Colloquium Archive

Security Issues In Wireless Sensor Networks

Xiaoming Lu, University of California, Davis

03/15/2007

As wireless nodes are battery powered, many Medium Access Control (MAC) protocols have been proposed to reduce energy consumption. Security issues related to the design of energy efficient protocols have, however, been largely ignored. In this talk, we present a new generic attack (the synchronization attack) on listen-sleep MAC protocols.

That Which Does Not Stabilize, Will Only Make Us Stronger

H. Kazerooni, University of California, Berkeley

03/22/2007

In October 2003, the first functional load-bearing and energetically autonomous exoskeleton, called the Berkeley Lower Extremity Exoskeleton (BLEEX) was demonstrated, walking at the average speed of two miles per hour while carrying 75 pounds of load. BLEEX augments human strength and endurance during locomotion and has numerous applications. This talks gives a summary of the technical challenges on the control algorithm; biomimetic design, power source, and actuation system.

Improving Healthcare Quality

Ethan Stone, Corman Technologies, Santa Rosa

03/29/2007

The current state of healthcare is inefficient, inconsistent, and error-prone. This talk will present an overview of some specific ways in which information technology is being used to improve the situation.

Programming For The Web

Bradley Creamer, De Anza College, Cupertino

04/05/2007

AJAX programming, database programming, development and live Web server setup, and some general accessibility (section 508) usability techniques will be surveyed along with a comparison of browser technologies.

Ajax At Work

Jerome Coonan, Xetus Corporation, Mountain View

04/19/2007

This talk will consider how the AJAX web methodology bridges the chasm between community mortgage lenders and Wall St. investors. It will explore the potential of this pioneering methodology to solve a wide range of seeming intractableproblems in the deployment of software in business.

Pages