Return to Skip Menu

Main Content

CESCA Previous Seminars


Previous seminars are listed in reverse chronological order in the table below.  Click the semester term to view the list of seminars.

Spring 2014       Fall 2013       Summer 2013       Spring 2013       Fall 2012       Spring 2012       Fall 2011      Spring 2011      

Fall 2010          Spring 2010     Fall 2009      Spring 2009      Fall 2008

Click the Semester Term in the table to view details about the seminars offered during the semester.  A Seminar Title leads to the abstract and speaker bio of the seminar.  Link under the Video column opens a new window for the particular seminar online.  

Date Speakers Seminar Title Video
Spring 2014
April 11 Dhruv Batra Hedging Against Uncertainty via Multiple Diverse Predictions Link
April 4 Chung-Hsing Hsu TUE, a New Energy-Efficiency Metric Applied at ORNL's Jaguar Link
March 21 Mantu K. Hudait Extremely High Mobility CMOS Logic  
March 7 CESCA Faculty CESCA Coffee + Cake  
February 21 Sarvesh Prabhu Property-Checking based LBIST for Improved Diagnosability Link
February 14 M. Zubair Shafiq Big Data Measurement and Analytics for Mobile Wireless Networks and Security Systems
(Note: the seminar was cancelled due to weather)
February 7 Dongyoon Lee Holistic System Design for Deterministic Replay Link
Fall 2013
December 6 Changhee Jung Effective Techniques for Understanding and Improving Data Structure Usage Link
November 22 CESCA students Wisdom of the Crowd
November 15 Devi Parikh Advancing Computer Vision by Leveraging Humans Link
November 1 Ayse K. Coskun Towards Sustainable Computing: Innovative Design and Management Strategies across the Computing Stack
October 25 Safa Messaoud Optimal Architecture Synthesis for Aircraft Electrical Power Systems Link
October 11 Bob Summers Building a Gigabit Community Link
October 4 Berk Sunar An FHE Implementation based on NTRU Link
September 27 Patrick Schaumont Don't talk to strangers (without authentication) Link
September 13 Michael Fowler Targeting Innovation for Defense Agencies through Sponsor Awareness Link
August 30 CESCA Faculty Welcome [back] to CESCA Link
Summer 2013
June 10 Francesco Regazzoni Towards the Automatic Application of Countermeasures Against Physical Attacks
Spring 2013
April 26 Dafeng (Daphne) Yao User Intention Based Anomaly Detection Link
April 5 Ali R. Butt On Using Simulations to Evaluate MapReduce Cluster Design Link
March 22 Ravi Tandon Interference Alignment with Time-varying Channel State Information Link
March 1 Houman Homayoun Dynamically heterogeneous cores through 3D resource pooling Link
February 8 John Lach Body Sensor Networks: An Application-Centric Approach Link
February 1 Neil Steiner Torc: open-source tools for reconfigurable computing Link
Fall 2012
December 7 Pamela Abshire BioChips: Learning from Biology Link
October 26 Gabe Westmaas  Learning to Scale a Public Cloud Link
October 19 Linda Xie  Distributed Broadcast in Multi-hop Cognitive Radio Ad Hoc Networks Link
October 5 Nathan Li  The Chronicles of Cyber Security: The offense, the defense and the analytics Link
September 28 Wu-Chun Feng  An Ecosystem for the New HPC: Heterogeneous Parallel Computing Link
September 21 Amira Youssef  Image Watermarking Techniques Using Histogram Tailored Chaotic Maps Link
September 14 Carlos Aguayo Gonzalez  Power Fingerprinting for integrity assessment of critical embedded systems Link
September 7 Jonathan Graf  FPGA Trust - Ensuring Design Integrity through Analysis of FPGA Bitstreams and IP Cores  
Spring 2012
May 18 Pranav Ashar Advanced-Sign-off Challenges for the Hybrid-Ecosystem Based SOC Paradigm  
April 20 Peng Ning CESCA Distinguished Lecture -- Cloud Computing Infrastructure Security Link
April 13 Dong Ha Maximum Power Point Tracking for Piezoelectric Energy Harvesting Circuits Link
April 6 Tevfik Bultan CESCA Distinguished Lecture -- String Analysis for Dependable Input Validation Link
March 16 Yu Wang Data Collection Capacity in Large-Scale Wireless Sensor Networks Link
March 2 Gyungsu Gyun Energy-efficient dual-band interconnect for future mobile computing system Link
February 17 Bo Gao Uplink Soft Frequency Reuse for Self-Coexistence of Cognitive Radio Networks Operating in White-Space Spectrum Link
February 10 Lynn Abbott How to Analyze Low-Quality Fingerprint Images Link
February 3 Patrick Schaumont Moving PUFs out of the lab Link
Fall 2011
December 2 Michael Hsiao Sufficiency-based Framework for Sequential Equivalence Checking  
November 11 Kenneth Schulz Overview of RC ICs: Industry Perspective Link
November 4 Rajeev Alur CESCA Distinguished Lecture: Interfaces for Control Components Link
October 28 Georg Weissenbacher SAT-based Design Debugging and Fault Localization Link
October 21 Zhichun Li Towards Scalable User-Agnostic Attack Defense Link
October 14 Malay Ganai Predicting Run-time Errors in x86 Executables of Multi-threaded C/C++/Java programs Link
September 30 Cansin Yaman Evrenosoglu An Insight to Contemporary Power Systems: Evolution, Operation and Challenges, Part II Link
September 23 Jean-Pierre Talpin
Jens Brandt
Polychrony as an abstract model of computation for GALS architectures
An Introduction to Synchronous Programming: Quartz
September 16 Cansin Yaman Evrenosoglu An Insight to Contemporary Power Systems: Evolution, Operation and Challenges, Part I Link
September 9 Sandeep Shukla Software Systems as Complex Networks – An invasive look into the structures of large software systems Link
September 2 Christian Colombo Handling Runtime Monitoring Overhead Link
Spring 2011
April 22 Mohammad Tehranipoor On-chip Structures and Methodologies for Reliable OC Design in Nanometer Era  
April 15 Raghu Pasupathy Optimal Parameter Choice in Sample-Path Methods for Root Finding and Optimization Link
April 1 Joseph Gaeddert CORNET: Virgnia Tech's Cognitive Radio Network  
March 25 Eric Vance Using Social Network Analysis to Understand Aspects of Behavior in African Elephants Link
February 25 Shobha Vasudevan GoldMine: Automatic Assertion Generation and Achieving Test Coverage Closure Link
February 18 Leyla Nazhandali Turning Lemons into Lemonade: Employing Process Variation for Building Chip Identifiers Link
February 11 Patrick Schaumont Specialized Machines for Cryptanalysis: Two examples, sixty years apart Link
February 4 Sandeep Shukla Exploring the Power System and Computation/Communication Systems Inter-dependency Link
Fall 2010
December 10 Edward A. Lee The first CESCA Distinguished Lecture - Computing Needs Time Link
November 19 Rahul Mangharam Closing the Loop with Networked Cyber-Physical Systems Link
November 5 Tom Martin A Case Study of an Interdisciplinary Design Course for Pervasive Computing Link
October 29 Phil Nigh The 'Top 10' Semiconductor Trends that are changing the way we Design, Manufacture, Test and Deliver High Quality ICs  
October 22 Alex K. Jones Cooperative Design Concepts for Chip Multiprocessors  
October 8 Dong Ha Small Scale Energy Harvesting - Principles, Practices, and Future Trends  
October 1 Chaun Han Optimal Cache-Based Router Repair for Real-Time Traffic  
September24 Xu Guo Fair and Comprehensive Performance Evaluation of SHA-3 Hardware Implementations  
September17 Mainak Ganga Design-for-Trust: Techniques to Detect Hardware Trojans in 3-PIPs  
September 10 Sandeep Shukla Sequential Code Synthesis from Concurrent Specifications
(at Department of Computer Science seminar)
Spring 2010
April 30 JingYao Zhang, Yi Tang, Sachin Hirve Sunshine: A Cross-domain Design Tool for Sensor Networks  
April 16 Benton Calhoun Sub-threshold Circuits and Architectures for Ultra Low Power Systems  
April 9 Danfeng (Daphne) Yao Host-Based Anomaly Detection Based on User Activities  
April 2 Majid Manteghi Chipless RFID  
March 19 Syed K. Islam High Temperature Electronics for Automotive and Wireless Sensor Applications  
March 5 Dong Ha Low-Power Active Wireless Sensor for Structural Health Monitoring  
February 26 Barbara G. Ryder Blended Program Analysis : Combining Static and Dynamic Analyses  
January 29 Nathan Short Modal-based Camera Correction for Large Baseline Stereo Imaging  
Fall 2009
December 4  Michael Gora  Exploring the Trusted Platform Module  
November 20 Ratnesh Kumar Fault Detection, Isolation, and Localization in Embedded Control Software  
November 13 Jason Worth Martin Parallel Performance of Some SHA-3 Second Round Candidates in GPUs  
November 6 Mike Henry From Transistors to MEMS: Throughput-Aware Power Gating in CMOS Circuits  
October 23 Naren Ramakrishnan Mining Graphical Models of Evolutionary Constraints in Protein Families  
October 16 Vignesh Vivekraja Circuit Level Decision for Enhanced Physical Uncloneable Functions  
October 2 Sandeep Shukla Automated Code Generation for Safety-Critical Embedded Applications from Formal Specifications  
September 17 Min Li An Ant Colony Optimization Technique for Abstraction-Guided State Justification  
September 4 CESCA Faculty Introductions of CESCA Research (no abstract)   
Spring 2009
April 17 Dennis W. Hong From Odin to DARwIn: Biologically Inspired Mobile Robots Developed at RoMeLa  
April 10 Mike Henry Fast Simulation Framework for Subthreshold Circuits  
February 13 Min-Ho Ka Synthetic Aperture Radars (SARs) for Remote Sensing Applications  
January 30 Thurmon Lockhart Prediction of Fall-Prone Elderly  
Fall 2008
December 5 Raghunandan Nagesh, Anand Balakrishnan Reddy, Abhranil Maiti Thermal Communication and Security Applications of Ring Oscillators  
November14 David Hwang, Kris Gaj  Efficient and Secure Hardware and Software
for Cryptography and Cryptanalysis
November 7 Daniel Inman  Monitoring and Harvesting  
October 31 Wu-Chun Feng  Green Supercomputing Comes of Age  
October 24 Yexin Zheng  A Novel Toffoli Network Synthesis Algorithm for Reversible Logic  
October 17 Sungyong Jung CMOS UWB Circuits and Systems for Radars and Communications  

    CESCA Logo

Seminars: Spring 2014
Fridays, February 7 to May 2 & May 8

New!  April 25 (F)
2:30pm - 3:30pm

Lavery Hall 320

Dr. Rolando Burgos and&
Dr. Zhiyu Shen

New!   CESCA Student Awards
2014 Awardees

CESCA Day 2014