CIS Event Speaker Archive
Spring 2024
Date | Speaker | Institution | Talk Title |
01/30/2024 – CIS Colloquium | James Bartusek | University of California, Berkeley | “Obfuscation of Quantum Computation” |
01/31/2024 – ASSET | Chudi Zhong | Computer Science Dept., Duke University | “Towards A New Frontier of Trustworthy AI: Interpretable Machine Learning Algorithms that Produce All Good Models” |
02/06/2024 – CIS Colloquium | Bailey Flanigan | Computer Science Dept., Carnegie Mellon University | “How Algorithms Can Support Deliberative Democracy” |
02/07/2024 – ASSET | Sarah Cen | Electrical Engineering and Computer Science Department, MIT | “Paths to AI Accountability” |
02/08/2024 – CIS Colloquium | Sewon Min | Natural Language Process Group, University of Washington | “Rethinking Data Use in Large Language Models” |
02/15/2024 – CIS Colloquium | Tim Dettmers | Computer Science Dept., University of Washington | “Accessible Foundation Models: Systems, Algorithms, and Science” |
02/20/2024 – CIS Colloquium | Jiatao Gu | Researcher at Apple AI/ML (MLR) | “Towards Flexible, Scalable, and Knowledgeable Generative Intelligence” |
02/21/2024 – ESE/CIS ASSET | Max Simchowitz | Robot Locomotion Group at MIT CSAIL | “Mathematical Foundations for Physical Agents” |
02/27/2024 – CIS Colloquium | Sherry Yang | Sr. Researcher Scientist at Google DeepMind and Comp. Sci. Dept. University of California, Berkeley | “Decision Making with Internet-Scale Knowledge” |
02/29/2024 – CIS Colloquium | Emma Dauterman | EECS Dept. University of California, Berkeley | “Secure systems from insecure components” |
03/12/2024 – CIS Colloquium | Neil Zhao | Computer Science at the University of Illinois Urbana-Champaign | “Modern Clouds: Side-Channel Attacks and Defenses” |
03/13/2024 – CIS/IDEAS ASSET | Andrew Ilyas | Computer Science, MIT | “Making Machine Learning Predictability Reliable” |
03/14/2024 – CIS Colloquium | Abhishek Shetty | Dept. of Computer Science, University of California, Berkeley | “Frameworks for Efficient Algorithms for Learning: Robustness and Data Compression” |
03/19/2024 – CIS Colloquium | Yilun Du | EECS, MIT | “Generalizing Outside the Training Distribution through Compositional Generation” |
03/20/2024 – CIS/IDEAS ASSET | Micah Goldblum | Postdoctoral Research Fellow at New York University | “Bridging the Gap Between Deep Learning Theory and Practice” |
03/21/2024 – CIS Colloquium | Praneeth Karimireddy | Computer Science Dept., University of California, Berkeley | “Building Planetary-Scale Collaborative Intelligence” |
03/26/2024 – CIS Colloquium | Zhuohan Li | Computer Science Dept., University of California, Berkeley | “Empowering Large Language Models with Efficient and Automated Systems” |
03/27/2024 – CIS Colloquium | Francis Y Yan | Senior Researcher at Microsoft Research | “Practical Machine Learning for Networked Systems” |
03/28/2024 – CIS Colloquium | Anwar Hithnawi | Computer Science Dept. ETH, Zurich | “Privacy-Preserving Systems for a Data-Driven World” |
04/02/2024 – CIS/IDEAS ASSET | Alexander Tong | Postdoctoral Researcher at Mila, Montreal | “Flow Matching and Optimal Transport with Applications to Cell Trajectories and Protein Design” |
04/03/2024 – CIS/IDEAS ASSET | Elan Rosenfeld | Computer Science and Statistics & Machine Learning, Carnegie Mellon University | “Building a Foundation for Trustworthy Machine Learning” |
Fall 2023
Spring 2023
Date | Speaker | Institution | Talk Title |
02/02/2023 | Nicholas Spooner | University of Warwick, UK | “Proofs, Cryptography and Quantum Information” |
02/09/2023 | Riccardo Paccagnella | Computer Science at the University of Illinois Urbana-Champaign | “Software Security Challenges in the Era of Modern Hardware” |
02/14/2023 | Sam Kumar | Computer Science at the University of California, Berkeley | “Rethinking System Design for Expressive Cryptography” |
02/15/2023 | Ethan Ordentlich | Electrical Engineering and Computer Science at the University of California, Berkeley | “Methods of Data Lookup with Hashing” |
02/16/2023 | Nicole Immorlica | Senior Researcher at Microsoft, New England | “Birds of a Feather Flock Together: How Homophily Leads to Segregation, Inequality, and Inefficiency and What We Can Do About It” |
02/21/2023 | Akshayaram Srinivasan | School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai | “Secure Computation with Minimal Interaction” |
02/23/2023 | Sunoo Park | Columbia University and Columbia Law School | “Cryptography, Security, and Law” |
02/28/2023 | Nirvan Tyagi | Computer Science at Cornell University | “Privacy-Preserving Accountability Online” |
03/02/2023 | Michael Kim | Miller Institute for Basic Research in Science at Stanford University | “Foundations of Responsible Machine Learning” |
03/14/2023 | Stephanie Wang | Electrical Engineering and Computer Science at the University of California, Berkeley | “The Design of a General-Purpose Distributed Execution System” |
03/16/2023 | Venkat Arun | CSAIL at the Massachusetts Institute of Technology | “Designing Provably Performant Networked Systems” |
03/21/2023 | Max Willsey | Computer Science and Engineering at the University of Washington | “E-Graphs for Next-Gen Programming Language Tools” |
03/28/2023 | Colin Raffel | Computer Science, University of North Carolina, Chapel Hill | “Collaborative, Communal, & Continual Machine Learning” |
Fall 2022
Date | Speaker | Institution | Talk Title |
09/08/2022 | Elette Boyle | Associate Professor, Reichman University (Israel) and Senior Scientist, Reichman University (Israel) & NTT Research | |
09/20/2022 | Sorin Lerner | Professor and Department Chair, Computer Science & Engineering, University of California, San Diego | “Live Programming and Programming by Example: Better Together” |
09/30/2022 | Matt Sinclair | Professor, Computer Science Dept. University of Wisconsin-Madison and Visiting Research Scholar at AMD Research | “Future Heterogeneous Systems Need More First-Class Citizens” |
10/18/2022 | Constantinos Daskalakis | Professor, Electrical Engineering and Computer Science, MIT | “Equilibrium Complexity and Deep Learning” |
10/22/2022 | Paul Resnick | Professor and Associate Dean, School of Information, University of Michigan | “Rater Equivalence: An Interpretable Measure of Classifier Accuracy Against Human Labels” |
10/25/2022 | Tim Roughgarden | Professor, Computer Science, Data Science Inst. at Cornell University | “The Long Arm of Theoretical Computer Science: A Case Study in Blockchains/Web3″ |
10/27/2022 | Srini Devadas | Professor, Electrical Engineering and Computer Science, MIT | “Designing Hardware for Cryptography and Cryptography for Hardware” |
11/01/2022 | Abhinav Gupta | Associate Professor, The Robotics Institution, CMU | “Rich Babies, Poor Robots: towards rich sensing, continuous data and multiple environments.” |
11/15/2022 | Kyunghyun Cho | Associate Professor, Computer Science and Center for Data Science, New York University | “Generative multitask learning mitigates target-causing confounding” |
