Speakers and Young Scientists Directory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
People and Things
People and things On 15 April, Haim Harari of the Weizmann Institute, Israel, was guest speaker at a symposium to mark 20 years of accelerator operation at the Paul Scherrer Institute, Maurice Jacob's roving camera caught Murray Villigen, Switzerland. Gell Mann in a London pub with the manu (Photo Armin Muller) script of his book 'The Quark and the Jaguar'. 20 years of PSI In April the Swiss Paul Scherrer Institute celebrated 20 years of accelerator operations. Originally built for particle research, these facilities now extend over a wide spectrum of applications, from molecular structure to cancer therapy. Each year over 400 visiting researchers make use of PSI particle beams. Meetings An international symposium on strangeness and quark matter will be held from 1-5 September in Crete, covering 1. strangeness and quark- gluon plasma, 2. strangeness con LAPP, Annecy, well known authority French Academy of Sciences densation, 3. strange astrophysics, 4. on non-Abelian gauge theories, and strangelets, 5. dedicated instrumen Michel Davier, long-time specialist in tation for strangeness and quark Among the new corresponding electron-positron collision physics matter. Information from the Secre members of the French Academy of and former Director of the Orsay tariat, University of Athens, Physics Sciences (Academie des Sciences Linear Accelerator Laboratory. Other Dept., Nuclear & Particle Physics de Paris) are Raymond Stora of new members are Alain Aspect, Division, Panepistimioupolis, Greece- 15771 Athens, tel. (30-1)7247502, 7243362, 7243143, fax (30- 1)7235089, email gvassils ©atlas, uoa.ariadne-t.gr At a special colloquium held at CERN on 20 April to mark Carlo Rubbia's 60th birthday and the tenth anniversary of his Nobel Prize award with Simon van der Meer, left to right - Canadian TRIUMF Laboratory Director and former UA1 co-spokesman Alan Astbury, LHC Project Director Lyn Evans, Carlo Rubbia, Director General Chris Llewellyn Smith, and former UA 1 co-spokesman John Dowel I. -
Efficient Algorithms with Asymmetric Read and Write Costs
Efficient Algorithms with Asymmetric Read and Write Costs Guy E. Blelloch1, Jeremy T. Fineman2, Phillip B. Gibbons1, Yan Gu1, and Julian Shun3 1 Carnegie Mellon University 2 Georgetown University 3 University of California, Berkeley Abstract In several emerging technologies for computer memory (main memory), the cost of reading is significantly cheaper than the cost of writing. Such asymmetry in memory costs poses a fun- damentally different model from the RAM for algorithm design. In this paper we study lower and upper bounds for various problems under such asymmetric read and write costs. We con- sider both the case in which all but O(1) memory has asymmetric cost, and the case of a small cache of symmetric memory. We model both cases using the (M, ω)-ARAM, in which there is a small (symmetric) memory of size M and a large unbounded (asymmetric) memory, both random access, and where reading from the large memory has unit cost, but writing has cost ω 1. For FFT and sorting networks we show a lower bound cost of Ω(ωn logωM n), which indicates that it is not possible to achieve asymptotic improvements with cheaper reads when ω is bounded by a polynomial in M. Moreover, there is an asymptotic gap (of min(ω, log n)/ log(ωM)) between the cost of sorting networks and comparison sorting in the model. This contrasts with the RAM, and most other models, in which the asymptotic costs are the same. We also show a lower bound for computations on an n × n diamond DAG of Ω(ωn2/M) cost, which indicates no asymptotic improvement is achievable with fast reads. -
INTERNATIONAL INSTITUTE of BENGAL and HIMALAYAN BASINS 10 Evans Hall, University of California at Berkeley Berkeley, California
