2023 Events
Software Engineering – Better, Sooner, Cheaper
Software Engineering – Better, Sooner, Cheaper January 24, 2023 Location: HEC-356 at 2pm. Abstract: I ...
2022 Events
Leveraging Edge Computing for Traffic Congestion Detection in a Connected and Autonomous Vehicles Environment
Maycon Peixoto is an associate professor at the Department of Computer Science of the Federal ...
2020 Events
Combining IoT and ML for Situation Classification
Dr. Gürkan Solmaz, NEC Laboratories Europe in Heidelberg, Germany ...
Read MoreBrain-Inspired Architecture for Efficient Learning and Robust Computing
Mr. Mohsen Imani - Ph.D. Candidate--University of California, San Diego ...
Read MoreDesigning Secure Multicore Systems from Untrusted Components
Michel A. Kinsy, Ph.D. - Assistant Professor, Boston University Adaptive and Secure Computing Systems (ASCS) Laboratory ...
Read MorePhysics Guided Machine Learning: A New Paradigm for Scientific Knowledge Discovery
Mr. Xiaowei Jia, University of Minnesota ...
Read MoreSocially-Aware Negotiating Agents
Mr. Johnathan Mell, University of Southern California, Institute for Creative Technologies ...
Read MoreHeterogeneous Systems in the Era of Exascale and Beyond
Jagadish Kotra, Ph.D. - AMD Research ...
Read MoreSide-Channel Attacks and Defenses for Intel SGX
Guoxing Chen, Ph.D.Research Scientist--Facebook, Inc. ...
Read MoreFrom Theory to Practice: Deployment-grade Tools and Methodologies for Software Security
Sazzadur Rahaman, Ph.D. Candidate, Virginia Tech ...
Read MoreRobust and Fast Neuroimaging for Improving Performance of Human-Robot Interaction
Yuchou Chang is an Assistant Professor of Computer Science at University of Houston-Downtown ...
Read MoreThe Role of Smart Wearables in Intervention-Centered Health Technologies
Dr. Kunal Mankodiya, Ph.D. Associate Professor & Director, Wearable Biosensing Lab University of Rhode Island ...
Read MoreEvolving Cooperation in the Iterated Prisoner’s Dilemma
Dr. David Mathias - University of Wisconsin ...
Read More2019 Events
An Overview of NSF CISE Research Programs
Dr. Deep Medhi - Program Director in the Computer & Network Systems Division at the National Science Foundation ...
Read MoreBlockchains and Distributed Computing
Dr. Maurice Herlihy - Fellow of the National Academy of Inventors, the National Academy of Engineering, and the National Academy of Arts and Sciences ...
Read MoreTowards Secure Execution of Neural Network Models on Edge Devices
Dr. Michel A. Kinsy - Assistant Professor in the Department of Electrical and Computer Engineering at Boston University (BU) ...
Read MoreHuman-Centric Privacy-Preserving Controls for Smart Home Devices
Dr. Vivian Motti - Assistant Professor at George Mason University ...
Read MoreFeeling Safe and Secure in a Learning-Enabled Cyber-physical World
Dr. Luis Garcia - University of California, Los Angeles (UCLA) ...
Read MoreStaying on Top of The Data Revolution: Taming Data Through Interactive and Immersive Visualization
Dr. Dirk Reiners - University of Arkansas at Little Rock ...
Read MoreVirtual Reality as an Innovation Catalyst for Convergence Research
Dr. Carolina Cruz-Neira - University of Arkansas at Little Rock ...
Read MoreBlack Boxes, Stories and Outcomes: Engaging Information Technology Students in Large Lecture Classes
Dr. Matthew B. Gerber - University of Central Florida ...
Read MoreTowards Virtual Reality Training Solutions for Robotic Operating Room Teams
Dr. Ryan P. McMahan - University of Texas ...
Read MoreIndustrial Control System Cybersecurity
Dr. Shahram Jahani - University of Central Florida ...
