Housed in the B. Thomas Golisano College of Computing and Information Sciences, the department offers bachelor's and master's degrees in computer science.
HistoryIn 1973, RIT's Institute College established the Department of Computer Science and Technology. In July of 1976, the Department moved into the newly formed School of Computer Science and Technology. In 1981, the School of Computer Science and Technology moved into the College of Applied Science and Technology, taking the Department with it. The Department remained in CAST until 2000. In 2001, the School of Computer Science and Technology formally became its own college, the B. Thomas Golisano College of Computing and Information Sciences (GCCIS), and the Department was moved into GCCIS.
Dates of Existence1973-present
Historical NamesDepartment of Computer Science and Technology
Documents from 2023
Investigating the Importance of Non-Textual Caption Properties From Deaf and Hard of Hearing Viewers' Perspective, Akhter Al Amin
Automatic Text Simplification Tools to Provide Reading Assistance for Deaf and Hard-of-Hearing Individuals, Oliver Alonzo
Efficiently Annotating Source Code Identifiers Using a Scalable Part of Speech Tagger, Gavin Burris
Rule Mining from Knowledge Bases: Semantics, Queries, and Estimations, Bhaskar Krishna Gangadhar
Empirical Investigations and Dataset Collection for American Sign Language-aware Personal Assistants, Abraham Trout Glasser
Network Security With Smart Switches, Sahil Gupta
Unsupervised Progressive and Continual Learning of Disentangled Representations, Zhiyuan Li
Efficient Synchronous Byzantine Consensus, Nibesh Shrestha
A Privacy Safeguarding Framework for the Smart Grid, Gaurav Shivaji Wagh
Documents from 2022
NLP and ML Methods for Pre-processing, Clustering and Classification of Technical Logbook Datasets, Farhad Akhbardeh
Modeling Users Feedback Using Bayesian Methods for Data-Driven Requirements Engineering, Moayad M. Alshangiti
Towards the detection and analysis of performance regression introducing code changes, Deema Adeeb ALShoaibi
Statistical Analysis of the MK-3 Customizable Authenticated Encryption, Peter Bajorski, Alan Kaminsky, Michael Kurdziel, Marcin Łukowiak, and Stanisław Radziszowski
Advancing Ubiquitous Collaboration for Telehealth - A Framework to Evaluate Technology-mediated Collaborative Workflow for Telehealth, Hypertension Exam Workflow Study, Christopher Bondy Ph.D., Linlin Chen Ph.D, Pamela Grover MD, and Pengcheng Shi Ph.D
Improving the Flexibility of CLARA's Automated Matching and Repair Processes, Maheen Riaz Contractor
Data-Driven Optimization for Bicycle Station Location in a Small to Medium-Sized City: The Case Study of Cuenca, Ecuador, Fernando Cueva
Graph Arrowing: Constructions and Complexity, Zohair Raza Hassan
Revisiting Ad-hoc Polymorphism, Apurav Khare
Investigating Vector Space Embeddings for Database Schema Management, Goldy Malhotra
Leveraging Formulae and Text for Improved Math Retrieval, Behrooz Mansouri
Memory Protection with Dynamic Authentication Trees, Matthew T. Millar, Marcin Łukowiak, and Stanisław Radziszowski
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Quality Automated Identifier Naming, Anthony S. Peruma
Unsupervised Transfer Learning with Autoencoders, Siddhant Reddy
Efficient Sampling and Counting of Graph Structures related to Chordal Graphs, Wenbo Sun
R-CAD: Rare Cyber Alert Signature Relationship Extraction Through Temporal Based Learning, Gordon Werner
Documents from 2021
Modeling the Speed and Timing of American Sign Language to Generate Realistic Animations, Sedeeq Al-khazraji
State of Refactoring Adoption: Towards Better Understanding Developer Perception of Refactoring, Eman Abdullah AlOmar
Spatial vs. Graph-Based Formula Retrieval, Robin Avenoso
A Framework for Evaluating Technology-Mediated Collaborative Workflow, Christopher Bondy
Data augmentation for automatic speech recognition for low resource languages, Ronit Damania
Understanding and Identifying Vulnerabilities Related to Architectural Security Tactics, Joanna Cecilia da Silva Santos
Introducing Handwriting into a Multimodal LATEX Formula Editor, Yancarlos Diaz
Generation, Verification, and Attacks on Elliptic Curves and their Applications in Signal Protocol, Tanay Pramod Dusane
Analyzing emotion regulation using multimodal data, Geeta Madhav Gali
Noninvasive Electrocardiographic Imaging (ECGi) to Guide Catheter Ablation of Scar-related Ventricular Tachycardia, Omar Ahmed Gharbia
The State of Practice for Security Unit Testing: Towards Data Driven Strategies to Shift Security into Developer's Automated Testing Workflows, Danielle Nicole Gonzalez
Learning with Limited Labeled Data in Biomedical Domain by Disentanglement and Semi-Supervised Learning, Prashnna Kumar Gyawali
Star-Critical Ramsey Numbers for Cycles Versus K4, Chula J. Jayawardene, David E. Narvaez, and Stanislaw Radziszowski
Combinatorial and Stochastic Approach to Parallelization of the Kangaroo Method of Solving the Discrete Logarithm Problem, Joe Klesczewski
Reproducing and Explaining Entity and Relation Embeddings for Link Prediction in Knowledge Graphs, Narayanan Asuri Krishnan
