Skip to main content

2019 Events

Blockchains and Distributed Computing

Blockchains and Distributed Computing

Dr. Maurice Herlihy - Fellow of the National Academy of Inventors, the National Academy of Engineering, and the National Academy of Arts and Sciences ...

Read More
Towards Secure Execution of Neural Network Models on Edge Devices

Towards Secure Execution of Neural Network Models on Edge Devices

Dr. Michel A. Kinsy - Assistant Professor in the Department of Electrical and Computer Engineering at Boston University (BU) ...

Read More
Human-Centric Privacy-Preserving Controls for Smart Home Devices

Human-Centric Privacy-Preserving Controls for Smart Home Devices

Dr. Vivian Motti - Assistant Professor at George Mason University ...

Read More
Feeling Safe and Secure in a Learning-Enabled Cyber-physical World

Feeling Safe and Secure in a Learning-Enabled Cyber-physical World

Dr. Luis Garcia - University of California, Los Angeles (UCLA) ...

Read More
Virtual Reality as an Innovation Catalyst for Convergence Research

Virtual Reality as an Innovation Catalyst for Convergence Research

Dr. Carolina Cruz-Neira - University of Arkansas at Little Rock ...

Read More
Linked List Data Structure

Linked List Data Structure

Awrad Mohammed Ali - University of Central Florida ...

Read More
Industrial Control System Cybersecurity

Industrial Control System Cybersecurity

Dr. Shahram Jahani - University of Central Florida ...

Read More
Bridging the Gap between Physical and Virtual Reality

Bridging the Gap between Physical and Virtual Reality

Tomer Weiss - University of California, Los Angeles ...

Read More
Human-Centered Computing for Healthcare Applications

Human-Centered Computing for Healthcare Applications

Dr. Cindy L. Bethel - Mississippi State University ...

Read More


2018 Events

Analog Bloom Filter (ABF) for Wireless Networks

Analog Bloom Filter (ABF) for Wireless Networks

Dr. Zhenghao Zhang - Florida State University ...

Read More
A Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data

A Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data

Dr. Kevin A. Kwiat - Haloed Sun TEK of Sarasota, Florida ...

Read More
Uncovering Footprints of Adaption from Ancient and Modern Genomes

Uncovering Footprints of Adaption from Ancient and Modern Genomes

Dr. Michael DeGiorgio - Pennsylvania State University ...

Read More
Defeating DDoS Attacks and Adverse Network Conditions

Defeating DDoS Attacks and Adverse Network Conditions

Dr. Max Schuchard - University of Tennessee ...

Read More
A Knight’s Welcome to Dr. Katie A. Siek

A Knight’s Welcome to Dr. Katie A. Siek

Dr. Katie A. Siek - Indiana University ...

Read More
A Knights’ Welcome To: Dr. Cindy Bethel

A Knights’ Welcome To: Dr. Cindy Bethel

Dr. Cindy L. Bethel - Mississippi State University ...

Read More
From Explanatory to Exploratory Data Visualization

From Explanatory to Exploratory Data Visualization

Mr. Chris Bryan - University of California ...

Read More
Automating Safe and Secure Software Development

Automating Safe and Secure Software Development

Dr. Paul Gazzillo - Stevens Institute of Technology ...

Read More
Building Predictable and Adaptable Mobile Systems

Building Predictable and Adaptable Mobile Systems

Dr. Lukasz Ziarek - State University of New York at Buffalo ...

Read More
Building Correct Programs

Building Correct Programs

Dr. William Mansky - Princeton University ...

Read More
Making Small Spaces Feel Large: Practical Illusions in Virtual Reality

Making Small Spaces Feel Large: Practical Illusions in Virtual Reality

Dr. Evan Suma Rosenberg - University of Southern California ...

Read More
Revisiting the Future Roles of Computer Architecture in Cybersecurity Research

Revisiting the Future Roles of Computer Architecture in Cybersecurity Research

Dr. Yan Solihin - North Carolina State University and an IEEE Fellow ...

Read More
An Adaptive Multi-Factor Authentication (A-MFA) Methodology

An Adaptive Multi-Factor Authentication (A-MFA) Methodology

Dr. Dipankar Dasgupta - University of Memphis ...

Read More


2017 Events

Formal Verification of Robustness Properties of Hybrid Systems

Formal Verification of Robustness Properties of Hybrid Systems

Dr. Pavithra Prabhakar - Kansas State University ...

