Sample Template Example of Beautiful Excellent Professional Curriculum Vitae / Resume / CV Format with Career Objective, Job Profile & Work Experience for Freshers & Experienced in Word / Doc / Pdf Free Download
TECHNICAL SKILLS (SUMMARY):
PATENTS:
Publications:
Journal/Magazine:
Download Resume Format
PROFESSIONAL
SUMMARY:
Raymond Garcia has a consulting career that
spans over 18 years. In addition to
pursuing research interests (please see the list of publications below), he has
participated in the full lifecycle of software product development in various
roles mostly held simultaneously in terms of system integration, lead architect
and developer/implementer.
● Information Assurance & Security: work in these areas involved designing systems carrying
various conceptual mappings to cyber defense involving mathematical,
behavioral, biological, social, spacial, and temporal aspects. This work manifested in the form of applying
topics such as neural networks, evolutionary strategies, fuzzy inference, and
genetic algorithms to information assurance problems (intrusion prevention,
application security, denial of service, insider threat detection, etc.)
Dr. Garcia has a strong interest in applying his
research skills for technology transfer and has a consistent interest in
considering a commercialization strategy.
This is evidenced in his work with the SBIR programs having won several
grants to apply his research ideas to the commercial world.
The skills utilized through this body of work include
multi-threaded network programming with server-side, desktop, as well as
embedded platforms that include using C++, Java/J2ee, WinCE, and PowerTV (cable
settop) as well
as projects that relate to the following:
- COTS integration, Web
2.0 development (GWT), information assurance, computer forensics,
soft-computing, embedded software development for various platforms: Linux, iOS,
WinCE, PowerTV;
software development that interfaces with lab and field hardware;
application-specific FPGA prototyping and multi-platform driver development. In addition to hands-on development, taught courses on a
variety of topics including Java, C++, OO UML-based design concepts,
metropolitan area networks, signals and systems, probability and random
variables, and digital subscriber networks.
TECHNICAL SKILLS (SUMMARY):
Software/Dev Environments
|
IDE: Eclipse, GWT Designer,
Netbeans, Matisse, Visual Studio/TS; Version Control: VSS, Perforce, CVS, SVN; Modeling & Simulation:
Rational Rose, UMLet, MATLAB, Magic, Spice, QEMU, Micro Cap, MAPLE V, Mathematica, Opnet, NS-2; Web: Tomcat/Apache/IIS, WebSphere, WebLogic,
WAPT; Multimedia: Flash,
Photoshop, Gigapocket, Audacity; FPGA:
Xilinx ISE, ActiveHDL
|
Languages
|
Java, Swing, J2EE,
JSP, Servlets, JavaScript, C,
C++, PHP, Microsoft: C#, MFC, Visual C++, ASP.NET, EmbedVC++, Visual Basic,
SQL, XML, XSLT, UML, Tcl/Tk, IDL,
Flex, Perl, VHDL, XVT, Vax DCL, FORTRAN, Pascal, COBOL, Assembly (MIPS,
80x86, 6502), Omnis 7, MACCSII, Accent
|
Frameworks/APIs
|
GWT, RPC, GWT-Ext,
J2EE, EoD SQL, AJAX, Struts, Hibernate, JPA, JDBC, ODBC, ADO, OLE DB, .NET, HotDraw, AspectJ, Velocity, OSGI (with JMS), JPF, JBoss, MPI,
POI, Apache Commons, Server Faces, NVIDIA CUDA, OpenNebula
|
DB, Security, Forensic
|
Enterprise DB: Oracle, Informix, MySQL,
hsqldb, MS SQL 2005, Desktop DB:
Access, Paradox; Scanning: NMAP, Nessus, Nikto; Packet: tcpdump, snoop, Wireshark; IDS: Snort, NIDS,
PHPIDS; Forensic: FTK, Paraben, TSK/Autopsy, DASH4™,
REM4™
|
OS, Specifications, Protocols, Techniques
|
Windows, Linux (many
flavors), Unix/Solaris, Embedded
PowerTV, Windows CE, Palm; Specifications
Design Patterns, Anti-Patterns, RPC, BPM, COM/DCOM/ActiveX, DOM, MPEG2, MPEG4, IPTV, QOS, VoIP,
NDIS, GPIB, Protocols: TCP/IP, Java RMI, JRMP, RTP, SDP,
RTSP, Instant messaging- intant_t, SIMPLE, XMPP; Techniques: OOP, AOP, Neural Networks, Genetic Algorithms,
BPM, Evolutionary Strategies, Monte
Carlo Methods, Game Theory, IDS/IPS, Agile SCRUM, OPC UA, OPC DA
|
EDUCATION:
Ph.D., Electrical Engineering, Minor: Applied
Mathematics, Georgia Institute of Technology
M.E.E.E., Electrical Engineering, Pennsylvania State University
B.S.E., Electrical Engineering, Temple University
M.E.E.E., Electrical Engineering, Pennsylvania State University
B.S.E., Electrical Engineering, Temple University
EXPERIENCE:
10/10
- Present, Consultant,
Pluraldom and Clients
(Several were held simultaneously)
|
Pluraldom
Systems, Hockessin, DE
|
● Pluraldom/Cablevision (10/11 -
Present), Principal Investigator/Consultant
Conducting a feasibility study on
the use of run-time decompression as a means to extend the use of legacy
hardware (Motorola DCT2000, DCT2500
series, using an OM2000) still in use today by numerous multiple-subscriber
organizations. Post analysis includes use of several
design patterns (including factory and strategy) in conjunction with MVC; use
of core Hibernate as an ORM solution, JSP using Spring’s view resolver, and
Java collections.
