Computational Theory, Algorithms and Mathematics
Available Speakers on this Topic
Dorian C Arnold – Atlanta, GA, United States
-
A Non-checkpoint/restart, Non-algorithm-specific Approach to Fault-tolerance
Hierarchical or tree-based overlay networks (TBONs) are often used to execute data aggregation operations in a scalable, piecewise fashion. We present state compensation, a scalable failure...
-
Scalable Middleware and Tools for High-Performance Computing
In the pursuit of unprecedented high-performance computing (HPC) capabilities, and the scientific and economic advances such capabilities will bring, U.S., Asian, European...
-
The SMURFS Project: Simulation and Modeling for Understanding Resilience and Faults at Scale
Current HPC research explorations target computer systems with exaflop (10^18 or a quintillion floating point operations per second) capabilities. Such computational power...
Ricardo Baeza-Yates – Palo Alto, CA, United States
-
Bias and the Web
The Web is the most powerful communication medium and the largest public data repository that humankind has created. Its content ranges from great reference sources such as Wikipedia to ugly fake...
-
Big Data or Right Data? Opportunities and Challenges
Big data nowadays is a fashionable topic, independently of what people mean when they use this term. But being big is just a matter of volume, although there is no clear agreement in the size...
-
Designing Algorithms
This presentation is a tour of different paradigms to design algorithms using one of the most classical algorithmic problems: searching. Starting from sequential search and adding either resources...
David H Bailey – Alamo, CA, United States
-
Conquering Numerical Error in Large-Scale Scientific Computing
The proliferation of extremely large-scale, highly parallel computation (in some cases involving one million or more processors) has greatly exacerbated issues of numerical error and...
- High-Precision Computation: Applications and Challenges
High-precision floating-point arithmetic software, ranging from "double-double" or "quad" precision to arbitrarily high precision (hundreds or thousands of digits), has...- Numerical Reproducibility in Exascale Computing
The rapidly growing scale of modern scientific computing is exacerbating issues of numerical reproducibility. A computation running on 4096 CPUs, for instance, may give significantly...- Twelve ways to fool the masses: Fast forward to 2013
In 1991, the present author wrote a humorous essay "Twelve Ways to Fool the Masses," which outlined a number of highly questionable "techniques" often used at the time...Debnath Bhattacharyya – Visakhapatnam, India
-
Design and Analysis of Graphical Password
Most common computer authentication method is traditional ‘User Name’ and ‘password’. There are numerous Biometric authentication methods also proposed. In...
- Unsupervised Learning in Data Mining
The meaning of Unsupervised learning is to find hidden structure in unlabeled data. Approaches of Unsupervised learning can be used in Data Mining. Clustering is an important and popular approach...Albert Bifet – Paris, France
-
Massive Online Analytics for the Internet of Things (IoT)
Big Data and the Internet of Things (IoT) have the potential to fundamentally shift the way we interact with our surroundings. The challenge of deriving insights from the Internet of Things (IoT)...
Tracy K Camp – CO, United States
-
MANET Simulation Studies: The Incredibles
Simulation is the research tool of choice for a majority of the mobile ad hoc network (MANET) community; however, while the use of simulation...
-
SMOOTH: A Simple and Realistic Way to Model Human Mobility
Simulation is the research tool of choice for a majority of the mobile ad hoc network (MANET) community; however, while the use of simulation has increased, the credibility of the simulation...
Li Chen – Washington, DC, United States
-
Digital Geometry and its Applications: Geometrical and Topological Data Processing
Digital geometry focuses on digital objects, which are usually represented by a finite number of integer points or vectors. However, in a much larger sense, digital objects could be digital...
Cristina Conati – Vancouver, BC, Canada
-
The Eyes Are the Windows to the Mind: Implications for User Modeling and User-Adaptive Interaction
Eye-tracking has been extensively used both in psychology for understanding various aspects of human cognition, as well as in human computer interaction (HCI) for off-line evaluation of interface...
Tassos Dimitriou – Athens, Greece
-
Security and Privacy issues related to the use of Internet of Things (IoT) technologies
“The most profound technologies are those that disappear... they weave themselves into the fabric of everyday life until they become indistinguishable from it”. This...
