ScholarWorks
Home > Engineering > Computer Science > Computer Science Graduate Projects
Computer Science Graduate Projects and Theses
Theses/dissertations from 2023 2023.
High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal
Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan
Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah
Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker
Fake News Detection Using Narrative Content and Discourse , Hongmin Kim
Anomaly Detection Using Graph Neural Network , Bishal Lakha
Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola
Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George
Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten
Theses/Dissertations from 2022 2022
Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck
Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones
Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi
Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee
Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn
Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy
Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda
Hate Speech Detection Using Textual and User Features , Rohan Raut
Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib
Characterization and Mitigation of False Information on the Web , Anu Shrestha
Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez
Theses/Dissertations from 2021 2021
Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen
Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar
Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green
Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz
Modeling Real and Fake News Sharing in Social Networks , Abishai Joy
Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy
Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton
Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts
A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar
Actors for the Internet of Things , Arjun Shukla
Theses/Dissertations from 2020 2020
Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black
Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke
Polyhedral+Dataflow Graphs , Eddie C. Davis
Improving Spellchecking for Children: Correction and Design , Brody Downs
A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake
Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung
Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi
Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi
Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill
Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin
Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli
A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips
Theses/Dissertations from 2019 2019
Edge-Assisted Workload-Aware Image Processing System , Anil Acharya
MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick
Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman
Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas
A Hybrid Model to Detect Fake News , Indhumathi Gurunathan
Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris
UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani
Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh
Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar
Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan
Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo
Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury
Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya
BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran
FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota
Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader
Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla
Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian
Theses/Dissertations from 2018 2018
Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya
Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah
Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri
Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour
Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha
Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton
Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira
Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa
Theses/Dissertations from 2017 2017
Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella
Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli
CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly
Predicting Friendship Strength in Facebook , Nitish Dhakal
Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi
Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley
Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala
Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes
A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal
Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki
Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li
The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship
Towards Automatic Repair of XACML Policies , Shuai Peng
Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma
Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez
Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright
Theses/Dissertations from 2016 2016
Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.
When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic
Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh
Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt
Towards Multipurpose Readability Assessment , Ion Madrazo
Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson
CEST: City Event Summarization using Twitter , Deepa Mallela
Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami
Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas
Massively Parallel Algorithm for Solving the Eikonal Equation on Multiple Accelerator Platforms , Anup Shrestha
A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption , Srisarguru Sridhar
Dynamic Machine Level Resource Allocation to Improve Tasking Performance Across Multiple Processes , Richard Walter Thatcher
Theses/Dissertations from 2015 2015
Developing an Application for Evolutionary Search for Computational Models of Cellular Development , Nicolas Scott Cornia
Accelerated Radar Signal Processing in Large Geophysical Datasets , Ravi Preesha Geetha
Integrity Coded Databases (ICDB) – Protecting Integrity for Outsourced Databases , Archana Nanjundarao
- Collections
- Disciplines
- SelectedWorks Gallery
- Albertsons Library
- Division of Research
- Graduate College
Advanced Search
- Notify me via email or RSS
Author Corner
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
Home > College of Natural Sciences > COMPUTERSCI-ENGINEERING > COMPUTERSCI-ENGINEERING-ETD
Computer Science and Engineering Theses, Projects, and Dissertations
Theses/projects/dissertations from 2024 2024.
TRAFFIC ANALYSIS OF CITIES IN SAN BERNARDINO COUNTY , Sai Kalyan Ayyagari
Recommendation System using machine learning for fertilizer prediction , Durga Rajesh Bommireddy
Classification of Remote Sensing Image Data Using Rsscn-7 Dataset , Satya Priya Challa
Cultural Awareness Application , Bharat Gupta
PREDICTING HOSPITALIZATION USING ARTIFICIAL INTELLIGENCE , Sanath Hiremath
AUTOMATED BRAIN TUMOR CLASSIFIER WITH DEEP LEARNING , venkata sai krishna chaitanya kandula
TRUCK TRAFFIC ANALYSIS IN THE INLAND EMPIRE , Bhavik Khatri
A SMART HYBRID ENHANCED RECOMMENDATION AND PERSONALIZATION ALGORITHM USING MACHINE LEARNING , Aswin Kumar Nalluri
Theses/Projects/Dissertations from 2023 2023
CLASSIFICATION OF LARGE SCALE FISH DATASET BY DEEP NEURAL NETWORKS , Priyanka Adapa
GEOSPATIAL WILDFIRE RISK PREDICTION USING DEEP LEARNING , Abner Alberto Benavides
HUMAN SUSPICIOUS ACTIVITY DETECTION , Nilamben Bhuva
MAX FIT EVENT MANAGEMENT WITH SALESFORCE , AKSHAY DAGWAR
MELANOMA DETECTION BASED ON DEEP LEARNING NETWORKS , Sanjay Devaraneni
Heart Disease Prediction Using Binary Classification , Virendra Sunil Devare
CLASSIFICATION OF THORAX DISEASES FROM CHEST X-RAY IMAGES , Sharad Jayusukhbhai Dobariya
WEB BASED MANAGEMENT SYSTEM FOR HOUSING SOCIETY , Likhitha Reddy Eddala
Sales and Stock Management System , Rashmika Gaddam Ms
CONTACTLESS FOOD ORDERING SYSTEM , Rishivar Kumar Goli
RESTAURANT MANAGEMENT WEBSITE , Akhil Sai Gollapudi
DISEASE OF LUNG INFECTION DETECTION USING CNN MODEL -BAYESIAN OPTIMIZATION , poojitha gutha
DATA POISONING ATTACKS ON PHASOR MEASUREMENT UNIT DATA , Rutuja Sanjeev Haridas
CRIME MAPPING ANALYSIS USING WEB APPLICATION. , Lavanya Krishnappa
A LONG-TERM FUNDS PREDICTOR BASED ON DEEP LEARNING , SHUIYI KUANG
LIVER SEGMENTATION AND LESION DETECTION IN MEDICAL IMAGES USING A DEEP LEARNING-BASED U-NET MODEL , Kaushik Mahida
PHASOR MEASUREMENT UNIT DATA VISUALIZATION , Nikhila Mandava
TWITTER POLICING , Hemanth Kumar Medisetty
TRANSACTION MANAGEMENT SYSYEM FOR A PUBLISHER , HASSAIN SHAREEF MOHAMMED JR
LOBANGU: AN OPTICAL CHARACTER RECOGNITION RECEIPT MANAGEMENT APP FOR HEALTH CENTER PHARMACIES IN THE D.R.CONGO AND SURROUNDING EASTERN AFRICAN COUNTRIES , Bénis Munganga
PREDICTIVE MODEL FOR CFPB CONSUMER COMPLAINTS , Vyshnavi Nalluri
REVIEW CLASSIFICATION USING NATURAL LANGUAGE PROCESSING AND DEEP LEARNING , Brian Nazareth
Brain Tumor Detection Using MRI Images , Mayur Patel
QUIZ WEB APPLICATION , Dipti Rathod
HYPOTHYROID DISEASE ANALYSIS BY USING MACHINE LEARNING , SANJANA SEELAM
Pillow Based Sleep Tracking Device Using Raspberry Pi , Venkatachalam Seviappan
FINSERV ANDROID APPLICATION , Harsh Piyushkumar Shah
AUTOMATED MEDICAL NOTES LABELLING AND CLASSIFICATION USING MACHINE LEARNING , Akhil Prabhakar Thota
GENETIC PROGRAMMING TO OPTIMIZE PERFORMANCE OF MACHINE LEARNING ALGORITHMS ON UNBALANCED DATA SET , Asitha Thumpati
GOVERNMENT AID PORTAL , Darshan Togadiya
GENERAL POPULATION PROJECTION MODEL WITH CENSUS POPULATION DATA , Takenori Tsuruga
LUNG LESION SEGMENTATION USING DEEP LEARNING APPROACHES , Sree Snigdha Tummala
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING , Saranya Valleri
Machine Learning for Kalman Filter Tuning Prediction in GPS/INS Trajectory Estimation , Peter Wright
Theses/Projects/Dissertations from 2022 2022
LEARN PROGRAMMING IN VIRTUAL REALITY? A PROJECT FOR COMPUTER SCIENCE STUDENTS , Benjamin Alexander
LUNG CANCER TYPE CLASSIFICATION , Mohit Ramajibhai Ankoliya
HIGH-RISK PREDICTION FOR COVID-19 PATIENTS USING MACHINE LEARNING , Raja Kajuluri
IMPROVING INDIA’S TRAFFIC MANAGEMENT USING INTELLIGENT TRANSPORTATION SYSTEMS , Umesh Makhloga
DETECTION OF EPILEPSY USING MACHINE LEARNING , Balamurugan Murugesan
SOCIAL MOBILE APPLICATION: UDROP , Mahmoud Oraiqat
Improved Sensor-Based Human Activity Recognition Via Hybrid Convolutional and Recurrent Neural Networks , Sonia Perez-Gamboa
College of Education FileMaker Extraction and End-User Database Development , Andrew Tran
DEEP LEARNING EDGE DETECTION IN IMAGE INPAINTING , Zheng Zheng
Theses/Projects/Dissertations from 2021 2021
A General Conversational Chatbot , Vipin Nambiar
Verification System , Paras Nigam
DESKTOP APPLICATION FOR THE PUZZLE BOARD GAME “RUSH HOUR” , Huanqing Nong
Ahmedabad City App , Rushabh Picha
COMPUTER SURVEILLANCE SYSTEM USING WI-FI FOR ANDROID , Shashank Reddy Saireddy
ANDROID PARKING SYSTEM , Vishesh Reddy Sripati
Sentiment Analysis: Stock Index Prediction with Multi-task Learning and Word Polarity Over Time , Yue Zhou
Theses/Projects/Dissertations from 2020 2020
BUBBLE-IN DIGITAL TESTING SYSTEM , Chaz Hampton
FEEDBACK REVIEW SYSTEM USING SENTIMENT ANALYSIS , Vineeth Kukkamalla
WEB APPLICATION FOR MOVIE PERFORMANCE PREDICTION , Devalkumar Patel
Theses/Projects/Dissertations from 2019 2019
REVIEWS TO RATING CONVERSION AND ANALYSIS USING MACHINE LEARNING TECHNIQUES , Charitha Chanamolu
EASY EXAM , SARTHAK DABHI
EXTRACT TRANSFORM AND LOADING TOOL FOR EMAIL , Amit Rajiv Lawanghare
VEHICLE INFORMATION SYSTEM USING BLOCKCHAIN , Amey Zulkanthiwar
Theses/Projects/Dissertations from 2018 2018
USING AUTOENCODER TO REDUCE THE LENGTH OF THE AUTISM DIAGNOSTIC OBSERVATION SCHEDULE (ADOS) , Sara Hussain Daghustani
California State University, San Bernardino Chatbot , Krutarth Desai
ORGANIZE EVENTS MOBILE APPLICATION , Thakshak Mani Chandra Reddy Gudimetla
SOCIAL NETWORK FOR SOFTWARE DEVELOPERS , Sanket Prabhakar Jadhav
VIRTUALIZED CLOUD PLATFORM MANAGEMENT USING A COMBINED NEURAL NETWORK AND WAVELET TRANSFORM STRATEGY , Chunyu Liu
INTER PROCESS COMMUNICATION BETWEEN TWO SERVERS USING MPICH , Nagabhavana Narla
SENSOR-BASED HUMAN ACTIVITY RECOGNITION USING BIDIRECTIONAL LSTM FOR CLOSELY RELATED ACTIVITIES , Arumugam Thendramil Pavai
NEURAL NETWORK ON VIRTUALIZATION SYSTEM, AS A WAY TO MANAGE FAILURE EVENTS OCCURRENCE ON CLOUD COMPUTING , Khoi Minh Pham
EPICCONFIGURATOR COMPUTER CONFIGURATOR AND CMS PLATFORM , IVO A. TANTAMANGO
STUDY ON THE PATTERN RECOGNITION ENHANCEMENT FOR MATRIX FACTORIZATIONS WITH AUTOMATIC RELEVANCE DETERMINATION , hau tao
Theses/Projects/Dissertations from 2017 2017
CHILDREN’S SOCIAL NETWORK: KIDS CLUB , Eiman Alrashoud
MULTI-WAY COMMUNICATION SYSTEM , S. Chinnam
WEB APPLICATION FOR GRADUATE COURSE RECOMMENDATION SYSTEM , Sayali Dhumal
MOBILE APPLICATION FOR ATTENDANCE SYSTEM COYOTE-ATTENDANCE , Sindhu Hari
WEB APPLICATION FOR GRADUATE COURSE ADVISING SYSTEM , Sanjay Karrolla
Custom T-Shirt Designs , Ranjan Khadka
STUDENT CLASS WAITING LIST ENROLLMENT , AISHWARYA LACHAGARI
ANDROID MOBILE APPLICATION FOR HOSPITAL EXECUTIVES , Vihitha Nalagatla
PIPPIN MACHINE , Kiran Reddy Pamulaparthy
SOUND MODE APPLICATION , Sindhuja Pogaku
I2MAPREDUCE: DATA MINING FOR BIG DATA , Vishnu Vardhan Reddy Sherikar
COMPARING AND IMPROVING FACIAL RECOGNITION METHOD , Brandon Luis Sierra
NATURAL LANGUAGE PROCESSING BASED GENERATOR OF TESTING INSTRUMENTS , Qianqian Wang
AUTOMATIC GENERATION OF WEB APPLICATIONS AND MANAGEMENT SYSTEM , Yu Zhou
Theses/Projects/Dissertations from 2016 2016
CLOTH - MODELING, DEFORMATION, AND SIMULATION , Thanh Ho
CoyoteLab - Linux Containers for Educational Use , Michael D. Korcha
PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS , Essa Yahya M Muharish
DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP , Bir Apaar Singh Sodhi
Theses/Projects/Dissertations from 2015 2015
APPLY DATA CLUSTERING TO GENE EXPRESSION DATA , Abdullah Jameel Abualhamayl Mr.
Density Based Data Clustering , Rayan Albarakati
Developing Java Programs on Android Mobile Phones Using Speech Recognition , Santhrushna Gande
THE DESIGN AND IMPLEMENTATION OF AN ADAPTIVE CHESS GAME , Mehdi Peiravi
CALIFORNIA STATE UNIVERSITY SAN BERNARDINO WiN GPS , Francisco A. Ron
ESTIMATION ON GIBBS ENTROPY FOR AN ENSEMBLE , Lekhya Sai Sake
A WEB-BASED TEMPERATURE MONITORING SYSTEM FOR THE COLLEGE OF ARTS AND LETTERS , Rigoberto Solorio
Advanced Search
- Notify me via email or RSS
- Department, Program, or Office
- Disciplines
Author Corner
- School of Computer Science and Engineering Website
A service of the John M. Pfau Library
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright Acrobat Reader
Research Topics & Ideas: CompSci & IT
50+ Computer Science Research Topic Ideas To Fast-Track Your Project
Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you’ve landed on this post, chances are you’re looking for a computer science-related research topic , but aren’t sure where to start. Here, we’ll explore a variety of CompSci & IT-related research ideas and topic thought-starters, including algorithms, AI, networking, database systems, UX, information security and software engineering.
NB – This is just the start…
The topic ideation and evaluation process has multiple steps . In this post, we’ll kickstart the process by sharing some research topic ideas within the CompSci domain. This is the starting point, but to develop a well-defined research topic, you’ll need to identify a clear and convincing research gap , along with a well-justified plan of action to fill that gap.
If you’re new to the oftentimes perplexing world of research, or if this is your first time undertaking a formal academic research project, be sure to check out our free dissertation mini-course. In it, we cover the process of writing a dissertation or thesis from start to end. Be sure to also sign up for our free webinar that explores how to find a high-quality research topic.
Overview: CompSci Research Topics
- Algorithms & data structures
- Artificial intelligence ( AI )
- Computer networking
- Database systems
- Human-computer interaction
- Information security (IS)
- Software engineering
- Examples of CompSci dissertation & theses
Topics/Ideas: Algorithms & Data Structures
- An analysis of neural network algorithms’ accuracy for processing consumer purchase patterns
- A systematic review of the impact of graph algorithms on data analysis and discovery in social media network analysis
- An evaluation of machine learning algorithms used for recommender systems in streaming services
- A review of approximation algorithm approaches for solving NP-hard problems
- An analysis of parallel algorithms for high-performance computing of genomic data
- The influence of data structures on optimal algorithm design and performance in Fintech
- A Survey of algorithms applied in internet of things (IoT) systems in supply-chain management
- A comparison of streaming algorithm performance for the detection of elephant flows
- A systematic review and evaluation of machine learning algorithms used in facial pattern recognition
- Exploring the performance of a decision tree-based approach for optimizing stock purchase decisions
- Assessing the importance of complete and representative training datasets in Agricultural machine learning based decision making.
- A Comparison of Deep learning algorithms performance for structured and unstructured datasets with “rare cases”
- A systematic review of noise reduction best practices for machine learning algorithms in geoinformatics.
- Exploring the feasibility of applying information theory to feature extraction in retail datasets.
- Assessing the use case of neural network algorithms for image analysis in biodiversity assessment
Topics & Ideas: Artificial Intelligence (AI)
- Applying deep learning algorithms for speech recognition in speech-impaired children
- A review of the impact of artificial intelligence on decision-making processes in stock valuation
- An evaluation of reinforcement learning algorithms used in the production of video games
- An exploration of key developments in natural language processing and how they impacted the evolution of Chabots.