Exploring Wireless Data Center Networks: Can They Reduce Energy Consumption While Providing Secure Connections?, Sayed Ashraf Mamun
Domain Generalization and Adaptation with Generative Modeling and Representation Learning, Jaideep Vitthal Murkute
DANIEL: Towards Automated Bug Discovery By Black Box Test Case Generation & Recommendation, Michael G. Peechatt
Calibrating Knowledge Graphs, Aishwarya Rao
An Empirical Study of Offensive Language in Online Interactions, Diptanu Sarkar
Modeling Dyadic Human Interaction using Sequential Neural Network, Srijan Kumar Sharma
Using AR and VR characters for enhancing user experience in a museum, Kunal Shailesh Shitut
Predicting risk of readmission in heart failure patients using electronic health records, Pradumna Suryawanshi
MITRA: Robust Architecture for Distributed Metadata Indexing, Sarthak Thakkar
Reducing Catastrophic Forgetting in Self-Organizing Maps, Hitesh Ulhas Mangala Vaidya
Documents from 2020
The Role of Sonification as a Code Navigation Aid: Improving Programming Structure Readability and Understandability For Non-Visual Users, Khaled L. Albusays
Interactive Range Queries under Differential Privacy, Asma Mohammed Alnemari
Secure Outsourced Computation on Encrypted Data, Asma Aloufi
Towards the Automation of Migration and Safety of Third-Party Libraries, Hussein Ahmed Talib Al-Rubaye
Audio-Visual Caption Evaluation Metric for People who are Deaf and Hard of Hearing, Akhter Al Amin
A Data-parallel Approach for Efficient Resource Utilization in Distributed Serverless Deep Learning, Kevin Tunder Elom Assogba
Analyzing the Impact of Negative Sampling on Fact-Prediction Algorithms, Iti Bansal
Learning Riders' Preferences in Ridesharing Platforms, Ritaban Bhattacharya
AR Comic Chat, Dylan Bowald
Scalable Real-Time Rendering for Extremely Complex 3D Environments Using Multiple GPUs, Yangzi Dong
Nature-Inspired Topology Optimization of Recurrent Neural Networks, AbdElRahman A. ElSaid
Data Representation for Motor Imagery Classification, Andrew Festa
Bayesian Methods for Radiometric Calibration in Motion Picture Encoding Workflows, Ricardo R. Figueroa
Divide and Conquer in Neural Style Transfer for Video, Paul Galatic
Context Sensitive Image Denoising and Enhancement using U-Nets, Sahaj Tushar Gandhi
On Learning and Generalization to Solve Inverse Problem of Electrophysiological Imaging, Sandesh Ghimire
Failed power domination on graphs, Abraham Glasser, Bonnie Jacob, Emily Lederman, and Stanislaw Radziszowski
Nereus: A Proposal for Implementing Anti-phishing Software Using Corporate Branding Color Matching, Benjamin Heald
Interaction Recognition in a Paired Egocentric Video, Ajeeta Rajkumar Khatri
Integrated Framework for Data Quality and Security Evaluation on Mobile Devices, Igor Khokhlov
MetaRec: Meta-Learning Meets Recommendation Systems, James Le
Crafting Adversarial Examples using Particle Swarm Optimization, Rayan Mosli
Toward Data-Driven Discovery of Software Vulnerabilities, Nuthan Munaiah
RIT-Eyes: Realistic Eye Image and Video Generation for Eye Tracking Applications, Nitinraj Nair
Constraint Satisfaction Techniques for Combinatorial Problems, David E. Narvaez
Visual Structure Editing of Math Formulas, Gavin Nishizawa
Effective Activation Functions for Homomorphic Evaluation of Deep Neural Networks, Srinath Obla
Root Failure Analysis in Meshed Tree Networks, Shashank Rudroju
Rethinking Resource Allocation: Fairness and Computability, Andrew Searns
Anomaly Detection in Videos through Deep Unsupervised Techniques, Parikshit Prashant Shembekar
Machine-assisted translation by Human-in-the-loop Crowdsourcing for Bambara, Allahsera Auguste Tapo
Chromatic Vertex Folkman Numbers, Xiaodong Xu, Meilian Liang, and Stanislaw Radziszowski
Documents from 2019
Experimental Analysis of Spatial Sound for Storytelling in Virtual Reality, Saylee Bhide
Formally Verified Space-Safety for Program Transformations, Jason Carr
A Systematic Analysis of Accessibility Education Within Computing Disciplines, Paula Conn
Representing Mathematical Concepts Associated With Formulas Using Math Entity Cards, Abishai Dmello
Flexible HLS-Based Implementation of the Karatsuba Multiplier Targeting Homomorphic Encryption Schemes, Michael J. Foster, Marcin Lukowiak, and Stanislaw Radziszowski
Modeling Interacting Time-Series Signals, Kantha Girish Gangadhara
On Some Edge Folkman Numbers Small and Large, Jenny M. Kaufmann, Henry J. Wickus, and Stanislaw Radziszowski
On a Diagonal Conjecturefor Classical Ramsey Numbers, Meilian Liang, Stanislaw Radziszowski, and Xiaodong Xu
A Mechanized Theory of Communication Analysis in CML, Thomas Logan
Understanding prediction of low-quality comments in online science discourse, Elizabeth R. Lucas
Scanning Single Shot Detector for Math in Document Images, Parag Shrikrishna Mali
Prediction of Treatment Target for Ventricular Tachycardia using Multi-Task Machine Learning, Vishwanath Raman
A Comparative Assessment of the Impact of Various Norms on Wasserstein Generative Adversarial Networks, Chandini Ramesh
An Authentication mechanism for stateless communication, Ana Valentina Rodriguez Sosa
Exploring Deep Neural Network Models for Classification of High-resolution Panoramas, Deepak Sharma
Website Fingerprinting using Deep Learning, Payap Sirinam