JavaScript Menu Courtesy of Milonic.com
Stevens Computer Science Engineering & Science Stevens Computer Science
Stevens Institute of Technology Stevens Computer Science Homepage Stevens Computer Science Homepage
Stevens CS
ABOUT US
Overview
Mission Statement
News & Events
Publications
Seminars
Blogs
Gallery
Success Stories
        

News
gray gray Share/Save/Bookmark
Share
gray
Print
Stevens CS
Seminar List
 
Untitled Document

December 10, 2009

IP Training Seminar - Protecting Software

The creation, protection and commercialization of Intellectual Property is central to the implementation of Academic Entrepreneurship. It is therefore, essential that you attend the Intellectual Property (IP) Awareness Seminar, sponsored by the Office of Academic Entrepreneurship, (OAE). The seminar will be held on December 10th, 12:00pm until 2:00 pm.This Seminar will focus on protecting intellectual property in Software. David Peacock - will begiving an overview of the patent process and patent pip ...read more

For more information please contact:

David Peacock
Director - Intellectual Property Management
EAS Building
Room 210
Phone: 201.216.5242
Fax: 201.216.8185

dpeacock@stevens.edu

December 9, 2009

Some Thoughts on Electronic Elections

Speaker: Carsten Schuermann, IT University, Copenhagen

Time: Friday, December 11, 2 PM Location: Babbio 321 Host: David Naumann

Abstract:

Over the last decade, information technology has began to transform one of the most foundational process of the western democratic world: the electoral process. The near ubiquitous availability of information and communication technology and the public demand of simplicity, efficiency, and effectiveness of the electoral process is currentl ...read more

For more information please contact:

David Naumann
Professor
Lieb
Room 301
Phone: 201.216.5608
Fax: 201.216.8249

dnaumann@stevens.edu

December 8, 2009

Bjarne Stroustrup: "The Design of C++"

Time: Wednesday, December 2, 2-3:30pm

Location: Burchard 118

Abstract:We have a draft for a revised ISO C++ standard, C++0x. I present the background and aims, a bit about the standards process (with opinions), some of the guiding design principles (with tiny code examples), and a case study. The case study is concurrency support facilities (memory model, threads, locks, futures).

Bio:Bjarne Stroustrup invented, designed and implemented C++. Over the last decade, C++ has become th ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

December 7, 2009

Places Everyone: Creating an Animated Background of Human Activity

Speaker: Jan M. Allbeck (George Mason University)

Time: Monday, December 7, 2 PM Location: Babbio 221 Host: Philippos Mordohai

Abstract: Creating virtual scenarios that simulate a human population with typical and varied behaviors can be an overwhelming task. In addition to modeling the environment and characters, tagging the environment with semantic data, and creating motions for the characters, the simulation designer also needs to create character profiles for the populatio ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

December 2, 2009

Bjarne Stroustrup: The Design of C

Abstract: We have a draft for a revised ISO C++ standard, C++0x. I present the background and aims, a bit about the standards process (with opinions), some of the guiding design principles (with tiny code examples), and a case study. The case study is concurrency support facilities (memory model, threads, locks, futures).

Bio: Bjarne Stroustrup invented, designed and implemented C++. Over the last decade, C++ has become the most widely used language supporting object-oriented programming ...read more

November 23, 2009

Mobility, Data Mining and Privacy: Mining Human Movement Patterns from Trajectory Data

Speakers: Fosca Giannotti Senior Researcher Institute of Science and Technology Information (ISTI) Italian National Research Council (CNR) Knowledge Discovery and Delivery Laboratory (KDD)

Dino Pedreschi Professor of Computer Science Dipartimento di Informatica, University of Pisa ISTI-CNR Knowledge Discovery and Delivery Laboratory (KDD)

Time: Monday, November 23, 2 PM Location: Babbio 221 Host: Wendy Hui Wang

ABSTRACT The technologies of mobile communica ...read more

November 16, 2009

Excursions in Computation

Speaker: Wayne Patterson, Professor of Computer Science, Howard University

Time: Monday, November 16, 2 PMLocation: Babbio 221 Host: Susanne Wetzel

Abstract: The author is reminded of the old expression: "Something old, something new; something borrowed, something blue." Although reluctant to suggest a presentation anything like a wedding ceremony, he will look anew at some old computational concepts involving the Pascal triangle; something new (to many) in a rela ...read more

For more information please contact:

Susanne Wetzel
Associate Professor
Babbio
Room 634
Phone: 201.216.5610
Fax: 201.216.8249

swetzel@cs.stevens.edu

November 2, 2009

Using Cloud Computing Technology for Defensive Data Analysis

Speaker: Neal Ziring, Technical Director for Vulnerability Analysis & Operations, NSA

Time: Monday, November 2, 2PM Location: Babbio 221 Host: Susanne Wetzel

Abstract: US computer networks are under attack by increasing sophisticated adversaries. Network defenders, such as the NSA Blue Team, have extensive sources of information about hosts and networks available. But the volume of the data and its complexity make analysis with conventional methods very slow and inflexibl ...read more

