Skip to main content

2018 Events

Analog Bloom Filter (ABF) for Wireless Networks

Analog Bloom Filter (ABF) for Wireless Networks

Dr. Zhenghao Zhang - Florida State University ...
A Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data

A Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data

Dr. Kevin A. Kwiat - Haloed Sun TEK of Sarasota, Florida ...
Uncovering Footprints of Adaption from Ancient and Modern Genomes

Uncovering Footprints of Adaption from Ancient and Modern Genomes

Dr. Michael DeGiorgio - Pennsylvania State University ...
Defeating DDoS Attacks and Adverse Network Conditions

Defeating DDoS Attacks and Adverse Network Conditions

Dr. Max Schuchard - University of Tennessee ...
A Knight’s Welcome to Dr. Katie A. Siek

A Knight’s Welcome to Dr. Katie A. Siek

Dr. Katie A. Siek - Indiana University ...
A Knights’ Welcome To: Dr. Cindy Bethel

A Knights’ Welcome To: Dr. Cindy Bethel

Dr. Cindy L. Bethel - Mississippi State University ...
From Explanatory to Exploratory Data Visualization

From Explanatory to Exploratory Data Visualization

Mr. Chris Bryan - University of California ...
Automating Safe and Secure Software Development

Automating Safe and Secure Software Development

Dr. Paul Gazzillo - Stevens Institute of Technology ...
Building Predictable and Adaptable Mobile Systems

Building Predictable and Adaptable Mobile Systems

Dr. Lukasz Ziarek - State University of New York at Buffalo ...
Building Correct Programs

Building Correct Programs

Dr. William Mansky - Princeton University ...
Making Small Spaces Feel Large: Practical Illusions in Virtual Reality

Making Small Spaces Feel Large: Practical Illusions in Virtual Reality

Dr. Evan Suma Rosenberg - University of Southern California ...
Revisiting the Future Roles of Computer Architecture in Cybersecurity Research

Revisiting the Future Roles of Computer Architecture in Cybersecurity Research

Dr. Yan Solihin - North Carolina State University and an IEEE Fellow ...
An Adaptive Multi-Factor Authentication (A-MFA) Methodology

An Adaptive Multi-Factor Authentication (A-MFA) Methodology

Dr. Dipankar Dasgupta - University of Memphis ...