Colloquia 2013
October
Ryan Layer - Tuesday, October 8, 2013 Efficient Genomic Interval Intersection Algorithms
David Luebke - Tuesday, October 1, 2013 Near-Eye Light Field Displays
September
Sudeep Ghosh - Thursday, September 26, 2013 Software Protection via Composable Process-level Virtual Machines
July
Chih-hao Shen - Tuesday, July 23, 2013 Efficient Secure Two-Party Computation against Malicious Adversaries
Chris Greenwood - Tuesday, July 16, 2013 KinSpace: Obstacle Detection via Kinect
Luther Tychonievich - Monday, July 1, 2013 Providing Guaranteed Behaviors for Groups of Low-Capability Mobile Agents
June
Chenguang Xu - Friday, June 28, 2013 Two-way Data Exchange in Satellite Communication
May
Philip Asare - Friday, May 31, 2013 Enabling Patient Safety Analysis of Sense-Only Wearable Medical Body Sensor Networks
Liliya Besaleva - Friday, May 17, 2013 CrowdHelp: a Crowdsourcing Application for Improving Disaster Management
Luyao Jiang - Thursday, May 16, 2013 Accelerating Reliability Simulation of NAND-Flash Based Solid State Drives
Yuchen Zhou - Wednesday, May 15, 2013 Improving security and privacy of integrated applications using behavior-based approaches
Adam Brady - Wednesday, May 1, 2013 Synthesizing Novel Reflectance Functions with Genetic Programming
Ashwin Raghav Mohan Ganesh - Wednesday, May 1, 2013 A Scalable Application-level Distributed Filesystem Notifications Solution
Zhengyang Liu - Wednesday, May 1, 2013 On causes of GridFTP transfer throughput variance
April
Hamid Bagheri - Friday, April 26, 2013 Synthesis from Formal Partial Abstractions
Erin Griffiths - Friday, April 26, 2013 Room-level Localization of Individuals by Height for Smarthome Applications
Md. Anindya Prodhan - Friday, April 26, 2013 A Smarter Water Heater to Cool Down Your Energy Bill
Michael Boyer - Wednesday, April 24, 2013 Rate Matching to Improve the Performance and Energy Efficiency of GPU Systems
Claire Le Goues - Monday, April 22, 2013 Automatic Program Repair Using Genetic Programming
Jure Leskovec - Monday, April 22, 2013 Data Mining Massive Online Social Networks
Juhi Ranjan - Monday, April 22, 2013 RF Doormat - Room-level tracking of residents in homes using RFID
Shahriar Nirjon - Friday, April 19, 2013 A General-Purpose, Energy-Efficient, and Context-Aware Acoustic Event Detection Service for Smartphones
Karolina Sarnowska-Upton - Friday, April 19, 2013 Methods Toward Automatic Configuration of Computing Environments for Application Execution
Yamina Shams - Wednesday, April 17, 2013 Evaluating the Effect of Sensor Placement on Automated Sensor-Map Generation in Smart Homes
Yisong Yue - Monday, April 15, 2013 Learning with Humans in the Loop
Prateek Mittal - Friday, April 12, 2013 Trustworthy Communications Using Network Science
Roger W. Baker, Assistant Secretary for Information and Technology for the Department of Veterans Affairs - Thursday, April 11, 2013 Protecting One of the Nation's Largest IT Infrastructures
Grey Ballard - Friday, April 5, 2013 Avoiding Communication in Linear Algebra
Yanjun Qi - Wednesday, April 3, 2013 Machine Learning for Big Data in Biomedicine
Mohammad Mahmoody - Monday, April 1, 2013 On Tamper-Resilient Cryptography
March
Wei Wang - Thursday, March 28, 2013 Addressing Processor Over-provisioning on Contemporary Multi-core Platforms
Stefano Tessaro - Wednesday, March 27, 2013 Theoretical Foundations for Applied Cryptography
Xia Zhou - Monday, March 25, 2013 Network Design in the Big-Data Age
Huijia (Rachel) Lin - Friday, March 22, 2013 Concurrent Security
Connelly Barnes - Wednesday, March 20, 2013 Mid-level Image Editing with PatchMatch