Read More
Reading Between the Lines of Datacenter Logs

Reading Between the Lines of Datacenter Logs

Dr. Nosayba El-Sayed - Postdoctoral Associate at CSAIL, MIT ...

Read More
Deception for Proactive Cyber Defense

Deception for Proactive Cyber Defense

Dr. Cliff Wang - Program Director of the Information Assurance Program at the US Army Research Office ...

Read More
Hacking Sensors

Hacking Sensors

Dr. Yongdae Kim - Korea Advanced Institute of Science and Technology ...

Read More
Cross-Layer Attacks in Emerging Networks

Cross-Layer Attacks in Emerging Networks

Dr. Guevara Noubir - College of Computer and Information Science at Northeastern University ...

Read More
Leveraging Blockchain-based Protocols in IoT Systems

Leveraging Blockchain-based Protocols in IoT Systems

Dr. Angelos Stavrou - George Mason University ...

Read More
Intelligent User Interaction Driven by Psychology

Intelligent User Interaction Driven by Psychology

Dr. T. Metin Sezgin - Koc University, Istanbul ...

Read More
Computational Informatics for Improving Efficacy of Gene Therapy

Computational Informatics for Improving Efficacy of Gene Therapy

Dr. Hosna Jabbari - Postdoctoral Fellow, University of Alberta, Canada ...

Read More
General Geometric Models of Image Formation

General Geometric Models of Image Formation

Dr. Jean Ponce - Ecole Normale Superieure, Paris, France ...

Read More
Physical Computing for Everyone

Physical Computing for Everyone

Dr. Thomas Ball - Microsoft Research ...

Read More
The Representation of Spatial Data

The Representation of Spatial Data

Dr. Hanan Samet - University of Maryland, College Park ...

Read More
Reconstructing HDR Images of Complex Dynamic Scenes

Reconstructing HDR Images of Complex Dynamic Scenes

Dr. Oguz Akyuz - Middle East Technical University ...

Read More


2016 Events

Secure and Scalable Attestation: On Building Trust in IoT Systems

Secure and Scalable Attestation: On Building Trust in IoT Systems

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...

Read More
Advances in Smartphone Security: Attacks, Defenses, and Applications

Advances in Smartphone Security: Attacks, Defenses, and Applications

Dr. Alexandra Dmitrienko - Postdoctoral Researcher ...

Read More
A Brief Introduction to Succinct Data Structures and Text Indexing

A Brief Introduction to Succinct Data Structures and Text Indexing

Dr. Sharma Thankachan - Georgia Institute of Technology ...

Read More
Improved Genetic Operators for Path Planning

Improved Genetic Operators for Path Planning

Dr. David Mathias - Florida Southern College ...

Read More
Efficiently Searching Among Sensitive Content

Efficiently Searching Among Sensitive Content

Dr. Douglas W. Oard - University of Maryland ...

Read More
Design Engineering to Overcome Unwanted Replacement (DETOUR)

Design Engineering to Overcome Unwanted Replacement (DETOUR)

Dr. Laurent Njilla - U.S. Air Force Research Laboratory ...

Read More
Things, Trouble, Trust: On Building Trust in IoT Systems

Things, Trouble, Trust: On Building Trust in IoT Systems

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...

Read More
User Expectations in Mobile App Security

User Expectations in Mobile App Security

Dr. Tao Xie - University of Illinois at Urbana-Champaign ...

Read More
Achieving Photoreal Digital Actors

Achieving Photoreal Digital Actors

Dr. Paul Debevec - University of Southern California ...

Read More
Toward Personalized Visualizations

Toward Personalized Visualizations

Alvitta Ottley - Tufts University ...

Read More
Approximate Sequence Matching: Algorithms and Applications

Approximate Sequence Matching: Algorithms and Applications

Dr. Sharma V. Thankachan - Georgia Institute of Technology ...

Read More
A Layered Solution to Cybersecurity

A Layered Solution to Cybersecurity

Dr. Erfan Ibrahim - National Renewable Energy Lab ...

Read More
Everything You Code Can and Will Be Re-Used Against You

Everything You Code Can and Will Be Re-Used Against You

Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...

Read More
Big Data Security and Privacy

Big Data Security and Privacy

Dr. Elisa Bertino - Purdue University ...

