Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.
HistoryIn 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.
Dates of Existence1973-present
Historical NamesDepartment of Computer Science and Technology
Documents from 2011
HadoopT - breaking the scalability limits of Hadoop, Anup Talwalkar
Semantic Analysis of Facial Gestures from Video Using a Bayesian Framework, Gati Vashi
Botnet lab creation with open source tools and usefulness of such a tool for researchers, Dimitris Vergos
Dynamic load balancing based on live migration of virtual machines: Security threats and effects, Melvin Ver
NAT denial of service: An Analysis of translation table behavior on multiple platforms, Nathan Winemiller
Programmer's guide to the Recognition Strategy Language (RSL), Richard Zanibbi
Documents from 2010
Feasibility of backing up server information in a distributed storage using client workstations hard drives, Raúl Rafael Acevedo Cárdenas
An Analytic investigation into self organizing maps and their network topologies, Renee Baltimore
Automatic object detection and tracking in video, Isaac Case
Efficient object tracking in WAAS data streams, Trevor Clarke
Manipulation of elections by minimal coalitions, Christopher Connett
Kethelavia: Promoting and branding an original cartoon using interactive website design, Wenzheng Cui
Security practices: A Mixed approach, Sourabh Dass
Students’ satisfaction when using a remote virtual Lab based on Amazon EC2 for networking courses at PUCMM, Kenny Díaz Jorge
A Survey of transition strategies to improve the performance of Chord in the face of rapidly changing IP addresses, Timothy Ecklund
Evolutionary spectral co-clustering, Nathan S. Green
Gaining system access through information obtained in Web 2.0 sites, Arsenio Guzmán
Control of self-reconfigurable robot teams for sensor placement, Jacob Hays
No space left behind, Joseph Imbasciano
Interactive natural user interfaces, Sean Patrick Janis
Segmentation of slap fingerprints, Derek Johnson
Threshold interval indexing techniques for complicated uncertain data, Andrew Knight
Necessity of implementing electronic personal health information privacy regulation in Dominican Republic, Miguel Molina
Dynamic fault tolerant grid workflow in the water threat management project, Young Suk Moon
The Development and deployment of a remote virtual lab based on Amazon Cloud for networking courses, Emilio Nunez
Time delay and its effect in a virtual lab created using cloud computing, Juan Nunez
Proposed standards and best practices for technological infrastructure at contact centers in the Dominican Republic, Patricia Ortiz Suárez
Creating local networks in the Cloud, José R. Sánchez E.
Service level agreement in virtualized environment, Steven Sanchez Fermin
How does the power crisis problem affect data management in the Dominican Republic, José Raúl Vélez Díaz
Practical programming with total functions, Karl Voelker
Cyberaide JavaScript: A Web Application Development Framework for Cyberinfrastructure, Fugang Wang
Scene classification using spatial pyramid matching and hierarchical Dirichlet processes, Haohui Yin
Image-Based Math Retrieval Using Handwritten Queries, Li Yu
Data privacy: Legal and business malpractice, Gulmira Zhavgasheva
Documents from 2009
Vibrational control of chaos in artificial neural networks, Ralph Bean
Improving Dodgson scoring techniques, Jason A. Covey
Reactive exploration with self-reconfigurable systems, Eric Fabricant
Public finance in legalized gambling, Benjamin Gardner
Virtual reality modeling language, Joe Geigel
Hierarchical task allocation in robotic exploration, John Hawley
Securing location discovery in wireless sensor networks, Wisam F. Kadhim
Single block attacks and statistical tests on CubeHash, Alan Kaminsky and Benjamin Bloom
Scientific visualizations, Nick Kochakian
Cube attacks on cryptographic hash functions, Joel Lathrop
Counting triangles in some Ramsey graphs, Andrew Lin and John Mackey
Range voting is resistant to control, Curtis Menton
Algorithms for testing equivalence of finite automata, with a grading tool for JFLAP, Daphne Norton
Sampling edge covers, William August Rummler
