Software Engineering and Programming

Available Speakers on this Topic

Kaveh Bazargan

Shantanu Bhattacharya

Swarup Bhunia

Albert Bifet

Michael Bronstein

  • Geometric deep learning
    In recent years, more and more data science applications have to deal with a somewhat unusual kind of data residing on non-Euclidean geometric domains such as manifolds or graphs. For instance,...
  • Start thinking in 3D!
    The last decade has witnessed a series of technological breakthroughs in the acquisition, processing, and analysis of 3D geometric data, enabling applications that are revolutionizing our way of interaction...

Margaret Burnett

  • End-User Software Engineering
    End-user programming has become pervasive in our society, with end users programming simulations, courseware, spreadsheets, macros, mashups, and more.  This talk considers what happens when we...
  • Is our software gender-inclusive?
    Gender inclusiveness in the software workforce is receiving a lot of attention these days, but it overlooks a potentially critical factor—the software itself. Research into how individual...

Tracy K Camp

Amlan Chakrabarti

Dipankar Dasgupta

Kerstin Dautenhahn

Tassos Dimitriou

Henry Duh

Gabor Fichtinger

Dennis J Frailey

  • Improving Software Development Cycle Time
    Being first to market is often a critical factor for business success. Yet we often hear complaints about the poor quality of software that was rushed in order to meet a deadline. "Agile"...
  • Introduction to Software Safety
    Computers are used more and more to control the behavior of systems we rely on, whether they be cell phones, automobile brakes, airplane flight controls or power plants. What if a computer fails? What...
  • Software Engineering - Best Practices
    How do you build software so good that lives can depend on it? What’s the difference between developing a program that works and developing a program that’s reliable, dependable, and supportable...
  • Software Engineering for Large, Complex Projects
    Large projects such as airplanes, office towers, air traffic control systems and satellite networks often require special software development and management techniques.  Risky, leading edge technologies,...

Silvia Giordano

Donald Gotterbarn

  • Computer Ethics and Technology
    This talk focuses on computer ethics as it relates to the day to day activities of practicing computer professionals. The emphasis is on real world moral and legal issues for the practicing computer...
  • Software Development: More Than Just Programming
    We are often surprised by the number of non-programming related issues that affect the professional’s efforts to develop quality software and web interfaces. Development efforts are constrained...
  • Unmanaged Risk: Why Systems Don't Work
    The focus on software testing and risk analysis during software development has only had a limited effect in reducing software failures. This talk will present a new approach to the identification of...

Mark Grechanik

Michael Gschwind

Haitham S Hamza

  • Agile ITIL: An Approach for Practical Implementation of ITIL
    IT Service Management (ITSM) standards and frameworks aim at improving the design, implementation, and operation of IT services to ensure delivery of business value in a cost-effective way. The...
  • Demystifying the IoT Platforms
    The concept of Internet of things (IoT) has been around for more than a decade now and appears to continue attracting the attention of industry and research communities. The holistic vision of...
  • Value Creation with Open Data: Potentials and Challenges
    Open Data, as defined by the Open Data Institute (ODI), refers to the data that is made available by organizations, businesses and individuals for anyone to access, use and share. The ecosystem...

James D Herbsleb

  • Socio-technical Coordination
    Coordination, or managing dependencies among tasks, has long been recognized as one of the most difficult, pervasive, and persistent problems in large-scale software development.  A great...

Tsung-Yi Ho

Shiyan Hu

Yu Hua

Kristina Höök

  • Designing for Somaesthetics
    In designing for bodily experiences, there has been a lack of theories that can provide the underpinnings we need to understand and deepen our design thinking. Despite all the work we have seen on designing...
  • The Mobile Life? An enjoyment society
    The Mobile Life Centre, started in 2007, has grown to be about 45 researchers, exploring experiential, leisure and playful mobile and ubiquitous interactions. We do serious research on what we might...
  • What is design knowledge?
    Research through design (RtD) aims at bringing out design knowledge in different forms: both the ultimate particulars (specific designs used in specific contexts) as well as more generic design...

Seiji Isotani

  • Understanding Ontologies and Ontology Engineering
    Computer science borrows the term ontology from a branch of philosophy (metaphysics) that studies the nature of “being” and “existence.” For philosophers, ontology aims at explaining...

Dharm Singh Jat

Scott Jenson

  • Home Automation is an EasyHard problem
    It's so easy to fall into the trap that the internet of things 'just works'. This lecture shows how even something as simple as turning on a light can filled with UX distasters. It's...
  • The Physical Web
    The history of technology and interaction design is circular. A new technology creates a new product concept that starts off primitive but slowly matures over time. Then a new technology comes...
  • The UX Grid of IoT
    The "Internet of Things" is too broad a concept. It can be many things and that is a source of confusion. This 2x2 matrix of the UX Grid of IoT is a simple breakdown but it allows for...

