Search for tag: "id@gt lecture"

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello A week ago 9 views 0  

Ryan Diestelhorst - The Future of Computer-Aided Engineering

New advancements in cloud computing and machine learning have created an opportunity for a revolutionary advancement in how hardware engineering is performed. In this talk, Ryan Diestelhorst will…

From  Kathryn Gentilello A week ago 7 views 0  

Sam Kean - The Periodic Table: A Treasure Trove of Passion, Adventure, Betrayal, and Obsession

Why did Gandhi hate iodine? Why did the Japanese kill Godzilla with missiles made of cadmium? How did radium nearly ruin Marie Curie’s reputation? And why did tellurium lead to the most bizarre…

From  Kathryn Gentilello A week ago 7 views 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello 2 Weeks ago 3 views 0  

John Preskill - Quantum Computing and the Entanglement Frontier

The quantum laws governing atoms and other tiny objects seem to defy common sense, and information encoded in quantum systems has weird properties that baffle our feeble human minds. John Preskill…

From  Kathryn Gentilello 3 Weeks ago 10 views 0  

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello 3 Weeks ago 4 views 0  

James Park - Shape Machine and Parametrics

11:15 - 11:30 AM - Shape Machine and Parametrics James Park, BSArch, MArch PhD Student and Research Assistant Shape Computation Lab Georgia Institute of Technology

From  Kathryn Gentilello 3 Weeks ago 3 views 0  

Tzu-Chieh Kurt Hong - Shape Machine and Interpreters

11:00- 11:15AM - Shape Machine and Interpreters Tzu-Chieh Kurt Hong, BE, ME PhD Student and Research Assistant Shape Computation Lab Georgia Institute of Technology

From  Kathryn Gentilello 3 Weeks ago 3 views 0  

Cvetelina Hill - Shape Machine and Shape Signature

10:45 - 11:00 AM - Shape Machine and Shape Signature Cvetelina Hill, MS Math PhD Student School of Mathematics Georgia Institute of Technology

From  Kathryn Gentilello 3 Weeks ago 5 views 0  

Alanson Sample - Reinventing the Physical Layer to Create Interactive Sensing and Computing Systems

Harnessing electromagnetic waves has changed how we live, work, and play. While the semiconductor industry has enabled faster, cheaper, and lower power wireless computing devices, there is the…

From  Kathryn Gentilello A month ago 7 views 0  

Kira Barton - Advancements in Modeling, Sensing and Control for High-Resolution Additive Manufacturing

Additive manufacturing (AM) describes a class of processes that perform a layer-by-layer “bottom-up” fabrication approach as opposed to traditional top-down, subtractive fabrication such…

From  Kathryn Gentilello A month ago 5 views 0  

Konstantin Batygin - Planet Nine From Outer Space

At the outskirts of the solar system, beyond the orbit of Neptune, lies an expansive field of icy debris known as the Kuiper belt. The orbits of the individual asteroid-like bodies within the Kuiper…

From  Kathryn Gentilello A month ago 4 views 0  

Shimeng Yu - Neuro-Inspired Computing with Synaptic and Neuronal Devices

Neuro-inspired computing is a new computing paradigm that emulates the neural network for information processing. To enable the large-scale neuromorphic system, it is important to develop compact…

From  Kathryn Gentilello A month ago 3 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello A month ago 12 views 0  

John Baez - Mathematical Mysteries of the Periodic Table

Why do atoms behave the way they do? Why do electrons form “shells,” as seen in the periodic table? Why does the first shell hold 2 electrons, the second 8, and the third 18: twice the…

From  Kathryn Gentilello A month ago 4 views 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello A month ago 9 views 0