Public Talks
Choose Type
All
Colloquium
Career Mentorship Colloquium
Directed Research Project
Area Exam
Dissertation Defense
All of these talks are open to the public, and will provide some insight into various research activities here and at other institutions.
Choose Year
May 2002 | ||
---|---|---|
16 | A Collaborative view of Wearable/Mobile Information Systems Zary Segall, University of Oregon | |
09 | Automatic Construction of State Invariants and Their Application in Software Development Constance Heitmeyer, Center for High Assurance Computer Systems, Naval Research Laboratory, Washington, DC | |
03 | Transcending the Individual Human Mind: Social Creativity and Meta-Design Gerhard Fischer, Department of Computer Science and Institute of Cognitive Science, University of Colorado | |
02 | Adaptive Internet Multimedia Streaming Reza Rejaie, University of Oregon | |
April 2002 | ||
25 | Compiling with Types and Flows Allyn Dimock, Harvard University | |
15 | Automating Selective Dynamic Compilation Markus Mock, University of Washington | |
11 | Revere--Disseminating Security Updates at Internet Scale Jun Li, Laboratory for Advanced Systems Research, Computer Science Department, University of California, Los Angeles | |
08 | Know When To Fold 'Em. The Value of Improved Heuristics in A* Search Tristan Smith, University of Oregon | |
04 | Adaptive Scalable Internet Streaming Dmitri Loguinov, City University of New York | |
02 | Behavioral Software Contracts Robert Bruce Findler, Rice University | |
March 2002 | ||
14 | Framework and Toolkit for the Effective Measurement and Representation of Internet Internal Characteristics Khaled Harfoush, Boston University | |
13 | Security Protocols for Broadcast Communication Adrian Perrig, University of California, Berkeley | |
07 | Formalizing Reuse in Open, Collaborative Systems Joseph Kiniry, California Institute of Technology | |
February 2002 | ||
28 | Exploratory cognitive modeling provides insight into the strategic
coordination of the perceptual and motor processes used to search
hierarchical computer displays Anthony Hornof, University of Oregon | |
21 | Secure Computing Through Types Bratin Saha, Yale University | |
15 | Programming with Types Stephanie Weirich, Cornell University | |
14 | Programming Languages for Secure Information Flow Stephan Zdancewic, Cornell University | |
12 | Group Key Agreement: Theory and Practice Yongdae Kim, University of Southern California | |
07 | Automatic Tools for Building Secure Systems Dawn Song, Department of Computer Science, University of California, Berkeley | |
05 | Multicast Monitoring: Supporting a Robust Multicast Service in the Network Kamil Sarac, University of California, Santa Barbara | |
January 2002 | ||
31 | Value Sensitive Design Batya Friedman, The Information School, University of Washington | |
October 2001 | ||
16 | Evolutionary perspectives on protein folding, structure, and thermodynamics Richard Goldstein, Department of Chemistry, Biophysics Research Division, University of Michigan |