JavaScript Menu Courtesy of
Stevens Computer Science Engineering & Science Stevens Computer Science
Stevens Institute of Technology Stevens Computer Science Homepage Stevens Computer Science Homepage
Stevens CS
Mission Statement
News & Events
Success Stories

gray gray Share/Save/Bookmark
Stevens CS
Seminar List
Untitled Document

December 6, 2007

3D Video Mosaics for Surveillance and Inspection

Zhigang Zhu, Professor Department of Computer Science City College, City University of New York

Thursday, December 6, 1:00PM McLean 104 Stevens Institute of Technology

Abstract We address the problem of fusing images from many video cameras or a moving video camera. The captured images have obvious motion parallax, but they will be aligned and integrated into a few mosaics that preserve three-dimensional (3D) information in a large field-of-view (FOV). We have developed a pu more

November 26, 2007

Relay vs. User Cooperation in Multiaccess Networks

Lalitha Sankar Princeton University

Monday, November 26, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract Cooperation in communication networks results when terminals use their energy and bandwidth resources to mutually enhance their transmissions. Cooperation can be induced in many ways and each approach entails a different tradeoff of power, bandwidth, complexity, and costs to achieve spatial diversity gains characteristic of antenna arrays. In this talk, we presen more

November 19, 2007

A Model Curriculum for Graduate Software Engineering Education

Arthur Pyster Distinguished Research Professor School of Systems & Enterprises Stevens Institute of Technology

Monday, November 19, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract Over 50 universities in the United States and many others globally offer a Masters Degree in Software Engineering. However, the most current software engineering model graduate curriculum was developed by the Software Engineering Institute at Carnegie Mellon over 15 years ago. more

November 16, 2007

Ensemble of Classifiers Approaches for Data Fusion, Incremental Learning, Early Diagnosis of Alzheimer's Disease and Becoming a Millionaire!

Robi Polikar, Ph.D. Electrical and Computer Engineering, Rowan University, Glassboro, NJ

Friday, November 16, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract In matters of great importance that has financial, medical, social or other implications, we often seek a second opinion before making a decision, sometimes a third, and sometimes many more. In doing so, we somehow weigh the individual opinions, and combine them through some thought process to reach a fina more

November 16, 2007

Stevens / Columbia / IBM Research Security and Privacy Day

Stevens / Columbia / IBM Research Security and Privacy Day

Friday, November 16, 2007 Babbio 104 Stevens Institute of Technology Hoboken, New Jersey, USA

Web site:

Registration: [Registration is free, but requested.] more

November 12, 2007

Parallel Algorithms for Bayesian Indoor Positioning Systems

Konstantin Kleisouris Computer Science Department Rutgers University

Monday, November 12, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract In this work we present two parallel algorithms and their Unified Parallel C implementations for Bayesian indoor positioning systems. Our approaches are founded on Markov Chain Monte Carlo simulations, which explore the probability distributions of the unknown position variables using statistical sampling. We evaluated two ba more

November 9, 2007

A Deductive Framework for Security Policy Analysis

C. R. Ramakrishnan Computer Science Department Stony Brook University

Friday, November 9, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract Rule languages have been used to specify security and management policies, such as access control and authorization policies, and network management policies. While these rule languages aim to simplify the specification and management of complex policies, large rule sets often contain subtle interactions, making them difficult to unde more

November 5, 2007

Cognitive Radios for License-exempt Use

Kiran Challapali Philips Research North America

Monday, November 5, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract Although most of the spectrum is allocated much of it is unused. The enormous growth in the wireless industry has come from using a small part of the wireless spectrum, nominally less than 10% under 3 GHz. There is growing evidence of scarcity and overcrowding in these bands reflected for example, by price paid for cellular spectrum. However, meas more

October 29, 2007

Design and Analysis of Low-rate Codes

Guosen Yue NEC Research Laboratories

Monday, October 29, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract We consider the design and analysis of low-rate codes, generalized low-density parity-check (GLDPC) codes and the variations, repeat-zigzag-Hadamard (RZH) codes, in AWGN channels. The code ensembles of GLDPC and RZH codes can be optimized using Extrinsic information transfer (EXIT) charts. The simulation results show that a rate-0.003 LDPC-Hadamard code buil more

October 22, 2007

Securing Untrustworthy Software Using Information Flow Control

Dr. Nickolai ZeldovichStanford University


In this talk, I will present HiStar, a new operating system designed to enforce the security of user data in untrusted or malicious applications. For example, numerous web sites have had massive data compromises due to poorly-written application code. HiStar can ensure that even malicious application code in a web server cannot disclose sensitive user data.The key idea is to specify application security in terms of informatio more

For more information please contact:

Susanne Wetzel
Associate Professor
Room 634
Phone: 201.216.5610
Fax: 201.216.8249

October 17, 2007

Microsoft's Common Language Runtime: Is It Dynamic Enough?