12/08/2022 | Duncan Callaway | Associate Professor of Energy and Resources at the University of California, Berkeley | “Exploring the role of scientific machine learning in electric power system decarbonization” |
Fall 2021
Date | Speaker | Institution | Talk Title |
10/12/2021 |
Yejin Choi |
School of Computer Science and Engineering, University of Washington |
“David V.S. Goliath: the Art of Leaderboarding in the Era of Extreme-Scale Neural Models” |
11/02/2021 | School of Electrical Engineering and Computer Science, University of California, Berkeley | “Sketching Algorithms” | |
11/09/2021 |
Serdar Kadıoğlu |
Brown University |
“Optimization in Practice” |
11/23/2021 | Fei-Fei Li | School of Computer Science, McGill University and Mila | “Tackling climate change with machine learning” |
12/02/2021 | Noam Auslander | Molecular & Cellular Oncogenesis Program, Wistar Institute Cancer Center | “Modeling cancer progression with neural networks” |
12/07/2021 | Carmela Troncoso | EPFL Switzerland, Spring Lab | “Synthetic Data: Anonymisation Groundhog Day” |
Spring 2021
Date | Speaker | Institution | Talk Title |
01/19/2021 | Fransescka Xhakaj | Human-Computer Interaction Institute School of Computer Science, Carnegie Mellon University | “Hash Tables Lecture” |
02/04/2021 | Electrical Engineering and Computer Science, University of California, Berkeley | “What is a line of ‘best’ fit?: A framework for building predictive models” | |
02/16/2021 | Alekh Agarwal | Principal Research Manager, Microsoft | “Structural Foundations of Efficient Reinforcement Learning” |
02/17/2021 | Andrew Head | Computer Science Department, University of California, Berkeley | “IDEs for Ideas” |
02/18/2021 | Akshitha Sriraman | Computer Science and Engineering, University of Michigan | “Enabling Hyperscale Web Services” |
02/23/2021 | Aayush Jain | Computer Science Department, University of California, Los Angeles | “Provably Secure Indistinguishability Obfuscation” |
02/24/2021 | Anna Fariha | College of Information and Computer Science, University of Massachusetts, Amherst | “Enhancing Usability and Explainability of Data Systems” |
02/25/2021 | Riad Wahby | Computer Science Department, Stanford University | “Probabilistic proofs: theory, hardware, and everything in between” |
03/02/2021 | Fraser Brown | Computer Science Department, Stanford University | “Exterminating bugs in real systems” |
03/03/2021 | Sanmi Koyej | Department of Computer Science, University of Illinois at Urbana-Champaign | “The Measurement and Mismeasurement of Trustworthy ML” |
03/04/2021 | Yongshan Ding | Department of Computer Information Science, University of Chicago | “Architecting Quantum Computing Systems in the Presence of Noise” |
03/09/2021 | Ben Fisch | Computer Science Department, Stanford University | “Proof systems for governance, transparency, and privacy” |
03/16/2021 | Amy Pavel | Computer Science Department, Carnegie Mellon University | “Human-AI Systems for Making Video Useful” |
03/18/2021 | Danaë Metaxa | Computer Science Department, Stanford University | “Bias and Representation in Sociotechnical Systems” |
03/23/2021 | Kexin Rong | Computer Science Department, Stanford University | “Prioritizing Computation and Analyst Resources in Large-scale Data Analytics” |
03/25/2021 | Wengong Jin | Computer Science and Artificial Intelligence, MIT CSAIL | “Graph representation learning for drug discovery” |
03/30/2021 | Mingmin Zhao | Department of Electrical Engineering and Computer Science, MIT | “Wireless Systems that See the Invisible with Machine Learning: Through-Wall Vision, Emotion Recognition, and Health Monitoring” |
03/31/2021 | Makrand Sinha | Centrum Wiskunde & Informatica, National Research Institute for Mathematics and Computer Science Amsterdam | “Communication Complexity, Quantum Computing and Optimization: New Connections and Insights” |
04/01/2021 | Caroline Lemieux | Computer Science Department, University of California, Berkeley | “Expanding the Reach of Fuzzing” |
04/06/2021 | Dylan Foster | Institute for Foundations of Data Science, MIT | “Bridging Learning and Decision Making” |
04/07/2021 | Toby Li | Human-Computer Interaction Institute, Carnegie Mellon University | “Human-Centered Interactive Systems for Configuring, Extending, and Developing AI Applications” |
04/08/2021 | Bryan Wilder | Computer Science, Harvard University | “AI for Population Health: Melding Data and Algorithms on Networks” |
04/14/2021 | Aniket Bera | Department of Computer Science, University of Maryland at College Park | “Digital humans that move, interact, express, and feel, just like us!” |
04/15/2021 | Amy Zhang | McGill University and the Mila Institute | “Exploiting latent structure and bisimulation metrics for better generalization in reinforcement learning” |
Fall 2020
Date | Speaker | Institution | Talk Title |
09/08/2020 | Deva Ramanan | Robotics Institute, Carnegie Mellon University | “Embodied Perception in-the-wild” |
09/15/2020 | Computer Science Dept., Princeton University | “Recovering, manipulating and enhancing recorded speech (1905-2020)” | |
09/22/2020 | Michael Carbin | Electrical Engineering and Computer Science Dept., MIT | “Engineering Approximate Computations” |
09/29/2020 | Adrian Perrig | Computer Science Dept., ETH Zurich | “Experiencing a New Internet Architecture” |
10/06/2020 | Christos Papadimtriou | Computer Science Dept., Columbia University | “Language, Brain, and Computation” |
10/20/2020 | Umesh Vazirani | Electrical Engineering and Computer Science Dept. University of California, Berkeley |
“Theoretical Reflections on Quantum Supremacy” |
10/27/2020 | Joseph Gonzalez | Dept. of Electrical Engineering and Computer Science University of California, Berkeley |
“Advances in Machine Learning Systems Research” |
11/10/2020 | Amy J. Ko | Dept. of Computer Science and Engineering, University of Washington | “Critical Computing Education” |
11/12/2020 | Magdalena Balazinska | School of Computer Science and Engineering, University of Washington | “Video Data Management: From Data Models to Data Storage and Benchmarking” |
12/01/2020 | Yiling Chen | Computer Science Dept., Harvard University | “Challenges of Incorporating Algorithms into Decision Making: Fairness, Welfare and Disparate Interactions” |
12/08/2020 | Mirella Lapata | Institute for Language, Cognition and Computation School of Informatics, University of Edinburgh |
“Automatic Movie Analysis and Summarization via Turning Point Identification” |
Spring 2020
Date | Speaker | Institution | Talk Title |
01/21/2020 | Arvind Krishnamurthy | Professor of Computer Science and Engineering University of Washington |
“Networked Systems in the Era of Programmable Dataplanes” |
02/11/2020 |
Dimitrios Skarlatos |
Computer Science Department University of Illinois at Urbana-Champaign |
“Rethinking Operating System and Hardware Abstractions for Good and Evil” |
