Home > Computer Science > CompSci TDs > Masters Theses
Computer Science Masters Theses
Theses from 2024 2024.
Enabling smart healthcare applications through visible light communication networks , Jack Manhardt
Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan
Theses from 2023 2023
DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula
MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric
COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara
Theses from 2022 2022
Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga
Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong
Theses from 2021 2021
Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II
Theses from 2020 2020
On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu
Theses from 2019 2019
Advanced techniques for improving canonical genetic programming , Adam Tyler Harter
Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter
Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam
Theses from 2018 2018
Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin
CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush
Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani
Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa
Solidification rate detection through solid-liquid interface tracking , Wei Luo
Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham
Cyber-physical security of an electric microgrid , Prashanth Palaniswamy
An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla
Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy
Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti
A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang
Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang
Theses from 2017 2017
Cyber-physical security of a chemical plant , Prakash Rao Dunaka
UFace: Your universal password no one can see , Nicholas Steven Hilbert
Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco
Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti
Personalizing education with algorithmic course selection , Tyler Morrow
Decodable network coding in wireless network , Junwei Su
Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla
Theses from 2016 2016
Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels
Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar
Theses from 2015 2015
Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi
Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt
Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda
A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li
Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin
Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala
Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy
Cyber security research frameworks for coevolutionary network defense , George Daniel Rush
Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara
Theses from 2014 2014
Crime pattern detection using online social media , Raja Ashok Bolla
Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi
A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati
Access control delegation in the clouds , Pavani Gorantla
Evolving decision trees for the categorization of software , Jasenko Hosic
M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar
Privacy preservation using spherical chord , Doyal Tapan Mukherjee
Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram
On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu
Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli
An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan
Theses from 2013 2013
Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz
Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu
Security analysis of a cyber physical system : a car example , Jason Madden
Efficient integrity verification of replicated data in cloud , Raghul Mukundan
Search-based model summarization , Lokesh Krishna Ravichandran
Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg
Secure design defects detection and correction , Wenquan Wang
Theses from 2012 2012
Robust evolutionary algorithms , Brian Wesley Goldman
Semantic preserving text tepresentation and its applications in text clustering , Michael Howard
Vehicle path verification using wireless sensor networks , Gerry W. Howser
Distributed and collaborative watermarking in relational data , Prakash Kumar
Theses from 2011 2011
A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle
Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount
A low-cost motion tracking system for virtual reality applications , Abhinav Chadda
Optimization of textual affect entity relation models , Ajith Cherukad Jose
MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram
A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi
An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka
Location privacy policy management system , Arej Awodha Muhammed
Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni
Theses from 2010 2010
Event detection from click-through data via query clustering , Prabhu Kumar Angajala
Population control in evolutionary algorithms , Jason Edward Cook
Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana
EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads
Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett
Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher
Multi axis slicing for rapid prototyping , Divya Kanakanala
Content based image retrieval for bio-medical images , Vikas Nahar
2-D path planning for direct laser deposition process , Swathi Routhu
Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu
An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli
Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo
Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu
Theses from 2009 2009
Information flow properties for cyber-physical systems , Rav Akella
Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet
Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba
Theses from 2008 2008
Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das
Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong
A time series classifier , Christopher Mark Gore
An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade
Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia
PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu
Co-optimization: a generalization of coevolution , Travis Service
Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder
Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson
Theses from 2007 2007
A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird
Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj
Advanced Search
- Notify me via email or RSS
- Collections
- Disciplines
- All Authors
- Faculty Authors
Author Corner
Useful links.
- Library Resources
Thesis Locations
- View these on map
- View these in Google Earth
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
EWU Digital Commons
Home > College, Department, or Program > CSTEM > Computer Science > Theses
Computer Science Masters Thesis Collection
Theses/dissertations from 2023 2023.
A hierarchical approach to improve the ant colony optimization algorith , Bryan J. Fischer
From Tic-tac-toe to AlphaGo: a survey of algorithms used in various games , Mathew T. Godon
Temporally consistent FastDVDNet: an overlap loss implementation for FastDVDNet , Michael J. Henderson
Multimodal game-based learning in Post-Secondary Education , Nathan A. Vanos
Theses/Dissertations from 2022 2022
Towards Cloud-Based cost-effective serverless information system , Isaac C. Angle
Modeling document classification to automate mental health diagnosis , William M. Tadlock
Theses/Dissertations from 2021 2021
Password-less two-factor authentication using scannable barcodes on a mobile device , Grant M. Callant II
Intrusion detection for industrial control systems , Kurt Lamon
Theses/Dissertations from 2020 2020
Data entry voice assistant for healthcare providers , Sajad Hussain M Alhamada
Comparison of the tally numbering system to traditional arithmetic systems in field programmable gate arrays , Robert Paul Shredow
Using Blockchain for Digital Card Game , Raymond A. Swannack
Theses/Dissertations from 2019 2019
Relaxed mental state detection using the Emotiv Epoc and Adaptive Threshold Algorithms , Olin L. Anderson
Detecting and mapping real-time Influenza-like illness using Twitter stream data , Elisha D. Brunette
The application of cloud resources to terrain data visualization , Gregory J. Larrick
Theses/Dissertations from 2018 2018
A practical and efficient algorithm for the k-mismatch shortest unique substring finding problem , Daniel Robert Allen
DETERMINING VULNERABILITY USING ATTACK GRAPHS: AN EXPANSION OF THE CURRENT FAIR MODEL , Beth M. Anderson
The application of GPU to molecular communication studies , Tobias J. Cain
Improving Aerial Package Delivery Through Simulation of Hazard Detection, Mapping, and Regulatory Compliance , Kevin Chumbley
GPU accelerated risk quantification , Forrest L. Ireland
Evaluating a Cluster of Low-Power ARM64 Single-Board Computers with MapReduce , Daniel McDermott
Glyph based segmentation of Chinese calligraphy characters in the "Collected Characters" stele. , David A. McInnis
Theses/Dissertations from 2017 2017
CLOUD LIVE VIDEO TRANSFER , Ryan Babcock
GENE EXPRESSION PROSPECTIVE SIMULATION AND ANALYSIS USING DATA MINING AND IMMERSIVE VIRTUAL REALITY VISUALIZATION , Joshua Cotes
Theses/Dissertations from 2016 2016
Near real-time early cancer detection using a graphics processing unit , Jason Helms
Analysis of algorithms to create profitable trades in the stock market , Nicholas P. Klinger
Dynamically parallel CAMSHIFT: GPU accelerated object tracking in digital video , Matthew J. Perry
USING CONVOLUTIONAL NEURAL NETWORKS FOR FINE GRAINED IMAGECLASSIFICATION OF ACUTE LYMPHOBLASTIC LEUKEMIA , Richard K. Sipes
Character extraction from ancient Chinese stele using discrete cosine transform , Toshiaki Ueno
Theses/Dissertations from 2015 2015
ECS: Educational Communication System , Nasmah Alnaimi
The geo-secure system: a secure system for data access based on geographical data , Fawaz J. Alruwaili
Heartbeat location assistance for electrocardiograms , Sarah Bass
Indirect association rule mining for crime data analysis , Riley Englin
Modeling and rendering of fluid flows using the Lennard-Jones potential , Nicholas J. LeFave
Multi-drug association rule mining on graphics processing unit , Jesse Scholer
Theses/Dissertations from 2014 2014
A study of kNN using ICU multivariate time series data , Admir Djulovic
Artificial Frequency Match Neuron Implemented with Digital Logic , David J. Ellis
Bridging the detection gap: a study on a behavior-based approach using malware techniques , Geancarlo Palavicini
3D Image Acquisition System for Facial Recognition , James E. Pearson
Divide and Conquer G-Buffer Ray Tracing , Daniel Stokes
Improving the performance of skeletal mesh animations in the Blender game engine , Mitchell Stokes
MINING MULTI-GRANULAR MULTIVARIATE MEDICAL MEASUREMENTS , Conrad Sykes
Theses/Dissertations from 2013 2013
Alsafeer software for teaching computer literacy , Zieb Rabie Alqahtani
Wireless electronic scoring of kendo competition matches using an embedded system , Edward B. Hogan
Using phishing to test social engineering awareness of financial employees , Rebecca M. Long
GPU ray tracing with CUDA , Thomas A. Pitkin
Ray traced rendering using GPGPU devices , Coby Soss
Theses/Dissertations from 2012 2012
Windows security sandbox framework , Kyle P. Gwinnup
Micro unmanned aerial vehicle video surveillance platform quadrocopter aircraft , Michael John Skadan
WiFiPoz -- an accurate indoor positioning system , Xiaoyi Ye
SSVEP-based brain computer interface using the Emotiv EPOC , Brian J. Zier
Theses/Dissertations from 2010 2010
Bittorrent vulnerable to layer-7 packet injection , Stephen L. Heath
Masquerade detection using fortified naive Bayes , Eric Salsbury
Theses/Dissertations from 2009 2009
Raising security awareness among higher education recipients , Chun-I Lin
On refactoring , Kaleb P. Pederson
Word prediction in assistive technologies for Aphasia rehabilitation in using Systemic Functional Grammar , Christopher T. Sorna
Novel visualization scheme for reasoning with uncertainty , Kyle A. Springer
Theses/Dissertations from 2008 2008
Tor latency attach verification and analysis , Ronnie Hoeflin
GPU programming: developing realistic water effects with OpenGL and GLSL , Joshua G. Slider
Theses/Dissertations from 2006 2006
Visualization of logic programming , Michael D. Henry
Theses/Dissertations from 2005 2005
Construction of efficient indexes from Fuzzy Clusters: preliminary study , Sean M. Drexler
Navigation agents and traffic simulation , Bart Hunking
Web-based fuzzy expert system: EWU optimal advisor , Nasser A. Rafi
Theses/Dissertations from 2003 2003
Intrusion detection, intelligent agents, and soft computing , Patrick Miller
Source code security analysis and fuzzy logic , Alexander Moskalyuk
Theses/Dissertations from 2002 2002
Support vector machines, N-gram kernels, and text classification , John Mill
Theses/Dissertations from 2001 2001
Solid object model advanced operations , Robert L. Throop
Theses/Dissertations from 2000 2000
Interactive 3D model display in Java 3D , Keqiu Chen
Theses/Dissertations from 1998 1998
Subdivision, and rfefinement of non-uniform rational B-spline curves and surfaces in 3-D , Bill E. La Rue
Theses/Dissertations from 1995 1995
A transputer based prototype for a fuzzy logic controller with tuning and simulation capabilities , Marshall Ryan Weddle
Theses/Dissertations from 1994 1994
Visualizing medical data using direct volume rendering , Bryce R. Hein
Industrial control via a state language implementation on the transputer architecture , Ted Preston VanderWeyst
A cellular method for modeling solid features in volume data , Jeff Wolkenhauer
Theses/Dissertations from 1993 1993
Hybrid coding with enhanced RDC and Huffman compression algorithms , Wilhelm J. Jenner
Implementation of a digital control system analysis program using the z-transform , Kristine L. Rudin
Subtyping and inheritance in a metamodel of abstractions , Gavin Vess
Theses/Dissertations from 1992 1992
Left ventricular boundary detection in digitized cardiac images , Albertine L. Marie Alm
High level user interface for a parallel operating system , Terry Conkright
Hybrid dictionary/statistical text compression algorithms , Michael E. Piotrowski
A study of using backpropagation and a new neural net algorithm for edge detecting in binary images , Jun Tian
Theses/Dissertations from 1990 1990
Visual parallel programming via petri nets , David Glenn Passey
Theses/Dissertations from 1988 1988
An iconic approach to parallel design , Elizabeth Stevens
Theses/Dissertations from 1986 1986
Conversion form structured programming to an object-oriented programming structure , Daryl Edward Krauter
Advanced Search
- Notify me via email or RSS
- Colleges, Departments, and Programs
- Disciplines
Author Corner
- EWU Libraries
- Contact EWU Libraries
509.359.7888 | Email
Home | About | FAQ | My Account | Contact | Accessibility | EWU Libraries | EWU Home
Privacy Copyright
ScholarWorks
Home > Engineering > Computer Science > Computer Science Graduate Projects
Computer Science Graduate Projects and Theses
Theses/dissertations from 2023 2023.