Read MoreBridging the Gap between Physical and Virtual Reality
Tomer Weiss - University of California, Los Angeles ...
Read MoreLearning from Spatial-Temporal-Networked Data: Dynamics Modeling, Representation Learning, and Applications
Dr. Yanjie Fu - University of Missouri-Rolla ...
Read MoreHuman-Centered Computing for Healthcare Applications
Dr. Cindy L. Bethel - Mississippi State University ...
Read More2018 Events
Challenges in DDoS Defense and a New Approach with Trusted Hardware
Dr. Min Suk Kang - University of Singapore ...
Read MoreMollusks, Microgravity and More: understanding the impact of the space environment on host-microbe interactions
Dr. Jamie Foster - University of Florida ...
Read MoreAnalog Bloom Filter (ABF) for Wireless Networks
Dr. Zhenghao Zhang - Florida State University ...
Read MoreA Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data
Dr. Kevin A. Kwiat - Haloed Sun TEK of Sarasota, Florida ...
Read MoreMagnetoreceptionin Animals: Molecular Mechanisms and Biogeographical Consequences
Dr. Robert Fitak - Duke University ...
Read MoreMulti-omic analysis of adaptation in experimental Escherichia coli populations
Dr. Megan Behringer - Indiana University ...
Read MoreUncovering Footprints of Adaption from Ancient and Modern Genomes
Dr. Michael DeGiorgio - Pennsylvania State University ...
Read MoreDefeating DDoS Attacks and Adverse Network Conditions
Dr. Max Schuchard - University of Tennessee ...
Read MoreA Knights’ Welcome To: Dr. Cindy Bethel
Dr. Cindy L. Bethel - Mississippi State University ...
Read MoreFrom Explanatory to Exploratory Data Visualization
Mr. Chris Bryan - University of California ...
Read MoreFrom Online Romance to Collective Innovation: How Interactive Technologies Shape Interpersonal Relationships and Group Behaviors
Dr. Guo Freeman - University of Cincinnati ...
Read MoreAutomating Safe and Secure Software Development
Dr. Paul Gazzillo - Stevens Institute of Technology ...
Read MoreBuilding Predictable and Adaptable Mobile Systems
Dr. Lukasz Ziarek - State University of New York at Buffalo ...
Read MoreFinding a needle in a (meta)genomic haystack: single-nucleotide resolution via efficient multiple sequence alignment
Dr. Todd Treangen - University of Maryland College Park ...
Read MoreAI For Societally Relevant Problems: Influence Maximization in an Uncertain World
Mr. Amulya Yadav - USC Viterbi School of Engineering ...
Read MoreMaking Small Spaces Feel Large: Practical Illusions in Virtual Reality
Dr. Evan Suma Rosenberg - University of Southern California ...
Read MoreRevisiting the Future Roles of Computer Architecture in Cybersecurity Research
Dr. Yan Solihin - North Carolina State University and an IEEE Fellow ...
Read MoreAn Adaptive Multi-Factor Authentication (A-MFA) Methodology
Dr. Dipankar Dasgupta - University of Memphis ...
Read More2017 Events
I Know Where You’re Hiding! (Experience Doing Software Fault Prediction in an Industrial Environment)
Dr. Elaine Weyuker - University of Central Florida ...
Read MoreFormal Verification of Robustness Properties of Hybrid Systems
Dr. Pavithra Prabhakar - Kansas State University ...
Read MoreReading Between the Lines of Datacenter Logs
Dr. Nosayba El-Sayed - Postdoctoral Associate at CSAIL, MIT ...
Read MoreDeception for Proactive Cyber Defense
Dr. Cliff Wang - Program Director of the Information Assurance Program at the US Army Research Office ...
Read MoreCross-Layer Attacks in Emerging Networks
Dr. Guevara Noubir - College of Computer and Information Science at Northeastern University ...
