (848) 445-2001
The final dissertation or thesis manuscript must have a ready-for-publication appearance and standard features. The Office of the University Registrar does not endorse or verify the accuracy of any dissertation or thesis formatting templates that may be available to you.
Introduction Problem definition describe what you trying to do; clearly state the question being addressed; when appropriate formulate a testable hypothesis
Computer Science Style Guide Suggestions. Collect a basic set of information for each one of your references, and then format this information to match an accepted Bibliographic Style (ACM, APA or IEEE).
STYLE & FORMAT MANUAL For Thesis and Dissertations College of Science University of the Philippines July 2004 Revised September 2021 Adapted from the University of Hawaii Graduate Division, 2002.Style and Policy
Theses/Dissertations from 2024 PDF. Extracting Social Network Model Parameters from Social Science Literature, Isaac Batts. PDF. LANGUAGE MODELS FOR RARE DISEASE INFORMATION EXTRACTION: EMPIRICAL INSIGHTS AND MODEL COMPARISONS, Shashank Gupta. PDF
How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...
There are a number of excellent LaTeX packages for typesetting code, made for just such occasions. The listings package is one good example, which includes standardized formatting for a number of languages.. It does not provide a "definitive" way to typeset code (there is no such, since there are a number of competing conventions) but its defaults provide a standard and well-recognized ...
Theses/Dissertations from 2023 PDF. Refining the Machine Learning Pipeline for US-based Public Transit Systems, Jennifer Adorno. PDF. Insect Classification and Explainability from Image Data via Deep Learning Techniques, Tanvir Hossain Bhuiyan. PDF
Follow. Theses/Dissertations from 2024 PDF. A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR, Farhad Dalirani. PDF. Using Driver Gaze and On-Road Driving Data for Predicting Driver Maneuvers in Advanced Driving Assistance Systems, Farzan Heidari. PDF
Theses/Dissertations from 2024 PDF. A Deep Learning Framework for Blockage Mitigation in mmWave Wireless, Ahmed Hazaa Almutairi (Dissertation). PDF. Design and Test of Asynchronous Systems Using the Link and Joint Model, Ebelechukwu Esimai (Dissertation). PDF
Follow. Theses/Dissertations from 2023 PDF. A hierarchical approach to improve the ant colony optimization algorith, Bryan J. Fischer. PDF. From Tic-tac-toe to AlphaGo: a survey of algorithms used in various games, Mathew T. Godon. PDF
Thesis Format. Thesis format refers to the structure and layout of a research thesis or dissertation. It typically includes several chapters, each of which focuses on a particular aspect of the research topic.. The exact format of a thesis can vary depending on the academic discipline and the institution, but some common elements include:
4 2 Welcome! We thank you for pursuing your graduate study with us in the Department of Computer Science (CS). The goal of this manual, updated annually, is to provide a reliable authoritative guide to the CS
2.1 Program Personnel • Department Head: Srinvasan Seshan • Director of the Doctoral Program: Karl Crary • Graduate Programs Manager: Deb Cavlovich
Theses from 2024 PDF. Enabling smart healthcare applications through visible light communication networks, Jack Manhardt. PDF. Time series anomaly detection using generative adversarial networks, Shyam Sundar Saravanan. Theses from 2023 PDF
Date: Student: Adviser: Title: 13-Dec-16: Arpita Banerjee: Eckberg: Study of H.264 Video Streaming over Wireless Channel using GStreamer: 08-Dec-16: Srilaxmi Kamatam