To browse Master's Projects by academic department or program, please go to the College, School or Department page.
Master's Projects from 2011
FBchatters: A Facebook application for Gtalk, Ronak Shah
PROTECTIVE SHIELD FOR POLYMORPHIC VIRUSES, Priyadarshini Shanmuganathan
Algorithms Analysis System: Recurrences, Anchit Sharma
Dynamic Code Checksum Generator, Ashish Sharma
Improving the Performance of a Proxy Server using Web log mining, Akshay Shenoy
AUGMENTED-LIFE PHONE ORGANIZER, Chao-Hsin Shih
X10 vs Java: Concurrency Constructs and Performance, Anh Trinh
Online and Offline eBook Management System using W-CMS, Rohan Vibhandik
Scanned Wireless Network Setup Fake Access Point & its Detection, Saurabh Vishal
Mandatory Pet Sterilization and Overpopulation: Have Santa Cruz County's Policies Reduced Animal Shelter Intake and Euthanasia?, Amy Winkleblack
BitTorrent Traffic Detection with Deep Packet Inspection and Deep Flow Inspection, Raymond Wong
CENTRALIZED SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS, Li Yang
Learning Author’s Writing Pattern System By Automata, Qun Yu
ActiBot: A Botnet to Evade Active Detection, Xinjun Zhang
Master's Projects from 2010
Online Application Monitoring Tool, Sathya Anandan
Extending OWL with Finite Automata Constraints, Jignesh Borisa
A Framework for Active Learning: Revisited, Yue Chen
The ActiveLecture System, Sanuja Dabade
Japanese Kanji Suggestion Tool, Sujata Dongre
Enhancing open-source localization, Farzana Forhad
WiSeNetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale
Exhaustive Statistical Analysis for Detection of Metamorphic Malware, Aditya Govindaraju
A Study on Masquerade Detection, Lin Huang
Reliable Broadcasting in VANET, Pat Jangyodsuk
Clustering and Validation of Microarray Data Using Consensus Clustering, Sarbinder Kallar
An Online Versions of Hyperlinked-Induced Topics Search (HITS) Algorithm, Amith Kollam Chandranna
Food Phone Application, Shengyu Li
Intrusion Detection And Prevention System: SQL-Injection Attacks, Varian Luong
Auto-Generation of Use Case Controllers, Pushkar Marathe
Security in Peer-to-Peer SIP VoIP, Richa Marwaha
How Smart is your Android Smartphone?, Deepika Mulani
Bookmarklet Builder for Offline Data Retrieval, Sheetal Naidu
Mobile Search Engine using Clustering and Query Expansion, Huy Nguyen
Parallel Programming Recipes, Thuy C. Nguyenphuc
Web-Based IDE for Interfacing View Controller, Tejasvi Palvai
Automatic Grading of Programming Assignments, Ashlesha Patil
APPROXIMATE DISASSEMBLY, Dhivyakrishnan Radhakrishnan
Geometrical Structure and Analysis of Association Rules, Sar Rajat
Scala Server Faces, Vikas Vittal Rao
Analysis of False Cache Line Sharing Effects on Multicore CPUs, Suntorn Sae-eung
One Social, Sowmya Sampath
Geometrical Structure and Analysis of Association Rule, Rajat Sar
Approximate Disassembly using Dynamic Programming, Abhishek Shah
Metamorphic Viruses with Built-In Buffer Overflow, Ronak Shah
Open Source Analysis of Biomedical Figures, David Shao
A MicroRNA TARGET PREDICTION ALGORITHM, Rupinder Singh
Improved Worm Simulator and Simulations, Arnold Suvatne
Computational miRNA Target Prediction in Animals, Leyan Tang
Document Builder, Thien Tran
EMail Data Mining: An Approach to Construct an Organization Position-wise Structure While Performing EMail Analysis, Bhargav Vadher
View Component of Web-based IDE to develop Web Applications in CakePHP, Swathi Vegesna
DETECTING UNDETECTABLE COMPUTER VIRUSES, Sujandharan Venkatachalam
Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP, Sugiharto Widjaja
Automatic Execution Path Finding Tool, Fan Yang
IMPROVED SOFTWARE ACTIVATION USING MULTITHREADING, Jian Rui Zhang
Master's Projects from 2009
World Wide Web – Common Communication Language, Mohamed Ali
Visualization of Tree-Structured Data Through a Multi Touch User Interface, David Andrews
Online Circular Calendar, Praveen Athmanathan Panneerselvam
Intrusion Detection And Prevention System: CGI Attacks, Tejinder Aulakh
Evaluation of Strategies to Enhance NCLEX-RN Success, Joyce Barnby
Knowledge Engineering from Data Perspective: Granular Computing Approach, Rushin Barot
Heuristic Search Cryptanalysis of the Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju
Self-Directed Learning Readiness of Baccalaureate of Science in Nursing (BSN) Students, Saba Bayanzai
Video Conferencing Tool, Sapna Blesson
A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang
Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang
Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan
Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi
Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho
The Use of Complementary and Alternative Medicine for Menopausal Symptoms among Chinese-American Women, Rebecca Kwai-Ying Chung
Views About Health of Russian-Americans Living in Central California, Mark Fiterman
Objective Measurement of Speech Quality in VoIP over Wireless LAN during Handoff, Nidhi Marwaha Gambhir
Student Perceptions of Their Learning Experience in the Clinical Setting: A Pilot Study, Peggy Gnehm
Triggering of Just-In-Time Compilation in the Java Virtual Machine, Rouhollah Gougol
Chinese Wall Security Policy, Varun Gupta
MSG: A Gap-Oriented Genetic Algorithm for Multiple Sequence Alignment, Philip Heller
The Use of the "Get Up and Go Test" as the Initial Screening Measure for Fall Risk With Community Dwelling Seniors, Margaret E. Hermoso
Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka
MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke
Automatic Video Classification, Don Jayakody
Is Four File Chess a Draw?, Michael Karbushev
Client-Side Page Element Web-Caching, Ramya Karri
Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul
Class Size and Nursing Students' Perception of Empowerment, Cynthia T. Keane
Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim
Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan
Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy
Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy
Depression Among the Elderly: Screening Practices and Attitudes Among Nurse Practitioners, Grace Le
Hunting for Undetectable Metamorphic Viruses, Da Lin
Hunting for Undetectable Metamorphic Viruses, Da Lin
Role Strain of Nursing Students in Obstetrical Clinical Rotations: Is Role Strain Greater for Male Students?, Teri A. Lind
Removing the Digital Divide for Senior Web Users, Chiu Luk
English Language Acculturation and Academic Achievement Among Junior Year Nursing Students, Leah Lukrich
An Automata Based Text Analysis System, Yue Lu
Productivity Environmental Preference Survey (PEPS) of Undergraduate Nursing Students - A Generational Perspective, Susana Machado
Self Perceptions of Clinical Performance of Accelerated First Degree and Accelerated Second-Degree Graduates, Neelam N. Murthi
Web based Recommender Systems and Rating Prediction, Tho Nguyen