To browse Master's Projects by academic department or program, please go to the College, School or Department page.
Master's Projects from 2011
Association Rule Mining -- Geometry and Parallel Computing Approach, Dongyi Jia
Association Mining in Database Machine, Jindou Jiao
EVALUATION OF CLASSICAL INTER-PROCESS COMMUNICATION PROBLEMS IN PARALLEL PROGRAMMING LANGUAGES, Arunesh Joshi
AB INITIO PROTEIN STRUCTURE PREDICTION ALGORITHMS, Maciej Kicinski
JShield: A Java Anti-Reversing Tool, Deepti Kundu
A Machine Learning and Compiler-based Approach to Automatically Parallelize Serial Programs Using OpenMP, Nam Quang Lam
JDPET: Java Dynamic Programming Educational Tool, Aaron Lemoine
Improving Performance of BitTorrent Network through Incentive Mechanism, Mingzhe Li
RNA SECONDARY STRUCTURE PREDICTION TOOL, Meenakshee Mali
Java Smell Detector, Nitin Mathur
An Evaluation of the City of Palo Alto’s California Avenue Pedestrian And Transit-Oriented Development (PTOD) Combining District Regulations, Scott Alexander McKay
Re-envisioning the Mexican American Experience in World War II: A Local History of Sacramento & the Mexican American WWII Generation, Juan Pablo Mercado
Interface Design for Graphics Editor on Multi- Touch Point Systems, Srujitha Mullapudi
Robust Watermarking using Hidden Markov Models, Mausami Mungale
Substitution Cipher with NonPrefix Codes, Rashmi Bangalore Muralidhar
Nevada County’s Assisted Outpatient Treatment Program: A Model for Other California Counties to Adopt?, Ralph J. Murrieta Jr.
Medical Analysis Question and Answering Application for Internet Enabled Mobile Devices, Loc Nguyen
Smart Search: A Firefox Add-On to Compute a Web Traffic Ranking, Vijaya Pamidi
Decompiler For Pseudo Code Generation, Ankit Patel
Similarity Tests for Metamorphic Virus Detection, Mahim Patel
URL Recommender using Parallel Processing, Ravi Kishore Penta
Metamorphic Detection via Emulation, Sushant Priyadarshi
Users Positions in Social Networks, Jasim Qazi
DISCOVERING KNOWLEDGE STRUCTURE IN THE WEB, Siddharth Ramu
Graph Technique For Metamorphic Virus Detection, Neha Runwal
AUTOMATED PENETRATION TESTING, Neha Samant
A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in a Cloud Computing Environment, Shailesh Sawant
Enhancing Productivity of Recruitment Process Using Data Mining & Text Mining Tools, Charul Saxena
FBchatters: A Facebook application for Gtalk, Ronak Shah
PROTECTIVE SHIELD FOR POLYMORPHIC VIRUSES, Priyadarshini Shanmuganathan
Algorithms Analysis System: Recurrences, Anchit Sharma
Dynamic Code Checksum Generator, Ashish Sharma
Improving the Performance of a Proxy Server using Web log mining, Akshay Shenoy
AUGMENTED-LIFE PHONE ORGANIZER, Chao-Hsin Shih
X10 vs Java: Concurrency Constructs and Performance, Anh Trinh
Online and Offline eBook Management System using W-CMS, Rohan Vibhandik
Scanned Wireless Network Setup Fake Access Point & its Detection, Saurabh Vishal
Mandatory Pet Sterilization and Overpopulation: Have Santa Cruz County's Policies Reduced Animal Shelter Intake and Euthanasia?, Amy Winkleblack
BitTorrent Traffic Detection with Deep Packet Inspection and Deep Flow Inspection, Raymond Wong
CENTRALIZED SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS, Li Yang
Learning Author’s Writing Pattern System By Automata, Qun Yu
ActiBot: A Botnet to Evade Active Detection, Xinjun Zhang
Master's Projects from 2010
Online Application Monitoring Tool, Sathya Anandan
Extending OWL with Finite Automata Constraints, Jignesh Borisa