High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal
Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan
Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah
Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker
Fake News Detection Using Narrative Content and Discourse , Hongmin Kim
Anomaly Detection Using Graph Neural Network , Bishal Lakha
Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola
Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George
Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten
Theses/Dissertations from 2022 2022
Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck
Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones
Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi
Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee
Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn
Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy
Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda
Hate Speech Detection Using Textual and User Features , Rohan Raut
Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib
Characterization and Mitigation of False Information on the Web , Anu Shrestha
Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez
Theses/Dissertations from 2021 2021
Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen
Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar
Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green
Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz
Modeling Real and Fake News Sharing in Social Networks , Abishai Joy
Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy
Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton
Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts
A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar
Actors for the Internet of Things , Arjun Shukla
Theses/Dissertations from 2020 2020
Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black
Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke
Polyhedral+Dataflow Graphs , Eddie C. Davis
Improving Spellchecking for Children: Correction and Design , Brody Downs
A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake
Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung
Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi
Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi
Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill
Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin
Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli
A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips
Theses/Dissertations from 2019 2019
Edge-Assisted Workload-Aware Image Processing System , Anil Acharya
MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick
Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman
Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas
A Hybrid Model to Detect Fake News , Indhumathi Gurunathan
Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris
UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani
Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh
Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar
Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan
Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo
Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury
Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya
BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran
FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota
Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader
Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla
Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian
Theses/Dissertations from 2018 2018
Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya
Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah
Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri
Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour
Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha
Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton
Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira
Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa
Theses/Dissertations from 2017 2017
Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella
Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli
CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly
Predicting Friendship Strength in Facebook , Nitish Dhakal
Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi
Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley
Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala
Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes
A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal
Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki
Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li
The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship
Towards Automatic Repair of XACML Policies , Shuai Peng
Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma
Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez
Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright
Theses/Dissertations from 2016 2016
Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.
When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic
Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh
Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt
Towards Multipurpose Readability Assessment , Ion Madrazo
Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson
CEST: City Event Summarization using Twitter , Deepa Mallela
Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami
Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas
Massively Parallel Algorithm for Solving the Eikonal Equation on Multiple Accelerator Platforms , Anup Shrestha
A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption , Srisarguru Sridhar
Dynamic Machine Level Resource Allocation to Improve Tasking Performance Across Multiple Processes , Richard Walter Thatcher
Theses/Dissertations from 2015 2015
Developing an Application for Evolutionary Search for Computational Models of Cellular Development , Nicolas Scott Cornia
Accelerated Radar Signal Processing in Large Geophysical Datasets , Ravi Preesha Geetha
Integrity Coded Databases (ICDB) – Protecting Integrity for Outsourced Databases , Archana Nanjundarao
- Collections
- Disciplines
- SelectedWorks Gallery
- Albertsons Library
- Division of Research
- Graduate College
Advanced Search
- Notify me via email or RSS
Author Corner
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
Home > FACULTIES > Computer Science > CSD-ETD
Computer Science Theses and Dissertations
This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository
Theses/Dissertations from 2024 2024
A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani
Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy
Theses/Dissertations from 2023 2023
Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar
Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian
Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh
INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee
Algorithms and Software for Oligonucleotide Design , Qin Dong
Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani
De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han
Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley
A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He
A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh
Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani
Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu
Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li
Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li
DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li
Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai
Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad
The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi
Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam
Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat
Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul
On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi
Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza
Migration in Edge Computing , Arshin Rezazadeh
A Modified Hopfield Network for the K-Median Problem , Cody Rossiter
Predicting Network Failures with AI Techniques , Chandrika Saha
Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha
An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa
Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia
Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia
IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales
A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani
Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad
Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim
A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba
Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong
Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang
Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar
Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang
Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi
Theses/Dissertations from 2022 2022
The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt
Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy
Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez
Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu
Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte
Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell
Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch
Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh
Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost
Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie
Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka
Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling
Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan
Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti
Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida
False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito
Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford
An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson
Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem
A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid
Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma
Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi
Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis
Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg
Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang
Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang
Predicting and Modifying Memorability of Images , Mohammad Younesi
Theses/Dissertations from 2021 2021
Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed
A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar
Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani
Contrastive Learning of Auditory Representations , Haider Al-Tahan
Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi
Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak
Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman
Improving Reader Motivation with Machine Learning , Tanner A. Bohn
A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang
Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee
A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen
Exploratory Search with Archetype-based Language Models , Brent D. Davis
Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo
Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon
A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du
Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi
Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan
A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar
Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami
Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara
Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani
A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria
Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh
Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour
A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa
WesternAccelerator:Rapid Development of Microservices , Haoran Wei
A Lightweight and Explainable Citation Recommendation System , Juncheng Yin
Mitosis Detection from Pathology Images , Jinhang Zhang
Theses/Dissertations from 2020 2020
Visual Analytics of Electronic Health Records with a focus on Acute Kidney Injury , Sheikh S. Abdullah
Towards the Development of Network Service Cost Modeling-An ISP Perspective , Yasmeen Ali
- Accessible Formats
Advanced Search
- Notify me via email or RSS
- Expert Gallery
- Online Journals
- eBook Collections
- Reports and Working Papers
- Conferences and Symposiums
- Electronic Theses and Dissertations
- Digitized Special Collections
- All Collections
- Disciplines
Author Corner
- Submit Thesis/Dissertation
Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright
©1878 - 2016 Western University
- USF Research
- USF Libraries
Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations
Computer Science and Engineering Theses and Dissertations
Theses/dissertations from 2023 2023.
Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno
Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan
Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros
Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin
Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen
Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur
A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.
Graph Analysis on Social Networks , Shen Lu
Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera
Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo
Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi
Theses/Dissertations from 2022 2022
Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed
Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala
Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen
A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave
On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou
Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang
A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri
Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney
Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin
Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker
Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich
Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar
Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong
Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward
Theses/Dissertations from 2021 2021
Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar
Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia
Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto
Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis
Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey
AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi
Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill
Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja
Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana
Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev
Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.
Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski
Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov
Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai
Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri
Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco
Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam
Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava
A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza
Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar
Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams
Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari
Theses/Dissertations from 2020 2020
Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal
Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil
Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari
Composition of Atomic-Obligation Security Policies , Yan Cao Albright
Action Recognition Using the Motion Taxonomy , Maxat Alibayev
Sentiment Analysis in Peer Review , Zachariah J. Beasley
Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov
Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang
Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram
PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami
Composition of Atomic-Obligation Security Policies , Danielle Ferguson
Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel
The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann
Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez
Privacy-Preserving and Functional Information Systems , Thang Hoang
Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January
Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi
Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam
Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha
Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath
System Support of Concurrent Database Query Processing on a GPU , Hao Li
Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu
Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li
Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla
Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng
Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi
Models of Secure Software Enforcement and Development , Hernan M. Palombo
Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos
Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul
Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan
Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah
Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui
Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah
Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu
Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon
Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna
Theses/Dissertations from 2019 2019
Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur
Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed
Phenomena of Social Dynamics in Online Games , Essa Alhazmi
A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri
Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari
Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee
A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao
Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin
Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano
Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang
A GPU-Based Framework for Parallel Spatial Indexing and Query Processing , Zhila Nouri Lewis
A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic , Trisha Mukhopadhyay
An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks , Srivarsha Polnati
Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain , John Rippetoe
Detecting Digitally Forged Faces in Online Videos , Neilesh Sambhu
Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses , Dakun Shen
Advanced Search
- Email Notifications and RSS
- All Collections
- USF Faculty Publications
- Open Access Journals
- Conferences and Events
- Theses and Dissertations
- Textbooks Collection
Useful Links
- Rights Information
- SelectedWorks
- Submit Research
Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements
Privacy Copyright
- Northeastern University
- Khoury College of Computer Science
- Computer and Information Science Theses and Dissertations
- Computer Science Master's Theses
Computer Science Master's Theses Collection
http://hdl.handle.net/2047/D20233315
aBBRate: automating BBR congestion control attack exploration using a model-based approach.
Analysis of named entity recognition & entity linking in historical text
Annotating decision analyses using semantic web technologies
Applying EM to compute document relevance from crowdsourced pair preferences
Applying unsupervised grammar induction to OCR error correction
Argument mining for understanding media bias and misinformation
ARID: affinity representing instance descriptors.
Automated explanation of research informed consent by embodied conversational agents
Automated indexing of stories for conversational health intervention
Bias measurement in small datasets
- Emergency Info
- Directories
- UR Self-Service
- Academic Calendars & Schedules
- Find a Person
- Search Classes & Build Schedule
- Future Grad Students
- Professional Programs
- MSc (Thesis Route)
- MSc (Project Route)
- MSc (Data Science)
- MSc (Human-Centred Computing)
- MSc (Course Route)
- Thesis Approval & Defence Procedures
- FGSR Regulations
- Course Descriptions
- Most Recent Course Syllabi
- Course Timetable
- Financial Support
- Graduate Program FAQ
- Undergraduate
- Classes & Labs
Thesis Examples
Latex Example (shortened M.Sc. with urthesis.sty) (ZIP)
Latex Example (complete M.Sc. with no .sty) (ZIP)
How to Write a M.Sc. Thesis
The following guide to writing an M.Sc. thesis was prepared by Howard Hamilton and Brien Maguire, based on previous guides by Alan Mackworth (University of British Columbia) and Nick Cercone (Simon Fraser University), with their permission.