Read MoreLeveraging Blockchain-based Protocols in IoT Systems
Dr. Angelos Stavrou - George Mason University ...
Read MoreReflections on Applying Mathematics to Solve Hard Software Problems
Dr. Suresh C. Kothari - Iowa State University ...
Read MoreFunctional Reactive Programming for Real-Time and Cyber-Physical Systems: Response Time Analysis, Scheduling and Verification
Dr. Albert M.K. Cheng - University of Houston ...
Read MoreIntelligent User Interaction Driven by Psychology
Dr. T. Metin Sezgin - Koc University, Istanbul ...
Read MoreLife in High-Dimensional Space: Modeling Sequential Changes in Gene Expression
Dr. Joshua Welch - University of North Carolina at Chapel Hill ...
Read MoreFixing the Phone: Designing Strong Authentication for Telephony
Mr. Brad Reaves - University of Florida ...
Read MoreMy Smartphone Knows What You Print: Exploring Smartphone-Based Side-Channel Attacks Against 3D Printers
Dr. Kui Ren - State University of New York at Buffalo ...
Read MoreComputational Analysis of Transcript Interactions and Variants in Cancer
Dr. Wei Zhang - University of Minnesota Twin Cities ...
Read MoreSecurity Analytics for Defeating Automated Internet-Scale Threats
Dr. Aziz Mohaisen - University of Buffalo ...
Read MoreComputational Informatics for Improving Efficacy of Gene Therapy
Dr. Hosna Jabbari - Postdoctoral Fellow, University of Alberta, Canada ...
Read MoreGeneral Geometric Models of Image Formation
Dr. Jean Ponce - Ecole Normale Superieure, Paris, France ...
Read MoreThe Representation of Spatial Data
Dr. Hanan Samet - University of Maryland, College Park ...
Read MoreReconstructing HDR Images of Complex Dynamic Scenes
Dr. Oguz Akyuz - Middle East Technical University ...
Read MorePushing Community: From Community Network to Innovation Infrastructure
Dr. John M. Carroll - Pennsylvania State University ...
Read MoreRecord: Temporarily Randomized Encoding of Combinational Logic for Resistance to Data Leakage from Hardware Trojans
Dr. Kevin A. Kwiat - U.S. Air Force Research Laboratory (AFRL) ...
Read More2016 Events
The Ins and Outs of Preposition Semantics: Challenges of Coverage and Cross-linguistic Adequacy
Dr. Nathan Schneider - Georgetown University ...
Read MoreSecure and Scalable Attestation: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Read MoreAdvances in Smartphone Security: Attacks, Defenses, and Applications
Dr. Alexandra Dmitrienko - Postdoctoral Researcher ...
Read MoreA Brief Introduction to Succinct Data Structures and Text Indexing
Dr. Sharma Thankachan - Georgia Institute of Technology ...
Read MoreImproved Genetic Operators for Path Planning
Dr. David Mathias - Florida Southern College ...
Read MoreEfficiently Searching Among Sensitive Content
Dr. Douglas W. Oard - University of Maryland ...
Read MoreDesign Engineering to Overcome Unwanted Replacement (DETOUR)
Dr. Laurent Njilla - U.S. Air Force Research Laboratory ...
Read MoreThings, Trouble, Trust: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Read MoreAnalyzing and Modeling Multi-Level Dynamics of Multimodal Behavior in Affective Human Interactions
Zhaojun Yang - University of Southern California ...
Read MoreSecuring Emerging Short Range Wireless Communications
Dr. Kui Ren - University at Buffalo ...
Read MoreUser Expectations in Mobile App Security
Dr. Tao Xie - University of Illinois at Urbana-Champaign ...
Read MoreAlgorithms for Characterizing Intra-Tumor Heterogeneity in Cancer Genomes
Dr. Iman Hajirasouliha - Stanford University ...
Read MoreDo shallow kernel methods match deep neural networks — and if not, what can the shallow ones learn from the deep ones?
