The College of Computer and Information Science regularly brings some of the best and the brightest people in our field to Northeastern Univerity to speak on topics of interest to our community. We host colloquia talks all throughout the year and a distinguished speaker series. For more information, including a list of future and past speakers, please check the following websites:
http://acm.ccs.neu.edu/ (NU ACM student chapter)
http://www.ccs.neu.edu/groups/CISters/index.html (CISters student group)
Upcoming Events
Northeastern Game Demo Day
April 19, 2013 | Curry Student Center Indoor Quad and McLeod Suites 6:00 pm - 10:00 pm
2013 CCIS Colloquia
Growing Solver-Aided Languages with Rosette
Emina Torlak | April 8, 2013 | 366 WVH 11:45 am
Scaling Systematic Checking Using Incremental and Memoization Techniques
Guowei Yang | March 27, 2013 | 366 WVH 2:00pm
Building Efficient Networked Systems
Yadi Ma | March 21, 2013 | 366 WVH 10:00 am
Building Scholarly Methodologies with Large-Scale Topic Analysis
David Mimno | March 20, 2013 | 366 WVH 1:30 pm
Manipulation Under Uncertainty
Rob Platt | March 18, 2013 | 150 Forsyth 10:00 am
Network Design in the Big-Data Age
Xia Zhou | March 14, 2013 | 366 WVH 10:00 am
Programming On Demand: Wrangling, Iterating, and Opportunistic Learning
Philip Guo | March 13, 2013 | 366 WVH 1:00 pm
Systems Design, Optimization and Implementation for Differentiated Qualities of Storage Services
Feng Chen | March 11, 2013 | 366 WVH 10:00 am
High-performance Main-memory Data Management
Spyros Blanas | February 14, 2013 | 366 WVH 2:30 pm
Statistical Relational Learning for Predictive Personalized Medicine
Sriraam Natarajan | February 11, 2013 | 366 WVH 10:00 am
Learning with Humans in the Loop
Yisong Yue | February 6, 2013 | 366 WVH 1:30 pm
New Technology Approaches to Creating Scalable Health Interventions for a Changing World
Holly Jimison | February 4, 2013 | 366 WVH 2:00 pm
Transforming Health Care with Technology: Model-Based Approaches
Misha Pavel | February 4, 2013 | 366 WVH 10:15 am
Challenges in Building a Swarm of Robotic Bees
Karthik Dantu | December 7, 2012 | 366 WVH 10:30am
Brainwave Technologies for Gaming
Ozgur Yavuzcetin | November 19, 2012 | 130 Forsyth 3:00pm
Designing Core Mechanics
Chris Esaki, Director, Microsoft Game Studios | November 15, 2012 | 366 WVH 3:00pm
Sharing Sensitive Information with Privacy
Emiliano De Cristofaro | November 14, 2012 | 366 WVH 1:30 pm
Low-distortion Inference of Latent Similarities from a Multiplex Social Network
Rajmohan Rajaraman | May 16, 2012 | 366 WVH 11:00 AM
Mining Heterogeneous Information Networks
Mirek Riedewald | April 19, 2012 | 366 WVH 10:30 AM
Large Graph Models and Scalable Analytics
April 12, 2012 | 366 WVH 11:45 AM
Restructuring wireless systems using PHY layer capabilities
Guevara Noubir | April 2, 2012 | 366 WVH 11:45 AM
Securing Virtualization: Techniques and Applications
Engin Kirda | March 29, 2012 | 366 WVH 11:45 AM
Exploring the Web, Beyond Document Search
Mirek Riedewald | March 27, 2012 | 366 WVH 10:30 AM
Towards Reliable Storage Systems: From OS-Level File Systems to Cloud Storage
Olin Shivers | March 22, 2012 | 366 WVH 10:30 AM
Analytics for Detecting Web and Social Media Abuse
March 20, 2012 | 366 WVH 11:30 AM
Noncommutative Grothendieck inequalities and application to quantum two-player games
Christopher King (Math) and Rajmohan Rajaraman (CCIS) | March 19, 2012 | 366 WVH 1:30 PM
Enabling Innovation in Middlebox Deployment
Alan Mislove | March 16, 2012 | 366 WVH 11:30 AM
Securing The Next Generation Web Platform
Engin Kirda | March 14, 2012 | 366 WVH 11:45 AM
Understanding Spam Economics
Engin Kirda | March 1, 2012 | 366 WVH 11:45 AM
Pinning Down “Privacy” in Statistical Databases
Rajmohan Rajaraman | February 28, 2012 | 366 WVH 11:30 AM
Motor, Voters, and the Future of Embedded Security
Engin Kirda | February 24, 2012 | 366 WVH 11:30 AM
Security and Privacy Challenges in Future Internet Architectures: the Case of Named Data Networking
Guevara Noubir | February 23, 2012 | 366 WVH 11:00 AM
Internet privacy: It is not getting better
February 21, 2012 | 366 WVH 11:45 AM
Threats and Defenses on the Social Web
Alan Mislove | February 17, 2012 | 366 WVH 11:30 AM
Why and How: A Reverse Perspective on Data Management
Mirek Riedewald | February 14, 2012 | 366 WVH 10:30 AM
Security and Reliability for Internet-scale Services
Alan Mislove | February 10, 2012 | 366 WVH 11:00 AM
Cryptographic protocols in the era of cloud computing
Rajmohan Rajaraman | February 8, 2012 | 366 WVH 10:00 AM
Inferring and Exploiting Relational Structure in Large Collections
Alan Mislove | February 6, 2012 | 366 WVH 12:00 PM
Mining, Mapping, and Accelerating Science and Technology
February 3, 2012 | 366 WVH 11:45 AM
Health Promotion Technology for Underserved Populations: An Ecological Approach
Stephen Intille | February 2, 2012 | 366 WVH 10:00 AM
Playing with Data
February 1, 2012 | 153 SN 11:00 AM
No Free Lunch in Data Privacy
Mirek Riedewald | January 31, 2012 | 366 WVH 10:30 AM
Maintaining Security Under Imperfect Secrecy
Rajmohan Rajaraman | January 30, 2012 | 366 WVH 11:30 AM
Finding Levity for Serious Games
January 30, 2012 | 600 Columbus Place, 6th Floor 11:00 AM
Secure Computation: From Theory Towards Practice
Guevara Noubir | January 17, 2012 | 366 WVH 10:30 AM