2017 Research Exposition Posters

April 07, 2017, 8:30am - 4:30pm

UNB Fredericton, Wu Conference Centre


Authors
Title
Sana Oladi, Panagiotis Patros Arvin II: pressure analysis tool
Waseem Gharbieh, Virendra Bhavsar, Paul Cook Multiword Expression Identification Using Deep Learning
Menelaos Kotsollaris, William Liu, Emmanuel Stefanakis, Yun Zhang Implementing a Scalable Web Image Management System
Li Ji, Weichang Du Distributed Ontology Reasoning
Ismail Akbari, Yevgen Biletskiy, Weichang Du RIFEnge: A Rule Engine for RIF Language
Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani Online Advertisement Detection by Lightweight URL Analysis
Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A.Ghorbani A Framework for Profiling and Detecting Android Financial Malware
Arash Habibi Lashkari, Gerard Drapper Gil, Mohammad Mamun, Ali A. Ghorbani Detection and Characterization of Tor Encrypted Traffic
Arash Habibi Lashkari, Amy Seo, Gerard Drapper Gil, and Ali A. Ghorbani An Artificial Intelligence-Based Online Ad Blocker
Iman Sharafaldin, AmirhosseinGharib, ArashHabibiLashkari, Ali A. Ghorbani BotViz: A Memory Forensic-Based Botnet Detection and Visualization Approach
Aaron Tabor, Alex Kienzle, Carly Smith, Alex Watson, David Hanna, Scott Bateman, Erik Scheme The Falling Of Momo: a Myoelectric Muscle Training Game
Amirhossein Gharib, Arash Habibi Lashkari, Ali A. Ghorbani A Framework for Detecting Mobile Ransomware
Rasoul Shahsavarifar, David Bremner Research on Data Depth
Priyal Nagra, Paul Cook An Automatic Approach to Discover Lexical Semantic Differences in Varieties of English
Taees Eimouri, Kenneth Kent, Aleksander Micic Object Layout Optimization in JVM
Panagiotis Patros, K.B. Kent, M. Dawson, Jiapeng Zhu Performant PaaS Cloud
Maria Patrou, Kenneth B. Kent, Gerhard Dueck, Charlie Gracie NUMA Awareness: Improving Memory and Thread Management in the JVM
Panagiotis Patros, Maria Patrou, Maxim Uzun, Jiapeng Zhu, Kenneth B. Kent, Michael Dawson Optimizing and Integrating Node.js for the Cloud
Bing Yang, Kenneth B. Kent, Eric Aubanel, Tobi Agila Multi-granularity Locking on Multi-tier Data Structures
Sasha Williams, Kenneth B. Kent, Gerhard Dueck BALANCED COLLECTION SET IN GARCOSIM
Scott Young, Gerhard Dueck, Kenneth B. Kent, Charlie Gracie Identifying and Grouping Cold Objects
Konstantin Nasartschuk, Kenneth B. Kent, Aleksandar Micic, Charlie Gracie String Deduplication During Garbage Collection in Virtual Machines
Shijie Xu, David Bremner, Daniel Heidinga GraphJIT: a dynamic graph bytecode JIT compiler
Hugo Gonzalez, Natalia Stakhanova Fingerprinting Android Development Tools Using Visualization
Samuel Kelley, Kenneth B. Kent, Gerhard Dueck Reordering Objects During Garbage Collection
Johannes Ilisei, Kenneth B. Kent, Gerhard W. Dueck Killing Zombies –Generating Realistic Trace Files
Jianguo Xie, Wei Song Collaborative Message Distribution via Device-to-Device (D2D) Communications
Yiming Zhao, Wei Song Device-to-Device (D2D) Data Dissemination with Power Budget Constraints
Nafiseh Izadi Yekta, Rongxing Lu Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things
Hassan Mahdikhani, Rongxing Lu PMQ: Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT
Rongxing Lu, Kevin Heung, Arash. H. Lashkari, Ali A. Ghorbani A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
Saeed Shafiee, Jesus Alfonso Pereyra Duarte, Scott Wallace, Suprio Ray Parallel Spatio-textual Similarity Join with Spark​
Panagiotis Patros, K.B. Kent, M. Dawson, Jiapeng Zhu Performant PaaS Cloud
Canadian Institute for Cybersecurity Fingerprinting Android Development Tools Using Visualization (Revised)
Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook Android authorship attribution through analysis of string n-grams
Eltaher El-Shanta, Weichang Du Pattern Services for Service-Oriented Systems
Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook Android authorship attribution through analysis of string n-grams
Hugo Gonzalez, Ye Ning, Yan Li, Ratinder Kaur, Natalia Stakhanova Detecting Obfuscation on Android Apps
Daniel King, Bradford G. Nickerson, Wei Song Real-time Wireless Control via Ultra-Wideband (UWB) Communication
Hugo Gonzalez, Natalia Stakhanova, Ali Ghorbani StructSignature: Empirical Analysis of Android Binary File Layout
Hugo Gonzalez, Ratinder Kaur, Natalia Stakhanova Secure Platform for Collaborative Research
Zhendong Sha, Patricia A. Evans Using tree decomposition for general pedigree inference
Kris Bowman, Scott Bateman A Comparison of Pointing Assistance Techniques in Different Environments
Jason Wuertz, Scott Bateman A Virtual Memory Palace to Facilitate Memorizing Information