SeminarSchedule.Spring2009 History
Hide minor edits - Show changes to output
Added line 11:
|| 05/08/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/optimal | Towards Optimal Resource Utilization in Heterogeneous P2P Streaming ]] || Dongyu Liu || Songqing Chen || Engineering Building, Room 4201 ||
Changed line 10 from:
to:
|| 05/01/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/pplive | A Case Study of Traffic Locality in Internet P2P Live Streaming Systems ]] || Yao Liu || Songqing Chen || Engineering Building, Room 4201 ||
Changed lines 9-10 from:
|| 04/24/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Vehicular | Open Problems in Vehicular Ad Hoc Network Security ]] || Eric Sawankoski || Sanjeev Setia || Engineering Building, Room 4201 ||
to:
|| 04/24/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Vehicular | Open Problems in Vehicular Ad Hoc Network Security ]] || Eric Swankoski || Sanjeev Setia || Engineering Building, Room 4201 ||
Changed lines 9-10 from:
|| 04/24/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Vehicular | Open Problems in Vehicular Ad Hoc Network Security ]] || Eric Sawankoski || Sanjeev Setia || New Engineering Building, Room 4201 ||
to:
|| 04/24/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Vehicular | Open Problems in Vehicular Ad Hoc Network Security ]] || Eric Sawankoski || Sanjeev Setia || Engineering Building, Room 4201 ||
Changed lines 9-10 from:
to:
|| 04/24/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Vehicular | Open Problems in Vehicular Ad Hoc Network Security ]] || Eric Sawankoski || Sanjeev Setia || New Engineering Building, Room 4201 ||
Changed lines 8-9 from:
|| 04/10/2009 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Malyzer | Defeating Anti-detection for Application-level Malware Analysis ]] || Lei Liu || Songqing Chen || ST2, Room 430A ||
to:
|| 04/10/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Malyzer | Defeating Anti-detection for Application-level Malware Analysis ]] || Lei Liu || Songqing Chen || ST2, Room 430A ||
Changed lines 8-9 from:
to:
|| 04/10/2009 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Malyzer | Defeating Anti-detection for Application-level Malware Analysis ]] || Lei Liu || Songqing Chen || ST2, Room 430A ||
Changed lines 7-8 from:
|| 03/03/2009 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Online-scheduling |
Online Scheduling of Packets with Deadlines in a Bounded Buffer ]] || Prof. Fei Li || Jyh-Ming Lien || ST2, Room 430A ||
Online Scheduling of Packets with Deadlines in a Bounded Buffer ]] || Prof. Fei Li || Jyh-Ming Lien || ST2, Room 430A ||
to:
|| 03/03/2009 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Online-scheduling | Online Scheduling of Packets with Deadlines in a Bounded Buffer ]] || Prof. Fei Li || Jyh-Ming Lien || ST2, Room 430A ||
Changed lines 7-8 from:
to:
|| 03/03/2009 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/Online-scheduling |
Online Scheduling of Packets with Deadlines in a Bounded Buffer ]] || Prof. Fei Li || Jyh-Ming Lien || ST2, Room 430A ||
Online Scheduling of Packets with Deadlines in a Bounded Buffer ]] || Prof. Fei Li || Jyh-Ming Lien || ST2, Room 430A ||
Changed lines 6-7 from:
to:
|| 02/20/2009 || 2:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/TOR | One Cell is Enough to Break Tor's Anonymity ]] || Prof. Xinwen Fu || Songqing Chen || ST2, Room 430A ||
Changed lines 5-6 from:
|| 02/13/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/SQL | Preventing SQL Injection Attacks: A Policy-based Data Type Checking Approach ]] || [[ Anyi Liu ]] || Songqing Chen || ST2, Room 430A ||
to:
|| 02/13/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/SQL | Preventing SQL Injection Attacks: A Policy-based Data Type Checking Approach ]] || Anyi Liu || Songqing Chen || ST2, Room 430A ||
Changed lines 5-6 from:
to:
|| 02/13/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/SQL | Preventing SQL Injection Attacks: A Policy-based Data Type Checking Approach ]] || [[ Anyi Liu ]] || Songqing Chen || ST2, Room 430A ||
Deleted line 3:
Changed lines 5-11 from:
<<<<<<<
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
=======
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
>>>>>>>
>>>>>>>
to:
Changed line 5 from:
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
to:
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || [[ http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang ]] || Songqing Chen || ST2, Room 430A ||
Added lines 7-9:
<<<<<<<
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
=======
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
=======
Added line 12:
>>>>>>>
Changed lines 4-8 from:
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
to:
<<<<<<<
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
=======
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
>>>>>>>
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || http://www.seas.gwu.edu/~nzhang10/ | Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
=======
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
>>>>>>>
Changed line 4 from:
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/tba | TBA ]] || TBD || TBD || ST2, Room 430A ||
to:
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2009S/webdatabase | Sampling Attacks Against Hidden Web Databases ]] || Prof. Nan Zhang || Songqing Chen || ST2, Room 430A ||
Added lines 1-4:
|| border=1 width=100%
||! [+++'''Seminar Schedule of Spring 2009'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Host ||! Location ||
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/tba | TBA ]] || TBD || TBD || ST2, Room 430A ||
||! [+++'''Seminar Schedule of Spring 2009'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Host ||! Location ||
|| 01/30/2009 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/tba | TBA ]] || TBD || TBD || ST2, Room 430A ||