2016 IEEE International Symposium on Technologies for - IEEE-HST

Loading...
2016 IEEE International Symposium on Technologies for Homeland Security 10 - 12 May 2016 Waltham, MA USA

May 10, 2016 7:00 AM Registration & Vendor/Poster Setup

8:30 AM - 11:30 AM Introduction to Cyberwarfare, Cybercrime and Cybersecurity with Demonstration of Cyber Attack Tools George Markowsky, Professor of Computer Science, Director Cybersecurity Lab, School of Computing and Information Science, University of Maine, Orono, Maine, USA

12:30 PM Welcome to HST 2016 James Flavin, MIT Lincoln Laboratory 12:40 - 2:40 PM Ms. Elizabeth Puchek, Director of Systems Engineering, Office of Technology and Acquisition, U.S. Customs and Border Protection RADM Steven G. Smith USN (Ret) / Senior Government Executive (SES), Director, Disaster Planning & Risk Management, U.S. Small Business Administration Richard W. Vorder Bruegge, Senior Photographic Technologist at the Federal Bureau of Investigation

2:40 PM Break

2:55 PM Technical Program Overview Gerald Larocque, MIT Lincoln Laboratory

3:05 PM Cyber Security Track Overview David Balenson, SRI International; Claire Applegarth, The MITRE Corporation; Mark Peters, The MITRE 3:10 PM Attack and Disaster Preparation, Recovery, and Response Track Overview Lance Fiondella, UMass, Dartmouth Kenneth Crowther, MITRE 3:15 PM Land and Maritime Borader Security Track Overview Karen Panetta, Tufts University Rich Moro, Raytheon John Aldridge, MIT Lincoln Laboratory 3:20 PM Biometrics and Forensics Track Overview Eric Schwoebel, MIT Lincoln Laboratory James L. Wayman, San Jose State University 3:25 Best Paper Awards

3:40 PM Break

4:00 - 5:30 PM

Cyber Security 1: System Security Security Tenets for Life Critical Embedded Systems Ann Cox*, DHS S&T CSD I Can Detect You: Using Intrusion Checkers to Resist Malicious Firmware Attacks Devu Manikantan Shila*, United Technologies Research; Penghe Geng, ; Teems Lovett,

Corporation

Battelle Barricade: A Nondestructive Electronic Component Authentication and Counterfeit Detection Thomas Bergman*, Battelle; Katie Liszewski, Battelle

Technology

Attack/Disaster 1: Resilience Quantification Response and Recovery: A quantitative approach to emergency management Carol Romanowski*, RIT; Jennifer Schneider, RIT; Rajendra Raj, RIT; Sumita Mishra, Rochester Institute of

Technol

Mapping a community resilience management system: building operational knowledge Jennifer Schneider*, RIT; Carol Romanowski, RIT; Rajendra Raj, Rochester Institute of Tech; Sumita Mishra, Rochester Institute of Technol; Jon Aleckna, RIT; Kai Wang, RIT Properties and use of a resilience index in disaster preparation and response Horia-Nicolai Teodorescu*, Romanian Academy ; Stefan Wolfgang Pick, Universität der Bundeswehr München, Germany

Land & Maritime Border 1: Border Processes, CONOPS & System Architecture Turning Security Monitoring into an Engaging High Performance Task Malcolm Dcosta, University of Houston; Dvijesh Shastri, University of Houston Downtown; Panagiotis Tsiamyrtzis, Athens University of Economics and Business; Ioannis Pavlidis*, University of Houston Multitasking Intelligent Surveillance and First Response System Mais Nijim*, Texas A&M University Kingsvill Meaningful and Meaningless Statements Using Metrics for the Border Condition Fred Roberts*, Rutgers

Biometrics and Forensics 1: General Topics An Survey of Homeland Security Biometrics and Forensics Research Vidhyashree Nagaraju, University of Massachusetts; Lance Fiondella*, University of

Massachusetts

A MULTI-BIOMETRIC FEATURE-FUSION FRAMEWORK FOR IMPROVED UNI-MODAL AND MULTI-MODAL HUMAN IDENTIFICATION Dane Brown*, Rhodes University Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions Mehrdad Sharbaf*, CSUDH; Emi Morioka , CSUDH 5:30 PM Break