02/13/2020 | Sharath Chandra Guntuka | School of Medicine University of Pennsylvania |
“User Generated Content: Opportunities to Inform Healthcare” |
02/19/2020 | Maia Jacobs | Center for Research on Computation and Society Harvard University |
“One Size Doesn’t Fit Anyone: Tailoring Digital Tools for Personal Health Journeys” |
02/27/2020 | Jacob Gardner | Uber AI Labs San Francisco | ” Risk-Aware Machine Learning at Scale” |
03/03/2020 | Paul Grubbs | Dept. of Computer Science Cornell University |
“Breaking and Building End-to-End Encrypted Systems” |
03/05/2020 | Saugata Ghose | Electrical and Computer Engineering Carnegie Mellon University |
“Reducing Errors in Quantum Computation via Program Transformation” |
03/18/2020 | Dylan Hadfield-Menell | Computer Science Dept. University of California, Berkeley |
“The Value Alignment Problem in Artificial Intelligence” |
03/19/2020 | Adji Bousso Dieng | Department of Statistics Columbia University |
“Deep Probabilistic Graphical Modeling” |
03/24/2020 | Sara Achour | Department of Computer Science MIT |
“New Compilation Techniques for Reconfigurable Analog Devices” |
03/25/2020 | Qian Yang |
Human-Computer Interaction Institute Carnegie Mellon University |
” Harnessing the Power of People: Human-AI Interaction Design in Healthcare, Language, and Beyond” |
Fall 2019
Date | Speaker | Institution | Talk Title |
9/20/2019 | Ron Baecker | Emeritus Professor of Computer Science and Bell Chair in Human-Computer Interaction, University of Toronto | “What Society Must Require from AI” |
10/03/2019 | Eitan Grinspun | Computer Science Department, Columbia University | “A Geometric Perspective on Computing Motion” |
10/22/2019 | Eva Tardos | Computer Science Department, Cornell University | “Learning in dynamic environments” |
11/05/2019 | Mike Hicks | Department of Computer Science, University of Maryland | “Contesting Secure Development to Understand Security Mistakes” |
11/12/2019 | Dan Garcia | Electrical Engineering and Computer Science Department, University of California, Berkeley | “Achieving CSforALL through the Beauty and Joy of Computing (BJC)” |
11/14/2019 | Grace Hopper Speaker Rebecca Mercuri |
Founder of Notable Software, Inc | “A 2020 Vision of U.S. Election Security” |
11/19/2019 | Moinuddin Qureshi | Electrical and Computer Engineering at the Georgia Institute of Technology. |
“Reducing Errors in Quantum Computation via Program Transformation” |
11/21/2019 | Ari Juels | Computer Science Department, Cornell University and Jacobs Technion-Cornell Institute | “Flash Boys 2.0: Frontrunning. Transaction Reordering, and Consensus Instability in Decentralized Exchanges” |
12/05/2019 | Rada Milhalcia | Electrical Engineering and Computer Science Department, University of Michigan |
Spring 2019
Date | Speaker | Institution | Talk Title |
1/17/2019 | Steve Swanson | Computer Science & Engineering, University of California, San Diego | What Should We Do With Persistent Main Memory? |
1/29/2019 | Caroline Trippel | Department of Computer Science, Princeton University | Made to Order: Verifying Correctness and Security of Hardware through Event Orderings |
2/12/2019 | Dominik Moritz | Computer Science and Engineering Department, University of Washington | Visualization for People + Systems |
2/14/2019 | Yonatan Belinkov | School of Engineering and Applied Sciences, Harvard University | Deep Learning Models for Language: What they learn, where they fail, and how to make them more robust |
2/15/2019 | Jianjun Wu | Department of Electrical Engineering and Computer Science, MIT | Physical Scene Understanding |
2/21/2019 | Jeffery Regier | Department of Electrical Engineering and Computer Sciences , University of California, Berkeley | Cataloging the Visible Universe through Bayesian Inference at Petascale |
2/22/2019 | Wen Sun | School of Computer Science, CMU | Towards Generalization and Efficiency in Reinforcement Learning |
2/26/2019 | Angjoo Kanazawas | School of Computer Science and Electrical Engineering, University of California, Berkeley | Perceiving Humans in the 3D World |
2/28/2019 | Nandita Vijaykumar | Electrical and Computer Engineering Department, CMU | Rethinking the hardware-software contact: Enabling practical and general cross-layer optimization |
3/12/2019 | Dinesh Jayaraman | School of Electrical Engineering and Computer Science, University of California, Berkeley | Towards Embodied Visual Intelligence |
3/13/2019 | Mark Yatskar | Computer Science Department, University of Washington | Language as a Scaffold for Grounded Intelligence |
3/14/2019 | Raul Castro Fernandez | Computer Science and Artificial Intelligence Laboratory, MIT | Data Discovery: Unleashing the Value of Data |
3/19/2019 | Elissa Redmiles | Department of Computer Science, University of Maryland | Security for all: Modeling Structural Inequities to Design More Secure Systems |
3/20/2019 | Siva Reddy | Computer Science Department, NLP Group, Stanford University | Interacting with machines in natural languages |
3/21/2019 | Chi Jin | Computer Science Department, University of California, Berkeley | Machine Learning: Why Do Simple Algorithms Work So Well? |
3/26/2019 | Earlence Fernandes | Computer Science Department, University of Washington | Computer Security for Emerging Technologies |
3/28/2019 | Frank Li | Computer Science Department, University of California, Berkeley | Improving Security at an Internet Scale: A Data-Driven-Approach |
3/29/2019 | Fisher Yu | Computer Science Department, University of California, Berkeley | Towards Human-Level Recognition via Contextual, Dynamic, and Predictive Representations |
4/2/2019 | Nima Anari | Computer Science Department, Stanford University | |
4/4/2019 | Mark Jeffery | Computer Science and Artificial Intelligence Laboratory, MIT | Making Parallelism Pervasive with the Swarm Architecture |
4/9/2019 | Guy Van den Broeck | Computer Science Department, University of California, Los Angeles |
Fall 2018
Date | Speaker | Institution | Talk Title |
9/27/2018 | Pamela Zave | Department of Computer Science, Princeton University | The compositional architecture of the Internet |
10/9/2018 | Jack Stankovic | Department of Computer Science, University of Virginia | Research Challenges and Solutions for IOTT/CPS |
10/11/2018 | Lothar Thiele | Department Information Technology and Electrical Engineering, ETH Zurich | The Quest for Trust |
10/23/2018 | Aditya Akella | Department of Computer Science, University of Wisconsin-Madison | Putting Networks on a Firm Footing: Revolutionizing Network Management (and More) |
10/25/2018 | Tal Rabin | Cryptography Research Group, TJ Watson Research Center, IBM | Multiparty Computations and Threshold Cryptography – 30 Years in the Making |
10/30/2018 | Simson Garfinkel | US Census Bureau’s Senior Computer Scientist for Confidentiality and Data Access | Cybersecurity Research Is Not Making Us More Secure |
