ScholarWorks

Home > Engineering > Computer Science > Computer Science Graduate Projects

Computer Science Graduate Projects and Theses

Theses/dissertations from 2023 2023.

High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal

Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan

Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah

Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker

Fake News Detection Using Narrative Content and Discourse , Hongmin Kim

Anomaly Detection Using Graph Neural Network , Bishal Lakha

Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola

Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George

Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten

Theses/Dissertations from 2022 2022

Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck

Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones

Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi

Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee

Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn

Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy

Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane

Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda

Hate Speech Detection Using Textual and User Features , Rohan Raut

Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib

Characterization and Mitigation of False Information on the Web , Anu Shrestha

Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez

Theses/Dissertations from 2021 2021

Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen

Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar

Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green

Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz

Modeling Real and Fake News Sharing in Social Networks , Abishai Joy

Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy

Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton

Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts

A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar

Actors for the Internet of Things , Arjun Shukla

Theses/Dissertations from 2020 2020

Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black

Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke

Polyhedral+Dataflow Graphs , Eddie C. Davis

Improving Spellchecking for Children: Correction and Design , Brody Downs

A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake

Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung

Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi

Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi

Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill

Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin

Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli

A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips

Theses/Dissertations from 2019 2019

Edge-Assisted Workload-Aware Image Processing System , Anil Acharya

MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick

Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman

Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas

A Hybrid Model to Detect Fake News , Indhumathi Gurunathan

Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris

UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani

Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh

Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar

Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan

Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo

Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury

Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya

BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran

FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota

Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader

Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla

Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian

Theses/Dissertations from 2018 2018

Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya

Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah

Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri

Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour

Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha

Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton

Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira

Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa

Theses/Dissertations from 2017 2017

Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella

Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli

CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly

Predicting Friendship Strength in Facebook , Nitish Dhakal

Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi

Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley

Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala

Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes

A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal

Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki

Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li

The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship

Towards Automatic Repair of XACML Policies , Shuai Peng

Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma

Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez

Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright

Theses/Dissertations from 2016 2016

Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.

When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic

Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh

Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt

Towards Multipurpose Readability Assessment , Ion Madrazo

Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson

CEST: City Event Summarization using Twitter , Deepa Mallela

Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami

Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas

Massively Parallel Algorithm for Solving the Eikonal Equation on Multiple Accelerator Platforms , Anup Shrestha

A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption , Srisarguru Sridhar

Dynamic Machine Level Resource Allocation to Improve Tasking Performance Across Multiple Processes , Richard Walter Thatcher

Theses/Dissertations from 2015 2015

Developing an Application for Evolutionary Search for Computational Models of Cellular Development , Nicolas Scott Cornia

Accelerated Radar Signal Processing in Large Geophysical Datasets , Ravi Preesha Geetha

Integrity Coded Databases (ICDB) – Protecting Integrity for Outsourced Databases , Archana Nanjundarao

  • Collections
  • Disciplines
  • SelectedWorks Gallery
  • Albertsons Library
  • Division of Research
  • Graduate College

Advanced Search

  • Notify me via email or RSS

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

California State University, San Bernardino

Home > College of Natural Sciences > COMPUTERSCI-ENGINEERING > COMPUTERSCI-ENGINEERING-ETD

Computer Science and Engineering Theses, Projects, and Dissertations

Theses/projects/dissertations from 2024 2024.

TRAFFIC ANALYSIS OF CITIES IN SAN BERNARDINO COUNTY , Sai Kalyan Ayyagari

Recommendation System using machine learning for fertilizer prediction , Durga Rajesh Bommireddy

Classification of Remote Sensing Image Data Using Rsscn-7 Dataset , Satya Priya Challa

Cultural Awareness Application , Bharat Gupta

PREDICTING HOSPITALIZATION USING ARTIFICIAL INTELLIGENCE , Sanath Hiremath

AUTOMATED BRAIN TUMOR CLASSIFIER WITH DEEP LEARNING , venkata sai krishna chaitanya kandula

TRUCK TRAFFIC ANALYSIS IN THE INLAND EMPIRE , Bhavik Khatri

A SMART HYBRID ENHANCED RECOMMENDATION AND PERSONALIZATION ALGORITHM USING MACHINE LEARNING , Aswin Kumar Nalluri

Theses/Projects/Dissertations from 2023 2023

CLASSIFICATION OF LARGE SCALE FISH DATASET BY DEEP NEURAL NETWORKS , Priyanka Adapa

GEOSPATIAL WILDFIRE RISK PREDICTION USING DEEP LEARNING , Abner Alberto Benavides

HUMAN SUSPICIOUS ACTIVITY DETECTION , Nilamben Bhuva

MAX FIT EVENT MANAGEMENT WITH SALESFORCE , AKSHAY DAGWAR

MELANOMA DETECTION BASED ON DEEP LEARNING NETWORKS , Sanjay Devaraneni

Heart Disease Prediction Using Binary Classification , Virendra Sunil Devare

CLASSIFICATION OF THORAX DISEASES FROM CHEST X-RAY IMAGES , Sharad Jayusukhbhai Dobariya

WEB BASED MANAGEMENT SYSTEM FOR HOUSING SOCIETY , Likhitha Reddy Eddala

Sales and Stock Management System , Rashmika Gaddam Ms

CONTACTLESS FOOD ORDERING SYSTEM , Rishivar Kumar Goli

RESTAURANT MANAGEMENT WEBSITE , Akhil Sai Gollapudi

DISEASE OF LUNG INFECTION DETECTION USING CNN MODEL -BAYESIAN OPTIMIZATION , poojitha gutha

DATA POISONING ATTACKS ON PHASOR MEASUREMENT UNIT DATA , Rutuja Sanjeev Haridas

CRIME MAPPING ANALYSIS USING WEB APPLICATION. , Lavanya Krishnappa

A LONG-TERM FUNDS PREDICTOR BASED ON DEEP LEARNING , SHUIYI KUANG

LIVER SEGMENTATION AND LESION DETECTION IN MEDICAL IMAGES USING A DEEP LEARNING-BASED U-NET MODEL , Kaushik Mahida

PHASOR MEASUREMENT UNIT DATA VISUALIZATION , Nikhila Mandava

TWITTER POLICING , Hemanth Kumar Medisetty

TRANSACTION MANAGEMENT SYSYEM FOR A PUBLISHER , HASSAIN SHAREEF MOHAMMED JR

LOBANGU: AN OPTICAL CHARACTER RECOGNITION RECEIPT MANAGEMENT APP FOR HEALTH CENTER PHARMACIES IN THE D.R.CONGO AND SURROUNDING EASTERN AFRICAN COUNTRIES , Bénis Munganga

PREDICTIVE MODEL FOR CFPB CONSUMER COMPLAINTS , Vyshnavi Nalluri

REVIEW CLASSIFICATION USING NATURAL LANGUAGE PROCESSING AND DEEP LEARNING , Brian Nazareth

Brain Tumor Detection Using MRI Images , Mayur Patel

QUIZ WEB APPLICATION , Dipti Rathod

HYPOTHYROID DISEASE ANALYSIS BY USING MACHINE LEARNING , SANJANA SEELAM

Pillow Based Sleep Tracking Device Using Raspberry Pi , Venkatachalam Seviappan

FINSERV ANDROID APPLICATION , Harsh Piyushkumar Shah

AUTOMATED MEDICAL NOTES LABELLING AND CLASSIFICATION USING MACHINE LEARNING , Akhil Prabhakar Thota

GENETIC PROGRAMMING TO OPTIMIZE PERFORMANCE OF MACHINE LEARNING ALGORITHMS ON UNBALANCED DATA SET , Asitha Thumpati

GOVERNMENT AID PORTAL , Darshan Togadiya

GENERAL POPULATION PROJECTION MODEL WITH CENSUS POPULATION DATA , Takenori Tsuruga

LUNG LESION SEGMENTATION USING DEEP LEARNING APPROACHES , Sree Snigdha Tummala

DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING , Saranya Valleri

Machine Learning for Kalman Filter Tuning Prediction in GPS/INS Trajectory Estimation , Peter Wright

Theses/Projects/Dissertations from 2022 2022

LEARN PROGRAMMING IN VIRTUAL REALITY? A PROJECT FOR COMPUTER SCIENCE STUDENTS , Benjamin Alexander

LUNG CANCER TYPE CLASSIFICATION , Mohit Ramajibhai Ankoliya

HIGH-RISK PREDICTION FOR COVID-19 PATIENTS USING MACHINE LEARNING , Raja Kajuluri

IMPROVING INDIA’S TRAFFIC MANAGEMENT USING INTELLIGENT TRANSPORTATION SYSTEMS , Umesh Makhloga

DETECTION OF EPILEPSY USING MACHINE LEARNING , Balamurugan Murugesan

SOCIAL MOBILE APPLICATION: UDROP , Mahmoud Oraiqat

Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional and Recurrent Neural Networks , Sonia Perez-Gamboa

College of Education FileMaker Extraction and End-User Database Development , Andrew Tran

DEEP LEARNING EDGE DETECTION IN IMAGE INPAINTING , Zheng Zheng

Theses/Projects/Dissertations from 2021 2021

A General Conversational Chatbot , Vipin Nambiar

Verification System , Paras Nigam

DESKTOP APPLICATION FOR THE PUZZLE BOARD GAME “RUSH HOUR” , Huanqing Nong

Ahmedabad City App , Rushabh Picha

COMPUTER SURVEILLANCE SYSTEM USING WI-FI FOR ANDROID , Shashank Reddy Saireddy

ANDROID PARKING SYSTEM , Vishesh Reddy Sripati

Sentiment Analysis: Stock Index Prediction with Multi-task Learning and Word Polarity Over Time , Yue Zhou

Theses/Projects/Dissertations from 2020 2020

BUBBLE-IN DIGITAL TESTING SYSTEM , Chaz Hampton

FEEDBACK REVIEW SYSTEM USING SENTIMENT ANALYSIS , Vineeth Kukkamalla

WEB APPLICATION FOR MOVIE PERFORMANCE PREDICTION , Devalkumar Patel

Theses/Projects/Dissertations from 2019 2019

REVIEWS TO RATING CONVERSION AND ANALYSIS USING MACHINE LEARNING TECHNIQUES , Charitha Chanamolu

EASY EXAM , SARTHAK DABHI

EXTRACT TRANSFORM AND LOADING TOOL FOR EMAIL , Amit Rajiv Lawanghare

VEHICLE INFORMATION SYSTEM USING BLOCKCHAIN , Amey Zulkanthiwar

Theses/Projects/Dissertations from 2018 2018

USING AUTOENCODER TO REDUCE THE LENGTH OF THE AUTISM DIAGNOSTIC OBSERVATION SCHEDULE (ADOS) , Sara Hussain Daghustani

California State University, San Bernardino Chatbot , Krutarth Desai

ORGANIZE EVENTS MOBILE APPLICATION , Thakshak Mani Chandra Reddy Gudimetla

SOCIAL NETWORK FOR SOFTWARE DEVELOPERS , Sanket Prabhakar Jadhav

VIRTUALIZED CLOUD PLATFORM MANAGEMENT USING A COMBINED NEURAL NETWORK AND WAVELET TRANSFORM STRATEGY , Chunyu Liu

INTER PROCESS COMMUNICATION BETWEEN TWO SERVERS USING MPICH , Nagabhavana Narla

SENSOR-BASED HUMAN ACTIVITY RECOGNITION USING BIDIRECTIONAL LSTM FOR CLOSELY RELATED ACTIVITIES , Arumugam Thendramil Pavai

NEURAL NETWORK ON VIRTUALIZATION SYSTEM, AS A WAY TO MANAGE FAILURE EVENTS OCCURRENCE ON CLOUD COMPUTING , Khoi Minh Pham

EPICCONFIGURATOR COMPUTER CONFIGURATOR AND CMS PLATFORM , IVO A. TANTAMANGO

STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao

Theses/Projects/Dissertations from 2017 2017

CHILDREN’S SOCIAL NETWORK: KIDS CLUB , Eiman Alrashoud

MULTI-WAY COMMUNICATION SYSTEM , S. Chinnam

WEB APPLICATION FOR GRADUATE COURSE RECOMMENDATION SYSTEM , Sayali Dhumal

MOBILE APPLICATION FOR ATTENDANCE SYSTEM COYOTE-ATTENDANCE , Sindhu Hari

WEB APPLICATION FOR GRADUATE COURSE ADVISING SYSTEM , Sanjay Karrolla

Custom T-Shirt Designs , Ranjan Khadka

STUDENT CLASS WAITING LIST ENROLLMENT , AISHWARYA LACHAGARI

ANDROID MOBILE APPLICATION FOR HOSPITAL EXECUTIVES , Vihitha Nalagatla

PIPPIN MACHINE , Kiran Reddy Pamulaparthy

SOUND MODE APPLICATION , Sindhuja Pogaku

I2MAPREDUCE: DATA MINING FOR BIG DATA , Vishnu Vardhan Reddy Sherikar

COMPARING AND IMPROVING FACIAL RECOGNITION METHOD , Brandon Luis Sierra

NATURAL LANGUAGE PROCESSING BASED GENERATOR OF TESTING INSTRUMENTS , Qianqian Wang

AUTOMATIC GENERATION OF WEB APPLICATIONS AND MANAGEMENT SYSTEM , Yu Zhou

Theses/Projects/Dissertations from 2016 2016

CLOTH - MODELING, DEFORMATION, AND SIMULATION , Thanh Ho

CoyoteLab - Linux Containers for Educational Use , Michael D. Korcha

PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS , Essa Yahya M Muharish

DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP , Bir Apaar Singh Sodhi

Theses/Projects/Dissertations from 2015 2015

APPLY DATA CLUSTERING TO GENE EXPRESSION DATA , Abdullah Jameel Abualhamayl Mr.

Density Based Data Clustering , Rayan Albarakati

Developing Java Programs on Android Mobile Phones Using Speech Recognition , Santhrushna Gande

THE DESIGN AND IMPLEMENTATION OF AN ADAPTIVE CHESS GAME , Mehdi Peiravi

CALIFORNIA STATE UNIVERSITY SAN BERNARDINO WiN GPS , Francisco A. Ron

ESTIMATION ON GIBBS ENTROPY FOR AN ENSEMBLE , Lekhya Sai Sake

A WEB-BASED TEMPERATURE MONITORING SYSTEM FOR THE COLLEGE OF ARTS AND LETTERS , Rigoberto Solorio

Advanced Search

  • Notify me via email or RSS
  • Department, Program, or Office
  • Disciplines

Author Corner

  • School of Computer Science and Engineering Website

A service of the John M. Pfau Library

Digital Commons Network

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright Acrobat Reader

Grad Coach

Research Topics & Ideas: CompSci & IT

50+ Computer Science Research Topic Ideas To Fast-Track Your Project

IT & Computer Science Research Topics

Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you’ve landed on this post, chances are you’re looking for a computer science-related research topic , but aren’t sure where to start. Here, we’ll explore a variety of CompSci & IT-related research ideas and topic thought-starters, including algorithms, AI, networking, database systems, UX, information security and software engineering.

NB – This is just the start…

The topic ideation and evaluation process has multiple steps . In this post, we’ll kickstart the process by sharing some research topic ideas within the CompSci domain. This is the starting point, but to develop a well-defined research topic, you’ll need to identify a clear and convincing research gap , along with a well-justified plan of action to fill that gap.

If you’re new to the oftentimes perplexing world of research, or if this is your first time undertaking a formal academic research project, be sure to check out our free dissertation mini-course. In it, we cover the process of writing a dissertation or thesis from start to end. Be sure to also sign up for our free webinar that explores how to find a high-quality research topic. 