Benjamin Kenwright

  • Memory management: Fast Efficient Fixed-Sized Memory Pools
    This lecture discusses the importance of memory in the context of performance.  We examine and present a ready-to-use, robust, and computationally fast fixed-size memory pool manager with...
  • Debugging Game Systems (Practical Debugging)
    The practical challenges of debugging large software projects (such as video games) is important – not just the ability to track down issues but to write software that makes the process...
  • High Performance Graphics with Vulkan
    This lecture introducing the listener to the Vulkan cross platform 3D graphics API - including examples and discussion on the practical aspects. The lecture address questions, such as: 
    •...
  • Inverse Kinematics
    Inverse kinematics is the mathematical process for calculating the movement of objects. This is useful in a whole range of fields, from engineering and robotics to medical analysis and video...
  • Opportunities and Challenges in Teaching Video Games in Higher Education
    This lecture discusses the opportunities and challenges of video game curricula. The talk explores the diversity of the subject from both an artistic and technical perspective - centred around solutions...

Fernando Koch

Sven Koenig

  • Making Good Decisions Quickly
    Several disciplines, including artificial intelligence, operations research and others, study how to make timely and good decisions. In this talk, I argue that it is possible to combine ideas from these...

Anis Koubaa

Ponnurangam Kumaraguru

Ashish Kundu

  • Baking Compliance into Cloud: Art or Science?
    With the (obvious) evolution of cloud from being a compute-centric infrastructure to a data-and-compute-centric infrastructure, more and more enterprises are bringing their data to cloud in search...
  • Exploiting Placement New of C++
    In this talk, we would explore how to exploit the "placement new" expression in C++. "Placement new" facilitates placement of an object/array at a specific memory location. When...

Effie Lai-Chong Law

Dongwon Lee

  • Human Computation in Data Science
    As a novel computation paradigm, human computation (a.k.a. crowdsourcing) is being actively pursued in diverse academic disciplines. Within computer science, many sub-fields have also embraced the concept...
  • LIKEs-R-Us: Analyzing LIKEs in Social Media
    The recent dramatic increase in the usage and prevalence of social media has led to the creation and sharing of a significant amount of information in various formats such as texts, photos, or videos....

Hai Li

Shipeng Li

Gabriel H Loh

  • Computer Architectures for 3D Die Stacking
    Session 1 Title: Die Stacking and it Architectural Implications
    Session 2 Title: Introduction to Die-Stacked Memory Systems
    Session 3 Title: Advanced Topics in...
  • Memory Organizations for 3D Die Stacking
    This talk provides a brief overview and review of die-stacking technologies, covering some of the different types of options out there for stacking, and in particular focusing on how the different...

Oge Marques

  • Can you trust what you see? The magic of visual perception
    This lecture presents and explains a diverse collection of visual perception phenomena that challenge our common knowledge of how well we detect, recognize, compare, measure, interpret, and make decisions...
  • Machine learning and its applications
    This talk provides an overview of machine learning concepts, techniques and applications. 
     
    The field of machine learning has experienced significant...
  • Medical image analysis using deep learning
    This talk provides an overview of the field of medical image analysis, with emphasis on the recent impact of increasingly popular deep learning techniques on the design and implementation of intelligent...

Jeanna N Matthews

Prabhat Mishra

Jacquelyn F Morie

Laurence Nigay

  • Multimodal Interaction
    Multimodal interaction supports multiple interaction techniques, which may be used sequentially or concurrently, and independently or combined synergistically. Specific interaction aspects must...

Zoran Obradovic

Phillippe Palanque

Sharath Pankanti

  • Actionable Video Content Summarization: Lessons from Practical Case Studies
    For the first time in the history of universe, the video data generated by humans has exceeds all other forms of the data. While no one denies the utility of the information hidden within this...
  • Biometrics
    The determination of identity can be accomplished by three generic means. Conventionally, an exclusive possession (either a physical, e.g., key or electronic, e.g., cookie), knowledge (e.g., password,...
  • Multi-media Compliance: A practical paradigm for managing business integrity
    In virtually every business context there is a need to establish some form of monitoring system to ensure that employees comply with business processes and policies. Compliance failures range from organized...
  • Public Sector Surveillance
    Situation awareness is the key to security. Awareness requires information that spans multiple scales of space and time. The increasing need for sophisticated surveillance systems and the move to a...
  • Retail video analytics
    The retail industry grosses trillions of USD revenue annually worldwide and provides numerous opportunities for innovation to facilitate real-world business operations. Applications include: loss prevention,...