- An analysis of the ethical and social implications of artificial intelligence-based automated marking
- The influence of large-scale GIS datasets on artificial intelligence and machine learning developments
- An examination of the use of artificial intelligence in orthopaedic surgery
- The impact of explainable artificial intelligence (XAI) on transparency and trust in supply chain management
- An evaluation of the role of artificial intelligence in financial forecasting and risk management in cryptocurrency
- A meta-analysis of deep learning algorithm performance in predicting and cyber attacks in schools
Topics & Ideas: Networking
- An analysis of the impact of 5G technology on internet penetration in rural Tanzania
- Assessing the role of software-defined networking (SDN) in modern cloud-based computing
- A critical analysis of network security and privacy concerns associated with Industry 4.0 investment in healthcare.
- Exploring the influence of cloud computing on security risks in fintech.
- An examination of the use of network function virtualization (NFV) in telecom networks in Southern America
- Assessing the impact of edge computing on network architecture and design in IoT-based manufacturing
- An evaluation of the challenges and opportunities in 6G wireless network adoption
- The role of network congestion control algorithms in improving network performance on streaming platforms
- An analysis of network coding-based approaches for data security
- Assessing the impact of network topology on network performance and reliability in IoT-based workspaces
Topics & Ideas: Database Systems
- An analysis of big data management systems and technologies used in B2B marketing
- The impact of NoSQL databases on data management and analysis in smart cities
- An evaluation of the security and privacy concerns of cloud-based databases in financial organisations
- Exploring the role of data warehousing and business intelligence in global consultancies
- An analysis of the use of graph databases for data modelling and analysis in recommendation systems
- The influence of the Internet of Things (IoT) on database design and management in the retail grocery industry
- An examination of the challenges and opportunities of distributed databases in supply chain management
- Assessing the impact of data compression algorithms on database performance and scalability in cloud computing
- An evaluation of the use of in-memory databases for real-time data processing in patient monitoring
- Comparing the effects of database tuning and optimization approaches in improving database performance and efficiency in omnichannel retailing
Topics & Ideas: Human-Computer Interaction
- An analysis of the impact of mobile technology on human-computer interaction prevalence in adolescent men
- An exploration of how artificial intelligence is changing human-computer interaction patterns in children
- An evaluation of the usability and accessibility of web-based systems for CRM in the fast fashion retail sector
- Assessing the influence of virtual and augmented reality on consumer purchasing patterns
- An examination of the use of gesture-based interfaces in architecture
- Exploring the impact of ease of use in wearable technology on geriatric user
- Evaluating the ramifications of gamification in the Metaverse
- A systematic review of user experience (UX) design advances associated with Augmented Reality
- A comparison of natural language processing algorithms automation of customer response Comparing end-user perceptions of natural language processing algorithms for automated customer response
- Analysing the impact of voice-based interfaces on purchase practices in the fast food industry
Topics & Ideas: Information Security
- A bibliometric review of current trends in cryptography for secure communication
- An analysis of secure multi-party computation protocols and their applications in cloud-based computing
- An investigation of the security of blockchain technology in patient health record tracking
- A comparative study of symmetric and asymmetric encryption algorithms for instant text messaging
- A systematic review of secure data storage solutions used for cloud computing in the fintech industry
- An analysis of intrusion detection and prevention systems used in the healthcare sector
- Assessing security best practices for IoT devices in political offices
- An investigation into the role social media played in shifting regulations related to privacy and the protection of personal data
- A comparative study of digital signature schemes adoption in property transfers
- An assessment of the security of secure wireless communication systems used in tertiary institutions
Topics & Ideas: Software Engineering
- A study of agile software development methodologies and their impact on project success in pharmacology
- Investigating the impacts of software refactoring techniques and tools in blockchain-based developments
- A study of the impact of DevOps practices on software development and delivery in the healthcare sector
- An analysis of software architecture patterns and their impact on the maintainability and scalability of cloud-based offerings
- A study of the impact of artificial intelligence and machine learning on software engineering practices in the education sector
- An investigation of software testing techniques and methodologies for subscription-based offerings
- A review of software security practices and techniques for protecting against phishing attacks from social media
- An analysis of the impact of cloud computing on the rate of software development and deployment in the manufacturing sector
- Exploring the impact of software development outsourcing on project success in multinational contexts
- An investigation into the effect of poor software documentation on app success in the retail sector
CompSci & IT Dissertations/Theses
While the ideas we’ve presented above are a decent starting point for finding a CompSci-related research topic, they are fairly generic and non-specific. So, it helps to look at actual dissertations and theses to see how this all comes together.
Below, we’ve included a selection of research projects from various CompSci-related degree programs to help refine your thinking. These are actual dissertations and theses, written as part of Master’s and PhD-level programs, so they can provide some useful insight as to what a research topic looks like in practice.
- An array-based optimization framework for query processing and data analytics (Chen, 2021)
- Dynamic Object Partitioning and replication for cooperative cache (Asad, 2021)
- Embedding constructural documentation in unit tests (Nassif, 2019)
- PLASA | Programming Language for Synchronous Agents (Kilaru, 2019)
- Healthcare Data Authentication using Deep Neural Network (Sekar, 2020)
- Virtual Reality System for Planetary Surface Visualization and Analysis (Quach, 2019)
- Artificial neural networks to predict share prices on the Johannesburg stock exchange (Pyon, 2021)
- Predicting household poverty with machine learning methods: the case of Malawi (Chinyama, 2022)
- Investigating user experience and bias mitigation of the multi-modal retrieval of historical data (Singh, 2021)
- Detection of HTTPS malware traffic without decryption (Nyathi, 2022)
- Redefining privacy: case study of smart health applications (Al-Zyoud, 2019)
- A state-based approach to context modeling and computing (Yue, 2019)
- A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks (Solomon, 2019)
- HRSB-Tree for Spatio-Temporal Aggregates over Moving Regions (Paduri, 2019)
Looking at these titles, you can probably pick up that the research topics here are quite specific and narrowly-focused , compared to the generic ones presented earlier. This is an important thing to keep in mind as you develop your own research topic. That is to say, to create a top-notch research topic, you must be precise and target a specific context with specific variables of interest . In other words, you need to identify a clear, well-justified research gap.
Fast-Track Your Research Topic
If you’re still feeling a bit unsure about how to find a research topic for your Computer Science dissertation or research project, check out our Topic Kickstarter service.
You Might Also Like:
Investigating the impacts of software refactoring techniques and tools in blockchain-based developments.
Steps on getting this project topic
I want to work with this topic, am requesting materials to guide.
Information Technology -MSc program
It’s really interesting but how can I have access to the materials to guide me through my work?
That’s my problem also.
Investigating the impacts of software refactoring techniques and tools in blockchain-based developments is in my favour. May i get the proper material about that ?
BLOCKCHAIN TECHNOLOGY
I NEED TOPIC
Submit a Comment Cancel reply
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
- Print Friendly
Home > Arts and Sciences > Computer Science > COMPUTERSCIENCEETD
Computer Science Theses, Dissertations, and Masters Projects
Theses/dissertations from 2023 2023.
Appearance Driven Reflectance Modeling , James Christopher Bieron
Domain-Specific Optimization For Machine Learning System , Yu Chen
Intelligent Software Tooling For Improving Software Development , Nathan Allen Cooper
Amsel Criteria Based Computer Vision For Bacterial Vaginosis Diagnosis , Daniel Edwards Highland
Learning-Based Ubiquitous Sensing For Solving Real-World Problems , Woosub Jung
Recoverable Memory Bank For Class-Incremental Learning , Jiangtao Kong
A Reevaluation Of Why Crypto-Detectors Fail: A Systematic Revaluation Of Cryptographic Misuse Detection Techniques , Scott Marsden
Achieving Real-Time Dnn Execution On Mobile Devices With Compiler Optimizations , Wei Niu
Matfusion: A Generative Diffusion Model For Svbrdf Capture , Samuel Lee Sartor
A Comprehensive Study Of Bills Of Materials For Software Systems , Trevor Stalnaker
Program Analysis For Software Engineers And Students , Jialiang Tan
Efficient Parallelization Of Irregular Applications On Gpu Architectures , Qihan Wang
Exploring Software Licensing Issues Faced By Legal Practitioners , Nathan James Wintersgill
Theses/Dissertations from 2022 2022
Flexible And Robust Iterative Methods For The Partial Singular Value Decomposition , Steven Goldenberg
Techniques For Accelerating Large-Scale Automata Processing , Hongyuan Liu
Enabling Practical Evaluation Of Privacy Of Commodity-Iot , Sunil Manandhar
Exploring Multi-Level Parallelism For Graph-Based Applications Via Algorithm And System Co-Design , Zhen Peng
Communication And Computation Efficient Deep Learning , Zeyi Tao
Practical Gpgpu Application Resilience Estimation And Fortification , Lishan Yang
Theses/Dissertations from 2021 2021
On Supporting Android Software Developers And Testers , Carlos Eduardo Bernal Cardenas
Data-Driven Reflectance Estimation Under Natural Lighting , Victoria Cooper
Rethinking Cache Hierarchy And Interconnect Design For Next-Generation Gpus , Mohamed Assem Abd ElMohsen Ibrahim
Low-Overhead Techniques For Secure And Reliable Gpu Computing , Gurunath Kadam
Revisiting Isolation For System Security And Efficiency In The Era Of Internet Of Things , Lele Ma
Epidemic Spread Modeling For Covid-19 Using Hard Data , Anna Schmedding
Performance Optimization With An Integrated View Of Compiler And Application Knowledge , Ruiqin Tian
High-Dimensional Machine Learning Models In Fintech , Qiong Wu
Distributed Byzantine Tolerant Machine Learning , Qi Xia
Combining Performance Profiling And Modeling For Accuracy And Efficiency , Hao Xu
Theses/Dissertations from 2020 2020
Single Image Direct-Global Illumination Separation , Zhaoliang Duan
Exploring Heterogeneous Architectures With Tools And Applications , Du Shen
Understanding Performance Inefficiencies In Native And Managed Languages , Pengfei Su
Design And Analysis Of Memory Management Techniques For Next-Generation Gpus , Haonan Wang
Dietary Monitoring Through Sensing Mastication Dynamics , Shuangquan Wang
Hardware-Assisted Security Mechanisms On Arm-Based Multi-Core Processors , Shengye Wan
Wearable Technology For Healthcare And Athletic Performance , Amanda Annette Watson
Deep Learning In Software Engineering , Cody Watson
Pinpointing Software Inefficiencies With Profiling , Shasha Wen
Motion Sensors-Based Human Behavior Recognition And Analysis , Hongyang Zhao
On Cross-Series Machine Learning Models , Xiaodan Zhu
Theses/Dissertations from 2019 2019
Research on Efficiency and Security for Emerging Distributed Applications , Zijiang Hao
On Enhancing Security of Password-Based Authentication , Yue Li
Improving Wifi Sensing And Networking With Channel State Information , Yongsen Ma
GPGPU Reliability Analysis: From Applications to Large Scale Systems , Bin Nie
Learning Code Transformations via Neural Machine Translation , Michele Tufano
Theses/Dissertations from 2018 2018
Usability, Efficiency and Security of Personal Computing Technologies , Nancy Carter
Investigating Emerging Security Threats in Clouds and Data Centers , Xing Gao
Mixed-Weight Open Locating-Dominating Sets , Robin M. Givens
On Improving (Non)Functional Testing , Qi Luo
Automating Software Development for Mobile Computing Platforms , Kevin Patrick Moran
Exploring New Paradigms for Mobile Edge Computing , Yutao Tang
Assisting Software Developers With License Compliance , Christopher Vendome
Understanding and Enriching Randomness Within Resource-Constrained Devices , Kyle Wallace
Enhancing Usability, Security, and Performance in Mobile Computing , Shanhe Yi
Quantifying and Explaining Causal Effects of World Bank Aid Projects , Jianing Simulation Zhao
Theses/Dissertations from 2017 2017
On The Impact of Internet Naming Evolution: Deployment, Performance, and Security Implications , Shuai Hao
Security Enhancements in Voice Over Ip Networks , Seyed Amir Iranmanesh
Automatically Documenting Software Artifacts , Boyang Li
Data-Driven Radiometric Photo-Linearization , Han Li
An Investigation of Power Saving and Privacy Protection on Smartphones , Dachuan Liu
Enhancing Energy Efficiency and Privacy Protection of Smart Devices , Ge Peng
Enhancing Usability and Security through Alternative Authentication Methods , Nicolas Jorge Van Balen
Deep Learning Software Repositories , Martin White
Workload Prediction for Efficient Performance Isolation and System Reliability , Ji Xue
Exploiting Power for Smartphone Security and Privacy , Qing Yang
Theses/Dissertations from 2016 2016
Enhancing The Sensing Capabilities of Mobile and Embedded Systems , Daniel George Graham
Methods for Estimating The Diagonal of Matrix Functions , Jesse Harrison Laeuchli
Supporting Evolution and Maintenance of android Apps , Mario Linares-Vasquez
The Impact of Surface Normals on Appearance , Kathleen Dorothy Moore
Enhancing Mobile Device System using Information from Users and Upper Layers , Dung Nguyen Tien
Security and Privacy for Ubiquitous Mobile Devices , Edmund Novak
Security Supports for Cyber-Physical System and its Communication Networks , Zhengrui Qin
Rethinking Privacy and Security Mechanisms in Online Social Networks , Xin Ruan
Protecting Web Contents Against Persistent Crawlers , Shengye Wan
Managing Micro Vms in Amazon Ec2 , Jiawei Wen
Algorithms for Large Scale Problems in Eigenvalue and Svd Computations and in Big Data Applications , Lingfei Wu
Investigating Fraudulent and Privacy Activities in Online Business. , Haitao Xu
Understanding Security Threats in Cloud , Zhang Xu
Workload Interleaving with Performance Guarantees in Data Centers , Feng Yan
Theses/Dissertations from 2015 2015
Configuring and Assembling Information Retrieval based Solutions for Software Engineering Tasks. , Bogdan Dit
Enhancing Bug Reports for Mobile Apps , Kevin Patrick Moran
Providing efficient services for smartphone applications , Yifan Zhang
Enabling Parallel Execution via Principled Speculation. , Zhijia Zhao
Advancing Feedback-Driven Optimization for Modern Computing. , Mingzhou Zhou
Theses/Dissertations from 2014 2014
Towards Secure, Power-Efficient and Location-Aware Mobile Computing , Hao Han
Studying and Enabling Reuse in android Mobile Apps , andrew Steven Holtzhauer
Effective Resource and Workload Management in Data Centers , Lei Lu
Matching non-uniformity for program optimizations on heterogeneous many-core systems , Bo Wu
Exploiting behavioral biometrics for user security enhancements , Nan Zheng
Theses/Dissertations from 2013 2013
Real-Time High-Quality Image to Mesh Conversion for Finite Element Simulations , Panagiotis Foteinos
Translating Spatial Problems into Lumpable Markov Chains , Ruth Elizabeth Lamprecht
Tracelab: Reproducing Empirical Software Engineering Research , Evan Alexander Moritz
Network Traffic Aware Smartphone Energy Savings , andrew Joseph Pyles
Improving Security and Privacy in Online Social Networks , Wei Wei
Improving Energy Efficiency and Security for Pervasive Computing Systems , Fengyuan Xu
Theses/Dissertations from 2012 2012
Detecting Abnormal Behavior in Web Applications , Zi Chu
Information Integration for Software Maintenance and Evolution. , Malcom Bernard Gethers II
A Learning-based Approach to Exploiting Sensing Diversity in Performance Critical Sensor Networks , Matthew Alexander Keally
Understanding and Leveraging Virtualization Technology in Commodity Computing Systems , Duy Le
Searching, Selecting, and Synthesizing Source Code Components , Collin McMillan
- Collections
- Disciplines
Advanced Search
- Notify me via email or RSS
Author Corner
About scholarworks.
- Honors Theses
- W&M Libraries
- VIMS Hargis Library
- W&M Law School Repository
- Research Guides
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
- USF Research
- USF Libraries
Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations
Computer Science and Engineering Theses and Dissertations
Theses/dissertations from 2023 2023.
Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno
Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan
Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros
Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin
Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen
Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur
A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.
Graph Analysis on Social Networks , Shen Lu
Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera
Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo
Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi
Theses/Dissertations from 2022 2022
Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed
Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala
Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen
A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave
On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou
Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang
A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri
Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney
Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin
Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker
Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich
Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar
Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong
Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward
Theses/Dissertations from 2021 2021
Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar
Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia
Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto
Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis
Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey
AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi
Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill
Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja
Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana
Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev
Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.
Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski
Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov
Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai
Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri
Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco
Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam
Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava
A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza
Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar
Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams
Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari
Theses/Dissertations from 2020 2020
Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal
Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil
Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari
Composition of Atomic-Obligation Security Policies , Yan Cao Albright
Action Recognition Using the Motion Taxonomy , Maxat Alibayev
Sentiment Analysis in Peer Review , Zachariah J. Beasley
Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov
Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang
Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram
PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami
Composition of Atomic-Obligation Security Policies , Danielle Ferguson
Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel
The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann
Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez
Privacy-Preserving and Functional Information Systems , Thang Hoang
Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January
Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi
Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam
Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha
Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath
System Support of Concurrent Database Query Processing on a GPU , Hao Li
Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu
Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li
Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla
Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng
Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi
Models of Secure Software Enforcement and Development , Hernan M. Palombo
Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos
Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul
Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan
Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah
Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui
Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah
Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu
Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon
Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna
Theses/Dissertations from 2019 2019
Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur
Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed
Phenomena of Social Dynamics in Online Games , Essa Alhazmi
A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri
Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari
Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee
A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao
Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin
Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano
Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang
A GPU-Based Framework for Parallel Spatial Indexing and Query Processing , Zhila Nouri Lewis
A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic , Trisha Mukhopadhyay
An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks , Srivarsha Polnati
Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain , John Rippetoe
Detecting Digitally Forged Faces in Online Videos , Neilesh Sambhu
Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses , Dakun Shen
Advanced Search
- Email Notifications and RSS
- All Collections
- USF Faculty Publications
- Open Access Journals
- Conferences and Events
- Theses and Dissertations
- Textbooks Collection
Useful Links
- Rights Information
- SelectedWorks
- Submit Research
Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements
Privacy Copyright
Home > FACULTIES > Computer Science > CSD-ETD
Computer Science Theses and Dissertations
This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository
Theses/Dissertations from 2024 2024
A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani
Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy
Theses/Dissertations from 2023 2023
Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar
Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian
Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh
INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee
Algorithms and Software for Oligonucleotide Design , Qin Dong
Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani
De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han
Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley
A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He
A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh
Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani
Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu
Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li
Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li
DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li
Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai
Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad
The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi
Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam
Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat
Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul
On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi
Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza
Migration in Edge Computing , Arshin Rezazadeh
A Modified Hopfield Network for the K-Median Problem , Cody Rossiter
Predicting Network Failures with AI Techniques , Chandrika Saha
Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha
An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa
Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia
Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia
IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales
A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani
Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad
Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim
A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba
Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong
Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang
Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar
Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang
Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi
Theses/Dissertations from 2022 2022
The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt
Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy
Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez
Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu
Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte
Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell
Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch
Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh
Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost
Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie
Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka
Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling
Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan
Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti
Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida
False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito
Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford
An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson
Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem
A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid
Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma
Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi
Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis
Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg
Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang
Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang
Predicting and Modifying Memorability of Images , Mohammad Younesi
Theses/Dissertations from 2021 2021
Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed
A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar
Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani
Contrastive Learning of Auditory Representations , Haider Al-Tahan
Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi
Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak
Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman
Improving Reader Motivation with Machine Learning , Tanner A. Bohn
A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang
Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee
A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen
Exploratory Search with Archetype-based Language Models , Brent D. Davis
Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo
Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon
A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du
Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi
Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan
A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar
Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami
Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara
Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani
A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria
Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh
Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour
A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa
WesternAccelerator:Rapid Development of Microservices , Haoran Wei
A Lightweight and Explainable Citation Recommendation System , Juncheng Yin
Mitosis Detection from Pathology Images , Jinhang Zhang
Theses/Dissertations from 2020 2020
Visual Analytics of Electronic Health Records with a focus on Acute Kidney Injury , Sheikh S. Abdullah
Towards the Development of Network Service Cost Modeling-An ISP Perspective , Yasmeen Ali
- Accessible Formats
Advanced Search
- Notify me via email or RSS
- Expert Gallery
- Online Journals
- eBook Collections
- Reports and Working Papers
- Conferences and Symposiums
- Electronic Theses and Dissertations
- Digitized Special Collections
- All Collections
- Disciplines
Author Corner
- Submit Thesis/Dissertation
Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright
©1878 - 2016 Western University
Thesis Projects
A Guide for Students in Computer Science and Information Systems
- © 2008
- Latest edition
- Mikael Berndtsson 0 ,
- Jörgen Hansson 1 ,
- Björn Olsson 2 ,
- Björn Lundell 3
University of Skövde, Sweden
You can also search for this author in PubMed Google Scholar
Carnegie Mellon University, Pittsburgh, USA
- Provides a comprehensive approach to tackling project work
- Offers a simple step-by-step guide to the key processes involved
- Includes supplementary material: sn.pub/extras
90k Accesses
5 Citations
1 Altmetric
This is a preview of subscription content, log in via an institution to check access.
Access this book
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Other ways to access
Licence this eBook for your library
Institutional subscriptions
Table of contents (15 chapters)
Front matter, introduction, computer science and information systems research projects, actors involved, their roles and relationships, the process – an overview, developing your project proposal, references and citations, developing your aim, developing your objectives and choosing methods, following the objectives, presenting and analysing your data, drawing your conclusions and identifying future work, presenting and defending your work orally, supplements, information-seeking and use, examination, back matter.
- Collaboration
- Information Systems
- Project Work and Education
- Virtual Environments
- information technology
About this book
Authors and affiliations.
Mikael Berndtsson, Björn Olsson, Björn Lundell
Jörgen Hansson
Bibliographic Information
Book Title : Thesis Projects
Book Subtitle : A Guide for Students in Computer Science and Information Systems
Authors : Mikael Berndtsson, Jörgen Hansson, Björn Olsson, Björn Lundell
DOI : https://doi.org/10.1007/978-1-84800-009-4
Publisher : Springer London
eBook Packages : Computer Science , Computer Science (R0)
Copyright Information : Springer-Verlag London 2008
Softcover ISBN : 978-1-84800-008-7 Published: 25 October 2007
eBook ISBN : 978-1-84800-009-4 Published: 30 October 2007
Edition Number : 2
Number of Pages : XIV, 162
Number of Illustrations : 25 b/w illustrations
Topics : Computer Science, general
- Publish with us
Policies and ethics
- Find a journal
- Track your research
Home > Computer Science > CompSci TDs > Masters Theses
Computer Science Masters Theses
Theses from 2024 2024.
Enabling smart healthcare applications through visible light communication networks , Jack Manhardt
Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan
Theses from 2023 2023
DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula
MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric
COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara
Theses from 2022 2022
Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga
Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong
Theses from 2021 2021
Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II
Theses from 2020 2020
On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu
Theses from 2019 2019
Advanced techniques for improving canonical genetic programming , Adam Tyler Harter
Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter
Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam
Theses from 2018 2018
Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin
CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush
Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani
Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa
Solidification rate detection through solid-liquid interface tracking , Wei Luo
Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham
Cyber-physical security of an electric microgrid , Prashanth Palaniswamy
An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla
Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy
Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti
A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang
Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang
Theses from 2017 2017
Cyber-physical security of a chemical plant , Prakash Rao Dunaka
UFace: Your universal password no one can see , Nicholas Steven Hilbert
Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco
Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti
Personalizing education with algorithmic course selection , Tyler Morrow
Decodable network coding in wireless network , Junwei Su
Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla
Theses from 2016 2016
Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels
Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar
Theses from 2015 2015
Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi
Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt
Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda
A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li
Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin
Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala
Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy
Cyber security research frameworks for coevolutionary network defense , George Daniel Rush
Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara
Theses from 2014 2014
Crime pattern detection using online social media , Raja Ashok Bolla
Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi
A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati
Access control delegation in the clouds , Pavani Gorantla
Evolving decision trees for the categorization of software , Jasenko Hosic
M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar
Privacy preservation using spherical chord , Doyal Tapan Mukherjee
Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram
On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu
Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli
An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan
Theses from 2013 2013
Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz
Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu
Security analysis of a cyber physical system : a car example , Jason Madden
Efficient integrity verification of replicated data in cloud , Raghul Mukundan
Search-based model summarization , Lokesh Krishna Ravichandran
Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg
Secure design defects detection and correction , Wenquan Wang
Theses from 2012 2012
Robust evolutionary algorithms , Brian Wesley Goldman
Semantic preserving text tepresentation and its applications in text clustering , Michael Howard
Vehicle path verification using wireless sensor networks , Gerry W. Howser
Distributed and collaborative watermarking in relational data , Prakash Kumar
Theses from 2011 2011
A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle
Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount
A low-cost motion tracking system for virtual reality applications , Abhinav Chadda
Optimization of textual affect entity relation models , Ajith Cherukad Jose
MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram
A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi
An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka
Location privacy policy management system , Arej Awodha Muhammed
Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni
Theses from 2010 2010
Event detection from click-through data via query clustering , Prabhu Kumar Angajala
Population control in evolutionary algorithms , Jason Edward Cook
Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana
EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads
Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett
Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher
Multi axis slicing for rapid prototyping , Divya Kanakanala
Content based image retrieval for bio-medical images , Vikas Nahar
2-D path planning for direct laser deposition process , Swathi Routhu
Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu
An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli
Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo
Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu
Theses from 2009 2009
Information flow properties for cyber-physical systems , Rav Akella
Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet
Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba
Theses from 2008 2008
Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das
Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong
A time series classifier , Christopher Mark Gore
An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade
Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia
PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu
Co-optimization: a generalization of coevolution , Travis Service
Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder
Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson
Theses from 2007 2007
A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird
Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj
Advanced Search
- Notify me via email or RSS
- Collections
- Disciplines
- All Authors
- Faculty Authors
Author Corner
Useful links.
- Library Resources
Thesis Locations
- View these on map
- View these in Google Earth
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
Senior Thesis Archive
This page lists all Allen School student theses, archived online since 2005.
Winners, 2021 Best Senior Thesis Award Design Principles for Mobile and Wearable Health Technologies Parker S. Ruth, supervised by Dr. Shwetak Patel
Winner, 2020 Best Senior Thesis Award Understanding and Designing for Security and Privacy in Multi-User AR Interactions Kimberly Ruth, supervised by Franziska Roesner and Tadayoshi Kohno
Winner, 2019 Best Senior Thesis Award Implicit Linguistic Knowledge of Neural Natural Language Processing Models Nelson Liu, supervised by Noah Smith
Winner, 2018 Best Senior Thesis Award A Crash-Safe Key-Value Store Using Chained Copy-on-Write B-trees Bruno Castro-Karney, supervised by Xi Wang
BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains Linxing (Preston) Jiang, supervised by Raj Rao
Multi-Location Droplet Management for Digital Microfluidics Sarang Joshi, supervised by Luis Ceze
Kernel Support for Paravirtaulized Guest OS Shibin (Jack) Xi, supervised by Shwetak Patel, Elliot Saba
Winner, 2017 Best Senior Thesis Award The Methods of Interlacing Polynomials Kuikui Liu, supervised by Shayan Oveis Gharan
Winner, 2017 Best Senior Thesis Award Respeak: A Voice-based, Crowd-powered, and Accessible Speech Transcription System Pooja Sethi, supervised by Richard Anderson
Semi-Supervised Spatial Knowledge Transfer with Deep Generative Models Kousuke Ariga, supervised by Andrzej Pronobis
Automated Classification of Adult Cough Recordings into Wet vs. Dry with Applications to Pulmonary Disease Assessment Jiayao Clara Lu, supervised by Shwetak Patel, Elliot Saba
Preventing Signedness Errors in Numerical Computations in Java Christopher Mackie, supervised by Michael Ernst
Successive Convexification for Trajectory Planning: Analysis of Two Problems Irina Tolkova, supervised by Dieter Fox
Synthesis of Parallel Tree Programs with Domain-Specific Sympbolic Compilation Nate Yazdani, supervised by Ras Bodik
Evaluating Digital Financial Services for Financial Inclusion in Southern Ghana Sarah Yu, supervised by Richard Anderson
Learning Large-Scale Topological Maps Using Sum-Product Networks Kaiyu Zheng, supervised by Andrzej Pronobis, Raj Rao
Winner, 2016 Best Senior Thesis Award Navigating a 2D Virtual World Using Direct Brain Stimulation Darby Losey, supervised by Rajesh Rao
Third-Party Content on the Web: A Visual Study Christopher Blappert, supervised by Franziska Roesner, Tadayoshi Kohno
Contributions to Vega Ryan Russell, supervised by Jeffrey Heer
TR15-01: PDF Winner, 2015 Best Senior Thesis Award Probability Type Inference for Flexible Approximate Programming Brett Boston, supervised by Dan Grossman
TR15-02: PDF Tleilax: Porting Tor to Arrakis Sunjay Cauligi, supervised by Tom Anderson
TR15-03: PDF EKG Monitoring and Arrhythmia Detection Amaris Chen, supervised by Bruce Hemingway
TR15-04: PDF Automated Analysis of Paper-Based Immunoassay Tests Krittika D'Silva, supervised by Gaetano Borriello & Paul Yager
TR15-05: PDF The Wisdom of Multiple Guesses Ryan Drapeau, supervised by Johan Ugander and Carlos Guestrin
TR15-06: PDF Extending Streaming Features for Myria Yuqing Guo, supervised by Magdalena Balazinska
TR15-07: PDF Tabletop Manipulation Dylan Holmes, supervised by Emanuel Todorov
TR15-08: PDF Peer-to-peer Data Transfer in Resource Constrained Environments Shahar Levari, supervised by Gaetano Borriello & Richard Anderson
