The Computer Science and Electrical Engineering Department aims to maintain a program of excellence in teaching, research, and service for all of its programs. At the undergraduate level, we will provide students with a firm foundation of both the theory and practice of Computer Science and Computer Engineering. Our curricula also give students the social, ethical, and liberal education needed to make significant contributions to society. Students receiving a bachelor’s degree are ready to enter the work force as productive computer scientists or computer engineers, or to continue their education at the graduate or professional level.

At the graduate level, we are committed to developing the research and professional capabilities of students in Computer Science, Computer Engineering, Electrical Engineering and Cybersecurity. Our programs provide a deeper mastery of the basics of these fields, as well as opportunities to collaborate on leading-edge research with our faculty. Our faculty are engaged in both practical and theoretical research, often in partnership with government agencies, private industry and non-governmental organizations. The aim of this research is to advance knowledge within our disciplines and also to contribute to solving problems faced by our society.

Recent Submissions

  • A Bayesian Data Analytics Approach to Buildings’ Thermal Parameter Estimation 

    Pathak, Nilavra; Foulds, James; Roy, Nirmalya; Banerjee, Nilanjan; Robucci, Ryan (Association for Computing Machinery, 2019-06-28)
    Modeling buildings’ heat dynamics is a complex process which depends on various factors including weather, building thermal capacity, insulation preservation, and residents’ behavior. Gray-box models offer an explanation ...
  • In silico dermoscopy with detailed subsurface scattering 

    Seipp, B.; Olano, M.; Badano, A. (The Eurographics Association, 2019)
    We describe an approach to modeling dermoscopy, the imaging modality for the examination of skin lesions, using accurate subsurface scattering in human skin. We make use of an open-source, path-tracing program with advanced ...
  • A Graph-based Automatic Services Composition based on Cost Estimation Heuristic 

    Lee, Yunsu; Kulvatunyou, Boonserm; Lee, Minchul; Peng, Yun; Ivezic, Nenad (National Institute of Standards and Technology, 2019-10-31)
    Currently, software and hardware are being virtualized and offered as services on the internet. Companies have an opportunity to improve their workflow by composing these services that best suitable their requirements from ...
  • Chatbot Application on Cryptocurrency 

    Xie, Qitao; Zhang, Qingquan; Tan, Dayuan; Zhu, Ting; Xiao, Shen; Li, Beibei; Sun, Lei; Yi, Ping; Wang, Junyu (IEEE, 2019-07-11)
    Many chatbots have been developed that provide a multitude of services through a wide range of methods. A chatbot is a brand-new conversational agent in the highspeed changing technology world. With the advance of Artificial ...
  • Modeling phase noise in high-power photodetectors 

    Mahabadi, Seyed Ehsan Jamali; Carruthers, Thomas F.; Menyuk, Curtis R. (IEEE, 2019-08-22)
    We describe the simulation model that we use to calculate the impulse response and phase noise in a modified unitraveling carrier (MUTC) photodetector using the drift-diffusion equations while avoiding computationally ...
  • Temperature sensor based on liquid-filled negative curvature optical fibers 

    Wei, Chengli; Young, Joshua T.; Menyuk, Curtis R.; Hu, Jonathan (Optical Society of America, 2019-06-24)
    We computationally investigate a novel temperature sensor that uses liquid-filled negative curvature optical fibers. Both the core and cladding tubes are infiltrated with a liquid that has a temperature-sensitive refractive ...
  • Learning to regularize with a variational autoencoder for hydrologic inverse analysis 

    O’Malley, Daniel; Golden, John K.; Vesselinov, Velimir V. (2019-06-06)
    Inverse problems often involve matching observational data using a physical model that takes a large number of parameters as input. These problems tend to be under-constrained and require regularization to impose additional ...
  • PPT : New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues 

    Phatak, Dhananjay; Sherman, Alan T.; Houston, Steven D.; Henry, Andrew (2019-08-20)
    In this set of three companion manuscripts/articles, we unveil our new results on primality testing and reveal new primality testing algorithms enabled by those results. The results have been classified (and referred to) ...
  • KiloGrams: Very Large N-Grams for Malware Classification 

    Raff, Edward; Fleming, William; Zak, Richard; Anderson, Hyrum; Finlayson, Bill; Nicholas, Charles; McLean, Mark (2019-08-01)
    N-grams have been a common tool for information retrieval and machine learning applications for decades. In nearly all previous works, only a few values of n are tested, with n>6 being exceedingly rare. Larger values of n ...
  • Picturing Bivariate Separable-Features for Univariate Vector Magnitudes in Large-Magnitude-Range Quantum Physics Data 

