rhm31's list 2002-06-12 16:15: Electromagnetic eavesdropping on computers (Markus Kuhn (University of Cambridge)) 2005-06-10 11:00: What we talk about when we talk about context (Alan Blackwell and Richard Harper, University of Cambridge / Microsoft Research Cambridge) 2005-07-08 11:00: An activity theory approach to affordance (Abi Sellen and Kasim Rehman, Microsoft Research / Computer Laboratory) 2005-08-05 11:00: Let's stop pushing the envelope and start addressing it: a reference task agenda for HCI (William Newman and Jost Schatzmann) 2005-09-02 11:00: Wicked Problems Revisited (Martyn Dade-Robertson and Alex Taylor) 2005-10-06 11:00: Bounding Rational Analysis: Constraints on the Approach to Optimality (Richard Young and Alan Blackwell, UCL/Cambridge) 2005-11-03 11:00: User interface design with matrix algebra. (William Newman and David Mackay) 2005-12-01 11:00: The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company (William Newman and Lorisa Dubuc) 2006-01-31 16:15: Covert channels in TCP/IP: attack and defence (Steven J. Murdoch, University of Cambridge) 2006-02-02 11:00: An evaluation of integrated zooming and scrolling on small screens (Phil Tuddenham + Keith Vertanen) 2006-02-21 16:15: Design and implementation of a CC CAPP-compliant audit subsystem for the Mac OS X and FreeBSD operating systems (Robert N M Watson, University of Cambridge) 2006-02-28 16:15: Hiding on an Ethernet (Richard Clayton, University of Cambridge) 2006-03-02 11:00: Project Ernestine: Validating a GOMS analysis for predicting and explaining real-world performance (Alan Blackwell and William Newman) 2006-03-07 16:15: Security Flaws in Tunnel Mode IPsec (Kenny Paterson, Royal Holloway, University of London) 2006-03-31 16:00: Enhancing Signature-based Collaborative Spam Detection (Jeff Yan, University of Newcastle upon Tyne) 2006-05-04 11:00: Implications for Design (Abigail Sellen and Nathan Crilly) 2006-05-09 16:15: On inverting the VMPC one-way function (Kamil Kulesza, University of Cambridge) 2006-05-16 16:15: An overview of vulnerability research and exploitation (Peter Winter-Smith and Chris Anley, NGS Software) 2006-05-17 14:15: CCTV in the UK: A failure of theory or a failure of practice? (Martin Gill, PRCI Ltd) 2006-05-19 16:00: Network Security Monitoring (Richard Bejtlich, TaoSecurity) 2006-05-23 14:15: Opening locks by bumping in five seconds or less: is it really a threat to physical security? (Marc Weber Tobias, Investigative Law Offices) 2006-06-01 11:00: Making by making strange: Defamiliarization and the design of domestic technologies (Jack Lang and Andrew Barry) 2006-06-16 16:15: Bluetooth Simple Pairing: public key cryptography in adhoc wireless systems (Robin Heydon and Steven Wenham, CSR) 2006-07-06 11:00: Older People as a focus for Inclusive Design (Joy Goodman and Lorisa Dubuc) 2006-07-25 16:15: Milk or wine: does software security improve with age? (Andy Ozment, Computer Laboratory, University of Cambridge) 2006-08-03 11:00: Understanding Non-Literacy as a Barrier to Mobile Phone Communication (Nathan Crilley and Lucia Terrenghi) 2006-09-01 11:30: Rethinking Information and Space in Ubiquitous Computing (Paul Dourish, University of California at Irvine) 2006-09-08 16:00: Peer-to-peer network topologies and anonymity (Nikita Borisov, Electrical and Computer Engineering Department, University of Illinois at Urbana-Champaign) 2006-09-19 16:15: Daonity - Grid security with behaviour conformity from Trusted Computing (Wenbo Mao, HP Labs, China) 2006-09-26 16:15: Privacy preserving data mining in distributed databases (Ehud Gudes, Department of Computer Science, Ben-Gurion University) 2006-10-04 14:15: Learning Probabilistic Sequence Models for Uncovering Gene Regulation (Mark Craven, University of Wisconsin) 2006-10-06 14:00: Collection and Contra-collection in Mathematics (Paulo Oliva, Queen Mary, University of London) 2006-10-06 16:00: Distance bounding protocols: Authentication logic analysis (Catherine Meadows, Naval Research Laboratory) 2006-10-11 14:15: Logics for Unranked Trees: An Overview (Leonid Libkin, U of Edinburgh) 2006-10-13 14:00: Logical equivalence for subtyping object and recursive types. (Steffen van Bakel) 2006-10-18 14:15: Semantics in broad-coverage natural language processing (Ann Copestake, Computer Laboratory, University of Cambridge) 2006-10-18 16:15: The Polygraph (Marc Weber Tobias, Investigative Law Offices) 2006-10-18 16:15: Learning Probabilistic Sequence Models for Uncovering Gene Regulation (Mark Craven, University of Wisconsin) 2006-10-24 16:15: Becoming paranoid or, How I learned to start worrying and fear the Internet (George Neville-Neil) 2006-10-25 14:15: All-Optical Networks (Dr. Noriaki Kamiyama, Research Scientist, NTT Service Integration Laboratories) 2006-10-27 14:00: A structural proof of the soundness of rely/guarantee rules (Cliff Jones, Newcastle University) 2006-10-31 16:15: Optically enhanced position-locked power analysis (Sergei Skorobogatov, Computer Laboratory, University of Cambridge) 2006-11-01 14:15: The Challenges and Thrills of a Young Industry (David Braben, Frontier) 2006-11-03 14:00: Reasoning about Code Pointers (Separation Logic for Higher-Order Store) (Bernhard Reus, University of Sussex) 2006-11-08 14:15: Security Applications and Aspects of Meaning-Based Computing (Dr Michael Lynch, CEO of Autonomy) 2006-11-10 14:00: Bialgebras and modal logic (Bartek Klin, University of Edinburgh) 2006-11-13 10:00: Algebraic Routing (Part 1) (Tim Griffin) 2006-11-15 10:00: Algebraic Routing (Part 2) (Tim Griffin) 2006-11-15 14:15: Automatic termination proofs for software (Byron Cook, Microsoft Research) 2006-11-17 10:00: Algebraic Routing (Part 3) (Tim Griffin) 2006-11-17 14:00: A logical approach to data provenance. (James Cheney, Informatics, University of Edinburgh) 2006-11-21 16:15: Politics of Internet Security (Richard Allan, Cisco) 2006-11-22 14:15: Safety checking in a domain of collaborative applications. (David Greaves, Computer Laboratory, University of Cambridge) 2006-11-29 10:00: Countable ordinals and fast-growing functions (Part 1) (Thomas Forster (DPMMS)) 2006-11-29 14:15: New Challenges in Describing Digital Music (Alan Blackwell and Alejandro Vinao, Computer Laboratory, University of Cambridge) 2006-11-30 10:00: Countable ordinals and fast-growing functions (Part 2) (Harold Simmons (Univ. of Manchester)) 2006-12-01 09:00: Countable ordinals and fast-growing functions (Part 3) (Harold Simmons (Univ. of Manchester)) 2006-12-01 14:00: Fine-grained concurrency with separation logic (Uday Reddy, University of Birmingham) 2006-12-07 11:00: Using action research in information systems design to address change: a South African health information systems case study (Nathan Crilly and Cecily Morrison) 2007-01-04 11:00: Emotion recognition in human-computer interaction (Tal Sobol-Shikler and Lorna Brown) 2007-01-17 14:15: Verification of fine-grain concurrency: Separation Logic for Floyd assertions in Petri nets. (Tony Hoare, Microsoft Research) 2007-01-23 16:15: Privacy preserving censorship (Yvo Desmedt, Department of Computer Science, University College London) 2007-01-24 14:15: Road transport data and their uses (Richard Gibbens (Computer Laboratory)) 2007-01-30 16:15: A reciprocation-based economy for multiple services in P2P grids (Miranda Mowbray, HP Labs Bristol UK) 2007-01-31 14:15: Mechanising First-Order Logic: Technology, Decidability and Applications (Christoph Weidenbach, Max Planck Institut) 2007-02-01 11:00: How expert engineering teams use disciplines of innovation (Alan Blackwell and Chris Bishop) 2007-02-06 16:15: Data sharing and privacy in multi-agency working (Adam Warren, Department of Information Science, Loughborough University) 2007-02-07 14:15: From Pascal and ML to Perl and VB: Software Engineering in Postmodernity (James Noble, Victoria University of Wellington, New Zealand.) 2007-02-09 14:00: Verifying Object-Invariants in Spec# (Wolfram Schulte (Microsoft Research Redmond)) 2007-02-13 16:15: Anonymity in the wild: Mixes on unstructured networks (Shishir Nagaraja, Computer Laboratory, University of Cambridge) 2007-02-14 14:15: Computing for the Future of the Planet (Andy Hopper, Computer Laboratory, University of Cambridge) 2007-02-21 14:15: The Lixto Web Data Extraction Project: A Status Report (Georg Gottlob, Oxford University) 2007-02-23 14:00: A Logic of Reachable Patterns in Linked Data-Structures (Greta Yorsh (Tel Aviv University)) 2007-02-27 10:00: Mechanizing Theories in Twelf: A Tutorial (Part 1) (Susmit Sarkar) 2007-02-27 16:15: Power analysis attacks (Elisabeth Oswald, Department of Computer Science, University of Bristol) 2007-02-28 14:15: Security and Cooperation in Wireless Networks (Jean-Pierre Hubaux, EPFL) 2007-03-01 10:00: Mechanizing Theories in Twelf: A Tutorial (Part 2) (Susmit Sarkar) 2007-03-01 11:00: Moving on from Weiser's Vision of Calm Computing: engaging UbiComp experiences (Cecily Morrison) 2007-03-02 14:00: Verification Across Intellectual Property Boundaries (Helmut Veith, Technische Universität München) 2007-03-05 10:00: Mechanizing Theories in Twelf: A Tutorial (Part 3) (Susmit Sarkar) 2007-03-06 16:15: Alternative security mechanisms for WiFi networks (Daniel Cvrcek, Computer Laboratory, University of Cambridge) 2007-03-07 16:15: Annual Presentation of Student Projects (Student presentations.) 2007-03-09 14:00: Stone duality for bitopological spaces (Achim Jung, University of Birmingham) 2007-03-16 14:00: Relational parametricity for computational effects. (Rasmus Møgelberg, Edinburgh) 2007-03-23 14:00: When While is a Security Risk (Pasquale Malacaria, Queen Mary, University of London) 2007-04-18 14:15: Church's Problem on the Synthesis of Nonterminating Programs (Wolfgang Thomas, RWTH Aachen University) 2007-04-25 14:15: DNA Microarray Technology at Agilent Technologies: Engineering, Manufacturing and Applications (Bill Peck, Agilent Technologies, Santa Clara California) 2007-05-01 14:15: Phishing tips and techniques: tackle, rigging, and how and when to phish (Peter Gutmann, University of Auckland) 2007-05-01 16:15: The commercial malware industry (Peter Gutmann, University of Auckland) 2007-05-02 14:15: “I want to tell you a joke. Are you ready?” – Implementing automated pun generation for children with complex communication needs. (Annalu Waller, School of Computing, University of Dundee) 2007-05-08 16:15: Towards open trusted computing frameworks (Matt Barrett) 2007-05-09 14:15: Modelling Biochemical Pathways with Stochastic Process Algebra (Jane Hillston, University of Edinburgh) 2007-05-11 14:00: Infinite-State System Verification via Tree Automata (Wolfgang Thomas, RWTH Aachen) 2007-05-15 14:30: Alertme.com - implementing wireless home security 2.0 (Amyas Phillips, Alertme.com) 2007-05-15 16:15: Realities of online banking fraud (Matthew Pemble, Vizuri) 2007-05-16 14:15: New Directions for Navigation (Alan Jones, Cotares.com) 2007-05-18 14:00: An Executable Model of the JVM in Coq (Robert Atkey, LFCS, Edinburgh) 2007-05-18 15:15: Computational specification for temporal abstraction in music (Alejandro Vinao) 2007-05-18 15:45: I solemnly swear that I am up to... automatic parallelisation (Anton Lokhmotov (University of Cambridge)) 2007-05-23 14:15: Electronics Revolution - driving pivotal change in Computer Science (Simon.Moore, Computer Laboratory, University of Cambridge) 2007-05-30 14:15: Smart-card based authentication on an insecure network (Peter Sweeney, Centre for Communication Systems Research, University of Surrey.) 2007-06-01 15:15: Two Software-Based Models of Thread Level Speculation (Cosmin Oancea (University of Cambridge)) 2007-06-07 11:00: How HCI Interprets the Probes (Alan Blackwell and Richard Harper) 2007-06-08 14:00: Valiant's theory (Guillaume Malod (University of Mons-Hainaut, Belgium)) 2007-06-15 14:00: Cyclic Proofs of Program Termination in Separation Logic (James Brotherston, Imperial College) 2007-06-22 15:15: Termination analysis and call graph construction for higher-order functional programs (Damien Sereni (University of Oxford)) 2007-06-29 15:15: Sound Haskell (Dana N. Xu (University of Cambridge)) 2007-07-05 11:00: Do artifacts have politics? (Andrea Grimes and Robert Doubleday) 2007-07-06 14:00: A unified model of class invariant verification frameworks (Sophia Drossopoulou (Imperial College)) 2007-07-13 14:00: The Java Memory Model - the Good, the Bad and the Ugly (Jaroslav Sevcik) 2007-07-30 16:15: The economics of revealing and protecting private information: Evidence from human subject experiments and surveys (Jens Grossklags, School of Information, University of California Berkeley) 2007-08-02 11:00: Design parameters of rating scales for web sites (Luke Church and Per Ola Kristensson) 2007-09-06 11:00: Assessing Dimensions of Perceived Visual Aesthetics of Web Sites (Nathan Crilly and Chris Nash) 2007-09-19 14:15: SQ Minus EQ can Predict Programming Aptitude (Stuart Wray) 2007-10-02 16:15: High security locks: illusion or reality (Marc Weber Tobias) 2007-10-04 11:00: Designing for Usability: Key Principles and What Designers Think (Gilbert Cockton and Luke Church) 2007-10-10 14:15: How to Write Bug-Free Code - A Live Demonstration (Douglas Squirrel, youdDevise.com) 2007-10-15 10:00: Proving program termination (Part 1) (Byron Cook, Microsoft Research, Cambridge) 2007-10-16 16:15: Synergy of crime science and security engineering (Shaun Whitehead) 2007-10-17 14:15: How Do We Know What to Design? (Fred Brooks, University of North Carolina at Chapel Hill) 2007-10-19 10:00: Proving program termination (Part 2) (Byron Cook, Microsoft Research, Cambridge) 2007-10-22 10:00: Proving program termination (Part 3) (Byron Cook, Microsoft Research, Cambridge) 2007-10-24 14:15: TechTalk by Google - The Chubby lock service for loosely-coupled distributed systems (Mike Burrows, Principal Engineer, Google) 2007-10-25 15:15: Jones Optimality and Hardware Virtualization (A Report on Work in Progress) (Boris Feigin (University of Cambridge)) 2007-10-26 14:00: Logical Reasoning for Higher-Order Functions with Local State (Nobuko Yoshida (Imperial College)) 2007-10-30 16:15: Key amplification in unstructured networks (Shishir Nagaraja, Computer Laboratory, University of Cambridge) 2007-10-31 14:15: Multi-core programming with automatic parallelisation (Tim Harris, Microsoft Research, Cambridge) 2007-11-01 16:15: The cognitive neuroscience of the human voice (Pascal Belin (University of Glasgow)) 2007-11-02 14:00: Model theoretic tools for deciding boundedness of fixed points (Martin Otto, Darmstadt) 2007-11-06 14:30: Pointer Safety and Graph Grammars (Mike Dodds (York)) 2007-11-07 14:15: Birrell's distributed reference listing revisited (Richard Jones, University of Kent) 2007-11-09 14:00: Separation Logic Semantics for Communicating Processes (Peter O'Hearn, Queen Mary, University of London) 2007-11-13 16:15: Authentication protocols based on human interaction in security pervasive computing (Nguyen Hoang Long, Oxford University Computing Laboratory) 2007-11-14 14:15: Software Defect Mining with Formal Concept Analysis (Christian Lindig, Dagstuhl, Germany) 2007-11-16 11:00: Initial organising meeting (Speaker to be confirmed) 2007-11-21 14:15: Executable Biology: Successes and Challenges (Jasmin Fisher, Microsoft Research, Cambridge, United Kingdom) 2007-11-23 14:00: Category Theory and the Philosophy of Language (Graham White (Queen Mary)) 2007-11-23 15:15: Detecting and Tracking Inconsistencies in UML (Alexander Egyed (University College London and University of Southern California)) 2007-11-27 16:15: Networked information processing and privacy in Japan (Andrew A. Adams, School of Systems Engineering, University of Reading) 2007-11-28 14:15: Automation for Interactive Theorem Provers (Lawrence Paulson, Computer Laboratory, University of Cambridge) 2007-11-29 16:15: Uncertainty and behavioural control: Episodes, actions and habits (Peter Dayan (University College London)) 2007-11-30 11:30: Hindley-Milner type inference (Barney Stratford) 2007-11-30 14:00: Logics for Coalgebras (Alexander Kurz, University of Leicester) 2007-12-04 16:15: The Anti-Bank: the privatized delivery of social grants using biometric encrypted smart-cards in southern Africa (Keith Breckenridge, Professor of History and Internet Studies, University of KwaZulu-Natal, South Africa) 2007-12-06 11:00: Getting to Grips with Technology (Mo Syed and Tim Regan) 2007-12-06 15:15: Controlling control flow in web application (Robin Message (University of Cambridge)) 2007-12-07 11:30: Dependent types (David Turner (University of Cambridge)) 2007-12-07 16:00: Graphical passwords: some recent results (Jeff Yan, University of Newcastle) 2007-12-11 16:15: Tracking the Russian Business Network (RBN) (Jart Armin) 2007-12-13 11:30: Intuitionistic logic (Alexander Gurney (University of Cambridge)) 2007-12-14 15:15: Memory safety with exceptions and linear types (Richard Thrippleton, Computer Laboratory, University of Cambridge) 2007-12-18 16:15: Towards interactive belief, knowledge, and provability: possible application to zero-knowledge proofs (Simon Kramer, École Polytechnique Paris) 2008-01-16 14:15: Searching for Evil (Ross Anderson and Richard Clayton, Computer Laboratory, University of Cambridge) 2008-01-17 14:00: A completeness proof for bisimulation in the pi-calculus using Isabelle (Jesper Bengtson, Uppsala University) 2008-01-18 14:00: On Scalable Shape Analysis (Hongseok Yang (Queen Mary, University of London)) 2008-01-18 15:15: The Constraint Handling Rules (CHR) language (Tom Schrijvers, Catholic University of Leuven) 2008-01-23 16:15: Fine-grained differences and similarities in meanings (Graeme Hirst, Department of Computer Science, University of Toronto) 2008-01-29 10:30: Exploiting Online Games (Gary McGraw, CTO, Cigital) 2008-01-30 14:15: Executable Biology: Successes and Challenges (Jasmin Fisher, Microsoft Research, Cambridge UK) 2008-02-06 14:15: Defence against the Dark Arts (Mike Prettejohn, Netcraft) 2008-02-07 11:00: Computational Thinking (Simon Peyton Jones and Luke Church) 2008-02-08 11:00: Lent term initial meeting (Speaker to be confirmed) 2008-02-12 16:15: Hot or Not: Fingerprinting hosts through clock skew (Steven J. Murdoch (Computer Laboratory, University of Cambridge)) 2008-02-13 14:15: Rethink and Arise! (Theodor Holm Nelson, Founder, Project Xanadu) 2008-02-13 16:15: Hardware defences against side channel and invasive attacks (Philip Paul, Computer Lab, University of Cambridge) 2008-02-15 11:00: Stone Duality (David Turner (University of Cambridge)) 2008-02-20 14:15: High-Performance Processing with Field-Programmable Logic (George Constantinides, Imperial College London) 2008-02-22 11:00: Domain theory: dI-domains (Barney Stratford (University of Cambridge)) 2008-02-22 16:00: Is SSL provably secure ? (Nigel Smart, Department of Computer Science, University of Bristol) 2008-02-27 14:15: Delay Tolerant Routing in Mobile and Sensor Networks (Cecilia Mascolo, UCL) 2008-02-29 16:00: MD5crypt and GBDE: observations of a non-union cryptographer (Poul-Henning Kamp) 2008-03-05 16:15: Student Design Project Presentations (Alan Blackwell (University of Cambridge)) 2008-03-06 11:00: Unpacking a Timesheet: Formalisation and Representation (Robin Boast and Alan Blackwell) 2008-03-07 11:00: Focusing and proof search (Ruy Ley-Wild) 2008-03-07 14:00: Keep Off The Grass: Locking the Right Path for Atomicity (David Cunningham (Imperial College)) 2008-03-12 14:15: Sustainable Energy -- without the hot air (David J.C. MacKay, University of Cambridge) 2008-03-14 11:00: Tree decomposition of graphs (Bjarki Holm (University of Cambridge)) 2008-03-14 15:15: Sequentializing the Value State Dependence Graph (Alan Lawrence) 2008-03-25 16:15: Minimal TCB Code Execution (Jonathan M. McCune, Carnegie Mellon University) 2008-04-08 16:15: An Empirical Analysis of Phishing Attack and Defense (Tyler Moore (Computer Laboratory, University of Cambridge)) 2008-04-15 16:15: Process isolation for cloud computing using commodity operating systems (Wenbo Mao, Director and Chief Engineer, EMC Research China) 2008-04-18 14:00: A language extension for provably safe exception handling (Bart Jacobs (Katholieke Universiteit Leuven)) 2008-04-23 16:15: Fighting online crime (Mikko Hyppönen, Chief Research Officer, F-Secure Corporation) 2008-04-29 16:15: "From the Casebooks of..." (Mark Seiden) 2008-04-30 14:15: Copyright vs Community (Richard Stallman, www.gnu.org) 2008-05-01 11:00: What Is Good? – A Comparison Between The Quality Criteria Used In Design And Science (Cecily Morrison) 2008-05-02 14:00: Verification