CS Research Expo Research Posters
·
Bioinformatics
1. Mapping Regulatory Network from a
Model Organism to a Non-Model Organism, by Rachita
Sharma, Patricia Evans and Virendra Bhavsar
2.
Mutation Grounding Algorithm, by Jonas B. Laurila, Rajaraman
Kanagasabai and Christopher J. O. Baker
·
Critical
Infrastructures and Systems
3.
Exploring Human Dynamics in
Critical Infrastructures: An Agent-based Simulation of Stress in Hospital Surge, by Alexis Morris
4.
Modelling and Simulating
Emergency-Response Operations, by William Ross
·
Hardware/software
Co-Design
5.
Acceleration
of Blob Detection within Images in Hardware, by Alexander Bochem and
Kenneth B. Kent
6. Accelerated Decompression of Gzip in Hardware, by Joe Libby and Kenneth B. Kent
7. Accelerating the MMD Algorithm, by Michael Schlösser and Kenneth B. Kent
·
Knowledge
Engineering
8.
Text Mining & NLP based Algorithm to populate ontology with
A-Box individuals and object properties, by Alexandre Kouznetsov, Christopher J. O. Baker
9.
Managing
Uncertain Knowledge on the Fuzzy Semantic Web, by Jidi Zhao, Harold Boley and Weichang Du
·
Networks
and Applications
10. Middleware Framework for
Disconnection Tolerant Mobile Application Services, by Sangwhan Cha, Weichang Du and
Bernd J. Kurz
11. Dynamic Admission Control for A
Bandwidth Broker, by Chenguang Gao, John DeDourek and Przemyslaw Pochec
12. Divisible Load Scheduling on Heterogeneous Multi-level Tree
Networks, by
Mark Lord and Eric Aubanel
13. Investigation of channel formation
in a MANET, by Kerul
Patel, John DeDourek and Przemyslaw
Pochec
14. FRID Network Monitor, by Xi Ruan, Wei Lu, Andrew Merrithew, Hanli Ren, Ali Ghorbani
15. Sensor Web Language for Dynamic
Sensor Networks, by Gunita Saini, Bradford G. Nickerson
16. Automatic Discovery of Network
Applications: A Hybrid Approach, by Mahbod Tavallaee,
Wei Lu, Ali A. Ghorbani
·
Security
and Trust
17. Identifying Internet Mediated
Securities Fraud: Trends and Technology, by Jake van der Laan,
Brodie M. Shannon, and Christopher J.O. Baker
18. State of the Art in Trust and Reputation System: The Comparison
Framework, by Zeinab Noorian
19. An Online Adaptive Approach to Alert Correlation, by Hanli Ren, Natalia Stahanova and Ali A.
Ghorbani
20. IDS Alert Visualization for Network Security Monitoring and
Analysis, by Hadi Shiravi, Ali Shiravi and Ali A. Ghorbani
21. Simulating Intrusion in NS-2, by Palash Verma, John DeDourek and Przemyslaw Pochec
·
Spatial
Data Structures
22. I/O-efficient
Rectangular Segment Search, by Gautam K. Das, Bradford G.
Nickerson
23. A
Data Structure for Efficient Search of Objects Moving on a Graph, by Thuy T. T. Le and Bradford G. Nickerson
24. I/O-Efficient
Spatial Data Structures: Observations
on the d-Dimensional Grid File, by Stuart A. MacGillivray, Bradford G. Nickerson