Content-based addressing in hierarchical distributed hash tables, Joseph Srebro
A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege
Documents from 2008
A framework for integrating DNA sequenced data, Prabin Dutta
Towards flow cytometry data clustering on graphics processing units, Jeremy Espenshade, Doug Roberts, and James Cavenaugh
A biologically inspired focus of attention model, Daniel I. Harris
Counting and sampling paths in graphs, T. Ryan Hoens
Parallel Java: A Library for SMP, cluster, and hybrid parallel programming in 100% Java, Alan Kaminsky
Breaking the PayPal HIP: A Comparison of classifiers, Kurt Alfred Kluever
Evaluating the usability and security of a video CAPTCHA, Kurt Alfred Kluever
Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi
Cognitive dimensions usability assessment of textual and visual VHDL environments, George Kontos
Implementation of active collections framework using .NET, Sushil Magdum
From the world stage to the virtual stage: The Life of a designer, Schweppe Marla
Automated generation of SW design constructs from Mesa source code, Keith Needels
Introducing legacy program scripting to molecular biology toolkit (MBT), Todd Newell
Denotational style correctness of a CPS-Transform based compiler, Arthur Nunes-Harwitt
A distributed public key creation system for ad-hoc groups, Brian Padalino
Solving an MRI spin relaxometry problem using Parallel Java, Hardik Parikh
Efficient data access techniques for large structured data files, Payal Patel
Biologically inspired object categorization in cluttered scenes, Theparit Peerasathien
A computational investigation of graph reconstruction, David Rivshin
Monadic parsing using JavaScript, Axel-Tobias Schreiner
Design Patterns in Parsing, Axel-Tobias Schreiner and James Heliotis
Functional Parsing — A Multi-Lingual Killer-Application, Axel-Tobias Schreiner and James Heliotis
An Object-oriented natural language expert system, Kenneth Staffan and Henry Etlinger
XESS: The XML expert system shell, Robert J. St. Jacques
Counting points on elliptic curves over Zp, Suresh Sundriyal
Investigations of cellular automata-based stream ciphers, Joseph S. Testa
Automated grazing management, Gregory J. Von Pless
Cloud Computing: A Perspective Study, Lizhe Wang, Gregor von Laszewski, Marcel Kunze, and Jie Tao
Elliptic curve cryptography: Generation and validation of domain parameters in binary Galois Fields, Peter Wozny
Bounds onSome Ramsey Numbers Involving Quadrilateral, Xiaodong Xu, Zehui Shao, and Stanislaw Radziszowski
Computational model of MST neuron receptive field and interaction effect for the perception of self-motion, Chen-Ping Yu
Documents from 2007
An analysis of connectivity, Tayeb Al Karim
Technology bridge to employment: A Community technology initiative, Rosalind Bain
Visualization analysis of astrophysics n-bodied problem using image morphological processing techniques, Thomas J. Borrelli
Approximation and elections, Eric Brelsford
Parametric & non-parametric background subtraction model with object tracking for VENUS, Karthik Chandrasekaran
Cyberinfrastructure: Supporting Scientific Discovery and Innovation in the 21st Century, Jorge Diaz-Herrera
Anomaly-based botnet detection for 10 Gb/s networks, Jonathon Donaldson
Point seeking: a family of dynamic path finding algorithms, Andrew Fanton
The performance of Group Diffie-Hellman paradigms: a software framework and analysis, Kieran S. Hagzan
Mutually Adaptive Distributed Heterogeneous Agents for Data Classification, Joshua Alan Harlow
Parallel Java: A Unified API for Shared Memory and Cluster Parallel Programming in 100% Java, Alan Kaminsky
GridTorrent framework: A High-performance data transfer and data sharing framework for scientific computing, Ali Kaplan, Geoffrey Fox, and Gregor von Laszewski
Performance evaluation of eXtended sparse linearization in GF(2) and GF(28), Tigin Kaptanoglu
Audio watermarking techniques using singular value decomposition, Joseph Kardamis
JavaScript grid abstractions, Gregor Laszewski, Fugang Wang, Andrew Younge, and Zhenhua Guo
Table driven prediction for recursive descent LL(k) parsers, William M. Leiserson