The academic degrees and the research findings produced by our Department are worth no more than the integrity of the process by which they are gained. If we do not maintain reliably high standards of ethics and integrity in our work and our relationships, we have nothing of value to offer one another or to offer the larger community outside this Department, whether potential employers or fellow scholars.
For this reason, the principles of academic integrity have priority over every other consideration in every aspect of our departmental life, and we will defend these principles vigorously. It is essential that every student be fully aware of these principles, what the procedures are by which possible violations are investigated and adjudicated, and what the punishments for these violations are. Wherever they are suspected, potential violations will be investigated, and determinations of fact sought. In short, breaches of academic integrity will not be tolerated.
The Department of Computer Science and Engineering endorses and adheres to the University policy on academic integrity. Students should be familiar with that policy, as formulated in:
The following statement further describes the specific application of these general principles to a common context in the CSE Department environment, the production of source code for project and homework assignments. It should be thoroughly understood before undertaking any cooperative activities or using any other sources in such contexts.
All academic work must be your own. Plagiarism, defined as copying or receiving materials from a source or sources and submitting this material as one's own without acknowledging the particular debts to the source (quotations, paraphrases, basic ideas), or otherwise representing the work of another as one's own, is never allowed. Collaboration, usually evidenced by unjustifiable similarity, is never permitted in individual assignments. Any submitted academic work may be subject to screening by software programs designed to detect evidence of plagiarism or collaboration.
It is your responsibility to maintain the security of your computer accounts and your written work. Do not share passwords with anyone, nor write your password down where it may be seen by others. Do not change permissions to allow others to read your course directories and files. Do not walk away from a workstation without logging out. These are your responsibilities. In groups that collaborate inappropriately, it may be impossible to determine who has offered work to others in the group, who has received work, and who may have inadvertently made their work available to the others by failure to maintain adequate personal security. In such cases, all will be held equally liable.
These policies and interpretations may be augmented by individual instructors for their courses. Always check the handouts and web pages of your course and section for additional guidelines.
Any student accused of a violation of academic integrity will be so notified by the course director. An informal review will be conducted, including a meeting between these parties. After this review and upon determination that a violation has occurred, the following sanctions will be imposed. It is the policy of this department that any violation of academic integrity will result in an F for the course, that all departmental financial support including teaching assistanceship, research assistanceship or scholarships be terminated, that notification of this action be placed in the student's confidential departmental record, and that the student be permanently ineligible for future departmental financial support. A second violation of academic integrity will cause the department to seek permanent dismissal from the major and bar from enrollment in any departmental courses. Especially flagrant violations will be considered under formal review proceedings, which may in addition to the above sanctions result in expulsion from the University.
GamePute won first prize in a field of 30 teams at UBHacking 2013. UBHacking organizers Joe Peacock and Nick DiRienzo pose with GamePute team Scott Florentino, Andrew Wantuch, Jen Cordaro, and Andrew Kopanon.
Ankur Upadhyay, Daniel Bellinger, and Sumit Agarwal's work on Laasie won first prize in the 2013 SEAS Graduate Student Poster Competition. They are advised by Luke Ziarek and Oliver Kennedy.
CSE undergrads demonstrate technology from the Center for Socially Relevant Computing (CSRC) to newly-accepted students and their parents at the CSE Open House on Saturday, March 23.
CSE graduate students and their faculty advisors present research posters in the Davis Atrium on March 7, 2013.
CSE and Management students compete in the Northeast Collegiate Cyberdefense Competition (NCCC) on Saturday, January 19. UB advanced to the next round of competition, to be held at the University of Maine in March.
UB's Center of Excellence in Information Systems, Assurance, Research, and Education (CEISARE) received a $1.6 million NSF grant to train students to protect the United States from cyberattacks. »
Geoffrey Challen and Steven Ko are enlisting hundreds of students to build an unprecedented smartphone network to help scientists improve mobile computers and better understand how they're changing the world. »
UB hosted Davis Hall's ribbon-cutting ceremony on May 12, 2012. Pictured (l to r) are: Kamlesh Tripathi, Margaret Jacobs, Jeremy Jacobs, Barbara Davis, Jack Davis, Rajan Batta, George Maziarz, and Harvey Stenger.
Davis Hall, CSE's new $75M headquarters, is designed to meet LEED "Gold" standards. The building is named for Barbara and Jack Davis. Davis is the founder of Akron-based I Squared R Element Co.
Theoretician and International Master chessplayer Kenneth W. Regan devises algorithms to detect chess cheating. The New York Times recently profiled his work .
Nobel Laureate Herbert Hauptman, a CSE affiliated professor, developed an algorithm for determining crystal structure. Computing in Science and Engineering Magazine named it one of the top 10 algorithms of the 20th century.
Pursuing work on document verification and identification, CSE researchers use machine-learning algorithms to study handwriting variability.
CSE professor Russ Miller is one of the authors of a program that can determine the structure of molecules as large as 2,000 atoms from X-ray diffraction patterns.
CSE professor Aidong Zhang is developing intelligent content-analysis programs to automatically analyze images, replacing human coding of semantic content.
This concept scheme shows Davis Hall, CSE's new $75M headquarters, viewed from the northwest. The edge of Ketter Hall is visible on the right, just east of Davis. UB held the ribbon-cutting ceremony on May 12, 2012.
A geometric algorithm developed by CSE professor Jinhui Xu configures a set of radiation beams to destroy brain tumors in a form of computer-aided surgery.
The CSE faculty includes NSF CAREER award holders; ACM, IEEE, and AAAI fellows; and editors of noteworthy journals.
CSE faculty work with researchers in chemistry, the life sciences, the pharmaceutical sciences, media study, geography, and many other disciplines.
This concept scheme shows Davis Hall, CSE's new $75M headquarters, viewed from the northeast. Ketter and Furnas Halls can be seen on the left, just south of the new building. We broke ground in April 2009.
CEDAR, a CSE-affiliated research center, developed the systems that postal agencies around the world use to automatically sort hand-addressed mail.
CSE's MultiStore Research Group is funded by a $1 million NSF grant for the development of high-performance online data-storage systems.
CSE faculty are major participants in the new $200 million Buffalo Center of Excellence in Bioinformatics.
CSE faculty average some $4.5 million annually in research grants. Our research areas range from high-performance computing to data mining.

Click on the calendar image to view the schedule of planned events.
See a list of current and past events.