Read More
Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets

Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets

Dr. David M. Nicol - University of Illinois at Urbana-Champaign ...

Read More


2015 Events

The Laws Governing Data Breaches

The Laws Governing Data Breaches

Al Saikali, - Shook, Hardy & Bacon ...

Read More
Localized Algorithms for Wireless Ad Hoc / Sensor Networks

Localized Algorithms for Wireless Ad Hoc / Sensor Networks

Dr. Nabanita Das - Indian Statistical Institute, Kolkata, Inda ...

Read More
Truth and Consequences

Truth and Consequences

Dr. Eugene H. Spafford - Purdue University ...

Read More
Social-Media-Based Cyber Security: Cases on U.S. Border Security

Social-Media-Based Cyber Security: Cases on U.S. Border Security

Dr. Wingyan Chung - University of Central Florida ...

Read More
From GPS and Google Maps to Spatial Computing 2020

From GPS and Google Maps to Spatial Computing 2020

Dr. Shashi Shekhar - University of Minnesota ...

Read More
Design and Development of Wireless Sensor Networks with its Emerging Applications

Design and Development of Wireless Sensor Networks with its Emerging Applications

Dr. Indrajit Banerjee - Indian Institute of Engineering Science and Technology (IIEST), Shibpur ...

Read More
Cloud Auto-Provisioning for Parallel Processing

Cloud Auto-Provisioning for Parallel Processing

Dr. Liqiang Wang - University of Wyoming ...

Read More
Minding the Gaps in Memory Forensics

Minding the Gaps in Memory Forensics

Dr. Golden G. Richard III - University of New Orleans ...

Read More
Attack-Resilient Systems and Networks

Attack-Resilient Systems and Networks

Dr. Aron Laszka - Vanderbilt University ...

Read More
Kernel Methods for Unsupervised Visual Domain Adaptations

Kernel Methods for Unsupervised Visual Domain Adaptations

Dr. Boqing Gong - University of Southern California ...

Read More
Towards Wearable Interactions that Go Beyond the Touchscreen

Towards Wearable Interactions that Go Beyond the Touchscreen

Dr. Xing-Dong Yang - University of Calgary, Canada ...

Read More
Comprehensive Human State Modeling and Its Applications

Comprehensive Human State Modeling and Its Applications

Dr. Ajay Divakaran - SRI International ...

Read More
Topological Analysis of Modern Data

Topological Analysis of Modern Data

Dr. Chao Chen - Rutgers University ...

Read More
Visual Understanding of Human Actions

Visual Understanding of Human Actions

Dr. Hamed Pirsiavash - Massachusetts Institute of Technology ...

Read More
AgriNeTT: Open Data and Mobile apps in Agriculture

AgriNeTT: Open Data and Mobile apps in Agriculture

Dr. Margaret Bernard - The University of the West Indies, St. Augustine, Trinidad and Tobago ...

Read More
Using Technology to Connect and Protect

Using Technology to Connect and Protect

Dr. Pamela Wisniewski - The Pennsylvania State University ...

Read More
Machine Learning with World Knowledge

Machine Learning with World Knowledge

Dr. Yangqiu Song - University of Illinois at Urbana-Champaign ...

Read More
Body-wide Automatic Anatomy Recognition in Medical Imagery

Body-wide Automatic Anatomy Recognition in Medical Imagery

Dr. Jay Udupa - University of Pennsylvania ...

Read More
Atlas-based Segmentation of Anatomical Organs in Chest X-Ray

Atlas-based Segmentation of Anatomical Organs in Chest X-Ray

Dr. Sema Candemir - National Institutes of Health ...

Read More
Retinal Imaging and Image Analysis

Retinal Imaging and Image Analysis

Dr. Xinjian Chen - Soochow University ...

Read More
Interactive Sound Simulation and Rendering

Interactive Sound Simulation and Rendering

Dr. Dinesh Manocha - University of North Carolina ...

Read More


2014 Events

Multi-Modal and Data-Based Motion Planners for Humanoid Characters

Multi-Modal and Data-Based Motion Planners for Humanoid Characters

Dr. Marcelo Kallmann - University of California at Merced ...

Read More
Localization and Scheduling in Wireless Sensor Network

Localization and Scheduling in Wireless Sensor Network

Dr. Tuhina Samanta - Indian Institute of Engineering Science and Technology, Shibpur ...