Dr. Fei Sha - University of California, Los Angeles ...
Read MoreSpectral Algorithms for Large Graphs: Where Theory and Practice Meet
Dr. Ioannis Koutis - University of Puerto Rico ...
Read MoreComputational Methods for Characterizing Large-Scale Human Genome Variations with Applications to Cancer
Dr. Iman Hajirasouliha - Stanford University ...
Read MoreWhy are Pens so Terrible? Deconstructing and Understanding the Stylus Ecosystem and User Experience Today
Dr. Michelle Annett - University of Toronto ...
Read MoreApproximate Sequence Matching: Algorithms and Applications
Dr. Sharma V. Thankachan - Georgia Institute of Technology ...
Read MoreEverything You Code Can and Will Be Re-Used Against You
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Read MoreBreaking Mobile Social Networks for Automated User Location Tracking
Dr. Kui Ren - University at Buffalo ...
Read MoreQuantitative Analysis of Stepping Stone Access to Cyber-Physical Assets
Dr. David M. Nicol - University of Illinois at Urbana-Champaign ...
Read MoreLocality as a Detection Approach to Insider Threat Behavior
Dr. Timothy J. Shimeall - Carnegie Mellon University ...
Read More2015 Events
Click, Click, Boom! Human Behavior in Cybersecurity Research
Dr. Chris Ferguson - Stetson University ...
Read MoreOptimizing Dynamic Task-Parallel Execution on NUMA Systems
Dr. Antoniu Pop - University of Manchester ...
Read MoreMagnetic Resonance Guided High Intensity Focused Ultrasound and Clinical Applications
Dr. Haydar Celik - National Institutes of Health ...
Read MoreDancing chickens and gorillas in the lung: If I can see so much, why do I miss so much?
Dr. Jeremy Wolfe - Harvard Medical School ...
Read MoreLocalized Algorithms for Wireless Ad Hoc / Sensor Networks
Dr. Nabanita Das - Indian Statistical Institute, Kolkata, Inda ...
Read MoreSunTrust Bank and Its Technology: Cyber Security, Big Data Analytics, Private Cloud Computing, Mobility, and Process Reengineering
John Vidlak - SunTrust Banks, Inc. ...
Read MoreSocial-Media-Based Cyber Security: Cases on U.S. Border Security
Dr. Wingyan Chung - University of Central Florida ...
Read MoreThorough Mining of Metagenomic and Metatranscriptomic Data with Guided Reference-Based Assembly of Short Peptides
Dr. Cuncong Zhong - J. Craig Venter Institute ...
Read MoreFrom GPS and Google Maps to Spatial Computing 2020
Dr. Shashi Shekhar - University of Minnesota ...
Read MoreEmerging Trends in Open System Technologies and Model-Based Design for Real-Time Embedded Software
Dr. Thomas DuBois - Boeing ...
Read MoreSequential Determinantal Point Process: Modeling the Diverse and Sequential Properties in Video Summarization
Dr. Boqing Gong - University of Southern California ...
Read MoreDeep learning Strategies in Classification of CT Attenuation Patterns for Interstitial Lung Diseases
Dr. Ziyue Xu - National Institute of Health ...
Read MoreDesign and Development of Wireless Sensor Networks with its Emerging Applications
Dr. Indrajit Banerjee - Indian Institute of Engineering Science and Technology (IIEST), Shibpur ...
Read MoreCloud Auto-Provisioning for Parallel Processing
Dr. Liqiang Wang - University of Wyoming ...
Read MoreThat Thing In Your Pocket Is A Computer! The Future of Mobile Computing
Dr. Edward Delp - Purdue University ...
Read MoreHelping to Keep Your Mom Safe in the Digital Age: Research that Impacts Everyone
Dr. Michael Lehrfeld - East Tennessee State University ...
Read MoreBinary Program Integrity Models for Defeating Code-Reuse Attacks
Aravind Prakash - Syracuse University ...
