• ECE MS Thesis Defense: Griffin Knipe

    MS Thesis Defense: Unifying Performance and Security Evaluation for Microarchitecture Design Exploration Griffin Knipe Location: Zoom Link Abstract: Computer architects develop microarchitectural features that boost instruction-level parallelism to improve CPU performance. While performance may be improved, adding new features increases the CPU’s design complexity. This further compounds the effort required to complete design verification. Trustworthy […]

  • MS Thesis Defense: Hao Chen

    MS Thesis Defense: Reconstruction of Sulcal Geometry in Brain Stimulation Models using Spherical Harmonics Hao Chen Location: Zoom Link Abstract: Over the past few years, there has been increasing interest in transcranial electrical stimulation (tCS) and thus it has been the subject of a growing number of simulation studies. Indeed, some federal agencies in the […]

  • Making a Graduate School Plan

    In this intensive workshop, we'll walk through the steps of identifying a right fit graduate program and help you plan out the who, what, when, where, and how of applying to graduate schools. Bring a laptop if you have one, a notebook, and come prepared with some thoughts about what’s next! If you can’t make it, […]

  • ECE MS Thesis Defense: Rubens Lacouture

    MS Thesis Defense: GPUBLQMR: GPU-Accelerated Sparse Block Quasi-Minimum Residual Linear Solver Rubens Lacouture Location: Zoom Link Abstract: Solutions of linear systems of equations is the central point of many scientific and engineering research problems across a variety of domains. In many cases, the solution of linear systems can even take most of the simulation time […]

  • ECE MS Thesis Defense: Matin Raayai Ardakani

    MS Thesis Defense: A Framework for Denoising Two and Three-dimensional Monte CarloPhoton Transport Simulations Using Convolutional Neural Networks Matin Raayai Ardakani Location: Zoom Link Abstract: The Monte Carlo (MC) method is considered to be the gold standard for modeling light propagation inside turbid media, proving superior to other Radiative Transfer Equation (RTE) solvers relying on […]

  • MS Thesis Defense: Yuezhou Liu

    MS Thesis Defense: Optimizations of Caching Networks: Fairness and Application to Mobile Networks Yuezhou Liu Location: Zoom Link Abstract: In-network caching is playing a more and more important role in today's network architectures, because of the explosive growth of data traffic due to the proliferation of mobile devices and demands for high-volume media content, as […]

  • ChE Seminar Series: Biomaterials to unlock the regenerative capacity of tissues

    ChE Seminar Series Presets: Dr. Tatiana Segura Tatiana Segura, PhD Professor of Biomedical Engineering, Duke University Biomaterials to unlock the regenerative capacity of tissues Abstract: Injectable materials that can conform to the shape of a desired space are used in a variety of fields including medicine. The ability to fill a tissue defect with an […]

  • ECE PhD Dissertation Defense: Muhamed Yildiz

    PhD Dissertation Defense: Interpretable Machine Learning for Retinopathy of Prematurity Muhamed Yildiz Location: Zoom Link Abstract: Retinopathy of Prematurity (ROP), a leading cause of childhood blindness, is diagnosed by clinical ophthalmoscopic examinations or reading retinal images. Plus disease, defined as abnormal tortuosity and dilation of the posterior retinal blood vessels, is the most important feature […]

  • ECE MS Thesis Defense: Peter Kelly

    MS Thesis Defense: Design of a Thruster-assisted Bipedal Robot Peter Kelly Location: Zoom Link Abstract: During the past few years, legged robot technology has been rapidly advancing. However, even the most advanced bipedal legged robots are susceptible to strong disturbances and slippery or impassible terrain. By introducing thrusters to enable hybrid legged-aerial locomotion, these problems […]

  • ECE MS Thesis Defense: Tianhong Xu

    MS Thesis Defense: A novel simple power analysis (SPA) attack on Elliptic Curve Cryptography (ECC) Tianhong Xu Location: Zoom Link Abstract: Elliptic Curve Cryptography (ECC), as a widely used public-key cryptography, is vulnerable to simple power analysis(SPA) attacks. There are many countermeasures against simple power analysis(SPA) attacks on ECC implementation, the Always-add algorithm is one […]