2018 Events
Challenges in DDoS Defense and a New Approach with Trusted Hardware
Dr. Min Suk Kang - University of Singapore...
Read MoreMollusks, Microgravity and More: understanding the impact of the space environment on host-microbe interactions
Dr. Jamie Foster - University of Florida...
Read MoreAnalog Bloom Filter (ABF) for Wireless Networks
Dr. Zhenghao Zhang - Florida State University...
Read MoreA Design Technique to Prevent Hardware Trojans from Leaking Sensitive Data
Dr. Kevin A. Kwiat - Haloed Sun TEK of Sarasota, Florida...
Read MoreMagnetoreceptionin Animals: Molecular Mechanisms and Biogeographical Consequences
Dr. Robert Fitak - Duke University...
Read MoreMulti-omic analysis of adaptation in experimental Escherichia coli populations
Dr. Megan Behringer - Indiana University...
Read MoreUncovering Footprints of Adaption from Ancient and Modern Genomes
Dr. Michael DeGiorgio - Pennsylvania State University...
Read MoreDefeating DDoS Attacks and Adverse Network Conditions
Dr. Max Schuchard - University of Tennessee...
Read MoreA Knights’ Welcome To: Dr. Cindy Bethel
Dr. Cindy L. Bethel - Mississippi State University...
Read MoreFrom Explanatory to Exploratory Data Visualization
Mr. Chris Bryan - University of California...
Read MoreFrom Online Romance to Collective Innovation: How Interactive Technologies Shape Interpersonal Relationships and Group Behaviors
Dr. Guo Freeman - University of Cincinnati...
Read MoreAutomating Safe and Secure Software Development
Dr. Paul Gazzillo - Stevens Institute of Technology...
Read MoreBuilding Predictable and Adaptable Mobile Systems
Dr. Lukasz Ziarek - State University of New York at Buffalo...
Read MoreFinding a needle in a (meta)genomic haystack: single-nucleotide resolution via efficient multiple sequence alignment
Dr. Todd Treangen - University of Maryland College Park...
Read MoreAI For Societally Relevant Problems: Influence Maximization in an Uncertain World
Mr. Amulya Yadav - USC Viterbi School of Engineering...
Read MoreMaking Small Spaces Feel Large: Practical Illusions in Virtual Reality
Dr. Evan Suma Rosenberg - University of Southern California...
Read MoreRevisiting the Future Roles of Computer Architecture in Cybersecurity Research
Dr. Yan Solihin - North Carolina State University and an IEEE Fellow...
Read MoreAn Adaptive Multi-Factor Authentication (A-MFA) Methodology
Dr. Dipankar Dasgupta - University of Memphis...
Read More