Search for tag: "lecture"

Brian Kondracki - Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers

Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data…

From  Kathryn Gentilello on September 22nd, 2020 1 plays 0  

Kevin Bock - Automating the Discovery of Censorship Evasion Strategies

Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long…

From  Kathryn Gentilello on September 18th, 2020 2 plays 0  

Redesigning Cities with the Green New Deal

Season 3 Redesigning Cities: the Speedwell Talks @ Georgia Tech kicked off on September 9 with Redesigning Cities with the Green New Deal. Nancy Levinson of Places led the conversation with Billy…

From  Carmen New on September 15th, 2020 6 plays 0  

Ayse Coskun - Cross-layer Optimizations for Building Energy-Efficient 2.5D Systems with Silicon Photonic Networks

The design of today's leading-edge systems is fraught with power, thermal, and variability challenges. The applications in rapidly growing computing domains of cloud and HPC exhibit significant…

From  Kathryn Gentilello on September 10th, 2020 3 plays 0  

Nicholas Weaver - Reflections on Internet Surveillance

Six years ago Edward Snowden leaked a massive trove of internal NSA documents detailing the operation of the US government’s electronic surveillance system. The overall systems described a…

From  Timothy Hynes on April 27th, 2020 74 plays 0  

Wanrong Zhang - Differentially Private Change-point Detection

The change-point detection problem seeks to identify distributional changes in streams of data. Increasingly, tools for change-point detection are applied in settings where data may be highly…

From  Kathryn Gentilello on March 12th, 2020 34 plays 0  

Marcel Wilson - Bionic@X

Bionic is a landscape architecture and urban design practice in founded on the mandate to “enable life” in an increasingly complicated and changing world. After a decade of acting on…

From  Kathryn Gentilello on March 9th, 2020 0 plays 0  

Elizabeth Loftus - The Fiction of Memory

For several decades, Elizabeth Loftus has been manufacturing memories in unsuspecting minds. Sometimes these techniques change details of events that someone actually experienced. Other times, the…

From  Kathryn Gentilello on March 9th, 2020 29 plays 0  

Equity in Architecture Forum: Show, Tell, and Do

Equity in Architecture at Georgia Tech is hosting their second annual Forum. This year's theme is Show, Tell, and Do. Julia Gamolina, our keynote speaker, will speak on gender and minority…

From  Kathryn Gentilello on March 6th, 2020 5 plays 0  

Sarah Myers West - Discriminating Systems: Gender, Race and Power in Artificial Intelligence

The artificial intelligence industry is in the midst of a crisis in diversity and inclusion: while the representation of women in computer science recently fell below levels in the 1960s, inclusion…

From  Kathryn Gentilello on March 3rd, 2020 16 plays 0  

Lisa Yaszek - A Brief History of Nanotechnology in Science Fiction

Physicist Richard Feynman is generally credited with formulating the concepts that seeded nanotechnology in his 1959 talk, “There’s Plenty of Room at the Bottom.” In this talk,…

From  Kathryn Gentilello on March 3rd, 2020 4 plays 0  

Sharbani Pandit - Fighting Voice Spam with a Virtual Assistant

Telephony has been a trusted channel in the past but technological advances have exposed it to abuse that is perpetrated by fraudsters and criminals. Mass robocalls, call source spoofing and voice…

From  Kathryn Gentilello on February 24th, 2020 25 plays 0  

Michael D. Brown - The Impact of Compiler-Based Performance Optimizations on Security

The security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations…

From  Kathryn Gentilello on February 17th, 2020 21 plays 0  

Hong Hu - Space Wars: Exploiting Program (in)Variants for Software Security

The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow…

From  Kathryn Gentilello on February 6th, 2020 17 plays 0  

Juan-Pablo Correa-Baena - Understanding and Designing Interfaces and Defects in Perovskite Solar Cells

Perovskite solar cells promise to yield efficiencies beyond 30% by further improving the quality of the materials and devices. Electronic defect passivation, and suppression of detrimental…

From  Kathryn Gentilello on February 5th, 2020 41 plays 0  

Luong Nguyen - Hardware Trojan detection using the backscattering side channel

Integrated circuits (IC) have become an integral aspect of our lives. Thus, the problem of ensuring authenticity and trust for ICs is critically important, especially for sensitive fields such as…

From  Kathryn Gentilello on February 3rd, 2020 0 plays 0