Bradley Glasbergen, PhD candidate
David R. Cheriton School of Computer Science
Nabiha Asghar, PhD candidate
David R. Cheriton School of Computer Science
Huy Hoang, Master’s candidate
David R. Cheriton School of Computer Science
Anastasia Kuzminykh, PhD candidate
David R. Cheriton School of Computer Science
As the popularity of conversational agent systems grows, there is a pressing need to understand end-users’ perceptions of the types of tasks and the interactions that these agents can and should support.
Siddhartha Sahu, PhD candidate
David R. Cheriton School of Computer Science
Umar Farooq Minhas, Database Group
Microsoft Research

The University of Waterloo Human Factors and Ergonomics Society is proud host IUW19 — the Inter-University Workshop — for its 20th anniversary.
Michael Abebe, PhD candidate
David R. Cheriton School of Computer Science
Mirela Ben-Chen, Center for Graphics and Geometric Computing
Computer Science Department, Technion
Marcia Lucena, Departamento de Informática e Matemática Aplicada
Universidade Federal do Rio Grande do Norte, Brazil
Marianna Rapoport, PhD candidate
David R. Cheriton School of Computer Science
The goal of my thesis is to enable formal reasoning about the Scala programming language. To that end I present a core calculus that formalizes Scala's
Chris Eliasmith, Director of the Centre for Theoretical Neuroscience
Department of Systems Design Engineering
Yakov Nekrich, Department of Computer Science
Michigan Technological University
Mike Schaekermann, PhD candidate
David R. Cheriton School of Computer Science
Bundit Laekhanukit, Institute for Theoretical Computer Science
Shanghai University of Finance and Economics
Dr. Mohamed Omar
Harvey Mudd College
Toward the end of an undergraduate degree, especially at an institution with many students in technical majors, students tend to form a perception of their mathematical/technical prowess and abilities. However, this perception is usually based on markers that do not come close to adequately reflecting the mathematical process as it is practiced by mathematicians.
Chendi Ni, PhD candidate
David R. Cheriton School of Computer Science
Joan Bartlett, School of Information Studies
McGill University
Crispin Cowan, Leviathan Security Group
Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts.
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Amira Ghenai, PhD candidate
David R. Cheriton School of Computer Science
Amira Ghenai, PhD candidate
David R. Cheriton School of Computer Science
Amine Mhedhbi, PhD candidate
David R. Cheriton School of Computer Science
Marco Serafini, College of Information and Computer Sciences
University of Massachusetts Amherst
Jessy Ceha, PhD candidate
David R. Cheriton School of Computer Science