Skip to main content

2020 Events

Robust and Fast Neuroimaging for Improving Performance of Human-Robot Interaction

Robust and Fast Neuroimaging for Improving Performance of Human-Robot Interaction

Yuchou Chang is an Assistant Professor of Computer Science at University of Houston-Downtown ...
The Role of Smart Wearables in Intervention-Centered Health Technologies

The Role of Smart Wearables in Intervention-Centered Health Technologies

Dr. Kunal Mankodiya, Ph.D. Associate Professor & Director, Wearable Biosensing Lab University of Rhode Island ...
Evolving Cooperation in the Iterated Prisoner’s Dilemma

Evolving Cooperation in the Iterated Prisoner’s Dilemma

Dr. David Mathias - University of Wisconsin ...


2019 Events

An Overview of NSF CISE Research Programs

An Overview of NSF CISE Research Programs

Dr. Deep Medhi - Program Director in the Computer & Network Systems Division at the National Science Foundation ...
Blockchains and Distributed Computing

Blockchains and Distributed Computing

Dr. Maurice Herlihy - Fellow of the National Academy of Inventors, the National Academy of Engineering, and the National Academy of Arts and Sciences ...
Towards Secure Execution of Neural Network Models on Edge Devices

Towards Secure Execution of Neural Network Models on Edge Devices

Dr. Michel A. Kinsy - Assistant Professor in the Department of Electrical and Computer Engineering at Boston University (BU) ...
Human-Centric Privacy-Preserving Controls for Smart Home Devices

Human-Centric Privacy-Preserving Controls for Smart Home Devices

Dr. Vivian Motti - Assistant Professor at George Mason University ...
Feeling Safe and Secure in a Learning-Enabled Cyber-physical World

Feeling Safe and Secure in a Learning-Enabled Cyber-physical World

Dr. Luis Garcia - University of California, Los Angeles (UCLA) ...
Virtual Reality as an Innovation Catalyst for Convergence Research

Virtual Reality as an Innovation Catalyst for Convergence Research

Dr. Carolina Cruz-Neira - University of Arkansas at Little Rock ...
Linked List Data Structure

Linked List Data Structure

Awrad Mohammed Ali - University of Central Florida ...
Industrial Control System Cybersecurity

Industrial Control System Cybersecurity

Dr. Shahram Jahani - University of Central Florida ...
Bridging the Gap between Physical and Virtual Reality

Bridging the Gap between Physical and Virtual Reality

Tomer Weiss - University of California, Los Angeles ...
Human-Centered Computing for Healthcare Applications

Human-Centered Computing for Healthcare Applications

Dr. Cindy L. Bethel - Mississippi State University ...


2018 Events

Analog Bloom Filter (ABF) for Wireless Networks

Analog Bloom Filter (ABF) for Wireless Networks

Dr. Zhenghao Zhang - Florida State University ...
A Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data

A Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data

Dr. Kevin A. Kwiat - Haloed Sun TEK of Sarasota, Florida ...
Uncovering Footprints of Adaption from Ancient and Modern Genomes

Uncovering Footprints of Adaption from Ancient and Modern Genomes

Dr. Michael DeGiorgio - Pennsylvania State University ...
Defeating DDoS Attacks and Adverse Network Conditions

Defeating DDoS Attacks and Adverse Network Conditions

Dr. Max Schuchard - University of Tennessee ...
A Knight’s Welcome to Dr. Katie A. Siek

A Knight’s Welcome to Dr. Katie A. Siek

Dr. Katie A. Siek - Indiana University ...
A Knights’ Welcome To: Dr. Cindy Bethel

A Knights’ Welcome To: Dr. Cindy Bethel

Dr. Cindy L. Bethel - Mississippi State University ...
From Explanatory to Exploratory Data Visualization

From Explanatory to Exploratory Data Visualization

Mr. Chris Bryan - University of California ...
Automating Safe and Secure Software Development

Automating Safe and Secure Software Development

Dr. Paul Gazzillo - Stevens Institute of Technology ...
Building Predictable and Adaptable Mobile Systems

Building Predictable and Adaptable Mobile Systems

Dr. Lukasz Ziarek - State University of New York at Buffalo ...
Building Correct Programs

Building Correct Programs

Dr. William Mansky - Princeton University ...
Making Small Spaces Feel Large: Practical Illusions in Virtual Reality

