Lectures and Seminars
Upcoming Events Heading link
Distinguished Lecture Series Heading link
The Department of Computer Science holds an annual series of talks featuring distinguished scientists from across the country. Renowned experts in their fields, these speakers provide an opportunity for faculty and students to keep abreast of some of the latest developments in the ever-evolving landscape that defines the discipline. These lectures are mostly concentrated in the fall semester to allow adequate time for other faculty activities in the spring term.
-
2022-2023
Avrim Blum
Toyota Technological Institute at Chicago
On learning in the presence of biased data and strategic behaviorKristina Lerman
University of Southern California
Bias and Emergent Instabilities in Socially-embedded AlgorithmsPankaj Agarwal
Duke University
Learnability of Selectivity FunctionsJack Dongarra
University of Tennessee
An Overview of High Performance Computing and Future RequirementsArun Venkataramani
University of Massachusetts at Amherst
On the Importance of Logical Centralization in Network ArchitectureRakesh Vohra
University of Pennsylvania
Will AI and ML make Economics Obsolete? -
2020-2021
Andreas Podelski
University of Freiburg
Software Model Checking -
1
Rada Mihalcea
University of Michigan
When the Computers Spot the Lie (and People Don’t)Anna Karlin
University of Washington
Towards an improved approximation algorithm for the Traveling Salesperson ProblemAnders Ynnerman
Linkopping University, Sweden
Visual Science Communication: From the Inside of Mummies to Planets, Stars, and GalaxiesShriram Krishmanurthi
Brown University
The Role of Computer Science in Computer Science Education -
1
Thorsten Joachims
Cornell University
Batch learning from bandit feedbackHari Balakrishnan
Massachusetts Institute of Technology
Making roads safer with mobile sensing and computingValerie E. Taylor
Argonne National Laboratory
Exploring the tradeoffs between execution time, power, and resilience in HPC applicationsAvi Wigderson
Princeton University
On the nature of the theory of computationAditya Akella
University of Wisconsin at Madison
Putting networks on a firm footing: Revolutionizing network management (and more) -
1
Michael Reiter
University of North Carolina at Chapel Hill
Side channels in multi-tenant environmentsMary Czerwinski
Microsoft Research
Lessons learned from designing interventions for health and wellbeingSorin Istrail
Brown University
Eric Davidson’s “Regulatory Genome” for computer scientistsAmitabh Varshney
University of Maryland at College Park
Improving medicine, saving lives: Developing visual computing technologies for health care -
1
Maria Klawe
Harvey Mudd College
Tech careers and why it mattersMichael Franklin
University of Chicago
A retrospective on the AMPLab and the Berkeley Data Analytica StackSheelagh Carpendale
University of Calgary
Interacting with information through visualizationDouglas Schmidt
Vanderbilt University
The past, present, and future of MOOCs and ther relevance to software engineeringTom Dietterich
Oregon State University
Anomaly detection: Principles, benchmarking, explanations, and theory -
1
Tamara Munzner
University of British Columbia
Visual Analysis and DesignGiovanni Vigna
University of California, Santa Barbara
The Evolution of Malware: From Invasion to EvasionHal Abelson
Massachusetts Institute of Technology
From Computational Thinking to Computational ValuesDavid B. Shmoys
Cornell University
The Return of the Traveling Salesman: Approximation Algorithm Design via Randomization and Linear Programming -
1
L. Jean Camp
Indiana University
Building Trust By Communicating RiskPhilip A. Bernstein
Microsoft Research
Rethinking Eventual ConsistencyDavid S. Rosenblum
National University of Singapore
Jogging While Driving, and Other Software Engineering Research Problems
Juan E. Gilbert
Clemson University
