Lectures and Seminars

Upcoming Events Heading link

Nov 7 2024

Cardinality Estimation: Achilles' Heel of Query Optimizers

Thursday, 11:00 am–12:00 pm
SEO 1000

Distinguished Lecture Series Heading link

The Department of Computer Science holds an annual series of talks featuring distinguished scientists from across the country. Renowned experts in their fields, these speakers provide an opportunity for faculty and students to keep abreast of some of the latest developments in the ever-evolving landscape that defines the discipline. These lectures are mostly concentrated in the fall semester to allow adequate time for other faculty activities in the spring term.

Ellen Zegura
Georgia Tech University
Responsible Computing

Lorrie Faith Cranor
Carnegie Mellon University
Designing Usable and Useful Privacy Interfaces

Dan Suciu
University of Washington
Cardinality Estimation: Achilles’ Heel of Query Optimizers

 

 

 

Avrim Blum
Toyota Technological Institute at Chicago
On learning in the presence of biased data and strategic behavior

Kristina Lerman
University of Southern California
Bias and Emergent Instabilities in Socially-embedded Algorithms

Pankaj Agarwal
Duke University
Learnability of Selectivity Functions

Jack Dongarra
University of Tennessee
An Overview of High Performance Computing and Future Requirements

Arun Venkataramani
University of Massachusetts at Amherst
On the Importance of Logical Centralization in Network Architecture

Rakesh Vohra
University of Pennsylvania
Will AI and ML make Economics Obsolete?

Andreas Podelski
University of Freiburg
Software Model Checking

Rada Mihalcea
University of Michigan
When the Computers Spot the Lie (and People Don’t)

Anna Karlin 
University of Washington 
Towards an improved approximation algorithm for the Traveling Salesperson Problem

Anders Ynnerman
Linkopping University, Sweden
Visual Science Communication: From the Inside of Mummies to Planets, Stars, and Galaxies

Shriram Krishmanurthi
Brown University
The Role of Computer Science in Computer Science Education

Thorsten Joachims
Cornell University
Batch learning from bandit feedback

Hari Balakrishnan
Massachusetts Institute of Technology
Making roads safer with mobile sensing and computing

Valerie E. Taylor
Argonne National Laboratory
Exploring the tradeoffs between execution time, power, and resilience in HPC applications

Avi Wigderson
Princeton University
On the nature of the theory of computation

Aditya Akella
University of Wisconsin at Madison
Putting networks on a firm footing: Revolutionizing network management (and more)

Michael Reiter
University of North Carolina at Chapel Hill
Side channels in multi-tenant environments

Mary Czerwinski
Microsoft Research
Lessons learned from designing interventions for health and wellbeing

Sorin Istrail
Brown University
Eric Davidson’s “Regulatory Genome” for computer scientists

Amitabh Varshney
University of Maryland at College Park
Improving medicine, saving lives: Developing visual computing technologies for health care

Maria Klawe
Harvey Mudd College
Tech careers and why it matters

Michael Franklin
University of Chicago
A retrospective on the AMPLab and the Berkeley Data Analytica Stack

Sheelagh Carpendale
University of Calgary
Interacting with information through visualization

Douglas Schmidt
Vanderbilt University
The past, present, and future of MOOCs and ther relevance to software engineering

Tom Dietterich
Oregon State University
Anomaly detection: Principles, benchmarking, explanations, and theory

Tamara Munzner
University of British Columbia
Visual Analysis and Design

Giovanni Vigna
University of California, Santa Barbara
The Evolution of Malware: From Invasion to Evasion

Hal Abelson
Massachusetts Institute of Technology
From Computational Thinking to Computational Values

David B. Shmoys
Cornell University
The Return of the Traveling Salesman: Approximation Algorithm Design via Randomization and Linear Programming

 

L. Jean Camp
Indiana University
Building Trust By Communicating Risk

Philip A. Bernstein
Microsoft Research
Rethinking Eventual Consistency

David S. Rosenblum
National University of Singapore
Jogging While Driving, and Other Software Engineering Research Problems

