Software Engineering and Programming

Available Speakers on this Topic

Kaveh Bazargan – Tehran, Iran

Swarup Bhunia – Gainesville, FL, United States

Albert Bifet – Paris, France

Michael Bronstein – Lugano, Switzerland

  • Geometric deep learning
    In recent years, more and more data science applications have to deal with a somewhat unusual kind of data residing on non-Euclidean geometric domains such as manifolds or graphs. For...
  • Start thinking in 3D!
    The last decade has witnessed a series of technological breakthroughs in the acquisition, processing, and analysis of 3D geometric data, enabling applications that are revolutionizing our way of...

Tracy K Camp – CO, United States

Amlan Chakrabarti – Kolkata, India

Dipankar Dasgupta – Memphis, TN, United States

Kerstin Dautenhahn – Hatfield, United Kingdom

Tassos Dimitriou – Athens, Greece

Henry Duh – Melbourne, VIC, Australia

Gabor Fichtinger – Kingston, ON, Canada

Silvia Giordano – MANNO ,TI, Switzerland

Donald Gotterbarn – Johnson City, TN, United States

  • Computer Ethics and Technology
    This talk focuses on computer ethics as it relates to the day to day activities of practicing computer professionals. The emphasis is on real world moral and legal issues for the practicing...
  • Software Development: More Than Just Programming
    We are often surprised by the number of non-programming related issues that affect the professional’s efforts to develop quality software and web interfaces. Development efforts are...
  • Unmanaged Risk: Why Systems Don't Work
    The focus on software testing and risk analysis during software development has only had a limited effect in reducing software failures. This talk will present a new approach to the identification...

Mark Grechanik – Chicago, IL, United States

Michael Gschwind – Yorktown Heights, NY, United States

Haitham S Hamza – Giza, Egypt

James D Herbsleb – Pittsburgh, PA, United States

  • Socio-technical Coordination
    Coordination, or managing dependencies among tasks, has long been recognized as one of the most difficult, pervasive, and persistent problems in large-scale software development.  A...

Tsung-Yi Ho – Hsinchu, Taiwan

Shiyan Hu – Houghton, MI, United States

Yu Hua – Wuhan, China

Kristina Höök – Stockholm, Sweden

  • Designing for Somaesthetics
    In designing for bodily experiences, there has been a lack of theories that can provide the underpinnings we need to understand and deepen our design thinking. Despite all the work we have seen on...
  • The Mobile Life? An enjoyment society
    The Mobile Life Centre, started in 2007, has grown to be about 45 researchers, exploring experiential, leisure and playful mobile and ubiquitous interactions. We do serious research on what we...
  • What is design knowledge?
    Research through design (RtD) aims at bringing out design knowledge in different forms: both the ultimate particulars (specific designs used in specific contexts) as well as more generic...

Seiji Isotani – Sao Carlos - SP, Brazil

Dharm Singh Jat – Windhoek, AR, Namibia

Scott Jenson – Mountain View, CA, United States

  • Home Automation is an EasyHard problem
    It's so easy to fall into the trap that the internet of things 'just works'. This lecture shows how even something as simple as turning on a light can filled with UX distasters....
  • The Physical Web
    The history of technology and interaction design is circular. A new technology creates a new product concept that starts off primitive but slowly matures over time. Then a new technology...
  • The UX Grid of IoT
    The "Internet of Things" is too broad a concept. It can be many things and that is a source of confusion. This 2x2 matrix of the UX Grid of IoT is a simple breakdown but it allows...

Benjamin Kenwright – Southampton, United Kingdom

  • Memory management: Fast Efficient Fixed-Sized Memory Pools
    This lecture discusses the importance of memory in the context of performance.  We examine and present a ready-to-use, robust, and computationally fast fixed-size memory pool manager...
  • Debugging Game Systems (Practical Debugging)
    The practical challenges of debugging large software projects (such as video games) is important – not just the ability to track down issues but to write software that makes the...
  • High Performance Graphics with Vulkan
    This lecture introducing the listener to the Vulkan cross platform 3D graphics API - including examples and discussion on the practical aspects. The lecture address questions, such...
  • Inverse Kinematics
    Inverse kinematics is the mathematical process for calculating the movement of objects. This is useful in a whole range of fields, from engineering and robotics to medical analysis and...
  • Opportunities and Challenges in Teaching Video Games in Higher Education
    This lecture discusses the opportunities and challenges of video game curricula. The talk explores the diversity of the subject from both an artistic and technical perspective - centred around...