6:00 PM - 8:30 PM Welcome Reception and Posters (food and drinks will be served) Real Time Big Data Analytics for Predicting Terrorist Incidents Ibrahim Toure*, UMBC; Aryya Gangopadhyay, UMBC A Resilient Critical Infrastructure in the Age of the “Internet of Things” Luis Cruz-Rivera*, Resilient Corp; Thomas Barnett, Resilient; Jeff Gaynor, Resilient Countering Improvised Explosive Devices With Adaptive Sensor Networks Jorge Buenfil*, Stevens Institute of Technolog; Jose Ramirez-Marquez, Stevens Institute of

Technology

Active Shooter Mitigation for Gun-Free Zones Adam Kirby*, Purdue University; J. Eric Dietz, Purdue University Secure facilities for Nuclear Warheads Prof.Dr.Mr.Ashraf Mohamed*, BRNO University Multiple People Tracking using Contextual Trajectory Forecasting Pranav Mantini*, University of Houston; Shishir K. Shah, University of Houston Network Security via biometric recognition of patterns of gene expression Harry Shaw*, Space Network Project, NASA/GS Neuromorphic and Early Warning Behavior-Based Authentication for Mobile Devices Matthew Phillips*, HRL Laboratories; Nigel Stepp, HRL Laboratories; Jose Cruz-Albrecht, HRL Laboratories; Vincent De Sapio, HRL Laboratories; Tsai-Ching Lu, HRL Laboratories; Vincent Sritapan, Department of Homeland Security – Science & Technology Directo Electroencephalogram (EEG) Based Authentication Leveraging Visual Evoked Potentials (VEP) Resulting From Exposure To Emotionally Significant Images Ricardo Rodriguez*, Raytheon None Invasive Biometric for Patient information Satisfying Patient’s Security Concerns Okey Igbonagwam*, Saint Leo University; Kingsley Nwosu, Saint Leo University Security Analysis and Improvement of USB Technology Daniel Noyes, Univ of MA Dartmouth; Hong Liu*, Univ of MA Dartmouth; Paul Fortier, Univ of MA

Dartmouth

A Study on the Privacy and Security of Police Body Cameras Deployments Chiu Tan*, Temple University Dynamic Rule Generation for SCADA Intrusion Detection Jeyasingam Nivethan*, University of Tulsa; Mauricio Papa, University of Tulsa Automated rootkit detection using SSDT hooks extracted from memory images Rayan Mosli*, Rochester Institute of Technol; Rui Li, Rochester Institute of Technology; Yin Pan, Rochester Institute of Technology

Empowering Android MDMs Using Non-traditional Means Ryan Johnson*, Kryptowire / George Mason University; Angelos Stavrou, Kryptowire; Vincent Sritapan, Department of Homeland Security – Science & Technology Directorate Covert Ground and Port Surveillance Using Hyperbox®: Rayleigh Backscattering from Fiber Optics Jefferson Odhner*, Odhner Holographics; Jonathan Mohlenhoff, Tesseract Sensors; Jake Carr, Tesseract Sensors; Darren Flynn, Tesseract Sensors; Ronnie Sartain, Tesseract Sensors Research, Analysis and Implementation of Self-organizing, Heterogeneous Ad Hoc Network Dedicated to Monitor People in Ship Environment Krzysztof Cwalina*, Gda Technolog; Piotr Rajchowski, Gdank University of Technology; Pawe Kosz, Gdansk University of Technolog; Jaros aw Sadowski, Gdansk University of Technology Wireless Communication Supported by Contactless Fingerprints Sam Mil'shtein*, ECE Dept. UMass; Stanislav Datskovsiy, Consulting Co.

sk University of

2016 IEEE International Symposium on Technologies for Homeland Security 10 - 12 May 2016 Waltham, MA USA

May 11, 2016 7:00 AM Continental Breakfast

8:00 - 10:00 AM

Cyber Security 2: Cyber Analysis Semantic Ontologies for Cyber Threat Sharing Standards Elchin Asgarli*, Georgetown University; Eric Burger, Georgetown University Learning to Rank for Alert Triage JD Doak*, Sandia National Laboratories; Michael Bierma, Sandia National Laboratories; Corey Hudson, Sandia National Laboratories

