Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.
HistoryIn 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.
Dates of Existence1973-present
Historical NamesDepartment of Computer Science and Technology
Documents from 2019
Exploring the Application of Homomorphic Encryption to a Cross Domain Solution, Cody W. Tinker, Kevin Millar, Alan Kaminsky, Michael Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski
Efficient Distribution Regression, Nicholas Wilkins
Documents from 2018
Array-Based Statistical Analysis of the MK-3 Authenticated Encryption Scheme, Peter Bajorski, Alan Kaminsky, Michael Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski
Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm, Peter Bajorski, Alan Kaminsky, Michael Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski
Low-Cost Multiple-MAV SLAM Using Open Source Software, Andrew Hollenbach
Semi-Supervised Normalized Embeddings for Fusion and Land-Use Classification of Multiple View Data, Poppy Immel
Using High-Order Prior Belief Predictions in Hierarchical Temporal Memory for Streaming Anomaly Detection, Brody Kutt
Tone Reproduction in Virtual Reality, Antara Mishra
Strategic Behavior and Manipulation in Gender-Neutral Matching Algorithms, Sanjay Varma Rudraraju
On the Nonexistence of Some Generalized Folkman Numbers, Xiaodong Xu, Meilian Liang, and Stanislaw Radziszowski
Documents from 2017
Applying Data Analytics to Improve Multi-Asset Portfolio Performance, Amrith Akula
Better Text Detection through Improved K-means-based Feature Learning, Kardo Othman Aziz
Applying Hierarchical Contextual Parsing with Visual Density and Geometric Features to Typeset Formula Recognition, Michael Patrick Erickson Condon
A Dataset of Gaze Behavior in VR Faithful to Natural Statistics, Brendan John
Automated Grading and Feedback of Regular Expressions, Himesh Kakkar
Service Compositions in Challenged Mobile Environments Under Spatiotemporal Constraints, Daisuke Kasamatsu, Mohan Kumar, and Peizhao Hu
DRAPS: Dynamic and Resource-Aware Placement Scheme for Docker Containers in a Heterogeneous Cluster, Ying Mao, Jenna Oak, Anthony Pompili, Daniel Beer, Tao Han, and Peizhao Hu
Facial Capture Lip-Sync, Victoria McGowen
Dysarthric Speech Recognition and Offline Handwriting Recognition using Deep Neural Networks, Suhas Pillai
Neural Networks and the Search for a Quadratic Residue Detector, Michael Potter, Leon Reznik, and Stanislaw Radziszowski
Computers in Ramsey Theory; Testing, Constructions and Nonexistence, Stanislaw Radziszowski
Formal Verification of Receipt Validation in Chaum’s Scheme, Kyle Savarese
An Alternative Approach to Counting Minimum (s; t)-cuts in Planar Graphs, Rachel E. Silva
Documents from 2016
An Adaptive Algorithm for Range Queries in Differential Privacy, Asma Alnemari
Separators in High-Genus Near-Planar Graphs, Juraj Culak
On Some Three-Color Ramsey Numbers for Paths, Janusz Dybizbanski, Tomasz Dzido, and Stanislaw Radziszowski
On Some Zarankiewicz Numbers and Bipartite Ramsey Numbers for Quadrilateral, Janusz Dybizbanski, Tomasz Dzido, and Stanislaw Radziszowski
On bipartization of cubic graphs by removal of an independent set, Hanna Furmanczyk, Marek Kubale, and Stanislaw Radziszowski
The FMCAD 2016 Graduate Student Forum, Hossein Hojjat
Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski
Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski
Homomorphic Proximity Computation in Geosocial Networks, Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski
PLOMaR: An Ontology Framework for Context Modeling and Reasoning on Crowd-Sensing Platforms, Yogesh Jagadeesan, Peizhao Hu, and Carlos Rivero
Partial Aborts for Transactions via First Class Continuations, Matthew Le
The Uncanny Valley The Effect of Removing Blendshapes from Facial Animation, Ameya Lonkar
Asset Protection in Escorting using Multi-Robot Systems, Stephen Powers
Computation of the Ramsey Numbers R(C_4, K_9) and R(C_4, K_10), Stanislaw Radziszowski, Alexander Lange, and Ivan Livinsky
Icosatree Data Partitioning of Massive Geospatial Point Clouds with User-Selectable Entities and Surface Modeling, Stephen Walter Ranger
Multi-robot Task Allocation using Agglomerative Clustering, Maria Shoaib
Sampling and Counting Crossing-Free Matchings, Wenbo Sun
Learning in Markov Game for Femtocell Power Allocation with Limited Coordination, Wenbo Wang, Peizhao Hu, and Jing Na
Advancing Android Activity Recognition Service with Markov Smoother: Practical Solutions, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska
A Small Step Forwards on the Erd˝os-S´os Problem Concerning the Ramsey Numbers R(3, k), Rujie Zhu, Xiaodong Xu, and Stanislaw Radziszowski
Documents from 2015
Leveraging the BLAC Model for Situation Awareness in CIP, Samah Mobarak Balkhair
Mining and Integration of Structured and Unstructured Electronic Clinical Data for Dementia Detection, Joseph Bullard
