Student Profile

A Professionally Diverse Student Body

There is a great deal of professional diversity among Pace’s DPS students. Entering students’ careers extend from 6 to 33 years, with an average of about 13 years. Professional activities include software development, telecommunications management, data management, and e-commerce, with employers such as:


  • AT&T
  • Avon Products
  • Brookhaven National Labs
  • Computer Associates
  • E*Trade
  • IBM
  • ITT Industries
  • JPMorgan Chase
  • MetLife
  • New York Life
  • Oracle
  • Pfizer
  • Philips Research
  • PricewaterhouseCoopers
  • SIAC
  • Verizon

Many of our DPS students live and work in the greater New York metropolitan area, but others travel from California, Washington, D.C., Philadelphia, and Boston for the on-site sessions that occur monthly, five times a semester, on Friday evening and all day Saturday. In between the on-site sessions, students and faculty interact energetically over the Internet.



The DPS dissertation is an original, rigorous, independent applied research product that may

  • advance knowledge
  • improve professional practice
  • contribute to the understanding of computing
  • be a disciplined and systematic inquiry for the purpose of discovery, establishing or extending the field of study

Research methods used depend upon the nature of the research

  • controlled experiment
  • project development
  • empirical studies
  • theoretical analyses
  • or other methods as appropriate

Examples of dissertation areas:

Data Warehousing, Pattern Languages, Visualization of Data, Genetic Algorithms, Distributed Systems Architecture, Software Component Integration, Web Personalization, Software Testing, Data Security, Information Assurance, Web Content Management, Broadband Wireless Network Access Services, Pervasive Computing, Information Retrieval, Knowledge Management, Software Product Quality and CMMI, Cybercrime, Biometrics, Pattern Recognition, Web services and Service Oriented Architecture, Agile methods in business and other non-software development processes.

List of Dissertations

Carl Abrams, Shape Matching with Ordered Boundary Point Shape Contexts Using a Least Cost Diagonal Method, 2006

Bashir U. Ahmed, Detection of Foreign Words and Names in Written Text, 2005

Maria Azua Himmel, Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks, 2012

Richard Bassett, Computer-based Objective Interactive Numismatic System, 2003

Leslie Beckford, Facilitating the Use of Patterns via a Generic Framework That Supports Semi-Automatic Concept Indexing and In-Depth Searching, 2004

Gulsebnem Bishop, Classification of Greek Pottery Shapes and Schools Using Image Retrieval Techniques, 2006

Lawrence A. Bliss, Selecting Artificial Network Inputs Using Particle Swarm Optimization, 2003

Raymond E. Boehm, An Approach to Early Lifecycle Estimating for Agile Projects, 2011

Andrew W. Boyd, A Longitudinal Study of Social Media Privacy Behavior, 2011

Kenneth Charles Brancik, Insider Computer Fraud Detection in Applications: A Defense in Depth framework involving Software Engineering and Novelty Neural Networks, 2005

Kathleen M. Bravo, A Model for HIPAA Security Compliance, 2005

Carlos Delano Buskey, A Software Metrics Based Approach to Enterprise Software Beta Testing Design, 2005

Mirkeya Capellan, An Agile Course-Delivery Approach, 2009

Hsiauh-Tsyr Clara Chang, Optimized Software Component Allocation on clustered Application Servers, 2004

Borming Chiang, A Feasibility Study: Secure Public Key Infrastructure with Quantum Key Distributions in Grid Computing, 2006

Seung-Seok Choi, Correlation Analysis of Binary Similarity / Dissimilarity Measures, 2008

Donna J. Clapsaddle, Measuring Usability: Categorically Modeling Successful Websites Using Established Metrics, 2004

Eric Cole, Stego-Marking Packets to Control Information Leakage on TCP/IP Based Networks, 2004

Mary Curtin, Long-Text Keystroke Biometric Applications Over the Internet, 2006

Eddie A. Davis, The effects of Technological and Organizational Innovations on Business Value in the context of a New Product or Service Deployment, 2010

Joseph DeCicco, Sensitivity Analysis of Certain Time Dependent Matroid Base Models Solved by Genetic Algorithms, 2002

Rigoberto Diaz, Solving a Class of Time-Dependent Combinatorial Optimization Problems with Abstraction, Transformation and Simulated Annealing, 2004

Fred Dreyfus, A Study of Access Control in Wireless Communications Utilizing Game Theory, 2009

Barbara Edington, A Model of Internal Contextual Factor Relationships Affecting Technology Implementations, 2005

Romerl Elizes, Investigating the Value of Using Sequences of Natural Computing Heuristics to Address Traveling Salesman Problem, 2008

Joe Feliciano, The Success Criteria for Implementing Knowledge Management Systems in an Organization, 2006

Ronald I. Frank, Regular Array Expansions in Null Arrays, with Applications: Zero is Not Nothing, 2002

Matthew Robert Ganis, A study of the agile whole team and its effectiveness in the software development process, 2009

Anthony Gottlieb, Efficient Static Analysis of Java Source Code for Security, 2006

Kevin Gravesande, Using Geographic Information Systems (GIS) to Improve Patient-Clinician Encounters and Patient Care, 2010

Abraham Guerra, A Framework for Building Intelligent Software Assistants for Virtual Worlds, 2010

Darren Hayes, The Efficacy of Project Retrospectives on Organizational Process Improvement Initiatives in Software Development, 2008

Karina J. Hernandez, Reasoning and Learning under Uncertainty Using Dynamic Probabilistic Models For Real Time Problem Determination, 2004