Quick Guide to the M.Sc. Thesis
An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria:
- Original research results are explained clearly and concisely.
- The thesis explains a novel exploratory implementation or a novel empirical study whose results will be of interest to the Computer Science community in general and to a portion of the Computer Science community in particular, e.g., Artificial Intelligence, Computational Complexity, etc.
- Novel implementation techniques are outlined, generalized, and explained.
- Theoretical results are obtained, explained, proven, and (worst, best, average) case analysis is performed where applicable.
- The implementation of a practical piece of nontrivial software whose availability could have some impact on the Computer Science community. Examples are a distributed file system for a mobile computing environment and a program featuring the application of artificial intelligence knowledge representation and planning techniques to intelligent computer assisted learning software.
Writing an acceptable thesis can be a painful and arduous task, especially if you have not written much before. A good methodology to follow, immediately upon completion of the required courses, is to keep a paper or electronic research notebook and commit to writing research oriented notes in it every day. From time to time, organize or reorganize your notes under headings that capture important categories of your thoughts. This journal of your research activities can serve as a very rough draft of your thesis by the time you complete your research. From these notes to a first M.Sc. thesis draft is a much less painful experience than to start a draft from scratch many months after your initial investigations. To help structure an M.Sc. thesis, the following guide may help.
One Formula for an M.Sc. Thesis for Computer Science
Chapter 1 Introduction: This chapter contains a discussion of the general area of research which you plan to explore in the thesis. It should contain a summary of the work you propose to carry out and the motivations you can cite for performing this work. Describe the general problem that you are working towards solving and the specific problem that you attempt to solve in the thesis. For example, the general problem may be finding an algorithm to help an artificial agent discover a path in a novel environment, and the specific problem may be evaluating the relative effectiveness and efficiency of five particular named approaches to finding the shortest path in a graph where each node is connected to at most four neighbours, with no knowledge of the graph except that obtained by exploration. This chapter should also explain the motivations for solving each of the general problem and your specific problem. The chapter should end with a guide to the reader on the composition and contents of the rest of the thesis, chapter by chapter. If there are various paths through the thesis, these should also be explained in Chapter 1.
Chapter 2 Limited Overview of the Field: This chapter contains a specialized overview of that part of a particular field in which you are doing M.Sc. thesis research, for example, paramodulation techniques for automated theorem proving or bubble figure modelling strategies for animation systems. The survey should not be an exhaustive survey but rather should impose some structure on your field of research endeavour and carve out your niche within the structure you impose. You should make generous use of illustrative examples and citations to current research.
Chapter 3 My Theory/Solution/Algorithm/Program: This chapter outlines your proposed solution to the specific problem described in Chapter 1. The solution may be an extension to, an improvement of, or even a disproof of someone else's theory / solution / method / ...).
Chapter 4 Description of Implementation or Formalism: This chapter describes your implementation or formalism. Depending on its length, it may be combined with Chapter 3. Not every thesis requires an implementation. Prototypical implementations are common and quite often acceptable although the guiding criterion is that the research problem must be clearer when you've completed your task than it was when you started!
Chapter 5 Results and Evaluation: This chapter should present the results of your thesis. You should choose criteria by which to judge your results, for example, the adequacy, coverage, efficiency, productiveness, effectiveness, elegance, user friendliness, etc., and then clearly, honestly and fairly adjudicate your results according to fair measures and report those results. You should repeat, whenever possible, these tests against competing or previous approaches (if you are clever you will win hands down in such comparisons or such comparisons will be obviated by system differences). The competing or previous approaches you compare against must have been introduced in Chapter 2 (in fact that may be the only reason they actively appear in Chapter 2) and you should include pointers back to Chapter 2. Be honest in your evaluations. If you give other approaches the benefit of the doubt every time, and develop a superior technique, your results will be all the more impressive.
Chapter 6 Conclusions: This chapter should summarize the achievements of your thesis and discuss their impact on the research questions you raised in Chapter 1. Use the distinctive phrasing "An original contribution of this thesis is" to identify your original contributions to research. If you solved the specific problem described in Chapter 1, you should explicitly say so here. If you did not, you should also make this clear. You should indicate open issues and directions for further or future work in this area with your estimates of relevance to the field, importance and amount of work required.
References Complete references for all cited works. This should not be a bibliography of everything you have read in your area.
Appendices include technical material (program listings, output, graphical plots of data, detailed tables of experimental results, detailed proofs, etc.) which would disrupt the flow of the thesis but should be made available to help explain or provide details to the curious reader.
- Privacy & Terms of Use
- Contact U of R
- Campus Maps
- U of R Home
- For Faculty and Staff
- City of Regina
Department of Computer Science
- Teaching Associates
- Undergraduate Advisors
- Graduate Advisors
- Faculty Positions
- Computer Sciences Advisory Board
- Fall 2021 Old/New CS Major/Minor FAQs
- Undergraduate Degree Information
- Prospective Undergrads
- 2021 CS Major Requirements
- 2020 CS Major Requirements
- 2021 CS Minor Requirements
- 2020 CS Minor Requirements
- M.S. in Computer Science
- M.S. in Computer Science 2023
- M.S. in Computer Science 2022
- Applying to the Master’s in CS Program
- Thesis Defense
Past Theses
- Spring 2024 CS Master Exams Registration
- Automata & Formal Languages
- Data Structures & Algorithms
- Database Management Systems
- Intelligent Systems & Robotics
- Operating Systems & Architecture
- Programming Languages
- Applying to the Program
- Registering for Classes
- GIS Certificate
- Laboratories
- CS Undergraduate Advising
- Sciences Advising
- Financial Aid & Scholarships
- Scholarship Finder
- Graduate Studies
- Student Ability Center
- Student Support Programs
- Study Abroad
- Health Resources
- Counseling & Psychological Services
- Employee Resources
- Technical Services
- Job Possibilities for CS Majors
- Career Development
- Clubs & Organizations
- Cultural Centers
- Student Council
- ACM Chapter
- Cyber Defense Team
- Mechatronics Club
- Give to the Department
Recent CS Masters Theses
The following is a list of some of the recently completed CS Masters Theses.
ScholarWorks@UMass Amherst
Home > CICS > CS > CS_DISS
Computer Science Department Dissertations Collection
Dissertations from 2024 2024.
Enabling Privacy and Trust in Edge AI Systems , Akanksha Atrey, Computer Science
Generative Language Models for Personalized Information Understanding , Pengshan Cai, Computer Science
Towards Automatic and Robust Variational Inference , Tomas Geffner, Computer Science
Multi-SLAM Systems for Fault-Tolerant Simultaneous Localization and Mapping , Samer Nashed, Computer Science
Policy Gradient Methods: Analysis, Misconceptions, and Improvements , Christopher P. Nota, Computer Science
Data to science with AI and human-in-the-loop , Gustavo Perez Sarabia, Computer Science
Question Answering By Case-Based Reasoning With Textual Evidence , Dung N. Thai, Computer Science
Dissertations from 2023 2023
An Introspective Approach for Competence-Aware Autonomy , Connor Basich, Computer Science
Foundations of Node Representation Learning , Sudhanshu Chanpuriya, Computer Science
Learning to See with Minimal Human Supervision , Zezhou Cheng, Computer Science
IMPROVING USER EXPERIENCE BY OPTIMIZING CLOUD SERVICES , Ishita Dasgupta, Computer Science
Automating the Formal Verification of Software , Emily First, Computer Science
Learning from Sequential User Data: Models and Sample-efficient Algorithms , Aritra Ghosh, Computer Science
Human-Centered Technologies for Inclusive Collection and Analysis of Public-Generated Data , Mahmood Jasim, Computer Science
Rigorous Experimentation For Reinforcement Learning , Scott M. Jordan, Computer Science
Towards Robust Long-form Text Generation Systems , Kalpesh Krishna, Computer Science
Emerging Trustworthiness Issues in Distributed Learning Systems , Hamid Mozaffari, Computer Science
TOWARDS RELIABLE CIRCUMVENTION OF INTERNET CENSORSHIP , Milad nasresfahani, Computer Science
Evidence Assisted Learning for Clinical Decision Support Systems , Bhanu Pratap Singh Rawat, Computer Science
DESIGN AND ANALYSIS OF CONTENT CACHING SYSTEMS , Anirudh Sabnis, Computer Science
Quantifying and Enhancing the Security of Federated Learning , Virat Vishnu Shejwalkar, Computer Science
Effective and Efficient Transfer Learning in the Era of Large Language Models , Tu Vu, Computer Science
Data-driven Modeling and Analytics for Greening the Energy Ecosystem , John Wamburu, Computer Science
Bayesian Structural Causal Inference with Probabilistic Programming , Sam A. Witty, Computer Science
LEARNING TO RIG CHARACTERS , Zhan Xu, Computer Science
GRAPH REPRESENTATION LEARNING WITH BOX EMBEDDINGS , Dongxu Zhang, Computer Science
Dissertations from 2022 2022
COMBINATORIAL ALGORITHMS FOR GRAPH DISCOVERY AND EXPERIMENTAL DESIGN , Raghavendra K. Addanki, Computer Science
MEASURING NETWORK INTERFERENCE AND MITIGATING IT WITH DNS ENCRYPTION , Seyed Arian Akhavan Niaki, Computer Science
Few-Shot Natural Language Processing by Meta-Learning Without Labeled Data , Trapit Bansal, Computer Science
Communicative Information Visualizations: How to make data more understandable by the general public , Alyxander Burns, Computer Science
REINFORCEMENT LEARNING FOR NON-STATIONARY PROBLEMS , Yash Chandak, Computer Science
Modeling the Multi-mode Distribution in Self-Supervised Language Models , Haw-Shiuan Chang, Computer Science
Nonparametric Contextual Reasoning for Question Answering over Large Knowledge Bases , Rajarshi Das, Computer Science
Languages and Compilers for Writing Efficient High-Performance Computing Applications , Abhinav Jangda, Computer Science
Controllable Neural Synthesis for Natural Images and Vector Art , Difan Liu, Computer Science
Probabilistic Commonsense Knowledge , Xiang Li, Computer Science
