Past Lecture Series

Photo of Tauhid Alam

A Dynamical System Approach for Resource-Constrained Mobile Robotics

Tauhidul Alam

The revolution of autonomous vehicles has led to the development of robots with abundant sensors, actuators with many degrees of …

Read More

Tales of Robots with Tails

Dylan Shell

In this talk, I’ll describe a recent line of our work in which we’ve looked at robots equipped with passive, …

Read More

Self-Adaptable Framework to Analyse and Evaluate the Behavior of Entities in Commercial Online System

Thejas Gubbi Sadashiva

In online commercial systems like e-commerce it is difficult to differentiate honest and dishonest entities as they are dynamic in …

Read More
Photo of Mingming Guo

User-Centric Privacy Preservation in Mobile and Location-Aware Applications

Mingming Guo

The mobile and wireless community has brought a significant growth of location-aware devices including smart phones, connected vehicles, and IoT …

Read More

Educating Tomorrows Engineers including Entrepreneurship and Numerical Simulation of Boiling Heat Transfer under Different Gravity Levels

Vijay Dhir

Engineering education is going through a change in pedagogy and modes of delivery. In the first part of this talk …

Read More
Photo of Stephanie Willett

Overview of DHS Science and Technology Directorate

Stephanie Willett

Ms. Willett will provide an overview of major responsibilities of DHS S&T and will identify ways that academia have contributed …

Read More
Mohammad Ataur Rahman Chowdhury headshot

Rethinking the I/O Stack for Persistent Memory

Mohammad Ataur Rahman Chowdhury

Modern operating systems have been designed around the hypotheses that (a) memory is both byte-addressable and volatile and (b) storage …

Read More

Traffic-Aware Deployment of Interdependent NFV Middleboxes in Software-Defined Networks

Wenrui Ma

Middleboxes, such as firewalls, Network Address Translators(NATs), WAN optimizers, or Deep Packet Inspectors(DPIs), are widely deployed in modern networks to …

Read More
Photo of Kemal Akkaya

Building a Private Bitcoin-based Payment Network among Electric Vehicles and Charging Stations

Kemal Akkaya

Mass penetration and market dominance of Electric Vehicles (EVs) are expected in the upcoming years. Due to their frequent charging …

Read More
Photo of Kishwar Ahmed

Energy Demand Response for High-Performance Computing Systems

Kishwar Ahmed

The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the …

Read More
Photo of Qing Wang

Intelligent Data Mining Techniques for Automatic Service Management

Qing Wang

Driven by the rapid changes in economic environment, business enterprises constantly explore innovative ways of expanding their outreach and gaining …

Read More
Photo of Dionny Santiago

A Model-Based AI-Driven Test Generation System

Dionny Santiago

Achieving high software quality today involves manual analysis, test planning, documentation of testing strategy and test cases, and development of …

Read More
Photo of Mohammad Abu Obaida

Performance Prediction of Large Scale Parallel Applications and Systems using HPC Simulation and Analysis based Modeling

Mohammad Abu Obaida

Parallel application performance predictions offer valuable insight about their actual runs.  However, producing high quality predictions for massively parallel applications …

Read More
Photo of Md Mizanur Rahman

Search Rank Fraud Prevention in Online Systems

Md Mizanur Rahman

The survival of products in online services such as Google Play, Yelp, Facebook, and Amazon, is contingent on their search …

Read More
Photo of Bin Shi

Gradient-Based Algorithm on Machine Learning

Bin Shi

Researchers are exploring efficient algorithms to find local minima as well as global minima from Newton Second Law without friction. …

Read More
Photo of Ramesh Baral

Context-Aware Point-of-Interest Recommendation System

Ramesh Baral

The increasing volume of information has created overwhelming challenges to extract the relevant items manually. Fortunately, the online systems, such …

Read More

Deep Learning for Representation, and its Application for Natural Language Understanding

Shekoofeh Mokhtari

As the web evolves even faster than expected, the exponential growth of data becomes overwhelming. Textual data is being generated …

Read More

Erasure Coding for Distributed Storage Systems

Jun Li

Distributed storage systems store a significant amount of data on a large number of commodity servers. In a distributed storage …

Read More
Photo of Benjamin Scribner

Critical Cybersecurity Education & Professional Development

Benjamin Scribner

First Workshop on Critical Cybersecurity Education (WCCE-2018) Keynote Presentation The Nation has an ever-growing need for cybersecurity professionals who can …

Read More

IPV6 networking at FIU SCIS

Eric Johnson

FIU SCIS has had IPv6 connectivity in some fashion for over 15 years now. I will talk about the what …

Read More

Understanding the Human in Human-Robot Teams

Ruzena Bajcsy

Natural language researchers and data scientists apply a multitude of techniques for analysis and extraction of knowledge from potentially massive …

