Search for tag: "lecture"

Nga Lee (Sally) Ng - Atmospheric Organic Aerosols: Sources, Chemistry, and Health Impacts

Organic aerosols constitute a significant fraction of submicron fine particulate matter (PM) in the atmosphere. Secondary organic aerosols (SOA) formed from condensation of low-volatility species…

From  Kathryn Gentilello on December 6th, 2019 0 plays 0  

Omar Alrawi - Security Evaluation of Home-Based IoT Deployments

Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by…

From  Kathryn Gentilello on November 22nd, 2019 5 plays 0  

Margaret Kosal - The Geopolitics of the Rare and Not-So-Rare Elements

Chemical elements have played important roles in the geopolitics of modern times and will continue to do so.From Einstein’s 1939 letter to President Franklin D. Roosevelt highlighting the need…

From  Kathryn Gentilello on November 20th, 2019 6 plays 0  

Mary Lou Soffa - Software Testing: And the Challenges (and Opportunities) Keep Coming!

Disruptive shifts in software application types and software development environments create challenges to software testing that need to be addressed to ensure software quality and reduce the cost of…

From  Kathryn Gentilello on November 18th, 2019 8 plays 0  

Nader Sehatbakhsh - Leveraging Side-Channel Signals for Security and Trust

With the proliferation of computing systems in our world, from servers to internet-of-things devices, side-channel signals have become significantly more available and accessible to measure and…

From  Kathryn Gentilello on November 18th, 2019 8 plays 0  

Peter S. Dodds - The Science of Stories: Measuring and Exploring the Ecology of Human Stories with Lexical Instruments

I will survey our efforts at the Computational Story Lab to measure and study a wide array of social and cultural phenomena using “lexical meters” — online, interactive instruments…

From  Kathryn Gentilello on November 14th, 2019 7 plays 0  

Alexandra Boldyreva - Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUIC

Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of…

From  Kathryn Gentilello on November 13th, 2019 12 plays 0  

Takamitsu “Taka” Ito - Turning Sour, Bloated, and Out of Breath: Ocean Chemistry under Global Warming

In 1997, the Japanese oceanographer Yoshiyuki Nozaki compiled a periodic table of ocean chemistry, encapsulating the distribution of elements as a function of depth. In this periodic table, many…

From  Kathryn Gentilello on November 13th, 2019 3 plays 0  

John Wise, Gongjie Li - Cosmology and Exoplanets: Unpacking the 2019 Nobel Prize in Physics

Cosmology studies the universe at the largest scales, applying the laws of physics over billions of light years and all the way back to the universe's infancy. In dozens of groundbreaking…

From  Kathryn Gentilello on November 7th, 2019 9 plays 0  

John Rogers - Semiconductor Nanomaterials for Transient Electronics

A remarkable feature of modern integrated circuit technology is its ability to operate in a stable fashion, with almost perfect reliability, without physical or chemical change. Recently developed…

From  Kathryn Gentilello on October 30th, 2019 38 plays 0  

Arijit Raychowdhury - Machine Learning in Profiled Side-Channel Attacks and Low-Overhead Countermeasures

Computationally secure Cryptographic algorithms, when implemented on physical hardware leak correlated physical signatures (e.g. power supply current, electromagnetic radiation, acoustic, thermal)…

From  Kathryn Gentilello on October 30th, 2019 10 plays 0  

Lydia Kallipoliti - History Machines: The Deviant Practice of Inhabiting Information

The tentative term “history machine” is a medium of immersive scholarship lingering between reality and fiction, with which I examine, redesign, and reimagine archives. I see archives,…

From  Kathryn Gentilello on October 29th, 2019 1 plays 0  

David Hu - Cube-Shaped Poo and Georgia Tech's Second Ig Nobel Prize

How does a wombat produce cube-shaped feces? How long does it take an elephant to urinate? Answering these two questions have landed David Hu two Ig Nobel Prizes, awards given at Harvard University…

From  Kathryn Gentilello on October 25th, 2019 3 plays 0  

Charles Johnson-Bey - Cyber Science: The Third Frontier

Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”;…

From  Kathryn Gentilello on October 23rd, 2019 6 plays 0  

Seth Marder - Applications of Molecular Dopants and Interface Modifiers for Electronic and Opto-Electronic Applications

Organic, hybrid, and 2D materials have attracted interest for electronic applications due to their potential for use in low-cost, large-area, flexible electronic devices. Here we will report on…

From  Kathryn Gentilello on October 17th, 2019 7 plays 0  

Peter Swire - The Growing Importance of the Non-Code Aspects of Cybersecurity

According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity…

From  Kathryn Gentilello on October 15th, 2019 15 plays 0