Cyber Security 2: Mobile Authentication Two-Factor Authentication through Near Field Communication Matthew Crossman, Univ of MA Dartmouth; Hong Liu*, Univ of MA Dartmouth A multi-faceted approach to user authentication for mobile devices—using human movement, usage, and location patterns Devu Manikantan Shila*, United Technologies Research; Kunal Srivastava, ; Paul O'Neill, ; Kishore Reddy, ; Vincent Sritapan,

Attack/Disaster 2: Fire Critical Infrastructure Protection for Sub Stations and Transformers John Sinisi*, Ballistic Fire Barrier LLC Modelling Urban Fires in Mediterranean and Middle-East Cities Yonatan Shaham*, Tel Aviv University; Itzhak Benenson, Tel Aviv University Modeling of a Statistical Fire Spread to Respond Fire Accident in Buildings Jeongwan Kim*, Purdue university; J. Eric Dietz, Purdue University Modeling of a Multi-Robot Energy Saving System to Increase Operating Time of a Firefighting Robot Jeongwan Kim*, Purdue university

Land & Maritime Border 2: Airborne Sensing and Imaging Aerial Precision 3D Ground Surveillance and Localization Using a Network of Inexpensive, Disposable, Image-based Sensors Almir Davis*, Draper Laboratory Enduring Vigilance (EV) (Fixed Wing Aircraft Squadrons & CONOPS for 24/7 Border Patrol) Anthony Petrella*, Lake/MARIP International Optimum Solution Information Theoretic Metric for Hyperspectral Aerial Imagery Band Specific Similarity Measures with Application to Large Border Surveillance and Monitoring Dalila Megherbi*, CMINDS center/UMASS Lowell; Imran Vakil, AFRL; John Mallas, AFRL Contrast Enhancement for Color Images Using Discrete Cosine Transform Coefficient Scaling Arash Samani*, The MITRE Corporation; Karen Panetta, Tufts University; Sos Agaian, University of Texas at San Antonio

Biometrics & Forensics 2: Face Recognition A Model for Ethnic-Specific Age Group Ranking Approach for Facial Age Estimation using Raw Pixel Features Joseph Akinyemi*, UNIVERSITY OF IBADAN; Olufade Falade ONIFADE, UNIVERSITY OF IBADAN Computerized sketch to Face Photos Recognition based on the Human Visual System Qianwen Wan*, Tufts University; Karen Panetta, Tufts University Analysis of the Effect of Selecting Statistically Significant Registered Image Pixels on Individual Face Physiognomy Recognition Accuracy Dalila Megherbi*, CMINDS center/UMASS Lowell; Iliana Voynichka, CMINDS/UMASS Lowell New Biometrics Ear-Eye Pitch (E2P) Leonid Naimark*, BAE Systems; Paul Briggs, BAE Systems 10:00 - 10:30 Break

10:30 AM - 12:00 noon

Cyber Security 3 Panel The Burr-Feinstein Government Access Bill: Policy, Ethics, and Technology Issues In the aftermath of the Apple-FBI dispute over a court’s ordering Apple to assist the FBI in accessing an encrypted iPhone, Senators Burr and Feinstein have proposed legislation mandating that hardware and software manufacturers comply with court orders to provide “intelligible” versions of communications when the manufacturer’s product has rendered data otherwise unintelligible through encryption. Panelists will discuss policy, ethics, and technology issues surrounding the Burr-Feinstein bill and other proposals mandating that manufacturers maintain a government access mechanism for their products. Panelists: ▪ Ms. April Doss - Partner, Saul Ewing & Former Assistant General Counsel for Intelligence Law, NSA ▪ Dr. Hong Liu - Professor of Electrical and Computer Engineering, University of Massachusetts