Juan E. Gilbert
Clemson University
Changing the Landscape: Voting Rights, Technology and Policy

 

S. “Muthu” Muthukrishnan
Rutgers University
Internet Ad Systems Auctions, Optimizations and Exchanges

Ben Shneiderman
University of Maryland
Information Visualization for Knowledge Discovery

Jon Peha
Carneigie Mellon University
A New Era in Spectrum Management

Mary Jean Harrold
Georgia Institute of Technology
Software Testing: A Roadmap

Julia Hirschberg
Columbia University
What Siri can’t do: Creating Clarification Questions for Spoken Dialogue Systems

Dawn Song
University of California, Berkeley
BitBlaze-WebBlaze-DroidBlaze: Automatic Security Analysis inBinary, Web and Android

Anne Condon
University of British Columbia
Some How’s and Why’s of Programming DNA Molecules

Helen Nissenbaum
New York University
A Contextual Approach to Privacy Online

Martin C. Rinard
MIT
Compilers that (Intentionally) Change the Result Your Program Produces

Umesh Dayal
HP Labs
Next Generation Business Intelligence

Rajeev Alur
University of Pennsylvania
Computer Augmented Program Engineering

Michael A. Eisenberg
University of Colorado Boulder
Designing Technologies for Learning: The Move from Cognitive Science to Anthropology

Dan Garcia
University of California, Berkeley
Best Practices and Teaching Tips to Improve CS Education

Craig Boutilier
University of Toronto
Computational Social Choice: A Decision-theoretic Perspective

Michel Resnick
MIT
Programming for Everyone: Rethinking Literacy and Creativity for the 21st Century

Karem Sakallah
University of Michigan
Scalable Formal Hardware Verification Through Automatic Abstraction

Joan Feigenbaum
Yale
The DISSENT Approach to Anonymous, Interactive Communication on the Internet

Somesh Jha
University of Wisconsin, Madison
Retrofitting Legacy Code for Security

Michael Goodrich
University of California, Irvine
Turning Privacy Leaks into Floods: Surreptitious Discovery of Social Network Freindships and Other Sensitve Binary Attribute Vectors

 

Mihalis Yannakakis
Columbia University
Computational Aspects of Equilibria

Leora Morgenstern
IBM Watson
Formal Theories of Business Strategy and Narration for Commercial Applications

Hector Garcia-Molina
Stanford
A Social Site for Academic Course Planning and Evaluation

Martha Pollack
Michigan University
Computing Outside the Box

Maurice Herlihy
Brown University
Transactional Memory Today

John Holland
Michigan University
Signals and Boundaries

Wesley W. Chu
UCLA
A Knowledge-based Medical Digital Library

Avrim Blum
Carnegie Mellon University
A Computational Theory of Clustering

H. T. Kung
Harvard School of Engineering and Applied Sciences
Use of Ad-hoc Wireless Networks as Backplanes for High-performance Parallel and Distributed Computing

Pierre Boulanger
University of Alberta
An Advanced Collaborative Infrastructure for Real-Time Computational Steering

Edward W. Felten
Princeton University
Electronic Voting: Danger and Opportunity

C. Mohan
IBM Fellow and IBM India Chief Scientis
Global Technology Outlook (GTO)

Mary Lou Soffa
University of Virginia
Path-Sensitive Analysis for Security Flaws

Sartaj Sahni
University of Florida
Data Structures and Algorithms for Packet Forwarding and Classification

Mary Beth Rosson,
Penn State University
When Users Do the Programming: Challenges and Opportunities for End User Software Engineering

Bart Selman
Cornell University
The Challenge and Promise of Automated Reasoning

Leslie Pack Kaelbling
Massachusetts Institute of Technology
Learning to Think about the World

Prabhakar Raghavan,
Yahoo! Research
Web Search – from Information Retrieval to Microeconomic Modeling

Susan Dumais,
Microsoft Research
Information Retrieval in Context

Victor R. Basili,
University of Maryland
The Role of Empirical Study in High End Computing

Jeannette M. Wing,
Carnegie Mellon University
Automatic Generation and Analysis of Attack Graphs

Ravi Sandhu
George Mason University
The Secure Information Sharing Problem and Solution Approaches

Marc Snir
University of Illinois at Urbana-Champaign
Parallel Programming Models and Languages

Richard M. Stallman,
GNU project and Free Software Foundation
The Free Software Movement and the GNU/Linux Operating System

David Harel
The Weizmann Institute of Science
On Comprehensive Biological Modeling: Some Ruminations on the What, the How and the Why

Yechiam Yemini
Columbia University
IS THERE LIFE AFTER THE INTERNET?

