ongoing
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ongoing [2011/05/30 17:17] – bil | ongoing [2014/12/04 21:28] (current) – Added assigned projects stevenc | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
+ | |||
+ | |||
+ | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== | ||
+ | |||
+ | **Supervisor: | ||
+ | |||
+ | Description: | ||
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
+ | |||
+ | Recently, in collaboration with Shafiei (NASA) we have developed | ||
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
+ | |||
+ | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " | ||
+ | |||
+ | **Required Background: | ||
+ | |||
+ | |||
+ | |||
+ | ====== DDoS Attack using Google-bots ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Recommended Background**: | ||
+ | |||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
+ | |||
+ | |||
+ | |||
+ | ====== Comparison of Finger Tracking systems ====== | ||
+ | |||
+ | **Student**: | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | __Description__ | ||
+ | This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study | ||
+ | |||
+ | |||
+ | __Completed__ | ||
+ | Winter, 2013 | ||
====== Imputation of missing values in microarray data ====== | ====== Imputation of missing values in microarray data ====== | ||
Line 9: | Line 69: | ||
__Description__ | __Description__ | ||
- | | + | Microarrays are a relatively new technology that have had tremendous |
- | on many areas within biology and bioinformatics. | + | impact |
- | enables researchers to study the behaviour of many genes and/or conditions | + | technology |
- | | + | and/or conditions in a single experiment. |
- | + | ||
- | Due to technological limitations and experiment design issues, microarray | + | |
- | data sets typically have several missing values. | + | |
- | imputation of these values improves the accuracy of different processing | + | |
- | tasks, including clustering, that are typically done on these data sets. | + | |
- | Therefore, good imputation algorithms are required. | + | |
- | In this project, we will explore fast and accurate imputation algorithms for | + | Due to technological limitations and experiment design issues, |
- | microarray data. | + | microarray data sets typically have several missing values. |
- | a short summary | + | shown that imputation |
- | | + | different processing tasks, including clustering, that are typically |
- | 1 - 2 may need to be implemented). | + | done on these data sets. |
- | supervisor on the design of better | + | required. |
- | | + | |
- | performance (accuracy and speed) of the new algorithm(s) to the GMCImpute | + | |
- | algorithm and several other existing ones. | + | |
- | Throughout | + | In this project, we will explore fast and accurate imputation algorithms |
- | to report any progress | + | for microarray data. The student will first read the papers assigned |
+ | and write a short summary of them. Then, he will study the performance | ||
+ | a few algorithms from the literature (many algorithms are already | ||
+ | implemented but 1 - 2 may need to be implemented). | ||
+ | work with the supervisor on the design of better algorithms for the | ||
+ | problem being studied. | ||
+ | compare the performance (accuracy | ||
+ | the GMCImpute algorithm and several other existing ones. | ||
+ | Throughout the course, the student is required to maintain a course | ||
+ | website to report any progress and details about the project. | ||
====== An Open Source Structural Equation Modeling Graph Drawing Application ====== | ====== An Open Source Structural Equation Modeling Graph Drawing Application ====== | ||
Line 42: | Line 102: | ||
__Description__ | __Description__ | ||
- | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. These models can include latent variables, which are not measured directly but are constructs inferred by observed variables. Structural equation models can be represented visually by graphs | + | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. These models can include latent variables, which are not measured directly but are constructs inferred by observed variables. Structural equation models can be represented visually by graphs. To generate |
Collected data is used to estimate the parameters of the equations and assessing the fit of the model. There are several SEM software options available to researchers, | Collected data is used to estimate the parameters of the equations and assessing the fit of the model. There are several SEM software options available to researchers, |
ongoing.1306775831.txt.gz · Last modified: 2011/05/30 17:17 by bil