Overview: CompSci Research Topics

  • Algorithms & data structures
  • Artificial intelligence ( AI )
  • Computer networking
  • Database systems
  • Human-computer interaction
  • Information security (IS)
  • Software engineering
  • Examples of CompSci dissertation & theses

Topics/Ideas: Algorithms & Data Structures

  • An analysis of neural network algorithms’ accuracy for processing consumer purchase patterns
  • A systematic review of the impact of graph algorithms on data analysis and discovery in social media network analysis
  • An evaluation of machine learning algorithms used for recommender systems in streaming services
  • A review of approximation algorithm approaches for solving NP-hard problems
  • An analysis of parallel algorithms for high-performance computing of genomic data
  • The influence of data structures on optimal algorithm design and performance in Fintech
  • A Survey of algorithms applied in internet of things (IoT) systems in supply-chain management
  • A comparison of streaming algorithm performance for the detection of elephant flows
  • A systematic review and evaluation of machine learning algorithms used in facial pattern recognition
  • Exploring the performance of a decision tree-based approach for optimizing stock purchase decisions
  • Assessing the importance of complete and representative training datasets in Agricultural machine learning based decision making.
  • A Comparison of Deep learning algorithms performance for structured and unstructured datasets with “rare cases”
  • A systematic review of noise reduction best practices for machine learning algorithms in geoinformatics.
  • Exploring the feasibility of applying information theory to feature extraction in retail datasets.
  • Assessing the use case of neural network algorithms for image analysis in biodiversity assessment

Topics & Ideas: Artificial Intelligence (AI)

  • Applying deep learning algorithms for speech recognition in speech-impaired children
  • A review of the impact of artificial intelligence on decision-making processes in stock valuation
  • An evaluation of reinforcement learning algorithms used in the production of video games
  • An exploration of key developments in natural language processing and how they impacted the evolution of Chabots.
  • An analysis of the ethical and social implications of artificial intelligence-based automated marking
  • The influence of large-scale GIS datasets on artificial intelligence and machine learning developments
  • An examination of the use of artificial intelligence in orthopaedic surgery
  • The impact of explainable artificial intelligence (XAI) on transparency and trust in supply chain management
  • An evaluation of the role of artificial intelligence in financial forecasting and risk management in cryptocurrency
  • A meta-analysis of deep learning algorithm performance in predicting and cyber attacks in schools

Research topic idea mega list

Topics & Ideas: Networking

  • An analysis of the impact of 5G technology on internet penetration in rural Tanzania
  • Assessing the role of software-defined networking (SDN) in modern cloud-based computing
  • A critical analysis of network security and privacy concerns associated with Industry 4.0 investment in healthcare.
  • Exploring the influence of cloud computing on security risks in fintech.
  • An examination of the use of network function virtualization (NFV) in telecom networks in Southern America
  • Assessing the impact of edge computing on network architecture and design in IoT-based manufacturing
  • An evaluation of the challenges and opportunities in 6G wireless network adoption
  • The role of network congestion control algorithms in improving network performance on streaming platforms
  • An analysis of network coding-based approaches for data security
  • Assessing the impact of network topology on network performance and reliability in IoT-based workspaces

Free Webinar: How To Find A Dissertation Research Topic

Topics & Ideas: Database Systems

  • An analysis of big data management systems and technologies used in B2B marketing
  • The impact of NoSQL databases on data management and analysis in smart cities
  • An evaluation of the security and privacy concerns of cloud-based databases in financial organisations
  • Exploring the role of data warehousing and business intelligence in global consultancies
  • An analysis of the use of graph databases for data modelling and analysis in recommendation systems
  • The influence of the Internet of Things (IoT) on database design and management in the retail grocery industry
  • An examination of the challenges and opportunities of distributed databases in supply chain management
  • Assessing the impact of data compression algorithms on database performance and scalability in cloud computing
  • An evaluation of the use of in-memory databases for real-time data processing in patient monitoring
  • Comparing the effects of database tuning and optimization approaches in improving database performance and efficiency in omnichannel retailing

Topics & Ideas: Human-Computer Interaction

  • An analysis of the impact of mobile technology on human-computer interaction prevalence in adolescent men
  • An exploration of how artificial intelligence is changing human-computer interaction patterns in children
  • An evaluation of the usability and accessibility of web-based systems for CRM in the fast fashion retail sector
  • Assessing the influence of virtual and augmented reality on consumer purchasing patterns
  • An examination of the use of gesture-based interfaces in architecture
  • Exploring the impact of ease of use in wearable technology on geriatric user
  • Evaluating the ramifications of gamification in the Metaverse
  • A systematic review of user experience (UX) design advances associated with Augmented Reality
  • A comparison of natural language processing algorithms automation of customer response Comparing end-user perceptions of natural language processing algorithms for automated customer response
  • Analysing the impact of voice-based interfaces on purchase practices in the fast food industry

Research Topic Kickstarter - Need Help Finding A Research Topic?

Topics & Ideas: Information Security

  • A bibliometric review of current trends in cryptography for secure communication
  • An analysis of secure multi-party computation protocols and their applications in cloud-based computing
  • An investigation of the security of blockchain technology in patient health record tracking
  • A comparative study of symmetric and asymmetric encryption algorithms for instant text messaging
  • A systematic review of secure data storage solutions used for cloud computing in the fintech industry
  • An analysis of intrusion detection and prevention systems used in the healthcare sector
  • Assessing security best practices for IoT devices in political offices
  • An investigation into the role social media played in shifting regulations related to privacy and the protection of personal data
  • A comparative study of digital signature schemes adoption in property transfers
  • An assessment of the security of secure wireless communication systems used in tertiary institutions

Topics & Ideas: Software Engineering

  • A study of agile software development methodologies and their impact on project success in pharmacology
  • Investigating the impacts of software refactoring techniques and tools in blockchain-based developments
  • A study of the impact of DevOps practices on software development and delivery in the healthcare sector
  • An analysis of software architecture patterns and their impact on the maintainability and scalability of cloud-based offerings
  • A study of the impact of artificial intelligence and machine learning on software engineering practices in the education sector
  • An investigation of software testing techniques and methodologies for subscription-based offerings
  • A review of software security practices and techniques for protecting against phishing attacks from social media
  • An analysis of the impact of cloud computing on the rate of software development and deployment in the manufacturing sector
  • Exploring the impact of software development outsourcing on project success in multinational contexts
  • An investigation into the effect of poor software documentation on app success in the retail sector

CompSci & IT Dissertations/Theses

While the ideas we’ve presented above are a decent starting point for finding a CompSci-related research topic, they are fairly generic and non-specific. So, it helps to look at actual dissertations and theses to see how this all comes together.

Below, we’ve included a selection of research projects from various CompSci-related degree programs to help refine your thinking. These are actual dissertations and theses, written as part of Master’s and PhD-level programs, so they can provide some useful insight as to what a research topic looks like in practice.

  • An array-based optimization framework for query processing and data analytics (Chen, 2021)
  • Dynamic Object Partitioning and replication for cooperative cache (Asad, 2021)
  • Embedding constructural documentation in unit tests (Nassif, 2019)
  • PLASA | Programming Language for Synchronous Agents (Kilaru, 2019)
  • Healthcare Data Authentication using Deep Neural Network (Sekar, 2020)
  • Virtual Reality System for Planetary Surface Visualization and Analysis (Quach, 2019)
  • Artificial neural networks to predict share prices on the Johannesburg stock exchange (Pyon, 2021)
  • Predicting household poverty with machine learning methods: the case of Malawi (Chinyama, 2022)
  • Investigating user experience and bias mitigation of the multi-modal retrieval of historical data (Singh, 2021)
  • Detection of HTTPS malware traffic without decryption (Nyathi, 2022)
  • Redefining privacy: case study of smart health applications (Al-Zyoud, 2019)
  • A state-based approach to context modeling and computing (Yue, 2019)
  • A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks (Solomon, 2019)
  • HRSB-Tree for Spatio-Temporal Aggregates over Moving Regions (Paduri, 2019)

Looking at these titles, you can probably pick up that the research topics here are quite specific and narrowly-focused , compared to the generic ones presented earlier. This is an important thing to keep in mind as you develop your own research topic. That is to say, to create a top-notch research topic, you must be precise and target a specific context with specific variables of interest . In other words, you need to identify a clear, well-justified research gap.

Fast-Track Your Research Topic

If you’re still feeling a bit unsure about how to find a research topic for your Computer Science dissertation or research project, check out our Topic Kickstarter service.

You Might Also Like:

Research topics and ideas about data science and big data analytics

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments.

Steps on getting this project topic

Joseph

I want to work with this topic, am requesting materials to guide.

Yadessa Dugassa

Information Technology -MSc program

Andrew Itodo

It’s really interesting but how can I have access to the materials to guide me through my work?

Sorie A. Turay

That’s my problem also.

kumar

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments is in my favour. May i get the proper material about that ?

BEATRICE OSAMEGBE

BLOCKCHAIN TECHNOLOGY

Nanbon Temasgen

I NEED TOPIC

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly

W&M ScholarWorks

Home > Arts and Sciences > Computer Science > COMPUTERSCIENCEETD

Computer Science Theses, Dissertations, and Masters Projects

Theses/dissertations from 2023 2023.

Appearance Driven Reflectance Modeling , James Christopher Bieron

Domain-Specific Optimization For Machine Learning System , Yu Chen

Intelligent Software Tooling For Improving Software Development , Nathan Allen Cooper

Amsel Criteria Based Computer Vision For Bacterial Vaginosis Diagnosis , Daniel Edwards Highland

Learning-Based Ubiquitous Sensing For Solving Real-World Problems , Woosub Jung

Recoverable Memory Bank For Class-Incremental Learning , Jiangtao Kong

A Reevaluation Of Why Crypto-Detectors Fail: A Systematic Revaluation Of Cryptographic Misuse Detection Techniques , Scott Marsden

Achieving Real-Time Dnn Execution On Mobile Devices With Compiler Optimizations , Wei Niu

Matfusion: A Generative Diffusion Model For Svbrdf Capture , Samuel Lee Sartor

A Comprehensive Study Of Bills Of Materials For Software Systems , Trevor Stalnaker

Program Analysis For Software Engineers And Students , Jialiang Tan

Efficient Parallelization Of Irregular Applications On Gpu Architectures , Qihan Wang

Exploring Software Licensing Issues Faced By Legal Practitioners , Nathan James Wintersgill

Theses/Dissertations from 2022 2022

Flexible And Robust Iterative Methods For The Partial Singular Value Decomposition , Steven Goldenberg

Techniques For Accelerating Large-Scale Automata Processing , Hongyuan Liu

Enabling Practical Evaluation Of Privacy Of Commodity-Iot , Sunil Manandhar

Exploring Multi-Level Parallelism For Graph-Based Applications Via Algorithm And System Co-Design , Zhen Peng

Communication And Computation Efficient Deep Learning , Zeyi Tao

Practical Gpgpu Application Resilience Estimation And Fortification , Lishan Yang

Theses/Dissertations from 2021 2021

On Supporting Android Software Developers And Testers , Carlos Eduardo Bernal Cardenas

Data-Driven Reflectance Estimation Under Natural Lighting , Victoria Cooper

Rethinking Cache Hierarchy And Interconnect Design For Next-Generation Gpus , Mohamed Assem Abd ElMohsen Ibrahim

Low-Overhead Techniques For Secure And Reliable Gpu Computing , Gurunath Kadam

Revisiting Isolation For System Security And Efficiency In The Era Of Internet Of Things , Lele Ma

Epidemic Spread Modeling For Covid-19 Using Hard Data , Anna Schmedding

Performance Optimization With An Integrated View Of Compiler And Application Knowledge , Ruiqin Tian

High-Dimensional Machine Learning Models In Fintech , Qiong Wu

Distributed Byzantine Tolerant Machine Learning , Qi Xia

Combining Performance Profiling And Modeling For Accuracy And Efficiency , Hao Xu

Theses/Dissertations from 2020 2020

Single Image Direct-Global Illumination Separation , Zhaoliang Duan

Exploring Heterogeneous Architectures With Tools And Applications , Du Shen

Understanding Performance Inefficiencies In Native And Managed Languages , Pengfei Su

Design And Analysis Of Memory Management Techniques For Next-Generation Gpus , Haonan Wang

Dietary Monitoring Through Sensing Mastication Dynamics , Shuangquan Wang

Hardware-Assisted Security Mechanisms On Arm-Based Multi-Core Processors , Shengye Wan

Wearable Technology For Healthcare And Athletic Performance , Amanda Annette Watson

Deep Learning In Software Engineering , Cody Watson

Pinpointing Software Inefficiencies With Profiling , Shasha Wen

Motion Sensors-Based Human Behavior Recognition And Analysis , Hongyang Zhao

On Cross-Series Machine Learning Models , Xiaodan Zhu

Theses/Dissertations from 2019 2019

Research on Efficiency and Security for Emerging Distributed Applications , Zijiang Hao

On Enhancing Security of Password-Based Authentication , Yue Li

Improving Wifi Sensing And Networking With Channel State Information , Yongsen Ma

GPGPU Reliability Analysis: From Applications to Large Scale Systems , Bin Nie

Learning Code Transformations via Neural Machine Translation , Michele Tufano

Theses/Dissertations from 2018 2018

Usability, Efficiency and Security of Personal Computing Technologies , Nancy Carter

Investigating Emerging Security Threats in Clouds and Data Centers , Xing Gao

Mixed-Weight Open Locating-Dominating Sets , Robin M. Givens

On Improving (Non)Functional Testing , Qi Luo

Automating Software Development for Mobile Computing Platforms , Kevin Patrick Moran

Exploring New Paradigms for Mobile Edge Computing , Yutao Tang

Assisting Software Developers With License Compliance , Christopher Vendome

Understanding and Enriching Randomness Within Resource-Constrained Devices , Kyle Wallace

Enhancing Usability, Security, and Performance in Mobile Computing , Shanhe Yi

Quantifying and Explaining Causal Effects of World Bank Aid Projects , Jianing Simulation Zhao

Theses/Dissertations from 2017 2017

On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications , Shuai Hao

Security Enhancements in Voice Over Ip Networks , Seyed Amir Iranmanesh

Automatically Documenting Software Artifacts , Boyang Li

Data-Driven Radiometric Photo-Linearization , Han Li

An Investigation of Power Saving and Privacy Protection on Smartphones , Dachuan Liu

Enhancing Energy Efficiency and Privacy Protection of Smart Devices , Ge Peng

Enhancing Usability and Security through Alternative Authentication Methods , Nicolas Jorge Van Balen

Deep Learning Software Repositories , Martin White

Workload Prediction for Efficient Performance Isolation and System Reliability , Ji Xue

Exploiting Power for Smartphone Security and Privacy , Qing Yang

Theses/Dissertations from 2016 2016

Enhancing The Sensing Capabilities of Mobile and Embedded Systems , Daniel George Graham

Methods for Estimating The Diagonal of Matrix Functions , Jesse Harrison Laeuchli

Supporting Evolution and Maintenance of android Apps , Mario Linares-Vasquez

The Impact of Surface Normals on Appearance , Kathleen Dorothy Moore

Enhancing Mobile Device System using Information from Users and Upper Layers , Dung Nguyen Tien

Security and Privacy for Ubiquitous Mobile Devices , Edmund Novak

Security Supports for Cyber-Physical System and its Communication Networks , Zhengrui Qin

Rethinking Privacy and Security Mechanisms in Online Social Networks , Xin Ruan

Protecting Web Contents Against Persistent Crawlers , Shengye Wan

Managing Micro Vms in Amazon Ec2 , Jiawei Wen

Algorithms for Large Scale Problems in Eigenvalue and Svd Computations and in Big Data Applications , Lingfei Wu

Investigating Fraudulent and Privacy Activities in Online Business. , Haitao Xu

Understanding Security Threats in Cloud , Zhang Xu

Workload Interleaving with Performance Guarantees in Data Centers , Feng Yan

Theses/Dissertations from 2015 2015

Configuring and Assembling Information Retrieval based Solutions for Software Engineering Tasks. , Bogdan Dit

Enhancing Bug Reports for Mobile Apps , Kevin Patrick Moran

Providing efficient services for smartphone applications , Yifan Zhang

Enabling Parallel Execution via Principled Speculation. , Zhijia Zhao

Advancing Feedback-Driven Optimization for Modern Computing. , Mingzhou Zhou

Theses/Dissertations from 2014 2014

Towards Secure, Power-Efficient and Location-Aware Mobile Computing , Hao Han

Studying and Enabling Reuse in android Mobile Apps , andrew Steven Holtzhauer

Effective Resource and Workload Management in Data Centers , Lei Lu

Matching non-uniformity for program optimizations on heterogeneous many-core systems , Bo Wu

Exploiting behavioral biometrics for user security enhancements , Nan Zheng

Theses/Dissertations from 2013 2013

Real-Time High-Quality Image to Mesh Conversion for Finite Element Simulations , Panagiotis Foteinos

Translating Spatial Problems into Lumpable Markov Chains , Ruth Elizabeth Lamprecht

Tracelab: Reproducing Empirical Software Engineering Research , Evan Alexander Moritz

Network Traffic Aware Smartphone Energy Savings , andrew Joseph Pyles

Improving Security and Privacy in Online Social Networks , Wei Wei

Improving Energy Efficiency and Security for Pervasive Computing Systems , Fengyuan Xu

Theses/Dissertations from 2012 2012

Detecting Abnormal Behavior in Web Applications , Zi Chu

Information Integration for Software Maintenance and Evolution. , Malcom Bernard Gethers II

A Learning-based Approach to Exploiting Sensing Diversity in Performance Critical Sensor Networks , Matthew Alexander Keally

Understanding and Leveraging Virtualization Technology in Commodity Computing Systems , Duy Le

Searching, Selecting, and Synthesizing Source Code Components , Collin McMillan

  • Collections
  • Disciplines

Advanced Search

  • Notify me via email or RSS

Author Corner

About scholarworks.

  • Honors Theses
  • W&M Libraries
  • VIMS Hargis Library
  • W&M Law School Repository
  • Research Guides

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations

Computer Science and Engineering Theses and Dissertations

Theses/dissertations from 2023 2023.

Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno

Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan

Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros

Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin

Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen

Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur

A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.

