Student Publications and Theses
Computer science students are involved in active research, both through senior thesis and through other undergraduate research opportunities. In both cases students often publish this work in prestigious academic venues. Below is a list of recent thesis and published work.
Past theses are available in the Reed library stacks, and some are available online. Seniors: visit the Resources page for typesetting help, including the thesis template.
Recent Student Publications
Bolded authors are Reed students.
Differentially Private Nonparametric Hypothesis Testing, Simon Couch, Zeki Kazan, Kaiyan Shi, and Andrew Bray, and Adam Groce. Conference on Computer and Communications Security (CCS) 2019.

Oracle Separations Between Quantum and ZeroKnowledge Classes, Benjamin Morrison and Adam Groce. Information Processing Letters 2019.

Improved Differentially Private Analysis of Variance, Marika Swanberg, Ira GlobusHarris, Iris Griffith, Anna Ritz, Adam Groce and Andrew Bray. Privacy Enhancing Technologies Symposium (PETS) 2019.

Connectivity Measures for Signaling Pathway Topologies Nicholas Franzese, Adam Groce, T. M. Murali, and Anna Ritz. Great Lakes Bioinformatics Conference (GLBIO) 2019.

Differentially Private ANOVA Testing, Zachary Campbell, Andrew Bray, Anna Ritz, and Adam Groce. International Conference on Data Intelligence and Security (ICDIS) 2018.

Poster: CancerLinker: Integrating Gene Expression For Pathway Analysis, Sol TaylorBrill, Kathy Thompson, and Anna Ritz. Murdock College Science Research Conference 2018

Poster: Controllability of Functional Classes in the Genetic Regulatory Network of E. Coli, Ananthan Nambiar. SIAM Annual Meeting 2018.

Externally Verifiable Oblivious RAM, Joshua Gancher, Adam Groce, and Alex Ledger. Privacy Enhancing Technologies Symposium (PETS) 2017.

Poster: Modeling Cell Signaling Networks with PrizeCollecting Subhypernetworks, Barney Potter, Jim Fix, and Anna Ritz. ACM Bioinformatics, Computational Biology, and Health Informatics (ACMBCB) 2016.