- Sensor networks: A Bridge to the Physical World
The distribution of networked sensors in the environment offers exciting new possibilities for sensing and monitoring. Sensors can be placed close to multiple signal sources so that,...- Tools of the Trade: Enhancing Privacy in Participatory Sensing
The increasing availability of sensors in today's smartphones and other everyday devices, carried around by millions of people, has opened up the possibility of new ways of information...Falko Dressler – Paderborn, Germany
-
Biologically-inspired and Nano-scale Communication and Networking
The developments in communication technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sensor and actor networks, quantum...
-
Sensor Networks: From Theory to Tracking Bats in the Wild
With the development of new generations of micro controllers, the advances in miniaturization, and the increasing use of networked embedded systems, new research challenges emerged in...
- Towards the Vehicular Cloud: From Connected Cars to Smart Cities
From an industry point of view, vehicular networking serves as one of the most important enabling technologies required to implement a myriad of applications related to vehicles, vehicle...- Vehicular Networking
Looking back at the last decade, one can observe enormous progress in the domain of vehicular networking. In this growing community, many ongoing activities focus on the design of...Chuck Easttom – Plano, TX, United States
-
Applying Graph Theory to Digital Forensics
Graph theory is an area of discrete mathematics that is used to model the relationships between entities. Previously, graph theory has been used to model network traffic, biological systems, and...
-
Cryptographic Backdoors
This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for...
-
Steganography
This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more...
Panagiota Fatourou – Heraklion, Greece
-
Concurrency for the masses: The Paradigm of Transactional Memory
The proliferation of multi-core machines has led to a new software revolution: the concurrency revolution. At a first glance, this might look surprising since concurrency is almost as old as...
-
Harnessing the Difficulties of Synchronization
We are well into the era of multi-core architectures and as the applications demands are still growing, we soon expect to see the first many-cores which will feature many hundreds or thousands of...
Gabor Fichtinger – Kingston, ON, Canada
-
Rapid Prototyping of Computer-Assisted Medical Interventions
Real-time computational image guidance is powerful aid to physicians in carrying out minimally-invasive surgical and interventional procedures. This technology offers higher accuracy and precision...
João Portela Gama – Porto, Portugal
-
Data Stream Mining for Ubiquitous Environments
Data stream mining is, nowadays, a mature topic in data mining. Nevertheless, most of the works focus on centralized approaches to learn from sequences of instances generated from...
Silvia Giordano – MANNO ,TI, Switzerland
-
What's still missing in Sensor Networks: User Friendly WSN Development & Deployment
Wireless sensor networks (WSNs) penetrated the market mainly as solutions for specific application scenarios. However, this strong specialization limits WSNs reuse both in terms of development as...
Yu Hua – Wuhan, China
-
Deduplication-aware Architecture and System for Edge Computing
Edge computing requires cost-efficient storage infrastructure to deliver high performance. Deduplication-based schemes are able to meet these needs due to salient features of space and bandwidth...
-
Deduplication-aware Ecosystem: A Bottom-up Approach
In the era of big data, the rapid growth in data volume and complexity requires highly efficient schemes to reduce the amounts of data. Deduplication schemes can remove the redundant data, which...
-
Smarter Storage for Big Data Analytics: Architecture and Systems
In the era of big data, the explosive growth in data volume and complexity requires highly efficient searchable data analytics. Existing cloud storage systems have largely failed to offer an...
Dharm Singh Jat – Windhoek, AR, Namibia
-
Evaluation of Video Quality of Service in Wireless Networks
Computer simulation is the research tool of choice for a majority of the wired and wireless network research community and these days most of research works on the network adopt computer...
-
Futuristic Wireless Networks for Multimedia Applications
Nowadays the IP video traffic over the wireless network is continuously growing due the advances in wireless network technologies and smart mobile communication devices. It is estimated that...
Benjamin Kenwright – Southampton, United Kingdom
-
Memory management: Fast Efficient Fixed-Sized Memory Pools
This lecture discusses the importance of memory in the context of performance. We examine and present a ready-to-use, robust, and computationally fast fixed-size memory pool manager...