Read More
Abdur Rahman Bin Shahid photo

Practical Privacy-Preservation Techniques for Location-Based Services

Abdur Rahman Bin Shahid

Location-Based Services (LBS) offer users a vast array of services such as Point-of-Interest (POI) searching, check-ins and geotagged photo sharing …

Read More
Samia Tasnim photo

Cleaning of Data Streams in Mobile Wireless Sensor Networks

Samia Tasnim

Mobile Wireless Sensor Networks (MWSNs) are a critically important technology area for the acquisition of spatiotemporally dense data in diverse …

Read More
Georges Arsene Kamhoua photo

Colluding Attacks Defense Algorithms In Online Social Networks And Crowdsourcing

Georges A. Kamhoua

Most people view Online Social Networks (OSNs) as platforms for communicating and sharing information, while organizations use OSNs to engage …

Read More
Photo of Hava Siegelmann

Computation in Nature and DARPA’s Lifelong Learning Machines

Hava Siegelmann

Lifelong Learning encompasses computational methods that allow systems to learn in runtime and incorporate learning for application in new, unanticipated …

Read More

Automatic Extraction of Narrative Structure from Long Form Text

Joshua Eisenberg

My dissertation is on the automatic extraction of narrative structure from English text. I am developing programs that allow computers …

Read More

Aspect Based Sentiment Analysis on Review Data

Wei Xue

With proliferation of user-generated reviews, new opportunities and challenges arise. The advance of Web technologies allows people easily to access …

Read More

IHMC Research: Natural Language Processing, Cyber Security, and Big Data

Bonnie Dorr

Natural language researchers and data scientists apply a multitude of techniques for analysis and extraction of knowledge from potentially massive …

Read More

Cyber Security Challenges and Opportunities

David Martinez

Cyber technologies are evolving at a very fast pace commensurate with the need to respond to cyber threats. This presentation …

Read More

Automated Detection of Specification Bugs in Network Protocol Implementations

Endadul Hoque

Network protocols are notorious for their complexity. Implementing these protocols correctly is crucial to the success of secure communication. However, …

Read More

Making Sense of Twitter @Bloomberg

Umut Topkara

Decision makers around the world look to Bloomberg for delivering timely political, business and financial information and insight. Ever since …

Read More
Photo of Mozhgan Azimpourkivi

Image-based Mobile Data Protection

Mozhgan Azimpourkivi

Mobile and wearable devices are popular platforms for accessing sensitive online services such as e-mail, social networks, and banking. A …

Read More

Augmented Terrain-Based Navigation to Enable Persistent Autonomy for Underwater Vehicles in GPS-Denied Environments

Gregory Murad Reis

Aquatic robots, such as Autonomous Underwater Vehicles (AUVs), play a major role in the study of ocean processes that require …

Read More

Biological solutions to two fundamental computer science problems

Saket Navlakha

Many biological systems can be viewed as algorithms designed by evolution to solve computational problems. I will present two such …

Read More

Multi-Robot Coordination and Scheduling for Deactivation & Decommissioning

Sebastian Zanlongo

There is an abundance of nuclear material in the world that requires constant monitoring. Semi and fully autonomous robots can …

Read More

Climate Change and National Security

Yannis Phillis

Anthropogenic climate change is causing many dangerous phenomena such as hot spells, floods, droughts, hurricanes, acidification of oceans, sea level …

Read More

Edge Computing: How Low Will the Clouds Fall?

Dilma Da Silva

The computing community reached a reasonable level of consensus on how to deploy cloud computing services to benefit a variety …

Read More

How to Make a Better Direct Digital Frequency Synthesizer (DDFS)

Alan Willson

This talk provides essential information on direct digital synthesizers (DDS)–also known as DDFS and numerically controlled oscillators (NCO).  We begin …

Read More
Photo of Pawel Sniatala

Implantable chips and a current-mode ΣΔ modulator as a part of such systems

Paweł Śniatała

The development of new electronic technologies allows increasing the complexity of modern System on Chip devices (SoC). They contain the …

Read More
Photo of Szymon Wilk

Using Reasoning Techniques to Personalize of Clinical Practice Guidelines for Patients with Multi-morbidities

Szymon Wilk

Clinical practice guidelines (CPGs) are defined as “systematically developed statements to assist practitioner and patient decisions about appropriate health care …

Read More
Photo of Alex Afanasyev

Named Data Networking of Things

Alex Afanasyev

The Internet of Things (IoT) is a vision for interconnecting all of the world’s “things”—from vehicles to diet scales, smart …

Read More
Photo of Zhou Wubai

Data Mining Techniques to Understand Textual Data

Wubai Zhou

More than ever, information delivery online and storage heavily rely on text. Billions of texts are produced every day in …

Read More

Robust Distributed Coordination of Loads for Providing Virtual Energy

Prabir Barooah

As we move away from fossil fuels toward renewable energy sources such as solar and wind, inexpensive energy storage technologies …

