Computational Theory, Algorithms and Mathematics

Available Speakers on this Topic

Dorian C Arnold – Atlanta, GA, United States

Ricardo Baeza-Yates – Palo Alto, CA, United States

  • Bias and the Web
    The Web is the most powerful communication medium and the largest public data repository that humankind has created. Its content ranges from great reference sources such as Wikipedia to ugly fake...
  • Big Data or Right Data? Opportunities and Challenges
    Big data nowadays is a fashionable topic, independently of what people mean when they use this term. But being big is just a matter of volume, although there is no clear agreement in the size...
  • Designing Algorithms
    This presentation is a tour of different paradigms to design algorithms using one of the most classical algorithmic problems: searching. Starting from sequential search and adding either resources...

David H Bailey – Alamo, CA, United States

Debnath Bhattacharyya – Visakhapatnam, India

  • Design and Analysis of Graphical Password
    Most common computer authentication method is traditional ‘User Name’ and ‘password’. There are numerous Biometric authentication methods also proposed. In...
  • Unsupervised Learning in Data Mining
    The meaning of Unsupervised learning is to find hidden structure in unlabeled data. Approaches of Unsupervised learning can be used in Data Mining. Clustering is an important and popular approach...

Albert Bifet – Paris, France

Tracy K Camp – CO, United States

Li Chen – Washington, DC, United States

Cristina Conati – Vancouver, BC, Canada

Tassos Dimitriou – Athens, Greece

Falko Dressler – Paderborn, Germany

Chuck Easttom – Plano, TX, United States

  • Applying Graph Theory to Digital Forensics
    Graph theory is an area of discrete mathematics that is used to model the relationships between entities. Previously, graph theory has been used to model network traffic, biological systems, and...
  • Cryptographic Backdoors
    This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for...
  • Steganography
    This lecture begins with an overview of steganography, including the history of steganography techniques. Basic current methods (LSB and DCT) are discussed. The lecture then describes more...

Panagiota Fatourou – Heraklion, Greece

Gabor Fichtinger – Kingston, ON, Canada

João Portela Gama – Porto, Portugal

  • Data Stream Mining for Ubiquitous Environments
     Data stream mining is, nowadays, a mature topic in data mining. Nevertheless, most of the works focus on centralized approaches to learn from sequences of instances generated from...

Silvia Giordano – MANNO ,TI, Switzerland

Yu Hua – Wuhan, China

Dharm Singh Jat – Windhoek, AR, Namibia

Benjamin Kenwright – Southampton, United Kingdom

  • Memory management: Fast Efficient Fixed-Sized Memory Pools
    This lecture discusses the importance of memory in the context of performance.  We examine and present a ready-to-use, robust, and computationally fast fixed-size memory pool manager...
  • Debugging Game Systems (Practical Debugging)
    The practical challenges of debugging large software projects (such as video games) is important – not just the ability to track down issues but to write software that makes the...
  • High Performance Graphics with Vulkan
    This lecture introducing the listener to the Vulkan cross platform 3D graphics API - including examples and discussion on the practical aspects. The lecture address questions, such...
  • Inverse Kinematics
    Inverse kinematics is the mathematical process for calculating the movement of objects. This is useful in a whole range of fields, from engineering and robotics to medical analysis and...
  • Opportunities and Challenges in Teaching Video Games in Higher Education
    This lecture discusses the opportunities and challenges of video game curricula. The talk explores the diversity of the subject from both an artistic and technical perspective - centred around...

Samee U Khan – Fargo, ND, United States

  • Big Data Recommendation Systems
    Recommendation systems were developed in the 90s to address the challenges of automatic and personalized selection of data from diverse and overloaded sources of information. These systems...
  • Data Center Networks: Trends, Opportunities, and Challenges
    The major Information and Communication Technology (ICT) components within a data center are: (a) servers, (b) storage, and (c) interconnection networks. The data center network (DCN) is...
  • Universal Design in Learning
    It is a well-known fact that the human learning experience is not universal. Consequently, when developing instructional materials, we must be cognizant of techniques and procedures that...

Fernando Koch – Melbourne, Australia

  • Disruptive Technologies and the Future of Society
    The new generation of technology development -- including Computational intelligence, Cognitive Computing, Internet of Things, Social Computing and Virtual Reality, and others – will disrupt...