A Framework for Active Learning: Revisited, Yue Chen
The ActiveLecture System, Sanuja Dabade
Japanese Kanji Suggestion Tool, Sujata Dongre
Enhancing open-source localization, Farzana Forhad
WiSeNetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale
Exhaustive Statistical Analysis for Detection of Metamorphic Malware, Aditya Govindaraju
A Study on Masquerade Detection, Lin Huang
Reliable Broadcasting in VANET, Pat Jangyodsuk
Clustering and Validation of Microarray Data Using Consensus Clustering, Sarbinder Kallar
An Online Versions of Hyperlinked-Induced Topics Search (HITS) Algorithm, Amith Kollam Chandranna
Food Phone Application, Shengyu Li
Intrusion Detection And Prevention System: SQL-Injection Attacks, Varian Luong
Auto-Generation of Use Case Controllers, Pushkar Marathe
Security in Peer-to-Peer SIP VoIP, Richa Marwaha
How Smart is your Android Smartphone?, Deepika Mulani
Bookmarklet Builder for Offline Data Retrieval, Sheetal Naidu
Mobile Search Engine using Clustering and Query Expansion, Huy Nguyen
Parallel Programming Recipes, Thuy C. Nguyenphuc
Web-Based IDE for Interfacing View Controller, Tejasvi Palvai
Automatic Grading of Programming Assignments, Ashlesha Patil
APPROXIMATE DISASSEMBLY, Dhivyakrishnan Radhakrishnan
Geometrical Structure and Analysis of Association Rules, Sar Rajat
Scala Server Faces, Vikas Vittal Rao
Analysis of False Cache Line Sharing Effects on Multicore CPUs, Suntorn Sae-eung
One Social, Sowmya Sampath
Geometrical Structure and Analysis of Association Rule, Rajat Sar
Approximate Disassembly using Dynamic Programming, Abhishek Shah
Metamorphic Viruses with Built-In Buffer Overflow, Ronak Shah
Open Source Analysis of Biomedical Figures, David Shao
A MicroRNA TARGET PREDICTION ALGORITHM, Rupinder Singh
Improved Worm Simulator and Simulations, Arnold Suvatne
Computational miRNA Target Prediction in Animals, Leyan Tang
Document Builder, Thien Tran
EMail Data Mining: An Approach to Construct an Organization Position-wise Structure While Performing EMail Analysis, Bhargav Vadher
View Component of Web-based IDE to develop Web Applications in CakePHP, Swathi Vegesna
DETECTING UNDETECTABLE COMPUTER VIRUSES, Sujandharan Venkatachalam
Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP, Sugiharto Widjaja
Automatic Execution Path Finding Tool, Fan Yang
IMPROVED SOFTWARE ACTIVATION USING MULTITHREADING, Jian Rui Zhang
Master's Projects from 2009
World Wide Web – Common Communication Language, Mohamed Ali
Visualization of Tree-Structured Data Through a Multi Touch User Interface, David Andrews
Online Circular Calendar, Praveen Athmanathan Panneerselvam
Intrusion Detection And Prevention System: CGI Attacks, Tejinder Aulakh
Evaluation of Strategies to Enhance NCLEX-RN Success, Joyce Barnby
Knowledge Engineering from Data Perspective: Granular Computing Approach, Rushin Barot
Heuristic Search Cryptanalysis of the Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju
Self-Directed Learning Readiness of Baccalaureate of Science in Nursing (BSN) Students, Saba Bayanzai
Video Conferencing Tool, Sapna Blesson
A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang
Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang
Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan
Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi
Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho
The Use of Complementary and Alternative Medicine for Menopausal Symptoms among Chinese-American Women, Rebecca Kwai-Ying Chung