Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.

History

In 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.

Dates of Existence

1973-present

Historical Names

Department of Computer Science and Technology

Follow

Documents from 2017

PDF

Automated Grading and Feedback of Regular Expressions, Himesh Kakkar

PDF

Facial Capture Lip-Sync, Victoria McGowen

PDF

Dysarthric Speech Recognition and Offline Handwriting Recognition using Deep Neural Networks, Suhas Pillai

PDF

Formal Verification of Receipt Validation in Chaum’s Scheme, Kyle Savarese

Documents from 2016

PDF

An Adaptive Algorithm for Range Queries in Differential Privacy, Asma Alnemari

PDF

A Comparative Study of Twitter Sentiment Analysis Methods for Live Applications, Angel Cambero

PDF

Separators in High-Genus Near-Planar Graphs, Juraj Culak

PDF

On Some Zarankiewicz Numbers and Bipartite Ramsey Numbers for Quadrilateral, Janusz Dybizbanski, Tomasz Dzido, and Stanislaw Radziszowski

PDF

The FMCAD 2016 Graduate Student Forum, Hossein Hojjat

PDF

Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski

PDF

Partial Aborts for Transactions via First Class Continuations, Matthew Le

PDF

The Uncanny Valley The Effect of Removing Blendshapes from Facial Animation, Ameya Lonkar

PDF

Asset Protection in Escorting using Multi-Robot Systems, Stephen Powers

PDF

Icosatree Data Partitioning of Massive Geospatial Point Clouds with User-Selectable Entities and Surface Modeling, Stephen Walter Ranger

PDF

Multi-robot Task Allocation using Agglomerative Clustering, Maria Shoaib

PDF

Sampling and Counting Crossing-Free Matchings, Wenbo Sun

PDF

Advancing Android Activity Recognition Service with Markov Smoother: Practical Solutions, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska

Documents from 2015

PDF

Leveraging the BLAC Model for Situation Awareness in CIP, Samah Mobarak Balkhair

PDF

Mining and Integration of Structured and Unstructured Electronic Clinical Data for Dementia Detection, Joseph Bullard

PDF

A Generalized Model of Cognitive Workload, Taylor Carpenter

PDF

Fear Feedback Loop: Creative and Dynamic Fear Experiences Driven by User Emotion, Charlene DiMeglio

File

Virtual Reality Modeling Language, Joex Geigelx

PDF

The RIT SDN Testbed and GENI, Bruce Hartpence

PDF

Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes, Matthew Kelly, Alan Kaminsky, Michasel Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Gesture Recognition with the Leap Motion Controller, Robert McCartney, Jie Yuan, and Hans-Peter Bischof

PDF

Anonymity Analysis of Cryptocurrencies, Liam Morris

PDF

Some Multicolor Ramsey Numbers Involving Cycles, David E. Narvaez

PDF

3D Gaze Point Localization and Visualization Using LiDAR-based 3D Reconstructions, James Pieszala

PDF

COSC: Paths with Combined Optimal Stability and Capacity in Opportunistic Networks, Shiraz Qayyum, Peizhao Hu, and Mohan Kumar

PDF

Some Computational and Theoretical Problems for Ramsey Numbers, Stanislaw P. Radziszowski

PDF

Content-Based Image Retrieval using Deep Learning, Anshuman Vikram Singh

PDF

Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations, Christopher Wood, Marcin Lukowiak, and Stanislaw Radziszowski

PDF

Wheel and Star-critical Ramsey Numbers for Quadrilateral, Yali Wu, Yongqi Sun, and Stanislaw Radziszowski

PDF

Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska

Documents from 2014

PDF

The Impact of Adaptation Delays on Routing Protocols forMobile Ad-Hoc Networks (MANETs), Yamin Al-Mousa

PDF

A New Covert Channel Over Cellular Network Voice Channel, Bushra Sulaiman Aloraini

PDF

Toward Effective Access Control Using Attributes and Pseudoroles, Suhair Alshehri

PDF

Grassmann Learning for Recognition and Classification, Sherif Azary

PDF

Guiding Attention in Controlled Real-World Environments, Thomas P. Booth

PDF

Process Cooperativity as a Feedback Metric in Concurrent Message-Passing Languages, Alexander Dean

PDF

Expanding the Role of Homework Assignments, Henry Etlinger

PDF

An Approach to Engaging Students in the Assessment Process, Henry Etlinger and Rajendra K. Raj

PDF

Putting the 'Student' in Student Learning Outcomes [poster], Henry Etlinger and Rajendra K. Raj

PDF

Assembling 3D Objects with Artificial Spatial Intelligence, Eugene Koon

PDF

Intelligent Combination of Structural Analysis Algorithms: Application to Mathematical Expression Recognition, Amit Pillay

PDF

A Generalized Probabilistic Gibbard-Satterthwaite Theorem, Jonathan Potter

PDF

Scalable Multi-document Summarization Using Natural Language Processing, Bhargav Prabhala

