Event Archive

Why Should Computer Science care about Identity? Webinar with Nicki Washington

Special Talk
Speaker Name
Nicki Washington
Location
Zoom - Registration Required
Date and Time
-

Duke Computer Science Professor Nicki Washington will be featured in a webinar today on Reimagining Education: Conversations on Character, Commitment & Community. Join Suzanne Shanahan, Nannerl O. Keohane Director of the Kenan Institute for Ethics and Associate Research Professor in Sociology and Nicki Washington for their conversation: “Why should computer science care about identity?”

Registration is required to attend this webinar:
Register Now

Computer Science 2021 Virtual Graduation Celebration

Special Event
Location
Virtual
Date and Time
-

Duke CS 2021 Graduates: Join our virtual celebration at 2 PM EDT on Sunday, May 2! The event will be live streamed over YouTube for friends and family, and CS graduates will be notified by email with the Zoom link to participate. CS faculty will welcome you to this Zoom meeting where you can interact with your peers, enjoy messages from CS alumni, hear graduates' names and degrees, awards, have some fun, and so much more. Don't miss it! https://graduation2021.cs.duke.edu

Disruptive Research on Distributed ML Systems

Systems and Networking Seminar
Speaker Name
Guanhua Wang
Location
The talk will be virtual on Zoom.
Date and Time
-

Deep Neural Networks (DNNs) enable computers to excel across many different applications such as image classification, speech recognition and robotics control. To accelerate DNN training and serving, parallel computing is widely adopted. System efficiency is a big issue when scaling out. In this talk, I will make three arguments towards better system efficiency in distributed DNN training and serving.

An Overview of Research Activities in the Software and Systems Division

Duke Electrical Computer Engineering Colloquium
Speaker Name
Ram D. Sriram
Location
The talk will be virtual on Zoom.
Date and Time
-

The mission of the Software and Systems Division (SSD) at the National Institute of Standards and Technology (NIST) is to work with industry, academia and other government agencies to accelerate the development and adoption of correct, reliable, testable software, leading to increased trust and confidence in deployed software; promulgate methods to develop better standards and testing tools for today's software infrastructures and tomorrow's next-generation software systems; advance the state of the art of software testing by developing scientifically rigorous, breakthrough techniques

E2E Encryption and Identity Properties for Zoom Meetings

Duke Privacy and Security Seminar
Speaker Name
Antonio Marcedone
Location
The talk will be virtual on Zoom.
Date and Time
-

Zoom’s platform provides video conferencing services for hundreds of millions of daily meeting participants. They use Zoom to conduct business, learn among classmates scattered by recent events, connect with friends and family, collaborate with colleagues, and in some cases, discuss critical matters of state. Zoom is working hard to improve meeting security for its users.

Google v Oracle: Copyright and Fair Use Examined

Duke Computer Science Colloquium
Speaker Name
Owen Astrachan
Location
The talk will be virtual on Zoom.
Date and Time
-
On April 5, 2021 the US Supreme Court in a 6-2 decision in the copyright case of Google v Oracle found that Google's use of the APIs from 37 Java packages in the Android platform was legally a "fair use", thus deciding the case in favor of Google. I was the technical expert witness working for Google in both jury trials. In this talk I will provide my perspective on the litigation, the trials, and the decision in favor of Google.

Networks Capable of Change

Duke Computer Science Distinguished Lecture Series
Speaker Name
Jennifer Rexford
Location
The talk will be virtual on Zoom.
Date and Time
-

The early designers of the Internet fostered tremendous innovation by leaving much of the network’s functionality to the programmable computers at its periphery. Unfortunately, the *inside* of the network has been much harder to change. Yet, changing the network is important to make the Internet more reliable, secure, performant, and cost-effective.  The networking research community has struggled for many years to make networks more programmable. What has worked, and what hasn't, and what lessons have we learned along the way?

Data Modalities and Differential Privacy

Duke Privacy and Security Seminar
Speaker Name
Amrita Roy Chowdhury
Location
The talk will be virtual on Zoom.
Date and Time
-
Differential privacy (DP) has emerged as the gold standard for achieving data privacy and has been deployed both by federal and commercial agencies. In this talk, I will show how to extend DP beyond its traditional domain of numeric datasets to address the privacy concerns of other data modalities - specifically, speech and eye-tracking data.

Towards a Robust DNS

Systems and Networking Seminar
Speaker Name
Ryan Beckett
Location
The talk will be virtual on Zoom.
Date and Time
-

The Domain Name System (DNS) is the "phonebook" of the Internet, efficiently connecting users to online services. Yet despite its importance, the DNS is also extraordinarily complex and, as a result, fraught with misconfigurations, software implementation bugs, and attack vectors for malicious actors, all of which can impact millions of users. In the past, issues in the DNS have rendered popular services such as GitHub, Twitter, HBO, LinkedIn, Yelp, and Azure inaccessible for extended periods of time. In this talk I will describe our work towards making the DNS as robust as possible.