TR15-09: PDF OBA Research & Development Aengus McMillin, supervised by Alan Borning
TR15-10: PDF A Web Based Tool for Labeling the 3D World Aaron Nech, supervised bySteve Seitz & Richard Newcombe
TR15-11: PDF Talk Space: Developing the Online Salon Karthik Palaniappan, supervised by Alan Borning
TR15-12: PDF Identification of Unstructured Language Indicating Multiple Objects Vivek Paramasivam, supervised by Luke Zettlemoyer
TR15-13: PDF Distributed Sampling in a Big Data Management System Dan Radion, supervised by Dan Suciu
TR15-14: PDF Algebraic Simplification for the Herbie Project Alex Sanchez-Stern, supervised by Zachary Tatlock
TR15-15: PDF Understanding Charts in Research Papers: A Learning Approach Noah Siegel, supervised by Ali Farhadi
TR15-16: PDF LeagueSpeak: The Language of Skill in Leage of Legends King O. Xia, supervised by James Fogarty
TR14-01: PDF POMDP-Based Interaction and Interactive Natural Language Grounding with a NAO Robot Maxwell Forbes, supervised by Rajesh Rao
TR14-02: PDF Running N-body Use Cases on Myria Lee Lee Choo, supervised by Magdalena Balazinska
TR14-03: PDF Verification Games Type Systems Nathaniel Mote, supervised by Michael Ernst
TR14-04: PDF PNA: Protein-Nucleic Acid Complex Structure Prediction Raymond Zhang, supervised by Martin Tompa
TR14-05: PDF Winner, 2014 Best Senior Thesis Award DCDN: Distributed Content Delivery for the Modern Web Nick Martindell, supervised by Tom Anderson & Arvind Krishnamurthy
TR14-06: PDF Data Purchase Advisor: Cost-Effective Data Acquisition for Shared Data Analysis Martina Unutzer, supervised by Magdalena Balazinska
TR14-07: PDF Investigation into Measuring Blood Pressure with a Mobile Phone Molly Moen, supervised by Gaetano Borriello
TR14-08: PDF DigiTaps Vaspol Ruamviboonsuk, supervised by Richard Ladner
TR14-09: PDF Modeling Relational Vocabulary for Grounded Language Acquisition Caitlin Harding, supervised by Luke Zettlemoyer
TR14-10: PDF Spectral Graph Theory, Expanders, and Ramanujan Graphs Christopher WIlliamson, supervised by James Lee & Anup Rao
TR14-11: PDF Eyes-Free Error Detection and Correction of Speech Dictation on Mobile Devices Rochelle Ng, supervised by Richard Ladner
TR14-12: PDF On a Competitive Secretary Problem Eric Lei, supervised by Anna Karlin
TR13-01: PDF Traceur: Inferring Variable Control Flow Using Synoptic With Multiple Relation Types Timothy Vega, supervised by Michael Ernst
TR13-02: PDF 1 , PDF 2 , PDF 3 Monitors: Keeping Informed on Code Changes [PDF 1] News and Notification: Propagating Releveant Changes to Developers [PDF 2] Refinements and Git Integration with Notifications and Monitoring [PDF 3] Christopher Dentel supervised at ETH Zurich by Christian Estler, Dr. Martin Nordio, & Prof. Dr. Bertrand Meyer supervised at UW by David Notkin
TR13-03: PDF 1 , PDF 2 , PDF 3 Contract Inserter: A Tool for Automatically Generating and Inserting C# Code Contracts Forrest Coward, supervised by Michael Ernst
TR13-04: PDF ODK Tables Graphing Tool Nathan Brandes, supervised by Gaetano Borriello
TR13-05: PDF Probabilistic Co-Adaptive Brain-Computer Interfacing Matthew Bryan, supervised by Rajesh Rao
TR13-06: PDF Stroke Rehabilitation Through Motor Imagery Controlled Humanoid Priya Chagaleti, supervised by Rajesh Rao
TR13-07: PDF Analyzer: Integrated Tools to Guide the Application of Machine Learning Christopher Clark, supervised by Oren Etzioni
TR13-08: PDF Considering Accuracy and Diversity when Creating Ensembles of Classifiers Michael Fain, supervised by James Fogarty
TR13-09: PDF ODK Tables Maps Christopher Gelon, supervised by Gaetano Borriello
TR13-10: PDF Appliance Reader Antonius Denny Harijanto, supervised by Richard Ladner
TR13-11: PDF Towards a Theory of Multiparty Information Complexity Samuel Hopkins, supervised by Paul Beame
TR13-12: PDF Instance-Based Recognition of Screen-Rendered Text in a System for Pixel-Based Reverse-Engineering of Graphical Interfaces Stephen Joe Jonany, supervised by James Fogarty
TR13-13: PDF Identifying Idiomatic Language at Scale Grace Muzny, supervised by Luke Zettlemoyer
TR13-14: PDF Identifying Application Breakage Caused by Virtualization Steven Portzer, supervised by Arvind Krishnamurthy
TR13-15: PDF Winner, 2013 Best Senior Thesis Award An API For Touch-Free Interfaces For Andriod Devices Leeran Raphaely, supervised by Gaetano Borriello
TR13-16: PDF ODK Tables: Improving the Custom Views Heidi So, supervised by Gaetano Borriello
TR13-17: PDF Leveraging Data Invariants in Model Interfernce for Test Case Generation Roykrong Sukkerd, supervised by Michael Ernst
TR12-01: PDF InvariMint: Modeling Logged Behavior with Invariant DFAs Jenny Abrahamson, supervised by Michael Ernst
TR12-02: PDF Quantum Compiler Optimizations Jeff Booth, supervised by Aram Harrow
TR12-03: PDF StopFinder: Improving the Experience of Blind Public Transit Riders with Crowdsourcing Sanjana Prasain, supervised by Alan Borning
TR12-04: PDF A Type System for Regular Expressions Eric Spishak, supervised by Michael Ernst
TR12-05: PDF Run-Length Encoding Markovian Streams Jennifer Wong, supervised by Magdalena Balazinska
TR12-06: PDF Expanding the Depth Cloud: How to Intelligently Improve Grasping Matthew Mullen, supervised by Joshua Smith
TR12-08: PDF Simultaneous Tracking of Two Hands Using Camshift Eric Hare, supervised by Dieter Fox
TR12-07: PDF A Cold Chain Data Visualization Tool Melissa Winstanley, supervised by Ruth Anderson
TR12-09: PDF Winner, 2012 Best Senior Thesis Award The Elan Programming Language for Field-Programmable Gate Arrays Elliott Brossard, supervised by Carl Ebeling
TR12-10: PDF The Friendbo Attention Bar: Improving Engagement with Web Feeds on Social Networking Sites Greg Bigelow, supervised by James Landay
TR12-11: PDF Namaste: A Yoga Activity Logging Sensor Milda Zizyte, supervised by Shewtak Patel
TR12-12: PDF Efficient MapReduce Applications Finn Parnell, supervised by Luis Ceze
TR12-13: PDF ODK Tables: A Customizable Data Management Application for Android Hilary Worden, supervised by Gaetano Borriello
TR12-14: PDF A Synchronization Protocol for ODK Tables and ODK Aggregate Dylan Price, supervised by Gaetano Borriello
TR12-15: PDF Computer Security in the Undergraduate Curriciulum Miles Sackler, supervised by Tadayoshi Kohno
TR11-01: PDF Improving DHT Routing Performance in Harmony using Client Caching Allison Obourn, supervised by Tom Anderson
TR11-03: PDF Smart Connect: Developing an SMS-Based Communcations Systems for Health Clinics in Vietnam Krysta Yousoufian, supervised by Richard Anderson
TR11-04: PDF Improving performance of prototype recognition in Prefab Orkhan Muradov, supervised by James Fogarty
TR11-05: PDF Winner, 2011 Best Senior Thesis Award LIFEGUARD: Locating Internet Failure Events and Generating Usable Alternate Routes Dynamically Robert Colin Scott, supervised by Tom Anderson
TR11-06: PDF Towards Practical Brain-Computer Interfaces: Hierarchical Learning and Source Estimation Willy Cheung, supervised by Rajesh Rao
TR11-07: PDF Improving Open Data Kit Collect's Multiple Choice Data Entry Methods Jeffrey Beorse, supervised by Gaetano Borriello
TR11-08: PDF Runtime Verification of Portable Programming Interfaces Jeff Rasley, supervised by Justin Cappos
TR10-01: PDF Modeling a Lattice-Traversing Robot Albert Chiu, supervised by Eric Klavins
TR10-02: PDF Haptic Laser Erik Rosenkrantz Dennison Turnquist, supervised by Shwetak Patel
TR10-03: PDF The Cinematic Sandbox: Utilizing Video Game Engines for Rapid Prototyping of Animated Films Nicholas Garrett, supervised by Barbara Mones
TR10-04: PDF Winner, 2010 Best Senior Thesis Award Applications of the IP Timestamp Option to Internet Measurement Justine Sherry, supervised by Tom Anderson
TR10-05: PDF Iterative Design and Implementation of an Educational Platform for Shared Computing Contexts Sunil Garg, supervised by Richard Anderson
TR10-06: PDF Deployment and Evaluation of an Educational Platform for Shared Computing Contexts Clint Tseng, supervised by Richard Anderson
TR10-07: PDF MultiViewer Imaging Viewer: Automated Calibration PET Phanton Analysis Project Yogesh Saletore, supervised by Linda Shapiro
TR09-01: PDF Node Containment in the Seattle Testbed Cosmin Barsan, supervised by Justin Cappos
TR09-02: PDF Simulating Hand Interaction in a Virtual Environment with Open Dynamics Engine and CyberGlove Nick Nunley, supervised by Miro Enev
TR09-03: PDF Winner, 2009 Best Senior Thesis Award Real-Time Classification of Everyday Fitness Activities on Windows Mobile Alireza Bagheri Garakani, supervised by James Fogarty
TR08-01: PDF Winner, 2008 Best Senior Thesis Award Maintaining Intelligibility of ASL Video in the Presence of Data Loss Sam Whittle, supervised by Richard Ladner
TR08-02: PDF Parallel N-Body Simulation Using Problem Space Promotion Brandon Farrell, supervised by Larry Snyder
TR08-03: PDF Exploring New Applications for Parallel Programming: Envisioning a New Realm David Tepper, supervised by Larry Snyder
TR07-01: PDF Connecting Diets to Disease: Using Data-Mining to Find Links between Food Comsumption and Chronic Diseases Alex Zheng, supervised by Rajesh Rao
TR07-02: PDF Tagged Representations in WIL Daria Craciunoiu, supervised by Craig Chambers
TR07-03: PDF Multicore ZPL Steven P. Smith, supervised by Larry Snyder
TR07-04: PDF Implementing NOT EXISTS Predicates over a Probabilistic Database Ting-You Wang, supervised by Dan Suciu
TR07-05: PDF Winner, 2007 Best Senior Thesis Award Context-Based Arithmetic Coding for the DCT: Achieving high compression rates with block transforms and simple context modeling Kyle Littlefield, supervised by Richard Ladner
TR06-01: PDF Winner, 2006 Best Senior Thesis Award Feature-Based Classification of the Mouse Eye Images Jenny Yuen, supervised by Linda Shapiro
TR05-01: PDF Winner, 2005 Best Senior Thesis Award Text Segmentation and Grouping for Tactile Graphics Matthew Renzelmann, supervised by Richard Ladner
Senior Thesis
A senior thesis is more than a big project write-up. It is documentation of an attempt to contribute to the general understanding of some problem of computer science, together with exposition that sets the work in the context of what has come before and what might follow. In computer science, some theses involve building systems, some involve experiments and measurements, some are theoretical, some involve human subjects, and some do more than one of these things. Computer science is unusual among scientific disciplines in that current faculty research has many loose ends appropriate for undergraduate research.
Senior thesis projects generally emerge from collaboration with faculty. Students looking for senior thesis projects should tell professors they know, especially professors whose courses they are taking or have taken, that they are looking for things to work on. See the page on CS Research for Undergrads . Ideas often emerge from recent papers discussed in advanced courses. The terms in which some published research was undertaken might be generalized, relaxed, restricted, or applied in a different domain to see if changed assumptions result in a changed solution. Once a project gets going, it often seems to assume a life of its own.
To write a thesis, students may enroll in Computer Science 91r one or both terms during their senior year, under the supervision of their research advisor. Rising seniors may wish to begin thinking about theses over the previous summer, and therefore may want to begin their conversations with faculty during their junior spring—or even try to stay in Cambridge to do summer research.
An information session for those interested in writing a senior thesis is held towards the end of each spring semester. Details about the session will be posted to the [email protected] email list.
Students interested in commercializing ideas in their theses may wish to consult Executive Dean Fawwaz Habbal about patent protection. See Harvard’s policy for information about ownership of software written as part of your academic work.
Thesis Supervisor
You need a thesis supervisor. Normally this is a Harvard Computer Science faculty member. Joint concentrators (and, in some cases, non-joint concentrators) might have a FAS/SEAS Faculty member from a different field as their thesis supervisor. Exceptions to the requirement that the thesis supervisor is a CS or FAS/SEAS faculty member must be approved by the Director of Undergraduate Studies. For students whose advisor is not a Harvard CS faculty member, note that at least one of your thesis readers must be a Harvard CS faculty member, and we encourage you to talk with this faculty member regularly to help ensure that your thesis is appropriately relevant for Harvard Computer Science.
It’s up to you and your supervisor how frequently you meet and how engaged the supervisor is in your thesis research. However, we encourage you to meet with your supervisor at least several times during the Fall and Spring, and to agree on deadlines for initial results, chapter outlines, drafts, etc.
Thesis Readers
The thesis is evaluated by the thesis readers. Thesis readers must be either:
Two Harvard CS faculty members/affiliates ; or:
Three readers, at least one of whom is a Harvard CS faculty member and the others are ordinarily teaching faculty members of the Faculty of Arts and Sciences or SEAS who are generally familiar with the research area.
The thesis supervisor is one of the readers.
The student is responsible for finding the other readers, but you can talk with your supervisor for suggestions of possible readers.
Exceptions to these thesis reader requirements must be approved by the Directors of Undergraduate Studies.
For joint concentrators, the other concentration may have different procedures for thesis readers; if you have any questions or concerns about thesis readers, please contact the Directors of Undergraduate Studies.
Senior Thesis Seminar
Computer Science does not have a Senior Thesis seminar course.
However, we do run an informal optional series of Senior Thesis meetings in the Fall to help with the thesis writing process, focused on topics such as technical writing tips, work-shopping your senior thesis story, structure of your thesis, and more. Pay attention to your email in the Fall for announcements about this series of meetings.
The thesis should contain an informative abstract separate from the body of the thesis. This abstract should clearly state what the contribution of the thesis is–which parts are expository, whether there are novel results, etc. We also recommend the thesis contain an introduction that is at most 5 pages in length that contains an “Our contributions” section which explains exactly what the thesis contributed, and which sections in the thesis these are elaborated on. At the degree meeting, the Committee on Undergraduate Studies in Computer Science will review the thesis abstract, the reports from the three readers and the student’s academic record; it will have access to the thesis. The readers (and student) are told to assume that the Committee consists of technical professionals who are not necessarily conversant with the subject matter of the thesis so their reports (and abstract) should reflect this audience.
The length of the thesis should be as long as it needs to be to present its arguments, but no longer!
There are no specific formatting guidelines. For LaTeX, some students have used this template in the past . It is set up to meet the Harvard PhD Dissertation requirements, so it is meeting requirements that you as CS Senior Thesis writers don’t have.
Thesis Timeline for Seniors
(The timeline below is for students graduating in May. For off-cycle students, the same timeline applies, but offset by one semester. The thesis due date for March 2025 graduates is Friday November 22, 2024 at 2pm. The thesis deadline for May 2024 graduates is Friday March 29th Monday April 1st at 2pm.
Please be aware that students writing a joint thesis must meet the requirements of both departments–so if there are two different due dates for the thesis, you are expected to meet the earlier date.
Senior Fall (or earlier) Find a thesis supervisor, and start research.
October/November/December Start writing.
All fourth year concentrators are contacted by the Office of Academic Programs and those planning to submit a senior thesis are requested to supply certain information, including name of advisor and a tentative thesis title. You may use a different title when you submit your thesis; you do not need to tell us your updated title before then. If Fall 2024 is your final term, please fill out this form . If May 2024 is your final term, please fill out this form .
Early February The student should provide the name and contact information for the readers (see above), together with assurance that they have agreed to serve.
Mid-March Thesis supervisors are advised to demand a first draft. (A common reaction of thesis readers is “This would have been an excellent first draft. Too bad it is the final thesis—it could have been so much better if I had been able to make some suggestions a couple of weeks ago.")
April 1, 2024 * Thesis is due by 2:00 pm. Electronic copies in PDF format should be delivered by the student to all three readers and to [email protected] (which will forward to the Director of Undergraduate Studies) on or before that date. An electronic copy should also be submitted via the SEAS online submission tool on or before that date. SEAS will keep this electronic copy as a non-circulating backup. During this online submission process, the student will also have the option to make the electronic copy publicly available via DASH, Harvard’s open-access repository for scholarly work. Please note that the thesis will NOT be published to ProQuest. More information can be found on the SEAS Senior Thesis Submission page.
The two or three readers will receive a rating sheet to be returned to the Office of Academic Programs before the beginning of the Reading Period, together with their copy of the thesis and any remarks to be transmitted to the student.
Late May The Office of Academic Programs will send students their comments after the degree meeting to decide honors recommendations.
Thesis Extensions and Late Submissions
Thesis extensions Thesis extensions will be granted in extraordinary circumstances, such as hospitalization or grave family emergency, with the support of the thesis advisor and resident dean and the agreement of all readers. For joint concentrators, the other concentration should also support the extension. To request an extension, please have your advisor or resident dean email [email protected] , ideally several business days in advance, so that we may follow up with readers. Please note that any extension must be able to fall within our normal grading, feedback, and degree recommendation deadline, so extensions of more than a few days are usually impossible.
Late submissions Late submission of thesis work should be avoided. Work that is late will ordinarily not be eligible for thesis prizes like the Hoopes Prize. Theses submitted late will ordinarily be penalized one full level of honors (highest honors, high honors, honors, no honors) per day late or part thereof, including weekends, so a thesis submitted two days and one minute late is ordinarily ineligible to receive honors. Penalties will be waived only in extraordinary cases, such as documented medical illness or grave family emergency; students should consult with the Directors of Undergraduate Studies in that event. Missed alarm clocks, crashed computers, slow printers, corrupted files, and paper jams are not considered valid causes for extensions.
Thesis Examples
Recent thesis examples can be found on the Harvard DASH (Digital Access to Scholarship at Harvard) repository here . Examples of Mind, Brain, Behavior theses are here .
Spectral Sparsification: The Barrier Method and its Applications
- Martin Camacho, Advisor: Jelani Nelson
Good Advice Costs Nothing and it’s Worth the Price: Incentive Compatible Recommendation Mechanisms for Exploring Unknown Options
- Perry Green, Advisor: Yiling Chen
Better than PageRank: Hitting Time as a Reputation Mechanism
- Brandon Liu, Advisor: David Parkes
Tree adjoining grammar at the interfaces
- Nicholas Longenbaugh, Advisor: Stuart Shieber
SCHUBOT: Machine Learning Tools for the Automated Analysis of Schubert’s Lieder
- Dylan Nagler, Advisor: Ryan Adams
Learning over Molecules: Representations and Kernels
- Jimmy Sun, Advisor: Ryan Adams
Towards the Quantum Machine: Using Scalable Machine Learning Methods to Predict Photovoltaic Efficacy of Organic Molecules
- Michael Tingley, Advisor: Ryan Adams
- Search SF State Search SF State Button SF State This Site
Master's Theses and Projects
The objective of the mandatory Master's Thesis or Project requirement is to provide a culminating educational experience, where the student, under the supervision of a faculty member, conducts an individual study employing concepts and methods learned in the program to solve a problem of significant importance from a practical or theoretical standpoint.
The Following Policies Apply
Study involves overview.
The study should involve a synthesis of concepts and methods learned in more than one course, and exhibit awareness of previous work in the area of study. This requirement also aims to provide an opportunity to the student to learn and practice the means of written and oral communication. The project or thesis provides an extremely important component to the students' portfolio applied towards a future undertaking whether it be for admission to a Ph.D. program or for a leadership position in the computing industry.
Two Equivalent Possibilities
There are two equivalent possibilities for the culminating experience in the MS program in Computer Science: MS project (CSC 895) , and MS thesis (CSC 898) . The MS thesis and the MS project have the same level of difficulty, need the same time for completion, and yield the same kind of MS degree. The decision whether a work is a thesis or a project must be made at the time of registration for CSC 895/898 in consultation with the faculty advisor.
1. Credits and Courses to Take
The complete work on MS thesis/project has a limit of 9 credits. Typically, students working on a thesis will register for 3 credits of CSC 897 (Research) followed by 3 credits of CSC 898, but they can take an additional 3 units of CSC 897 upon advisement. Students working on a project will usually enroll in 3 credits of CSC 899 followed by 3 credits of CSC 895,but they can take additional 3 units of CSC 899 upon advisement. CSC 895 and 898 are graded as CR/NC.
2. Advisor and Committee Selection
Before registering for the MS thesis/project the student must select an advisor, and other members of the thesis/project committee and file the GAP and Culminating Experience Form with the Graduate Division. The thesis committee must have at least 3 members, and the project committee must have at least 2 members. At least two members must be tenured or tenure-track SFSU/CS faculty for either type of committee. In addition to the 2 members of the CS Department, the committee may include faculty or members outside of the CS Department, upon approval of the CS Chair.
