2018 Events
Challenges in DDoS Defense and a New Approach with Trusted Hardware
Dr. Min Suk Kang - University of Singapore ...
Read MoreMollusks, Microgravity and More: understanding the impact of the space environment on host-microbe interactions
Dr. Jamie Foster - University of Florida ...
Read MoreAnalog Bloom Filter (ABF) for Wireless Networks
Dr. Zhenghao Zhang - Florida State University ...
Read MoreA Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data
Dr. Kevin A. Kwiat - Haloed Sun TEK of Sarasota, Florida ...
Read MoreMagnetoreceptionin Animals: Molecular Mechanisms and Biogeographical Consequences
Dr. Robert Fitak - Duke University ...
Read MoreMulti-omic analysis of adaptation in experimental Escherichia coli populations
Dr. Megan Behringer - Indiana University ...
Read MoreUncovering Footprints of Adaption from Ancient and Modern Genomes
Dr. Michael DeGiorgio - Pennsylvania State University ...
Read MoreDefeating DDoS Attacks and Adverse Network Conditions
Dr. Max Schuchard - University of Tennessee ...
Read MoreA Knights’ Welcome To: Dr. Cindy Bethel
Dr. Cindy L. Bethel - Mississippi State University ...
Read MoreFrom Explanatory to Exploratory Data Visualization
Mr. Chris Bryan - University of California ...
Read MoreFrom Online Romance to Collective Innovation: How Interactive Technologies Shape Interpersonal Relationships and Group Behaviors
Dr. Guo Freeman - University of Cincinnati ...
Read MoreAutomating Safe and Secure Software Development
Dr. Paul Gazzillo - Stevens Institute of Technology ...
Read MoreBuilding Predictable and Adaptable Mobile Systems
Dr. Lukasz Ziarek - State University of New York at Buffalo ...
Read MoreFinding a needle in a (meta)genomic haystack: single-nucleotide resolution via efficient multiple sequence alignment
Dr. Todd Treangen - University of Maryland College Park ...
Read MoreAI For Societally Relevant Problems: Influence Maximization in an Uncertain World
Mr. Amulya Yadav - USC Viterbi School of Engineering ...
Read MoreMaking Small Spaces Feel Large: Practical Illusions in Virtual Reality
Dr. Evan Suma Rosenberg - University of Southern California ...
Read MoreRevisiting the Future Roles of Computer Architecture in Cybersecurity Research
Dr. Yan Solihin - North Carolina State University and an IEEE Fellow ...
Read MoreAn Adaptive Multi-Factor Authentication (A-MFA) Methodology
Dr. Dipankar Dasgupta - University of Memphis ...
Read More