Graph Analysis on Social Networks , Shen Lu

Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera

Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo

Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi

Theses/Dissertations from 2022 2022

Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed

Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala

Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen

A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave

On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou

Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang

A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri

Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney

Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin

Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker

Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich

Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar

Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong

Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward

Theses/Dissertations from 2021 2021

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill

Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja

Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev

Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov

Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai

Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri

Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco

Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam

Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava

A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari

Theses/Dissertations from 2020 2020

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal

Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari

Composition of Atomic-Obligation Security Policies , Yan Cao Albright

Action Recognition Using the Motion Taxonomy , Maxat Alibayev

Sentiment Analysis in Peer Review , Zachariah J. Beasley

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov

Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang

Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram

PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami

Composition of Atomic-Obligation Security Policies , Danielle Ferguson

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel

The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez

Privacy-Preserving and Functional Information Systems , Thang Hoang

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi

Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam

Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha

Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath

System Support of Concurrent Database Query Processing on a GPU , Hao Li

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu

Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla

Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng

Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi

Models of Secure Software Enforcement and Development , Hernan M. Palombo

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan

Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah

Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui

Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon

Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna

Theses/Dissertations from 2019 2019

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur

Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed

Phenomena of Social Dynamics in Online Games , Essa Alhazmi

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri

Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao

Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang

A GPU-Based Framework for Parallel Spatial Indexing and Query Processing , Zhila Nouri Lewis

A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic , Trisha Mukhopadhyay

An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks , Srivarsha Polnati

Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain , John Rippetoe

Detecting Digitally Forged Faces in Online Videos , Neilesh Sambhu

Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses , Dakun Shen

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

Home > FACULTIES > Computer Science > CSD-ETD

Computer Science Department

Computer Science Theses and Dissertations

This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository

Theses/Dissertations from 2024 2024

A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani

Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy

Theses/Dissertations from 2023 2023

Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar

Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian

Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh

INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee

Algorithms and Software for Oligonucleotide Design , Qin Dong

Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani

De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han

Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley

A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He

A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh

Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani

Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu

Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li

Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li

DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li

Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai

Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad

The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi

Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam

Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi

Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat

Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul

On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi

Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza

Migration in Edge Computing , Arshin Rezazadeh

A Modified Hopfield Network for the K-Median Problem , Cody Rossiter

Predicting Network Failures with AI Techniques , Chandrika Saha

Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha

An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa

Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia

Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia

IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales

A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani

Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad

Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim

A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba

Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong

Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang

Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar

Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang

Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi

Theses/Dissertations from 2022 2022

The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt

Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy

Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez

Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu

Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte

Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell

Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch

Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh

Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost

Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie

Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka

Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling

Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan

Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti

Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida

False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito

Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford

An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson

Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem

A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid

Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma

Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi

Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis

Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg

Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang

Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang

Predicting and Modifying Memorability of Images , Mohammad Younesi

Theses/Dissertations from 2021 2021

Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed

A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar

Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani

Contrastive Learning of Auditory Representations , Haider Al-Tahan

Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi

Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak

Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman

Improving Reader Motivation with Machine Learning , Tanner A. Bohn

A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang

Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee

A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen

Exploratory Search with Archetype-based Language Models , Brent D. Davis

Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo

Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon

A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du

Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi

Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan

A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar

Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami

Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara

Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani

A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria

Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh

Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour

A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa

WesternAccelerator:Rapid Development of Microservices , Haoran Wei

A Lightweight and Explainable Citation Recommendation System , Juncheng Yin

Mitosis Detection from Pathology Images , Jinhang Zhang

Theses/Dissertations from 2020 2020

Visual Analytics of Electronic Health Records with a focus on Acute Kidney Injury , Sheikh S. Abdullah

Towards the Development of Network Service Cost Modeling-An ISP Perspective , Yasmeen Ali

  • Accessible Formats

Advanced Search

  • Notify me via email or RSS
  • Expert Gallery
  • Online Journals
  • eBook Collections
  • Reports and Working Papers
  • Conferences and Symposiums
  • Electronic Theses and Dissertations
  • Digitized Special Collections
  • All Collections
  • Disciplines

Author Corner

  • Submit Thesis/Dissertation

Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright

©1878 - 2016 Western University

computer science thesis projects

Thesis Projects

A Guide for Students in Computer Science and Information Systems

  • © 2008
  • Latest edition
  • Mikael Berndtsson 0 ,
  • Jörgen Hansson 1 ,
  • Björn Olsson 2 ,
  • Björn Lundell 3

University of Skövde, Sweden

You can also search for this author in PubMed   Google Scholar

Carnegie Mellon University, Pittsburgh, USA

  • Provides a comprehensive approach to tackling project work
  • Offers a simple step-by-step guide to the key processes involved
  • Includes supplementary material: sn.pub/extras

90k Accesses

5 Citations

1 Altmetric

This is a preview of subscription content, log in via an institution to check access.

Access this book

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (15 chapters)

Front matter, introduction, computer science and information systems research projects, actors involved, their roles and relationships, the process – an overview, developing your project proposal, references and citations, developing your aim, developing your objectives and choosing methods, following the objectives, presenting and analysing your data, drawing your conclusions and identifying future work, presenting and defending your work orally, supplements, information-seeking and use, examination, back matter.

  • Collaboration
  • Information Systems
  • Project Work and Education
  • Virtual Environments
  • information technology

About this book

Authors and affiliations.

Mikael Berndtsson, Björn Olsson, Björn Lundell

Jörgen Hansson

Bibliographic Information

Book Title : Thesis Projects

Book Subtitle : A Guide for Students in Computer Science and Information Systems

Authors : Mikael Berndtsson, Jörgen Hansson, Björn Olsson, Björn Lundell

DOI : https://doi.org/10.1007/978-1-84800-009-4

Publisher : Springer London

eBook Packages : Computer Science , Computer Science (R0)

Copyright Information : Springer-Verlag London 2008

Softcover ISBN : 978-1-84800-008-7 Published: 25 October 2007

eBook ISBN : 978-1-84800-009-4 Published: 30 October 2007

Edition Number : 2

Number of Pages : XIV, 162

Number of Illustrations : 25 b/w illustrations

Topics : Computer Science, general

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Scholars' Mine

Home > Computer Science > CompSci TDs > Masters Theses

Computer Science Masters Theses

Theses from 2024 2024.

Enabling smart healthcare applications through visible light communication networks , Jack Manhardt

Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan

Theses from 2023 2023

DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula

MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric

COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara

Theses from 2022 2022

Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga

Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong

Theses from 2021 2021

Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II

Theses from 2020 2020

On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu

Theses from 2019 2019

Advanced techniques for improving canonical genetic programming , Adam Tyler Harter

Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter

Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam

Theses from 2018 2018

Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin

CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush

Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani

Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa

Solidification rate detection through solid-liquid interface tracking , Wei Luo

Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham

Cyber-physical security of an electric microgrid , Prashanth Palaniswamy

An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla

Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy

Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti

A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang

Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang

Theses from 2017 2017

Cyber-physical security of a chemical plant , Prakash Rao Dunaka

UFace: Your universal password no one can see , Nicholas Steven Hilbert

Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco

Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti

Personalizing education with algorithmic course selection , Tyler Morrow

Decodable network coding in wireless network , Junwei Su

Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla

Theses from 2016 2016

Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar

Theses from 2015 2015

Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi

Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda

A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li

Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin

Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala

Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy

Cyber security research frameworks for coevolutionary network defense , George Daniel Rush

Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara

Theses from 2014 2014

Crime pattern detection using online social media , Raja Ashok Bolla

Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi

A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati

Access control delegation in the clouds , Pavani Gorantla

Evolving decision trees for the categorization of software , Jasenko Hosic

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar

Privacy preservation using spherical chord , Doyal Tapan Mukherjee

Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram

On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu

Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli

An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan

Theses from 2013 2013

Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu

Security analysis of a cyber physical system : a car example , Jason Madden

Efficient integrity verification of replicated data in cloud , Raghul Mukundan

Search-based model summarization , Lokesh Krishna Ravichandran

Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg

Secure design defects detection and correction , Wenquan Wang

Theses from 2012 2012

Robust evolutionary algorithms , Brian Wesley Goldman

Semantic preserving text tepresentation and its applications in text clustering , Michael Howard

Vehicle path verification using wireless sensor networks , Gerry W. Howser

Distributed and collaborative watermarking in relational data , Prakash Kumar

Theses from 2011 2011

A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle

Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount

A low-cost motion tracking system for virtual reality applications , Abhinav Chadda

Optimization of textual affect entity relation models , Ajith Cherukad Jose

MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram

A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi

An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka

Location privacy policy management system , Arej Awodha Muhammed

Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni

Theses from 2010 2010

Event detection from click-through data via query clustering , Prabhu Kumar Angajala

Population control in evolutionary algorithms , Jason Edward Cook

Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher

Multi axis slicing for rapid prototyping , Divya Kanakanala

Content based image retrieval for bio-medical images , Vikas Nahar

2-D path planning for direct laser deposition process , Swathi Routhu

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu

Theses from 2009 2009

Information flow properties for cyber-physical systems , Rav Akella

Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet

Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba

Theses from 2008 2008

Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das

Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong

A time series classifier , Christopher Mark Gore

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu

Co-optimization: a generalization of coevolution , Travis Service

Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder

Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson

Theses from 2007 2007

A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird

Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • All Authors
  • Faculty Authors

Author Corner

Useful links.

  • Library Resources

S&T logo

Thesis Locations

  • View these on map
  • View these in Google Earth

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Senior Thesis Archive

This page lists all Allen School student theses, archived online since 2005.

Winners, 2021 Best Senior Thesis Award Design Principles for Mobile and Wearable Health Technologies Parker S. Ruth, supervised by Dr. Shwetak Patel

Winner, 2020 Best Senior Thesis Award Understanding and Designing for Security and Privacy in Multi-User AR Interactions Kimberly Ruth, supervised by Franziska Roesner and Tadayoshi Kohno

Winner, 2019 Best Senior Thesis Award Implicit Linguistic Knowledge of Neural Natural Language Processing Models Nelson Liu, supervised by Noah Smith

Winner, 2018 Best Senior Thesis Award A Crash-Safe Key-Value Store Using Chained Copy-on-Write B-trees Bruno Castro-Karney, supervised by Xi Wang

BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains Linxing (Preston) Jiang, supervised by Raj Rao

Multi-Location Droplet Management for Digital Microfluidics Sarang Joshi, supervised by Luis Ceze

Kernel Support for Paravirtaulized Guest OS Shibin (Jack) Xi, supervised by Shwetak Patel, Elliot Saba

Winner, 2017 Best Senior Thesis Award The Methods of Interlacing Polynomials Kuikui Liu, supervised by Shayan Oveis Gharan

Winner, 2017 Best Senior Thesis Award Respeak: A Voice-based, Crowd-powered, and Accessible Speech Transcription System Pooja Sethi, supervised by Richard Anderson

Semi-Supervised Spatial Knowledge Transfer with Deep Generative Models Kousuke Ariga, supervised by Andrzej Pronobis

Automated Classification of Adult Cough Recordings into Wet vs. Dry with Applications to Pulmonary Disease Assessment Jiayao Clara Lu, supervised by Shwetak Patel, Elliot Saba

Preventing Signedness Errors in Numerical Computations in Java Christopher Mackie, supervised by Michael Ernst

Successive Convexification for Trajectory Planning: Analysis of Two Problems Irina Tolkova, supervised by Dieter Fox

Synthesis of Parallel Tree Programs with Domain-Specific Sympbolic Compilation Nate Yazdani, supervised by Ras Bodik

Evaluating Digital Financial Services for Financial Inclusion in Southern Ghana Sarah Yu, supervised by Richard Anderson

Learning Large-Scale Topological Maps Using Sum-Product Networks Kaiyu Zheng, supervised by Andrzej Pronobis, Raj Rao

Winner, 2016 Best Senior Thesis Award Navigating a 2D Virtual World Using Direct Brain Stimulation Darby Losey, supervised by Rajesh Rao

Third-Party Content on the Web: A Visual Study Christopher Blappert, supervised by Franziska Roesner, Tadayoshi Kohno

Contributions to Vega Ryan Russell, supervised by Jeffrey Heer

TR15-01:  PDF   Winner, 2015 Best Senior Thesis Award Probability Type Inference for Flexible Approximate Programming Brett Boston, supervised by Dan Grossman

TR15-02:  PDF Tleilax: Porting Tor to Arrakis Sunjay Cauligi, supervised by Tom Anderson

TR15-03:  PDF EKG Monitoring and Arrhythmia Detection Amaris Chen, supervised by Bruce Hemingway

TR15-04:  PDF Automated Analysis of Paper-Based Immunoassay Tests Krittika D'Silva, supervised by Gaetano Borriello & Paul Yager

TR15-05:  PDF   The Wisdom of Multiple Guesses Ryan Drapeau, supervised by Johan Ugander and Carlos Guestrin

TR15-06:  PDF Extending Streaming Features for Myria Yuqing Guo, supervised by Magdalena Balazinska

TR15-07:  PDF Tabletop Manipulation Dylan Holmes, supervised by Emanuel Todorov

TR15-08:  PDF Peer-to-peer Data Transfer in Resource Constrained Environments Shahar Levari, supervised by Gaetano Borriello & Richard Anderson

TR15-09:  PDF OBA Research & Development Aengus McMillin, supervised by Alan Borning

TR15-10:  PDF A Web Based Tool for Labeling the 3D World Aaron Nech, supervised bySteve Seitz & Richard Newcombe

TR15-11:  PDF Talk Space: Developing the Online Salon Karthik Palaniappan, supervised by Alan Borning

TR15-12:  PDF Identification of Unstructured Language Indicating Multiple Objects Vivek Paramasivam, supervised by Luke Zettlemoyer

TR15-13:  PDF Distributed Sampling in a Big Data Management System Dan Radion, supervised by Dan Suciu

TR15-14:  PDF Algebraic Simplification for the Herbie Project Alex Sanchez-Stern, supervised by Zachary Tatlock

TR15-15:  PDF Understanding Charts in Research Papers: A Learning Approach Noah Siegel, supervised by Ali Farhadi

TR15-16:  PDF LeagueSpeak: The Language of Skill in Leage of Legends King O. Xia, supervised by James Fogarty

TR14-01:  PDF POMDP-Based Interaction and Interactive Natural Language Grounding with a NAO Robot Maxwell Forbes, supervised by Rajesh Rao

TR14-02:  PDF Running N-body Use Cases on Myria Lee Lee Choo, supervised by Magdalena Balazinska

TR14-03:  PDF Verification Games Type Systems Nathaniel Mote, supervised by Michael Ernst

TR14-04:  PDF PNA: Protein-Nucleic Acid Complex Structure Prediction Raymond Zhang, supervised by Martin Tompa

TR14-05:  PDF   Winner, 2014 Best Senior Thesis Award DCDN: Distributed Content Delivery for the Modern Web  Nick Martindell, supervised by Tom Anderson & Arvind Krishnamurthy

TR14-06:  PDF Data Purchase Advisor: Cost-Effective Data Acquisition for Shared Data Analysis Martina Unutzer, supervised by Magdalena Balazinska

TR14-07:  PDF Investigation into Measuring Blood Pressure with a Mobile Phone Molly Moen, supervised by Gaetano Borriello

TR14-08:  PDF DigiTaps Vaspol Ruamviboonsuk, supervised by Richard Ladner

TR14-09:  PDF Modeling Relational Vocabulary for Grounded Language Acquisition Caitlin Harding, supervised by Luke Zettlemoyer

TR14-10:  PDF Spectral Graph Theory, Expanders, and Ramanujan Graphs Christopher WIlliamson, supervised by James Lee & Anup Rao

TR14-11:  PDF Eyes-Free Error Detection and Correction of Speech Dictation on Mobile Devices Rochelle Ng, supervised by Richard Ladner

TR14-12:  PDF On a Competitive Secretary Problem Eric Lei, supervised by Anna Karlin

TR13-01: PDF Traceur: Inferring Variable Control Flow Using Synoptic With Multiple Relation Types Timothy Vega, supervised by Michael Ernst

TR13-02: PDF 1 , PDF 2 , PDF 3 Monitors: Keeping Informed on Code Changes [PDF 1] News and Notification: Propagating Releveant Changes to Developers [PDF 2] Refinements and Git Integration with Notifications and Monitoring [PDF 3] Christopher Dentel supervised at ETH Zurich by Christian Estler, Dr. Martin Nordio, & Prof. Dr. Bertrand Meyer supervised at UW by David Notkin

TR13-03: PDF 1 , PDF 2 , PDF 3 Contract Inserter: A Tool for Automatically Generating and Inserting C# Code Contracts Forrest Coward, supervised by Michael Ernst

TR13-04: PDF ODK Tables Graphing Tool Nathan Brandes, supervised by Gaetano Borriello

TR13-05: PDF Probabilistic Co-Adaptive Brain-Computer Interfacing Matthew Bryan, supervised by Rajesh Rao

TR13-06: PDF Stroke Rehabilitation Through Motor Imagery Controlled Humanoid Priya Chagaleti, supervised by Rajesh Rao

TR13-07: PDF Analyzer: Integrated Tools to Guide the Application of Machine Learning Christopher Clark, supervised by Oren Etzioni

TR13-08: PDF Considering Accuracy and Diversity when Creating Ensembles of Classifiers Michael Fain, supervised by James Fogarty

TR13-09: PDF ODK Tables Maps Christopher Gelon, supervised by Gaetano Borriello

TR13-10: PDF Appliance Reader Antonius Denny Harijanto, supervised by Richard Ladner

TR13-11: PDF Towards a Theory of Multiparty Information Complexity Samuel Hopkins, supervised by Paul Beame

TR13-12: PDF Instance-Based Recognition of Screen-Rendered Text in a System for Pixel-Based Reverse-Engineering of Graphical Interfaces Stephen Joe Jonany, supervised by James Fogarty

TR13-13: PDF Identifying Idiomatic Language at Scale Grace Muzny, supervised by Luke Zettlemoyer

TR13-14: PDF Identifying Application Breakage Caused by Virtualization Steven Portzer, supervised by Arvind Krishnamurthy

TR13-15: PDF Winner, 2013 Best Senior Thesis Award An API For Touch-Free Interfaces For Andriod Devices Leeran Raphaely, supervised by Gaetano Borriello

TR13-16: PDF ODK Tables: Improving the Custom Views Heidi So, supervised by Gaetano Borriello

TR13-17: PDF Leveraging Data Invariants in Model Interfernce for Test Case Generation Roykrong Sukkerd, supervised by Michael Ernst

TR12-01: PDF InvariMint: Modeling Logged Behavior with Invariant DFAs Jenny Abrahamson, supervised by Michael Ernst