Language and Tools used: cygwin toolchain, DCCG (stb environment),
JAVA/J2EE, spring, hibernate (for post-analysis).
● Yonsei University, Seoul, Korea (06/09 – Present),
Communications & Networking Laboratory
(Ranked #26 among Top Asian
Universities)
|
Research Professor (Part-time)
|
Designing and implementing techniques for
forensic analysis of large scale SOA architectures and mobile environments; conducting
research on topics that include the application of signal processing, digital
filter design, and control theory (MIMO systems) to digital forensics for
virtual and mobile environments as well as large-scale architectures and cloud-computing
with relational and NoSQL database back-ends.
In particular, architectures that prevail in financial and mobile
systems are analyzed. For example, the
enterprise service bus SOA architecture is being explored as well as multiple specialized
entry points for mobile clients (in terms of services) in a B2C e-Commerce banking
business pattern.
Language and Tools used: Java, J2EE, GWT, Spring, Hibernate, C++,
Objective-C, iOS, Xcode, XML-RPC, MySQL, Cassandra, Redis, Java/J2EE, MPI, OpenNebula.
● Cloud Scorpion
(02/11 - 10/11), Principal Developer
Participated in a number of efforts:
Participated in a number of efforts:
Designed and implemented tools involving
the use of image processing, pattern recognition, and soft computing
(artificial neural networks, genetic algorithms, and evolutionary strategies);
the purpose of which was for digital forensic tools for litigation and law
enforcement support. Language and
Tools used: Java, J2EE, GWT, Spring, Hibernate, C++, XML-RPC, MySQL,
OpenNebula.
Generated numerous RPC services to coordinate with
collection intelligence efforts for recommendation, prediction, and text
analysis; created reconfigurable virtual client matrices for the cloud;
replicated numerous SOA pattern components associated with an enterprise
service bus. Namely, JMS as a form of
messaging, JTS as a mapping tool for clustering (JTS interfaces used as nodes
with logical thresholds than can be rolled back). JNI to utilize transform analysis implemented
in C++ with STL use of containers.
Designed an
architecture supporting speech recognition, natural language processing, object
archiving, and network support for a media-based computing application. Language
and Tools used: Objective-C, Xcode, Cocoa frameworks, Sqlite.
● Fourth Wall Media
(10/10 - 09/11), Consultant
Designed and implemented run-time
code decompression framework to optimize application footprint and embedded
environment memory usage. This was applied for use on applications including
Fourthwall's EBIF user agent; reducing the memory by over 30%. Various malware techniques were employed
including, symbol redefinition & injection, self-modifying code, and data
execution. This object-oriented framework supported both build-time and
run-time operations and made use of several design patterns. Designed cache
policies and codecs (dictionary and variable-length). Language
and Tools used: C/C++ using GNU toolchain, Cisco SDK, Eclipse,Visual
Studio 2010, C# (for RIOT EBIF applications).
Platform: Linux,
PowerTV/PowerTV (Emulated for Linux).
