Search for tag: "series"

Rachel Cummings, Swati Gupta, Judy Hoffman, Devan Desai - A Discussion on Fairness in Machine Learning with Georgia Tech Faculty

Fairness in machine learning and artificial intelligence is a hot, and important topic in tech today. Join Georgia Tech faculty members Judy Hoffman, Rachel Cummings, Deven Desai, and Swati Gupta for…

From  Kathryn Gentilello on November 14th, 2019 1 plays 0  

Alexandra Boldyreva - Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUIC

Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of…

From  Kathryn Gentilello on November 13th, 2019 5 plays 0  

Nigel Pedersen - Epilepsy – Beyond the Local Network

While human research has emphasized the large-scale network disruptions in the epilepsies and their co-morbidities, basic science has typically focused on local networks. In rodents, more general…

From  Kathryn Gentilello on November 12th, 2019 3 plays 0  

Keith Duggar - Bringing Intelligent Supply Chain to Life: Practical Paths on Azure

Though building a Connected Intelligent Supply Chain can seem daunting, we say Think Big, Start Small, Move Fast. To that end, the Microsoft Azure ecosystem provides platforms, products, and services…

From  Kathryn Gentilello on November 11th, 2019 12 plays 0  

John Rogers - Semiconductor Nanomaterials for Transient Electronics

A remarkable feature of modern integrated circuit technology is its ability to operate in a stable fashion, with almost perfect reliability, without physical or chemical change. Recently developed…

From  Kathryn Gentilello on October 30th, 2019 22 plays 0  

Arijit Raychowdhury - Machine Learning in Profiled Side-Channel Attacks and Low-Overhead Countermeasures

Computationally secure Cryptographic algorithms, when implemented on physical hardware leak correlated physical signatures (e.g. power supply current, electromagnetic radiation, acoustic, thermal)…

From  Kathryn Gentilello on October 30th, 2019 9 plays 0  

Muhammed Ahmed - NLP Approaches to Campaign Classification

Mailchimp is the world's largest marketing automation platform. Over a billion emails are sent by it every day, which raises the question: what exactly are users sending? We'll do a deep…

From  Kathryn Gentilello on October 30th, 2019 8 plays 0  

Lydia Kallipoliti - History Machines: The Deviant Practice of Inhabiting Information

The tentative term “history machine” is a medium of immersive scholarship lingering between reality and fiction, with which I examine, redesign, and reimagine archives. I see archives,…

From  Kathryn Gentilello on October 29th, 2019 1 plays 0  

Kristen Fichthorn - Shape-Selective Growth of Nanoscale Materials: Insights From Multi-Scale Theory and Simulation

Metal nanocrystals have gained tremendous attention due to their superior performance in various applications, ranging from selective catalysis to electronic devices to plasmonic applications, such…

From  Kathryn Gentilello on October 29th, 2019 1 plays 0  

Ashlee F. Versypt - Multiscale Modeling of Tissues, Treatments, & Toxicology

The Systems Biomedicine and Pharmaceutics research lab at Oklahoma State University led by Dr. Ford Versypt focuses on developing and utilizing multiscale systems engineering approaches including…

From  Kathryn Gentilello on October 25th, 2019 2 plays 0  

Robert Howe - Uniting Robots and Ultrasound for Cardiac Repair

Minimally invasive techniques have revolutionized many areas of surgery, but heart surgery has seen limited progress. We are working to combine ultrasound imaging and robotic manipulation to enable…

From  Kathryn Gentilello on October 25th, 2019 2 plays 0  

Charles Johnson-Bey - Cyber Science: The Third Frontier

Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”;…

From  Kathryn Gentilello on October 23rd, 2019 4 plays 0  

Seth Marder - Applications of Molecular Dopants and Interface Modifiers for Electronic and Opto-Electronic Applications

Organic, hybrid, and 2D materials have attracted interest for electronic applications due to their potential for use in low-cost, large-area, flexible electronic devices. Here we will report on…

From  Kathryn Gentilello on October 17th, 2019 5 plays 0  

Aubrey Kelly - Evolutionarily Conserved Mechanisms of Sociality

There is an extraordinary amount of variation in social behavior within and across species. However, when phenotypic convergence in behavior (e.g., sociality) is observed, it begs the question as to…

From  Kathryn Gentilello on October 17th, 2019 1 plays 0  

Peter Swire - The Growing Importance of the Non-Code Aspects of Cybersecurity

According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity…

From  Kathryn Gentilello on October 15th, 2019 14 plays 0