Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.
HistoryIn 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.
Dates of Existence1973-present
Historical NamesDepartment of Computer Science and Technology
Documents from 2012
Evolutionary star-structured heterogeneous data co-clustering, Amit Salunke
A Regression-based Training Algorithm for Multilayer Neural Networks, Christopher W. Sherry
Hadoop-cc (collaborative caching) in real time HDFS, Meenakshi Shrivastava
Perceptually optimized real-time computer graphics, Jeffrey Smith
Flow analysis based on role and pattern matching, Pooja Wagh
Documents from 2011
Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property, Liliya Andreicheva
Service level agreements and virtual machines, Jordan Caminiti
Prediction-based virtual instance migration for balanced workload in the cloud datacenters, Shibu Daniel and Minseok Kwon
Markov chain Monte Carlo on the GPU, Michael Dumont
Balancing truth error and manual processing in the PDQ system, Douglass Huang
Cloth simulation using hardware tessellation, David Huynh
Scientific visualization using Pixar's RenderMan, John Lukasiewicz
Influence maximization on families of graphs, Andrei Mouravski
Establishing parameters for problem difficulty in permutation-based genetic algorithms, Adam Nogaj
An Integrated environment for data acquisition with dynamic changes in wireless sensor networks, Albert Nurgaliev
Ray-traced simulation of radiation pressure for optical lift, Timothy Peterson
An Analysis of the Million Module March algorithm applied to the ATRON robotic platform, James Phipps
Layout-based substitution tree indexing and retrieval for mathematical expressions, Matthew Schellenberg
Scalable cooperative caching algorithm based on bloom filters, Nodirjon Siddikov
Cellular network monitoring system based on subscriber units, Victor Silva
HadoopT - breaking the scalability limits of Hadoop, Anup Talwalkar
Semantic Analysis of Facial Gestures from Video Using a Bayesian Framework, Gati Vashi
Botnet lab creation with open source tools and usefulness of such a tool for researchers, Dimitris Vergos
Dynamic load balancing based on live migration of virtual machines: Security threats and effects, Melvin Ver
NAT denial of service: An Analysis of translation table behavior on multiple platforms, Nathan Winemiller
Programmer's guide to the Recognition Strategy Language (RSL), Richard Zanibbi
Documents from 2010
Feasibility of backing up server information in a distributed storage using client workstations hard drives, Raúl Rafael Acevedo Cárdenas
An Analytic investigation into self organizing maps and their network topologies, Renee Baltimore
Automatic object detection and tracking in video, Isaac Case
Efficient object tracking in WAAS data streams, Trevor Clarke
Manipulation of elections by minimal coalitions, Christopher Connett
Kethelavia: Promoting and branding an original cartoon using interactive website design, Wenzheng Cui
Security practices: A Mixed approach, Sourabh Dass
Students’ satisfaction when using a remote virtual Lab based on Amazon EC2 for networking courses at PUCMM, Kenny Díaz Jorge
A Survey of transition strategies to improve the performance of Chord in the face of rapidly changing IP addresses, Timothy Ecklund
Evolutionary spectral co-clustering, Nathan S. Green
Gaining system access through information obtained in Web 2.0 sites, Arsenio Guzmán
Control of self-reconfigurable robot teams for sensor placement, Jacob Hays
No space left behind, Joseph Imbasciano
Interactive natural user interfaces, Sean Patrick Janis
Segmentation of slap fingerprints, Derek Johnson
Threshold interval indexing techniques for complicated uncertain data, Andrew Knight
Necessity of implementing electronic personal health information privacy regulation in Dominican Republic, Miguel Molina
Dynamic fault tolerant grid workflow in the water threat management project, Young Suk Moon
The Development and deployment of a remote virtual lab based on Amazon Cloud for networking courses, Emilio Nunez
Time delay and its effect in a virtual lab created using cloud computing, Juan Nunez
Proposed standards and best practices for technological infrastructure at contact centers in the Dominican Republic, Patricia Ortiz Suárez
Creating local networks in the Cloud, José R. Sánchez E.