01/03
– 10/10, Consultant,
Shadowband and Clients
(Several were held simultaneously)
|
Shadowband
Systems, Norcross, GA
|
● Fourth Wall Media
(12/09 - 10/10)
Ported the flagship RIOT product
(EBIF, Interactive TV, and advertising middleware) from classic Explorer
settops to the Linux-based Explorer boxes (4650HD, 86xxHD); extensive
optimization for SARA integration. Language and Tools used: C/C++
using GNU toolchain, Cisco SDK, Visual Studio 2010, C# (for RIOT EBIF
applications). Platform: Linux, PowerTV/PowerTV (Emulated for Linux).
● StreamSage/Comcast (09/09
- 12/09)
Algorithmic development for matching
media assets as part of an entertainment knowledge base “relationship matcher”;
investigated the use of soft-computing (neural, fuzzy, genetic hybrids) with
hard and fuzzy c-means clustering as well as signal processing techniques with
mapping as both continuous (Wavelets, Fourier series) and discrete-time
(z-transform) functions; automated regex-generation and pattern extraction;
created REST interfaces to asset matches. Language
and Tools used: Java, SQL, eclipse, Oracle, MySQL, Spring,
OpenPipeline, Jetty, Tomcat, REST (neolios, JSR311 Jersey). Platform:
Developed in Java in a Windows environment and deployed to Linux-based
environments.
● Shadowband Financial
(05/08 - 09/09)
1) Created web-based, MGCP-based telemarketer
workflow system. Language and Tools used: Eclipse, Java, GWT, GWT Designer,
GWT-Ext, hsqldb, httpunit, Cisco 7960 series phones. Client-side work involved GWT, and associated
tools, server-side work involved servlets and GWT-RPC.
2) Created web-based, credit-to-speech system. Credit reports pulled for customers were
analyzed and processed speech was produced.
Language and Tools used:
Java, Eclipse, GWT, GWT Designer, GWT-Ext, and several tts libs.
3) Created commercial credit analysis tool
“ShadowCASTER.” This tool is used to
help ineligible mortgage applicants obtain financing by analyzing their credit,
debt-to-income, and housing goals coupled with identity-theft prevention. Implemented in Java and operated based on
client data collected from web interface using GWT.
4) Conducted research on intrusion detection of
temporally-spaced attacks using (Haar) wavelets to aggregate the time a
frequency components.
● Haverford Trust
Company (07/08 - 08/08)
Conducted annual network vulnerability assessment: used a variety of tools to assess the vulnerability of the external network as a Phase 0 test (i.e. zero knowledge of internal infrastructure) incorporating guidelines from NIST, Open-Source Security Testing Methodology (OSSTM), and Payment Card Industry Data Security (PCI DSS). Tools used: Nessus, nikto, nmap, and ShadowDC.
Conducted annual network vulnerability assessment: used a variety of tools to assess the vulnerability of the external network as a Phase 0 test (i.e. zero knowledge of internal infrastructure) incorporating guidelines from NIST, Open-Source Security Testing Methodology (OSSTM), and Payment Card Industry Data Security (PCI DSS). Tools used: Nessus, nikto, nmap, and ShadowDC.
● Forensic Trade
Shows, LLC (06/08 - 07/08)
Designed and implemented a web-based marketing list generator; walked and parsed pages for contact list creation based on search criteria. Tabbed interface included support for file upload and download with support for multiple file formats in a multi-threaded environment. Language and Tools used: Eclipse, Java, GWT, GWT Designer, GWT-Ext, hsqldb, httpunit. Client-side work involved GWT, and associated tools, server-side work involved servlets and GWT-RPC.
Designed and implemented a web-based marketing list generator; walked and parsed pages for contact list creation based on search criteria. Tabbed interface included support for file upload and download with support for multiple file formats in a multi-threaded environment. Language and Tools used: Eclipse, Java, GWT, GWT Designer, GWT-Ext, hsqldb, httpunit. Client-side work involved GWT, and associated tools, server-side work involved servlets and GWT-RPC.
● National Science
Foundation (01/04 - 01/05), Principal Investigator
SBIR Phase I work involved applying self-similarity metrics to security. NS-2, C++, and Matlab were used to test hypothesis involving characteristics such as Hurst parameters, wavelet estimation, and power spectrum; an ARMA model was created to remove data set irregularity.
SBIR Phase I work involved applying self-similarity metrics to security. NS-2, C++, and Matlab were used to test hypothesis involving characteristics such as Hurst parameters, wavelet estimation, and power spectrum; an ARMA model was created to remove data set irregularity.
