Past Lecture Series

2016-10-07-Bir-Bhanu

Intelligent Video Systems

Bir Bhanu

Modeling and recognizing the underlying dynamics of living entities at multiple spatio-temporal scales are challenging tasks. They provide a deeper …

Read More
ye-duan

A Primitive-based 3D Segmentation Algorithm for CAD Models

Ye Duan

This talk presents a novel segmentation algorithm for CAD models (represented by either mesh or point cloud) constructed from planes, …

Read More
ZiyuanPhoto

Calculating bounds on information leakage using two-bit patterns

Ziyuan Meng

Theories of quantitative information flow have seen growing interest recently, in view of the fundamental importance of controlling the leakage …

Read More
Chunqiu Zeng talk in Doctoral Dissertation Defense

Large Scale Data Mining for IT Service Management

Chunqiu Zeng

More than ever, Businesses heavily rely on IT service delivery to meet their current and frequently changing business requirements. Optimizing …

Read More
Tracy Camp

SmartGeo: Toward the Development of Intelligent Geosystems

Tracy Camp

Much of our world’s subsurface is contaminated, due to legacy mining and milling sites; without treatment, the earth’s water supply …

Read More
Kishwar Ahmed Photo

Performance and Energy Prediction Modeling and Simulation in HPC System

Kishwar Ahmed

The growing computational demand of scientific applications has greatly motivated the development of large-scale High-performance Computing (HPC) system in the …

Read More
Photo of Dr. Alberto Quattrini Li

Multirobot systems for exploration: indoor and marine environments

Dr. Alberto Quattrini Li

The use of multirobot systems is an effective way to efficiently accomplish tasks in many real-life applications, such as cleaning, …

Read More
2016-09-30-Asad-Madni

Convergence of Emerging Technologies to Address the Challenges of the 21st Century

Asad Madni

There are numerous “Grand Challenges” facing humanity that will have to be addressed by us as a global society in …

Read More
biopic_sayeed

Analysis of Eye-Tracking Data In Visualization and Data Space

Sayeed Safayet Alam

Eye-tracking devices can tell us where on the screen a person is looking. Researchers generally analyze eye-tracking data manually, by …

Read More
picture of Rong Rong

Toward Distributed At-Scale Hybrid Network Test with Emulation and Simulation Symbiosis

Rong Rong

During the last ten years, significant advances have been made in Future Internet Architecture (FIA) design. Undoubtedly, the size of …

Read More
babak

From Nanoneurosurgery to Supercomputing, AI and Smart Intraoperative-Microscopy

Babak Kateb

The field of Brain Mapping has been evolving rapidly in last few years. Brain Mapping is defined as the study …

Read More
wenrui-ma

Traffic-Aware placement of NFV Middleboxes in Software-defined networks

Wenrui Ma

Network Function Virtualization (NFV) enables flexible deployment of middleboxes as Virtual Machines (VMs) running on general hardware. Different types of …

Read More
laurent_njilla

Design Engineering To Overcome Unwanted Replacement (DETOUR)

Laurent Njilla

Counterfeiting of integrated circuits (ICs) is a rising issue that has a huge economic impact on the electronics industry. With …

Read More
Bogdan-portrait

Research on Social Media Validation in the CaSPR Lab

Bogdan Carbunar

The considerable influence of social networks has made them ideal targets of information fabrication attacks. In this talk we overview …

Read More
Md Mahbubur Rahman

Efficient Mission Planning for Mobile Robot Networks in Communication Constrained Environment

Md Mahbubur Rahman

The use of networked autonomous vehicles has an increasing demand for many risky and labor intensive tasks such as military …

Read More
2016-02-26_Lori_Clarke-1square

Using Process Modeling and Analysis Techniques to Reduce Errors in Healthcare

Lori Clarke

As has been widely reported in the news lately, healthcare errors are a major cause of death and suffering. In …

Read More
FIU

Coordinated Job Scheduling and Resource Sharing in Federated Virtual Environments

David Villegas

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing …

Read More
Mershack-Okoe

Supporting Crowdsourcing-based Evaluations of Data Visualizations

Mershack Okoe

We propose to reduce the overhead involved in designing and running controlled user studies of web-based data visualizations so that …

Read More
Daniel-Campello

Optimizing Main Memory Usage in Modern Computing Systems to Improve Overall System Performance

Daniel Campello

Operating Systems use fast, CPU-addressable main memory to maintain an application’s temporary data as anonymous data and to cache copies …

Read More
A_S_M-Hasan-Mahmud

Sustainable Resource Management for Cloud Data Centers

A. S. M. Hasan Mahmud

In recent years, the demand for data center computing has increased significantly due to the growing popularity of cloud applications …

Read More
photo_Razib

Structural Mapping for Brain Morphometry Analysis

Muhammad Razib

Brain morphometry analysis refers to the study of the size and shape of brain structures and functions and its relations …

Read More
Xin

A Systematic Approach for Migrating Enterprise Networks

Xin Sun

Enterprise operators must frequently change the design of their networks to accommodate new organizational needs and to improve business agility. …