CompGC: Efficient Offline/Online Semihonest Twoparty Computation, Adam Groce, Alex Ledger, Alex J. Malozemoff and Arkady Yerukhimovich. Preprint 2016.
Recent Theses
This list includes math majors advised by computer science professors, especially in years when the computer science major did not yet exist.
2022
Emmanuel Arthur (Computer ScienceMathematics)
The stable roommates problem with globallyranked pairs
Cruz Barnum (Computer ScienceMathematics)
Indistinguishability obfuscation from the ground up
Maxx Curtis (Computer Science)
Simulating the GranularityChange Caching Problem
Caroline Fanelli (Computer ScienceArt)
Ago : empathy, simulation and princesses
Rylie Foster (Computer ScienceMathematics)
An introduction to datadriven modal analysis
Prasun Ghosh (Computer Science)
Investigating Writeback Aware Landlord
Benjamin Hunter (Computer Science)
Parallel Delaunay triangulations under the divideandconquer model
Safiyy Kanjiyani (Computer Science)
Recognition and Translation of Timbre in Monophonic Audio
Josh Klein Valente (Computer ScienceMathematics)
An Introduction to Elliptic Curves and Applications in Cryptography
Tunç Başar Köse (Computer ScienceMathematics)
Approximate Message Passing for Principal Component Analysis : Theory and Practice
Arthur Lawson (Computer Science)
Ain't Nothin But a Gtrie
Henry Lindeman (Computer ScienceMathematics)
Normal Attention: A Novel SelfAttention Linearization Strategy For Abstractive Summarization of Long Documents
Luka Morgan (Computer Science)
Tetris x Scrabble : Combining Two Classic Games and Getting a Computer To Play It
Alex Richter (Computer Science)
Instacloak : A Friendly Guide About Adding Noise to Preserve Some Anonymity Online
Daksh Shami (Computer ScienceMathematics)
Exploration of the Hidden Subgroup Problem
Stella Trout (Computer Science)
A Guessing Game: Text Compression With Natural Language Models
Charlotte WalkerKahn (Computer Science)
Investigating Fairness Definitions For Risk Classification Algorithms
2021
Reilly Cannon (Computer ScienceMathematics)
Differential Privacy: the Gap Statistic and the Mapper Algorithm
Zhengyao Gu (Computer ScienceMathematics)
Selective Prediction: Training and Evaluation Methods
Casey Harris (Computer Science)
Don’t Look Down: Interpreting Visual Information Using Celeste
Hannah Hellerstein (Computer Science)
Where’s My Proton Pack?: Defending Against Spectre Variant 1
David Herrero Quevedo (Computer Science)
Implementation of Local Differentially Private Protocols for Linear Queries
Albert Ji (Computer ScienceMathematics)
Universal Approximation and Interpolation in Neural Networks
Jonah Kohn (Computer ScienceNeuroscience)
The Recursive Application of Biological and Artificial Neural Networks: Towards an Understanding of Both
Jiarong Li (Computer ScienceMathematics)
Complex Network Comparison using Graphlets
Yilin Li (Computer ScienceMathematics)
What If English Had No Spaces? Investigating the Challenges of NLP for CharacterBased Languages
Robert McCaull (Computer Science)
Session Types for a Concurrent Language sNow
Kai Pinckard (Computer Science)
Causal Relation Extraction: a Three Step Process
Eli Poppele (Computer Science)
Do Algorithms Dream in Electric Sleep? Using Genetic Algorithms to Train Neural Networks to Play Atari Video Games on RAMBased Input
Weihang Qin (Computer ScienceMathematics)
Raymarching Hyperbolic Geometry
Danny Riso (Computer Science)
Building a Taxonomy from the Wikipedia Category Graph
Hrishee Shastri (Computer ScienceMathematics)
Cutting the Chord: Interleaved and Demand Aware Skip Graphs
Jakob Shimer (Computer ScienceMathematics)
CNF reduction in Bayesian network inference by weighted model counting
Aryeh Stahl (Computer ScienceMathematics)
A Generalized Approach to Graph Deanonymization
Jon Takagi (Computer Science)
Evaluating Multiparty Computation Techniques for Fuzzy Matching of Voter Registration Records
Ian Wahbe (Computer ScienceMathematics)
Improvements to the Heuristic Rural Postman Problem
Lucas Yong (Computer ScienceMathematics)
An Exploration of Topological Quantum Computation
Laura Yoshida (Computer Science)
Insights from Applying Readability Formulas to Computer Systems Papers
2020
Mercy Bhakta (Computer Science)
Colors in flux :rendering iridescence arising from singlelayer thin films
Henry Blanchette (Computer Science)
Purity and effect
Eric Boettner (Computer Science)
Keystroke encryption over USB HID pathways
Vinay Gopalan (Computer Science)
Sentiment analysis on codemixed tweets
Ian Jackson (Computer SciencePsychology)
A Novel BCI System for 3D Shape Imagery Classification
Jillian James (Computer Science)
Lengthy language generation :using neural networks to write a Reed thesis
Mason Koch (Computer ScienceMathematics)
Reinforcement learning for Pokemon AI
Noah Koster (Computer ScienceMathematics)
Neuronal Dynamics of the Action Potential: Spiking Behavior in the FitzHughNagumo Model and others
Alice McKean (Computer Science)
A replication of the AKS primality decision algorithm
Monica Moniot (Computer Science)
Differentially private bootstrap
Ryan Neumann (Computer Science)
An exploration of reinforcement learning through video games
Hien Nguyen (Computer Science)
Investigating the effectiveness of byte pair encoding for lowresource machine translation
Lilian Qi (Computer Science)
On Generating Stylized Line Drawerings from Polygonal Models
Josh Reiss (Computer Science)
Procedural terrain generation for virtual reality environments
Maxwell Rosenberg (Computer Science)
Odd One Out: Learning Taxonomic Embeddings from WordNet
Sierra Schlott (Computer Science)
Increasing mySQL throughput via smartNIC offloading
Kaiyan Shi (Computer ScienceMathematics)
Investigation on 1D area law and XXZ model
Sarah Strand (Computer Science)
SimuLating leaderfree byzantine faulttolerant consensus protocols in a partially synchronous distributed system
David TamasParris (Computer ScienceMathematics)
Elliptic Curves Aren't Secure? SIKE!
Sam Zofkie (Computer Science)
Parallel collaborative filtering for gray sheep
2019
Matthew Atteberry (Computer Science)
Reinforcement Learning: An Overview
Miles Baker (Computer Science)
Don't Point Yourself Into a Corner: Using Static Analysis to Prevent Memory Leaks in C
Tanmay Dubey (Computer ScienceMathematics)
Latent Dirichlet Allocation: an Application to Computer Systems Conference Papers
Ira GlobusHarris (Computer ScienceMathematics)
Differentially Private OneWay Analysis of Variance
Dylan Huff (Computer Science)
PowerPoint Natively on the Web, a Java PPTX Extension
Emmett Kahn (Computer Science)
DNA Compression Using Machine Learning
Michael Kalange (Computer ScienceMathematics)
Embed With the Entropy: Applying Word2Vec to Lossless Text Compression
Rhody Kaner (Computer Science)
Gender Representation in Computer Science
Abenezer Mamo (Computer Science)
Scalable learning for the oddmanout task with applications to word vector induction
Hannah Mead (Computer Science)
Untangling tech and timbre :assumptions make algorithms
Ananthan Nambiar (Computer Science)
Computing the Language of Life
Richard Pham (Computer ScienceMathematics)
Graph reconfiguration in the context of permutation routing
Angelica Richardson (Computer ScienceMathematics)
Composing Cellular Automata for Modeling nComponent Reaction Diffusion Systems
Veronica Richardson (Computer Science)
Dynamic emergence and evolution in a distributed behavioral flocking model
Marika Swanberg (Computer ScienceMathematics)
Noisy Quantum Oracles: A Study of Algorithmic Robustness
Ziyuan Zhong (Mathematics with a concentration in Computer Science)
Combined Program, Columbia University
Jalan Ziyad (Computer SciencePhysics)
Quantum Search in the Face of Decoherence: Insights From Histories Approach
2018
2017
2016
Nathan Duncan (Mathematics)
Heart of ZeroKnowledge
Joshua Gancher (Mathematics)
Fully Homomorphic Encryption
Gregory Alex Ledger (Mathematics with a concentration in Computer Science)
Implementing ComponentBased Garbled Circuits
Emma Miller (Mathematics)
A Quantum Walk on the Heisenberg Group
Alexandra Salem (Mathematics)
Explanation and Simulation of the HHL Algorithm
Barney Potter (MathematicsBiology)
Modeling Cell Signaling Networks with PrizeCollecting Subhypernetworks
Jeremy Cosel (Mathematics with a concentration in Computer Science)
Clean Up After Yourself: Implementing Garbage Collection
Joshua Hepworth (Mathematics with a concentration in Computer Science)
The States of Splendor: Searching Game Trees with Partial Information
Isabella Jorissen (Mathematics with a concentration in Computer Science)
Tiling the Heavens In special cases where 'the Heavens' is ℝ^{2}