11/1/2018 | Babak Falsafi | Computer & Communication Sciences, EPFL | Server Architecture for the Post-Moore Era |
11/6/2018 | Jeff Bilmes | Department of Electrical Engineering, University of Washington | AI, Information, and the Future of Machine Learning |
11/16/2018 | Bjarne Stroustrup | Managing Director, Technology Division of Morgan Stanley; Visiting Professor at Columbia University | What – if anything – have we learned from C++? |
11/27/2018 | Kate Crawford | AI Now Institute | |
11/29/2018 | Le Song | Computational Science and Engineering College of Computing, Georgia Tech | Representation Learning for Graphs |
12/4/2018 | Dinesh Manocha | Department of Computer Science, University of Maryland | Autonomous Driving: Simulation and Navigation |
12/11/2018 | Fei Sha | Department of Computer Science, University of Southern California | Asking Harder Questions So Machines Can Answer More Intelligently |
Spring 2018
Date | Speaker | Institution | Talk Title |
2/22/2018 | Sebastian Angel | Computer Science Department, University of Texas at Austin | Privacy despite mass surveillance |
2/27/2018 | Omer Paneth | Computer Science Department, MIT | Cryptography Outside the Black Box |
3/1/2018 | Stefano Tessaro | Computer Science Department, University of California, Santa Barbara | The Foundations of Applied Cryptography |
3/13/2018 | Taesoo Kim | School of Computer Science, College of Computing, Georgia Tech | Scaling Security Practices: Automated Approaches to Eliminate Security Vulnerabilities |
3/14/2018 | Alexandros Daglis | Ecole Polytechnique Federale de Lausanne, Switzerland | Network-Centric Computing for Online Services |
3/15/2018 | Seyed Zahedi | Computer Science Department, Duke University | Managing Shared Resources in the Data Center Era: Computer Architecture Meets Game Theory |
3/20/2018 | Huijia (Rachel) Lin | Computer Science Department, University of California, Santa Barbara | On The Foundations of Program Obfuscation |
3/22/2018 | Saurabh Gupta | Computer Science Department, University of California at Berkeley | Visual Perception and Navigation in 3D Scenes |
3/27/2018 | San Woo Jun | Computer Science & Artificial Intelligence, MIT | Big Data Analytics Made Affordable: Hardware-Accelerated Flash Storage for Graph Analytics and Other Applications |
3/28/2018 | Stephen Bach | Computer Science Dept., Stanford University | Programming Statistical Machine Learning with High-Level Knowledge |
3/29/2018 | Samira Khan | Computer Science Department, University of Virginia | Solving the DRAM Scaling Challenge |
4/3/2018 | Radhika Mittal | Electrical Engineering and Computer Science, University of California at Berkeley | Towards a More Stable Network Infrastructure |
4/12/2018 | Nika Haghtalab | Computer Science Department, Carnegie Mellon University | Machine learning by the people, for the people |
4/16/2018 | Danqi Chen | Computer Science Department, Stanford University | Knowledge from Language via Deep Understanding |
4/17/2018 | Jacob Andreas | Computer Science Department, University of California, Berkeley | Learning from Language |
4/27/2018 | Sanjoy Dasgupta | University of California, San Diego | Using interaction for simpler and better learning |
Fall 2017
Date | Speaker | Institution | Talk Title |
9/7/2017 | Hovav Shacham | Department of Computer Science and Engineering, University of California, San Diego | Trusted Browsers for Uncertain Times |
9/12/2017 | Michael Franklin | Department of Computer Science, University of Chicago | Big Data Software: What’s Next? |
9/21/2017 | Gaurav Chakravorty | Co-Founder, CIO, qplum | The next ten years: Deep Learning in Trading |
9/28/2017 | John Hughes | Computing Science Department, Chalmers University of Technology | The Incredible Shrinking Test Case |
10/3/2017 | Salvatore Stolfo | Department of Computer Science, Columbia University | A Brief History of Symbiote Defense |
10/12/2017 | Arnab Nandi | Department of Computer Science and Engineering, Ohio State University | Chasing Interactivity: Querying Beyond Keyboards |
10/16/2017 | Adam Blank | Computer Science and Engineering, University of Washington | Structure and Application of AVL Trees |
10/26/2017 | Avrim Blum | Professor and Chief Academic Officer, The Toyota Technological Institute at Chicago | Learning about Agents and Mechanisms from Opaque Transactions |
11/2/2017 | Kunle Olukotun | Departments of Electrical Engineering and Computer Science, Stanford University | Scaling Machine Learning Performance with Moore’s Law |
11/7/2017 | Ehsan Hoque | Computer Science Department, University of Rochester | When can a computer improve your social skills? |
11/9/2017 | Konrad Kording | Department of Neuroscience, Department of Bioengineering, UPenn PIK Professor | Rethinking the role of machine learning in (neuro)science |
11/16/2017 | Deborah Estrin | Department of Computer Science, Cornell Tech | In pursuit of digital biomarkers |
11/30/2017 | Aditya Parameswaran | Computer Science Department, University of Illinois at Urbana-Champaign | Enabling Data Science for the 99% |
12/7/2017 | Shafi Goldwasser | Electrical Engineering and Computer Science, MIT | Pseudo Deterministic Algorithms and Proofs |
Spring 2017
Date | Speaker | Institution | Talk Title |
1/18/2017 | Hanna Wallach | Senior Research Microsoft New York | Machine Learning for Social Science |
1/26/2017 | Edward Lee | Electrical Engineering and Computer Sciences, UC Berkeley | Resurrecting Laplace’s Demon: The Case for Deterministic Models |
1/31/2017 | Margaret Martonosi | Department of Computer Science, Princeton University | |
2/16/2017 | Eleazer Eskin | Computer Science Department, Human Genetics, University of California, Los Angeles | |
3/16/2017 | Yingyu Liang | Computer Science Dept., Princeton University | Theory for New Machine Learning Problems and Applications |
3/20/2017 | Osbert Bastani | Computer Science Dept., Stanford University | Beyond Deductive Inference in Program Analysis |
3/21/2017 | Bharath Hariharan | Post-doctoral Researcher, Facebook | Towards versatile visual recognition systems |
3/23/2017 | Ilya Razenshteyn | MIT CSAIL | New Algorithms for High-Dimensional Data |
3/27/2017 | Christina Garman | Department of Computer Science, Johns Hopkins University | Securing Deployed Cryptographic Systems |
3/30/2017 | Prashant Nair | Computer Architecture, Georgia Tech | Learning to Live with Errors: Architectural Solutions for Memory Reliability at Extreme Scaling |
4/4/2017 | Ali Jose Mashtizadeh | Computer Science Department, Stanford University | Systems and Tools for Reliable Software: Replication, Reproducibility, and Security |
4/6/2017 | Dorsa Sadigh | Electrical Engineering and Computer Science, University of California-Berkeley | Towards a Theory of Safe and Interactive Autonomy |
4/11/2017 | Kaushik Roy | Electrical and Computer Engineering, Purdue University | Approximate Computing for Energy-efficient Error-resilient Multimedia Systems |