Andy Pavlo - Monday, March 18, 2013 Everything I Know About Fast Databases I Learned at the Dog Track
Tianhao Tong - Monday, March 18, 2013 GuarDroid: Guarding Your Password from Untrusted Smartphone Apps
John Paisley - Monday, March 4, 2013 Bayesian Nonparametric Models and "Big Data"
Dan Feldman - Friday, March 1, 2013 Learning patterns in big data from small data using core-sets
February
Daniel Dougherty - Tuesday, February 12, 2013 Transaction Logging for Automated and Proactive Fault Management
January
Tanima Dey - Monday, January 28, 2013 Addressing Performance and Reliability in Multi-core Architectures via Effective Thread-mappingEnamul Hoque - Tuesday, January 22, 2013 Realism in Activity Recognition for Long Term Sensor Networks Deployments
Samee Zahur Al Islam - Monday, January 21, 2013 Circuit Structures for Improving Efficiency of Security & Privacy Tools
Ben Rodes - Friday, January 18th, 2013 Towards Establishing Desired Properties in Software of Unknown Provenance
Colloquia 2012
December
Matthew Yu - Wednesday, December 19th, 2012 A Wrinkle in the Active Appearance ModelHamid Bagheri - Monday, December 17th, 2012 Synthesis from Formal Partial Abstractions
Zachary Fry - Wednesday, December 12th, 2012 Leveraging Light-Weight Analyses to Aid Software Maintenance
Chih-hao Shen - Thursday, December 6th, 2012 Efficient Two-Party Secure Computation against Malicious Adversaries
Ming Mao - Tuesday, December 4, 2012 Cloud Auto-Scaling with Deadline and Budget Constraints
Saad Arrabi - Monday, December 3, 2012 Designing Vertically Integrated Dynamically Configurable Systems
November
Mona Sergi - Friday, November 30, 2012 New Designs of Encryption Schemes
October
Muhammad Nur Yanhaona - Wednesday, October 24, 2012 An Agent-Based Distributed Monitoring Framework
September
Jeffrey Brantley - Friday, September 14, 2012 Body Sensor Design for Unattended, Untethered DeploymentAvinash Kalyanaraman - Wednesday, September 5, 2012 Efficient Data Management in the Global Federated Filesystem
August
Taniya Siddiqua - Wednesday, August 29, 2012 A Multi-Level Approach to NBTI Mitigation in Processors
July
Huang Yan - Monday, July 30, 2012 Practical Secure Two-Party ComputationMichael Skalak - Monday, July 30, 2012 Intelligently Searching Large Patent Databases
Shuai Che - Thursday, July 26, 2012 Understanding and Optimizing the Performance of Heterogeneous Systems
June
Ross Gore - Thursday, June 28, 2012 Fault Localization for Exploratory SimulationsJing Yang - Tuesday, June 26, 2012 Trace-Based Dynamic Binary Parallelization
May
Kirti Chawla - Wednesday, May 30, 2012 Object Localization Using RFIDSriram Sankar - Tuesday, May 29, 2012 Impact of Datacenter Infrastructure on Server Availability Characterization, Management and Optimization
Tamim Sookoor - Thursday, May 24, 2012 Application Development for Cyber-Physical Systems: Programming Language Concepts and Case Studies
Chris Gregg - Wednesday, May 23, 2012 A Data and Contention Aware Approach to Dynamic Scheduling for Heterogeneous Processors
Daniel Williams - Tuesday, May 15, 2012 Persistent Storage for Program Metadata
Robbie Hott - Friday, May 11, 2012 KD-Tree Algorithm for Propensity Score Matching
Mona Sergi - Monday, May 7, 2012 New Designs of Encryption Schemes
Hui Shu - Friday, May 4, 2012 Implementing Super-Resolution Ultrasonic image Reconstruction Using Matlab on the GPU
Ge Gao - Friday, May 4, 2012 Social Decision Networks in Software Engineering
Kristen Walcott-Justice - Tuesday, May 1, 2012 Testing in Resource-Constrained Environments
Xiaoyuan Wang - Tuesday, May 1, 2012 Defeating Malware Obfuscation by Application Level Virtualization
April