● Cablevision (2/03 - 10/10)
Lead architect and implementer of 5 to 10 consultant teams for several projects:
Lead architect and implementer of 5 to 10 consultant teams for several projects:
1)
Designed a
multi-threaded tool to generate Java-based soft-computing solutions for product
and ad placement. Language and Tools
used: Mixed-language C/C++ server-side, Java on the client end with a
MySQL database back-end.
2)
Remote
testing-script generator. This
application creates and deploys remote testing scripts to set-top box clusters
through a client-server protocol with the head-end DNCS. This includes task scheduling and log
capture. Language and Tools used: Mixed-language C/C++ server-side,
Java on the client end with a MySQL database back-end.
3)
Web Server
benchmarking; the goal was to assist Cablevision in determining the optimal
amount of servers to purchase to adequately deploy their gaming services to
several million homes with minimized cost. Language
and Tools used: WAPT with Matlab.
4)
Set-top box system performance,
threading processes, and memory fragmentation stress analyzer; communicated
with the cable TV DNCS/Head-end as well as the set-top device itself through
the serial port. Language and Tools used: Mixed-language Java with Forte, MySQL as a back-end;
server-side was a C interface to the DNCS and Head-end.
5)
Set-top box log file analyzer
and report generation utility is designed to be used as a control panel for the
analysis of log-file TRAP reports.
Hardware/software failures. Language
and Tools used: Multi-threaded, mixed language- C++ for elf/coff
processing with a Java-based interface and parser; report generation with
L
with CSS.
6)
Characterized services on the
Cablevision DOCSIS network (Game Server, WWW traffic, and VoIP modeling) and
analyzed OCAP Requirements. Language and
Tools used: C++, OTcl, Ns-2 and Matlab.
7)
Developed scripts to
recursively parse game logs from head-ends serving 5M set-top boxes games from
servers. Language
and Tools used: Perl in a Windows environment.
8)
Analyzed general MSO (multiple
subscriber organization) problems which include the following: Multicast with
OPNET, Interactive Gaming (memory profiling and reboot analysis), Digital
Headend products that support multicasting using IGMP, IP-to-ASI gateways.
● Shadowband Systems Inc. (2/03 - 2/07)
1) Coded, staffed and lead a team of engineers to create a
design center with a multi-threaded plug-able architecture using JPF, then OSGI
with code-generation for VHDL, and Java targets tested against multiple cluster
back-ends. Designed and developed (AOP
and OOP) plug-ins that generated code and operated within the framework
itself. Plug-in types included Neural,
Genetic, Evolutionary, Fuzzy, Data Mining, Sniffer, Plotter, Network Modeler,
and Forensic. This work also involved
embedded development using a message passing interface and custom Linux kernel
development. Language and Tools used: JAVA/J2EE, Javascript, JPF, OSGi, Velocity,
Weka, MPI Platform: Cluster
Deployment using Linux (Busybox).
2) Research on novel intrusion-prevention techniques
including LSP routing security and mapping system behavior to very high-degree
polynomials and transfer functions with roots and poles representing attack
signatures using algorithms that include bisection, secant, eigenvalue, and
hybrids with Newton’s method (all of which varied based on the expected values
of the imaginary components of the roots).
● Air Force Research Labs, Principal
Investigator
1)
Participated
as principal and lead engineer for SBIR Phase I and II work on information
assurance for mobile users by creating robust channels in the form of a
multi-path routing MAC address (spoofing) scheme.
2) Technically managed and led with hands-on coding
the design of Prism chipset network device drivers for both Linux and WinCE in
C/C++ and .net, FPGA prototyping, and network modeling. The C++ coding was interfaced through
ActiveSync once the board support package was setup for StrongARM-based
PDA’s. Some of the code involved support
for plug and play detection for the adapter, NDIS miniport driver writing for
MAC spoofing techniques, and GUI development for both driver testing and
network discovery. Other details of the
driver work (WinCE) included managing the NIC as well as interfacing with the
higher-level drivers (transport protocol drivers). Language and Tools used: ActiveSync, embedded Visual C++,
Pocket PC SDK, and Platform Builder. Platform:
StrongARM SA1110 Chipset.
3) Designed and architected a forensic tool
generator to operate with the following analytical capabilities: Network-based
process, media, file system (physical and logical), memory, thread, process,
malware and malicious code detection, encryption, and boot process control;
other algorithms include the use of discrete cosine transforms (DCTs), hidden
Markov models (HMMs) to determine clandestine activity.
