BEGIN:VCALENDAR
VERSION:2.0
METHOD:PUBLISH
PRODID:-//Accessible Web Design//My Calendar//http://www.joedolson.com//v2.5.16//EN
BEGIN:VEVENT
UID:97-85
LOCATION:Babbidge Library Class of 1947 Conference room
SUMMARY:PhD Proposal - Misagh Kordi
DTSTAMP:20171201T153000
ORGANIZER;CN=Howard E:MAILTO:howard.ellis@uconn.edu
DTSTART:20171201T153000
DTEND:20171201T163000
URL;VALUE=URI:http://www.cse.uconn.edu/events
DESCRIPTION:Title: Inferring Microbial Gene Family Evolution using Duplication-Transfer-Loss Reconciliation: Algorithms and ComplexityMajor Advisor: Dr. Mukul BansalAssociate Advisors: Dr. Ion Mandoiu, Dr. Yufeng Wu, Dr. Sheida NabaviDate/Time: Friday, December 1, 2017 at 3:30pmLocation: Homer Babbidge Library Class of 1947 Conference RoomReconstructing the evolutionary histories of genes and genomes is an important problem in evolutionary biology and fundamental to our modern understanding of biology. In microbes, gene families evolve through complex evolutionary processes such as speciation, gene duplication, horizontal gene transfer, and gene loss. In the typical formulation of this problem, called DTL reconciliation problem, the goal is to reconcile an input gene tree (gene family phylogeny) to the corresponding rooted species tree by postulating speciation, duplication, transfer, and loss events. In this dissertation proposal, we focus on one of the most important limitations of the DTL reconciliation framework, gene uncertainty, and provide new problem formulations, analyze the computational complexities of the new formulations, and provide FPT algorithms for it.
CATEGORIES:Colloquia
END:VEVENT
BEGIN:VEVENT
UID:96-84
LOCATION:
SUMMARY:PhD Proposal - Chujiao Ma
DTSTAMP:20171205T140000
ORGANIZER;CN=Howard E:MAILTO:howard.ellis@uconn.edu
DTSTART:20171205T140000
DTEND:20171205T150000
URL;VALUE=URI:http://www.cse.uconn.edu/events
DESCRIPTION:Title: Practicality and Application of the Algebraic Side-Channel AttackStudent: Chujiao MaMajor Advisor: Dr. John ChandyAssociate Advisors: Dr. Laurent Michel, Dr. Bing WangLocation: ITEB 401Abstract:Side-channel attacks break cryptographic algorithms by performing statistical analysis on information correlated with the secret key during encryption, such as timing, power consumption or electromagnetic waves. While it is popular due to its passive and non-invasive nature, it is vulnerable to noise in the system and measuring equipment. To reduce the limitations of the attack, it is often combined with other methods such as algebraic analysis. This proposal focuses on the practicality and application of algebraic side-channel attack (ASCA) to retrieve cryptography keys.ASCA models the cryptographic algorithm as well as the side-channel information as a set of equations that are put through a solver to solve for the secret key. The proposal first considers the application of ASCA to different algorithms. ASCA was performed with side-channel information from faults injected in the system and proven to be successful on simple algorithms such as LED as well as GOST. ASCA was also performed on TwoFish and AES with side-channel information collected from power consumptions, which are more difficult to detect.ASCA allows the attack to succeed in unknown plaintext/ciphertext scenarios and has low data complexity. While the attack can succeed for algorithms of various complexity, it is susceptible to error from the side-channel information. We attempt to mitigate the effect of error by exploiting the incomplete diffusion feature in one AES round using incomplete diffusion analytical side-channel analysis (IDASCA). In addition to different ways to exploit the data, we also explored using different solvers. While ASCA has traditionally been solved with SAT solvers, we introduce the use of a Constraint-Programming (CP) solver which allows us to have a simpler model with better error tolerance.Since ASCA is feasible against a variety of algorithms and is error-tolerant, we then examined how the structure of the algorithm (confusion, diffusion, non-linearity, complexity of operations) affects the attack, which will not only give us ideas on how to improve the attack but also on different ways countermeasures can be designed.
