The Department of Computer Science has an accredited undergraduate program that offers specialized ‘tracks’ of study in key areas. Undergraduates are prepared by graduation for pursuing a computing career or for graduate study. Our active corporate partners program offers internships and permanent employment to our students. Students are encouraged to participate in research experiences during their studies. Capstone courses provide significant team project experiences. The graduate program offers M.S. and Ph.D. degrees, emphasizing thesis work both at the main campus in Blacksburg and at the Northern Virginia Center. About two-thirds of the graduate students are pursuing the Ph.D. degree. The faculty, among whom there are 12 NSF or DOE CAREER Award winners, are active researchers who are visible contributors to the profession and have achieved significant honors.

Sub-communities within this community

Collections in this community

Recent Submissions

  • MOANA: Modeling and Analyzing I/O Variability in Parallel System Experimental Design 

    Cameron, Kirk W.; Anwar, Ali; Cheng, Yue; Xu, Li; Li, Bo; Ananth, Uday; Lux, Thomas; Hong, Yili; Watson, Layne T.; Butt, Ali R. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-04-19), TR-18-04
    Exponential increases in complexity and scale make variability a growing threat to sustaining HPC performance at exascale. Performance variability in HPC I/O is common, acute, and formidable. We take the first step towards ...
  • Modeling Influence using Weak Supervision: A joint Link and Post-level Analysis 

    Chen, Liangzhe; Prakash, B. Aditya (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-04-09), TR-18-03
    Microblogging websites, like Twitter and Weibo, are used by billions of people to create and spread information. This activity depends on various factors such as the friendship links between users, their topic interests ...
  • Segmentations with Explanations for Outage Analysis 

    Chen, Liangzhe; Muralidhar, Nikhil; Chinthavali, Supriya; Ramakrishnan, Naren; Prakash, B. Aditya (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-04-09), TR-18-02
    Recent hurricane events have caused unprecedented amounts of damage and severely threatened our public safety and economy. The most observable (and severe) impact of these hurricanes is the loss of electric power in many ...
  • HOMER: An Interactive System for Home Based Stroke Rehabilitation 

    Kelliher, Aisling; Choi, Jinwoo; Huang, Jia-Bin; Rikakis, Thanassis; Kitani, Kris (ACM, 2017)
    Delivering long term, unsupervised stroke rehabilitation in the home is a complex challenge that requires robust, low cost, scalable, and engaging solutions. We present HOMER, an interactive system that uses novel therapy ...
  • Got the Flu (or Mumps)? Check the Eigenvalue! 

    Prakash, B. Aditya; Chakrabarti, Deepayan; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos (Virginia Tech, 2010-03-30)
    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal ...
  • Forecasting the Flu: Designing Social Network Sensors for Epidemics 

    Shao, Huijuan; Hossain, K.S.M. Tozammel; Wu, Hao; Khan, Maleq; Vullikanti, Anil; Prakash, B. Aditya; Marathe, Madhav; Ramakrishnan, Naren (Virginia Tech, 2016-03-08)
    Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to ...
  • Predicting Complications in Critical Care Using Heterogeneous Clinical Data 

    Huddar, Vijay; Desiraju, Bapu Koundinya; Rajan, Vaibhav; Bhattacharya, Sakyajit; Roy, Shourya; Reddy, Chandan K. (IEEE, 2016-10-19)
    Patients in hospitals, particularly in critical care, are susceptible to many complications affecting morbidity and mortality. Digitized clinical data in electronic medical records can be effectively used to develop machine ...
  • A large-scale RNA interference screen identifies genes that regulate autophagy at different stages 

    Guo, Sujuan; Pridham, Kevin J.; Virbasius, Ching-Man; He, Bin; Zhang, Liqing; Varmark, Hanne; Green, Michael R.; Sheng, Zhi (Nature Publishing Group, 2018-02-12)
    Dysregulated autophagy is central to the pathogenesis and therapeutic development of cancer. However, how autophagy is regulated in cancer is not well understood and genes that modulate cancer autophagy are not fully ...
  • GPU Power Prediction via Ensemble Machine Learning for DVFS Space Exploration 

    Dutta, Bishwajit; Adhinarayanan, Vignesh; Feng, Wu-chun (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-02-02), TR-18-01
    A software-based approach to achieve high performance within a power budget often involves dynamic voltage and frequency scaling (DVFS). Consequently, accurately predicting the power consumption of an application at different ...
  • Measuring the Insecurity of Mobile Deep Links of Android 

    Lui, Fang; Wang, Chun; Pico, Andres; Yao, Danfeng; Wang, Gang (USENIX, 2017-08)
    Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
  • CCS 2017- Women in Cyber Security (CyberW) Workshop 

    Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
    The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
  • FastViromeExplorer: a pipeline for virus and phage identification and abundance profiling in metagenomics data 

    Tithi, Saima Sultana; Aylward, Frank O.; Jensen, Roderick V.; Zhang, Liqing (PeerJ, 2018-01-12)
    With the increase in the availability of metagenomic data generated by next generation sequencing, there is an urgent need for fast and accurate tools for identifying viruses in host-associated and environmental samples. ...
  • Herbicide injury induces DNA methylome alterations in Arabidopsis 

    Kim, G; Clarke, CR; Larose, H; Tran, HT; Haak, DC; Zhang, L; Askew, S; Barney, J; Westwood, JH (PEERJ INC, 2017-07-20)
    The emergence of herbicide-resistant weeds is a major threat facing modern agriculture. Over 470 weedy-plant populations have developed resistance to herbicides. Traditional evolutionary mechanisms are not always sufficient ...
  • UPS-indel: a Universal Positioning System for Indels 

    Hasan, Mohammad Shabbir; Wu, Xiaowei; Watson, Layne T.; Li, Zhiyi; Zhang, Liqing (Nature, 2017-10-26)
    Storing biologically equivalent indels as distinct entries in databases causes data redundancy, and misleads downstream analysis. It is thus desirable to have a unified system for identifying and representing equivalent ...
  • Cooperative Object Manipulation in Collaborative Virtual Environments 

    Pinho, Marcio S.; Bowman, Doug A.; Dal Sasso Freitas, Carla M. (Springer Nature, 2008-06-20)
    Cooperative manipulation refers to the simultaneous manipulation of a virtual object by multiple users in an immersive virtual environment (VE). In this work, we present techniques for cooperative manipulation based on ...
  • Enterprise data breach: causes, challenges, prevention, and future directions 

    Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
    A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
  • Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

    Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
    Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
  • Secure Coding Practices in Java: Challenges and Vulnerabilities 

    Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
    Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
  • A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

    O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
    We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
  • Intrusion Detection System for Applications using Linux Containers 

    Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...

View more