DISTRIBUTED LEARNING ALGORITHMS: COMMUNICATION EFFICIENCY AND ERROR RESILIENCE , Raj Kumar Maity, Computer Science
Practical Methods for High-Dimensional Data Publication with Differential Privacy , Ryan H. McKenna, Computer Science
Incremental Non-Greedy Clustering at Scale , Nicholas Monath, Computer Science
High-Quality Automatic Program Repair , Manish Motwani, Computer Science
Unobtrusive Assessment of Upper-Limb Motor Impairment Using Wearable Inertial Sensors , Brandon R. Oubre, Computer Science
Mixture Models in Machine Learning , Soumyabrata Pal, Computer Science
Decision Making with Limited Data , Kieu My Phan, Computer Science
Neural Approaches for Language-Agnostic Search and Recommendation , Hamed Rezanejad Asl Bonab, Computer Science
Low Resource Language Understanding in Voice Assistants , Subendhu Rongali, Computer Science
Enabling Daily Tracking of Individual’s Cognitive State With Eyewear , Soha Rostaminia, Computer Science
LABELED MODULES IN PROGRAMS THAT EVOLVE , Anil K. Saini, Computer Science
Reliable Decision-Making with Imprecise Models , Sandhya Saisubramanian, Computer Science
Data Scarcity in Event Analysis and Abusive Language Detection , Sheikh Muhammad Sarwar, Computer Science
Representation Learning for Shape Decomposition, By Shape Decomposition , Gopal Sharma, Computer Science
Metareasoning for Planning and Execution in Autonomous Systems , Justin Svegliato, Computer Science
Approximate Bayesian Deep Learning for Resource-Constrained Environments , Meet Prakash Vadera, Computer Science
ANSWER SIMILARITY GROUPING AND DIVERSIFICATION IN QUESTION ANSWERING SYSTEMS , Lakshmi Nair Vikraman, Computer Science
Dissertations from 2021 2021
Neural Approaches to Feedback in Information Retrieval , Keping Bi, Computer Science
Sociolinguistically Driven Approaches for Just Natural Language Processing , Su Lin Blodgett, Computer Science
Enabling Declarative and Scalable Prescriptive Analytics in Relational Data , Matteo Brucato, Computer Science
Neural Methods for Answer Passage Retrieval over Sparse Collections , Daniel Cohen, Computer Science
Utilizing Graph Structure for Machine Learning , Stefan Dernbach, Computer Science
Enhancing Usability and Explainability of Data Systems , Anna Fariha, Computer Science
Algorithms to Exploit Data Sparsity , Larkin H. Flodin, Computer Science
3D Shape Understanding and Generation , Matheus Gadelha, Computer Science
Robust Algorithms for Clustering with Applications to Data Integration , Sainyam Galhotra, Computer Science
Improving Evaluation Methods for Causal Modeling , Amanda Gentzel, Computer Science
SAFE AND PRACTICAL MACHINE LEARNING , Stephen J. Giguere, Computer Science
COMPACT REPRESENTATIONS OF UNCERTAINTY IN CLUSTERING , Craig Stuart Greenberg, Computer Science
Natural Language Processing for Lexical Corpus Analysis , Abram Kaufman Handler, Computer Science
Social Measurement and Causal Inference with Text , Katherine A. Keith, Computer Science
Concentration Inequalities in the Wild: Case Studies in Blockchain & Reinforcement Learning , A. Pinar Ozisik, Computer Science
Resource Allocation in Distributed Service Networks , Nitish Kumar Panigrahy, Computer Science
History Modeling for Conversational Information Retrieval , Chen Qu, Computer Science
Design and Implementation of Algorithms for Traffic Classification , Fatemeh Rezaei, Computer Science
SCALING DOWN THE ENERGY COST OF CONNECTING EVERYDAY OBJECTS TO THE INTERNET , Mohammad Rostami, Computer Science
Deep Learning Models for Irregularly Sampled and Incomplete Time Series , Satya Narayan Shukla, Computer Science
Traffic engineering in planet-scale cloud networks , Rachee Singh, Computer Science
Video Adaptation for High-Quality Content Delivery , Kevin Spiteri, Computer Science
Learning from Limited Labeled Data for Visual Recognition , Jong-Chyi Su, Computer Science
Human Mobility Monitoring using WiFi: Analysis, Modeling, and Applications , Amee Trivedi, Computer Science
Geometric Representation Learning , Luke Vilnis, Computer Science
Understanding of Visual Domains via the Lens of Natural Language , Chenyun Wu, Computer Science
Towards Practical Differentially Private Mechanism Design and Deployment , Dan Zhang, Computer Science
Audio-driven Character Animation , Yang Zhou, Computer Science
Dissertations from 2020 2020
Noise-Aware Inference for Differential Privacy , Garrett Bernstein, Computer Science
Motion Segmentation - Segmentation of Independently Moving Objects in Video , Pia Katalin Bideau, Computer Science
An Empirical Assessment of the Effectiveness of Deception for Cyber Defense , Kimberly J. Ferguson-Walter, Computer Science
Integrating Recognition and Decision Making to Close the Interaction Loop for Autonomous Systems , Richard Freedman, Computer Science
Improving Reinforcement Learning Techniques by Leveraging Prior Experience , Francisco M. Garcia, Computer Science
Optimization and Training of Generational Garbage Collectors , Nicholas Jacek, Computer Science
Understanding the Dynamic Visual World: From Motion to Semantics , Huaizu Jiang, Computer Science
Improving Face Clustering in Videos , SouYoung Jin, Computer Science
Reasoning About User Feedback Under Identity Uncertainty in Knowledge Base Construction , Ariel Kobren, Computer Science
Learning Latent Characteristics of Data and Models using Item Response Theory , John P. Lalor, Computer Science
Higher-Order Representations for Visual Recognition , Tsung-Yu Lin, Computer Science
Learning from Irregularly-Sampled Time Series , Steven Cheng-Xian Li, Computer Science
Dynamic Composition of Functions for Modular Learning , Clemens GB Rosenbaum, Computer Science
Improving Visual Recognition With Unlabeled Data , Aruni Roy Chowdhury, Computer Science
Deep Neural Networks for 3D Processing and High-Dimensional Filtering , Hang Su, Computer Science
Towards Optimized Traffic Provisioning and Adaptive Cache Management for Content Delivery , Aditya Sundarrajan, Computer Science
The Limits of Location Privacy in Mobile Devices , Keen Yuun Sung, Computer Science
ALGORITHMS FOR MASSIVE, EXPENSIVE, OR OTHERWISE INCONVENIENT GRAPHS , David Tench, Computer Science
System Design for Digital Experimentation and Explanation Generation , Emma Tosch, Computer Science
Advanced Search
- Notify me via email or RSS
- Collections
- Disciplines
Author Corner
- Login for Faculty Authors
- Faculty Author Gallery
- Expert Gallery
- University Libraries
- Computer Science Website
- UMass Amherst
This page is sponsored by the University Libraries.
© 2009 University of Massachusetts Amherst • Site Policies
Privacy Copyright
A list of master’s thesis topics in computer science
by Bastis Consultores | Aug 2, 2021 | Educational News | 1 comment
Choosing a topic for your master’s thesis is a very important step. It all depends, to a large extent, on your interests and abilities. During your studies you have surely discovered the areas of computer science that you are good at and which of them you plan to improve in the future. Before you embark on a topic search, consider the following suggestions to help you craft an initial strategy.
Suggestions when choosing a Master’s Thesis topic
First of all, you have to choose a good supervisor or academic advisor. It is very important that you collaborate with a teacher whose interests match your topic; otherwise, you will benefit little from the writing process. Ask questions and find out if previous students were satisfied with their supervision.
Introduction to Computer Science Dissertations
A master’s degree in Information and Communications Technology is designed to meet the requirements of people working as different professionals, such as academics, administrators and managers, technical staff, trainers and developers in the private or public sectors. A master’s degree in computer science combines theory and educational practice to create a learning experience that allows for the development of skills that can be applied to complicated real-world problems.
The MSc in Computer Science aims to improve knowledge of how computer systems, software and applications, as well as other forms of communication technologies, can be used to drive economic growth, improve learning capacity, encourage greater communication and socialisation and generally improve living standards.
Thinking about the subfields of computer science that interest you
When looking for a thesis topic, don’t just focus on the defended works. Again, ask your teacher to give you a list of current topics in the field of computer science that are underdeveloped. Your professors have deep experience and are aware of all directions of research conducted in their areas of scientific interest. They can suggest a great idea and help you put it into practice. Here are some ideas:
Programme structure (old and new programme structures)
Computer security (privacy and openness)
Relationships between hardware and software (adaptation of hardware to software)
Complexity theory (computational problems, mathematical questions)
Algorithms and architectures (machine learning, hardware architectures)
Artificial intelligence (computer systems capable of recognizing speech and making decisions)
Bioinformatics (modelling of human body processes)
Databases and information retrieval (collection of information and creation of easy access to it)
Multimedia (creative technologies, animation, graphics, audio)
Computational linguistics (natural language processing, machine translation, speech recognition)
You can also work in the following fields, which have been very popular in the Master’s Theses of the Pontifical Catholic University of Peru
Image Processing
Data Mining
Cloud Computing
Network Security
Service Computing [ Web Service ]
Social sensor networks
Software-defined networking
Software reengineering
Telecommunications Engineering
Text mining
Pixel per inch
Ad hoc network
Ad hoc vehicle network
Video streaming
Visual cryptography
Soft computing
Wireless body area network
No cables [Redes inalámbricas]
Wireless sensor networks
Natural language processing
Audio, voice and language processing
Brain-computer interface
Reliable and secure computing
Information security and forensics
Internet Computing
Learning technologies
Systems and cybernetics
Context-aware computing
Mobile Cloud Computing
Consider the following list of ideas according to the latest theses defended at the Technological Institute of Costa Rica
New methodologies in the teaching of computer science.
Measurement methods and software management.
Management of business processes and data.
Detection of traps in online games: a behavioral approach.
Information security and cryptography.
Real-time systems.
Route planning for tourism applications.
Data mining for environmental problems.
Real-time traffic data to model the impact of traffic accidents on the road network.
Computer-aided educational process.
Security in cloud computing.
Optical character recognition.
Search and rescue robots: movement and trajectory planning.
Computational neurobiology.
Computer DNA analysis.
Examples of topic ideas for a Master’s Thesis in Computer Science project
Taking into consideration, the ideas presented above, here are the following examples:
A study to evaluate the challenges and benefits of using robotics in the offer of services.
Artificial intelligence is being used to develop automatic robotics, such as robots used in Japan to care for older adults. This study will evaluate the challenges and benefits associated with the use of robots in the provision of services.