Read More

Traffic-Aware Placement of Interdependent NFV Middleboxes in SDN Networks

Deng Pan

Network Function Virtualization (NFV) revolutionizes the implementation of network functions, or middleboxes, as virtual machines that can run any on …

Read More
Photo of Muhammad Razib is a Ph.D. candidate

Structural Surface Mapping for Shape Analysis

Muhammad Razib

Natural surfaces are usually associated with feature graphs, such as cortical surface with anatomical atlas structure. Such a feature graph …

Read More

Securing Devices and Applications in the Internet of Things and Cyber-Physical Systems Era

Selcuk Uluagac

Cyber space is expanding fast with the introduction of new Internet of Things (IoT) and CPS devices. Wearables, smart watches, …

Read More
image of Zhuo Sun

Toward Finding Concurrency Bugs in Distributed Systems

Zhuo Sun

As the most common non-deadlock concurrency bugs, atomicity violations are extremely hard to detect during testing since the exhaustive testing …

Read More
Photo of Tauhid Alam

A Dynamical System Approach for Resource-Constrained Mobile Robotics

Tauhidul Alam

Recent advances in technology have led to the development of robots with abundant sensors, actuators with large degrees of freedom, …

Read More
Photo of Md Mahbubur Rahman

Efficient Mission Planning for Robot Networks in Communication Constrained Environments

Md Mahbubur Rahman

Many robotic systems are remotely operated nowadays that require uninterrupted connection and safe mission planning. Such systems are commonly found …

Read More

Streaming and Sketching Algorithms and Their Applications

Vladimir Braverman

Streaming and sketching algorithms have found applications in machine learning, astronomy, medicine, networking, natural language processing and other disciplines. The …

Read More

Analysis of Eye-Tracking Data in Visualization and Data Space

Sayeed Safayet Alam

Eye-tracking devices can tell us where on the screen a person is looking. Researchers frequently analyze eye-tracking data manually, by …

Read More
Georges Arsene Kamhoua photo

Colluding Attacks Defense Techniques in Online Social Networks and Crowdsourcing

Georges Arsene Kamhoua

Online Social Networks (OSNs) and crowdsourcing services have rapidly grown into a wide network and offer users a variety of …

Read More
Abdur Rahman Bin Shahid photo

Location Privacy

Abdur Rahman Bin Shahid

With the rapid advancement of GPS technology, we have observed a tremendous growth of Location-Based Services (LBS). Users enjoy a …

Read More
Samia Tasnim photo

Cleaning of Data Streams in Mobile Wireless Sensor Networks

Samia Tasnim

In mobile Wireless Sensor Networks (mWSNs), uncertainty is a common phenomenon, where sensors change their positions rapidly and unpredictably. Although …

Read More
Frank Chang headshot

Terahertz Systems-on-Chip Based on Nanotechnologies

Dr. Frank Chang

There is an increased interest in recent time to explore mm-Wave and Sub-mm-Wave (Terahertz) systems from 60-1000GHz (i.e. up to …

Read More
Magy Seif El-Nasr photo image

Procedural and Analytic Tools for the Development and Evaluation of Game Environments

Magy Seif El-Nasr

Interactive 3D environments, games and social media, are emerging as platforms used for entertainment, education, training, and crowdsourcing. The design …

Read More
Wei Xue photo

Aspect Based Sentiment Analysis on Review Data

Wei Xue

With proliferation of user-generated reviews, new opportunities and challenges arise. The advance of Web technologies allows people easily access a …

Read More
Wubai Zhou photo

Data Mining Techniques to Understand Textual Data

Wubai Zhou

More than ever, information delivery online and storage heavily rely on text. Billions of texts are produced every day in …

Read More
Leonardo Marmol headshop

Customized Interfaces for Modern Storage Systems

Leonardo Marmol

In the past decade, we have seen two major evolutions on storage technologies: flash storage and non-volatile memory. These storage …

Read More
Mohammad Ataur Rahman Chowdhury headshot

Rethinking the operating system for persistent memory

Mohammad Chowdhury

Modern operating systems have been designed around the hypotheses that (a) memory is both byte-addressable and volatile and (b) storage …

Read More
Gernot Paulus headshot

Application of Unmanned Aerial Systems for Environmental Monitoring

Gernot Paulus

Unmanned Aerial Systems (UAS), also known as Remotely Piloted Aircraft Systems (RPAS) or “Drones” are currently representing one of the …

Read More
Kianoush Gholamiboroujeni headshot

Oblivious Network Optimization and Security Modeling in Sustainable Smart Grids and Cities

Kianoush Gholamiboroujeni

Today’s interconnected world requires an inexpensive, fast, and reliable way of transferring information. There exists an increasingly important need for …