Service level agreement in virtualized environment, Steven Sanchez Fermin
How does the power crisis problem affect data management in the Dominican Republic, José Raúl Vélez Díaz
Practical programming with total functions, Karl Voelker
Cyberaide JavaScript: A Web Application Development Framework for Cyberinfrastructure, Fugang Wang
Scene classification using spatial pyramid matching and hierarchical Dirichlet processes, Haohui Yin
Image-Based Math Retrieval Using Handwritten Queries, Li Yu
Data privacy: Legal and business malpractice, Gulmira Zhavgasheva
Documents from 2009
Vibrational control of chaos in artificial neural networks, Ralph Bean
Improving Dodgson scoring techniques, Jason A. Covey
Reactive exploration with self-reconfigurable systems, Eric Fabricant
Public finance in legalized gambling, Benjamin Gardner
Virtual reality modeling language, Joe Geigel
Hierarchical task allocation in robotic exploration, John Hawley
Securing location discovery in wireless sensor networks, Wisam F. Kadhim
Single block attacks and statistical tests on CubeHash, Alan Kaminsky and Benjamin Bloom
Scientific visualizations, Nick Kochakian
Cube attacks on cryptographic hash functions, Joel Lathrop
Counting triangles in some Ramsey graphs, Andrew Lin and John Mackey
Range voting is resistant to control, Curtis Menton
Algorithms for testing equivalence of finite automata, with a grading tool for JFLAP, Daphne Norton
Sampling edge covers, William August Rummler
Content-based addressing in hierarchical distributed hash tables, Joseph Srebro
A Relational Approach for Efficient Service Selection, Qi Yu and Manjeet Rege
Documents from 2008
A framework for integrating DNA sequenced data, Prabin Dutta
Towards flow cytometry data clustering on graphics processing units, Jeremy Espenshade, Doug Roberts, and James Cavenaugh
A biologically inspired focus of attention model, Daniel I. Harris
Counting and sampling paths in graphs, T. Ryan Hoens
Parallel Java: A Library for SMP, cluster, and hybrid parallel programming in 100% Java, Alan Kaminsky
Breaking the PayPal HIP: A Comparison of classifiers, Kurt Alfred Kluever
Evaluating the usability and security of a video CAPTCHA, Kurt Alfred Kluever
Video CAPTCHAs: Usability vs. Security, Kurt Alfred Kluever and Richard Zanibbi
Cognitive dimensions usability assessment of textual and visual VHDL environments, George Kontos
Implementation of active collections framework using .NET, Sushil Magdum
From the world stage to the virtual stage: The Life of a designer, Schweppe Marla
Automated generation of SW design constructs from Mesa source code, Keith Needels
Introducing legacy program scripting to molecular biology toolkit (MBT), Todd Newell
Denotational style correctness of a CPS-Transform based compiler, Arthur Nunes-Harwitt
A distributed public key creation system for ad-hoc groups, Brian Padalino
Solving an MRI spin relaxometry problem using Parallel Java, Hardik Parikh
Efficient data access techniques for large structured data files, Payal Patel
Biologically inspired object categorization in cluttered scenes, Theparit Peerasathien
A computational investigation of graph reconstruction, David Rivshin
Monadic parsing using JavaScript, Axel-Tobias Schreiner
Design Patterns in Parsing, Axel-Tobias Schreiner and James Heliotis
Functional Parsing — A Multi-Lingual Killer-Application, Axel-Tobias Schreiner and James Heliotis
An Object-oriented natural language expert system, Kenneth Staffan and Henry Etlinger
XESS: The XML expert system shell, Robert J. St. Jacques
Counting points on elliptic curves over Zp, Suresh Sundriyal
Investigations of cellular automata-based stream ciphers, Joseph S. Testa