Available Distinguised Visitor Program Speakers by Topic

IEEE chapters interested in the speakers below should refer to the general guidelines for the DVP.

.

Topic Speaker Presentation
Artificial Intelligence Enrique Vinicio Carrera Machine Learning Techniques for Radar Target Detection
Enrique Vinicio Carrera Signal Processing for Machine Learning
Amlan Chakrabarti Machine Learning for IoT Analytics
Carlos Henrique Cabral Duarte Rigorous Development of Distributed Systems
Anne C. Elster Parallel Computing and AI: Impact and Opportunities
Anne C. Elster AI for HPC: Experiences and Opportunities
Tarek El Ghazawi Exascale and the Convergence of HPC, Big Data, AI and IoT
Andre Leon Sampaio Gradvohl The Convergence between Computing and Astronomy: The Case of the Space Weather Forecasting
Shaoshan Liu Enabling Computer-vision-based Autonomous Driving with Affordable and Reliable sensors
Nancy Mead Threat Modeling Research and Machine Learning
Dejan Milojicic Generalize or Die: System Software for Memristor-based Accelerators for Deep Learning
Dejan Milojicic Applying AI/ML to cybersecurity
Elvira Popescu Learning analytics – a multiple perspectives analysis of student data
M. Sohel Rahman Prediction based on biological sequences (where Machine Learning meets Life Sciences)
P.A. Subrahmanyam Machine Learning & Analytics: Applications in FinTech & Security
Madhusudan Singh Transformation of Physical Era: Cyber Physical System
Bernard P. Zeigler How Abstraction, Formalization and Implementation Drive the Future of Modeling and Simulation
.
Computing History David Alan Grier The Generations of Computing and the Coming Data Age
David Alan Grier Anarchist with a Pintrest Account (also entitled “The Digital YMCA”)
David Alan Grier Human Computers, Crowdworkers, and the ever presence of the gig economy
 
Software Engineering CRS Kumar Introduction to IEEE SWEBOK
CRS Kumar Software Fault Tolerance
Eldon Caldwell Caldwell-t Algorithm Validation: Alternative proposal to the solution of Gupta for the sequencing of activities in processes of slender development of software with Critical Chain approach
Eldon Caldwell Designing a Cyber-physical Robotic Platform for a Speech-Language Therapy
 
