Speaker Series

The College of Computer and Information Science regularly brings some of the best and the brightest people in our field to Northeastern University to speak on topics of interest to our community. We host colloquia talks all throughout the year and a distinguished speaker series. To sign up to our Colloqium mailing list where we post event announcements, please subscribe here. For more information, including a list of future and past speakers, please check the following websites:

2015 CCIS Colloquia

  1. Natural Language Processing for Understanding Socially-Generated Content

    Lu Wang | April 9, 2015 | 108 WVH 3:15pm

  2. What’s in My Data? Fast, Principled Algorithms for Exploring Large Graphs

    Danai Koutra | March 19, 2015 | 108 WVH 3:15pm

  3. Inference Attacks: Understanding Privacy in the Era of “Privacy is Dead”

    Matt Fredrikson | March 5, 2015 | 108 WVH 3:15pm

  4. Sparse Modeling for High-Dimensional Multi-Manifold Data Analysis

    Ehsan Elhamifar | March 2, 2015 | 366 WVH 12:00pm

  5. Attacking the Browser

    Alexandros Kapravelos | February 24, 2015 | 108 WVH 12:00pm

  6. Rigorous OS Design: an Idea Whose Time Has Come

    Leonid Ryzhyk | February 19, 2015 | 108 WVH 3:15pm

  7. Crowd-Agents: Creating Crowd-Powered Interactive Systems

    Walter Lasecki | February 13, 2015 | 108 WVH 12:00pm

  8. Discovering Structure in Robotics Tasks via Demonstrations and Active Learning

    Scott Niekum | February 12, 2015 | 108 WVH 3:15pm

  9. Real-time Optimization Algorithms for Dynamic Walking, Running, and Manipulating Robots

    Scott Kuindersma | February 5, 2015 | 108 WVH 3:15pm

2014 CCIS Colloquia

  1. Coping with Uncertainty in Robotic Navigation, Exploration, and Grasping

    Sachin Patil | November 17, 2014 | 366 WVH 2pm

  2. Patient Data Storytelling and the Learning Healthcare System

    Amy P. Abernethy & RJ Andrews | April 29, 2014 | 366 WVH 10:30am

  3. Storage and Search in Dynamic Peer-to-Peer Networks

    John Augustine | April 23, 2014 | 366 WVH 12:00pm

  4. Finding Communities in Networks: Message-Passing, Phase Transitions, and New Spectral Methods

    Cristopher Moore | April 17, 2014 | 366 WVH 11:30am

  5. Sublinear-Time Algorithms for Massive Datasets

    Eric Blais | April 15, 2014 | 366 WVH 10:00am

  6. Privacy and the Complexity of Simple Queries

    Jonathan Ullman | March 27, 2014 | 366 WVH 10:30am

  7. Closing the Loop on Data Analysis

    Eugene Wu | March 25, 2014 | 366 WVH 10:30am

  8. Going Beyond Scalability to Build Resource-Efficient Data-Intensive Applications

    George Porter | March 19, 2014 | 366 WVH 10:30am

  9. Cybercrime and the Cyber Underground Economy

    Dick Kemmerer | March 18, 2014 | 366 WVH 10:00am

  10. The Good, The Bad, and the Ugly: An Exploration of the Interplay between Networks and Malice

    Michael Bailey | March 17, 2014 | 366 WVH 10:30am

  11. Growing up: How Big Data processing can cope with limited bandwidth and complex code

    Ariel Rabkin | March 11, 2014 | 366 WVH 10:30am

  12. Design Techniques for Crowdsourcing Complex Tasks

    Edith Law | February 27, 2014 | 366 WVH 10:30am

  13. Repeatability, Reproducibility and Rigor

    Jan Vitek | February 26, 2014 | 366 WVH 2:00PM

  14. The Institutional Case for OpenCourseWare

    Larry Cooperman | February 24, 2014 | 366 WVH 1PM

  15. Solving Difficult Problems with Video Games

    Seth Cooper | February 24, 2014 | 366 WVH 10:30am

  16. Learning with Lower Information Costs

    Sivan Sabato | February 20, 2014 | 366 WVH 10:30AM