Dartmouth

Attack/Disaster 3: DIORAMA Infrastructure-less and Calibration-free RFID-based Localization Algorithm for Victim Tracking in Massive Casualty Incidents Zhuorui Yang*, UMass Amherst; Aura Ganz, UMass Amherst Spatiotemporal Digital Forensic Toolkit for Mass Casualty Incidents: Interactive Incident Playback and Anomaly Detection Jingyan Tang*, University of Massachusetts Am; James Schafer, University of Massachusetts Amherst; Zhuorui Yang, University of Massachusetts Amherst; Aura Ganz, University of Massachusetts Amherst Augmented Reality based Mass Casualty Incident Training System Hao Dong*, Univ. of massachusetts Amherst; James Schafer, University of Massachusetts Amherst; Aura Ganz, University of Massachusetts Amherst

Land & Maritime Border 3: Big Data & Analytics Acoustic Methods of Invasive Species Detection in Agriculture Shipments Alexander Sutin*, Stevens Institute of Technology Border Crossing Data Acquisition, Analysis, and Use Pramud Rawat*, DASS Visual Analytics for Investigative Analysis of Hoax Distress Calls using Social Media Junghoon Chae*, Purdue University; Ziawei Zhang, Purdue University; Sungahn Ko, Purdue University; Abish Malik, Purdue University; Heather Connell, Purdue University; David Ebert, Purdue University

Biometrics & Forensics 2: DNA Human CODIS STR Loci Profiling from NGS Data Darrell Ricke*, MIT Lincoln Laboratory; Martha Petrovick, MIT Lincoln Laboratory; Johanna Bobrow, MIT Lincoln Laboratory; Tara Boettcher, MIT Lincoln Laboratory; Christina Zook, MIT Lincoln Laboratory; Edward Wack, MIT Lincoln Laboratory; Eric Schwoebel, An Intelligence Paradigm Shift Utilizing DNA Next Generation Sequencing Stephen Gabavics*, MIT Lincoln Lab US Army KinLinks: Software Tool for Kinship Analysis and Pedigree Generation from NGS Datasets Anna Shcherbina, MIT Lincoln Laboratory; Darrell Ricke*, MIT Lincoln Laboratory; Eric Schwoebel, MIT Lincoln Laboratory; Tara Boettcher, MIT Lincoln Laboratory; Christina Zook, MIT Lincoln Laboratory; Johanna Bobrow, MIT Lincoln Laboratory; Martha Petrovi 12:00 PM Lunch

1:00 PM - 3:00 PM

Cyber Security 4: Attack Modeling Producing and Evaluating Crowdsourced Computer Security Attack Trees George Markowsky*, University of Maine; Dan Bogaard, Rochester Institute of Technology; Sanjay Goel, SUNY Albany; Shreshth Kandari, Rochester Institute of Technology; Daryl Johnson, Rochester Institute of Technology; William Stackpole, Rochester Institute Propagating Mixed Uncertainties in Cyber Attacker Payoffs: Exploration of Two-Phase Monte Carlo Sampling and Probability Bounds Analysis Samrat Chatterjee*, Pacific Northwest National Lab; Ramakrishna Tipireddy, PNNL; Matthew Oster, PNNL; Mahantesh Halappanavar, PNNL A Novel Centrality Measure for Network-wide Cyber Vulnerability Assessment Arun Sathanur*, Pacific Northwest National Lab; David Haglin, Pacific Northwest National Lab Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems Sudip Saha*, Virginia Tech; Anil Kumar S. Vullikanti, Virginia Tech; Mahantesh Halappanavar, PNNL; Samrat Chatterjee, Pacific Northwest National Lab

Attack/Disaster 4: CBNRe/ HazMat Design and Experimental Validation of UAV-Assisted Radiological and Nuclear Sensing Daniel Behnke*, TU Dortmund University; Sebastian Rohde, TU Dortmund University; Christian Wietfeld, TU Dortmund University Hazmat Dispersion Modeling in Support of Urban Emergency Response for the Fire Brigade in Hamburg, Germany Eva Berbekar, University of Hamburg, Frank Harms, University of Hamburg, Bernd Leitl, University of Hamburg, Jay Boris, Naval Research Laboratory, Adam Moses, Naval Research Laboratory, Keith Obenschain, Naval Research Laboratory, Gopal Patnaik*, Naval Research Laboratory, Susanne Fischer, City of Hamburg Ministry of Interior and Sports Overview of the principles and practice of biodosimetry Harold Swartz*, Geisel School of Medicine; Ann Flood, geisel school of medicine

