{"id":1100,"date":"2014-10-21T10:55:24","date_gmt":"2014-10-21T15:55:24","guid":{"rendered":"http:\/\/blogs.iit.edu\/itm_loopback\/?p=1100"},"modified":"2014-10-21T10:55:24","modified_gmt":"2014-10-21T15:55:24","slug":"itm-students-win-best-paper-at-acm-riit","status":"publish","type":"post","link":"https:\/\/blogs.iit.edu\/itm_loopback\/2014\/10\/21\/itm-students-win-best-paper-at-acm-riit\/","title":{"rendered":"ITM Students win Best Paper at ACM RIIT"},"content":{"rendered":"<div id=\"attachment_1102\" style=\"width: 360px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blogs.iit.edu\/itm_loopback\/files\/2014\/10\/RIIT2014BestPaperThmb.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1102\" class=\"size-full wp-image-1102\" src=\"https:\/\/blogs.iit.edu\/itm_loopback\/files\/2014\/10\/RIIT2014BestPaper.jpg\" alt=\"ITM students Bill Wesselman and Maya Embar display their award for ACM RIIT 2014 Best Paper.\" width=\"350\" height=\"218\" \/><\/a><p id=\"caption-attachment-1102\" class=\"wp-caption-text\">ITM students Bill Wesselman and Maya Embar display their award for ACM RIIT 2014 Best Paper.<\/p><\/div>\n<p><strong>The Best Paper Award at the\u00a03rd annual\u00a0<a href=\"http:\/\/www.acm.org\/\">Association for Computing Machinery&#8217;s<\/a> <a href=\"http:\/\/sigite2014.sigite.org\/\">Research in Information Technology<\/a> conference<\/strong>\u00a0was won this year by the\u00a0IIT ITM student team of <strong>Maya Embar<\/strong>, <strong>Louis McHugh<\/strong>, and <strong>William Wesselman <\/strong>for their paper \u201c<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2656437&amp;CFID=441215078&amp;CFTOKEN=54241891\">Printer Water-Mark Obfuscation<\/a>\u201d. Also presenting at the\u00a0conference was ITM student\u00a0<strong>Ben Khodja<\/strong> ( \u201c<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2656438&amp;CFID=441215078&amp;CFTOKEN=54241891\">Probabilistically Detecting Steganography withinMP3 Files<\/a>\u201d ) and ITM alumnus\u00a0<strong>David Stacey<\/strong>\u00a0(\u201c<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2659756&amp;CFID=441215078&amp;CFTOKEN=54241891\">Passive Warden Using Statistical Steganalysis<\/a>\u201d). \u00a0The IIT papers were presented at a session chaired by Industry Professor <strong>Ray Trygstad<\/strong>, Associate Chair of IIT\u2019s Department of Information Technology and Management<strong>.\u00a0<\/strong>The RIIT conference was held in conjunction with the annual conference of the ACM <a href=\"http:\/\/sigite2014.sigite.org\/\">Special Interest Group for Information Technology Education<\/a>,\u00a0October 15-18, 2014\u00a0in Atlanta, Georgia. \u00a0<strong>Congratulations to Maya, Louis, and Bill for this recognition of\u00a0their\u00a0accomplishment.<\/strong><\/p>\n<p>This is the second year that an IIT paper has won the Best Paper award at RIIT. At last year&#8217;s RIIT conference in Orlando, <strong>Dr. C. Robert Carlson<\/strong>, Dean of the IIT School of Applied Technology, along with <strong>Dr. Sargon Hasso<\/strong>, a former PhD student of Dr. Carlson\u2019s, won the award for their\u00a0paper \u201c<a title=\"Paper: Design patterns as first-class connectors\" href=\"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2512219&amp;ftid=1403446&amp;dwn=1&amp;CFID=254330931&amp;CFTOKEN=76551613\" target=\"_blank\">Design Patterns as First-Class Connectors<\/a>\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Best Paper Award at the\u00a03rd annual\u00a0Association for Computing Machinery&#8217;s Research in Information Technology conference\u00a0was won this year by the\u00a0IIT ITM student team of Maya Embar, Louis McHugh, and William Wesselman for their paper \u201cPrinter Water-Mark Obfuscation\u201d. Also presenting at the\u00a0conference was ITM student\u00a0Ben Khodja ( \u201cProbabilistically Detecting Steganography withinMP3 Files\u201d ) and ITM alumnus\u00a0David [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3884,437,3869,3904],"tags":[1648,1692,3948,3909,3896,3934],"class_list":["post-1100","post","type-post","status-publish","format-standard","hentry","category-academic","category-research","category-security","category-stuff-for-students","tag-academics","tag-awards","tag-conferences","tag-iit-students","tag-recognition","tag-research-2"],"_links":{"self":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/comments?post=1100"}],"version-history":[{"count":1,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1100\/revisions"}],"predecessor-version":[{"id":1103,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1100\/revisions\/1103"}],"wp:attachment":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/media?parent=1100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/categories?post=1100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/tags?post=1100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}