PDF

Sonar-Based Autonomous Navigation and Mapping of Indoor Environments Using Micro-Aerial Vehicles, Mark Williams

Documents from 2013

PDF

Approximate nearest neighbors for recognition of foreground and background in images and video, Josh Allmann

PDF

An Efficient interaction framework for mobile web services, Abdullah Almuaibid

PDF

Insider threat mitigation and access control in healthcare systems, Suhair Alshehri, Sumita Mishra, and Rajendra Raj

PDF

Secure access control for health information sharing systems, Suhair Alshehri and Rajendra Raj

PDF

Timeflies: Push-pull signal-function functional reactive programming, Edward Amsden

PDF

Starfish Search, Ethan Criss

PDF

Toward privacy-preserving emergency access in EHR systems with data auditing, Muhannad Darnasser

PDF

Analyzing Android applications for specifications and bugs, Danilo Dominguez

PDF

Adding a Contributing Student Pedagogy Component to an Introductory Database Course, Henry Etlinger

PDF

A Type- and Control-Flow Analysis for System F: Technical Report, Matthew Fluet

PDF

A Context-based framework for mobile applications, Omkar Kolangade

PDF

Solving Hard Graph Problems with Combinatorial Computing and Optimization, Alexander R. Lange

PDF

Representing and Inferring Visual Perceptual Skills in Dermatological Image Understanding, Rui Li

PDF

Using word and phrase abbreviation patterns to extract age from Twitter microtexts, Nathaniel Moseley

PDF

Large-scale cloudscapes using noise, Mario Rosa

PDF

Math expression retrieval using symbol pairs in layout trees, David Stalnaker

PDF

Measuring attention using Microsoft Kinect, Darren Stanley

PDF

Computational Modeling of Human Dorsal Pathway for Motion Processing, Yuheng Wang

PDF

Perception based heterogeneous subsurface scattering for film, Laura Wieme

PDF

Large substitution boxes with efficient combinational implementations, Christopher A. Wood

Documents from 2012

PDF

Fairness for transactional events: Technical report, Edward Amsden and Matthew Fluet

PDF

Semi-supervised heterogeneous evolutionary co-clustering, Pankaj Andhale

PDF

Don't overlook homework assignments - They're simple, but powerful, Henry Etlinger

PDF

Deep learning using genetic algorithms, Joshua Lamos-Sweeney

PDF

Energy-aware replica selection for data-intensive services in cloud, Bo Li

PDF

Procedural generation of road networks for large virtual environments, Craig Martek

PDF

Cross-enterprise access control security for electronic health records: Technical, practical and legislation impact, Mark Rodzinka

PDF

Evolutionary star-structured heterogeneous data co-clustering, Amit Salunke

PDF

A Regression-based Training Algorithm for Multilayer Neural Networks, Christopher W. Sherry

PDF

Hadoop-cc (collaborative caching) in real time HDFS, Meenakshi Shrivastava

PDF

Perceptually optimized real-time computer graphics, Jeffrey Smith

PDF

Flow analysis based on role and pattern matching, Pooja Wagh

Documents from 2011

PDF

Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property, Liliya Andreicheva

PDF

Service level agreements and virtual machines, Jordan Caminiti

PDF

Prediction-based virtual instance migration for balanced workload in the cloud datacenters, Shibu Daniel and Minseok Kwon

PDF

Markov chain Monte Carlo on the GPU, Michael Dumont

PDF

Evaluation of RSL history as a tool for assistance in the development and evaluation of computer vision algorithms, Ben Holm

PDF

Balancing truth error and manual processing in the PDQ system, Douglass Huang

PDF

Cloth simulation using hardware tessellation, David Huynh

PDF

Scientific visualization using Pixar's RenderMan, John Lukasiewicz

PDF

Influence maximization on families of graphs, Andrei Mouravski

PDF

Establishing parameters for problem difficulty in permutation-based genetic algorithms, Adam Nogaj

PDF

An Integrated environment for data acquisition with dynamic changes in wireless sensor networks, Albert Nurgaliev

PDF

Ray-traced simulation of radiation pressure for optical lift, Timothy Peterson

PDF

An Analysis of the Million Module March algorithm applied to the ATRON robotic platform, James Phipps

PDF

Layout-based substitution tree indexing and retrieval for mathematical expressions, Matthew Schellenberg

PDF

Scalable cooperative caching algorithm based on bloom filters, Nodirjon Siddikov

PDF

Cellular network monitoring system based on subscriber units, Victor Silva

PDF

HadoopT - breaking the scalability limits of Hadoop, Anup Talwalkar

PDF

Semantic Analysis of Facial Gestures from Video Using a Bayesian Framework, Gati Vashi

PDF

Botnet lab creation with open source tools and usefulness of such a tool for researchers, Dimitris Vergos

PDF

Dynamic load balancing based on live migration of virtual machines: Security threats and effects, Melvin Ver