Late and Post-Moore’s Law Computing Tarek El Ghazawi Rebooting Computing—The Search for Post-Moore’s Law Breakthroughs
Dejan Milojicic Memory-Driven Computing
.
E-Health Katarzyna Wac Biosensors for Telemonitoring of the Patients
Katarzyna Wac Star Trek’s tricorder: science fiction or future science?
Katarzyna Wac From Quantified Self to Quality of Life
.
Security And Privacy Swarup Bhunia Security of the Internet of Things: Are We Paranoid Enough?
Swarup Bhunia Innovations in IoT for a Safe, Secure, and Sustainable Future
Amlan Chakrabarti Task Scheduling and Hardware Design in Reconfigurable Space
Amlan Chakrabarti Quantum Computing- Harnessing Power of Atomic States for Accelerated and Secure Computing
 Carlos Henrique Cabral Duarte Rigorous Development of Distributed Systems
Andre Leon Sampaio Gradvohl Security Aspects in the Internet of Things and Wearable Computing
Dharm Singh Jat Modified AES Algorithm for Strong Encryption & Enhanced Security
 CRS Kumar Ransomware: Emerging Threats to Cyber Security
Shaoshan Liu Edge Computing for Autonomous Driving: Opportunities and Challenges
Bruce McMillin Cyber-Physical Security through Information Flow
Bruce McMillin Secure Fog Computing for Smart Living
Nancy Mead Threat Modeling Research and Machine Learning
Nancy Mead Using Malware Analysis to Identify Overlooked Security Requirements (MORE)
Nancy Mead Lessons Learned from an Industry/Government/Academic Collaboration in Educating Secure Software Developers
Dejan Milojicic Applying AI/ML to cybersecurity
Cyril Onwubiko Functional Requirements of Situational Awareness in Computer Network Security
Cyril Onwubiko A Security Audit Framework for Security Management in the Enterprise
Cyril Onwubiko Cyber Onboarding is ‘Broken’
Anirban Sengupta Anti-Piracy Aware IP Chipset Design for Integrated Circuits
Anirban Sengupta Protection of IP-Core Designs for Integrated Circuits
Anirban Sengupta Hardware Security of Integrated Circuits: Threat Models and Defense against IP Trojans and IP Piracy
Madhusudan Singh Blockchain for Secure Intelligent Environments
Madhusudan Singh Cyber Security for Symbiotic Vehicular Networks
Madhusudan Singh Transformation of Physical Era: Cyber Physical System
P.A. Subrahmanyam Machine Learning & Analytics: Applications in FinTech & Security
Anand Tripathi Scalable Consensus Protocols and System Architectures for Blockchain Services
Sherali Zeadally Cybersecurity Challenges and Future Research Opportunities
Sherali Zeadally Privacy in Cyberspace
Cloud Computing Mohamed Rawidean Mohd Kassim Applications of WSN in Agricultural Environment Monitoring Systems
Luis Felipe Herrera Quintero Embedded Computing towards the creation of services in the scope of Intelligent Transportation Systems
Luis Felipe Herrera Quintero Smart Cities from an ideal perspective to a real perspective, it is possible to implement it
Anand Tripathi Beehive: A Parallel Programming Framework for Graph Problems
.
Neural Networks Enrique Vinicio Carrera Machine Learning Techniques for Radar Target Detection
Leonel Sousa Modular Arithmetic-based Circuits and Systems for Emerging Technologies and Applications: Deep Neural Networks and Cryptography
.
Metaheuristics M. Sohel Rahman What Metaheuristics can do for you
.
Networks CRS Kumar Software Fault Tolerance
.
Image Processing Shaoshan Liu DragonFly+: An FPGA-based quad-camera visual SLAM system for autonomous vehicles
Shaoshan Liu Enabling Computer-vision-based Autonomous Driving with Affordable and Reliable sensors
.
Computer Architecture Amlan Chakrabarti Task Scheduling and Hardware Design in Reconfigurable Space
 Shaoshan Liu Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Applications on Heterogeneous Architectures
Anirban Sengupta Anti-Piracy Aware IP Chipset Design for Integrated Circuits
Madhusudan Singh Transformation of Physical Era: Cyber Physical System
.
Big Data Athman Bouguettaya From IoT Data to Services
Athman Bouguettaya Taming Big Data
Tarek El Ghazawi Exascale and the Convergence of HPC, Big Data, AI and IoT
Mohamed Rawidean Mohd Kassim Applications of WSN in Agricultural Environment Monitoring Systems
Andre Leon Sampaio Gradvohl Technologies, Research and Challenges for Distributed Systems for Data Stream Processing
.
Modeling, Simulation And Databases Zhi Jin Environment Modeling-based Requirements Engineering
Bernard Zeigler MBSE with/out Simulation: State of the Art and Way Forward
Bernard Zeigler Why Should We Develop Simulation Models in Pairs?
Bernard Zeigler How Abstraction, Formalization and Implementation Drive the Future of Modeling and Simulation
M. Sohel Rahman An agent-based model to examine the impact of Malaria vector control interventions
Leonel Sousa Modeling Performance and Energy-Efficiency of Multi-Cores: The Cache-Aware Roofline Approach and the Intel Advisor
.
Cryptography CRS Kumar https://www.computer.org/profiles/crs-kumar
Dharm Singh Jat Modified AES Algorithm for Strong Encryption & Enhanced Security
Madhusudan Singh Blockchain for Secure Intelligent Environments
Madhusudan Singh Cyber Security for Symbiotic Vehicular Networks
Leonel Sousa Modular Arithmetic-based Circuits and Systems for Emerging Technologies and Applications: Deep Neural Networks and Cryptography
.
Mathematical Foundations Of Computing Leonel Sousa Modular Arithmetic-based Circuits and Systems for Emerging Technologies and Applications: Deep Neural Networks and Cryptography
.
Internet of Things Athman Bouguettaya From IoT Data to Services
Amlan Chakrabarti Machine Learning for IoT Analytics
Tarek El Ghazawi Exascale and the Convergence of HPC, Big Data, AI and IoT
Andre Leon Sampaio Gradvohl  
Tulika Mitra Behind the Scenes of the Internet-of-Things Revolution
Leonel Sousa Microprocessors/ MCUs for Internet of Things
 
