Thursday, April 12, 2018 10:30 AM EDT

Maryam Mehri Dehvani
Department of Electrical and Computer Engineering, Rutgers University

The emergence of stupendously large matrices in applications such as data mining and large-scale scientific simulations has rendered the classical software frameworks and numerical methods inadequate in many situations. In this talk, I will demonstrate how building domain-specific compilers and reformulating classical mathematical methods significantly improve the performance and scalability of large-scale applications on modern computing platforms.

Wednesday, April 11, 2018 1:30 PM EDT

Aayush Rajasekaran, Master's candidate
David R. Cheriton School of Computer Science

Monday, April 9, 2018 1:00 PM EDT

William Callaghan, Master’s candidate
David R. Cheriton School of Computer Science

Monday, April 9, 2018 1:00 PM EDT

Ahmed El-Roby, PhD candidate
David R. Cheriton School of Computer Science

Today, there is an abundance of structured data available on the web in the form of RDF graphs and relational (i.e., tabular) data. This data comes from heterogeneous sources, and realizing its full value requires integrating these sources so that they can be queried together. Due to the scale and heterogeneity of the data sources on the web, integrating them is typically an automatic process.

Monday, April 9, 2018 10:30 AM EDT

Thomas Steinke, Postdoctoral researcher
IBM Almaden Research Center

As data is being more widely collected and used, privacy and statistical validity are becoming increasingly difficult to protect. Sound solutions are needed, as ad hoc approaches have resulted in several high-profile failures.

Friday, April 6, 2018 — 6:00 PM to 9:00 PM EDT

Come out to The Critical Media Lab at 44 Gaukel Street in Kitchener is experience the first ever Computational Digital Art Capstone Exhibition, where you will see interactive and digital art pieces made by students from the University of Waterloo!

Featured artists
Erin Kim
Helga Jiang
Susie Su
Simon Yu
Bonnie Wu
Stephanie Lin
Saadiya Desai
Jennifer Wu
Jimmie Shan

Friday, April 6, 2018 1:00 PM EDT

Xiao-Bo Li, PhD candidate
David R. Cheriton School of Computer Science

Thursday, April 5, 2018 4:00 PM EDT

Xiao-Bo Li, PhD candidate
David R. Cheriton School of Computer Science

Thursday, April 5, 2018 1:00 PM EDT

Edward Zulkoski, PhD candidate
David R. Cheriton School of Computer Science

Thursday, April 5, 2018 12:00 PM EDT

Edward Zulkoski, PhD candidate
David R. Cheriton School of Computer Science

Wednesday, April 4, 2018 3:00 PM EDT

Thad Starner, School of Interactive Computing
Georgia Institute of Technology

Wednesday, April 4, 2018 1:30 PM EDT

Hicham El-Zein, PhD candidate
David R. Cheriton School of Computer Science

We present succinct data structures for one-dimensional color reporting and color counting problems. We are given a set of $n$ points with integer coordinates in the range $[1,m]$ and every point is assigned a color from the set $\{\,1,\ldots,\sigma\,\}$. A color reporting query asks for the list of distinct colors that occur in a query interval $[a,b]$ and a color counting query asks for the number of distinct colors in $[a,b]$.

Wednesday, April 4, 2018 12:00 PM EDT

Feng-Xuan Choo, PhD candidate
David R. Cheriton School of Computer Science

Tuesday, April 3, 2018 10:30 AM EDT

Chengnian Sun, Software Engineer
Google Inc., Mountain View, USA

Wednesday, March 28, 2018 10:30 AM EDT

Dakshita Khurana, PhD candidate
Department of Computer Science, UCLA

Can we provably immunize protocols against coordinated attacks on the internet? Can we verify that computation is performed correctly while preserving the privacy of underlying data? Can we enable mutually distrusting participants to securely compute on distributed private data?

These are some of the core challenges that lie at the heart of modern cryptography and secure protocol design.

