Lectures and Seminars
Upcoming Events Heading link
Cardinality Estimation: Achilles' Heel of Query Optimizers
Distinguished Lecture Series Heading link
The Department of Computer Science holds an annual series of talks featuring distinguished scientists from across the country. Renowned experts in their fields, these speakers provide an opportunity for faculty and students to keep abreast of some of the latest developments in the ever-evolving landscape that defines the discipline. These lectures are mostly concentrated in the fall semester to allow adequate time for other faculty activities in the spring term.
2024-2025
Ellen Zegura
Georgia Tech University
Responsible Computing
Lorrie Faith Cranor
Carnegie Mellon University
Designing Usable and Useful Privacy Interfaces
Dan Suciu
University of Washington
Cardinality Estimation: Achilles’ Heel of Query Optimizers
2022-2023
Avrim Blum
Toyota Technological Institute at Chicago
On learning in the presence of biased data and strategic behavior
Kristina Lerman
University of Southern California
Bias and Emergent Instabilities in Socially-embedded Algorithms
Pankaj Agarwal
Duke University
Learnability of Selectivity Functions
Jack Dongarra
University of Tennessee
An Overview of High Performance Computing and Future Requirements
Arun Venkataramani
University of Massachusetts at Amherst
On the Importance of Logical Centralization in Network Architecture
Rakesh Vohra
University of Pennsylvania
Will AI and ML make Economics Obsolete?
2020-2021
Andreas Podelski
University of Freiburg
Software Model Checking
1
Rada Mihalcea
University of Michigan
When the Computers Spot the Lie (and People Don’t)
Anna Karlin
University of Washington
Towards an improved approximation algorithm for the Traveling Salesperson Problem
Anders Ynnerman
Linkopping University, Sweden
Visual Science Communication: From the Inside of Mummies to Planets, Stars, and Galaxies
Shriram Krishmanurthi
Brown University
The Role of Computer Science in Computer Science Education
1
Thorsten Joachims
Cornell University
Batch learning from bandit feedback
Hari Balakrishnan
Massachusetts Institute of Technology
Making roads safer with mobile sensing and computing
Valerie E. Taylor
Argonne National Laboratory
Exploring the tradeoffs between execution time, power, and resilience in HPC applications
Avi Wigderson
Princeton University
On the nature of the theory of computation
Aditya Akella
University of Wisconsin at Madison
Putting networks on a firm footing: Revolutionizing network management (and more)
1
Michael Reiter
University of North Carolina at Chapel Hill
Side channels in multi-tenant environments
Mary Czerwinski
Microsoft Research
Lessons learned from designing interventions for health and wellbeing
Sorin Istrail
Brown University
Eric Davidson’s “Regulatory Genome” for computer scientists
Amitabh Varshney
University of Maryland at College Park
Improving medicine, saving lives: Developing visual computing technologies for health care
1
Maria Klawe
Harvey Mudd College
Tech careers and why it matters
Michael Franklin
University of Chicago
A retrospective on the AMPLab and the Berkeley Data Analytica Stack
Sheelagh Carpendale
University of Calgary
Interacting with information through visualization
Douglas Schmidt
Vanderbilt University
The past, present, and future of MOOCs and ther relevance to software engineering
Tom Dietterich
Oregon State University
Anomaly detection: Principles, benchmarking, explanations, and theory
1
Tamara Munzner
University of British Columbia
Visual Analysis and Design
Giovanni Vigna
University of California, Santa Barbara
The Evolution of Malware: From Invasion to Evasion
Hal Abelson
Massachusetts Institute of Technology
From Computational Thinking to Computational Values
David B. Shmoys
Cornell University
The Return of the Traveling Salesman: Approximation Algorithm Design via Randomization and Linear Programming
1
L. Jean Camp
Indiana University
Building Trust By Communicating Risk
Philip A. Bernstein
Microsoft Research
Rethinking Eventual Consistency
David S. Rosenblum
National University of Singapore
Jogging While Driving, and Other Software Engineering Research Problems
Juan E. Gilbert
Clemson University
Changing the Landscape: Voting Rights, Technology and Policy
1
S. “Muthu” Muthukrishnan
