Speaker Series

The College of Computer and Information Science regularly brings some of the best and the brightest people in our field to Northeastern University to speak on topics of interest to our community. We host colloquia talks all throughout the year and a distinguished speaker series. For more information, including a list of future and past speakers, please check the following websites:

2014 CCIS Colloquia

  1. Coping with Uncertainty in Robotic Navigation, Exploration, and Grasping

    Sachin Patil | November 17, 2014 | 366 WVH 2pm

  2. Patient Data Storytelling and the Learning Healthcare System

    Amy P. Abernethy & RJ Andrews | April 29, 2014 | 366 WVH 10:30am

  3. Storage and Search in Dynamic Peer-to-Peer Networks

    John Augustine | April 23, 2014 | 366 WVH 12:00pm

  4. Finding Communities in Networks: Message-Passing, Phase Transitions, and New Spectral Methods

    Cristopher Moore | April 17, 2014 | 366 WVH 11:30am

  5. Sublinear-Time Algorithms for Massive Datasets

    Eric Blais | April 15, 2014 | 366 WVH 10:00am

  6. Privacy and the Complexity of Simple Queries

    Jonathan Ullman | March 27, 2014 | 366 WVH 10:30am

  7. Closing the Loop on Data Analysis

    Eugene Wu | March 25, 2014 | 366 WVH 10:30am

  8. Going Beyond Scalability to Build Resource-Efficient Data-Intensive Applications

    George Porter | March 19, 2014 | 366 WVH 10:30am

  9. Cybercrime and the Cyber Underground Economy

    Dick Kemmerer | March 18, 2014 | 366 WVH 10:00am

  10. The Good, The Bad, and the Ugly: An Exploration of the Interplay between Networks and Malice

    Michael Bailey | March 17, 2014 | 366 WVH 10:30am

  11. Growing up: How Big Data processing can cope with limited bandwidth and complex code

    Ariel Rabkin | March 11, 2014 | 366 WVH 10:30am

  12. Design Techniques for Crowdsourcing Complex Tasks

    Edith Law | February 27, 2014 | 366 WVH 10:30am

  13. Repeatability, Reproducibility and Rigor

    Jan Vitek | February 26, 2014 | 366 WVH 2:00PM

  14. The Institutional Case for OpenCourseWare

    Larry Cooperman | February 24, 2014 | 366 WVH 1PM

  15. Solving Difficult Problems with Video Games

    Seth Cooper | February 24, 2014 | 366 WVH 10:30am

  16. Learning with Lower Information Costs

    Sivan Sabato | February 20, 2014 | 366 WVH 10:30AM

  17. The Billion Dollar Question in Online Videos: How Video Performance Impacts Viewer Behavior?

    Ramesh K. Sitaraman | February 14, 2014 | 366 WVH 1:30PM

  18. SafEdge for residential Networks: Building Privacy from the Bottom Up

    Aldo Cassola | February 13, 2014 | 366WVH 5:00PM

  19. Programming for Everyone: From Solvers to Solver-Aided Languages and Beyond

    Emina Torlak | February 10, 2014 | 366WVH 10:30AM

  20. Machine Learning in Evidence-Based Medicine: Taming the Clinical Data Deluge

    Byron Wallace | February 6, 2014 | 366 WVH 10:30AM

  21. The Promises and Pitffals of Demographic Interference in Social Media

    Derek Ruths | January 9, 2014 | 366 WVH 04:15 PM

  22. The Password That Never Was

    Ari Juels | January 9, 2014 | 366 WVH 09:15 AM

  23. Learning Large-Scale Patterns in Complex Network Data

    Aaron Clauset | January 7, 2014 | 366 WVH 10:30 AM

  24. 2013 CCIS Colloquia

    1. Polar Codes for Multiple Access Channels

      Edmund Yeh | December 11, 2013 | 366 WVH 10:30AM

    2. Bridging the Gap Between Industrial-Scale Control Systems and Formal Methods

      Jyotirmoy V. Deshmukh | December 5, 2013 | 366 WVH 4:00PM

    3. The Frontiers of Intelligent Robot Motion and Manipulation

      Dmitry Berenson | November 21, 2013 | 366WVH 3:00PM

    4. Inverse Problems in Potential Energy Minimization, and Algorithms for Self-Assembly

      Abhinav Kumar | October 16, 2013 | 366WVH 10:30AM

    5. Characterizing Users’ Engagement in Major OSNs

      Rubén Cuevas | October 9, 2013 | 366 WVH 1:30pm

    6. Introduction to the Kolker Lab

      Eugene Kolker | September 26, 2013 | 366 WVH 10:30am

    7. How to Search on Encrypted Data

      Dr. Seny Kamara | September 17, 2013 | 366 WVH 11:00am

    8. Growing Solver-Aided Languages with Rosette

      Emina Torlak | April 8, 2013 | 366 WVH 11:45 am

    9. Scaling Systematic Checking Using Incremental and Memoization Techniques

      Guowei Yang | March 27, 2013 | 366 WVH 2:00pm

    10. Building Efficient Networked Systems

      Yadi Ma | March 21, 2013 | 366 WVH 10:00 am

    11. Building Scholarly Methodologies with Large-Scale Topic Analysis

      David Mimno | March 20, 2013 | 366 WVH 1:30 pm

    12. Manipulation Under Uncertainty

      Rob Platt | March 18, 2013 | 150 Forsyth 10:00 am

    13. Network Design in the Big-Data Age

      Xia Zhou | March 14, 2013 | 366 WVH 10:00 am

    14. Programming On Demand: Wrangling, Iterating, and Opportunistic Learning