Changing the Landscape: Voting Rights, Technology and Policy
-
1
S. “Muthu” Muthukrishnan
Rutgers University
Internet Ad Systems Auctions, Optimizations and ExchangesBen Shneiderman
University of Maryland
Information Visualization for Knowledge Discovery
Jon Peha
Carneigie Mellon University
A New Era in Spectrum Management
Mary Jean Harrold
Georgia Institute of Technology
Software Testing: A RoadmapJulia Hirschberg
Columbia University
What Siri can’t do: Creating Clarification Questions for Spoken Dialogue Systems
Dawn Song
University of California, Berkeley
BitBlaze-WebBlaze-DroidBlaze: Automatic Security Analysis inBinary, Web and Android -
1
Anne Condon
University of British Columbia
Some How’s and Why’s of Programming DNA MoleculesHelen Nissenbaum
New York University
A Contextual Approach to Privacy Online
Martin C. Rinard
MIT
Compilers that (Intentionally) Change the Result Your Program Produces
Umesh Dayal
HP Labs
Next Generation Business IntelligenceRajeev Alur
University of Pennsylvania
Computer Augmented Program Engineering
Michael A. Eisenberg
University of Colorado Boulder
Designing Technologies for Learning: The Move from Cognitive Science to Anthropology
Dan Garcia
University of California, Berkeley
Best Practices and Teaching Tips to Improve CS Education -
1
Craig Boutilier
University of Toronto
Computational Social Choice: A Decision-theoretic Perspective
Michel Resnick
MIT
Programming for Everyone: Rethinking Literacy and Creativity for the 21st Century
Karem Sakallah
University of Michigan
Scalable Formal Hardware Verification Through Automatic Abstraction
Joan Feigenbaum
Yale
The DISSENT Approach to Anonymous, Interactive Communication on the Internet
Somesh Jha
University of Wisconsin, Madison
Retrofitting Legacy Code for Security
Michael Goodrich
University of California, Irvine
Turning Privacy Leaks into Floods: Surreptitious Discovery of Social Network Freindships and Other Sensitve Binary Attribute Vectors
-
1
Mihalis Yannakakis
Columbia University
Computational Aspects of Equilibria
Leora Morgenstern
IBM Watson
Formal Theories of Business Strategy and Narration for Commercial Applications
Hector Garcia-Molina
Stanford
A Social Site for Academic Course Planning and EvaluationMartha Pollack
Michigan University
Computing Outside the Box
Maurice Herlihy
Brown University
Transactional Memory Today
John Holland
Michigan University
Signals and Boundaries
-
2008 - 2009
Wesley W. Chu
UCLA
A Knowledge-based Medical Digital Library
Avrim Blum
Carnegie Mellon University
A Computational Theory of ClusteringH. T. Kung
Harvard School of Engineering and Applied Sciences
Use of Ad-hoc Wireless Networks as Backplanes for High-performance Parallel and Distributed Computing
Pierre Boulanger
University of Alberta
An Advanced Collaborative Infrastructure for Real-Time Computational Steering
Edward W. Felten
Princeton University
Electronic Voting: Danger and Opportunity
C. Mohan
IBM Fellow and IBM India Chief Scientis
Global Technology Outlook (GTO) -
1
Mary Lou Soffa
University of Virginia
Path-Sensitive Analysis for Security FlawsSartaj Sahni
University of Florida
Data Structures and Algorithms for Packet Forwarding and ClassificationMary Beth Rosson,
Penn State University
When Users Do the Programming: Challenges and Opportunities for End User Software Engineering
Bart Selman
Cornell University
The Challenge and Promise of Automated ReasoningLeslie Pack Kaelbling
Massachusetts Institute of Technology
Learning to Think about the World -
1
Prabhakar Raghavan,
Yahoo! Research
Web Search – from Information Retrieval to Microeconomic ModelingSusan Dumais,
Microsoft Research
Information Retrieval in ContextVictor R. Basili,
University of Maryland
The Role of Empirical Study in High End ComputingJeannette M. Wing,
Carnegie Mellon University
Automatic Generation and Analysis of Attack GraphsRavi Sandhu
George Mason University
The Secure Information Sharing Problem and Solution ApproachesMarc Snir