Land & Maritime Border 4: CIKR Site Protection

Experimental Security Surveillance System for an Island-Based Facility Alexander Yakubovskiy*, Stevens Institute of Technology Walk-Through Metal Detectors for Stadium Security Christie Nelson*, Rutgers University

Biometrics & Forensics 4: Eye Ultrafast Blur Evaluation in Ocular Biometrics Plamen Doynov*, MRIGlobal; Pavan Tankasala, UMKC Multi-feature Representation of Ocular Surface Vasculature for Biometric Recognition Pavan Tankasala*, UMKC; Plamen Doynov, MRIGlobal A Robust Scheme for Iris Segmentation in Mobile Environment Sai Narsi Reddy Donthi Reddy*, UMKC; Ajita Rattani , UMKC; Reza Derakhshani, UMKC On a Taxonomy of Ear Features Susan El-Naggar*, WVU; Ayman Abaza, Cairo University; Thirimachos Bourlai, West Virginia

University

3:00 PM Break

3:30 PM - 5:00 PM

Cyber Security 5: Research Methodologies and Ethics Applying the scientific method to cybersecurity research Mark Tardiff*, Pacific Northwest National Lab Measuring efficacy of a classroom training week for a military cybersecurity training exercise Gary Deckard*, Indiana University; Jean Camp, Indiana University The Ethics of Hacking Back Corey Holzer*, Purdue University; James Lerums, Purdue University

Attack/Disaster 5: Cyber Critical Infrastructure Drone classification and identification system by phenome analysis using data mining Mais Nijim*, Texas A&M University Kingsvill; Nikhil Mantrawadi,

techniques

Secure Mobile Technologies for Proactive Critical Infrastructure Situational Awareness Gabriel Salles-Loustau, Rutgers University; Saman Zonouz*, Rutgers University; vidyasagar sadhu, Rutgers University; Dario Pompili, Rutgers University; Vincent Sritapan, Department of Homeland Security – Science & Technology Directorate Resilience and Risk: Problems and Solutions in Homeland Security Context Igor Linkov*, US Army Engineer R&D Center

Attack/Disaster 9: Information Sharing & Analysis Adapting NIEM Input for Automated Privacy Policy Reasoning Ben Yuan*, MIT CSAIL Common Information Space for Collaborative Emergency Management Maike Kuhnert*, TU Dortmund University; Christina Schäfer, Paderborn University; Jens Pottebaum, Paderborn University; Monika Büscher, Lancaster University; Katrina Petersen, Lancaster University Programming Language Support for Analyzing Non-Persistent Data Yung-Hsiang Lu*, Purdue University; Milind Kulkarni, Purdue University; Jerry Zhu, University of

Wisconsin

Improve Safety using Public Network Cameras Youngsol Koh, Purdue University; Anup Mohan, Purdue University; Guizhen Wang, Purdue University; Hanye Xu, Purdue University; Abish Malik, Purdue University; YungHsiang Lu*, Purdue University; David Ebert, Purdue University

Biometrics & Forensics 5: Fingerprint Improved Fingercode Alignment for Accurate and Compact Fingerprint Recognition Dane Brown*, Rhodes University Evaluation of ‘non-traditional’ fingerprint sensor performance Richard Lazarick*, CSRA; Patricia Wolfhope, DHS Robust and Interoperable Fingerprint Spoof Detection via Convolutional Neural Networks Emanuela Marasco*, UNCC; Peter Wild, AIT; Bojan Cukic, UNCC 5:00 PM HST 2016 Conference Organization Committee Meeting / Evening Free

2016 IEEE International Symposium on Technologies for Homeland Security 10 - 12 May 2016 Waltham, MA USA

May 12, 2016 7:00 AM Continental Breakfast 8:00 AM Announcements: Plans for HST 2017

