Events

Filter by:

Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the title matches:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:
Thursday, June 21, 2018 9:30 am - 3:30 pm EDT (GMT -04:00)

Inaugural Wes Graham Research Symposium & Computer Science Awards

The David R. Cheriton School of Computer Science is pleased to announce the inaugural Wes Graham Research Symposium & Computer Science Awards reception. The symposium takes its name from James Wesley (Wes) Graham, a humble visionary known as the father of computing at the University of Waterloo and an academic who devoted his career to making the magic of computers available to everyone. 

Abdullah Rashwan, PhD candidate
David R. Cheriton School of Computer Science

Sum-product networks have recently emerged as an attractive representation due to their dual view as a special type of deep neural network with clear semantics and a special type of probabilistic graphical model for which inference is always tractable. Those properties follow from some conditions (i.e., completeness and decomposability) that must be respected by the structure of the network. 

Chelsea Komlo, HashiCorp

​Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes. 

Matthew Finkel, The Tor Project

There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted.