Next Distinguished Lecture
Building Smart Memories and Cloud Services with Derecho
Ken Birman Monday, October 30, 2017 |
Future and Past Distinguished Lectures
Building Smart Memories and Cloud Services with Derecho
Ken Birman Monday, October 30, 2017 |
|
New Era in Distributed Computing with Blockchains and Databases
Dr. C. Mohan Monday, October 23, 2017 |
|
Testing Quantum Devices and Quantum Mechanics
Umesh Vazirani Wednesday, May 10, 2017 |
Internet of Things: History and Hype, Technology and Policy
Margaret Martonosi Monday, December 2, 2016 |
The Automated-Reasoning Revolution: From Theory to Practice and Back
Moshe Y. Vardi Friday, September 9, 2016 |
RustBelt: Logical Foundations for the Future of Safe Systems Programming
Derek Dreyer Thursday, May 12, 2016 |
Scaling Data Analytics with Moore's Law
Kunle Olukotun Thursday, May 5, 2016 |
Programming Uncertain <T>hings
Kathryn S. McKinley Thursday, February 4, 2016 |
RAMCloud and the Low-Latency Datacenter
John Ousterhout Thursday, November 12, 2015 |
It's the End of the World as We Know It (And I Feel Fine)
James Larus Thursday, October 22, 2015 |
Bounded Staleness in Distributed Machine Learning Systems: Getting the Right Answer Sooner
Garth Gibson Thursday, April 16, 2015 |
Rethinking Computer Architecture for Energy Limited Computing
Wen-mei W. Hwu Thursday, January 22, 2015 |
Compiler Technology for Solving PDEs with Performance Portability
Paul H. J. Kelly Thursday, November 13, 2014 |
Computational Perspectives on Social Phenomena at Global Scales
Jon Kleinberg Thursday, November 6, 2014 |
Towards a Theory of Trust in Networks of Humans and Computers
Jeannette Wing Thursday, May 8, 2014 |
How can one trust the information they read over the Internet? We argue that a general theory of trust in networks of humans and computers must be built on both a theory of behavioral trust and a theory of computational trust.
Structured Data in Web Search
Alon Halevy Thursday, April 24, 2014 |
For the first time since the emergence of the Web, structured data is playing a key role in search engines and is therefore being collected via a concerted effort. The talk will describe some of the Google's efforts to collect structured data, filter the high-quality content, and serve its users.
Let's Stop Trusting Software With Our Sensitive Data
Suppose we only trust hardware manufacturers and cryptographers, and not system software developers, application programmers, or other software vendors. It will be the hardware manufacturer's job to produce a piece of hardware that provides some security properties. |
Co-sponsors:
- Argonne National Laboratory
- Computation Institute
- The Chicago Center for the Theory of Computing and Allied Areas