This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.

Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.

Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.

For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.

Follow


Submissions from 2016

PDF

Bloon: Software and Hardware for Data Collection and Real-Time Analysis, Jacob Z. Weiss

PDF

Monarch: A Reimagined Browser for the Modern Web, Daniel R. Whitcomb

PDF

Automating 3D Wireless Measurements with Drones, Ethan Yu

Submissions from 2015

PDF

Communication Complexity of Distributed Statistical Algorithms, James A. Brofos

PDF

Optimistic and Parallel Ising Model Estimation, James Brofos and Rui Shu

PDF

WiPrint: 3D Printing Your Wireless Coverage, Justin Chan

PDF

How Realistic is Photorealistic?, Olivia B. Holmes

PDF

Cell Representations of the Configuration Space for Planning Optimal Paths, Ajay Kannan

PDF

Why Do Protein Structures Recur?, Rebecca G. Leong

PDF

On the Multidimensional Stable Marriage Problem, Jared Duker Lichtman

PDF

Repcoin: A Market-Based Approach to Reputation, Stephen D. Malina

PDF

mCollector: Sensor-enabled health-data collection system for rural areas in the developing world, Rima Narayana Murthy

PDF

Two Algorithms for Finding Edge Colorings in Regular Bipartite Multigraphs, Patricia T. Neckowicz

PDF

Repcoin: The Only Reputation Market, Matthew Ritter

PDF

Mismorphism: a Semiotic Model of Computer Security Circumvention (Extended Version), Sean W. Smith, R Koppel, J Blythe, and V Kothari

PDF

Course InSight: An Application of Natural Language Processing in a Course Browser, Chuanqi Sun

PDF

FrameShift: Shift Your Attention, Shift the Story, Tim Tregubov and Rukmini Goswami

Submissions from 2014

PDF

Methods for efficient object categorization, detection, scene recognition, and image search, Alessandro Bergamo

PDF

Information-Theoretic Limits for Density Estimation, James Brofos

PDF

On Opportunity Cost Bounds for the Knowledge Gradient, James Brofos

PDF

Vocal resonance as a passive biometric, Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz

PDF

ModFlows: Methods for Studying and Managing Mesh Editing Workflows, Jonathan D. Denning

PDF

3DFlow: Continuous Summarization of Mesh Editing Workflows, Jonathan D. Denning and Fabio Pellacini

PDF

CrossComp: Comparing Multiple Artists Performing Similar Modeling Tasks, Jonathan D. Denning and Fabio Pellacini

PDF

SculptFlow: Visualizing Sculpting Sequences by Continuous Summarization, Jonathan D. Denning, Fabio Pellacini, and Jiawei Ou

PDF

Garden of Eden: Software Packages for the Generation and Rendering of Visually Realistic Trees and Forests, William B. Jackson

PDF

Speaking the Local Dialect: Exploiting differences between IEEE 802.15.4 Receivers with Commodity Radios for fingerprinting, targeted attacks, and WIDS evasion, Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Travis Goodspeed, Ryan Speers, and David Dowd

PDF

Fingerprinting IEEE 802.15.4 Devices with Commodity Radios, Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Ryan Speers, and Travis Goodspeed

PDF

Constant RMR Transformation to Augment Reader-Writer Locks with Atomic Upgrade/Downgrade Support, Jake S. Leichtling

PDF

Cutting Wi-Fi Scan Tax for Smart Devices, Tianxing Li

PDF

ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report), Shrirang Mare, Andres Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz

PDF

Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph, Stefanie L. Ostrowski

PDF

An Assessment of Single-Channel EMG Sensing for Gestural Input, Travis Peters

PDF

Shared Roots: Regularizing Deep Neural Networks through Multitask Learning, Piotr Teterwak

PDF

StyleCheck: An Automated Stylistic Analysis Tool, Alexander P. Welton

Submissions from 2013

PDF

Ekho: A Tool for Recording and Emulating Energy Harvesting Conditions, Ryan H. Archer

PDF

ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection, Julian Bangert, Sergey Bratus, Rebecca Shapiro, Michael E. Locasto, Jason Reeves, Sean W. Smith, and Anna Shubina

PDF

Geometrical and probabilistic methods for determining association models and structures of protein complexes, Himanshu Chandola

PDF

Usable Security for Wireless Body-Area Networks, Cory Cornelius

PDF

Interpreting and Reconstructing Data from Sensor Networks, Jonathan H. Guinther

PDF

An Algorithm for Computing Edge Colorings on Regular Bipartite Multigraphs, Andrew S. Hannigan

PDF

Polynomial and Query Complexity of Minterm-Cyclic Functions, Matthew J. Harding

PDF

Photo Forensics from Partial Constraints, Eric R. Kee

PDF

Please Take My Survey: Compliance with smartphone-based EMA/ESM studies, Shloka R. Kini

PDF

Nimbus A Novel Multi-Device Operating System Shell, Sang Jin Lee

PDF

Sampling for Complexity in Rendering, Jiawei Ou

PDF

Access Control In and For the Real World, Sara Sinclair

PDF

MEXSVMs: Mid-level Features for Scalable Action Recognition, Du Tran and Lorenzo Torresani

