This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.
Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.
Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.
For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.
Submissions from 2016
Bloon: Software and Hardware for Data Collection and Real-Time Analysis, Jacob Z. Weiss
Monarch: A Reimagined Browser for the Modern Web, Daniel R. Whitcomb
Automating 3D Wireless Measurements with Drones, Ethan Yu
Submissions from 2015
Communication Complexity of Distributed Statistical Algorithms, James A. Brofos
Optimistic and Parallel Ising Model Estimation, James Brofos and Rui Shu
WiPrint: 3D Printing Your Wireless Coverage, Justin Chan
How Realistic is Photorealistic?, Olivia B. Holmes
Cell Representations of the Configuration Space for Planning Optimal Paths, Ajay Kannan
Why Do Protein Structures Recur?, Rebecca G. Leong
On the Multidimensional Stable Marriage Problem, Jared Duker Lichtman
Repcoin: A Market-Based Approach to Reputation, Stephen D. Malina
mCollector: Sensor-enabled health-data collection system for rural areas in the developing world, Rima Narayana Murthy
Two Algorithms for Finding Edge Colorings in Regular Bipartite Multigraphs, Patricia T. Neckowicz
Repcoin: The Only Reputation Market, Matthew Ritter
Mismorphism: a Semiotic Model of Computer Security Circumvention (Extended Version), Sean W. Smith, R Koppel, J Blythe, and V Kothari
Course InSight: An Application of Natural Language Processing in a Course Browser, Chuanqi Sun
FrameShift: Shift Your Attention, Shift the Story, Tim Tregubov and Rukmini Goswami
Submissions from 2014
Methods for efficient object categorization, detection, scene recognition, and image search, Alessandro Bergamo
Information-Theoretic Limits for Density Estimation, James Brofos
On Opportunity Cost Bounds for the Knowledge Gradient, James Brofos
Vocal resonance as a passive biometric, Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz
ModFlows: Methods for Studying and Managing Mesh Editing Workflows, Jonathan D. Denning
3DFlow: Continuous Summarization of Mesh Editing Workflows, Jonathan D. Denning and Fabio Pellacini
CrossComp: Comparing Multiple Artists Performing Similar Modeling Tasks, Jonathan D. Denning and Fabio Pellacini
SculptFlow: Visualizing Sculpting Sequences by Continuous Summarization, Jonathan D. Denning, Fabio Pellacini, and Jiawei Ou
Garden of Eden: Software Packages for the Generation and Rendering of Visually Realistic Trees and Forests, William B. Jackson
Speaking the Local Dialect: Exploiting differences between IEEE 802.15.4 Receivers with Commodity Radios for fingerprinting, targeted attacks, and WIDS evasion, Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Travis Goodspeed, Ryan Speers, and David Dowd
Fingerprinting IEEE 802.15.4 Devices with Commodity Radios, Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Ryan Speers, and Travis Goodspeed
Constant RMR Transformation to Augment Reader-Writer Locks with Atomic Upgrade/Downgrade Support, Jake S. Leichtling
Cutting Wi-Fi Scan Tax for Smart Devices, Tianxing Li
ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report), Shrirang Mare, Andres Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz
Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph, Stefanie L. Ostrowski
An Assessment of Single-Channel EMG Sensing for Gestural Input, Travis Peters
Shared Roots: Regularizing Deep Neural Networks through Multitask Learning, Piotr Teterwak
StyleCheck: An Automated Stylistic Analysis Tool, Alexander P. Welton
Submissions from 2013
Ekho: A Tool for Recording and Emulating Energy Harvesting Conditions, Ryan H. Archer
ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection, Julian Bangert, Sergey Bratus, Rebecca Shapiro, Michael E. Locasto, Jason Reeves, Sean W. Smith, and Anna Shubina
Geometrical and probabilistic methods for determining association models and structures of protein complexes, Himanshu Chandola
Usable Security for Wireless Body-Area Networks, Cory Cornelius
Interpreting and Reconstructing Data from Sensor Networks, Jonathan H. Guinther
An Algorithm for Computing Edge Colorings on Regular Bipartite Multigraphs, Andrew S. Hannigan
Polynomial and Query Complexity of Minterm-Cyclic Functions, Matthew J. Harding
Photo Forensics from Partial Constraints, Eric R. Kee
Please Take My Survey: Compliance with smartphone-based EMA/ESM studies, Shloka R. Kini
Nimbus A Novel Multi-Device Operating System Shell, Sang Jin Lee
Sampling for Complexity in Rendering, Jiawei Ou
Access Control In and For the Real World, Sara Sinclair
MEXSVMs: Mid-level Features for Scalable Action Recognition, Du Tran and Lorenzo Torresani
Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid, Tucker L. Ward
Security-Policy Analysis with eXtended Unix Tools, Gabriel A. Weaver
Mobile Applications: Games that Transform Education, Edward Y. Zhang
Submissions from 2012
A Data Flow Tracker and Reference Monitor for WebKit and JavaScriptCore, Andrew Bloomgarden
Privacy-Preserving Screen Capture: Closing the Loop for Medical Informatics Usability, Joseph Cooley and Sean Smith
MeshGit: Diffing and Merging Polygonal Meshes, Jonathan D. Denning and Fabio Pellacini
Methods of Computing Deque Sortable Permutations Given Complete and Incomplete Information, Daniel J. Denton
Constructing Simplicial Complexes over Topological Spaces, Milka N. Doktorova
Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements, Alexandra C. Grant
Asymptotic Statistics of Nodal Domains of Quantum Chaotic Billiards in the Semiclassical Limit, Kyle T. Konrad
Abortable Reader-Writer Locks are No More Complex Than Abortable Mutex Locks, Zhiyu Liu
Wallpaper Maps, M. Douglas McIlroy
Toward Evaluating Progressive Rendering Methods in Appearance Design Tasks, Jiawei Ou, Ondrej Karlik, Jaroslav Krivanek, and Fabio Pellacini
Exposing Privacy Concerns in mHealth Data Sharing, Aarathi Prasad
Access Control Realities As Observed in a Clinical Medical Setting, Sara Sinclair and Sean Smith
Sensor-based system for verifying blood-pressure measurement position, Emma N. Smithayer
Access Control Hygiene and the Empathy Gap in Medical IT, Yifei Wang, Sean Smith, and Andrew Gettinger
Submissions from 2011
Anomaly Detection in Network Streams Through a Distributional Lens, Chrisil Arackaparambil
Obstruction-free Snapshot, Obstruction-free Consensus, and Fetch-and-add Modulo k, Jack R. Bowman
Beyond SELinux: the Case for Behavior-Based Policy and Trust Languages, Sergey Bratus, Michael E. Locasto, Boris Otto, Rebecca Shapiro, Sean W. Smith, and Gabriel Weaver
A Solution to k-Exclusion with O(logk) RMR Complexity, Jonathan H. Choi
Screen Capture for Sensitive Systems, Joseph A. Cooley
Reader-Writer Exclusion Supporting Upgrade and Downgrade with Reader-Priority, Michael I. Diamond
Static Analysis for Ruby in the Presence of Gradual Typing, Michael Edgar
Reader-Writer Exclusion Supporting Upgrade and Downgrade with Starvation Freedom, Matthew Elkherj
A 3-D Lighting and Shadow Analysis of the JFK Zapruder Film (Frame 317), Hany Farid
Effects of network trace sampling methods on privacy and utility metrics, Phillip A. Fazio
Minimum time kinematic trajectories for self-propelled rigid bodies in the unobstructed plane, Andrei A. Furtuna
A Multilevel, Posture-based Model for Motor Control in Simulation and Robotic Applications, Divya A. Gunasekaran
Assisting Human Motion-Tasks with Minimal, Real-time Feedback, Paritosh A. Kavathekar
Appearance-design interfaces and tools for computer cinematography: Evaluation and application, William B. Kerr
Hide-n-Sense: Privacy-aware secure mHealth sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz
A New Artificial Intelligence for Auralux, Edward McNeill
802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface, Ricky A. Melgares
Tackling Latency Using FG, Priya Natarajan
Exploiting the Hard-Working DWARF: Trojans with no Native Executable Code, James Oakley and Sergey Bratus
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, James M.H. Oakley
Scalable Object-Class Search via Sparse Retrieval Models and Approximate Ranking, Mohammad Rastegari, Chen Fang, and Lorenzo Torresani
Autoscopy Jr.: Intrusion Detection for Embedded Control Systems, Jason O. Reeves
Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, and Anna Shubina
IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks, Ryan Speers
Large-scale Wireless Local-area Network Measurement and Privacy Analysis, Keren Tan
Privacy Analysis of User Association Logs in a Large-scale Wireless LAN, Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz
BGrep and BDiff: UNIX Tools for High-Level Languages, Gabriel A. Weaver and Sean W. Smith
The Good, the Bad, and the Actively Verified, John Williamson
Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm, Nan Zheng
Submissions from 2010
On the Reliability of Wireless Fingerprinting using Clock Skews, Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz
Virtual Container Attestation: Customized trusted containers for on-demand computing., Katelin A. Bailey
Flexible Object Manipulation, Matthew P. Bell
Constant RMR Solutions to Reader Writer Synchronization, Vibhor Bhatt and Prasad Jayanti
Some Communication Complexity Results and their Applications, Joshua E. Brody
A Note on Randomized Streaming Space Bounds for the Longest Increasing Subsequence Problem, Amit Chakrabarti