- Debugging Game Systems (Practical Debugging)
The practical challenges of debugging large software projects (such as video games) is important – not just the ability to track down issues but to write software that makes the...- High Performance Graphics with Vulkan
This lecture introducing the listener to the Vulkan cross platform 3D graphics API - including examples and discussion on the practical aspects. The lecture address questions, such...- Inverse Kinematics
Inverse kinematics is the mathematical process for calculating the movement of objects. This is useful in a whole range of fields, from engineering and robotics to medical analysis and...- Opportunities and Challenges in Teaching Video Games in Higher Education
This lecture discusses the opportunities and challenges of video game curricula. The talk explores the diversity of the subject from both an artistic and technical perspective - centred around...Samee U Khan – Fargo, ND, United States
-
Big Data Recommendation Systems
Recommendation systems were developed in the 90s to address the challenges of automatic and personalized selection of data from diverse and overloaded sources of information. These systems...
- Data Center Networks: Trends, Opportunities, and Challenges
The major Information and Communication Technology (ICT) components within a data center are: (a) servers, (b) storage, and (c) interconnection networks. The data center network (DCN) is...- Universal Design in Learning
It is a well-known fact that the human learning experience is not universal. Consequently, when developing instructional materials, we must be cognizant of techniques and procedures that...Fernando Koch – Melbourne, Australia
-
Disruptive Technologies and the Future of Society
The new generation of technology development -- including Computational intelligence, Cognitive Computing, Internet of Things, Social Computing and Virtual Reality, and others – will disrupt...
Ashish Kundu – Yorktown Heights, NY, United States
-
Energy Attacks on Mobile and IoT Devices
All mobile devices are energy-constrained. They use batteries thatallows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of...
- Network Flow Security Analytics for IoT and Mobile Devices
Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of...
- Privacy-preserving Authentication of Graphs on Cloud
Leakages of structural information in trees and graphs due to (redactable) signatures lead to privacy and confidentiality breaches. So leakage-free redactable signatures are an important topic...- Security and Compliance Issues in Blockchain
Blockchain is a paradigm shift in computing -- it enables computing among distributed untrusted peers without the need for any centralized trusted authority. Transaction...
Jysoo Lee – Daejeon, Republic of Korea
-
User Centric e-Infrastructure
Construction of any infrastructure requires active interaction between users and providers. When emerging technology is applied to users who are not familiar with technology, such as in the cases...
Hai Li – Durham, NC, United States
-
Neuromorphic Computing and Deep Learning - Technology, Hardware and Implementation
As big data processing becomes pervasive and ubiquitous in our lives, the desire for embedded-everywhere and human-centric information systems calls for an "intelligent" computing...
Oge Marques – Boca Raton, FL, United States
-
Machine learning and its applications
This talk provides an overview of machine learning concepts, techniques and applications.The field of machine learning has experienced...
- Medical image analysis using deep learning
This talk provides an overview of the field of medical image analysis, with emphasis on the recent impact of increasingly popular deep learning techniques on the design and implementation of...- Practical Image Processing and Computer Vision Using MATLAB
This lecture presents an overview of useful image processing and computer vision algorithms and demonstrates how to quickly use them to build practical solutions implemented with MATLAB. It...Jeanna N Matthews – Potsdam, NY, United States
-
Algorithmic Accountability and Transparency and Other Alternatives to Digital Destiny
Big-data trained algorithms are increasingly used to make big decisions about people's lives, such as who gets loans, whose...
-
Becoming a researcher: practical strategies for taming the angst and changing the world
For beginning researchers, identifying their research topic can be a daunting and intimidating task. (You mean I need to find the right question and then answer it too?) This talk is part pep talk...
Prabhat Mishra – Gainesville, FL, United States
-
High-level Modeling and Validation of Embedded Systems
Design validation is a major bottleneck in System-on-Chip (SoC) design – up to 70% of the time (cost) is spent in functional and timing validation. To drastically reduce overall validation...
-
Post-Silicon Validation and Debug
Post-silicon validation is widely acknowledged as a major bottleneck for complex integrated circuits. Due to increasing design complexity coupled with shrinking time-to-market constraints, it is...
James F. O'Brien – Berkeley, CA, United States
-
Adaptive Simulation with Triangle Meshes
This talk will discuss the development of high-fidelity finite element simulation methods based on adaptive mesh refinement. These methods dynamically refine and coarsen meshes so that they...