Read MoreMinding the Gaps in Memory Forensics
Dr. Golden G. Richard III - University of New Orleans ...
Read MoreAuto-Tuning Performance of Data-Intensive Systems in Cloud Computing
Dr Liqiang Wang - University of Wyoming ...
Read MoreVirtual Human Training Systems: From Understanding Human Behavior to Modeling Users’ Emotional Body Posture
Dr. Andrea Kleinsmith - University of Florida ...
Read MoreKernel Methods for Unsupervised Visual Domain Adaptations
Dr. Boqing Gong - University of Southern California ...
Read MoreTowards Wearable Interactions that Go Beyond the Touchscreen
Dr. Xing-Dong Yang - University of Calgary, Canada ...
Read MoreSummarizing Information in Big Data: Algorithms and Applications
Dr. Fei Lu - Carnegie Mellon University ...
Read MoreComprehensive Human State Modeling and Its Applications
Dr. Ajay Divakaran - SRI International ...
Read MoreAttack-Resilient Mechanisms for Scalable Monitoring and SDN-Based Approaches for DDoS Attack Mitigation and Detection in Cloud Computing
Dr. Kaiqi Xiong - Rochester Institute of Technology ...
Read MoreExploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics
Dr. Douglas Kelly - Army Research Laboratory ...
Read MoreVisual Understanding of Human Actions
Dr. Hamed Pirsiavash - Massachusetts Institute of Technology ...
Read MoreVirtual Humans and Beyond: Algorithms, Systems and Interdisciplinary Applications
Dr. Zhigang Deng - University of Houston ...
Read MoreAgriNeTT: Open Data and Mobile apps in Agriculture
Dr. Margaret Bernard - The University of the West Indies, St. Augustine, Trinidad and Tobago ...
Read MoreUsing Technology to Connect and Protect
Dr. Pamela Wisniewski - The Pennsylvania State University ...
Read MoreTowards Interactive Large-Scale Data Analytics Platform for Diverse Data Sources
Dr. Michael Gubanov - MIT ...
Read MoreMachine Learning with World Knowledge
Dr. Yangqiu Song - University of Illinois at Urbana-Champaign ...
Read MoreBody-wide Automatic Anatomy Recognition in Medical Imagery
Dr. Jay Udupa - University of Pennsylvania ...
Read MoreAtlas-based Segmentation of Anatomical Organs in Chest X-Ray
Dr. Sema Candemir - National Institutes of Health ...
Read MoreInteractive Sound Simulation and Rendering
Dr. Dinesh Manocha - University of North Carolina ...
Read More2014 Events
Digital Forensics in the Age of the Internet of Things: Challenges and Opportunities
Dr. Sam Liles - Purdue University ...
Read MoreMulti-Modal and Data-Based Motion Planners for Humanoid Characters
Dr. Marcelo Kallmann - University of California at Merced ...
Read MoreLocalization and Scheduling in Wireless Sensor Network
Dr. Tuhina Samanta - Indian Institute of Engineering Science and Technology, Shibpur ...
Read MoreFast and Efficient Fingerprint-based Localization and Tracking
Dr. Duc A. Tran - University of Massachusetts at Boston ...
Read MoreSecurity and Interdependency in a Public Cloud: A Game Theoretic Approach
Dr. Charles Kamhoua - Air Force Research Laboratory ...
Read MoreOak Ridge Bio-Surveillance Toolkit (ORBiT): Using “Big Data” Machine Learning in Public Health Dynamics
Lauren Pullum and Arvind Ramanathan - Oak Ridge National Lab ...
Read MoreA View of Applying Gaming & Simulation for Physical Security Analysis
Jon Whetzel - Sandia National Laboratories ...
Read MoreStructured Sparse Models for Object Detection and Classification
Dr. Nasser M. Nasrabadi - US Army Research Laboratory ...