Christoph Kirsch – Salzburg, Austria

  • Selfie and the Basics
    Imagine a world in which virtually everyone at least intuitively understands the fundamental principles of information and computation. In such a world computing would be as natural to people as...

Fernando Koch – Melbourne, Australia

Sven Koenig – Los Angeles, CA, United States

  • Making Good Decisions Quickly
    Several disciplines, including artificial intelligence, operations research and others, study how to make timely and good decisions. In this talk, I argue that it is possible to combine ideas from...

Anis Koubaa – Riyadh, Saudi Arabia

Ponnurangam Kumaraguru – New Delhi, India

Ashish Kundu – Yorktown Heights, NY, United States

  • Baking Compliance into Cloud: Art or Science?
    With the (obvious) evolution of cloud from being a compute-centric infrastructure to a data-and-compute-centric infrastructure, more and more enterprises are bringing their data to cloud in...
  • Exploiting Placement New of C++
    In this talk, we would explore how to exploit the "placement new" expression in C++. "Placement new" facilitates placement of an object/array at a specific memory location....

Effie Lai-Chong Law – Leicester, United Kingdom

Dongwon Lee – Fairfax, VA, United States

  • Human Computation in Data Science
    As a novel computation paradigm, human computation (a.k.a. crowdsourcing) is being actively pursued in diverse academic disciplines. Within computer science, many sub-fields have also embraced the...
  • LIKEs-R-Us: Analyzing LIKEs in Social Media
    The recent dramatic increase in the usage and prevalence of social media has led to the creation and sharing of a significant amount of information in various formats such as texts, photos, or...

Hai Li – Durham, NC, United States

Shipeng Li – Beijing, China

Gabriel H Loh – Bellevue, WA, United States

  • Computer Architectures for 3D Die Stacking
    Session 1 Title: Die Stacking and it Architectural Implications
    Session 2 Title: Introduction to Die-Stacked Memory Systems
    Session 3 Title: Advanced Topics...
  • Memory Organizations for 3D Die Stacking
    This talk provides a brief overview and review of die-stacking technologies, covering some of the different types of options out there for stacking, and in particular focusing on how the...

Oge Marques – Boca Raton, FL, United States

Jeanna N Matthews – Potsdam, NY, United States

Prabhat Mishra – Gainesville, FL, United States

Jacquelyn F Morie – Los Angeles, CA, United States

Laurence Nigay – Grenoble, France

  • Multimodal Interaction
    Multimodal interaction supports multiple interaction techniques, which may be used sequentially or concurrently, and independently or combined synergistically. Specific interaction aspects...

Zoran Obradovic – Philadelphia, PA, United States

Phillippe Palanque – Toulouse, Cedex, France

Sharath Pankanti – Yorktown Heights, NY, United States

  • Actionable Video Content Summarization: Lessons from Practical Case Studies
    For the first time in the history of universe, the video data generated by humans has exceeds all other forms of the data. While no one denies the utility of the information hidden within...
  • Biometrics
    The determination of identity can be accomplished by three generic means. Conventionally, an exclusive possession (either a physical, e.g., key or electronic, e.g., cookie), knowledge (e.g.,...
  • Multi-media Compliance: A practical paradigm for managing business integrity
    In virtually every business context there is a need to establish some form of monitoring system to ensure that employees comply with business processes and policies. Compliance failures range from...
  • Public Sector Surveillance
    Situation awareness is the key to security. Awareness requires information that spans multiple scales of space and time. The increasing need for sophisticated surveillance systems and the move to...
  • Retail video analytics
    The retail industry grosses trillions of USD revenue annually worldwide and provides numerous opportunities for innovation to facilitate real-world business operations. Applications include: loss...

