log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
Five Short Talks
(See abstract) - University of Maryland, College Park
Friday, October 4, 2013, 1:00-2:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

Marshini Chetty, HCI and Networking: Taming the Internet One Bit at a Time.

Abstract: As we become more dependent on high speed Internet, we increasingly have to deal with making sure our devices are connected properly, that we're getting the speeds we need, and that we're making efficient use of our data. Yet often, Internet connections break or do not work as planned, causing us endless headaches. We also have to juggle constraints such as slow speeds, limited bandwidth, and high data costs depending on our location and use. My research focuses on helping users manage Internet connectivity in their homes, the workplace, and on the go, particularly under constraints of low resources and high costs. In this talk, I'll go over the use of HCI and networking to reach the goal of taming the Internet for everyday users and talk about opportunities for research in the HCIL lab.

 

Dana Dachman-Soled, Research in Cryptography:  A Sneak Peek

Modern cryptography is not just about encryption!  To illustrate, we will briefly discuss some exciting and highly active areas of research within cryptography.  Examples include cryptography against physical attacks, secure multiparty computation in strong models and program obfuscation.

 

Tudor Dumitras, Improving System Security with Big Data Techniques

Traditional security mechanisms, such as firewalls, password-protection systems, two-factor authentication, separation of privilege and even physical isolation, have been overcome by skilled and persistent targeted hackers. To meet the security challenges of tomorrow, we must learn how to use Big Data techniques for making sense of the vast amounts of telemetry that we can collect from systems and networks worldwide. In this talk, I will illustrate this approach with an example: analyzing data from 11 million hosts to measure the duration of zero-day attacks, which are cyber attacks that exploit undisclosed vulnerabilities. 

 

Leah Findlater, Designing an Inclusive Future

Today’s computing technologies—from tablets to smartphones to wearables—offer immense potential to accommodate individual user needs and preferences. Without inclusive design, however, these same technologies can introduce new accessibility barriers for populations of users not typically well-served by mainstream research and product development. In this talk, I will highlight our work on designing accessible mobile and wearable technologies for people with visual or motor impairments, and touch on how personalization can improve interaction for users more broadly.

Charalampos (Babis) Papamanthou, Secure and Private Computing in the Cloud

In the age of big data, cloud computing plays a major role in processing and analyzing massive amounts of information. Nevertheless, many security concerns have arisen in this new paradigm. In this talk, I will present my work that tackles the above mentioned problems through protocols and systems that offer verifiability and privacy assurances of data and computations in the cloud (or generally in untrusted environments). 

This talk is organized by Jeff Foster