List of qualifying seminars - Spring 2013

  1. Feb 11, 2:00 - 3:00 pm, ENG-4201
    Houman Homayoun, Assistant Professor, ECE Department, GMU
    Dynamically heterogeneous cores through 3D resource pooling
  2. Feb 14, 10:00 - 11:00 am, ENG-4201
    Davide Falessi & Forresr Shull, Fraunhofer Center for Experimental Software Engineering in Maryland (CESE)
    Applying Empirical Software Engineering to Software Architecture: Challenges and Lessons Learned
  3. Feb 12, noon - 1:00 pm, ENG-4201
    Brendan Klare, Scientist, Noblis.
    Heterogeneous Face Recognition
  4. Feb 15, 11:00 am - noon, Research Hall 163
    Don Towsley, Professor, Computer Science Department, University of Massachussets
    A Walk in the Dark: Random Walks and Network Discovery
  5. Feb 18, 11:00 am - noon, Research Hall 401
    Selcuk Uluagac, Georgia Institute of Technology
    GTID: A Technique for Physical Device and Device Type Fingerprinting
  6. Feb 26, 11:00 am - noon, ENG-4201
    Sonia Haiduc, Ph.D. Candidate, Wayne State University
    Improving Text Retrieval Applications in Software Engineering: A Case on Concept Location (faculty recruitment talk)
  7. Feb 28, 10:00 - 11:00 am, ENG-4201
    Kathryn Stolee, Ph.D. Candidate and NSF Graduate Research Fellow, the University of Nebraska-Lincoln
    Solving the Search for Source Code (faculty recruitment talk)
  8. Mar 5, 12:0 - 1:30 pm, ENG-4201
    Jessica Lin, Computer Science Department, George Mason University
    Discovery of Novel Patterns in Massive Time Series Data
  9. Mar 28, 2:00 - 4:00 pm, ENG 4201
    Guodong Shao, Ph.D. Candidate, The Volgenau School of Engineering, George Mason University
    Deecision Guidance for Sustainable Manufacturing (dissertation defense)
  10. Marc 20, 1:00 - noon, Research Hall - 163
    Lydia Kavraki, Professor of Computer Science and Bioengineering, Rice University
    Automatic Annotation of Protein Function
  11. Mar 29, 12:30 - 1:30 pm, ENG-4201
    Haibin Ling, Department of Computer and Information Sciences, Temple University
    Multi-target Tracking by Rank-1 Tensor Approximation
  12. Mar 25, 11:00 am - noon, ENG-4201
    Claire Le Goues, Ph.D. Candidate, Computer Science Department, the University of Virginia
    Automatic Program Repair Using Genetic Programming (faculty recruitment talk)
  13. Mar 28, 10:00 am - noon, ENG-4201
    Denys Poshyvanyk, Computer Science Department, College of William and Mary
    Searching for Relevant Functions and Their Usages in Millions of Lines of Code (faculty recruitment talk)
  14. May 2, 1:30 - 3:30 pm, ENG-4201
    Paul Ngo, Ph.D. Candidate, Computer Science Department, George Mason University
    Emergency Communications via Handheld Devices (dissertation defense)
  15. Apr 24, 10:00 am - noon, Eng-4201
    Yau liu, Ph.D. Candidate, Computer Science Department, George Mason University
    Towards Power-Efficient Internet Streaming to Mobile Devices (dissertation defense)
  16. Apr 30, 2:00 - 4:00 pm, ENG-4801
    Zeehasham Rasheed, Ph.D. Candidate, Computer Science Department, George Mason University
    Data Mining Framework for Metagenome Analysis (dissertation defense)
  17. Apr 19, 11:00 am - noon, Research Hall - 163
    Eric Xing, School of Computer Science, Carnegie Mellon University
    Machine Learning Approaches to Network and Social Media
  18. Apr 17, 2:00 - 3:00 pm, ENG-4201
    Nigel Waters, Department of Geography and Geoinformation Science, George Mason University
    Using GIS to Optimize Liver Transplant Locations in the US and Other Health GIS Projects
  19. May 2, 10:00 am - noon, ENG-357
    Firas Alomari, Ph.D. Candidate, The Volgenau School of Engineering, George Mason University
    An Autonomic Framework for Integrating Security and Quality of Service Support in Databases (dissertation defense)
  20. May 1, 9:00 - 11:00 am
    Meixing Le, Ph.D. Candidate, The Volgenau School of Engineering, George Mason University
    Secure Cooperative Data Access in Multi-Cloud Environment (dissertation defense)
  21. May 16: 11:00 am - noon, ENG-4201
    Dov Gordon, Senior Research Scientist, Applied Communication Sciences
    Computing Securely With Big Data