To browse Master's Projects by academic department or program, please go to the College, School or Department page.

Follow


Master's Projects from 2011

PDF

Decompiler For Pseudo Code Generation, Ankit Patel

PDF

Similarity Tests for Metamorphic Virus Detection, Mahim Patel

PDF

URL Recommender using Parallel Processing, Ravi Kishore Penta

PDF

Metamorphic Detection via Emulation, Sushant Priyadarshi

PDF

Users Positions in Social Networks, Jasim Qazi

PDF

DISCOVERING KNOWLEDGE STRUCTURE IN THE WEB, Siddharth Ramu

PDF

Graph Technique For Metamorphic Virus Detection, Neha Runwal

PDF

AUTOMATED PENETRATION TESTING, Neha Samant

PDF

A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in a Cloud Computing Environment, Shailesh Sawant

PDF

Enhancing Productivity of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena

PDF

FBchatters: A Facebook application for Gtalk, Ronak Shah

PROTECTIVE SHIELD FOR POLYMORPHIC VIRUSES, Priyadarshini Shanmuganathan

PDF

Algorithms Analysis System: Recurrences, Anchit Sharma

PDF

Dynamic Code Checksum Generator, Ashish Sharma

PDF

Improving the Performance of a Proxy Server using Web log mining, Akshay Shenoy

PDF

AUGMENTED-LIFE PHONE ORGANIZER, Chao-Hsin Shih

PDF

X10 vs Java: Concurrency Constructs and Performance, Anh Trinh

PDF

Online and Offline eBook Management System using W-CMS, Rohan Vibhandik

PDF

Scanned Wireless Network Setup Fake Access Point & its Detection, Saurabh Vishal

PDF

Mandatory Pet Sterilization and Overpopulation: Have Santa Cruz County's Policies Reduced Animal Shelter Intake and Euthanasia?, Amy Winkleblack

PDF

BitTorrent Traffic Detection with Deep Packet Inspection and Deep Flow Inspection, Raymond Wong

PDF

CENTRALIZED SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS, Li Yang

PDF

Learning Author’s Writing Pattern System By Automata, Qun Yu

PDF

ActiBot: A Botnet to Evade Active Detection, Xinjun Zhang

Master's Projects from 2010

PDF

Online Application Monitoring Tool, Sathya Anandan

PDF

Extending OWL with Finite Automata Constraints, Jignesh Borisa

PDF

A Framework for Active Learning: Revisited, Yue Chen

PDF

The ActiveLecture System, Sanuja Dabade

PDF

Japanese Kanji Suggestion Tool, Sujata Dongre

PDF

A Communication Intervention in a City Government Organization Using the Appreciative Inquiry Theory Focusing on Communication, Teamwork, and Leadership to Improve Work Group Performance, Mary T. Figone

PDF

Enhancing open-source localization, Farzana Forhad

PDF

WiSeNetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale

PDF

Exhaustive Statistical Analysis for Detection of Metamorphic Malware, Aditya Govindaraju

PDF

Fluoridation in the City of Santa Clara: A Cost Benefit Analysis for the City of Santa Clara Potable Water System, Nina Hawk

PDF

A Study on Masquerade Detection, Lin Huang

PDF

Reliable Broadcasting in VANET, Pat Jangyodsuk

PDF

Clustering and Validation of Microarray Data Using Consensus Clustering, Sarbinder Kallar

PDF

An Online Versions of Hyperlinked-Induced Topics Search (HITS) Algorithm, Amith Kollam Chandranna

