Computer Science
Independent Study
Senior I.S.
To meet the graduation requirements of The College of Wooster, the major in Computer Science requires a two-course Independent Study Project, which culminates in an Independent Study Thesis along with an oral presentation describing the Thesis.
Independent Study is the student's opportunity to do a significant piece of work in an area of personal interest and to expand his or her understanding of computer science. Although the faculty advisor must approve all topics, the student is free to pursue virtually any area of computer science that is of interest. The topic should be challenging, but manageable with the resources and time available. A typical I.S. involves a theoretical investigation of a topic in Computer Science accompanied by a software implementation that illustrates concepts developed in the theoretical investigation.
- Micah Caunter
Procedurally generating everything
- Trisha Fultz
Exploring opinion dynamics from a computational science perspective (CS and Math)
- Yanlong Hu
Data Mining and its Applications (CS and Math)
- Atticus Jack
Mining the Linux source code, an examination of data mining
- Jason Palevsky
Computer generated architecture through nature: using swarm intelligence and evolutionary computing to generate 3D models
- Evan Radkoff
Topical Web Crawlers (CS and Math)
- Tristan Vroljik
Computational profiling and identification of the 3’ untranslated region within Paramecium tetraurela (CS and BCMB)
- Itai Njanji
Exploring the Branch-and-Cut Algorithm (CS and Math)
- Robert Taylor
Selection Pressure on a Selfish Herd: Evolution of Ecological Relationships in an Agent-based Model (CS and Math)
- Joshua Thomas
Go with the Lava Flow (CS and Math)
- Elena Fiocca
Music Genre Recognition: Developing a Tool to Identify Genre Specific Characteristics of a Musical Piece
- David Mar
Exploring the Capabilities of the Scribbler Robot as a Teaching Tool for Introductory CS Classes
- Daniel Norris
We Didn’t Start the Fire! Applying Swarm Intelligence to Unmanned Aerial Vehicles for Forest Fire Suppression
- Max Rafferty
BitTorrent-Enhanced Distributed Internet Caching: Applying Peer-to-Peer Protocols to Enhance Performance and Scalability of Browser-Accessible Internet Resources
- Andrew Courtney
Attacking Wireless Network Security
- Joseph Henrich
GraffiWii The Wiimote as a Text Entry Device
- Michael Liberatore
Real-time Simulation of Deformable Objects: Improving and Extending the Mass-Spring Particle Structure for Modeling the Draping Behavior of Cloth
- Ellen Wagner
Secret, Secrets Are So Fun, If They're Not For Everyone (CS and Math)
- Matthew Dominski
Population Based Incremental Schema Learning
- Richard Lawrence
Mobile Robotics: The Study of the Mindstorms Lego NXT Robotics Kit and its Applications in Autonomous Robotics
- Zachary Patterson
Improving The Artificial Intelligence Component Of Warcraft II With Genetic Algorithms And Dynamic Scripting With Conditional Weights
- Joseph Pletcher
Donald Davidson and Natural Language Processing (CS and Philosophy)
- Matthew Snively
Leading the Virtual Orchestra
- Benjamin Strecker
Making Monads: Binding to a Specific Type of Computation with a Return to Familiar Themes (CS and Math)
- David Sullivan
Implementing Optimizations in the Joeq Virtual Machine
- Mark Wellons
Simulating a Charged Spherical Pendulum in Time-Varying Electric and Magnetic Fields (CS and Physics)