CS Department Colloquium Series
Parallel Proofs for Parallel Programs
[[{"fid":"545","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"","field_file_image_title_text[und][0][value]":"Zachary Kincaid","field_file_caption_credit[und][0][value]":"%3Cp%3EZachary%20Kincaid%3C%2Fp%3E%0A","field_file_caption_credit[
Iterative Methods, Combinatorial Optimization, and Linear Programming Beyond the Universal Barrier
Deterministic Transaction Processing
[[{"fid":"544","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"Daniel Abadi","field_file_image_title_text[und][0][value]":"","field_file_caption_credit[und][0][value]":"%3Cp%3EDaniel%20Abadi%3C%2Fp%3E%0A","field_file_caption_credit[und][0
Verifying distributed car and aircraft systems with logic and refinement
Formal methods and theorem proving have been used successfully in many discrete applications, such as chip design and verification, but computation is not confined to the discrete world. Increasingly, we depend on discrete software to control safety-critical components of continuous physica
Learning Systems: Systems and Abstractions for Large-Scale Machine Learning
[[{"fid":"543","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"Joseph Gonzalez","field_file_image_title_text[und][0][value]":"","field_file_caption_credit[und][0][value]":"%3Cp%3EJoseph%20Gonzalez%3C%2Fp%3E%0A","field_file_caption_credit[
Rise of the Planet of the Apps: Security and Privacy in the Age of Bad Code
[[{"fid":"540","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"Suman Jana","field_file_image_title_text[und][0][value]":"","field_file_caption_credit[und][0][value]":"%3Cp%3ESuman%20Jana%3C%2Fp%3E%0A","field_file_caption_credit[und][0][fo
Crowd-Agents: Creating Crowd-Powered Interactive Systems
[[{"fid":"535","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"Walter Lasecki","field_file_image_title_text[und][0][value]":"","field_file_caption_credit[und][0][value]":"%3Cp%3EWalter%20Lasecki%3C%2Fp%3E%0A","field_file_caption_credit[un
Unlocking Interaction via Pixel-Based Reverse Engineering
[[{"fid":"529","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"Morgan Dixon","field_file_image_title_text[und][0][value]":"","field_file_caption_credit[und][0][value]":"%3Cp%3EMorgan%20Dixon%3C%2Fp%3E%0A","field_file_caption_credit[und][0
Unlocking Cellular Computation and Information Processing through Multidimensional Single-Cell Data
[[{"fid":"525","view_mode":"embedded_left","fields":{"format":"embedded_left","field_file_image_alt_text[und][0][value]":"Smita Krishnaswamy","field_file_image_title_text[und][0][value]":"","field_file_caption_credit[und][0][value]":"%3Cp%3ESmita%20K