This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.
Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.
Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.
For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.
Submissions from 2023
Reasoning about the Conant Gasket, M. Douglas McIlroy
Submissions from 2021
Eating detection with a head-mounted video camera, Shengjie Bi and David Kotz
On Mentzer’s Hardness of the k-Center Problem on the Euclidean Plane., Raymond Chen
Submissions from 2020
On Session Languages, Prashant Anantharaman and Sean W. Smith
Data-driven Personalized Applications in Networks, Chuankai An
Information Network Navigation, Ryan W. Blankemeier
Memory constraints in cued-recall-dependent learning and performance tasks: Why do humans struggle with simple yet memory-intensive tasks?, Jack L. Burgess
Push-relabel algorithms for computing perfect matchings of regular bipartite multigraphs, Benjamin J. Coleman
A Clustering Algorithm for Early Prediction of Controversial Reddit Posts, Abenezer Daniel Dara
Towards Ryser's Conjecture: Bounds on the Cardinality of Partitioned Intersecting Hypergraphs, Anna E. Dodson
Mining Academic Publications to Predict Automation, Elena A. Doty
Digital Legacies for Digital Natives, Katie Goldstein
Predicting Influencer Virality on Twitter, Danah K. Han
Defense in Depth of Resource-Constrained Devices, Ira Ray Jenkins
Distributed IoT Attestation via Blockchain (Extended Version), Ira Ray Jenkins and Sean W. Smith
A Critical Audit of Accuracy and Demographic Biases within Toxicity Detection Tools, Jiachen Jiang
Probabilistic Error Upper Bounds For Distributed Statistical Estimation, Matthew Jin
Bridging the Gap Between Intent and Outcome: Knowledge, Tools & Principles for Security-Minded Decision-Making, Vijay Harshed Kothari
THaW publications, Carl Landwehr and David Kotz
Learning Humor Through AI: A Study on New Yorker's Cartoon Caption Contests Using Deep Learning, Ray Tianyu Li
A computational approach to analyzing and detecting trans-exclusionary radical feminists (TERFs) on Twitter, Christina T. Lu
VR-Notes: A Perspective-Based, Multimedia Annotation System in Virtual Reality, Justin Luo
Query Free Adversarial Transfer via Undertrained Surrogates, Christopher S. Miller
Restoring Humanity to Those Dying Below: An Inquiry Concerning the Ethics of Autonomous Weapons Systems, Juliette A. Pouchol
Regression-based motion planning, Josiah K. Putman
Autonomous Eye Tracking in Octopus bimaculoides, Mark Andrew Taylor
Label Noise Reduction Without Assumptions, Jason Wei
Automatic Generation of Input Grammars Using Symbolic Execution, Linda Xiao
Submissions from 2019
Convergence Times of Decentralized Graph Coloring Algorithms, Paul B. de Supinski
Orthogonal Array Sampling for Monte Carlo Based Rendering, Afnan Enayet
Fair Algorithms for Clustering, Nicolas J. Flores
Evaluating the Efficacy of Magnetometer-Based Vehicle Sensors, Luke A. Hudspeth
Twitter Bot Detection in the Context of the 2018 US Senate Elections, Wes Kendrick
Application of Binary Search to Video Annotation and Behavior Tracking for the Social Sciences, Caitlyn Lee
Is Augmented Reality in Denial of the Convention? Examining the Presence of Uncanny Valley in Augmented Reality, Sung Jun Park
Trustworthy Wireless Personal Area Networks, Travis W. Peters
Comparing brain-like representations learned by vanilla, residual, and recurrent CNN architectures, Cara E. Van Uden
Interlocking structure design and assembly, Yinan Zhang
Submissions from 2018
A JPEG Corner Artifact from Directed Rounding of DCT Coefficients, Shruti Agarwal and Hany Farid
Securing, Standardizing, and Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson
A radiative transfer framework for non-exponential media, Benedikt Bitterli, Srinath Ravichandran, Thomas Müller, Magnus Wrenninge, Jan Novák, Steve Marschner, and Wojciech Jarosz
IPv6 Security Issues in Linux and FreeBSD Kernels: A 20-year Retrospective, Jack R. Cardwell
STEM Outreach Activity with Fitbit Wearable Devices, Joseph Carrigan, David Kotz, and Aviel Rubin
Time-Space Tradeoffs for the Memory Game, Yining Chen and Amit Chakrabarti
Overlaying Virtual Scale Models on Real Environments Without the Use of Peripherals, George Hito
Robotic Laundry Folding, Evan Honnold
Balancing patient control and practical access policy for electronic health records via blockchain technology, Elena Horton
Co-Training of Audio and Video Representations from Self-Supervised Temporal Synchronization, Bruno Korbar
