Coordinator: Prof. Xuehai Qian
Date | Location | Speaker | Title | Resources |
---|---|---|---|---|
September 20 | EEB 132 | Zhiyun Qian University of California Riverside |
Network Side Channel Attacks: An Oversight Yesterday, A Lingering Threat Today | |
October 4 | EEB 248 | Yu Hua Huazhong University of Science and Technology |
Encrypted Non-volatile Main Memory Systems | [slides][video] |
October 5 | EEB 248 | Yiying Zhang Purdue University |
Farewell to Servers: Hardware, Software, and Network Approaches Towards Datacenter Resource Disaggregation | [slides][video] |
October 11 | EEB 248 | Akshitha Sriraman University of Michigan |
Auto-Tuned Threading for OLDI Microservices | [video] |
October 12 | RTH 105 | Scott Aaronson University of Texas at Austin |
Quantum Supremacy and its Applications | [slides][video] |
November 13 | EEB 132 | Michel A. Kinsy Boston University |
Trusted Inference Engine: Preventing Neural Network Exfiltration in Hardware Devices | [video] |
November 16 | EEB 248 | Brandon Lucia Carnegie Mellon University |
Intermittent Computing Systems |
Date | Location | Speaker | Title | Resources |
---|---|---|---|---|
November 7 | EEB 132 | Tony Nowatzki UCLA |
Towards General Purpose Acceleration by Exploiting Irregularity | |
November 15 | RTH 211 | Mircea Stan University of Virginia |
Processing in Memory (PIM) – Power and Thermal Challenges And Opportunities |
Date | Location | Speaker | Title | Resources |
---|---|---|---|---|
January 31st | RTH 526 | Lin Tan Purdue University |
AI for Software and Software for AI | |
February 18 | EEB 248 | Nael Abu-Ghazaleh UC Riverside |
Secure speculative execution in the age of Spectre and Meltdown | |
February 20 | EEB 248 | Kirk W. Cameron Virginia Tech |
Limits of the quantitative approach, or why parallel and distributed system energy management needs to move on | |
February 28 | RTH 105 | Lizy Kurian John UT Austin |
Machine Learning for Performance and Power Modeling/Prediction |