Making Small Spaces Feel Large: Practical Illusions in Virtual Reality

Dr. Evan Suma Rosenberg - University of Southern California ...
Revisiting the Future Roles of Computer Architecture in Cybersecurity Research

Revisiting the Future Roles of Computer Architecture in Cybersecurity Research

Dr. Yan Solihin - North Carolina State University and an IEEE Fellow ...
An Adaptive Multi-Factor Authentication (A-MFA) Methodology

An Adaptive Multi-Factor Authentication (A-MFA) Methodology

Dr. Dipankar Dasgupta - University of Memphis ...


2017 Events

Formal Verification of Robustness Properties of Hybrid Systems

Formal Verification of Robustness Properties of Hybrid Systems

Dr. Pavithra Prabhakar - Kansas State University ...
Reading Between the Lines of Datacenter Logs

Reading Between the Lines of Datacenter Logs

Dr. Nosayba El-Sayed - Postdoctoral Associate at CSAIL, MIT ...
Deception for Proactive Cyber Defense

Deception for Proactive Cyber Defense

Dr. Cliff Wang - Program Director of the Information Assurance Program at the US Army Research Office ...
Hacking Sensors

Hacking Sensors

Dr. Yongdae Kim - Korea Advanced Institute of Science and Technology ...
Cross-Layer Attacks in Emerging Networks

Cross-Layer Attacks in Emerging Networks

Dr. Guevara Noubir - College of Computer and Information Science at Northeastern University ...
Leveraging Blockchain-based Protocols in IoT Systems

Leveraging Blockchain-based Protocols in IoT Systems

Dr. Angelos Stavrou - George Mason University ...
Intelligent User Interaction Driven by Psychology

Intelligent User Interaction Driven by Psychology

Dr. T. Metin Sezgin - Koc University, Istanbul ...
Computational Informatics for Improving Efficacy of Gene Therapy

Computational Informatics for Improving Efficacy of Gene Therapy

Dr. Hosna Jabbari - Postdoctoral Fellow, University of Alberta, Canada ...
General Geometric Models of Image Formation

General Geometric Models of Image Formation

Dr. Jean Ponce - Ecole Normale Superieure, Paris, France ...
Physical Computing for Everyone

Physical Computing for Everyone

Dr. Thomas Ball - Microsoft Research ...
The Representation of Spatial Data

The Representation of Spatial Data

Dr. Hanan Samet - University of Maryland, College Park ...
Reconstructing HDR Images of Complex Dynamic Scenes

Reconstructing HDR Images of Complex Dynamic Scenes

Dr. Oguz Akyuz - Middle East Technical University ...


2016 Events

Secure and Scalable Attestation: On Building Trust in IoT Systems

Secure and Scalable Attestation: On Building Trust in IoT Systems

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Advances in Smartphone Security: Attacks, Defenses, and Applications

Advances in Smartphone Security: Attacks, Defenses, and Applications

Dr. Alexandra Dmitrienko - Postdoctoral Researcher ...
A Brief Introduction to Succinct Data Structures and Text Indexing

A Brief Introduction to Succinct Data Structures and Text Indexing

Dr. Sharma Thankachan - Georgia Institute of Technology ...
Improved Genetic Operators for Path Planning

Improved Genetic Operators for Path Planning

Dr. David Mathias - Florida Southern College ...
Efficiently Searching Among Sensitive Content

Efficiently Searching Among Sensitive Content

Dr. Douglas W. Oard - University of Maryland ...
Design Engineering to Overcome Unwanted Replacement (DETOUR)

Design Engineering to Overcome Unwanted Replacement (DETOUR)

Dr. Laurent Njilla - U.S. Air Force Research Laboratory ...
Things, Trouble, Trust: On Building Trust in IoT Systems

Things, Trouble, Trust: On Building Trust in IoT Systems

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
User Expectations in Mobile App Security

User Expectations in Mobile App Security

Dr. Tao Xie - University of Illinois at Urbana-Champaign ...
Achieving Photoreal Digital Actors

Achieving Photoreal Digital Actors

Dr. Paul Debevec - University of Southern California ...
Toward Personalized Visualizations

Toward Personalized Visualizations

Alvitta Ottley - Tufts University ...
Approximate Sequence Matching: Algorithms and Applications

