Speaker: Viona Duncan
Abstract: We all want to be the nice guy, but we do not want to finish last. How should we respect the IP of others, particularly confidential information and what should we expect of others when we provide confidential information to them? Simple steps that can be taken to meet obligations and preserve confidentiality will be discussed. You may also have obligations to funding agencies and the University. The UW IP policy will be discussed along with issues of ownership and employee confidentiality.
Matthew Day, University of Bristol and National Physical Laboratory, UK
Jeongmin Park - Center for Integrated Nanostructure Physics (CINAP), Institute for Basic Science (IBS) Department of Energy Science, Sungkyunkwan University
The combination of two-dimensional (2D) materials and functional oxide has been attracted in electrical transport study. Many researchers expected synergetic performance from this interesting structure. And the field effect transistor (FET) scheme was widely used to study it. Here, we successfully demonstrated graphene FET device which is fabricated on top of SrTiO3 (STO).
Hydrogen and hydride superconductors, a new path to room temperature superconductivity?
Kyle Willick: Carbon Nanotube Mechanical Resonators - Magnetic force detection and fast sensing
Andrew N. Cleland, University of Chicago
David Gosset, IBM TJ Watson Research Center
There is strong evidence that a sufficiently large fault-tolerant quantum computer would solve certain computational problems exponentially faster than any classical computer. How can quantum algorithms and complexity theory help guide the way forward in our current era of small and noisy quantum computers?
Jiawei Ji - The University of Calgary
Ke He, Tsinghua University
Tarun Patel: Photocurrent imaging of charge density wave transitions in ultrathin 1T-TaS2
Elizabeth Crosson, California Institute of Technology
Speaker: Heather Hoff
Abstract: Software is a key asset of any new business. How do you protect the results of weeks or months of hard labour? Who owns the software and how do I mange its development to ensure its inherent value is maintained? Should I use Open Source, or even contribute to Open Source? What are the benefits and how does this measure up against the risks?
MSc Thesis Presentation
Candidate: Matthew Brown
PhD Comprehensive Seminar
Candidate: Guillaume Verdon-Akzam
Brandon Buonacorsi - Modeling the Exchange Interaction in Silicon Quantum Dots
Candidate: Michael Mazurek
Title: Testing classical and quantum theory with single photons
CryptoWorks21 at the University of Waterloo, together with representatives from the Standards Council of Canada (SCC) and the European Telecommunications Standards Institute (ETSI), are proud to present a lunch-time standards session.
Candidate: Elena Anisimova
Title: Single-photon detectors for long distance quantum communications
“He who is good with a hammer thinks everything is a nail.”
- Modified quote from the original by Abraham Maslow
How does one sell security? How does one commercialize such nebulous concepts such as “Trust”, “Security” and “Cryptography”? Cryptography, which is just one building block of security, is based on other more abstract building blocks such as algorithms which have a foundation on hard mathematical problems.