Read More
Ted Chiang headshot

Why the Brain is Not a Computer

Ted Chiang

TBA Share this:Tweet

Read More
Damla Turgut headshot

Value of information in intruder tracking and underwater sensor networks

Damla Turgut

Sensor networks are distributed systems where nodes embedded in the environment collect readings through their sensors and transmit data to …

Read More
Ahmed Fawaz headshot

Cyber Resilience against Sophisticated Attacks using Detection and Response

Ahmed Fawaz

Systems and attacks are becoming more sophisticated; classical security methods are failing to protect and secure those systems. We believe …

Read More
Istiaque Ahmed headshot

Understanding People and Designing Technology for Sustainable Development

Istiaque Ahmed

Syed Ishtiaque Ahmed is a Ph.D. Candidate in the Department of Information Science at Cornell University where he is advised …

Read More
image of Jun li

Erasure Coding in Distributed Storage Systems with Optimal Network Overhead

Jun Li

Distributed storage systems store a significant amount of data on a large number of commodity servers. In a distributed storage …

Read More
Albert Pisano headshot

Trillion Sensors Technology: Research, Commercialization and Education

Dr. Albert Pisano

After making a short introduction of the Jacobs School of Engineering at UC San Diego, Dean Pisano will outline several …

Read More
Yung Hsiang Lu photo

Opportunities and Challenges in Global Network Cameras

Yung-Hsiang Lu

Millions of network cameras have been deployed. Many of these cameras provide publicly available data, continuously streaming live views of …

Read More
Alex Afanasyev photo

Named Data Networking: The Data-Centric Future of the Internet

Alexander Afanasyev

Today’s Internet is built on top of the IP architecture, which provides point-to-point communications among all computing devices in the …

Read More
Hui Lu photo

Rethinking Cloud Storage System Software under Multi-Tenancy

Hui Lu

Virtualization-based cloud computing has dominated today’s data centers by supporting consolidated servers, converged infrastructures, and horizontal scalability. To provide high …

Read More
chen yiran photo

Brain-Inspired Computing: The Extraordinary Voyages in Known and Unknown Worlds

Yiran Chen

Human brain is the most sophisticated organ that nature ever builds. Building a machine that can function like a human …

Read More
Haibin Zhang headshot

Building “Incorruptible” Systems in Cloud Environments

Haibin Zhang

In this talk, I will discuss how to design and implement efficient distributed systems in untrusted cloud environments that simultaneously …

Read More
Hui Lin Hugo photo

Detect and Prevent Intrusions in Cyber-Physical Infrastructure of Power Systems

Hui Lin

In recent years, adversaries show the high intelligence to perform attacks against industrial control systems, such as power grids. They …

Read More
Endadul Hoque headshot

Securing Networks by Detecting Logical Flaws in Protocol Implementations

Endadul Hoque

Implementations of network protocols are integral components of various networked computing systems, spanning from Internet-of-Things (IoT) to enormous data centers. …

Read More
david martinez photo

High Performance Embedded Computing (HPEC): Past, Present, and Future Outlook

David Martinez

This talk addresses the technologies that have impacted the High Performance Embedded Computing (HPEC) community, the existing and future challenges, …

Read More
Hsin Hao Su headshot

Algorithms for Fundamental Problems in Computer Networks

Hsin-Hao Su

We consider models of distributed networks in which nodes are only aware of their neighbors, but not the global topology. …

Read More
Ayanna Howard photo

Socially Interactive Robots for Pediatric Therapy

Dr. Ayanna Howard

There are an estimated 150 million children worldwide living with a disability. For many of these children in the U.S., …

Read More
Dr. Sisi Duan headshot image

Building Resilient Distributed Systems from Byzantine Fault Tolerance

Sisi Duan

Building resilient network services that can withstand a wide range of failures and malicious attacks is a fundamental problem in …

Read More
Kevin Bowyer headshot

Case Studies In Computing-Based Entrepreneurship

Kevin Bowyer

This talk will describe a new elective course created for Computer Science and Engineering majors at the University of Notre …

Read More
Volkan Isler photo

Robotic Data Gathering in the Wild

Volkan Isler

Mobile robots equipped with various sensors can gather data at unprecedented spatial and temporal scales and resolution. Over the years, …

Read More
Alan Wilner photo

High-Capacity Optical Communications Using Multiplexing of Multiple Orbital-Angular-Momentum Beams

Dr. Alan Willner

Optical communications has historically experienced capacity growth by multiplexing many channels, and space-division-multiplexing (SDM) appears to be the next domain …

Read More
doug oard photo

Information Retrieval Research for E-Discovery

Doug Oard

Civil litigation in this country relies on each side making relevant evidence available to the other, a process known as …

Read More
leonardo marmol amador photo

Customized Interfaces for Modern Storage Devices

Leonardo Marmol Amador

In the past decade, we have seen two major evolutions on storage technologies: flash storage and non-volatile memory. These storage …