Visualization Cyril Onwubiko Functional Requirements of Situational Awareness in Computer Network Security
.
Machine Learning Enrique Vinicio Carrera Machine Learning Techniques for Radar Target Detection
Enrique Vinicio Carrera Signal Processing for Machine Learning
Amlan Chakrabarti Machine Learning for IoT Analytics
Amlan Chakrabarti Quantum Computing- Harnessing Power of Atomic States for Accelerated and Secure Computing
Anne C. Elster Parallel Computing and AI: Impact and Opportunities
Nancy Mead Threat Modeling Research and Machine Learning
Dejan Milojicic Applying AI/ML to cybersecurity
Elvira Popescu Learning analytics – a multiple perspectives analysis of student data
M. Sohel Rahman Prediction based on biological sequences (where Machine Learning meets Life Sciences)
P.A. Subrahmanyam Machine Learning & Analytics: Applications in FinTech & Security
 
Quantum Computing Amlan Chakrabarti Quantum Computing- Harnessing Power of Atomic States for Accelerated and Secure Computing
Chuck Easttom
Tarek El Ghazawi Rebooting Computing—The Search for Post-Moore’s Law Breakthroughs
.
Graduate School Bruce McMillin Why should I go to graduate school, and how do I do it?
.
Smart Cities Swarup Bhunia Security of the Internet of Things: Are We Paranoid Enough?
Dharm Singh Jat Smart Computing and Communication: Enabling future IoT
Mohamed Rawidean Mohd Kassim A 7-Level Smart Home System for the XY Generation
Bruce McMillin
Luis Felipe Herrera Quintero Smart Cities from an ideal perspective to a real perspective, it is possible to implement it
Sherali Zeadally Cybersecurity Challenges and Future Research Opportunities
   
Research Proposals Zhi Jin How to Figure out a Competitive Research Project Proposal
   
Parallel Computing Anne C. Elster Parallel Computing and AI: Impact and Opportunities
Swarup Bhunia Computing in Memory for Data-Intensive Kernels
.
Autonomous Driving  Shaoshan Liu Enabling Computer-vision-based Autonomous Driving with Affordable and Reliable sensors
 Shaoshan Liu DragonFly+: An FPGA-based quad-camera visual SLAM system for autonomous vehicles
 Shaoshan Liu Edge Computing for Autonomous Driving: Opportunities and Challenges
.
Deep Learning Enrique Vinicio Carrera Machine Learning Techniques for Radar Target Detection
Enrique Vinicio Carrera Signal Processing for Machine Learning
Tarek El Ghazawi Exascale and the Convergence of HPC, Big Data, AI and IoT
Andre Leon Sampaio Gradvohl The Convergence between Computing and Astronomy: The Case of the Space Weather Forecasting
 Shaoshan Liu Enabling Computer-vision-based Autonomous Driving with Affordable and Reliable sensors
Dejan Milojicic Generalize or Die: System Software for Memristor-based Accelerators for Deep Learning
 