Rutgers University
Internet Ad Systems Auctions, Optimizations and Exchanges
Ben Shneiderman
University of Maryland
Information Visualization for Knowledge Discovery
Jon Peha
Carneigie Mellon University
A New Era in Spectrum Management
Mary Jean Harrold
Georgia Institute of Technology
Software Testing: A Roadmap
Julia Hirschberg
Columbia University
What Siri can’t do: Creating Clarification Questions for Spoken Dialogue Systems
Dawn Song
University of California, Berkeley
BitBlaze-WebBlaze-DroidBlaze: Automatic Security Analysis inBinary, Web and Android
1
Anne Condon
University of British Columbia
Some How’s and Why’s of Programming DNA Molecules
Helen Nissenbaum
New York University
A Contextual Approach to Privacy Online
Martin C. Rinard
MIT
Compilers that (Intentionally) Change the Result Your Program Produces
Umesh Dayal
HP Labs
Next Generation Business Intelligence
Rajeev Alur
University of Pennsylvania
Computer Augmented Program Engineering
Michael A. Eisenberg
University of Colorado Boulder
Designing Technologies for Learning: The Move from Cognitive Science to Anthropology
Dan Garcia
University of California, Berkeley
Best Practices and Teaching Tips to Improve CS Education
1
Craig Boutilier
University of Toronto
Computational Social Choice: A Decision-theoretic Perspective
Michel Resnick
MIT
Programming for Everyone: Rethinking Literacy and Creativity for the 21st Century
Karem Sakallah
University of Michigan
Scalable Formal Hardware Verification Through Automatic Abstraction
Joan Feigenbaum
Yale
The DISSENT Approach to Anonymous, Interactive Communication on the Internet
Somesh Jha
University of Wisconsin, Madison
Retrofitting Legacy Code for Security
Michael Goodrich
University of California, Irvine
Turning Privacy Leaks into Floods: Surreptitious Discovery of Social Network Freindships and Other Sensitve Binary Attribute Vectors
1
Mihalis Yannakakis
Columbia University
Computational Aspects of Equilibria
Leora Morgenstern
IBM Watson
Formal Theories of Business Strategy and Narration for Commercial Applications
Hector Garcia-Molina
Stanford
A Social Site for Academic Course Planning and Evaluation
Martha Pollack
Michigan University
Computing Outside the Box
Maurice Herlihy
Brown University
Transactional Memory Today
John Holland
Michigan University
Signals and Boundaries
2008 - 2009
Wesley W. Chu
UCLA
A Knowledge-based Medical Digital Library
Avrim Blum
Carnegie Mellon University
A Computational Theory of Clustering
H. T. Kung
Harvard School of Engineering and Applied Sciences
Use of Ad-hoc Wireless Networks as Backplanes for High-performance Parallel and Distributed Computing
Pierre Boulanger
University of Alberta
An Advanced Collaborative Infrastructure for Real-Time Computational Steering
Edward W. Felten
Princeton University
Electronic Voting: Danger and Opportunity
C. Mohan
IBM Fellow and IBM India Chief Scientis
Global Technology Outlook (GTO)
1
Mary Lou Soffa
University of Virginia
Path-Sensitive Analysis for Security Flaws
Sartaj Sahni
University of Florida
Data Structures and Algorithms for Packet Forwarding and Classification
Mary Beth Rosson,
Penn State University
When Users Do the Programming: Challenges and Opportunities for End User Software Engineering
Bart Selman
Cornell University
The Challenge and Promise of Automated Reasoning
Leslie Pack Kaelbling
Massachusetts Institute of Technology
Learning to Think about the World
1
Prabhakar Raghavan,
Yahoo! Research
Web Search – from Information Retrieval to Microeconomic Modeling
Susan Dumais,
Microsoft Research
Information Retrieval in Context
Victor R. Basili,
University of Maryland
The Role of Empirical Study in High End Computing
Jeannette M. Wing,
Carnegie Mellon University
Automatic Generation and Analysis of Attack Graphs
Ravi Sandhu
George Mason University
The Secure Information Sharing Problem and Solution Approaches
Marc Snir
University of Illinois at Urbana-Champaign
Parallel Programming Models and Languages
1
Richard M. Stallman,
GNU project and Free Software Foundation
The Free Software Movement and the GNU/Linux Operating System
David Harel
The Weizmann Institute of Science
On Comprehensive Biological Modeling: Some Ruminations on the What, the How and the Why
Yechiam Yemini
Columbia University
IS THERE LIFE AFTER THE INTERNET?
