2014 Events
Digital Forensics in the Age of the Internet of Things: Challenges and Opportunities
Dr. Sam Liles - Purdue University...
Read MoreMulti-Modal and Data-Based Motion Planners for Humanoid Characters
Dr. Marcelo Kallmann - University of California at Merced...
Read MoreLocalization and Scheduling in Wireless Sensor Network
Dr. Tuhina Samanta - Indian Institute of Engineering Science and Technology, Shibpur...
Read MoreFast and Efficient Fingerprint-based Localization and Tracking
Dr. Duc A. Tran - University of Massachusetts at Boston...
Read MoreSecurity and Interdependency in a Public Cloud: A Game Theoretic Approach
Dr. Charles Kamhoua - Air Force Research Laboratory...
Read MoreOak Ridge Bio-Surveillance Toolkit (ORBiT): Using “Big Data” Machine Learning in Public Health Dynamics
Lauren Pullum and Arvind Ramanathan - Oak Ridge National Lab...
Read MoreA View of Applying Gaming & Simulation for Physical Security Analysis
Jon Whetzel - Sandia National Laboratories...
Read MoreStructured Sparse Models for Object Detection and Classification
Dr. Nasser M. Nasrabadi - US Army Research Laboratory...
Read MoreThe Value of Open Source Intelligence in Penetration Testing & Hacking
Dr. Josh Pauli - Dakota State University...
Read MoreCrowdsourcing Computing Tasks to People: From ESP Game to Social Media
Guo-Jun Qi - University of Illinois at Urbana-Champaign...
Read MoreExample-based Real-time Skinning Animation: Algorithms and Applications
Binh Le - University of Houston...
Read MoreRecent Algorithmic Results in Stable Matching and Allocation Problems
Dr. Brian Dean - Clemson University...
Read MoreOptimization Techniques in High-Performance Computing Sustainability
Dr. Ishfaq Ahmad - University of Texas at Arlington...
Read MoreModel-Based Embedded Software Testing and Monitoring
Dr. Ratnesh Kumar - Iowa State University...
Read MoreMolecular Computing: Computation by Chemistry and Geometry
Dr. David Doty - California Institute of Technology...
Read MoreDetecting and Repairing Performance Bugs
Adrian Nistor - University of Illinois at Urbana-Champaign...
Read MoreGaining Better Understanding of Software through Visualizing the Memory Access Patterns of Executing Software
Dr. Paul Rosen - University of Utah...
Read MoreMASK: Masquerade of Mobile Applications Against Behavioral Tracking
Dr. Kang G. Shin - University of Michigan-Ann Arbor...
Read MoreTaming Big Data Variety: From Social Networks to Brain Networks
Xiangnan Kong - University of Illinois at Chicago...
Read MoreCodes that No Longer Correct: New Faces of Error-Correcting Codes
Dr. Mahdi Cheraghchi - MIT...
Read MoreEfficient Modeling-Based Approaches for Large-Scale Mining and Retrieval
Dr. Lidan Wang - University of Illinois at Urbana Champaign...
Read MoreMy Quest for High-Quality, Interactive Rendering
Dr. Dirk Reiners - University of Louisiana at Lafayette...
Read MoreThe Next Stage for Virtual Reality: an Evolutionary Look
Dr. Carolina Cruz-Neira - University of Louisiana at Lafayette...
Read MoreBoa: A language and a BIGDATA repository for Democratizing Ultra-Large-Scale Software Repository Mining
Dr. Hridesh Rajan - Iowa State University...
Read MoreUsing a Push-Button Verifying Compiler to Build Verified Software Components
Dr. Murali Sitaraman - Clemson University...
Read MoreSupporting Software Evolution through Model Transformation
Dr. Jeff Gray - University of Alabama...
Read MoreLarge-Scale Quantum Computing Architectures: A Systems Perspective
Dr. Fred Chong - University of California at Santa Barbara...
Read More