TR12-02: PDF Quantum Compiler Optimizations Jeff Booth, supervised by Aram Harrow

TR12-03: PDF StopFinder: Improving the Experience of Blind Public Transit Riders with Crowdsourcing Sanjana Prasain, supervised by Alan Borning

TR12-04: PDF A Type System for Regular Expressions Eric Spishak, supervised by Michael Ernst

TR12-05: PDF Run-Length Encoding Markovian Streams Jennifer Wong, supervised by Magdalena Balazinska

TR12-06: PDF Expanding the Depth Cloud: How to Intelligently Improve Grasping Matthew Mullen, supervised by Joshua Smith

TR12-08: PDF Simultaneous Tracking of Two Hands Using Camshift Eric Hare, supervised by Dieter Fox

TR12-07: PDF A Cold Chain Data Visualization Tool Melissa Winstanley, supervised by Ruth Anderson

TR12-09: PDF Winner, 2012 Best Senior Thesis Award The Elan Programming Language for Field-Programmable Gate Arrays Elliott Brossard, supervised by Carl Ebeling

TR12-10: PDF The Friendbo Attention Bar: Improving Engagement with Web Feeds on Social Networking Sites Greg Bigelow, supervised by James Landay

TR12-11: PDF Namaste: A Yoga Activity Logging Sensor Milda Zizyte, supervised by Shewtak Patel

TR12-12: PDF Efficient MapReduce Applications Finn Parnell, supervised by Luis Ceze

TR12-13: PDF ODK Tables: A Customizable Data Management Application for Android Hilary Worden, supervised by Gaetano Borriello

TR12-14: PDF A Synchronization Protocol for ODK Tables and ODK Aggregate Dylan Price, supervised by Gaetano Borriello

TR12-15: PDF Computer Security in the Undergraduate Curriciulum Miles Sackler, supervised by Tadayoshi Kohno

TR11-01: PDF Improving DHT Routing Performance in Harmony using Client Caching Allison Obourn, supervised by Tom Anderson

TR11-03: PDF Smart Connect: Developing an SMS-Based Communcations Systems for Health Clinics in Vietnam Krysta Yousoufian, supervised by Richard Anderson

TR11-04: PDF Improving performance of prototype recognition in Prefab Orkhan Muradov, supervised by James Fogarty

TR11-05: PDF   Winner, 2011 Best Senior Thesis Award LIFEGUARD: Locating Internet Failure Events and Generating Usable Alternate Routes Dynamically Robert Colin Scott, supervised by Tom Anderson

TR11-06: PDF Towards Practical Brain-Computer Interfaces: Hierarchical Learning and Source Estimation Willy Cheung, supervised by Rajesh Rao

TR11-07: PDF Improving Open Data Kit Collect's Multiple Choice Data Entry Methods Jeffrey Beorse, supervised by Gaetano Borriello

TR11-08: PDF Runtime Verification of Portable Programming Interfaces Jeff Rasley, supervised by Justin Cappos

TR10-01: PDF Modeling a Lattice-Traversing Robot Albert Chiu, supervised by Eric Klavins

TR10-02: PDF Haptic Laser Erik Rosenkrantz Dennison Turnquist, supervised by Shwetak Patel

TR10-03: PDF The Cinematic Sandbox: Utilizing Video Game Engines for Rapid Prototyping of Animated Films Nicholas Garrett, supervised by Barbara Mones

TR10-04: PDF   Winner, 2010 Best Senior Thesis Award Applications of the IP Timestamp Option to Internet Measurement Justine Sherry, supervised by Tom Anderson

TR10-05: PDF Iterative Design and Implementation of an Educational Platform for Shared Computing Contexts Sunil Garg, supervised by Richard Anderson

TR10-06: PDF Deployment and Evaluation of an Educational Platform for Shared Computing Contexts Clint Tseng, supervised by Richard Anderson

TR10-07: PDF MultiViewer Imaging Viewer: Automated Calibration PET Phanton Analysis Project Yogesh Saletore, supervised by Linda Shapiro

TR09-01: PDF Node Containment in the Seattle Testbed Cosmin Barsan, supervised by Justin Cappos

TR09-02: PDF Simulating Hand Interaction in a Virtual Environment with Open Dynamics Engine and CyberGlove Nick Nunley, supervised by Miro Enev

TR09-03: PDF   Winner, 2009 Best Senior Thesis Award Real-Time Classification of Everyday Fitness Activities on Windows Mobile Alireza Bagheri Garakani, supervised by James Fogarty

TR08-01: PDF Winner, 2008 Best Senior Thesis Award Maintaining Intelligibility of ASL Video in the Presence of Data Loss Sam Whittle, supervised by Richard Ladner

TR08-02: PDF Parallel N-Body Simulation Using Problem Space Promotion Brandon Farrell, supervised by Larry Snyder

TR08-03: PDF Exploring New Applications for Parallel Programming: Envisioning a New Realm David Tepper, supervised by Larry Snyder

TR07-01: PDF Connecting Diets to Disease: Using Data-Mining to Find Links between Food Comsumption and Chronic Diseases Alex Zheng, supervised by Rajesh Rao

TR07-02: PDF Tagged Representations in WIL Daria Craciunoiu, supervised by Craig Chambers

TR07-03: PDF Multicore ZPL Steven P. Smith, supervised by Larry Snyder

TR07-04: PDF Implementing NOT EXISTS Predicates over a Probabilistic Database Ting-You Wang, supervised by Dan Suciu

TR07-05: PDF   Winner, 2007 Best Senior Thesis Award Context-Based Arithmetic Coding for the DCT: Achieving high compression rates with block transforms and simple context modeling Kyle Littlefield, supervised by Richard Ladner

TR06-01: PDF Winner, 2006 Best Senior Thesis Award Feature-Based Classification of the Mouse Eye Images Jenny Yuen, supervised by Linda Shapiro

TR05-01: PDF   Winner, 2005 Best Senior Thesis Award Text Segmentation and Grouping for Tactile Graphics Matthew Renzelmann, supervised by Richard Ladner

Harvard SEAS logo

Senior Thesis

A senior thesis is more than a big project write-up. It is documentation of an attempt to contribute to the general understanding of some problem of computer science, together with exposition that sets the work in the context of what has come before and what might follow. In computer science, some theses involve building systems, some involve experiments and measurements, some are theoretical, some involve human subjects, and some do more than one of these things. Computer science is unusual among scientific disciplines in that current faculty research has many loose ends appropriate for undergraduate research.

Senior thesis projects generally emerge from collaboration with faculty. Students looking for senior thesis projects should tell professors they know, especially professors whose courses they are taking or have taken, that they are looking for things to work on. See the page on CS Research for Undergrads . Ideas often emerge from recent papers discussed in advanced courses. The terms in which some published research was undertaken might be generalized, relaxed, restricted, or applied in a different domain to see if changed assumptions result in a changed solution. Once a project gets going, it often seems to assume a life of its own.

To write a thesis, students may enroll in Computer Science 91r one or both terms during their senior year, under the supervision of their research advisor. Rising seniors may wish to begin thinking about theses over the previous summer, and therefore may want to begin their conversations with faculty during their junior spring—or even try to stay in Cambridge to do summer research.

An information session for those interested in writing a senior thesis is held towards the end of each spring semester. Details about the session will be posted to the  [email protected] email list.

Students interested in commercializing ideas in their theses may wish to consult Executive Dean Fawwaz Habbal about patent protection. See  Harvard’s policy  for information about ownership of software written as part of your academic work.

Thesis Supervisor

You need a thesis supervisor. Normally this is a Harvard Computer Science faculty member. Joint concentrators (and, in some cases, non-joint concentrators) might have a FAS/SEAS Faculty member from a different field as their thesis supervisor. Exceptions to the requirement that the thesis supervisor is a CS or FAS/SEAS faculty member must be approved by the Director of Undergraduate Studies. For students whose advisor is not a Harvard CS faculty member, note that at least one of your thesis readers must be a Harvard CS faculty member, and we encourage you to talk with this faculty member regularly to help ensure that your thesis is appropriately relevant for Harvard Computer Science.

It’s up to you and your supervisor how frequently you meet and how engaged the supervisor is in your thesis research. However, we encourage you to meet with your supervisor at least several times during the Fall and Spring, and to agree on deadlines for initial results, chapter outlines, drafts, etc.

Thesis Readers

The thesis is evaluated by the thesis readers. Thesis readers must be either:

Two Harvard CS faculty members/affiliates ; or:

Three readers, at least one of whom is a Harvard CS faculty member and the others are ordinarily teaching faculty members of the Faculty of Arts and Sciences or SEAS who are generally familiar with the research area.

The thesis supervisor is one of the readers.

The student is responsible for finding the other readers, but you can talk with your supervisor for suggestions of possible readers.

Exceptions to these thesis reader requirements must be approved by the Directors of Undergraduate Studies.

For joint concentrators, the other concentration may have different procedures for thesis readers; if you have any questions or concerns about thesis readers, please contact the Directors of Undergraduate Studies.

Senior Thesis Seminar

Computer Science does not have a Senior Thesis seminar course.

However, we do run an informal optional series of Senior Thesis meetings in the Fall to help with the thesis writing process, focused on topics such as technical writing tips, work-shopping your senior thesis story, structure of your thesis, and more. Pay attention to your email in the Fall for announcements about this series of meetings.

The thesis should contain an informative abstract separate from the body of the thesis. This abstract should clearly state what the contribution of the thesis is–which parts are expository, whether there are novel results, etc. We also recommend the thesis contain an introduction that is at most 5 pages in length that contains an “Our contributions” section which explains exactly what the thesis contributed, and which sections in the thesis these are elaborated on. At the degree meeting, the Committee on Undergraduate Studies in Computer Science will review the thesis abstract, the reports from the three readers and the student’s academic record; it will have access to the thesis.  The readers (and student) are told to assume that the Committee consists of technical professionals who are not necessarily conversant with the subject matter of the thesis so their reports (and abstract) should reflect this audience.

The length of the thesis should be as long as it needs to be to present its arguments, but no longer!

There are no specific formatting guidelines. For LaTeX, some students have used this template in the past . It is set up to meet the Harvard PhD Dissertation requirements, so it is meeting requirements that you as CS Senior Thesis writers don’t have.

Thesis Timeline for Seniors

(The timeline below is for students graduating in May. For off-cycle students, the same timeline applies, but offset by one semester. The thesis due date for March 2025 graduates is Friday November 22, 2024 at 2pm. The thesis deadline for May 2024 graduates is Friday March 29th Monday April 1st at 2pm.

Please be aware that students writing a joint thesis must meet the requirements of both departments–so if there are two different due dates for the thesis, you are expected to meet the earlier date.

Senior Fall (or earlier) Find a thesis supervisor, and start research. 

October/November/December Start writing.

All fourth year concentrators are contacted by the Office of Academic Programs and those planning to submit a senior thesis are requested to supply certain information, including name of advisor and a tentative thesis title. You may use a different title when you submit your thesis; you do not need to tell us your updated title before then. If Fall 2024 is your final term, please fill out this form . If May 2024 is your final term, please fill out this form .

Early February The student should provide the name and contact information for the readers (see above), together with assurance that they have agreed to serve. 

Mid-March Thesis supervisors are advised to demand a first draft. (A common reaction of thesis readers is “This would have been an excellent first draft. Too bad it is the final thesis—it could have been so much better if I had been able to make some suggestions a couple of weeks ago.")

April 1, 2024 * Thesis is due by 2:00 pm. Electronic copies in PDF format should be delivered by the student to all three readers and to [email protected] (which will forward to the Director of Undergraduate Studies) on or before that date. An electronic copy should also be submitted via the SEAS online submission tool on or before that date. SEAS will keep this electronic copy as a non-circulating backup. During this online submission process, the student will also have the option to make the electronic copy publicly available via DASH, Harvard’s open-access repository for scholarly work. Please note that the thesis will NOT be published to ProQuest. More information can be found on the SEAS  Senior Thesis Submission  page.

The two or three readers will receive a rating sheet to be returned to the Office of Academic Programs before the beginning of the Reading Period, together with their copy of the thesis and any remarks to be transmitted to the student.

Late May The Office of Academic Programs will send students their comments after the degree meeting to decide honors recommendations.

Thesis Extensions and Late Submissions

Thesis extensions Thesis extensions will be granted in extraordinary circumstances, such as hospitalization or grave family emergency, with the support of the thesis advisor and resident dean and the agreement of all readers. For joint concentrators, the other concentration should also support the extension. To request an extension, please have your advisor or resident dean email [email protected] , ideally several business days in advance, so that we may follow up with readers. Please note that any extension must be able to fall within our normal grading, feedback, and degree recommendation deadline, so extensions of more than a few days are usually impossible.

Late submissions Late submission of thesis work should be avoided. Work that is late will ordinarily not be eligible for thesis prizes like the Hoopes Prize. Theses submitted late will ordinarily be penalized one full level of honors (highest honors, high honors, honors, no honors) per day late or part thereof, including weekends, so a thesis submitted two days and one minute late is ordinarily ineligible to receive honors. Penalties will be waived only in extraordinary cases, such as documented medical illness or grave family emergency; students should consult with the Directors of Undergraduate Studies in that event. Missed alarm clocks, crashed computers, slow printers, corrupted files, and paper jams are not considered valid causes for extensions.

Thesis Examples

Recent thesis examples can be found on the Harvard DASH (Digital Access to Scholarship at Harvard) repository here . Examples of Mind, Brain, Behavior theses are here .

Spectral Sparsification: The Barrier Method and its Applications

  • Martin Camacho, Advisor: Jelani Nelson

Good Advice Costs Nothing and it’s Worth the Price: Incentive Compatible Recommendation Mechanisms for Exploring Unknown Options

  • Perry Green, Advisor: Yiling Chen

Better than PageRank: Hitting Time as a Reputation Mechanism

  • Brandon Liu, Advisor: David Parkes

Tree adjoining grammar at the interfaces

  • Nicholas Longenbaugh, Advisor: Stuart Shieber

SCHUBOT: Machine Learning Tools for the Automated Analysis of Schubert’s Lieder

  • Dylan Nagler, Advisor: Ryan Adams

Learning over Molecules: Representations and Kernels

  • Jimmy Sun, Advisor: Ryan Adams

Towards the Quantum Machine: Using Scalable Machine Learning Methods to Predict Photovoltaic Efficacy of Organic Molecules

  • Michael Tingley, Advisor: Ryan Adams
  • Search SF State Search SF State Button SF State This Site

Master's Theses and Projects

The objective of the mandatory Master's Thesis or Project requirement is to provide a culminating educational experience, where the student, under the supervision of a faculty member, conducts an individual study employing concepts and methods learned in the program to solve a problem of significant importance from a practical or theoretical standpoint.

The Following Policies Apply

Study involves overview.

The study should involve a synthesis of concepts and methods learned in more than one course, and exhibit awareness of previous work in the area of study. This requirement also aims to provide an opportunity to the student to learn and practice the means of written and oral communication. The project or thesis provides an extremely important component to the students' portfolio applied towards a future undertaking whether it be for admission to a Ph.D. program or for a leadership position in the computing industry.

Two Equivalent Possibilities

There are two equivalent possibilities for the culminating experience in the MS program in Computer Science: MS project (CSC 895) , and MS thesis (CSC 898) . The MS thesis and the MS project have the same level of difficulty, need the same time for completion, and yield the same kind of MS degree. The decision whether a work is a thesis or a project must be made at the time of registration for CSC 895/898 in consultation with the faculty advisor.

1. Credits and Courses to Take

The complete work on MS thesis/project has a limit of 9 credits. Typically, students working on a thesis will register for 3 credits of CSC 897 (Research) followed by 3 credits of CSC 898, but they can take an additional 3 units of CSC 897 upon advisement. Students working on a project will usually enroll in 3 credits of CSC 899 followed by 3 credits of CSC 895,but they can take additional 3 units of CSC 899 upon advisement. CSC 895 and 898 are graded as CR/NC.

2. Advisor and Committee Selection

Before registering for the MS thesis/project the student must select an advisor, and other members of the thesis/project committee and file the GAP and Culminating Experience Form with the Graduate Division. The thesis committee must have at least 3 members, and the project committee must have at least 2 members. At least two members must be tenured or tenure-track SFSU/CS faculty for either type of committee. In addition to the 2 members of the CS Department, the committee may include faculty or members outside of the CS Department, upon approval of the CS Chair.

Both MS thesis and MS project have a public oral defense. Usually the student presentation is about 30 min. with Q&A following. Defense committee then asks all to leave the room for a short period of time to discuss the work and the grading. The defense must be advertised to the local community. This is a great opportunity to bring family and friends. Students are advised to carefully rehearse and check the presentation for content, duration and to make sure all the SW and demos work.

4. MS Thesis Format

The format of the MS thesis document is strictly defined and controlled by the SF State Graduate Division ( University Thesis Composition Guidelines ). The original copy of the thesis, including committee signatures, is submitted to the Graduate Division for approval. After approval by the Graduate Division the original version is bound according to the SFSU standard and available in the SFSU library. One bound copy of the thesis must also be given to the CS Department office. Thesis copies are submitted to the committee members in a form approved by the members.

5. MS Project Format

The format of the MS project document is strictly defined and controlled by the Department of Computer Science, and has the form of the CS Technical Report. The final version of the MS project is submitted to the CS Department and stored in the CS Department office. Project document copies are submitted to the committee members in a form approved by the members. Please work with your advisor for more details.