Impact of virtual reality systems on product promotion
Virtual reality technology has made it possible to develop a 3D environment with which people can interact as if it were a physical environment. This study will examine how the introduction of virtual reality has led to the growth of product promotion. The research will also examine the benefits in terms of costs and how the technology can be adopted in a company for use in product promotion.
Improve mobile battery life and processing power through cloud computing
The battery life of mobile phones in many of the smartphones on the market today is between two and twelve hours. This has become a major setback for the use of mobile technology, especially in areas where there are no electrical connections. This study will assess how cloud computing technology could be used to improve the battery life of mobile phones, testing the processing power of smartphones.
Integration of natural language processing in Microsoft office.
Microsoft office is very popular for its efficient services, especially in writing. However, its use is limited to people who understand the use of computers and is limited in common languages. This study will examine how natural language processing could be used to integrate indigenous language into Microsoft’s office suite.
Use of big data analytics in the detection of irresponsible use of social networks
The innovation of big data analytics (BDA) has helped many companies process real-time data from multiple sources. This has made it possible to improve the decision-making procedure and monitoring processes. This study will examine how BDA could be used in a company to control irresponsible social media use.
Assessment of the effects of database security mechanisms on system performance
Security mechanisms are very important for any database because they help detect and prevent any form of cyberattack. However, some security mechanisms have overhead costs or performance issues that slow down service delivery. This study will examine how the security mechanisms of database systems affect the performance of systems.
Remember that computer science is widely used today in different fields. Its application ranges from physics and medicine to education and entertainment. You can focus on the theoretical part of a certain topic or present your ideas about the practical use of a specific program.
An overview of various business stimulation tools; assessment of its impact on student learning in tertiary business school
Information and communication technologies have greatly improved the efficiency of business processes, making the functions of the organization more effective. Multimedia advances have also provided stronger platforms for information sharing, socialization and entertainment. Business process designs and multimedia information systems are key research areas in information and communication technologies.
M-Government; benefits and outcomes of mobile government for connected societies
Multi-agent systems allow for a higher level of collaboration between multiple agents working together to achieve a common goal. Coinciding with advances in the field of artificial intelligence, multi-agent systems are moving towards a higher level of adaptability. Stimulation programs are also an important stream of intelligent computer programs that aim to work in highly complex scenarios.
Encouraging the use of e-commerce in Saudi Arabia in light of existing challenges
The growing power of the Internet, software as a service (SAAS) is a booming trend that opens up many new research opportunities.
Implications of cloud computing for the multimedia industry
With the advancement of information and communication technologies, security remains one of the biggest concerns and also an important field of research.
Interpretation of information systems security management
The security management of information systems is evaluated according to the business environment, the organizational culture, the expectations and obligations of the different roles, the meanings of the different actions and the related behavioral patterns. The results of the two case studies show that inadequate analysis, design and management of computer-based information systems affect the integrity and integrity of an organization. As a result, the likelihood of adverse events occurs increases. In such an environment, it is very likely that security measures will be ignored or inadequate for the real needs of an organization. Therefore, what is needed is consistency between computer-based information systems and the business environment in which they are integrated.
A framework for assessing the quality of customer information
This thesis addresses a widespread, significant and persistent problem in the practice of information systems: the lack of investment in the quality of information about customers. Many organizations need clear financial models to undertake investments in their information systems and related processes. However, there are no widely accepted approaches to rigorously articulate the costs and benefits of potential improvements in the quality of customer information. This can result in low-quality customer information that impacts the broader goals of the organization.
Submit a Comment Cancel reply
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
Please enter an answer in digits: five × 1 =
Categories:
The most seen.
Copy short link
Master's Thesis in Computer Science
A Master's Thesis is expected to contain the following items:
- Introduction and Motivation
- Background of the Research Problem
- Related Work (state of the art)
- Problem Definition and Technical Solution
- Evaluation of Developed Solution
- Conclusions
In particular, the review of the state of the art should be thorough and the work performed should advance the state of the art.
Each Master's Thesis will be read and judged by a thesis committee consisting of the candidate's supervisor, a faculty member appointed by the supervisor, and a faculty member appointed by the Department through the GPD. The candidate is required to present a seminar on the thesis topic.
To register for MS Thesis (CS 699), the candidate must first obtain the approval of the GPD on the proposal.
Required Format
For more information on the format and procedure for completing the thesis, see ODU's Thesis & Dissertation Guide . Also see the guides under "Electronic Theses and Dissertations" at the Graduate School page .
Model Journal
Before you submit your thesis to ProQuest, the format must be approved by the College of Sciences . The College expects that you submit a "model journal" article along with your thesis. Your thesis format should match the journal for placement of table titles, placement of figure titles, and reference format. Your advisor may suggest a model journal, for example IEEE Transactions on Mobile Computing .
Recommended Deadlines
- Submission of thesis to committee: six weeks prior to the last day of classes for the semester (must be at least two weeks before the defense)
- MS thesis defense: four weeks prior to the deadline for college review
- Include all required documents (see College of Sciences Thesis & Dissertation Review Procedures )
- The College will follow-up with you about one week after submission
- Any subsequent submissions to the College may be sent as PDF via email
- Submission of approved thesis to ProQuest: see the official academic calendar for exact deadlines
Computer Science
- Undergraduate
- Linked Programs
- Future Students
- Scholarships & Financial Aid
- Student Resources
- Course Schedule
Department of Computer Science
3300 Engineering & Computational Sciences Building Norfolk, VA 23529
- Frequently Asked Questions
- Graduate Requirements
- Graduate Advising
- Graduate Forms
- Graduate Scholarships
- Join Computer Science Graduate Society
- Alumni Updates
Enhance your college career by gaining relevant experience with the skills and knowledge needed for your future career. Discover our experiential learning opportunities.
Picture yourself in the classroom, speak with professors in your major, and meet current students.
From sports games to concerts and lectures, join the ODU community at a variety of campus events.
- My UCalgary
- Class Schedule
- UCalgary Directory
- Continuing Education
- Active Living
- Academic Calendar
- UCalgary Maps
- Close Faculty Websites List Viewing: Faculty Websites
- Cumming School of Medicine
- Faculty of Arts
- Faculty of Graduate Studies
- Faculty of Kinesiology
- Faculty of Law
- Faculty of Nursing
- Faculty of Nursing (Qatar)
Faculty of Science
- Faculty of Social Work
- Faculty of Veterinary Medicine
- Haskayne School of Business
- School of Architecture, Planning and Landscape
- School of Public Policy
- Schulich School of Engineering
- Werklund School of Education
- Future Students
- Explore programs
- How to apply
- Understanding graduate studies
- Indigenous graduate students
- Financing grad school
- International students
- Graduate Student life
- Current Students
- Indigenous Graduate Students
- Newly Admitted
- Graduate Orientation
- Pre-arrival
- Registration
- Annual Registration
- Concurrent Registration
- Flexible Grading Option (CG Grade)
- Confirmation of registration
- Course registration
- Leave of absence
- Registration status
- Studying at another university
- Updating personal information (included preferred name)
- Thesis-based students
Fees and funding
- Understanding your fees
- Paying your fees
- Funding options
- Payment plan
- Supervision
- Best practices and guidelines
- Conflict of interest
- Changing supervision
- Academic integrity
- Annual progress report
- Intellectual property
- Building a thesis
- Submit your thesis
- Conducting oral exams remotely
- Thesis defence
- Course-based Students
- Academic Integrity
- Sources of funding
- Payment Plan
- NEW: Term-Based Registration
- Completing my degree
- Important dates and resources
- Forms and documents
- Graduate Calendar
- Service Requests and eForms
- News, updates and events
- Find your Graduate Program Administrator
- Calendar Archives
- Award Opportunities
- Graduate Awards Database
- Award opportunities
- Doctoral Recruitment Scholarships
- Award Guide
- Step 1: Applying
- Looking for awards
- Eligibility
- Preparing your application
- Step 2: Receiving
- Accept/Decline your award
- Getting paid
- Step 3: Managing your award
- Renewing your award
- Award interruption
- Award Termination
- Policies and Regulations
- Regulations
- Contact the Scholarship Office
- My GradSkills
- Academic Success
- My GradSkills Partners
- Communication Skills
- Research Communications Feedback Sessions
- Oral communication
- Visual communication
- Written communication
- Experiential Learning
- Internships
- For employers
- For graduate students
- Finding an internship
- Making your internship a TTI
- Applying for a TTI
- For graduate supervisors
- Images of Research
- Three Minute Thesis
- 2024 UCalgary 3MT Information
- Past Three Minute Thesis Videos
- Workshops and Resources
- Career planning and professional development resources
- My GradSkills Calendar
- My GradSkills Workshop Matrix
- Online/Virtual Training
- UCalgary Alumni Mentorship Program
- Exceptional scholars
- Graduate Mental Health Survey
- Test metrics
- Demographics
- Circumstances
- Mental Health
- What I wish I knew
- FGS Services
- Supervisory Renewal
- Supports for graduate students
- Graduate Academic and International Specialists
- Graduate supervisors
- Thesis and candidacy exams
- Supervisor resources
- Maintaining your supervisor profile
- Supervisory privileges
- Leadership team
- FGS Council
- Committees of Council
- Minutes and meetings
- Website Feedback
Computer Science
Master of Science (MSc)
Thesis-based program
Program overview.
The Computer Science program provides the bedrock for exciting careers at the forefront of innovation in private industry or entrepreneurship. It helps students build skills and novel ideas for designing and implementing software, as well as developing effective algorithms to solve computing problems and plan and manage organizational technology infrastructures. Cutting-edge companies such as Google, Apple, Amazon, Facebook, Autodesk, and Microsoft frequently hire graduates. Alumni are also actively engaged in entrepreneurship, innovation, and creating start-ups.
Completing this program
- Core Course: Research Methodology in Computer Science.
- Seminar: Students are required to give a departmental seminar on the results of their research.
- Software Engineering Specialization: Four additional courses from a list approved by the Department of Computer Science.
- Additional Courses: May include Artificial Intelligence, Databases, Computer Graphics, Scientific Computing, HCI and Visualization and others.
- Thesis: Students will complete a thesis based on original research.
Specializations
- Master of Science (MSc) Thesis-based in Computer Science, Software Engineering Specialization . The specialization is offered jointly through the Department of Computer Science and the Department of Electrical and Software Engineering.
- Wearable Technology Interdisciplinary Specialization
- Computational Neuroscience Interdisciplinary Specialization
Technology sector, business start-ups, computer science research, IT, software development.
A master’s degree in computer science will give you the pre-requisite for a PhD.
Students are required to prepare a thesis and successfully defend in an open oral defense.
One core course and four electives
Learn more about program requirements in the Academic Calendar
Classroom delivery
Time commitment.