INTERNATIONAL INSTITUTE OF BENGAL AND HIMALAYAN BASINS 10 Evans Hall, University of California at Berkeley BERKELEY, CALIFORNIA The International Institute of the Bengal and Himalayan Basins PEACE July 20, 2013 TOWNES AND TAGORE FOURTH ANNUAL SEMINAR ON THE GLOBAL WATER CRISIS 1:30 – 2:00 PM RECEPTION/MIXER 2:00 – 2:15 PM POETRY / SONG Mamade Kadreebux Sushmita Ghosh 2:15-4:00 PM SEMINAR INTRODUCTION Rosalie Say Welcome Founder’s Introduction: Mamade Kadreebux Welcome and Prefatory Remarks, Rash B. Ghosh, PhD, Founder, IIBHB SPECIAL WORDS FROM FRIENDS & WELL-WISHERS OF PROFESSOR CHARLES TOWNES 2:45 – 4:00 PM SESSION ONE The Convergence of Science and Spirituality David Presti, PhD, Professor, Molecular Cell Biology, UC Berkeley Water Budget Estimation and Water Management in the Mekong River Basin Jeanny Wang, President/Sr. Environmental Engineer, EcoWang Ltd. Sand from Newton’s Seashore: Introduction of Dr. Charles H. Townes John Paulin, PhD, Technical Writer and Editor, IIBHB Chief Guest Address: Vivekananda and a Vision for the South Asia, the US, and our Planet Charles H. Townes, PhD, 1964 Nobel Laureate in Physics, 1999 Rabindranath Tagore Award Recipient, and 2005 Templeton Prize Awardee Q & A 4:30 - 6:30 SESSION TWO INTRODUCTION OF KEYNOTE SPEAKER Derek Whitworth, PhD, President, IIBHB Keynote Address Steven Chu, 1997 Nobel Laureate in Physics and former U.S. Secretary of Energy Reducing the Impact of Toxics in Drinking Water Resources Rash B. Ghosh, PhD, Founder, IIBHB Special Presentation: How Advances in Science are Made. Douglas Osheroff, PhD, 1996 Nobel Laureate in Physics Q & A SUMMARY AND CONCLUDING REMARKS Sterling Bunnel, MD, IIBHB Former President and Advisor ACKNOWLEDGEMENT Master of Ceremonies Rosalie Say Professor Charles Hard Townes was born in 1915 and invented the microwave laser, or maser, in 1953 while at Columbia University. -
Computational Learning Theory: New Models and Algorithms
Computational Learning Theory: New Models and Algorithms by Robert Hal Sloan S.M. EECS, Massachusetts Institute of Technology (1986) B.S. Mathematics, Yale University (1983) Submitted to the Department- of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 1989 @ Robert Hal Sloan, 1989. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute copies of this thesis document in whole or in part. Signature of Author Department of Electrical Engineering and Computer Science May 23, 1989 Certified by Ronald L. Rivest Professor of Computer Science Thesis Supervisor Accepted by Arthur C. Smith Chairman, Departmental Committee on Graduate Students Abstract In the past several years, there has been a surge of interest in computational learning theory-the formal (as opposed to empirical) study of learning algorithms. One major cause for this interest was the model of probably approximately correct learning, or pac learning, introduced by Valiant in 1984. This thesis begins by presenting a new learning algorithm for a particular problem within that model: learning submodules of the free Z-module Zk. We prove that this algorithm achieves probable approximate correctness, and indeed, that it is within a log log factor of optimal in a related, but more stringent model of learning, on-line mistake bounded learning. We then proceed to examine the influence of noisy data on pac learning algorithms in general. Previously it has been shown that it is possible to tolerate large amounts of random classification noise, but only a very small amount of a very malicious sort of noise. -
劉炯朗教授prof. Chung-Laung Liu 簡介biography
劉炯朗教授 Prof. Chung-Laung Liu 台灣清華大學蒙民偉榮譽講座教授 William Mong Honorary Chair Professor of Computer Science In National Tsing Hua University 簡 介 Biography 劉炯朗教授,台灣成功大學理學學士,美國麻省理工學院理學碩士和理學博士。先後於麻省 理工學院、伊利諾大學、台灣清華大學等知名高校任教,服務教育界逾四十年,現任台灣清 華大學蒙民偉榮譽講座教授。過往曾任高校領導職務包括:伊利諾大學(香檳校區)助理副 校長(1996-1998)及台灣清華大學校長(1998-2002)。 劉教授的專業領域涵蓋超大型集成電路的電腦輔助設計、電腦輔助教學、實時系統、系統組 合的優化、離散數學等。迄今為止,已發表一百八十餘篇學術論文,出版了八部學術專著。 此外,還出版了七部中文散文集。2005 年至今,劉教授還為新竹 IC975 廣播電台每週主持一 期人文科技節目。 劉教授曾當選台灣中研院院士、電子電機工程師學會(IEEE)會士以及計算機協會(ACM)傑出 會員,同時亦出任多間台灣高科技公司、教育及慈善機構的董事會成員。他曾榮獲澳門大學 和台灣政治大學頒授的榮譽博士學位,亦曾獲電機電子工程師學會及其分會頒發的多個奬項, 如電子設計自動化學會的菲爾‧卡夫曼獎、實時系統技術委員會技術成就獎、電路系統學會 技術成就獎以及教育勳章等殊榮。 C. L. Liu received his B. Sc. degree at the National Cheng Kung University in Taiwan, and his S. M. and Sc. D. degrees from the Massachusetts Institute of Technology. His teaching career spans over forty years, at MIT, the University of Illinois at Urbana Champaign, and the National Tsing Hua University, where he is now the William Mong Honorary Chair Professor of Computer Science. His academic administrative duties include serving as Associate Provost at the University of Illinois at Urbana Champaign from 1996 to 1998, and as President of the National Tsing Hua University from 1998 to 2002. His research areas are: computer-aided design of VLSI circuits, computer-aided instruction, real-time systems, combinatorial optimization, and discrete mathematics. He has published over 180 technical papers, and 8 technical books. In addition, he has published seven books which are essay collections in Chinese. He serves on the Boards of a number of high tech companies and educational and charitable foundations in Taiwan. Since 2005, he hosts a weekly radio show on Technology and Humanities in the radio station IC975 in Hsinchu. He is a member of Academia Sinica, and a Fellow of IEEE and ACM. -