Gyana R Parija – New Delhi, India

Fabio Paterno – Pisa, Italy

Shrisha Rao – Bangalore, India

  • Safety Issues in Cyber-Physical Systems
    Computers and software components are now integral to large complex systems in almost all sectors of modern society.  The safety of such systems is therefore dependent upon many...
  • Services Science and Services Computing
    New models of computation such as cloud computing, Big Data, and the Internet of Things have fundamentally upended common assumptions about the nature and purposes of computation. One thing...
  • Sustainability in IT Systems
    While we all appreciate the ways in which information technology (IT) has revolutionized society, it is becoming increasingly obvious that the full benefits of IT will be available to us...

Abhik Roychoudhury – Singapore, Singapore

  • Automated Program Repair
    Software debugging is extremely time consuming, and hence techniques to aid automated program repair are of value. Moreover, even after software errors are identified, fixing the...
  • Software Debugging as a Science
    Program debugging is an extremely time-consuming process, and it takes up a large portion of software development time. In practice, debugging is still very much of an art, with the...
  • Symbolic Analysis Methods for Software Debugging and Repair
    In recent years, there have been significant advances in symbolic execution technology, driven by the increasing maturity of constraint solvers as well as by the availability of cheap...
  • Testing and Debugging of Software Regressions
    Software regressions, where a previously working program fails on certain tests after changes, constitute a major source of delays and missed schedules in any large software...

Andrzej Rucinski – Strafford, NH, United States

  • OPPORTUNITY OF INTERNET OF THINGS SEMINAR
    Internet of Things (IoT) is an expanding space for researchers, students, and professionals.  Development of IoT applications is hindered by the lack of available design tools,...

Valentina Salapura – NY, United States

  • High Performance Computing at IBM

    High-performance computing technologies are entering the mainstream in a transition ready to revolutionize entire industries.  Today, clusters, grids and virtualization infrastructure at...

  • Innovation at IBM -- Smarter Planet Initiative
    When IBM set its sights on helping to create a smarter planet two years ago, we predicted the evolution of an increasingly instrumented, intelligent and interconnected world. Intelligence is being...
  • Technology Futures: IBM's Global Technology Outlook
    Join us for a look at IBM's vision for the near term future, or as IBM terms it, IBM's Global Technology Outlook (GTO).  IBM Research and its global community of some of the...

Hanan Samet – College Park, MD, United States

Xipeng Shen – Raleigh, NC, United States

Biplav Srivastava – Yorktown Heights, NY, United States

Richard Stallman – Boston, MA, United States

  • A Free Digital Society: What Makes Digital Inclusion Good Or Bad?
    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs, nonfree software that controls users, and the War on Sharing....
  • Copyright vs. Community in the Age of Computer Networks
    Copyright developed in the age of the printing press, and was designed to fit with the system of centralized copying imposed by the printing press. But the copyright system does not fit...
  • Free Software and Your Freedom
    The Free Software Movement campaigns for computer users' freedom to cooperate and control their own computing. The Free Software Movement developed the GNU operating system, typically...
  • The GNU General Public License
    Richard Stallman wrote the first GNU General Public License in 1989, and version 3 which was completed in 2007.  He will discuss  the philosophy of the GNU GPL, the changes made in...

David G. Stork – Sunnyvale, CA, United States

Venkat Subramaniam – Broomfield, CO, United States

  • Functional Programming
    Most of the mainstream languages have supported the imperative style of programming for a very long time. Functional programming has been around for a few decades but it's finally gaining...
  • Java 8 Lambda Expressions, the Pathway to Functional Style
    Java 8 has been one of the most significant changes to the language. It is not simply the introduction of some new syntax, but a fundamental different way of thinking that we're used to when...
  • Let's Get Lazy: Explore the Real Power of Streams
    When we hear functional programming we often hear about immutability and higher-order functions. They are definitely important, but the real power of functional programming is in function...
  • Reactive Programming
    Why a new programming model? The computing platform and the demands on applications have significantly changed in the past few years. We can't be creating applications like we once did....
  • The Power and Perils of Parallel Streams
    Java 8 makes it really easy to convert a stream to a parallel stream, to run tasks concurrently. When come thing is that easy we tend to ask "what's the catch" and that's a very...
  • Twelve Ways to Make Code Suck Less
    The quality of the code we create has a significant impact on our ability to change the software in the future. As programmers succumb to time and deliver pressures, the quality of code may get...