Read More
Bir Bhanu headshot

Intelligent Video Systems

Bir Bhanu

Modeling and recognizing the underlying dynamics of living entities at multiple spatio-temporal scales are challenging tasks. They provide a deeper …

Read More
ye duan photo

A Primitive-based 3D Segmentation Algorithm for CAD Models

Ye Duan

This talk presents a novel segmentation algorithm for CAD models (represented by either mesh or point cloud) constructed from planes, …

Read More

Calculating bounds on information leakage using two-bit patterns

Ziyuan Meng

Theories of quantitative information flow have seen growing interest recently, in view of the fundamental importance of controlling the leakage …

Read More
Chunqiu Zeng talk in Doctoral Dissertation Defense

Large Scale Data Mining for IT Service Management

Chunqiu Zeng

More than ever, Businesses heavily rely on IT service delivery to meet their current and frequently changing business requirements. Optimizing …

Read More
Tracy Camp headshot

SmartGeo: Toward the Development of Intelligent Geosystems

Tracy Camp

Much of our world’s subsurface is contaminated, due to legacy mining and milling sites; without treatment, the earth’s water supply …

Read More
Kishwar Ahmed Photo

Performance and Energy Prediction Modeling and Simulation in HPC System

Kishwar Ahmed

The growing computational demand of scientific applications has greatly motivated the development of large-scale High-performance Computing (HPC) system in the …

Read More
Photo of Dr. Alberto Quattrini Li

Multirobot systems for exploration: indoor and marine environments

Dr. Alberto Quattrini Li

The use of multirobot systems is an effective way to efficiently accomplish tasks in many real-life applications, such as cleaning, …

Read More
Asad Madni image

Convergence of Emerging Technologies to Address the Challenges of the 21st Century

Asad Madni

There are numerous “Grand Challenges” facing humanity that will have to be addressed by us as a global society in …

Read More
Sayeed headshot

Analysis of Eye-Tracking Data In Visualization and Data Space

Sayeed Safayet Alam

Eye-tracking devices can tell us where on the screen a person is looking. Researchers generally analyze eye-tracking data manually, by …

Read More
picture of Rong Rong

Toward Distributed At-Scale Hybrid Network Test with Emulation and Simulation Symbiosis

Rong Rong

During the last ten years, significant advances have been made in Future Internet Architecture (FIA) design. Undoubtedly, the size of …

Read More
Babak headshot

From Nanoneurosurgery to Supercomputing, AI and Smart Intraoperative-Microscopy

Babak Kateb

The field of Brain Mapping has been evolving rapidly in last few years. Brain Mapping is defined as the study …

Read More
wenrui ma headshot

Traffic-Aware placement of NFV Middleboxes in Software-defined networks

Wenrui Ma

Network Function Virtualization (NFV) enables flexible deployment of middleboxes as Virtual Machines (VMs) running on general hardware. Different types of …

Read More
picture of laurent njilla

Design Engineering To Overcome Unwanted Replacement (DETOUR)

Laurent Njilla

Counterfeiting of integrated circuits (ICs) is a rising issue that has a huge economic impact on the electronics industry. With …

Read More
Bogdan portrait

Research on Social Media Validation in the CaSPR Lab

Bogdan Carbunar

The considerable influence of social networks has made them ideal targets of information fabrication attacks. In this talk we overview …

Read More
Md Mahbubur Rahman photo

Efficient Mission Planning for Mobile Robot Networks in Communication Constrained Environment

Md Mahbubur Rahman

The use of networked autonomous vehicles has an increasing demand for many risky and labor intensive tasks such as military …

Read More
Lori Clarke photo

Using Process Modeling and Analysis Techniques to Reduce Errors in Healthcare

Lori Clarke

As has been widely reported in the news lately, healthcare errors are a major cause of death and suffering. In …

Read More
FIU SCIS logo

Coordinated Job Scheduling and Resource Sharing in Federated Virtual Environments

David Villegas

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing …

Read More

Supporting Crowdsourcing-based Evaluations of Data Visualizations

Mershack Okoe

We propose to reduce the overhead involved in designing and running controlled user studies of web-based data visualizations so that …

Read More

Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance

Daniel Campello

Operating Systems use fast, CPU-addressable main memory to maintain an application’s temporary data as anonymous data and to cache copies …

Read More

Sustainable Resource Management for Cloud Data Centers

A. S. M. Hasan Mahmud

In recent years, the demand for data center computing has increased significantly due to the growing popularity of cloud applications …

Read More

Structural Mapping for Brain Morphometry Analysis

Muhammad Razib

Brain morphometry analysis refers to the study of the size and shape of brain structures and functions and its relations …

Read More

A Systematic Approach for Migrating Enterprise Networks

Xin Sun

Enterprise operators must frequently change the design of their networks to accommodate new organizational needs and to improve business agility. …

