2009 CS Research Expo
Posters
,      
Botnet
Analysis Framework by Ali Shiravi and Ali Ghorbani
,      
Network Security
Simulation Visualization by Ali
Shiravi, Hadi Shiravi, and Ali Ghorbani
,      
The Disseminated
ACKnowledgment (DACK) Protocol for Data Collection in
Wireless Sensor Networks by John-Paul Arp and Bradford G. Nickerson
,      
Quantifying
Process Model Conformance Through Minimal-Cost Approximations by Bruce Hamiton and Liqiang Geng
,      
KB
Validation under the Closed-world Semantics by Cheng Lu, Weichang Du and Bruce Spencer
,      
RNA
Motif Discovery using Probabilistic Tree Adjoining Grammars
by Patricia A. Evans and Emad Bahrami
Samani
,       
Update Propagation In Modular Ontologies by Faezeh Ensan and Weichang Du
,      
Generating
partial COP-nets on demand by Henry Bediako-Asare, Michael Fleming, and Scott
Buffett
,      
Expressing
Vague Knowledge in the Fuzzy Description Logic fALCHIN by Jidi Zhao, Harold Boley,
and Weichang Du
,       
An Embedded
Decryption/Decompression Engine using HandelC by Farnaz Gharibian
and Kenneth B. Kent
,       
A Handel-C Implementation of
a Computationally Intensive Problem in GF(3) by Joey C.
Libby, Jonathan P. Lutes, and Kenneth B. Kent
,       
A Methodology for Rapid Optimization of HandelC Specifications by Joseph C
Libby and Kenneth B Kent
,      
Performance
Enhancement of Smith-Waterman Sequence Database Searches Using Hybrid Model:
Comparing the MPI and Hybrid Programming Paradigm on SMP Clusters by Mahdi Noorian and Zeinab Noorian
,      
An
Incremental Self-Improvement Hybrid
Intrusion Detection System by Mahbod Tavallaee, Wei Lu,
and Ali A. Ghorbani
,      
Effective
Query Selection during Preference Elicitation by Minruo Li, Michael
Fleming, and Scott Buffett
,      
Automatic Discovery of Botnet
Communities on Large-Scale Communication Network by Wei Lu and Ali A. Ghorbani 
,       
A
Framework for Mobile Applications by Sangwhan Cha 
,      
Ontology-based Unit
Test-case Generation by Valeh H. Nasser, Weichang Du, and
Dawn MacIsaac
,      
Fusing Multiple Sensors to
Detect Network
Traffic Anomalies - A Control Theoretic Model by Mahsa Kiani, Wei Lu, Mahbod
Tavallaee, and Ali A. Ghorbani