ongoing
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| ongoing [2010/08/24 15:33] – bil | ongoing [2011/10/14 12:57] (current) – bil | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Ongoing projects ====== | ====== Ongoing projects ====== | ||
| - | ====== Web-based digital system | + | ====== Web Crawlers Behaving Like Humans: Are We There Yet!? |
| - | **Student**: | + | **Student**: |
| - | **Supervisor**: | + | **Supervisor**: |
| - | __Description__ | + | **Required Background**: CSE4480 prerequisites |
| - | + | ||
| - | Build a web-based digital signage system for Bethune College. Some of the technologies that you will be expected to learn/use include Javascript, JQuery, HTML, CSS, and ical/ | + | |
| - | + | ||
| - | ====== Tandem repeat detection using spectral methods ====== | + | |
| - | + | ||
| - | **Student**: | + | |
| - | + | ||
| - | **Supervisor**: | + | |
| __Description__ | __Description__ | ||
| - | DNA sequences | + | Distributed Denial |
| - | + | of the most serious threats | |
| - | Finding tandem repeats is an important problem in Computational Biology. The techniques that have been proposed for it fall into two classes – string matching algorithms and signal processing techniques. In this project, we will explore fast, accurate algorithms for detecting tandem repeats and evaluate the outputs | + | simplicity |
| - | + | the quality | |
| - | The student will implement the spectral algorithms used in [1] (one based on Fourier Transforms and one on autoregressive models). He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. | + | An especially challenging form of DDoS attacks are the so-called |
| - | Throughout the course, the student is required | + | Application-Layer DDoS attacks. Namely: |
| - | + | ||
| - | ====== Low-Cost Three-Dimensional Face Scanning System ====== | + | |
| - | + | ||
| - | **Supervisor**: | + | |
| - | + | ||
| - | **Requirements**: | + | |
| - | + | ||
| - | __Description__ | + | |
| - | + | ||
| - | Low-cost three-dimensional face-scanning systems have a large range of potential applications in security | + | |
| - | + | ||
| - | The project will involve systems design and development of a specialized real-time 3D face scanner. | + | |
| - | + | ||
| - | For more information on the laboratory: [[http:// | + | |
| - | + | ||
| - | ====== Simulation | + | |
| - | + | ||
| - | **Supervisor**: | + | |
| - | + | ||
| - | **Required Background**: | + | |
| - | + | ||
| - | **Recommended Background**: | + | |
| - | + | ||
| - | __Description__ | + | |
| - | + | ||
| - | Previous work by the supervisor resulted in a novel and highly accurate Virtual Reality tracking system that matches or exceeds the specifications of all competing systems. However, this system works only in 5 or 6-sided immersive display environment. | + | |
| - | + | ||
| - | This project is the first step towards an adaptation of the technology for more general environments. In particular we target normal rooms and immersive displays with less than 5 screens. The technical work involves adapting the simulation software for the previous device to simulate a new design, and iteratively optimizing that design based on the results obtained. | + | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | ====== Programming Multi-Core GPUs with CUDA ====== | + | |
| - | + | ||
| - | **Supervisor**: | + | |
| - | + | ||
| - | **Required background**: | + | |
| - | + | ||
| - | **Recommended background**: | + | |
| - | + | ||
| - | __Description__ | + | |
| - | + | ||
| - | CUDA stands for " | + | |
| - | + | ||
| - | The aim of this project is to get familiar with GPUs and to study how to program them. | + | |
| - | + | ||
| - | More details can be found at: [[http:// | + | |
| - | (this link is only accessible from machines within the domain yorku.ca.) | + | |
| + | - In Application-Layer DDoS attacks, the attackers utilize a flood of legitimate-looking Layer-7 network sessions (i.e., sessions that are generally hard to detect and/or filter out by a firewall or an IDS system) | ||
| + | - Increasingly, | ||
| + | The goal of this project is to investigate the state of the art in | ||
| + | malicious web crawler design. In particular, the project will look | ||
| + | into the challenges of designing a smart-DDoS-crawler from the | ||
| + | attacker point of view - one of these challenges being the estimation | ||
| + | of web-page popularity assuming no a priori access to the web-logs | ||
| + | of the victim web-site. | ||
ongoing.1282664035.txt.gz · Last modified: by bil