A Generalized Model of Cognitive Workload, Taylor Carpenter
Fear Feedback Loop: Creative and Dynamic Fear Experiences Driven by User Emotion, Charlene DiMeglio
The RIT SDN Testbed and GENI, Bruce Hartpence
Dichotomy Results for Fixed Point Counting in Boolean Dynamical Systems, Christopher Homan and Sven Kosub
Customizable Sponge-Based Authenticated Encryption Using 16-bit S-boxes, Matthew Kelly, Alan Kaminsky, Michasel Kurdziel, Marcin Lukowiak, and Stanislaw Radziszowski
Gesture Recognition with the Leap Motion Controller, Robert McCartney, Jie Yuan, and Hans-Peter Bischof
Anonymity Analysis of Cryptocurrencies, Liam Morris
Some Multicolor Ramsey Numbers Involving Cycles, David E. Narvaez
3D Gaze Point Localization and Visualization Using LiDAR-based 3D Reconstructions, James Pieszala
COSC: Paths with Combined Optimal Stability and Capacity in Opportunistic Networks, Shiraz Qayyum, Peizhao Hu, and Mohan Kumar
Some Computational and Theoretical Problems for Ramsey Numbers, Stanislaw P. Radziszowski
Content-Based Image Retrieval using Deep Learning, Anshuman Vikram Singh
Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations, Christopher Wood, Marcin Lukowiak, and Stanislaw Radziszowski
Wheel and Star-critical Ramsey Numbers for Quadrilateral, Yali Wu, Yongqi Sun, and Stanislaw Radziszowski
Advancing Android Activity Recognition Service with Markov Smoother, Mingyang Zhong, Jiahui Wen, Peizhao Hu, and Jadwiga Indulska
Documents from 2014
The Impact of Adaptation Delays on Routing Protocols forMobile Ad-Hoc Networks (MANETs), Yamin Al-Mousa
A New Covert Channel Over Cellular Network Voice Channel, Bushra Sulaiman Aloraini
Toward Effective Access Control Using Attributes and Pseudoroles, Suhair Alshehri
Grassmann Learning for Recognition and Classification, Sherif Azary
Guiding Attention in Controlled Real-World Environments, Thomas P. Booth
Process Cooperativity as a Feedback Metric in Concurrent Message-Passing Languages, Alexander Dean
Expanding the Role of Homework Assignments, Henry Etlinger
An Approach to Engaging Students in the Assessment Process, Henry Etlinger and Rajendra K. Raj
Putting the 'Student' in Student Learning Outcomes [poster], Henry Etlinger and Rajendra K. Raj
Assembling 3D Objects with Artificial Spatial Intelligence, Eugene Koon
Intelligent Combination of Structural Analysis Algorithms: Application to Mathematical Expression Recognition, Amit Pillay
A Generalized Probabilistic Gibbard-Satterthwaite Theorem, Jonathan Potter
Scalable Multi-document Summarization Using Natural Language Processing, Bhargav Prabhala
Sonar-Based Autonomous Navigation and Mapping of Indoor Environments Using Micro-Aerial Vehicles, Mark Williams
Documents from 2013
Approximate nearest neighbors for recognition of foreground and background in images and video, Josh Allmann
An Efficient interaction framework for mobile web services, Abdullah Almuaibid
Insider threat mitigation and access control in healthcare systems, Suhair Alshehri, Sumita Mishra, and Rajendra Raj
Secure access control for health information sharing systems, Suhair Alshehri and Rajendra K. Raj
Timeflies: Push-pull signal-function functional reactive programming, Edward Amsden
Starfish Search, Ethan Criss
Toward privacy-preserving emergency access in EHR systems with data auditing, Muhannad Darnasser
Analyzing Android applications for specifications and bugs, Danilo Dominguez
A Type- and Control-Flow Analysis for System F: Technical Report, Matthew Fluet
A Context-based framework for mobile applications, Omkar Kolangade
Solving Hard Graph Problems with Combinatorial Computing and Optimization, Alexander R. Lange
Representing and Inferring Visual Perceptual Skills in Dermatological Image Understanding, Rui Li
Using word and phrase abbreviation patterns to extract age from Twitter microtexts, Nathaniel Moseley
Large-scale cloudscapes using noise, Mario Rosa
Math expression retrieval using symbol pairs in layout trees, David Stalnaker
Measuring attention using Microsoft Kinect, Darren Stanley
Computational Modeling of Human Dorsal Pathway for Motion Processing, Yuheng Wang
Perception based heterogeneous subsurface scattering for film, Laura Wieme
Large substitution boxes with efficient combinational implementations, Christopher A. Wood
Documents from 2012
Fairness for Transactional Events, Edward Amsden and Matthew Fluet
Semi-supervised heterogeneous evolutionary co-clustering, Pankaj Andhale
Don't Overlook Homework Assignments - They're Simple, but Powerful, Henry Etlinger
Deep learning using genetic algorithms, Joshua Lamos-Sweeney
Energy-aware replica selection for data-intensive services in cloud, Bo Li
Procedural generation of road networks for large virtual environments, Craig Martek
Cross-enterprise access control security for electronic health records: Technical, practical and legislation impact, Mark Rodzinka