Read More
2016-05-06_Cagatay_Demiralp

Visual Data Analysis: Perceptual Foundations and Applications

Çağatay Demiralp

The explosion of digital data in size and form across domains surged the demand for data visualization. Visualizations facilitate data …

Read More
RosalindPicard_1

Emotion Technology, Wearables, and Surprises

Dr. Rosalind Picard

Almost two decades ago I set out to create computational systems that would have emotional intelligence. My team and I …

Read More
2016-04-29_Andres_Parra

Automatic Detection and Quantitative Dynamic Contrast-Enhanced Magnetic Resonance Imaging Scoring of Prostate Cancer Aggressiveness

Andres Parra

Routine multi-parametric MRI (MP-MRI) acquisition consists of T2-weighted imaging (T2W), Diffusion Weighted imaging (DWI) and Dynamic Contrast Enhanced (DCE) imaging. …

Read More
2016-04-28_Alexander_Aved

Real-Time Scene Understanding

Alexander Aved

“With heightened security concerns across the globe and increasing need to monitor, preserve and protect critical infrastructure and public spaces …

Read More
2016-04-22_Lijun_Yin

3D Facial Behavior Analysis and Gesture Computing

Dr. Lijun Yin

A facial surface is a three-dimensional time varying ‘wave’, which is associated with the movement of facial expressions. Tracing the …

Read More
Chunqiu_Zeng

Large Scale Data Mining for IT Service Management

Chunqiu Zeng

More than ever, Business heavily rely on IT service delivery to meet their current and frequently changing business requirements. Optimizing …

Read More
2016-04-15_Jeannette

Computational Thinking

Dr. Jeannette M Wing

My vision for the 21st Century: Computational thinking will be a fundamental skill used by everyone in the world. To …

Read More
Wenrui_Ma

Traffic-Aware placement of NFV Middleboxes in Software-defined networking

Wenrui Ma

Network Function Virtualization (NFV) enables flexible deployment of middleboxes as Virtual Machines (VMs) running on general hardware. Different types of …

Read More
2016-04-08_Cristina_Conati

Who are my users? The quest of user-adaptive interaction, applied to Information Visualization.

Cristina Conati

The potential of computers as interactive tools that support a large variety of users in a growing range of tasks …

Read More
2016-04-04_Radha_Radnaparkhi

IBM Research: Foundations for Cognitive Business

Radha Ratnaparkhi

This talk will discuss the key trends and implications of a cognitive business, the scientific foundation of a cognitive business, …

Read More
2016-04-07_Esteban_Clua

The Future of the GPUs

Esteban Clua

GPUs became important hardware for High Performance Computing. Today, near 90 of the 500 top World Clusters are highly based …

Read More
2016-04-07_-_Michael-Perrone

Optimal Scaling for Deep Neural Networks

Michael Perrone

Deep Neural Networks (DNNs) have recently received tremendous publicity due to significant advances in training, accuracy, and novel applications. In …

Read More
2016-04-01_Carlos_Leon

Creation or Creativity: Perception Makes the Difference

Carlos Leon

Creativity and evaluation of what has been created go together. It is in general assumed that this is a fundamental …

Read More
Longhui_Zhang

An Integrated Framework for Patent Analysis and Mining

Longhui Zhang

Patent, as one of the important intellectual property components for individuals, has great research values, beneficial to the industry, business, …

Read More
Yiqi Xu Portrait

Yiqi Xu

Yiqi Xu

Computing systems are becoming increasingly data-intensive because of the explosion of data and the needs for processing the data, and …

Read More
av_DSC0556

Flash Caching for Cloud Computing Systems

Dulcardo Arteaga

As the size of cloud systems and the number of hosted virtual machines (VMs) rapidly grow, the scalability of shared …

Read More
2016-03-11_Lisa_Anthony

Understanding, Designing, and Developing Natural User Interactions for Children

Lisa Anthony

The field of Natural User Interaction (NUI) focuses on allowing users to interact with technology through the range of human …

Read More
2016-02-24_Georges_Grinstein

Modern Visual Analytics Research: Opportunities for Computer, Cognitive and Mathematical Scientists

Georges Grinstein

Visualization, Information Visualization and Visual Analytics share the same pipeline, basically taking data and producing interactive images on displays. There …

Read More
portrait

Cognitively Natural Machine Learning

Patrick Shafto

Machine learning and computer science have traditionally focused on optimizing computational complexity and predictive accuracy of algorithms. I propose that …

Read More
2015-11-13_Dale_Williams

The Path to Truth–Health and Medical Research: Conflicts and Challenges in our Joint Future

O. Dale Williams

The fundamental purpose of health and medical research is to gain knowledge for actions and treatment decisions for improving health …

Read More
Michael_Robinson

Medical Records Research and Towards Finding Unknown Genes: the Genome Pro Framework

Michael Robinson

Data mining our Medical Records and Genomic databases allows us to understand how medications, human behavior, environmental conditions and genetics …