Jim Miller Microsoft

Wednesday, October 17, 4:00PM Babbio 310 Stevens Institute of Technology

Abstract Microsoft's Common Language Runtime (CLR) was released to the public in 2000 and was touted as a multi-language runtime. But for the first five years of its commercial life it has been mostly used for executing statically typed languages (Visual Basic, Java, C#, Eiffel, C++). There has been considerable skepticism about its ability to support more dynamic languages more

October 12, 2007

Proximity Distribution Kernels for Geometric Context in Category Recognition

Dr. Haibin Ling Siemens

Friday, October 12, 2:00PM Babbio 310 Stevens Institute of Technology

Abstract We propose using the proximity distribution of vector-quantized local feature descriptors for object and category recognition. To this end, we introduce a novel "proximity distribution kernel'' that naturally combines local geometric as well as photometric information from images. It satisfies Mercer's condition and can therefore be readily combined wit more

September 10, 2007

On Secrecy Capacity of Cognitive Radio Networks

Anand Santhanakrishnan Stevens Institute of Technology

Monday, September 10, 2:00PM Babbio 110 Stevens Institute of Technology

Abstract Secrecy capacity is a measure of the information theoretic capacity of a key-less secure channel. It was traditionally discussed for wired channels and later extended to wireless channels. Secrecy capacity is defined as the difference between the rate of information transfer from the source to the destination and that between the source and more

June 1, 2007

Columbia / IBM Research / Stevens : Security and Privacy Day

Click here for Registration & Information

May 15, 2007

Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model

Marco Pistoia, IBM Research

Modern component-based systems, such as Java and Microsoft .NET Common Language Runtime (CLR), have adopted Stack-Based Access Control (SBAC). Its purpose is to use stack inspection to verify that all the code responsible for a security-sensitive action is sufficiently authorized to perform that action. However, previous literature has shown that the security model enforced by SBAC is flawed in that stack inspection may allow unauthorized code no longer o more

April 26, 2007

Analysing the MUTE Anonymous File-Sharing System Using the Pi-calculus

Tom Chothia, CWI

This talk describes details of a formal analysis of the MUTE system for anonymous file-sharing. We built pi-calculus models of a node that is innocent of sharing files, a node that is guilty of file-sharing and of the network environment. We then tested to see if an attacker can distinguish between a connection to a guilty node and a connection to an innocent node. A "weak bi-simulation" between every guilty network and an innocent network would be require more

April 23, 2007

Applications of Differential Equations in Biomedical Computer Vision

Greg Slabaugh, Siemens Corporate Research

Ordinary and partial differential equations have found wide applicability in computer vision, graphics, and imaging, including diverse problems such as anisotropic diffusion for image and surface smoothing, estimation of rigid and deformable transformations between images and surfaces for alignment, and curve and surface evolutions for image segmentation, reconstruction from unorganized points, and multi-view stereo.

In this talk, I will pre more

April 17, 2007

3D Reconstruction and Recognition of Reflective Objects

Silvio Savarese, University of Illinois at Urbana-Champaign

The ability to perceive and interpret the geometric shape and semantic meaning of materials and objects is essential for an intelligent visual system. My research is particularly focused on the problems of shape reconstruction, material recognition as well as geometrically inspired object and scene reconstruction and categorization.

A number of extensively studied cues, notably stereoscopic disparity, texture gradient more

April 16, 2007

Verification of Security Protocols

Sasa Radomirovic, University of Luxembourg and Centre de Recerca Matematica

An introduction to protocol security and verification of protocol security in a particular model, which was developed at the University of Eindhoven.

The talk is aimed at Mathematicians and Computer Scientists interested in Cryptography, Security, and Formal Methods. No prior knowledge of protocol verification is required.

Sponsored by the Algebraic Crypto more

April 9, 2007

Privacy-Preserving Data Publishing

Benjamin Fung, Simon Fraser University

The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves person-specific and sensitive information like medical records, the public acquires a negative impression that data mining is a tool for privacy intrusion. Privacy-preserving data publishing is a study of el more

April 5, 2007

Secure and Efficient Query Evaluation on XML Databases

Hui (Wendy) Wang, University of British Columbia

Database security is of utmost importance today. To protect the secrecy of data, we must define and enforce some security policies. However, the enforcement of those security polices on the database will bring unavoidable overhead for query evaluation. Sometimes such overhead is very expensive. For example, the database may be encrypted to increase security. In this case, answering a query requires first decrypting the data. The decryp more