Based on Algebra and Automated Deduction (Georg Struth, Sheffield University) 2008-05-07 14:15: Stylized Rendering for Multi-resolution Image Representation: Reconciling Efficiency with Aesthetics in Image Compression (Neil Dodgson, Computer Laboratory) 2008-05-09 14:00: Eriskay: a programming language based on game semantics. (John Longley, University of Edinburgh) 2008-05-14 14:15: Citations and Argumentation for Better Information Access (Simone Teufel, Computer Laboratory) 2008-05-15 19:00: ALL IN THE BEST POSSIBLE TASTE - THE SCIENCE OF FOOD & FLAVOUR (Dr Len Fisher, University of Bristol) 2008-05-16 14:00: Extensional rewriting with sums (Sam Lindley, University of Edinburgh) 2008-05-20 14:30: Privacy-preserving datagram delivery for ubiquitous systems (David Evans (Computer Laboratory)) 2008-05-21 14:15: How to prove that a communications protocol stack is up to the job (James Collier, Chief Technical Officer , Cambridge Silicon Radio, http://www.csr.com) 2008-05-23 14:15: Map-reduce as a Programming Model for Custom Computing Machines (Philip Leong, The Chinese University of Hong Kong) 2008-05-28 14:15: Acceleration of scientific computing using graphics hardware (Graham Pullan, Department of Engineering, University of Cambridge) 2008-06-05 11:00: Evaluating user interface systems research (Per Ola Kristensson) 2008-06-06 14:00: Event structure semantics of the pi-calculus (Daniele Varacca, Paris 7) 2008-06-17 16:15: "Fourteen Thousand Messages" (John Levine) 2008-06-24 16:15: Advances in Hash Cryptanalysis (Christian Rechberger, IAIK, Graz University of Technology) 2008-06-27 14:00: The interpretation of intuitionistic type theory in locally cartesian closed categories: an intuitionistic approach (Peter Dybjer) 2008-07-03 11:00: Affective computing: problems, reactions and intentions (Shazia Afzal) 2008-08-07 11:00: “Resistance is Futile”: Reading Science Fiction Alongside Ubiquitous Computing (Mark Blythe, University of York) 2008-09-03 14:15: STRUCTURE AND DYNAMICS IN COMPLEX SYSTEMS (Prof Luciano da Fontoura Costa, University of São Paulo, Brazil) 2008-09-05 16:00: Electronic health records: which is worse, the UK system or the US System? (Deborah C. Peel, Patient Privacy Rights) 2008-09-26 14:00: Nominal terms and one-and-a-half level Curry-Howard (Jamie Gabbay) 2008-10-02 11:00: How do we program the home? Gender, attention investment, and the psychology of programming at home. (Steven Clarke and Cecily Morrison) 2008-10-08 14:15: Content Distribution based on Social Swarming (Carmen Guerrero – Dpt. of Telematics Engineering at University Carlos III Madrid (UC3M)) 2008-10-10 14:00: Classical BI (A Logic for Reasoning About Dualising Resource) (James Brotherston, Imperial College) 2008-10-10 15:15: Planning meeting and welcome (Speaker to be confirmed) 2008-10-13 14:00: Design, Compilation and Runtime Solutions for Energy-Efficient Microprocessors (Timothy M. Jones - School of Informatics, University of Edinburgh) 2008-10-15 14:15: Practical Dynamic Software Updating for C (Michael Hicks - University of Maryland) 2008-10-17 14:00: NO LOGIC AND SEMANTICS SEMINAR TODAY () 2008-10-17 15:15: Dynamic loaded compiler plugins for the Glasgow Haskell Compiler (Max Bolingbroke (University of Cambridge)) 2008-10-21 16:15: Browsing with the enemy: a German view (Kai Buchholz-Stepputtis and Boris Hemkemeier) 2008-10-22 14:15: Forensic Genomics:Kin Privacy, Driftnets and Other Open Questions (Frank Stajano, Lucia Bianchi, Pietro Liò and Douwe Korff) 2008-10-24 15:15: Logical Testing: Hoare-style Specification Meets Executable Validation (Kathy Gray (University of Cambridge)) 2008-10-29 14:15: How to Protect your Data by Eliminating Trusted Storage Infrastructure (David Mazieres - Stanford University) 2008-10-29 15:15: A practical approach to Domain Specific Language development (Vitaly Lugovskiy http://www.meta-alternative.net/) 2008-10-30 17:15: The New Food Security Debate: Should the UK produce as much of its own food as possible? (Tim Lang, Professor of Food Policy, City University) 2008-10-30 19:30: Internet Censorship and How It Is Resisted (Dr Steven Murdoch (Computer science department, University of Cambridge)) 2008-11-03 15:15: Towards programming Safety Critical Systems in Java (Bent Thomsen (Aalborg University)) 2008-11-04 16:15: Improving Tor using a TCP-over-DTLS Tunnel (Joel Reardon, University of Waterloo) 2008-11-05 14:15: The Manticore project (John Reppy - University of Chicago) 2008-11-06 15:30: Realizability Semantics of Parametric Polymorphism, General References, and Recursive Types (Lars Birkedal, ITU Denmark) 2008-11-07 15:15: Work in progress on visual programming languages (Robin Message (University of Cambridge)) 2008-11-11 16:15: Is the Operating System the Right Place to Address Mobile Phone Security? (Craig Heath, Symbian) 2008-11-12 14:15: Defending Networked Resources Against Floods of Unwelcome Requests (Michael Walfish - University of Texas, Austin and University College London) 2008-11-14 15:15: Limits of parallelism using Dynamic Dependency Graphs (Jonathan Mak (University of Cambridge)) 2008-11-17 19:30: “What goes round comes round” Making wind turbines from renewable materials (Dr Jim Platts (Department of Engineering, University of Cambridge)) 2008-11-19 14:15: Robust Networks (Sanjeev Goyal, University of Cambridge, Economics Department) 2008-11-20 19:00: The Climate Crunch: Ethics, Ecology and the End of Civilisation (Dr Michael Northcott, Divinity, University of Edinburgh) 2008-11-21 14:00: Polynomial functors (Nicola Gambino) 2008-11-21 15:15: Haskell is Not Not ML (Benjamin Rudiak-Gould (University of Cambridge)) 2008-11-21 16:00: The robustness of CAPTCHAs (Jeff Yan, Newcastle University) 2008-11-26 14:15: MetiTarski: An Automatic Theorem Prover for Real-Valued Special Functions (Larry Paulson - Univ. of Cambridge Computer Laboratory) 2008-11-27 14:00: Economics of architectural change: resistance to distributed denial of service attacks (Mikko Särelä, NomadicLab, Ericsson) 2008-11-28 14:45: Dynamics, robustness and fragility of trust (Dusko Pavlovic) 2008-12-02 16:15: Talking to strangers (Bruce Christianson, University of Hertfordshire) 2008-12-03 14:15: Second-Order Quantifier Elimination (Renate Schmidt - University of Manchester) 2008-12-09 16:15: Bayesian Inference and Traffic Analysis (Carmela Troncoso, Microsoft Research Cambridge/KU Leuven(COSIC)) 2009-01-13 16:15: Identity Theft and the Mobile Device (Andy Jones - Head of Information Security Research, Centre for Information & Security Systems Research, BT Innovate) 2009-01-14 14:15: Statistical Parsing of Natural Language with Lexicalised Grammars (Stephen Clark - Oxford University) 2009-01-16 16:00: How secure is my messaging protocol for clinical communication? (Mohammed Al-Ubaydli) 2009-01-20 16:15: Hardware security: trends and pitfalls of the past decade (Sergei Skorobogatov - Computer Laboratory, University of Cambridge) 2009-01-21 14:15: Structured Hidden Markov Model: A General Tool for Analysing Sequential data (Marco Botta - University of Torino) 2009-01-27 16:15: Improving Cache Performance while Mitigating Software Side-Channel Attacks (Ruby Lee - Princeton University) 2009-01-28 14:15: A Framework for the Analysis of Mix-Based Steganographic File Systems (Claudia Diaz - Department of Electrical Engineering (ESAT), K.U.Leuven, Belgium) 2009-01-30 14:00: Nondeterminism: many questions and (maybe) some answers (Paul Levy, University of Birmingham (visiting Cambridge until March 15)) 2009-01-30 15:15: Deriving efficient data movement from decoupled Access/Execute specifications (Anton Lokhmotov (Imperial College London; CPRG alumnus 2008)) 2009-02-03 14:30: An overview of the Smart Flow project (David Eyers (University of Cambridge)) 2009-02-03 16:15: Privacy-Preserving 802.11 Access-Point Discovery (Janne Lindqvist - Helsinki University of Technology, Finland) 2009-02-03 16:15: Call-by-push-value (part 1) (Paul Levy, University of Birmingham (visiting Cambridge until March 15)) 2009-02-04 14:15: IPv6: the basics (Ben Harris, University of Cambridge) 2009-02-04 16:15: Call-by-push-value (part 2) (Paul Levy, University of Birmingham (visiting Cambridge until March 15)) 2009-02-05 14:00: Equideductive logic and CCCs with subspaces (Paul Taylor) 2009-02-11 14:15: Modelling Quality Properties of Systems (John Herbert - University College, Cork, Ireland) 2009-02-12 16:00: Wedge: Splitting Applications into Reduced-Privilege Compartments (Andrea Bittau (UCL)) 2009-02-13 15:15: Programming for Mamba (Charlie Reams, Computer Lab) 2009-02-18 14:15: Privacy and HCISec: Notes From The Front (Alma Whitten - Google) 2009-02-20 14:30: A game for a neutral approach to provability in MALL (Olivier Delande, Laboratoire d'Informatique (LIX), Ecole Polytechnique) 2009-02-20 16:00: Security lessons from embedded devices (Philip Paeps, FreeBSD security team) 2009-02-25 14:15: Balancing the expected and the surprising in geometric patterns: an investigation inspired by Bridget Riley's early Op art (Neil Dodgson - University of Cambridge) 2009-02-27 15:15: Designing Languages to Aid Verification (David Pearce (Victoria University of Wellington)) 2009-02-27 16:00: Mobile malware prevention using temporal information (John Tang, Computer Laboratory) 2009-03-04 14:15: Collective Intelligence Techniques for Pervasive Computing (George Roussos - Birkbeck College, University of London) 2009-03-06 14:00: Deciding Boolean BI (via Display Logic) (James Brotherston, Imperial College London) 2009-03-06 14:00: Securing Virtual Machine Monitors: What is Needed? (Paul Karger (IBM Research - Watson)) 2009-03-06 15:15: Painless Parse Errors (Kathy Gray) 2009-03-10 16:15: The Effectiveness of T-way Test Data Generation (Michael Ellims) 2009-03-11 14:15: Correctness by Construction of High-Integrity Software (Rod Chapman, Praxis High Integrity Systems) 2009-03-13 15:15: Interoperation of Lucid's Dataflow paradigm and Object-orientation with a Coalgebraic Semantics (Dominic Orchard, Computer Lab) 2009-03-19 15:00: High Assurance Smart Cards for Multinational Coalitions and Other Applications of National Security (Paul Karger, IBM Watson Research Center) 2009-03-20 14:00: Structurally Recursive Descent Parsing (Nils Anders Danielsson (University of Nottingham)) 2009-03-20 15:15: Type (re)construction from values (Robin Message (Computer Lab)) 2009-03-24 16:15: Privacy Implications of Public Listings on Social Networks (Joseph Bonneau, University of Cambridge) 2009-03-26 16:00: Pointless Tainting? Evaluating the practicality of pointer tainting (Asia Slowinska (Vrije Universiteit Amsterdam)) 2009-03-30 15:00: Enhancing Verilog (Cherif Salama (Rice University)) 2009-04-07 16:15: Cloning MiFare Classic rail and building passes, anywhere, anytime (Nicolas Courtois, University College London) 2009-04-22 14:15: "Re-architecting Internet capacity sharing" aka "Putting far-reaching Cambridge research into practice" (Andrea Soppera - BT Networks Research Centre) 2009-04-24 14:00: TALK CANCELLED: An overview of structural corecursion (Venanzio Capretta (University of Nottingham)) 2009-04-24 15:15: Beginning of term introductory meeting (Speaker to be confirmed) 2009-04-27 14:00: (Research) OpenRoomMap: Mapping the Gates building / (Skills) Best Papers Lent 2009 (Andrew Rice and DTG members) 2009-04-28 16:15: Bypassing Physical Security Systems (Marc Weber Tobias, Investigative Law Offices) 2009-04-29 14:15: Accounting for User Behaviour in Security (Angela Sasse - UCL) 2009-04-30 17:00: A conversation with Phil Zimmermann (Phil Zimmerman) 2009-05-01 15:15: Cake: a language for adapting and linking mismatched binary components (Stephen Kell (Computer Lab)) 2009-05-06 15:00: Inventing the User: EDSAC in context (Professor David Barron, Emeritus Professor of the University of Southampton, Dr Doron Swade MBE, formerly Senior Curator of Computing, Science Museum, and Professor Sir Maurice Wilkes) 2009-05-08 14:00: Focalisation and Classical Realisability (Guillaume Munch, Paris 7) 2009-05-12 16:15: Whither Challenge Question Authentication? (Mike Just, University of Edinburgh) 2009-05-13 14:15: Model-Based Design: a New Landscape for Embedded Systems Development (David Maclay - Mathworks) 2009-05-14 16:00: PeerSoN: Privacy-Preserving P2P Social Networks (Sonja Buchegger (Deutsche Telekom Laboratories)) 2009-05-15 15:15: Dictionaries: lazy or strict type class witnesses? (Tom Schrijvers (K.U. Leuven)) 2009-05-18 14:00: (Research) Bluetooth Tracking without Discoverability / (Skills) Deploying web user authentication with Shibboleth (Simon Hay and Sören Preibusch) 2009-05-20 14:15: Computational Creativity: A Different Future for AI Research (Simon Colton - Imperial College) 2009-05-22 15:15: Types are calling conventions (Max Bolingbroke, Computer Lab) 2009-05-27 11:00: Safety of program transformations in shared-memory concurrency (Jaroslav Sevcik (visiting from Edinburgh)) 2009-05-27 14:15: The 10 Cultures Problem (Bill Thompson) 2009-05-29 11:00: Online Social Networks and Applications: a Measurement Perspective (Ben Zhao (UCSB)) 2009-05-29 14:00: Inductive-recursive definitions (Anton Setzer (University of Swansea)) 2009-05-29 15:15: Studying task-level parallelism in C programs using Embla (work in progress) (Jonathan Mak (Computer Laboratory)) 2009-06-03 14:15: No Wednesday Seminar today! (EXAMS!) 2009-06-05 14:00: Explicit Stabilisation for Rely-Guarantee reasoning (John Wickerson (University of Cambridge)) 2009-06-05 15:15: Optimizing Dynamically Updateable Programs (Boris Feigin (University of Cambridge)) 2009-06-10 14:15: Concurrency Through the Ages (Andrew Birrell - Microsoft Research Silicon Valley) 2009-06-17 14:15: What can sequent calculus do for functional programs? (Pierre-Louis Curien, Paris) 2009-06-17 16:00: Toward Energy-efficient Computing (David J. Brown, Sun Microsystems Inc.) 2009-06-19 15:15: Monadic Constraint Programming (Tom Schrijvers (Leuven)) 2009-06-30 16:15: Efficient Implementation of Physical Random Bit Sources (Richard Newell, Actel) 2009-07-01 14:15: Evolving a language in and for the real world (Bjarne Stroustrup - Texas A&M University) 2009-07-17 15:15: Intelligent Thread-Level Speculation (Jeremy Singer (School of Computer Science, University of Manchester)) 2009-07-20 14:00: Reflections on merging the digital and the physical (Tim Kindberg - HP Labs, Bristol) 2009-09-15 16:15: So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users (Cormac Herley, Microsoft Research, Redmond) 2009-09-18 14:00: A Canonical Local Representation of Binding (Masahiko Sato (Graduate School of Informatics, Kyoto University)) 2009-09-25 14:00: NO LOGIC AND SEMANTICS SEMINAR TODAY (Speaker to be confirmed) 2009-10-07 14:15: Scalable Ontology-Based Information Systems (Ian Horrocks - Oxford University) 2009-10-13 16:15: Optical surveillance on silicon chips: your crypto keys are visible (Sergei Skorobogatov) 2009-10-14 14:15: Reaching Out: how to engage young people with computer science (Chris Bishop - Microsoft Research Cambridge) 2009-10-21 14:15: Pushing JavaScript Performance (Lars Bak - Google Aarhus, Denmark) 2009-10-23 15:15: Informal Tutorial: Haskell's Type Classes and Type Families (Dominic Orchard, Computer Lab) 2009-10-26 16:15: Policing Online Games -- Defining A Strong, Mutually Verifiable Reality in Virtual Games (Peter Wayner) 2009-10-27 15:00: A Theory of Indirection via Approximation (Aquinas Hobor) 2009-10-28 14:15: Aggregated Security Monitoring in 10GB networks (Nathan Macrides and Nick McKenzie - Security Engineering, RBS) 2009-11-02 14:00: Surveillance in Speculative Fiction: Have Our Artists Been Sufficiently Imaginative? (Roger Clarke, University of New South Wales) 2009-11-04 14:15: Serializability Enforcement for Concurrent ML (Suresh Jagannathan - Purdue University, USA) 2009-11-10 14:30: The Elephant in the Room: Health Information System Security and the User-Level Environment (Juanita Fernando (Monash University)) 2009-11-11 14:15: On Quantitative Software Verification (Marta Kwiatkowska - Oxford University) 2009-11-17 16:15: Understanding scam victims: Seven principles for systems security (Frank Stajano, University of Cambridge) 2009-11-18 14:15: Insights from Expert Software Design Practice (Marian Petre - Open University) 2009-11-20 15:15: Ypnos: Declarative, Parallel Structured Grid Programming (Dominic Orchard, Computer Lab) 2009-11-25 14:15: Elements of a Networked Urbanism (Adam Greenfield - Nokia Helsinki) 2009-11-26 15:15: Energy Efficiency in Warehouse-Scale Computers (Luiz André Barroso) 2009-11-27 14:00: The Microcosm Principle and Coalgebraic Modeling of Component Calculi (Ichiro Hasuo, Kyoto) 2009-11-27 15:15: Alore: Making dynamic languages simpler (Jukka Lehtosalo (Computer Laboratory)) 2009-12-02 14:15: A POPLmark retrospective: Using proof assistants in programming language research (Stephanie Weirich - University of Pennsylvania, USA) 2009-12-04 10:00: MPhil Mini-Symposium Security Talks (MPhil students, University of Cambridge) 2009-12-04 14:00: The Hybrid Systems Jigsaw: Bringing Together Computer Science, Dynamical Systems and Control Engineering. (Eva Navarro López, School of Computer Science, Manchester.) 2009-12-09 14:15: Performance Comparisons of Hard Logic, Programmable Soft Logic, and Instruction Set Architectures (Jonathan Rose - University of Toronto) 2009-12-10 16:00: Security Architectures for Distributed Social Networks (Jonathan Anderson (University of Cambridge)) 2009-12-11 15:15: (CANCELLED) Google's Go Programming Language (Speaker to be confirmed) 2009-12-15 14:15: Optimizing sparse vector-matrix multiplication on GPUs (Alexander Monakov, ISP-RAS and Moscow State University) 2010-01-13 14:15: Multipath TCP (Mark Handley - UCL) 2010-01-15 14:00: Automatic Analysis of Scratch-pad Memory Code for Heterogeneous Multicore Processors (Alastair Donaldson (University of Oxford)) 2010-01-18 15:00: Anonymity via networks of mixes (Venkat Anantharam, EECS Department, University of California Berkeley.) 2010-01-19 16:15: The impact of incident vs. forensic response (Andrew Sheldon (Evidence Talks)) 2010-01-20 14:15: Models of large-scale real-life networks (Bela Bollobas - University of Cambridge and University of Memphis) 2010-01-21 14:15: Proactive Fraud Management over Financial Data Streams (Pedro Sampaio, University of Manchester) 2010-01-27 14:15: Graphical Reasoning in Symmetric Monoidal Categories (Lucas Dixon - University of Edinburgh) 2010-02-03 14:15: Automated Experimentation: Beyond Deployment and Execution (Alexander Wolf - Imperial College London) 2010-02-10 14:15: Third Generation Machine Intelligence (Chris Bishop - Microsoft Research Cambridge) 2010-02-12 15:15: Haskell Type Constraints Unleashed (Dominic Orchard, Computer Lab) 2010-02-17 14:15: Proving that programs eventually do something good (Byron Cook - Microsoft Research Cambridge) 2010-02-19 17:30: Risk, Security and Terrorism (Professor Lucia Zedner, University of Oxford) 2010-02-24 14:15: Generic Programming (Dietmar Kühl - Bloomberg) 2010-03-03 14:00: Exhibition of Student Design Projects (Part 1B Students) 2010-03-04 16:00: Detecting Sybil attacks and recommending social contacts from proximity records (Daniele Quercia (University of Cambridge)) 2010-03-04 18:30: Chip and PIN -- notes on a dysfunctional security system (Saar Drimer, Computer Lab) 2010-03-10 14:15: Aura: A Programming Language with Authorization and Audit (Steve Zdancewic - University of Pennsylvania, USA) 2010-03-11 16:00: How Google Tests Software (James Whittaker (Google)) 2010-03-12 14:00: Undecidability of propositional separation logic and its neighbours (James Brotherston, Imperial College London) 2010-03-18 16:15: The Path Towards Scalable Practical Security for Web Transactions (Dr Corrado Ronchi, EISST Ltd) 2010-03-30 14:15: Adventures in XML updates (James Cheney (University of Edinburgh)) 2010-04-16 14:00: Declassification Policy Inference (Jeff Vaughan (Harvard University)) 2010-04-21 14:15: Privacy in Advertising: Not all Adware is Badware (Paul Francis - MPI Kaiserslautern, Germany) 2010-04-23 15:00: Green IPTV (Fernando Ramos) 2010-04-26 15:00: Building Secure Systems On and For Social Networks (Nishanth Sastry) 2010-04-27 15:00: Introduction to Data Center Computing (Derek Murray (University of Cambridge)) 2010-04-27 16:15: Internet Voting: Threat or Menace (Jeremy Epstein, SRI International) 2010-04-28 14:15: From Separation Logic to Systems Code (Peter O'Hearn - Queen Mary University of London) 2010-04-29 16:00: Detecting Temporal Sybil Attacks (Neal Lathia (UCL)) 2010-04-30 15:00: Non-Photorealistic Rendering (NPR) (Christian Richardt (University of Cambridge)) 2010-05-03 15:00: Social Human-Robot Interaction (Laurel D. Riek (University of Cambridge)) 2010-05-04 14:00: Privacy as a competitive advantage (Sören Preibusch) 2010-05-04 15:00: Side-Channel Cryptanalysis (Joseph Bonneau (Cambridge University)) 2010-05-05 14:15: NO SEMINAR THIS WEEK (Speaker to be confirmed) 2010-05-07 15:00: Computational approaches to figurative language (Ekaterina Shutova (University of Cambridge)) 2010-05-10 15:00: Modularity: What, why and how (Stephen Kell (Computer Lab)) 2010-05-11 15:00: Meta Programming and You (Robin Message (Computer Lab)) 2010-05-12 14:15: Privacy in Advertising: Not all Adware is Badware (Paul Francis - MPI Kaiserslautern, Germany) 2010-05-14 14:00: Algebraic Theories over Nominal Sets (Alexander Kurz (University of Leicester)) 2010-05-14 15:00: Mathematically Structuring Programming Languages (Dominic Orchard (University of Cambridge)) 2010-05-17 15:00: Verification of infinite-state programs (Eric Koskinen (University of Cambridge)) 2010-05-18 15:00: Algorithmic Game Theory (Arno Pauly) 2010-05-19 14:15: Statistical problems in complex networks (Edoardo Airoldi - Harvard University, USA) 2010-05-20 10:00: The Scott model of Linear Logic is the extensional collapse of its relational model (Thomas Ehrhard, Université Paris Diderot) 2010-05-21 14:00: Scalars & probabilities, monads & categories (Bart Jacobs, Radboud University Nijmegen, The Netherlands) 2010-05-21 15:00: Logics of polynomial-time computation (Bjarki Holm (University of Cambridge)) 2010-05-24 15:00: Optimising Functional Programming Languages (Max Bolingbroke (University of Cambridge)) 2010-05-26 14:15: Dynamical Grammars for Galaxy Image Recognition (Wayne Hayes - UC Irvine, USA) 2010-06-01 10:00: Mini course on proof theory (Part 1) (Pierre-Louis Curien, pi.r2 team, PPS Laboratory, CNRS, Paris 7, and INRIA) 2010-06-02 14:00: System Tests from Unit Tests (Kathryn Gray, Computer Lab, Cambridge) 2010-06-02 14:15: EXAMS (Good luck to students with their exams!) 