Two years full-time
A supervisor is required, but is not required prior to the start of the program
See the Graduate Calendar for information on fees and fee regulations, and for information on awards and financial assistance .
Virtual Tour
Explore the University of Calgary (UCalgary) from anywhere. Experience all that UCalgary has to offer for your graduate student journey without physically being on campus. Discover the buildings, student services and available programs all from your preferred device.
Supervisors
Learn about faculty available to supervise this degree. Please note: additional supervisors may be available. Contact the program for more information.
John Aycock
Mario Costa Sousa
Philip Fong
Dr. Marina Gavrilova
Majid Ghaderi
Helen Ai He
Peter Høyer
Christian Jacob
Michael Jacobson, Jr.
Admission requirements
A minimum of 3.3 GPA on a 4.0 point system, over the past two years of full-time study (a minimum of 10 full-course equivalents or 60 units) of the undergraduate degree. Post-degree CS courses may be considered when calculating GPA. Exceptions to GPA requirement may be considered for those with either:
- demonstrated research excellence, or
- GRE General scores of at least 600 verbal and 750 quantitative and either 720 analytical (old test format) or 5.5 (new test format)
Minimum education
Four year degree in computer science or another field with 3rd or 4th year courses in the following areas: Theory of Computation; Software Engineering; Systems (OS, Compilers, Distributed Systems, Networking); Application (AI, Graphics, Databases, etc.).
Work samples
Reference letters.
Two letters of reference dated within twelve months of the application.
Test scores
Optional: Special consideration will be given to those with GRE scores of at least 600 verbal, 750 quantitative, and 720 analytical (5.5 in the new format). Applicants from outside Canada are expected to apply with GRE scores.
English language proficiency
An applicant whose primary language is not English may fulfill the English language proficiency requirement in one of the following ways:
- Test of English as a Foreign Language (TOEFL ibt) score of 97.
- International English Language Testing System (IELTS) score of 7.0 (minimum of 6.5 in each section).
- Pearson Test of English (PTE) score of 68, or higher (Academic version).
- Canadian Academic English Language test (CAEL) score of 70 (70 in some sections – up to the program, 60 in all other).
- Academic Communication Certificate (ACC) score of A- in one or two courses (up to the program), “B+” on all other courses.
- Cambridge C1 Advanced or Cambridge C2 Proficiency minimum score of 191.
- Duolingo English Test and obtaining a minimum score of 135* (with no sub-score below 115*). ( temporary until Fall 2024 intake ).
*Please contact your program of interest if you have any questions about ELP requirements
WINTER (For admission on January 1)
- Final Application Deadline – July 1 (Final Documentation Submission Deadline – July 15 )
- Final Application Deadline – September 1 (Final Documentation Submission Deadline – October 1 )
--------------
FALL (For admission on September 1)
- Early Applications (complete application review) - January 15
- Final Application Deadline – March 1 (Final Documentation Submission Deadline – March 15 )
- Final Application Deadline – May 1 (Final Documentation Submission Deadline – June 1 )
If you're not a Canadian or permanent resident, or if you have international credentials, make sure to learn about international requirements
Are you ready to apply?
Learn more about this program, department of computer science.
602 ICT Building 856 Campus Place NW Calgary, ABT2N 1N4 403.220.3528
Contact the Graduate Program Administrator
Visit the departmental website
University of Calgary 2500 University Drive NW Calgary, AB, T2N 1N4
Visit the Faculty of Science's website
Learn more about UCalgary by taking a virtual tour
Related programs
If you're interested in this program, you might want to explore other UCalgary programs.
Thesis-based PhD
Computational Media Design
Thesis-based MSc
Electrical and Software Engineering
Course-based MEng
Course-based MEng (Software)
Thesis-based MEng
Thesis-based MSc
Curious about the University of Calgary?
Located in the nation's most enterprising city, we are a living, growing and youthful institution that embraces change and opportunity with a can-do attitude.
Master’s Thesis
Preliminary Note: According to the Master regulations, the final paper in the Master program in Computer Science is the Master’s Thesis.
In a Master’s Thesis, candidates show their ability to independently perform scientific research on an appropriately challenging theme that also gives them the opportunity to develop their own ideas. On the basis of the "state-of-the-art" processes, the students must systematically apply the methods of computer science.
The Master’s Thesis must be written in the student's specialization area. The thesis advisor ensures that the objectives of the thesis can be reached within the intended time period. Advisors are available for consultation throughout the entire development of the thesis. They should regularly check that the work is progressing well and should also counteract any potentially negative developments, such as the student not meeting the objectives or exceeding the given time limit. They also give timely advice when the student is writing the thesis, and before the student submits the completed thesis.
All candidates must report the starting date of a Master’s Thesis to the Examination Office; the thesis topic and the starting date of the official processing period are then documented by the thesis advisor and forwarded to the Examination Office. The knowledge required for the thesis and how to acquire this knowledge should be clarified prior to when the topic is granted. For a Master’s Thesis, graduate students are first formally obliged to design a work plan. Approximately one month of full-time work (5 ECTS) is intended for this starting phase. The work plan (called a “Proposal”) must explore the thesis topic thoroughly enough and lay out a detailed plan for the following research on the thesis topic. The Proposal must explain this proposed research through detailed contents and depth as well as a complete depiction of the considered aspects. The Proposal must contain the following elements: a description of the task to be completed, the reasons behind working on the thesis, a clear formulation of the objectives, a description of the work necessary to reach the goal, and an accompanying timetable and preliminary outline of the written thesis. The work plan must be countersigned by the thesis advisor and submitted for approval to the Examination Office together with the application for the Master's Thesis. From this point on, the planned processing time is five months, whereas the start of the processing period agreed upon with the thesis advisor takes the one-month processing period for the work plan into account.
The written thesis is the main component of the final research. It should contain an incisive, understandable description of the completed research task, the research results, and the approach used to reach the result. In a thesis, candidates must also justify their decisions on which research methods or alternative solution approaches were used. The Master's Thesis must be written in the style of a scientific treatise. This includes in particular a summary, an outline, a description of the "state-of-the-art", and a bibliography of the literature used for the thesis. If software was designed and implemented during the thesis research, the structure, work methods and interfaces of the software must also be described precisely. Although it is not necessary to include the software documents in the written thesis, the software system, including the source code, must be available to the thesis advisor for review. Candidates must submit the written thesis in print to the examination office. Their advisor receives an additional copy in a common electronic format (PDF).
The thesis defense, meaning an open-audience presentation followed by scientific discussion, is also an element of the Master’s Thesis. During the defense, the candidate must explain his/her research results concisely in a 30- to 45-minute presentation and then answer questions posed by a professional audience (usually during an advanced seminar held by the advisor). Ideally, the defense should be held soon after submission of the thesis.
To determine the grade granted for the thesis, the various achievements presented in the thesis are evaluated individually and internally. In general, the following individual achievements are divided into the categories listed below, arranged from the top down in order of the grade-relevant importance of the individual aspects.
Research Results . The results of the research work are given the highest priority and can come in various forms: theorems, software products, hardware products, empirically derived statements, or a mixture thereof. The approach employed to reach the results are also evaluated when the quality of the results are assessed.
Written Thesis. The written thesis, the main component of the research work, is given second priority. Here the evaluation includes determining how understandably graduates present the findings and research method to expert readers, and how well they concentrated on essential details and excluded non-essential details. The form, graphics, language and style of the thesis are also assessed.
Work method . The evaluation of the work method includes determining how purposefully and independently the candidate performed the research.
Presentation and discussion. Here, the committee evaluates the preparation of the presentation, the visual aids used for the presentation (such as slides), the candidates’ rhetorical skills and their ability to handle critical questions.
Due to the nature of the field of computer science, a Master’s Thesis that is written in cooperation with other institutes or (industrial) university-external parties is no rarity. And sometimes candidates write their thesis on a topic at an institute that corresponds to their minor subject. In both of these cases, the thesis advisor must inspect the research topic carefully and ensure that the candidate is given competent "on-site support". If the Master’s Thesis is written in a minor subject and an advisor in this minor subject takes on the role of the candidate’s supervisor, a university instructor in the Computer Science Department at the University of Paderborn must first determine that the research topic is plausible, and this instructor must supervise the thesis together with the advisor in the minor subject. Merely including the Computer Science Department advisor’s name as the secondary advisor when submitting the completed written thesis is not sufficient.
If the Master’s Thesis is written outside the university, such as at an external company, the thesis advisor must ensure that the candidate is not negatively affected by company-internal constraints (deadlines, financial dependence, non-disclosure agreements for concealing trade secrets). In this sense, “freedom of education” must be guaranteed. Companies are notified that the research work (the written thesis) is, by general rule, open to all readers. In special cases (such as when a patent is pending), a certain limited time period between the end of the research and the actual publication of the thesis can be determined. The in-company advisor/reviewer must make the entire research work available.
When submitting the thesis, candidates pledge to archive a public copy of the thesis for up to at least 5 years. The Computer Science Department, meaning the university in general, does not archive the submitted, accepted written thesis.
Guide Lines
- Master's Thesis
- Projectgroups
- Enroll & Pay
- Prospective Students
- Current Students
- Degree Programs
Example MS Thesis Outline
- describe what you trying to do
- clearly state the question being addressed
- when appropriate formulate a testable hypothesis
- Describe the motivation; who is interested in the solution.
- Summarize the results and their significance.
- Describe current understanding of the problem, existing solutions, and the barriers to these solutions.
- Review of the pertinent literature.
- Methodology: Describe the approach to addressing the problem
- Presentation of Work (Could be more than one chapter)
- Summary of results
- Recommendations: generalize conclusions to appropriate design decisions, practices and/or procedures
- Implications to existing knowledge/theory
- Implications for further study
- Future Work
- jump to content
- jump to footer
Theses in the Department of Computer Science
Here you can find important information about theses in the department of computer science. [Photo: Pixabay]
The final thesis (Bachelor or Master) should show that the student is able to work independently on a complex task related to the study program and present it in a scientifically correct manner. It does not necessarily have to be the last module in the degree program, but there are guidelines as to when it can be started at the earliest (see Planning the Thesis).
In our study programs, there is no requirement that the thesis must be registered no later than X months after the last module exam. Nevertheless, please note that the thesis must be completed AND graded by the end of the maximum study period at the latest.
How does everything work around the thesis?
Requirements for the search for a topic.
- A thesis can only be started if at least 120 ECTS have been acquired in the Bachelor, and at least 60 ECTS in the Master. These ECTS must be entered on the transcript of records!
- The examiner of a thesis MUST be a professor of the Department of Computer Science. The examiner issues the topic and gives the final grade for the thesis.