Andrew S Tanenbaum – Amsterdam, Netherlands

  • MINIX 3: A Reliable and Secure Operating System
    Most computer users nowadays are nontechnical people who have  a mental model of what they expect from a computer based on their experience with TV sets and stereos: you buy it, plug...

Ranjith Tharayil – Bangalore, India

Harold Thimbleby Wales Uk

  • Creativity, innovation and taking risk in your research
    Most people just “do” research without thinking strategically about their work, their interests and how to do better. What is their plan when a paper or a funding application gets...
  • Human error is not the problem
    Error, if it was a disease, would be classified as the third biggest killer after cancer and heart disease. Why is it neglected, and what can be done? 
  • Missed solutions to WWII Enigma design weaknesses
    The German World War II Enigma suffered from design weaknesses that facilitated its large-scale decryption by the British throughout the war. The main technical weaknesses (self-coding and...
  • Pirate talks: Getting to great presentations
    Pirates say Arrrrr! This is the best mnemnonic on how to give great presentations: audience, remember, route... 
     
    Pirate Harold Thimbleby...
  • Social network analysis and interactive device design analysis
    All interactive systems respond to what users do by changing what they are doing Ñ though sometimes maybe not in the way you intended! What they were doing before and after any particular...
  • Unsafe in any bed
    ‘Unsafe At Any Speed’ was the title of Ralph Nader’s damning critique of the 1960s car industry. We are at a similar position with today’s healthcare: Terrible, but quite...

Aida Todri-Sanial – Montpellier, France

Jean Vanderdonckt – Louvain-La-Neuve, Belgium

  • Animated Transitions in User Interface Design.
    Animated transitions are widely used in many different domains of human activity, ranging from cartoons and movies to computer science for powerfully conveying a message more effectively and...
  • Context-aware adaptation of user interfaces.
    Efficient adaptation aims at ensuring that a user interface is adapted to a user’s task according to the context of use, since the end user is carrying out a task with one or several...
  • Distributed User Interfaces.
    Distributed User Interfaces (DUIs) are user interfaces whose elements are distributed in time and space in order to support one or many users to carry out one or many tasks on one or many domains...
  • Heuristic evaluation of user interfaces.
    Heuristic evaluation is a usability inspection method that consists of submitting any user interface of an interactive system to a set of recognized principles, called heuristics. These heuristics...
  • Model-based and Model-driven engineering of user interfaces: The UsiXML experience.
    In order to be relieved from empirical and opportunistic development of user interfaces and to promote a genuine and rigorous approach throughout the development life cycle,...
  • Multimodal web user interfaces.
    Web applications are not limited to graphical interaction, they are now open to vocal, tactile, gestural, and multimodal interaction. This lecture provides an overview of these interaction...
  • Pen-based gestures and sketching.
    Incorporating pen-based gestures in a graphical user interface induces several questions: which gesture should represent which command? What is the most appropriate gesture set when all gestures...

Rakesh Verma – Houston, TX, United States

Arun Vishwanath – Melbourne, VIC, Australia

Ellen M Voorhees – Gaithersburg, MD, United States

  • Information Retrieval Challenge Problems

    The Text REtrieval Conference (TREC) is a series of workshops designed to advance the state-of-the-art in information retrieval by providing the infrastructure necessary for large-scale...

  • Measuring Search Effectiveness
    In contrast to most areas of computer science research, information retrieval research has a rich tradition of experimentation dating back to the 1960s. This experimental methodology...
  • The Text REtrieval Conference
    The Text REtrieval Conference (TREC) project at the National Institute of Standards and Technology has created standard test sets and evaluation methodology to support the development of...

Yu Wang – Beijing, China

Bebo White – San Francisco, CA, United States

Tao Xie – Raleigh, IL, United States

Moustafa A Youssef – New Borg Elarab City, Alexandria, Egypt

Demetrios Zeinalipour-Yazti – Nicosia, Cyprus

  • Internet-based Indoor Navigation Services
    This talk presents the fundamental mobile data management concepts behind the realization of innovative indoor information services that deal with all aspects of handling indoor data as a...