2010-06-02 15:30: Functional programming with monads combined with comonads (Dominic Orchard, Computer Lab, Cambridge) 2010-06-03 10:00: Mini course on proof theory (Part 2) (Pierre-Louis Curien, pi.r2 team, PPS Laboratory, CNRS, Paris 7, and INRIA) 2010-06-04 10:00: Mini course on proof theory (Part 3) (Pierre-Louis Curien, pi.r2 team, PPS Laboratory, CNRS, Paris 7, and INRIA) 2010-06-09 14:15: Executable Strategies for Cellular Decision Making (Jasmin Fisher, Microsoft Research Cambridge) 2010-06-11 15:30: Quiz (Speaker to be confirmed) 2010-07-01 16:15: Colour, usability and computer security (Jeff Yan, Newcastle University) 2010-07-16 15:15: Supercompilation by evaluation (Max Bolingbroke) 2010-08-02 14:15: Some Uses of Hashing in Networking Problems (Michael Mitzenmacher, Harvard University) 2010-08-13 15:15: Estimating and Exploiting Potential Parallelism by Source-level Dependence Profiling (Jonathan Mak (Computer Laboratory)) 2010-09-07 14:00: Offloading Java to Graphics Processors (Pete Calvert, Computer Laboratory) 2010-09-09 15:00: Characterizations of the Expressive Power of Logics over Trees (Luc Segoufin (INRIA and ENS, Cachan)) 2010-09-20 14:00: Analysis, Synchronization and Scheduling Challenges in X10 (RK Shyamasundar; Tata Institute of Fundamental Research) 2010-10-06 14:15: Multi-Target Data-Parallel Programming with Accelerator for GPUs, Multicore Processors and FPGAs (Satnam Singh, Microsoft Research Cambridge) 2010-10-08 14:00: Extracting the Semantic Signature of Malware, Metamorphic Viruses and Worms (RK Shyamasundar; Tata Institute of Fundamental Research, Mumbai) 2010-10-12 13:00: Schedulability analysis of embedded real-time Java (Thomas Boegholm (University of Cambridge)) 2010-10-12 16:15: Hierarchies, Lowerarchies, Anarchies, and Plutarchies: Historical Perspectives of Composably Layered High-Assurance Architectures (Peter Neumann, Principal Scientist, SRI International Computer Science Lab) 2010-10-12 16:15: Hierarchies, Lowerarchies, Anarchies, and Plutarchies: Historical Perspectives of Composably Layered High-Assurance Architectures (Peter Neumann, Principal Scientist, SRI International Computer Science Lab) 2010-10-13 14:15: Test Generation and Fault Localization for Web Applications (Frank Tip, IBM T.J. Watson Research Center) 2010-10-15 16:00: Introduction to Data Center Computing (Derek Murray (University of Cambridge)) 2010-10-20 14:15: A Survey of Classical and Real-Time Verification (Joel Ouaknine, Oxford University Computing Laboratory) 2010-10-20 16:15: Across the Pond: An Update on Health Privacy and Health Data Security. How are American patients faring? (Deborah C. Peel, Founder and Chair, Patient Privacy Rights) 2010-10-22 16:00: Algorithmic Game Theory (Arno Pauly, University of Cambridge) 2010-10-22 16:00: Performance-portable Programming Abstraction for Image Processing (Richard Membarth, University of Erlangen-Nuremberg (currently ARM intern)) 2010-10-25 16:00: Understanding Cyberattack as an Instrument of U.S. Policy (Herbert Lin (The National Academies, USA)) 2010-10-29 13:00: A Framework for Incremental Modelling and Verification of On-Chip Protocols and Its Application to PCI Express (Peter Boehm, Oxford University) 2010-10-29 16:00: Building Secure Systems On and For Social Networks (Nishanth Sastry (University of Cambridge)) 2010-11-02 16:15: An investigation into Chinese cybercrime and the underground economy in comparison with the West (Michael Yip, University of Southampton) 2010-11-03 14:15: A Look Into Youtube - The World's Largest Video Site (Oliver Heckmann, Director of Engineering, Google Zurich) 2010-11-05 11:00: Towards Automatic Resource Consumption Certification (Marco Gaboardi, University of Bologna) 2010-11-05 14:00: Using SAT Solvers for Cryptographic Problems (Mate Soos, Pierre and Marie Curie University) 2010-11-05 16:00: Side-Channel Cryptanalysis (Joseph Bonneau (Cambridge University)) 2010-11-09 16:15: Privacy preserving smart-metering (George Danezis, Microsoft Research) 2010-11-10 14:15: What is happening now? Finding events in Massive Message Streams (Miles Osborne, University of Edinburgh School of Informatics) 2010-11-12 16:00: Mobile phones based continuous sensing systems (Kiran Rachuri (University of Cambridge)) 2010-11-16 16:15: The distribution of different sources of malware (Francis Turner, ThreatSTOP Inc.) 2010-11-17 14:15: Detecting Network Traffic Anomalies (Paul Barford, University of Wisconsin-Madison) 2010-11-19 14:00: Automatic reduction of differential semantics for protein-protein interaction networks, by abstract interpretation (Jerome Feret, ENS, Paris) 2010-11-23 16:15: Physical Attacks on PIN Entry Devices (Matt Scott, ACI Worldwide) 2010-11-26 16:00: Mathematically Structuring Programming Languages (Dominic Orchard (University of Cambridge)) 2010-12-02 16:00: QuickSpec -- Guessing Formal Specifications using Testing (Koen Claessen (Chalmers/Visiting at MSR)) 2010-12-07 16:15: Bumping attacks: the affordable way of obtaining chip secrets (Sergei Skorobogatov - Computer Laboratory ( University of Cambridge)) 2010-12-09 14:15: Reverse Engineering Malware (Hassen Saidi, SRI International) 2011-01-14 15:15: Pluggable Type System with Optional Runtime Monitoring of Type Errors (Jukka Lehtosalo (Computer Lab, Cambridge)) 2011-01-19 14:15: Implementing a Distributed Event Processing Network (Alex Kozlenkov, Betfair Research) 2011-01-20 13:00: Idris --- Systems Programming Meets Full Dependent Types (Edwin Brady (St. Andrews)) 2011-01-20 15:15: Specification, Implementation and Verification of Refactorings (Max Schaefer (Oxford Computing Lab)) 2011-01-21 14:00: Modular Reasoning for Deterministic Parallelism (Mike Dodds, University of Cambridge) 2011-01-21 15:15: Joinads: a retargetable control-flow construct for reactive, parallel and concurrent programming (Tomas Petricek (Computer Laboratory, Cambridge)) 2011-01-21 16:00: Computing with Real Numbers (Arno Pauly (University of Cambridge)) 2011-01-26 14:15: Challenging Computer Science Problems at Ocado (Dr Vince Darley, Head of Analytics & Optimisation, Ocado) 2011-01-28 14:00: Selection functions everywhere (Martín Escardó, University of Birmingham) 2011-02-01 13:00: A report on the IAB/W3C Internet Privacy Workshop (Dr. David Evans (Computer Laboratory)) 2011-02-02 14:15: Efficient Network-wide Flow Record Generation (Joel Sommers, Colgate University) 2011-02-09 14:15: In the beginning God created tensor, ... then matter, ... then speech (Bob Coecke, Oxford University Computing Laboratory) 2011-02-11 14:00: Kleisli Arrows of Outrageous Fortune (Conor McBride, University of Strathclyde) 2011-02-18 15:15: Petri-nets as an Intermediate Representation for Heterogeneous Architectures (Pete Calvert (Computer Lab, Cambridge)) 2011-02-18 16:00: Non-Photorealistic Rendering (NPR) (Christian Richardt (University of Cambridge)) 2011-02-23 14:15: Reasoning about Software Safety Integrity and Assurance (Tim Kelly, University of York) 2011-02-25 14:00: Approximating Labelled Markov Processes by Averaging (Prakash Panangaden, McGill University) 2011-03-02 14:15: Mobile Software Engineering - Characteristics and Challenges (Manfred Bortenschlager, Samsung) 2011-03-03 16:00: Promoting location privacy... one lie at a time (Daniele Quercia (University of Cambridge)) 2011-03-09 14:00: Exhibition of Student Design Projects (Student Designers) 2011-03-11 14:00: Bisimulation and Model-Checking for Partial Order Models of Concurrency (Julian Gutierrez, University of Edinburgh) 2011-03-15 16:15: Caveat coercitor: towards coercion-evident elections (Mark Ryan (University of Birmingham)) 2011-03-16 14:15: Quantum computing -- theoretical prospects and relations to classical computation (Richard Jozsa, Centre for Quantum Information and Foundations, DAMTP, University of Cambridge) 2011-04-06 14:00: Netalyzr: Network Measurement as a Network Security Problem (Nicholas Weaver, ICSI and UC Berkeley) 2011-04-08 14:00: Domination When the Stars Are Out – An algorithmization of Chudnovsky’s and Seymour’s Structure Theorem for Claw-Free Graphs (Matthias Mnich, International Computer Science Institute, Berkeley) 2011-04-12 16:15: What is Software Assurance? (John Rushby, SRI International) 2011-04-13 16:00: Mobile Social Networks and Context-Awareness: Usage, Privacy and a Solution to Texting While Driving? (Janne Lindqvist (Carnegie Mellon University)) 2011-04-27 14:15: Moose: an open platform for software analysis (Stephane Ducasse) 2011-04-28 13:15: Using the Cambridge ARM model to verify the concrete machine code of seL4 (Magnus Myreen (University of Cambridge)) 2011-05-03 14:15: An overview of the DARPA CRASH research programme (Howie Shrobe, DARPA) 2011-05-03 14:45: CTSRD: Capability CPUs revisited (Peter Neumann, SRI International / Robert Watson, University of Cambridge) 2011-05-03 15:45: Architectures for Practical Client-Side Security (Virgil Gligor, Carnegie Mellon University) 2011-05-04 14:15: Reflection on Java Security and Its Practical Impacts (Li Gong) 2011-05-04 14:15: Reflection on Java Security and Its Practical Impacts (Li Gong) 2011-05-04 15:30: The Bluespec hardware definition language (Joe Stoy, Bluespec Inc.) 2011-05-05 14:15: Introduction to MILS and the LynuxWorks Separation Kernel (Rance DeLong, LynuxWorks Inc.) 2011-05-05 15:00: Functional Programming for the Data Centre (Jeff Epstein, Computer Laboratory) 2011-05-06 14:00: Isomorphisms of types in the presence of higher-order references (Pierre Clairambault, University of Bath) 2011-05-09 14:00: (Research) Influences of wind on radiowave propagation in foliated fixed wireless system / (Research) Information flow control for static enforcement of user-defined privacy policies (Sören Preibusch and Tien Han Chua) 2011-05-11 14:15: From deterministic finite automata to infinite games (Eryk Kopczynski) 2011-05-12 16:00: Demystifying GCC (Or What the GCC manuals should have told you but they don't!) (Uday Khedker, IIT Bombay) 2011-05-13 15:00: Programming with Comonads and Codo Notation (Dominic Orchard, Computer Lab) 2011-05-17 14:30: Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (Uday Khedker ( IIT Bombay)) 2011-05-17 16:15: Practical Linguistic Steganography using Synonym Substitution (Ching-Yun (Frannie) Chang & Stephen Clark, University of Cambridge) 2011-05-18 14:15: Kernel Methods: the Emergence of a Well-founded Machine Learning (John Shawe-Taylor, Professor and Director of the UCL Centre for Computational Statistics and Machine Learning) 2011-05-20 14:00: The Complexity of #CSP (David Richerby, University of Liverpool) 2011-05-20 15:00: When Monads and Comonads Overlap (Dominic Orchard, Computer Lab) 2011-05-25 14:15: The Duality of State and Observation (Prakash Panangaden, Computing Laboratory Oxford University; on leave from McGill University) 2011-06-01 14:15: Body Part Recognition: Making Kinect Robust (Jamie Shotton, MSR Cambridge) 2011-06-08 14:15: EXAMS - NO SEMINAR THIS WEEK (Speaker to be confirmed) 2011-06-15 14:15: Compiler Tools for MATLAB (Laurie Hendren, Professor, School of Computer Science, McGill University, Canada Leverhulme Visiting Professor, Oxford University Computing Laboratory) 2011-06-17 15:15: Practice talks (Pete Calvert and Tomas Petricek) 2011-07-01 14:00: Lightweight Monadic Programming in ML (Michael Hicks, University of Maryland) 2011-07-08 14:00: Parallel Assertions for Debugging Parallel Programs (Daniel Schwartz-Narbonne, Princeton University) 2011-07-19 11:00: A Language for Type-Safe Web Programming (Cervesato Iliano) 2011-07-19 16:15: Evolutionary Software Repair (Stephanie Forrest, University of New Mexico) 2011-08-02 16:15: The great censorship war of 2011: are we winning? (Mystery speaker) 2011-08-19 15:15: Petri-nets as an Intermediate Representation for Heterogeneous Architectures (Peter Calvert (University of Cambridge)) 2011-08-30 14:00: Parameterized Complexity of some Problems in Concurrency and Verification (Praveen Manjunatha, The Institute of Mathematical Sciences, Chennai) 2011-09-02 15:15: Efficient and Correct Stencil Computations via Pattern Matching and Type Checking (Dominic Orchard, Computer Lab) 2011-09-08 13:30: The IITM Model and its Application to the Analysis of Real-World Security Protocol (Ralf Küsters, University of Trier) 2011-09-29 16:00: Twitter bots (Miranda Mowbray (HP Labs Bristol)) 2011-10-06 14:15: Building Trusted Systems with Protected Modules (Bryan Parno (Microsoft Research)) 2011-10-07 15:15: Coeffect Systems and Typing (Preliminary report) (Tomas Petricek & Dominic Orchard (Computer Laboratory, Cambridg)) 2011-10-12 14:15: Probabilistic Graphical Models in Microsoft's Online Services: TrueSkill, AdPredictor, and Matchbox (Thore Graepel, MSR Cambridge) 2011-10-21 14:00: Wool: low overhead work stealing for fine grain parallelism. (Karl-Filip Faxén (SICS)) 2011-10-21 15:00: Software Bloat: A systems' perspective (K. Gopinath (Indian Institute of Science)) 2011-10-25 16:15: Facial Analysis for Lie Detection (Hassan Ugail (University of Bradford)) 2011-10-26 14:15: TIME: Transport Information Monitoring Environment (Dr Ken Moody (University of Cambridge)) 2011-10-28 14:00: Almost always blue trees and bar induction (Tarmo Uustalu, Tallinn University of Technology) 2011-10-31 13:00: Web mining and privacy: foes or friends? (Bettina Berendt) 2011-11-02 14:15: Notes on the Synthesis of Music (Sam Aaron) 2011-11-09 14:15: Algebraic theories and computational effects (Sam Staton (Computer Laboratory, University of Cambridge)) 2011-11-16 14:15: Search Based Software Engineering (Prof. Mark Harman, UCL Dept of Computer Science) 2011-11-17 16:00: Quantifying Location Privacy (George Theodorakopoulos (EPFL, University of Derby)) 2011-11-21 15:00: Real-Time and Real Trustworthiness: Timing Analysis of a Protected OS Kernel (Bernard Blackham (NICTA)) 2011-11-23 14:15: Automatic Discovery of Patterns in Media Content (Nello Cristianini, Professor of Artificial Intelligence, Departments of Engineering Mathematics and Computer Science, University of Bristol) 2011-11-25 14:00: Nash Equilibrium, Bekic's Lemma and Bar Recursion (Paulo Oliva - Queen Mary, University of London) 2011-11-25 15:15: Virtual machines should be invisible (and might be augmented) (Stephen Kell (Oxford)) 2011-12-02 14:00: Algebra unifies Calculi of programming (Tony Hoare (Microsoft Research)) 2012-01-10 10:00: Homomorphic Encryption from Ring Learning with Errors (Michael Naehrig, Technische Universiteit Eindhoven) 2012-01-18 14:15: Speech Synthesis at Google (Matt Stuttle, Google) 2012-01-20 14:00: Layered Fixed Point Logic (Piotr Filipiuk, Technical University of Denmark (DTU)) 2012-01-24 16:15: User choice of PINs and passphrases (Joseph Bonneau (University of Cambridge)) 2012-01-25 14:15: Inclusive Design (Professor John Clarkson (University of Cambridge)) 2012-01-30 14:00: Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning no Results (David Naccache (ENS)) 2012-01-30 16:15: Statistical Attack on RC4: Distinguishing WPA (Serge Vaudenay (EPFL)) 2012-01-31 12:45: The Yin and Yang Sides of Embedded Security (Christof Paar (Ruhr University Bochum)) 2012-02-02 13:00: Using the OpenJDK to investigate covariance in Java (Raoul-Gabriel Urma and Janina Voigt (University of Cambridge)) 2012-02-03 14:00: Iterative algorithms and Sherali-Adams linear programming relaxations of graph isomorphism (Elitza Maneva, Universitat de Barcelona (UB)) 2012-02-08 14:15: A Communications Medium for the 21st Century : Towards Open Public Display Networks (Nigel Davies, University of Lancaster) 2012-02-15 16:00: C++11 Style (Bjarne Stroustrup, Distinguished University Professor, Texas A&M University; Visiting Professor, Cambridge University) 2012-02-24 14:00: Don't kill my ads! Balancing Privacy in an Ad-Supported Mobile Application Market (Ilias Leontiadis (University of Cambridge)) 2012-02-28 13:00: A Proposed Framework for Analysing Security Ceremonies (Jean Martina (Federal University of Santa Catarina / Brazil)) 2012-03-02 15:15: Evaluation strategies for monadic computations (Tomas Petricek (University of Cambridge)) 2012-03-09 14:00: On modal definability of first-order formulas with many free variables and its application to conjunctive query answering in description logics (Stanislav Kikot, University of London Birkbeck College) 2012-03-09 15:15: Architecture-neutral Parallelism (Peter Calvert (University of Cambridge)) 2012-03-14 10:00: Malleability in Modern Cryptography (Markulf Kohlweiss, MSRC) 2012-03-20 14:00: Insecurity Engineering in Locks (Marc Weber Tobias) 2012-03-20 16:15: Trustworthy Medical Device Software (Kevin Fu (University of Massachusetts Amherst)) 2012-03-23 14:00: Expressiveness of real-time temporal logics (Paul Hunter, University of Oxford) 2012-03-28 14:00: Non-Interactive Verifiable Computation (Bryan Parno, Microsoft Research) 2012-04-02 16:00: Towards Statistical Queries over Distributed Private User Data (Paul Francis (MPI-SWS)) 2012-04-05 09:30: The science of guessing (Joseph Bonneau (Cambridge University)) 2012-04-13 14:00: First steps in synthetic guarded domain theory: step-indexing in the topos of trees (Rasmus Møgelberg, IT University, Copenhagen) 2012-04-17 16:00: Efficient Cryptography for the Next Generation Secure Cloud (Alptekin Küpçü, Koç University) 2012-04-18 10:30: Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing (Shriram Krishnamurthi, Brown University) 2012-04-23 14:00: Rekeyable Ideal Cipher from a Few Random Oracles (Elena Andreeva, K.U. Leuven) 2012-05-01 16:15: New evidence on consumers’ willingness to pay for privacy (Sören Preibusch (University of Cambridge)) 2012-05-02 14:15: Content delivery in the Internet: an infrastructure-oriented perspective. (Steve Uhlig, Professor of Networks, School of electronic engineering and computer science, Queen Mary, University of London) 2012-05-08 16:15: Building Bankomat: Cash dispensers and the development of on-line, real-time networks in Britain and Sweden, c.1965-1985 (Bernardo Batiz-Lazo (Bangor University)) 2012-05-09 14:15: CANCELLED: Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google ( Thomas Dullien, Google) 2012-05-16 14:15: Energy efficiency and the design of brains ( Professor Simon Laughlin, Department of Zoology, University of Cambridge) 2012-05-17 16:00: Facebook and Privacy: The Balancing Act of Personality, Gender, and Relationship Currency (Daniele Quercia (University of Cambridge)) 2012-05-18 14:00: MELL in a free compact closure (Etienne Duchesne, LIPN, Université Paris 13) 2012-05-18 15:15: MPhil Presentations: (1) An investigation of the Join Calculus