- A second examiner (required for the master thesis) may come from another department / faculty of the University of Stuttgart.
- Often you will be assigned a supervisor who will give you advice and support and whom you can ask anything about your thesis. The supervisor is generally a member of the examiner's staff.
- It is possible to write a thesis in cooperation with a company. However, this is only possible if the examiner agrees. The company can at most take over the supervision, never the assignment of grades. However, since the orientation of the topics that come from companies often differs significantly from what is required as a thesis at the university, such constructs are very rare.
Finding a topic ...
To find a topic, it is best to contact the professors or their staff directly. Please make sure that you have taken courses from the department you are applying to. Otherwise, it may be difficult to work on a specific research topic of the department because you lack the prerequisites in this specific area. It may be a good start to take your own performance review and see what you particularly liked and where you also performed well on exams. These departments are then worth addressing first.
We try to post offers for theses as well as contact persons for the departments in ILIAS in the computer science marketplace.
If, after two to three months of intensive searching , you still have not found a topic, you can apply to the examination board for assignment of a thesis topic along with evidence of your unsuccessful search to date.
Registration of the thesis
It is important to note that you have to register your thesis with the Examinations Office no later than 1 month after starting the thesis (issue of the topic to you).
If a topic has been agreed upon, the secretary of the examiner prepares the computer science-specific contract including the license agreement (and, if applicable, confidentiality and/or language agreement) and hands out these documents to the student for proofreading. If possible, the time for proofreading and, if necessary, follow-up questions should not exceed one week. The contract documents are then signed by the student and returned to the secretary's office. If no publication is desired, the license agreement is crossed out. However, the document must remain with the contract.
At the same time, download the thesis application form from C@mpus. You can find it under the heading "My applications". If you are studying in the Master of Education, in the B.A. in Computer Science or in the B.A. minor in Computer Science, you will not receive this form from C@mpus, but directly from your exam officer. Please enter the following information in the form:
- the topic of the thesis in the original language and in English,
- the name of the examiner,
- the start date,
- sign the document and hand it in to the examiner's office.
The secretariat will have the document countersigned by the examiner and will then hand it back to you or send you a scan of it. You will then forward the document to the examination office as soon as possible. This can be done via the contact form and you can attach the scan or you can bring it personally to the examination office. There, the registration of the work will be entered into the system and confirmed on the form. Afterwards, please inform the examiner's office that the registration has been entered and that the work can now start. If the registration of the work is visible in the system (for the secretary's office), you will receive a copy of the contract.
By the way ...
- Theses can be registered at any time (even outside the exam registration period).
- In connection with the registration of the final thesis, the application for the issuance of the final documents must also be submitted. If you have any questions, please contact the examination office.
If you have any further questions, please contact the program manager or the examination board.
Submission of the thesis
The thesis must be printed and bound in the required number of copies (see contract). The following must be observed:
- For all printed copies, a rigid transparent film should be used as the front cover and, if possible, a black, solid cover at the back.
- The work must not be bound with a ring binding . Any type of adhesive or glue binding is permitted - preferably with a black linen booklet spine.
- The form requirements are summarized here once again.
To ensure that everything is printed, bound and handed in on time, you should collect the required number of covers from the examiner's office approximately 14 days BEFORE handing in your thesis.
In addition to the print copies the followings things have to be submitted:
- one separately printed title page of the thesis and
- the electronic version (pdf) of the thesis and an electronic version of the abstract in txt format. If you are studying in a German-language program and the thesis was written in English, both an English and a German abstract must be submitted. The electronic files can be sent to the examiner and the secretary's office by e-mail, on a stick or on a CD. The code generated by the work, if any, will be handed over separately to the examiner.
All printed copies and the electronic version must be handed in to the examiner's office by the deadline . After the examination by the secretary's office, you will receive the separate title page signed and date-stamped as proof of submission.
Form specifications, templates & links
Here are once again summarized all the notes (in German only)
- Instructions for examiners for the execution of theses
- Instructions for students
- Form specifications
- Template title page
- Template personal statetemt
- Graduation ceremony of the department
What if problems occur?
You forgot the register the thesis.
Subsequent registration of the thesis is possible for a maximum of one month (from the date of topic assignment). After that, this is only possible upon application to the examination board and only if there are valid reasons for which you are not responsible. Otherwise, the thesis will not be evaluated and you will have to look for a new topic.
Aborting the thesis and second attempt
The topic of the thesis can be returned once within the first 2 months of the processing time (Bachelor thesis) or within the first 3 months of the processing time (Master thesis) without a 5.0 being recorded. After that, this is no longer possible and an abandonment leads to a "Not Passed".
The thesis can be repeated once. If you have returned the topic at the first attempt and received a new one, this is no longer possible at the second attempt.
There is no time limit within which the second attempt must be registered. However, the thesis must be passed within the maximum period of study.
In general ...
If problems arise during the processing period that prevent you from devoting yourself to your thesis in a targeted manner, please contact your examiner and the examination board as soon as possible.
Contact person concerning theses
Katrin Schneider
Program Manager, Department Manager & Erasmus Coordinator of the Computer Science Department
- Profile page
- +49 711 685 88520
- Write e-mail
Universities Have a Computer-Science Problem
The case for teaching coders to speak French
Listen to this article
Produced by ElevenLabs and News Over Audio (NOA) using AI narration.
Updated at 5:37 p.m. ET on March 22, 2024
Last year, 18 percent of Stanford University seniors graduated with a degree in computer science, more than double the proportion of just a decade earlier. Over the same period at MIT, that rate went up from 23 percent to 42 percent . These increases are common everywhere: The average number of undergraduate CS majors at universities in the U.S. and Canada tripled in the decade after 2005, and it keeps growing . Students’ interest in CS is intellectual—culture moves through computation these days—but it is also professional. Young people hope to access the wealth, power, and influence of the technology sector.
That ambition has created both enormous administrative strain and a competition for prestige. At Washington University in St. Louis, where I serve on the faculty of the Computer Science & Engineering department, each semester brings another set of waitlists for enrollment in CS classes. On many campuses, students may choose to study computer science at any of several different academic outposts, strewn throughout various departments. At MIT, for example, they might get a degree in “Urban Studies and Planning With Computer Science” from the School of Architecture, or one in “Mathematics With Computer Science” from the School of Science, or they might choose from among four CS-related fields within the School of Engineering. This seepage of computing throughout the university has helped address students’ booming interest, but it also serves to bolster their demand.
Another approach has gained in popularity. Universities are consolidating the formal study of CS into a new administrative structure: the college of computing. MIT opened one in 2019. Cornell set one up in 2020. And just last year, UC Berkeley announced that its own would be that university’s first new college in more than half a century. The importance of this trend—its significance for the practice of education, and also of technology—must not be overlooked. Universities are conservative institutions, steeped in tradition. When they elevate computing to the status of a college, with departments and a budget, they are declaring it a higher-order domain of knowledge and practice, akin to law or engineering. That decision will inform a fundamental question: whether computing ought to be seen as a superfield that lords over all others, or just a servant of other domains, subordinated to their interests and control. This is, by no happenstance, also the basic question about computing in our society writ large.
When I was an undergraduate at the University of Southern California in the 1990s, students interested in computer science could choose between two different majors: one offered by the College of Letters, Arts and Sciences, and one from the School of Engineering. The two degrees were similar, but many students picked the latter because it didn’t require three semesters’ worth of study of a (human) language, such as French. I chose the former, because I like French.
An American university is organized like this, into divisions that are sometimes called colleges , and sometimes schools . These typically enjoy a good deal of independence to define their courses of study and requirements as well as research practices for their constituent disciplines. Included in this purview: whether a CS student really needs to learn French.
The positioning of computer science at USC was not uncommon at the time. The first academic departments of CS had arisen in the early 1960s, and they typically evolved in one of two ways: as an offshoot of electrical engineering (where transistors got their start), housed in a college of engineering; or as an offshoot of mathematics (where formal logic lived), housed in a college of the arts and sciences. At some universities, including USC, CS found its way into both places at once.
The contexts in which CS matured had an impact on its nature, values, and aspirations. Engineering schools are traditionally the venue for a family of professional disciplines, regulated with licensure requirements for practice. Civil engineers, mechanical engineers, nuclear engineers, and others are tasked to build infrastructure that humankind relies on, and they are expected to solve problems. The liberal-arts field of mathematics, by contrast, is concerned with theory and abstraction. The relationship between the theoretical computer scientists in mathematics and the applied ones in engineers is a little like the relationship between biologists and doctors, or physicists and bridge builders. Keeping applied and pure versions of a discipline separate allows each to focus on its expertise, but limits the degree to which one can learn from the other.
Read: Programmers, stop calling yourself engineers
By the time I arrived at USC, some universities had already started down a different path. In 1988, Carnegie Mellon University created what it says was one of the first dedicated schools of computer science. Georgia Institute of Technology followed two years later. “Computing was going to be a big deal,” says Charles Isbell, a former dean of Georgia Tech’s college of computing and now the provost at the University of Wisconsin-Madison. Emancipating the field from its prior home within the college of engineering gave it room to grow, he told me. Within a decade, Georgia Tech had used this structure to establish new research and teaching efforts in computer graphics, human-computer interaction, and robotics. (I spent 17 years on the faculty there, working for Isbell and his predecessors, and teaching computational media.)
Kavita Bala, Cornell University’s dean of computing, told me that the autonomy and scale of a college allows her to avoid jockeying for influence and resources. MIT’s computing dean, Daniel Huttenlocher, says that the speed at which computing evolves justifies the new structure.
But the computing industry isn’t just fast-moving. It’s also reckless. Technology tycoons say they need space for growth, and warn that too much oversight will stifle innovation. Yet we might all be better off, in certain ways, if their ambitions were held back even just a little. Instead of operating with a deep understanding or respect for law, policy, justice, health, or cohesion, tech firms tend to do whatever they want . Facebook sought growth at all costs, even if its take on connecting people tore society apart . If colleges of computing serve to isolate young, future tech professionals from any classrooms where they might imbibe another school’s culture and values—engineering’s studied prudence, for example, or the humanities’ focus on deliberation—this tendency might only worsen.