6. Deadlines, Forms & Paperwork

Students are encouraged to consult with prospective thesis/project advisors and CS office for more detailed information on the expected schedules for completion of their culminating experience work.

Note: CSC 895 enrollment (permit number) is strictly controlled by CS Office and not your mentor. This is due to the need to make a complete check on whether you fulfilled all the requirements for graduation.

The deadline for filing all forms for your CSC 895/898 is the semester preceding your planned CSC 895/898 enrollment (November for Spring and April for Fall). See your grad advisor and CS office for details, and check the above link.

7. Culminating Experience Project Proposal

This is submitted the term prior to enrollment in 895 or 898. The CER is a vehicle to communicate and agree upon expectations for the work for culminating experience between the student and the advisor. Typical sections of this proposal should include motivation, problem description, method of solving the problem, relevant work of others, as well as milestones, deliverables and approximate timetable (for more details talk with the thesis/project advisor). This project proposal should be done carefully and will serve as a "contract" between the advisor and the student. The size of this report is in general about 2-4 pages. Students are encouraged to work with their thesis/project advisor on specific details.

It is required that this proposal be developed as a deliverable with the 899 or 897 course preceding 895 or 898 courses.

8. Student Responsibility

It is  critical  to plan to take graduate level electives with possible culminating experience supervisors during your first year of study. Think of topic(s) for your culminating experience, do a research on it, check what CS faculty does for research, and feel free to meet CS Chair or other faculty for advice.

  • Must  attend the first graduate seminar (graduate program overview) in your first semester of study
  • Must  enroll in courses taught by prospective thesis/project supervisors in your second semester of study. Consult your favorite professors for guidance in project selection.
  • Must  attend mandatory advising group meeting with CS Chair to be organized within the first 4 weeks of second semester.
  • Must  select your culminating experience supervisor by the end of second semester and obtain your supervisor's permission to work under his/her supervision.

The culminating project and thesis require serious commitment and focus of the student. Serve the purpose to show that the student is capable of delivering individual work as well as being independent, able to deliver a project etc.

It is the responsibility of the student to follow up the agreed upon milestones and commitments made to the advisors (typically via approved project proposal). This is especially critical for projects where the work involves external funding and commitments including developing publications that require student's contributions.

Students are strongly encouraged to help faculty develop research publications (e.g. doing the necessary work such as SW development, experiments) and to participate in writing research papers, especially those aspiring toward Ph. D. studies.

While students own the copyright to the code they develop at SF State, the source code, and all the data and procedures used for the research and experiments, must be made publicly available for faculty and others for the purpose of grading and evaluation.

Changes in project plans, topics, title or committee members (but not the main advisor) must be made in writing in accordance with Department procedures. Change of advisor requires repeating the whole culminating project or thesis course sequence (including 899 or 897) and adherence to Department polices.

Students must follow all CS Department and general rules about plagiarism. Details are available at  Department Cheating and Plagiarism Policy Web Page

Other Options to Finish Culminating Experience

If you do not finish your culminating experience within two semester, you must enroll in culminating experience through CEL. More about enrolling through CEL. 

CS Department Information

Information and deadlines.

Advancement to Candidacy (ATC)

  • University Graduate Student Deadlines
  • University ATC Information

Proposal for Culminating Experience Form (CEF)

  • University Culminating Experience Procedures

Human Subjects Protocol (HSP)

  • University Submitting a Protocol Information
  • Department Human Subjects Protocol Information

Graduate Seminars (PERNET)

  • Complete the semester PRIOR to 895/898 enrollment
  • Department Graduate Seminar Series

895/898 Enrollment

  • Need ALL of the above submitted/completed the semester PRIOR to enrollment in 895/898
  • Department Checklist for Enrolling in 895/898 PDF

Thesis Defense (Complete Culminating Experience)

  • University Graduate Students Deadlines
  • Department Oral and Written Defense

Oral and Written Defense

If you are a Graduate Student, in your last semester and planning to graduate, you need to write up your project report or thesis, and prepare for your Oral Defense. Please follow the steps and timeline below for writing up your project report/thesis and oral defense. We urge you to work closely with your project/thesis advisor, to clarify expectations, confirm deadlines, and coordinate other committee members.

Steps for Completing Your Culminating Experience Project/Master's Thesis

  • The last day to submit your "Report of Completion" is the last day of instruction (not the last day of final exams). Your committee members need ample time to read and review your written report. Plan accordingly. All programming should be done, most experiments completed and you should have a solid first draft report written by the second week of the semester. Submit the masters project/thesis write up to your project/thesis advisor for content approval no later than the 6th week of the semester. This allows you time to correct for proper grammar as well as make any other edits based on your advisor's feedback. Students completing the thesis option are referred to the University Gradute Studies website  for guidelines on formatting the thesis report, as well as instructions on submitting final copies.
  • Once the project/thesis advisor approves the report/thesis, the student submits copies to all committee members for their approval of the CONTENT.
  • Student confers with faculty to determine the date and time all committee members are available for the Oral Defense
  • Student submits abstract and keywords to project/thesis advisor for approval
  • The student works with the committee to resolve any issues with the report submitted in Steps 1. and 2. above. After all issues with the written report are resolved, the student is given the (official) signed signature sheets and cover sheet to include with the written report
  • Students submitting a thesis write-up are referred to the  Graduate Division website  for instruction on submitting final copies.
  • Students submitting a project write-up should use the plastic (white) binding combs, thick black plastic sheet on the back and thick clear plastic sheet on the front. The number of copies depends upon the committee - minimal of 2 copies. The original version is provided to the office.
  • In preparing for oral presentation, students must review instructions and guidelines for  Department Preparing Oral Presentation web page  and confirm this to their advisor.
  • Department Writing Culminating Experience Reports (CER) Web Page

Writing a Culminating Experience Report (CER)

In this section we will outline what constitutes an outstanding culminating experience report (CER) whether it is Thesis or a Project; what constitutes unacceptable one; and also outline our general recommendations for the CER outline and content of each chapter.

The focus here is on the write-up part of the CER, namely how to communicate it in the written form (i.e. CER), and not on the culminating experience project itself. Please note that the final decision and guidance on this comes from your Culminating Experience Committee Chair and committee members, but we believe that the material in this section is general enough to set you on the right path. Finally, we will reiterate some recommendations on your oral presentation of CER.

More details on what kinds of CER exist (Thesis or Project) are located at:  Department M.S. Culminating Experience Requirments .

Steps in completing the Culminating Experience are located at:  Department Writen and Oral Defense Information .

To help you improve your writing skills, all of our students are encouraged to take an online writing course such as the one offered through courses at Stanford University, titled "Writing in the Sciences" offered during the Fall semester. For more information:  Stanford Writing in the Sciences Course Information .

Very good resources on how to write technical reports are here:

  • Colubia Web Page: Writing Technical Articles .
  • Columbia Web Page: Common Bugs in Writing .

Before we start, let us reiterate that completing culminating experience (both the project and the report) is primarily the responsibility of the student and hence the student has to drive it. It is not expected from the faculty to fully participate in writing the CER or in very extensive editing except to give necessary feedback and comments. We strongly recommend that high level CER outline be agreed between student and faculty before the writing commences.

Let us first see what constitutes an outstanding CER and what constitutes an unacceptable CER. While the definitions below touch upon the project work itself, please focus for now on the suggestions that refer to the ways on how to write about it.

Preparing Oral Presentations

Being able to present your work is critically important for your future career as well as for the oral defense of your culminating project or thesis. Please consult the following resources in preparing for your oral defense. Be sure to test your presentation on the exact same computer and projector which you will use during your presentation.

Performance Juxtaposition Web Page: Presentations

Student Theses and Projects

Office Hours

Quick links.

  • Future Students
  • News @ SF State

Princeton University

  • Advisers & Contacts
  • Bachelor of Arts & Bachelor of Science in Engineering
  • Prerequisites
  • Declaring Computer Science for AB Students
  • Declaring Computer Science for BSE Students
  • Class of '25, '26 & '27 - Departmental Requirements
  • Class of 2024 - Departmental Requirements
  • COS126 Information
  • Important Steps and Deadlines
  • Independent Work Seminars
  • Guidelines and Useful Information

Undergraduate Research Topics

  • AB Junior Research Workshops
  • Undergraduate Program FAQ
  • How to Enroll
  • Requirements
  • Certificate Program FAQ
  • Interdepartmental Committee
  • Minor Program
  • Funding for Student Group Activities
  • Mailing Lists and Policies
  • Study Abroad
  • Jobs & Careers
  • Admissions Requirements
  • Breadth Requirements
  • Pre-FPO Checklist
  • FPO Checklist
  • M.S.E. Track
  • M.Eng. Track
  • Departmental Internship Policy (for Master's students)
  • General Examination
  • Fellowship Opportunities
  • Travel Reimbursement Policy
  • Communication Skills
  • Course Schedule
  • Course Catalog
  • Research Areas
  • Interdisciplinary Programs
  • Technical Reports
  • Computing Facilities
  • Researchers
  • Technical Staff
  • Administrative Staff
  • Graduate Students
  • Undergraduate Students
  • Graduate Alumni
  • Climate and Inclusion Committee
  • Resources for Undergraduate & Graduate Students
  • Outreach Initiatives
  • Resources for Faculty & Staff
  • Spotlight Stories
  • Job Openings
  • Undergraduate Program
  • Independent Work & Theses

Suggested Undergraduate Research Topics

computer science thesis projects

How to Contact Faculty for IW/Thesis Advising

Send the professor an e-mail. When you write a professor, be clear that you want a meeting regarding a senior thesis or one-on-one IW project, and briefly describe the topic or idea that you want to work on. Check the faculty listing for email addresses.

Parastoo Abtahi, Room 419

Available for single-semester IW and senior thesis advising, 2024-2025

  • Research Areas: Human-Computer Interaction (HCI), Augmented Reality (AR), and Spatial Computing
  • Input techniques for on-the-go interaction (e.g., eye-gaze, microgestures, voice) with a focus on uncertainty, disambiguation, and privacy.
  • Minimal and timely multisensory output (e.g., spatial audio, haptics) that enables users to attend to their physical environment and the people around them, instead of a 2D screen.
  • Interaction with intelligent systems (e.g., IoT, robots) situated in physical spaces with a focus on updating users’ mental model despite the complexity and dynamicity of these systems.

Ryan Adams, Room 411

Research areas:

  • Machine learning driven design
  • Generative models for structured discrete objects
  • Approximate inference in probabilistic models
  • Accelerating solutions to partial differential equations
  • Innovative uses of automatic differentiation
  • Modeling and optimizing 3d printing and CNC machining

Andrew Appel, Room 209

Available for Fall 2024 IW advising, only

  • Research Areas: Formal methods, programming languages, compilers, computer security.
  • Software verification (for which taking COS 326 / COS 510 is helpful preparation)
  • Game theory of poker or other games (for which COS 217 / 226 are helpful)
  • Computer game-playing programs (for which COS 217 / 226)
  •  Risk-limiting audits of elections (for which ORF 245 or other knowledge of probability is useful)

Sanjeev Arora, Room 407

  • Theoretical machine learning, deep learning and its analysis, natural language processing. My advisees would typically have taken a course in algorithms (COS423 or COS 521 or equivalent) and a course in machine learning.
  • Show that finding approximate solutions to NP-complete problems is also NP-complete (i.e., come up with NP-completeness reductions a la COS 487). 
  • Experimental Algorithms: Implementing and Evaluating Algorithms using existing software packages. 
  • Studying/designing provable algorithms for machine learning and implementions using packages like scipy and MATLAB, including applications in Natural language processing and deep learning.
  • Any topic in theoretical computer science.

David August, Room 221

Not available for IW or thesis advising, 2024-2025

  • Research Areas: Computer Architecture, Compilers, Parallelism
  • Containment-based approaches to security:  We have designed and tested a simple hardware+software containment mechanism that stops incorrect communication resulting from faults, bugs, or exploits from leaving the system.   Let's explore ways to use containment to solve real problems.  Expect to work with corporate security and technology decision-makers.
  • Parallelism: Studies show much more parallelism than is currently realized in compilers and architectures.  Let's find ways to realize this parallelism.
  • Any other interesting topic in computer architecture or compilers. 

Mark Braverman, 194 Nassau St., Room 231

  • Research Areas: computational complexity, algorithms, applied probability, computability over the real numbers, game theory and mechanism design, information theory.
  • Topics in computational and communication complexity.
  • Applications of information theory in complexity theory.
  • Algorithms for problems under real-life assumptions.
  • Game theory, network effects
  • Mechanism design (could be on a problem proposed by the student)

Sebastian Caldas, 221 Nassau Street, Room 105

  • Research Areas: collaborative learning, machine learning for healthcare. Typically, I will work with students that have taken COS324.
  • Methods for collaborative and continual learning.
  • Machine learning for healthcare applications.

Bernard Chazelle, 194 Nassau St., Room 301

  • Research Areas: Natural Algorithms, Computational Geometry, Sublinear Algorithms. 
  • Natural algorithms (flocking, swarming, social networks, etc).
  • Sublinear algorithms
  • Self-improving algorithms
  • Markov data structures

Danqi Chen, Room 412

  • My advisees would be expected to have taken a course in machine learning and ideally have taken COS484 or an NLP graduate seminar.
  • Representation learning for text and knowledge bases
  • Pre-training and transfer learning
  • Question answering and reading comprehension
  • Information extraction
  • Text summarization
  • Any other interesting topics related to natural language understanding/generation

Marcel Dall'Agnol, Corwin 034

  • Research Areas: Theoretical computer science. (Specifically, quantum computation, sublinear algorithms, complexity theory, interactive proofs and cryptography)
  • Research Areas: Machine learning

Jia Deng, Room 423

  •  Research Areas: Computer Vision, Machine Learning.
  • Object recognition and action recognition
  • Deep Learning, autoML, meta-learning
  • Geometric reasoning, logical reasoning

Adji Bousso Dieng, Room 406

  • Research areas: Vertaix is a research lab at Princeton University led by Professor Adji Bousso Dieng. We work at the intersection of artificial intelligence (AI) and the natural sciences. The models and algorithms we develop are motivated by problems in those domains and contribute to advancing methodological research in AI. We leverage tools in statistical machine learning and deep learning in developing methods for learning with the data, of various modalities, arising from the natural sciences.

Robert Dondero, Corwin Hall, Room 038

  • Research Areas:  Software engineering; software engineering education.
  • Develop or evaluate tools to facilitate student learning in undergraduate computer science courses at Princeton, and beyond.
  • In particular, can code critiquing tools help students learn about software quality?

Zeev Dvir, 194 Nassau St., Room 250

  • Research Areas: computational complexity, pseudo-randomness, coding theory and discrete mathematics.
  • Independent Research: I have various research problems related to Pseudorandomness, Coding theory, Complexity and Discrete mathematics - all of which require strong mathematical background. A project could also be based on writing a survey paper describing results from a few theory papers revolving around some particular subject.

Benjamin Eysenbach, Room 416

  • Research areas: reinforcement learning, machine learning. My advisees would typically have taken COS324.
  • Using RL algorithms to applications in science and engineering.
  • Emergent behavior of RL algorithms on high-fidelity robotic simulators.
  • Studying how architectures and representations can facilitate generalization.

Christiane Fellbaum, 1-S-14 Green

  • Research Areas: theoretical and computational linguistics, word sense disambiguation, lexical resource construction, English and multilingual WordNet(s), ontology
  • Anything having to do with natural language--come and see me with/for ideas suitable to your background and interests. Some topics students have worked on in the past:
  • Developing parsers, part-of-speech taggers, morphological analyzers for underrepresented languages (you don't have to know the language to develop such tools!)
  • Quantitative approaches to theoretical linguistics questions
  • Extensions and interfaces for WordNet (English and WN in other languages),
  • Applications of WordNet(s), including:
  • Foreign language tutoring systems,
  • Spelling correction software,
  • Word-finding/suggestion software for ordinary users and people with memory problems,
  • Machine Translation 
  • Sentiment and Opinion detection
  • Automatic reasoning and inferencing
  • Collaboration with professors in the social sciences and humanities ("Digital Humanities")

Adam Finkelstein, Room 424 

  • Research Areas: computer graphics, audio.

Robert S. Fish, Corwin Hall, Room 037

  • Networking and telecommunications
  • Learning, perception, and intelligence, artificial and otherwise;
  • Human-computer interaction and computer-supported cooperative work
  • Online education, especially in Computer Science Education
  • Topics in research and development innovation methodologies including standards, open-source, and entrepreneurship
  • Distributed autonomous organizations and related blockchain technologies

Michael Freedman, Room 308 

  • Research Areas: Distributed systems, security, networking
  • Projects related to streaming data analysis, datacenter systems and networks, untrusted cloud storage and applications. Please see my group website at http://sns.cs.princeton.edu/ for current research projects.

Ruth Fong, Room 032

  • Research Areas: computer vision, machine learning, deep learning, interpretability, explainable AI, fairness and bias in AI
  • Develop a technique for understanding AI models
  • Design a AI model that is interpretable by design
  • Build a paradigm for detecting and/or correcting failure points in an AI model
  • Analyze an existing AI model and/or dataset to better understand its failure points
  • Build a computer vision system for another domain (e.g., medical imaging, satellite data, etc.)
  • Develop a software package for explainable AI
  • Adapt explainable AI research to a consumer-facing problem

Note: I am happy to advise any project if there's a sufficient overlap in interest and/or expertise; please reach out via email to chat about project ideas.