Monday, March 26, 2018 3:30 PM EDT
photo of Jennifer Widom

Jennifer Widom
​Frederick Emmons Terman Dean, School of Engineering
Fletcher Jones Professor, Computer Science and Electrical Engineering
Stanford University

Monday, March 26, 2018 10:30 AM EDT

Xi He, PhD candidate
Computer Science Department, Duke University

Thursday, March 22, 2018 10:30 AM EDT

Charles Perin, Department of Computer Science
City, University of London

We live in an increasingly data-driven world, where commercial, societal, environmental, and political decisions are made based on data. However, we also live in a world where most people lack the literacy required to participate in the data-informed debates of modern society. Perhaps the main barrier to improving people’s data literacy is that data is often associated with complexity, large scale, corporatism, and dystopia.

But data is about people.

Wednesday, March 21, 2018 7:30 PM EDT

What are we? By what processes and patterns did we originate and how do these patterns compare to the processes of the world around us, digital and biological, societal and fictional?

Wednesday, March 21, 2018 1:30 PM EDT

Hicham El-Zein, PhD candidate
David R. Cheriton School of Computer Science

Tuesday, March 20, 2018 4:00 PM EDT

Daniel Recoskie, PhD candidate
David R. Cheriton School of Computer Science

Tuesday, March 20, 2018 10:30 AM EDT

Haifeng Xu, PhD candidate
Computer Science Department, University of Southern California

Strategic interactions among self-interested agents (a.k.a., games) are ubiquitous, ranging from economic activity in daily life and the Internet to defender-adversary interactions in national security. A key variable influencing agents' strategic decision making is the information they have available about their environment as well as the preferences and actions of others. 

Tuesday, March 20, 2018 10:00 AM EDT

Rina Wehbe, PhD candidate
David R. Cheriton School of Computer Science

Why do we care if our teammates are not human? This study seeks to uncover whether or not the perception of other players as human or artificial entities can influence player experience. We use both deception and a between-participants blind study design to reduce bias in our experiment. 

Monday, March 19, 2018 10:30 AM EDT

Please note: This seminar has been cancelled

Thomas Steinke, Postdoctoral researcher
IBM Almaden Research Center, San Jose, California

As data is being more widely collected and used, privacy and statistical validity are becoming increasingly difficult to protect. Sound solutions are needed, as ad hoc approaches have resulted in several high-profile failures.

Friday, March 16, 2018 1:30 PM EDT

Cong Guo, PhD candidate
David R. Cheriton School of Computer Science

Consolidation of multiple workloads is cost-effective for system operators. However, it is difficult to determine how to share resources among multiple tenants to achieve both performance isolation and work conservation. The primary shared resource in the server are the CPU cores. We show that current solutions cannot handle CPU sharing very well in various multi-tenancy scenarios.

Pages

S M T W T F S
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
3
  1. 2024 (96)
    1. April (19)
    2. March (27)
    3. February (25)
    4. January (25)
  2. 2023 (296)
    1. December (20)
    2. November (28)
    3. October (15)
    4. September (25)
    5. August (30)
    6. July (30)
    7. June (22)
    8. May (23)
    9. April (32)
    10. March (31)
    11. February (18)
    12. January (22)
  3. 2022 (245)
  4. 2021 (210)
  5. 2020 (217)
  6. 2019 (255)
  7. 2018 (217)
    1. December (16)
    2. November (19)
    3. October (24)
    4. September (21)
    5. August (17)
    6. July (20)
    7. June (13)
    8. May (25)
    9. April (34)
    10. March (24)
    11. February (3)
    12. January (1)
  8. 2017 (36)
  9. 2016 (21)
  10. 2015 (36)
  11. 2014 (33)
  12. 2013 (23)
  13. 2012 (4)
  14. 2011 (1)
  15. 2010 (1)
  16. 2009 (1)
  17. 2008 (1)