MODELING and ANALYSIS of MOBILE TELEPHONY PROTOCOLS by Chunyu Tang a DISSERTATION Submitted to the Faculty of the Stevens Instit
MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS by Chunyu Tang A DISSERTATION Submitted to the Faculty of the Stevens Institute of Technology in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Chunyu Tang, Candidate ADVISORY COMMITTEE David A. Naumann, Chairman Date Yingying Chen Date Daniel Duchamp Date Susanne Wetzel Date STEVENS INSTITUTE OF TECHNOLOGY Castle Point on Hudson Hoboken, NJ 07030 2013 c 2013, Chunyu Tang. All rights reserved. iii MODELING AND ANALYSIS OF MOBILE TELEPHONY PROTOCOLS ABSTRACT The GSM (2G), UMTS (3G), and LTE (4G) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. This poses serious challenges in ensuring authentication and other security properties. Analyzing the security of all possible interoperation scenarios by hand is, at best, tedious under- taking. Model checking techniques provide an effective way to automatically find vulnerabilities in or to prove the security properties of security protocols. Although the specifications address the interoperation cases between GSM and UMTS and the switching and mapping of established security context between LTE and previous technologies, there is not a comprehensive specification of which are the possible interoperation cases. Nor is there comprehensive specification of the procedures to establish security context (authentication and short-term keys) in the various interoperation scenarios. We systematically enumerate the cases, classifying them as allowed, disallowed, or uncertain with rationale based on detailed analysis of the specifications. We identify the authentication and key agreement procedure for each of the possible cases. We formally model the pure GSM, UMTS, LTE authentication protocols, as well as all the interoperation scenarios; we analyze their security, in the symbolic model of cryptography, using the tool ProVerif. -
See the Scientific Petition
May 20, 2016 Implement the Endangered Species Act Using the Best Available Science To: Secretary Sally Jewell and Secretary Penny Prtizker We, the under-signed scientists, recommend the U.S. government place species conservation policy on firmer scientific footing by following the procedure described below for using the best available science. A recent survey finds that substantial numbers of scientists at the U.S. Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration believe that political influence at their agency is too high.i Further, recent species listing and delisting decisions appear misaligned with scientific understanding.ii,iii,iv,v,vi For example, in its nationwide delisting decision for gray wolves in 2013, the FWS internal review failed the best science test when reviewed by an independent peer-review panel.vii Just last year, a FWS decision not to list the wolverine ran counter to the opinions of agency and external scientists.viii We ask that the Departments of the Interior and Commerce make determinations under the Endangered Species Actix only after they make public the independent recommendations from the scientific community, based on the best available science. The best available science comes from independent scientists with relevant expertise who are able to evaluate and synthesize the available science, and adhere to standards of peer-review and full conflict-of-interest disclosure. We ask that agency scientific recommendations be developed with external review by independent scientific experts. There are several mechanisms by which this can happen; however, of greatest importance is that an independent, external, and transparent science-based process is applied consistently to both listing and delisting decisions. -