4/13/2017 | Yuhao Zhu | Computer Architecture, University of Texas, Austin | Energy-Efficient Mobile Web Computing |
4/18/2017 | Aasheesh Kolli | Computer Engineering Lab, University of Michigan | Architecting Persistent Memory Systems |
4/20/2017 | Wyatt Lloyd | Computer Science Dept., University of South Carolina | Low Latency and Strong Guarantees for Scalable Storage |
4/27/2017 | Zvi Galil | The John P. Imlay Jr. Dean of Computing and Professor, Georgia Tech | Georgia Tech’s Online MOOC-based Master Program |
Fall 2016
Date | Speaker | Institution | Talk Title |
10/24/2016 | Benjamin Pierce | University of Pennsylvania | The Science of Deep Specification |
10/27/2016 | Deborah Johnson | University of Virginia | Ethical Issues in Big Data |
11/1/2016 | Emmanuel Thome | INRIA | Large cryptanalytic computations with the Number Field Sieve |
11/8/2016 | Kathleen R. McKeown | Columbia University | At the Intersection of Data Science and Language |
11/10/2016 | Mridul Aanjaneya | University of Wisconsin – Madison | Simulation-Enhanced Visual Computing for Real World Applications |
11/15/2016 | Samuel Madden | MIT | Interactive Data Analytics: the New Frontier |
12/8/2016 | Ragunathan Rajkumar | Carnegie Mellon University | Driverless Vehicles: What Can We (Not) Do? |
12/13/2016 | Chenfanfu Jiang | UCLA | Hybrid methods for computer graphics simulation of snow, sand, water, foam and beyond |
Spring 2016
Date | Speaker | Institution | Talk Title |
1/28/2016 | Mayur Naik | Georgia Tech | A Declarative Approach to Leverage “Big Code” for Program Reasoning |
2/4/2016 | Dan Roth | Computer Science and the Beckman Institute, University of Illinois at Urbana/Champaign | Constraints Driven Learning and Inference for Natural Language Understanding |
2/9/2016 | James Zou | Microsoft Research; Massachusetts Institute of Technology | Harnessing the unseen for next-generation data science |
2/12/2016 | Jan Cuny | National Science Foundation | The Rise of Computer Science Education and the Move Toward Greater Diversity |
2/16/2016 | Shivani Agarwal | Radcliffe Institute for Advanced Study, Harvard University | Machine Learning: Art or Science? |
2/18/2016 | Justine Sherry | University of California, Berkeley | Middleboxes As A Cloud Service |
2/23/2016 | Mooly Sagiv | Tel Aviv University | Verifying Safety of Distributed Systems |
2/25/2016 | Benedikt Shmidt | IMDEA Software Institute | Computer-aided proofs for Cryptographic Primitives and Protocols |
3/1/2016 | Matthew Hicks | University of Michigan | Engineering a more trustworthy computing base |
3/3/2016 | Emmanouil Kapritsos | Microsoft Research | Sustainable Reliability for Distributed Systems |
3/15/2016 | Xin Jin | Princeton University | Dynamic Control of Software-Defined Networks |
3/17/2016 | Vincent Liu | University of Washington | Improving the Efficiency and Reliability of Data Center Networks |
3/24/2016 | Abhishek Bhattacharjee | Rutgers-New Brunswick | Efficient Virtual Memory for Big Data Systems |
3/31/2016 | Gennady Pekhimenko | Carnegie Mellon University | Practical Data Compression for Modern Memory Hierarchies |
4/19/2016 | Duncan Watts | Microsoft Research | Computational Social Science: Exciting Progress and Future Challenges |
4/21/2016 | Cary Phillips | Creating the Impossible: Hollywood Visual Effects at Industrial Light & Magic | |
4/26/2016 | Linh Thi Xuan Phan | Timing Guarantees for Cyber-Physical Systems | |
5/3/2016 | James Weimer | University of Pennsylvania | Personalizing Medicine in an Impersonal World: Parameter-Invariant Design for Cyber-Physical Systems |
Spring 2015
Date | Speaker | Institution | Talk Title |
2/3/2015 | Xuehai Qian | EECS at Berkeley, Computer Science Division, University of California at Berkeley | Taming Relaxed Memory Consistency and Non-determinism in Parallel System |
3/3/2015 | Dr. Matthew Jackson | Professor of Economics at Stanford University | Gossip: Identifying Central Individuals in Networks and Diffusion Processes |
3/19/2015 | Sue Gardner | Special Advisor to Wikipedia | Yes! The Future of the Internet |
3/24/2015 | Abhishek Bhattacharjee | Computer Science Department, Rutgers University | Virtual Memory in Next-Generation Heterogeneous Manycore Systems |
3/31/2015 | Byron Wallace | Department of Computer Science and School of Information, University of Texas at Austin | Automating evidence synthesis via machine learning and natural language processing |
4/6/2015 | Zachary Palmer | Ph.D. candidate, Computer Science Dept., Johns Hopkins | Refactoring: The Same is Better |
4/7/2015 | Sumit Gulwani | Principal Researcher, Microsoft Research | Data Manipulation using Programming By Examples and Natural Language |
4/9/2015 | Zachary Kincaid | University of Toronto | Parallel Proofs for Parallel Programs |
4/9/2015 | Alessandro Acquisti | Carnegie Mellon University | On the Roots of Privacy Concerns |
4/14/2015 | Jimmy Yang | Senior Director of Research at Yahoo Labs | Optimization in Online Advertising |
4/16/2015 | Dawn Song | Computer Science Division, University of California, Berkeley | No More Cat and Mouse: Towards Building Systems Secure by Construction |
Fall 2014
Date | Speaker | Institution | Talk Title |
9/2/2014 | Eva Tordos | Department of Computer Science, Cornell University | Composable Mechanisms, Learning, and Price of Anarchy in Auctions |
9/9/2014 | Jon Moore | Comcast | Not-So-Big Data After All: Managing Reference Data with Sirius |
9/18/2014 | Cynthia Dwork | Microsoft Research Silicon Valley | Fairness, Awareness, and Privacy |
9/29/2014 | Susan Athey | Graduate School of Business, Stanford University | |
10/14/2014 | Laura Haas | IBM Fellow and Director, Technology and Operations IBM Research Accelerated Discovery Lab | Accelerating Data Discovery for Better Health |
10/21/2014 | Emin Gun Sirer | Computer Science Department, Cornell University | Bitcoin: How to Get Rich or Die Tryin’ |
10/28/2014 | Time Kelly | Department of Computer Science, University of York | Mechanising Informal Arguments – Some Challenges and Possibilities |
11/6/2014 | Mingyao Li | Department of Biostatistics and Epidemiology, University of Pennsylvania | Statistical and Computational Modeling of RNA Sequencing Data |
11/11/2014 | Jennifer Rexford | Department of Computer Science, Princeton University | Putting the ‘Inter’ in ‘Internet’ |
11/18/2014 | Philip Resnik | Linguistics Department, University of Maryland, College Park | Modeling Agendas and Framing in Political Debates and Other Conversations |
12/2/2014 | Panos Ipeirotis | Stern School of Business, New York University | Adventures In Crowdsourcing |
12/11/2014 | Andrew DeOrio | University of Michigan | A Lesson on Data Abstraction |
Spring 2014
Date | Speaker | Institution | Talk Title |
1/16/2014 | Farnam Jahanian | Assistant Director for CISE, National Science Foundation | Innovating for Society: Realizing the Transformative Impact of Computing and Communication in a Data-Driven World |