Digital Transformation Carlos Henrique Cabral Duarte Digital Transformation
.
Software Systems Carlos Henrique Cabral Duarte Digital Transformation
Carlos Henrique Cabral Duarte The Influence of Regulatory Requirements on ICT Businesses
Zhi Jin Engineering Fine-grain Dependability Requirements
.
Algorithms Enrique Vinicio Carrera Nature-inspired Optimization Algorithms Applied to Control Systems
Eldon Caldwell Caldwell-t Algorithm Validation: Alternative proposal to the solution of Gupta for the sequencing of activities in processes of slender development of software with Critical Chain approach
Dharm Singh Jat Modified AES Algorithm for Strong Encryption & Enhanced Security
.
Embedded Computing Luis Felipe Herrera Quintero Embedded Computing towards the creation of services in the scope of Intelligent Transportation Systems
Luis Felipe Herrera Quintero Smart Cities from an ideal perspective to a real perspective, it is possible to implement it
Anne C. Elster Optimizing for Energy Efficiency and Performance: From Embedded Systems to Supercomputers
.
Blockchain Madhusudan Singh Blockchain for Secure Intelligent Environments
P.A. Subrahmanyam Private vs. Public Blockchains: Myth vs. Reality.
P.A. Subrahmanyam The need for a Quantitative Approach to Blockchain Infrastructure & Application design.
Anand Tripathi Scalable Consensus Protocols and System Architectures for Blockchain Services
..
Social Networks David Alan Grier Anarchist with a Pintrest Account (also entitled “The Digital YMCA”)
..
Wearables Katarzyna Wac From Quantified Self to Quality of Life
Andre Leon Sampaio Gradvohl Security Aspects in the Internet of Things and Wearable Computing
..
Social Learning Environments Elvira Popescu Learning analytics – a multiple perspectives analysis of student data
Elvira Popescu Peer assessment in technology-enhanced learning
Elvira Popescu Social learning environments – design solutions and trends
..
Robotics Eldon Caldwell Designing a Cyber-physical Robotic Platform for a Speech-Language Therapy
Carlos Henrique Cabral Duarte Rigorous Development of Distributed Systems
 Shaoshan Liu π-BA: Bundle Adjustment Acceleration on Embedded FPGAs with Co-Observation Optimization
 Shaoshan Liu Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Applications on Heterogeneous Architectures
..
Mobile Heterogeneous Computing Tulika Mitra Mobile Heterogeneous Computing: A Software Perspective
..
Multi-faceted Environments Zhi Jin Engineering Fine-grain Dependability Requirements
..
Fault-tolerant Computing Anand Tripathi Scalable Consensus Protocols and System Architectures for Blockchain Services
.
Gig Economy David Alan Grier Human Computers, Crowdworkers, and the ever presence of the gig economy
.
Personalized Analytics Katarzyna Wac Biosensors for Telemonitoring of the Patients
.
Learning Analytics Elvira Popescu Learning analytics – a multiple perspectives analysis of student data
.
Cyberphysical Technology Platforms Eldon Caldwell Designing a Cyber-physical Robotic Platform for a Speech-Language Therapy
.
Wireless Sensor Network Mohamed Rawidean Mohd Kassim Wireless Sensor Network in Precision Agriculture Application
Mohamed Rawidean Mohd Kassim Applications of WSN in Agricultural Environment Monitoring Systems
.
Technical Writing Athman Bouguettaya Workshop on Writing for (top) Computer Science Journals
.
Data Classification Carlos Henrique Cabral Duarte The Influence of Regulatory Requirements on ICT Businesses
.
Fault Tolerant Systems CRS Kumar Software Fault Tolerance
.
Network Security Amlan Chakrabarti Task Scheduling and Hardware Design in Reconfigurable Space
.
Convolution Leonel Sousa Modular Arithmetic-based Circuits and Systems for Emerging Technologies and Applications: Deep Neural Networks and Cryptography
.
High Performance Computing Anne C. Elster AI for HPC: Experiences and Opportunities
Tarek El Ghazawi Rebooting Computing—The Search for Post-Moore’s Law Breakthroughs
Tarek El Ghazawi Exascale and the Convergence of HPC, Big Data, AI and IoT
Tarek El Ghazawi Exploiting Hierarchical Locality for Productive Extreme Computing
Storage CRS Kumar Software Fault Tolerance

IEEE Computer Society and ACM Share Distinguished Speakers Programs

IEEE-Computer Society and ACM are sharing their invited speaker programs, to further the dissemination of technical knowledge of computing fields that greatly benefit both memberships. ACM chapter volunteers can host a speaker from IEEE Computer Society’s Distinguished Visitors Program (DVP), with access to top technology leaders and innovators from nearly every sector of the computing industry, by following the instructions on the DVP site. Make sure you identify yourself as an ACM Chapter.

ACM provides a popular offering of first-quality speakers serving its professional and student chapters. The Distinguished Speakers Program (DSP) owes its success to the many volunteers and staff members of the ACM who generously contribute their time and talent. Organizers of an Computer Society chapter, conference, or event can host a speaker from ACM’s DSP by following the instructions on the DSP site. Make sure you identify yourself as an ACM chapter or event.