Richard Karp,
University of California, Berkeley
Geometric Optics, Linear Programming and Congestion in Sensornets

Elaine Weyuker
AT&T Fellow
I know where you’re Hiding

Jared Saia
University of New Mexico
Secure Algorithms and Data Structures for Massive Networks

Carlo Ghezzi 
Politecnico di Milano
Towards open, dynamic software processes and products: achievements and challenges
Tuesday, November 1, 2005, 11:00 a.m., Room 1000 SEO

Yvonne Rogers
Indiana University
Grown-Up Science: Enabling Students to Learn How to Become Scientists Through Using Pervasive Technologies

Andrew C. Yao 
Tsinghua University
Quantum Complexity: How Fast Can Quantum Computers Sort?

Aravind K. Joshi,
University of Pennsylvania
Discourse connectives and their argument structure: Some aspects of transition from sentence structure to discourse structure

Aravind K. Joshi
University of Pennsylvania
Discourse connectives and their argument structure: Some aspects of transition from sentence structure to discourse structure

Moshe Vardi
Rice University
And Logic Begat Computer Science: When Giants Roamed the Earth

M. Frans Kaashoek,
Massachusetts Institute of Technology
PEER-TO-PEER COMPUTING RESEARCH: A FAD?

Leslie Lamport
Microsoft Research
Thinking for Programmers

Tiziana Catarci 
University di Roma
“Searching for good quality data? Trust us”

Janet L. Kolodner
Georgia Institute of Technology
From Case-Based Reasoning to Learning by Design to Design of Technology for Learning

Other Lectures and Seminars Heading link

The department also holds other lectures and seminars, some of which are delivered by experts visiting from outside UIC and others of which showcase scholarship produced at UIC’s College of Engineering. The sections below summarize the presenters in these categories for each academic year.

Distinguished Computer Science Educator Lecture

Beth Simon
University of California, San Diego
How We Teach Impacts Students’ Learning, Performance, and Persistence: Results from Three Recent Studies of Peer Instruction in Computer Science

Distinguished Computer Science Educator Lecture

Dan Garcia
University of California, Berkeley

Tim Hinrichs
University of Chicago
Collaborative Programming

Ed Reingold
Illinois Institute of Technology
Lower Bounds for Cops and Robber Pursuit

Dr. Yaser Sheikh
Carnegie Mellon University
Recovering the Structure of Dynamic Scenes from Moving Cameras

Sonia Bergamaschi
University of Modena & Reggio Emilia
The MOMIS Data Integration System

Ling Liu
Georgia Institute of Technology
Location Privacy in Location-Aware Computing

Gyorgy Turan
Schwartz Lemma and Applications

Jose Zagal 
Georgia Tech
Supporting Learning about Games

Leilah Lyons
University of Michigan
Playing Together at the Museum: Preliminary Results on Factors Affecting Participation in a Multi-User Software-Based Exhibit

Ben Shapiro
Northwestern University
Design Research from the Bottom Up: New Infrastructure for School Reform

Jared Saia
University of New Mexico
Attack-Resistant Networks

John Reppy 
University of Chicago
Parallel Concurrent ML

Dr. Zahir Tari
RMIT University, Melbourne, Australia
Dynamic Load Balancing for Systems Under Heavy Traffic and High Task Variation

Teresa Przytycka
NCBI/NLM/NIH
Application of combinatorial optimization to prediction of domain-domain interactions

Hanan Samet
University of Maryland
Spatial Databases and Geographic Information Systems

