Yong Guan
Yong Guan CREATOR OF TECHNOLOGY TO COMBAT ONLINE AUCTION FRAUD In the beginning: If Associate Professor Yong Guan hadn’t begun his master’s program…
Yong Guan CREATOR OF TECHNOLOGY TO COMBAT ONLINE AUCTION FRAUD In the beginning: If Associate Professor Yong Guan hadn’t begun his master’s program…
…Collection of Correlated Fields in Randomly Distributed Sensor Networks,” IEEE International Conference on Communications (ICC), 2008. S. Ababneh, R. Ansari, and A. Khokhar “Improved Image Authentication Using Closed-Form Compensation and…
…area.” The article is currently available online for those who subscribe to Discover Magazine. It will also appear in the March 2016 Discover print issue. For more details, visit http://discovermagazine.com/2016/march/15-blackout-of-the-century….
…integrated component throughout the four-year curriculum. The major is new, but Iowa State has been teaching and researching cyber security since 1995, making it one of the oldest programs in…
…(VR), the unique research facilities at Iowa State, how VRAC uses virtual reality as a research tool and a look at how computer graphics technology has improved in the past…
…the I-9 Form. International students will also work with the International Students and Scholars Office (ISSO, 3248 Memorial Union) to complete your employment verification. Also in Workday, you will manage…
…2002 A voice-interactive, self-propelled, self-directed, semi-artificially intelligent robot named Octagonal Speech-Controlled, Autonomous Robot (OSCAR) debuts. Information Infrastructure Institute is created. 2003 University Professor and Alumnus Doug Jacobson creates world’s first…
…team’s presentation was selected out of 48 total oral and poster presentations in the conference held Feb. 13-18 in San Francisco. The goal of the team’s project is to find…
…select the ECpE department as their home department to pursue graduate degrees in one of three interdepartmental programs: bioinformatics and computational biology (Ph.D.), cyber security (MS, Ph.D.), and human-computer interaction…
…Oster, Sasha Interferometric Methods of Magneto-Optic Optical Switching Tioh, Jin-Wei Interferometric switches for transparent networks: development and integration Yang, Ming Techniques suitable for on chip implementation and ADC Built-in Self-test…