Cecylia Bocovich, PhD candidate
David R. Cheriton School of Computer Science
Vern Paxson
Department of Electrical Engineering and Computer Sciences, University of California, Berkeley
Chief Scientist, Corelight, Inc.
Lead, Networking and Security Group, International Computer Science Institute
Hamed Haddadi, Senior Lecturer and Deputy Director of Research
Dyson School of Design Engineering
Academic Fellow, Data Science Institute, Imperial College London
Michael Mior, PhD candidate
David R. Cheriton School of Computer Science
Corwin Sinnamon, Master’s candidate
David R. Cheriton School of Computer Science
Philipp Kindermann, Postdoctoral Fellow
David R. Cheriton School of Computer Science
The visual complexity of a graph drawing is defined as the number of geometric objects needed to represent all its edges. In particular, one object may represent multiple edges, e.g., one needs only one line segment to draw two collinear incident edges.
Erinn Atwater, PhD candidate
David R. Cheriton School of Computer Science
Pavel Valov, PhD candidate
David R. Cheriton School of Computer Science
Daniel Recoskie, PhD candidate
David R. Cheriton School of Computer Science
The wavelet transform has seen success when incorporated into neural network architectures, such as in wavelet scattering networks. More recently, it has been shown that the dual-tree complex wavelet transform can provide better representations than the standard transform.
Join us for a special event showcasing FileMaker Pro and the new FileMaker 17 Platform.
Discover how to quickly create and use custom apps that work the way you do.
Pavel Valov, PhD candidate
David R. Cheriton School of Computer Science
Chunhao Wang, PhD candidate
David R. Cheriton School of Computer Science
Carolyn Lamb, PhD candidate
David R. Cheriton School of Computer Science
We describe three versions of TwitSong, a system that generates poetry based on the news. TwitSong is designed to make aesthetic decisions about potential lines of poetry and, in the third version, to edit its own work. We describe how the system was developed, how it performs in user studies, and why this type of computer-generated poetry still has a long way to go.
Finn Lidbetter, Master’s candidate
David R. Cheriton School of Computer Science
The fundamental problem of additive number theory is to determine whether there exists an integer m such that every nonnegative integer (resp., every sufficiently large nonnegative integer) is the sum of at most m elements of S. If so, we call S an additive basis of order m (resp., an asymptotic additive basis of order m). If such an m exists, we also want to find the smallest such m.
Anil Pacaci, PhD candidate
David R. Cheriton School of Computer Science
Daniel M. Berry
David R. Cheriton School of Computer Science
Dan Berry weaves the twin peaks of (1) his life in computing, programming, programming languages, software engineering, electronic publishing, and requirements engineering with (2) the almost concurrent development of programming languages, software engineering, and requirements engineering.
Torben Bach Pedersen, Professor of Computer Science
Aalborg University
Data collected from new sources such as sensors and smart devices is large, fast, and often complex. There is a universal wish to perform multidimensional OLAP-style analytics on such data, i.e., to turn it into “Big Multidimensional Data.” Supporting this is a multi-stage journey, requiring new tools and systems, and forming a new, extended data cycle with models as a key concept. We will look at three specifics steps in this data cycle.
Waterloo empowers entrepreneurs to go beyond.
Entrepreneurs are natural problem solvers. Beyond creating companies that bring innovative and world-changing ideas to the global market place, entrepreneurs are increasingly acting as community builders, industry change agents, and global disruptors.
Find out why.
Matthew Finkel, The Tor Project
There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted.
Chelsea Komlo, HashiCorp
Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes.