![]() |
COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. | ![]() |
![]() Churchill CompSci Talks
Add to your list(s)
Send you e-mail reminders
Further detail
Each week, students, fellows and veteran practitioners deliver presentations on topical, pertinent and pressing issues in Computer Science. The talks are technical in nature and consider implications and opportunities for Computer Science in the modern society. This enables everyone to explore cutting-edge aspects of Computer Science outside the confines of the University lecture syllabus which is set 18 months in advance. Topics are wide-ranging, across both theoretical and practical areas of Computer Science. The talks are public and everyone is welcome to join us. You can enjoy some of the previous talks on our YouTube channel: https://www.youtube.com/channel/UCUyBk6W5OKWUQRiQhP1Zhzg In addition to the regular schedule, we often host talks from external speakers and organisations. If you’re looking for a stage to share your latest project with the world, please get in touch! COVID -19 Adjustments for the 2020/21 academic year: Speakers will mostly present from the Wolfson Hall in Churchill College to make the recording and live-streaming of the talks run smoothly. Those who wish to watch the talks may do so either online or in-person. Attendance in person is subject to social distancing requirements, and a one-way system in place in the Wolfson Hall. Members of the University of Cambridge can watch the weekly live-stream via Microsoft Teams; please email the talk organisers for access. Please check back here as these arrangements may be revised in response to changing circumstances. If you have a question about this list, please contact: Matthew Ireland; Dr John Fawcett; Márton Erdős. If you have a question about a specific talk, click on that talk to find its organiser. 0 upcoming talks and 303 talks in the archive. Introduction to GANs
Autoencoders
Treaps - Power and Simplicity of Randomisation
FluBot
The Asynchronous Computability Theorem
Serving Webpages with Client-side Frameworks
Typesetting with TeX and LaTeX
Dimensionality Redution
L1TF/Foreshadow Attack
Implementation of persistent arrays
Introduction to programming with OpenGL
Learning-to-Rank for Information Retrieval
Data anonymization and differential privacy
Shadow Mapping in Real-Time 3D Graphics
Forward and Deferred Rendering
Alternative Memory Technologies to DRAM and SRAM (for on-chip cache design)
Constraint Programming
Adversarial attacks against reinforcement learning agents
Turning Points in Programming
Censorship and Surveillance Resistance Systems
Programming with monads
How to Land on the Moon: The Apollo Guidance Computer
Multidimensional scaling
String-matching Algorithms
Understanding the Source Coding Theorem: A Talk on Shannon’s EntropyOnline only
Designing a type system: an introduction
A Graph of All Mathematics
Differentiable rendering
SLAM Problem: Dealing with Augmented Reality
Covert channels (a networks perspective)
Acoustic Fingerprinting and Music Identification
Netflix and Recommender Systems
Deep Learning for Vision: Lecture and Workshop
Text Summarisation with TextRank
CycleGANs
Why theory matters in biology
Quantum Cryptography
The Nature of Entropy
The busy beaver game: a simple yet non-computable function
Variational Autoencoders
Anti-malware software and trusting trust
Fingerprint matching
The Perfect Snake AI
Proofs: From a Complexity Theoretic Perspective
Balanced Allocations : Balls into Bins
Halting Problem and Gödel's Incompleteness Theorem
On the Use of Typing for Static Logical Verification: RCF and Refinement Types
Censorship Resistance Systems
Software design anti-patterns
Expander Graphs
Paxos: How can we all agree?
AI in Graphics
Range Minimum Query & Lowest Common Ancestor
Hypercomputation
Representing words for NLP (An introduction to Semantic Vector Space Models and GloVe)Note late start time
Neural Architecture Search - a gateway to AutoML
Difficult games for computers: Arimaa
The CAP theorem and its limitations
Less is more
Hyper-converged infrastructure
The Nature of Entropy
Breaking and Making the Internet
Quantum computing in the Real World
Segment Trees
Generative Adversarial Networks
Adversarial Machine Learning
The AKS primality test explained
What are the goals of 5G?
