CS Logo

Our Students

Senior Projects

from 2003 to present
  • ¿Puedes Anagramar?: A Game That Helps Heritage Speakers Master Spanish, Jose Alexander
  • Using Byte Code to Find Idiosyncratic Android Camera Apps, Christopher Burnley
  • Tracking Pose Using Common Mobile Phone Sensors, Drew Carlson
  • Training Neural Networks to Pilot Autonomous Vehicles: Scaled Self-Driving Car, Jason Zisheng Chang
  • A Location-Based Smart Gun: An Attempt to Lock Down Firearms to Geographically Defined Areas, Daniel Ellis
  • A Deep Learn Agent for Games with Hidden Information, Robert Mills
  • An Implementation of the Solution to the Conjugacy Problem on Thompson's Group V, Rachel Nalecz
  • Is there Joy Beyond the Joystick?: Immersive Potential of Brain-Computer Interfaces, Elias Posen
  • Neural Network Reconstruction via Graph Locality-Driven Machine Learning, Hayden Sartoris
  • A Study of Neural Networks for the Quantum Many-Body Problem, Liam Schramm
  • Don't Take This Personally: Sentiment Analysis for Identification of "Subtweeting" on Twitter", Noah Segal-Gould
  • Geometry of Projections on a Non-Planar Surface, Darren Tirto
  • Some results on 0-1 languages, Thanh Thuy Trang Tran
  • Using Static Analysis and Dalvik ByteCode on Android Compass Applications to detect Operational Anomalies, Arti Tripathi

  • Go With the Flow: An Exploration of Distributed Network Flow for Robot Pathfinding, Marley Alford
  • Dynamic Difficulty Adjustment in Procedural Content Generation, Charles Calder
  • An Evaluation of Constituency-based Hyponymy Extraction from Privacy Policies, Morgan Evans
  • Mouse vs. Machine: The Game, Cafferty Frattarelli
  • The Search for Mal’cev Terms over Finite Quandles, Meghan Hogan
  • Community Detection for Counter-Terrorism, Patrick Kelly
  • Beyond Homographies: Exploration and Analysis of Image Warping for Projection in a Dome, Kai Malowany
  • Content-Aware Image Resizing, Race Morel
  • Thinking Outside The Box: Computing 3D Volume in 2D, Alexandra Morris
  • Sum Tzu and the Mathematics of War: a Predictive Assistant for Warhammer 40,000, Benjamin Newman
  • The Disciple: A Talking Platformer, Ben Sernau
  • An Alternative Formulation for Nonnegative Matrix Factorization, Stefan Stojanov
  • Design and Implementation of a Revised Android Application for Bard Shuttle Services, Chance Wren

  • An Overview of a Driving Profile Based on Mobile Phone Sensor Data, John Belk
  • Computing Language and Thinking: Analysis, Design, and Assessment of Introductory Computer Science Workshops in the Liberal Arts Experience, Kathleen Burke
  • Phyro: Exploring an Untethered Model for Robots in CS-1, Philip Franchi-Pereira
  • Hybrid Algorithm for Matching Profiles and Social Networks, Elliot Garcia
  • Study of Queueing Delay in the Single-Hop Case, Muhsin King
  • Public Key Cryptography with the Brin-Thompson Group 2V, Cyril Kuhn
  • Optimizing Website Design Through the Application of an Interactive Genetic Algorithm, Elijah Mensch
  • Context-Aware Application using Beacons, Abdullah Nasim
  • Algorithmic Music Composition and Accompaniment Using Neural Networks, Daniel Risdon
  • Branching Boogaloo: Botanical Adventures in Multi-Mediated Morphologies, Diana Ruggiero
  • Paralinguistic Speech Recognition: Classifying Emotion in Speech with Deep Learning Neural Networks, Eli Segal
  • FLD: A FIFO/LRU decision algorithm for managing L1 private cache in heterogeneous processors, Ameer Shalabi
  • Radical Recognition in On-Line Handwritten Chinese Characters Using Non-Negative Matrix Factorization, Xiangying Shuai
  • A Deep Learning Approach to Text Simplification, Wayne Zhang

