Student Recognitions
Graduate Conference Winners and Student publication recognitionMay 7, 2010
Best Presentation: Justin Fincher, "A Computational Exploration of Gene Regulation by Nucleosome Position"
Best Presentation Honorable Mention: C. Matthew Weir, "Overview of Password Cracking Research"
Best Initial Results: Jonathan Jenkins, "Wireless Route Discovery"
Best Application: Arturo Donate, "Extracting 3D Features from 2D Videos"
Best Undergraduate Research: "Patrick Dwyer - MDMAP: Email based online Phishing"
Best Theory: Mark Stanovich, "Theoretical Analysis in Real-time Systems"
Best Theory Honorable Mention: Samidh Chatterjee, "Geometric Minimum Spanning Trees with GeoFilterKruskal"
Student publications can be seen at
http://www.cs.fsu.edu/~awang/pub.html.
Zhenghao Zhang, Steven Bronson, Jin Xie and Wei Hu, Employing the One-sender-multiple-receiver Technique in Wireless LANs, Proceedings of IEEE Infocom’10, March 2010.
Zhenghao Zhang and Steven Bronson, A Packet Scheduling Algorithm for Optimizing Downlink Throughput in Wireless LANs with the One-sender-multiple-receiver Technique, Proceedings of Globecom’09, December 2009.
Daniel Chang, Stephen Hines, Paul West, Gary Tyson, and David Whalley, Program Differentiation, Proceedings of the Workshop on Interaction between Compilers and Computer Architecture (INTERACT), March 2010.
Stephen Hines, Yuval Peress, Peter Gavin, David Whalley, Gary Tyson, Guaranteeing Instruction Fetch Behavior with a Lookahead Instruction Fetch Engine, Proceedings of the ACM Conference on Languages, Compilers, and Tools for Embedded Systems, June 2009.
Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan, Incorporating Accountability into Internet Email, Journal of Digital Forensic Practice, 2(4):209-220, 2009.
Sudhir Aggarwal, Zhenhai Duan, Faye Jones, and Wayne Liu, Trust-Based Internet Accountability: Requirements and Legal Ramifications, Journal of Internet Law, 11(10):3-26, April 2010.
Xin Yuan, Wickus Nienaber, Zhenhai Duan, and Rami Melhem, Oblivious Routing in Fat-Tree Based System Area Networks with Uncertain Traffic Demands, IEEE/ACM Transactions on Networking, 17(5):1439-1452, October 2009.
Fernando Sanchez, Zhenhai Duan, Region-based BGP Announcement Filtering for Improved BGP Security. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2010. (Acceptance Rate: 15% (25/166))
Fernando Sanchez, Zhenhai Duan, Yingfei Dong, An Accurate and Efficient Email Traceback Framework for E-Crime Investigation. Proceedings of 2009 ARO Workshop on Digital Forensics, September 2009.
Matthew Small and Xin Yuan, Maximizing MPI Point-to-Point Communication Performance on RDMA-enabled Clusters with Customized Protocols, Proceeding of the 23th ACM International Conference on Supercomputing (ICS), June 2009.
Mark Stanovich, Theodore Baker, An-I Andy Wang, and Michael Gonzalez Harbour, Defects of the POSIX Sporadic Server and How to Correct Them. Proceedings of the 16th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), April 2010.
Bo Sun and Zhenghao Zhang, Probabilistic Diagnosis of Link Loss Using End-to-end Path Measurements and Maximum Likelihood Estimation, Proceedings of IEEE International Conference on Communications (ICC), June 2009. Best Paper Award.
Matt Weir, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek, Password Cracking Using Probabilistic Context Free Grammars, Proceedings of the 30th IEEE Symposium on Security and Privacy, May 2009.
Haohai Yu and Robert van Engelen, Arc Refractor Methods for Adaptive Importance Sampling on Large Bayesian Networks under Evidential Reasoning, accepted for publication in the International Journal of Approximate Reasoning, 2009.
Yanan Yu and Ashok Srinivasan, Dynamic Iterations for the Solution of Ordinary Differential Equations on Multicore Processors, Proceedings of the 23rd International Parallel and Distributed Process