4) Designed a prototype FPGA board with memory with
a PCI interface. Several design
considerations were made from pricing to voltage regulation to layout and
processor selection.
09/01 - 02/03, Consultant,
|
Scientific Atlanta, Lawrenceville, GA
|
|||
Technical lead in the
development and implementation of a multi-threaded navigational framework, SA’s C++, OO based set-top
resident application, and multi-tuner DVR (digital video recorder). This
effort represents a paradigm shift to an object-oriented environment. This
includes a coded migration path from legacy code, sufficient breadth for feature
enhancements via support for multiple design patterns, and plug-and-play-able
layering with respect to switching operating systems. Multiple hardware platforms with cross-over
compilation were integral to the project.
|
||||
|
Scientific Atlanta, Lawrenceville, GA
|
|||
Lead, designed, and implemented
a thread-safe object-oriented component library used by application
developers and served as the set-top GUI
underpinnings for Buzztime Entertainment, Inc. This
C++ library has several features that present a consistent and versatile approach
to developing applications that require GUI components for interactive
television applications. Media-based efforts include jpg conversion for
graphical animation. The library was
suitable for multiple hardware platforms and extensively interacted with
video memory and window management.
|
||||
05/00 - 04/01,
Consultant,
|
PowerTV/Scientific Atlanta, Cupertino, CA
|
|||
Projects included: Technical
lead of 10 person team hired to enhance, port, and stabilize a multi-threaded
C/C++ HTML engine; developed a JavaScript lexer-scanner
used to search for unsupported language features involving pre-AJAX efforts
involving the DOM and CSS; background work on MPEG-2 transport streams for
data carousel creation; porting code to meet Suns JavaTV
specification as part of an effort to meet the DVB-MHP standard.
|
||||
09/00
- 02/01, Research Engineer,
|
GTRI,
Atlanta, GA
|
||||||||
Private
and public-sector contract development; conducted research on security topics
including soft-computing approaches to anomaly/intrusion detection, data
correlation to reduce false positives, and wireless work on Mobile IP using
Matlab, C++, and Java. Techniques
involving LVQ (learning vector quantization), SOMs (self-organizing maps),
and radial basis functions.
|
|||||||||
10/97
- 05/00, Research Assistant,
|
Georgia
Institute of Technology
|
||||||||
Participated in several projects
in several different areas:
● 06/99 - 05/00 GTISC (Georgia Tech
Information Security Center) funded research related to the development of
intelligent tools C++ and Java to analyze real-time network traffic data for
detection of malicious activity; methods included characterizing port usage,
source IP, Date/Time, etc. This work
also included analysis of denial of service, covert applet channels, buffer
overflows in Java security assessments; RSA encryption strength via primality
testing (including Solovay-Strassen and Lehmann algorithms).
● 06/98 - 06/99
NSF-funded Computer Enhanced Education project, developed software in Java,
Matlab and C++ to facilitate the learning of classical control theory.
In particular, the tool allows iterative proportional integrator (PI/lag) and
proportional differential (PD/lead) design directly on a root-locus plot as
well as a Bode plot (magnitude and phase).
● 10/97 - 06/98 Efforts included
research on dielectric heating and the design of a radio-wave heater for a
Department of Agriculture sponsored project using C++ and Matlab
|
|||||||||
07/95
- 02/97, Academic
Computing Fellow,
|
The
Pennsylvania State University
|
||||||||
Research
related to applying intelligent tools to optimization problems as well as
electrostatic boundary value problems.
In particular, evolutionary strategies to solve Laplace’s and
Poisson’s equation, neural networks (various multi-layered perceptrons with
Levenberg-Marquardt training), hybrid interpolative systems involving neural
networks with Markov chains were designed.
Innovations include a new variation of a floating random walk.
|
|||||||||
|
|||||||||
|
|||||||||
Serviced
clients in the chemical, manufacturing and pharmaceutical industries (Namely,
Johnson and Johnson Inc. and Arco Chemical Co.). Coded in C, C++, MACCSII,
and Omnis 7. Developed applications generally
d of a graphical
front-end with a database back-end. Client needs included prototyping a
compound registration system for chemists, assisting in the development of a
material data sheet system, and automated file handling routines used in a
customized barcode inventory system.