      Philip Guo | March 13, 2013 | 366 WVH 1:00 pm

    15. Systems Design, Optimization and Implementation for Differentiated Qualities of Storage Services

      Feng Chen | March 11, 2013 | 366 WVH 10:00 am

    16. High-performance Main-memory Data Management

      Spyros Blanas | February 14, 2013 | 366 WVH 2:30 pm

    17. Statistical Relational Learning for Predictive Personalized Medicine

      Sriraam Natarajan | February 11, 2013 | 366 WVH 10:00 am

    18. Learning with Humans in the Loop

      Yisong Yue | February 6, 2013 | 366 WVH 1:30 pm

    19. New Technology Approaches to Creating Scalable Health Interventions for a Changing World

      Holly Jimison | February 4, 2013 | 366 WVH 2:00 pm

    20. Transforming Health Care with Technology: Model-Based Approaches

      Misha Pavel | February 4, 2013 | 366 WVH 10:15 am

    21. 2012 CCIS Colloquia

      1. Challenges in Building a Swarm of Robotic Bees

        Karthik Dantu | December 7, 2012 | 366 WVH 10:30am

      2. Brainwave Technologies for Gaming

        Ozgur Yavuzcetin | November 19, 2012 | 130 Forsyth 3:00pm

      3. Designing Core Mechanics

        Chris Esaki, Director, Microsoft Game Studios | November 15, 2012 | 366 WVH 3:00pm

      4. Sharing Sensitive Information with Privacy

        Emiliano De Cristofaro | November 14, 2012 | 366 WVH 1:30 pm

      5. Low-distortion Inference of Latent Similarities from a Multiplex Social Network

        David Kempe | May 16, 2012 | 366 WVH 11:00 AM

      6. Mining Heterogeneous Information Networks

        Mirek Riedewald | April 19, 2012 | 366 WVH 10:30 AM

      7. Large Graph Models and Scalable Analytics

        April 12, 2012 | 366 WVH 11:45 AM

      8. Restructuring wireless systems using PHY layer capabilities

        Guevara Noubir | April 2, 2012 | 366 WVH 11:45 AM

      9. Securing Virtualization: Techniques and Applications

        Engin Kirda | March 29, 2012 | 366 WVH 11:45 AM

      10. Exploring the Web, Beyond Document Search

        Mirek Riedewald | March 27, 2012 | 366 WVH 10:30 AM

      11. Towards Reliable Storage Systems: From OS-Level File Systems to Cloud Storage

        Olin Shivers | March 22, 2012 | 366 WVH 10:30 AM

      12. Analytics for Detecting Web and Social Media Abuse

        March 20, 2012 | 366 WVH 11:30 AM

      13. Noncommutative Grothendieck inequalities and application to quantum two-player games

        Christopher King (Math) and Rajmohan Rajaraman (CCIS) | March 19, 2012 | 366 WVH 1:30 PM

      14. Enabling Innovation in Middlebox Deployment

        Alan Mislove | March 16, 2012 | 366 WVH 11:30 AM

      15. Securing The Next Generation Web Platform

        Engin Kirda | March 14, 2012 | 366 WVH 11:45 AM

      16. Understanding Spam Economics

        Engin Kirda | March 1, 2012 | 366 WVH 11:45 AM

      17. Pinning Down “Privacy” in Statistical Databases

        Rajmohan Rajaraman | February 28, 2012 | 366 WVH 11:30 AM

      18. Motor, Voters, and the Future of Embedded Security

        Engin Kirda | February 24, 2012 | 366 WVH 11:30 AM

      19. Security and Privacy Challenges in Future Internet Architectures: the Case of Named Data Networking

        Guevara Noubir | February 23, 2012 | 366 WVH 11:00 AM

      20. Internet privacy: It is not getting better

        February 21, 2012 | 366 WVH 11:45 AM

      21. Threats and Defenses on the Social Web

        Alan Mislove | February 17, 2012 | 366 WVH 11:30 AM

      22. Why and How: A Reverse Perspective on Data Management

        Mirek Riedewald | February 14, 2012 | 366 WVH 10:30 AM

      23. Security and Reliability for Internet-scale Services

        Alan Mislove | February 10, 2012 | 366 WVH 11:00 AM

      24. Cryptographic protocols in the era of cloud computing

        Rajmohan Rajaraman | February 8, 2012 | 366 WVH 10:00 AM

      25. Inferring and Exploiting Relational Structure in Large Collections

        Alan Mislove | February 6, 2012 | 366 WVH 12:00 PM

      26. Mining, Mapping, and Accelerating Science and Technology

        February 3, 2012 | 366 WVH 11:45 AM

      27. Health Promotion Technology for Underserved Populations: An Ecological Approach

        Stephen Intille | February 2, 2012 | 366 WVH 10:00 AM

      28. Playing with Data

        February 1, 2012 | 153 SN 11:00 AM

      29. No Free Lunch in Data Privacy

        Mirek Riedewald | January 31, 2012 | 366 WVH 10:30 AM

      30. Maintaining Security Under Imperfect Secrecy

        Rajmohan Rajaraman | January 30, 2012 | 366 WVH 11:30 AM

      31. Finding Levity for Serious Games

        January 30, 2012 | 600 Columbus Place, 6th Floor 11:00 AM

      32. Secure Computation: From Theory Towards Practice

        Guevara Noubir | January 17, 2012 | 366 WVH 10:30 AM