Read More
Rahman

Securing User Interactions in Online Social Networks

Mahmudur Rahman

Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their …

Read More
2015-11-09_Flavio_de_Oliveira_Silva

The Road Towards Future Internet Deployment

Flávio de Oliveira Silva

Information and communication technologies (ICT) plays a central role in order to create a fully mobile and connected society where …

Read More
cillij

A Personalized Semantic Recommender Using Inference Star Ratings

Joseph Cilli

User-generated comments and reviews for hotels on the web are an important information source for hoteliers and for travel planners. …

Read More
2015-10-30_Jimeng_Sun

Building Scalable Health Analytic Platform: Computational Phenotyping and Cloud-based Predictive Modeling

Jimeng Sun

As the adoption of electronic health records (EHRs) has grown, EHRs are now composed of a diverse array of data, …

Read More
ASM-Hasan-Mahmud

Resource Management in Sustainable Cloud Data Centers.

A. S. M. Hasan Mahmud

To meet the surging demand for online computing, data centers are continuously growing in both numbers and sizes, increasing their …

Read More
abc

A Modeling Approach and Network Security Analysis for Oblivious Routing Algorithms in Cloud Computing

Kianoosh Gholami Boroojeni

The recent advances of cloud computing has substantially changed researcher‰Ûªs understanding of computing hardware/software infrastructure and development methods. This fast …

Read More
2015-10-02_Guru_Madhavan.jpg

On Being a Practical Engineer

Dr. Guru Madhavan

The challenges and opportunities of our time require solutions that go beyond traditional approaches. Based on narratives from his book …

Read More
Gabriel_Lizarraga

A Web Interface for Data Acquisition and Analysis of Alzheimer’s Disease and its Prodromal Stages

Gabriel Lizarraga

We propose a generalized system for medical data analysis, targeted for classification of Alzheimer‰Ûªs disease (AD) and its prodromal stages, …

Read More
HienNguyen-Picture

Modeling, Designing, and Implementing an Ad-Hoc M-Learning Platform that Integrates Sensory Data to Support Ubiquitous Learning

Hien Nguyen

Learning at any-time, at anywhere, using any mobile computing platform learning (which we refer to as “education in your palm”) …

Read More
Screen-Shot-2015-08-11-at-2.30.55-PM

The Human Side of Computing

Dr. Vicki Hanson

Historically, computing has been envisioned as a way of augmenting human abilities. Nowhere is such a computing goal more evident …

Read More
thomas_kailath

The Process of Making Breakthroughs in Engineering

Thomas Kailath

This talk covers Mathematical modeling and engineering aspects of Computational and Communication Sciences. The talk will explore the origins and …

Read More
ZiyuanPhoto

Two-Bit Pattern Analysis for Quantitative Information Flow

Ziyuan Meng

In the contexts of secure information flow and side-channel analysis, quantitative information flow theories allow us to relax the traditional …

Read More
zhengli

Towards Next Generation Vertical Search Engines

Li Zheng

As the Internet grows exponentially every year, information on the Web has been explosively increasing and the volume of unstructured …

Read More
MichaelRobinson

Discovery and annotation of repeats and signatures in genomic sequences

Michael Robinson

We have developed a computational framework that finds signatures among multiple genomic data files. The signatures process compares genomes of …

Read More
img

Modeling Human Nonverbal Empathic Communication to Create Expressive Animations of Virtual Characters

Reza Amini

Virtual agents and Embodied Conversational Agents (ECAs) are an emerging technology in multi-modal interfaces that have become increasingly interesting user …

Read More
ugan-photo

Statistical Dialogue Manager For Brief Alcohol Interventions

Ugan Yasavur

Research endeavors on spoken dialogue systems in the 1990s and 2000s have led to the deployment of commercial spoken dialogue …

Read More
scheuermann2

Processing Spatio-Temporal Queries for Uncertain Trajectories

Peter Scheuermann

The ( location, time) data capturing the motion of moving objects is subject to uncertainty due to a number of …

Read More
HienNguyen_500x522

Education in the Palm: Adaptive m-learning mechanisms for building and delivering content using privacy centric of reusable learning objects in wireless ad-hoc network

Hien Nguyen

Any-time, anywhere and device learning (which we fondly refer to as Ì¢??education in your palmÌ¢?å) empowers informal and formal science …

Read More
TOSHIBA Exif JPEG

Modeling Unreliable Data Streams In Sensor Networks

Vasanth Iyer

Lifetime and reliability of information processing are two areas of Sensor Data Stream management that exist separately due to the …

Read More
karl_proposal_picture

A Middleware To Support Delivery of Services In A Domain-Specific Execution Engine

Karl A. Morris

The increasing use of model-driven software development has recently renewed emphasis on using domain-specific models during application development. More specifically, …

Read More
image001

Innovating the TV Viewing Experience

Khaled El-Maleh

In this talk, the focus will be on identifying key innovations that have contributed to the enhancement of the quality …

Read More
photo1

A Generic Model of Execution for Synthesizing Domain-Specific Models

Mark Allison

The increasing complexity and pervasiveness of software has resulted in the need for a new development paradigm that places abstraction …