Gyana R Parija

Fabio Paterno

Shrisha Rao

  • Safety Issues in Cyber-Physical Systems
    Computers and software components are now integral to large complex systems in almost all sectors of modern society.  The safety of such systems is therefore dependent upon many components...
  • Services Science and Services Computing
    New models of computation such as cloud computing, Big Data, and the Internet of Things have fundamentally upended common assumptions about the nature and purposes of computation. One thing that...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us and...

Abhik Roychoudhury

  • Automated Program Repair
    Software debugging is extremely time consuming, and hence techniques to aid automated program repair are of value. Moreover, even after software errors are identified, fixing the errors...
  • Software Debugging as a Science
    Program debugging is an extremely time-consuming process, and it takes up a large portion of software development time. In practice, debugging is still very much of an art, with the developer...
  • Symbolic Analysis Methods for Software Debugging and Repair
    In recent years, there have been significant advances in symbolic execution technology, driven by the increasing maturity of constraint solvers as well as by the availability of cheap compute...
  • Testing and Debugging of Software Regressions
    Software regressions, where a previously working program fails on certain tests after changes, constitute a major source of delays and missed schedules in any large software development...

Andrzej Rucinski

  • OPPORTUNITY OF INTERNET OF THINGS SEMINAR
    Internet of Things (IoT) is an expanding space for researchers, students, and professionals.  Development of IoT applications is hindered by the lack of available design tools, methodologies,...

Valentina Salapura

  • High Performance Computing at IBM

    High-performance computing technologies are entering the mainstream in a transition ready to revolutionize entire industries.  Today, clusters, grids and virtualization infrastructure at the...

  • Innovation at IBM -- Smarter Planet Initiative
    When IBM set its sights on helping to create a smarter planet two years ago, we predicted the evolution of an increasingly instrumented, intelligent and interconnected world. Intelligence is being infused...
  • Technology Futures: IBM's Global Technology Outlook
    Join us for a look at IBM's vision for the near term future, or as IBM terms it, IBM's Global Technology Outlook (GTO).  IBM Research and its global community of some of the world’s...

Xipeng Shen

Biplav Srivastava

Richard Stallman

  • A Free Digital Society: What Makes Digital Inclusion Good Or Bad?
    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs, nonfree software that controls users, and the War on Sharing. Other...
  • Copyright vs. Community in the Age of Computer Networks
    Copyright developed in the age of the printing press, and was designed to fit with the system of centralized copying imposed by the printing press. But the copyright system does not fit well...
  • Free Software and Your Freedom
    The Free Software Movement campaigns for computer users' freedom to cooperate and control their own computing. The Free Software Movement developed the GNU operating system, typically used...
  • The GNU General Public License
    Richard Stallman wrote the first GNU General Public License in 1989, and version 3 which was completed in 2007.  He will discuss  the philosophy of the GNU GPL, the changes made in version...

David G. Stork

Venkat Subramaniam

  • Functional Programming
    Most of the mainstream languages have supported the imperative style of programming for a very long time. Functional programming has been around for a few decades but it's finally gaining popularity....
  • Java 8 Lambda Expressions, the Pathway to Functional Style
    Java 8 has been one of the most significant changes to the language. It is not simply the introduction of some new syntax, but a fundamental different way of thinking that we're used to when programming...
  • Let's Get Lazy: Explore the Real Power of Streams
    When we hear functional programming we often hear about immutability and higher-order functions. They are definitely important, but the real power of functional programming is in function composition...
  • Reactive Programming
    Why a new programming model? The computing platform and the demands on applications have significantly changed in the past few years. We can't be creating applications like we once did. Applications...
  • The Power and Perils of Parallel Streams
    Java 8 makes it really easy to convert a stream to a parallel stream, to run tasks concurrently. When come thing is that easy we tend to ask "what's the catch" and that's a very important...
  • Twelve Ways to Make Code Suck Less
    The quality of the code we create has a significant impact on our ability to change the software in the future. As programmers succumb to time and deliver pressures, the quality of code may get neglected....

Andrew S Tanenbaum

  • MINIX 3: A Reliable and Secure Operating System
    Most computer users nowadays are nontechnical people who have  a mental model of what they expect from a computer based on their experience with TV sets and stereos: you buy it, plug it...

Ranjith Tharayil

Harold Thimbleby

  • Creativity, innovation and taking risk in your research
    Most people just “do” research without thinking strategically about their work, their interests and how to do better. What is their plan when a paper or a funding application gets rejected?...
  • Human error is not the problem
    Error, if it was a disease, would be classified as the third biggest killer after cancer and heart disease. Why is it neglected, and what can be done? 