8:30 AM Jalal Mapar (SES), Sr. Technical Advisor to Asst Secretary, DHS NPPD Infrastructure Protection / Division Director, DHS Science & Technology Directorate

9:00 AM Mr. Dave Masters, Senior Program Advisor, S&T 9:30 AM Mr. Shawn Romanoski, Telecommunications Director, Boston Police Department 10:00 AM Break

10:30 AM - 12:00 PM

Cyber Security 6: Network Security 1 A Linux-based firewall for the DNP3 protocol Jeyasingam Nivethan*, University of Tulsa; Mauricio Papa, University of Tulsa RADAR: An Automated System for Near Real-Time Detection and Diversion of Malicious Network Traffic Ziad El Jamous *, Intelligent Automation, Inc. ; Sohraab Soltani, Intelligent Automation, Inc. ; Yalin Sagduyu, Intelligent Automation, Inc.; Jason Li, Intelligent Automation, Inc. Secured Formation Control for Multi-agent Systems Under DoS Attacks Esther Amullen*, Tennessee State University; Sachin Shetty, Tennessee State Univeristy; Lee Keel, Tennessee State Univeristy

Attack/Disaster 6: Prediction and Managment Using Scenario Planning to Predict/Prevent Future Terror Attacks Larry Chasteen*, University of TX at Dallas Characterizing Sex Trafficking in Pennsylvania for Law Enforcement Nicklaus Giacobe*, Penn State University; Peter Forster, Penn State University; Jesse Altmire, Penn State University; Andrea Forster, Penn State University; Addie Jackson, Penn State University; Erick Raibick, Penn State University; James Reep, Penn State University; Rebecca Tsang, Penn State University Human Collaboration in Homeland Security Robert Desourdis*, SAIC; Kuan Collins, SAIC

Biometrics & Forensics 6: Tatoo Automatic and Manual Tattoo Localization Joonsoo Kim*, Purdue University; Landis Huffman, The MITRE Corporation; He Li, ; Jiaju Yue, ; Javi Ribera, ; Edward Delp, Purdue University Tattoo Image Retrieval for Region of Interest Joonsoo Kim*, Purdue University; He Li, ; Jiaju Yue, ; Edward Delp, Purdue University Mixed Media Tattoo Image Matching Using Transformed Edge Alignment Landis Huffman*, The MITRE Corporation; Jacob McDonald, The MITRE Corp. 12:00 PM - 1:00 PM Lunch

1:00 PM - 3:00 PM

Cyber Security 7: Network Security 2 Gathering Threat Intelligence Through Computer Network Deception

Vincent Urias*, Sandia National Labs; William Stout, Sandia Labs; Han Lin, Sandia Labs

Cyber Security 7: Risk Assessment Modeling Cybersecurity Risks: Proof of concept of a holistic approach for integrated risk

quantification

Mariana Cains*, Indiana University School of P; Diane Henshel, ; Hasan Cam, ; Iulian Neamtiu, ; Blaine Hoffman, ; Alexander Alexeev, ; Jeffrey Rowe Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success Tanveer Hossain Bhuiyan, Mississippi State University; Apurba Nandi, Mississippi State University; Hugh Medal, Mississippi State University; Mahantesh Halappanavar*, PNNL

Attack/Disaster 7: Social Media/IoT Micro-Community Detection and Vulnerability Identification for Large Critical Networks Pravin Chopade*, North Carolina A&T State Unive; Justin Zhan, University of Nevada-Las Vegas; Marwan Bikdash, North Carolina A&T State University, Greensboro, NC Feedback-Based Social Media Filtering Tool for Improved Situational Awareness Jason Thornton*, MIT Lincoln Lab Message Authentication in Driverless Cars Yeka Abueh, Univ of MA Dartmouth; Hong Liu*, Univ of MA Dartmouth