Neil Daswani
Google
Emerging Security Vulnerabilities & the Impact to Business

Matthias Trier
Technical University Berlin, Germany
Exploring Patterns of dynamic Networks with event-based Visualization and Analysis

Mahesh Viswanathan
University of Illinois at Urbana-Champaign
Learning to Verify

Amit P. Sheth
Wright State University
Relationship Web: Spinning the Semantic Web from Trailblazing to Complex Hypothesis Evaluation

Carl Landwehr 
Disruptive Technology Office, CASL
Disruptive Technologies for Information Assurance

Kartik Gopalan
SUNY Binghamton
MemX: Supporting Large Memory Applications in Xen Virtual Machines

Sorin Draghici 
Wayne State University
A Systems Biology Approach to Pathway Analysis

Mona Singh 
Princeton University
Analyzing and Interrogating Protein Interaction Maps

Roxana Girju
University of Illinois at Urbana-Champaign
Improving the Interpretation of Noun Phrases with Cross-linguistic Information

Thomas Messerges
Motorola Research Main/Labs
Security for Mobile Financial Applications

Magdi A. Mohamed 
Motorola Research Main/Labs
Computational Intelligence and Q-filter Structures

Lenore Zuck
University of Illinois at Chicago
Automatic Verification of Parameterized Systems

David Zavattero
City of Chicago Office of Emergency Management and Communications
ITS initiatives nationally and locally and the building of the Chicago TMC

Chris Quintana
University of Michigan
Designing for Learning…Learning about Design The Interplay Between HCI and the Learning Sciences

Deborah Tatar
Virginia Polytechnic Institute and State University
Practice Into Theory: from serious work about learning in classroom environments to serious questions about the playful nature of control and coordination in computing

Ryan S. J. d. Baker
University of Nottingham
Detecting and Adapting to When Students Game the System

Brian K. Smith
The Pennsylvania State University
Acts into Artifacts: Computational Tools to Support Experience Capture and Reflection

Luis von Ahn
Carnegie Mellon University
Human Computation

Erik Meijer
Microsoft
VB Is Not C#

Samir Khuller 
University of Maryland
Algorithms for Data Management and Migration

Kathleen M. Carley
Carnegie Mellon University
Dynamic Network Analysis: A Computational Approach to Counter Terrorism Analyses

Edward Reingold
Illinois Institute of Technology
Determining Plurality

Jennifer Golbeck
University of Maryland
Web-based Social Network Analysis for Socially Intelligent Applications

Jinbo Xu
University of Chicago
A Parameterized Algorithm for Protein Structure Alignment

Der-Horng Lee
National University of Singapore
Deployment and Innovation of Intelligent Transportation Systems in Singapore

Lin Cai
University of Waterloo
Transport layer protocol design for multimedia wireless Internet

Raj Jain
Nayna Networks, Inc.
Computer Networking: Recent Developments, Trends, and Issues

Riccardo Pucella
Cornell University
A Knowledge-Based Foundation for Security

Lance Fortnow 
University of Chicago
The Complexity of Information Markets

John Langford
TTI-Chicago
Fast Exact High Dimensional Nearest Neighbors in Arbitrary Dimensions with a Cover Tree

Ray DeCarlo
Purdue University
Software Release Control using Defect Based Quality Estimation

Chris Ding
Lawrence Berkeley National Laboratory
Link Analysis and Topic Discovery via Spectral Clustering

Paul Dan Cristea
University of Bucharest
Genomic Signal Analysis and Processing

Tao Jiang
University of California
Efficient Rule-Based Haplotype Inference on Pedigrees

Marianne Winslett
University of Illinois at Urbana-Champaign
An Introduction to Trust Negotiation

Tanya Berger-Wolf
University of New Mexico
How to See a Tree for a Forest? Combining Phylogenetic Trees: Reasons, Methods, and Consequences

Tiffani L. Williams
University of New Mexico
Phylogeny Reconstruction and Experimental Algorithmics

Mark Guzdial 
Georgia Institute of Technology
Collaborative Dynabooks: A Research Agenda on Building Systems to Support Learning through Multimedia