Spectre and Meltdown
Monads
AI: How it works, and why it could be working against us
PID Controllers
How to implement an encryption system badly: InfoSec lessons from WW2
Recommender systems
Recommendation Systems
Email Spam Detection and Filtering: Keeping Your Mailbox Clean
Monads: Simple AND Usable
Resource Management in Programming Languages
Where Compilers Optimizations Go Wrong
Typesetting with TeX and LaTeX
Torrenting for Free
How DNSSEC secures DNS
Particle Swarm Optimisation
Spell Checking: A comparison of approaches
Lua: designing a language to be embeddable
Pedestrian detection and tracking
Practical Decisions in Neural Network Design
Mental Poker
Kolmogorov Complexity and Gödel’s Incompleteness Theorems
Requirements in Application Development
The Signal Protocol for end-to-end encryption in chat clientsNote unusual time
Communication ComplexityNote unusual time
Asynchronous Computation
Internet censorship and Tor
Constraint Satisfaction Problems
Reliable Transmission in Broadcast Networks
MapReduce
The NTP Algorithm in Detail
Google's Transformer: A Novelty to Language Understanding
Programming with Monads
Maze Generation and Solving Algorithms
Sarcasm Identification in Natural Language Processing
Practical Type Systems
The Karhunen–Loève Transform and Principal Component Analysis
Bufferbloat
An introduction to Reinforcement Learning
Genetic Algorithms
Adversarial Machine Learning
Introduction to coding and information theories and the noisy-channel coding theorem
Btrfs
The Achilles' heel: a cautionary tale
Convert Channels and their Analysis
Emulating Early Computers
Google Translate
How not to hit pedestrians if you're a self driving car
Pretending to be a computer
Using Neural Networks to Generate Image Captions
On-line recognition of handwritten equations in a nutshell
Bitcoin as a currency
Chess Engines
How to Render Stuff with OpenGL
Voting systems
Space-partitioning Data- Structures and their Applications
Real-time Computer Graphics: An overview of popular approaches and techniques
Closed Timelike Curves and Complexity Theory
Concurrency in C++
An Introduction to Secure Hash Algorithms
Music Recommender Systems
What did I just hear? An introduction to Speech Recognition using Hidden Markov Models
Combinators
Monads and Comonads
Anti-aliasing Techniques for Real-time Graphics Applications
Image Segmentation: Breaking it downRoom changed: Club Room
Yao's protocol for secure computation
Introduction to BlockchainRoom changed: club room
C++ Templates, Concepts and Modules
Text Data Mining using Topic ModelingRoom changed: club room
A comparison of three modern filesystemsRoom changed: Jock Colville Hall
Things you thought you couldn't do in JavaRoom changed: Jock Colville Hall
Sublinear time property testers
Localisation for Robotics
Lock-free programming
PAC learning
MIDI: What it is and how it changed the world of music
Capture the Flag 101 - practical systems and web security
Don't like the sound of your voice? You can do something about that!