Coding effort involved chemist compound registrations.
|
|||||||||
|
|||||||||
08/93
- 06/94, SOFTWARE ENGINEER,
|
Numar
Corp., Malvern, PA
|
||||||||
Designed and
coded software in C++ for a petroleum searching system using Nuclear Magnetic Resonance Imaging. Development effort consisted
of approximately 70,000 lines of multi-threaded, object-oriented code. Coded mathematical algorithms to compute porosity, diffusion, and
formation relaxation times. Code existed as both a server-side monitor and an
embedded magnet communication driver.
|
|||||||||
Awards
and Memberships:
Awards:
|
● 2007 Administrator’s Award of Excellence (June 2007): Award
given by the Small Business Administration in recognition of outstanding
service as a vendor to the Department of Defense.
|
● SBIR Phase I Award ($100K): National Science Foundation: Self-similarity Metrics in
Intrusion Detection
|
● SBIR Phase I Award ($100K):
United States Air Force:: Multi-layered Protocol Security
|
● SBIR Phase II Award ($750K): United
States Air Force: Multi-layered Protocol Security
|
● SBIR Phase IIa Award ($70K): United
States Air Force: Multi-layered Protocol Security
|
● Georgia Institute of Technology Tower Award (2001) Award given in recognition of academic
excellence
|
● GTISC (Georgia Tech Information Security Center): Research Award
(June 1999): $30,000 award to conduct security research as well as produce
tools that can be used to facilitate the learning of security.
|
● The Pennsylvania State University Academic Computing Fellowship
(1995-96): $30,000/year renewed annually for two years. Tuition,
monthly stipend, and yearly allowance to attend conferences and purchase
equipment; first electrical engineering graduate school major to win such an
award.
|
● Eta
Kappa Nu
Honor Society Best Paper Award (1996): Penn State Chapter competition.
|
Memberships: Eta Kappa Nu, IEEE, ACM
|
PATENTS:
“Expandable
Visual Design Framework with Flexible, Multi-Language Code Generation” (Non-provisional, filed 7/2008).
Publications:
Journal/Magazine:
1.
|
M. N. O. Sadiku, C. M. Akujuobi,
R. C. Garcia, An Introduction to
Wavelets in Electromagnetics, IEEE Microwave Magazine, pp. 63-72, June 2005.
|
2.
|
J. Cannady and R. C. Garcia.
The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks,
Lecture Notes in Computer Science: 2001 International Conference on
Artificial Neural Networks. Springer:Heidelberg, GE
|
3.
|
R.
C. Garcia and B. S. Heck,
Enhancing Classical Controls Education via Interactive GUI Design, IEEE Control Systems Magazine, vol.
19, no. 3, pp. 77-82, June 1999.
|
4.
|
R.
C. Garcia and M. N. O.
Sadiku, Neuro-Monte Carlo Solution of Electrostatic
Problems, Journal of the Franklin
Institute, vol. 335B, no. 1, pp. 53-69, 1998.
|
5.
|
M.N.O. Sadiku and R.C. Garcia, Whole Field Computation using Monte Carlo Method, International Journal of Numerical
Modeling: Electronic Networks, Devices and Fields, vol. 10, pp. 303-312,
1997.
|
Book
Related Work/Book Chapters:
1.
|
Appendix B: Solving Electromagnetic Problems Using C++, M. N. O. Sadiku, Numerical Techniques in Electromagnetics, 2nd Ed., New York, NY: CRC
Press, 2000.
|
2.
|
Appendix C:
Numerical Techniques Using C++, M.
N. O. Sadiku, Numerical Techniques in Electromagnetics,
2nd Ed., New York, NY: CRC Press, 2000.
|
Invited Conference:
1.
|
R.
C. Garcia (Invited Paper)
Network Security: Mapping Intrusion and Anomaly Detection to Very-High-Degree
Polynomials, Asilomar Conference on Signals,
Systems, and Computers, Pacific Grove, California, Nov. 7-10, 2004.
|
2.
|
J.-M.
Chung, S. Panguluru,
D. Liu, and R. C. Garcia, (Invited Paper) "Multiple LSP Routing Network
Security for MPLS Networking," Proc. of IEEE MWSCAS 2002, Tulsa,
Oklahoma, Aug. 4-7, 2002.
|
Conference:
1.
|
R. C. Garcia, J. Cannady, and M.N.O. Sadiku, WAID:
Wavelet Analysis Intrusion Detection, Proc. IEEE MWSCAS02, Aug. 2002.
|
2.
|
R.
