Security Issues In Wireless Sensor Networks
Xiaoming Lu, University of California, Davis
03/15/2007
As wireless nodes are battery powered, many Medium Access Control (MAC) protocols have been proposed to reduce energy consumption. Security issues related to the design of energy efficient protocols have, however, been largely ignored. In this talk, we present a new generic attack (the synchronization attack) on listen-sleep MAC protocols.
That Which Does Not Stabilize, Will Only Make Us Stronger
H. Kazerooni, University of California, Berkeley
03/22/2007
In October 2003, the first functional load-bearing and energetically autonomous exoskeleton, called the Berkeley Lower Extremity Exoskeleton (BLEEX) was demonstrated, walking at the average speed of two miles per hour while carrying 75 pounds of load. BLEEX augments human strength and endurance during locomotion and has numerous applications. This talks gives a summary of the technical challenges on the control algorithm; biomimetic design, power source, and actuation system.
Improving Healthcare Quality
Ethan Stone, Corman Technologies, Santa Rosa
03/29/2007
The current state of healthcare is inefficient, inconsistent, and error-prone. This talk will present an overview of some specific ways in which information technology is being used to improve the situation.
Programming For The Web
Bradley Creamer, De Anza College, Cupertino
04/05/2007
AJAX programming, database programming, development and live Web server setup, and some general accessibility (section 508) usability techniques will be surveyed along with a comparison of browser technologies.
Ajax At Work
Jerome Coonan, Xetus Corporation, Mountain View
04/19/2007
This talk will consider how the AJAX web methodology bridges the chasm between community mortgage lenders and Wall St. investors. It will explore the potential of this pioneering methodology to solve a wide range of seeming intractableproblems in the deployment of software in business.