Abstract Machine (2) Ownership in Object-Oriented Languages (Borja Moreno Fernandez and Artem Glebov (University of Cambridge)) 2012-05-23 14:15: Alan Turing as a computer designer (Prof. Brian Carpenter, University of Auckland Computer Science) 2012-05-29 16:15: Some recent results on TLS and DTLS (Kenny Paterson (Royal Holloway)) 2012-05-30 14:15: A Bayesian Approach to Learning the Structure of Human Languages (Phil Blunsom, Department of Computer Science, Oxford University) 2012-05-31 16:00: Attacks and defenses in decentralised botnets (Shishir Nagaraja (University of Birmingham)) 2012-06-01 14:00: Safe Recursive Set Functions (Arnold Beckmann, Swansea University) 2012-06-01 15:15: Syntax Matters: Writing abstract computations in F# (Tomas Petricek (University of Cambridge)) 2012-06-07 16:00: Lock Inference in the Presence of Large Libraries (Khilan Gudka (University of Cambridge)) 2012-06-08 14:00: Bounds on proof size and distributive encryption (R. Ramanujam, Institute of Mathematical Sciences, Chennai) 2012-06-08 15:15: Mathematical Structures for Data Types with Restricted Parametericity (Dominic Orchard (University of Cambridge)) 2012-06-13 14:15: Behavioural Nudge or Technological Fudge? (Yvonne Rogers, Professor of Interaction Design, UCL) 2012-06-22 11:00: Towards Trustworthy Embedded Systems (Gernot Heiser (University of New South Wales/NICTA)) 2012-06-22 15:15: Control Flow Analysis for the Join Calculus (Peter Calvert (University of Cambridge)) 2012-06-25 13:00: The Great Indoors: The Next Frontier in Location-Based Services (Ravi Palanki, Qualcomm) 2012-06-27 11:00: Code-Level Formal Verification for Large Real Systems (Mark Staples (NICTA)) 2012-07-10 16:15: Security Analysis of Industrial Control Systems (Arthur Gervais (Aalto University)) 2012-07-31 16:15: Bromium: Task isolation through hardware-assisted virtualization (Ian Pratt, Bromium) 2012-08-29 15:00: A Notation for Comonads (Dominic Orchard (University of Cambridge)) 2012-08-30 14:00: Preservation under Substructures modulo Bounded Cores (Abhisekh Sankaran, IIT Bombay) 2012-09-07 15:15: The Whiley Programming Language: Design & Implementation (David Pearce, Victoria University of Wellington, New Zealand) 2012-09-27 16:15: Protecting Distributed Applications Through Software Diversity and Renewability (Christian Collberg, University of Arizona) 2012-10-01 15:00: Explorations of Science in Cyber Security (Greg Shannon (CERT and Carnegie Mellon University)) 2012-10-04 17:00: Technology Risk Management - Achilles Heels, Myths and Mirages (Tony Chew (Monetary Authority of Singapore)) 2012-10-09 16:15: Aurasium: Practical Policy Enforcement for Android Applications (Rubin Xu (University of Cambridge)) 2012-10-10 14:15: Dart: A Platform for Building Large Web Applications (Mads Ager, Google) 2012-10-12 10:00: Dynamically Enforcing Knowledge-based Security Policies (Michael Hicks, University of Maryland) 2012-10-12 15:15: Monadic Program Slicing (Dr. Yingzhou Zhang (University of Cambridge -- visitor until March 2013)) 2012-10-16 16:15: Analysis of FileVault 2: Apple's full disk encryption scheme (Omar Choudary (University of Cambridge)) 2012-10-17 14:15: Machine Learning Methods for the Detection and Prediction of Transmembrane Beta-Barrel Proteins in Prokariotes (Dr Piero Fariselli, Biocomputing Group and Department of Computer Science, University of Bologna) 2012-10-18 16:00: From geek-dream to mass-market: Will privacy-preserving technologies ever be adopted? (Hamed Haddadi (Queen Mary, University of London)) 2012-10-23 16:15: Exploring compartmentalisation hypotheses with SOAAP (Khilan Gudka (University of Cambridge)) 2012-10-24 14:15: Challenges and approaches to improving the accuracy of indoor positioning systems (Niki Trigoni, Oxford University Department of Computer Science) 2012-10-31 14:15: Semi-local string comparison (Alexander Tiskin, Department of Computer Science, University of Warwick) 2012-11-07 14:15: Sentiment Analysis (Prof. Stephen Pulman, Oxford University Department of Computer Science) 2012-11-09 14:00: Abstraction and Invariance for Algebraically Indexed Types (Andrew Kennedy, Microsoft Research Cambridge) 2012-11-14 14:15: Structural executable comparison, malware classification, and collaborative binary analysis - the formerly-zynamics tools at Google (Thomas Dullien, Google) 2012-11-20 16:15: An Updated Threat Model for Security Ceremonies (Jean Martina (Federal University of Santa Catarina / Brazil)) 2012-11-21 14:15: Every tweet counts: How statistical content analysis of social networks can improve our knowledge of citizens' preferences. An application to France and US presidential elections and EU leaders' popularity (Prof. Stefano Iacus, Dipartimento di Economia, Management e Metodi Quantitativi Universita' di Milano) 2012-11-23 14:00: Halo: From Haskell to Logic through Denotational Semantics (Dimitrios Vytiniotis, MSR Cambridge) 2012-11-23 15:15: Continuation-Passing C: Program Transformations for Compiling Concurrency in an Imperative Language (Dr Gabriel Kerneis (University of Cambridge)) 2012-11-27 16:15: Who's next? Identifying risk factors for subjects of targeted attacks (Martin Lee (Symantec)) 2012-11-28 14:15: One Bit is Not Enough: The Benefit of Reference Analysis in Virtual Memory Management (Frank Bellosa, Karlsruhe Institute of Techology) 2012-12-04 16:15: Protecting websites from social engineering attacks against your users (Christopher Palow, Facebook) 2013-01-15 16:15: Protecting your website from hackers (Ben Mathews, Facebook) 2013-01-21 15:00: Java 8 Workshop (Raoul-Gabriel Urma (University of Cambridge)) 2013-01-22 16:15: CERB Banking: How to secure online banking and keep the users happy? (Pawel Jakub Dawidek) 2013-01-23 14:15: Computing at School: Tackling the ICT Education Crisis in UK Schools (Simon Peyton-Jones, Microsoft Research) 2013-01-30 14:15: Replacing lectures with videos in the Computer Science Tripos (Andy Rice, Alastair Beresford, Computer Lab) 2013-02-05 16:15: A novel, efficient, scalable and easy-to-use cryptographic key management solution for wireless sensor networks (Dr Michael Healy, University of Limerick ) 2013-02-06 14:15: Adaptive Runtime Verification (Prof Ezio Bartocci, University of Wien) 2013-02-13 14:15: Privacy Challenges and Solutions for Data Sharing (Dr Aris Gkoulalas-Divanis, IBM Research, Dublin) 2013-02-20 14:15: Challenges in Computer Graphics Modeling (Prof. Oliver Deussen, University of Konstanz, Germany) 2013-02-27 14:15: High-Assurance Algorithmic Trading (Dr. Hasan Amjad, Cantab Capital Partners) 2013-03-01 16:00: Cyclic Abduction of Inductive Termination Preconditions (James Brotherston, University College London) 2013-03-06 14:00: Student Design Project Presentations (Student design teams) 2013-03-12 14:00: Malware Analysis with Tree Automata Inference (Domagoj Babic) 2013-04-24 14:30: Could Computers Understand Their Own Programs (Prof Sir Tony Hoare - Microsoft Research & Computer Laboratory) 2013-04-26 16:00: Semigroups with low difficulty word problem (Markus Pfeiffer, St Andrew's) 2013-04-30 14:00: Mezzo (Jonathan Protzenko (from INRIA)) 2013-05-01 14:15: CANCELLED: Compressed Sensing and the Art of Subsampling (Anders Hansen - University of Cambridge Computer Laboratory) 2013-05-03 16:00: Barrier Invariants : a Shared State Abstraction for Data-dependent GPU Kernels > (Nathan Chong, Imperial College, London) 2013-05-08 14:15: Mind the Map - Modelling Sustainability of Urban Crowd-Sourcing (Dr Licia Capra - University College London) 2013-05-08 16:15: Pins, Tacks, and Slinks: Proposals for patching PKI on the web (Joseph Bonneau, Google) 2013-05-14 15:45: Coinductive big-step semantics for concurrency (Tarmo Uustalu ( Institute of Cybernetics, Tallinn University of Technology)) 2013-05-14 16:15: Rendezvous: A search engine for binary code (Wei Ming Khoo, Computer Laboratory, University of Cambridge) 2013-05-15 14:15: Strongly-Typed Language Support for Internet-Scale Information Sources (Don Syme - Microsoft Research) 2013-05-17 16:00: Multiparty session types and their application in large distributed systems (Raymond Hu and Nobuko Yoshida, Imperial College) 2013-05-22 14:15: Digging into (Historical) Data: Tracking global commodity trading in the nineteenth century (Prof Ewan Klein - University of Edinburgh) 2013-05-23 13:00: Part III projects: Approximating a Haskell stack trace/Language and compiler for heterogenous parallelism (William Kenyon, Nicholas Tomlinson) 2013-05-23 13:20: A Heterogeneous Parallel Programming Language and Compiler Architecture (Nicholas Tomlinson) 2013-05-24 14:00: Distributed Electronic Rights in JavaScript (Mark S. Miller, Google) 2013-05-29 14:15: The Domain Name System in 2013 – The political and technical landscape ( Simon McCalla - CTO, Nominet UK) 2013-06-07 16:00: A few lessons that I learnt about interprocedural program analyses (Hongseok Yang, University of Oxford) 2013-06-11 13:00: Concise analysis using implication algebras for task-local memory optimisation (Leo White ) 2013-06-11 16:15: PHANTOM: A Parallel Architecture for Practical Oblivious Computation (Martin Maas, UC Berkeley) 2013-06-12 14:15: Errors, Exploits, and Espionage - A tour of software vulnerabilities and their real-world impact (Tim Pullen - Detica / BAE Systems) 2013-06-19 14:15: Humans + Automation: Greater than the sum of the parts (Missy Cummings - MIT) 2013-06-28 15:00: Goji: a tool to generate OCaml bindings of JavaScript libraries (Dr. Benjamin Canou) 2013-06-28 16:00: **Cancelled** Logic of Hybrid Games (Andre Platzer, CMU) 2013-07-01 13:00: Coeffects: Unified static analysis of context-dependence (Tomas Petricek (University of Cambridge)) 2013-07-01 14:00: Denotation of Contextual Modal Type theory (Murdoch Gabbay) 2013-07-02 14:00: An overview of nominal algebra, lattice, representation and dualities for computer science foundations (Jamie Gabbay) 2013-07-26 16:00: Descriptive set theory and Computation theory (Victor Selivanov, Novosibirsk Pedagogical University) 2013-08-08 14:00: OCaml-Java: blending OCaml & Java (Xavier Clerc) 2013-09-17 14:00: Automatic SIMD vectorization for Haskell (Dominic Orchard (University of Cambridge)) 2013-10-11 14:30: Logic of Hybrid Games (Andre Platzer, CMU) 2013-10-15 16:15: TLS Security - Where Do We Stand? (Kenny Paterson, Royal Holloway) 2013-10-16 14:15: Towards Position-based Routing for Mobile Environments ( Dr Marwan Fayad - Univ Stiling) 2013-10-18 15:15: Automated functional program verification using fixpoint fusion (Will Sonnex, Université de Cambridge) 2013-10-21 13:00: Upgrading Fortran source code using automatic refactoring (Dominic Orchard (University of Cambridge)) 2013-10-22 16:15: Psychology of scams (David Modic, University of Cambridge) 2013-10-23 14:15: Disciplined Approximate Computing: From Language to Hardware and Beyond (Luis Ceze - University of Washington.) 2013-10-25 14:00: In-depth crypto attacks: "It always takes two bugs" (Karsten Nohl, Security Research Labs) 2013-10-25 16:00: Fibrational Parametricity (Neil Ghani, University of Strathclyde) 2013-10-30 14:15: Understanding Video and Audio at Google ( Tom Walters - Google Zurich Labs) 2013-11-01 16:00: **TALK POSTPONED** (Daniel Roy, Engineering Department, University of Cambridge) 2013-11-05 16:15: Animals as Mobile Social Users (Tanya Berger-Wolf) 2013-11-06 14:15: Pico: no more passwords! ( Dr Frank Stajano - University of Cambridge Computer Laboratory) 2013-11-08 16:00: Simple, efficient, sound-and-complete combinator parsing for all context-free grammars, using an oracle. (Tom Ridge, University of Leicester) 2013-11-12 16:15: A day in the life of government cybersecurity (Ian Levy) 2013-11-13 14:15: Towards Do-It-Yourself Networking ( Joerg Ott - Aalto University, Finland) 2013-11-15 16:00: Weighted relational models of typed lambda-calculi (Guy McCusker, University of Bath) 2013-11-18 14:00: SCION: Scalability, Control, and Isolation On Next-Generation Networks (Prof. Adrian Perrig, Department of Computer Science at the Swiss Federal Institute of Technology (ETH)) 2013-11-20 14:15: Research Issues in Computer Support for Collaborative Problem Solving ( Steve Tanimoto - University of Washington, Seattle.) 2013-11-22 16:00: Language based web security: the operational semantics approach (Sergio Maffeis, Imperial College, London) 2013-11-26 16:15: TESLA: Temporally-enhanced security logic assertions (Jonathan Anderson, University of Cambridge) 2013-11-27 14:15: Compressed sensing and the art of subsampling (Anders Hansen - DAMTP, Centre for Mathematical Sciences, University of Cambridge) 2013-11-29 16:00: Decision Problems for Linear Recurrence Sequences (Joel Ouaknine, University of Oxford) 2013-12-02 13:00: Julia: A Fast Dynamic Language for Technical Computing (Stefan Karpinski, MIT) 2013-12-03 16:15: Reviewing Cybercrime; Epistemology, Political Economy and Models (Dr Michael McGuire, University of Surrey) 2013-12-04 14:15: MirageOS: compiling a functional cloud (Anil Madhavapeddy - University of Cambridge Computer Laboratory) 2013-12-06 16:00: Relational Programming in miniKanren (William E. Byrd, University of Utah) 2013-12-13 13:00: An algebraic theory of type-and-effect systems (Ohad Kammar (University of Cambridge)) 2013-12-23 16:15: Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet. (Prof. Steven M. Bellovin, Columbia University) 2014-01-14 15:00: Privacy/Proxy/Perfidy – what criminals (and others) put in domain whois (Dr Richard Clayton, University of Cambridge) 2014-01-17 16:00: Automating reasoning tasks for separation logic (Juan A. Navarro Pérez, UCL) 2014-01-21 15:00: Eavesdropping near field contactless payments: A quantitative analysis (Thomas P. Diakos, University of Surrey) 2014-01-22 14:00: Evaluation Metrics and Learning to Rank for Information Retrieval (Emine Yilmaz - University College London) 2014-01-24 14:00: Towards Language Composition (Laurence Tratt, King's College London) 2014-01-24 16:00: Representing conditional independence in probabilistic programming (Daniel Roy, Engineering Department, University of Cambridge) 2014-01-29 14:00: Randomised Load Balancing For Networks (Thomas Sauerwald - University of Cambridge, Computer Laboratory) 2014-02-04 15:00: The effect of decentralized behavioral decision making on system-level risk (Kim Kaivanto, Lancaster University) 2014-02-05 14:00: Talking About Shapes (MALCOLM SABIN ) 2014-02-11 15:00: On the (in)security of widely-used RFID access control systems (Dr. Flavio D. Garcia, University of Birmingham) 2014-02-12 14:00: Safer Healthcare by Better Computer Science (Prof. Harold Thimbleby - Swansea University, Wales.) 2014-02-19 14:00: Interactive Configuration Problems (Henrik Reif Andersen - Configit.Com, Copenhagen.) 2014-02-25 15:00: Introduction to DNSSEC (Tony Finch, University of Cambridge Computing Service) 2014-02-26 14:00: What We Talk About When We Talk About Types ( Dr Nick Benton - Microsoft Research Cambridge) 2014-03-05 14:00: Part Ib Group Project Presentations (Computer Laboratory Part Ib Students) 2014-03-12 14:00: Competitive Contagion in Networks (Moez Draief - Imperial College London) 2014-03-18 15:00: Bitcoin: A Full Employment Act for security engineers? (Joseph Bonneau, Center For Information Technology Policy, Princeton) 2014-03-28 14:00: What can Programming Language Research Learn from the Philosophy of Science? (Tomas Petricek (University of Cambridge)) 2014-04-04 14:00: Solving an existential crisis in Haskell (Michael Gale (University of Cambridge)) 2014-04-22 15:00: Website Fingerprinting (Nikita Borisov, University of Illinois) 2014-04-23 14:00: *** The Weight of Gravity *** (Hills, Graham and Blain - Framestore Visual Effects, London) 2014-04-25 16:00: On-the-fly garbage collection: issues and opportunities (Richard Jones, University of Kent) 2014-04-29 15:00: Protecting Programs During Resource Retrieval (Professor Trent Jaeger, CSE Department, Pennsylvania State University) 2014-04-30 14:00: Computing Cancer ( Jasmin Fisher - Microsoft Research & Department of Biochemistry, Cambridge) 2014-05-05 11:00: A Core Quantitative Coeffect Calculus (Marco Gaboardi (University of Dundee)) 2014-05-05 11:00: A Core Quantitative Coeffect Calculus (Marco Gaboardi (University of Dundee)) 2014-05-06 15:00: Psychology of malware warnings (David Modic, Cambridge University) 2014-05-07 14:00: Multitask Learning (Prof Massimiliano Pontil - University College London) 2014-05-13 15:00: Security, Reliability and Backdoors (Dr Sergei Skorobogatov, Security Group, University of Cambridge Computer Laboratory) 2014-05-14 14:00: No Babbage Seminar today owing to the Wheeler Lecture (Speaker to be confirmed) 2014-05-14 16:00: Computational Thinking (Prof Jeannette M. Wing - Microsoft Research & Carnegie Mellon University) 2014-05-21 14:00: Theory into Practice: the story of Incremental (Yaron Minsky - Jane Street) 2014-05-23 14:00: Higher-kinded programming in ML (Jeremy Yallop, University of Cambridge) 2014-05-23 16:00: Modeling a Practical Combination of Delimited Continuations, Exceptions, Dynamic-Wind Guards, Dynamic Binding, and Stack Inspection (Matthew Flatt, University of Utah) 2014-05-28 14:00: No Fixed Abode: Avoiding IP Address Blocking to Circumvent Censorship (Professor Nikita Borisov - University of Illinois at Urbana-Champaign) 2014-06-03 15:00: Trust, Religion, and Tribalism: Reflections on the Sociological Data from the Balkans (Gorazd Andrejč, Junior Research Fellow, Woolf Institute, Cambridge) 2014-06-06 14:00: Formally Verified Security Micro Policies (Arthur Azevedo de Amorim (Upenn)) 2014-07-01 14:00: Why Isn’t Verification Standard Practice? (Steve Crocker, ICANN) 2014-07-08 14:00: Points-To and Alias Analysis -- the precision vs efficiency dilemma (Professor Uday Khedker, Department of Computer Science & Engg. IIT Bombay, India. ) 2014-07-14 14:00: Programming Robotic Agents: A Multi-tasking Teleo-Reactive Approach (Professor Keith Clark, Department of Computing, Imperial College, London) 2014-07-29 15:15: Safe Shell Scripting with Capabilities and Contracts (Scott Moore, PhD student, Harvard) 2014-08-22 16:00: Backward Analysis via Over-Approximate Abstraction and Under-Approximate Subtraction (Alexey Bakhirkin, MSR/University of Leicester) 2014-08-29 14:00: Embedding effect systems in Haskell (Dominic Orchard (University of Cambridge)) 2014-09-09 14:00: From TLS to secure websites: the HTTPS landmine (Antoine Delignat-Lavaud, Inria Paris, team Prosecco (Programming Securely with Cryptography) 2014-09-10 13:00: Micro-Policies: A Framework for Tag-Based Security Monitors (Benjamin C. Pierce, University of Pennsylvania) 2014-09-10 13:00: Micro-Policies: A Framework for Tag-Based Security Monitors (Benjamin C. Pierce, University of Pennsylvania) 2014-09-23 14:00: DP5: Privacy-preserving Presence Protocols (Ian Goldberg, University of Waterloo [currently on sabbatical at the University of Cambridge]) 2014-09-30 14:00: Bitcoin as a source of verifiable public randomness (Joseph Bonneau, Center For Information Technology Policy, Princeton) 2014-10-09 14:00: Logic programming beyond Prolog (Maarten van Emden, University of Victoria, Canada) 2014-10-15 14:00: Fuzzy Optimisation of Reverse Logistics Networks (Prof Dobrila Petrovic - Coventry University) 2014-10-22 14:00: Science Data Processor for the Square Kilometre Array Telescope (Bojan Nikolic - University of Cambridge MRAO) 2014-10-29 14:00: Structure and Dynamics of Mutlilayer Networks (Ginestra Bianconi - Queen Mary University London) 2014-11-03 14:00: Taming GPU threads with F# and Alea.GPU (Dr Daniel Egloff, QuantAlea AG) 2014-11-05 14:00: Payment System Security - Attacks and Defences (Dr Steven Murdoch - University College London) 2014-11-07 14:00: An Algorithmic Metatheorem for Directed Treewidth (Mateus de Oliveria Oliveira, KTH, Stockholm) 2014-11-12 14:00: Kafka and Samza: distributed stream processing in practice (Martin Kleppmann - LinkedIn) 2014-11-14 16:00: Verification of quantum protocols using Coq (Jaap Boender, Middlesex University) 2014-11-19 14:00: Scientific Data Management (Dr Thomas Heinis - Imperial College London) 2014-11-19 15:05: Hacking is not random: a case-control study of webserver-compromise risk (Marie Vasek, PhD student in the Computer Science and Engineering department, Southern Methodist University (SMU)) 2014-11-21 16:00: Senescent Ground Tree Rewrite Systems (Matthew Hague, Royal Holloway) 2014-11-26 14:00: Text Analysis of Social Media Beyond Twitterdome (Prof Tim Baldwin - Melbourne University) 2014-11-27 11:00: Cloud-centric assured information sharing ( Dr. Bhavani Thuraisingham, Executive Director of the Cyber Security Research Institute, The University of Texas at Dallas) 2014-11-28 16:00: Transition systems over games (Paul Levy, University of Birmingham) 2014-12-03 14:00: Transitive leap frogging: how to avoid queuing up for work (Dr Karl-Filip Faxén - SICS, Sweden.) 