Tom Griffiths, Room 405

Available for Fall 2024 single-semester IW advising, only

Research areas: computational cognitive science, computational social science, machine learning and artificial intelligence

Note: I am open to projects that apply ideas from computer science to understanding aspects of human cognition in a wide range of areas, from decision-making to cultural evolution and everything in between. For example, we have current projects analyzing chess game data and magic tricks, both of which give us clues about how human minds work. Students who have expertise or access to data related to games, magic, strategic sports like fencing, or other quantifiable domains of human behavior feel free to get in touch.

Aarti Gupta, Room 220

  • Research Areas: Formal methods, program analysis, logic decision procedures
  • Finding bugs in open source software using automatic verification tools
  • Software verification (program analysis, model checking, test generation)
  • Decision procedures for logical reasoning (SAT solvers, SMT solvers)

Elad Hazan, Room 409  

  • Research interests: machine learning methods and algorithms, efficient methods for mathematical optimization, regret minimization in games, reinforcement learning, control theory and practice
  • Machine learning, efficient methods for mathematical optimization, statistical and computational learning theory, regret minimization in games.
  • Implementation and algorithm engineering for control, reinforcement learning and robotics
  • Implementation and algorithm engineering for time series prediction

Felix Heide, Room 410

  • Research Areas: Computational Imaging, Computer Vision, Machine Learning (focus on Optimization and Approximate Inference).
  • Optical Neural Networks
  • Hardware-in-the-loop Holography
  • Zero-shot and Simulation-only Learning
  • Object recognition in extreme conditions
  • 3D Scene Representations for View Generation and Inverse Problems
  • Long-range Imaging in Scattering Media
  • Hardware-in-the-loop Illumination and Sensor Optimization
  • Inverse Lidar Design
  • Phase Retrieval Algorithms
  • Proximal Algorithms for Learning and Inference
  • Domain-Specific Language for Optics Design

Peter Henderson , 302 Sherrerd Hall

  • Research Areas: Machine learning, law, and policy

Kyle Jamieson, Room 306

  • Research areas: Wireless and mobile networking; indoor radar and indoor localization; Internet of Things
  • See other topics on my independent work  ideas page  (campus IP and CS dept. login req'd)

Alan Kaplan, 221 Nassau Street, Room 105

Research Areas:

  • Random apps of kindness - mobile application/technology frameworks used to help individuals or communities; topic areas include, but are not limited to: first response, accessibility, environment, sustainability, social activism, civic computing, tele-health, remote learning, crowdsourcing, etc.
  • Tools automating programming language interoperability - Java/C++, React Native/Java, etc.
  • Software visualization tools for education
  • Connected consumer devices, applications and protocols

Brian Kernighan, Room 311

  • Research Areas: application-specific languages, document preparation, user interfaces, software tools, programming methodology
  • Application-oriented languages, scripting languages.
  • Tools; user interfaces
  • Digital humanities

Zachary Kincaid, Room 219

  • Research areas: programming languages, program analysis, program verification, automated reasoning
  • Independent Research Topics:
  • Develop a practical algorithm for an intractable problem (e.g., by developing practical search heuristics, or by reducing to, or by identifying a tractable sub-problem, ...).
  • Design a domain-specific programming language, or prototype a new feature for an existing language.
  • Any interesting project related to programming languages or logic.

Gillat Kol, Room 316

Aleksandra korolova, 309 sherrerd hall.

  • Research areas: Societal impacts of algorithms and AI; privacy; fair and privacy-preserving machine learning; algorithm auditing.

Advisees typically have taken one or more of COS 226, COS 324, COS 423, COS 424 or COS 445.

Pravesh Kothari, Room 320

  • Research areas: Theory

Amit Levy, Room 307

  • Research Areas: Operating Systems, Distributed Systems, Embedded Systems, Internet of Things
  • Distributed hardware testing infrastructure
  • Second factor security tokens
  • Low-power wireless network protocol implementation
  • USB device driver implementation

Kai Li, Room 321

  • Research Areas: Distributed systems; storage systems; content-based search and data analysis of large datasets.
  • Fast communication mechanisms for heterogeneous clusters.
  • Approximate nearest-neighbor search for high dimensional data.
  • Data analysis and prediction of in-patient medical data.
  • Optimized implementation of classification algorithms on manycore processors.

Xiaoyan Li, 221 Nassau Street, Room 104

  • Research areas: Information retrieval, novelty detection, question answering, AI, machine learning and data analysis.
  • Explore new statistical retrieval models for document retrieval and question answering.
  • Apply AI in various fields.
  • Apply supervised or unsupervised learning in health, education, finance, and social networks, etc.
  • Any interesting project related to AI, machine learning, and data analysis.

Lydia Liu, Room 414

  • Research Areas: algorithmic decision making, machine learning and society
  • Theoretical foundations for algorithmic decision making (e.g. mathematical modeling of data-driven decision processes, societal level dynamics)
  • Societal impacts of algorithms and AI through a socio-technical lens (e.g. normative implications of worst case ML metrics, prediction and model arbitrariness)
  • Machine learning for social impact domains, especially education (e.g. responsible development and use of LLMs for education equity and access)
  • Evaluation of human-AI decision making using statistical methods (e.g. causal inference of long term impact)

Wyatt Lloyd, Room 323

  • Research areas: Distributed Systems
  • Caching algorithms and implementations
  • Storage systems
  • Distributed transaction algorithms and implementations

Alex Lombardi , Room 312

  • Research Areas: Theory

Margaret Martonosi, Room 208

  • Quantum Computing research, particularly related to architecture and compiler issues for QC.
  • Computer architectures specialized for modern workloads (e.g., graph analytics, machine learning algorithms, mobile applications
  • Investigating security and privacy vulnerabilities in computer systems, particularly IoT devices.
  • Other topics in computer architecture or mobile / IoT systems also possible.

Jonathan Mayer, Sherrerd Hall, Room 307 

Available for Spring 2025 single-semester IW, only

  • Research areas: Technology law and policy, with emphasis on national security, criminal procedure, consumer privacy, network management, and online speech.
  • Assessing the effects of government policies, both in the public and private sectors.
  • Collecting new data that relates to government decision making, including surveying current business practices and studying user behavior.
  • Developing new tools to improve government processes and offer policy alternatives.

Mae Milano, Room 307

  • Local-first / peer-to-peer systems
  • Wide-ares storage systems
  • Consistency and protocol design
  • Type-safe concurrency
  • Language design
  • Gradual typing
  • Domain-specific languages
  • Languages for distributed systems

Andrés Monroy-Hernández, Room 405

  • Research Areas: Human-Computer Interaction, Social Computing, Public-Interest Technology, Augmented Reality, Urban Computing
  • Research interests:developing public-interest socio-technical systems.  We are currently creating alternatives to gig work platforms that are more equitable for all stakeholders. For instance, we are investigating the socio-technical affordances necessary to support a co-op food delivery network owned and managed by workers and restaurants. We are exploring novel system designs that support self-governance, decentralized/federated models, community-centered data ownership, and portable reputation systems.  We have opportunities for students interested in human-centered computing, UI/UX design, full-stack software development, and qualitative/quantitative user research.
  • Beyond our core projects, we are open to working on research projects that explore the use of emerging technologies, such as AR, wearables, NFTs, and DAOs, for creative and out-of-the-box applications.

Christopher Moretti, Corwin Hall, Room 036

  • Research areas: Distributed systems, high-throughput computing, computer science/engineering education
  • Expansion, improvement, and evaluation of open-source distributed computing software.
  • Applications of distributed computing for "big science" (e.g. biometrics, data mining, bioinformatics)
  • Software and best practices for computer science education and study, especially Princeton's 126/217/226 sequence or MOOCs development
  • Sports analytics and/or crowd-sourced computing

Radhika Nagpal, F316 Engineering Quadrangle

  • Research areas: control, robotics and dynamical systems

Karthik Narasimhan, Room 422

  • Research areas: Natural Language Processing, Reinforcement Learning
  • Autonomous agents for text-based games ( https://www.microsoft.com/en-us/research/project/textworld/ )
  • Transfer learning/generalization in NLP
  • Techniques for generating natural language
  • Model-based reinforcement learning

Arvind Narayanan, 308 Sherrerd Hall 

Research Areas: fair machine learning (and AI ethics more broadly), the social impact of algorithmic systems, tech policy

Pedro Paredes, Corwin Hall, Room 041

My primary research work is in Theoretical Computer Science.

 * Research Interest: Spectral Graph theory, Pseudorandomness, Complexity theory, Coding Theory, Quantum Information Theory, Combinatorics.

The IW projects I am interested in advising can be divided into three categories:

 1. Theoretical research

I am open to advise work on research projects in any topic in one of my research areas of interest. A project could also be based on writing a survey given results from a few papers. Students should have a solid background in math (e.g., elementary combinatorics, graph theory, discrete probability, basic algebra/calculus) and theoretical computer science (226 and 240 material, like big-O/Omega/Theta, basic complexity theory, basic fundamental algorithms). Mathematical maturity is a must.

A (non exhaustive) list of topics of projects I'm interested in:   * Explicit constructions of better vertex expanders and/or unique neighbor expanders.   * Construction deterministic or random high dimensional expanders.   * Pseudorandom generators for different problems.   * Topics around the quantum PCP conjecture.   * Topics around quantum error correcting codes and locally testable codes, including constructions, encoding and decoding algorithms.

 2. Theory informed practical implementations of algorithms   Very often the great advances in theoretical research are either not tested in practice or not even feasible to be implemented in practice. Thus, I am interested in any project that consists in trying to make theoretical ideas applicable in practice. This includes coming up with new algorithms that trade some theoretical guarantees for feasible implementation yet trying to retain the soul of the original idea; implementing new algorithms in a suitable programming language; and empirically testing practical implementations and comparing them with benchmarks / theoretical expectations. A project in this area doesn't have to be in my main areas of research, any theoretical result could be suitable for such a project.

Some examples of areas of interest:   * Streaming algorithms.   * Numeric linear algebra.   * Property testing.   * Parallel / Distributed algorithms.   * Online algorithms.    3. Machine learning with a theoretical foundation

I am interested in projects in machine learning that have some mathematical/theoretical, even if most of the project is applied. This includes topics like mathematical optimization, statistical learning, fairness and privacy.

One particular area I have been recently interested in is in the area of rating systems (e.g., Chess elo) and applications of this to experts problems.

Final Note: I am also willing to advise any project with any mathematical/theoretical component, even if it's not the main one; please reach out via email to chat about project ideas.

Iasonas Petras, Corwin Hall, Room 033

  • Research Areas: Information Based Complexity, Numerical Analysis, Quantum Computation.
  • Prerequisites: Reasonable mathematical maturity. In case of a project related to Quantum Computation a certain familiarity with quantum mechanics is required (related courses: ELE 396/PHY 208).
  • Possible research topics include:

1.   Quantum algorithms and circuits:

  • i. Design or simulation quantum circuits implementing quantum algorithms.
  • ii. Design of quantum algorithms solving/approximating continuous problems (such as Eigenvalue problems for Partial Differential Equations).

2.   Information Based Complexity:

  • i. Necessary and sufficient conditions for tractability of Linear and Linear Tensor Product Problems in various settings (for example worst case or average case). 
  • ii. Necessary and sufficient conditions for tractability of Linear and Linear Tensor Product Problems under new tractability and error criteria.
  • iii. Necessary and sufficient conditions for tractability of Weighted problems.
  • iv. Necessary and sufficient conditions for tractability of Weighted Problems under new tractability and error criteria.

3. Topics in Scientific Computation:

  • i. Randomness, Pseudorandomness, MC and QMC methods and their applications (Finance, etc)

Yuri Pritykin, 245 Carl Icahn Lab

  • Research interests: Computational biology; Cancer immunology; Regulation of gene expression; Functional genomics; Single-cell technologies.
  • Potential research projects: Development, implementation, assessment and/or application of algorithms for analysis, integration, interpretation and visualization of multi-dimensional data in molecular biology, particularly single-cell and spatial genomics data.

Benjamin Raphael, Room 309  

  • Research interests: Computational biology and bioinformatics; Cancer genomics; Algorithms and machine learning approaches for analysis of large-scale datasets
  • Implementation and application of algorithms to infer evolutionary processes in cancer
  • Identifying correlations between combinations of genomic mutations in human and cancer genomes
  • Design and implementation of algorithms for genome sequencing from new DNA sequencing technologies
  • Graph clustering and network anomaly detection, particularly using diffusion processes and methods from spectral graph theory

Vikram Ramaswamy, 035 Corwin Hall

  • Research areas: Interpretability of AI systems, Fairness in AI systems, Computer vision.
  • Constructing a new method to explain a model / create an interpretable by design model
  • Analyzing a current model / dataset to understand bias within the model/dataset
  • Proposing new fairness evaluations
  • Proposing new methods to train to improve fairness
  • Developing synthetic datasets for fairness / interpretability benchmarks
  • Understanding robustness of models

Ran Raz, Room 240

  • Research Area: Computational Complexity
  • Independent Research Topics: Computational Complexity, Information Theory, Quantum Computation, Theoretical Computer Science

Szymon Rusinkiewicz, Room 406

  • Research Areas: computer graphics; computer vision; 3D scanning; 3D printing; robotics; documentation and visualization of cultural heritage artifacts
  • Research ways of incorporating rotation invariance into computer visiontasks such as feature matching and classification
  • Investigate approaches to robust 3D scan matching
  • Model and compensate for imperfections in 3D printing
  • Given a collection of small mobile robots, apply control policies learned in simulation to the real robots.

Olga Russakovsky, Room 408

  • Research Areas: computer vision, machine learning, deep learning, crowdsourcing, fairness&bias in AI
  • Design a semantic segmentation deep learning model that can operate in a zero-shot setting (i.e., recognize and segment objects not seen during training)
  • Develop a deep learning classifier that is impervious to protected attributes (such as gender or race) that may be erroneously correlated with target classes
  • Build a computer vision system for the novel task of inferring what object (or part of an object) a human is referring to when pointing to a single pixel in the image. This includes both collecting an appropriate dataset using crowdsourcing on Amazon Mechanical Turk, creating a new deep learning formulation for this task, and running extensive analysis of both the data and the model

Sebastian Seung, Princeton Neuroscience Institute, Room 153

  • Research Areas: computational neuroscience, connectomics, "deep learning" neural networks, social computing, crowdsourcing, citizen science
  • Gamification of neuroscience (EyeWire  2.0)
  • Semantic segmentation and object detection in brain images from microscopy
  • Computational analysis of brain structure and function
  • Neural network theories of brain function

Jaswinder Pal Singh, Room 324

  • Research Areas: Boundary of technology and business/applications; building and scaling technology companies with special focus at that boundary; parallel computing systems and applications: parallel and distributed applications and their implications for software and architectural design; system software and programming environments for multiprocessors.
  • Develop a startup company idea, and build a plan/prototype for it.
  • Explore tradeoffs at the boundary of technology/product and business/applications in a chosen area.
  • Study and develop methods to infer insights from data in different application areas, from science to search to finance to others. 
  • Design and implement a parallel application. Possible areas include graphics, compression, biology, among many others. Analyze performance bottlenecks using existing tools, and compare programming models/languages.
  • Design and implement a scalable distributed algorithm.

Mona Singh, Room 420

  • Research Areas: computational molecular biology, as well as its interface with machine learning and algorithms.
  • Whole and cross-genome methods for predicting protein function and protein-protein interactions.
  • Analysis and prediction of biological networks.
  • Computational methods for inferring specific aspects of protein structure from protein sequence data.
  • Any other interesting project in computational molecular biology.

Robert Tarjan, 194 Nassau St., Room 308

  • Research Areas: Data structures; graph algorithms; combinatorial optimization; computational complexity; computational geometry; parallel algorithms.
  • Implement one or more data structures or combinatorial algorithms to provide insight into their empirical behavior.
  • Design and/or analyze various data structures and combinatorial algorithms.

Olga Troyanskaya, Room 320

  • Research Areas: Bioinformatics; analysis of large-scale biological data sets (genomics, gene expression, proteomics, biological networks); algorithms for integration of data from multiple data sources; visualization of biological data; machine learning methods in bioinformatics.
  • Implement and evaluate one or more gene expression analysis algorithm.
  • Develop algorithms for assessment of performance of genomic analysis methods.
  • Develop, implement, and evaluate visualization tools for heterogeneous biological data.

David Walker, Room 211

  • Research Areas: Programming languages, type systems, compilers, domain-specific languages, software-defined networking and security
  • Independent Research Topics:  Any other interesting project that involves humanitarian hacking, functional programming, domain-specific programming languages, type systems, compilers, software-defined networking, fault tolerance, language-based security, theorem proving, logic or logical frameworks.

Shengyi Wang, Postdoctoral Research Associate, Room 216

Available for Fall 2024 single-semester IW, only

  • Independent Research topics: Explore Escher-style tilings using (introductory) group theory and automata theory to produce beautiful pictures.

Kevin Wayne, Corwin Hall, Room 040

  • Research Areas: design, analysis, and implementation of algorithms; data structures; combinatorial optimization; graphs and networks.
  • Design and implement computer visualizations of algorithms or data structures.
  • Develop pedagogical tools or programming assignments for the computer science curriculum at Princeton and beyond.
  • Develop assessment infrastructure and assessments for MOOCs.