CATEGORIES:Colloquia
END:VEVENT
BEGIN:VEVENT
UID:94-83
LOCATION:Babbidge Library Class of 1947 Conference room
SUMMARY:PhD Proposal - Mahmoodreza Jahanseir
DTSTAMP:20171207T100000
ORGANIZER;CN=Howard E:MAILTO:howard.ellis@uconn.edu
DTSTART:20171207T100000
DTEND:20171207T110000
URL;VALUE=URI:http://www.cse.uconn.edu/events
DESCRIPTION:Title: Hierarchical Structures for High Dimensional Data AnalysisMajor Advisor: Dr. Donald SheehyAssociate Advisors: Dr. Thomas Peters, Dr. Sanguthevar RajasekaranDate/Time: Thursday, December 7, 2017 at 10:00amLocation: Homer Babbidge Library Class of 1947 Conference RoomAbstract:The volume of data is not the only problem in modern data analysis, data complexity is often more challenging. In many areas such as computational biology, topological data analysis, and machine learning, the data resides in high dimensional spaces which may not even be Euclidean. Therefore, processing such massive and complex data and extracting some useful information is a big challenge. Here, the input is a set of objects and a metric that measures the distance between pairs of objects.In this proposal, we first consider the problem of preprocessing and organizing such complex data into a hierarchical data structure that allows efficient nearest neighbor and range queries. There have been many data structures for general metric spaces, but almost all of them have construction time that can be quadratic in terms of the number of points. There are only two data structures with O(n log n) construction time but both have very complex algorithms and analyses, and they cannot be implemented efficiently. Here, we present a simple randomized incremental algorithm that builds a metric data structure in O(n log n) time in expectation. Thus, we achieve the best of both worlds, simple implementation with theoretically optimal performance.Furthermore, we consider the close relationship between our metric data structure and orderings on the points used in applications such as k-center clustering. We give linear time algorithms to go back and forth between these orderings and our metric data structure.In the last part of this proposal, we use metric data structures to extract topological features of a data set, such as the number of connected components, holes, and voids. We give a linear time algorithm for constructing a (1 + ε)-approximation to the so-called Vietoris-Rips filtration of a metric space, a fundamental tool in topological data analysis.
CATEGORIES:Colloquia
END:VEVENT
BEGIN:VEVENT
UID:98-86
LOCATION:Babbidge Library Class of 1947 Conference room
SUMMARY:PhD Proposal - Jingwen Pei
DTSTAMP:20171214T100000
ORGANIZER;CN=Howard E:MAILTO:howard.ellis@uconn.edu
DTSTART:20171214T100000
DTEND:20171214T110000
URL;VALUE=URI:http://www.cse.uconn.edu/events
DESCRIPTION:Title: Inferring the ancestry of parents and grandparents from genetic dataStudent: Jingwen PeiMajor Advisor: Dr. Yufeng WuAssociate Advisors: Dr. Ion Mandoiu, Dr. Mukul BansalDay/Time: Thursday, December 14, 2017 10:00amLocation: Babbidge 1947 Conference RoomAbstract:Inference of admixture proportions is a classical statistical problem in population genetics. Standard methods implicitly assume that both parents of an individual have the same admixture fraction. However, this is rarely the case in real data. In this project we show that the distribution and lengths of admixture tracts in a genome contains information about the admixture proportions of the ancestors of an individual. We develop a Hidden Markov Model (HMM) framework for estimating the admixture proportions of the immediate ancestors of an individual, i.e. a type of appropriation of an individual's admixture proportions into further subsets of ancestral proportions in the ancestors. Based on a genealogical model for admixture tracts, we develop an efficient algorithm for computing the sampling probability of the genome from a single individual, as a function of the admixture proportions of the ancestors of this individual. This allows us to perform probabilistic inference of admixture proportions of ancestors only using the genome of an extant individual. Extensive simulations are conducted to quantify the error in the estimation of ancestral admixture proportions under various conditions. As an illustration, we also apply the method on real data from the 1000 Genomes Project.
CATEGORIES:Colloquia
END:VEVENT
END:VCALENDAR