Waikato University crest

Department of
Computer Science
Tari Rorohiko

Computing and Mathematical Sciences

Research Students

PhD | MCGD | MCS | MSc | MSc(Research) | Postgraduate Diploma | BCGD Honours | BCMS Honours | BE Honours | BSc Honours | Student Archive

PhD Students

StudentResearch Topic
Bahiss, KhadijaSerious game to provide social skills training for people with Asperger Syndrome/High-functioning Autism
Bravo Marquez, FelipeAdaptive domain-focused sentiment analysis for social media streams
Chang, Su-PingAugmented memory system on mobile devices fir brain injury
Eichler, StephenImplementing Internet black hole and topology analysis with large numbers of vantage points
Grout, CameronDesktop environments in virtual reality and the usability impacts of an adjusting workspace paradigm
Hunkin, PaulDistributed operating systems for wireless sensor networks
Laing, SimonImage selection on a design context: the development of a system for image retrieval in support of graphic design
Li, MiParallel stream data mining with Graphics Processing Unit (GPU)
Ma, BoUser centric data provenance
Mato, PaoraWhat is the role of computer technology within a Māori language regeneration strategy
Monigatti, PaulLarge-scale mico-management of domestic electricity consumption
Nemhauser, BryceSpatial hypermedia as a programming environment
Ozoh, PatrickThe impact on the electricity network of residential demand-side management and control
Pilbrow, ColinVisualisation of specification models
Puurula, AnttiDocument enrichment of Wikipedia articles through machine learning
Rinck, MichaelConnecting information: detecting and tracing object evolution
Shiblaq, FouadLocalisation provision: Arabic speakers' preference on para-lingual website-layout
Suppers, JorisSmart grids, the internet of energy, and energy use efficiency
Tan, Alan Yu ShyangContext-based generation of provenance data
Thompson, JohnArchitectures for the parallel processing of very large scale digital libraries
Timpany, ClaireHow the typographic relationships between access structure features (headings) improve within-document search and retrieval tasks in non-fiction texts
Turner, EmmanuelAdaptive user interfaces for the semantic web
Vanderschantz, NicImproving children's learning with ebooks and digital libraries
Walmsley, MichaelAutomatic creation of dynamic second language reading texts
Weng, Min-Hsien (Sam)Efficient OpenCL implementation for computational Whiley programs
Will, MarkReducing latency in data transfers

Master of Computer Graphic Design Students

Castle, SeanBiometric data visalisation

Master of Cyber Security Students

Garae, JefferyUser-centric visualisation of data provenance

Master of Science Students

de Lange, AndrewPower grid simulation
Fowlie, MichaelEvolutionary computation on a cluster
Griffiths, ChrisWeb based simulation of medical devices for training and testing purposes
Li, WanboTask visualization
Lundon, MichaelData stream classification
Markose, MiltonMonitoring and reducing cloud computing vulnerabilities, outgages, and failures
Neelakanta Sharma, KarthikDatabase-backed redundant Open Flow controllers
Neil, BradleyA modern branch analysis
Tootell, ZaneInforming users about data leakages in the Cloud

Master of Science (Research) Students

Delamore, BadenWeb vulnerability analysis with risk realization
Dusterwald, SebastianProcedural generation of voxel-based castles
Liu, LiangLGP with Experience
Petko, VladimirGPU computing for data stream mining
Ren, XinningInterface for semantic search
Si, BoXNA development on the Raspberry Pi
Yang, Wanying (Cassie)Poject together with GNS, mobile storytelling and hot spring

Postgraduate Diploma Dissertation Students

Hardyment, BrianO-Glycosylation site prediction
Khong, EmilyDigitally prototyping a controller for multiple medical infusions pumps
Te Momo, HamioraA mobile app to support TISI sufferers in Maori counties

BCGD Honours Students

Kitson, ShawneeTo be advised
Liu, Lucy DanyangIs non-textual narrative illustration an effective way for communication?

BCMS Honours Students

Brown, CameronProvenance visualisation in WebGL
Bryers, DylanClassification modeller
Chapman, RexHuman interaction through electronic surrogates
Christensen, Bradley802.15.4 wireless security in an Internet of Things
de Feijter, SjoerdSimulation of replay attack on contactless smart cards
Donnelly, CalebVirtual electric vehicle
Gilbert, LeahSame support for memory rehabilitation
Gouk, HenryFeature learning with Convolutional Neural Networks
Hiatt, JasonPlaying in the street
Hollinshead, JoshAndroid security and the privacy of your data
Hu, YichenDiscovering disjointness for ontology
Jameson, CaineCloud security for personal data
Jenkins, GeorgeFine-tuning alerting systems filter
Johnson, ZacharyTime series representation
Lammers, RosjierTraining cyber security concepts with Project RifleRange (Part 2)
Law, MickeyImproving security of Facebook sharing
Leathart, TimAccelerating regular expressions on many core systems
Littlewood, HaleySynthetic singing
Mackintosh, AndrewDisaster resilient, privacy preserving and mobile network
Manning, DanielTraining cyber security concepts with Project RifleRange (Part 1)
Meier, GregDifferential evolution on the Cloud
Nicholson, BrandonMobile Voting (M-Voting) for democracies of the future
Osborne, CraigBuilding an OpenFlow-enabled BRAS/BNG
Sanger, RichardParallelising Libtrace
Smith, ReneeWater particle simulation
Stricot-Tarboton, ShaunEffective task management systems
Turner, JessicaCombined testing strategies for interactive systems
Wallace, ThomasSurveying the realities of data security and privacy perceptions
Watson, JesseVisual based gaming AI
Willcock, DuncanGenetic algorithm assisted decision trees

BE Honours Students

Andela, MathewConsumer-centric secure SMS service
Burke, RobertInteractive visualisations for resource allocation
Chaudhry, JawwadTo be advised
Crake, StephenGaze tracking for mobile devices
Mason, StevenVirtual electric vehicle
Payne, LesleyUsing gaming algorithms to minimise Junit test suites
Shuker, RafaelCloud provenance datasets for security research and benchmarking
Shute, SamMobile handset based EFTPOS
Thomas, NigelDetection and recognition of traffic signs on mobile devices

BSc Honours Students

Hannam, JonathanOne class classification for data streams
Melchert, JulianSecurity and privacy for VoIP communication

See also:


Last updated September 2014