19.01.2013 Views

ABI-ONE ghc program v14.indd - Grace Hopper Celebration of ...

ABI-ONE ghc program v14.indd - Grace Hopper Celebration of ...

ABI-ONE ghc program v14.indd - Grace Hopper Celebration of ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GENERAL POSTER SESSION<br />

W e d n e s d ay | s e p T 3 0<br />

India. In an attempt to help SOWED, the<br />

Health information system and the computer<br />

information system departments have<br />

combined their efforts by bringing together<br />

students to develop an electronic medical<br />

record system.<br />

Building a Successful and Sustainable<br />

Training Outreach Program - Lessons<br />

Learned<br />

Presenter: Stephanie Garcia (New Mexico<br />

State University)<br />

Young Women in Computing (YWIC) is<br />

an outreach <strong>program</strong> at New Mexico<br />

State University targeting middle and high<br />

school females. The goal is to introduce<br />

them to computer science in middle school<br />

and continue to give them options in CS<br />

all through high school, hopefully resulting<br />

in technology majors in university. YWIC<br />

also plans to help these students pursue<br />

their degrees by providing a student group,<br />

tutoring and job opportunities.<br />

Building the Computing Pipeline:<br />

Recognizing & Supporting Young<br />

Women Aspiring in Technology<br />

Presenter: Ruthe Farmer (National Center<br />

for Women & IT)<br />

Isolation is one <strong>of</strong> the biggest factors<br />

preventing young women from thriving<br />

in computing classes in high school and<br />

college. The NCWIT Award for Aspirations<br />

in Computing <strong>program</strong> identifies and<br />

connects these young women at a critical<br />

stage in their educational experience. Learn<br />

how to build a pipeline <strong>of</strong> young women into<br />

computing and IT in your community utilizing<br />

a national <strong>program</strong> model and toolkit<br />

developed by NCWIT.<br />

Career Transitions: Business to<br />

Education<br />

Presenter: Deborah Hughes (Lyndon State<br />

College)<br />

Have you considered making the transition<br />

from business to education? This<br />

poster presentation considers important<br />

aspects <strong>of</strong> each pr<strong>of</strong>ession and explores<br />

factors to reflect on before choosing. It will<br />

assist you in examining your strengths and<br />

skills to determine if they are applicable<br />

to education. Also, this investigation will<br />

identify and explore possible career paths.<br />

Finally, guidelines will be provided for the<br />

successful transition to a new and fulfilling<br />

career.<br />

CBEAR : A New Energy Aware Routing<br />

Algorithm<br />

Presenter: Komal Jalan (Indian Institute <strong>of</strong><br />

Technology Guqahati)<br />

CBEAR is a power-aware routing<br />

algorithm for non-mobile sparse<br />

wireless network in rural areas where<br />

power supply is a problem. This algorithm is<br />

oriented towards maintaining connectivity<br />

<strong>of</strong> the network. Matrix manipulations on the<br />

graph are used to find the contribution <strong>of</strong><br />

each node to connectivity which is used as a<br />

routing metric. The residual battery capacity<br />

<strong>of</strong> each node is also taken into account<br />

during routing.<br />

Cellular Automaton Model <strong>of</strong> Solid<br />

Tumour Growth<br />

Presenter: Jenna Cameron (University <strong>of</strong><br />

Western Ontario)<br />

Solid mass tumours consist <strong>of</strong> mutated<br />

cells exhibiting uncontrolled growth and<br />

lack <strong>of</strong> correct response to signals. Cellular<br />

automaton (CA) models involve individual<br />

units that operate independently similar<br />

to cancerous cells. The CA model being<br />

presented models the growth <strong>of</strong> solid mass<br />

tumours from the avascular growth phase to<br />

the vascular growth phase and metastasis,<br />

using partial differential equations representing<br />

the environment. The model tests<br />

the efficacy <strong>of</strong> brachytherapy.<br />

Cloud Computing - Collaborative<br />

Technology<br />

Presenter: Sowmya Vijayalakshmi (IBM<br />

India Private Ltd)<br />

The research and development in the field<br />

<strong>of</strong> collaborative technologies shows<br />

phenomenal impact. One <strong>of</strong> the very popular<br />

technology in the current age is cloud<br />

computing. Adopting cloud computing has<br />

a very powerful and potential impact and<br />

Indeed cloud computing would work well<br />

in reducing cost, managing resources and<br />

being eco-friendly. This technical presentation<br />

will focus on architecture & collaborative<br />

capabilities <strong>of</strong> cloud computing & how<br />

this technology is extremely beneficial.<br />

Collaboration Through Pair<br />

Programming<br />

Presenter: Kera Watkins (Georgia<br />

Southern University)<br />

Research has indicated that pair <strong>program</strong>ming<br />

improves student retention. When<br />

students pair <strong>program</strong>, they are happier and<br />

they perform at least as well or better than<br />

solo <strong>program</strong>ming students. Informal peer<br />

mentoring and increased student communication<br />

is developed.<br />

Collaborative Spam Detection for<br />

Mobile Phone Text Messages<br />

Presenter: Padmavathy Murthy<br />

(Symantec)<br />

This antispam solution helps curb spam<br />

in text messages using a crowdsourcing<br />

approach. We intend to provide smartphone<br />

users with a special application that allows<br />

them to report text messages as spam,<br />

and look up the rating <strong>of</strong> a text message,<br />

as determined by the crowd. To minimize<br />

false positives and negatives, we maintain a<br />

“Reliability Quotient” for each participating<br />

user, rewarding or penalizing them based on<br />

the reporting accuracy.<br />

50 Anita Borg Institute for Women and Technology | <strong>Grace</strong> <strong>Hopper</strong> <strong>Celebration</strong> <strong>of</strong> Women in Computing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!