Information Leakage in Encrypted Search

Duke Privacy and Security Seminar
Speaker Name
Tarik Moataz
Location
The talk will be virtual on Zoom.
Date and Time
-

Encrypted search is the area that focuses on the design, cryptanalysis, implementation of protocols and systems that allow search operations on encrypted data. One aspect of the area that is still poorly understood is its leakage. This talk will go over some recent cryptanalytic results as well as leakage suppression -- a new research direction that focuses on designing “low-leakage” schemes.

Zissou: Novel Datacenter, Server, and Software Designs using Liquid Immersion Cooling

Miscellaneous Talk
Speaker Name
Brijesh Warrier
Location
The talk will be virtual on Zoom.
Date and Time
-

Chip power has been steadily increasing with the end of Dennard scaling, requiring ever larger cooling infrastructures and server footprints.  Motivated by this trend, in project Zissou, we are exploring the use of 2-phase liquid immersion cooling for hyperscale public clouds.  Zissou will provide a multi-fold improvement in our IT cooling capability, and in turn unlock innovation across datacenter, server, and software stacks.

Manta: Privacy Preserving Blockchain Platform for DeFi and More

Systems and Networking Seminar
Speaker Name
Shumo Chu
Location
The talk will be virtual on Zoom.
Date and Time
-

In this talk, I am going to introduce Manta, the privacy preserving blockchain platform for DeFi. Manta solves the pseudo-anonymity problem of permissionless blockchain systems by putting privacy guarantee in the design principles. The core technique that Manta uses is zkSNARK, a zero-knowledge proof system that can verify any NP-statement efficiently with zero-knowledge. Currently, Manta has two parts, a decentralized anonymous payment layer that supports minting public tokens to private tokens, and a decentralized anonymous exchange layer that support exchanging tokens using AMM.

Lighting up Wireless Communication and Sensing

CS-ECE Distinguished Lecture Series
Speaker Name
Xia Zhou
Location
The talk will be virtual on Zoom.
Date and Time
-

We are entering a post-smartphone era, where zillions of new wireless devices compete for the already limited radio spectrum (RF) to obtain wireless connectivity. Addressing the problem of spectrum crunch demands radical new thinking. In this talk, I will present our journey in exploring light as a new spectrum territory, which provides ten thousand times wider bandwidth than RF for wireless communication. Additionally, the physical properties of light offer unique benefits for object tracking and behavioral sensing.

Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption

Duke Privacy and Security Seminar
Speaker Name
Sravya Yandamuri
Location
The talk will be virtual on Zoom.
Date and Time
-

Agreement protocols for partially synchronous or asynchronous networks tolerate fewer than one-third Byzantine faults. If parties are equipped with trusted hardware that prevents equivocation, then fault tolerance can be improved to fewer than one-half Byzantine faults, but typically at the cost of increased communication complexity. In this work, we present results that use small trusted hardware without worsening communication complexity assuming the adversary controls a fraction of the network that is less than one-half.

The Computer Network behind the Social Network

Systems and Networking Seminar
Speaker Name
James Hongyi Zeng
Location
The talk will be virtual on Zoom.
Date and Time
-

Facebook is one of the biggest Internet content providers in the world. In this talk, we will take a sneak peek of how the edge, backbone, and datacenter networks behind the scene that supports Facebook’s massive infrastructure, which in turn supports its more than 2 billion users through Facebook, Instagram, Whatsapp, Messenger, Oculus and many more applications.

Algorithmic Challenges in Efficient Training of Private (Deep) Language Models

Algorithms Seminar
Speaker Name
Janardhan Kulkarni
Location
The talk will be virtual on Zoom.
Date and Time
-

Many attacks have shown that deep learning models trained on private data of users can leak sensitive information of the users. Differential Privacy is a provable way to prevent such attacks. However, training deep learning models using DP introduces several new challenges both in terms of privacy vs accuracy tradeoffs and in the resource cost of the process. In this talk, I will highlight some of the problems we encountered, our solutions for resolving them and mention many important open problems.

Conversation with New York Times A.I. Reporter Cade Metz on his new book "Genius Makers"

Special Talk
Speaker Name
Cade Metz
Location
The talk will be virtual on Zoom.
Date and Time
-

Duke alum Cade Metz will discuss his new book, Genius Makers: The Mavericks Who Brought AI to Google, Facebook, and the World, a sweeping look at the rise of "AI" (Artificial Intelligence) over the last 10 years -- and the decades of history that made this possible. He will also discuss his time at Duke and his path to becoming a New York Times reporter. He will be interviewed by North Carolina State professor Ross Bassett, before taking any and all questions from students.

Protecting Cryptography against Compelled Self-Incrimination

Duke Privacy and Security Seminar
Speaker Name
Sarah Scheffler
Location
The talk will be virtual on Zoom.
Date and Time
-

The information security community has devoted substantial effort to the design, development, and universal deployment of strong encryption schemes that withstand search and seizure by computationally-powerful nation-state adversaries. In response, governments are increasingly turning to a different tactic: issuing subpoenas that compel people to decrypt devices themselves, under the penalty of contempt of court if they do not comply.