    When...
  • Missed solutions to WWII Enigma design weaknesses
    The German World War II Enigma suffered from design weaknesses that facilitated its large-scale decryption by the British throughout the war. The main technical weaknesses (self-coding and reciprocal...
  • Pirate talks: Getting to great presentations
    Pirates say Arrrrr! This is the best mnemnonic on how to give great presentations: audience, remember, route... 
     
    Pirate Harold Thimbleby explains,...
  • Social network analysis and interactive device design analysis
    All interactive systems respond to what users do by changing what they are doing Ñ though sometimes maybe not in the way you intended! What they were doing before and after any particular user...
  • Unsafe in any bed
    ‘Unsafe At Any Speed’ was the title of Ralph Nader’s damning critique of the 1960s car industry. We are at a similar position with today’s healthcare: Terrible, but quite able...

Aida Todri-Sanial

Jean Vanderdonckt

  • Animated Transitions in User Interface Design.
    Animated transitions are widely used in many different domains of human activity, ranging from cartoons and movies to computer science for powerfully conveying a message more effectively and efficiently...
  • Context-aware adaptation of user interfaces.
    Efficient adaptation aims at ensuring that a user interface is adapted to a user’s task according to the context of use, since the end user is carrying out a task with one or several computing...
  • Distributed User Interfaces.
    Distributed User Interfaces (DUIs) are user interfaces whose elements are distributed in time and space in order to support one or many users to carry out one or many tasks on one or many domains in...
  • Heuristic evaluation of user interfaces.
    Heuristic evaluation is a usability inspection method that consists of submitting any user interface of an interactive system to a set of recognized principles, called heuristics. These heuristics could...
  • Model-based and Model-driven engineering of user interfaces: The UsiXML experience.
    In order to be relieved from empirical and opportunistic development of user interfaces and to promote a genuine and rigorous approach throughout the development life cycle, model-driven...
  • Multimodal web user interfaces.
    Web applications are not limited to graphical interaction, they are now open to vocal, tactile, gestural, and multimodal interaction. This lecture provides an overview of these interaction modalities...
  • Pen-based gestures and sketching.
    Incorporating pen-based gestures in a graphical user interface induces several questions: which gesture should represent which command? What is the most appropriate gesture set when all gestures should...

Rakesh Verma

  • Programming Without Tears?
    Can you imagine a sorting program that is two lines? A Quicksort Program that fits on a PowerPoint slide? In this...
  • Talking to Computers - A Solved Problem?
    Life would be so much easier if computers could read and understand our directions in English, talk to people, and perhaps also compose stories and poems for them. Siri and Cortana notwithstanding,...
  • Wireless Sensor Networks: Security, Protocols and Countermeasures
    Wireless Sensor Networks are increasingly being deployed in hazardous and hostile environments for numerous civil and military applications such as sensing the environment, biosensors, etc. They pose...

Arun Vishwanath

Ellen M Voorhees

  • Information Retrieval Challenge Problems

    The Text REtrieval Conference (TREC) is a series of workshops designed to advance the state-of-the-art in information retrieval by providing the infrastructure necessary for large-scale evaluation...

  • Measuring Search Effectiveness
    In contrast to most areas of computer science research, information retrieval research has a rich tradition of experimentation dating back to the 1960s. This experimental methodology involves...
  • The Text REtrieval Conference
    The Text REtrieval Conference (TREC) project at the National Institute of Standards and Technology has created standard test sets and evaluation methodology to support the development of methods...

Yu Wang

Bebo White

  • Cybercurrencies and Blockchain (fiction, fallacy, fact, fun, and future)
    Hardly a day goes by without a news story about Bitcoin or Ethereum, two of the best known and strongest cybercurrency technologies. Opinions run the spectrum, from those who view it as mainly...
  • Preparing for the Internet of Things
    The Internet as we have known it for the past three+ decades is in the midst of a major and disruptive change. “The Internet of Things (IOT)” will bring opportunities that could hardly...
  • Storages Are Not Forever
    Like the well-known concern over diminishing fossil fuels, information technology is bringing its own unique future challenges. This lecture describes one of the most fundamental of these concerns...
  • The Future of User Interaction Design
    User interaction design is one of the most active and exciting research and development areas in computer science. As IT becomes more pervasive in every aspect of day-to-day life, interaction efficiency...
  • The Web: A Nostalgic View of the Past and Informed Hopes for the Future
    This lecture draws upon the speaker’s 30-year love affair with WWW technology – from his first exposure at CERN in 1989 and the first US Web site at SLAC in 1991 to his current involvement...

Tao Xie

Moustafa A Youssef

Demetrios Zeinalipour-Yazti

  • Internet-based Indoor Navigation Services
    This talk presents the fundamental mobile data management concepts behind the realization of innovative indoor information services that deal with all aspects of handling indoor data as a valuable...