Master's Projects from 2010
Auto-Generation of Use Case Controllers, Pushkar Marathe
Security in Peer-to-Peer SIP VoIP, Richa Marwaha
How Smart is your Android Smartphone?, Deepika Mulani
Bookmarklet Builder for Offline Data Retrieval, Sheetal Naidu
Mobile Search Engine using Clustering and Query Expansion, Huy Nguyen
Parallel Programming Recipes, Thuy C. Nguyenphuc
Web-Based IDE for Interfacing View Controller, Tejasvi Palvai
Automatic Grading of Programming Assignments, Ashlesha Patil
APPROXIMATE DISASSEMBLY, Dhivyakrishnan Radhakrishnan
Geometrical Structure and Analysis of Association Rules, Sar Rajat
Scala Server Faces, Vikas Vittal Rao
Analysis of False Cache Line Sharing Effects on Multicore CPUs, Suntorn Sae-eung
One Social, Sowmya Sampath
Geometrical Structure and Analysis of Association Rule, Rajat Sar
Approximate Disassembly using Dynamic Programming, Abhishek Shah
Metamorphic Viruses with Built-In Buffer Overflow, Ronak Shah
Open Source Analysis of Biomedical Figures, David Shao
A MicroRNA TARGET PREDICTION ALGORITHM, Rupinder Singh
Improved Worm Simulator and Simulations, Arnold Suvatne
Computational miRNA Target Prediction in Animals, Leyan Tang
Document Builder, Thien Tran
EMail Data Mining: An Approach to Construct an Organization Position-wise Structure While Performing EMail Analysis, Bhargav Vadher
View Component of Web-based IDE to develop Web Applications in CakePHP, Swathi Vegesna
DETECTING UNDETECTABLE COMPUTER VIRUSES, Sujandharan Venkatachalam
Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP, Sugiharto Widjaja
Automatic Execution Path Finding Tool, Fan Yang
IMPROVED SOFTWARE ACTIVATION USING MULTITHREADING, Jian Rui Zhang
Master's Projects from 2009
World Wide Web – Common Communication Language, Mohamed Ali
Visualization of Tree-Structured Data Through a Multi Touch User Interface, David Andrews
Online Circular Calendar, Praveen Athmanathan Panneerselvam
Intrusion Detection And Prevention System: CGI Attacks, Tejinder Aulakh
Intrusion detection and prevention system: CGI attacks., Tejinder Aulakh
Knowledge Engineering from Data Perspective: Granular Computing Approach, Rushin Barot
Heuristic Search Cryptanalysis of the Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju
Video Conferencing Tool, Sapna Blesson
A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang
Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang
Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan
Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi
Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho
Software reverse engineering education, Teodoro Cipresso
Objective Measurement of Speech Quality in VoIP over Wireless LAN during Handoff, Nidhi Marwaha Gambhir
Triggering of Just-In-Time Compilation in the Java Virtual Machine, Rouhollah Gougol
Chinese Wall Security Policy, Varun Gupta
MSG: A Gap-Oriented Genetic Algorithm for Multiple Sequence Alignment, Philip Heller
Network traffic clustering and geographic visualization, Ali Hushyar
Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka
MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke
Event based propagation approach to constraint configuration problems, Rajhdeep Jandir
Automatic Video Classification, Don Jayakody
Is Four File Chess a Draw?, Michael Karbushev
Client-Side Page Element Web-Caching, Ramya Karri
Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul
Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim
Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan
Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy
Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy
Hunting for Undetectable Metamorphic Viruses, Da Lin
Hunting for Undetectable Metamorphic Viruses, Da Lin
Removing the Digital Divide for Senior Web Users, Chiu Luk
An Automata Based Text Analysis System, Yue Lu
Enhancing spammer detection in online social networks with trust-based metrics., Alexander J. Murmann
Web based Recommender Systems and Rating Prediction, Tho Nguyen
Information Flow Model for Commercial Security, Jene Pan
Automated Artice Generation Using the Web, Gaurang Patel
Intrusion Alerts Analysis Using Attack Graphs and Clustering, Hardik Patel
Analysis of rxbot, Esha Patil
Total Recall for AJAX applications – Firefox extension, Smita Periyapatna
Hybrid Clustering with Application to Web Pages, Ameya Sabnis
Active Lecture: An Interactive Lecturing System, Himavanthara Sajja
Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur
Improving Web Recommendations Using Web Usage Mining and Web Semantics, Neha Saxena
DNA Sequence Representation by Use of Statistical Finite Automata, Asmi Shah
Analysis of an OpenMP Program for Race Detection, Dhaval Shah
Expert Finding Using Social Networking, Parin Shah
Distributed Port Scanning Detection, Himanshu Singh
Improving Location Determination for non-GPS devices, Varun Sud
Priority Based Routing for Mobile Peer-To-Peer Communications, Swathi Venugopal
Master's Projects from 2008
Web Security Detection Tool, Abhishek Agashe
Personalized Web Content with Fuzzy System, Bassam Almogahed
Investigating the Effectiveness of Active Interaction Tools on Student Learning, Lurie Andrei
Personalized Shopping Agent for Semantic Web, Ramani Arunachalam
Expanding JavaScript's metaobject protocol, Tom Austin
Analysis of the Zodiac 340-cipher, Thá̆ng Đào
Towards an Undetectable Computer Virus, Priti Desai
A Comparative Xeon and CBE Performance Analysis, Randy Fort
Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank
Adaptive software transactional memory : dynamic contention management, Joel Cameron Frank
Practical Detection of Metamorphic Computer Viruses, Sharmidha Govindaraj
SQL Injection analysis, Detection and Prevention, Jagdish Halde
JavaFX as a Domain-Specific Language in Scala / Groovy, Sadiya Hameed
Employee Performance Assessment in Quality Assurance, Rahul Jain
Intelligent query for real estate search, Mandeep Jandir
Intelligent Query for Real Estate Search, Mandeep Jandir
Authoring and Sharing of Programming Exercises, Somyajit Jena
The Prosody of Uncertainty for Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones
Online Recommendation System, Ankit Khera
Cryptanalysis of the SIGABA cipher, Heather Ellie Kwong
DNA Fragment Assembly Algorithms: Toward a Solution for Long Repeats, Ching Li
Design & Evaluation of Path-based Reputation System for MANET Routing, Ji Li