  17. The Billion Dollar Question in Online Videos: How Video Performance Impacts Viewer Behavior?

    Ramesh K. Sitaraman | February 14, 2014 | 366 WVH 1:30PM

  18. SafEdge for residential Networks: Building Privacy from the Bottom Up

    Aldo Cassola | February 13, 2014 | 366WVH 5:00PM

  19. Programming for Everyone: From Solvers to Solver-Aided Languages and Beyond

    Emina Torlak | February 10, 2014 | 366WVH 10:30AM

  20. Machine Learning in Evidence-Based Medicine: Taming the Clinical Data Deluge

    Byron Wallace | February 6, 2014 | 366 WVH 10:30AM

  21. The Promises and Pitffals of Demographic Interference in Social Media

    Derek Ruths | January 9, 2014 | 366 WVH 04:15 PM

  22. The Password That Never Was

    Ari Juels | January 9, 2014 | 366 WVH 09:15 AM

  23. Learning Large-Scale Patterns in Complex Network Data

    Aaron Clauset | January 7, 2014 | 366 WVH 10:30 AM

2013 CCIS Colloquia

  1. Polar Codes for Multiple Access Channels

    Edmund Yeh | December 11, 2013 | 366 WVH 10:30AM

  2. Bridging the Gap Between Industrial-Scale Control Systems and Formal Methods

    Jyotirmoy V. Deshmukh | December 5, 2013 | 366 WVH 4:00PM

  3. The Frontiers of Intelligent Robot Motion and Manipulation

    Dmitry Berenson | November 21, 2013 | 366WVH 3:00PM

  4. Inverse Problems in Potential Energy Minimization, and Algorithms for Self-Assembly

    Abhinav Kumar | October 16, 2013 | 366WVH 10:30AM

  5. Characterizing Users’ Engagement in Major OSNs

    Rubén Cuevas | October 9, 2013 | 366 WVH 1:30pm

  6. Introduction to the Kolker Lab

    Eugene Kolker | September 26, 2013 | 366 WVH 10:30am

  7. How to Search on Encrypted Data

    Dr. Seny Kamara | September 17, 2013 | 366 WVH 11:00am

  8. Growing Solver-Aided Languages with Rosette

    Emina Torlak | April 8, 2013 | 366 WVH 11:45 am

  9. Scaling Systematic Checking Using Incremental and Memoization Techniques

    Guowei Yang | March 27, 2013 | 366 WVH 2:00pm

  10. Building Efficient Networked Systems

    Yadi Ma | March 21, 2013 | 366 WVH 10:00 am

  11. Building Scholarly Methodologies with Large-Scale Topic Analysis

    David Mimno | March 20, 2013 | 366 WVH 1:30 pm

  12. Manipulation Under Uncertainty

    Rob Platt | March 18, 2013 | 150 Forsyth 10:00 am

  13. Network Design in the Big-Data Age

    Xia Zhou | March 14, 2013 | 366 WVH 10:00 am

  14. Programming On Demand: Wrangling, Iterating, and Opportunistic Learning

    Philip Guo | March 13, 2013 | 366 WVH 1:00 pm

  15. Systems Design, Optimization and Implementation for Differentiated Qualities of Storage Services

    Feng Chen | March 11, 2013 | 366 WVH 10:00 am

  16. High-performance Main-memory Data Management

    Spyros Blanas | February 14, 2013 | 366 WVH 2:30 pm

  17. Statistical Relational Learning for Predictive Personalized Medicine

    Sriraam Natarajan | February 11, 2013 | 366 WVH 10:00 am

  18. Learning with Humans in the Loop

    Yisong Yue | February 6, 2013 | 366 WVH 1:30 pm

  19. New Technology Approaches to Creating Scalable Health Interventions for a Changing World

    Holly Jimison | February 4, 2013 | 366 WVH 2:00 pm

  20. Transforming Health Care with Technology: Model-Based Approaches

    Misha Pavel | February 4, 2013 | 366 WVH 10:15 am

2012 CCIS Colloquia

  1. Challenges in Building a Swarm of Robotic Bees

    Karthik Dantu | December 7, 2012 | 366 WVH 10:30am

  2. Brainwave Technologies for Gaming

    Ozgur Yavuzcetin | November 19, 2012 | 130 Forsyth 3:00pm

  3. Designing Core Mechanics

    Chris Esaki, Director, Microsoft Game Studios | November 15, 2012 | 366 WVH 3:00pm

