2019 Research Exposition Posters

April 12, 2019, 8:30am - 4:30pm

UNB Fredericton, Wu Conference Centre


Authors
Title
Puya Memarzia, Virendra C. Bhavsar, Suprio Ray In-memory Aggregation for Big Data Analytics
Mark Thom, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier Pervasive, Secure Sharing of Language Runtimes in Cloud Applications
Georgiy Krylov, Petar Jelenkovic, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier AOT compilation in OMR: Relocations
Dayton J Allen, David Bremner, DeVerne Jones, Daryl Maier, Mark Stoodley, Leonardo Banderali Python on OMR
Eric Coffin, Scott Young, Kenneth B. Kent, Marius Pirvu, Vijay Sundaresan Boosting MicroJIT – a Lightweight Just-In-Time Compiler
A. Taware, K. B. Kent, G. W. Dueck, & Charlie Gracie Cold Object Identification, Sequestration and Revitalization
Maria Patrou, Kenneth B. Kent, Michael Dawson Scaling Parallelism under CPU-intensive Loads in Node.js
Hillary J. Soontiens, Jean-Philippe Legault, Aaron G. Graham, Kenneth B. Kent, Daryl Maier, Kazuhiro Konno AArch64 Support for the OMR Language Runtime Toolkit
Jean-Philippe Legault, Aaron G. Graham, Kenneth B. Kent, Daryl Maier Containerized Cross Platform Development for the New Age Polyglot
Rahul Roychowdhury,Dr Eric Aubanel,Dr Suprio Ray,Charlie Gracie Multiprocessing in Python to exploit Multi-core Hardware
Kay Boldt, Arash Habibi Lashkari, Ali A. Ghorbani Detection and characterization of multi-layer encryption traffic (VPN through Tor) using AI
Rongxing Lu AGREE: Efficient and Privacy-preserving Speaker Recognition for Internet of Things
Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner Privacy-Preserving Simplicial Depth Query over Outsourced Cloud Platform
Rongxing Lu A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT
Jason Chang, Rongxing Lu Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application on Genomic Data
Son Luong, Rongxing Lu A Blockchain-Based Privacy-Preserving Medical Insurance Storage System
Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao Achieving Efficient and Privacy-Preserving Top-k Query over Vertically Distributed Data Sources
Yandong Zheng, Rongxing Lu, Jun Shao Achieving Efficient and Privacy-Preserving k-NN Query for Outsoured eHealthcare Data
naNasrin Eshraghi Ivari, Kenneth B. Kent Improving the Verilog-to-Routing FPGA CAD flow
Scott Young, Kenneth B. Kent Verilog Static Loop Unrolling Support in Odin II
Britta Sennewald, Arash Habibi Lashkari, Ali A. Ghorbani Authorship attribution within different Dark Web forums by using statistical analysis of strings
Chenghao Xu, Wei Song Intelligent Data Collection and Dissemination Application with Wi-Fi Direct
Aaron G. Graham, Jean-Philippe Legault, Maria Patrou, Kenneth B. Kent Improved Synthesis and Simulation for FPGAs: ODIN II for VTR 8.0 and Beyond
Xichen Zhang, Ali A. Ghorbani Human Factors in Cybersecurity: Issues and Challenges in Big Data
Xi Tao, Wei Song Efficient Path Planning and Truthful Incentive Mechansim Design for Mobile Crowdsensing
Haoru Xing, Wei Song Collaborative Content Distribution in 5G Mobile Networks with Edge Caching
Shlomi linoy, Hassan Mahdikhani, Suprio Ray, Rongxing Lu, Natalia Stakhanova, i Ghorbani Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain
Ali Hakimi Parizi, Paul Cook Evaluating Cross-lingual Sub-word Embeddings
Mahdi D. Firoozjaei, Ali A. Ghorbani Location Privacy issues with the online Services
Vedang Goswami, Scott Bateman Artificial Landmarks for Spatial Interfaces
Xichen Zhang, Ali A. Ghorbani An overview of online fake news: characterization, detection, and discussion
Iman Sharafaldin, Ali A. Ghorbani A Novel Visual Anomaly Detection Method
Kwasi Boakye-Boateng, Arash Habibi Lashkari, Ali A. Ghorbani Application of One-Time Pad in Security of Substation Automation Systems
Alex Demmings, Kasey Dionne, Connor Wilson, Scott Bateman No Contact Navigation: Developing Gesture Sets for Navigational Tasks
Aaron Tabor, Scott Bateman, Erik Scheme, m.c. schraefel Designing Guided Breathing Technology: Enhancing Cognitive Performance in the Workplace
Mohammed Al-Darwbi, Arash Lashkari, Ali Ghorbani NetFlowScope: A novel Intrusion Detection Systems
Reyhan Pradantyo, Scott Bateman What Are Video-Game Baddies? Observing and Evaluating Player Perception on Video-Game Villain Designs
Jeremie Boudreau, Ian Sadler, Caleb Smith jerbou_etal_poster-sb
Nasim Maleki, Ali Ghorbani Simulating Phishing Email through Graph Database Models
Hamid Azimy, Ali Ghorbani Competitive Selfish Bitcoin Mining
Samaneh Mahdavifar, Ali A. Ghorbani Android Malware Detection Utilizing Translucent Deep Neural Network