Department of Computer Science
i cl i ck ! MAGAZINE click MAGAZINE 2014, VOLUME II FIVE DECADES AS A DEPARTMENT. THOUSANDS OF REMARKABLE GRADUATES. 50COUNTLESS INNOVATIONS. Department of Computer Science click! Magazine is produced twice yearly for the friends of got your CS swag? CS @ ILLINOIS to showcase the innovations of our faculty and Commemorative 50-10 Anniversary students, the accomplishments of our alumni, and to inspire our t-shirts are available! partners and peers in the field of computer science. Department Head: Editorial Board: Rob A. Rutenbar Tom Moone Colin Robertson Associate Department Heads: Rob A. Rutenbar shop now! my.cs.illinois.edu/buy Gerald DeJong Michelle Wellens Jeff Erickson David Forsyth Writers: David Cunningham CS Alumni Advisory Board: Elizabeth Innes Alex R. Bratton (BS CE ’93) Mike Koon Ira R. Cohen (BS CS ’81) Rick Kubetz Vilas S. Dhar (BS CS ’04, BS LAS BioE ’04) Leanne Lucas William M. Dunn (BS CS ‘86, MS ‘87) Tom Moone Mary Jane Irwin (MS CS ’75, PhD ’77) Michelle Rice Jennifer A. Mozen (MS CS ’97) Colin Robertson Daniel L. Peterson (BS CS ’05) Laura Schmitt Peter L. Tannenwald (BS LAS Math & CS ’85) Michelle Wellens Jill C. Zmaczinsky (BS CS ’00) Design: Contact us: SURFACE 51 [email protected] 217-333-3426 Machines take me by surprise with great frequency. Alan Turing 2 CS @ ILLINOIS Department of Computer Science College of Engineering, College of Liberal Arts & Sciences University of Illinois at Urbana-Champaign shop now! my.cs.illinois.edu/buy click i MAGAZINE 2014, VOLUME II 2 Letter from the Head 4 ALUMNI NEWS 4 Alumni -
Wolfgang Pauli Niels Bohr Paul Dirac Max Planck Richard Feynman
Wolfgang Pauli Niels Bohr Paul Dirac Max Planck Richard Feynman Louis de Broglie Norman Ramsey Willis Lamb Otto Stern Werner Heisenberg Walther Gerlach Ernest Rutherford Satyendranath Bose Max Born Erwin Schrödinger Eugene Wigner Arnold Sommerfeld Julian Schwinger David Bohm Enrico Fermi Albert Einstein Where discovery meets practice Center for Integrated Quantum Science and Technology IQ ST in Baden-Württemberg . Introduction “But I do not wish to be forced into abandoning strict These two quotes by Albert Einstein not only express his well more securely, develop new types of computer or construct highly causality without having defended it quite differently known aversion to quantum theory, they also come from two quite accurate measuring equipment. than I have so far. The idea that an electron exposed to a different periods of his life. The first is from a letter dated 19 April Thus quantum theory extends beyond the field of physics into other 1924 to Max Born regarding the latter’s statistical interpretation of areas, e.g. mathematics, engineering, chemistry, and even biology. beam freely chooses the moment and direction in which quantum mechanics. The second is from Einstein’s last lecture as Let us look at a few examples which illustrate this. The field of crypt it wants to move is unbearable to me. If that is the case, part of a series of classes by the American physicist John Archibald ography uses number theory, which constitutes a subdiscipline of then I would rather be a cobbler or a casino employee Wheeler in 1954 at Princeton. pure mathematics. Producing a quantum computer with new types than a physicist.” The realization that, in the quantum world, objects only exist when of gates on the basis of the superposition principle from quantum they are measured – and this is what is behind the moon/mouse mechanics requires the involvement of engineering. -
July 2007 (Volume 16, Number 7) Entire Issue