Both MS thesis and MS project have a public oral defense. Usually the student presentation is about 30 min. with Q&A following. Defense committee then asks all to leave the room for a short period of time to discuss the work and the grading. The defense must be advertised to the local community. This is a great opportunity to bring family and friends. Students are advised to carefully rehearse and check the presentation for content, duration and to make sure all the SW and demos work.
4. MS Thesis Format
The format of the MS thesis document is strictly defined and controlled by the SF State Graduate Division ( University Thesis Composition Guidelines ). The original copy of the thesis, including committee signatures, is submitted to the Graduate Division for approval. After approval by the Graduate Division the original version is bound according to the SFSU standard and available in the SFSU library. One bound copy of the thesis must also be given to the CS Department office. Thesis copies are submitted to the committee members in a form approved by the members.
5. MS Project Format
The format of the MS project document is strictly defined and controlled by the Department of Computer Science, and has the form of the CS Technical Report. The final version of the MS project is submitted to the CS Department and stored in the CS Department office. Project document copies are submitted to the committee members in a form approved by the members. Please work with your advisor for more details.
6. Deadlines, Forms & Paperwork
Students are encouraged to consult with prospective thesis/project advisors and CS office for more detailed information on the expected schedules for completion of their culminating experience work.
Note: CSC 895 enrollment (permit number) is strictly controlled by CS Office and not your mentor. This is due to the need to make a complete check on whether you fulfilled all the requirements for graduation.
The deadline for filing all forms for your CSC 895/898 is the semester preceding your planned CSC 895/898 enrollment (November for Spring and April for Fall). See your grad advisor and CS office for details, and check the above link.
7. Culminating Experience Project Proposal
This is submitted the term prior to enrollment in 895 or 898. The CER is a vehicle to communicate and agree upon expectations for the work for culminating experience between the student and the advisor. Typical sections of this proposal should include motivation, problem description, method of solving the problem, relevant work of others, as well as milestones, deliverables and approximate timetable (for more details talk with the thesis/project advisor). This project proposal should be done carefully and will serve as a "contract" between the advisor and the student. The size of this report is in general about 2-4 pages. Students are encouraged to work with their thesis/project advisor on specific details.
It is required that this proposal be developed as a deliverable with the 899 or 897 course preceding 895 or 898 courses.
8. Student Responsibility
It is critical to plan to take graduate level electives with possible culminating experience supervisors during your first year of study. Think of topic(s) for your culminating experience, do a research on it, check what CS faculty does for research, and feel free to meet CS Chair or other faculty for advice.
- Must attend the first graduate seminar (graduate program overview) in your first semester of study
- Must enroll in courses taught by prospective thesis/project supervisors in your second semester of study. Consult your favorite professors for guidance in project selection.
- Must attend mandatory advising group meeting with CS Chair to be organized within the first 4 weeks of second semester.
- Must select your culminating experience supervisor by the end of second semester and obtain your supervisor's permission to work under his/her supervision.
The culminating project and thesis require serious commitment and focus of the student. Serve the purpose to show that the student is capable of delivering individual work as well as being independent, able to deliver a project etc.
It is the responsibility of the student to follow up the agreed upon milestones and commitments made to the advisors (typically via approved project proposal). This is especially critical for projects where the work involves external funding and commitments including developing publications that require student's contributions.
Students are strongly encouraged to help faculty develop research publications (e.g. doing the necessary work such as SW development, experiments) and to participate in writing research papers, especially those aspiring toward Ph. D. studies.
While students own the copyright to the code they develop at SF State, the source code, and all the data and procedures used for the research and experiments, must be made publicly available for faculty and others for the purpose of grading and evaluation.
Changes in project plans, topics, title or committee members (but not the main advisor) must be made in writing in accordance with Department procedures. Change of advisor requires repeating the whole culminating project or thesis course sequence (including 899 or 897) and adherence to Department polices.
Students must follow all CS Department and general rules about plagiarism. Details are available at Department Cheating and Plagiarism Policy Web Page
Other Options to Finish Culminating Experience
If you do not finish your culminating experience within two semester, you must enroll in culminating experience through CEL. More about enrolling through CEL.
CS Department Information
Information and deadlines.
Advancement to Candidacy (ATC)
- University Graduate Student Deadlines
- University ATC Information
Proposal for Culminating Experience Form (CEF)
- University Culminating Experience Procedures
Human Subjects Protocol (HSP)
- University Submitting a Protocol Information
- Department Human Subjects Protocol Information
Graduate Seminars (PERNET)
- Complete the semester PRIOR to 895/898 enrollment
- Department Graduate Seminar Series
895/898 Enrollment
- Need ALL of the above submitted/completed the semester PRIOR to enrollment in 895/898
- Department Checklist for Enrolling in 895/898 PDF
Thesis Defense (Complete Culminating Experience)
- University Graduate Students Deadlines
- Department Oral and Written Defense
Oral and Written Defense
If you are a Graduate Student, in your last semester and planning to graduate, you need to write up your project report or thesis, and prepare for your Oral Defense. Please follow the steps and timeline below for writing up your project report/thesis and oral defense. We urge you to work closely with your project/thesis advisor, to clarify expectations, confirm deadlines, and coordinate other committee members.
Steps for Completing Your Culminating Experience Project/Master's Thesis
- The last day to submit your "Report of Completion" is the last day of instruction (not the last day of final exams). Your committee members need ample time to read and review your written report. Plan accordingly. All programming should be done, most experiments completed and you should have a solid first draft report written by the second week of the semester. Submit the masters project/thesis write up to your project/thesis advisor for content approval no later than the 6th week of the semester. This allows you time to correct for proper grammar as well as make any other edits based on your advisor's feedback. Students completing the thesis option are referred to the University Gradute Studies website for guidelines on formatting the thesis report, as well as instructions on submitting final copies.
- Once the project/thesis advisor approves the report/thesis, the student submits copies to all committee members for their approval of the CONTENT.
- Student confers with faculty to determine the date and time all committee members are available for the Oral Defense
- Student submits abstract and keywords to project/thesis advisor for approval
- The student works with the committee to resolve any issues with the report submitted in Steps 1. and 2. above. After all issues with the written report are resolved, the student is given the (official) signed signature sheets and cover sheet to include with the written report
- Students submitting a thesis write-up are referred to the Graduate Division website for instruction on submitting final copies.
- Students submitting a project write-up should use the plastic (white) binding combs, thick black plastic sheet on the back and thick clear plastic sheet on the front. The number of copies depends upon the committee - minimal of 2 copies. The original version is provided to the office.
- In preparing for oral presentation, students must review instructions and guidelines for Department Preparing Oral Presentation web page and confirm this to their advisor.
- Department Writing Culminating Experience Reports (CER) Web Page
Writing a Culminating Experience Report (CER)
In this section we will outline what constitutes an outstanding culminating experience report (CER) whether it is Thesis or a Project; what constitutes unacceptable one; and also outline our general recommendations for the CER outline and content of each chapter.
The focus here is on the write-up part of the CER, namely how to communicate it in the written form (i.e. CER), and not on the culminating experience project itself. Please note that the final decision and guidance on this comes from your Culminating Experience Committee Chair and committee members, but we believe that the material in this section is general enough to set you on the right path. Finally, we will reiterate some recommendations on your oral presentation of CER.
More details on what kinds of CER exist (Thesis or Project) are located at: Department M.S. Culminating Experience Requirments .
Steps in completing the Culminating Experience are located at: Department Writen and Oral Defense Information .
To help you improve your writing skills, all of our students are encouraged to take an online writing course such as the one offered through courses at Stanford University, titled "Writing in the Sciences" offered during the Fall semester. For more information: Stanford Writing in the Sciences Course Information .
Very good resources on how to write technical reports are here:
- Colubia Web Page: Writing Technical Articles .
- Columbia Web Page: Common Bugs in Writing .
Before we start, let us reiterate that completing culminating experience (both the project and the report) is primarily the responsibility of the student and hence the student has to drive it. It is not expected from the faculty to fully participate in writing the CER or in very extensive editing except to give necessary feedback and comments. We strongly recommend that high level CER outline be agreed between student and faculty before the writing commences.
Let us first see what constitutes an outstanding CER and what constitutes an unacceptable CER. While the definitions below touch upon the project work itself, please focus for now on the suggestions that refer to the ways on how to write about it.
Preparing Oral Presentations
Being able to present your work is critically important for your future career as well as for the oral defense of your culminating project or thesis. Please consult the following resources in preparing for your oral defense. Be sure to test your presentation on the exact same computer and projector which you will use during your presentation.
Performance Juxtaposition Web Page: Presentations
Student Theses and Projects
- Email: [email protected]
- Telephone: (415) 338-1244
Office Hours
Quick links.
- Future Students
- News @ SF State
- Advisers & Contacts
- Bachelor of Arts & Bachelor of Science in Engineering
- Prerequisites
- Declaring Computer Science for AB Students
- Declaring Computer Science for BSE Students
- Class of '25, '26 & '27 - Departmental Requirements
- Class of 2024 - Departmental Requirements
- COS126 Information
- Important Steps and Deadlines
- Independent Work Seminars
- Guidelines and Useful Information
Undergraduate Research Topics
- AB Junior Research Workshops
- Undergraduate Program FAQ
- How to Enroll
- Requirements
- Certificate Program FAQ
- Interdepartmental Committee
- Minor Program
- Funding for Student Group Activities
- Mailing Lists and Policies
- Study Abroad
- Jobs & Careers
- Admissions Requirements
- Breadth Requirements
- Pre-FPO Checklist
- FPO Checklist
- M.S.E. Track
- M.Eng. Track
- Departmental Internship Policy (for Master's students)
- General Examination
- Fellowship Opportunities
- Travel Reimbursement Policy
- Communication Skills
- Course Schedule
- Course Catalog
- Research Areas
- Interdisciplinary Programs
- Technical Reports
- Computing Facilities
- Researchers
- Technical Staff
- Administrative Staff
- Graduate Students
- Undergraduate Students
- Graduate Alumni
- Climate and Inclusion Committee
- Resources for Undergraduate & Graduate Students
- Outreach Initiatives
- Resources for Faculty & Staff
- Spotlight Stories
- Job Openings
- Undergraduate Program
- Independent Work & Theses
Suggested Undergraduate Research Topics
How to Contact Faculty for IW/Thesis Advising
Send the professor an e-mail. When you write a professor, be clear that you want a meeting regarding a senior thesis or one-on-one IW project, and briefly describe the topic or idea that you want to work on. Check the faculty listing for email addresses.
Parastoo Abtahi, Room 419
Available for single-semester IW and senior thesis advising, 2024-2025
- Research Areas: Human-Computer Interaction (HCI), Augmented Reality (AR), and Spatial Computing
- Input techniques for on-the-go interaction (e.g., eye-gaze, microgestures, voice) with a focus on uncertainty, disambiguation, and privacy.
- Minimal and timely multisensory output (e.g., spatial audio, haptics) that enables users to attend to their physical environment and the people around them, instead of a 2D screen.
- Interaction with intelligent systems (e.g., IoT, robots) situated in physical spaces with a focus on updating users’ mental model despite the complexity and dynamicity of these systems.
Ryan Adams, Room 411
Research areas:
- Machine learning driven design
- Generative models for structured discrete objects
- Approximate inference in probabilistic models
- Accelerating solutions to partial differential equations
- Innovative uses of automatic differentiation
- Modeling and optimizing 3d printing and CNC machining
Andrew Appel, Room 209
Available for Fall 2024 IW advising, only
- Research Areas: Formal methods, programming languages, compilers, computer security.
- Software verification (for which taking COS 326 / COS 510 is helpful preparation)
- Game theory of poker or other games (for which COS 217 / 226 are helpful)
- Computer game-playing programs (for which COS 217 / 226)
- Risk-limiting audits of elections (for which ORF 245 or other knowledge of probability is useful)
Sanjeev Arora, Room 407
- Theoretical machine learning, deep learning and its analysis, natural language processing. My advisees would typically have taken a course in algorithms (COS423 or COS 521 or equivalent) and a course in machine learning.
- Show that finding approximate solutions to NP-complete problems is also NP-complete (i.e., come up with NP-completeness reductions a la COS 487).
- Experimental Algorithms: Implementing and Evaluating Algorithms using existing software packages.
- Studying/designing provable algorithms for machine learning and implementions using packages like scipy and MATLAB, including applications in Natural language processing and deep learning.
- Any topic in theoretical computer science.
David August, Room 221
Not available for IW or thesis advising, 2024-2025
- Research Areas: Computer Architecture, Compilers, Parallelism
- Containment-based approaches to security: We have designed and tested a simple hardware+software containment mechanism that stops incorrect communication resulting from faults, bugs, or exploits from leaving the system. Let's explore ways to use containment to solve real problems. Expect to work with corporate security and technology decision-makers.
- Parallelism: Studies show much more parallelism than is currently realized in compilers and architectures. Let's find ways to realize this parallelism.
- Any other interesting topic in computer architecture or compilers.
Mark Braverman, 194 Nassau St., Room 231
- Research Areas: computational complexity, algorithms, applied probability, computability over the real numbers, game theory and mechanism design, information theory.
- Topics in computational and communication complexity.
- Applications of information theory in complexity theory.
- Algorithms for problems under real-life assumptions.
- Game theory, network effects
- Mechanism design (could be on a problem proposed by the student)
Sebastian Caldas, 221 Nassau Street, Room 105
- Research Areas: collaborative learning, machine learning for healthcare. Typically, I will work with students that have taken COS324.
- Methods for collaborative and continual learning.
- Machine learning for healthcare applications.
Bernard Chazelle, 194 Nassau St., Room 301
- Research Areas: Natural Algorithms, Computational Geometry, Sublinear Algorithms.
- Natural algorithms (flocking, swarming, social networks, etc).
- Sublinear algorithms
- Self-improving algorithms
- Markov data structures
Danqi Chen, Room 412
- My advisees would be expected to have taken a course in machine learning and ideally have taken COS484 or an NLP graduate seminar.
- Representation learning for text and knowledge bases
- Pre-training and transfer learning
- Question answering and reading comprehension
- Information extraction
- Text summarization
- Any other interesting topics related to natural language understanding/generation
Marcel Dall'Agnol, Corwin 034
- Research Areas: Theoretical computer science. (Specifically, quantum computation, sublinear algorithms, complexity theory, interactive proofs and cryptography)
- Research Areas: Machine learning
Jia Deng, Room 423
- Research Areas: Computer Vision, Machine Learning.
- Object recognition and action recognition
- Deep Learning, autoML, meta-learning
- Geometric reasoning, logical reasoning
Adji Bousso Dieng, Room 406
- Research areas: Vertaix is a research lab at Princeton University led by Professor Adji Bousso Dieng. We work at the intersection of artificial intelligence (AI) and the natural sciences. The models and algorithms we develop are motivated by problems in those domains and contribute to advancing methodological research in AI. We leverage tools in statistical machine learning and deep learning in developing methods for learning with the data, of various modalities, arising from the natural sciences.
Robert Dondero, Corwin Hall, Room 038
- Research Areas: Software engineering; software engineering education.
- Develop or evaluate tools to facilitate student learning in undergraduate computer science courses at Princeton, and beyond.
- In particular, can code critiquing tools help students learn about software quality?
Zeev Dvir, 194 Nassau St., Room 250
- Research Areas: computational complexity, pseudo-randomness, coding theory and discrete mathematics.
- Independent Research: I have various research problems related to Pseudorandomness, Coding theory, Complexity and Discrete mathematics - all of which require strong mathematical background. A project could also be based on writing a survey paper describing results from a few theory papers revolving around some particular subject.
Benjamin Eysenbach, Room 416
- Research areas: reinforcement learning, machine learning. My advisees would typically have taken COS324.
- Using RL algorithms to applications in science and engineering.
- Emergent behavior of RL algorithms on high-fidelity robotic simulators.
- Studying how architectures and representations can facilitate generalization.
Christiane Fellbaum, 1-S-14 Green
- Research Areas: theoretical and computational linguistics, word sense disambiguation, lexical resource construction, English and multilingual WordNet(s), ontology
- Anything having to do with natural language--come and see me with/for ideas suitable to your background and interests. Some topics students have worked on in the past:
- Developing parsers, part-of-speech taggers, morphological analyzers for underrepresented languages (you don't have to know the language to develop such tools!)
- Quantitative approaches to theoretical linguistics questions
- Extensions and interfaces for WordNet (English and WN in other languages),
- Applications of WordNet(s), including:
- Foreign language tutoring systems,
- Spelling correction software,
- Word-finding/suggestion software for ordinary users and people with memory problems,
- Machine Translation
- Sentiment and Opinion detection
- Automatic reasoning and inferencing
- Collaboration with professors in the social sciences and humanities ("Digital Humanities")
Adam Finkelstein, Room 424
- Research Areas: computer graphics, audio.