Read More
Rao_photo

Analytical and Experimental Methods for High-Performance Network Testing

Nageswara S. Rao

There has been an increasing number of large-scale science and commercial applications that produce large amounts of data, in the …

Read More
mohit

New Interfaces for Solid-State Memory Management

Mohit Saxena

The availability of high-speed flash solid-state devices (SSD) has introduced a new tier into the memory hierarchy. SSDs have dramatically …

Read More
GDG_Headshot_1

DEVELOPMENT OF AN EXPERT SYSTEM FOR INTERPRETING FEATURES IN MEDICAL IMAGES IN MOBILE DEVICES

Frank Hernandez

As mobile devices become more powerful the number of operations they can per- form increases. With everyone owning a mobile …

Read More
Reza-Amini

Building an Empathic On-Demand Avatar-based Health Intervention for Behavior Change

Reza Amini

Embodied Conversational Agents (ECAs) have become increasingly interesting user interfaces in a wide range of domains such as Human-Computer Interaction …

Read More
SKundu

Improving Resource Management in Virtualized Data Centers Using Application Performance Models

Sajibn Kundu

The rapid growth of virtualized data centers and cloud hosting services is making the management of physical resources such as …

Read More
xiaokang_qiu

Automatic Verification Techniques for Heap-Manipulating Programs

Xiaokang Qiu

Reliability is critical for system software, such as OS kernels and mobile browsers, as well as applications such as office …

Read More
PastedGraphic-1

An Overview of Virtualization and Private Cloud Technologies at Ultimate Software

John Machado

The speaker will be discussing the latest technologies and trends with Cloud Computing, specifically focusing on the below 4 subjects. …

Read More
zhengli

Towards Next Generation Vertical Search Engine

Li Zheng

As the Internet grows exponentially every year, information on the Web has been explosively increasing and the volume of unstructured …

Read More
qian

Scalable and Flexible Bulk Architecture

Xuehai Qian

To help parallel computing become mainstream, one of the main design considerations for multicore architectures should be support for programming …

Read More
barbara

Foundations of Quantitative Information Flow: Channels, Cascades and the Composition Refinement Order

Barbara Espinoza

Theories of quantitative information flow offer an attractive framework for analyzing confidentiality in practical systems, which often cannot avoid small …

Read More
su-liu-1

Formal Modeling and Analysis of High Level Petri Nets

Su Liu

Today, hardware and software systems are widely used in applications where failure is unacceptable: electronic commerce, telephone switching networks, highway …

Read More
fchen

Systems Design, Optimization and Implementation for Differentiated Qualities of Storage Services

Feng Chen

As rapid advancement of storage R&D, storage technologies have become increasingly diverse (e.g., hard drives, SSDs, and non-volatile memory), which …

Read More
JuanCarlosMartinezPhoto

Discovery and Prediction of Repeated Mutations in Genomic Sequences

Juan Carlos Martinez

In academia as well as in industry, there have been a lot of efforts on developing computer algorithms to aid …

Read More
Photo_HengJi

Capturing Global Coherence for Cross-source Information Extraction

Heng Ji

Information Extraction (IE) is a task of identifying Ì¢??factsÌ¢?å, such as the attack/arrest events, people’s jobs, people’s whereabouts, merger and …

Read More
wdong

Turning data into data products and essential social sciences = tools using human dynamics models

Wen Dong

The future of both the computational social sciences and consumer electronics lies in an understanding of the “data exhaust trails” …

Read More
small

A Cloud Services Marketplace for Cloud Service Acquisition

Yexi Jiang

Cloud services marketplace (CSM) is an exploratory project aiming to provide Ì¢??an AppStore for ServicesÌ¢?å. It is an intelligent online …

Read More
Leonardo-Bobadilla

Minimalist Multi-Agent Filtering and Guidance

Leonardo Bobadilla

This talk presents methods for solving fundamental robotics tasks such as navigation, patrolling, coverage, and tracking without system identification, geometric …

Read More
Zheng_Cui_640

A Generalized Adaptive Mathmatical Morphological Filter For Lidar Data

Zheng Cui

LIDAR (Light Detection And Ranging) is a widely used remote sensing technology to measure terrain properties and topographic mapping nowadays. …

Read More
elena1

Lower Bounds for Statistical Algorithms

Dr. Elena Grigorescu

We introduce a framework for proving lower bounds on computational problems over distributions, based on defining a restricted class of …

Read More
Untitled

Dynamic Capacity Management for Multi-Tier Data Centers

Anshul Gandhi

data center infrastructures. A primary goal for these service providers is to meet certain response time Service Level Agreements (SLAs). …

Read More
av_DSC0556

A Trace-driven Analysis of Solid-State Caching in Cloud Computing Systems

Dulcardo Arteaga

Distributed storage systems (e.g., SAN, iSCSI) are commonly used in the emerging cloud computing systems to provide virtual machine (VM) …

Read More
OLYMPUS DIGITAL CAMERA

Digital Identity Protection – Concepts and Issues

Elisa Bertino

Digital identity management (DIM) has emerged as a critical foundation for supporting successful interaction in today’s globally interconnected society. It …