PDF

Food Phone Application, Shengyu Li

PDF

Intrusion Detection And Prevention System: SQL-Injection Attacks, Varian Luong

PDF

Auto-Generation of Use Case Controllers, Pushkar Marathe

PDF

Security in Peer-to-Peer SIP VoIP, Richa Marwaha

PDF

How Smart is your Android Smartphone?, Deepika Mulani

PDF

Bookmarklet Builder for Offline Data Retrieval, Sheetal Naidu

PDF

Mobile Search Engine using Clustering and Query Expansion, Huy Nguyen

PDF

Parallel Programming Recipes, Thuy C. Nguyenphuc

PDF

Web-Based IDE for Interfacing View Controller, Tejasvi Palvai

PDF

Automatic Grading of Programming Assignments, Ashlesha Patil

PDF

APPROXIMATE DISASSEMBLY, Dhivyakrishnan Radhakrishnan

PDF

Geometrical Structure and Analysis of Association Rules, Sar Rajat

PDF

Scala Server Faces, Vikas Vittal Rao

PDF

Analysis of False Cache Line Sharing Effects on Multicore CPUs, Suntorn Sae-eung

PDF

One Social, Sowmya Sampath

PDF

Geometrical Structure and Analysis of Association Rule, Rajat Sar

PDF

Approximate Disassembly using Dynamic Programming, Abhishek Shah

PDF

Metamorphic Viruses with Built-In Buffer Overflow, Ronak Shah

PDF

Open Source Analysis of Biomedical Figures, David Shao

PDF

A MicroRNA TARGET PREDICTION ALGORITHM, Rupinder Singh

PDF

Improved Worm Simulator and Simulations, Arnold Suvatne

PDF

Computational miRNA Target Prediction in Animals, Leyan Tang

PDF

Document Builder, Thien Tran

PDF

EMail Data Mining: An Approach to Construct an Organization Position-wise Structure While Performing EMail Analysis, Bhargav Vadher

PDF

View Component of Web-based IDE to develop Web Applications in CakePHP, Swathi Vegesna

PDF

DETECTING UNDETECTABLE COMPUTER VIRUSES, Sujandharan Venkatachalam

PDF

Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP, Sugiharto Widjaja

PDF

Automatic Execution Path Finding Tool, Fan Yang

PDF

IMPROVED SOFTWARE ACTIVATION USING MULTITHREADING, Jian Rui Zhang

Master's Projects from 2009

PDF

World Wide Web – Common Communication Language, Mohamed Ali

PDF

Visualization of Tree-Structured Data Through a Multi Touch User Interface, David Andrews

PDF

Online Circular Calendar, Praveen Athmanathan Panneerselvam

PDF

Intrusion Detection And Prevention System: CGI Attacks, Tejinder Aulakh

PDF

Evaluation of Strategies to Enhance NCLEX-RN Success, Joyce Barnby

PDF

Knowledge Engineering from Data Perspective: Granular Computing Approach, Rushin Barot

PDF

Heuristic Search Cryptanalysis of the Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju

PDF

Self-Directed Learning Readiness of Baccalaureate of Science in Nursing (BSN) Students, Saba Bayanzai

PDF

Video Conferencing Tool, Sapna Blesson

PDF

A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang

PDF

Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang

PDF

Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan

PDF

Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi

PDF

Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho

PDF

The Use of Complementary and Alternative Medicine for Menopausal Symptoms among Chinese-American Women, Rebecca Kwai-Ying Chung

PDF

Views About Health of Russian-Americans Living in Central California, Mark Fiterman

PDF

Objective Measurement of Speech Quality in VoIP over Wireless LAN during Handoff, Nidhi Marwaha Gambhir

PDF

Student Perceptions of Their Learning Experience in the Clinical Setting: A Pilot Study, Peggy Gnehm

PDF

Triggering of Just-In-Time Compilation in the Java Virtual Machine, Rouhollah Gougol

PDF

Chinese Wall Security Policy, Varun Gupta

PDF

MSG: A Gap-Oriented Genetic Algorithm for Multiple Sequence Alignment, Philip Heller

PDF

The Use of the "Get Up and Go Test" as the Initial Screening Measure for Fall Risk With Community Dwelling Seniors, Margaret E. Hermoso

PDF

Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka

PDF

MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke

PDF

Automatic Video Classification, Don Jayakody

PDF

Is Four File Chess a Draw?, Michael Karbushev

PDF

Client-Side Page Element Web-Caching, Ramya Karri

PDF

Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul

PDF

Class Size and Nursing Students' Perception of Empowerment, Cynthia T. Keane

PDF

Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim

PDF

Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan

PDF

Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy

PDF

Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy