Date | Notes
Sessions |
Topics |
Dec. 4, 1:30pm-4:30pm, ECS660 |
Workshop/Student presentations Session 1: 1:30pm-2:45pm 1) Hichem Rehouma, Ali Alwalid, Khmais Elnawaa, Capacity analysis of 802.11 networks 2) Tianyang Li, Queuing Model Analysis of Hospital Congestion 3) Trevor Adams, Dylan Griff, Elizabeth Heslop, RED queue analysys 4) Braighton Polack, Marco Rohon O'Halloran, How much users a WiFi access point can support? 5) Jackson Kostiuk, Nick Likar, and Alexander Fisher, Card shuffling 6) Jigar Patel, Risham Guram, Nefsal M. rDCF: a relay-enabled MAC protocol for wireless ad hoc networks 7) Weizheng Li, Pin Yin to character converting algorithm 8) Harpreet Singh Brar and Navjot Singh, Layer-2 Protocol Design for Vehicle Safety Communications in Dedicated Short Range Communications Spectrum 9) Kevin Mok, Yang Fang, Kruskal count and kangaroo method 10) Eric Krystofiak and Michael Campell, Analysis on Distributed Denial-of-Service (DDoS) 11) Doug Maclean, Analysis of the bounds of a broadcast network that uses the Building Automation and Control network (BACnet) protocol 12) Raymond Zhi Zeng and Candace Chen, Vehicle-to-vehicle safety messaging in DSRC 13) Byron Cole and John Mack, Card shuflling with card counting applications Session 2: 3:00pm - 4:15pm 14) Salahuddin Jokhio, Shahbaz Ali, Abdul Alenazi, On analysis of adaptive RED and stabilized RED in terms of queue performance matrices 15) Chinelo Udoka, Zhuo Chen, Yiming Li, PRESS: PRedictive Elastic ReSources Scaling for cloud systems 16) Hanan Alhindi, A Makrov-based channel model algorithm for wireless networks 17) Ajay Khatri, Markov chain based analysis of google pagerank algorithm 18) Mohammad Ghasemiahmadi, Modeling and analysis of linear multi-hop networks 19) Navjot Singh and Harpreet Singh Brar, V2V safety messaging in DSRC 20) Cameron Hesse and Darren Prince, Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement 21) Vivek Ratan, Hao Shuai, and Amir, Wireless security standards and their supporting technologies 22) Linlin Zhang, Jingjing Lin, Chechen Guo, Detailed analysis of card shuffles 23) Jigar Patel, Risham Guram, Nefsal M. rDCF: a relay-enabled MAC protocol for wireless ad hoc networks 24) Akanksha Sharma and Tushar Mehra, Improving DCF for supporting TCP 25) Jiayi Chen, Social Network Privacy Protection 26) Mohammad Ghasemiahmadi, Modeling and analysis of linear multi-hop networks |
|
Probability problems |
|