Breadcrumb

Events

April 20, 2018 @ 10:00 am
Bourns A125
Eamonn Keogh --- Time series data mining/analytics is a perennially popular research topic due to the ubiquity of time series in medical, financial, industrial, and scientific domains. There are about a dozen major time series mining tasks, including Classification, Clustering, Motif (repeated pattern) Discovery, Semantic…
April 13, 2018 @ 10:00 am
Bourns A125
Andrey Balmin --- Workday Prism Analytics enables data discovery and interactive Business Intelligence analysis for Workday customers. To prepare data for analysis, business users can setup data transformation pipelines in an interactive, self-service, modern data prep environment. Thus, Workday Prism Analytics needs to run three…
April 11, 2018 @ 10:00 am
Bourns A265
TBA --- Software is becoming ubiquitous in everyday life, from today’s smartphones and servers to tomorrow’s self-driving cars, drones, and Internet of Things devices.  However, the distributed, always-on nature of this software poses significant new challenges for reliability, security, and programmer productivity.  Better…
April 06, 2018 @ 10:00 am
Bourns A125
Jens Palsberg --- We are on the cusp of a barrage of opportunities: software tools that take advantage of Big Code. Specifically, Big Code will enable novel tools in areas such as security enhancers, bug finders, and code synthesizers. What do researchers need from Big Code to make progress on their tools? High on the wish list is…
February 16, 2018 @ 10:00 am
Bourns A125
Maria Klawe (Distinguished Lecture Series) --- Computing is one of the least diverse disciplines in science and engineering in terms of participation by women, African-Americans and Hispanics, and the only discipline where participation by women has significantly decreased over the last three decades. While our discipline does…
February 12, 2018 @ 10:00 am
Bourns A265
Carlee Joe-Wong --- Users in networked systems often compete with each other for resources, e.g., users may share resources on a cloud computing server. While competition for resources occurs in a large variety of settings, users’ optimal response to this competition depends on the particular resource being used and the method of…
February 05, 2018 @ 10:00 am
Bourns A125
Bruce Maggs --- The Public Key Infrastructure (PKI) for the web was designed to help thwart "phishing" attacks by providing a mechanism for browsers to authenticate web sites, and also to help prevent the disclosure of confidential information by enabling encrypted communications.  For users to reap these benefits, however, the…
January 12, 2018 @ 10:00 am
Bourns A125
Renwei (Richard) Li --- Recent years have brought the current Internet design to the limits of what it can support.  New services such as Industrial Internet, Tactile Internet, Vehicular Networks, and AR/VR delivery with their requirements for deterministic service-level guarantees or ultra-low latency have brought current…
February 13, 2015 @ 10:00 am
MSE 116
Ardalan Amiri Sani --- New I/O devices are rapidly emerging in computer systems. These devices include sensors and actuators in mobile systems and in Internet of Things and accelerators in data centers. However, computer systems still treat these devices as second-class citizens, supporting them with ad hoc and poorly-developed…
February 09, 2015 @ 10:00 am
MSE 116
Vasileios Kemerlis --- Today’s operating systems are large, complex, and plagued with vulnerabilities that allow perpetrators to exploit them for profit. The constant rise in the number of software weaknesses, coupled with the sophistication of modern adversaries, make the need for effective and adaptive defenses more critical…
Search