Lingjia Tang - Friday, April 27th, 2012 Mitigating Resource Contention in Warehouse Scale Computers
Zhiheng Xie - Wednesday, April 25th, 2012 Decentralized Infrastructure-free Accurate Collaborative Localization for
Firefighters
Jason Mars - Thursday, April 26, 2012 Rethinking the Architecture of Warehouse-Scale Computers
Xiang Yin - Tuesday, April 24, 2012 Echo: Practical Formal Verification by Reverse Synthesis
Michael Boyer - Wednesday, April 18, 2012 Dynamic Rate Matching in Heterogeneous Systems
Ray Buse - Tuesday, April 17, 2012 Automatically Describing Program Structure and Behavior
Pieter Hooimeijer - April 16, 2012 Decision Procedures for String Constraints
Arkaitz Ruiz Alvarez - April 16, 2012 Automated Data Management in Cloud Computing
Krasimira Kapitanova - Wednesday, April 11, 2012 Robust Real-Time Event Services in Wireless Sensor Networks
Joel Coffman - Tuesday, April 10, 2012 Creating Deployable Relational Keyword Search Systems
Jiawei Huang - Friday, April 6, 2012 A Digital System Design Methodology for Efficiency-Quality Tradeoffs Using Imprecise Hardware
March
Liang Wang - Friday, March 30, 2012 Mitigating Dark Silicon with Near-Threshold ComputingRyan Layer - Thursday, March 29, 2012 Binary Interval Search (BITS): A Massively Parallel Interval Intersection Algorithm
Michelle McDaniel - Friday, March 16, 2012 Assessing the Opportunities for Reactive Code Alignment
February
Ben Rodes - Tuesday, February 21, 2012 Diversification of Stack Layout in Binary Programs Using Dynamic Binary Translation
January
Yafeng Wu - Wednesday January 25, 2012 Reliability Solutions in Wireless Sensor NetworksNathanael Paul, Oak Ridge National Labs / University of Tennessee - Monday, January 23, 2012 Trustworthy Systems from (Un)trusted Components
Benjamin Kreuter - Monday, January 9, 2012 Efficient use of Hybrid Symmetric/Fully Homomorphic Encryption
Colloquia 2011
December
Vijay Srinivasan - Wednesday, December 21, 2011 Non-Invasive Sensor Solutions for Activity Recognition in Smart HomesTaniya Siddiqua - Tuesday, December 20, 2011 A Multi-Level Approach to Processor and Memory Reliability
Colin Braley- Wednesday, December 7, 2011 Multispectral Camera Calibration for Image Based BRDF Acquisition
Sriram Sankar- Monday, December 12, 2011 Impact of Temperature on Hard Disk Drive Reliability in Large Datacenters
Duane Merrill- Friday, December 2, 2011 Allocation-oriented Algorithm Design for GPU Computing
November
Ming Mao- Tuesday, November 22, 2011 Cloud Auto-Scaling with Deadline and Budget ConstraintsJiakang Lu - Monday, November 21, 2011 A Convenient and Inexpensive Sensing System for Improving the Energy Efficiency of Heating, Cooling, and Lighting in Homes
October
Timothy Hnat - Friday, October 28, 2011 Infrastructure-based Occupant Localization for Indoor Home EnvironmentsGreg Faust - Thursday, October 27, 2011 A DNA Alignment Tool for Structural Variation Detection
Qiang Li - Tuesday, October 25, 2011 Reliable Multi-Body, Multi-Function Body Sensor Networks
September
Clint Smullen - Thursday, September 15, 2011 Designing Giga-scale Memory Systems with STT-RAM
August
Wei Wang - Wednesday, August 24, 2011 Performance Analysis of Thread Mappings with a Holistic View of the Hardware ResourcesRobert Dickerson - Tuesday, August 16, 2011 System for the collection, Storage, Analysis, and Reporting of Objective and Subjective Behavorial Measures
Daniel Dougherty - Thursday, August 4, 2011 Workflow and Job Management on the Grid
July
Jeffrey Shirley - Monday, July 28, 2011 Mining User Action Policies to Control Program BehaviorDan Upton - Monday, July 11, 2011 Enabling Efficient Online Profiling of Homogeneous and Heterogeneous Multicore Systems