Electronic mail
Composing by Numbers: An Introduction to Algorithmic Melody Generation
Computer Timekeeping
2-SAT
Rinocloud
The Current State of Virtual Reality
Meta-Programming
Constraint Programming
Maze Generation Algorithms
Network Coding: An introduction to network coding and random linear codes
Iterative Development: the Lowest Common Ancestor Problem
Deep Learning with the Analytical Engine
Lenstra's elliptic curve factorization method
Arduino and Genuino Hardware Programming
AI in Board Games 2: The Settlers of Catan
Deep Learning in Practice
Whimsical Networking: the Past, the Present, and the FutureLast session of term
Fault tolerant systemsLast session of term
Safe modern C++Room changed: club room
Randomised computationRoom changed: club room
Sonic Pi: Keeping the Rhythm
The Colossus computer and code breaking in WW2
Deep Learning (II) -- A comprehensive survey
Algorithmic Musical Composition in the Style of J. S. Bach
How Sharding is Accomplished in MongoDB
Tracking the Hand using Computer Vision
Where did that come from? An introduction to Sound LocalisationRoom changed: Jock Colville Hall
Distributed hash tablesRoom changed: Jock Colville Hall
Deep LearningRoom changed: club room
Zero Knowledge ProtocolsRoom changed: club room
Pass Go and collect $200: how slot machines are advancing the state of the art in computer go AI
Balls into Bins: A Sequential Resource Allocation Problem
A Look into the Fascinating World of Matrix Computations
A Talk on Paradoxes
On the pitfalls and traps of programming languages
An Introduction to Wireless Sensor Systems
Game theory: What really happens
Designing Socially Aware Robots
A Primer in Machine Learning
Reversible computing
Bitcoin: How to design a peer-to-peer currency
Local Search and the General Assignment Problem
Molecular programming – moving from electronic computation to molecular systems
Methods for Lossless Data Compression
Exploring the Static Semantics of the Standard ML Core Language
Uncovering the Secrets of Rumor Spreading
Turing Tar-PitsLast session of term
A History of Lambda CalculusLast session of term
An Introduction to Analogue ComputingRoom changed to the Jock Colville Hall
Coupling of Markov Chains
The Linux Networking Stack
"Programming" Problems
IPv6
Adaptive Filters
Solving games - the what, how and why.
In Search of the Perfect Voting System
Consensus in distributed systems
The structure and dynamics of networks
The Impartial Game of Nim and the Sprague Grundy Theorem
Curry-Howard Correspondence: Dependent Types and First Order Intuitionistic Logic
An Introduction to Computerised Tomographic Imaging
How to make Auto-tune? Harmonic Audio Pitch Detection and CorrectionLast talk of term
Feature Extraction Method of Eye Detection / HOWTO: Sleep Detection
Evolutionary ComputationRoom changed
Cooperative Pathfinding - from A Star to the field
How to cook an undigestable program with lots of LOLZ? [Esoteric programming languages]
Mobile ad-hoc networksRoom changed
When will We See Princess Leia?Room changed
Security in Computer EntertainmentRoom changed
Data compression techniques in theory and practiceDate and room changed
Unmanned Helicopter Flight: Learning for Control from Multiple Demonstrations
Big NumbersRoom changed
An Introduction to BioinformaticsRoom changed
Electronic WarfareRoom changed & Note unusual time
Demystifying the Cloud: A Survey of Cloud Computing
Solution by Evolution: an Introduction to Genetic Programming
MapReduce: Processing Big DataRoom changed
Motion Commotion: Using Hidden Markov Models in Gesture RecognitionRoom changed
Operating System InternalsRoom changed
N-gramsRoom changed
Introduction to AI in First Person Shooter games
Lighting Effects in Real Time RenderingRoom changed
Optical Mark Recognition using commodity hardwareRoom changed
Rhythmic Analysis of Musical RecordingsRoom changed
Commercial developments in Computer Architecture
Cloud Computing - Back to the Mainframe?
Google products you might not know aboutRoom changed
Computer VisionRoom changed
How (in)secure is it to surf the internet with your browser?Room changed
Ruby on Rails and Test-Driven Development
The Consequences of Open Source Licensing
Please see above for contact details for this list. |
Other listsFaculty of Education Research Students' Association (FERSA) Lunchtime Seminars 2014-2015 Type the title of a new list hereOther talks“Modulating Tregs in Cancer and Autoimmunity” Develop a tool for inferring symptoms from prescriptions histories for cancer patients Number, probability and community: the Duckworth-Lewis-Stern data model, Monte Carlo simulations and counterfactual futures in cricket Reading and Panel Discussion with Emilia Smechowski Feeding your genes: The impact of nitrogen availability on gene and genome sequence evolution A compositional approach to scalable statistical modelling and computation Statistical Methods in Pre- and Clinical Drug Development: Tumour Growth-Inhibition Model Example Market Socialism and Community Rating in Health Insurance Stereodivergent Catalysis, Strategies and Tactics Towards Secondary Metabolites as enabling tools for the Study of Natural Products Biology A new proposal for the mechanism of protein translocation Louisiana Creole - a creole at the periphery |