April 2, 2007

Learning to Recognize Objects and Scenes with Bags of Features and Spatial Pyramids

Svetlana Lazebnik, University of Illinois at Urbana-Champaign

Bag-of-features models, which represent images by distributions of salient local features contained in them, are among the most robust and powerful image descriptions currently used for object and scene recognition. In this talk, I will present fundamental techniques for learning effective bag-of-features models and their extensions by constructing discriminative visual codebooks and incorporating spatial relationships between local fe more

March 8, 2007

Malware analysis from DDoS agents to bots and more

Sven Dietrich, Carnegie Mellon University / Software Engineering Institute

Distributed intruder attack tools (from the early distributed denial of service handler/agent programs, to IRC based bots) have suffered from a major weakness that resulted in their takeover or takedown. That weakness was a detectable command and control channel that exposed the entire network and/or the attackers own commands. We discuss the communication techniques of DDoS malware evolving from si more

March 5, 2007

When Conventional Authentication is Not Enough

Antonio Nicolosi, New York University and Stanford University

While authentication within organizations is a well-understood problem, traditional solutions are often inadequate at the scale of the Internet, where the lack of a central authority, the open nature of the systems, and issues such as privacy and anonymity create new challenges. For example, users typically establish dozens of web accounts with independently administered services under a single password, which complicates reco more

March 1, 2007

An Overlay Architecture for End-to-End Service Availability

Angelos Stavrou, Columbia University

Perhaps one of the most compelling problems of the Internet today is the lack a comprehensive and unifying approach to dealing with online service security and resilience: there exist a lot of mechanisms but no "security and availability architecture" -- no set of policies or standards for how these mechanisms can be combined to achieve overall good security. My work is aimed at introducing and analyzing mechanisms that boost the security, re more

February 26, 2007

Byzantine-Resilient Routing in Multi-Hop Wireless Networks

Reza Curtmola, Johns Hopkins University

Fueled by the proliferation of wireless devices, mobile ad hoc wireless networks (MANETs) have been the focus of active research in recent years. MANETs can be deployed fast and do not require fixed infrastructure, which makes them well-suited for critical environments (e.g., battlefield or disaster recovery). In such environments robustness and reliability are crucial. This strongly motivates the need for survivable routing protocols, which are able t more

February 23, 2007

Improving the Robustness of Intrusion Detection Systems

Prahlad Fogla, Georgia Institute of Technology

With the increase in the complexity of computer systems, security prevention measures are not enough to prevent all attacks. Intrusion detection systems (IDS) have become an integral part of computer security to detect attempted intrusions. Intrusion detection systems need to be robust against the attacks which are disguised to evade them.

To analyze the robustness of network anomaly detection systems, we introduce a new class of p more

February 12, 2007

A Cheap, Practical and Effective IP Spoofing Defense Via Self-Learning Packet Filtering

Jelena Mirkovic, University of Delaware

IP spoofing exacerbates many security threats. While many contemporary attacks do not exploit spoofing, a large number still does - thus eliminating or reducing spoofing would greatly improve Internet security. Seven spoofing defenses have been proposed to date. Our evaluation shows that there are only two defenses - hop-count filtering (HCF) and route-based filtering (RBF) - that offer significant spoofing reduction, in sparse but strategic deploy more

January 29, 2007

The Human Factor in Phishing

Markus Jakobsson, Indiana University

We discuss the importance of understanding psychological aspects of phishing, and review some recent findings. Given these findings, we critique some commonly used security practices and suggest and review alternatives, including educational approaches. We suggest a few techniques that can be used to assess and remedy threats remotely, without requiring any user involvement. We conclude by discussing some approaches to anticipate the next wave of thr more

January 22, 2007

On a Modular Approach to (Password-)Authenticated Group Key Establishment

Rainer Steinwandt, Florida Atlantic University

The talk discusses a protocol compiler enabling the derivation of a group key establishment protocol from a given 2-party solution. The compiler can be applied in the context of password-based authentication and does not introduce idealizing assumptions. For a scenario where an existentially unforgeable signature scheme is available, the talk addresses the question of how such a compiler could help in building a group key establishmen more

Stevens CS

gray gray Share/Save/Bookmark

Daniel Duchamp
Research Professor & Department Director
Room 313
Phone: 201.216.5390
Fax: 201.216.8249

Dawn Garcia
Administrative Assistant
Room 317
Phone: 201.216.5578
Fax: 201.216.8249

Sherry Dorso
Assistant to the Director
Lieb 317
Phone: 201.216.5328
Fax: 201.216.8249

Stevens CS
Stevens CS Stevens CS Stevens CS
View my Iframe Content