PhD Seminar • Algorithms and Complexity • The Visibility Center of a Simple Polygon
Please note: This PhD seminar will be given online.
Anurag Murty Naredla, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Anna Lubiw
Anurag Murty Naredla, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Anna Lubiw
John Bostanci, Master’s candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Richard Cleve
Zeinab El-Rewini, Master’s candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Yousra Aafer
Android’s permission model is used to regulate access to the Application Program Interfaces (APIs) within the Android system services, which provide access to sensitive system resources, such as the camera and microphone. To successfully invoke sensitive APIs, a caller must hold one or more Android permissions.
Karthik Ramesh, Master’s candidate
David R. Cheriton School of Computer Science
Supervisor: Professor N. Asokan
Authentication mechanisms have always been prevalent in our society — even as far back as Ancient Mesopotamia in the form of seals. Since the advent of the digital age, the need for a good digital authentication technique has soared stemming from the widespread adoption of online platforms and digitized content.
Nathan Harms, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Eric Blais
Atrisha Sarkar, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Krzysztof Czarnecki
Alexander Terenin, Postdoctoral Research Associate
Sidney Sussex College, University of Cambridge
Li Liu, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Richard Cleve
Runsheng (Benson) Guo, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Khuzaima Daudjee
Myroslav Kryven
University of Arizona