Events

  • Current Events
  • Past Events

  • Feb27

    Although Iowa’s Computer Science program launched in 1965, the talk focuses on the preceding year, when the department was booting up. In that period Gerry Weeg, the department founder, arrived and set up shop; faculty such as Art Fleck were hired; and courses and curriculum were outlined. The focus was on computers, so we look at the machines, the computations, and how dramatically computing has changed since the day of the punch card.

    7:30pm to 8:30pm
    W10 PBB
    Larry Snyder
    University of Washington
  • Mar02

    As data from far-reaching sources is collected, aggregated, and re-packaged to enable new and smarter applications, confidentiality and data security are at greater risk than ever before. Some of the most surprising and invasive threats to materialize in recent years are brought about by so-called inference attacks: successful attempts to learn sensitive information by leveraging public data such as social network updates, published research articles, and web APIs.

    4:30pm to 5:30pm
    40 SH
    Matt Fredrickson
    University of Wisconsin
  • Mar06

    Many computer security problems stem from buggy software. Attackers exploit software bugs to infiltrate systems and install malicious software (malware) such as viruses. Therefore, it is imperative to find bugs before an attacker can exploit them. However, merely discovering software bugs may not help in thwarting attacks, because the debugging process is largely manual and time-consuming. Recently, we have developed several techniques for finding software bugs and checking their exploitability.

    4:00pm to 5:00pm
    110 MLH
    Sang Kil Cha
    Carnegie Mellon University
  • Mar09

    Visualization helps people make sense of large and complex data, leveraging the power of the human visual system to enable serendipitous insights into information. I develop systems and techniques that overcome scalability limitations in visualization designs by applying, quantifying, and expanding knowledge of perception for visual analysis applications. In this talk, I will discuss three ways I have bridged perception and visualization to design analytics solutions for fields ranging from biology to the humanities.

    4:30pm to 5:30pm
    40 SH
    Danielle Albers Szafir
    University of Wisconsin-Madison
  • Mar11

    Cyber security and privacy have brought the attention from the general public these days. Melissa Hathaway, who advised both President Obama and President Bush, estimated in a report that governments and consumers lost $125 billion annually to cyber-attacks, including losses in tax revenue. In this talk, from the perspective of program analysis, I will discuss the security and privacy of two important computer systems: Web browser and Android system.

    4:30pm to 5:30pm
    40 SH
    Yinzhi Cao
    Columbia University
  • Mar30
    12:00pm to 1:00pm
    UCC 2390
  • Mar30

    In my talk, I will present my research on end-user parameter space explorability. The need for explorability research became apparent during my time as a collaborator on several interactive dance performances. As both a researcher and an artist, I integrated computer science algorithms into each dance piece, using sensor data from the dancers to create real-time interactive visualizations. Coupling the visualizations and multiple sensor inputs with various tracking, filtering, and computer vision algorithms required an exploration of a vast space of possibilities.

    4:30pm to 5:30pm
    40 SH
    Berto Gonzalez
    University of North Carolina
  • Apr03

    Narrative intelligence (NI), or the ability to craft, tell, understand and respond appropriately to narratives, has been recognized as a central component of human intelligence. Hence, computationally replicating narrative intelligence can provide ample benefits for machines aiming to communicate effectively with humans, to understand human activities, to assist and augment game-play, and to produce creative solutions and artwork.

    4:00pm to 5:00pm
    110 MLH
    Boyang Li
    Disney Research Pittsburgh
  • Feb26

    Please join us Feb. 26-28 in celebrating 50 years of teaching, research, and scholarship at the UI. Coinciding with the 2015 UI Computing Conference, Feb. 27-28.

    More information on our anniversary here (e.g. schedule, registration, and lodging details).

     

    (All day)
    MLH; PBB et al.
    CS Department | UI Student Chapter of ACM
  • Feb25

    Open to all majors! Over 150 employers will be available to talk about their internship and full-time opportunities! Bring copies of your resume and dress professionally!

    Check out the Career Fair App here - Android // iOS

    11:00am to 4:00pm
    IMU Main Lounge & 2nd Floor Ballroom
    Pomerantz Career Center
  • Feb24

    Responsive web design is a set of practices which can be used to create websites that work well on devices of all screen sizes. Source Allies' Dustin Greif will present a series of interactive examples which give students hands-on experience with a core set of responsive design techniques. Students are encouraged to bring a laptop to interact with the code examples, and a smartphone/tablet to see the responsive websites on a smaller screen. The examples are accessible with any browser (Chrome, Firefox, Safari, etc.), and no additional software is required.

    6:00pm to 8:00pm
    W151 PBB
    Dustin Greif - Software Engineer at Source Allies Inc.
    ACM, WICS, Tippie Tech, & Microsoft
  • Feb13

    Building systems with rigorous security guarantees is still difficult. Language-based security is a promising approach, since it can offer strong security assurance while giving programmers guidance in building secure systems. Recent advances in language-based security show that many important security policies can be provably enforced at the language level.

    4:00pm to 5:00pm
    110 MLH
    Danfeng Zhang
    Cornell University
  • Feb10

    We will just be relaxing and enjoying from food and drink. We will also discuss interview tips and techniques, including what types of questions the tech giants ask in their infamous interviews.

    So come with questions (and an appetite) and hangout with some of your fellow ACM members!

    6:30pm to 7:30pm
    3 MLH - Muhly Lounge
    ACM University of Iowa Chapter
  • Feb03

    Fast Enterprises will talk about their company. Pizza and pop will be provided.

    This presentation is held in conjunction with the Spring 2015 Engineering Career Fair.

    5:00pm
    110 MLH
    Fast Enterprises
    ACM University of Iowa Chapter
  • Feb03

    In connection with the fair, ACM is hosting two company presentations:

    • Cerner will be talking about employment at their company on Monday, Feb. 2, at 5:30 p.m. in 110 MLH.
    • Fast Enterprises will talk about their company on Tuesday, Feb. 3, at 5 p.m. in 110 MLH.

    Pizza and pop will be provided at both functions.

    1:00pm to 5:00pm
    Main Lounge - IMU
    College of Engineering
  • Feb02

    Cerner will be talking about employment at their company. Pizza and pop will be provided.

    This presentation is held in conjunction with the Spring 2015 Engineering Career Fair.

    5:30pm
    110 MLH
    Cerner
    ACM University of Iowa Chapter
  • Jan29

    We’ll be talking about semester goals for the group, the MinneWIC conference, a collaboration with RadiologyProtocols (a local tech startup), and some community outreach opportunities.

    5:30pm to 6:30pm
    Muhly Lounge (3 MLH)
    Women in Informatics and Computer Science (WICS)
  • Jan27

    We will discuss Microsoft’s \\GameOn Contest, the University of Iowa Computing Conference (and how you can be involved), future workshops/meetings, and a collaboration with Radiology Protocols (a start-up here in Iowa City)! And of course, there will be free pizza J.

    5:00pm to 6:00pm
    118 MLH
    ACM University of Iowa Chapter

Pages

Subscribe to Events