Read More

Visual Data Analysis: Perceptual Foundations and Applications

Çağatay Demiralp

The explosion of digital data in size and form across domains surged the demand for data visualization. Visualizations facilitate data …

Read More

Emotion Technology, Wearables, and Surprises

Dr. Rosalind Picard

Almost two decades ago I set out to create computational systems that would have emotional intelligence. My team and I …

Read More

Automatic Detection and Quantitative Dynamic Contrast-Enhanced Magnetic Resonance Imaging Scoring of Prostate Cancer Aggressiveness

Andres Parra

Routine multi-parametric MRI (MP-MRI) acquisition consists of T2-weighted imaging (T2W), Diffusion Weighted imaging (DWI) and Dynamic Contrast Enhanced (DCE) imaging. …

Read More

Real-Time Scene Understanding

Alexander Aved

“With heightened security concerns across the globe and increasing need to monitor, preserve and protect critical infrastructure and public spaces …

Read More

3D Facial Behavior Analysis and Gesture Computing

Dr. Lijun Yin

A facial surface is a three-dimensional time varying ‘wave’, which is associated with the movement of facial expressions. Tracing the …

Read More

Large Scale Data Mining for IT Service Management

Chunqiu Zeng

More than ever, Business heavily rely on IT service delivery to meet their current and frequently changing business requirements. Optimizing …

Read More

Computational Thinking

Dr. Jeannette M Wing

My vision for the 21st Century: Computational thinking will be a fundamental skill used by everyone in the world. To …

Read More

Traffic-Aware placement of NFV Middleboxes in Software-defined networking

Wenrui Ma

Network Function Virtualization (NFV) enables flexible deployment of middleboxes as Virtual Machines (VMs) running on general hardware. Different types of …

Read More

Who are my users? The quest of user-adaptive interaction, applied to Information Visualization.

Cristina Conati

The potential of computers as interactive tools that support a large variety of users in a growing range of tasks …

Read More

IBM Research: Foundations for Cognitive Business

Radha Ratnaparkhi

This talk will discuss the key trends and implications of a cognitive business, the scientific foundation of a cognitive business, …

Read More

The Future of the GPUs

Esteban Clua

GPUs became important hardware for High Performance Computing. Today, near 90 of the 500 top World Clusters are highly based …

Read More

Optimal Scaling for Deep Neural Networks

Michael Perrone

Deep Neural Networks (DNNs) have recently received tremendous publicity due to significant advances in training, accuracy, and novel applications. In …

Read More

Creation or Creativity: Perception Makes the Difference

Carlos Leon

Creativity and evaluation of what has been created go together. It is in general assumed that this is a fundamental …

Read More

An Integrated Framework for Patent Analysis and Mining

Longhui Zhang

Patent, as one of the important intellectual property components for individuals, has great research values, beneficial to the industry, business, …

Read More
Yiqi Xu Portrait

Yiqi Xu

Yiqi Xu

Computing systems are becoming increasingly data-intensive because of the explosion of data and the needs for processing the data, and …

Read More

Flash Caching for Cloud Computing Systems

Dulcardo Arteaga

As the size of cloud systems and the number of hosted virtual machines (VMs) rapidly grow, the scalability of shared …

Read More

Understanding, Designing, and Developing Natural User Interactions for Children

Lisa Anthony

The field of Natural User Interaction (NUI) focuses on allowing users to interact with technology through the range of human …

Read More

Modern Visual Analytics Research: Opportunities for Computer, Cognitive and Mathematical Scientists

Georges Grinstein

Visualization, Information Visualization and Visual Analytics share the same pipeline, basically taking data and producing interactive images on displays. There …

Read More

Cognitively Natural Machine Learning

Patrick Shafto

Machine learning and computer science have traditionally focused on optimizing computational complexity and predictive accuracy of algorithms. I propose that …

Read More

The Path to Truth–Health and Medical Research: Conflicts and Challenges in our Joint Future

O. Dale Williams

The fundamental purpose of health and medical research is to gain knowledge for actions and treatment decisions for improving health …

Read More

Medical Records Research and Towards Finding Unknown Genes: the Genome Pro Framework

Michael Robinson

Data mining our Medical Records and Genomic databases allows us to understand how medications, human behavior, environmental conditions and genetics …

Read More

Securing User Interactions in Online Social Networks

Mahmudur Rahman

Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their …

Read More

The Road Towards Future Internet Deployment

Flávio de Oliveira Silva

Information and communication technologies (ICT) plays a central role in order to create a fully mobile and connected society where …

Read More

A Personalized Semantic Recommender Using Inference Star Ratings

Joseph Cilli

User-generated comments and reviews for hotels on the web are an important information source for hoteliers and for travel planners. …

Read More

Building Scalable Health Analytic Platform: Computational Phenotyping and Cloud-based Predictive Modeling

Jimeng Sun

As the adoption of electronic health records (EHRs) has grown, EHRs are now composed of a diverse array of data, …

Read More

Resource Management in Sustainable Cloud Data Centers.

