Posters for the 2006 UNB Computer Science Research Expo

  1. Shrinkage on Decision Trees for Ranking, by Bin Wang and Huajie Zhang. An Adobe .pdf version of the abstract is available here.
  2. Adaptive Network Intrusion Detection System in Hardware, by Farnaz Gharibian, Junaid Khan and Ali Ghorbani. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  3. Communication in a System-on-Chip Virtual Machine, by Adam Baker and Ken Kent. An Adobe .pdf version of the abstract is available here.
  4. Design and Implementation of Reusable VHDL Template Components, Onoriode Ikede & Kenneth Kent.  An Adobe .pdf version of the abstract is available here.
  5. An Extensible Virtual Machine Using a Network-on-Chip Design, by Graham Mathias, Kenneth B. Kent.  An Adobe .pdf version of the abstract is available here.
  6. Approximate Autoregressive Modeling For Network Attack Detection, by Harshit Nayyar, Ali A Ghorbani.  An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  7. A Study of the Low-level Network Data, by Iosif-Viorel Onut and Ali A. Ghorbani.  An Adobe .pdf version of the abstract is available here.
  8. A Fast Decision Tree Learning Algorithm, by H. Zhang and J. Su.  An Adobe .pdf version of the abstract is available here.
  9. Modelling Critical Infrastructure Interdependencies Using Software Agents and the JADE Framework, by Gordie Noye. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  10. A Common Language Runtime Embedded Processor, by Joey C. Libby, Kenneth Kent. An Adobe .pdf version of the abstract is available here.
  11. Web Service Infrastructure for Mobile Web Mapping of Environmental, Health and Climate Change Data, by Bernd Kurz, Yuan Yao, Mei Jiang, Bing Ge, Eddie Oldfield. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  12. Similarity of Weighted Directed Acyclic Graphs, by Jing Jin, Harold Boley, Virendrakumar C. Bhavsar, Sushil K. Prasad, Biplab K. Sarker, Lu Yang. An Adobe .pdf version of the abstract is available here.
  13. Node-Weighted Trees for RNA Secondary Structures: Representation and Comparison, by Jing Jin, Biplab K. Sarker, Virendra C. Bhavsar, Harold Boley and Lu Yang. An Adobe .pdf version of the abstract is available here.
  14. Quality of Service Control Agent for an Enterprise Network, First Place poster award winner, by John M. DeDourek and Venkata Krishna, Tunga Baskararao. An Adobe .pdf version of the abstract is available here.
  15. Fast orthogonal k-d range search with large k, by Qingxiu Shi and Bradford G. Nickerson. An Adobe .pdf version of the abstract is available here.
  16. Parameter-Specific FPGA Implementation of Edit-Distance Calculation, by Ryan Proudfoot, Kenneth Kent, Yong Zhao. An Adobe .pdf version of the abstract is available here.
  17. High Performance Software/Hardware Network Intrusion Detection System, by Nan Chen, Ryan Proudfoot, Kenneth Kent, Eric Aubanel. An Adobe .pdf version of the abstract is available here.
  18. Mobile Hotspot, by Bernd Kurz and Troy Nelson. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  19. Ambient Intelligence and its Applications, by Mohsin Sohail. An Adobe .pdf version of the abstract is available here.
  20. Eucalyptus: A Service-oriented Participatory Design Studio Supported by UCLP, by Sandy Liu, Yong Liang, Bo Xu, Bruce Spencer. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  21. Learning Naïve Bayes Tree for Conditional Probability Estimation, by Han Liang, Dr. Yuhong Yan, Dr. Huajie Zhang. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  22. Synthesizing Function-Rich Web Pages for Adaptive Hypermedia, by Mehran Nadjarbashi-Noghani and Ali A. Ghorbani. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  23. Aligning biological networks, by Andrew McKim, Dr. Patricia Evans. An Adobe .pdf version of the abstract is available here.
  24. Adaptive Web Search Engine, by M. Barouni-Ebrahimi and Ali A. Ghorbani. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  25. Critical Infrastructures’ Interdependencies Modeling and Simulation, by Ebrahim Bagheri, Ali Ghorbani. An Adobe .pdf version of the abstract is available here.
  26. CIFS – Towards a Comprehensive Information Filtering System, by Eugenia Kondratova, Ali Ghorbani, Stephen Marsh. An Adobe .pdf version of the abstract is available here.
  27. Context-Aware Software Development for Mobile Devices, by Weichang Du, Lei Wang, Ning Wang. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  28. withdrawn
  29. Agent Negotiation, Fairness and the Miner World Simulation, by Mark Kilfoil. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  30. Reliable Low-Power Communications for Mobile Ad Hoc Networks, Second Place poster award winner, by John-Paul Arp and Bradford G. Nickerson. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  31. Real time collision detection in 3D games, by Richard McAleer and Bradford G. Nickerson. An Adobe .pdf version of the abstract is available here.
  32. RuleML FOAF: Web Rules for Social Networking, by Jie Li, Harold Boley, Virendrakumar C. Bhavsar. An Adobe .pdf version of the abstract is available here.
  33. Interoperation and Interchange of Knowledge Bases, by Le Thi Thu Thuy, Doan Dai Duong, Harold Boley, and Virendrakumar C. Bhavsar. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  34. ConPred: An Online Consensus Protein Secondary Structure Prediction System, by Zheng Wang, Patricia Evans, Virendra Bhavsar. An Adobe .pdf version of the abstract is available here.
  35. Construction of Regulatory Networks for Non-Model Organisms, by Rachita Sharma, Dr. Virendra C. Bhavsar and Dr. Patricia A. Evans. An Adobe .pdf version of the abstract is available here.
  36. A Real-Time Recurrent Alert Correlation Model for Intrusion Detection Systems, by Reza Sadoddin and Ali A. Ghorbani. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  37. Buyer-Seller Matching: Global and Local Similarity Measures, by Lu Yang, Virendra C. Bhavsar, Harold Boley and Biplab Sarker. An Adobe .pdf version of the abstract is available here. An Adobe .pdf version of the poster is available here.
  38. Putting Labs Online with Web Services, by Yuhong Yang, Yong Liang, Xinge Du, Ali A. Ghorbani and Hamadou Saliah-Hassane. An Adobe .pdf version of the abstract is available here.