2014-12-05 14:00: QuLog: A modern logic-based agent-implementation language (Professor Keith L Clark, Imperial College) 2014-12-05 16:00: Rigid Graphs for Adaptive Networks, with Data (Reiko Heckel, University of Leicester) 2015-01-13 14:00: Single Password Authentication (Alptekin Küpçü, Assistant Professor, Cryptography, Security & Privacy Research Group, Koç University) 2015-01-16 16:00: New reasoning techniques for monoidal algebras (Aleks Kissinger, University of Oxford) 2015-01-21 14:00: The UK National Cyber Security Programme ( Natalie Black - UK National Office of Cyber Security) 2015-01-28 14:00: Interacting with Infrastructure: Home Networking and Beyond (Dr Richard Mortier - University of Cambridge Computer Laboratory) 2015-02-04 14:00: Non-Photorealistic Rendering of Images ( Prof. Paul Rosin - Cardiff University) 2015-02-05 14:00: Human factors and missed solutions to WWII Enigma design weaknesses (Prof. Harold Thimbleby CEng FIET FRCPE FLSW HonFRSA HonFRCP) 2015-02-09 15:00: Reflection without Remorse: Revealing a hidden sequence to speed up monadic reflection (Oleg Kiselyov) 2015-02-11 14:00: Compressed sensing in the real world - Why and what actually works (Dr Bogdan Roman - DAMPT, University of Cambridge) 2015-02-13 14:00: Game Semantics for Interface Middleweight Java (Andrzej Murawski, University of Warwick) 2015-02-18 14:15: The Evolution of Sophos (Dr Jan Hruska - Sophos Ltd.) 2015-02-25 14:00: Digital by Default - A Paradigm Shift in Government (Stephen Allott - Crown Representative for Small and Medium Enterprises in the Cabinet Office) 2015-03-04 14:00: Group Project Presentations (Computer Laboratory 2nd Year Undergraduates) 2015-03-10 14:00: Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation (Nathan Dautenhahn, University of Illinois at Urbana-Champaign) 2015-03-11 14:00: The Automatic Statistician - an AI for Data Science (Zoubin Ghahramani - Department of Engineering, University of Cambridge) 2015-03-20 14:00: Linear numeral systems (Ian Mackie, University of Sussex) 2015-03-31 14:00: Chupja--PHY Covert Channels: Can you see the Idles? (Hakim Weatherspoon, assistant professor, Department of Computer Science, Cornell University) 2015-04-13 14:00: Deep Learning of Natural Language Semantics (Prof Yoshua Bengio - Université de Montréal) 2015-04-17 10:00: Probability and Prejudice: Bridging the Gap Between Machine Learning and Programming Languages (Neil Toronto, University of Maryland) 2015-04-21 14:00: Understanding and Fighting Malicious Activity on Online Social Networks (Gianluca Stringhini, Assistant Professor, University College London) 2015-04-28 14:00: Captchas - the state of play (Dr Jeff Yan, Newcastle University) 2015-04-29 14:00: Toward Causal Machine Learning (Prof. Dr. Bernhard Schölkopf - Max Planck Institute for Intelligent Systems) 2015-05-04 14:00: The Dutch electronic patient record system and beyond - towards physician-controlled decentralized medical record exchange. (Guido van 't Noordende, University of Amsterdam) 2015-05-12 14:00: On the power of techniques for defeating code reuse attacks + some retrospective reflection on the DARPA CRASH program (Prof Howie Shrobe (MIT)) 2015-05-13 14:00: Cellular Systems Biology of Chromosome Dynamics (Dr Karen Lipkow - Barbraham Institute) 2015-05-15 14:00: Locally Finite Constraint Satisfaction Problems (Joanna Ochremiak, University of Warsaw) 2015-05-19 14:00: Information-flow tracking for web technologies (Luciano Bello) 2015-05-20 11:00: Generic Computational Models (Nachum Dershowitz, Tel Aviv University) 2015-05-20 14:00: Cancelled : Full reduction in the face of absurdity. (Didier Remy - Inria) 2015-05-22 14:00: From Communicating Machines to Graphical Choreographies (Nobuko Yoshida and Julien Lange) 2015-05-26 16:15: Hints and Principles for Computer System Design (Butler Lampson - Microsoft Research + MIT) 2015-05-27 14:00: Probabilistic Programming; Ways Forward (Dr Frank Wood - Dept Engineering Science, Oxford) 2015-05-28 14:00: Massively Parallel Hardware Security Platform (Petr Svenda, Masaryk University, Czech Republic) 2015-05-29 14:00: Consistency of Quine's NF using nominal techniques (Jamie Gabbay, Heriot-Watt ) 2015-06-02 14:30: Insecure processing of cookies in modern web applications and browsers (Dawid Czagan, Silesia Security Lab) 2015-06-12 14:00: Improving Implicit Parallelism (Jose Calderon, University of York) 2015-06-12 14:00: Heat kernels in graphs: A journey from random walks to geometry, and back (He Sun, University of Bristol) 2015-06-26 14:00: Making Better Privacy Decisions in Ubiquitous Computing Environments (Serge Egelman, International Computer Science Institute (ICSI) and Department of Electrical Engineering and Computer Sciences (EECS) at the University of California, Berkeley) 2015-07-20 09:30: Interaction + Graphics: Four Lectures By Computer Laboratory Visitors ((Four Guest Lecturers)) 2015-07-21 12:00: Brand Objects and Gradual Contracts (Timothy Jones (Victoria University of Wellington)) 2015-07-28 14:00: Massively Parallel Hardware Security Platform (Petr Svenda, Masaryk University, Czech Republic) 2015-09-11 14:00: The Gamma: Programming tools for data journalism (Tomas Petricek (University of Cambridge)) 2015-10-08 13:00: Unweaving The Lexical Rainbow: Grounding Linguistic Creativity in Perceptual Semantics (Tony Veale, University College Dublin) 2015-10-13 14:00: Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer (Flavio Garcia, University of Birmingham) 2015-10-14 14:00: Clouds, Things and Robots: the need for innovation in Architecture and Software (Prof David May - University of Bristol) 2015-10-21 14:00: Cluster Management with Kubernetes (Dr Satnam Singh - Facebook) 2015-10-23 14:00: Towards a dynamic object model within Unix processes (Stephen Kell (University of Cambridge)) 2015-10-26 13:00: nShield HSMs (Richard Kettlewell, Thales) 2015-10-28 14:00: Today’s and Tomorrow’s Camera Processing Pipelines (Prof Graham Finlayson - University of East Anglia) 2015-10-28 16:00: Decertifying the Worst Voting Machine in the US: Lessons Learned and Looking Forward (Jeremy Epstein, SRI International) 2015-11-03 14:00: Identification and Investigation of Cyber Risk Hotspots in a Large Computer Network (Shahzad Awan, Cardiff University) 2015-11-04 14:00: Image-triage, Brain Computer Interaction and Deception Detection using EEG (Prof Howard Bowman - Univs Kent & Birmingham) 2015-11-06 14:00: Global Realisations of Local Specifications (Martin Otto, Technische Universität Darmstadt, Germany) 2015-11-11 14:00: Unpatchable: Living with a Vulnerable Implanted Device (Marie Moe - SINTEF Norway) 2015-11-13 14:00: Online Space Complexity (Nathanaël Fijalkow, Laboratoire d'Informatique Algorithmique: Fondements et Applications (LIAFA), Université Paris Diderot - Paris 7) 2015-11-18 14:00: Talk Cancelled (was 'Synthetic Biology') (Dr. Jim Haseloff - Department of Plant Sciences, University of Cambridge) 2015-11-24 14:00: Android security: Protecting users, a billion at a time (Adrian Ludwig, Android Security Team) 2015-11-25 14:00: Communication Technologies Research at the NPL (Dr Tian-Hong LOH - National Physical Laboratory UK) 2015-11-27 14:00: Typed realizability for first-order classical analysis (Valentin Blot, Mathematical foundations group, computer science department, University of Bath) 2015-12-02 14:00: Understanding and Verifying Javascript Programs. ( Prof Philippa Gardner - Imperial College London) 2015-12-04 14:00: A continuation passing translation for functional session types (Sam Lindley, LFCS, School of Informatics, University of Edinburgh, Scotland) 2016-01-15 14:00: Graphical linear algebra and applications (Pawel Sobocinski, School of Electronics and Computer Science, University of Southampton) 2016-01-20 14:00: Finding what is invisible through computation ( Dr Rafal Mantiuk - University of Cambridge, Computer Laboratory) 2016-01-22 14:00: Dependent Types and Fibred Computational Effects (Danel Ahman, University of Edinburgh, Scotland) 2016-01-27 14:00: Synthetic Biology ( Dr. Jim Haseloff - Department of Plant Sciences, University of Cambridge) 2016-01-29 14:00: Interacting Hopf monoids: the algebra of signal flow diagrams (Fabio Zanasi, Radboud University of Nijmegen, Netherlands) 2016-02-03 14:00: The Supercloud: Opportunities and Challenges (Prof Hakim Weatherspoon - Cornell University) 2016-02-05 14:00: Effects as sessions, sessions as effects (Dominic Orchard, Computer Laboratory) 2016-02-09 14:00: The Unfalsifiability of security claims (Cormac Herley, Microsoft Research, Redmond) 2016-02-09 16:00: What is an Algorithm? (Yuri Gurevich, Microsoft Research Redmond, USA) 2016-02-10 14:00: Predicting Psychology from Social Media Data (Dr David Stillwell - Judge Management School, University of Cambridge) 2016-02-12 14:00: Identity types in Algebraic Model Structures (Andrew Swan, The Logic Group, School of Mathematics, University of Leeds) 2016-02-16 14:00: Do You See What I See? Differential Treatment of Anonymous Users (Sheharbano Khattak, University of Cambridge) 2016-02-17 11:00: Biggest Challenges for Kotlin: Interoperability and Tooling (Andrey Breslav) 2016-02-17 14:00: Communication with Artificial Intelligences (Prof. Ann Copestake - University of Cambridge, Computer Laboratory.) 2016-02-19 14:00: Excuse My Extrusion (Conor McBride, Mathematically Structured Programming Group, Department of Computer and Information Sciences, the University of Strathclyde) 2016-02-24 15:00: Data Science at The Guardian (Felix Sanchez-Garcia, The Guardian) 2016-02-26 14:00: A call-by-value realizability model for PML (Rodolphe Lepigre, Laboratoire de Mathématiques, Université de Savoie) 2016-03-02 16:15: CST Part Ib, Group Project Presentations (Part Ib students of the Computer Laboratory) 2016-03-03 14:00: THIS TALK HAS BEEN CANCELLED/POSTPONED (Martín Escardó, School of Computer Science, University of Birmingham) 2016-03-09 14:00: Freedom to Innovate: Addressing Student Legal Risks at MIT and Queen Mary's Entrepreneurship and Cyberlaw Clinics (Nathan Matias - MIT Media Laboratory Centre For Civic Media) 2016-03-11 14:00: Comprehensive Parametric Polymorphism (Fredrik Nordvall Forsberg, Mathematically Structured Programming Group at the University of Strathclyde) 2016-03-15 12:30: Meeting on Testing and Verification for Computational Science (Multiple speakers) 2016-03-22 14:00: Understanding, Characterizing, and Detecting Facebook Like Farms (Dr. Emiliano De Cristofaro, Senior Lecturer (Associate Professor), University College London) 2016-04-08 14:00: Generating Gradual Typing Systems with the Gradualizer (Jeremy Siek, Indiana University) 2016-04-22 14:00: Logical dependence via functional dependence (Paulo Oliva, Queen Mary, University of London) 2016-04-27 14:00: From Human Affect and Personality to Social Robots: Affective and Social Signal Processing (Dr Hatice Gunes - University of Cambridge, Computer Laboratory) 2016-04-28 13:00: Dependent types, linear types and operating systems (Matthew Danish (University of Cambridge)) 2016-04-29 14:00: Giry and the Machine (Ilias Garnier, ENS Paris) 2016-05-04 14:00: Android: Mobile, Wearable and IoT devices - Designing Global, Scalable Systems (Dr Grant Allen - Google) 2016-05-05 11:15: A Live, Multiple-Representation Probabilistic Programming Environment for Novices (Maria Gorinova (University of Cambridge)) 2016-05-06 14:00: A rational reconstruction of homogeneous meta-programming (Martin Berger, University of Sussex) 2016-05-11 11:30: Gotta Go Fast: Futhark - A Data-Parallel Purely Functional Language and its Optimising GPGPU Compiler (Troels Henriksen (DIKU)) 2016-05-11 14:00: Imaginary Engines: Lovelace, Babbage and the Analytical Engine. (Sydney Padua) 2016-05-13 14:00: The C standard formalized in Coq, what's next? (Robbert Krebbers, Aarhus University) 2016-05-13 16:15: No Littering! (Bjarne Stroustrup - Morgan Stanley and Columbia University) 2016-05-18 14:00: What does the operating system ever do for me? - Systems Challenges in Graph Analytics ( Dr Tim Harris - Oracle Research Laboratories (Cambridge)) 2016-05-19 13:00: Program Verification Using Cyclic Proof (Reuben Rowe, UCL) 2016-05-20 14:00: Certified automated theorem proving for types (Ekaterina Komendantskaya, Heriot-Watt University, Edinburgh) 2016-05-25 14:30: A History of Virtualisation in Operating Systems. (Dr Andrew Herbert OBE, FREng..) 2016-06-03 14:00: Automated Reasoning and AI for Large Formal Mathematics (Josef Urban, Czech Technical University in Prague) 2016-06-10 14:00: Optimising star-convex functions (Jasper Lee, Brown University) 2016-06-17 14:00: Programming and Proving with Concurrent Resources (Ilya Sergey, University College London) 2016-06-21 14:00: Cyberinsurance: good for your company, bad for your country? (Fabio Massacci - University of Trento) 2016-06-24 14:00: Automatically comparing memory consistency models (John Wickerson, Imperial College) 2016-07-01 14:00: Practical Statically-checked Deterministic Parallelism (Ryan Newton, University of Indiana) 2016-07-08 14:00: A Verified CompCert Front-End for a Memory Model supporting Pointer Arithmetic and Uninitialised Data (Sandrine Blazy, University of Rennes 1) 2016-07-12 13:30: From EDA to NDA: Treating Networks like Hardware Circuits (George Varghese - Microsoft Research) 2016-07-29 14:00: Classical Linear Logic considered as a programming language (Robert Atkey, University of Strathclyde) 2016-08-02 14:45: Design for Security Test against Fault Injection Attack, and Fast Test with Compressive Sensing (Prof Huiyun Li, Shenzhen Institutes of Advanced Technology) 2016-08-18 15:00: A new verified compiler backend for CakeML (Magnus Myreen, Chalmers University, Sweden) 2016-09-09 14:00: Making Reactive Programs Function (Neel Krishnaswami, University of Cambridge) 2016-09-13 14:00: Title to be confirmedFlow- and Context-Sensitive Points-to Analysis using Generalized Points-to Graphs (Pritam Gharat, IIT Bombay) 2016-09-16 14:00: Analysing Goedel’s T by means of ordinal assignment and collapsing (Gunnar Wilken, Okinawa Institute of Science and Technology) 2016-10-07 14:00: On Proofs of Equality as Paths (Andy Pitts, Computer Laboratory) 2016-10-11 14:00: Semantics derived automatically from language corpora necessarily contain human biases (Arvind Narayanan, Princeton University) 2016-10-12 16:15: Rethinking Auto-Parallelisation (Prof Michael O'Boyle - School of Informatics, Edinburgh) 2016-10-14 14:00: An Algebraic Combinatorial Approach to the Abstract Syntax of Opetopic Structures (Marcelo Fiore, University of Cambridge) 2016-10-18 14:00: The Million-Key Question : Investigating the Origins of RSA Public Keys (Best Paper Award @ USENIX Security 2016) (Petr Svenda, Masaryk University, Brno, Czech Republic) 2016-10-19 16:15: From Idea to Startup (David Chan - Entrepreneur-in-Residence, CyLon Accelerator) 2016-10-21 14:00: Context Equivalences and Metrics in Probabilistic Lambda-Calculi (Ugo Dal Lago, University of Bologna) 2016-10-21 14:00: Putting wireless signal security in a system security context (Wade Trappe, Rutgers University) 2016-10-26 16:15: End-to-end encryption: Behind the scenes (D Vasile, M Kleppmann & D Thomas - University of Cambridge Computer Laboratory) 2016-11-02 16:15: Graduate Studies Open Day (Speaker to be confirmed) 2016-11-04 13:15: Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (Kaveh Razavi, Vrije Universiteit Amsterdam) 2016-11-09 16:15: Web search in an AI world: small, cute, distributed. (Dr Aurelie Herbelot - University of Trento) 2016-11-11 14:00: Fencing off Go: Liveness and Safety for Channel-based Programming (Nicholas Ng and Bernardo Toninho, Imperial College) 2016-11-16 16:15: PYNQ - Enabling Software Engineers to Program Heterogeneous, Reconfigurable SoCs ( Peter Ogden - Xilinx Inc) 2016-11-18 14:00: A compositional account of Herbrand's theorem via concurrent games (Pierre Clairambault, ENS Lyon) 2016-11-23 15:15: Automatic Identification and Parallelisation of General Reduction Operations (Philip Ginsbach, University of Edinburgh) 2016-11-23 16:15: Making Reactive Programs Function (Dr Neel Krishnaswami - University of Cambridge, Computer Laboratory) 2016-11-29 14:00: Reversing chip design for hardware security characterization (Franck Courbon, Security group, University of Cambridge) 2016-11-30 16:15: Architectural Impacts of the Silicon Performance Wall (Dr Gavin Stark - Netronome and Visiting Industrial Fellow, Computer Laboratory.) 2016-12-02 14:00: Cantor meets Scott: Domain-Theoretic Foundations for Probabilistic Network Programming (Alexandra Silva ( University College London)) 2016-12-09 14:00: A categorical perspective on type refinement systems (Noam Zeilberger, University of Birmingham) 2016-12-16 14:00: Polymorphism, subtyping and type inference in MLsub (Stephen Dolan, University of Cambridge) 2017-01-17 14:00: Trends in Online Payment Security (Mohammed Aamir Ali, Newcastle University) 2017-01-20 14:00: One-Dimensional Higher Inductive Types (Peter Dybjer, Chalmers University of Technology) 2017-01-25 16:15: Sequencing DNA Using Biological Nanopores (Tim Massingham - Oxford Nanopore Technologies) 2017-01-27 14:00: Genus, Numerics and Architectural Level Optimisation (Theo Drane, Cadence Design Systems) 2017-02-01 16:15: GLOBULAR: A PROOF ASSISTANT FOR DIAGRAMMATIC SCIENCE (Jamie Vicary - Department of Computer Science, University of Oxford) 2017-02-08 16:15: Data Science for the World of Moving Things (Dr Damon Wischik - Computer Laboratory, University of Cambridge) 2017-02-15 16:15: Challenges in Human-Robot Interaction (Prof. Kerstin Dautenhahn - University of Hertfordshire) 2017-02-17 14:00: A monad for full ground reference cells (Ohad Kammar, University of Oxford) 2017-02-21 14:00: On the Privacy and Security of the Ultrasound Ecosystem (Vasilios Mavroudis, University College London) 2017-02-22 16:15: CHERI - Architectural support for software memory protection and compartmentalisation (Robert N. M. Watson - University of Cambridge, Computer Laboratory) 2017-03-01 16:15: AI Meets Cancer (Dr Jasmin Fisher - Department of Biochemistry, University of Cambridge & Microsoft Research) 2017-03-03 14:00: Verified Characteristic Formulae for CakeML (Magnus Myreen, Chalmers University) 2017-03-08 14:00: Part Ib Computer Science Group Project Presentations (Part Ib CST Group Leaders) 2017-03-15 16:15: Are Sensor Networks a first step towards the Diamond Age? (Prof Julie McCann - Imperial College London) 2017-03-17 14:00: Diagrammatic Operational Semantics for Digital Circuits (Dan Ghica, University of Birmingham) 2017-03-28 14:00: Free-Form Gesture Passwords: Security, Memorability, Usability (Janne Lindqvist, assistant professor of electrical and computer engineering, Rutgers University) 2017-04-07 14:00: Monads and Lenses (James Cheney, University of Edinburgh) 2017-05-03 16:15: Morphologically Computing Soft Robots toward Self-Organizing Machines (Dr Fumiya Iida - Department of Engineering, University of Cambridge) 2017-05-10 16:15: Pervasive Sensing for Lifestyle Monitoring and Urban Applications (Prof Archan Misra - SMU Singapore) 2017-05-12 14:00: Higher Categorical Structures, Type-Theoretically (Nicolai Kraus, University of Nottingham) 2017-05-17 16:15: Ubiquitous Sensing with Light (Xia Zhou - Dept of Computer Science Dartmouth College ) 2017-05-19 14:00: What does the Future of Programming Look Like? (David Pearce, Victoria University of Wellington, New Zealand) 2017-05-23 14:00: Improving the Impact of Smartphone Apps (Vincent Taylor, University of Oxford) 2017-05-24 16:15: Can we make people value IT security? (M. Angela Sasse - UCL London.) 