A. S. M. Hasan Mahmud

To meet the surging demand for online computing, data centers are continuously growing in both numbers and sizes, increasing their …

Read More

A Modeling Approach and Network Security Analysis for Oblivious Routing Algorithms in Cloud Computing

Kianoosh Gholami Boroojeni

The recent advances of cloud computing has substantially changed researcher‰Ûªs understanding of computing hardware/software infrastructure and development methods. This fast …

Read More

On Being a Practical Engineer

Dr. Guru Madhavan

The challenges and opportunities of our time require solutions that go beyond traditional approaches. Based on narratives from his book …

Read More

A Web Interface for Data Acquisition and Analysis of Alzheimer’s Disease and its Prodromal Stages

Gabriel Lizarraga

We propose a generalized system for medical data analysis, targeted for classification of Alzheimer‰Ûªs disease (AD) and its prodromal stages, …

Read More

Modeling, Designing, and Implementing an Ad-Hoc M-Learning Platform that Integrates Sensory Data to Support Ubiquitous Learning

Hien Nguyen

Learning at any-time, at anywhere, using any mobile computing platform learning (which we refer to as “education in your palm”) …

Read More

The Human Side of Computing

Dr. Vicki Hanson

Historically, computing has been envisioned as a way of augmenting human abilities. Nowhere is such a computing goal more evident …

Read More
Photo of Barbara Ericson

Women in Computing – Creating the Future

Barbara Ericson

Women have been involved in computing from the beginning. Learn about the first computer programmer, the Harvard Computers, the Secret …

Read More

Women in Computing – Creating the Future

Barbara Ericson

Women have been involved in computing from the beginning. Learn about the first computer programmer, the Harvard Computers, the Secret …

Read More

The Process of Making Breakthroughs in Engineering

Thomas Kailath

This talk covers Mathematical modeling and engineering aspects of Computational and Communication Sciences. The talk will explore the origins and …

Read More

An Integrated Top-Down Approach to Network Design

Xin Sun

The field of network design is at a crossroad. On the one hand, a decade of sustained research on clean …

Read More

Security and Interdependency in a Public Cloud: A Game Theoretic Approach

Charles Kamhoua

As cloud computing thrives, many organizations – both large and small – are joining a public cloud to take advantage …

Read More

Two-Bit Pattern Analysis for Quantitative Information Flow

Ziyuan Meng

In the contexts of secure information flow and side-channel analysis, quantitative information flow theories allow us to relax the traditional …

Read More

Towards Next Generation Vertical Search Engines

Li Zheng

As the Internet grows exponentially every year, information on the Web has been explosively increasing and the volume of unstructured …

Read More

Discovery and annotation of repeats and signatures in genomic sequences

Michael Robinson

We have developed a computational framework that finds signatures among multiple genomic data files. The signatures process compares genomes of …

Read More

Modeling Human Nonverbal Empathic Communication to Create Expressive Animations of Virtual Characters

Reza Amini

Virtual agents and Embodied Conversational Agents (ECAs) are an emerging technology in multi-modal interfaces that have become increasingly interesting user …

Read More

Statistical Dialogue Manager For Brief Alcohol Interventions

Ugan Yasavur

Research endeavors on spoken dialogue systems in the 1990s and 2000s have led to the deployment of commercial spoken dialogue …

Read More

Processing Spatio-Temporal Queries for Uncertain Trajectories

Peter Scheuermann

The ( location, time) data capturing the motion of moving objects is subject to uncertainty due to a number of …

Read More

Education in the Palm: Adaptive m-learning mechanisms for building and delivering content using privacy centric of reusable learning objects in wireless ad-hoc network

Hien Nguyen

Any-time, anywhere and device learning (which we fondly refer to as Ì¢??education in your palmÌ¢?å) empowers informal and formal science …

Read More

Modeling Unreliable Data Streams In Sensor Networks

Vasanth Iyer

Lifetime and reliability of information processing are two areas of Sensor Data Stream management that exist separately due to the …

Read More

A Middleware To Support Delivery of Services In A Domain-Specific Execution Engine

Karl A. Morris

The increasing use of model-driven software development has recently renewed emphasis on using domain-specific models during application development. More specifically, …

Read More

Innovating the TV Viewing Experience

Khaled El-Maleh

In this talk, the focus will be on identifying key innovations that have contributed to the enhancement of the quality …

Read More

A Generic Model of Execution for Synthesizing Domain-Specific Models

Mark Allison

The increasing complexity and pervasiveness of software has resulted in the need for a new development paradigm that places abstraction …

Read More

Analytical and Experimental Methods for High-Performance Network Testing

Nageswara S. Rao

There has been an increasing number of large-scale science and commercial applications that produce large amounts of data, in the …