University of Illinois at Urbana-Champaign
Parallel Programming Models and Languages -
1
Richard M. Stallman,
GNU project and Free Software Foundation
The Free Software Movement and the GNU/Linux Operating SystemDavid Harel
The Weizmann Institute of Science
On Comprehensive Biological Modeling: Some Ruminations on the What, the How and the WhyYechiam Yemini
Columbia University
IS THERE LIFE AFTER THE INTERNET?Richard Karp,
University of California, Berkeley
Geometric Optics, Linear Programming and Congestion in SensornetsElaine Weyuker
AT&T Fellow
I know where you’re HidingJared Saia
University of New Mexico
Secure Algorithms and Data Structures for Massive NetworksCarlo Ghezzi
Politecnico di Milano
Towards open, dynamic software processes and products: achievements and challenges
Tuesday, November 1, 2005, 11:00 a.m., Room 1000 SEOYvonne Rogers
Indiana University
Grown-Up Science: Enabling Students to Learn How to Become Scientists Through Using Pervasive Technologies -
2004 - 2005
Andrew C. Yao
Tsinghua University
Quantum Complexity: How Fast Can Quantum Computers Sort?Aravind K. Joshi,
University of Pennsylvania
Discourse connectives and their argument structure: Some aspects of transition from sentence structure to discourse structureAravind K. Joshi
University of Pennsylvania
Discourse connectives and their argument structure: Some aspects of transition from sentence structure to discourse structureMoshe Vardi
Rice University
And Logic Begat Computer Science: When Giants Roamed the EarthM. Frans Kaashoek,
Massachusetts Institute of Technology
PEER-TO-PEER COMPUTING RESEARCH: A FAD?Leslie Lamport
Microsoft Research
Thinking for ProgrammersTiziana Catarci
University di Roma
“Searching for good quality data? Trust us”Janet L. Kolodner
Georgia Institute of Technology
From Case-Based Reasoning to Learning by Design to Design of Technology for Learning
Other Lectures and Seminars Heading link
The department also holds other lectures and seminars, some of which are delivered by experts visiting from outside UIC and others of which showcase scholarship produced at UIC’s College of Engineering. The sections below summarize the presenters in these categories for each academic year.
-
1
Distinguished Computer Science Educator Lecture
Beth Simon
University of California, San Diego
How We Teach Impacts Students’ Learning, Performance, and Persistence: Results from Three Recent Studies of Peer Instruction in Computer Science -
1
Distinguished Computer Science Educator Lecture
Dan Garcia
University of California, Berkeley -
2009 - 2010
Tim Hinrichs
University of Chicago
Collaborative ProgrammingEd Reingold
Illinois Institute of Technology
Lower Bounds for Cops and Robber PursuitDr. Yaser Sheikh
Carnegie Mellon University
Recovering the Structure of Dynamic Scenes from Moving Cameras -
1
Sonia Bergamaschi
University of Modena & Reggio Emilia
The MOMIS Data Integration SystemLing Liu
Georgia Institute of Technology
Location Privacy in Location-Aware ComputingGyorgy Turan
Schwartz Lemma and ApplicationsJose Zagal
Georgia Tech
Supporting Learning about GamesLeilah Lyons
University of Michigan
Playing Together at the Museum: Preliminary Results on Factors Affecting Participation in a Multi-User Software-Based ExhibitBen Shapiro
Northwestern University
Design Research from the Bottom Up: New Infrastructure for School ReformJared Saia
University of New Mexico
Attack-Resistant NetworksJohn Reppy
University of Chicago
Parallel Concurrent MLDr. Zahir Tari
RMIT University, Melbourne, Australia
Dynamic Load Balancing for Systems Under Heavy Traffic and High Task VariationTeresa Przytycka
NCBI/NLM/NIH
Application of combinatorial optimization to prediction of domain-domain interactionsHanan Samet
University of Maryland
Spatial Databases and Geographic Information SystemsNeil Daswani
Google
Emerging Security Vulnerabilities & the Impact to BusinessMatthias Trier
Technical University Berlin, Germany
Exploring Patterns of dynamic Networks with event-based Visualization and AnalysisMahesh Viswanathan
University of Illinois at Urbana-Champaign
Learning to VerifyAmit P. Sheth
Wright State University
Relationship Web: Spinning the Semantic Web from Trailblazing to Complex Hypothesis Evaluation -
2006 - 2007
Carl Landwehr
Disruptive Technology Office, CASL
Disruptive Technologies for Information AssuranceKartik Gopalan
SUNY Binghamton
MemX: Supporting Large Memory Applications in Xen Virtual MachinesSorin Draghici
Wayne State University
A Systems Biology Approach to Pathway AnalysisMona Singh
Princeton University
Analyzing and Interrogating Protein Interaction MapsRoxana Girju
University of Illinois at Urbana-Champaign
Improving the Interpretation of Noun Phrases with Cross-linguistic InformationThomas Messerges
Motorola Research Main/Labs
Security for Mobile Financial ApplicationsMagdi A. Mohamed
Motorola Research Main/Labs
Computational Intelligence and Q-filter StructuresLenore Zuck
University of Illinois at Chicago
Automatic Verification of Parameterized SystemsDavid Zavattero
City of Chicago Office of Emergency Management and Communications
ITS initiatives nationally and locally and the building of the Chicago TMCChris Quintana
University of Michigan
Designing for Learning…Learning about Design The Interplay Between HCI and the Learning SciencesDeborah Tatar
Virginia Polytechnic Institute and State University
Practice Into Theory: from serious work about learning in classroom environments to serious questions about the playful nature of control and coordination in computingRyan S. J. d. Baker
University of Nottingham
Detecting and Adapting to When Students Game the SystemBrian K. Smith
The Pennsylvania State University
Acts into Artifacts: Computational Tools to Support Experience Capture and ReflectionLuis von Ahn
Carnegie Mellon University
Human ComputationErik Meijer
Microsoft
VB Is Not C# -
2005 - 2006
Samir Khuller
University of Maryland
Algorithms for Data Management and MigrationKathleen M. Carley
Carnegie Mellon University
Dynamic Network Analysis: A Computational Approach to Counter Terrorism AnalysesEdward Reingold
Illinois Institute of Technology
Determining PluralityJennifer Golbeck
University of Maryland
Web-based Social Network Analysis for Socially Intelligent ApplicationsJinbo Xu
University of Chicago
A Parameterized Algorithm for Protein Structure AlignmentDer-Horng Lee
National University of Singapore
Deployment and Innovation of Intelligent Transportation Systems in Singapore -
2004 - 2005
Lin Cai
University of Waterloo
Transport layer protocol design for multimedia wireless InternetRaj Jain
Nayna Networks, Inc.
Computer Networking: Recent Developments, Trends, and IssuesRiccardo Pucella
Cornell University
A Knowledge-Based Foundation for SecurityLance Fortnow
University of Chicago
The Complexity of Information MarketsJohn Langford
TTI-Chicago
Fast Exact High Dimensional Nearest Neighbors in Arbitrary Dimensions with a Cover TreeRay DeCarlo
Purdue University
Software Release Control using Defect Based Quality EstimationChris Ding
Lawrence Berkeley National Laboratory
Link Analysis and Topic Discovery via Spectral ClusteringPaul Dan Cristea
University of Bucharest
Genomic Signal Analysis and Processing -
2003 - 2004
Tao Jiang
University of California
Efficient Rule-Based Haplotype Inference on PedigreesMarianne Winslett
University of Illinois at Urbana-Champaign
An Introduction to Trust NegotiationTanya Berger-Wolf
University of New Mexico
How to See a Tree for a Forest? Combining Phylogenetic Trees: Reasons, Methods, and ConsequencesTiffani L. Williams
University of New Mexico
Phylogeny Reconstruction and Experimental AlgorithmicsMark Guzdial
Georgia Institute of Technology
Collaborative Dynabooks: A Research Agenda on Building Systems to Support Learning through Multimedia