Search results

Results found for “phd”

Showing results 451-460 of 730.

Li Songhua
LI Songhua
Post Doc Research Fellow
songhua_li
sutd.edu.sg
ESD
Programming with Robots: A Hands-on Experience – by Assistant Professor Malika Meghjani, ISTD

Through this one-day workshop taught by ISTD faculty, Assistant Professor Malika Meghjani, participants were taught the fundamentals of simple programming using Ardunios to code a simple differential drive robot.

events-listing
David Wharton
WHARTON David
Research Fellow
david_wharton
sutd.edu.sg
HASS
Feng Li (Shandong University) – Distributed Intelligence: From An Algorithmic Perspective

Feng Li (Shandong University) – Distributed Intelligence: From An Algorithmic Perspective

events-listing
Melissa Tu Shao-Hsuan
TU Shao-Hsuan Melissa
Lecturer
melissa_tu
sutd.edu.sg
HASS
Max Li (University of Michigan) – Data-Driven Modeling and Optimization Methods for Current and Future Airspace Users

Max Li (University of Michigan) – Data-Driven Modeling and Optimization Methods for Current and Future Airspace Users

ESD
events-listing
Lavanya Marla (University of Illinois at Urbana-Champaign) – Greedy Policies and Penalized Information-Relaxation Bounds for EMS: Allocation and Performance Assessment

Lavanya Marla (University of Illinois at Urbana-Champaign) – Greedy Policies and Penalized Information-Relaxation Bounds for EMS: Allocation and Performance Assessment

events-listing
Faculty/Staff Achievements 2020

Here are some achievements of our faculty and staff

achievements-listing
Bradley Camburn
CAMBURN Bradley
Senior Lecturer
bradley_camburn
sutd.edu.sg
EPD
Eugene Lim (GOVTECH) – Reverse Engineering Cryptographic Implementations in Software and Teo Sui Guan (GOVTECH) – Cryptography and its use in Government

Encryption is used everywhere in software, from custom network protocols to password vaults. We will walk through the process of reverse-engineering software to identify encryption protocols and analysing them for vulnerabilities through real-world applications. We will look at common encryption patterns in source code as well as common mistakes made by developers.

events-listing