PDF

Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid, Tucker L. Ward

PDF

Security-Policy Analysis with eXtended Unix Tools, Gabriel A. Weaver

PDF

Mobile Applications: Games that Transform Education, Edward Y. Zhang

Submissions from 2012

PDF

A Data Flow Tracker and Reference Monitor for WebKit and JavaScriptCore, Andrew Bloomgarden

PDF

Privacy-Preserving Screen Capture: Closing the Loop for Medical Informatics Usability, Joseph Cooley and Sean Smith

PDF

MeshGit: Diffing and Merging Polygonal Meshes, Jonathan D. Denning and Fabio Pellacini

PDF

Methods of Computing Deque Sortable Permutations Given Complete and Incomplete Information, Daniel J. Denton

PDF

Constructing Simplicial Complexes over Topological Spaces, Milka N. Doktorova

PDF

Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements, Alexandra C. Grant

PDF

Asymptotic Statistics of Nodal Domains of Quantum Chaotic Billiards in the Semiclassical Limit, Kyle T. Konrad

PDF

Abortable Reader-Writer Locks are No More Complex Than Abortable Mutex Locks, Zhiyu Liu

PDF

Wallpaper Maps, M. Douglas McIlroy

PDF

Toward Evaluating Progressive Rendering Methods in Appearance Design Tasks, Jiawei Ou, Ondrej Karlik, Jaroslav Krivanek, and Fabio Pellacini

PDF

Exposing Privacy Concerns in mHealth Data Sharing, Aarathi Prasad

PDF

Access Control Realities As Observed in a Clinical Medical Setting, Sara Sinclair and Sean Smith

PDF

Sensor-based system for verifying blood-pressure measurement position, Emma N. Smithayer

PDF

Access Control Hygiene and the Empathy Gap in Medical IT, Yifei Wang, Sean Smith, and Andrew Gettinger

Submissions from 2011

PDF

Anomaly Detection in Network Streams Through a Distributional Lens, Chrisil Arackaparambil

PDF

Obstruction-free Snapshot, Obstruction-free Consensus, and Fetch-and-add Modulo k, Jack R. Bowman

PDF

Beyond SELinux: the Case for Behavior-Based Policy and Trust Languages, Sergey Bratus, Michael E. Locasto, Boris Otto, Rebecca Shapiro, Sean W. Smith, and Gabriel Weaver

PDF

A Solution to k-Exclusion with O(logk) RMR Complexity, Jonathan H. Choi

PDF

Screen Capture for Sensitive Systems, Joseph A. Cooley

PDF

Reader-Writer Exclusion Supporting Upgrade and Downgrade with Reader-Priority, Michael I. Diamond

PDF

Static Analysis for Ruby in the Presence of Gradual Typing, Michael Edgar

PDF

Reader-Writer Exclusion Supporting Upgrade and Downgrade with Starvation Freedom, Matthew Elkherj

PDF

A 3-D Lighting and Shadow Analysis of the JFK Zapruder Film (Frame 317), Hany Farid

PDF

Effects of network trace sampling methods on privacy and utility metrics, Phillip A. Fazio

PDF

Minimum time kinematic trajectories for self-propelled rigid bodies in the unobstructed plane, Andrei A. Furtuna

PDF

A Multilevel, Posture-based Model for Motor Control in Simulation and Robotic Applications, Divya A. Gunasekaran

PDF

Assisting Human Motion-Tasks with Minimal, Real-time Feedback, Paritosh A. Kavathekar

PDF

Appearance-design interfaces and tools for computer cinematography: Evaluation and application, William B. Kerr

PDF

Hide-n-Sense: Privacy-aware secure mHealth sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz

PDF

A New Artificial Intelligence for Auralux, Edward McNeill

PDF

802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface, Ricky A. Melgares

PDF

Tackling Latency Using FG, Priya Natarajan

PDF

Exploiting the Hard-Working DWARF: Trojans with no Native Executable Code, James Oakley and Sergey Bratus

PDF

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, James M.H. Oakley

PDF

Scalable Object-Class Search via Sparse Retrieval Models and Approximate Ranking, Mohammad Rastegari, Chen Fang, and Lorenzo Torresani

PDF

Autoscopy Jr.: Intrusion Detection for Embedded Control Systems, Jason O. Reeves

PDF

Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, and Anna Shubina

PDF

IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks, Ryan Speers

PDF

Large-scale Wireless Local-area Network Measurement and Privacy Analysis, Keren Tan

PDF

Privacy Analysis of User Association Logs in a Large-scale Wireless LAN, Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz

PDF

BGrep and BDiff: UNIX Tools for High-Level Languages, Gabriel A. Weaver and Sean W. Smith

PDF

The Good, the Bad, and the Actively Verified, John Williamson

PDF

Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm, Nan Zheng

Submissions from 2010

PDF

On the Reliability of Wireless Fingerprinting using Clock Skews, Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz

PDF

Virtual Container Attestation: Customized trusted containers for on-demand computing., Katelin A. Bailey

PDF

Flexible Object Manipulation, Matthew P. Bell

PDF

Constant RMR Solutions to Reader Writer Synchronization, Vibhor Bhatt and Prasad Jayanti

PDF

Some Communication Complexity Results and their Applications, Joshua E. Brody

PDF

A Note on Randomized Streaming Space Bounds for the Longest Increasing Subsequence Problem, Amit Chakrabarti