| Guidelines for Student Presentations (updated 1/21/2011)
     
        Paper presentations.Each student is required to give  on oral presentation of one of the papers listed under the category Student  Presentations on the course home page. Each presentation should last  25  minutes, including about 5 minutes  for questions/answers at the end. These presentations will take place during the last  two weeks of the class (20% of the grade)
 Class       participation.Students are expected to read the papers covered in the last two weeks of       class and participate in the discussions following the presentations.       Students should also submit two-three paragraph write-ups about the pros       and cons of the papers discussed.        You need to write critiques for  six of the papers to be       presented.
 (20% of the grade) 
       
          | WEEK | DATE | PRESENTATIONS | PRESENTERS |   
          | 9 | Monday, Feb 28 | Presentation 1—ApplicationsCartel—ref  [ Hull0] in Applications
 | Tiantian RenPresentation | Critique
 
 |  
          | 9 | Monday, Feb 28 | Presentation 2 — Applications ConterSniper—ref  [Simon04] in Applications
 | Ziwei Ren Presentation | Critique
 |  
          | 9 | Monday, Feb 28 | Presentation 3 — Software Platforms Squirrel—ref [Mot2010]
 | Jaime Espinosa Presentation | Critique
 |  
          | 9 | Wednesday, March 2 | Presentation 4 — Real-Time SchedulingRef [OLS06]
 | Stephen Wylie Presentation | Critique
 |  
          | 9 | Wednesday, March 2 | Presentation 5—TrackingTrajectory reduction—ref [Ghica10]
 | Emre Yildiz Presentation | Critique
 |  
          | 9 | Wednesday, March 2 | Presentation 6 — TrackingBinary Sensors—ref [Singh07]
 | Jesse Yanutola Presentation | Critique
 |  
 
        
          | WEEK | DATE | PRESENTATIONS | PRESENTERS |  
          | 10 | Monday, March 7 | Presentation 7 — RFIDAloha—ref [BLM06]
 | Raj Bokade Presentation | Critique
 |  
          | 10 | Monday, March 7 | Presentation 8 — RFIDReader Elimination—ref [CRKHGO5]
 | Christopher Francis Presentation | Critique
 |  
          | 10 | Wednesday, March 9 | Presentation 9 — Security Key-Management—ref [Eschen02]
 | Li Jin Presentation | Critique
 |  
          | 10 | Wednesday, March 9 | Presentation 10 — Security Secure Routing---ref [KW03]
 | Muhammad Sadeeq Presentation | Critique
 |  
          | 10 | Wednesday, March 9 | Presentation 11 — Query    ProcessingIsocontours & Spatial Summaries---ref [GHS07]
 | Besim Avci Presentation | Critique
 |  
 
   |