1/13/2014 | Victor Vianu | Computer Science Department, University of California San Diego Title | Automatic Verification of Data-Centric Workflows |
2/18/2014 | Hal Daume III | Computer Science, University of Maryland, College Park | The Many Flavors of Language: Understanding and Adapting Statistical Models |
2/27/2014 | Alekh Agarwal | Microsoft Research New York | Representation, modeling and computation: Opportunities and challenges of modern datasets |
3/6/2014 | John Duchi | Computer Science Department, University of California, Berkeley | Computation, Communication, and Privacy Constraints on Learning |
3/18/2014 | Rishabh Singh | Computer Science and Artificial Intelligence Laboratory, MIT | Program Synthesis for the Masses |
3/25/2014 | Zachary Kincaid | Computer Science Dept., University of Toronto | Parallel proofs for parallel programs |
3/27/2014 | Michael Carbin | Electrical Engineering and Computer Science Dept., MIT | Reasoning about Approximate Computing |
4/1/2014 | Finale Doshi-Velez | School of Engineering and Applied Sciences and the Center for Biomedical Informatics, Harvard University | Prediction and Interpretation with Complex Data |
4/3/2014 | Sivan Sabato | Microsoft Research New England | Learning with Lower Information Costs |
4/8/2014 | Wen-Hann Wang | Managing Director of INTEL labs | Energy Efficient Computing: Enabling The New Digital Society |
4/10/2014 | Emina Torlak | Computer Science Department, University of California, Berkeley | Programming for Everyone: From Solvers to Solver-Aided Languages and Beyond |
4/15/2014 | Heming Cui | Computer Science Dept., University of Columbia | Adding Simplicity and Order in Today’s Complex Software |
4/22/2014 | Eric Horvitz | Distinguished Scientist & Managing Director, Microsoft Research | Data, Predictions, and Decisions in Support of People and Society |
4/24/2014 | Byron Boots | Robotics and State Estimation, University of Washington | Machine Learning For Modeling Real-World Dynamical Systems” |
5/6/2014 | Harsha V. Madhyastha | Computer Science and Engineering Dept., University of California Riverside | Enabling Cloud-Based Services: The Cloud Isn’t Everywhere |
5/14/2014 | Aarti Gupta | NEC Labs America | Software Verification: Locks and MLoCs* |
Fall 2013
Date | Speaker | Institution | Talk Title |
9/17/2013 | Raymond J. Mooney | Computer Science Dept., University of Texas, Austin | Grounded Language Learning |
9/24/2013 | Michael Reiter | Dept. of Computer Science, University of North Carolina at Chapel Hill | How to Misuse, Use, and Mitigate Side Channels in Virtualized Environments |
10/1/2013 | Raquel Urtasun | Toyota Technological Institute at Chicago | Visual Scene Understanding for Autonomous Systems |
10/8/2013 | Avrim Blum | Dept. of Computer Science, Carnegie Mellon University | Towards theoretical models of natural inputs: aiming to bridge the Theory/AI divide |
10/18/2013 | Al Roth | Professor of Economics at Stanford University | Networks and Algorithms: What Have We Learned from Market Design |
10/29/2013 | Trevor Mudge | Electrical Engineering & Computer Science Dept, University of Michigan | Interconnect Fabrics for Multicore Computers |
11/5/2013 | Lydia E. Kavraki | Computer Science and Bioengineering, Rice University | From Robots to Biomolecules: Computing for the Physical World |
11/12/2013 | Stephen Chong | School of Engineering and Applied Sciences, Harvard University | Towards a Practical Secure Concurrent Language |
11/19/2013 | Frans Kaashoek | Dept. of Electrical Engineering, MIT | The multicore evolution and operating systems |
11/26/2013 | Hal Daume III | Computer Science Dept., University of Maryland, College Park | The Many Flavors of Language: Understanding and Adapting Statistical Models |
12/5/2013 | Jame O’Brien | Dept. of Electrical Engineering and Computer Science, University of California, Berkeley | Talk Geometric Image and Video Forensics |
Spring 2013
Date | Speaker | Institution | Talk Title |
1/11/2013 | Domagoj Babic | Facebook, Inc | Synthesis of Symbolic Input-Output Specifications with Sigm |
2/21/2013 | Isil Dillig | Computer Science Dept. College of William & Mary | Introspective Static Analysis via Abductive Inference |
2/26/2013 | Thomas Dillig | Computer Science Dept. College of William & Mary | Practical Program Verification using Integer Linear Programming |
2/28/2013 | Geoff Voelker | Dept. of Computer Science and Engineering University of California, San Diego Talk | Exploring the Technical and Economic Factors Underlying Internet Scams |
3/14/2013 | Fred Schneider | Computer Science Dept. Cornell University Talk | Blueprint for a Science of Cyber-security |
3/19/2013 | Zachary Tatlock | Dept. of Computer Science and Engineering University of California, San Diego Talk | Securing Software via Design and Proof |
3/21/2013 | Allison Lewko | Microsoft Research New England | Expanding Capabilities for Functional Encryption |
3/26/2013 | Daniel Hsu | Microsoft Research New England | Fast learning algorithms for discovering the hidden structure in data |
4/4/2013 | John C. Mitchell | Dept. of Computer Science Stanford University | JavaScript and Web Security: Isolation and Communication in the Programmable Web |
4/9/2013 | Erin Solovey | Humans and Automation Lab MIT Talk | Enhancing Interactive Systems with Real-time Brain Input |
4/11/2013 | Nadia Heninger | Computer Science Dept. Princeton University | RSA in the real world |
4/16/2013 | Ruzica Piskac | Max Planck Institute for Software Systems | Software Synthesis using Automated Reasoning |
4/18/2013 | Quoc V. Le | Computer Science Dept. Stanford University Talk | Scaling deep learning to 10,000 cores and beyond |
Fall 2012
Date | Speaker | Institution | Talk Title |
10/9/2012 | Arvind | Computer Science and Engineering, Computer Science and Artificial Intelligence Laboratory, MIT | Programming in the Brave New world of Systems-on-a-chip |
12/6/2012 | Andrei Sabelfeld | Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg University | Tracking information flow in web applications |
11/6/2012 | Ion Stoica | Computer Science Division, University of California, Berkeley | Taming Big Data with BDAS (Berkeley Data Analytics Stack) |
11/13/2012 | Ellen Witte Zegura | School of Computer Science, College of Computing, Georgia Tech | Computing in Cirrus Clouds: The Challenge of Intermittent Connectivity |
11/19/2012 | Justine Cassell | Human Computer Interaction Institute, Carnegie Mellon | Building Rapport between People and Machines: Why and How |
11/20/2012 | Nikos Laoutaris | Telefónica I+D, S.A.U., Senior Researcher, Internet Scientific Group | Data Driven Network Economics Some thoughts and several real world applications |
12/4/2012 | M. Tamer Özsu | School of Computer Science, University of Waterloo | RDF Data Management Using Graph Algorithms |
12/11/2012 | Noah Smith | School of Computer Science, Carnegie Mellon University | Text and Social Context: Analysis and Prediction |
