Loading… Loading…
25 07, 2017

Srini Devadas (Massachusetts Institute of Technology) – Cybersecurity Challenges for 2020 and Beyond

With the advent of the Internet of Things and ubiquitous computing, our lives are increasingly dependent on computer software and hardware. We depend on computer systems of various types for financial services, [...]

2 05, 2017

Best Paper Award at CPSS 2017 and Best Poster Award Finalist at SAC 2017

Congratulations on winning the following awards. [...]

29 04, 2017

First Prize in the Civic Engagement Category of Silicon Hacks 2017

Congratulations to our senior student Christabella Irwanto [...]

28 04, 2017

Wan Du (Nanyang Technological University) – Building Adaptive and Fast Networked Sensing Systems for Cyber Physical Systems

In a Cyber Physical System (CPS, also known as system of systems), the cyber system and the physical system are connected by a networked sensing system. [...]

27 04, 2017

Machine Learning and Optimization for Cutting Edge Applications in Digital Music

Music generation systems are becoming increasingly important, bolstered by rising global expenditure on digital music which was over 64 billion USD in 2014 alone. [...]

21 04, 2017

John M. Chowning (Stanford University) – Composing Music From the Inside-Out and a Bit of History Along the Way

A lecture demonstration showing how the capacity of computer systems 50 years ago limited composers/researchers to only one of the sound generating/processing tools that are available today: synthesis. [...]

10 04, 2017

Sieng Chye Oh (Cyber Security Fusion Center (CSFC)) – Cyber Security in Citi

Sieng Chye has 12 years of experience in cyber security, starting by building and operating a Security Operation Center (SOC) for a large managed service provider. In that capacity, he had been involved with various security analyses and research functions; also serving as a mentor to junior analyst. [...]

3 04, 2017

Delaney Ng (Ministry of Defence (MINDEF)) – Cyber Security in MINDEF/SAF

Hear some inside stories and gain first-hand information on the realities of cyber security in the real world. [...]