  • Machine Learning on Images of a Microbial Mutant Library, Georgia Doing
  • Exploring a Learning Approach for Social Humanoid Robots Through Handwriting Reproduction, Manon Escoffier
  • Development and Optimization of a Two-View Model for Anamorphic Projections on Planar Surfaces, Van Mai Nguyen Thi
  • Detecting Intruders via Touchscreen Usage Patterns on a Smartphone, Yu Qiu
  • Why Do the Order of the Strokes Matter in Handwriting?, Lillian Reich
  • Towards an Automated Ballet Teacher, Oliver Bruce
  • A Creative Exploration of Sensors Through a Mobile Application Interface, Julia Carter
  • Feature Extraction and Texture Analysis in the Classification of Paintings, Jacob Fauber
  • The Effects of Robots on Computer Science Perceptions, Shannon Gray
  • Browsing Data as a Predictor of Web Page Relevancy, Elliot Korte
  • Learning The Unknown by Masking The Known: Application of Sound Subtraction to Non-Negative Matrix Factorization, Yuexi Ma
  • Testing the Fences: Using Multi-Agent Reinforcement Learning to Structure the Behavior of Virtual Dinosaurs, Henry Meyers
  • Using Graph Traversal to Find Similarity Between Sentences, Michael Anzuoni
  • Augmented Reality Using the Kinect Camera, Jonathan De Wolf
  • Implementation of the Solution to the Conjugacy Problem in Thompson's Groups, Nabil Hossain
  • Recreating the Trajectory of a Golf Swing Using a Microelectromechanical System, Blagoy Kaloferov
  • Turning a Duet into Two Solos: Is It Just a Statistics Problem?, Hsiao-Fang Lin
  • A Statistical and Semantic Approach to Sentence Similarity, Anis Zaman
  • Finite Algebras on the Semantic Web, Feifan Zheng
  • P2P Protest: Practical Adaptations of Epidemic Routing for Mobile Devices, Curtis Carmony
  • A Reinforcement-based Brain Computer Interface to Translate EEG Patterns into Commands, Abhimanyu Sheshashayee
  • Semi-Automated Creation of Cinemagraphs for the Exhibition Still Moving, Will Wisseman
  • Computable Invariants for Quandles , Steven Wu
  • Evaluation of Interfaces for Senior Citizens: BigScreenLive, Eldy and PointerWare, Bella Manoim
  • Modeling Environments through Range Scanning, Erik Shagdar
  • Delaunay Diagram Representations For Use in Image Near-Duplicate Detection, Adina-Raluca Stoica
  • An Information Theoretic Approach for Evaluating Document Clustering, Maksim Tsikhanovich
  • The Effect of Tangible and Multitouch Interfaces on Game Performance, Michael Walker
  • Analyzing and Visualizing Data Collected Via Honeypots, Jacqueline Bow
  • Computing the Typeset for Quandles, Alexander Chakarov
  • Using Vision for Bayesian Robot Localization, Robert McNevin
  • An Introduction to Quay Theory, Hannah Quay-de la Vallee
  • Genetic Algorithms for Clustering, Georgi Smilyanov
  • A REINFORCE Algorithm Applied to Recurrent Spiking Neural Networks, Peter Stojanov
  • Pattern Analysis in Dynamic Social Network, Yu Wu
  • Uncertainty in Pursuit-Evasion Games of Imperfect Information, Peter Golbus
  • Biologically Inspired Computer Vision, Morgon Kanter
  • Automated Learning of a Probabilistic Context-Free Grammar for English, Vladimir Pick
  • Improving the Course Registration Experience: A Web Application to Facilitate Course Selection and Schedule Building, Sphurti Saraph
  • Timing Response in Temporally Selective Networks, Mary Sharac
  • Quand(DL)es: An Ontology for Knots and Finite Quandles, Barnaby Alter
  • Rubot: A Domain-Specific Language for Behavior-Based Robotics, Peter Jaros
  • Can We Beat the Dow Jones Index? Artificial Intelligence in Finance and Investing, Geral Pambo-Awich
  • OpenPCG, James Callender
  • Data Ontology to Support the Bard College Research Funding System, Sutha Ganesharajah
  • Use of Singular Value Decomposition in Document Analysis, Loydal (Derek) Tingley
  • SongFinder: An Experiment in Audio Retrieval Using Audio Signals as Input, George Acker
  • The Self-Organizing Desktop: Using Unsupervised Content Classification for Efficient Document Browsing Poster, Brendan Berg (PDF)
  • Exploring Robot Communication: A Journey from Theory to Practice, Andrei Furtuna
  • Ranking Search Results Using Statistical Analysis, Alexei Phillips
  • SHA-1 Attack Based on the Binary Representation of its Digest, Mariana Raykova
  • Bacterial Identification: Algorithms for the Selection of Primers for PCR Reactions, Kamun Chan
  • Information Visualization and HCI:Using Novel Visualization Techniques to Increase Cognition Rates When Performing Information-Intensive Tasks, Joanna Fivelsdal
  • Phreaking Pinna - An Audio Reproduction System for Wave Front Synthesis, Kyle Jaster
  • Lollio: Monadic Input/Output and Linear Context Management in Logic Programming, Todd Johnson
  • Chip Firing Games, Kate Belin
  • An Incursion into Finite Model Theory, Elena Grigorescu
  • Deriving Phylogentic Trees from Non-Coding DNA, Reazur Rahman
  • Generating Class Recommendations through Collaborative Filtering, David Steeves
  • Determining Image Authorship: Applied Techniques of Textual Stylometrics, Jordan Berkowitz
  • Using malicious code to establish and maintain illicit networks: Feasibility and concerns, Peter Bohning
  • Parallelizing rho-Caml programs, Sean Callanan
  • Implementation of mobil ambients in Lambda Prolog, Vasilicea Crecea
  • A microplanning preprocessor for natural language generation, Joshua Hall-Bachner
  • A mathematical theory of adaptation, Katharine Mullen
  • Chat-Based Secruity System: Computer Network Security System Based on a Client-Server Chat Room Running on an Encrypted Platform, Naimur Rahman