Upcoming Lectures

Cyber Security Challenges and Opportunities

Speaker: David Martinez

Cyber technologies are evolving at a very fast pace commensurate with the need to respond to cyber threats. This presentation …

Read More

IHMC Research: Natural Language Processing, Cyber Security, and Big Data

Speaker: Bonnie Dorr

Natural language researchers and data scientists apply a multitude of techniques for analysis and extraction of knowledge from potentially massive …

Read More

Understanding the Human in Human-Robot Teams

Speaker: Ruzena Bajcsy

Natural language researchers and data scientists apply a multitude of techniques for analysis and extraction of knowledge from potentially massive …

Read More

Past Lectures

Photo of Zhou Wubai

Data Mining Techniques to Understand Textual Data

Speaker: Wubai Zhou

More than ever, information delivery online and storage heavily rely on text. Billions of texts are produced every day in …

Read More

Robust Distributed Coordination of Loads for Providing Virtual Energy

Speaker: Prabir Barooah

As we move away from fossil fuels toward renewable energy sources such as solar and wind, inexpensive energy storage technologies …

Read More

Traffic-Aware Placement of Interdependent NFV Middleboxes in SDN Networks

Speaker: Deng Pan

Network Function Virtualization (NFV) revolutionizes the implementation of network functions, or middleboxes, as virtual machines that can run any on …

Read More
Photo of Muhammad Razib is a Ph.D. candidate

Structural Surface Mapping for Shape Analysis

Speaker: Muhammad Razib

Natural surfaces are usually associated with feature graphs, such as cortical surface with anatomical atlas structure. Such a feature graph …

Read More

Securing Devices and Applications in the Internet of Things and Cyber-Physical Systems Era

Speaker: Selcuk Uluagac

Cyber space is expanding fast with the introduction of new Internet of Things (IoT) and CPS devices. Wearables, smart watches, …

Read More
image of Zhuo Sun

Toward Finding Concurrency Bugs in Distributed Systems

Speaker: Zhuo Sun

As the most common non-deadlock concurrency bugs, atomicity violations are extremely hard to detect during testing since the exhaustive testing …

Read More
Page 1 Page 2 Page 3 Page 4 Page 5 Page 33