Spring 2012
Date | Speaker | Institution | Talk Title |
1/24/2012 | Carlos Guestrin | Computer Science Department, Carnegie Mellon University | GraphLab: A Distributed Abstraction for Machine Learning |
1/26/2012 | Jae Woo Lee | Dept. of Computer Science, Columbia University | C++ in 45 minutes. Or not |
2/7/2012 | Gokhan Memik | Department of Electrical Eng. and Computer Science, Northwestern University | Humans and Bits: Designing Holistic Computer Architectures |
2/9/2012 | Sam Moelius | IDA Center for Computing Sciences in Bowie, Maryland | Java Generics |
2/9/2012 | Hank Hoffman | Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology | A Framework for the Self-aware Management of Goals and Constraints in Modern Computing Systems |
2/14/2012 | Haryadi Gunawi | Computer Science Dept, University of California, Berkeley | Towards Reliable Storage Systems: From OS-Level File Systems to Cloud Storage |
2/23/2012 | Allen Clement | Max Planck Institute for Software Systems | Robust Replication (or how I learned to stop worrying and love failures) |
2/28/2012 | Chris Callison-Burch | Computer Science Department, Johns Hopkins University | Advances to machine translation and language understanding |
3/1/2012 | Mohit Tiwari | Electrical Engineering and Computer Sciences, University of California, Berkley | Crafting Secure Systems from the Gates Up |
3/13/2012 | Jack Sampson | Department of Computer Science and Engineering, University of California, San Diego | Conservation Cores: Architectures for a Future of Dark Silicon |
3/15/2012 | Kevin Fu | Dept. of Computer Science, University of Massachusetts Amherst | Your Abstractions are Worth^H^H^H^H^HPowerless! Perpetual Computation on Intermittently Powered Embedded Systems* (*Batteries Not Included) |
3/20/2012 | Daniel Sanchez | Electrical Engineering Dept., Stanford University | Scaling Software and Hardware for Thousand-Core Systems |
3/22/2012 | Joe Devietti | Computer Science & Engineering, University of Washington | No Such Thing as Luck: Improving Parallel Programmability with Determinism |
3/27/2012 | Barbara Jobstmann | Verimag Laboratory, CNRS and Université de Grenoble, France | Synthesis-Augmented System Development |
4/3/2012 | Viktor Kuncak | École polytechnique fédérale de Lausanne EPFL, Switzerland | Verifying and Computing with Constraint Solvers |
4/17/2012 | Dana Scott | Emeritus Hillman University Professor of Mathematical Logic, Computer Science, and Philosophy, Carnegie Mellon University | A Simple NP-complete Tiling Problem |
4/24/2012 | Leslie G. Valiant | Computer Science and Applied Mathematics, School of Engineering and Applied Sciences, Harvard University | A Computational Theory of Cortex and Hippocampus |
4/25/2012 | Vladimir Vapnik | NEC Laboratories | |
5/9/2012 | Thomas J. Farmer | NRC Postdoctoral Fellow at Army Research Lab, Adjunct Professor at the George Washington University Department of Electrical and Computer Engineering | From C to Assembly to the MIPS Processor – An Overview |
5/10/2012 | Max Morawski | University of Maryland, Baltimore County, Maple Lab | Intro To Recursion |
7/11/2012 | Nora Newcombe | Professor of Psychology; PI and Director, Spatial Intelligence and Learning Center (SILC), Temple | Spatial Skills and Success in STEM: Thinking about Gender Differences |
Fall 2011
Date | Speaker | Institution | Talk Title |
9/13/2011 | Nancy Pollard | Robotics Institute and the Computer Science Department at Carnegie Mellon University | Directing Physically Based (and Physical) Interactions: New Interfaces for Animation Control |
9/27/2011 | Marianne Winslett | University of Illinois at Urbana-Champaign, and Advanced Digital Sciences Center, Singapore | Records Retention: Addressing Insider Threats to Data Integrity |
9/29/2011 | Elchanan Mossel | Statistics and Computer Science at UC Berkeley | |
10/18/2011 | Kevin Knight | USC/Information Sciences Institute | Language Translation and Code-Breaking |
10/19/2011 | Steve Swanson | Computer Science & Engineering, University of California, San Diego | Moneta Engineering Storage for the Data Age |
10/25/2011 | Gerald Tesauro | IBM Watson Research Center | How Watson Learns Superhuman Jeopardy! Strategies |
11/8/2011 | Joe Hellerstein | EECS Computer Science Division, UC Berkeley | CALM Consistency: Disorderly Programming in Bloom |
11/15/2011 | Justine Cassell | Director of the Human-Computer Interaction Institute, in the School of Computer Science at CMU | The Human at the Heart of our Work: Advancing Social Theory and Engineering Practice |
11/22/2011 | Eitan Grinspun | Computer Science Dept., Columbia University | From Sorcery to Science: how Hollywood Physics impacts the Sciences |
11/29/2011 | Santish Narayanasamy | Electrical Engineering and Computer Science, University of Michigan | A Path to Achieving Sequential Correctness for Parallel Programs |
12/6/2011 | Ladislav Kavan | Dept. of Computer Science, Universtitaetstrasse | 3D Virtual Characters: Skinning, Clothing, and Weird Math |
Fall 2010
Date | Speaker | Institution | Talk Title |
9/14/2010 | Martin C. Rinard | Computer Science and Artificial Intelligence Laboratory, MIT | Automatically Reducing Energy Consumption, Improving Performance, and Tolerating Failures With Good Accuracy |
9/21/2010 | Dan Suciu | Computer Science and Engineering Dept, University of Washington | Querying Probabilistic Data |
9/28/2010 | Silvio Micali | Computer Science and Artificial Intelligence Laboratory, MIT | New Mechanisms for a New World |
10/19/2010 | Madhu Sudan | Microsoft Research, New England | Towards Universal Semantic Communication |
10/26/2010 | Bill Pugh | Department of Computer Science, University of Maryland | Mistakes that matter, and Mistakes that don’t |
11/9/2010 | Tom Mitchell | Carnegie Mellon University, Machine Learning Dept., School of Computer Science | Never-Ending Learning |
11/16/2010 | Craig Chambers | Flume: Towards Easy, Efficient Massively-Data-Parallel Pipelines | |
11/23/2010 | Margo Seltzer | Engineering and Applied Sciences, Harvard University | Provenance Everywhere |
11/30/2010 | Dan Roth | Department of Computer Science, University of Illinois at Urbana-Champaign | Constraints Driven Learning for Natural Language Understanding |
Spring 2010
Date | Speaker | Institution | Talk Title |
2/12/2010 | Kostas Bimpikis | Operations Research Center, Massachusetts Institute of Technology | Dynamics of Information Exchange in Endogenous Social Networks |
2/16/2010 | Aaron Roth | Computer Science Dept., Carnegie Mellon University | Efficient Computation under the Constraints of Privacy and Incentives |
2/22/2010 | Sachin Adlakha | Department of Electrical Engineering, Stanford University | Decision Making in Complex Interconnected Systems |
3/15/2010 | Jinwoo Shin | Department of Mathematics, Massachusetts Institute of Technology | Message Passing Networks |
