The College of Computing formed the School of Computer Science (SCS) in 2007. SCS is defining the foundations and advancing the frontiers of computing. Its mission is to invent the intellectual and architectural basis for computing; to educate students in the foundations and future of the field; to understand and realize the potential of computation, in algorithms, systems, software, architecture and networks; to invent and enable networks, computers and platforms that advance our knowledge and benefit society; to educate practitioners and future leaders of computer science; and to be at the forefront of research, education and service based on computer science.

Recent Submissions

  • Mobile device clusters as edge compute resources: Design, deployment, and role in the computing ecosystem 

    Habak, Karim (Georgia Institute of Technology, 2018-07-27)
    Edge computing offers an alternative to centralized, in-the-cloud compute services. Among the potential advantages of edge-computing are lower latency that improves responsiveness, reduced wide-area network congestion, and ...
  • An image-based approach for 3D reconstruction of urban scenes using architectural symmetries 

    Srinivasan, Natesh (Georgia Institute of Technology, 2018-07-23)
    In this dissertation, I focus on an important, generalizable and freely available sub-category of semantic information in addressing modern reconstruction challenges: the notion of symmetry. The emphasis in the 3D modeling ...
  • Markov chains and emergent behavior for problems from discrete geometry 

    Cannon, Sarah (Georgia Institute of Technology, 2018-07-02)
    The problem of generating random samples from large, complex sets is widespread across the sciences, where such samples provide one way to begin to learn about the sets' typical properties. However, when the samples generated ...
  • Distributive lattices, stable matchings, and robust solutions 

    Mai, Tung (Georgia Institute of Technology, 2018-05-18)
    The stable matching problem, first presented by mathematical economists Gale and Shapley, has been studied extensively since its introduction. As a result, a remarkably rich literature on the problem has accumulated in ...
  • Neuro-general computing an acceleration-approximation approach 

    Yazdan Bakhsh, Amir (Georgia Institute of Technology, 2018-07-30)
    A growing number of commercial and enterprise systems rely on compute and power intensive tasks. While the demand of these tasks is growing, the performance benefits from general-purpose platforms are diminishing. Without ...
  • Combinatorial and exchange markets: Algorithms, complexity, and applications 

    Yazdanbod, Sadra (Georgia Institute of Technology, 2018-05-23)
    In today's world, globalization and the Internet have resulted in the creation of enormously many different kinds of marketplaces. The marketplaces naturally tend to find an equilibrium in terms of prices and interaction ...
  • A computational model for solving raven’s progressive matrices intelligence test 

    Shegheva, Snejana (Georgia Institute of Technology, 2018-05-11)
    Graphical models offer techniques for capturing the structure of many problems in real- world domains and provide means for representation, interpretation, and inference. The modeling framework provides tools for discovering ...
  • Breaking the abstractions for productivity and performance in the era of specialization 

    Park, Jongsea (Georgia Institute of Technology, 2018-07-25)
    Over the last decades, general-purpose computing stack and its abstractions have provided both performance and productivity, which have been the main drivers for the revolutionary advances in IT industry. However, the ...
  • Exploiting intrinsic flash properties to enhance modern storage systems 

    Huang, Jian (Georgia Institute of Technology, 2017-08-02)
    The longstanding goals of storage system design have been to provide simple abstractions for applications to efficiently access data while ensuring the data durability and security on a hardware device. The traditional ...
  • Enabling one-handed input for wearable computing 

    Reyes, Gabriel (Georgia Institute of Technology, 2017-05-30)
    A new evolution of computing is emerging around wearable technologies. Wearable computing has been a topic of research for years. However, we are beginning to see adoption by consumers and non-researchers due to advances ...
  • Securing software systems by preventing information leaks 

    Lu, Kangjie (Georgia Institute of Technology, 2017-07-31)
    Foundational software systems such as operating systems and web servers are implemented in unsafe programming languages for efficiency, and system designers often prioritize performance over security. Hence, these systems ...
  • Simply safe lattice cryptography 

    Crockett, Eric (Georgia Institute of Technology, 2017-07-27)
    Lattice cryptography has many compelling features, like security under worst-case hardness assumptions, apparent security against quantum attacks, efficiency and parallelism, and powerful constructions like fully homomorphic ...
  • Building trust in the user I/O in computer systems 

    Jang, Yeong Jin (Georgia Institute of Technology, 2017-07-26)
    User input plays an essential role in computer security because it can control system behavior and make security decisions in the system. System output to users, or user output, is also important because it often contains ...
  • Near field deniable communication 

    Narain, Abhinav (Georgia Institute of Technology, 2017-07-20)
    There is an increasing interest of companies and government agencies to snoop on people's daily lives the increasing difficulty for people to handle such scenarios. The need for private communications is perhaps greater ...
  • A model checker for Java bytecode, with novel applications 

    Sahin, Burak (Georgia Institute of Technology, 2017-08-01)
    In this work, we have designed and developed an automated static program analysis tool which can check whether the given program satisfies the required safety properties for the Java bytecode. Using the combination of model ...
  • Integrating reinforcement learning into a programming language 

    Simpkins, Christopher Lee (Georgia Institute of Technology, 2017-06-26)
    Reinforcement learning is a promising solution to the intelligent agent problem, namely, given the state of the world, which action should an agent take to maximize goal attainment. However, reinforcement learning algorithms ...
  • Efficient high-dimensional sampling and integration 

    Cousins, Benjamin (Georgia Institute of Technology, 2017-05-31)
    Volume computation is an algorithmic version of the fundamental geometric problem to figure out how much space an object occupies. Related problems of sampling and integration have numerous applications to other fields, ...
  • LP and SDP extended formulations: lower bounds and approximation algorithms 

    Roy, Aurko (Georgia Institute of Technology, 2017-05-24)
    In this thesis we study various aspects of linear and semidefinite programs including their limitations in approximating various combinatorial optimization problems as well as applications of these paradigms in solving ...
  • Protecting computer systems through eliminating or analyzing vulnerabilities 

    Lee, Byoungyoung (Georgia Institute of Technology, 2016-08-01)
    There have been tremendous efforts to build fully secure computer systems, but it is not an easy goal. Making a simple mistake introduces a vulnerability, which can critically endanger a whole system's security. This ...
  • Code generation and adaptive control divergence management for light weight SIMT processors 

    Gupta, Meghana (Georgia Institute of Technology, 2016-05-03)
    The energy costs of data movement are limiting the performance scaling of future generations of high performance computing architectures targeted to data intensive applications. The result has been a resurgence in the ...

View more