Full and Dense Cyclic Gray codes in Mixed Radices, Devina Kumar
Navigating Virtual Reality Using Only Your Gazes and Mind, Christopher J. Kymn
The Next Generation of EMPRESS: A Metadata Management System For Accelerated Scientific Discovery at Exascale, Margaret R. Lawson
Battery-Free Eye Tracker on Glasses, Tianxing Li and Xia Zhou
DartDraw: The Design and Implementation of Global State Management, User Interaction Management, and Text in a React-Redux Drawing Application, Collin M. McKinney
Investigating Contextual Cues as Indicators for EMA Delivery, Varun Mishra, Byron Lowens, Sarah Lord, Kelly Caine, and David Kotz
PyMOL Plugin to Build Protein Structures Based on Natural TERM Overlaps, Noah T. Paravicini
Secure short-range communications, Timothy J. Pierson
Reflections on Building DartDraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury
Complex Neural Networks for Audio, Andy M. Sarroff
AfterImage: Collecting and Replaying Geospatial Memory, Hyun Ji Seong
Types for the Chain of Trust: No (Loader) Write Left Behind, Rebecca Shapiro
Customizing Indoor Wireless Coverage via 3D-Fabricated Reflectors, Xi Xiong
Submissions from 2017
ActivityAware: Wearable System for Real-Time Physical Activity Monitoring among the Elderly, George G. Boateng
Accuracy and Racial Biases of Recidivism Prediction Instruments, Julia J. Dressel
Dense Gray Codes in Mixed Radices, Jessica C. Fan
A Statistical Prior for Photo Forensics: Object Removal, Wei Fan and Hany Farid
Using Computational Models to Understand ASD Facial Expression Recognition Patterns, Irene L. Feng
OpenCollab: A Blockchain Based Protocol to Incentivize Open Source Software Development, Yondon Fu
ShareABEL: Secure Sharing of mHealth Data through Cryptographically-Enforced Access Control, Emily Greene
Chinese Font Style Transfer with Neural Network, Xue Hanyu
Cryptographic transfer of sensor data from the Amulet to a smartphone, David B. Harmon
A HoloLens Application to Aid People who are Visually Impaired in Navigation Tasks, Jonathan L. Huang
A Digital Practice Tool for Chemical Resonance, Kimball Jaclyn
NovenaNetwork: A Catholic Social Media iOS Application for Praying Novenas as a Community, Marissa Le Coz
Assemble.live: Designing for Schisms in Large Groups in Audio/Video Calls, Benjamin P. Packer
A Survey of Trustworthy Computing on Mobile & Wearable Systems, Travis Peters
Scene classification from degraded images: comparing human and computer vision performance, Tim M. Tadros
Improving Elementary Math Learning Through iPad Games, Kaya M. Thomas
Submissions from 2016
StressAware: App for Continuously Measuring and Monitoring Stress Levels in Real Time on the Amulet Wearable Device, George G. Boateng
Security and Privacy Analysis of Medical Wearables, Brian M. Chalif
Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, and Digital Avatars, Daniel J. Chen
Air Keyboard: Mid-Air Text Input Using Wearable EMG Sensors and a Predictive Text Model, Jacob A. Gaba
Algorithmic Problems Arising in Posets and Permutations, Shahrzad Haddadan
Towards A Verified Complex Protocol Stack in a Production Kernel: Methodology and Demonstration, Peter C. Johnson
Reusing Ambient Light to Recognize Hand Gestures, Mahina-Diana A. Kaholokula
Integrating Bluetooth Low Energy Peripherals with the Amulet, Anna J. Knowles
Bae: Before Anyone Else; The Answer to Mobile Dating for the African Diaspora, Jordan S. Kunzika
Devising a Framework for Efficient and Accurate Matchmaking and Real-time Web Communication, Charles Li
Implications of Motion Planning: Optimality and k-survivability, Yu-Han Lyu
Seamless Authentication for Ubiquitous Devices, Shrirang Mare
Wanda: securely introducing mobile devices (Extended version), Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz
Privacy-preserving controls for sharing mHealth data, Aarathi Prasad
TEDDI: Tamper Event Detection on Distributed Cyber-Physical Systems, Jason O. Reeves
All Your BASE Are Belong To You: Improved Browser Anonymity and Security on Android, Peter Saisi
Monte Carlo Convergence Analysis for Anisotropic Sampling Power Spectra, Gurprit Singh and Wojciech Jarosz
The DarkLight Rises: Visible Light Communication in the Dark, Zhao Tian, Kevin Wright, and Xia Zhou
Representations and Models for Large-Scale Video Understanding, Du Le Hong Tran
Interactive Data Visualization of Christian Demographics, Allison C. Wang
Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme, Bingyue Wang
Constraint-based robot knot tying, Weifu Wang