Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.

History

In 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.

Dates of Existence

1973-present

Historical Names

Department of Computer Science and Technology

Follow

Documents from 2012

PDF

A Regression-based Training Algorithm for Multilayer Neural Networks, Christopher W. Sherry

PDF

Hadoop-cc (collaborative caching) in real time HDFS, Meenakshi Shrivastava

PDF

Perceptually optimized real-time computer graphics, Jeffrey Smith

PDF

Flow analysis based on role and pattern matching, Pooja Wagh

Documents from 2011

PDF

Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property, Liliya Andreicheva

PDF

Service level agreements and virtual machines, Jordan Caminiti

PDF

Prediction-based virtual instance migration for balanced workload in the cloud datacenters, Shibu Daniel and Minseok Kwon

PDF

Markov chain Monte Carlo on the GPU, Michael Dumont

PDF

Evaluation of RSL history as a tool for assistance in the development and evaluation of computer vision algorithms, Ben Holm

PDF

Balancing truth error and manual processing in the PDQ system, Douglass Huang

PDF

Cloth simulation using hardware tessellation, David Huynh

PDF

Scientific visualization using Pixar's RenderMan, John Lukasiewicz

PDF

Influence maximization on families of graphs, Andrei Mouravski

PDF

Establishing parameters for problem difficulty in permutation-based genetic algorithms, Adam Nogaj

PDF

An Integrated environment for data acquisition with dynamic changes in wireless sensor networks, Albert Nurgaliev

PDF

Ray-traced simulation of radiation pressure for optical lift, Timothy Peterson

PDF

An Analysis of the Million Module March algorithm applied to the ATRON robotic platform, James Phipps

PDF

Layout-based substitution tree indexing and retrieval for mathematical expressions, Matthew Schellenberg

PDF

Scalable cooperative caching algorithm based on bloom filters, Nodirjon Siddikov

PDF

Cellular network monitoring system based on subscriber units, Victor Silva

PDF

HadoopT - breaking the scalability limits of Hadoop, Anup Talwalkar

PDF

Semantic Analysis of Facial Gestures from Video Using a Bayesian Framework, Gati Vashi

PDF

Botnet lab creation with open source tools and usefulness of such a tool for researchers, Dimitris Vergos

PDF

Dynamic load balancing based on live migration of virtual machines: Security threats and effects, Melvin Ver

PDF

NAT denial of service: An Analysis of translation table behavior on multiple platforms, Nathan Winemiller

PDF

Programmer's guide to the Recognition Strategy Language (RSL), Richard Zanibbi

Documents from 2010

PDF

Feasibility of backing up server information in a distributed storage using client workstations hard drives, Raúl Rafael Acevedo Cárdenas

PDF

An Analytic investigation into self organizing maps and their network topologies, Renee Baltimore

PDF

Automatic object detection and tracking in video, Isaac Case

PDF

Efficient object tracking in WAAS data streams, Trevor Clarke

PDF

Manipulation of elections by minimal coalitions, Christopher Connett

PDF

Kethelavia: Promoting and branding an original cartoon using interactive website design, Wenzheng Cui

PDF

Security practices: A Mixed approach, Sourabh Dass

PDF

Students’ satisfaction when using a remote virtual Lab based on Amazon EC2 for networking courses at PUCMM, Kenny Díaz Jorge

PDF

A Survey of transition strategies to improve the performance of Chord in the face of rapidly changing IP addresses, Timothy Ecklund

PDF

Evolutionary spectral co-clustering, Nathan S. Green

PDF

Gaining system access through information obtained in Web 2.0 sites, Arsenio Guzmán

PDF

Control of self-reconfigurable robot teams for sensor placement, Jacob Hays

PDF

No space left behind, Joseph Imbasciano

PDF

Interactive natural user interfaces, Sean Patrick Janis

PDF

Segmentation of slap fingerprints, Derek Johnson

PDF

Threshold interval indexing techniques for complicated uncertain data, Andrew Knight

PDF

Evaluation of privacy assurance methods and guideline development: Implications for dr’s higher education institutions, Noe Luzon

PDF

Necessity of implementing electronic personal health information privacy regulation in Dominican Republic, Miguel Molina

PDF

Dynamic fault tolerant grid workflow in the water threat management project, Young Suk Moon

PDF

The Development and deployment of a remote virtual lab based on Amazon Cloud for networking courses, Emilio Nunez

PDF

Time delay and its effect in a virtual lab created using cloud computing, Juan Nunez

PDF

Proposed standards and best practices for technological infrastructure at contact centers in the Dominican Republic, Patricia Ortiz Suárez

PDF

A Competitive gaussian model and linear regression technique for modeling MST neuron receptive field responses for primate perception of self-motion, Jeffrey Robble

PDF

Creating local networks in the Cloud, José R. Sánchez E.