Read More
Human-Centered Computer Graphics

Human-Centered Computer Graphics

Dr. Eakta Jain - University of Florida ...

Read More
Fast and Efficient Fingerprint-based Localization and Tracking

Fast and Efficient Fingerprint-based Localization and Tracking

Dr. Duc A. Tran - University of Massachusetts at Boston ...

Read More
Security and Interdependency in a Public Cloud: A Game Theoretic Approach

Security and Interdependency in a Public Cloud: A Game Theoretic Approach

Dr. Charles Kamhoua - Air Force Research Laboratory ...

Read More
The Canons of Disease Etiology

The Canons of Disease Etiology

Dr. Bud Mishra - New York University ...

Read More
Structured Sparse Models for Object Detection and Classification

Structured Sparse Models for Object Detection and Classification

Dr. Nasser M. Nasrabadi - US Army Research Laboratory ...

Read More
Software Testing in the Cloud

Software Testing in the Cloud

Dr. Scott Tilley - Florida Institute of Technology ...

Read More
Crowdsourcing Computing Tasks to People: From ESP Game to Social Media

Crowdsourcing Computing Tasks to People: From ESP Game to Social Media

Guo-Jun Qi - University of Illinois at Urbana-Champaign ...

Read More
Optimization Techniques in High-Performance Computing Sustainability

Optimization Techniques in High-Performance Computing Sustainability

Dr. Ishfaq Ahmad - University of Texas at Arlington ...

Read More
Model-Based Embedded Software Testing and Monitoring

Model-Based Embedded Software Testing and Monitoring

Dr. Ratnesh Kumar - Iowa State University ...

Read More
Molecular Computing: Computation by Chemistry and Geometry

Molecular Computing: Computation by Chemistry and Geometry

Dr. David Doty - California Institute of Technology ...

Read More
Valuable Verification: Theorems that Pay

Valuable Verification: Theorems that Pay

Dr. Jay McCarthy - Brigham Young University ...

Read More
Detecting and Repairing Performance Bugs

Detecting and Repairing Performance Bugs

Adrian Nistor - University of Illinois at Urbana-Champaign ...

Read More
Designing with Crowds

Designing with Crowds

Anbang Xu - University of Illinois at Urbana-Champaign ...

Read More
Taming Big Data Variety: From Social Networks to Brain Networks

Taming Big Data Variety: From Social Networks to Brain Networks

Xiangnan Kong - University of Illinois at Chicago ...

Read More
A New Multiple Protein Sequence Alignment Method

A New Multiple Protein Sequence Alignment Method

Dr. Xin Dang - LexisNexis Healthcare ...

Read More
Green Computing

Green Computing

Dr. Sartaj Sahni - University of Florida ...

Read More
Efficient Modeling-Based Approaches for Large-Scale Mining and Retrieval

Efficient Modeling-Based Approaches for Large-Scale Mining and Retrieval

Dr. Lidan Wang - University of Illinois at Urbana Champaign ...

Read More
My Quest for High-Quality, Interactive Rendering

My Quest for High-Quality, Interactive Rendering

Dr. Dirk Reiners - University of Louisiana at Lafayette ...

Read More
The Next Stage for Virtual Reality: an Evolutionary Look

The Next Stage for Virtual Reality: an Evolutionary Look

Dr. Carolina Cruz-Neira - University of Louisiana at Lafayette ...

Read More
Large-Scale Quantum Computing Architectures: A Systems Perspective

Large-Scale Quantum Computing Architectures: A Systems Perspective

Dr. Fred Chong - University of California at Santa Barbara ...

Read More


2013 Events

User-centric Optimizations for Multimedia Broadcast over Wireless

User-centric Optimizations for Multimedia Broadcast over Wireless

Dr. Swades De - Indian Institute of Technology, Delhi ...

Read More
Naming and Address Resolution in Mobile Ad-hoc Networks

Naming and Address Resolution in Mobile Ad-hoc Networks

Sebastian Schellenberg - Ilmenau University of Technology ...

Read More
Computations over Geo-Spatial and Temporal Datasets

Computations over Geo-Spatial and Temporal Datasets

Dr. Sushil K. Prasad - Georgia State University ...

Read More
Verifying Dynamic Taint Analyzers

Verifying Dynamic Taint Analyzers

Dr. Lok Yan - Air Force Research Lab ...