3/16/2010 | Elchanan Mossel | Mathematics and Computer Science, Weizmann Institute; Electrical Engineering and Computer Science, U.C. Berkeley | Some Network Models in Economics and Related Areas |
3/18/2010 | Katrina Ligett | Computer Science Department, Cornell University | A Formal Approach to Privacy and Individual Incentives |
3/25/2010 | Gagan Goel | School of Computer Science, Georgia Institute of Technology | Computational Issues in Auction Design |
4/1/2010 | Hamid Nazer Zadeh | Microsoft Research | Online Optimization with Uncertain Information |
4/15/2010 | Amin Saberi | Management Science and Engineering, Institute for Computational and Mathematical Engineering, Stanford University | Game Dynamics, Equilibrium Selection and Network Structure |
Fall 2009
Date | Speaker | Institution | Talk Title |
9/29/2009 | Michael Collins | Computer Science and Artificial Intelligence Laboratory, MIT | TAG-based Structured Prediction Models for Parsing and Machine Translation |
10/13/2009 | Carol O’ Sullivan | Computer Science Department, Trinity College Dublin | Simulating and Evaluating Virtual Populace |
10/20/2009 | Rastislav Bodik | Computer Science Division, University of California, Berkeley | Algorithmic Program Synthesis with Partial Programs |
11/3/2009 | Lillian Lee | Dept. of Computer Science, Cornell University | A tempest: Or, On the flood of interest in sentiment analysis, opinion mining, and the computational treatment of subjective language |
11/17/2009 | Elaine J. Weyuker | AT&T Labs–Research, Shannon Laboratory | Bugs – Find Them Before They Find You! |
12/1/2009 | Larry Peterson | Dept. of Computer Science, Princeton University | Towards the Big “C” Cloud |
12/3/2009 | David Culler | Computer Science Dept., University of California, Berkeley | LoCal: Rethinking the Energy Infrastructure from an IT Perspective |
Spring 2009
Date | Speaker | Institution | Talk Title |
1/29/2009 | Ryan MacDonald | Google Research | Mining and Summarizing Opinions from the Web |
2/19/2009 | Moses Charikar | Dept. of Computer Science, Princeton University | New Insights into Semidefinite Programming for Combinatorial Optimization |
3/3/2009 | Sharon Goldberg | Electrical Engineering, Princeton University | |
3/5/2009 | Eugene Charniak | Computer Science Department, Brown University | EM Works for Pronoun-Anaphora Resolution |
3/17/2009 | Andreas Haeberlen | Computer Science Dept., Rice University | |
3/19/2009 | Stefan Savage | Department of Computer Science and Engineering, University of California, San Diego | Spamalytics: Exploring the Technical and Economic Underpinnings of Bulk E-mail Scams |
3/24/2009 | David Pennock | Yahoo Research | |
3/26/2009 | Ashish Goel | Management Science and Engineering, Stanford University | Algorithms at the Molecular Scale |
3/31/2009 | Alan Mislove | Max Planck Institute for Software Systems | |
4/2/2009 | Tom Reps | Computer Sciences Department, University of Wisconsin-Madison | WYSINWYX: What You See Is Not What You eXecute |
4/7/2009 | Andrew Odlyzko | School of Mathematics, University of Minnesota | |
4/9/2009 | Mohammad Mahdian | Yahoo! Research | |
4/14/2009 | Duncan Watts | Yahoo! Research | |
4/16/2009 | Peter Lee | Computer Science Department, Carnegie Mellon University | Programming a Million Robots |
4/21/2009 | Ramesh Johari | Stanford University | The interaction of positive externalities and congestion effects in services |
Fall 2008
Date | Speaker | Institution | Talk Title |
9/4/2008 | Rajeev Alur | Computer and Information Science, Penn | Software Model Checking |
9/11/2008 | Milo Martin | Computer and Information Science, Penn | HardBound Architectural Support for Spatial Safety of the C Programming Language |
9/16/2008 | Zack Ives | Computer and Information Science, Penn | Orchestra: Sharing Inconsistent Data in a Consistent Way |
9/18/2008 | Paul Francis | Computer Science Dept., Cornell University | Scaling Internet Routing with Legacy Routers |
9/25/2008 | Valentina Salapura | Exploratory Server Systems Group, IBM T.J. Watson Research Center | Scaling Up Next Generation Supercomputers |
10/16/2008 | Alex Aiken | Computer Science Dept, Stanford University | Verifying a Security Property of an Operating System |
10/23/2008 | Andy Yao | Center for Advanced Study, Tsinghua University | Secure Multiparty Computation and Percolation Theory |
10/28/2008 | Merrick Furst | College of Computing, Georgia Tech | Threads: Restructuring Computer Science Curricula for a Flat World |
11/4/2008 | Ani Nenkova | Computer and Information Science, Penn | Modeling text quality in newspaper text and machine translation |
11/6/2008 | Jean Gallier | Computer and Information Science, Penn | What is a Proof? |
11/11/2008 | Ben Taskar | Computer and Information Science, Penn | From Co-occurrence to Correspondence |
11/13/2008 | Guy Blelloc | Department of Computer Science, Carnegie Mellon University | Parallel Thinking |
11/18/2008 | Oleg Sokolsky | Computer and Information Science, Penn | Runtime Verification |
11/20/2008 | Umesh Vazirani | Berkeley Quantum Computing Center, Computer Science Division, University of California at Berkeley | The truth about quantum computers |
11/25/2008 | Robin Permantle | Dept. of Mathematics, Penn | An upper bound on the time for quadratic sieving |
12/2/2008 | Anna Karlin | University of Washington | A Survey of Some Recent Research at the Border of Game Theory, Algorithms and Economics |
12/4/2008 | Doug Burger | Computer Sciences and Electrical & Computer Engineering, University of Texas | The Golden Age of Architecture (?) |
Spring 2007
Date | Speaker | Institution | Talk Title |
2/27/2007 | Adrien Treuille | Computer Science Dept Computer Graphics, University of Washington | New approaches to modeling and control of complex dynamics |
3/27/2007 | Alla Safonova | Computer Graphics Lab, Carnegie Mellon University | Synthesizing Human Motion from Intuitive Constraints |
4/5/2007 | Stephen Boyd | Information Systems Laboratory, Department of Electrical Engineering, Stanford University | An Interior-Point Method for Large-Scale l_1-Regularized Logistic Regression |
4/19/2007 | Vivek Kwatra | Department of Computer Science, The University of North Carolina at Chapel Hill | Spatio-temporal Textural Modeling for Data-driven Synthesis and Visualization |
4/23/2007 | Judea Pearl | Department of Computer Science, University of California, Los Angeles | The Mathematics of Casual Inference |
4/24/2007 | Lior Pachter | Mathematics and Computer Science, University of California at Berkeley | From Drosophila and Transposable Elements to the Neighbor-Net Algorithm and Phylogenetic Networks |
4/25/2007 | Stuart Card | Senior Research Fellow, Palo Alto Research Center | Human Information Interaction: The theory and design of cognitive prostheses |
5/29/2007 | Luca Cardelli | Microsoft Research | Artificial Biochemistry |
7/30/2007 | Shaz Qadeer | Microsoft Research | Iterative context-bounding: a new approach for finding errors in large multithreaded programs |