Richard Karp,
University of California, Berkeley
Geometric Optics, Linear Programming and Congestion in Sensornets
Elaine Weyuker
AT&T Fellow
I know where you’re Hiding
Jared Saia
University of New Mexico
Secure Algorithms and Data Structures for Massive Networks
Carlo Ghezzi
Politecnico di Milano
Towards open, dynamic software processes and products: achievements and challenges
Tuesday, November 1, 2005, 11:00 a.m., Room 1000 SEO
Yvonne Rogers
Indiana University
Grown-Up Science: Enabling Students to Learn How to Become Scientists Through Using Pervasive Technologies
2004 - 2005
Andrew C. Yao
Tsinghua University
Quantum Complexity: How Fast Can Quantum Computers Sort?
Aravind K. Joshi,
University of Pennsylvania
Discourse connectives and their argument structure: Some aspects of transition from sentence structure to discourse structure
Aravind K. Joshi
University of Pennsylvania
Discourse connectives and their argument structure: Some aspects of transition from sentence structure to discourse structure
Moshe Vardi
Rice University
And Logic Begat Computer Science: When Giants Roamed the Earth
M. Frans Kaashoek,
Massachusetts Institute of Technology
PEER-TO-PEER COMPUTING RESEARCH: A FAD?
Leslie Lamport
Microsoft Research
Thinking for Programmers
Tiziana Catarci
University di Roma
“Searching for good quality data? Trust us”
Janet L. Kolodner
Georgia Institute of Technology
From Case-Based Reasoning to Learning by Design to Design of Technology for Learning
Other Lectures and Seminars Heading link
The department also holds other lectures and seminars, some of which are delivered by experts visiting from outside UIC and others of which showcase scholarship produced at UIC’s College of Engineering. The sections below summarize the presenters in these categories for each academic year.
1
Distinguished Computer Science Educator Lecture
Beth Simon
University of California, San Diego
How We Teach Impacts Students’ Learning, Performance, and Persistence: Results from Three Recent Studies of Peer Instruction in Computer Science
1
Distinguished Computer Science Educator Lecture
Dan Garcia
University of California, Berkeley
2009 - 2010
Tim Hinrichs
University of Chicago
Collaborative Programming
Ed Reingold
Illinois Institute of Technology
Lower Bounds for Cops and Robber Pursuit
Dr. Yaser Sheikh
Carnegie Mellon University
Recovering the Structure of Dynamic Scenes from Moving Cameras
1
Sonia Bergamaschi
University of Modena & Reggio Emilia
The MOMIS Data Integration System
Ling Liu
Georgia Institute of Technology
Location Privacy in Location-Aware Computing
Gyorgy Turan
Schwartz Lemma and Applications
Jose Zagal
Georgia Tech
Supporting Learning about Games
Leilah Lyons
University of Michigan
Playing Together at the Museum: Preliminary Results on Factors Affecting Participation in a Multi-User Software-Based Exhibit
Ben Shapiro
Northwestern University
Design Research from the Bottom Up: New Infrastructure for School Reform
Jared Saia
University of New Mexico
Attack-Resistant Networks
John Reppy
University of Chicago
Parallel Concurrent ML
Dr. Zahir Tari
RMIT University, Melbourne, Australia
Dynamic Load Balancing for Systems Under Heavy Traffic and High Task Variation
Teresa Przytycka
NCBI/NLM/NIH
Application of combinatorial optimization to prediction of domain-domain interactions
Hanan Samet
University of Maryland
Spatial Databases and Geographic Information Systems
Neil Daswani
Google
Emerging Security Vulnerabilities & the Impact to Business
Matthias Trier
Technical University Berlin, Germany
Exploring Patterns of dynamic Networks with event-based Visualization and Analysis
Mahesh Viswanathan
University of Illinois at Urbana-Champaign
Learning to Verify
