Unless otherwise specified, all talks will take place in
220 Deschutes Hall (the CIS department colloquium room)
at 3:30, with refreshments following the presentation. Send comments, ideas,
and requests to Michel Kinsy.
June 2008 |
| 25 | Deployed Software: An Ideal Environment for Fixing Bugs? Michael Bond, University of Texas, Austin |
| 20 | A Neural-Group Basis for Evolving and Developing Neural Networks Keith Downing, Norwegian University of Science and Technology |
| 05 | Certifying Algorithms and the Undergraduate Curriculum Ross McConnell, Colorado State University |
May 2008 |
| 29 | Computing While Compiling: Reasons and Methods for Compile-time
Metaprogramming Ronald Garcia, Indiana University |
| 22 | CIS Department Photograph Faculty, Staff & Graduating Students, University of Oregon |
| 15 | Towards Internationalization: Computer Science and Technology at Tsinghua University Bin Xu, Tsinghua University, China |
| 15 | Theorems, theories, and things: Computing is more than a science Ted Kirkpatrick, Simon Fraser University |
| 09 | The Future of Kernel Designs Dave Probert, Microsoft |
| 08 | Distinguished Lecture Series - Exploring the Power of Links in Information Network Mining Jiawei Han, University of Illinois at Urbana-Champaign |
| 06 | Self-Adjusting Computation Umut A. Acar, Toyota Technological Institute, University of Chicago |
| 02 | How to Get Your Resumé Noticed Ivan Lumala, Microsoft |
| 01 | Games, Puzzles, and Computation Robert Hearn, Neukom Institute for Computational Science, Dartmouth College |
April 2008 |
| 25 | Have you got game? Joe Maruschak, Garage Games |
| 24 | Datalogic Scanning, Inc. and the fundamentals of reading a barcode Tom Tamburrini, Datalogic Scanning of Eugene Pietro Todescato, Datalogic Scanning of Eugene |
| 22 | Life at a Global Technology Company Raymond Hardman, Symantec Corporation Michael Guidero, Symantec Corporation |
| 14 | Exact algorithms for Frequency Assignment: Branching versus Dynamic Programming Jan Kratochvil, Charles University, Prague |
| 04 | From the Classroom to the Cubicle Phillip Singer, Lunar Logic |
| 03 | Automatic Signature Generation for Unknown Vulnerabilities Weidong Cui, Microsoft Research |
| 01 | Wireless Network Health: An Adaptation a Day Keeps the System
Administrator Away Elizabeth M. Belding, University of California, Santa Barbara |
March 2008 |
| 13 | Distinguished Lecture Series - Computerized Voting Machines: Who is Counting your Vote? Barbara Simons |
February 2008 |
| 27 | Game Programming - The Big Picture Dan White, Pipeworks |
| 20 | Career Opportunities in the SAP Ecosphere Jeff Knowlton, Datalogic Scanning |
| 19 | Amazon Web Service's Elastic Cloud Computing (EC2) in
academic, scientific and university computing Jinesh Varia, Amazon Web Services |
| 07 | Databases from a category-theoretic perspective David Spivak, University of Oregon |
January 2008 |
| 23 | Ten things I needed to know to work in IBM.... but that nobody told me about Laurent Montaron, IBM |
| 17 | The JastAdd System - modular extensible language processing tools Torbjörn Ekman, Oxford University |
| 16 | Having a Life AND a High Tech Career Sabrina Parsons, CEO, Palo Alto Software |
| 11 | What is RCU? Paul McKenney, Distinguished Engineer, IBM |
December 2007 |
| 06 | Representing and Reasoning with Modular Ontologies Jie Bao, Iowa State University |
November 2007 |
| 29 | Experimental Mathematics and High-Performance Computing David H. Bailey, Lawrence Berkeley Laboratory |
| 08 | Internet Topology Measurements for the OneLab Testbed Timur Friedman, Pierre and Marie Curie University |
| 01 | Verification and Validation Techniques for Scientific Simulations Matthew Sottile, University of Oregon |
October 2007 |
| 18 | Interval Graph Completion and Polynomial-Time Preprocessing Jan Arne Telle , University of Bergen |