Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.
HistoryIn 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.
Dates of Existence1973-present
Historical NamesDepartment of Computer Science and Technology
Documents from 2017
Formal Verification of Receipt Validation in Chaum’s Scheme, Kyle Savarese
An Alternative Approach to Counting Minimum (s; t)-cuts in Planar Graphs, Rachel E. Silva
Documents from 2016
An Adaptive Algorithm for Range Queries in Differential Privacy, Asma Alnemari
Separators in High-Genus Near-Planar Graphs, Juraj Culak
On Some Three-Color Ramsey Numbers for Paths, Janusz Dybizbanski, Tomasz Dzido, and Stanislaw Radziszowski
On Some Zarankiewicz Numbers and Bipartite Ramsey Numbers for Quadrilateral, Janusz Dybizbanski, Tomasz Dzido, and Stanislaw Radziszowski
On bipartization of cubic graphs by removal of an independent set, Hanna Furmanczyk, Marek Kubale, and Stanislaw Radziszowski
The FMCAD 2016 Graduate Student Forum, Hossein Hojjat
Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski
Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski
Homomorphic Proximity Computation in Geosocial Networks, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski
PLOMaR: An Ontology Framework for Context Modeling and Reasoning on Crowd-Sensing Platforms, Yogesh Jagadeesan, Peizhao Hu, and Carlos Rivero
Partial Aborts for Transactions via First Class Continuations, Matthew Le
The Uncanny Valley The Effect of Removing Blendshapes from Facial Animation, Ameya Lonkar
Asset Protection in Escorting using Multi-Robot Systems, Stephen Powers
Computation of the Ramsey Numbers R(C_4, K_9) and R(C_4, K_10), Stanislaw Radziszowski, Alexander Lange, and Ivan Livinsky
Icosatree Data Partitioning of Massive Geospatial Point Clouds with User-Selectable Entities and Surface Modeling, Stephen Walter Ranger
Multi-robot Task Allocation using Agglomerative Clustering, Maria Shoaib
Sampling and Counting Crossing-Free Matchings, Wenbo Sun
Learning in Markov Game for Femtocell Power Allocation with Limited Coordination, Wenbo Wang, Peizhao Hu, and Jing Na
Advancing Android Activity Recognition Service with Markov Smoother: Practical Solutions, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska
A Small Step Forwards on the Erd˝os-S´os Problem Concerning the Ramsey Numbers R(3, k), Rujie Zhu, Xiaodong Xu, and Stanislaw Radziszowski
Documents from 2015
Leveraging the BLAC Model for Situation Awareness in CIP, Samah Mobarak Balkhair
Mining and Integration of Structured and Unstructured Electronic Clinical Data for Dementia Detection, Joseph Bullard
A Generalized Model of Cognitive Workload, Taylor Carpenter
Fear Feedback Loop: Creative and Dynamic Fear Experiences Driven by User Emotion, Charlene DiMeglio
The RIT SDN Testbed and GENI, Bruce Hartpence
Dichotomy Results for Fixed Point Counting in Boolean Dynamical Systems, Christopher Homan and Sven Kosub
Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes, Matthew Kelly, Alan Kaminsky, Michasel Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski
Gesture Recognition with the Leap Motion Controller, Robert McCartney, Jie Yuan, and Hans-Peter Bischof
Anonymity Analysis of Cryptocurrencies, Liam Morris
Some Multicolor Ramsey Numbers Involving Cycles, David E. Narvaez
3D Gaze Point Localization and Visualization Using LiDAR-based 3D Reconstructions, James Pieszala
COSC: Paths with Combined Optimal Stability and Capacity in Opportunistic Networks, Shiraz Qayyum, Peizhao Hu, and Mohan Kumar
Some Computational and Theoretical Problems for Ramsey Numbers, Stanislaw P. Radziszowski
Content-Based Image Retrieval using Deep Learning, Anshuman Vikram Singh
Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations, Christopher Wood, Marcin Lukowiak, and Stanislaw Radziszowski
Wheel and Star-critical Ramsey Numbers for Quadrilateral, Yali Wu, Yongqi Sun, and Stanislaw Radziszowski
Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska
Documents from 2014
The Impact of Adaptation Delays on Routing Protocols forMobile Ad-Hoc Networks (MANETs), Yamin Al-Mousa
A New Covert Channel Over Cellular Network Voice Channel, Bushra Sulaiman Aloraini
Toward Effective Access Control Using Attributes and Pseudoroles, Suhair Alshehri
Grassmann Learning for Recognition and Classification, Sherif Azary
Guiding Attention in Controlled Real-World Environments, Thomas P. Booth
Process Cooperativity as a Feedback Metric in Concurrent Message-Passing Languages, Alexander Dean