Amit P. Sheth
Wright State University
Relationship Web: Spinning the Semantic Web from Trailblazing to Complex Hypothesis Evaluation
2006 - 2007
Carl Landwehr
Disruptive Technology Office, CASL
Disruptive Technologies for Information Assurance
Kartik Gopalan
SUNY Binghamton
MemX: Supporting Large Memory Applications in Xen Virtual Machines
Sorin Draghici
Wayne State University
A Systems Biology Approach to Pathway Analysis
Mona Singh
Princeton University
Analyzing and Interrogating Protein Interaction Maps
Roxana Girju
University of Illinois at Urbana-Champaign
Improving the Interpretation of Noun Phrases with Cross-linguistic Information
Thomas Messerges
Motorola Research Main/Labs
Security for Mobile Financial Applications
Magdi A. Mohamed
Motorola Research Main/Labs
Computational Intelligence and Q-filter Structures
Lenore Zuck
University of Illinois at Chicago
Automatic Verification of Parameterized Systems
David Zavattero
City of Chicago Office of Emergency Management and Communications
ITS initiatives nationally and locally and the building of the Chicago TMC
Chris Quintana
University of Michigan
Designing for Learning…Learning about Design The Interplay Between HCI and the Learning Sciences
Deborah Tatar
Virginia Polytechnic Institute and State University
Practice Into Theory: from serious work about learning in classroom environments to serious questions about the playful nature of control and coordination in computing
Ryan S. J. d. Baker
University of Nottingham
Detecting and Adapting to When Students Game the System
Brian K. Smith
The Pennsylvania State University
Acts into Artifacts: Computational Tools to Support Experience Capture and Reflection
Luis von Ahn
Carnegie Mellon University
Human Computation
Erik Meijer
Microsoft
VB Is Not C#
2005 - 2006
Samir Khuller
University of Maryland
Algorithms for Data Management and Migration
Kathleen M. Carley
Carnegie Mellon University
Dynamic Network Analysis: A Computational Approach to Counter Terrorism Analyses
Edward Reingold
Illinois Institute of Technology
Determining Plurality
Jennifer Golbeck
University of Maryland
Web-based Social Network Analysis for Socially Intelligent Applications
Jinbo Xu
University of Chicago
A Parameterized Algorithm for Protein Structure Alignment
Der-Horng Lee
National University of Singapore
Deployment and Innovation of Intelligent Transportation Systems in Singapore
2004 - 2005
Lin Cai
University of Waterloo
Transport layer protocol design for multimedia wireless Internet
Raj Jain
Nayna Networks, Inc.
Computer Networking: Recent Developments, Trends, and Issues
Riccardo Pucella
Cornell University
A Knowledge-Based Foundation for Security
Lance Fortnow
University of Chicago
The Complexity of Information Markets
John Langford
TTI-Chicago
Fast Exact High Dimensional Nearest Neighbors in Arbitrary Dimensions with a Cover Tree
Ray DeCarlo
Purdue University
Software Release Control using Defect Based Quality Estimation
Chris Ding
Lawrence Berkeley National Laboratory
Link Analysis and Topic Discovery via Spectral Clustering
Paul Dan Cristea
University of Bucharest
Genomic Signal Analysis and Processing
2003 - 2004
Tao Jiang
University of California
Efficient Rule-Based Haplotype Inference on Pedigrees
Marianne Winslett
University of Illinois at Urbana-Champaign
An Introduction to Trust Negotiation
Tanya Berger-Wolf
University of New Mexico
How to See a Tree for a Forest? Combining Phylogenetic Trees: Reasons, Methods, and Consequences
Tiffani L. Williams
University of New Mexico
Phylogeny Reconstruction and Experimental Algorithmics
Mark Guzdial
Georgia Institute of Technology
Collaborative Dynabooks: A Research Agenda on Building Systems to Support Learning through Multimedia