Soner Onder, professor of computer science, was recently awarded $246,329 for the first year of a four-year NSF grant for his project, “SHF: Medium: Collaborative Research: Statically Controlled Asynchronous Lane Execution (SCALE).” The project is in collaboration with Prof. David Whalley of Florida State University. Michigan Tech is the lead institution in the project, it . . .
George Anderson and Sally Sutherland of the US Naval Undersea Warfare Center (NUWC)-Newport will present talks on Tuesday, September 17, 2019, from 3:00 to 4:00 pm, in Room 202 of the Michigan Tech Great Lakes Research Center. A reception will follow and refreshments will be served. George Anderson will present his talk from 3:00 – 3:30 pm. Titled “Classification . . .
Keith Vertanen, assistant professor of computer science (HCC), and Scott Kuhl (HCC), associate professor of computer science, are principal investigators of a recently funded three-year National Science Foundation grant for their project, “CHS: Small: Rich Surface Interaction for Augmented Environments.” The expected funding over three years is $499,552.00. Vertanen and Kuhl are members of Michigan Tech’s . . .
The College of Computing and the Computer Science Department were well represented at the 24th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE 19), July 14-17, at University of Aberdeen, Aberdeen, Scotland. Senior Lecturer Leo Ureel, along with James Heliotis, professor of computer science at Rochester (New York) Institute of Technology, led . . .
Bo Chen (Comp Sci/ICC) is Principal Investigator on a project that has received a $199,975 research and development grant from the National Science Foundation. The project is titled “EAGER: Enabling Secure Data Recovery for Mobile Devices Against Malicious Attacks.” This is a potential two-year project. Abstract: Mainstream mobile computing devices like smart phones and tablets . . .
By Karen S. Johnson, ICC Communications Director We live in a world where pretty much everything and everybody – individuals, companies, governments, critical infrastructure – are increasingly dependent on connected systems, networks and devices. And, as newspaper headlines reveal, those systems may be insecure and vulnerable to hackers. “Nowadays, everybody is using computers, and more . . .