Read More
su_liu-1

Verify High Level Petri nets via Satisfiability Modulo Theories

Su Liu

Today, hardware and software systems are widely used in applications where failure is unacceptable: electronic commerce, telephone switching networks, highway …

Read More
Radu

An agenda for context-dependent visualization at FIU

Dr. Radu Jianu

This talk will lay out a research agenda for upcoming work on data visualization at Florida International University. The unifying …

Read More
IMAG0382

Scaling up Spatial Set-Similarity Joins

Jaime Ballesteros

Spatial set-similarity joins on two geospatial datasets finds pairs of records that are simultaneously similar on nonspatial(textual) and spatial attributes. …

Read More
jezequel

Hyper-Agility: Handling Variability at Runtime

Jean-Marc Jezequel

Hyper-agility can be defined as the transposition of the Agile Manifesto at runtime to obtain systems able to adapt automatically …

Read More
JuanCarlosMartinezPhoto

Towards the Prediction of Repeated Mutations in Genomic Sequences

Juan Carlos Martinez

In academia as well as in industry, there have been a lot of efforts on developing computer algorithms to aid …

Read More

Working at and Collaborating with the Air Force Research Labs

Dr. Timothy S. Kroecker

In this talk, Dr. Kroecker will present an overview of the Air Force Research Lab – Information Directorate and its …

Read More
jingxuanli

Mining the Online Social Network Data: Influence, Summarization, and Organization

Jingxuan Li

The users and contents in the social media have attracted much research attention. However, due to the large-scale property of …

Read More
Seon_Kim

Techniques for Optimization-Based MPS Applications for a Large Size of Manufacturing Systems

Dr. Seon Ki Kim

The semiconductor industry has one of the most complex manufacturing systems for building CPU processors, chipsets, network cards, flash memory, …

Read More
Miguel-Erazo

Leveraging Symbiotic Relationship for Emulation and Simulation of Computer Networks

Miguel A. Erazo

The lack of analytical models that can accurately describe large-scale networked systems makes empirical experimentation indispensable for understanding complex behaviors. …

Read More
Miguel-Erazo

Leveraging Symbiotic Relationships for Emulation of Computer Networks

Michael Erazo

Research on network testbeds has made steady progress. Physical testbeds, such as PlanetLab, provide realistic network environments for testing network …

Read More
Abanerjee

Flexible Confidentiality Policies and their Modular Enforcement

Anindya Banerjee

To obtain guarantees that an application program conforms to security policies, techniques based on programming language semantics, program logics and …

Read More
barbara

Min-entropy Leakage of Channels in Cascade

Barbara Espinoza

Theories of quantitative information flow offer an attractive framework for analyzing confidentiality in practical systems, which often cannot avoid “small” …

Read More
Mani

Approaches to Provisioning Network Topology of Virtual Machines in Cloud Systems

Mani Shafaatdoost

The current infrastructure as a service (IaaS) cloud systems, allow users to load their own virtual machines. However, most of …

Read More
babich

Adaptive Software Fault Prediction Approach Using Object-Oriented Metrics

Djuradj Babic

As users continually request additional functionality, software systems will continue to grow in their complexity, as well as in their …

Read More
chaoshen

Comparative Summarization of Document Sets

Chao Shen

Multi-document summarization is a well-studied topic in text mining, aiming to distill the most important information from a set of …

Read More
marek

Cyber (In-)Security in SCADA Networks (with a Case Study)

Dr. Marek Rusinkiewicz

In this talk, I will describe the infamous Stuxnet Trojan, which was used to penetrate and sabotage an industrial control …

Read More
Jing_xu

Enabling Autonomic Management in Virtualized Datacenter/Cloud Environment

Dr. Jing Xu

Virtualization has revolutionized the way that computing infrastructure is abstracted and used, and it is a key enabling technology of …

Read More
mahmudur

Private Location Centric Profiles for GeoSocial Networks

Mahmudur Rahman

Providing input to targeted advertising, profiling social network users is an important source of revenue for geosocial networks. Since profiles …

Read More
hao_jin

VM Placement with Multiple Deterministic and Stochastic Resources in Data Centers

Hao Jin

Virtual machines (VMs) may signiÌøåÂåcantly improve the efÌøåÂåciency of the data center infrastructure by sharing resources of physical servers. This …

Read More
david_villegas

Interoperable Resource Brokering with Policy-based Provisioning and Job Allocation

David Villegas

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing …

Read More
FIU_logo

What can the FIU Libraries do for you?