2017-05-26 14:00: Concurrent Kleene Algebras and Pomset Languages (Georg Struth, University of Sheffield) 2017-05-31 16:15: Reigniting Innovation in the Hardware Industry (Krste Asanovic - UC Berkeley) 2017-06-01 13:30: Disjoint Semirings for Fractional Permissions (Aquinas Hobor, National University of Singapore) 2017-06-02 14:00: Syntax and Handlers for Operations with Scopes (Maciej Piróg) 2017-06-09 14:00: Interleaved scope for games and automata (Murdoch Gabbay, Heriot-Watt University) 2017-06-13 14:00: What could we actually do about radicalisation, both online and offline? (Lydia Wilson, University of Oxford) 2017-06-16 14:00: Applications of Finite Model Theory in Graph Isomorphism Testing and Propositional Proof Complexity (Wied Pakusa, University of Oxford) 2017-06-20 14:00: Anti-surveillance: Can Applied Cryptography, Law Enforcement, and Formal Methods be Friends? (Dr. Markulf Kohlweiss, Microsoft Research, Cambridge) 2017-06-27 14:00: abraCARDabra: understanding carding forums (Jeremiah Onaolapo, University College London) 2017-07-21 14:00: Semantics of Full Ground References (Paul Blain Levy (University of Birmingham)) 2017-09-08 14:00: A promising semantics for relaxed-memory concurrency (Chung-Kil Hur, Seoul National University) 2017-09-15 14:00: Event Correlation with Algebraic Effects (Oliver Bracevac, University of Darmstadt) 2017-09-28 14:00: Protecting Analog Sensor Security (Kevin Fu, Associate Professor in Electrical Engineering and Computer Science, University of Michigan) 2017-09-29 14:00: Lightweight verification of separate compilation (Chung-Kil Hur, Seoul National University) 2017-10-04 14:00: Conditional Linear Cryptanalysis (Eli Biham, Computer Science Department, Technion - Israel Institute of Technology) 2017-10-10 14:00: Analysis and Classification of Android Malware (Lorenzo Cavallaro, Information Security Group (ISG), Royal Holloway, University of London) 2017-10-11 16:15: Wireless community mesh networks: fresh connectivity for 7 billion people (Prof Leandro Navarro - Universitat Politècnica de Catalunya) 2017-10-17 14:00: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing (Changyu Dong, School of Computing, Newcastle University) 2017-10-18 16:15: (No Seminar Today) (Mr Nobody) 2017-10-25 16:15: What if Computers Understood Physics? (Dr Phillip Stanley-Marbell - University of Cambridge, Dept Engineering.) 2017-11-01 16:15: Programming Computers Without Processors (Dr Satnam Singh - X, The Moonshot Factory) 2017-11-08 16:15: Open source – 19th C. capitalism re-invented ? (Dr Lee Smith - ARM ) 2017-11-10 13:00: Designing Verifiable Cache Coherence Protocols (Daniel Sorin, Duke University) 2017-11-10 14:00: Reasoning beyond data-race freedom (Stephen Dolan, Ocaml Labs, University of Cambridge) 2017-11-15 16:15: When Robots Hit the Road: New Challenges in Multi-Vehicle Coordination and Control (Dr Amanda Prorok - University of Cambridge, Computer Laboratory.) 2017-11-22 16:15: Using Modern C++ - stepping up to C++14/17 (Dr Bjarne Stroustrup) 2017-11-28 14:00: Bayes, not Naive: Security Bounds on Website Fingerprinting Defenses (Giovanni Cherubin, Information Security Group (ISG), Royal Holloway, University of London) 2017-11-29 16:15: Hands-on Generative Programming: Write an Interpreter, Build a Compiler. (Dr Nada Amin - University of Cambridge, Computer Laboratory.) 2017-12-01 14:00: On the expressive power of user-defined effects: effect handlers, monadic reflection, delimited control (Sam Lindley, University of Edinburgh) 2017-12-05 10:30: Effective Stateless Model Checking for C/C++ Concurrency (Viktor Vafeiadis, MPI-SWS) 2017-12-07 11:00: The Linux Kernel Concurrency Model (Andrea Parri) 2018-01-19 14:00: A Geometric Theory of Program Testing. (Tony Hoare, FRS FREng) 2018-01-23 11:00: Logic Programming, Semantics, and a Bit of Cleverness (William Byrd, University of Alabama at Birmingham) 2018-01-23 14:00: The impact of cybercrime on businesses: A new conceptual framework and its application to Belgium (Letizia Paoli, Faculty of Law, University of Leuven) 2018-01-24 16:15: THEMIS: Fairness in Federated Stream Processing under Overload (Dr Eva Kalyvianaki - The Computer Laboratory, Cambridge.) 2018-01-25 14:00: Energy Efficient Compilation of Irregular Task-Parallel Loops (Krishna Nandivada, IIT Madras, India) 2018-01-26 14:00: Atomicity Abstractions in Relaxed Memory Architectures (Brijesh Dongol, Brunel University London) 2018-01-30 14:00: Anonymity in Cryptocurrencies (Sarah Meiklejohn, Information Security Group, University College London (UCL)) 2018-01-31 16:15: Amazon Alexa (Dr Craig Saunders - Amazon ) 2018-02-06 15:00: Psychological predictors of risky online behaviour: The cases of online piracy and privacy (Piers Fleming, School of Psychology, University of East Anglia) 2018-02-07 16:15: Private Statistics and Their Applications to Distributed Learning: Tools and Challenges (Dr Emiliano De Cristofaro - University College London) 2018-02-13 14:00: Lecture 2: Algebraic Theory of Program Transformation (Tony Hoare, FRS FREng) 2018-02-14 16:15: Kiwi Scientific Acceleration on FPGA (Dr David J Greaves - University of Cambridge, Computer Laboratory.) 2018-02-16 14:00: Lightweight verification of separate compilation (Chung-Kil Hur, Seoul National University) 2018-02-20 14:00: Large Scale Ubiquitous Data Sources for Crime Prediction (Cristina Kadar, ETH Zurich) 2018-02-21 16:15: Exploring the mechanisms of haematopoietic lineage progression at the single-cell level (Dr Ana Cvejic - The Sanger Centre & Dept of Haematology, Cambridge.) 2018-02-23 14:00: Modular Algorithm Analysis (Michel Schellekens, University College Cork) 2018-02-28 16:15: The Exposome in Epidemiological Practice (Prof. Paolo Vineis - School of Public Health, Imperial College London) 2018-03-02 15:00: Executing C, C++ and Fortran Efficiently on the Java Virtual Machine via LLVM IR (Manuel Rigger, Johannes Kepler University, Linz) 2018-03-07 14:00: Part Ib Group Project Presentations (Computer Science Tripos 2nd Year Students) 2018-03-09 14:00: Left Exact Modalities in Type Theory (Eric Finster, INRIA Rennes) 2018-03-14 16:15: Embedding Musical Codes into an Interactive Piano Composition (Prof Steve Benford - University of Nottingham, Mixed Reality Laboratory) 2018-03-27 14:00: Wireless Physical-layer Security: Fundamentals and Jamming with Coding for Secrecy (João P. Vilela, Informatics Engineering, University of Coimbra) 2018-04-27 14:00: One Hierarchy Spawns Another: Graph Deconstructions and the Complexity Classification of Conjunctive Queries (Hubert Chen, Birkbeck University of London) 2018-05-02 16:15: No Seminar Today (Speaker to be confirmed) 2018-05-04 14:00: Lecture 3: Logic for Program Development, Verification and Implementation. (Tony Hoare, FRS FREng) 2018-05-08 14:00: Data science approaches to understanding key actors on online hacking forums (Sergio Pastrana/Andrew Caines, Computer Laboratory, University of Cambridge) 2018-05-09 16:15: Latent Variable Model, Matrix Estimation and Collaborative Filtering (Prof Devavrat Shah - MIT) 2018-05-15 14:00: Ethical Issues in Network Measurement (Shehar Bano, Dept. of Computer Science, University College London (UCL)) 2018-05-16 16:15: A New Era of Open-Source System-on-Chip Design (Prof Christopher Batten - Cornell University) 2018-05-18 14:00: Scheduling Tasks for Reconfigurable Architecture (Amlan Chakrabarti, University of Calcutta) 2018-05-22 14:00: Detecting Spies in Sensor-Rich Environments using Cyber-Physical Correlation (Brent Lagesse, University of Washington Bothell (visiting Cambridge as a Fulbright Scholar)) 2018-05-23 16:15: Rule Control Of Teleo-Reactive, Multi-Tasking, Communicating Robotic Agents ( Keith Clark - Imperial College London) 2018-05-24 13:45: Quantitative equational reasoning (Prakash Panangaden, McGill University) 2018-05-30 16:15: The Wheeler Lecture In Computer Science: Language, Learning, and Creativity (Professor Stephen Pulman - Department of Computer Science, University of Oxford.) 2018-06-01 14:00: From global to local state in game semantics via the sequoid (James Laird, University of Bath) 2018-06-15 14:00: Compositional Compiler Verification for a Multi-Language World (Amal Ahmed, Northeastern University) 2018-06-19 14:00: The direct approach to evaluation order (Guillaume Munch-Maccagnoni, INRIA) 2018-06-29 14:00: Types and Safety of Lock-free Data Structures (Elias Castegren, MSR) 2018-07-06 14:00: Polynomial models of type theory (Tamara von Glehn (DPMMS)) 2018-07-16 15:00: Combating a hydra: Islamic State's digital jihad as a threat to international security (Miron Lakomy, Department of International Relations, University of Silesia) 2018-07-19 14:00: Automated Full-Stack Memory Model Verification with the Check suite (Yatin Manerkar, Princeton University) 2018-07-27 14:00: Graphical Conjunctive Queries (Pawel Sobocinski, University of Southampton) 2018-09-11 14:00: Beyond Polarity: Towards A Multi-Discipline Intermediate Language with Sharing (Paul Downen, University of Oregon) 2018-09-14 14:00: Quasi-polynomial solutions for parity games and other problems (Karoliina Lehtinen, Christian-Albrechts University of Kiel) 2018-10-10 16:15: Machine learning for medicine: Predicting, pre-empting and treating disease (Professor Mihaela van der Schaar - John Humphrey Plummer Professor, University of Cambridge) 2018-10-17 16:15: A journey into interdisciplinary research (Derek McAuley - Professor of Digital Economy, University of Nottingham) 2018-10-30 14:00: The Guardian Council: Using many-core architectures to support programmable hardware security (Sam Ainsworth, Computer Laboratory, University of Cambridge) 2018-10-31 16:15: Stylus input and the benefits of a standard (Mark Hayter - Sr Engineering Director in the Chrome OS Hardware team at Google, and is currently a visitor from industry with the Computer Architecture team in the Computer Lab ) 2018-11-06 14:00: You think you're not a target? A tale of three developers (Chris Lamb, Debian Project Leader) 2018-11-07 16:15: Scalable Intelligent Systems by 2025 (Carl Hewitt - Emeritus Professor at MIT) 2018-11-13 14:00: Displacing big data: How cybercriminals cheat the system (Alice Hutchings, Computer Laboratory, University of Cambridge) 2018-11-14 16:15: Failing with Style: Why and How we Should Encourage Humans to Fail with Highly Capable Systems (Professor Steve Benford, Mixed Reality Laboratory, School of Computer Science, The University of Nottingham) 2018-11-16 14:15: Lower bound for arithmetic circuits via Hankel matrix (Pierre Ohlmann, IRIF, Université Paris 7) 2018-11-20 14:00: PP is not a monad (Bartek Klin, Warsaw University) 2018-11-21 16:15: Computational Imaging for Realistic Appearance Modelling (Abhijeet Ghosh, Imperial College London) 2018-11-26 15:00: Verifying Concurrent Search Structure Templates (Siddharth Krishna, NYU) 2018-11-27 14:00: The ideal versus the real: A brief history of secure isolation in virtual machines and containers (Allison Randal, Computer Laboratory, University of Cambridge) 2018-11-28 16:15: From molecules to recurrent visual hallucinations: multimodal imaging and computational modelling of Dementia with Lewy bodies (Dr Li Su - Alzheimer’s Research UK Senior Research Fellow) 2018-11-30 14:00: Project Everest: towards a verified TLS ecosystem (Jonathan Protzenko, MSR Redmond) 2018-12-04 16:00: Function-Based Access Control (Yvo G. Desmedt, Department of Computer Science, University of Texas at Dallas) 2019-01-15 14:00: Trustworthy and Accountable Function-as-a-Service using Intel SGX (Andrew Paverd, Microsoft Research Cambridge) 2019-01-22 14:00: Evil on the Internet (Richard Clayton, Computer Laboratory, University of Cambridge) 2019-01-23 16:15: Imitation learning for structured prediction (Dr Andreas Vlachos) 2019-01-29 14:00: Keeping authorities honest with verifiable append-only logs, and making backdoored software updates detectable (Mustafa Al Bassam, Department of Computer Science, University College London (UCL)) 2019-01-30 16:15: The Magic of Machine Learning and Classifier ensembles (Ludmila Kuncheva,Bangor University) 2019-02-06 16:15: Perpetual Computing: Technologies for Banishing Batteries (Joshua R. Smith - Zeutschel Professor, Allen School of Computer Science and Engineering, University of Washington) 2019-02-13 16:15: Make Switches Simple Again! (Dr Noa Zilberman) 2019-02-19 14:00: Thunderclap: Exploring Vulnerabilities Operating System IOMMU Protection via DMA from Untrustworthy Peripherals (Theo Markettos, Computer Laboratory, University of Cambridge) 2019-02-20 16:15: Verified Probabilistic Reachability in Parametric Hybrid Systems: Theory and Tool Implementation (Dr Paolo Zuliani - School of Computing, Newcastle University) 2019-02-22 15:00: A domain theory for statistical probabilistic programming (Ohad Kammar, Edinburgh) 2019-02-27 16:15: DevOps and Cloud Native development in the University of Cambridge (Dr Abraham Martin - Head of DevOps, University of Cambridge Information Services ) 2019-03-12 14:00: “Doing more” to keep children safe online – why the tech sector can only do so much (Andy Phippen, University of Plymouth) 2019-03-18 11:15: StkTokens: Enforcing Well-Bracketed Control Flow and Stack Encapsulation Using Linear Capabilities (Lau Skorstengaard, Aarhus University) 2019-03-18 11:45: Linear capabilities for fully abstract compilation of separation-logic-verified code (Thomas Van Strydonck, KU Leuven) 2019-03-18 14:30: Linear Capabilities: an overview (Dominique Devriese, Vrije Universiteit Brussel) 2019-03-20 16:15: Representation Learning on Graphs (Jure Leskovec - Associate Professor of Computer Science at Stanford University, Chief Scientist at Pinterest, and investigator at Chan Zuckerberg Biohub) 2019-03-21 14:00: Securing Systems with Insecure Hardware (Kaveh Razavi, Systems and Network Security Group, Vrije Universiteit Amsterdam) 2019-03-22 14:00: Excel Formulae: a PL perspective (Ben Simner, Computer Laboratory) 2019-04-02 14:00: Stacked Borrows: An Aliasing Model for Rust (Ralf Jung, MPI-SWS) 2019-04-12 14:00: Push versus Pull-Based Loop Fusion in Query Engines (Amir Shaikhha, Oxford) 2019-04-17 14:00: Uncertainty is hope: towards a unified foundation of gradual typing (Joshua Dunfield, Queen’s University, Canada) 2019-04-18 14:00: Resource-oriented programming with graded modal types (Vilem Liepelt, University of Kent) 2019-04-24 16:15: Hand Tracking on HoloLens 2 (Dr Erroll Wood) 2019-04-30 14:00: A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions (Alisa Frik, International Computer Science Institute (ICSI), University of California Berkeley) 2019-05-01 16:15: How to design a programming language (Professor Alan Blackwell) 2019-05-07 14:00: Firecracker microVMs - How to Securely Run Thousands of Workloads on a Single Host (Diana Popa, Amazon) 2019-05-07 15:00: rust-vmm: Building the Virtualization Stack of the Future (Andreea Florescu, Amazon) 2019-05-09 13:45: An Overview of the Flix Programming Language (Magnus Madsen, Aarhus University) 2019-05-10 14:00: Hardness magnification near state-of-the-art lower bounds (Jan Pich, Oxford) 2019-05-22 15:15: Combining Formal Methods and Machine Learning (Professor Jane Hillston, University of Edinburgh) 2019-05-24 14:00: Retrofitting Purity with Comonads and Capabilities (Vikraman Choudhury, Indiana University / Cambridge) 2019-05-29 16:15: The Principle of Least Cognitive Action (Professor Marco Gori) 2019-06-12 16:15: Security and Privacy in a World of Safety: Analysing Avionic Data Links and NextGen ATC Networks (Professor Ivan Martinovic - Computer Science Department, University of Oxford) 2019-06-17 14:00: Verification of Cyber-Physical Systems: Temporal Properties and Airplane Collision Avoidance (Jean-Baptiste Jeannin, University of Michigan) 2019-07-23 14:00: Deploying Differential Privacy for the 2020 Census of Population and Housing (Simson L. Garfinkel, Senior Computer Scientist for Confidentiality and Data Access, U.S. Census Bureau) 2019-09-12 13:45: Local reasoning for robust observational equivalence (Koko Muroya) 2019-09-12 14:00: An analysis of the threats of the consumer spyware industry (Diarmaid Harkin, Alfred Deakin Institute, Deakin University) 2019-10-11 14:00: The way of the empty proof (Jean-Louis Lassez) 2019-10-15 14:00: Reducing Metadata Leakage from Encrypted Files and Communication (Nikitin Kirill, Decentralized/Distributed Systems Lab, EPFL) 2019-10-29 14:00: Automatically Dismantling Online Dating Fraud (Matthew Edwards, Faculty of Engineering, University of Bristol) 2019-10-30 15:05: StructureNet: Hierarchical Graph Networks for 3D Shape Generation (Professor Niloy Mitra - Professor of Geometry Processing in the Department of Computer Science, University College London (UCL)) 2019-11-06 15:05: Deep learning on graphs and manifolds: going beyond Euclidean data (Professor Michael Bronstein (Imperial College / Twitter)) 2019-11-08 13:00: Haskelly things (Richard Eisenberg (Bryn Mawr College)) 2019-11-11 13:00: Realistic Adversarial Machine Learning (Nicholas Carlini, Google Brain) 2019-11-13 15:05: The Digital Architecture of Future Cities (Dr Ian Lewis - Director, Infrastructure Investment - Computer Laboratory) 2019-11-14 14:15: Quantum Things 1 - Monads, comonads, and resource-limited computation (Adam ó Conghaile (University of Cambridge)) 2019-11-15 14:00: Quantum Things 2 - The quantum monad on relational structures (Nadish de Silva (University of Cambridge)) 2019-11-19 14:00: Radio Protocol Vulnerabilities in 5G Networks (Ravishankar Borgaonkar, SINTEF Digital) 2019-11-20 15:05: Earphones: The Next Significant Platform after Smartphones (Romit Roy Choudhury (University of Illinois at Urbana Champaign)) 2019-12-05 14:00: Modular Relaxed Dependencies in Weak Memory Concurrency (Marco Paviotti) 2019-12-06 14:00: Quantum things 3 - Resources and Co-resources (Anuj Dawar (University of Cambridge)) 2020-01-21 14:00: It's Damn Hard to Decentralise the Web (Gareth Tyson, School of Electronic Engineering and Computer Science, Queen Mary University of London) 2020-01-22 15:05: Digital Modeling of Reality with Machine Learning (Dr Cengiz Oztireli, Graphics Lecturer, Department of Computer Science and Technology, University of Cambridge) 2020-01-28 14:00: Security economics to inform behaviour change support (Simon Parkin, Information Security Group, University College London) 2020-02-05 15:05: Machine Learning at the Extreme Edge - an Open Platform Approach (Prof. Dr. Luca Benini, ETH Zürich) 2020-02-12 15:05: Climate, Carbon, and Computer Science (Professor Keshav - Robert Sansom Professor, Department of Computer Science and Technology, University of Cambridge) 2020-02-17 13:00: On the Effectiveness of Generating Adversarial Examples for Evading Blackbox Malware Classifiers (Dr Sadia Afroz, ICSI, UC Berkeley, Avast) 2020-02-18 14:00: Measuring Cryptocurrency Fraud (Marie Vasek, Department of Computer Science, UCL) 2020-02-19 15:05: Soft Aerial Robotics for Digital Infrastructure Systems (Dr Mirko Kovac - Director, Aerial Robotics Laboratory, Imperial College) 2020-02-21 14:00: A Profunctorial Finiteness Semantics (Zeinab Galal) 2020-02-24 14:00: Computation via Substructures (Ramanathan S. Thinniyam, MPI-SWS) 2020-02-25 14:00: Product Design, Liability, and Insecurity Engineering (Marc Weber Tobias, School of Engineering, University of Pittsburgh) 2020-02-28 13:00: Cerberus C semantics & pointer provenance (Kayvan Memarian (University of Cambridge)) 2020-02-28 14:00: A duality theoretic view on limits of finite structures (Tomáš Jakl, Computer Lab) 2020-03-03 10:00: Formal Foundations for Provably Safe Web Components (Michael Herzberg, University of Sheffield) 2020-03-04 10:00: Automating proof by induction in Isabelle/HOL using domain-specific languages (Yutaka Nagashima, Czech University in Prague (CTU) & University of Innsbruck) 2020-03-05 10:00: Aspects of my formal development work (Boris Djalal, OpenAirInterface Software Alliance) 2020-03-10 14:30: Tests and Proofs in Isabelle (Yakoub Nemouchi, University of York) 2020-03-12 13:00: A Syntactic View of Computational Adequacy (Marco Devesas Campos, University of Birmingham) 2020-04-21 14:00: Trustable Hardware as a TOCTOU Problem: Overview and Potential Remedies (Dr. Andrew 'bunnie' Huang, Independent Researcher) 2020-04-28 14:00: SEAL: sealed-bid auction without auctioneers (Feng Hao, Department of Computer Science, University of Warwick) 2020-05-05 14:00: Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations (Damon McCoy, New York University) 2020-05-12 14:00: The politics of data-driven governance (Lina Dencik, Data Justice Lab, Cardiff University) 2020-05-19 14:00: Understanding Privacy-Related Questions on Stack Overflow (Kami Vaniea, University of Edinburgh) 2020-05-20 14:00: Wheeler Lecture 2020: The Future of Microprocessors (Dr Sophie Wilson) 2020-05-26 14:00: Collaborative Deanonymization (Rainer Böhme, University of Innsbruck) 2020-06-02 14:00: TRRespass: Exploiting the Many Sides of Target Row Refresh (Kaveh Razavi, ETH Zurich) 2020-06-17 15:00: Addressing Imbalance in Object Detection (Dr Sinan Kalkan - Assoc. Prof Middle East Technical University and Visiting Researcher, Cambridge University) 2020-10-09 14:00: Higher Algebra in Computer Science (Eric Finster, University of Cambridge) 2020-10-16 14:00: Incrementality xor