Read More
DataFlow SuperComputing

DataFlow SuperComputing

Dr. Veljko Milutinovic - University of Belgrade, Serbia ...

Read More
Complex Event Processing with Reusable Event Detectors and Aspects

Complex Event Processing with Reusable Event Detectors and Aspects

Prof. Shmuel Katz - Israel Institute of Technology ...

Read More
I Can Bank Online; Why Can’t I Vote Online?

I Can Bank Online; Why Can’t I Vote Online?

Barbara Simons - An expert on electronic voting ...

Read More
Microarchitecture and Compiler Support for Timing Speculation

Microarchitecture and Compiler Support for Timing Speculation

Russ Joseph - Electrical Engineering and Computer Science at Northwestern University ...

Read More
Trust Management in a Cloud Distributed Environment

Trust Management in a Cloud Distributed Environment

Prof. Hossam Afifi - Institut Mines Telecom ...

Read More
Designing a Multi-tiered Networking Architecture for Smart Building Applications

Designing a Multi-tiered Networking Architecture for Smart Building Applications

Dr. JeongGil Ko - Electronics and Telecommunications Research Institute, Daejeon, Korea ...

Read More
Can Mobility Improve WSN Performance?

Can Mobility Improve WSN Performance?

Dr. Stefano Basagni - Department of Electrical and Computer Engineering, Northeastern University ...

Read More
Robust-First Computing: Beyond Correctness and Efficiency

Robust-First Computing: Beyond Correctness and Efficiency

Dr. David Ackley - University of New Mexico ...

Read More
Topological properties of SINR Diagram with Interference Cancellation

Topological properties of SINR Diagram with Interference Cancellation

Dr. Yoram Haddad - Jerusalem College of Technology, Jerusalem, Israel ...

Read More


2012 Events

Salting Public Traces with Attack Traffic to Test Flow Classifiers

Salting Public Traces with Attack Traffic to Test Flow Classifiers

Dr. Geroge Kesidis - The Pennsylvania State University ...

Read More
Checking Contracts for AOP using XPIDRs

Checking Contracts for AOP using XPIDRs

Henrique RebĂȘlo - Federal University of Pernambuco ...

Read More
Ear-Phone: A Participatory Sensing System for Noise Monitoring

Ear-Phone: A Participatory Sensing System for Noise Monitoring

Dr. Salil Kanhere - University of New South Wales ...

Read More
Vision Research at Disney Research Pittsburgh

Vision Research at Disney Research Pittsburgh

Leonid Sigal and J. Rafael Tena - Disney Research, Puttsburgh ...

Read More
Observing People with Multiple Cameras

Observing People with Multiple Cameras

Dr. Andrea Cavallaro - Queen Mary University ...

Read More
Location Awareness and its Applications

Location Awareness and its Applications

Dr. Rung-Ching Chen - ChaoYang University of Technology ...

Read More
Computational Insight and the Theory of Evolution

Computational Insight and the Theory of Evolution

Dr. Christos H. Papadimitriou - University of California at Berkeley ...

Read More
Visual Perception: “Setting” the state of the art with Graphical Models, Linear Programming & Duality

Visual Perception: “Setting” the state of the art with Graphical Models, Linear Programming & Duality

Nikos Paragios - Ecole Centrale de Paris, Ecole des Ponts-ParisTech, INRIA, Saclay, Ile-de-France ...

Read More
Towards Gaining Control Over Information Overflow

Towards Gaining Control Over Information Overflow

Dr. Michael Gubanov - Stanford University ...

Read More
Human Computer Intelligent Interaction

Human Computer Intelligent Interaction

Dr. Thomas Huang - University of Illinois at Urbana-Champaign ...

Read More
Understanding Virus Capsid Assembly Through Stochastic Simulation

Understanding Virus Capsid Assembly Through Stochastic Simulation

Dr. Russell Schwartz - Carnegie Mellon University ...

Read More
Mining Hidden Knowledge in Heterogeneous Information Networks

Mining Hidden Knowledge in Heterogeneous Information Networks

Dr. Jiawei Han - University of Illinois at Urbana-Champaign ...

Read More
Tunebot and iQ: music software that listens

Tunebot and iQ: music software that listens

Dr. Bryan Pardo - Northwestern University ...

Read More