Patricia Pereira-Pujol

The FIU Libraries offer many services and research resources to the FIU community, however many faculty and students are not …

Read More
photo

Optimizing System Monitoring Configurations for Non-Actionable Alerts

Liang Tang

Today’s competitive business climate and the complexity of IT environments dictate efficient and cost effective service delivery and support of …

Read More
ballesteros

Safe Cities. A Participatory Sensing Approach

Jaime Ballesteros

Smart cities combine technology and human resources to improve the quality of life and reduce expenditures. Ensuring the safety of …

Read More
carbunar

You Can Review But You Can’t Hide. Detecting Review Campaigns in Yelp

Bogdan Carbunar

The popularity and influence of reviews make geosocial networks (GSNs) ideal targets for malicious behavior. In this talk we focus …

Read More
reng_zeng

McPatom: A Predictive Analysis Tool for Atomicity Violation using Model Checking

Reng Zeng

Multi-thread programs are prone to bugs due to concurrency. Concurrency bugs are hard to find and reproduce because of the …

Read More
Lei-Li

A generalized framework for reciprocal recommendation

Lei Li

Recommender systems have been intensively studied in both academia and industry, following a paradigm of providing a target user with …

Read More
Xin

Modeling Complexity of Enterprise Routing Design

Xin Sun

Enterprise networks often have complex routing designs given the need to meet a wide set of resiliency, security and routing …

Read More
Lixi2

Application- aware Cross-layer Virtual Machine Resource Management

Lixi Wang

Existing resource management solutions in datacenters and cloud systems typically treat VMs as black boxes when making resource allocation decisions. …

Read More
Geoffrey

Measuring information leakage using min-entropy and g-leakage

Geoffrey Smith

A fundamental issue in security is to prevent computer systems from leaking confidential information, whether maliciously or accidentally. While it …

Read More
Nisha

Implications of Non Volatile Memory on Software Architectures

Nisha Talagala

Flash based non volatile memory is revolutionizing data center architectures, improving application performance by bridging the gap between DRAM and …

Read More
jingxuanli

Social influence interpretation and a dynamic prediction model

Jingxuan Li

Identifying influential users and predicting their network impact on social networks have attracted tremendous interest from both academia and industry. …

Read More
pand

Fine-Grained and Accurate Bandwidth Provisioning for OpenFlow Networks

Deng Pan

Flow-level bandwidth provisioning achieves fine-grained bandwidth assurance for individual flows. It is especially important for virtualization based computing environments such …

Read More
FIU

Improving Caches in Consolidated Environments

Ricardo Koller

Memory (cache, DRAM, and disk) is in charge of feeding data and instructions to a computer.s processor. In order to …

Read More
FIU

Optimizing Storage and Memory Systems for Energy and Performance

Luis Useche

Electrical energy is an essential resource for the modern world. Unfortunately, its price has almost doubled in the last decade. …

Read More
FIU

Improving Storage with Stackable Extensions

Jorge Guerra

Storage is a central part of computing. Driven by exponentially increasing amount of content being generated and a widening performance …

Read More
FIU

Affect-based Modeling and its Application in Multimedia Analysis Problems

Abhishek Bhattacharya

The multimedia domain is undergoing a rapid development phase with various audio, image video systems ranging from 2D to 3D …

Read More
mit_logo

Local Computation Algorithms

Ning Xie

For input $x$, let $F(x)$ denote the set of outputs that are the “legal” answers for a computational problem $F$. …

Read More
Honggang

Online Social Networking and Data Swarming — Information Sharing in the Future Internet

Honggang Zhang

Online Social Networking (OSN) and Peer-to-Peer (P2P) Data Swarming (i.e., file sharing and media streaming) have emerged as the two …

Read More
Mani

Integration VL (Virtual Lab) of FIU and VCL (Virtual Computing lab) of NCSU

Mani Shafaatdoost

There is an IT-automation course at FIU that allows students to have multiple computers connected to each other via pre-defined …

Read More
Gabriel

Applying Modelling and Simulation for Development and Testing of Embedded Systems

Gabriel A. Wainer

Embedded real-time software construction has usually posed interesting challenges due to the complexity of the tasks executed. Most methods are …

Read More
david_villegas

Coordinated task and resource sharing in federations of virtual infrastructure

David Villegas

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to geographical …

Read More
jelena

Automatic Design and Optimization of Embedded Computing Platforms

Dr. Jelena Trajkovic

The stringent performance constraints on application software continue to grow, particularly in the embedded and mobile computing domains. Conventional processors …

Read More
samar

Model Automation for Embedded System Design

Samar Abdi

The rising computation requirements of modern embedded applications, such as in multimedia, automotive and healthcare domains, have posed new challenges …

Read More
LixWang

Fuzzy Modeling and Control Based Virtual Machine Resource Management

Lix Wang

Virtual machines (VMs) are powerful platforms for building agile datacenters and emerging cloud systems. In such a virtualized system, applications …

Read More
FranciscoOrtega

3D Navigation using Multi-Touch 2D Surfaces

Francisco Ortega

With the pervasive use of the keyboard and the mouse, the Windows-Icon-Menu-Pointer (WIMP) interaction framework has been the most successful …

Read More
julia

Information Discovery in Large Complex Datasets

Julia Stoyanovich

The focus of my research is on enabling novel kinds of interaction between the user and the information in a …

Read More
yiqi

vPFS – Performance Virtualization of Parallel Storage System

Yiqi Xu

There remains an inadequacy in parallel file system performance management approaches to support the allocation of shared storage resources on …

Read More
yaoliu

Building a Security Foundation for Emerging Wireless Technologies

Yao Liu

The security of wireless systems is becoming increasingly important as wireless devices are more and more pervasive and adopted in …

