70 likes | 167 Views
This paper explores the challenges of data security and proposes advanced encryption techniques to address them. The motivation, characteristics of the problem, and reasons for solving it are discussed. The presentation includes an overview of the talk, techniques, evaluation, related work, and observations.
E N D
Paper Title Your Name CMSC 838 Presentation
Motivation • Problem paper is trying to solve • Characteristics of problem • … • Why do we care • Reasons for solving problem • … • 1-2 slides CMSC 838T – Presentation
Talk Overview • Overview of talk • Motivation • Techniques • Evaluation • Related work • Observations CMSC 838T – Presentation
Techniques • Approach • How techniques in paper try to solve problem • Main intuition(s) behind approach • Algorithm • Steps of algorithm used • Input / output of algorithm • 4-6 slides CMSC 838T – Presentation
Evaluation • Experimental environment • Input data sets • Hardware platforms • Software environment • Evaluation results • Performance of techniques • Comparisons with previous approaches • 1-2 slides CMSC 838T – Presentation
Related Work • Similar / previous approaches • For each related work • Describe technique • How much is the same • How much is different • 1-2 slides CMSC 838T – Presentation
Observations • Your observations • Is technique useful • Real target applications • Sufficient improvement (vs. previous work) • Feasible in practice (in computing power, user effort, etc…) • How much better than previous work • How may technique be improved? • 1-2 slides CMSC 838T – Presentation