Robert S. Fish, Corwin Hall, Room 037
- Networking and telecommunications
- Learning, perception, and intelligence, artificial and otherwise;
- Human-computer interaction and computer-supported cooperative work
- Online education, especially in Computer Science Education
- Topics in research and development innovation methodologies including standards, open-source, and entrepreneurship
- Distributed autonomous organizations and related blockchain technologies
Michael Freedman, Room 308
- Research Areas: Distributed systems, security, networking
- Projects related to streaming data analysis, datacenter systems and networks, untrusted cloud storage and applications. Please see my group website at http://sns.cs.princeton.edu/ for current research projects.
Ruth Fong, Room 032
- Research Areas: computer vision, machine learning, deep learning, interpretability, explainable AI, fairness and bias in AI
- Develop a technique for understanding AI models
- Design a AI model that is interpretable by design
- Build a paradigm for detecting and/or correcting failure points in an AI model
- Analyze an existing AI model and/or dataset to better understand its failure points
- Build a computer vision system for another domain (e.g., medical imaging, satellite data, etc.)
- Develop a software package for explainable AI
- Adapt explainable AI research to a consumer-facing problem
Note: I am happy to advise any project if there's a sufficient overlap in interest and/or expertise; please reach out via email to chat about project ideas.
Tom Griffiths, Room 405
Available for Fall 2024 single-semester IW advising, only
Research areas: computational cognitive science, computational social science, machine learning and artificial intelligence
Note: I am open to projects that apply ideas from computer science to understanding aspects of human cognition in a wide range of areas, from decision-making to cultural evolution and everything in between. For example, we have current projects analyzing chess game data and magic tricks, both of which give us clues about how human minds work. Students who have expertise or access to data related to games, magic, strategic sports like fencing, or other quantifiable domains of human behavior feel free to get in touch.
Aarti Gupta, Room 220
- Research Areas: Formal methods, program analysis, logic decision procedures
- Finding bugs in open source software using automatic verification tools
- Software verification (program analysis, model checking, test generation)
- Decision procedures for logical reasoning (SAT solvers, SMT solvers)
Elad Hazan, Room 409
- Research interests: machine learning methods and algorithms, efficient methods for mathematical optimization, regret minimization in games, reinforcement learning, control theory and practice
- Machine learning, efficient methods for mathematical optimization, statistical and computational learning theory, regret minimization in games.
- Implementation and algorithm engineering for control, reinforcement learning and robotics
- Implementation and algorithm engineering for time series prediction
Felix Heide, Room 410
- Research Areas: Computational Imaging, Computer Vision, Machine Learning (focus on Optimization and Approximate Inference).
- Optical Neural Networks
- Hardware-in-the-loop Holography
- Zero-shot and Simulation-only Learning
- Object recognition in extreme conditions
- 3D Scene Representations for View Generation and Inverse Problems
- Long-range Imaging in Scattering Media
- Hardware-in-the-loop Illumination and Sensor Optimization
- Inverse Lidar Design
- Phase Retrieval Algorithms
- Proximal Algorithms for Learning and Inference
- Domain-Specific Language for Optics Design
Peter Henderson , 302 Sherrerd Hall
- Research Areas: Machine learning, law, and policy
Kyle Jamieson, Room 306
- Research areas: Wireless and mobile networking; indoor radar and indoor localization; Internet of Things
- See other topics on my independent work ideas page (campus IP and CS dept. login req'd)
Alan Kaplan, 221 Nassau Street, Room 105
Research Areas:
- Random apps of kindness - mobile application/technology frameworks used to help individuals or communities; topic areas include, but are not limited to: first response, accessibility, environment, sustainability, social activism, civic computing, tele-health, remote learning, crowdsourcing, etc.
- Tools automating programming language interoperability - Java/C++, React Native/Java, etc.
- Software visualization tools for education
- Connected consumer devices, applications and protocols
Brian Kernighan, Room 311
- Research Areas: application-specific languages, document preparation, user interfaces, software tools, programming methodology
- Application-oriented languages, scripting languages.
- Tools; user interfaces
- Digital humanities
Zachary Kincaid, Room 219
- Research areas: programming languages, program analysis, program verification, automated reasoning
- Independent Research Topics:
- Develop a practical algorithm for an intractable problem (e.g., by developing practical search heuristics, or by reducing to, or by identifying a tractable sub-problem, ...).
- Design a domain-specific programming language, or prototype a new feature for an existing language.
- Any interesting project related to programming languages or logic.
Gillat Kol, Room 316
Aleksandra korolova, 309 sherrerd hall.
- Research areas: Societal impacts of algorithms and AI; privacy; fair and privacy-preserving machine learning; algorithm auditing.
Advisees typically have taken one or more of COS 226, COS 324, COS 423, COS 424 or COS 445.
Pravesh Kothari, Room 320
- Research areas: Theory
Amit Levy, Room 307
- Research Areas: Operating Systems, Distributed Systems, Embedded Systems, Internet of Things
- Distributed hardware testing infrastructure
- Second factor security tokens
- Low-power wireless network protocol implementation
- USB device driver implementation
Kai Li, Room 321
- Research Areas: Distributed systems; storage systems; content-based search and data analysis of large datasets.
- Fast communication mechanisms for heterogeneous clusters.
- Approximate nearest-neighbor search for high dimensional data.
- Data analysis and prediction of in-patient medical data.
- Optimized implementation of classification algorithms on manycore processors.
Xiaoyan Li, 221 Nassau Street, Room 104
- Research areas: Information retrieval, novelty detection, question answering, AI, machine learning and data analysis.
- Explore new statistical retrieval models for document retrieval and question answering.
- Apply AI in various fields.
- Apply supervised or unsupervised learning in health, education, finance, and social networks, etc.
- Any interesting project related to AI, machine learning, and data analysis.
Lydia Liu, Room 414
- Research Areas: algorithmic decision making, machine learning and society
- Theoretical foundations for algorithmic decision making (e.g. mathematical modeling of data-driven decision processes, societal level dynamics)
- Societal impacts of algorithms and AI through a socio-technical lens (e.g. normative implications of worst case ML metrics, prediction and model arbitrariness)
- Machine learning for social impact domains, especially education (e.g. responsible development and use of LLMs for education equity and access)
- Evaluation of human-AI decision making using statistical methods (e.g. causal inference of long term impact)
Wyatt Lloyd, Room 323
- Research areas: Distributed Systems
- Caching algorithms and implementations
- Storage systems
- Distributed transaction algorithms and implementations
Alex Lombardi , Room 312
- Research Areas: Theory
Margaret Martonosi, Room 208
- Quantum Computing research, particularly related to architecture and compiler issues for QC.
- Computer architectures specialized for modern workloads (e.g., graph analytics, machine learning algorithms, mobile applications
- Investigating security and privacy vulnerabilities in computer systems, particularly IoT devices.
- Other topics in computer architecture or mobile / IoT systems also possible.
Jonathan Mayer, Sherrerd Hall, Room 307
Available for Spring 2025 single-semester IW, only
- Research areas: Technology law and policy, with emphasis on national security, criminal procedure, consumer privacy, network management, and online speech.
- Assessing the effects of government policies, both in the public and private sectors.
- Collecting new data that relates to government decision making, including surveying current business practices and studying user behavior.
- Developing new tools to improve government processes and offer policy alternatives.
Mae Milano, Room 307
- Local-first / peer-to-peer systems
- Wide-ares storage systems
- Consistency and protocol design
- Type-safe concurrency
- Language design
- Gradual typing
- Domain-specific languages
- Languages for distributed systems
Andrés Monroy-Hernández, Room 405
- Research Areas: Human-Computer Interaction, Social Computing, Public-Interest Technology, Augmented Reality, Urban Computing
- Research interests:developing public-interest socio-technical systems. We are currently creating alternatives to gig work platforms that are more equitable for all stakeholders. For instance, we are investigating the socio-technical affordances necessary to support a co-op food delivery network owned and managed by workers and restaurants. We are exploring novel system designs that support self-governance, decentralized/federated models, community-centered data ownership, and portable reputation systems. We have opportunities for students interested in human-centered computing, UI/UX design, full-stack software development, and qualitative/quantitative user research.
- Beyond our core projects, we are open to working on research projects that explore the use of emerging technologies, such as AR, wearables, NFTs, and DAOs, for creative and out-of-the-box applications.
Christopher Moretti, Corwin Hall, Room 036
- Research areas: Distributed systems, high-throughput computing, computer science/engineering education
- Expansion, improvement, and evaluation of open-source distributed computing software.
- Applications of distributed computing for "big science" (e.g. biometrics, data mining, bioinformatics)
- Software and best practices for computer science education and study, especially Princeton's 126/217/226 sequence or MOOCs development
- Sports analytics and/or crowd-sourced computing
Radhika Nagpal, F316 Engineering Quadrangle
- Research areas: control, robotics and dynamical systems
Karthik Narasimhan, Room 422
- Research areas: Natural Language Processing, Reinforcement Learning
- Autonomous agents for text-based games ( https://www.microsoft.com/en-us/research/project/textworld/ )
- Transfer learning/generalization in NLP
- Techniques for generating natural language
- Model-based reinforcement learning
Arvind Narayanan, 308 Sherrerd Hall
Research Areas: fair machine learning (and AI ethics more broadly), the social impact of algorithmic systems, tech policy
Pedro Paredes, Corwin Hall, Room 041
My primary research work is in Theoretical Computer Science.
* Research Interest: Spectral Graph theory, Pseudorandomness, Complexity theory, Coding Theory, Quantum Information Theory, Combinatorics.
The IW projects I am interested in advising can be divided into three categories:
1. Theoretical research
I am open to advise work on research projects in any topic in one of my research areas of interest. A project could also be based on writing a survey given results from a few papers. Students should have a solid background in math (e.g., elementary combinatorics, graph theory, discrete probability, basic algebra/calculus) and theoretical computer science (226 and 240 material, like big-O/Omega/Theta, basic complexity theory, basic fundamental algorithms). Mathematical maturity is a must.
A (non exhaustive) list of topics of projects I'm interested in: * Explicit constructions of better vertex expanders and/or unique neighbor expanders. * Construction deterministic or random high dimensional expanders. * Pseudorandom generators for different problems. * Topics around the quantum PCP conjecture. * Topics around quantum error correcting codes and locally testable codes, including constructions, encoding and decoding algorithms.
2. Theory informed practical implementations of algorithms Very often the great advances in theoretical research are either not tested in practice or not even feasible to be implemented in practice. Thus, I am interested in any project that consists in trying to make theoretical ideas applicable in practice. This includes coming up with new algorithms that trade some theoretical guarantees for feasible implementation yet trying to retain the soul of the original idea; implementing new algorithms in a suitable programming language; and empirically testing practical implementations and comparing them with benchmarks / theoretical expectations. A project in this area doesn't have to be in my main areas of research, any theoretical result could be suitable for such a project.
Some examples of areas of interest: * Streaming algorithms. * Numeric linear algebra. * Property testing. * Parallel / Distributed algorithms. * Online algorithms. 3. Machine learning with a theoretical foundation
I am interested in projects in machine learning that have some mathematical/theoretical, even if most of the project is applied. This includes topics like mathematical optimization, statistical learning, fairness and privacy.
One particular area I have been recently interested in is in the area of rating systems (e.g., Chess elo) and applications of this to experts problems.
Final Note: I am also willing to advise any project with any mathematical/theoretical component, even if it's not the main one; please reach out via email to chat about project ideas.
Iasonas Petras, Corwin Hall, Room 033
- Research Areas: Information Based Complexity, Numerical Analysis, Quantum Computation.
- Prerequisites: Reasonable mathematical maturity. In case of a project related to Quantum Computation a certain familiarity with quantum mechanics is required (related courses: ELE 396/PHY 208).
- Possible research topics include:
1. Quantum algorithms and circuits:
- i. Design or simulation quantum circuits implementing quantum algorithms.
- ii. Design of quantum algorithms solving/approximating continuous problems (such as Eigenvalue problems for Partial Differential Equations).
2. Information Based Complexity:
- i. Necessary and sufficient conditions for tractability of Linear and Linear Tensor Product Problems in various settings (for example worst case or average case).
- ii. Necessary and sufficient conditions for tractability of Linear and Linear Tensor Product Problems under new tractability and error criteria.
- iii. Necessary and sufficient conditions for tractability of Weighted problems.
- iv. Necessary and sufficient conditions for tractability of Weighted Problems under new tractability and error criteria.
3. Topics in Scientific Computation:
- i. Randomness, Pseudorandomness, MC and QMC methods and their applications (Finance, etc)
Yuri Pritykin, 245 Carl Icahn Lab
- Research interests: Computational biology; Cancer immunology; Regulation of gene expression; Functional genomics; Single-cell technologies.
- Potential research projects: Development, implementation, assessment and/or application of algorithms for analysis, integration, interpretation and visualization of multi-dimensional data in molecular biology, particularly single-cell and spatial genomics data.
Benjamin Raphael, Room 309
- Research interests: Computational biology and bioinformatics; Cancer genomics; Algorithms and machine learning approaches for analysis of large-scale datasets
- Implementation and application of algorithms to infer evolutionary processes in cancer
- Identifying correlations between combinations of genomic mutations in human and cancer genomes
- Design and implementation of algorithms for genome sequencing from new DNA sequencing technologies
- Graph clustering and network anomaly detection, particularly using diffusion processes and methods from spectral graph theory
Vikram Ramaswamy, 035 Corwin Hall
- Research areas: Interpretability of AI systems, Fairness in AI systems, Computer vision.
- Constructing a new method to explain a model / create an interpretable by design model
- Analyzing a current model / dataset to understand bias within the model/dataset
- Proposing new fairness evaluations
- Proposing new methods to train to improve fairness
- Developing synthetic datasets for fairness / interpretability benchmarks
- Understanding robustness of models
Ran Raz, Room 240
- Research Area: Computational Complexity
- Independent Research Topics: Computational Complexity, Information Theory, Quantum Computation, Theoretical Computer Science
Szymon Rusinkiewicz, Room 406
- Research Areas: computer graphics; computer vision; 3D scanning; 3D printing; robotics; documentation and visualization of cultural heritage artifacts
- Research ways of incorporating rotation invariance into computer visiontasks such as feature matching and classification
- Investigate approaches to robust 3D scan matching
- Model and compensate for imperfections in 3D printing
- Given a collection of small mobile robots, apply control policies learned in simulation to the real robots.
Olga Russakovsky, Room 408
- Research Areas: computer vision, machine learning, deep learning, crowdsourcing, fairness&bias in AI
- Design a semantic segmentation deep learning model that can operate in a zero-shot setting (i.e., recognize and segment objects not seen during training)
- Develop a deep learning classifier that is impervious to protected attributes (such as gender or race) that may be erroneously correlated with target classes
- Build a computer vision system for the novel task of inferring what object (or part of an object) a human is referring to when pointing to a single pixel in the image. This includes both collecting an appropriate dataset using crowdsourcing on Amazon Mechanical Turk, creating a new deep learning formulation for this task, and running extensive analysis of both the data and the model
Sebastian Seung, Princeton Neuroscience Institute, Room 153
- Research Areas: computational neuroscience, connectomics, "deep learning" neural networks, social computing, crowdsourcing, citizen science
- Gamification of neuroscience (EyeWire 2.0)
- Semantic segmentation and object detection in brain images from microscopy
- Computational analysis of brain structure and function
- Neural network theories of brain function
Jaswinder Pal Singh, Room 324
- Research Areas: Boundary of technology and business/applications; building and scaling technology companies with special focus at that boundary; parallel computing systems and applications: parallel and distributed applications and their implications for software and architectural design; system software and programming environments for multiprocessors.
- Develop a startup company idea, and build a plan/prototype for it.
- Explore tradeoffs at the boundary of technology/product and business/applications in a chosen area.
- Study and develop methods to infer insights from data in different application areas, from science to search to finance to others.
- Design and implement a parallel application. Possible areas include graphics, compression, biology, among many others. Analyze performance bottlenecks using existing tools, and compare programming models/languages.
- Design and implement a scalable distributed algorithm.
Mona Singh, Room 420
- Research Areas: computational molecular biology, as well as its interface with machine learning and algorithms.
- Whole and cross-genome methods for predicting protein function and protein-protein interactions.
- Analysis and prediction of biological networks.
- Computational methods for inferring specific aspects of protein structure from protein sequence data.
- Any other interesting project in computational molecular biology.
Robert Tarjan, 194 Nassau St., Room 308
- Research Areas: Data structures; graph algorithms; combinatorial optimization; computational complexity; computational geometry; parallel algorithms.
- Implement one or more data structures or combinatorial algorithms to provide insight into their empirical behavior.
- Design and/or analyze various data structures and combinatorial algorithms.
Olga Troyanskaya, Room 320
- Research Areas: Bioinformatics; analysis of large-scale biological data sets (genomics, gene expression, proteomics, biological networks); algorithms for integration of data from multiple data sources; visualization of biological data; machine learning methods in bioinformatics.
- Implement and evaluate one or more gene expression analysis algorithm.
- Develop algorithms for assessment of performance of genomic analysis methods.
- Develop, implement, and evaluate visualization tools for heterogeneous biological data.
David Walker, Room 211
- Research Areas: Programming languages, type systems, compilers, domain-specific languages, software-defined networking and security
- Independent Research Topics: Any other interesting project that involves humanitarian hacking, functional programming, domain-specific programming languages, type systems, compilers, software-defined networking, fault tolerance, language-based security, theorem proving, logic or logical frameworks.