Read More
nate

Towards Simulation and Emulation of Large-Scale Computer Networks

Nathanael Van Vorst

Developing analytical models that can accurately describe behaviors of Internet-scale networks is difficult. This is due, in part, to the …

Read More
maryam

Systematic Optimization of Search Engines for Difficult Queries

Maryam Karimzadehgan

Search engines have now become essential tools in all aspects of our life. Although a variety of information needs can …

Read More
Sajib_Kundu

Improving Resources Management in Virtualized Data Centers Using Application Performance Models

Sajib Kundu

The rapid growth of virtualized data centers and cloud hosting services is making the management of physical resources such as …

Read More
seidel

The Data and Compute-Driven Transformation of Modern Science

Edward Seidel

We all know that modern science is undergoing a profound transformation as it aims to tackle the complex problems of …

Read More
wei_zeng

Ricci Curvature Flow for General Shape Registration and Geometric Analysis

Wei Zeng

Ricci flow has been successfully applied in the proof of Poincare.s conjecture, which deforms the Riemannian metric proportionally to the …

Read More
vince_mccoy

Simulating Quantum Collisions

Vince McKoy

Experiments have shown that even very slow electrons can break DNA strands. This surprising result suggests that the electrons are …

Read More
IM000466.JPG

SymbioSim: Leveraging Symbiotic Relationships Towards Scalable Network Emulation Experiments

Miguel A. Erazo

Considerable efforts have been invested in the last decade to build testbeds for developing and testing new protocols and applications. …

Read More
FIU

Designing Motion Gestures for Mobile Interaction

Jaime Ruiz

Hand motion — pointing, gesturing, grasping, shaking, tapping — is a rich channel of communication. We point and gesture while …

Read More
Yang_Song

Distributed Algorithm Design for Combinatorial Optimization Problems: A Game Theoretic Approach

Yang Song

Combinatorial optimization arises in many important network design and resource allocation problems. However, most solutions to solve combinatorial optimization are …

Read More
wei_gao

Social-Aware Data Dissemination in Opportunistic Mobile Networks

Wei Gao

Opportunistic mobile networks consist of mobile devices spanning smartphones, vehicles, and medical devices, and are the network paradigm of mobile …

Read More
RafaPhoto

Positive Computing: How can technology support wellbeing?

Dr. Rafael Calvo

Digital technologies have made their way into all the aspects of our lives that, according to psychology, influence our wellbeing …

Read More
Ting

A Fluid Background Traffic Model

Ting Li

Background traffic has a significant impact on the behavior of network services and protocols. However, a detailed model of the …

Read More
jianu

Improved Scientific analysis through Domain Driven Visualization and Support for Analytic Deliberation

Radu Jianu

Data visualization explores how to represent data graphically in order to leverage the ability of our visual system to extract …

Read More
mary_wheeler

High Performance Computing and Computational Science Applications

Mary Fanett Wheeler

The research of the Center for Subsurface Modeling (CSM) addresses the growing use of computers to simulate physical events and …

Read More
Ren

Managing Batch Services in Heterogeneous Data Centers

Shaolei Ren

With the emergence of cloud computing, there has been a growing trend toward large-scale data centers, each housing tens of …

Read More
moshe_vardi

And Logic Begat Computer Science: When Giants Roamed the Earth

Moshe Y. Vardi

During the past fifty years there has been extensive, continuous and growing interaction between logic and computer science. In fact, …

Read More
zhengli

Applying Data Mining Techniques to Address Disaster Information Management Challenges

Li Zheng

Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A …

Read More
fausto

An Efficient Multimedia Indexing Structure for Similarity Queries

Fausto C. Fleites

Tree-based index structures have been used in the area of multimedia retrieval to support efficient retrieval through similarity queries, more …

Read More
nate

Integrating network simulation and emulation in GENI

Nathanael Van Vorst

Developing analytical models that can accurately describe behaviors of Internet-scale networks is difficult. This is due, in part, to the …

Read More
jack_dongarra

On The Future of High Performance Computing: How To Think for Peta and Exascale Computing

Jack Dongarra

In this talk we examine how high performance computing has changed over the last 10-year and look toward the future …

Read More

Intelligent Personal Health Record

Gang Luo

Web-based personal health records (PHRs) are under massive deployment. To improve PHRÌ¢‰â‰ã¢s capability and usability and provide users with personalized …

Read More
terremark

Intrusion Suppression – A Different Approach to Threat Management and Mitigation

Christopher Day

Terremark designs its security systems, operations, and incident response capabilities around the concept of “intrusion suppression”. The central tenet of …

Read More
konstantin_beznosov

On the Feasibility, Effectiveness, and Implications of Socialbot Nets

Dr. Konstantin Beznosov

Online Social Networks (OSNs)have become an integral part of today’s Web. Politicians, celebrities, revolutionists, and others use OSNs as a …

Read More
SONY DSC

Storage Resource Management: From Hosts to Clusters to Cloud

Dr. Ajay Gulati

In this talk, I will present our last 5 year journey at VMware on building storage management and QoS features …

Read More
Sion

The Economics of Cloud Computing OR Why a Brooklyn Latte buys a million unforgeable signatures.

