Academic Awards Presented to Stellar Undergraduate Students
On December 9th, forty three seniors were recognized for their superior academic performance in Computer Science & Engineering, Computer Science, and Computer Engineering. The special event was . . .
read more | January 12, 2016
CT Skills Challenge Programming Contest
The Connecticut Skills Challenge connects talented, tech savvy students to Connecticut’s hottest technology companies. UConn Students, Please register on this page AND at the CT Technology Council s. . .
read more | November 17, 2015
Dr. Michel Elected President of the ACP
We are happy to announce that Professor Laurent Michel was elected as the President of the Association for Constraint Programming for a three year term starting in 2015. Election results can be viewed. . .
read more | November 16, 2015
Dr. Ammar named as Chairman of EMC Project Competition
Professor Reda Ammar has been selected as the chairman of the steering committee for the EMC Project Competition, a part of the EMC Academic Alliance in the Middle East and Africa for 2015-2016. The o. . .
read more | October 21, 2015
|More Department News|
|January 31, 2016||February 1, 2016||February 2, 2016||
February 3, 2016
CSE Colloquium: Ben Fuller
3:00 pm - 4:00 pm
Strong Key Derivation from Noisy Sources Abstract: A shared cryptographic key enables strong authentication. Biometrics are one candidate source for creating such a shared key. However, biometrics come with a substantial problem: noise in repeated readings. A fuzzy extractor produces a stable key from a noisy source of entropy. The iris is believed…
February 4, 2016
CSE Colloquium: Or Sheffet
1:00 pm - 2:00 pm
When Existing Techniques Preserve Differential Privacy Speaker: Or Sheffet, Harvard University Abstract: It is no secret that online companies, hospitals, credit-card companies and governments hold massive datasets composed of our personal and private details. Information from such datasets is often released using some privacy preserving heuristics, which have been repeatedly shown to fail. That is…
February 5, 2016
CSE Colloquium: Phillip G. Bradford
11:00 am - 12:00 pm
Path Problems applied to Computer Security and Cryptography Abstract: Labeled paths in directed graphs have many applications. The graph edges are labeled with terminals of context free grammars. This talk presents some new results for labeled paths in digraphs with balanced parenthesis grammars. The focus is on using a basic variation of Nykanan and Ukkonen's…
|February 6, 2016|
|February 7, 2016||February 8, 2016||February 9, 2016||February 10, 2016||February 11, 2016||February 12, 2016||February 13, 2016|
|February 14, 2016||February 15, 2016||February 16, 2016||February 17, 2016||February 18, 2016||February 19, 2016||February 20, 2016|
|February 21, 2016||February 22, 2016||February 23, 2016||February 24, 2016||February 25, 2016||February 26, 2016||February 27, 2016|
|February 28, 2016||February 29, 2016||March 1, 2016||March 2, 2016||March 3, 2016||March 4, 2016||March 5, 2016|
Professor Wang Elected To Journal Editorial Board
Dr. Fei Wang was appointed as an Action Editor to the Editorial Board of The Journal of Data Mining and Knowledge Discovery based on his extensive knowledge and research accomplishments in the field of Data Mining