Read MoreThe Value of Open Source Intelligence in Penetration Testing & Hacking
Dr. Josh Pauli - Dakota State University ...
Read MoreCrowdsourcing Computing Tasks to People: From ESP Game to Social Media
Guo-Jun Qi - University of Illinois at Urbana-Champaign ...
Read MoreExample-based Real-time Skinning Animation: Algorithms and Applications
Binh Le - University of Houston ...
Read MoreRecent Algorithmic Results in Stable Matching and Allocation Problems
Dr. Brian Dean - Clemson University ...
Read MoreOptimization Techniques in High-Performance Computing Sustainability
Dr. Ishfaq Ahmad - University of Texas at Arlington ...
Read MoreModel-Based Embedded Software Testing and Monitoring
Dr. Ratnesh Kumar - Iowa State University ...
Read MoreMolecular Computing: Computation by Chemistry and Geometry
Dr. David Doty - California Institute of Technology ...
Read MoreDetecting and Repairing Performance Bugs
Adrian Nistor - University of Illinois at Urbana-Champaign ...
Read MoreGaining Better Understanding of Software through Visualizing the Memory Access Patterns of Executing Software
Dr. Paul Rosen - University of Utah ...
Read MoreMASK: Masquerade of Mobile Applications Against Behavioral Tracking
Dr. Kang G. Shin - University of Michigan-Ann Arbor ...
Read MoreTaming Big Data Variety: From Social Networks to Brain Networks
Xiangnan Kong - University of Illinois at Chicago ...
Read MoreCodes that No Longer Correct: New Faces of Error-Correcting Codes
Dr. Mahdi Cheraghchi - MIT ...
Read MoreEfficient Modeling-Based Approaches for Large-Scale Mining and Retrieval
Dr. Lidan Wang - University of Illinois at Urbana Champaign ...
Read MoreMy Quest for High-Quality, Interactive Rendering
Dr. Dirk Reiners - University of Louisiana at Lafayette ...
Read MoreThe Next Stage for Virtual Reality: an Evolutionary Look
Dr. Carolina Cruz-Neira - University of Louisiana at Lafayette ...
Read MoreBoa: A language and a BIGDATA repository for Democratizing Ultra-Large-Scale Software Repository Mining
Dr. Hridesh Rajan - Iowa State University ...
Read MoreUsing a Push-Button Verifying Compiler to Build Verified Software Components
Dr. Murali Sitaraman - Clemson University ...
Read MoreSupporting Software Evolution through Model Transformation
Dr. Jeff Gray - University of Alabama ...
Read MoreLarge-Scale Quantum Computing Architectures: A Systems Perspective
Dr. Fred Chong - University of California at Santa Barbara ...
Read More2013 Events
User-centric Optimizations for Multimedia Broadcast over Wireless
Dr. Swades De - Indian Institute of Technology, Delhi ...
Read MoreAgent Based Models, Social Phenomena and Massively Multiplayer Online Games
Dr. Kiran Lakkaraju - Sandia National Labs ...
Read MoreNaming and Address Resolution in Mobile Ad-hoc Networks
Sebastian Schellenberg - Ilmenau University of Technology ...
Read MoreComputations over Geo-Spatial and Temporal Datasets
Dr. Sushil K. Prasad - Georgia State University ...
Read MoreSecure and Holistic Coexistence with Kernel Extensions – A Immune System Inspired Approach
Dr. Daniela Oliveira - Bowdoin College ...
Read MoreMobility-Assisted k-Coverage and Geographic Forwarding in Sparse Heterogeneous Wireless Sensor Networks
Dr. Habib M. Ammari - University of Michigan-Dearborn ...
Read MoreVisioning Studies: A Socio-Technical Approach to Designing the Future
Dr. Diane Sonnenwald - University College Dublin ...
Read MoreTactical Wireless Multi-hop Networks – Realistic Scenario Modeling and Adaptive Sensor Applications
Nils Aschenbruck - University of Osnabrueck ...
