ECE Seminar: 3D Tunable Microwave and Integrated Millimeter-Wave Components for 5G Communication Systems
Professor Pierre Blondy, University of Limoges, France
Invited by: Professor Raafat Mansour
ABSTRACT
Professor Pierre Blondy, University of Limoges, France
Invited by: Professor Raafat Mansour
ABSTRACT
Enrique Mallada
Assistant Professor of Electrical and Computer Engineering
Johns Hopkins University
The Waterloo Institute for Sustainable Energy and the Canadian Plastics Industry Association are pleased to offer complimentary academic registration to faculty and students for this 2-day event.
This conference is intended to bring together international experts, policy makers, researchers, innovators and entrepreneurs to explore how the advancements in resource recovery technologies and the pursuit of a sustainable economy are changing the way we interact with our world.
Come and explore Electrical & Computer Engineering's Capstone Design
Symposium!
View all 2018 Electrical and Computer Engineering Capstone Design Projects.
Speaker: Richard Frayne, PhD
Hopewell Professor of Brain Imaging, Radiology and Clinical Neuroscience, Hotchkiss Brain Institute, University of Calgary, and Scientific Director, Seaman Family MR Research Centre, Foothills Medical Centre, Alberta Health Services
The Honourable Kirsty Duncan, Minister of Science, announced the Strategic Partnership Grants today. They help bring together expertise from academia, Canadian-based companies and government organizations, and international institutes to collaborate on innovative research with commercialization potential.
Read the full story.
Low-cost antennas may one day bring Internet connectivity to billions of people in developing countries
Research at the University of Waterloo that has the potential to affordably connect billions of new users to the Internet via intelligent antennas will receive $6.1 million in joint funding from C-COM Satellite Systems Inc. (C-COM) and the federal government.
Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.
Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system’s memory space with unanticipated inputs.
But how do you plan for every possible type of input a hacker could use? You turn to Vijay Ganesh.
Read the full story.