Matt Weinberg, 194 Nassau St., Room 222

  • Research Areas: algorithms, algorithmic game theory, mechanism design, game theoretical problems in {Bitcoin, networking, healthcare}.
  • Theoretical questions related to COS 445 topics such as matching theory, voting theory, auction design, etc. 
  • Theoretical questions related to incentives in applications like Bitcoin, the Internet, health care, etc. In a little bit more detail: protocols for these systems are often designed assuming that users will follow them. But often, users will actually be strictly happier to deviate from the intended protocol. How should we reason about user behavior in these protocols? How should we design protocols in these settings?

Huacheng Yu, Room 310

  • data structures
  • streaming algorithms
  • design and analyze data structures / streaming algorithms
  • prove impossibility results (lower bounds)
  • implement and evaluate data structures / streaming algorithms

Ellen Zhong, Room 314

Opportunities outside the department.

We encourage students to look in to doing interdisciplinary computer science research and to work with professors in departments other than computer science.  However, every CS independent work project must have a strong computer science element (even if it has other scientific or artistic elements as well.)  To do a project with an adviser outside of computer science you must have permission of the department.  This can be accomplished by having a second co-adviser within the computer science department or by contacting the independent work supervisor about the project and having he or she sign the independent work proposal form.

Here is a list of professors outside the computer science department who are eager to work with computer science undergraduates.

Maria Apostolaki, Engineering Quadrangle, C330

  • Research areas: Computing & Networking, Data & Information Science, Security & Privacy

Branko Glisic, Engineering Quadrangle, Room E330

  • Documentation of historic structures
  • Cyber physical systems for structural health monitoring
  • Developing virtual and augmented reality applications for documenting structures
  • Applying machine learning techniques to generate 3D models from 2D plans of buildings
  •  Contact : Rebecca Napolitano, rkn2 (@princeton.edu)

Mihir Kshirsagar, Sherrerd Hall, Room 315

Center for Information Technology Policy.

  • Consumer protection
  • Content regulation
  • Competition law
  • Economic development
  • Surveillance and discrimination

Sharad Malik, Engineering Quadrangle, Room B224

Select a Senior Thesis Adviser for the 2020-21 Academic Year.

  • Design of reliable hardware systems
  • Verifying complex software and hardware systems

Prateek Mittal, Engineering Quadrangle, Room B236

  • Internet security and privacy 
  • Social Networks
  • Privacy technologies, anonymous communication
  • Network Science
  • Internet security and privacy: The insecurity of Internet protocols and services threatens the safety of our critical network infrastructure and billions of end users. How can we defend end users as well as our critical network infrastructure from attacks?
  • Trustworthy social systems: Online social networks (OSNs) such as Facebook, Google+, and Twitter have revolutionized the way our society communicates. How can we leverage social connections between users to design the next generation of communication systems?
  • Privacy Technologies: Privacy on the Internet is eroding rapidly, with businesses and governments mining sensitive user information. How can we protect the privacy of our online communications? The Tor project (https://www.torproject.org/) is a potential application of interest.

Ken Norman,  Psychology Dept, PNI 137

  • Research Areas: Memory, the brain and computation 
  • Lab:  Princeton Computational Memory Lab

Potential research topics

  • Methods for decoding cognitive state information from neuroimaging data (fMRI and EEG) 
  • Neural network simulations of learning and memory

Caroline Savage

Office of Sustainability, Phone:(609)258-7513, Email: cs35 (@princeton.edu)

The  Campus as Lab  program supports students using the Princeton campus as a living laboratory to solve sustainability challenges. The Office of Sustainability has created a list of campus as lab research questions, filterable by discipline and topic, on its  website .

An example from Computer Science could include using  TigerEnergy , a platform which provides real-time data on campus energy generation and consumption, to study one of the many energy systems or buildings on campus. Three CS students used TigerEnergy to create a  live energy heatmap of campus .

Other potential projects include:

  • Apply game theory to sustainability challenges
  • Develop a tool to help visualize interactions between complex campus systems, e.g. energy and water use, transportation and storm water runoff, purchasing and waste, etc.
  • How can we learn (in aggregate) about individuals’ waste, energy, transportation, and other behaviors without impinging on privacy?

Janet Vertesi, Sociology Dept, Wallace Hall, Room 122

  • Research areas: Sociology of technology; Human-computer interaction; Ubiquitous computing.
  • Possible projects: At the intersection of computer science and social science, my students have built mixed reality games, produced artistic and interactive installations, and studied mixed human-robot teams, among other projects.

David Wentzlaff, Engineering Quadrangle, Room 228

Computing, Operating Systems, Sustainable Computing.

  • Instrument Princeton's Green (HPCRC) data center
  • Investigate power utilization on an processor core implemented in an FPGA
  • Dismantle and document all of the components in modern electronics. Invent new ways to build computers that can be recycled easier.
  • Other topics in parallel computer architecture or operating systems

Facebook

Brown Logo

  • About Brown
  • Campus Life

Information for:

  • Current Students
  • Friends & Neighbors
  • A to Z Index
  • People Directory
  • Social@Brown
  • About the Department
  • Systems & Software
  • Socially Responsible    Computing
  • Positions / Jobs
  • Brown CS News
  • Brown CS Blog
  • Our Community
  • Grad Students
  • Ugrad Students
  • Research Links
  • Publications
  • Opportunities For    Visiting Students
  • Degree Programs
  • Computer Science
  • Cybersecurity
  • Undergraduate
  • Interdisciplinary
  • Miscellaneous
  • Course List
  • TA Program
  • Who We Are
  • Action Plan & Initiatives
  • Student Advocates
  • Data And Demographics
  • Student Groups
  • UTA Endowment
  • Home »
  • Research »
  • Publications »
  • Student Project Reports »
  • Master's

Master's Project Reports

  Chen, Catherine

Icon

  Chen, Yiwen and Ren, Jiahao

  Chernosky, Brynn

  Christou, Neophytes

  Dekle, Max

  Demetci, Pinar

  Fu, Changcheng

  Fu, Haotian

  Goktas, Denizalp

  Golovanevsky, Michal

  Howe, Wyatt

  Kaan, Ozulkulu

  Li, Shihang

  Lu, Cheng-You

  Luo, Calvin

  Maynard, Patrick

  Peng, Kathy

  Ramesh, Dev

  Ryjikov, Benjamin

  Scherick, James

  Sriram, Abhinav

  Zhou, Peisen

  Zhou, Tongyu

  Zhuo, Wang

Computer Science at Brown University Providence, Rhode Island 02912 USA Phone: 401-863-7600 Map & Directions / Contact Us

Facebook

  • Harvard Library
  • Research Guides
  • Faculty of Arts & Sciences Libraries

Computer Science Library Research Guide

Find dissertations and theses.

  • Get Started
  • How to get the full-text
  • What is Peer Review?
  • Find Books in the SEC Library This link opens in a new window
  • Find Conference Proceedings
  • Find Patents This link opens in a new window
  • Find Standards
  • Find Technical Reports
  • Find Videos
  • Ask a Librarian This link opens in a new window

Engineering Librarian

Profile Photo

How to search for Harvard dissertations

  • DASH , Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.  Most Ph.D. dissertations submitted from  March 2012 forward  are available online in DASH.
  • Check HOLLIS, the Library Catalog, and refine your results by using the   Advanced Search   and limiting Resource  Type   to Dissertations
  • Search the database  ProQuest Dissertations & Theses Global Don't hesitate to  Ask a Librarian  for assistance.

How to search for Non-Harvard dissertations

Library Database:

  • ProQuest Dissertations & Theses Global

Free Resources:

  • Many  universities  provide full-text access to their dissertations via a digital repository.  If you know the title of a particular dissertation or thesis, try doing a Google search.  

Related Sites

  • Formatting Your Dissertation - GSAS
  • Ph.D. Dissertation Submission  - FAS
  • Empowering Students Before you Sign that Contract!  - Copyright at Harvard Library

Select Library Titles

Cover Art

  • << Previous: Find Conference Proceedings
  • Next: Find Patents >>
  • Last Updated: Feb 27, 2024 1:52 PM
  • URL: https://guides.library.harvard.edu/cs

Harvard University Digital Accessibility Policy

Thesis Guide

computer science thesis projects

Advice for great computer science thesis projects.

My thesis project was the most rewarding experience of my computer science studies. Unfortunately, many students suffer theirs as frustrating, tedious and with few opportunities for personal growth.

In this guide, I want to share the pitfalls and best practices from supervising 50+ thesis projects in computer science at TUM . I hope that it helps you write a great thesis and grow in the process.  Start reading here .

Slides From My Presentations

We provide slides in English from January 2024 . The slides on how to write a guided research are from Roman’s talk from January 2024.

For more information on how to write a thesis at the company Elmar has founded, we recommend our software intelligence night. Please register such that we can order enough pizza and beer for everyone!

Video Recordings

Below are videos that summarize the thesis guide content. The first one is in German, the second one in in English.

German version:

English version:

Recent Posts

Talk at tum: how to write a great master’s thesis, talk at tum: how to do a guided research, avoiding typical pitfalls (not only) at tum, from thesis to paper: my first publication on a scientific conference, how to write a case study.

' src=

  • Already have a WordPress.com account? Log in now.
  • Subscribe Subscribed
  • Copy shortlink
  • Report this content
  • View post in Reader
  • Manage subscriptions
  • Collapse this bar
  • Advisory Board
  • Biological Sciences
  • Computing & Software Systems
  • Engineering & Mathematics
  • Physical Sciences
  • STEM Inclusivity Awards
  • School of STEM contact
  • School of STEM Employment
  • Student Forms & Resources
  • Investigative Biology
  • Research & Internships
  • Student Organizations
  • Friday Harbor Laboratories
  • Earth System Science
  • Student Projects
  • Actuarial Science
  • Computer Science & Software Engineering (CSSE)
  • Data Science
  • Information Technology (IT)
  • Marine Biology
  • Mathematics
  • Neuroscience
  • Capstone & Symposium Event
  • Undergraduate Policies & Procedures
  • CSS Registration & Waitlists
  • Getting Started with Computer Science
  • Excellence in Cybersecurity Education
  • How to Apply
  • Core Courses
  • Elective Courses
  • Project or Thesis
  • Computer Engineering
  • Power & Energy
  • Signal Processing
  • Biomedical Systems and Devices
  • Microelectronics and Devices
  • Wireless, RF/Microwave, and Telecommunications
  • Prerequisites guide
  • Frequently Asked Questions
  • Career Resources
  • Previous Quarters
  • Division of Biological Sciences Faculty
  • Division of Computing & Software Systems Faculty
  • Division of Engineering & Mathematics Faculty
  • Faculty in Chemistry
  • Faculty in Earth System Science
  • Faculty in Physics
  • Associate Professor with Tenure
  • Full Professor
  • Teaching Track Faculty
  • Promotion and Tenure Public Statement
  • Teaching Effectiveness
  • Capstones & internships
  • Center for Biotechnology Innovation & Training
  • National Center of Academic Excellence in Cybersecurity
  • Research Experiences for Undergraduates (REU)
  • Faculty Research Projects
  • Research Experiences for Undergraduates (REU) from Heritage University
  • Ocean Engineering
  • Safety and Security Studies and Modeling in Fluids
  • Instrumentation
  • Room Access
  • Support Services
  • Quick Links & Forms
  • EE Open lab schedule

Quick Links

  • Information Technology
  • Commuter Services
  • Human Resources
  • Campus Safety

Thesis/Project Student Process

The following process applies to all Division of Computing & Software Systems (CSS) graduate students, regardless of degree program (CSSE or CSE) or thesis/project goals.

In general, a thesis is a scholarly written document aimed at an academic audience as a contribution to an existing body of knowledge. A project is aimed at building a connection between academic concepts and the application of those concepts into real-world context.

Before students determine which option to pursue, they should discuss how each option applies to their own individual goals for their degree program with their faculty advisor and the CSS Graduate Advisor.

Step 1: Form a Supervisory Committee

Students who desire to register for their thesis/project credit(s) must first form a committee of faculty who will supervise and grade their efforts and results of their work. A supervisory committee will consist of a student’s Faculty Advisor (who will serve as Committee Chair) and at least 2-3 additional faculty members. At least two of the committee members must be faculty whose primary appointment is in the Computing & Software Systems Division. The Chair of the Committee and at least one-half of the total membership must be members of the graduate faculty.

Students must submit a signed Request to Form a Supervisory Committee to the CSS Graduate Advisor to obtain an entry code to register for the class. Included with the signed form should be a proposal (minimally 3 pages) addressing the questions asked in section 2 of the form. Please follow the proposal guidelines detailed in the link below:

  • Proposal Guidelines
  • Proposal Rubric

Before submitting the form, students are expected to attend another students CSS master’s project or thesis final examination & defense. View the Thesis/Project Final Exam Schedule .

The deadline for all committee requests is the first day of the seventh week of the quarter PRECEDING the start of a student’s project or thesis coursework . Students should request for specific faculty to staff their Supervisory Committee; however, final staffing assignments of the Supervisory Committee resides with the CSS Division’s Graduate Program Coordinator. Once a supervisory request has been granted, students will receive an email from the CSS Graduate Advisor notifying them of the approved committee and an entry code to register for their thesis/project credit(s). Students are encouraged to submit their request early, to avoid any registration late fees.

Submission Deadlines

  • Winter 2024: November 6, 2023
  • Spring 2024: February 12, 2024
  • Summer 2024: May 6, 2024
  • Autumn 2024: July 29, 2024

Step 2: File a Thesis or Project Plan

By the end of the second week of the quarter in which a student is registered for their first capstone credits, the student must submit to their Supervisory Committee a detailed project or thesis plan. The plan should include an updated proposal of the work to be done, a time table listing key milestones and associated deliverables, the quality criteria and specific metrics by which student expects to measure the quality of their result, and the software development lifecycle and processes planned to complete the work. There are no penalties for deviations in the approved plan or failure to meet the estimates in the timetable or failure to achieve the quality goals. The plan simply provides a well-defined start for the remainder of the capstone work. A PDF copy of the approved plan must be submitted by the student to the STEM Graduate Advising Office.

  • Winter 2024: January 16, 2024
  • Spring 2024: April 8, 2024
  • Summer 2024: July 1, 2024

To submit your plan to the STEM Graduate Office, please send your PDF document to [email protected] , with the subject line “Project Plan” or “Thesis Plan”.

Register for CSSSKL 594

A substantial working draft of the capstone research project paper or thesis should be completed by the beginning of the quarter in which you expect to graduate. For this reason, generally, you will enroll in CSSSKL 594 “Scientific Writing for Thesis/Project” during the quarter before you expect to graduate. (For example, to graduate in the spring, you should enroll in 594 in the Winter). Please consult with your supervisory committee chair as to the best timing of this class for the most benefit to you.

Step 3: Communicate Regular Progress Reports with the Supervisory Committee

Throughout the period of enrollment in the thesis/project credit(s), students are expected to lead the effort to regularly update their Supervisory Committee members on their work progress. Students should plan on meeting with their Committee Chair frequently based on the advice from the committee chair (minimally three times in each quarter that they are enrolled for thesis/project credits).

To register for second and subsequent quarters, students should work with their Chair to determine the workload for the upcoming quarter and the number of credits to enroll for. Once the Committee Chair grants permission and confirms the number of credits for the next quarter, the student forwards that permission to the CSS Graduate Advisor, who will issue a new entry code to use for registration. In cases where satisfactory progress is made, the student will be issued of a grade of N (in progress) until the project/thesis is complete.

Students who fail to make appropriate progress in their project/thesis during a quarter may receive a notification from their Chair warning them of lack of progress. If students continue failing to achieve satisfactory progress, Chairs may also choose to issue a grade of NC (No Credit) and move to dissolve the Committee. For full information regarding the project/thesis continuation policy, please see the Academic Progress Policy .

  • Guidelines for Status Reports
  • Rubric for Status Reports

Step 4: Schedule Final Defense

By 5PM on Thursday of the third week of the quarter that a student is registered for their final thesis/project credits, the student must consult with their supervisory committee members to schedule a defense of their culminating work. Students should work closely with their committee chair to ensure that they are ready for their final examination and defense. The STEM Graduate Advising Office will send students the link to the online scheduling system each quarter to select a time/date for their defense. View details about defense format options and attendance requirements in the Defense Attendance Policy .

Step 5: Apply to Graduate

By 5:00 p.m. on Thursday of the third week of the quarter that a student is registered for their final degree credits the student must apply to graduate by filing a master’s degree request online . Students should work with the CSS Graduate Advisor and Committee Chair to plan their degree curriculum accordingly, so that their final capstone requirements serve as the culmination of their degree coursework. Students must be registered for credits during the quarter they want to graduate.

Step 6: Submit Draft of Final Paper/Thesis

Writing the final paper/thesis is a time intensive process. Students should plan ahead to schedule substantial time to compose and proofread their paper/thesis. A low-quality paper/thesis may lead to the delay of their defense. Early in the quarter that a student is registered for their final thesis/project credits, the student must review the following sample templates and discuss with their committee chair on the preference for the organization of their final project or thesis report:

  • Guidelines from the UW Graduate School for thesis document
  • Word template for thesis and project papers
  • Latex template for thesis and project papers

Two weeks before the defense , submit the title and abstract to the School of STEM Office of Graduate Studies to post on the Final Examination & Defense schedule.

At least seven days before the defense, the student must submit a final draft of their project paper or thesis to their committee for a preliminary reading. The purpose of this draft is to demonstrate to the Supervisory Committee that the student has achieved a Master’s level competency in computer science and software engineering, and that the student is ready to defend their work.