For more information please contact:

Susanne Wetzel
Associate Professor
Babbio
Room 634
Phone: 201.216.5610
Fax: 201.216.8249

swetzel@cs.stevens.edu

October 19, 2009

Usable Security Lessons for Creating Effective Browser Warnings

Speaker: Serge Egelman, Brown

Time: Monday, October 19, 2PM Location: Babbio 221 Host: Sven Dietrich

Abstract : In a world where making an incorrect online trust decision can mean the difference between checking your account balance and transferring it to criminals, Internet users need effective security warnings to help them identify risky situations. In a perfect world, software could automatically detect all security threats and then block access to high risk websites. Be ...read more

For more information please contact:

Dr. Sven Dietrich
Assistant Professor
Babbio Center
Room 635
Phone: +1-201-216-8078
Fax: +1-201-216-8249

spock+web@cs.stevens.edu

October 5, 2009

Does Privacy Require True Randomness?

Speaker: Carl Bosley (Stevens) Time: Monday, October 5, 2PM Location: Babbio 221

Host: Antonio Nicolosi

Abstract: Most cryptographic primitives require randomness (for example, to generate secret keys). Usually, one assumes that perfect randomness is available, but, conceivably, such primitives might be built underweaker, more realistic assumptions. This is known to be achievable for many authentication applications, when entropy alone is typically sufficient. In contrast, all ...read more

For more information please contact:

Antonio Nicolosi
Assistant Professor
Babbio
Room 624
Phone: 201.216.8035
Fax: 201.216.8249

nicolosi@cs.stevens.edu

September 28, 2009

Automated Detection of Stealth Attacks on the Operating System Kernel

Speaker: Arati Baliga, Rutgers

Time: Monday, September 28, 2PM Location: Babbio 221 Host: Vivek Pathak

Abstract: The operating system kernel is implicitly trusted by applications running on a computer system. An attack on the operating system kernel that alters its state is critical because it puts all applications at risk. A compromised system can be stealthily exploited by the attackers, in several ways, such as exfiltration of sensitive information, wasteful usage of the syst ...read more

For more information please contact:


September 14, 2009

Efficient Training of Classifiers for Detection Seminar

Computer vision researchers are presented with a potentially embarrassing problem these days - too much data.  In particular very large data sets can be a challenge for learning algorithms used in computer vision.  We have shown that a class of techniques used in computer vision that had previously been considered prohibitively expensive can in fact be used very efficiently.  This result comes in two parts, first determining the form of the classifiers in question and demonstrating ...read more

July 6, 2009

From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research

Speaker: Andrei Sabelfeld, Chalmers University of Technology

Time: Monday, July 6, 3PM Location: Babbio 304 Host: David Naumann

Abstract: Historically, dynamic techniques are the pioneers of the area of information flow in the 70’s. In their seminal work, Denning and Denning suggest a static alternative for information-flow analysis. Following this work, the 90’s see the domination of static techniques for information flow. The common wisdom appears to be that dynami ...read more

For more information please contact:

David Naumann
Professor
Lieb
Room 301
Phone: 201.216.5608
Fax: 201.216.8249

dnaumann@stevens.edu

May 4, 2009

Robust Decentralized Authentication in Peer-to-peer, Social, and Ad-hoc Networks

Speaker: Vivek Pathak (Rutgers)

Time: Monday, May 4, 2PM Location: Babbio 221 Host: Philippos Mordohai

Abstract: Authentication has traditionally been done either in a decentralized manner with human assistance or automatically through a centralized security infrastructure. In the security infrastructure approach, a central trusted authority takes on the responsibility of authenticating participants within its domain of control. While the security infrastructure approach works we ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

April 27, 2009

Machine Learning with Graphs and Matchings

Speaker: Tony Jebara, Columbia University

Time: Monday, April 27, 2PM Location: Babbio 221 Host: Philippos Mordohai

Abstract: Many machine learning problems on data can naturally be formulated as problems on graphs. For example, dimensionality reduction and visualization are related to graph embedding. Given a sparse graph between N high-dimensional data nodes, how do we faithfully embed it in low dimension? We present an algorithm that improves dimensionality reduction by exte ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

April 13, 2009

Making Fake Skin (and other things) Look Real

Speaker: Craig Donner, Columbia University

Time: Monday, April 13, 2PM Location: Babbio 221 Host: Philippos Mordohai

Abstract: Natural materials such as juice, leaves, marble, and skin have a complex interaction with light. Light refracts into such materials and scatters many times before exiting, and this subsurface scatteringof light has a profound impact on their appearance. In this talk, I will present recent advances in computer graphics for making images and acquiring the ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

April 6, 2009

Distributed Control of Networked Robots and Systems

Speaker: Michael Zavlanos, University of Pennsylvania

Time: Monday, April 6, 2PM Location: Babbio 221 Host: Philippos Mordohai

Abstract: The field of robotics is evolving from single monolithic robots to teams of small but interconnected robots achieving global objectives using local coordination. Coordinated missions for teams of mobile robots include coordinated estimation, surveillance, and coverage, coordinated satellite alignment and synchronization, as well as distri ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