-
Image and Video Forensics through Content Analysis
Advances in computational photography, computer vision, and computer graphics allow for the creation of visually compelling photographic forgeries. Forged images have appeared in tabloid...
Zoran Obradovic – Philadelphia, PA, United States
-
Computational Methods for Early Diagnostics and Multiple Blood Cleansing Interventions in Sepsis
Sepsis, a severe complication of pathogen infection that triggers systemic inflammatory response and can lead quickly to multiple organs damage, is recognized as one of the leading causes of...
Gyana R Parija – New Delhi, India
-
CBC2015: Industry Connect
IBM's Watson represents a whole new class of industry specific solutions called cognitive systems. It builds on the current paradigm of Programmatic Systems and is not meant to be a...
- Using Hybrid Goal Programming for performing National Analysis of Wild land Fire Management in US
We present a multi-criteria budget allocation model for assigning national budgets across all the Fire Planning Units (FPU) in the US. We discuss the innovations we have made, based on users...Shrisha Rao – Bangalore, India
-
Resource Management in Cloud Computing
Cloud computing is an increasingly popular paradigm of offering services over the Internet; it is also an active area of research. One key area that calls for innovative approaches, is...
- Services Science and Services Computing
New models of computation such as cloud computing, Big Data, and the Internet of Things have fundamentally upended common assumptions about the nature and purposes of computation. One thing...- Sustainability in IT Systems
While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us...Sherif Sakr – Riyadh, Saudi Arabia
-
Big Data Science as a Service
Recently, big data science has emerged as a modern and important data analysis discipline. It is considered as an amalgamation of classical disciplines such as statistics, artificial intelligence...
-
Data Analytics for Healthcare Services
The last decade has seen huge advances in the scale of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand...
Theo Schlossnagle – Fulton, MD, United States
-
Adaptive Availability for Quality of Service
In this presentation, I'll talk about lessons learned in building a always-on distributed time-series database with aggressive quality of service guarantees. As any distributed systems...
- Monitoring: The Math Behind Bad Behavior
As we monitor more and more system we can quickly become overwhelmed with data. Large systems today can generate millions of measurements per second across millions of separate points of...- Production Debugging Techniques
Debugging applications in a development environment is one of the first skills software engineers every learn. However, the real bugs happen in production under circumstances that are...Marc Shapiro – Paris, France
-
Having High Concurrency, and Correctness Too - or - How I Stopped Worrying about Eventual Consistency.
In clouds and other large-scale distributed systems, data is shared by replicating it a different geographical locations. In this context, is it possible to have replicas that remain...
- Just-Right Consistency (As available as possible, consistent when necessary)
In a distributed data store, the CAP theorem forces a choice between strong consistency (CP) and availability and responsiveness (AP) when the network can partition. To address this...Seth Shostak – Mountain View, CA, United States
-
The Big News of the 21st Century
The 21st century promises to be an inflection point in the history of Homo sapiens. While one might expect a continuing improvement in technology, a greater degree of...
- When Will We Find Extraterrestrial Life?
Are we alone in the universe? The scientific hunt for extraterrestrial intelligence is now into its fifth decade, and we still haven’t discovered any cosmic company. Could...Sandeep K Shukla – Kanpur, India
-
Cyber Security Landscape and the Urgent Need for Cyber Manpower Development
Cyber Security is recognized as one of the most dangerous threats to our increasingly digital society and livelihood. Other than our reliance on smart phone, smart devices, medical implants, our...
-
Cyber Security of Critical Infrastructures: A Case for a Schizoid Design Approach
In the past, the design of cyber physical systems required a model based engineering approach, where as a first step of the design process -- a physics based mathematical model of the physical...
-
Smart-Grid: Where Embedded Computing, Communication and Power Systems Meet
The vision of a smart grid is predicated upon pervasive use of embedded intelligence, and digital communication techniques in today's power system. As wide area...Biplav Srivastava – Yorktown Heights, NY, United States
-
Putting Water Quality Data to Productive Use by Integrating Historical and Real-time Sensing Data
Water is unique in its role as a life preserver. It is important to all members of a society. However, if one is looking for quality data to make data-driven decisions, one is lost. This is...