currency for monotone fixed points (Michael Arntzenius, University of Cambridge) 2020-10-20 14:00: Sponge Examples: Energy-Latency Attacks on Neural Networks (Ilia Shumailov, University of Cambridge) 2020-10-23 14:00: Axiomatic Concurrency Semantics for Full-Scale ARMv8-A using Symbolic Execution (Alasdair Armstrong, University of Cambridge) 2020-10-27 14:00: Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble (Kit Murdock, University of Birmingham) 2020-10-28 15:00: Haar Graph Pooling (Dr Yu Guang Wang - University of New South Wales) 2020-10-30 14:00: Symmetric Arithmetic Circuits (Gregory Wilsenach, University of Cambridge) 2020-11-03 14:00: Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband (James Pavur, University of Oxford) 2020-11-05 14:00: SHB Seminar (Multiple Speakers) 2020-11-06 14:00: Free Commutative Monoids in Homotopy Type Theory (Vikraman Choudhury, University of Indiana) 2020-11-10 13:00: Hardware and Software Fingerprinting of Mobile Devices (Jiexin (Stan) Zhang, University of Cambridge) 2020-11-13 14:00: Lovász' Theorem and Comonads in Finite Model Theory (Tomas Jakl, University of Cambridge) 2020-11-17 14:00: Cultural Convergence in the time of COVID (Alicia Bargar and Erin McAweeney, Graphika) 2020-11-20 14:00: Fully Abstract Models of Call-by-Value Languages, à la O'Hearn & Riecke (Philip Saville, University of Edinburgh) 2020-11-24 14:00: Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention (Rutger Leukfeldt, NSCR) 2020-11-25 15:00: Graph Neural Networks for Biomedical Data (Marinka Zitnik, Harvard University) 2020-11-30 14:00: The Android Platform Security Model (and the security status of actual devices) (René Mayrhofer (Johannes Kepler University Linz)) 2020-12-01 13:00: User Privacy Concerns and Preferences in Smart Buildings (Maryam Mehrnezhad, Newcastle University) 2021-01-26 16:00: Towards Provable Physical Safety Against False Actuation Attacks in CPS (Alvaro Cardenas, University of California, Santa Cruz) 2021-01-27 15:00: Reconciling Temporalities in Relating Different Worlds (Professor Nicola Bidwell - International University of Management, Namibia) 2021-01-29 14:00: Promising ARMv8/RISC-V relaxed memory (Christopher Pulte, University of Cambridge) 2021-02-03 15:00: The Compelling World of Augmented Perception - A Perspective on Sensory Wearables (Dr Fahim Kawsar - Nokia Bell Labs) 2021-02-09 14:00: Cybersecurity Risk to Hospitals from Building Services (Sheryn Gillin, University of Cambridge) 2021-02-16 14:00: A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty (Sophie van der Zee, Erasmus University Rotterdam) 2021-02-17 15:00: Theoretical Foundations of Graph Neural Networks (Dr Petar Veličković - DeepMind) 2021-02-23 14:00: Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land (Luca Allodi, Eindhoven University of Technology) 2021-02-24 15:00: Data driven design for sustainable future cities: incorporating the intangible (Dr Ronita Bardhan - University Lecturer of Sustainability in Built Environment, Department of Architecture, University of Cambridge) 2021-03-02 14:00: Crowdsourcing Security Research: A case study of AdObserver (Laura Edelson and Damon McCoy, New York University) 2021-03-09 14:00: Deep Learning Assisted Side-Channel Attacks (Elena Dubrova, KTH Royal Institute of Technology) 2021-03-10 15:00: Modelling syntactico-semantic composition for natural language understanding and generation (Dr Weiwei Sun - Department of Computer Science and Technology, University of Cambridge) 2021-03-16 14:00: Understanding Modern Phishing (Brad Wardman and Adam Oest, PayPal) 2021-03-23 14:00: Dark web marketplaces and COVID-19: Flexible and resilient (Andrea Baronchelli, City University of London and The Alan Turing Institute) 2021-03-26 14:00: Unfinity Categories (Andrew Pitts, University of Cambridge) 2021-04-27 14:00: Mix-net cryptoeconomics: Rebooting privacy-preserving communications as incentive-driven collaborative projects (Aggelos Kiayias, University of Edinburgh) 2021-05-04 14:00: FastPay: High-Performance Byzantine Fault Tolerant Settlement (Alberto Sonnino, UCL) 2021-05-05 15:00: Programming languages for humans (Dr Jeremy Yallop - Department of Computer Science and Technology, University of Cambridge) 2021-05-12 15:30: Wheeler Lecture 2021: Reimagining Robots (Professor Daniela Rus - Director of the Computer Science and Artificial Intelligence Laboratory (CSAIL) at MIT) 2021-05-18 14:00: Apple, App Tracking Transparency, and the Hidden Costs of More Privacy (Sam Gilbert, University of Cambridge) 2021-05-26 15:00: Computation, Composition (Dr Jamie Vicary - Department of Computer Science and Technology, University of Cambridge) 2021-06-02 15:00: Morello - Arm's research prototype using Capabilities (Richard Grisenthwaite - SVP, Chief Architect & Fellow, Arm) 2021-06-09 15:00: The Statistical Finite Element Method (Professor Mark Girolami - Department of Engineering, University of Cambridge) 2021-06-16 15:00: A Retrospective on the 2014 NeurIPS Experiment (Professor Neil Lawrence - Department of Computer Science and Technology, University of Cambridge) 2021-07-20 14:00: It's not only the dark web: Distributed surface web marketplaces (Constantinos Patsakis, University of Piraeus) 2021-10-12 14:00: Super-Posters in Extremist Forums (Stephane Baele, University of Exeter ) 2021-10-15 14:00: Quantum Software in 2021: Patterns and Problems (Ross Duncan, Cambridge Quantum Computing) 2021-10-20 15:05: CO2 Monitoring in the Department (Ian Lewis - Department of Computer Science and Technology, University of Cambridge) 2021-10-22 14:00: CaTT, a type-theory to describe weak omega-categories (Thibaut Benjamin, CEA Tech) 2021-10-26 14:00: Resilient Machine Learning: A Systems-Security Perspective (Roei Schuster, Cornell Tech) 2021-10-27 15:05: Remote sensing and computer vision – just analysis of images from different sensors? (Professor Clement Atzberger - BOKU University, Austria & Mantle Labs Ltd., UK) 2021-10-29 14:00: The Semantics of Shared Memory in Intel CPU/FPGA Systems (Dan Iorga, Imperial College London) 2021-11-01 14:00: Computational Methods to Measure and Mitigate Weaponized Online Information (Gianluca Stringhini, Boston University) 2021-11-03 15:05: Self-Organization of Lifelike Behaviors (Dr Jeremy England - Georgia Institute of Technology, School of Physics ) 2021-11-05 14:00: A formal context for metric semantics (Radu Mardare, University of Strathclyde) 2021-11-09 14:00: Blind Backdoors in Deep Learning (Eugene Bagdasaryan, Cornell Tech) 2021-11-12 14:00: Enriched categories for optimal transport (Simon Willerton, University of Sheffield) 2021-11-16 14:00: Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability (Damon McCoy, New York University) 2021-11-19 14:00: Towards a geometry for syntax (Jon Sterling, University of Aarhus) 2021-11-23 14:00: Teardown of encrypted USB Flash drives (Sergei Skorobogatov, University of Cambridge) 2021-11-26 14:00: A computational method for left adjointness (Simon Forest, University of Aix-Marseille) 2021-11-30 14:00: Securing the Future: Futures Literacy in Cyber Security (Genevieve Liveley, University of Bristol) 2021-12-03 14:00: Comparing general definitions of type theories (Peter LeFanu Lumsdaine, Stockholm University) 2021-12-07 15:00: Why Johnny doesn’t write secure software? (Awais Rashid, University of Bristol) 2022-01-14 15:00: Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime (Erik van de Sandt, Dutch National Police and University of Bristol) 2022-01-18 14:00: Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation (Federico Barbero, University of Cambridge) 2022-01-21 14:00: Theorem Provers to Protect Democracy: Formally Verified Vote-Counting-Software (Mukesh Tiwari, University of Cambridge) 2022-01-25 14:00: Incident Response as a Lawyers' Service (Daniel Woods, University of Innsbruck, Austria) 2022-01-26 15:05: The Quarks of Attention (Professor Pierre Baldi - Distinguished Professor, Department of Computer Science Director, Institute for Genomics and Bioinformatics Associate Director, Center for Machine Learning and Intelligent Systems, University of California, Irvine) 2022-02-02 15:05: Improving Quality of Experience for Video Users in Cellular Networks (Professor Cormac J. Sreenan - Professor of Computer Science at University College Cork) 2022-02-04 14:00: Categorical Foundations of Gradient-Based Learning (Fabio Zanasi, UCL) 2022-02-08 14:00: Trojan Source: Invisible Vulnerabilities (Nicholas Boucher, University of Cambridge) 2022-02-11 14:00: Relational databases versus relational models (Alex Gurney, WebFlow) 2022-02-15 14:00: Machine Learning in context of Computer Security (Ilia Shumailov, University of Cambridge) 2022-02-18 14:00: CANCELLED -- The complexity of counting problems (David Richerby, University of Essex) 2022-02-23 15:05: AI x Mathematics (Dr Alex Davies - DeepMind and Dr Petar Veličković - DeepMind / University of Cambridge) 2022-02-25 14:00: A categorical view of conditional expectation (Prakash Panangaden, McGill University and University of Edinburgh) 2022-03-02 15:05: Intelligent Systems of the People, by the People, for the People (Xiaofan (Fred) Jiang - Associate Professor of Electrical Engineering and Computer Engineering, Columbia University) 2022-03-04 14:00: How undecidable are HyperLTL and HyperCTL*? (Marie Fortin, University of Liverpool) 2022-03-08 10:00: Sex, money, and the mating market: How big data helps us understand sexual politics (Khandis Blake, University of Melbourne) 2022-03-09 15:05: Graph Neural Networks through the lens of algebraic topology, differential geometry, and PDEs (Professor Michael Bronstein - Department of Computer Science, University of Oxford) 2022-03-11 14:00: Cyclic Implicit Complexity (Anupam Das, University of Birmingham) 2022-03-18 16:00: Design rules and Maxims for insecurity engineering for lock designs (Marc Weber Tobias, School of Engineering, University of Pittsburgh) 2022-03-22 14:00: Risk and Resilience: Promoting Adolescent Online Safety and Privacy through Human-Centered Computing (Pamela Wisniewski, University of Central Florida) 2022-04-26 14:00: Attacking and Fixing the Bitcoin Network (Muoi Tran, National University of Singapore) 2022-04-29 14:00: The complexity of counting problems (David Richerby, University of Essex) 2022-05-03 14:00: The gap between research and practice in authentication (Arvind Narayanan, Princeton University) 2022-05-04 15:05: Safe and accurate satellite navigation with non-Gaussian models (Dr Ian Sheret - Polymath Insight Limited) 2022-05-06 14:00: Game comonads, FVM theorems, and bilinear maps (Dan Marsden, University of Oxford) 2022-05-10 14:00: “You’re never left alone:” the use of digital technologies in domestic abuse (Lisa Sugiura, Jason R.C. Nurse, Jacki Tapley and Chloe Hawkins) 2022-05-17 14:00: VerLoc: Verifiable Localization in Decentralized Systems (Katharina Kohls, Radboud University) 2022-05-18 15:15: CANCELLED: Wheeler Lecture 2022 (David Silver, Principal Research Scientist at DeepMind) 2022-05-24 14:00: Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps (Kassem Fawaz, University of Wisconsin-Madison) 2022-05-25 15:05: AI Hardware and Real-World AI (Andrew Fitzgibbon - Distinguished Engineer, Graphcore) 2022-05-27 14:00: Symmetries in Reversible Programming (Vikraman Choudhury, University of Indiana) 2022-05-27 14:00: Title to be confirmed (Vikraman Choudhury, University of Indiana) 2022-05-27 16:00: PostCog: A “Search Engine” Enabling Interdisciplinary Research into Underground Forums at Scale (Anh V. Vu, University of Cambridge) 2022-06-01 15:05: Balanced Allocations: The Power of Choice versus Noise (Dr Thomas Sauerwald - Department of Computer Science and Technology) 2022-06-07 14:00: Reward Sharing for Mixnets (Claudia Diaz, KU Leuven) 2022-06-08 15:05: Computational Inverse Design of Deployable Structures (Professor Mark Pauly - Geometric Computing Laboratory, EPFL Swiss Federal Institute of Technology, Lausanne) 2022-06-10 14:00: Symmetries in quantitative semantics (Hugo Paquet, University of Oxford) 2022-06-10 16:00: Exploring Internet services mis-configuration at scale (Danny Willems and Gregory Boddin, LeakIX; Raphael Proust, Nomadic Labs) 2022-06-14 14:00: No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis (Arwa Al Alsadi, Delft University of Technology) 2022-06-17 14:00: Finite-state polynomial computation (Mikołaj Bojanczyk, University of Warsaw) 2022-07-15 16:00: Mapping the Geography of Cybercrime - findings from an expert survey (Miranda Bruce, University of Oxford) 2022-07-28 16:00: Decoding Nets: A Formal Take on Address Translation (Ben Fiedler, ETH) 2022-08-19 16:00: Analog vs. Digital Epsilons: Implementation Considerations for Differential Privacy (Olya Ohrimenko, University of Melbourne) 2022-08-22 14:00: Staged Compilation with Two-Level Type Theory (András Kovács, Eötvös Loránd University) 2022-08-30 14:00: Algebraic type theory (Steve Awodey, Carnegie Mellon University) 2022-09-29 14:00: The Expressive Power of CSP Quantifiers (Lauri Hella, Tampere University) 2022-09-29 14:00: Title to be confirmed (Lauri Hella, University of Helsinki) 2022-10-07 14:00: Verification for free: using K to build a theorem prover for any language (Bruce Collie, Runtime Verification) 2022-10-10 16:00: Mixing finite and infinite structure (Michael Benedikt, University of Oxford) 2022-10-11 14:00: Generative Language Model, Deepfake, and Fake News 2.0: Scenarios and Implications (Dongwon Lee, Penn State University) 2022-10-12 15:05: Would you trust a cybercriminal? (Dr Alice Hutchings - Department of Computer Science and Technology) 2022-10-14 14:00: ∞-type theories and coherence problems (Taichi Uemura, University of Stockholm) 2022-10-18 14:00: Technology-Facilitated Abuse: The Role of Tech in the Context of Intimate Partner Violence (Leonie Tanczer, University College London) 2022-10-19 15:05: Developing an artificial heart (Dr Mark Goldberg - Camp Lowell Cardiology) 2022-10-21 14:00: Generic pattern unification: a categorical approach (Ambroise Lafont, University of Cambridge) 2022-10-25 14:00: Secure and efficient networks (Oleh Stupak, University of Cambridge) 2022-10-28 14:00: Coherent differentiation makes the differential lambda-calculus deterministic (Thomas Ehrhard, University of Paris) 2022-11-04 14:00: Subcubic certificates for CFL reachability (Dmitry Chistikov, University of Warwick) 2022-11-09 15:05: CANCELLED: Turning the metaverse from myth to reality (Herman Narula - CEO of Improbable) 2022-11-11 14:00: On bilinearity of Whitehead products in Homotopy Type Theory (Ulrik Buchholtz, University of Nottingham) 2022-11-11 16:00: Picking on locks: early security, cybersecurity, and the sophisticated criminal trope. (Yanna Papadodimitraki, University of Cambridge) 2022-11-15 14:00: Towards Meaningful Stochastic Defences in Machine Learning (Ilia Shumailov, University of Oxford) 2022-11-16 15:05: Financing Forests: A Credible Approach towards Halting Tropical Deforestation (Professor Anil Madhavapeddy - Department of Computer Science and Technology) 2022-11-18 14:00: Linear Logic and the Semantics of Concurrent Computation (Alex Kavvos, University of Bristol) 2022-11-22 14:00: Bad men, good men, and loving women: Gender Constructions in the UK’s Online Action Counters Terrorism (ACT) Campaign (Harmonie Toros, University of Kent) 2022-11-23 15:05: Formalised Mathematics: Obstacles and Achievements (Professor Lawrence Paulson - Department of Computer Science and Technology) 2022-11-25 14:00: The linear operator semantics of probabilistic programs (Fredrik Dahlqvist, UCL) 2022-11-29 14:00: The Security of Post-Quantum Telco Networks, or changing 10 billion door-locks in 197 countries (Zygmunt A Lozinski, IBM) 2022-11-30 15:30: Using Everyday Routines as a Resource for Understanding Behaviors and Making Recommendations (Professor Anind Dey - Dean and Professor of the Information School at the University of Washington) 2022-12-02 14:00: String diagrams for semistrict n-categories (Manuel Araujo, University of Cambridge) 2022-12-13 16:00: A Sociotechnical Audit: Assessing Police use of Facial Recognition (Evani Radiya-Dixit, Minderoo Centre for Tech & Democracy) 2022-12-19 11:00: Functional Programming with an Incremental Datalog (Sebastian Erdweg, Johannes Gutenberg University Mainz) 2022-12-19 11:00: Functional Programming with an Incremental Datalog (Sebastian Erdweg, Johannes Gutenberg University Mainz) 2023-01-27 14:00: When Concurrency Strikes (Matthew Parkinson, Microsoft Research) 2023-01-31 16:00: Influence Policing: Mapping the Rise of Strategic Communications and Digital Behaviour Change within UK Law Enforcement and Security Services (Ben Collier, University Of Edinburgh) 2023-02-03 14:00: Bidirectional typing is not just an implementation technique (Meven Lennon-Bertrand, University of Cambridge) 2023-02-14 14:00: Binary Stars: How Crime Shapes Insurance and Insurance Shapes Crime (Anja Shortland, King's College London) 2023-02-15 16:00: Memorial Event for Alexander 'Sandy' Fraser (Various) 2023-02-21 14:00: No One to Blame, but... : Fear and Failure in Securing Large Organisations (Ahana Datta, University College London) 2023-02-22 15:05: Data Science and Machine Learning in Context (Dr. Alfred Z. Spector Visiting Scholar, MIT EECS) 2023-02-24 14:00: The Functional Machine Calculus (Chris Barrett, University of Birmingham) 2023-02-28 14:00: On the motivations and challenges of affiliates involved in cybercrime (Masarah Paquet-Clouston, Université de Montréal) 2023-03-01 15:05: Backdoors in Machine Learning Models (Dr Ilia Shumailov - Christ Church, University of Oxford) 2023-03-07 14:00: Algorithms and the criminal justice system: promises and challenges in deployment and research (Miri Zilka, University of Cambridge) 2023-03-10 14:00: Stochastic games and strategy complexity (Mahsa Shirmohammadi, University of Oxford) 2023-03-14 14:00: Graduality and Parametricity - Together again for the first time, for the second time (Philip Wadler, University of Edinburgh) 2023-03-15 15:05: TALK CANCELLED: Explicit Weakening (A Functional Pearl) (Professor Philip Wadler - Professor of Theoretical Computer Science, Laboratory for Foundations of Computer Science, School of Informatics, University of Edinburgh) 2023-04-28 14:00: Model Checking Disjoint-Paths Logic on Topological-Minor-Free Graph Classes (Giannos Stamoulis, University of Montpellier) 2023-05-03 15:05: From the GUI to ChatGPT: a historical sketch of HCI research agendas and their applicability today (Professor Richard Harper - Lancaster University) 2023-05-05 14:00: Types-To-Sets and Types-to-PERs Relativization in Higher-Order Logic (Andrei Popescu, University of Sheffield) 2023-05-09 14:00: Testing the Effectiveness of Targeted Financial Sanctions on Russia: Law or War? (Jason Sharman, University of Cambridge) 2023-05-10 15:05: Learning the topology of complex systems from their dynamics (Professor Ginestra Bianconi - Queen Mary University of London) 2023-05-12 14:00: Compound Memory Models (Andrés Goens, University of Edinburgh) 2023-05-16 14:00: The INCEL Movement: A New Form of Technology-Facilitated Abuse (Melissa Hamilton, University of Surrey) 2023-05-19 14:00: Making concurrency functional (Glynn Winskel, Huawei Edinburgh Research Centre and Strathclyde University) 2023-05-24 15:05: Bayes in the age of intelligent machines (Professor Tom Griffiths - Princeton University) 2023-05-31 15:05: Privacy in mobility measurements (Professor Jörg Ott - Technische Universität München) 2023-06-06 14:00: The Nym mixnet: Design and Evaluation (Harry Halpin & Ania Piotrowska, Nym Technologies) 2023-06-09 14:00: RoboCert: A Formal Specification Notation for Robotic Software (Matthew Windsor, University of York) 2023-06-16 14:00: Formalizing General Calculi with Binders in Rewriting Logic (Jose Meseguer, University of Illinois at Urbana-Champaign and Leverhulme Visiting Professor at King's College London) 2023-06-20 14:00: The Unlearning Problem(s) (Anvith Thudi, University of Toronto) 2023-06-27 14:00: A View of the Dark Web through the Lens of NLP and Language Modeling (Youngjin Jin, Korea Advanced Institute of Science & Technology (KAIST)) 2023-07-20 14:00: Optimizations in a formally verified compiler (David Monniaux, CNRS/VERIMAG and École Polytechnique) 2023-07-21 16:00: EviHunter: Identifying Digital Forensic Artifacts from Android Apps/Devices via Static & Dynamic Analysis + Android™ App Forensic Artifacts Database (Yong Guan, Iowa State University) 2023-09-19 14:00: On the Insecurity of PLC Systems (Eli Biham, Technion) 2023-10-10 14:00: A Tale of Two Internet (In)Security