March 30, 2009

Civitas: Toward a Secure Voting System

Speaker: Michael Clarkson, Cornell

Time: Monday, March 30, 2PM Location: Babbio 221, Stevens Institute of Technology Host: David Naumann

Abstract: Voting systems are hard to make trustworthy because they have strong, conflicting security requirements: Voters must be convinced that their votes are tallied correctly, while the secrecy of those votes must also be maintained---even when someone tries to buy votes or physically coerce voters. This talk presents Civitas, an elect ...read more

For more information please contact:

David Naumann
Professor
Lieb
Room 301
Phone: 201.216.5608
Fax: 201.216.8249

dnaumann@stevens.edu

March 23, 2009

Detection, Tracking and Registration in 3D Radiology Image Analysis

Speaker: Lin Yang, Rutgers

Time: Monday, March 23, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Philippos Mordohai

Abstract: In this talk, we will describe a robust, fast and accurate 3D object detection/tracking algorithm which is developed for the 3D echocardiography. According to our knowledge, this is the first study reporting fast and reliable 3D ultrasound tracking of the left ventricle on a very large dataset, which contains 1143 3D volumetric dat ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

March 16, 2009

Efficient Comparison of 3D Models for Shape Retrieval

Speaker: Ameesh Makadia, Google Research

Time: Monday, March 16, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Philippos Mordohai

Abstract:

The ability to perform fast and accurate retrieval from a database of 3D models is becoming a growing necessity as the number of models in circulation is rapidly increasing. Most search engines, built around text-based search, fail to leverage shape content, which often leads to search results of limited success and ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

March 2, 2009

Property Verification of an Electronic Payment System: EP2

Speaker: Temesghen Kahsai, Dep. of Computer Science, Swansea University, UK

Time: Monday, March 2, 2PM Location: Babbio 221, Stevens Institute of Technology Host: David Naumann

Abstract: The EP2 system is an electronic payment system and it stands for 'EFT/POS 2000' short for 'Electronic Fund Transfer / Point of Service 2000', is a joint project established by a number of (mainly Swiss) financial institutes in order to define the infrastructure for credit, debit ...read more

For more information please contact:

David Naumann
Professor
Lieb
Room 301
Phone: 201.216.5608
Fax: 201.216.8249

dnaumann@stevens.edu

February 23, 2009

Controlling Sensors through Physics: some Ideas for the well-founded Control of Mobile Sensor Networks

Speaker: Simon Dobson, UCD Dublin IE

Time: Monday, Feb 23, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Dominic Duggan

Abstract: Mobile sensors are an attractive proposition for environmental sensing, but pose significant engineering problems. Not least amongst these is the need to match the behaviour of the sensor platform to the physical environment in which it operates. We present initial work on using models of physical processes to generate models f ...read more

For more information please contact:

Professor Dominic Duggan
Associate Professor
Lieb
Room 303
Phone: 201.216.8042
Fax: 201.216.8249

dduggan@stevens.edu

February 9, 2009

Efficient Image Search and Retrieval using Compact Binary Codes

Speaker: Rob Fergus, NYU

Time: Monday, Feb 9, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Philippos Mordohai

Abstract: The vast majority of information on the Internet is in visual form, yet we currently lack effective methods for searching images or videos. Existing strategies rely mainly on textual cues which give impoverished and often misleading descriptions of the visual content. A key part of the challenge is that the search needs to be highly effi ...read more

For more information please contact:

Philippos Mordohai
Assistant Professor
Lieb
Room 215
Phone: +1 201 216 5611
Fax: +1 201 216 8249

pmordoha@stevens.edu

February 2, 2009

Developing Secure Software - Builders vs. Breakers

Speaker: Boaz Gelbord, Wireless Generation

Time: Monday, Feb 2, 2PM Location: Babbio 221, Stevens Institute of Technology Host: Wendy Hui Wang

Abstract: What is the best way to produce secure code - through Building or Breaking? The Building school holds that secure software can only result from security-trained developers who incorporate security principles into their coding. On the other hand, many software shops are built around a Breaking model - build software as fas ...read more

Stevens CS
        

News
gray gray Share/Save/Bookmark
Share
gray
Print
gray
Contacts  
 

Daniel Duchamp
Research Professor & Department Director
Lieb
Room 313
Phone: 201.216.5390
Fax: 201.216.8249
dduchamp@stevens.edu

Dawn Garcia
Administrative Assistant
Lieb
Room 317
Phone: 201.216.5578
Fax: 201.216.8249
dgarcia@cs.stevens.edu

Sherry Dorso
Assistant to the Director
Lieb 317
Phone: 201.216.5328
Fax: 201.216.8249
sdorso@stevens.edu

Stevens CS
Stevens CS Stevens CS Stevens CS
View my Iframe Content