2009 CS Research Expo Posters

 

       Botnet Analysis Framework by Ali Shiravi and Ali Ghorbani

       Network Security Simulation Visualization by Ali Shiravi, Hadi Shiravi, and Ali Ghorbani

       The Disseminated ACKnowledgment (DACK) Protocol for Data Collection in Wireless Sensor Networks by John-Paul Arp and Bradford G. Nickerson

       Quantifying Process Model Conformance Through Minimal-Cost Approximations by Bruce Hamiton and Liqiang Geng

       KB Validation under the Closed-world Semantics by Cheng Lu, Weichang Du and Bruce Spencer

       RNA Motif Discovery using Probabilistic Tree Adjoining Grammars by Patricia A. Evans and Emad Bahrami Samani

        Update Propagation In Modular Ontologies by Faezeh Ensan and Weichang Du

       Generating partial COP-nets on demand by Henry Bediako-Asare, Michael Fleming, and Scott Buffett

       Expressing Vague Knowledge in the Fuzzy Description Logic fALCHIN by Jidi Zhao, Harold Boley, and Weichang Du

        An Embedded Decryption/Decompression Engine using HandelC by Farnaz Gharibian and Kenneth B. Kent

        A Handel-C Implementation of a Computationally Intensive Problem in GF(3) by Joey C. Libby, Jonathan P. Lutes, and Kenneth B. Kent

        A Methodology for Rapid Optimization of HandelC Specifications by Joseph C Libby and Kenneth B Kent

       Performance Enhancement of Smith-Waterman Sequence Database Searches Using Hybrid Model: Comparing the MPI and Hybrid Programming Paradigm on SMP Clusters by Mahdi Noorian and Zeinab Noorian

       An Incremental Self-Improvement Hybrid Intrusion Detection System by Mahbod Tavallaee, Wei Lu, and Ali A. Ghorbani

       Effective Query Selection during Preference Elicitation by Minruo Li, Michael Fleming, and Scott Buffett

       Automatic Discovery of Botnet Communities on Large-Scale Communication Network by Wei Lu and Ali A. Ghorbani

        A Framework for Mobile Applications by Sangwhan Cha

       Ontology-based Unit Test-case Generation by Valeh H. Nasser, Weichang Du, and Dawn MacIsaac

       Fusing Multiple Sensors to Detect Network Traffic Anomalies - A Control Theoretic Model by Mahsa Kiani, Wei Lu, Mahbod Tavallaee, and Ali A. Ghorbani