Problems (Michael Schapira, Hebrew University of Jerusalem) 2023-10-11 15:05: How can we make trustworthy AI? (Professor Mateja Jamnik - Department of Computer Science and Technology, University of Cambridge) 2023-10-13 14:00: How to prove - hopefully - that polynomial time is not choiceless (Benedikt Pago) 2023-10-17 14:00: CIA to AIC: Why Cyber Must Enable the Business (Keith A Price, Chief Security Officer, National Highways) 2023-10-18 14:00: Software for Compositional Modeling (John Baez, University of California Riverside) 2023-10-20 14:00: Coherence by Normalization for Linear Multicategorical Structures (Federico Olimpieri, University of Leeds) 2023-10-25 15:05: An invitation to univalent foundations of mathematics (Dr Jon Sterling - Department of Computer Science and Technology, University of Cambridge) 2023-10-31 14:00: Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India (Aakansha Natani, IIIT Hyderabad, India) 2023-11-01 15:05: Pathfinding for 10k agents (Dr Keisuke Okumura - Visiting scholar at the Department of Computer Science and Technology, University of Cambridge) 2023-11-08 15:05: Coherence Attacks and Defenses in 2.5D Integrated Systems (Professor Paul Gratz - Professor in the Department of Electrical and Computer Engineering, Texas A&M University. Visiting academic at the Department of Computer Science and Technology, University of Cambridge ) 2023-11-14 14:00: Red teaming privacy-preserving systems using AI (Yves-Alexandre de Montjoye, Imperial College London) 2023-11-15 15:00: Wheeler Lecture 2023: Beyond functional programming: a taste of Verse (Professor Simon Peyton Jones - Honorary Distinguished Fellow of the Department of Computer Science and Technology, University of Cambridge) 2023-11-22 15:05: Cross-lingual transfer learning with multilingual masked language models (Professor Mamoru Komachi - Research Professor, Tokyo Metropolitan University. Visiting academic at the Department of Computer Science and Technology, University of Cambridge) 2023-11-24 14:00: A categorical semantics for neural networks (Charlotte Aten, University of Denver) 2023-11-24 16:00: Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks (Pranav Dahiya, University of Cambridge) 2023-11-28 14:00: Human-producible Adversarial Examples (David Khachaturov, University of Cambridge) 2023-11-29 15:05: A brief introduction to causal inference (Dr Apinan Hasthanasombat - Visiting academic at the Department of Computer Science and Technology, University of Cambridge) 2023-11-30 16:00: 25 years of crypto wars and privacy tussles – where next? (Ross Anderson, Duncan Campbell, Ben Collier, Ahana Datta, Merlin Erroll, Gus Hosein, Julian Huppert, Jim Killock, Jen Persson, Sam Smith and Martyn Thomas) 2023-12-05 14:00: Securing Supply Chains with Compilers (Nicholas Boucher, University of Cambridge) 2023-12-18 14:00: Differential Privacy: Theory to Practice for the 2020 US Census (Simson Garfinkel) 2024-01-12 14:00: Testing GPU Memory Consistency at Large (Reese Levine, University of California Santa Cruz) 2024-01-19 16:00: Two Sides of the Same Crime (Michael Dewar, Vice President for Data Science at Mastercard) 2024-01-23 14:00: A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical Discourse (Antonis Papasavva, University College London) 2024-01-24 15:05: Quantum computing via the lens of additive combinatorics (Dr Tom Gur - Department of Computer Science and Technology, University of Cambridge) 2024-01-26 14:00: Towards Secure Distributed Choreographies (Andrew K. Hirsch (Buffalo)) 2024-01-26 15:15: When Subtyping Constraints Liberate: Polymorphic Subtype Inference And Scope Safety (Lionel Parreaux, HKUST (Hong Kong University of Science and Technology)) 2024-01-26 15:15: When Subtyping Constraints Liberate: Polymorphic Subtype Inference And Scope Safety ( HKUST (Hong Kong University of Science and Technology)) 2024-01-26 16:00: One Protocol to Rule Them All? On Securing Interoperable Messaging (Jenny Blessing (University of Cambridge)) 2024-02-06 14:00: Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data (Will Shackleton, Meta) 2024-02-07 15:05: The Compilation Game: Unifying AI, Hardware Design, Quantum, Climate Modelling, and Verification (Dr Tobias Grosser - Department of Computer Science and Technology, University of Cambridge) 2024-02-13 14:00: Securing the WebPKI in Practice: A tour of the technologies, politics and open problems (Dennis Jackson, Mozilla) 2024-02-14 15:05: Graph Neural Networks for skillful weather forecasting (Dr Ferran Alet - Research Scientist, Google DeepMind) 2024-02-16 14:00: Synthesis modulo oracles (Elizabeth Polgreen, University of Edinburgh) 2024-02-20 14:00: Owl - an augmented password-authenticated key exchange protocol (Feng Hao, University of Warwick) 2024-02-21 15:05: Making Large Language Models Safe: A Case Study of Llama2 (Pushkar Mishra - Lead AI Research Engineer, Meta and Computer Science Part 1B Supervisor, University of Cambridge) 2024-02-28 15:05: A Data-Free, Universal Prior Distribution for Syntactic Structures (Dr Fermin Moscoso del Prado Martin - Department of Computer Science and Technology, University of Cambridge) 2024-02-29 14:00: Characterizing Machine Unlearning through Definitions and Implementations (Nicolas Papernot, University of Toronto and Vector Institute) 2024-03-01 14:00: Epimorphisms and Acyclic Types in Univalent Mathematics (Tom de Jong, University of Nottingham) 2024-03-05 14:00: How to Catch an AI Liar: Lie Detection in Black-Box LLMs by Asking Unrelated Questions (Lorenzo Pacchiardi, University of Cambridge) 2024-03-06 15:05: Distribution Shifts in Human-Centered Representation Learning (Dr Ali Etemad - Associate Professor at Queen’s University, Canada. Visiting academic at the Department of Computer Science and Technology, University of Cambridge) 2024-03-08 14:00: Choice Principles in Observational Type Theory (Loïc Pujet (University of Stockholm)) 2024-03-12 14:00: Mysticeti: Low-Latency DAG Consensus with Fast Commit Path (Alberto Sonnino, Mysten Labs) 2024-03-13 15:05: Private Data Analysis over Large Populations (Professor Graham Cormode - Research Scientist, Facebook and professor in the Department of Computer Science, University of Warwick) 2024-03-19 14:00: Data Poisoning and Fakes in Mobile, Web and Cyber Physical Systems (Soteris Demetriou, Imperial College London) 2024-04-02 14:00: Legal Concepts in Cybersecurity and Privacy for Digital & Smart Environments (Raj Sachdev, Cornell University & Plymouth State) 2024-04-23 14:00: Applications of proofs to network security (Joseph Bonneau, New York University) 2024-04-26 17:00: A biography of Tor - a cultural and technological history of power, privacy, and global politics at the internet's core (Ben Collier, University of Edinburgh) 2024-05-01 10:00: Comodule representations of Second-order functionals (Andrej Bauer, University of Ljubljana) 2024-05-01 15:05: Exploring novel (bio)molecular spaces by design – a dialogue between representation and generation (Professor Bruno Correia - Laboratory of Protein Design and Immunoengineering, EPFL Swiss Federal Institute of Technology, Lausanne.) 2024-05-07 14:00: Automated detection of cryptocurrency investment scams at scale (Jose Gilberto Atondo Siu (University of Cambridge)) 2024-05-14 12:00: A selective and biased choice of techniques for building a distributed data store (Paweł T. Wojciechowski, Poznan University of Technology) 2024-05-15 15:05: Iterative active learning for the rapid discovery of best-in-class multispecific antibody therapeutics (Dr Leonard Wossnig - CTO at LabGenius and Honorary Research Fellow in Computer Science at UCL) 2024-06-07 13:00: The end of world as we know it (Arturo Bejar) 2024-06-11 14:00: How Misinformation Creators (Ab)use Generative AI Tools (Amelia (Mia) Hassoun, University of Cambridge) 2024-06-21 14:00: Much Still to Do in Compiler Verification (A Perspective from the CakeML Project) (Magnus Myreen ( Chalmers University, Sweden)) 2024-07-16 14:00: Data-Agnostic Model Poisoning to Manipulating Federated Learning (Kai (Lukas) Li, CISTER research centre, Portugal) 2024-09-20 14:00: Latency-aware routing in mix networks (Mahdi Rahimi, KU Leuven) 2024-10-08 14:00: The Curious Case of Big Phishes in The Netherlands (Hugo Bijmans, TNO & TU Delft) 2024-10-23 15:00: Wheeler Lecture 2024: Supercharging the Human Mind With AI (Professor Yvonne Rogers - Professor of Interaction Design, Director of UCL Interaction Centre, Deputy Head of the Computer Science Department UCL) 2024-10-29 14:00: Developing Technical Interventions for Technical Abuse (Kieron Ivy Turk, University of Cambridge) 2024-11-05 14:00: Decision-making in cybercriminal underground spaces. Where to go, and why? (Luca Allodi, Eindhoven University of Technology) 2024-11-06 15:05: Lean Learning: Applying Lean and Agile Techniques to Software Engineering Education (Dr Robert Chatley - Director, Software Engineering Practice and Director, DoC EdTech Lab, Imperial College London) 2024-11-08 14:00: Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites (Hans Hanley, Stanford University) 2024-11-12 14:00: Federated Deep Learning for Intrusion Detection in Smart Critical Infrastructure (Segun Popoola, Anglia Ruskin University) 2024-11-13 15:05: Computing for Climate Science and Programming for the Planet (Dr Dominic Orchard - Department of Computer Science and Technology, University of Cambridge. Co-director of the Institute of Computing for Climate Science (ICCS)) 2024-11-15 14:00: Design and Verification of Byzantine Fault Tolerant CRDTs (Liangrun Da, Technical University of Munich) 2024-11-19 14:00: On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Learnings from XZ (Mario Lins, Johannes Kepler University Linz) 2024-11-20 15:05: Sensing human activities: from the lab to the home of the elderly (Professor Claudio Bettini - Department of Computer Science, University of Milan, Italy) 2024-11-22 14:00: Bluesky and the AT Protocol: Usable Decentralized Social Media (Martin Kleppmann (University of Cambridge)) 2024-11-26 14:00: Cyber security and privacy issues raised by mobile data extraction for evidential purposes.  (Anna-Maria Piskopani, Chris Hargreaves) 2024-11-27 15:05: The first AGI will be Federated (Professor Nic Lane - Department of Computer Science and Technology, University of Cambridge) 2024-12-03 14:00: Beyond Whack-A-Mole: Disrupting Online Crime and Harms through Law Enforcement and Industry Efforts (Anh V. Vu, University of Cambridge) 2024-12-13 14:00: A detailed analysis of how locks and physical security become vulnerable to attack (Marc Weber Tobias, Investigative Law Offices) 2025-01-29 15:05: Green Algorithms, Green DiSC and GREENER principles: making computational science more environmentally sustainable (Dr Loïc Lannelongue - Department of Public Health and Primary Care, University of Cambridge) 2025-01-31 14:00: Police responses to young people’s experiences of cyberstalking (Tahreem Tahir, University of Central Lancashire) 2025-02-04 14:00: Researchers‘ experiences with vulnerability disclosures (Yasemin Acar, Paderborn University) 2025-02-05 15:05: EU AI Act: A firsthand perspective (Dr Gabriele Mazzini - Research Affiliate, MIT Media Lab. Architect & lead author of the EU AI Act) 2025-02-11 14:00: Designing Counter Strategies against Online Harms (Stefanie Ullmann, University of Cambridge) 2025-02-12 15:05: Hardware Datapath: For Machine Learning and Beyond (Professor George A. Constantinides - Professor of Digital Computation, Department of Electrical and Electronic Engineering, Imperial College London) 2025-02-18 14:00: Physical-Layer Security of Satellite Communications Links (Simon Birnbach, University of Oxford) 2025-02-19 15:05: Probabilistic weather forecasting with machine learning (Dr Ilan Price - Senior Research Scientist, Google DeepMind) 2025-02-25 14:00: Downvoted to Oblivion: Censorship in Online, LGBTQ+ Communities (Kyle Beadle, UCL) 2025-02-26 15:05: Digital Money and Decentralised Finance (Professor Frank Stajano and Dr Ferdinando Samaria - Department of Computer Science and Technology, University of Cambridge.) 2025-02-28 14:00: Challenges and tensions around online safety, security and privacy (Dan Sexton, Internet Watch Foundation) 2025-03-04 13:00: CRIS: The power of imagination in specification and verification (Gil Hur (Seoul National University)) 2025-03-04 14:00: Towards a Faster Finality Protocol for Ethereum (Luca Zanolini, Ethereum Foundation) 2025-03-05 15:05: Generative modelling for de novo design of therapeutics (Dr Joe Watson - Co-founder, Xaira Therapeutics and Dr Emile Mathieu) 2025-03-07 14:00: Axiomatization of infinity-categories (Bastiaan Cnossen, University of Regensburg) 2025-03-14 14:00: ‘To Report or Not to Report: is that the Question?’ Exploring Young People's Reporting Practices of Illicit Drug Ads on Social Media (Ashly Fuller, University College London) 2025-03-18 14:00: Fighting cancer and fake news: A battle against misinformation (Alice Hutchings (University of Cambridge)) 2025-03-19 14:05: Which Faculty Diversity Programs Work? Evidence from 600 U.S. Colleges and Universities (Professor Frank Dobbin - Henry Ford II Professor of the Social Sciences at Harvard) 2025-03-21 14:00: Number of quantifiers in 3-variable logic on linear orders (Lauri Hella (Univeristy of Tampere)) 2025-03-28 14:00: Interventions and Counterfactuals for the Working Programmer (Dario Stein (Radboud University)) 2025-04-22 14:00: On morphisms between diagrams, and strictification of (∞,n)-categories (Amar Hadzihasanovic - Taltech) 2025-05-06 14:00: Kintsugi: A Decentralized E2EE Key Recovery Protocol (Emilie Ma) 2025-05-07 15:05: The TPTP World - Infrastructure for Automated Reasoning (Dr Geoff Sutcliffe - Department of Computer Science, University of Miami, USA) 2025-05-09 14:00: A topological proof of the H-colouring dichotomy (Jakub Oprsal (University of Birmingham)) 2025-05-13 14:00: Harnessing the Power, Managing the Risk: The Future of AI, Data, and Cybersecurity (Evan Kotsovinos, Vice President Privacy, Safety, Security, Google) 2025-05-14 15:05: Type-driven Development with Idris 2 (Dr Edwin Brady - School of Computer Science, University of St Andrews) 2025-05-20 14:00: Two Tales of End-to-End Encryption (Sunoo Park, NYU) 2025-05-21 15:05: Recreating the Physical Natural World from Images (Dr Elliott Wu - Department of Engineering, University of Cambridge) 2025-05-27 14:00: 007: End-to-End Encrypted Audio Calls via Blind Audio Mixing (Emad Heydari Beni and Lode Hoste, Nokia Bell Labs) 2025-05-28 15:05: Hard and soft equivariance priors via Steerable CNNs (Dr Gabriele Cesa - Qualcomm AI Research, Amsterdam) 2025-05-30 14:00: Aeneas: Rust Verification by Functional Translation (Son Ho (Azure Research team)) 2025-06-03 14:00: Safer (cyber)spaces: Reconfiguring Digital Security Towards Solidarity (Dr Julia Slupska, Ofcom) 2025-06-06 14:00: A unified treatment of commuting tensor products (Nicola Gambino ( University of Manchester)) 2025-06-17 14:00: Systems & Cryptography Research in Defense of Democracy (Michael A. Specter, Georgia Tech) 2025-07-15 14:00: "Please Verify": How Human Behavior Undermines Blockchain Security (Taro Tsuchiya, Carnegie Mellon University) 2025-08-04 13:00: Trio of talks: actionable security and privacy, security and privacy perceptions in South Asia, and reproductive security and privacy on TikTok in the post-Roe era (Anna Lena Rotthaler (Paderborn University), Deepthi Munagara (Paderborn University), and Rachel Rodriguez Gonzalez (Paderborn University and The George Washington University)) 2025-08-08 14:00: Modelling the language of extremist communities (Christine de Kock, University of Melbourne) 2025-09-26 14:00: Fibred models of dual-context type theory and internal universes in models of HoTT (Florrie Verity (Australian National University)) 2025-10-03 14:00: On Solution Discovery via Reconfiguration (Sebastian Siebertz) 2025-10-10 14:00: Semiring Semantics: Algebraic Properties vs. Logical Results (Sophie Brinke (RWTH Aachen)) 2025-10-17 14:00: The Dichotomy Theorem on the computational complexity of the Constraint Satisfaction Problem (Petar Markovic (University of Novi Sad)) 2025-10-21 14:00: Scalable and Verifiable Carbon Accounting in Supply Chains: Towards an Integrated Framework (Jonathan Heiss (TU Berlin)) 2025-10-22 15:00: Wheeler Lecture 2025: Efficiency, Resilience, and Artificial Intelligence (Professor Moshe Vardi - Rice University) 2025-10-29 15:05: Standing on the Shoulders of Giants (Dr Greg Lavender - Former CTO of Intel and VMware Trustee, American School of Classical Studies at Athens) 2025-10-31 14:00: Catch Me If You Scan: A Longitudinal Analysis of Stalkerware Evasion Tactics (Anahitha Vijay (University of Cambridge)) 2025-10-31 14:00: Cospans of finite sets (John Baez (University of Edinburgh, U. C. Riverside)) 2025-11-07 14:00: Liberating synthetic quasi-coherence from syntax (David Jaz Myers (Topos Institute)) 2025-11-12 15:05: From research lab to newsroom: deploying secure whistleblower technology in practice (Dr Daniel Hugenroth and Professor Alastair Beresford - Department of Computer Science and Technology, University of Cambridge) 2025-11-18 14:00: Examining Shocks to Ransomware Groups: The Effects of Law Enforcement Interventions and Internal Disputes on Leak Site Uptime (Tom Meurs, Dutch Police) 2025-11-19 15:05: AI for Math: The Future of Collaborative Discovery (Professor Mateja Jamnik - Department of Computer Science and Technology, University of Cambridge.) 2025-11-26 15:05: Physical Inductive Biases for World Models (Dr Ayush Tewari - Department of Engineering, University of Cambridge) 2025-11-28 14:00: Semantics for Reactive Probabilistic Programming (Christine Tasson (Institut Supérieur de l’Aéronautique et de l’Espace)) 2025-12-03 15:05: Resource estimation and optimization to accelerate progress towards quantum advantage (Dr Prakash Murali - Department of Computer Science and Technology, University of Cambridge) 2026-01-28 15:05: What is HoTT? (Professor Steve Awodey - Departments of Philosophy and Mathematics, Carnegie Mellon University ) 2026-02-04 15:05: 15 years of the CHERI Research Project: Reflections, Current Work, and Next Directions (Professor Robert N. M. Watson - Department of Computer Science and Technology, University of Cambridge) 2026-02-06 14:00: Nitro Isolation Engine: formally verifying a production hypervisor (Dominic Mulligan (Amazon Web Services)) 2026-02-10 14:00: Abusability of Automation Apps in Intimate Partner Violence (Shirley Zhang, University of Wisconsin-Madison) 2026-02-11 15:05: A Gentle Introduction to Quantum Computational ElectroMagnetics (Professor Gabriele Gradoni - Institute for Communication Systems, University of Surrey) 2026-02-18 15:05: Geometric Gaussian Processes (Dr Viacheslav Borovitskiy - School of Informatics Institute for Adaptive and Neural Computation, University of Edinburgh ) 2026-02-20 14:00: The Cognitive and Human Factors of Formal Methods (Shriram Krishnamurti (Brown University)) 2026-02-24 14:00: Digital platforms and health disinformation (Marco Zenone, University of Ottawa) 2026-02-25 15:00: The Cybersecurity Awareness Experience: A Masterclass in Social Engineering, Behavioral Psychology, and Digital Self-Defense (Paul Draper) 2026-02-27 14:00: Layered monoidal theories (Leo Lobski (University College London)) 2026-03-03 14:00: Self-Auditable Key Transparency at Scale (Hossein Hafezi, New York University (NYU)) 2026-03-04 15:05: Automated Translation of Real-World Codebases: How Far Are We? (Dr Cristina David - School of Computer Science, University of Bristol) 2026-03-27 14:00: Non-Closure Properties of Read-Once Oblivious Algebraic Branching Programs (Prateek Dwivedi) 2026-04-14 14:00: The Epstein Files vs ExtremeBB (Lydia Wilson) 2026-04-17 14:00: Neutrality and The Atoll Verified Hypervisor (David Cock) 2026-04-21 14:00: Am I a Member? Auditing Private Machine Learning (Nicolas Papernot, University of Toronto) 2026-05-06 15:05: Title to be confirmed (Professor Tomas Petricek - Department of Distributed and Dependable Systems, Faculty of Mathematics and Physics, Charles University, Czech Republic) 2026-05-13 15:05: Title to be confirmed (Professor Simon Moore - Department of Computer Science and Technology, University of Cambridge) 2026-05-20 15:05: Title to be confirmed (Professor Tom Stafford - School of Psychology, Universitry of Sheffield) 2026-05-27 15:00: Title to be confirmed (Professor David Kotz - Department of Computer Science, Dartmouth College) 2026-06-03 15:05: Title to be confirmed (Dr Hana Aliee - Cancer Research UK, University of Cambridge)