July 2007 Volume 16, No. 7 www.aps.org/publications/apsnews APS NEWS Election Preview A PUBLICATION OF THE AMERICAN PHYSICAL SOCIETY • WWW.apS.ORG/PUBLICATIONS/apSNEWS Pages 6-7 Executive Board Resolution Thanks US physics team trains for competition in Iran By Katherine McAlpine Legislators for Support of Science Twenty-four high school stu- The APS Executive Board bill authorizes nearly $60 billion dents comprising the US Phys- has passed a resolution thanking for various programs for FY 2008 ics Olympiad team vied for five House and Senate policy makers through FY 2011. The bill would places on the traveling team at for recently-passed legislation double the NSF budget over five the University of Maryland from that strengthens the science, math years and double the DOE Office May 22nd to June 1st. Those and engineering activities of our of Science budget over 10 years. chosen to travel will compete nation. The House of Representatives this month against teams from “Sustaining and improving the passed five separate authorization all over the world at Isfahan standard of living of American bills, which were then combined University of Technology in Is- citizens, achieving energy security into one bill, H.R. 2272, the 21st fahan, Iran. and environmental sustainability, Century Competitiveness Act of Over 3,100 US Physics Team providing the jobs of tomorrow 2007. The bill would put the NSF hopefuls took the preliminary and defending our nation against budget and the NIST Scientific examination in January, and 200 aggressors all require federal in- and Technical Research and Ser- were given a second exam in vestments in science education vices budget on track to double in March to determine the top 24 and research… The Board con- 10 years. -
Ion Trap Nobel
The Nobel Prize in Physics 2012 Serge Haroche, David J. Wineland The Nobel Prize in Physics 2012 was awarded jointly to Serge Haroche and David J. Wineland "for ground-breaking experimental methods that enable measuring and manipulation of individual quantum systems" David J. Wineland, U.S. citizen. Born 1944 in Milwaukee, WI, USA. Ph.D. 1970 Serge Haroche, French citizen. Born 1944 in Casablanca, Morocco. Ph.D. from Harvard University, Cambridge, MA, USA. Group Leader and NIST Fellow at 1971 from Université Pierre et Marie Curie, Paris, France. Professor at National Institute of Standards and Technology (NIST) and University of Colorado Collège de France and Ecole Normale Supérieure, Paris, France. Boulder, CO, USA www.college-de-france.fr/site/en-serge-haroche/biography.htm www.nist.gov/pml/div688/grp10/index.cfm A laser is used to suppress the ion’s thermal motion in the trap, and to electrode control and measure the trapped ion. lasers ions Electrodes keep the beryllium ions inside a trap. electrode electrode Figure 2. In David Wineland’s laboratory in Boulder, Colorado, electrically charged atoms or ions are kept inside a trap by surrounding electric fields. One of the secrets behind Wineland’s breakthrough is mastery of the art of using laser beams and creating laser pulses. A laser is used to put the ion in its lowest energy state and thus enabling the study of quantum phenomena with the trapped ion. Controlling single photons in a trap Serge Haroche and his research group employ a diferent method to reveal the mysteries of the quantum world. -
Lipics-ISAAC-2020-42.Pdf (0.5
Multiparty Selection Ke Chen Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Adrian Dumitrescu Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Abstract Given a sequence A of n numbers and an integer (target) parameter 1 ≤ i ≤ n, the (exact) selection problem is that of finding the i-th smallest element in A. An element is said to be (i, j)-mediocre if it is neither among the top i nor among the bottom j elements of S. The approximate selection problem is that of finding an (i, j)-mediocre element for some given i, j; as such, this variant allows the algorithm to return any element in a prescribed range. In the first part, we revisit the selection problem in the two-party model introduced by Andrew Yao (1979) and then extend our study of exact selection to the multiparty model. In the second part, we deduce some communication complexity benefits that arise in approximate selection. In particular, we present a deterministic protocol for finding an approximate median among k players. 2012 ACM Subject Classification Theory of computation Keywords and phrases approximate selection, mediocre element, comparison algorithm, i-th order statistic, tournaments, quantiles, communication complexity Digital Object Identifier 10.4230/LIPIcs.ISAAC.2020.42 1 Introduction Given a sequence A of n numbers and an integer (selection) parameter 1 ≤ i ≤ n, the selection problem asks to find the i-th smallest element in A. If the n elements are distinct, the i-th smallest is larger than i − 1 elements of A and smaller than the other n − i elements of A.