Shengyi Wang, Postdoctoral Research Associate, Room 216
Available for Fall 2024 single-semester IW, only
- Independent Research topics: Explore Escher-style tilings using (introductory) group theory and automata theory to produce beautiful pictures.
Kevin Wayne, Corwin Hall, Room 040
- Research Areas: design, analysis, and implementation of algorithms; data structures; combinatorial optimization; graphs and networks.
- Design and implement computer visualizations of algorithms or data structures.
- Develop pedagogical tools or programming assignments for the computer science curriculum at Princeton and beyond.
- Develop assessment infrastructure and assessments for MOOCs.
Matt Weinberg, 194 Nassau St., Room 222
- Research Areas: algorithms, algorithmic game theory, mechanism design, game theoretical problems in {Bitcoin, networking, healthcare}.
- Theoretical questions related to COS 445 topics such as matching theory, voting theory, auction design, etc.
- Theoretical questions related to incentives in applications like Bitcoin, the Internet, health care, etc. In a little bit more detail: protocols for these systems are often designed assuming that users will follow them. But often, users will actually be strictly happier to deviate from the intended protocol. How should we reason about user behavior in these protocols? How should we design protocols in these settings?
Huacheng Yu, Room 310
- data structures
- streaming algorithms
- design and analyze data structures / streaming algorithms
- prove impossibility results (lower bounds)
- implement and evaluate data structures / streaming algorithms
Ellen Zhong, Room 314
Opportunities outside the department.
We encourage students to look in to doing interdisciplinary computer science research and to work with professors in departments other than computer science. However, every CS independent work project must have a strong computer science element (even if it has other scientific or artistic elements as well.) To do a project with an adviser outside of computer science you must have permission of the department. This can be accomplished by having a second co-adviser within the computer science department or by contacting the independent work supervisor about the project and having he or she sign the independent work proposal form.
Here is a list of professors outside the computer science department who are eager to work with computer science undergraduates.
Maria Apostolaki, Engineering Quadrangle, C330
- Research areas: Computing & Networking, Data & Information Science, Security & Privacy
Branko Glisic, Engineering Quadrangle, Room E330
- Documentation of historic structures
- Cyber physical systems for structural health monitoring
- Developing virtual and augmented reality applications for documenting structures
- Applying machine learning techniques to generate 3D models from 2D plans of buildings
- Contact : Rebecca Napolitano, rkn2 (@princeton.edu)
Mihir Kshirsagar, Sherrerd Hall, Room 315
Center for Information Technology Policy.
- Consumer protection
- Content regulation
- Competition law
- Economic development
- Surveillance and discrimination
Sharad Malik, Engineering Quadrangle, Room B224
Select a Senior Thesis Adviser for the 2020-21 Academic Year.
- Design of reliable hardware systems
- Verifying complex software and hardware systems
Prateek Mittal, Engineering Quadrangle, Room B236
- Internet security and privacy
- Social Networks
- Privacy technologies, anonymous communication
- Network Science
- Internet security and privacy: The insecurity of Internet protocols and services threatens the safety of our critical network infrastructure and billions of end users. How can we defend end users as well as our critical network infrastructure from attacks?
- Trustworthy social systems: Online social networks (OSNs) such as Facebook, Google+, and Twitter have revolutionized the way our society communicates. How can we leverage social connections between users to design the next generation of communication systems?
- Privacy Technologies: Privacy on the Internet is eroding rapidly, with businesses and governments mining sensitive user information. How can we protect the privacy of our online communications? The Tor project (https://www.torproject.org/) is a potential application of interest.
Ken Norman, Psychology Dept, PNI 137
- Research Areas: Memory, the brain and computation
- Lab: Princeton Computational Memory Lab
Potential research topics
- Methods for decoding cognitive state information from neuroimaging data (fMRI and EEG)
- Neural network simulations of learning and memory
Caroline Savage
Office of Sustainability, Phone:(609)258-7513, Email: cs35 (@princeton.edu)
The Campus as Lab program supports students using the Princeton campus as a living laboratory to solve sustainability challenges. The Office of Sustainability has created a list of campus as lab research questions, filterable by discipline and topic, on its website .
An example from Computer Science could include using TigerEnergy , a platform which provides real-time data on campus energy generation and consumption, to study one of the many energy systems or buildings on campus. Three CS students used TigerEnergy to create a live energy heatmap of campus .
Other potential projects include:
- Apply game theory to sustainability challenges
- Develop a tool to help visualize interactions between complex campus systems, e.g. energy and water use, transportation and storm water runoff, purchasing and waste, etc.
- How can we learn (in aggregate) about individuals’ waste, energy, transportation, and other behaviors without impinging on privacy?
Janet Vertesi, Sociology Dept, Wallace Hall, Room 122
- Research areas: Sociology of technology; Human-computer interaction; Ubiquitous computing.
- Possible projects: At the intersection of computer science and social science, my students have built mixed reality games, produced artistic and interactive installations, and studied mixed human-robot teams, among other projects.
David Wentzlaff, Engineering Quadrangle, Room 228
Computing, Operating Systems, Sustainable Computing.
- Instrument Princeton's Green (HPCRC) data center
- Investigate power utilization on an processor core implemented in an FPGA
- Dismantle and document all of the components in modern electronics. Invent new ways to build computers that can be recycled easier.
- Other topics in parallel computer architecture or operating systems
- About Brown
- Campus Life
Information for:
- Current Students
- Friends & Neighbors
- A to Z Index
- People Directory
- Social@Brown
- About the Department
- Systems & Software
- Socially Responsible Computing
- Positions / Jobs
- Brown CS News
- Brown CS Blog
- Our Community
- Grad Students
- Ugrad Students
- Research Links
- Publications
- Opportunities For Visiting Students
- Degree Programs
- Computer Science
- Cybersecurity
- Undergraduate
- Interdisciplinary
- Miscellaneous
- Course List
- TA Program
- Who We Are
- Action Plan & Initiatives
- Student Advocates
- Data And Demographics
- Student Groups
- UTA Endowment
- Home »
- Research »
- Publications »
- Student Project Reports »
- Master's
Master's Project Reports
Chen, Catherine
Chen, Yiwen and Ren, Jiahao
Chernosky, Brynn
Christou, Neophytes
Dekle, Max
Demetci, Pinar
Fu, Changcheng
Fu, Haotian
Goktas, Denizalp
Golovanevsky, Michal
Howe, Wyatt
Kaan, Ozulkulu
Li, Shihang
Lu, Cheng-You
Luo, Calvin
Maynard, Patrick
Peng, Kathy
Ramesh, Dev
Ryjikov, Benjamin
Scherick, James
Sriram, Abhinav
Zhou, Peisen
Zhou, Tongyu
Zhuo, Wang
Computer Science at Brown University Providence, Rhode Island 02912 USA Phone: 401-863-7600 Map & Directions / Contact Us
- Harvard Library
- Research Guides
- Faculty of Arts & Sciences Libraries
Computer Science Library Research Guide
Find dissertations and theses.
- Get Started
- How to get the full-text
- What is Peer Review?
- Find Books in the SEC Library This link opens in a new window
- Find Conference Proceedings
- Find Patents This link opens in a new window
- Find Standards
- Find Technical Reports
- Find Videos
- Ask a Librarian This link opens in a new window
Engineering Librarian
How to search for Harvard dissertations
- DASH , Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard. Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.
- Check HOLLIS, the Library Catalog, and refine your results by using the Advanced Search and limiting Resource Type to Dissertations
- Search the database ProQuest Dissertations & Theses Global Don't hesitate to Ask a Librarian for assistance.
How to search for Non-Harvard dissertations
Library Database:
- ProQuest Dissertations & Theses Global
Free Resources:
- Many universities provide full-text access to their dissertations via a digital repository. If you know the title of a particular dissertation or thesis, try doing a Google search.
Related Sites
- Formatting Your Dissertation - GSAS
- Ph.D. Dissertation Submission - FAS
- Empowering Students Before you Sign that Contract! - Copyright at Harvard Library
Select Library Titles
- << Previous: Find Conference Proceedings
- Next: Find Patents >>
- Last Updated: Feb 27, 2024 1:52 PM
- URL: https://guides.library.harvard.edu/cs
Harvard University Digital Accessibility Policy
Thesis Guide
Advice for great computer science thesis projects.
My thesis project was the most rewarding experience of my computer science studies. Unfortunately, many students suffer theirs as frustrating, tedious and with few opportunities for personal growth.
In this guide, I want to share the pitfalls and best practices from supervising 50+ thesis projects in computer science at TUM . I hope that it helps you write a great thesis and grow in the process. Start reading here .
Slides From My Presentations
We provide slides in English from January 2024 . The slides on how to write a guided research are from Roman’s talk from January 2024.
For more information on how to write a thesis at the company Elmar has founded, we recommend our software intelligence night. Please register such that we can order enough pizza and beer for everyone!
Video Recordings
Below are videos that summarize the thesis guide content. The first one is in German, the second one in in English.
German version:
English version:
Recent Posts
Talk at tum: how to write a great master’s thesis, talk at tum: how to do a guided research, avoiding typical pitfalls (not only) at tum, from thesis to paper: my first publication on a scientific conference, how to write a case study.
- Already have a WordPress.com account? Log in now.
- Subscribe Subscribed
- Copy shortlink
- Report this content
- View post in Reader
- Manage subscriptions
- Collapse this bar
- Advisory Board
- Biological Sciences
- Computing & Software Systems
- Engineering & Mathematics
- Physical Sciences
- STEM Inclusivity Awards
- School of STEM contact
- School of STEM Employment
- Student Forms & Resources
- Investigative Biology
- Research & Internships
- Student Organizations
- Friday Harbor Laboratories
- Earth System Science
- Student Projects
- Actuarial Science
- Computer Science & Software Engineering (CSSE)
- Data Science
- Information Technology (IT)
- Marine Biology
- Mathematics
- Neuroscience
- Capstone & Symposium Event
- Undergraduate Policies & Procedures
- CSS Registration & Waitlists
- Getting Started with Computer Science
- Excellence in Cybersecurity Education
- How to Apply
- Core Courses
- Elective Courses
- Project or Thesis
- Computer Engineering
- Power & Energy
- Signal Processing
- Biomedical Systems and Devices
- Microelectronics and Devices
- Wireless, RF/Microwave, and Telecommunications
- Prerequisites guide
- Frequently Asked Questions
- Career Resources
- Previous Quarters
- Division of Biological Sciences Faculty
- Division of Computing & Software Systems Faculty
- Division of Engineering & Mathematics Faculty
- Faculty in Chemistry
- Faculty in Earth System Science
- Faculty in Physics
- Associate Professor with Tenure
- Full Professor
- Teaching Track Faculty
- Promotion and Tenure Public Statement
- Teaching Effectiveness
- Capstones & internships
- Center for Biotechnology Innovation & Training
- National Center of Academic Excellence in Cybersecurity
- Research Experiences for Undergraduates (REU)
- Faculty Research Projects
- Research Experiences for Undergraduates (REU) from Heritage University
- Ocean Engineering
- Safety and Security Studies and Modeling in Fluids
- Instrumentation
- Room Access
- Support Services
- Quick Links & Forms
- EE Open lab schedule
Quick Links
- Information Technology
- Commuter Services
- Human Resources
- Campus Safety
Thesis/Project Student Process
The following process applies to all Division of Computing & Software Systems (CSS) graduate students, regardless of degree program (CSSE or CSE) or thesis/project goals.
In general, a thesis is a scholarly written document aimed at an academic audience as a contribution to an existing body of knowledge. A project is aimed at building a connection between academic concepts and the application of those concepts into real-world context.
Before students determine which option to pursue, they should discuss how each option applies to their own individual goals for their degree program with their faculty advisor and the CSS Graduate Advisor.
Step 1: Form a Supervisory Committee
Students who desire to register for their thesis/project credit(s) must first form a committee of faculty who will supervise and grade their efforts and results of their work. A supervisory committee will consist of a student’s Faculty Advisor (who will serve as Committee Chair) and at least 2-3 additional faculty members. At least two of the committee members must be faculty whose primary appointment is in the Computing & Software Systems Division. The Chair of the Committee and at least one-half of the total membership must be members of the graduate faculty.
Students must submit a signed Request to Form a Supervisory Committee to the CSS Graduate Advisor to obtain an entry code to register for the class. Included with the signed form should be a proposal (minimally 3 pages) addressing the questions asked in section 2 of the form. Please follow the proposal guidelines detailed in the link below:
- Proposal Guidelines
- Proposal Rubric
Before submitting the form, students are expected to attend another students CSS master’s project or thesis final examination & defense. View the Thesis/Project Final Exam Schedule .
The deadline for all committee requests is the first day of the seventh week of the quarter PRECEDING the start of a student’s project or thesis coursework . Students should request for specific faculty to staff their Supervisory Committee; however, final staffing assignments of the Supervisory Committee resides with the CSS Division’s Graduate Program Coordinator. Once a supervisory request has been granted, students will receive an email from the CSS Graduate Advisor notifying them of the approved committee and an entry code to register for their thesis/project credit(s). Students are encouraged to submit their request early, to avoid any registration late fees.
Submission Deadlines
- Winter 2024: November 6, 2023
- Spring 2024: February 12, 2024
- Summer 2024: May 6, 2024
- Autumn 2024: July 29, 2024
Step 2: File a Thesis or Project Plan
By the end of the second week of the quarter in which a student is registered for their first capstone credits, the student must submit to their Supervisory Committee a detailed project or thesis plan. The plan should include an updated proposal of the work to be done, a time table listing key milestones and associated deliverables, the quality criteria and specific metrics by which student expects to measure the quality of their result, and the software development lifecycle and processes planned to complete the work. There are no penalties for deviations in the approved plan or failure to meet the estimates in the timetable or failure to achieve the quality goals. The plan simply provides a well-defined start for the remainder of the capstone work. A PDF copy of the approved plan must be submitted by the student to the STEM Graduate Advising Office.
- Winter 2024: January 16, 2024
- Spring 2024: April 8, 2024
- Summer 2024: July 1, 2024
To submit your plan to the STEM Graduate Office, please send your PDF document to [email protected] , with the subject line “Project Plan” or “Thesis Plan”.
Register for CSSSKL 594
A substantial working draft of the capstone research project paper or thesis should be completed by the beginning of the quarter in which you expect to graduate. For this reason, generally, you will enroll in CSSSKL 594 “Scientific Writing for Thesis/Project” during the quarter before you expect to graduate. (For example, to graduate in the spring, you should enroll in 594 in the Winter). Please consult with your supervisory committee chair as to the best timing of this class for the most benefit to you.
Step 3: Communicate Regular Progress Reports with the Supervisory Committee
Throughout the period of enrollment in the thesis/project credit(s), students are expected to lead the effort to regularly update their Supervisory Committee members on their work progress. Students should plan on meeting with their Committee Chair frequently based on the advice from the committee chair (minimally three times in each quarter that they are enrolled for thesis/project credits).
To register for second and subsequent quarters, students should work with their Chair to determine the workload for the upcoming quarter and the number of credits to enroll for. Once the Committee Chair grants permission and confirms the number of credits for the next quarter, the student forwards that permission to the CSS Graduate Advisor, who will issue a new entry code to use for registration. In cases where satisfactory progress is made, the student will be issued of a grade of N (in progress) until the project/thesis is complete.
Students who fail to make appropriate progress in their project/thesis during a quarter may receive a notification from their Chair warning them of lack of progress. If students continue failing to achieve satisfactory progress, Chairs may also choose to issue a grade of NC (No Credit) and move to dissolve the Committee. For full information regarding the project/thesis continuation policy, please see the Academic Progress Policy .
- Guidelines for Status Reports
- Rubric for Status Reports
Step 4: Schedule Final Defense
By 5PM on Thursday of the third week of the quarter that a student is registered for their final thesis/project credits, the student must consult with their supervisory committee members to schedule a defense of their culminating work. Students should work closely with their committee chair to ensure that they are ready for their final examination and defense. The STEM Graduate Advising Office will send students the link to the online scheduling system each quarter to select a time/date for their defense. View details about defense format options and attendance requirements in the Defense Attendance Policy .
Step 5: Apply to Graduate
By 5:00 p.m. on Thursday of the third week of the quarter that a student is registered for their final degree credits the student must apply to graduate by filing a master’s degree request online . Students should work with the CSS Graduate Advisor and Committee Chair to plan their degree curriculum accordingly, so that their final capstone requirements serve as the culmination of their degree coursework. Students must be registered for credits during the quarter they want to graduate.
Step 6: Submit Draft of Final Paper/Thesis
Writing the final paper/thesis is a time intensive process. Students should plan ahead to schedule substantial time to compose and proofread their paper/thesis. A low-quality paper/thesis may lead to the delay of their defense. Early in the quarter that a student is registered for their final thesis/project credits, the student must review the following sample templates and discuss with their committee chair on the preference for the organization of their final project or thesis report:
- Guidelines from the UW Graduate School for thesis document
- Word template for thesis and project papers
- Latex template for thesis and project papers
Two weeks before the defense , submit the title and abstract to the School of STEM Office of Graduate Studies to post on the Final Examination & Defense schedule.
