2023 Research Exposition Posters

April 14, 2023,


Authors
Title
Hassan S. A. Arafat, David Bremner, Kenneth B. Kent, Julian Wang Load Stall Minimization
Jonas R. Schoenauer, David Bremner, Kenneth B. Kent, Julian Wang Detection and Mitigation of Load Stalls on AArch64
Nancy Chahal, Kenneth B. Kent, Joran Siu, Michael Dawson Towards An Efficient Autoscaling Decision for Cloud Applications
Joannah Nanjekye , David Bremner, Aleksandar Micic Eclipse OMR Garbage Collection for Meta tracing JIT based Dynamic Languages
Georgiy Krylov, Gerhard W. Dueck, Kenneth B. Kent, Younes Manton Calling Functions Dynamically Generated By Eclipse OMR JitBuilder
Subhabrata Rana, Fatemeh Khoda Parast, Kenneth B. Kent, Brett Kelly CephVault : A Secure Key Management System for Ceph
Connor Wilson, Alex McInnis, Scott Bateman Tailoring Intro to Programming: Using the User Type Hexad
Shubham Verma, Kenneth B. Kent, Marius Pirvu Implementation of Array Bytecodes in MicroJIT
Shermin Khosravi, David Bremner Linear Programs Size Reduction via Feature Sharing in Sparktope Compiler
Saumya Verma, Sudip Chatterjee Effecient SQL Query Compilation Using JIT Compilers
Chenghao Xu, Wei Song Intelligent Mobile Crowdsensing with Deep Reinforcement Learning
Geetesh More, Supriyo Ray, Kenneth Kent On-chip Database Acceleration with FPGA
Harpreet Kaur, Kenneth B. Kent, Marius Pirvu Method Invocation in Templated JIT Compiler
Md Mazder Rahman and Gerhrad W. Dueck Optimization of Quantum Circuits
Jérémy Robichaud,Paul Cook WaCadie: A Web Corpus of Acadian French
Ethan Eddy, Erik Scheme, Scott Bateman A Framework and Call to Action for the Future Development of EMG-Based Input in HCI
Navid Jafarof, Kennet B. Kent Heterogeneous Logic Implementation for Adders in VTR​ ​
Alireza Azadi, Kenneth B. Kent Open Hardware Development With Incremental Synthesis
Dakota Staples, Saqib Hakak, Paul Cook A Comparison of Machine Learning Algorithms for Multilingual Phishing Detection
Pouya Pournasir, Daniel J. Rea ”J.A.C.K.A.L”: Your social AI Companion in robotic teleoperation
Yantao Yu, Xin Zeng, Xiaoping Xue, Jingxiao Ma LSTM-based IDS for VANETs: A Time Series Classification Approach to False Message Detection
Muhammad Zubair, Saqib Hakak Deep Fake Analysis in Compressed Videos
Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari Hardening The Substation’s Security Posture By Utilizing Trust
Raghuraman Swaminathan, Paul Cook Token-level Identification of Multiword Expressions using Pre-trained Multilingual Language Models
Atah Nuh Mih, Hung Cao EdgeAI for Defect Detection using Transfer Learning Techniques in the Context of Smart Manufacturing
Simran Dadhich, Hung Cao Developing an IoT prototype for Climate Data Acquisition using Arduino
Vishnu Prasanth. RongXing Lu Dynamic key Management for privacy in Aging in place
Asfia Kawnine, Hung Cao Towards A Performance Evaluation for Federated Averaging on Edge Devices
Avinaba Mistry, Bilal Husain, Dane Sheppard, Gaia Noseworthy, Jarod Kelly, Robert Santacruz, Sanjeev Seahra, Suprio Ray Individual level agent based contagion simulator
Sean Lalla, Rongxing Lu, Yunguo Guan, Songnian Zhang Improving Decision Tree Privacy with Bloom Filters