Approximate Sequence Matching: Algorithms and Applications

Dr. Sharma V. Thankachan - Georgia Institute of Technology ...
A Layered Solution to Cybersecurity

A Layered Solution to Cybersecurity

Dr. Erfan Ibrahim - National Renewable Energy Lab ...
Everything You Code Can and Will Be Re-Used Against You

Everything You Code Can and Will Be Re-Used Against You

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Big Data Security and Privacy

Big Data Security and Privacy

Dr. Elisa Bertino - Purdue University ...
Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets

Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets

Dr. David M. Nicol - University of Illinois at Urbana-Champaign ...


2015 Events

The Laws Governing Data Breaches

The Laws Governing Data Breaches

Al Saikali, - Shook, Hardy & Bacon ...
Localized Algorithms for Wireless Ad Hoc / Sensor Networks

Localized Algorithms for Wireless Ad Hoc / Sensor Networks

Dr. Nabanita Das - Indian Statistical Institute, Kolkata, Inda ...
Truth and Consequences

Truth and Consequences

Dr. Eugene H. Spafford - Purdue University ...
Social-Media-Based Cyber Security: Cases on U.S. Border Security

Social-Media-Based Cyber Security: Cases on U.S. Border Security

Dr. Wingyan Chung - University of Central Florida ...
From GPS and Google Maps to Spatial Computing 2020

From GPS and Google Maps to Spatial Computing 2020

Dr. Shashi Shekhar - University of Minnesota ...
Design and Development of Wireless Sensor Networks with its Emerging Applications

Design and Development of Wireless Sensor Networks with its Emerging Applications

Dr. Indrajit Banerjee - Indian Institute of Engineering Science and Technology (IIEST), Shibpur ...
Cloud Auto-Provisioning for Parallel Processing

Cloud Auto-Provisioning for Parallel Processing

Dr. Liqiang Wang - University of Wyoming ...
Minding the Gaps in Memory Forensics

Minding the Gaps in Memory Forensics

Dr. Golden G. Richard III - University of New Orleans ...
Attack-Resilient Systems and Networks

Attack-Resilient Systems and Networks

Dr. Aron Laszka - Vanderbilt University ...
Kernel Methods for Unsupervised Visual Domain Adaptations

Kernel Methods for Unsupervised Visual Domain Adaptations

Dr. Boqing Gong - University of Southern California ...
Towards Wearable Interactions that Go Beyond the Touchscreen

Towards Wearable Interactions that Go Beyond the Touchscreen

Dr. Xing-Dong Yang - University of Calgary, Canada ...
Comprehensive Human State Modeling and Its Applications

Comprehensive Human State Modeling and Its Applications

Dr. Ajay Divakaran - SRI International ...
Topological Analysis of Modern Data

Topological Analysis of Modern Data

Dr. Chao Chen - Rutgers University ...
Visual Understanding of Human Actions

Visual Understanding of Human Actions

Dr. Hamed Pirsiavash - Massachusetts Institute of Technology ...
AgriNeTT: Open Data and Mobile apps in Agriculture

AgriNeTT: Open Data and Mobile apps in Agriculture

Dr. Margaret Bernard - The University of the West Indies, St. Augustine, Trinidad and Tobago ...
Using Technology to Connect and Protect

Using Technology to Connect and Protect

Dr. Pamela Wisniewski - The Pennsylvania State University ...
Machine Learning with World Knowledge

Machine Learning with World Knowledge

Dr. Yangqiu Song - University of Illinois at Urbana-Champaign ...
Body-wide Automatic Anatomy Recognition in Medical Imagery

Body-wide Automatic Anatomy Recognition in Medical Imagery

Dr. Jay Udupa - University of Pennsylvania ...
Atlas-based Segmentation of Anatomical Organs in Chest X-Ray

Atlas-based Segmentation of Anatomical Organs in Chest X-Ray

Dr. Sema Candemir - National Institutes of Health ...
Retinal Imaging and Image Analysis

Retinal Imaging and Image Analysis

Dr. Xinjian Chen - Soochow University ...
Interactive Sound Simulation and Rendering

Interactive Sound Simulation and Rendering

Dr. Dinesh Manocha - University of North Carolina ...


