Studying SFX Logs to Better Understand User Behavior Bennett Claire Ponsford, Digital Services Librarian Anne L. Highsmith, Consortia Systems Coordinator.
POLICY EXPERIENCE REPORT Leslie Nobile. Review existing policies – Ambiguous text/Inconsistencies/Gaps/Effectiveness Identify areas where new or modified.
Passive Visual Fingerprinting of Network Attack Tools Gregory Conti Kulsoom Abdullah College of Computing Georgia Institute of Technology.
HOMEWORK Complete lab handout Read 11.7 - 11.9 Remember to try self checks! #'s 30,32-36 Review this powerpoint.
Image Processing Lecture 1 Introduction and Application - Gaurav Gupta - Shobhit Niranjan.