Ashish Kundu – Yorktown Heights, NY, United States

Jysoo Lee – Daejeon, Republic of Korea

  • User Centric e-Infrastructure
    Construction of any infrastructure requires active interaction between users and providers. When emerging technology is applied to users who are not familiar with technology, such as in the cases...

Hai Li – Durham, NC, United States

Oge Marques – Boca Raton, FL, United States

Jeanna N Matthews – Potsdam, NY, United States

Prabhat Mishra – Gainesville, FL, United States

  • High-level Modeling and Validation of Embedded Systems
    Design validation is a major bottleneck in System-on-Chip (SoC) design – up to 70% of the time (cost) is spent in functional and timing validation. To drastically reduce overall validation...
  • Post-Silicon Validation and Debug
    Post-silicon validation is widely acknowledged as a major bottleneck for complex integrated circuits. Due to increasing design complexity coupled with shrinking time-to-market constraints, it is...

James F. O'Brien – Berkeley, CA, United States

  • Adaptive Simulation with Triangle Meshes
    This talk will discuss the development of high-fidelity finite element simulation methods based on adaptive mesh refinement. These methods dynamically refine and coarsen meshes so that they...
  • Image and Video Forensics through Content Analysis
    Advances in computational photography, computer vision, and computer graphics allow for the creation of visually compelling photographic forgeries. Forged images have appeared in tabloid...

Zoran Obradovic – Philadelphia, PA, United States

Gyana R Parija – New Delhi, India

Shrisha Rao – Bangalore, India

  • Resource Management in Cloud Computing
    Cloud computing is an increasingly popular paradigm of offering services over the Internet; it is also an active area of research. One key area that calls for innovative approaches, is...
  • Services Science and Services Computing
    New models of computation such as cloud computing, Big Data, and the Internet of Things have fundamentally upended common assumptions about the nature and purposes of computation. One thing...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us...

Sherif Sakr – Riyadh, Saudi Arabia

  • Big Data Science as a Service
    Recently, big data science has emerged as a modern and important data analysis discipline. It is considered as an amalgamation of classical disciplines such as statistics, artificial intelligence...
  • Data Analytics for Healthcare Services
    The last decade has seen huge advances in the scale of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand...

Theo Schlossnagle – Fulton, MD, United States

  • Adaptive Availability for Quality of Service
    In this presentation, I'll talk about lessons learned in building a always-on distributed time-series database with aggressive quality of service guarantees. As any distributed systems...
  • Monitoring: The Math Behind Bad Behavior
    As we monitor more and more system we can quickly become overwhelmed with data. Large systems today can generate millions of measurements per second across millions of separate points of...
  • Production Debugging Techniques
    Debugging applications in a development environment is one of the first skills software engineers every learn.  However, the real bugs happen in production under circumstances that are...

Marc Shapiro – Paris, France

Seth Shostak – Mountain View, CA, United States

  • The Big News of the 21st Century
    The 21st century promises to be an inflection point in the history of Homo sapiens.  While one might expect a continuing improvement in technology, a greater degree of...
  • When Will We Find Extraterrestrial Life?
    Are we alone in the universe?  The scientific hunt for extraterrestrial intelligence is now into its fifth decade, and we still haven’t discovered any cosmic company.  Could...

Sandeep K Shukla – Kanpur, India

Biplav Srivastava – Yorktown Heights, NY, United States

David G. Stork – Sunnyvale, CA, United States

Aida Todri-Sanial – Montpellier, France

Jean Vanderdonckt – Louvain-La-Neuve, Belgium

  • Distributed User Interfaces.
    Distributed User Interfaces (DUIs) are user interfaces whose elements are distributed in time and space in order to support one or many users to carry out one or many tasks on one or many domains...

Arun Vishwanath – Melbourne, VIC, Australia

Bebo White – San Francisco, CA, United States

  • Preparing for the Internet of Things
    The Internet as we have known it for the past three+ decades is in the midst of a major and disruptive change. “The Internet of Things (IOT)” will bring opportunities that could...
  • Storages Are Not Forever
    Like the well-known concern over diminishing fossil fuels, information technology is bringing its own unique future challenges. This lecture describes one of the most fundamental of these...

Moustafa A Youssef – New Borg Elarab City, Alexandria, Egypt

Demetrios Zeinalipour-Yazti – Nicosia, Cyprus