The Department of Computer Science has an accredited undergraduate program that offers specialized ‘tracks’ of study in key areas. Undergraduates are prepared by graduation for pursuing a computing career or for graduate study. Our active corporate partners program offers internships and permanent employment to our students. Students are encouraged to participate in research experiences during their studies. Capstone courses provide significant team project experiences. The graduate program offers M.S. and Ph.D. degrees, emphasizing thesis work both at the main campus in Blacksburg and at the Northern Virginia Center. About two-thirds of the graduate students are pursuing the Ph.D. degree. The faculty, among whom there are 12 NSF or DOE CAREER Award winners, are active researchers who are visible contributors to the profession and have achieved significant honors.

Sub-communities within this community

Collections in this community

Recent Submissions

  • Herbicide injury induces DNA methylome alterations in Arabidopsis 

    Kim, G; Clarke, CR; Larose, H; Tran, HT; Haak, DC; Zhang, L; Askew, S; Barney, J; Westwood, JH (PEERJ INC, 2017-07-20)
    The emergence of herbicide-resistant weeds is a major threat facing modern agriculture. Over 470 weedy-plant populations have developed resistance to herbicides. Traditional evolutionary mechanisms are not always sufficient ...
  • UPS-indel: a Universal Positioning System for Indels 

    Hasan, Mohammad Shabbir; Wu, Xiaowei; Watson, Layne T.; Li, Zhiyi; Zhang, Liqing (Nature, 2017-10-26)
    Storing biologically equivalent indels as distinct entries in databases causes data redundancy, and misleads downstream analysis. It is thus desirable to have a unified system for identifying and representing equivalent ...
  • Cooperative Object Manipulation in Collaborative Virtual Environments 

    Pinho, Marcio S.; Bowman, Doug A.; Dal Sasso Freitas, Carla M. (Springer Nature, 2008-06-20)
    Cooperative manipulation refers to the simultaneous manipulation of a virtual object by multiple users in an immersive virtual environment (VE). In this work, we present techniques for cooperative manipulation based on ...
  • Secure Coding Practices in Java: Challenges and Vulnerabilities 

    Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
    Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
  • Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

    Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
    Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
  • Enterprise data breach: causes, challenges, prevention, and future directions 

    Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
    A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
  • Towards Optimal Secure Distributed Storage Systems with Exact Repair 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
  • Intrusion Detection System for Applications using Linux Containers 

    Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
  • A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

    O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
    We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
  • Opinion: Mathematical models: A key tool for outbreak response 

    Lofgren, Eric T.; Halloran, M. Elizabeth; Rivers, Caitlin M.; Drake, John M.; Porco, Travis C.; Lewis, Bryan; Yang, Wan; Vespignani, Alessandro; Shaman, Jeffrey; Eisenberg, Joseph N.S.; Eisenberg, Marisa C.; Marathe, Madhav; Scarpino, Samuel V.; Alexander, Kathleen A.; Meza, Rafael; Ferrari, Matthew J.; Hyman, James M.; Meyers, Lauren A.; Eubank, Stephen (NAS, 2015-01-13)
    The 2014 outbreak of Ebola in West Africa is unprecedented in its size and geographic range, and demands swift, effective action from the international community. Understanding the dynamics and spread of Ebola is critical ...
  • Improving somatic variant identification through integration of genome and exome data 

    Vijayan, Vinaya; Yiu, Siu-Ming; Zhang, Liqing (2017-10-16)
  • Describing the Relationship between Cat Bites and Human Depression Using Data from an Electronic Health Record 

    Hanauer, David A.; Ramakrishnan, Naren; Seyfried, Lisa S. (PLOS, 2013-08-01)
    Data mining approaches have been increasingly applied to the electronic health record and have led to the discovery of numerous clinical associations. Recent data mining studies have suggested a potential association between ...
  • Temporal Topic Modeling to Assess Associations between News Trends and Infectious Disease Outbreaks 

    Ghosh, Saurav; Chakraborty, Prithwish; Nsoesie, Elaine O.; Cohn, Emily; Mekaru, Sumiko R.; Brownstein, John S.; Ramakrishnan, Naren (Nature, 2017-01-19)
    In retrospective assessments, internet news reports have been shown to capture early reports of unknown infectious disease transmission prior to official laboratory confirmation. In general, media interest and reporting ...
  • Monitoring Disease Trends using Hospital Traffic Data from High Resolution Satellite Imagery: A Feasibility Study 

    Nsoesie, Elaine O.; Butler, Patrick; Ramakrishnan, Naren; Mekaru, Sumiko R.; Brownstein, John S. (Nature, 2015-03-13)
    Challenges with alternative data sources for disease surveillance include differentiating the signal from the noise, and obtaining information from data constrained settings. For the latter, events such as increases in ...
  • Determining Relative Airport Threats from News and Social Media 

    Khandpur, Rupinder P.; Ji, Taoran; Ning, Yue; Zhao, Liang; Lu, Chang-Tien; Smith, Erik R.; Adams, Christopher; Ramakrishnan, Naren (AAAI, 2017)
    Airports are a prime target for terrorist organizations, drug traffickers, smugglers, and other nefarious groups. Traditional forms of security assessment are not real-time and often do not exist for each airport and port ...
  • A systematic review of studies on forecasting the dynamics of influenza outbreaks 

    Nsoesie, Elaine O.; Brownstein, John S.; Ramakrishnan, Naren; Marathe, Madhav V. (Wiley, 2013-12-23)
    Forecasting the dynamics of influenza outbreaks could be useful for decision-making regarding the allocation of public health resources. Reliable forecasts could also aid in the selection and implementation of interventions ...
  • ETH: A Framework for the Design-Space Exploration of Extreme-Scale Visualization 

    Abrams, Gregory; Adhinarayanan, Vignesh; Feng, Wu-chun; Rogers, David; Ahrens, Jams; Wilson, Luke (Department of Computer Science, Virginia Polytechnic Institute & State University, 2017-09-29), TR-17-05
    As high-performance computing (HPC) moves towards the exascale era, large-scale scientific simulations are generating enormous datasets. A variety of techniques (e.g., in-situ methods, data sampling, and compression) have ...
  • Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities 

    Basam, Dileep; Ransbottom, J. Scot; Marchany, Randy; Tront, Joseph G. (2016-04-20)
    Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts ...
  • SOLR supported search on an OpenStack metadata service 

    Komawar, Nikhil (Virginia Tech, 2017-08-26)
    In cloud computing, the use of databases, particularly the MySQL database system, is a common practice. While the MySQL database system has advantages such as consistency and transaction support, some software architects ...
  • CommAnalyzer: Automated Estimation of Communication Cost on HPC Clusters Using Sequential Code 

    Helal, Ahmed E.; Jung, Changhee; Feng, Wu-chun; Hanafy, Yasser Y. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2017-08-14), TR-17-04
    MPI+X is the de facto standard for programming applications on HPC clusters. The performance and scalability on such systems is limited by the communication cost on different number of processes and compute nodes. Therefore, ...

View more