Biometrics & Forensics 7: General Topics Adaptive Visual Sort and Summary of Depleted Uranium Nanoparticles for Forensic Analysis Elizabeth Jurrus*, Pacific Northwest National Lab; Tim Marrinan, University of Colorado; Nathan Hodas, Pacific Northwest National Laboratory; Nathan Baker, Pacific Northwest National Laboratory Profiling Hoax Callers Rita Singh*, Carnegie Mellon University; Joseph Keshet, Bar-Ilan University; Eduard Hovy, Carnegie Mellon

University

A Cognitive Forensic Framework to Study and Mitigate Human Observer Bias Donald Kretz*, Raytheon Person Re-identification using Deep Neural Network with Group Contextual Information Li Wei*, University of Houston; Shishir Shah, University of Houston 3:00 PM - 3:30 PM Break

3:30 PM - 5:30 PM

Attack/Disaster 8: Emergency Communication and Broadcast Priority Service for CSfC Secure Mobile Communication over LTE Networks for National Security and Emergency Preparedness Jared Everett*, JHU/APL; Warren Kim, JHU/APL; Muayyad Al-Chilabi, JHU/APL; Yongwen Yang, JHU/APL Location-Aware Wireless Emergency Alerts Sumeet Kumar*, CMU; hakan Erdogmus, CMU; Joao Diogo Falcao, Carnegie Mellon University; martin Griss, CMU; Bob Iannucci, CMU From Alerting to Awareness Bob Iannucci*, CMU; Joao Diogo Falcao, Carnegie Mellon University; Sumeet Kumar, CMU; hakan Erdogmus, CMU; martin Griss, CMU The Houston and Chicago DTV Datacasting Pilots Robert Desourdis*, SAIC; Mark O'Brien, SpectraRep

Biometrics & Forensics 8: General Topics Thermal Handprint Recognition System Based on Heat-Earth Mover’s Distance Kun Woo Cho, University at Buffalo; Feng Lin*, University at Buffalo; Xiaowei Xu, University at Buffalo; Wenyao Xu, University at Buffalo 5:30 Conference Adjourns

Loading...

2016 IEEE International Symposium on Technologies for - IEEE-HST

2016 IEEE International Symposium on Technologies for Homeland Security 10 - 12 May 2016 Waltham, MA USA May 10, 2016 7:00 AM Registration & Vendor/P...

167KB Sizes 0 Downloads 0 Views

Recommend Documents

2013 IEEE International Symposium on Antennas - Proceedings.com
M. Tentzeris, Georgia Institute of Technology, United States. 103.6: A ...... Giselle M. Galvan-Tejada, Emmanuel Q. Duar

[IEEE 2012 IEEE 20th International Symposium on Modelling, Analysis
Feb 19, 2017 - ... Technology Rochester, New York 14623 Email: [email protected] Shuaiwen Song SCAPE laboratory Virginia T

[IEEE 2006 IEEE MTT-S International Microwave Symposium Digest
Dec 14, 2016 - Finite Element Method Conformal Mapping 2D Quasi-static 2D FEM 3D FEM Quasi-static (QS) Eigenanalysis (EA

Symposium proceedings - XV International symposium Symorg 2016:
FREEMIUM-BASED REVENUE MODEL As shown in previous chapter, telecommunication companies successfully adapted segments of

The Twelfth International Symposium on High - IEEE Xplore
Results 1 - 25 of 31 - Abstract | PDF file icon PDF (789 KB) | HTML icon HTML. An integrated, hardware/software co-desig

22nd International Seaweed Symposium 2016
Jun 19, 2016 - Hotel in the very city center right next to the beautiful lakes, and not least the excellent scientific p

IEEE CEC 2016 Program - IEEE WCCI 2016
9:20AM GPUpowered and settingsfree parameter estimation of biochemical systems [#16727]. Marco Nobile ... University of

International Symposium on Volunteering - ICVolunteers
Nov 21, 2001 - Luz Stella Alvarez, Social Worker and. National Representative of the International Association ...... ma

2016 Regulatory White Paper | 2nd International Symposium on
Apr 29, 2017 - Concepts of continuous processing methods have evolved into various prototypes, some of which had been fu

1st IEEE Conference on Technologies for Sustainability (SusTech
Aug 4, 2013 - Please submit to Gigi Lau a list of your needs for the hotel or any A/V requirements including electricity