Distinguished Lecture Series - On the Evolution of Adversary Models in Security Protocols


Invariably, new technologies introduce new vulnerabilities which often enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversary models seem to be perpetually out of date: often they do not capture adversary attacks and sometimes they address attacks rendered impractical by new technologies.

Distinguished Lecture Series - New Style Parallel Programming


Parallel computers have been touted as the "next big thing" for three decades, but the software developers have been able to ignore it, largely by leveraging the ever increasing single-thread performance of modern microprocessors. This situation has completely changed within the last three years: flagship microprocessors from Intel, AMD and IBM are all "multicores". Now everyone needs a strategy for parallel programming.

Computational Environment for the computational modeling of human head


An important problem in Neuroscience is to determine the brain active regions given the measured electrical potentials on the scalp. This problem is called "the source localization problem". An accurate solution to this problem will provide an opportunity to access the active cortex region non-invasively. This knowledge can help neurologist in the treatment of epilepsy patients and can help psychologist to better understand the brain functions.


Subscribe to RSS - Colloquium