2016 Events
The Ins and Outs of Preposition Semantics: Challenges of Coverage and Cross-linguistic Adequacy
Dr. Nathan Schneider - Georgetown University ...
Read MoreSecure and Scalable Attestation: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Read MoreAdvances in Smartphone Security: Attacks, Defenses, and Applications
Dr. Alexandra Dmitrienko - Postdoctoral Researcher ...
Read MoreA Brief Introduction to Succinct Data Structures and Text Indexing
Dr. Sharma Thankachan - Georgia Institute of Technology ...
Read MoreImproved Genetic Operators for Path Planning
Dr. David Mathias - Florida Southern College ...
Read MoreEfficiently Searching Among Sensitive Content
Dr. Douglas W. Oard - University of Maryland ...
Read MoreDesign Engineering to Overcome Unwanted Replacement (DETOUR)
Dr. Laurent Njilla - U.S. Air Force Research Laboratory ...
Read MoreThings, Trouble, Trust: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Read MoreAnalyzing and Modeling Multi-Level Dynamics of Multimodal Behavior in Affective Human Interactions
Zhaojun Yang - University of Southern California ...
Read MoreSecuring Emerging Short Range Wireless Communications
Dr. Kui Ren - University at Buffalo ...
Read MoreUser Expectations in Mobile App Security
Dr. Tao Xie - University of Illinois at Urbana-Champaign ...
Read MoreAlgorithms for Characterizing Intra-Tumor Heterogeneity in Cancer Genomes
Dr. Iman Hajirasouliha - Stanford University ...
Read MoreDo shallow kernel methods match deep neural networks — and if not, what can the shallow ones learn from the deep ones?
Dr. Fei Sha - University of California, Los Angeles ...
Read MoreSpectral Algorithms for Large Graphs: Where Theory and Practice Meet
Dr. Ioannis Koutis - University of Puerto Rico ...
Read MoreComputational Methods for Characterizing Large-Scale Human Genome Variations with Applications to Cancer
Dr. Iman Hajirasouliha - Stanford University ...
Read MoreWhy are Pens so Terrible? Deconstructing and Understanding the Stylus Ecosystem and User Experience Today
Dr. Michelle Annett - University of Toronto ...
Read MoreApproximate Sequence Matching: Algorithms and Applications
Dr. Sharma V. Thankachan - Georgia Institute of Technology ...
Read MoreEverything You Code Can and Will Be Re-Used Against You
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Read MoreBreaking Mobile Social Networks for Automated User Location Tracking
Dr. Kui Ren - University at Buffalo ...
Read MoreQuantitative Analysis of Stepping Stone Access to Cyber-Physical Assets
Dr. David M. Nicol - University of Illinois at Urbana-Champaign ...
Read MoreLocality as a Detection Approach to Insider Threat Behavior
Dr. Timothy J. Shimeall - Carnegie Mellon University ...
Read More