25 07, 2017

Srini Devadas (Massachusetts Institute of Technology) – Cybersecurity Challenges for 2020 and Beyond

With the advent of the Internet of Things and ubiquitous computing, our lives are increasingly dependent on computer software and hardware. We depend on computer systems of various types for financial services, [...]

28 04, 2017

Wan Du (Nanyang Technological University) – Building Adaptive and Fast Networked Sensing Systems for Cyber Physical Systems

In a Cyber Physical System (CPS, also known as system of systems), the cyber system and the physical system are connected by a networked sensing system. [...]

27 04, 2017

Machine Learning and Optimization for Cutting Edge Applications in Digital Music

Music generation systems are becoming increasingly important, bolstered by rising global expenditure on digital music which was over 64 billion USD in 2014 alone. [...]

21 04, 2017

John M. Chowning (Stanford University) – Composing Music From the Inside-Out and a Bit of History Along the Way

A lecture demonstration showing how the capacity of computer systems 50 years ago limited composers/researchers to only one of the sound generating/processing tools that are available today: synthesis. [...]

10 04, 2017

Sieng Chye Oh (Cyber Security Fusion Center (CSFC)) – Cyber Security in Citi

Sieng Chye has 12 years of experience in cyber security, starting by building and operating a Security Operation Center (SOC) for a large managed service provider. In that capacity, he had been involved with various security analyses and research functions; also serving as a mentor to junior analyst. [...]

3 04, 2017

Delaney Ng (Ministry of Defence (MINDEF)) – Cyber Security in MINDEF/SAF

Hear some inside stories and gain first-hand information on the realities of cyber security in the real world. [...]

23 03, 2017

Kevin Steppe (Singapore Management University) – Design: From Software to Chemistry to Curricula and Back

Follow me on a life journey of design through software, sciences and education. We will start with design lessons from early computers still relevant today. [...]

9 03, 2017

Pawel Szalachowski (ETH Zurich) – Next-generation Secure Public-Key Infrastructures

Although much progress has been made towards a more secure public key infrastructure (PKI), the proposed approaches still suffer from security vulnerabilities, inefficiency, or incremental deployment challenges. [...]

9 03, 2017

Bundit Laekhanukit (Weizmann Institute of Science) – Designing Fault-Tolerant Networks via Rounding-by-Tree-Embedding

Designing a network in a cost-effective way is a major goal in network design, which has become an important subject in combinatorial optimization and theoretical computer science. In this talk, we present algorithms that designs a cost-efficient asymmetric network that can function under failure conditions (link or node failures). [...]

16 02, 2017

Jesper Jansson (Kyoto University) – Fast Algorithms for Consensus Trees

The phylogenetic tree is a 150-year-old data structure used by scientists and scholars to describe treelike evolutionary history. [...]