Expanding the Role of Homework Assignments, Henry Etlinger
An Approach to Engaging Students in the Assessment Process, Henry Etlinger and Rajendra K. Raj
Putting the 'Student' in Student Learning Outcomes [poster], Henry Etlinger and Rajendra K. Raj
Assembling 3D Objects with Artificial Spatial Intelligence, Eugene Koon
Intelligent Combination of Structural Analysis Algorithms: Application to Mathematical Expression Recognition, Amit Pillay
A Generalized Probabilistic Gibbard-Satterthwaite Theorem, Jonathan Potter
Scalable Multi-document Summarization Using Natural Language Processing, Bhargav Prabhala
Sonar-Based Autonomous Navigation and Mapping of Indoor Environments Using Micro-Aerial Vehicles, Mark Williams
Documents from 2013
Approximate nearest neighbors for recognition of foreground and background in images and video, Josh Allmann
An Efficient interaction framework for mobile web services, Abdullah Almuaibid
Insider threat mitigation and access control in healthcare systems, Suhair Alshehri, Sumita Mishra, and Rajendra Raj
Secure access control for health information sharing systems, Suhair Alshehri and Rajendra K. Raj
Timeflies: Push-pull signal-function functional reactive programming, Edward Amsden
Starfish Search, Ethan Criss
Toward privacy-preserving emergency access in EHR systems with data auditing, Muhannad Darnasser
Analyzing Android applications for specifications and bugs, Danilo Dominguez
A Type- and Control-Flow Analysis for System F: Technical Report, Matthew Fluet
A Context-based framework for mobile applications, Omkar Kolangade
Solving Hard Graph Problems with Combinatorial Computing and Optimization, Alexander R. Lange
Representing and Inferring Visual Perceptual Skills in Dermatological Image Understanding, Rui Li
Using word and phrase abbreviation patterns to extract age from Twitter microtexts, Nathaniel Moseley
Large-scale cloudscapes using noise, Mario Rosa
Math expression retrieval using symbol pairs in layout trees, David Stalnaker
Measuring attention using Microsoft Kinect, Darren Stanley
Computational Modeling of Human Dorsal Pathway for Motion Processing, Yuheng Wang
Perception based heterogeneous subsurface scattering for film, Laura Wieme
Large substitution boxes with efficient combinational implementations, Christopher A. Wood
Documents from 2012
Fairness for Transactional Events, Edward Amsden and Matthew Fluet
Semi-supervised heterogeneous evolutionary co-clustering, Pankaj Andhale
Don't Overlook Homework Assignments - They're Simple, but Powerful, Henry Etlinger
Deep learning using genetic algorithms, Joshua Lamos-Sweeney
Energy-aware replica selection for data-intensive services in cloud, Bo Li
Procedural generation of road networks for large virtual environments, Craig Martek
Cross-enterprise access control security for electronic health records: Technical, practical and legislation impact, Mark Rodzinka
Evolutionary star-structured heterogeneous data co-clustering, Amit Salunke
A Regression-based Training Algorithm for Multilayer Neural Networks, Christopher W. Sherry
Hadoop-cc (collaborative caching) in real time HDFS, Meenakshi Shrivastava
Perceptually optimized real-time computer graphics, Jeffrey Smith
Flow analysis based on role and pattern matching, Pooja Wagh
Documents from 2011
Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property, Liliya Andreicheva
Service level agreements and virtual machines, Jordan Caminiti
Prediction-based virtual instance migration for balanced workload in the cloud datacenters, Shibu Daniel and Minseok Kwon
Markov chain Monte Carlo on the GPU, Michael Dumont
Balancing truth error and manual processing in the PDQ system, Douglass Huang
Cloth simulation using hardware tessellation, David Huynh
Scientific visualization using Pixar's RenderMan, John Lukasiewicz
Influence maximization on families of graphs, Andrei Mouravski
Establishing parameters for problem difficulty in permutation-based genetic algorithms, Adam Nogaj
An Integrated environment for data acquisition with dynamic changes in wireless sensor networks, Albert Nurgaliev
Ray-traced simulation of radiation pressure for optical lift, Timothy Peterson
An Analysis of the Million Module March algorithm applied to the ATRON robotic platform, James Phipps
Layout-based substitution tree indexing and retrieval for mathematical expressions, Matthew Schellenberg
Scalable cooperative caching algorithm based on bloom filters, Nodirjon Siddikov
Cellular network monitoring system based on subscriber units, Victor Silva