- Understanding Approaches for Composition, Execution and Adaptation of Web Services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standard...David G. Stork – Sunnyvale, CA, United States
-
Computational imaging: Using computing for optics and optics for computing
The discipline of computational imaging involves the design of both the optics and the digital signal processing to achieve a desired digital output. The electro-optical system is hence best...
Aida Todri-Sanial – Montpellier, France
-
Physical Design Challenges and Solutions for Three-Dimensional Integrated Circuits
Three-dimensional (3-D) ICs offer dense integration of heterogeneous technologies with a small footprint. Interconnection of the various tiers by means of through-silicon...
-
Toward Carbon Nanotube Interconnects for Nanoelectronics
Carbon nanotubes (CNTs) due their unique electrical, thermal and mechanical properties are being investigated as promising candidate material for on-chip and off-chip interconnects. The...
Jean Vanderdonckt – Louvain-La-Neuve, Belgium
-
Distributed User Interfaces.
Distributed User Interfaces (DUIs) are user interfaces whose elements are distributed in time and space in order to support one or many users to carry out one or many tasks on one or many domains...
Arun Vishwanath – Melbourne, VIC, Australia
-
Improving Building Energy Efficiency Using IoT-Driven Analytics
The United Nations estimates that the buildings sector accounts for about 40% of global energy consumption. In...
-
Modelling Energy Consumption in High-Capacity Routers and Switches
Internet equipment such as routers and switches are major contributors to the energy consumption of modern networks. Many energy efficiency metrics for these high-capacity devices are...
- Net Neutrality and Internet Fast Lanes
Net neutrality and Internet fast lanes have been the subject of raging debates — in the he US and around the world — for several years now. Various view points have been put...- Towards an Energy Efficient Internet Core with Near-Zero Buffers
Reducing the power consumption of core Internet routers is important for both Internet Service Providers (ISPs) and router vendors. ISPs can reduce their Carbon footprint and operational...Bebo White – San Francisco, CA, United States
-
Preparing for the Internet of Things
The Internet as we have known it for the past three+ decades is in the midst of a major and disruptive change. “The Internet of Things (IOT)” will bring opportunities that could...
- Storages Are Not Forever
Like the well-known concern over diminishing fossil fuels, information technology is bringing its own unique future challenges. This lecture describes one of the most fundamental of these...Moustafa A Youssef – New Borg Elarab City, Alexandria, Egypt
-
Location-aware Routing for Cognitive Radio Networks
Multi-hop cognitive radio networks (CRNs) are gaining interest recently in many practical applications. With location information becoming more available, designing location-aware routing...
Demetrios Zeinalipour-Yazti – Nicosia, Cyprus
-
"Telco Big Data: Current State & Future Directions"
A Telecommunication company (Telco) is traditionally only perceived as the entity that provides telecommunication services, such as telephony and data communication access to users. However, the...
-
Distributed All k Nearest Neighbor Queries
A wide spectrum of Internet-scale mobile applications, ranging from social networking, gaming and entertainment...
-
"Telco Big Data: Current State & Future Directions"
- Storages Are Not Forever
- Net Neutrality and Internet Fast Lanes
-
Distributed User Interfaces.
- Understanding Approaches for Composition, Execution and Adaptation of Web Services
-
Putting Water Quality Data to Productive Use by Integrating Historical and Real-time Sensing Data
- When Will We Find Extraterrestrial Life?
- Just-Right Consistency (As available as possible, consistent when necessary)
- Monitoring: The Math Behind Bad Behavior
- Services Science and Services Computing
- Using Hybrid Goal Programming for performing National Analysis of Wild land Fire Management in US
-
Computational Methods for Early Diagnostics and Multiple Blood Cleansing Interventions in Sepsis
- Medical image analysis using deep learning
- Network Flow Security Analytics for IoT and Mobile Devices
- Data Center Networks: Trends, Opportunities, and Challenges
- Debugging Game Systems (Practical Debugging)
-
What's still missing in Sensor Networks: User Friendly WSN Development & Deployment
- Towards the Vehicular Cloud: From Connected Cars to Smart Cities
- Sensor networks: A Bridge to the Physical World
-
The Eyes Are the Windows to the Mind: Implications for User Modeling and User-Adaptive Interaction
- Unsupervised Learning in Data Mining
- High-Precision Computation: Applications and Challenges