Seminar • Software Engineering — Requirements Management in Agile Projects
Marcia Lucena, Departamento de Informática e Matemática Aplicada
Universidade Federal do Rio Grande do Norte, Brazil
Marcia Lucena, Departamento de Informática e Matemática Aplicada
Universidade Federal do Rio Grande do Norte, Brazil
Siddhartha Sahu, PhD candidate
David R. Cheriton School of Computer Science
Dr. Mohamed Omar
Harvey Mudd College
Toward the end of an undergraduate degree, especially at an institution with many students in technical majors, students tend to form a perception of their mathematical/technical prowess and abilities. However, this perception is usually based on markers that do not come close to adequately reflecting the mathematical process as it is practiced by mathematicians.
Michael Abebe, PhD candidate
David R. Cheriton School of Computer Science
Yakov Nekrich, Department of Computer Science
Michigan Technological University
Chris Eliasmith, Director of the Centre for Theoretical Neuroscience
Department of Systems Design Engineering
Mirela Ben-Chen, Center for Graphics and Geometric Computing
Computer Science Department, Technion
Crispin Cowan, Leviathan Security Group
Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts.
Bundit Laekhanukit, Institute for Theoretical Computer Science
Shanghai University of Finance and Economics
Chendi Ni, PhD candidate
David R. Cheriton School of Computer Science