Read MoreComplex Event Processing with Reusable Event Detectors and Aspects
Prof. Shmuel Katz - Israel Institute of Technology ...
Read MoreI Can Bank Online; Why Can’t I Vote Online?
Barbara Simons - An expert on electronic voting ...
Read MoreMicroarchitecture and Compiler Support for Timing Speculation
Russ Joseph - Electrical Engineering and Computer Science at Northwestern University ...
Read MoreTrust Management in a Cloud Distributed Environment
Prof. Hossam Afifi - Institut Mines Telecom ...
Read MoreDesigning a Multi-tiered Networking Architecture for Smart Building Applications
Dr. JeongGil Ko - Electronics and Telecommunications Research Institute, Daejeon, Korea ...
Read MoreCan Mobility Improve WSN Performance?
Dr. Stefano Basagni - Department of Electrical and Computer Engineering, Northeastern University ...
Read MoreRobust-First Computing: Beyond Correctness and Efficiency
Dr. David Ackley - University of New Mexico ...
Read MoreTopological properties of SINR Diagram with Interference Cancellation
Dr. Yoram Haddad - Jerusalem College of Technology, Jerusalem, Israel ...
Read More2012 Events
Salting Public Traces with Attack Traffic to Test Flow Classifiers
Dr. Geroge Kesidis - The Pennsylvania State University ...
Read MoreChecking Contracts for AOP using XPIDRs
Henrique Rebêlo - Federal University of Pernambuco ...
Read MoreCrowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach
Dr. Rong Jin - Michigan State University ...
Read MoreEar-Phone: A Participatory Sensing System for Noise Monitoring
Dr. Salil Kanhere - University of New South Wales ...
Read MoreVision Research at Disney Research Pittsburgh
Leonid Sigal and J. Rafael Tena - Disney Research, Puttsburgh ...
Read MoreUnderstanding Photos of People Using Social Context
Dr. Tsuhan Chen - Cornell University ...
Read MoreCombining Optimism and Pessimism in Accessing Replicas of Countable Objects in Distributed Systems
Dr. Joel M. Crichlow - Rowan University ...
Read MoreLearning to Match Appearances by Correlations in a Covariance Metric Space
Dr. Slawomir Bak - INRIA, Sophia Antipolis ...
Read MoreLocation Awareness and its Applications
Dr. Rung-Ching Chen - ChaoYang University of Technology ...
Read MoreThe Role of Intermediate Shape Priors in Perceptual Grouping and Image Abstraction
Dr. Sven Dickinson - University of Toronto ...
Read MoreDesign, Development, and Evaluation of Interactive Virtual Environments
Dr. Veysi Isler - Middle East Technical University ...
Read MoreComputational Insight and the Theory of Evolution
Dr. Christos H. Papadimitriou - University of California at Berkeley ...
Read MoreVisual Perception: “Setting” the state of the art with Graphical Models, Linear Programming & Duality
Nikos Paragios - Ecole Centrale de Paris, Ecole des Ponts-ParisTech, INRIA, Saclay, Ile-de-France ...
Read MoreTowards Gaining Control Over Information Overflow
Dr. Michael Gubanov - Stanford University ...
Read MoreHuman Computer Intelligent Interaction
Dr. Thomas Huang - University of Illinois at Urbana-Champaign ...
Read MoreUnderstanding Virus Capsid Assembly Through Stochastic Simulation
Dr. Russell Schwartz - Carnegie Mellon University ...
Read MoreThe Requirements for Software and Algorithms to Utilize Present and Future Processor Architectures
Dr. Paulius Micikevicius - NVIDIA ...
Read MoreMining Hidden Knowledge in Heterogeneous Information Networks
Dr. Jiawei Han - University of Illinois at Urbana-Champaign ...
Read MoreMosaicing, Segmentation and Categorization of Dynamic Scenes
Dr. Rene Vidal - John Hopkins University ...
Read More