C. Garcia and J. D. Cannady, Boundary Expansion of Expert Systems:
Incorporating Evolutionary Computation with Intrusion Detection Solutions, in
Proceedings of IEEE SoutheastCon 2001, Clemson,
South Carolina, March 2001.
|
3.
|
Dennis C. Bauer, J. D. Cannady,
and R. C. Garcia, Detecting
Anomalous Behavior: Optimization of Network Traffic Parameters via an
Evolutionary Strategy, in Proceedings of IEEE SoutheastCon
2001, Clemson, South Carolina, March 2001.
|
4.
|
R.
C. Garcia, M. N. O. Sadiku
and K. Gu, Applying Absorbing Markov Chains to
Solve Poissons Equation in Inhomogeneous Regions, in Proceedings of IEEE SoutheastCon 2001, Clemson, South Carolina, March 2001.
|
5.
|
J. A. Copeland and R. C. Garcia, Real-Time Anomaly Detection Using Soft-Computing
Techniques, in Proc. of IEEE SoutheastCon 2001,
Clemson, South Carolina, March 2001.
|
6.
|
B. S. Heck, S. E. Poindexter, and R. C. Garcia, Integrating the Web into traditional teaching
methods, in Proceedings of 2000 American Controls Conference,
Chicago, IL, June 2000.
|
7.
|
R.
C. Garcia and J. A. Copeland,
Soft Computing Tools to Detect and Characterize Anomalous Network Behavior,
in Proceedings of IEEE SoutheastCon 2000, pp.
475-478, Nashville, Tennessee, April 2000.
|
8.
|
R.
C. Garcia, R. J. LeBlanc, and
M. N. O. Sadiku, JavaMonte: A New Programming
Language for Monte Carlo Simulation, in Proceedings of IEEE SoutheastCon 2000, pp. 305-308, Nashville, Tennessee,
April 2000.
|
9.
|
M. N. O. Sadiku and R. C. Garcia, The Method of Lines Solution of Axisymmetric
Problems, in Proceedings of IEEE SoutheastCon 2000,
pp. 527-530, Nashville, Tennessee, April 2000.
|
10.
|
R.
C. Garcia and B. S. Heck,
Enhancing Engineering Education on the Web: The Use of ActiveX Controls and
Automation Server Technology, in Proceedings of IEEE SoutheastCon
2000, pp. 515-518, Nashville, Tennessee, April 2000.
|
11.
|
R.
C. Garcia and B. S. Heck, An
Interactive Tool for Classical Control Design Education, in Proceedings 1999
American Controls Conference, pp. 1460-1464, San Diego, California, June
1999.
|
12.
|
R.
C. Garcia and M. N. O.
Sadiku, Two-Part Solution of Laplaces Equation: An
Adaptive Fuzzy System Front-End with a Markov Chain Back-End, in Proceedings
IEEE SoutheastCon 1998, pp. 281-282, Orlando,
Florida, April 1998.
|
13.
|
R.
C. Garcia and M. N. O.
Sadiku, Using Evolutionary Strategies to Solve Laplaces
Equation, in Symposium Digest, 15th Benjamin Franklin Symposium, pp. 18-21,
Philadelphia, Pennsylvania, May 1997.
|
14.
|
R.
C. Garcia and M. N. O.
Sadiku, Neural Network Solution of Poissons Equation with a Floating Random
Walk Back-End, in Symposium Digest, 14th Benjamin Franklin Symposium, pp.
68-71, Philadelphia, Pennsylvania, May 1996.
|
15.
|
R.
C. Garcia and M. N. O.
Sadiku, Neural Network Solution of Laplaces
Equation with a Markov Chain Back-End, in Symposium Digest, 14th Benjamin
Franklin Symposium, pp. 3-6, Philadelphia, Pennsylvania, May 1996.
|
16.
|
R.
C. Garcia and M. N. O.
Sadiku, Monte Carlo Fixed-Radius Floating Random Walk Solution For Potential
Problems, in Proceedings of IEEE SoutheastCon 1996,
pp. 92-95, Tampa, Florida, April 1996.
|
17.
|
M. N. O. Sadiku and R. C. Garcia, Monte Carlo Floating Random Walk Solution of
Poissons Equation in Proceedings of IEEE SoutheastCon
1993, Charlotte, NC, April 1993.
|
Download Resume Format
0 comments:
Post a Comment