At least seven days before the defense, the student must submit a final draft of their project paper or thesis to their committee for a preliminary reading. The purpose of this draft is to demonstrate to the Supervisory Committee that the student has achieved a Master’s level competency in computer science and software engineering, and that the student is ready to defend their work.
Step 7: Final Examination and Defense
The Final Examination and Defense consists of (a) a public student presentation, (b) a public questions and answers session, (c) a closed-door question and answer session between the student and the Supervisory Committee, (d) a brief private discussion among the Supervisory Committee, and (e) the Supervisory Committee announcing to the student the result of the Final Examination and Defense. A typical defense will last close to two hours. If a student does not pass the Final Examination and Defense, the Supervisory Committee will work with the student to decide upon the necessary additional work required for obtaining their Master’s degree. The final examination and defense must take place no later than the third day of the last week of the quarter (final exam week).
- Presentation Guidelines
- Presentation Rubric
Step 8: File your Thesis or Project Paper
After passing their final examination/defense, students must submit an electronic copy (PDF) of their final project paper or thesis, incorporating any post examination/defense revisions required by their Committee to the following entities in the order listed:
- Supervisory Committee members, by the time/date given to students by their Chairs. This deadline will vary, based on the date of the student’s defense and scope of requested changes. Students must receive approval of final document from their Committee before submitting the paper to the STEM Graduate Office (all students) and the UW Graduate School (thesis students only).
- STEM Graduate Office by 11:59 p.m. on the final day of the quarter in which the student intends to graduate. See submission instructions below.
- Thesis Students only: UW Graduate School by 11:59 p.m. on the last day of the quarter in which the student intends to graduate. This step applies to thesis students only. See “Special Notes for Thesis Students” section below.
Failure to complete any of the above steps by the appropriate time/date will result in a delay of graduation.
Students submit their final document to the STEM Graduate Office ( [email protected] ) with their supervisory committee members copied on the email, and the email subject as “Final Thesis”, or “Final Project Report.”
Special Notes for Thesis Students
- Formatting and process : Thesis students must meet formatting requirements, and follow a specific submission process. Students are urged to read the UW thesis formatting guidelines well in advance of their final examination, and to set up their ProQuest account early in the quarter they intend to graduate.
- Master’s Supervisory Committee Form : Thesis students must submit a signed Master’s Supervisory Committee Form as part of the ETD submission process.
Additional Information
- Summary of Master’s Guidelines & Rubrics Documents
- Video Overview and Guideline
Navigation Menu
Search code, repositories, users, issues, pull requests..., provide feedback.
We read every piece of feedback, and take your input very seriously.
Saved searches
Use saved searches to filter your results more quickly.
To see all available qualifiers, see our documentation .
computer-science-project
Here are 42 public repositories matching this topic..., vatshayan / final-year-project-cryptographic-technique-for-communication-system.
Top B.tech/M.tech Final Year Project "Design and Analysis of Cryptographic Technique for Communication System" with Project Code, Report, PPT, Synopsis, IEEE Research Paper and HD Video Explanation
- Updated Dec 22, 2022
- Jupyter Notebook
shamsulhusainansari / Simplify-Event-Management-System
"Simplify” is a Mobile Application which is Designed to Help the College Student Clubs to manage and promote their events easily and manage all the activities and tasks of the clubs in an easy way without the use of paper. This Application project is not only useful for the college student clubs but also for any community, society, NGO, or organ…
- Updated Jul 21, 2022
Vatshayan / Steganography-Website-Project
Final Year Steganography Project with Code and Project report
- Updated Aug 12, 2022
Vatshayan / Blockchain-and-Cryptography-Communication-System
Final Year Blockchain Project for Security of communication. [Security of Communication Increase through Use of Combination of Cryptography and Blockchain technology]
mymadhavyadav07 / Library-Management-System
A Client-Server Architecture Based Library Management System.
- Updated Jun 28, 2023
paulveillard / cybsecurity-cs
A collection of CS tools, software, libraries, learning tutorials, frameworks, academic and practical resources for Computer Science students in Cybersecurity
- Updated Mar 6, 2022
Vatshayan / Image-Chain-Blockchain-Project
Final Year ImageChain Blockchain Project is application of Blockchain. Project Include Code, Documents with Video Explanation
deepshig / Textual-Video-to-Speech-Interface
An interface to extract text from a video and convert it to speech
- Updated May 29, 2020
Satharus / MinesweeperGame
Minesweeper Game
- Updated May 6, 2018
HackyCoder0951 / E-Bookshop
The goal of this project is to design an e-bookshop named E-Bookshop.com that sells computer, technical, architecture, sports and various categories books. The book inventories are stored in MySQL database. Customers can access the e-bookshop web site through the World Wide Web. Customers will be able to search the database to find the books the…
- Updated May 2, 2024
EdwinWalela / fixture-generator
Algorithm to generate football match fixtures (Data Structures and Algorithms Term Project)
- Updated Jul 12, 2019
varunsingh87 / Frequency-Analysis-Simulator
A Java program that decrypts cryptograms without keys using frequency analysis
- Updated Nov 27, 2023
SeaWar741 / ITC
Computer Science coursework and projects at Tec de Monterrey 👨🎓
- Updated Jan 19, 2023
Vatshayan / Real-Estate-Price-Prediction-Using-Machine-Learning-Project
Real Estate Price Prediction Using Machine Learning Project with Code and Datatsets
- Updated Jun 8, 2023
thetechnohack / Student-Management-System
It's a project work for class 12 Computer Science students learning Python programming language. Student Management system or Student Information System is a cli project which add ,delete,update,show the student details in a colorful manner. Hope u like it 🙂
- Updated Apr 8, 2021
Vatshayan / Cryptography-final-year-project
Super cipher cryptography project which uses three types of key such as numerical and alphabets for providing triple layer of security. Final Year Cryptography Project with code and documents
- Updated Jan 31, 2023
final-year-project-thesis-help / Final-Year-Project-Thesis
Config files for my GitHub profile.
- Updated Jan 27, 2024
RootLeo00 / robot-coldstorage
Robot commanded by a server using QAktor system (DLS based on kotlin), deployed on RaspBerry 4B
- Updated Sep 1, 2023
jofaval / tfcgs-daw
Trabajo final de Ciclo Formativo Grado Superior en Desarrollo de Aplicaciones Web (CFGS-DAW)
- Updated Dec 21, 2021
ml3m / Map_Of_Computer_Science
computer science map in Obsidian
- Updated Apr 27, 2024
Improve this page
Add a description, image, and links to the computer-science-project topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the computer-science-project topic, visit your repo's landing page and select "manage topics."
CPSC 490 Senior Project
Recent projects.
See https://zoo.cs.yale.edu/classes/cs490 (Yale only).
THE INSTRUCTIONS BELOW APPLY TO TERMS PRIOR TO FALL 2022. SEE CANVAS SITE FOR FALL 2022 AND LATER YCPS Description
Individual research intended to fulfill the senior requirement. Requires a faculty supervisor and the permission of the director of undergraduate studies. The student must submit a written report about the results of the project. May be taken more than once for credit.
Enrolling in CPSC 490
To enroll in CPSC 490, you must:
- Register for CPSC 490.
- Find an advisor.
- Prepare a three-page description of your planned project. This is a written document, negotiated with your advisor, that must include a list of deliverables for your project.
- Submit your project description, as approved by your advisor, by email in plain text or PDF format to the DUS. You should CC your advisor on this message. Joint majors should also CC their second reader and the DUS from the appropriate department.
Other than registering for CPSC 490, seniors must complete these requirements by noon on the fourth Thursday of classes.
Non-seniors and non-majors must complete these requirements and have their project approved by the DUS at least two days before your course schedule is due . Note that taking CPSC 490 as a non-senior requires special approval by the DUS, which will be granted only under exceptional circumstances.
Special requirements for joint majors
Joint majors must complete the same steps, but will need a second reader in their other department and must have their project approved by both DUSes.
For the Computer Science and Mathematics major, you will also need to present an oral report on the mathematical aspects of the project to the Mathematics faculty at the end of the semester.
End-of-Term Requirements
The following requirements must be completed by noon on the last day of reading period:
- Use the script /c/cs490/bin/abstract in the Zoo to submit your thesis abstract. Just type the command and wait for prompt to submit your name, the title of your project, your advisor’s name, and a 250-to-300-word abstract. This information will be added to the on-line database of recent CPSC 490 projects.
- must have a top-level page named index.html ;
- should use only relative links for links between pages (they may be moved around); and
- must include a copy of the description of the project as originally submitted at the start of the semester.
- must include the final project report in PDF format.
These pages will become part of the on-line database of recent CPSC 490 projects. If you want to check your upload, the best way is to see how they look in the online database: click the link on the Recent Projects (above) and find your entry.
Note : You must satisfy these requirements even if you plan to continue your project next term. The only difference is that your electronic abstract, final report, and web pages should constitute an interim progress report (i.e., the level of detail must be the same as in the final versions, but the work described need not be complete).
Frequently Asked Questions
How do I choose a project?
There are two general approaches
- Student sells project to professor : you get an idea, write a 3-page prospectus that describes the scope of the project and includes a list of deliverables, and find a faculty member willing to supervise the work (which may require changes in the prospectus)
- Professor sells project to student ; a faculty member has a list of possible projects, and you select one (which may involve changes in the nature of the project)
and a host of possibilities in between.
What kind of project is appropriate?
The project should be (1) substantial, and (2) novel and including a research component. To be substantial, it should be more than just an extended homework assignment or final course project and should require that you learn more about some area of computer science. To give you some idea of the possibilities, the titles, abstracts, and web pages of recent projects are available online.
Regular courses meet 2 1/2 hours per week and require 2 to 3 additional hours per week for each hour of class. Using this as a guideline for what it takes to earn a course credit at Yale, the project should be something that you can complete in one semester (i.e., 14 weeks) working approximately 7 to 10 hours per week (i.e., in a total of 100-140 hours).
Note : You cannot be paid for your work on the project. Moreover, to allow others to build on your results, all code and data must be made available to the Yale community.
Who may advise a CPSC 490 project?
The official advisor (and thus the person who evaluates the work and assigns the grade) must be a faculty member with (1) a multi-year appointment at Yale; (2) a current appointment in the Department of Computer Science at Yale and (3) a Ph.D. degree or equivalent research qualification--490 should include a research component. However, the de facto advisor need not be, as long as the student meets with the official advisor at least once a month. Your final report should acknowledge all advisors.
How can I learn more about projects from past semesters?
The course web page contains the titles, abstracts, and web pages of recent projects. Copies of the written reports are kept in a circulating library managed by the departmental registrar (AKW 003).
When should I take CPSC 490?
Most students take the course during their final term of enrollment as the capstone of the program. However, students applying to graduate school should take it in the fall (or, with permission of the DUS, in the spring of their junior year) so that they can get a letter of recommendation from their advisor.
Ideally, planning for the project should begin the preceding term (at least to the extent of finding an advisor).
Taking CPSC 490 before your senior year requires special permission from the DUS, which will be granted only under exceptional circumstances. Non-seniors interested in research should consdier CPSC 290 instead.
Does CPSC 490 count as an advanced elective for the CS major or related majors?
No. CPSC 490 only gives you credit toward your 36-credit graduation requirement, and toward the senior project requirement in the major.
How often may I take CPSC 490?
You may take CPSC 490 more than once for Yale credit.
May I do a two-term project?
Yes. However, you must satisfy the end-of-term requirements at the end of each term, and your grade for each semester will be assigned at the end of that semester and will reflect what you accomplished. Thus in effect a two-term project is equivalent to two one-term projects, except that the work may be incomplete at the end of the first semester and the electronic abstract, written report, and web pages for the second semester describe the entire project.
Are group projects allowed?
Yes. However, each member of the group must work on a different part of the project, and your description, electronic abstract, final written report, and web pages must focus on your own contributions.
What are the “deliverables”?
Whatever you and your advisor decide you must complete by the end of the project. Possibilities include (but are not limited to) code, theorems, simulation studies, data analysis, written reports, and oral presentations.
How is CPSC 490 graded?
CPSC 490 is graded using the usual letter grade system. Typically your advisor will decide your grade.
Does my grade in CPSC 490 affect Distinction in Major?
Yes. If you take CPSC 490 for your senior project, you will need a grade of at least A- to qualify for Distinction in Major. CPSC 490 also counts toward both the numerator and denominator when calculating whether three-quarters of your credits in the major are A- or higher.
COMMENTS
The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...
A PROJECT FOR COMPUTER SCIENCE STUDENTS, Benjamin Alexander. PDF. LUNG CANCER TYPE CLASSIFICATION, Mohit Ramajibhai Ankoliya. PDF. HIGH-RISK PREDICTION FOR COVID-19 PATIENTS USING MACHINE LEARNING, Raja Kajuluri. PDF. IMPROVING INDIA'S TRAFFIC MANAGEMENT USING INTELLIGENT TRANSPORTATION SYSTEMS, Umesh Makhloga. PDF.
Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you've landed on this post, chances are you're looking for a computer science-related research topic, but aren't sure where to start.Here, we'll explore a variety of CompSci & IT-related research ideas and topic thought-starters ...
Theses/Dissertations from 2023. Appearance Driven Reflectance Modeling, James Christopher Bieron. Domain-Specific Optimization For Machine Learning System, Yu Chen. Intelligent Software Tooling For Improving Software Development, Nathan Allen Cooper. Amsel Criteria Based Computer Vision For Bacterial Vaginosis Diagnosis, Daniel Edwards Highland.
Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications, Arup Kanti Dey. PDF. AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing, Hamza Elhamdadi. PDF. Automatic Detection of Vehicles in Satellite Images for Economic Monitoring, Cole Hill. PDF
Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF. Improved Protein Sequence Alignments Using Deep Learning, Seyed Sepehr Ashrafzadeh.
In this book we will use the term 'thesis project', and in some cases, for the sake of simplicity, just 'project'. This book focuses on thesis projects within the computing discipline. Thus, the type of project discussed in this book is in line with the capstone format described in the ACM/IEEE Computing Curricula 2001 Computer Science ...
MIT's DSpace contains more than 58,000 theses completed at MIT dating as far back as the mid 1800's. Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded.
COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong
2018. Winner, 2018 Best Senior Thesis Award. A Crash-Safe Key-Value Store Using Chained Copy-on-Write B-trees. Bruno Castro-Karney, supervised by Xi Wang. BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains. Linxing (Preston) Jiang, supervised by Raj Rao.
Senior Thesis. A senior thesis is more than a big project write-up. It is documentation of an attempt to contribute to the general understanding of some problem of computer science, together with exposition that sets the work in the context of what has come before and what might follow. In computer science, some theses involve building systems ...
Master's Theses and Projects. The objective of the mandatory Master's Thesis or Project requirement is to provide a culminating educational experience, where the student, under the supervision of a faculty member, conducts an individual study employing concepts and methods learned in the program to solve a problem of significant importance from ...
Available for single-semester IW and senior thesis advising, 2024-2025. Research Areas: computational complexity, algorithms, applied probability, computability over the real numbers, game theory and mechanism design, information theory. Independent Research Topics: Topics in computational and communication complexity.
Zhang, Minrui. CS2980: Model-based Semantic Compression in Database Project Report (478.9 KB) Zhang, Shu. Column-based Database Semantic Compression and Prediction-based Query Optimization (551.8 KB) Zhong, Zhigang. Fractal Tree Implementation with Intel Hardware Supported Transactional Memory (106.1 KB)
How to search for Harvard dissertations. DASH, Digital Access to Scholarship at Harvard, is the university's central, open-access repository for the scholarly output of faculty and the broader research community at Harvard.Most Ph.D. dissertations submitted from March 2012 forward are available online in DASH.; Check HOLLIS, the Library Catalog, and refine your results by using the Advanced ...
Abstract Writing a computer science thesis is a considerable challenge for stu- dents. In this text, we give some tips and structure to write a great thesis. We will go over the research process in general, finding a topic, writing an expos´e, and thesis structure. At the end, we include some tips on researching and writing.
My thesis project was the most rewarding experience of my computer science studies. Unfortunately, many students suffer theirs as frustrating, tedious and with few opportunities for personal growth. In this guide, I want to share the pitfalls and best practices from supervising 50+ thesis projects in computer science at TUM. I hope that it helps…
Jan 2008. Thesis Projects. This book outlines a general process for carrying out thesis projects, and it embraces the following components as fundamentally important: (1) identifying the question ...
All students are required to complete CIS 693, or both CIS 690 and 695 to complete the Master's degree. You can find helpful information on getting started and general expectations for both a project and thesis below. Before enrolling in any research course students are required to complete an online course in research integrity (select "Online RCR Training" at the top of the page) prior to ...
Thesis/Project Student Process. The following process applies to all Division of Computing & Software Systems (CSS) graduate students, regardless of degree program (CSSE or CSE) or thesis/project goals. ... draft is to demonstrate to the Supervisory Committee that the student has achieved a Master's level competency in computer science and ...
To associate your repository with the computer-science-project topic, visit your repo's landing page and select "manage topics." GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.
For the Computer Science and Mathematics major, ... Use the script /c/cs490/bin/abstract in the Zoo to submit your thesis abstract. Just type the command and wait for prompt to submit your name, the title of your project, your advisor's name, and a 250-to-300-word abstract. ... Professor sells project to student; a faculty member has a list ...