Step 7: Final Examination and Defense

The Final Examination and Defense consists of (a) a public student presentation, (b) a public questions and answers session, (c) a closed-door question and answer session between the student and the Supervisory Committee, (d) a brief private discussion among the Supervisory Committee, and (e) the Supervisory Committee announcing to the student the result of the Final Examination and Defense. A typical defense will last close to two hours. If a student does not pass the Final Examination and Defense, the Supervisory Committee will work with the student to decide upon the necessary additional work required for obtaining their Master’s degree. The final examination and defense must take place no later than the third day of the last week of the quarter (final exam week).

  • Presentation Guidelines
  • Presentation Rubric

Step 8: File your Thesis or Project Paper

After passing their final examination/defense, students must submit an electronic copy (PDF) of their final project paper or thesis, incorporating any post examination/defense revisions required by their Committee to the following entities in the order listed:

  • Supervisory Committee members, by the time/date given to students by their Chairs. This deadline will vary, based on the date of the student’s defense and scope of requested changes. Students must receive approval of final document from their Committee before submitting the paper to the STEM Graduate Office (all students) and the UW Graduate School (thesis students only).
  • STEM Graduate Office by 11:59 p.m. on the final day of the quarter in which the student intends to graduate. See submission instructions below.
  • Thesis Students only: UW Graduate School by 11:59 p.m. on the last day of the quarter in which the student intends to graduate. This step applies to thesis students only. See “Special Notes for Thesis Students” section below.

Failure to complete any of the above steps by the appropriate time/date will result in a delay of graduation.

Students submit their final document to the STEM Graduate Office ( [email protected] ) with their supervisory committee members copied on the email, and the email subject as “Final Thesis”, or “Final Project Report.”

Special Notes for Thesis Students

  • Formatting and process : Thesis students must meet formatting requirements, and follow a specific submission process. Students are urged to read the UW thesis formatting guidelines well in advance of their final examination, and to set up their ProQuest account early in the quarter they intend to graduate.
  • Master’s Supervisory Committee Form : Thesis students must submit a signed Master’s Supervisory Committee Form as part of the ETD submission process.

Additional Information

  • Summary of Master’s Guidelines & Rubrics Documents
  • Video Overview and Guideline

Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

computer-science-project

Here are 42 public repositories matching this topic..., vatshayan / final-year-project-cryptographic-technique-for-communication-system.

Top B.tech/M.tech Final Year Project "Design and Analysis of Cryptographic Technique for Communication System" with Project Code, Report, PPT, Synopsis, IEEE Research Paper and HD Video Explanation

  • Updated Dec 22, 2022
  • Jupyter Notebook

shamsulhusainansari / Simplify-Event-Management-System

"Simplify” is a Mobile Application which is Designed to Help the College Student Clubs to manage and promote their events easily and manage all the activities and tasks of the clubs in an easy way without the use of paper. This Application project is not only useful for the college student clubs but also for any community, society, NGO, or organ…

  • Updated Jul 21, 2022

Vatshayan / Steganography-Website-Project

Final Year Steganography Project with Code and Project report

  • Updated Aug 12, 2022

Vatshayan / Blockchain-and-Cryptography-Communication-System

Final Year Blockchain Project for Security of communication. [Security of Communication Increase through Use of Combination of Cryptography and Blockchain technology]

mymadhavyadav07 / Library-Management-System

A Client-Server Architecture Based Library Management System.

  • Updated Jun 28, 2023

paulveillard / cybsecurity-cs

A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity

  • Updated Mar 6, 2022

Vatshayan / Image-Chain-Blockchain-Project

Final Year ImageChain Blockchain Project is application of Blockchain. Project Include Code, Documents with Video Explanation

deepshig / Textual-Video-to-Speech-Interface

An interface to extract text from a video and convert it to speech

  • Updated May 29, 2020

Satharus / MinesweeperGame

Minesweeper Game

  • Updated May 6, 2018

HackyCoder0951 / E-Bookshop

The goal of this project is to design an e-bookshop named E-Bookshop.com that sells computer, technical, architecture, sports and various categories books. The book inventories are stored in MySQL database. Customers can access the e-bookshop web site through the World Wide Web. Customers will be able to search the database to find the books the…

  • Updated May 2, 2024

EdwinWalela / fixture-generator

Algorithm to generate football match fixtures (Data Structures and Algorithms Term Project)

  • Updated Jul 12, 2019

varunsingh87 / Frequency-Analysis-Simulator

A Java program that decrypts cryptograms without keys using frequency analysis

  • Updated Nov 27, 2023

SeaWar741 / ITC

Computer Science coursework and projects at Tec de Monterrey 👨‍🎓

  • Updated Jan 19, 2023

Vatshayan / Real-Estate-Price-Prediction-Using-Machine-Learning-Project

Real Estate Price Prediction Using Machine Learning Project with Code and Datatsets

  • Updated Jun 8, 2023

thetechnohack / Student-Management-System

It's a project work for class 12 Computer Science students learning Python programming language. Student Management system or Student Information System is a cli project which add ,delete,update,show the student details in a colorful manner. Hope u like it 🙂

  • Updated Apr 8, 2021

Vatshayan / Cryptography-final-year-project

Super cipher cryptography project which uses three types of key such as numerical and alphabets for providing triple layer of security. Final Year Cryptography Project with code and documents

  • Updated Jan 31, 2023

final-year-project-thesis-help / Final-Year-Project-Thesis

Config files for my GitHub profile.

  • Updated Jan 27, 2024

RootLeo00 / robot-coldstorage

Robot commanded by a server using QAktor system (DLS based on kotlin), deployed on RaspBerry 4B

  • Updated Sep 1, 2023

jofaval / tfcgs-daw

Trabajo final de Ciclo Formativo Grado Superior en Desarrollo de Aplicaciones Web (CFGS-DAW)

  • Updated Dec 21, 2021

ml3m / Map_Of_Computer_Science

computer science map in Obsidian

  • Updated Apr 27, 2024

Improve this page

Add a description, image, and links to the computer-science-project topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the computer-science-project topic, visit your repo's landing page and select "manage topics."

CPSC 490 Senior Project

Recent projects.

See https://zoo.cs.yale.edu/classes/cs490 (Yale only).

THE INSTRUCTIONS BELOW APPLY TO TERMS PRIOR TO FALL 2022. SEE CANVAS SITE FOR FALL 2022 AND LATER YCPS Description

Individual research intended to fulfill the senior requirement. Requires a faculty supervisor and the permission of the director of undergraduate studies. The student must submit a written report about the results of the project. May be taken more than once for credit.

Enrolling in CPSC 490

To enroll in CPSC 490, you must:

  • Register for CPSC 490.
  • Find an advisor.
  • Prepare a three-page description of your planned project. This is a written document, negotiated with your advisor, that must include a list of deliverables for your project.
  • Submit your project description, as approved by your advisor, by email in plain text or PDF format to the DUS. You should CC your advisor on this message. Joint majors should also CC their second reader and the DUS from the appropriate department.

Other than registering for CPSC 490, seniors must complete these requirements by noon on the fourth Thursday of classes.

Non-seniors and non-majors must complete these requirements and have their project approved by the DUS at least two days before your course schedule is due . Note that taking CPSC 490 as a non-senior requires special approval by the DUS, which will be granted only under exceptional circumstances.

Special requirements for joint majors

Joint majors must complete the same steps, but will need a second reader in their other department and must have their project approved by both DUSes.

For the Computer Science and Mathematics major, you will also need to present an oral report on the mathematical aspects of the project to the Mathematics faculty at the end of the semester.

End-of-Term Requirements

The following requirements must be completed by noon on the last day of reading period:

  • Use the script /c/cs490/bin/abstract in the Zoo to submit your thesis abstract. Just type the command and wait for prompt to submit your name, the title of your project, your advisor’s name, and a 250-to-300-word abstract. This information will be added to the on-line database of recent CPSC 490 projects.
  • must have a top-level page named index.html ;
  • should use only relative links for links between pages (they may be moved around); and
  • must include a copy of the description of the project as originally submitted at the start of the semester.
  • must include the final project report in PDF format.

These pages will become part of the on-line database of recent CPSC 490 projects. If you want to check your upload, the best way is to see how they look in the online database: click the link on the Recent Projects (above) and find your entry.

Note : You must satisfy these requirements even if you plan to continue your project next term. The only difference is that your electronic abstract, final report, and web pages should constitute an interim progress report (i.e., the level of detail must be the same as in the final versions, but the work described need not be complete).

Frequently Asked Questions

How do I choose a project?

There are two general approaches

  • Student sells project to professor : you get an idea, write a 3-page prospectus that describes the scope of the project and includes a list of deliverables, and find a faculty member willing to supervise the work (which may require changes in the prospectus)
  • Professor sells project to student ; a faculty member has a list of possible projects, and you select one (which may involve changes in the nature of the project)

and a host of possibilities in between.

What kind of project is appropriate?

The project should be (1) substantial, and (2) novel and including a research component. To be substantial, it should be more than just an extended homework assignment or final course project and should require that you learn more about some area of computer science. To give you some idea of the possibilities, the titles, abstracts, and web pages of recent projects are available online.

Regular courses meet 2 1/2 hours per week and require 2 to 3 additional hours per week for each hour of class. Using this as a guideline for what it takes to earn a course credit at Yale, the project should be something that you can complete in one semester (i.e., 14 weeks) working approximately 7 to 10 hours per week (i.e., in a total of 100-140 hours).

Note : You cannot be paid for your work on the project. Moreover, to allow others to build on your results, all code and data must be made available to the Yale community.

Who may advise a CPSC 490 project?

The official advisor (and thus the person who evaluates the work and assigns the grade) must be a faculty member with (1) a multi-year appointment at Yale; (2) a current appointment in the Department of Computer Science at Yale and (3) a Ph.D. degree or equivalent research qualification--490 should include a research component. However, the de facto advisor need not be, as long as the student meets with the official advisor at least once a month. Your final report should acknowledge all advisors.

How can I learn more about projects from past semesters?

The course web page contains the titles, abstracts, and web pages of recent projects. Copies of the written reports are kept in a circulating library managed by the departmental registrar (AKW 003).

When should I take CPSC 490?

Most students take the course during their final term of enrollment as the capstone of the program. However, students applying to graduate school should take it in the fall (or, with permission of the DUS, in the spring of their junior year) so that they can get a letter of recommendation from their advisor.

Ideally, planning for the project should begin the preceding term (at least to the extent of finding an advisor).

Taking CPSC 490 before your senior year requires special permission from the DUS, which will be granted only under exceptional circumstances. Non-seniors interested in research should consdier CPSC 290 instead.

Does CPSC 490 count as an advanced elective for the CS major or related majors?

No. CPSC 490 only gives you credit toward your 36-credit graduation requirement, and toward the senior project requirement in the major.

How often may I take CPSC 490?

You may take CPSC 490 more than once for Yale credit.

May I do a two-term project?

Yes. However, you must satisfy the end-of-term requirements at the end of each term, and your grade for each semester will be assigned at the end of that semester and will reflect what you accomplished. Thus in effect a two-term project is equivalent to two one-term projects, except that the work may be incomplete at the end of the first semester and the electronic abstract, written report, and web pages for the second semester describe the entire project.

Are group projects allowed?

Yes. However, each member of the group must work on a different part of the project, and your description, electronic abstract, final written report, and web pages must focus on your own contributions.

What are the “deliverables”?

Whatever you and your advisor decide you must complete by the end of the project. Possibilities include (but are not limited to) code, theorems, simulation studies, data analysis, written reports, and oral presentations.

How is CPSC 490 graded?

CPSC 490 is graded using the usual letter grade system. Typically your advisor will decide your grade.

Does my grade in CPSC 490 affect Distinction in Major?

Yes. If you take CPSC 490 for your senior project, you will need a grade of at least A- to qualify for Distinction in Major. CPSC 490 also counts toward both the numerator and denominator when calculating whether three-quarters of your credits in the major are A- or higher.

COMMENTS

  1. Computer Science Graduate Projects and Theses

    The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...

  2. Computer Science and Engineering Theses, Projects, and Dissertations

    A PROJECT FOR COMPUTER SCIENCE STUDENTS, Benjamin Alexander. PDF. LUNG CANCER TYPE CLASSIFICATION, Mohit Ramajibhai Ankoliya. PDF. HIGH-RISK PREDICTION FOR COVID-19 PATIENTS USING MACHINE LEARNING, Raja Kajuluri. PDF. IMPROVING INDIA'S TRAFFIC MANAGEMENT USING INTELLIGENT TRANSPORTATION SYSTEMS, Umesh Makhloga. PDF.

  3. Computer Science Research Topics (+ Free Webinar)

    Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you've landed on this post, chances are you're looking for a computer science-related research topic, but aren't sure where to start.Here, we'll explore a variety of CompSci & IT-related research ideas and topic thought-starters ...

  4. Computer Science Theses, Dissertations, and Masters Projects

    Theses/Dissertations from 2023. Appearance Driven Reflectance Modeling, James Christopher Bieron. Domain-Specific Optimization For Machine Learning System, Yu Chen. Intelligent Software Tooling For Improving Software Development, Nathan Allen Cooper. Amsel Criteria Based Computer Vision For Bacterial Vaginosis Diagnosis, Daniel Edwards Highland.

  5. Computer Science and Engineering Theses and Dissertations

    Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications, Arup Kanti Dey. PDF. AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing, Hamza Elhamdadi. PDF. Automatic Detection of Vehicles in Satellite Images for Economic Monitoring, Cole Hill. PDF

  6. Computer Science Theses and Dissertations

    Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF. Improved Protein Sequence Alignments Using Deep Learning, Seyed Sepehr Ashrafzadeh.

  7. Thesis Projects: A Guide for Students in Computer Science and

    In this book we will use the term 'thesis project', and in some cases, for the sake of simplicity, just 'project'. This book focuses on thesis projects within the computing discipline. Thus, the type of project discussed in this book is in line with the capstone format described in the ACM/IEEE Computing Curricula 2001 Computer Science ...

  8. MIT Theses

    MIT's DSpace contains more than 58,000 theses completed at MIT dating as far back as the mid 1800's. Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded.

  9. Computer Science Masters Theses

    COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong

  10. Senior Thesis Archive

    2018. Winner, 2018 Best Senior Thesis Award. A Crash-Safe Key-Value Store Using Chained Copy-on-Write B-trees. Bruno Castro-Karney, supervised by Xi Wang. BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains. Linxing (Preston) Jiang, supervised by Raj Rao.

  11. Senior Thesis :: Harvard CS Concentration

    Senior Thesis. A senior thesis is more than a big project write-up. It is documentation of an attempt to contribute to the general understanding of some problem of computer science, together with exposition that sets the work in the context of what has come before and what might follow. In computer science, some theses involve building systems ...

  12. Master's Theses and Projects

    Master's Theses and Projects. The objective of the mandatory Master's Thesis or Project requirement is to provide a culminating educational experience, where the student, under the supervision of a faculty member, conducts an individual study employing concepts and methods learned in the program to solve a problem of significant importance from ...

  13. Undergraduate Research Topics

    Available for single-semester IW and senior thesis advising, 2024-2025. Research Areas: computational complexity, algorithms, applied probability, computability over the real numbers, game theory and mechanism design, information theory. Independent Research Topics: Topics in computational and communication complexity.

  14. Brown CS: Master's Project Reports

    Zhang, Minrui. CS2980: Model-based Semantic Compression in Database Project Report (478.9 KB) Zhang, Shu. Column-based Database Semantic Compression and Prediction-based Query Optimization (551.8 KB) Zhong, Zhigang. Fractal Tree Implementation with Intel Hardware Supported Transactional Memory (106.1 KB)

  15. Computer Science Library Research Guide

    How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...

  16. PDF Writing a Computer Science Thesis

    Abstract Writing a computer science thesis is a considerable challenge for stu- dents. In this text, we give some tips and structure to write a great thesis. We will go over the research process in general, finding a topic, writing an expos´e, and thesis structure. At the end, we include some tips on researching and writing.

  17. Thesis Guide

    My thesis project was the most rewarding experience of my computer science studies. Unfortunately, many students suffer theirs as frustrating, tedious and with few opportunities for personal growth. In this guide, I want to share the pitfalls and best practices from supervising 50+ thesis projects in computer science at TUM. I hope that it helps…

  18. Thesis Projects: A Guide for Students in Computer Science and

    Jan 2008. Thesis Projects. This book outlines a general process for carrying out thesis projects, and it embraces the following components as fundamentally important: (1) identifying the question ...

  19. Projects and Theses for Applied Computer Science, M.S

    All students are required to complete CIS 693, or both CIS 690 and 695 to complete the Master's degree. You can find helpful information on getting started and general expectations for both a project and thesis below. Before enrolling in any research course students are required to complete an online course in research integrity (select "Online RCR Training" at the top of the page) prior to ...

  20. Thesis/Project Student Process

    Thesis/Project Student Process. The following process applies to all Division of Computing & Software Systems (CSS) graduate students, regardless of degree program (CSSE or CSE) or thesis/project goals. ... draft is to demonstrate to the Supervisory Committee that the student has achieved a Master's level competency in computer science and ...

  21. computer-science-project · GitHub Topics · GitHub

    To associate your repository with the computer-science-project topic, visit your repo's landing page and select "manage topics." GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.

  22. CPSC 490 Senior Project

    For the Computer Science and Mathematics major, ... Use the script /c/cs490/bin/abstract in the Zoo to submit your thesis abstract. Just type the command and wait for prompt to submit your name, the title of your project, your advisor's name, and a 250-to-300-word abstract. ... Professor sells project to student; a faculty member has a list ...