  4. Sharing Sensitive Information with Privacy

    Emiliano De Cristofaro | November 14, 2012 | 366 WVH 1:30 pm

  5. Low-distortion Inference of Latent Similarities from a Multiplex Social Network

    David Kempe | May 16, 2012 | 366 WVH 11:00 AM

  6. Mining Heterogeneous Information Networks

    Mirek Riedewald | April 19, 2012 | 366 WVH 10:30 AM

  7. Large Graph Models and Scalable Analytics

    April 12, 2012 | 366 WVH 11:45 AM

  8. Restructuring wireless systems using PHY layer capabilities

    Guevara Noubir | April 2, 2012 | 366 WVH 11:45 AM

  9. Securing Virtualization: Techniques and Applications

    Engin Kirda | March 29, 2012 | 366 WVH 11:45 AM

  10. Exploring the Web, Beyond Document Search

    Mirek Riedewald | March 27, 2012 | 366 WVH 10:30 AM

  11. Towards Reliable Storage Systems: From OS-Level File Systems to Cloud Storage

    Olin Shivers | March 22, 2012 | 366 WVH 10:30 AM

  12. Analytics for Detecting Web and Social Media Abuse

    March 20, 2012 | 366 WVH 11:30 AM

  13. Noncommutative Grothendieck inequalities and application to quantum two-player games

    Christopher King (Math) and Rajmohan Rajaraman (CCIS) | March 19, 2012 | 366 WVH 1:30 PM

  14. Enabling Innovation in Middlebox Deployment

    Alan Mislove | March 16, 2012 | 366 WVH 11:30 AM

  15. Securing The Next Generation Web Platform

    Engin Kirda | March 14, 2012 | 366 WVH 11:45 AM

  16. Understanding Spam Economics

    Engin Kirda | March 1, 2012 | 366 WVH 11:45 AM

  17. Pinning Down “Privacy” in Statistical Databases

    Rajmohan Rajaraman | February 28, 2012 | 366 WVH 11:30 AM

  18. Motor, Voters, and the Future of Embedded Security

    Engin Kirda | February 24, 2012 | 366 WVH 11:30 AM

  19. Security and Privacy Challenges in Future Internet Architectures: the Case of Named Data Networking

    Guevara Noubir | February 23, 2012 | 366 WVH 11:00 AM

  20. Internet privacy: It is not getting better

    February 21, 2012 | 366 WVH 11:45 AM

  21. Threats and Defenses on the Social Web

    Alan Mislove | February 17, 2012 | 366 WVH 11:30 AM

  22. Why and How: A Reverse Perspective on Data Management

    Mirek Riedewald | February 14, 2012 | 366 WVH 10:30 AM

  23. Security and Reliability for Internet-scale Services

    Alan Mislove | February 10, 2012 | 366 WVH 11:00 AM

  24. Cryptographic protocols in the era of cloud computing

    Rajmohan Rajaraman | February 8, 2012 | 366 WVH 10:00 AM

  25. Inferring and Exploiting Relational Structure in Large Collections

    Alan Mislove | February 6, 2012 | 366 WVH 12:00 PM

  26. Mining, Mapping, and Accelerating Science and Technology

    February 3, 2012 | 366 WVH 11:45 AM

  27. Health Promotion Technology for Underserved Populations: An Ecological Approach

    Stephen Intille | February 2, 2012 | 366 WVH 10:00 AM

  28. Playing with Data

    February 1, 2012 | 153 SN 11:00 AM

  29. No Free Lunch in Data Privacy

    Mirek Riedewald | January 31, 2012 | 366 WVH 10:30 AM

  30. Maintaining Security Under Imperfect Secrecy

    Rajmohan Rajaraman | January 30, 2012 | 366 WVH 11:30 AM

  31. Finding Levity for Serious Games

    January 30, 2012 | 600 Columbus Place, 6th Floor 11:00 AM

  32. Secure Computation: From Theory Towards Practice

    Guevara Noubir | January 17, 2012 | 366 WVH 10:30 AM