Jonathan Hill, Apply Abstraction to Master Complexity: The Comparison of Abstraction Ability in Computer Science Majors with Students in Other Disciplines, 2007

Jingkun Hu, Visual Modeling of XML Constraints Based on A New Extensible Constraint, 2003

Rita Hubert, Usability Field Study of Older Adults Using Multi-modal Home Health Monitoring Devices, 2006

Christopher W. Iervolino, Using Data Envelopment Analysis To Measure Web Site Efficiency, 2002

Hevel Jean-Baptiste, A Distributed Architecture for U-Messaging Systems (DAUMS), 2002

Melanie Johnson, Multi-Project Staffing: An Agile based Framework, 2006

Satty Joshua, A Three-Prong Network Solution Approach - A Sustainable Business Case Centered approach in Networking Convergence, 2006

Bintou Kane Aidara, XML Update Transaction Execution Based on Incremental Constraint Checks, 2011

Suman K. Kalia, A Study of the Pervasive Computing Solution to Asset, Problem and Knowledge Management, 2002

Maheswara Prasad Kasinadhuni, Solving Optimization Problems Using Genetic Algorithms with Multiple Genome Coding, 2004

James Kile, An Investigation into the Effectiveness of Agile Software Development with a Highly Distributed Workforce, 2007

Todd W. Kolb, Efficient Solutions to a class of Generalized Time-Dependent Combinatorial Optimization Problems, 2005

Stella Kontantinou, A Web Service Framework for Automating Constituent Product Costing Operations of Business Producing , 2004

Adam Kuta, Enterprise Interceptor: A Framework for Applications Interchangeability, 2006

Thanh Van Lam, Run-Time Interface Mapping For On-The-Fly Software Component Integration, 2002

Patricia H. Lapczynski, An Integrated Model of Technology Acceptance for Mobile Computing, 2004

Jonathan K. Law, An Efficient First Pass of a Two-Stage Approach for Automatic Language Indentification of Telephone Speech, 2002

James P. Lawler, A Study of Customer Loyalty and Privacy on the Web, 2002

Kwang W. Lee, An efficient Procedure to Select a Near-Optimal Subset of Pattern Classification Features, 2002

Donald Little, Optimizing Effective Data Rates Among Contending Wireless Devices on a Shared Channel, 2007

Thomas Edward Lombardi, The Classification of Style in Fine-Art Painting, 2005

Mary L. Manfredi, Copybook Style Determination of Pseudo-Online Handwriting Data, 2005

Anne Mannette-Wright, A Feasibility Study of Ontology-Based Automatic Document Transformation, 2009

Theodore J. Markowitz, An Empirical Evaluation of Active Learning and Selective Sampling Variations Supporting Large Corpus Labeling, 2011

Marilyn Mead, Practitioner's Guide to Software Testing, 2002

Peter J. Morales, A computational econometric modeling technique for the parametric simulation of effort and duration estimation as applied to the development of software systems, 2011

Pauline H. Mosley, The Cognitive Complexities Confronting Developers Using Object Technology, 2002

Yonesy F. Nunez, Maximizing an Organization’s Information Security Posture by Using a Distributed Patch Management Security System, 2011

Christopher Nwosisi, Developing a Genetic Algorithm to Construct Efficient Binary Decision Trees, 2010

Jill O’Sullivan, Validating Academic Training versus Organizational Training: An Analysis in the Enterprise Resource Planning (ERP) Field, 2011

Josua Purba, Dynamic Sub-Channel Allocation in OFDMA Systems, 2011

Visveshwar Reddy, Estimating Intrinsic Engineering Value of Emerging Software Innovations, 2010

Mark Ritzmann, Strategies for Managing Missing and Incomplete Information with Applications to Keystroke Biometric Data and a Business Analytical Application, 2009

Hany Saleeb, Information Retrieval: A Framework for Recommending Text-based Classification Algorithms, 2002

Carolyn J. Sher DeCusatis, The Effects of Cloud Computing on Vendor’s Data Center Network Component Design, 2011

Renel Smith, Gameplay to Introduce and Reinforce Requirements Engineering Good Practices, 2009

Carlos A. Thomas, Assessing the Factors that Determine Compliance with the Federal Information Security Management Act (FISMA), 2011

Frances Trees, A Meta-Analysis of Pedagogical Tools used in Introductory Programming Courses, 2010

Alexander Tsekhansky, Byzantine-Reliable Domain Name Service protocol in networks with limited Public Key Infrastructure, 2010

David B. Ulmer, Architectural Solutions to Agent-Enabling, 2004

Gokbora Uran, A Hybrid Heuristic Model for Classification Rule Discovery, 2005

Mary Villani, Keystroke Biometric Identification Studies on Long-Text Input, 2006

Daniel Scott Weaver, Prospective Students' Reactions to the Presentation of the Computer Science Major, 2010

Roli Garg Wendorf, Channel-Change Games in Spectrum-Agile Wireless Networks, 2005

Sandra Westcott, Effectiveness of Using Digital Game Playing in a First-Level Programming Course, 2008

Aurelia Williams, Pair Formation in CS1: Self-Selection vs Random Pairing, 2006

Patrick Wong, Effects of 802.11 Protocols in Broadband wireless communication, 2002

Robert Zack, An Improved k-NN Classification Method with Application to Keystroke Biometric Authentication, 2010

Robert Zandoli, An Agile Framework for an Information Technology Outsourcing Decision process (ITODP), 2006