Radu Sion

In this talk we explore the economics of technology outsourcing in general and cloud computing in particular. We identify cost …

Read More

Static Analysis Based Invariant Detection for Commodity Operating Systems

Dr. Jinpeng Wei

As the most critical program on a computer, Operating Systems must maintain high integrity. Runtime attestation has emerged as a …

Read More

Scaling Geospatial Searches in Large Spatial Databases

Ariel Cary

Modern geographical databases store a rich set of aspatial attributes in addition to geographic data. Retrieving spatial records constrained on …

Read More

A Large-scale Dynamic Vector and Raster Data Visualization Geographic Information System based on Parallel Map Tiling

Huan Wang

With the exponential increasing demands and uses of GIS data visualization system, such as urban planning, environment and climate change …

Read More
mladen_vouk

From Grid to Cloud: the VCL Journey

Prof. Mladen A. Vouk, Associate Vice-Provost for Information Technology

Apache Virtual Computing Laboratory (VCL) cloud computing technology was developed by NC State University in collaboration with IBM. It offers …

Read More
DIGITAL CAMERA

Towards a Semantic-based Technique for Verifying the Matching of Software Components

Edgar Castillo-Barrera

The goal of Component-Based Software Engineering (CBSE) is the development of systems which are an assembly of pre-fabricated software components. …

Read More
108_MJB

Software Oriented Patents

Michael Buchenhorner, P.A.

Mr. Buchenhorner shall present and discuss a broad range of relevant case law that has shaped software oriented patents at …

Read More
DCF 1.0

Design and Implementation of Scalable Distributed Systems for Big Data Analytics

Dr. Xiaodong Zhang

A critical challenge we are facing today in the society is how to effectively respond the massive and quick online …

Read More
liux

Can We Really Model the Internet?

Dr. Jason Liu

Modeling and simulation is an effective method for studying network protocols and applications. It is capable of capturing detailed operations …

Read More

Futures in Brain-Machine Interfaces: System and Computing Design Strategies

Dr. Justin C. Sanchez

Closed-loop neural interfaces have the great potential for treating neurological disorders and restoring communication/control in disabled individuals. The transformative aspect …

Read More

Personalized Medicine

Dr. Yaacov Yesha and Dr. Yelena Yesha

Personalized Medicine is the systematic use of individual patientÌ¢‰â‰ã¢s information to optimize patientÌ¢‰â‰ã¢s therapeutic care and diagnosis process. Information about …

Read More

Spanners: Toward Designing Efficient Communication Networks

Dr. Giri Narasimhan

Designing networks with Ì¢‰âÒgoodÌ¢‰âÂå properties is an important problem. Ì¢‰âÒSpanner networksÌ¢‰âÂå were defined to describe and study good networks. Desirable …

Read More

A Formal Framework for Software System Modeling, Analysis and Realization

Dr. Xudong He

Software is playing an essential role in the functioning of our society. Many software systems are often mission and safety …

Read More

Infiltration Attacks in Online Social Networks

Dr. Bogdan Carbunar

Online Social Networks (OSNs) have become ubiquitous in the past few years, counting hundreds of millions of people as members. …

Read More

Toward Virtual Characters for Health Promotion

Dr. Christine Lætitia Lisetti

Western healthcare interest has recently started to move toward finding ways of preventively promote wellness, rather than to solely treat …

Read More

Caterpillar Scholars 2011

Caterpillar

Caterpillar Scholars 2011 Total amount: $2,500.00 Criteria: 2.8/4.0 GPA or greater Sophomore level ,or above Full time undergraduate students Mechanical/ …

Read More

A Domain-Specific Modeling Approach for Coordinating User-Centric Communication Services

Yali Wu

Major Professor: Dr. Peter J. Clarke

Read More

Quantitative Information Flow and its Relation with Differential Privacy

Catuscia Palamidessi, Ph.D.

One of the concerns in the use of computer systems is to avoid the leakage of secret information through public …

Read More

SeerSuite: Enterprise Search and Cyberinfrastructure for Science and Academia

Lee Giles

Cyberinfrastructure or e-science has become crucial in many areas of science as data access often defines scientific progress. Open source …

Read More

Automating Software Evolution through Model-Driven Engineering

Jeff Gray, Associate Professor

Model-Driven Engineering (MDE) represents a design approach that enables description of the essential characteristics of a problem in a manner …

Read More

Change-effects Analysis for Effective Testing and Validation of Evolving Software

Raul Santelices

Software is constantly modified during its life cycle, posing serious risks because changes might not behave as expected or might …

Read More

Lessons from Wearable Computing and Beyond

Dr. Daniel Siewiorek

The confluence of decades of computer science and computer engineering research in multi-modal interaction such as speech and gesture recognition; …

Read More

Abstractions to Support Dynamic Adaptation of Communication Frameworks for User-centric Communication

Andrew A. Allen

Major Professor: Dr. Peter J. Clarke

Read More