Note: the overall presentation time is 20m: 15m talk and 5m for questions.
Time | Event | |
Information Retrieval, chair: Claudia Ott | ||
9:00-9:20 | Chris Heinrich: Visualizing 3D data in 3D space Summary: My project aims to explore the visualization of 3D data in 3Dspace (with the use of a tablet device). With the use of a tablet device, the user is able to explore and experience the data in different ways than a normal 2D environment. The use of a tablet device with a large dataset presents problems/constraints on how to achieve this. |
|
9:20-9:40 | Mathew Crane: Curiosities from the Internet Summary: A potentially hilariously filled exposition into some of the weird and wonderful things that can be found on webpages crawled from the internet. I endeavour to answer at least one question: how precise do we need pi to be. |
|
Artificial Intelligence, chair: Maryam Bagher Oskouei | ||
9:40-10:00 | Mira Guise: Enhanced polychronisation in a spiking network with
metaplasticity Summary: In this talk we examine the effect of a spike-timing-dependent model of metaplasticity on a network-level phenomenon called polychronicity. Polychronous neural groups (PNGs) develop readily when spiking networks are exposed to repeated spatio-temporal stimuli under the influence of spike-timing-dependent plasticity (STDP), but are sensitive to changes in synaptic weight distribution. We have found that PNGs formed in the presence of metaplasticity are significantly larger than those with no metaplasticity. A mechanism for this change in network-level performance involving increased flexibility in the precise time of firing is discussed. |
|
10:00-10:20 | Azam Shirrafi: The role of brain activity on the synaptic plasticity
of the granule cell Summary: We have investigated the real experimental studies of synaptic plasticity. In these experiments, synaptic plasticity of the granule cell (hippocampus) of freely moving rate is tested. What we have done so far is we have simulated these real experiments with synaptic plasticity rules within different protocols. |
|
10:20-10:40 | Coffee break (Tea room, 2nd Floor) | |
Graphics, chair: Paul Crane | ||
10:40-11:00 | Xiping Fu: NOKMeans: Non-Orthogonal K-means Hashing Summary: Finding nearest neighbour points in a large-scale high dimensional data set is of wide interest in computer vision. One popular and efficient approach is to encode each data point as a binary code in Hamming space using separating hyper planes. One condition, which is often implicitly assumed, is that the separating hyper planes should be mutually orthogonal. With the aim of increasing the representation capability of the hyper planes when used for indexing, we relax the orthogonality assumption without forsaking the alternate view of using cluster centers to represent the indexing partitions. This is achieved by viewing the data points in a space determined by their distances to the hyper planes. We show that the proposed method is superior to existing state-of-the-art techniques on several large computer vision datasets. |
|
11:00-11:20 | Jordan Campbell: Inferring 3D pose of dynamic articulated objects from
multiple views Summary: In this work we present the PoseCut algorithm, which simultaneously segments a target from background and infers the most likely pose of the target. We use evidence from multiple views to find the pose of the modelling 3D. Extensions to unsupervised tracking / pose estimation will be discussed. |
|
11.20-11.40 | Hamza Bennani: Creation of a database of vertebrae and validation
process Summary: I will be presenting what I have been doing lately on creating a database of vertebrae and will discuss the process of validation of this database by comparing it to a ground truth data. I will also be exposing the purpose of my research and the application field. |
|
11:40-12:00 | Keynote: Professor Michael Albert,
"I could be wrong". |
|
12:00-1:00 | Lunch (Tea room, 2nd floor) | |
Systems and Networks (session 1), chair: Matt Crane | ||
1:00-1:20 | Ashraful Alam: Intrusion Detection of a WSN Over the Air
Update Protocol Summary: In a WSN deployment, there may be an operational need to change the software running on the motes within the network. Over The Air (OTA) network update protocols allow us the flexibility and luxury of performing this at ease. But "this ease" comes at the cost of vulnerability to intruders in terms of potential malicious and unauthorised exploitation of the update process. I will present my investigation into intrusion detection in WSN software updates using Deluge protocol. I shall discuss the practical aspects of WSN software updates, and the resulting pattern and timing of updates and a model (a function/algorithm) that can raise a ''red flag" to detect a possible intrusion. |
|
1:20-1:40 | Adeel Javed: Particle Filter based Train Localization
using WSN Summary: In train localization, anchor sensors along the track participate by transmitting their geographic coordinates and RSSI value to the gateway sensor (train). Particle filter is an important technique to utilize the noisy (RSSI) information to estimate the location of the train. In this talk, I will talk about how I am using particle filter for train localization and the improvements I have introduced in localization algorithm. |
|
1:40-2:00 | Feiyang Liu: A Scalable Optical Network on Chip
Architecture with Wavelength Reuse Summary: Optical Network on Chip (ONoC) utilizes on-chip photonics to construct a communication platform for multiprocessor system on chip. It has the advantages of low power, high bandwidth density, low latency, etc. However, it still meets great challenges on the design of scalable architectures for ONoC, since the lack of optical buffer and processing logics and limited number of wavelengths. I will present a wavelength reused hierarchical architecture for Optical Network on Chip, which is capable of interconnecting thousands of cores using a limited number of wavelengths with significant performance improvement and cost reduction in comparison with existing schemes. |
|
2:00-2:20 | Coffee Break | |
Systems and Networks (session 2), chair: Gonzalo Sanchez Nido | ||
2:20-2:40 | Leila Eskandari: Scheduling in data stream management systems
Summary: A Data stream management system (DSMS) is designed to manage continuous data streams. The scheduling problem in a DSMS is complicated because it has significant impact on the performance metrics of the system, such as tuple latency, maximal memory requirement, and system throughput. I will talk about some DSMSs and their scheduling algorithms. |
|
2:40-3:00 | Paul Crane: Indoor Localisation with Multiple Transmission Powers Summary: GPS and location-based services are used for tasks such as navigation across an unfamiliar town or finding the closest restaurant. GPS devices are known for performing poorly indoors. Commodity Wi-Fi devices provide promising solution to being able to locate a mobile device, however they suffer from inaccuracies. In this talk, I present my work at improving the accuracy of indoor localisation. |
|
3:00-3:20 | Luming Wan: Effective routing in delay tolerant network
Summary: Delay Tolerant Network (DTN) is a prototype of future network as its low-cost on both infrastructure and devices, and also easy to cover large-scale of area. However, because of lack of end-to-end connectivity, the delivery rates in DTN are much lower than heterogeneous network. In our project, we are focusing on generating a more reliable routing prediction. We try to optimize the routing prediction by exploiting the regular contacts between users. |
|
3:20-3:40 | Closing, best talk and best publications prizes |