The College of Computing has built a reputation for providing challenging courses and an overall rewarding academic experience at all levels. In the undergraduate program, the College awards bachelor's degrees in computer science, and in the graduate program, the College offers master's and doctoral degrees in computer science. The College offers an undergraduate certificate in Information Systems jointly with the DuPree College of Management and an undergraduate minor and undergraduate and graduate certificates in Cognitive Science jointly with the Schools of Psychology and Industrial and Systems Engineering.

Sub-communities within this community

Collections in this community

Recent Submissions

  • CvLabs: A Container Based Interactive Virtual Lab for IT Education 

    Chen, Geng (Georgia Institute of Technology, 2020-04)
    With the ongoing trend of digital transformation, the need for more well-trained IT professionals is keep raising, as well as the need for quality IT education. Experiential learning is a key component for learners to ...
  • Learning to Form Coalitions in Heterogeneous Teams from Suboptimal Demonstrations 

    Bhargava, Rachit
    Multi-agent systems (MAS) have proven to be effective in a wide range of domains including warehouse automation, defense, agriculture, and environmental modeling. Heterogeneous MAS, often made up of a different types of ...
  • DNS over Https (DoH) 

    Choi, John Sang
    DNS over HTTPS (DoH) is a new form of DNS encryption where DNS requests are no longer in plaintext but are sent over Port 443, which is the port meant for HTTPS. The focus of this paper is mainly on determining if ...
  • Computer science education of underserved populations and the efficacy of one-day STEM events 

    Golombek, Julian
    In the U.S., students seeking Computer Science (CS) as an undergraduate major increased by 12% from 2006 to 2012 and then another 51% from 2011 to 2017. Despite this wide pursuit, there is a belief that not enough citizens ...
  • AdventumRL: A Quest-Based Reinforcement Learning API 

    Singh, Kushagr
    We propose AdventumRL, a framework to facilitate complex, quest-based reinforcement learning in Minecraft, a 3D first person sandbox video game. We define a set of encodings on top of tools provided by Malmo, an open-source ...
  • Leveraging 2D pose estimators for American Sign Language Recognition 

    Bansal, Dhruva
    Most deaf children born to hearing parents do not have continuous access to language, leading to weaker short-term memory compared to deaf children born to deaf parents. This lack of short-term memory has serious consequences ...
  • Effect of Boosting on Adversarial Robustness 

    Kareer, Simarpreet
    In this paper I explore the relationship between boosting and neural networks. We see that our adaptation of ADABOOST.MM for neural networks results in a consistent increase in accuracy, in the nonadversarial setting. ...
  • Doctor Shopping and the Patient Sharing Network of Healthcare Providers 

    James, Zachary
    Patients with chronic opioid use disorder (OUD) often engage in “doctor shopping” to improperly obtain prescription opioids. An analysis of the patient sharing network of healthcare providers that serve patients with OUD ...
  • Resultant polytope f-vectors in four and five dimensions 

    Profili, Daniel A.
    For a system of polynomials with A = (A_1, ..., A_k) as supports, the Newton polytope of the resultant, or resultant polytope, is the convex hull of the resultant monomial exponent vectors in Z^n and encodes certain ...
  • Tensions between Access and Control in Makerspaces 

    Zhong, Ruican
    Makerspaces refer to highly interactive physical spaces where people can work on projects. These spaces have complex access control requirements and are increasingly protected through digital access control mechanisms ...
  • Penny, The Security Assistant 

    Gabrielyan, Davit
    In this paper, my team endeavored to assist end-users in their cybersecurity struggles by constructing a security assistant. The security assistant would unobtrusively detect vulnerabilities on the end-users machines and ...
  • Privacy Preserving Biometric Authentication for Master Password Generation 

    Huang, Jerry
    The main way for users to authenticate via biometrics is through 2-factor authentication (2FA), which design requires users to bind their biometric data to a certain device. To solve this problem, Uzun et al. (2021) (to ...
  • Efficient Windows Application Fuzzing with Fork-server 

    Tong, Stephen
    Fuzzing is an effective technique for automatically uncovering bugs in software. Since it was introduced, it has found thousands of vulnerabilities. Nowadays, fuzzing is an indispensable tool in security researchers' ...
  • Automatic Future-Based Parallelism in Intrepyyd 

    Sklar, Matthew J.
    Hardware requirements are reaching record highs, but in the modern post-Moore computing world hardware improvements are decelerating. With fields such as Artificial Intelligence (AI) and data analysis requiring increasing ...
  • Creating Legible Robotic Motion via Local Planning 

    Stowers, Dijon T.
    A requirement for human robot collaboration is that the robot’s movements display intent early in the interaction so that a human may respond to the action appropriately. Regarding autonomous navigation, local planning is ...
  • Training Artificial Intelligence 

    Gasser, Tarik
    Training an Artificial Intelligence could be challenging in so many ways. In our research we are building a strong AI that has the ability to make decision on its own without given explicit answers. We are using Reinforcement ...
  • Design of Systems and Optimizations for Autonomous Agents using passive RFID Localization Techniques - Recycling Collaborative Robots 

    Piroozi Esfahani, Parsa
    This paper aims to describe the work done towards designing and implementing systems and optimizations for a set of autonomous robots that intend to collaborate towards accomplishing the specific common goal of transporting ...
  • Generalizing Single-View 3D Reconstruction 

    Michnovicz, Randal J.
    Single-view 3D reconstruction is a task in which an algorithm constructs a 3D model from a single image of an object without seeing the back side of that object or viewing any explicit depth information. We create a ...
  • Multi-task learning for neural image classification and segmentation using a 3D/2D contextual U-Net model 

    Miano, Joseph D.
    We present a 3D/2D Contextual U-Net model and apply it to segment and classify samples from a heterogeneous mouse brain dataset obtained via X-ray microtomography, which spans 4 distinct brain areas: Striatum, Ventral ...
  • Context Aware Policy Selection 

    Liu, Anthony J.
    In of optimal control and reinforcement learning, the difference in the performance of a state-of-the-art policy and a mediocre one is minuscule in comparison to their difference in amortized computational cost. Further, ...

View more