Events

Filter by:

Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the title matches:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:

Please note: This master’s thesis presentation will take place online.

Jason Goertzen, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Douglas Stebila

Monday, November 21, 2022 9:00 am - 9:00 am EST (GMT -05:00)

PhD Defence • Data Systems • Memory Power Consumption in Main-Memory Database Systems

Please note: This PhD defence will take place online.

Alexey Karyakin, PhD candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Ken Salem

In main-memory database systems, memory can consume a substantial amount of power, comparable to that of the processors. However, existing memory power-saving mechanisms are much less effective than processor power management. Unless the system is almost idle, memory power consumption will be high.

Please note: This master’s thesis presentation will take place online.

Ziqi Zhou, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Jian Zhao

Please note: This lecture will take place in DC 1302 and online.

Mostafa H. Ammar, Regents’ Professor
School of Computer Science, Georgia Institute of Technology

A networking researcher, traveling forward in time from 1985 to the present, would be shocked by many things — not the least of which is the fact that people are still doing networking research in 2022.

Please note: This PhD seminar will take place in DC 1304 and online.

Futian (Caesar) Zhang, PhD candidate
David R. Cheriton School of Computer Science

Supervisors: Professors Jian Zhao, Keiko Katsuragawa

Pointing is an elementary interaction in virtual and augmented reality environments, and, to effectively support selection, techniques must deal with the challenges of occlusion and depth specification. Most of the previous techniques require two explicit steps to handle occlusion.