2014 Events

Multi-Modal and Data-Based Motion Planners for Humanoid Characters

Multi-Modal and Data-Based Motion Planners for Humanoid Characters

Dr. Marcelo Kallmann - University of California at Merced ...
Localization and Scheduling in Wireless Sensor Network

Localization and Scheduling in Wireless Sensor Network

Dr. Tuhina Samanta - Indian Institute of Engineering Science and Technology, Shibpur ...
Human-Centered Computer Graphics

Human-Centered Computer Graphics

Dr. Eakta Jain - University of Florida ...
Fast and Efficient Fingerprint-based Localization and Tracking

Fast and Efficient Fingerprint-based Localization and Tracking

Dr. Duc A. Tran - University of Massachusetts at Boston ...
Security and Interdependency in a Public Cloud: A Game Theoretic Approach

Security and Interdependency in a Public Cloud: A Game Theoretic Approach

Dr. Charles Kamhoua - Air Force Research Laboratory ...
The Canons of Disease Etiology

The Canons of Disease Etiology

Dr. Bud Mishra - New York University ...
Structured Sparse Models for Object Detection and Classification

Structured Sparse Models for Object Detection and Classification

Dr. Nasser M. Nasrabadi - US Army Research Laboratory ...
Software Testing in the Cloud

Software Testing in the Cloud

Dr. Scott Tilley - Florida Institute of Technology ...
Crowdsourcing Computing Tasks to People: From ESP Game to Social Media

Crowdsourcing Computing Tasks to People: From ESP Game to Social Media

Guo-Jun Qi - University of Illinois at Urbana-Champaign ...
Optimization Techniques in High-Performance Computing Sustainability

Optimization Techniques in High-Performance Computing Sustainability

Dr. Ishfaq Ahmad - University of Texas at Arlington ...
Model-Based Embedded Software Testing and Monitoring

Model-Based Embedded Software Testing and Monitoring

Dr. Ratnesh Kumar - Iowa State University ...
Molecular Computing: Computation by Chemistry and Geometry

Molecular Computing: Computation by Chemistry and Geometry

Dr. David Doty - California Institute of Technology ...
Valuable Verification: Theorems that Pay

Valuable Verification: Theorems that Pay

Dr. Jay McCarthy - Brigham Young University ...
Detecting and Repairing Performance Bugs

Detecting and Repairing Performance Bugs

Adrian Nistor - University of Illinois at Urbana-Champaign ...
Designing with Crowds

Designing with Crowds

Anbang Xu - University of Illinois at Urbana-Champaign ...
Taming Big Data Variety: From Social Networks to Brain Networks

Taming Big Data Variety: From Social Networks to Brain Networks

Xiangnan Kong - University of Illinois at Chicago ...
A New Multiple Protein Sequence Alignment Method

A New Multiple Protein Sequence Alignment Method

Dr. Xin Dang - LexisNexis Healthcare ...
Green Computing

Green Computing

Dr. Sartaj Sahni - University of Florida ...
Efficient Modeling-Based Approaches for Large-Scale Mining and Retrieval

Efficient Modeling-Based Approaches for Large-Scale Mining and Retrieval

Dr. Lidan Wang - University of Illinois at Urbana Champaign ...
My Quest for High-Quality, Interactive Rendering

My Quest for High-Quality, Interactive Rendering

Dr. Dirk Reiners - University of Louisiana at Lafayette ...
The Next Stage for Virtual Reality: an Evolutionary Look

The Next Stage for Virtual Reality: an Evolutionary Look

Dr. Carolina Cruz-Neira - University of Louisiana at Lafayette ...
Large-Scale Quantum Computing Architectures: A Systems Perspective

Large-Scale Quantum Computing Architectures: A Systems Perspective

Dr. Fred Chong - University of California at Santa Barbara ...


2013 Events

User-centric Optimizations for Multimedia Broadcast over Wireless

User-centric Optimizations for Multimedia Broadcast over Wireless

Dr. Swades De - Indian Institute of Technology, Delhi ...
Naming and Address Resolution in Mobile Ad-hoc Networks

Naming and Address Resolution in Mobile Ad-hoc Networks

Sebastian Schellenberg - Ilmenau University of Technology ...
Computations over Geo-Spatial and Temporal Datasets

Computations over Geo-Spatial and Temporal Datasets

Dr. Sushil K. Prasad - Georgia State University ...
Verifying Dynamic Taint Analyzers

Verifying Dynamic Taint Analyzers

Dr. Lok Yan - Air Force Research Lab ...
DataFlow SuperComputing

DataFlow SuperComputing

Dr. Veljko Milutinovic - University of Belgrade, Serbia ...
Complex Event Processing with Reusable Event Detectors and Aspects

Complex Event Processing with Reusable Event Detectors and Aspects

Prof. Shmuel Katz - Israel Institute of Technology ...
I Can Bank Online; Why Can’t I Vote Online?

I Can Bank Online; Why Can’t I Vote Online?

Barbara Simons - An expert on electronic voting ...
Microarchitecture and Compiler Support for Timing Speculation

Microarchitecture and Compiler Support for Timing Speculation

Russ Joseph - Electrical Engineering and Computer Science at Northwestern University ...
Trust Management in a Cloud Distributed Environment

Trust Management in a Cloud Distributed Environment

Prof. Hossam Afifi - Institut Mines Telecom ...
Designing a Multi-tiered Networking Architecture for Smart Building Applications

Designing a Multi-tiered Networking Architecture for Smart Building Applications

Dr. JeongGil Ko - Electronics and Telecommunications Research Institute, Daejeon, Korea ...
Can Mobility Improve WSN Performance?

Can Mobility Improve WSN Performance?

Dr. Stefano Basagni - Department of Electrical and Computer Engineering, Northeastern University ...
Robust-First Computing: Beyond Correctness and Efficiency

Robust-First Computing: Beyond Correctness and Efficiency

Dr. David Ackley - University of New Mexico ...
Topological properties of SINR Diagram with Interference Cancellation

Topological properties of SINR Diagram with Interference Cancellation

Dr. Yoram Haddad - Jerusalem College of Technology, Jerusalem, Israel ...


2012 Events

Salting Public Traces with Attack Traffic to Test Flow Classifiers

Salting Public Traces with Attack Traffic to Test Flow Classifiers

Dr. Geroge Kesidis - The Pennsylvania State University ...
Checking Contracts for AOP using XPIDRs

Checking Contracts for AOP using XPIDRs

Henrique Rebêlo - Federal University of Pernambuco ...
Ear-Phone: A Participatory Sensing System for Noise Monitoring

Ear-Phone: A Participatory Sensing System for Noise Monitoring

Dr. Salil Kanhere - University of New South Wales ...
Vision Research at Disney Research Pittsburgh

Vision Research at Disney Research Pittsburgh

Leonid Sigal and J. Rafael Tena - Disney Research, Puttsburgh ...
Observing People with Multiple Cameras

Observing People with Multiple Cameras

Dr. Andrea Cavallaro - Queen Mary University ...
Location Awareness and its Applications

Location Awareness and its Applications

Dr. Rung-Ching Chen - ChaoYang University of Technology ...
Computational Insight and the Theory of Evolution

Computational Insight and the Theory of Evolution

Dr. Christos H. Papadimitriou - University of California at Berkeley ...
Visual Perception: “Setting” the state of the art with Graphical Models, Linear Programming & Duality

Visual Perception: “Setting” the state of the art with Graphical Models, Linear Programming & Duality

Nikos Paragios - Ecole Centrale de Paris, Ecole des Ponts-ParisTech, INRIA, Saclay, Ile-de-France ...
Towards Gaining Control Over Information Overflow

Towards Gaining Control Over Information Overflow

Dr. Michael Gubanov - Stanford University ...
Human Computer Intelligent Interaction

Human Computer Intelligent Interaction

Dr. Thomas Huang - University of Illinois at Urbana-Champaign ...
Understanding Virus Capsid Assembly Through Stochastic Simulation

Understanding Virus Capsid Assembly Through Stochastic Simulation

Dr. Russell Schwartz - Carnegie Mellon University ...
Mining Hidden Knowledge in Heterogeneous Information Networks

Mining Hidden Knowledge in Heterogeneous Information Networks

Dr. Jiawei Han - University of Illinois at Urbana-Champaign ...
Tunebot and iQ: music software that listens

Tunebot and iQ: music software that listens

Dr. Bryan Pardo - Northwestern University ...