Privacy Preserving Service Discovery in Mobile P2P Networks by Sanjay Madria. Monday, March 21, 2011

In mobile peer-to-peer networks, existing service discovery protocols disregard the exposure of the participating peers' privacy details (privileged information). In these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it correctly identifies the service providing peer. Thus, these peers face a problem; who should reveal their identity first, the service requesting or the service providing peer.

Presentation-Scheduling and Synchronization for Multi-Core Real-Time Systems by Karthik Lakshmanan

Monday, February 28th, 3:00 pm at Jacobs Believed in Me Auditorium

Presentation-Reverse Engineering of Data Structures from Binary by Zhiqiang Lin

The syntactic and semantic definitions of a program's data structures are valuable to many security and forensics applications, such as memory image mining, software vulnerability discovery, protocol reverse engineering, and virtual machine introspection. 

Presentation-Compositionality and Modularity in Embeddded System Design: Interface Synthesis and Interface theories by Stavros Tripakis

 Compositionality and modularity in embedded system design: Interface synthesis and interface theories by Stavros Tripakis. Monday, February 14th, 4:00 pm, Jacobs Believed in Me Auditorium.

Presentation-Visualizing Biological Data by Miriah Meyer

Visualization tools are essential for deriving meaning from the avalanche of data we are generating today. To facilitate an understanding of the complex relationships embedded in this data, visualization research leverages the power of the human perceptual and cognitive systems, encoding meaning through images and enabling exploration through human-computer interactions. In my research I design visualization systems that support exploratory, complex data analysis tasks by biologists who are analyzing large amounts of heterogeneous data.

Electrical Engineering & Computer Science Faculty Search Presentation by Jur van den Berg - February 10, 2011

Recent Advances in Collision Avoidance and Motion Planning for Autonomous Robots by Jur van den Berg, Thursday, February 10th - 3:00 pm, Jacobs Believed in Me Auditorium.

Research Seminar - January 19, 2011- Rigorous Component-based System Design Using the BIP Framework

Professor Joseph Sifakis will host a Research Seminar on January 19, 2011 at 3:30 pm at the ISDE/ISIS School of Engineering location at 1025 16th Avenue South in Suite 213.

Rigorous system design requires the use of a single powerful component framework allowing the representation of the designed system at different levels of abstraction, from application software to its implementation. Such a framework allows to maintain overall coherency and correctness of the design flow by comparing different architectural solutions and their properties.

The John R. and Donna S. Hall Engineering Lecture Series - The Evolution of Computer Science

The founder of Verimag Laboratory in Grenoble, France, will deliver Vanderbilt University School of Engineering’s John R. and Donna S. Hall Engineering Lecture Thursday, Jan. 20, at 4 p.m. in Jacobs Believed in Me Auditorium, Featheringill Hall. A reception will follow the lecture.

Janos Sztipanovits receives Air Force Meritorious Civilian Service Award Medal for defense projects

Janos Sztipanovits, E. Bronson Ingram Distinguished Professor of Engineering, received the Air Force Meritorious Civilian Service Award Medal and a Citation at the 2010 banquet of the Air Force Scientific Advisory Board Oct. 6 in Arlington, Va.

The Meritorious Civilian Service Award is commonly the second highest award and medal provided to civilian employees within agencies of the federal government of the United States.