Read: The moral failure of computer scientists
When I raised this concern with Isbell, he said that the same reasoning could apply to any influential discipline, including medicine and business. He’s probably right, but that’s cold comfort. The mere fact that universities allow some other powerful fiefdoms to exist doesn’t make computing’s centralization less concerning. Isbell admitted that setting up colleges of computing “absolutely runs the risk” of empowering a generation of professionals who may already be disengaged from consequences to train the next one in their image. Inside a computing college, there may be fewer critics around who can slow down bad ideas. Disengagement might redouble. But he said that dedicated colleges could also have the opposite effect. A traditional CS department in a school of engineering would be populated entirely by computer scientists, while the faculty for a college of computing like the one he led at Georgia Tech might also house lawyers, ethnographers, psychologists, and even philosophers like me. Huttenlocher repeatedly emphasized that the role of the computing college is to foster collaboration between CS and other disciplines across the university. Bala told me that her college was established not to teach CS on its own but to incorporate policy, law, sociology, and other fields into its practice. “I think there are no downsides,” she said.
Mark Guzdial is a former faculty member in Georgia Tech’s computing college, and he now teaches computer science in the University of Michigan’s College of Engineering. At Michigan, CS wasn’t always housed in engineering—Guzdial says it started out inside the philosophy department, as part of the College of Literature, Science and the Arts. Now that college “wants it back,” as one administrator told Guzdial. Having been asked to start a program that teaches computing to liberal-arts students, Guzdial has a new perspective on these administrative structures. He learned that Michigan’s Computer Science and Engineering program and its faculty are “despised” by their counterparts in the humanities and social sciences. “They’re seen as arrogant, narrowly focused on machines rather than people, and unwilling to meet other programs’ needs,” he told me. “I had faculty refuse to talk to me because I was from CSE.”
In other words, there may be downsides just to placing CS within an engineering school, let alone making it an independent college. Left entirely to themselves, computer scientists can forget that computers are supposed to be tools that help people. Georgia Tech’s College of Computing worked “because the culture was always outward-looking. We sought to use computing to solve others’ problems,” Guzdial said. But that may have been a momentary success. Now, at Michigan, he is trying to rebuild computing education from scratch, for students in fields such as French and sociology. He wants them to understand it as a means of self-expression or achieving justice—and not just a way of making software, or money.
Early in my undergraduate career, I decided to abandon CS as a major. Even as an undergraduate, I already had a side job in what would become the internet industry, and computer science, as an academic field, felt theoretical and unnecessary. Reasoning that I could easily get a job as a computer professional no matter what it said on my degree, I decided to study other things while I had the chance.
I have a strong memory of processing the paperwork to drop my computer-science major in college, in favor of philosophy. I walked down a quiet, blue-tiled hallway of the engineering building. All the faculty doors were closed, although the click-click of mechanical keyboards could be heard behind many of them. I knocked on my adviser’s door; she opened it, silently signed my paperwork without inviting me in, and closed the door again. The keyboard tapping resumed.
The whole experience was a product of its time, when computer science was a field composed of oddball characters, working by themselves, and largely disconnected from what was happening in the world at large. Almost 30 years later, their projects have turned into the infrastructure of our daily lives. Want to find a job? That’s LinkedIn. Keep in touch? Gmail, or Instagram. Get news? A website like this one, we hope, but perhaps TikTok. My university uses a software service sold by a tech company to run its courses. Some things have been made easier with computing. Others have been changed to serve another end, like scaling up an online business.
Read: So much for ‘learn to code’
The struggle to figure out the best organizational structure for computing education is, in a way, a microcosm of the struggle under way in the computing sector at large. For decades, computers were tools used to accomplish tasks better and more efficiently. Then computing became the way we work and live. It became our culture, and we began doing what computers made possible, rather than using computers to solve problems defined outside their purview. Tech moguls became famous, wealthy, and powerful. So did CS academics (relatively speaking). The success of the latter—in terms of rising student enrollments, research output, and fundraising dollars—both sustains and justifies their growing influence on campus.
If computing colleges have erred, it may be in failing to exert their power with even greater zeal. For all their talk of growth and expansion within academia, the computing deans’ ambitions seem remarkably modest. Martial Hebert, the dean of Carnegie Mellon’s computing school, almost sounded like he was talking about the liberal arts when he told me that CS is “a rich tapestry of disciplines” that “goes far beyond computers and coding.” But the seven departments in his school correspond to the traditional, core aspects of computing plus computational biology. They do not include history, for example, or finance. Bala and Isbell talked about incorporating law, policy, and psychology into their programs of study, but only in the form of hiring individual professors into more traditional CS divisions. None of the deans I spoke with aspires to launch, say, a department of art within their college of computing, or one of politics, sociology, or film. Their vision does not reflect the idea that computing can or should be a superordinate realm of scholarship, on the order of the arts or engineering. Rather, they are proceeding as though it were a technical school for producing a certain variety of very well-paid professionals. A computing college deserving of the name wouldn’t just provide deeper coursework in CS and its closely adjacent fields; it would expand and reinvent other, seemingly remote disciplines for the age of computation.
Near the end of our conversation, Isbell mentioned the engineering fallacy, which he summarized like this: Someone asks you to solve a problem, and you solve it without asking if it’s a problem worth solving. I used to think computing education might be stuck in a nesting-doll version of the engineer’s fallacy, in which CS departments have been asked to train more software engineers without considering whether more software engineers are really what the world needs. Now I worry that they have a bigger problem to address: how to make computer people care about everything else as much as they care about computers.
This article originally mischaracterized the views of MIT’s computing dean, Daniel Huttenlocher. He did not say that computer science would be held back in an arts-and-science or engineering context, or that it needs to be independent.
IMAGES
VIDEO
COMMENTS
COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong
Theses/Dissertations from 2013. Alsafeer software for teaching computer literacy, Zieb Rabie Alqahtani. Wireless electronic scoring of kendo competition matches using an embedded system, Edward B. Hogan. Using phishing to test social engineering awareness of financial employees, Rebecca M. Long.
The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...
Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF. Improved Protein Sequence Alignments Using Deep Learning, Seyed Sepehr Ashrafzadeh.
Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications, Arup Kanti Dey. PDF. AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing, Hamza Elhamdadi. PDF. Automatic Detection of Vehicles in Satellite Images for Economic Monitoring, Cole Hill. PDF
Zhang, Minrui. CS2980: Model-based Semantic Compression in Database Project Report (478.9 KB) Zhang, Shu. Column-based Database Semantic Compression and Prediction-based Query Optimization (551.8 KB) Zhong, Zhigang. Fractal Tree Implementation with Intel Hardware Supported Transactional Memory (106.1 KB)
Displaying 1 to 10 of 57. The Digital Repository Service is a secure repository system, designed to store and share scholarly, administrative, and archival materials from the Northeastern University community. The DRS was developed by the Northeastern University Library as a tool for University faculty and staff to protect the valuable ...
An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria: Original research results are explained clearly and concisely. The thesis explains a novel exploratory implementation or a novel empirical study whose results will be of interest to the Computer Science community in general and to a ...
The thesis statement is a refined and succinct set of arguments that define what you will demonstrate or prove in the thesis—it is your position. It is the "point" of your work. The statement can be very short or many pages in length. If an oral defense were a battle, this is the ground you fight to hold.
Sample Masters Thesis/Projects. Sample Computer Science Masters Theses. Implementation of a Cartesian Grid Incompressible Navier-Stokes Solver on Multi-GPU Desktop Platforms Using CUDA. (Julien C. Thibault, 2009) Application of Parallel CompPerforming an Unsupervised Fluoroscopic Analysis of Knee Joint Kinematics. (Renu Ramanatha, 2009)
There needs to a statement of (1) the problem to be studied, (2) previous work on the problem, (3) the software requirements, (4) the goals of the study, (5) an outline of the proposed work with a set of milestones, and (6) a bibliography.
Award: 2017 Royal Geographical Society Undergraduate Dissertation Prize. Title: Refugees and theatre: an exploration of the basis of self-representation. University: University of Washington. Faculty: Computer Science & Engineering. Author: Nick J. Martindell. Award: 2014 Best Senior Thesis Award. Title: DCDN: Distributed content delivery for ...
Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded. MIT Theses are openly available to all readers. Please share how this access affects or benefits you.
The following is a list of some of the recently completed CS Masters Theses. Date. Student. Adviser. Title. 13-Dec-16. Arpita Banerjee. Eckberg. Study of H.264 Video Streaming over Wireless Channel using GStreamer.
Geometric Representation Learning, Luke Vilnis, Computer Science. PDF. Understanding of Visual Domains via the Lens of Natural Language, Chenyun Wu, Computer Science. PDF. Towards Practical Differentially Private Mechanism Design and Deployment, Dan Zhang, Computer Science. PDF. Audio-driven Character Animation, Yang Zhou, Computer Science
Computer DNA analysis. Examples of topic ideas for a Master's Thesis in Computer Science project. Taking into consideration, the ideas presented above, here are the following examples: A study to evaluate the challenges and benefits of using robotics in the offer of services.
Master's Thesis in Computer Science. A Master's Thesis is expected to contain the following items: In particular, the review of the state of the art should be thorough and the work performed should advance the state of the art. Each Master's Thesis will be read and judged by a thesis committee consisting of the candidate's supervisor, a faculty ...
thesis/project, e.g., the hypothesis to be tested, the thesis to be defended, the project to be completed, the question to be answered, etc. Methods - The method to be followed in accomplishing the thesis/project statement, i.e., proposed algorithms, procedures, controls, sample sizes, experiments, and expected results, etc.
Specializations. Master of Science (MSc) Thesis-based in Computer Science, Software Engineering Specialization . The specialization is offered jointly through the Department of Computer Science and the Department of Electrical and Software Engineering. Wearable Technology Interdisciplinary Specialization.
In a Master's Thesis, candidates show their ability to independently perform scientific research on an appropriately challenging theme that also gives them the opportunity to develop their own ideas. On the basis of the "state-of-the-art" processes, the students must systematically apply the methods of computer science.
Master's Thesis in Computer Science. F. Kuhn, A. Podelski, A. Ludwig. Published 2014. Computer Science. TLDR. This thesis argues that it is beneficial to interface the higher-level ''dynamic'' programming languages to lower-level ''static'' programming languages, and proposes a way for interfacing these in such a way, that the ...
Example MS Thesis Outline. Introduction. Problem definition. describe what you trying to do. clearly state the question being addressed. when appropriate formulate a testable hypothesis. Describe the motivation; who is interested in the solution. Summarize the results and their significance. Background.
A thesis can only be started if at least 120 ECTS have been acquired in the Bachelor, and at least 60 ECTS in the Master. These ECTS must be entered on the transcript of records! The examiner of a thesis MUST be a professor of the Department of Computer Science. The examiner issues the topic and gives the final grade for the thesis.
The case for teaching coders to speak French. Updated at 5:37 p.m. ET on March 22, 2024. Last year, 18 percent of Stanford University seniors graduated with a degree in computer science, more than ...