Potential Speakers (to be confirmed)
School of Art and Design
- Prof. Hilary Robinson
- Prof. Suzanne Buchan – Curating Animated Wonderworlds at the Museum for Design Zurich
A brief illustrated talk on thematics and the curatorial process of selecting 35 animated works from mostly digital R&D, popular, scientific animation, apps and data visualisations.
- Jonathan Hodgson
- Helen Bendon
- Aleksandar Zivanovic
- Nic Sandiland
- Magnus Moar
School of Science and Technology
- Prof. Martin Looms – Into the Frame
This is a mixed-media art installation that combined haptics, sound and visuals into the exerience of an artstic work, and also makes visible the tech that is going on behind the scenes.
- Prof. William Wong
- Prof. Chris Huyck
- Prof Sue Tapsell – Managing flood risk and related issues – an overview of the work at Flood Hazard Research Centre (Natural Sciences Dept.)
- Dr. Kai Xu – Making Sense of Data through Visual Analytics
- Dr Gill Whitney – Innovation in interface design supported by the use of accessibility and usability standards
- Dr Susan Hansen – Communities’ complex affective identifications and dis-identifications with street art and graffiti
In particular the removal of street art from community walls for private auction as a morally problematic yet legal action that provokes forms of aesthetic protest. I use longitudinal photo documentation (i.e., I photograph the same walls over time) to examine street art and graffiti as ephemeral dialogue.
- Dr Jaap Boender – Introduction to interactive theorem proving and program verification
- A Ian Kruger – Tableau dashboards as knowledge visualisations
Work in organisations is cognitively distributed, this means that an organisation is composed of multiple areas of knowledge expertise and specialist practices and tools that still have to be coordinated. Dashboards are an increasingly popular means of making sense of data and using it to inform decision making, but I am looking at how Tableau is being used as an artefact in the creation and sharing of knowledge throughout the university, the way in which its use has defused throughout the organisation is itself very interesting. My research question relates to how data is made useful to business users, turns out it is very much a social process, the idea of a lone analyst creating something and then communicating this seems to be a myth, they seem very tightly co-created.
Dr. Kary Myers, Statistical Sciences Group, Los Alamos National Laboratory
(Please note this is not the usual IDC seminar time, and the location is to be confirmed)
As computer simulations continue to grow in size and complexity, they present a challenging example of big data. Simulation output may exceed both the storage capacity and the available bandwidth for transfer to storage. In this talk I’ll describe an in situ approach — i.e., one that embeds calculations in the simulation itself — for efficiently approximating a complex simulation using piecewise linear fitting. This significantly reduces the data transfer and storage requirements while facilitating post processing and reconstruction of the simulation. I’ll illustrate the method with a massively parallel radiation-hydrodynamics simulation performed by Korycansky et al. (2009) to support NASA’s 2009 Lunar Crater Observation and Sensing Satellite mission.
About the Speaker:
Since 2006 Kary Myers has been a scientist in the Statistical Sciences group at Los Alamos National Laboratory. She earned her PhD from Carnegie Mellon’s Statistics Department and her MS from their Machine Learning Department. At Los Alamos she’s been involved with projects examining electromagnetic measurements, large scale computer simulations, and chemical spectra from the Mars Science Laboratory. She serves as an associate editor for the Annals of Applied Statistics and the Journal of Quantitative Analysis in Sports.
Dr Shujun Li
Observer-resistant password systems (ORPSs, also known as human authentication against observers or leakage-resilient password systems)have been studied since the early 1990s in both cryptography and computer security contexts, but until today a both secure and usable ORPS remains an open question to the research community. The concept of ORPS can be used to cover a large family of attacks against password-based human authentication systems such as shoulder surfers, hidden cameras, man-in-the-middle, keyloggers and other malware. A key assumption of ORPS is that human users must respond to authentication challenges without using any computational devices (which are considered untrusted). In other words, the threat model behind ORPSs assumes that other than the human user’s brain, nothing is trusted. The main security requirement is to avoid disclosure of the shared secret between the human user and the verifier (i.e., password) even after a practically large number of authentication sessions observed by untrusted parties.