PDF

Service level agreement in virtualized environment, Steven Sanchez Fermin

PDF

How does the power crisis problem affect data management in the Dominican Republic, José Raúl Vélez Díaz

PDF

Practical programming with total functions, Karl Voelker

PDF

Cyberaide JavaScript: A Web Application Development Framework for Cyberinfrastructure, Fugang Wang

PDF

Scene classification using spatial pyramid matching and hierarchical Dirichlet processes, Haohui Yin

PDF

Image-Based Math Retrieval Using Handwritten Queries, Li Yu

PDF

Data privacy: Legal and business malpractice, Gulmira Zhavgasheva

Documents from 2009

PDF

Vibrational control of chaos in artificial neural networks, Ralph Bean

PDF

Improving Dodgson scoring techniques, Jason A. Covey

PDF

Reactive exploration with self-reconfigurable systems, Eric Fabricant

Public finance in legalized gambling, Benjamin Gardner

PDF

Virtual reality modeling language, Joe Geigel

PDF

Hierarchical task allocation in robotic exploration, John Hawley

PDF

Securing location discovery in wireless sensor networks, Wisam F. Kadhim

PDF

Single block attacks and statistical tests on CubeHash, Alan Kaminsky and Benjamin Bloom

PDF

Scientific visualizations, Nick Kochakian

PDF

Cube attacks on cryptographic hash functions, Joel Lathrop

PDF

Counting triangles in some Ramsey graphs, Andrew Lin and John Mackey

PDF

Range voting is resistant to control, Curtis Menton

PDF

Algorithms for testing equivalence of finite automata, with a grading tool for JFLAP, Daphne Norton

PDF

Sampling edge covers, William August Rummler

PDF

Content-based addressing in hierarchical distributed hash tables, Joseph Srebro

PDF

A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege

Documents from 2008

PDF

A framework for integrating DNA sequenced data, Prabin Dutta

PDF

Towards flow cytometry data clustering on graphics processing units, Jeremy Espenshade, Doug Roberts, and James Cavenaugh

PDF

A biologically inspired focus of attention model, Daniel I. Harris

PDF

Counting and sampling paths in graphs, T. Ryan Hoens

PDF

Parallel Java: A Library for SMP, cluster, and hybrid parallel programming in 100% Java, Alan Kaminsky

PDF

Breaking the PayPal HIP: A Comparison of classifiers, Kurt Alfred Kluever

PDF

Evaluating the usability and security of a video CAPTCHA, Kurt Alfred Kluever

PDF

Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi

PDF

Cognitive dimensions usability assessment of textual and visual VHDL environments, George Kontos

PDF

Implementation of active collections framework using .NET, Sushil Magdum

File

From the world stage to the virtual stage: The Life of a designer, Schweppe Marla

PDF

Automated generation of SW design constructs from Mesa source code, Keith Needels

PDF

Introducing legacy program scripting to molecular biology toolkit (MBT), Todd Newell

PDF

Denotational style correctness of a CPS-Transform based compiler, Arthur Nunes-Harwitt

PDF

A distributed public key creation system for ad-hoc groups, Brian Padalino

PDF

Solving an MRI spin relaxometry problem using Parallel Java, Hardik Parikh

PDF

Efficient data access techniques for large structured data files, Payal Patel

PDF

Biologically inspired object categorization in cluttered scenes, Theparit Peerasathien

PDF

A computational investigation of graph reconstruction, David Rivshin

PDF

Monadic parsing using JavaScript, Axel-Tobias Schreiner

PDF

Design Patterns in Parsing, Axel-Tobias Schreiner and James Heliotis

PDF

Functional Parsing — A Multi-Lingual Killer-Application, Axel-Tobias Schreiner and James Heliotis

PDF

An Object-oriented natural language expert system, Kenneth Staffan and Henry Etlinger

PDF

XESS: The XML expert system shell, Robert J. St. Jacques

PDF

Counting points on elliptic curves over Zp, Suresh Sundriyal

PDF

Investigations of cellular automata-based stream ciphers, Joseph S. Testa

PDF

Automated grazing management, Gregory J. Von Pless