Section 01 Individual Presentation Schedule - Fall, 20081 

Day Date Slot Name
Brief Topic Laptop?
Mon
October 27
1




2 Robert Middleton
A double-piped iterated hash function based on a hybrid of chaotic maps



3 Chris Zubak-Skees
AdWords and generalized Online Matching



4 Christopher Williams
How Social network sites embedded in the web? an exploratory link



5
Nathan Davis
VoteBox: a tamper-evident, verifiable electronic voting system



6
Peter Loughman Sotware Testing for Security yes


7
ZhenHua Lu
An interactive environment for beginning java programmers
yes


8
Deanna Loveland Cerberus: development of a humanoid robot

Wed October 29
1
Sam Gillis
On the fly Macros



2 Dylan Hall A Fast Method for Cryptanalysis of Substitution Ciphers


3 Elliot Stern
Monte Carlo Go



4 Jerome Waddell Using Hard and Soft AI algorithms to Simulate Human Go Playing Techniques
yes


5
Murray Miron Navigating Networks by using homophily and degree
yes


6
James Loomis
Brain computer interface, virtual reality, and videogames
yes


7
Rachel Thomas
Finding the chromatic number by means of critical graphs



8
Olarotimi Abiona Projecting our presence in space and in time

Mon November 3
1
Adam Herchenroether Archive storage system design for long-term storage of massive amounts of data



2 Anton Ryabinin
NOX: Towards an Operationg System for Networks



3 Chris Herbison
Analyzing and Improving Dta Quality



4 Vincent Reedhead
The Self Organizing Desk



5
Cameron Fiederer Efficient Event-driven simulation of parallel processor architectures



6
Ninoslav Jovancev The pagerank citation ranking: bringing order to the web



7
Richard Eckel
Discovering neglected conditions in software by mining dependence graphs



8
Sheraan Mohsin Visualization Optimization: Application to the RoboCup Rescue Domain
yes
Wed
November 5
1
Thomas Bottom
Low-power high performance reconfigurable computing cache architectures



2 Brian Leibig
Guidelines for Eliciting Usability Functionalities



3
Aleksey Kovtun
Evolving Neural Network Ensembles for control problems
yes


4
Daniel Iland Vulnerabilities in First-generation RFID enabled credit cards


5
Bryan Hodge Applied inexpensive AI techniques to computer games



6
Dan Muggeo TESSA, a system to aid communication with deaf people



7
Ryan Maier
Historical reflections will the future of software be open source?



8
this slot is not available to be used this slot is not available to be used
Last modified: Oct  29, 4pm