CS Research Expo Research Posters

 

·       Bioinformatics

1.     Mapping Regulatory Network from a Model Organism to a Non-Model Organism, by Rachita Sharma, Patricia Evans and Virendra Bhavsar

2.     Mutation Grounding Algorithm, by Jonas B. Laurila, Rajaraman Kanagasabai and Christopher J. O. Baker

 

·       Critical Infrastructures and Systems

3.     Exploring Human Dynamics in Critical Infrastructures: An Agent-based Simulation of Stress in Hospital Surge, by Alexis Morris

4.     Modelling and Simulating Emergency-Response Operations, by William Ross

 

·       Hardware/software Co-Design

5.     Acceleration of Blob Detection within Images in Hardware, by Alexander Bochem and Kenneth B. Kent

6.     Accelerated Decompression of Gzip in Hardware, by Joe Libby and Kenneth B. Kent

7.     Accelerating the MMD Algorithm, by Michael Schlösser and Kenneth B. Kent

 

·       Knowledge Engineering

8.     Text Mining & NLP based Algorithm to populate ontology with A-Box individuals and object properties, by Alexandre Kouznetsov, Christopher J. O.  Baker

9.     Managing Uncertain Knowledge on the Fuzzy Semantic Web, by Jidi Zhao, Harold Boley and Weichang Du

 

·       Networks and Applications

10.  Middleware Framework for Disconnection Tolerant Mobile Application Services, by Sangwhan Cha, Weichang Du and Bernd J. Kurz

11.  Dynamic Admission Control for A Bandwidth Broker, by Chenguang Gao, John DeDourek and Przemyslaw Pochec

12.  Divisible Load Scheduling on Heterogeneous Multi-level Tree Networks, by Mark Lord and Eric Aubanel

13.  Investigation of channel formation in a MANET, by Kerul Patel, John DeDourek and Przemyslaw Pochec

14.  FRID Network Monitor, by Xi Ruan, Wei Lu, Andrew Merrithew, Hanli Ren, Ali Ghorbani

15.  Sensor Web Language for Dynamic Sensor Networks, by Gunita Saini, Bradford G. Nickerson

16.  Automatic Discovery of Network Applications: A Hybrid Approach, by Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani

 

·       Security and Trust

17.  Identifying Internet Mediated Securities Fraud: Trends and Technology, by Jake van der Laan, Brodie M. Shannon, and Christopher J.O. Baker

18.  State of the Art in Trust and Reputation System: The Comparison Framework, by Zeinab Noorian

19.  An Online Adaptive Approach to Alert Correlation, by Hanli Ren, Natalia Stahanova and Ali A. Ghorbani

20.  IDS Alert Visualization for Network Security Monitoring and Analysis, by Hadi Shiravi, Ali Shiravi and Ali A. Ghorbani

21.  Simulating Intrusion in NS-2, by Palash Verma, John DeDourek and Przemyslaw Pochec

 

·       Spatial Data Structures

22.  I/O-efficient Rectangular Segment Search, by Gautam K. Das, Bradford G. Nickerson

23.  A Data Structure for Efficient Search of Objects Moving on a Graph, by Thuy T. T. Le and Bradford G. Nickerson

24.  I/O-Efficient Spatial Data Structures: Observations on the d-Dimensional Grid File, by Stuart A. MacGillivray, Bradford G. Nickerson