Computational Theory, Algorithms and Mathematics

Available Speakers on this Topic

Dorian C Arnold – Orange County, CA, United States

PARAMESHACHARI B D – Mysore, India

Ricardo Baeza-Yates – Palo Alto, CA, United States

  • Designing Algorithms
    This presentation is a tour of different paradigms to design algorithms using one of the most classical algorithmic problems: searching. Starting from sequential search and adding either resources...

Tassos Dimitriou – Athens, Greece

Henry Duh – Melbourne, VIC, Australia

Chuck Easttom – Plano, TX, United States

  • Applying Graph Theory to Digital Forensics
    Graph theory is an area of discrete mathematics that is used to model the relationships between entities. Previously, graph theory has been used to model network traffic, biological systems, and...
  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for...
  • Exploring nonlinear dynamics and emergence
    This talk first provides an overview of nonlinear dynamics and emergences, as well as their relationship to computing. Then methods for mathematically modeling both nonlinear dynamics and...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more...

Dan Garcia – Millbrae, CA, United States

  • The Beauty and Joy of Binary Numbers
    (This is meant for the general public, especially young children)
    In this interactive demonstration, we explain binary numbers, the foundation of electrical engineering and...

Dharm Singh Jat – Windhoek, AR, Namibia

Samee U Khan – Fargo, ND, United States

  • Universal Design in Learning
    It is a well-known fact that the human learning experience is not universal. Consequently, when developing instructional materials, we must be cognizant of techniques and procedures that...

Hai Li – Durham, NC, United States

Ramasuri Narayanam – Bangalore, India

Mohammad Sohel Rahman – Dhaka, Bangladesh

  • String Inference and (non)Lexicographic Ordering
    In this lecture we will discuss two interesting but possibly less studied topics from string combinatorics. We will divide the talk into two parts. In the first part, we will briefly present...

Shrisha Rao – Bangalore, India

  • Resource Management in Cloud Computing
    Cloud computing is an increasingly popular paradigm of offering services over the Internet; it is also an active area of research. One key area that calls for innovative approaches, is...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us...

David G. Stork – Sunnyvale, CA, United States

Jean Vanderdonckt – Louvain-La-Neuve, Belgium

  • Distributed User Interfaces.
    Distributed User Interfaces (DUIs) are user interfaces whose elements are distributed in time and space in order to support one or many users to carry out one or many tasks on one or many domains...