    Zhao, Henan; Chen, Jian (2019-05-06)
    We present study results from two experiments to empirically validate that separable bivariate pairs for univariate representations of large-magnitude-range vectors are more efficient than integral pairs. The first ...
  • Moving to client-side hashing for online authentication 

    Blanchard, Nikola K.; Coquand, Xavier; Selker, Ted
    Credential leaks still happen with regular frequency, and show evidence that, despite decades of warnings, password hashing is still not correctly implemented in practice. The common practice today, inherited from previous ...
  • Reflexive Memory Authenticator: a proposal for effortless renewable biometrics 

    Blanchard, Nikola K.; Kachanovich, Siargey; Selker, Ted; Waligorski, Florentin
    Today’s biometric authentication systems are still struggling with replay attacks and irrevocable stolen credentials. This paper introduces a biometric protocol that addresses such vulnerabilities. The approach prevents ...
  • Breast Tumor Detection and Classification Using Intravoxel Incoherent Motion Hyperspectral Imaging Techniques 

    Chan, Si-Wa; Chang, Yung-Chieh; Huang, Po-Wen; Ouyang, Yen-Chieh; Chang, Yu-Tzu; Chang, Ruey-Feng; Chai, Jyh-Wen; Chen, Clayton Chi-Chang; Chen, Hsian-Min; Chang, Chein-I.; Lin, Chin-Yao (Hindawi, 2019-07-28)
    Breast cancer is a main cause of disease and death for women globally. Because of the limitations of traditional mammography and ultrasonography, magnetic resonance imaging (MRI) has gradually become an important radiological ...
  • Soliton Frequency Combs in Dual Microresonators 

    Qi, Zhen; Menyuk, Curtis R. (Optical Society of America, 2019-09-15)
    We study soliton frequency combs generated in dual microresonators with different group velocity dispersion. We obtain stable bright and dark solitons at different pump amplitudes.
  • Third-Order Nonlinear Optical Properties of ALD Grown TiO2 Thin Films 

    Kuis, R.; Basaldua, I.; Burkins, P.; Kropp, J. A.; Gougousi, T.; Johnson, A. M. (Optical Society of America, 2019-09-15)
    Nonlinear index values as high as 1±.1x10-9 cm2/W were measured of ALD based TiO2 films. The 1000-fold increase in the index is believed to be due to the incorporation of nitrogen during growth.
  • Dissipative cnoidal waves (Turing rolls) and the soliton limit in microring resonators 

    Qi, Zhen; Wang, Shaokang; Jaramillo-Villegas, José; Qi, Minghao; Weiner, Andrew M.; D'Aguanno, Giuseppe; Carruthers, Thomas F.; Menyuk, Curtis R. (Optical Society of America, 2019-05-17)
    Single solitons are a special limit of more general waveforms commonly referred to as cnoidal waves or Turing rolls. We theoretically and computationally investigate the stability and accessibility of cnoidal waves in ...
  • Energy Transport Station Deployment in Electric Vehicles Energy Internet 

    Sui, Yu; Yi, Ping; Liu, Xin; Zhu, Ting (IEEE, 2019-07-02)
    Energy Internet allows energy to flow flexibly for transmission and it can transport energy to every energy user via electric vehicles (EVs). The energy that EVs use is produced from renewable energy sources like solar ...
  • Multi Authority Access Control in a Cloud EHR System with MA-ABE 

    Dixit, Sharad; Joshi, Karuna P.; Choi, Seung Geol (IEEE, 2019-07-08)
    With the rapid adoption of Cloud-based Electronic Health Record (EHR) systems, health providers are particularly concerned about managing data privacy on the cloud. Existing approaches have either a scalability bottleneck ...
  • On the transition to secondary Kerr combs in whispering-gallery mode resonators 

    Coillet, Aurélien; Qi, Zhen; Balakireva, Irina V.; Lin, Guoping; Menyuk, Curtis R.; Chembo, Yanne K. (Optical Society of America, 2019)
    We demonstrate that extended dissipative structures in Kerr-nonlinear whispering-gallery mode resonators undergo a spatiotemporal instability, as the pumping parameters are varied. We show that the dynamics of the patterns ...
  • Mobile Device Security Corporate-Owned Personally-Enabled (COPE) 

    Franklin, Joshua M.; Howell, Gema; Boeckl, Kaitlin; Lefkovitz, Naomi; Nadeau, Ellen; Shariati, Dr. Behnam; Ajmo, Jason G.; Brown, Christopher J.; Dog, Spike E.; Javar, Frank; Peck, Michael; Sandlin, Kenneth F. (NIST, 2019-07)
    Mobile devices provide access to workplace data and resources that are vital for organizations to accomplish their mission while providing employees the flexibility to perform their daily activities. Securing these devices ...

View more