Read More

New Interfaces for Solid-State Memory Management

Mohit Saxena

The availability of high-speed flash solid-state devices (SSD) has introduced a new tier into the memory hierarchy. SSDs have dramatically …

Read More

DEVELOPMENT OF AN EXPERT SYSTEM FOR INTERPRETING FEATURES IN MEDICAL IMAGES IN MOBILE DEVICES

Frank Hernandez

As mobile devices become more powerful the number of operations they can per- form increases. With everyone owning a mobile …

Read More

Building an Empathic On-Demand Avatar-based Health Intervention for Behavior Change

Reza Amini

Embodied Conversational Agents (ECAs) have become increasingly interesting user interfaces in a wide range of domains such as Human-Computer Interaction …

Read More

Improving Resource Management in Virtualized Data Centers Using Application Performance Models

Sajibn Kundu

The rapid growth of virtualized data centers and cloud hosting services is making the management of physical resources such as …

Read More

Automatic Verification Techniques for Heap-Manipulating Programs

Xiaokang Qiu

Reliability is critical for system software, such as OS kernels and mobile browsers, as well as applications such as office …

Read More

An Overview of Virtualization and Private Cloud Technologies at Ultimate Software

John Machado

The speaker will be discussing the latest technologies and trends with Cloud Computing, specifically focusing on the below 4 subjects. …

Read More

Towards Next Generation Vertical Search Engine

Li Zheng

As the Internet grows exponentially every year, information on the Web has been explosively increasing and the volume of unstructured …

Read More

Scalable and Flexible Bulk Architecture

Xuehai Qian

To help parallel computing become mainstream, one of the main design considerations for multicore architectures should be support for programming …

Read More

Foundations of Quantitative Information Flow: Channels, Cascades and the Composition Refinement Order

Barbara Espinoza

Theories of quantitative information flow offer an attractive framework for analyzing confidentiality in practical systems, which often cannot avoid small …

Read More

Formal Modeling and Analysis of High Level Petri Nets

Su Liu

Today, hardware and software systems are widely used in applications where failure is unacceptable: electronic commerce, telephone switching networks, highway …

Read More

Systems Design, Optimization and Implementation for Differentiated Qualities of Storage Services

Feng Chen

As rapid advancement of storage R&D, storage technologies have become increasingly diverse (e.g., hard drives, SSDs, and non-volatile memory), which …

Read More

Discovery and Prediction of Repeated Mutations in Genomic Sequences

Juan Carlos Martinez

In academia as well as in industry, there have been a lot of efforts on developing computer algorithms to aid …

Read More

Capturing Global Coherence for Cross-source Information Extraction

Heng Ji

Information Extraction (IE) is a task of identifying Ì¢??factsÌ¢?å, such as the attack/arrest events, people’s jobs, people’s whereabouts, merger and …

Read More

Turning data into data products and essential social sciences = tools using human dynamics models

Wen Dong

The future of both the computational social sciences and consumer electronics lies in an understanding of the “data exhaust trails” …

Read More

A Cloud Services Marketplace for Cloud Service Acquisition

Yexi Jiang

Cloud services marketplace (CSM) is an exploratory project aiming to provide Ì¢??an AppStore for ServicesÌ¢?å. It is an intelligent online …

Read More

Minimalist Multi-Agent Filtering and Guidance

Leonardo Bobadilla

This talk presents methods for solving fundamental robotics tasks such as navigation, patrolling, coverage, and tracking without system identification, geometric …

Read More

A Generalized Adaptive Mathmatical Morphological Filter For Lidar Data

Zheng Cui

LIDAR (Light Detection And Ranging) is a widely used remote sensing technology to measure terrain properties and topographic mapping nowadays. …

Read More

Lower Bounds for Statistical Algorithms

Dr. Elena Grigorescu

We introduce a framework for proving lower bounds on computational problems over distributions, based on defining a restricted class of …

Read More

Dynamic Capacity Management for Multi-Tier Data Centers

Anshul Gandhi

data center infrastructures. A primary goal for these service providers is to meet certain response time Service Level Agreements (SLAs). …

Read More

A Trace-driven Analysis of Solid-State Caching in Cloud Computing Systems

Dulcardo Arteaga

Distributed storage systems (e.g., SAN, iSCSI) are commonly used in the emerging cloud computing systems to provide virtual machine (VM) …

Read More

Digital Identity Protection – Concepts and Issues

Elisa Bertino

Digital identity management (DIM) has emerged as a critical foundation for supporting successful interaction in today’s globally interconnected society. It …

Read More

Verify High Level Petri nets via Satisfiability Modulo Theories

Su Liu

Today, hardware and software systems are widely used in applications where failure is unacceptable: electronic commerce, telephone switching networks, highway …

Read More

An agenda for context-dependent visualization at FIU

Dr. Radu Jianu

This talk will lay out a research agenda for upcoming work on data visualization at Florida International University. The unifying …