2016 Events
The Ins and Outs of Preposition Semantics: Challenges of Coverage and Cross-linguistic Adequacy
Dr. Nathan Schneider - Georgetown University...
Read MoreSecure and Scalable Attestation: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt...
Read MoreAdvances in Smartphone Security: Attacks, Defenses, and Applications
Dr. Alexandra Dmitrienko - Postdoctoral Researcher...
Read MoreA Brief Introduction to Succinct Data Structures and Text Indexing
Dr. Sharma Thankachan - Georgia Institute of Technology...
Read MoreImproved Genetic Operators for Path Planning
Dr. David Mathias - Florida Southern College...
Read MoreEfficiently Searching Among Sensitive Content
Dr. Douglas W. Oard - University of Maryland...
Read MoreDesign Engineering to Overcome Unwanted Replacement (DETOUR)
Dr. Laurent Njilla - U.S. Air Force Research Laboratory...
Read MoreThings, Trouble, Trust: On Building Trust in IoT Systems
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt...
Read MoreAnalyzing and Modeling Multi-Level Dynamics of Multimodal Behavior in Affective Human Interactions
Zhaojun Yang - University of Southern California...
Read MoreSecuring Emerging Short Range Wireless Communications
Dr. Kui Ren - University at Buffalo...
Read MoreUser Expectations in Mobile App Security
Dr. Tao Xie - University of Illinois at Urbana-Champaign...
Read MoreAlgorithms for Characterizing Intra-Tumor Heterogeneity in Cancer Genomes
Dr. Iman Hajirasouliha - Stanford University...
Read MoreDo shallow kernel methods match deep neural networks — and if not, what can the shallow ones learn from the deep ones?
Dr. Fei Sha - University of California, Los Angeles...
Read MoreSpectral Algorithms for Large Graphs: Where Theory and Practice Meet
Dr. Ioannis Koutis - University of Puerto Rico...
Read MoreComputational Methods for Characterizing Large-Scale Human Genome Variations with Applications to Cancer
Dr. Iman Hajirasouliha - Stanford University...
Read MoreWhy are Pens so Terrible? Deconstructing and Understanding the Stylus Ecosystem and User Experience Today
Dr. Michelle Annett - University of Toronto...
Read MoreApproximate Sequence Matching: Algorithms and Applications
Dr. Sharma V. Thankachan - Georgia Institute of Technology...
Read MoreEverything You Code Can and Will Be Re-Used Against You
Dr. Ahmad-Reza Sadeghi - Center for Advance Security Research Darmstadt...
Read MoreBreaking Mobile Social Networks for Automated User Location Tracking
Dr. Kui Ren - University at Buffalo...
Read MoreQuantitative Analysis of Stepping Stone Access to Cyber-Physical Assets
Dr. David M. Nicol - University of Illinois at Urbana-Champaign...
Read MoreLocality as a Detection Approach to Insider Threat Behavior
Dr. Timothy J. Shimeall - Carnegie Mellon University ...
Read More