SeminarSchedule.Spring2008 History

Hide minor edits - Show changes to markup

August 25, 2008, at 10:44 AM by 129.174.88.95 -
Changed lines 4-12 from:
01/25/20083:00 PMDynamic Bi-Overlay Rotation for Streaming with Heterogeneous DevicesDongyu LiuST2, Room 430A
02/07/20082:00 PMVoIP over 802.11Henning SchulzrinneRoom 5&6, Sub II
02/22/20081:30 PMExploiting Hardware/Software Interactions for Embedded Systems DesignSibin MohanST2, Room 430A
03/07/20083:00 PMSecure Structures for Symmetric Key Ciphers and Their ApplicationsDebra CookST2, Room 430A
03/21/20083:00 PMSQLProb: A Proxy-based Architecture towards Preventing SQL Injection AttacksAnyi LiuST2, Room 430A
04/04/20083:00 PMRouting in Delay Tolerant NetworksMuhammad AbdullaST2, Room 430A
04/18/20083:00 PMRoving Bugnet: Distributed Surveillance Threat and MitigationRyan FarleyST2, Room 430A
to:
01/25/20083:00 PMDynamic Bi-Overlay Rotation for Streaming with Heterogeneous DevicesDongyu LiuST2, Room 430A
02/07/20082:00 PMVoIP over 802.11Henning SchulzrinneRoom 5&6, Sub II
02/22/20081:30 PMExploiting Hardware/Software Interactions for Embedded Systems DesignSibin MohanST2, Room 430A
03/07/20083:00 PMSecure Structures for Symmetric Key Ciphers and Their ApplicationsDebra CookST2, Room 430A
03/21/20083:00 PMSQLProb: A Proxy-based Architecture towards Preventing SQL Injection AttacksAnyi LiuST2, Room 430A
04/04/20083:00 PMRouting in Delay Tolerant NetworksMuhammad AbdullaST2, Room 430A
04/18/20083:00 PMRoving Bugnet: Distributed Surveillance Threat and MitigationRyan FarleyST2, Room 430A
August 16, 2008, at 03:59 PM by 129.174.88.95 -
Deleted lines 12-38:

Seminar Schedule of Fall 2007
DateTimeTopicSpeakerLocation
08/31/20073:00 PMEnabling "Out-of-the-Box" Malware Detection with Virtual MachinesXuxian JiangST2, Room 320
09/14/20073:00 PMIntrusion Detection on RootkitJing JinST2, Room 320
09/28/20073:00 PMBilling Attacks on SIP-Based VoIP SystemsXinyuan WangST2, Room 430
10/12/200712:00 PMThe Future of Internet SecuritySteve BellovinRoom E, Johnson Center
10/26/20073:00 PMOpenTor: Anonymity as a Commodity ServiceAngelos StavrouST2, Room 430
11/08/200712:00 PMOnline Buffer ManagementFei LiST2, Room 430
11/30/20073:00 PMScaling Properties of Worst-Case Delays in NetworksFlorin CiucuST2, Room 430
12/06/200710:30 AMThe Wireless Networks Program at the National Science FoundationJie WuST2, Room 430

Seminar Schedule of Spring 2007
DateTimeTopicSpeakerLocation
02/02/20073:00 PMAutonomic ComputingDaniel MenasceST2, Room 430
02/16/20073:00 PMRouting in Delay Tolerant NetworksMuhammad AbdullaST2, Room 430
03/02/20073:00 PMEnergy-efficient Reliable Bulk Data Dissemination in Sensor NetworksLeijun HuangST2, Room 430
03/16/20073:00 PMIP Telephony is Vulnerable to OverloadingHemant SengarST2, Room 430
03/30/20073:00 PMAttack-resilient Hierarchical Data Aggregation in Sensor NetworksSankardas RoyST2, Room 430
04/13/20073:00 PMNetwork Flow Watermarking Attack on Low-Latency Anonymous Communication SystemsXinyuan WangST2, Room 430
04/27/20073:00 PMSystem-level Power Management for Real-time ApplicationsVinay DevadasST2, Room 430
05/11/20073:00 PMexam weekcancelledST2, Room 430
05/25/20073:00 PMPAT: Peer-Assisted Transcoding for Overlay Streaming to Heterogeneous DevicesDongyu LiuST2, Room 430
August 16, 2008, at 03:59 PM by 129.174.88.95 -
Added lines 1-39:
Seminar Schedule of Spring 2008
DateTimeTopicSpeakerLocation
01/25/20083:00 PMDynamic Bi-Overlay Rotation for Streaming with Heterogeneous DevicesDongyu LiuST2, Room 430A
02/07/20082:00 PMVoIP over 802.11Henning SchulzrinneRoom 5&6, Sub II
02/22/20081:30 PMExploiting Hardware/Software Interactions for Embedded Systems DesignSibin MohanST2, Room 430A
03/07/20083:00 PMSecure Structures for Symmetric Key Ciphers and Their ApplicationsDebra CookST2, Room 430A
03/21/20083:00 PMSQLProb: A Proxy-based Architecture towards Preventing SQL Injection AttacksAnyi LiuST2, Room 430A
04/04/20083:00 PMRouting in Delay Tolerant NetworksMuhammad AbdullaST2, Room 430A
04/18/20083:00 PMRoving Bugnet: Distributed Surveillance Threat and MitigationRyan FarleyST2, Room 430A

Seminar Schedule of Fall 2007
DateTimeTopicSpeakerLocation
08/31/20073:00 PMEnabling "Out-of-the-Box" Malware Detection with Virtual MachinesXuxian JiangST2, Room 320
09/14/20073:00 PMIntrusion Detection on RootkitJing JinST2, Room 320
09/28/20073:00 PMBilling Attacks on SIP-Based VoIP SystemsXinyuan WangST2, Room 430
10/12/200712:00 PMThe Future of Internet SecuritySteve BellovinRoom E, Johnson Center
10/26/20073:00 PMOpenTor: Anonymity as a Commodity ServiceAngelos StavrouST2, Room 430
11/08/200712:00 PMOnline Buffer ManagementFei LiST2, Room 430
11/30/20073:00 PMScaling Properties of Worst-Case Delays in NetworksFlorin CiucuST2, Room 430
12/06/200710:30 AMThe Wireless Networks Program at the National Science FoundationJie WuST2, Room 430

Seminar Schedule of Spring 2007
DateTimeTopicSpeakerLocation
02/02/20073:00 PMAutonomic ComputingDaniel MenasceST2, Room 430
02/16/20073:00 PMRouting in Delay Tolerant NetworksMuhammad AbdullaST2, Room 430
03/02/20073:00 PMEnergy-efficient Reliable Bulk Data Dissemination in Sensor NetworksLeijun HuangST2, Room 430
03/16/20073:00 PMIP Telephony is Vulnerable to OverloadingHemant SengarST2, Room 430
03/30/20073:00 PMAttack-resilient Hierarchical Data Aggregation in Sensor NetworksSankardas RoyST2, Room 430
04/13/20073:00 PMNetwork Flow Watermarking Attack on Low-Latency Anonymous Communication SystemsXinyuan WangST2, Room 430
04/27/20073:00 PMSystem-level Power Management for Real-time ApplicationsVinay DevadasST2, Room 430
05/11/20073:00 PMexam weekcancelledST2, Room 430
05/25/20073:00 PMPAT: Peer-Assisted Transcoding for Overlay Streaming to Heterogeneous DevicesDongyu LiuST2, Room 430