Computational Theory, Algorithms and Mathematics

Available Speakers on this Topic

Dorian C Arnold – Atlanta, GA, United States

Ricardo Baeza-Yates – Palo Alto, CA, United States

  • Designing Algorithms
    This presentation is a tour of different paradigms to design algorithms using one of the most classical algorithmic problems: searching. Starting from sequential search and adding either resources...

David H Bailey – Alamo, CA, United States

Tracy K Camp – CO, United States

Tassos Dimitriou – Athens, Greece

Henry Duh – Melbourne, VIC, Australia

Chuck Easttom – Plano, TX, United States

  • Applying Graph Theory to Digital Forensics
    Graph theory is an area of discrete mathematics that is used to model the relationships between entities. Previously, graph theory has been used to model network traffic, biological systems, and...
  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more...

Panagiota Fatourou – Heraklion, Greece

Silvia Giordano – MANNO ,TI, Switzerland

Yu Hua – Wuhan, China

Dharm Singh Jat – Windhoek, AR, Namibia

Benjamin Kenwright – Leicester, United Kingdom

Samee U Khan – Fargo, ND, United States

  • Universal Design in Learning
    It is a well-known fact that the human learning experience is not universal. Consequently, when developing instructional materials, we must be cognizant of techniques and procedures that...

Ashish Kundu – Yorktown Heights, NY, United States

  • Energy Attacks on Mobile and IoT Devices
    All mobile devices are energy-constrained. They use batteries thatallows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of...
  • Security and Compliance Issues in Blockchain

    Blockchain is a paradigm shift in computing -- it enables computing among distributed untrusted peers without the need for any centralized trusted authority. Transaction...

Hai Li – Durham, NC, United States

Jeanna N Matthews – Potsdam, NY, United States

Ramasuri Narayanam – Bangalore, India

Zoran Obradovic – Philadelphia, PA, United States

Gyana R Parija – New Delhi, India

Shrisha Rao – Bangalore, India

  • Resource Management in Cloud Computing
    Cloud computing is an increasingly popular paradigm of offering services over the Internet; it is also an active area of research. One key area that calls for innovative approaches, is...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us...

Sherif Sakr – Riyadh, Saudi Arabia

  • Big Data Science as a Service
    Recently, big data science has emerged as a modern and important data analysis discipline. It is considered as an amalgamation of classical disciplines such as statistics, artificial intelligence...
  • Data Analytics for Healthcare Services
    The last decade has seen huge advances in the scale of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand...

Theo Schlossnagle – Fulton, MD, United States

  • Adaptive Availability for Quality of Service
    In this presentation, I'll talk about lessons learned in building a always-on distributed time-series database with aggressive quality of service guarantees. As any distributed systems...
  • Monitoring: The Math Behind Bad Behavior
    As we monitor more and more system we can quickly become overwhelmed with data. Large systems today can generate millions of measurements per second across millions of separate points of...
  • Production Debugging Techniques
    Debugging applications in a development environment is one of the first skills software engineers every learn.  However, the real bugs happen in production under circumstances that are...

Marc Shapiro – Paris, France

Seth Shostak – Mountain View, CA, United States

  • The Big News of the 21st Century
    The 21st century promises to be an inflection point in the history of Homo sapiens.  While one might expect a continuing improvement in technology, a greater degree of...
  • When Will We Find Extraterrestrial Life?
    Are we alone in the universe?  The scientific hunt for extraterrestrial intelligence is now into its fifth decade, and we still haven’t discovered any cosmic company.  Could...

David G. Stork – Sunnyvale, CA, United States

Aida Todri-Sanial – Montpellier, France

Jean Vanderdonckt – Louvain-La-Neuve, Belgium

  • Distributed User Interfaces.
    Distributed User Interfaces (DUIs) are user interfaces whose elements are distributed in time and space in order to support one or many users to carry out one or many tasks on one or many domains...

Arun Vishwanath – Melbourne, VIC, Australia

Moustafa A Youssef – New Borg Elarab City, Alexandria, Egypt

Demetrios Zeinalipour-Yazti – Nicosia, Cyprus