Seminar • Cryptography, Security, and Privacy (CrySP): Enhancing the Discovery and Mitigation of Vulnerabilities in Binary Programs
Ruoyu (Fish) Wang, PhD candidate
SecLab, Department of Computer Science, University of California, Santa Barbara
Ruoyu (Fish) Wang, PhD candidate
SecLab, Department of Computer Science, University of California, Santa Barbara
Lesley Istead, PhD candidate
David R. Cheriton School of Computer Science
In this talk, we present a method for producing stylized stereoscopic 3D (S3D) line drawings or sketches from S3D photos.
Our method renders contours and silhouettes found in the disparity map and addresses some of the issues that arise when working with 8-bit disparity. Finally, we add shading to our stylized S3D line drawings to improve the perception of depth and surface shape.
Sangho Lee, Postdoctoral fellow
School of Computer Science, Georgia Institute of Technology
Drop by MC third floor, outside Math C&D for photo opportunities with Professor Stephen M. Watt, Dean of Mathematics, and other Math faculty members to commemorate supporters of the HeForShe campaign.
Time: 11:30 a.m. to 1:30 p.m. (or until the cupcakes last!)
Show your commitment and join the movement ... #COUNT ME IN
Free cupcakes for participants.
IMPACT 10x10x10
Ashvin Goel, Associate Professor
Electrical and Computer Engineering and Computer Science, University of Toronto
Pedram Ghodsnia, PhD candidate
David R. Cheriton School of Computer Science
James Wright, Postdoctoral researcher
Microsoft Research, New York
Rina Wehbe, PhD candidate
David R. Cheriton School of Computer Science
Designing difficulty levels in platformer games is a challenge for game designers. It is important because design decisions that affect difficulty also directly affect player experience. Consequently, design strategies for balancing game difficulty are discussed by both academics and game designers.
Chenyan Xiong, PhD candidate
Carnegie Mellon University
Search engines and other information systems have started to evolve from retrieving documents to providing more intelligent information access. However, the evolution is still in its infancy due to computers’ limited ability in representing and understanding human language.
Michael Abebe, PhD candidate
David R. Cheriton School of Computer Science
Cloud storage systems typically choose between replicating or erasure encoding data to provide fault tolerance. Replication ensures that data can be accessed from a single site but incurs a much higher storage overhead, which is a costly downside for large-scale storage systems. Erasure coding has a lower storage requirement but relies on encoding/decoding and distributed data retrieval that can result in increased response times.