Hengchang Liu - Monday, July 11, 2011 Design and Implementation of an Automatic, Robust, and Efficient Breadcrumb Sensor Network
Sal Valente - Friday, July 1, 2011 Replicated Grid Resources
June
Hamid Bagheri - Monday, June 20, 2011, Architectural Style as a Separate Variable in Design
May
Abhishek Rawat - Tuesday, May 10, 2011, Accelerating Reliability Simulations for NAND Flash based Solid State DisksAleksander Morgan - Monday, May 9, 2011, Analysis of the Hidden Subset Sum problem
Ph.D. Qualifying Exam by Mario Marino - Monday, May 9, 2011, RFDRAM:Addressing DRAM I/O pad scalability using RF Coplanar Waveguides on the Same Package
Mario Marino Ph.D. Qualifying Exam - Monday, May 9, 2011, KOLF: Kirchhoff Optimal Localization Framework for Wireless Sensor Networks
William Burns - Thursday, May 5, 2011, The e-Commerce Sandbox: an Interactive Learning Tool with Real-Time Feedback
Sean Arietta - Tuesday, May 3, 2011, Early Experiences in Building and Using a Database of One Trillion Natural Image Patches
Aleksander Morgan - Monday, May 2, 2011, Analysis of the Hidden Subset Sum problem
April
Jeffery von Ronne - Friday, April 29, 2011, Early Analysis and Optimization of Java ProgramsPitchaya Sitthi-amorn - Wednesday, April 27, 2011, Methods for Optimizing Procedural Shaders in Interactive 3D Rendering Systems
Mona Sergi - Ph.D. Qualifying Exam Presentation - Tuesday, April 26, 2011, Threshold Fully Homomorphic Encryption and Secure Computation
Chih-hao Shen - PhD Qualifying Exam Presentation - Monday, April 25, 2011, Two-Output Secure Computation with Malicious Players
Tamal Saha - Monday, April 25, 2011, Extended Mediator-based Component Composition for Building Integrated Systems on the Web
Vidyabhushan Mohan - Ph.D. Qualifying Examination - Wednesday, April 20, 2011, Modeling NAND Flash Memory Reliability
Michael Spiegel - Monday, April 18, 2011, Cache-Conscious Concurrent Data Structures
Pitchaya Sitthi-amorn Seminar Presentation - Friday, April 15, 2011, Methods for Optimizing Procedural Shaders in Interactive 3D Rendering Systems
Michael Holroyd - Thursday, April 14, 2011, Methods for the Synchronous Acquisition of 2D Shape and Material Appearance
Jonathan McCune - Thursday, April 7, 2011, Firmware Integrity on Peripheral Devices???
Michael Spiegel - Monday, April 4, 2011, Cache-Conscious Concurrent Data Structures
March
Rahul Mangharam - Thursday, March 31, 2011, Closing the loop with Cyber-Physical ModelingSirajum Munir - Thursday, March 17, 2011, Addressing Burstiness for Reliable Communication and Latency Bound Generation in Wireless Sensor Networks
Xipeng Shen - Wednesday, March 16, 2011, Locality Enhancement and Dynamic Optimizations on Multicore and GPU A
S.M. Shahriar Nirjon - Wednesday, March 16, 2011, MultiNets: A System for Switching between Multiple Network Interfaces on Mobile Devices
Enamul Hoque - Monday, March 14, 2011, Monitoring Body Positions and Movements During Sleep using WISPs
Jing Yang - Wednesday, March 2, 2011, Dynamic Binary Parallelization
February
Daniel Williams - Friday, February 25, 2011, Persistent Storage for Program MetadataRicky Benitez - Thursday, February 24, 2011, Storage Challenges at Google
Hengchang Liu - Friday, February 18, 2011, Design and Implementation of an Automatic, Robust, and Efficient Breadcrumb Sensor Network
Lingjia Tang - Thursday, February 17, 2011, Compiling to Mitigate Contention for QoS
Gary McGraw - Thursday, February 10, 2011, Attack Trends 2011 -or- Why Software Security
Tanima Dey - Friday, February 4, 2011, Characterizing Multi-threaded Applications based on Shared-Resource Contention