2016 Events
The Ins and Outs of Preposition Semantics: Challenges of Coverage and Cross-linguistic Adequacy
Dr. Nathan Schneider - Georgetown University ...
Secure and Scalable Attestation: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Advances in Smartphone Security: Attacks, Defenses, and Applications
Dr. Alexandra Dmitrienko - Postdoctoral Researcher ...
A Brief Introduction to Succinct Data Structures and Text Indexing
Dr. Sharma Thankachan - Georgia Institute of Technology ...
Improved Genetic Operators for Path Planning
Dr. David Mathias - Florida Southern College ...
Efficiently Searching Among Sensitive Content
Dr. Douglas W. Oard - University of Maryland ...
Design Engineering to Overcome Unwanted Replacement (DETOUR)
Dr. Laurent Njilla - U.S. Air Force Research Laboratory ...
Things, Trouble, Trust: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Analyzing and Modeling Multi-Level Dynamics of Multimodal Behavior in Affective Human Interactions
Zhaojun Yang - University of Southern California ...
Securing Emerging Short Range Wireless Communications
Dr. Kui Ren - University at Buffalo ...
User Expectations in Mobile App Security
Dr. Tao Xie - University of Illinois at Urbana-Champaign ...
Algorithms for Characterizing Intra-Tumor Heterogeneity in Cancer Genomes
Dr. Iman Hajirasouliha - Stanford University ...
Do shallow kernel methods match deep neural networks — and if not, what can the shallow ones learn from the deep ones?
Dr. Fei Sha - University of California, Los Angeles ...
Spectral Algorithms for Large Graphs: Where Theory and Practice Meet
Dr. Ioannis Koutis - University of Puerto Rico ...
Computational Methods for Characterizing Large-Scale Human Genome Variations with Applications to Cancer
Dr. Iman Hajirasouliha - Stanford University ...
Why are Pens so Terrible? Deconstructing and Understanding the Stylus Ecosystem and User Experience Today
Dr. Michelle Annett - University of Toronto ...
Approximate Sequence Matching: Algorithms and Applications
Dr. Sharma V. Thankachan - Georgia Institute of Technology ...
Everything You Code Can and Will Be Re-Used Against You
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt ...
Breaking Mobile Social Networks for Automated User Location Tracking
Dr. Kui Ren - University at Buffalo ...
Quantitative Analysis of Stepping Stone Access to Cyber-Physical Assets
Dr. David M. Nicol - University of Illinois at Urbana-Champaign ...
Locality as a Detection Approach to Insider Threat Behavior
Dr. Timothy J. Shimeall - Carnegie Mellon University ...