Events

  • Current Events
  • Past Events

  • Dec11

    We present a method to design parallel algorithms for the constrained combinatorial optimization problems. Our method solves and generalizes many classical combinatorial optimization problems including the stable marriage problem, the shortest path problem and the market clearing price problem.

    4:00pm
    Zoom - See emails for details
    Vijay K. Garg
    The University of Texas at Austin
  • Dec11

    Save the Date!

    • 8 am to 11 am: virtual event
    • 4 pm to 5:30 pm: virtual colloquium and in-person event (118MLH)

    Schedule may be found here (Some details TBD).

    8:00am to 5:30pm
    Virtual and hybrid - TBD
  • Dec04

    Database management systems (DBMS) expose dozens of configurable knobs that control their runtime behavior. Setting these knobs correctly for an application's workload can improve the performance and efficiency of the DBMS. But such tuning requires considerable efforts from experienced administrators, which is not scalable for large DBMS fleets. This problem has led to research on using machine learning (ML) to devise strategies to optimize DBMS knobs for any application automatically.

    4:00pm to 5:00pm
    Zoom - See emails for details
    Andy Pavlo
    Carnegie Mellon University
  • Nov18

    Git is a version control system designed to allow software engineers to collaborate on projects easily and have a history of their code revisions. It is widely used in industry and you'll probably use it in some of your classes. Unfortunately, this isn't really something that's taught in courses and by the time you reach the job market, you might already be expected to know how to do this. 

    6:00pm
    Zoom - See emails for details
    Students in Technology and Sciences
  • Nov13

    The massive growth of online advertising has created a need for commensurate amounts of user tracking. Advertising companies track online users extensively to serve them targeted advertisements. On the surface, this seems like a simple process: a tracker places a unique cookie in the user’s browser, repeatedly observes the same cookie as the user surfs the web, and finally uses the accrued data to select targeted ads.  However, the reality is much more complex.

    4:00pm to 5:00pm
    Zoom - See emails for details
    Ahmad Bashir
    International Computer Science Institute (ICSI) | Berkeley
Subscribe to Events