Course Number: CMSC 199
Course Title: Undergraduate Seminar
Lecture: Section C2, 10-11 M, ICS LH4
Joseph Anthony C. Hermocilla (firstname.lastname@example.org)
The aim of this course is to introduce students to the basic research methods in Computer Science.
At the end of this course the students should be able to:
The student will select a research paper to study from this list of journals.
The papers may be survey papers or full research papers. Make sure though that the research paper has not been
presented in the past. Students will have to write a review paper plus orally
present the research paper assigned on a designated date. All students in a section should read
the research paper to be presented and submit three (3) questions after the presentation. This ensures
that the students also read the other papers, not just the paper assigned to them. There will be two (2)
presenters each week which means that six (6) questions will be submitted by each student.
The due date of the deliverables(review paper, slides, and seminar announcement) for all students will be on Meeting #5. If a student failed to submit the deliverables, automatically he/she gets a U.
|S1[AGUIRRE]: Transmission of Patient Vital Signs Using Wireless Body Area Networks|
|S2[ALBACEA]: The Impact of Infostation Density on Vehicular Data Dissemination|
|S3[ANGELES]: A Survey of Green Mobile Networks: Opportunities and Challenges|
|S4[BARRETTO]: Rapid Dengue and Outbreak Detection with Mobile Systems and Social Networks|
|S5[BARRO]: On Democracy in Peer-to-Peer systems|
|S6[BATION]: Grid Technology Reliability for Flash Flood Forecasting: End-user Assessment|
|S7[BUSENOS]: Introducing Widget-based IMS Client Applications|
|S8[CESAR]: Quantifying the Trustworthiness of Social Media Content|
|S9[CHUAQUICO]: Unleashing the Power of Mobile Cloud Computing using ThinkAir|
|S10[CUEVAS]: Managing DFA History with Queue for Deflation DFA|
|S11[ENRIQUEZ]: ReVirt: enabling intrusion analysis through virtual-machine logging and replay|
|S12[FUENTES]: Cloud computing: state-of-the-art and research challenges|
|S13[GARCIA]: Enabling Heterogeneous Mobility in Android Devices|
|S14[GENEROSO]: Debugging operating systems with time-traveling virtual machines|
|S15[HONRADE]: Comprehensive Security Framework for Global Threats Analysis|
|S16[NAMUCO]: Multihoming Management for Future Networks|
|S17[PLARAS]: Cloud computing services: taxonomy and comparison|
|S18[SALAVERIA]: Resource Management Strategies for the Mobile Web|
|S19[SALGADO]: Network game design: hints and implications of player interaction|
|S20[SANCHEZ]: Security and identification indicators for browsers against spoofing and phishing attacks|
|S21[SUICO]: On Object Identification Reliability Using RFID|
|S22[TRIA]: Modeling, run-time optimization and execution of distributed workflow applications in the JEE-based BeesyCluster environment|
|S23[VERGEL]: Smart Cities at the Forefront of the Future Internet|
|S24[VILLATE]: A Semantics-based Approach to Large-Scale Mobile Social Networking|
|S25[RAQUEL]: Dynamic scheduling of a batch of parallel task jobs on heterogeneous clusters|
|3||06/27/11||Due date of the paper title|
|4||07/04/11||Due date of review paper, slides, and teaser|
The student will get a grade of S if the following criteria are satisfied.
Attendance will be checked every meeting. University policy on attendance will be applied.
There will be a closed door policy, 15 minutes after start of class.
Students caught plagiarizing work of others will automatically get a grade of U for the course.
$Id: CMSC199-1st-Sem-2011.html 1959 2011-07-05 03:53:31Z jachermocilla $