Events

Filter by:

Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the title matches:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:

Abel Molina, PhD candidate
David R. Cheriton School of Computer Science

Yao (1993) proved that quantum Turing machines and uniformly generated quantum circuits are polynomially equivalent computational models: t >= n steps of a quantum Turing machine running on an input of length n can be simulated by a uniformly generated family of quantum circuits with size quadratic in t, and a polynomial-time uniformly generated family of quantum circuits can be simulated by a quantum Turing machine running in polynomial time.

Monday, November 26, 2018 10:30 am - 10:30 am EST (GMT -05:00)

Seminar • Cryptography, Security, and Privacy (CrySP) — Securing Cloud-assisted Services

N. Asokan, Department of Computer Science
Aalto University, Finland

All kinds of previously local services are being moved to cloud settings. While this is justified by the scalability and efficiency benefits of cloud-based services, it also raises new security and privacy challenges. Solving them by naive application of standard security/privacy techniques can conflict with other functional requirements. In this talk, I will outline some cloud-assisted services and the conflicts that arise while trying to secure these services.

Monday, November 26, 2018 2:00 pm - 2:00 pm EST (GMT -05:00)

PhD Seminar • Quantum Computing / Information — Perfect Embezzlement of Entanglement

Li Liu, PhD candidate
David R. Cheriton School of Computer Science

Entanglement is a type of resource used in quantum information theory that gives correlations that cannot be simulated using classical probability theory. It is known that entanglement cannot be created locally. 

Wednesday, November 28, 2018 12:15 pm - 12:15 pm EST (GMT -05:00)

PhD Seminar • Data Systems — Generalized Transaction Durability Model

Jaemyung Kim, PhD candidate
David R. Cheriton School of Computer Science

Transaction durability guarantees the ability to recover committed transactions from failures. However, making every transaction durable impacts transaction processing performance. Some ad-hoc durability mechanisms (e.g., delayed durability) improve performance, but they risk transactions losing their effects due to failures. The current one-size-fits-all transaction durability model does not solve this problem.

John P. Conley, Department of Economics
Vanderbilt University

Blockchains are distributed, immutable, append only, ledgers designed to make trustless interactions between anonymous agents feasible and safe. The ledgers are maintained by networks of independent nodes who process transactions and come to a consensus view of which are valid and how this affects the ledger state. The integrity of blockchain ledgers therefore depends on the incentives contained in the consensus protocols that are designed to make the validating nodes behave honestly.

Thursday, November 29, 2018 10:30 am - 10:30 am EST (GMT -05:00)

Mathematics Education Seminar • Penny For Your Thoughts? The Power of Mathematical Reflection

Nick Rollick, Graduate student
Department of Pure Mathematics

For this week's seminar, I invite you to join me for an informal chat about my experiences using "reflective responses" in my elementary number theory course. In these bi-weekly formal reflective assignments, my students were asked to set and monitor learning goals, identify gaps in understanding, and ponder the value and importance of their course material. Most importantly, I responded in detail to every student's reflection, creating a meaningful course-long conversation.

Anastasia Kuzminykh, PhD candidate
David R. Cheriton School of Computer Science

Video-mediated communication has long struggled with asymmetrical constraints on situational awareness, especially in hybrid work meetings between collocated and remote participants. Advances in computer vision offer exciting opportunities to augment mediated situational awareness, but we must first understand what is meaningful to capture and present.