Bruce McMillin (2018-2020)
Cyber-Physical Security through Information Flow
Secure Fog Computing for Smart Living
Why should I go to graduate school, and how do I do it?
Tarek El Ghazawi (2018-2020)
Rebooting Computing—The Search for Post-Moore’s Law Breakthroughs
Exascale and the Convergence of HPC, Big Data, AI and IoT
Exploiting Hierarchical Locality for Productive Extreme Computing
Anand Tripathi (2019-2021)
Scalable Consensus Protocols and System Architectures for Blockchain Services
Beehive: A Parallel Programming Framework for Graph Problems
Scalable Transaction Management in Key-Value Based Distributed Data Stores
Anne C. Elster (2019-2021)
Parallel Computing and AI: Impact and Opportunities
AI for HPC: Experiences and Opportunities
Optimizing for Energy Efficiency and Performance: From Embedded Systems to Supercomputers
Bernard P. Zeigler (2019-2021)
MBSE with/out Simulation: State of the Art and Way Forward
Why Should We Develop Simulation Models in Pairs?
How Abstraction, Formalization and Implementation Drive the Future of Modeling and Simulation
Shaoshan Liu (2019-2021)
Edge Computing for Autonomous Driving: Opportunities and Challenges
DragonFly+: An FPGA-based quad-camera visual SLAM system for autonomous vehicles
Enabling Computer-vision-based Autonomous Driving with Affordable and Reliable sensors
π-BA: Bundle Adjustment Acceleration on Embedded FPGAs with Co-Observation Optimization
Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Applications on Heterogeneous Architectures
Sherali Zeadally (2019-2021)
Cybersecurity Challenges and Future Research Opportunities
Privacy in Cyberspace
Dejan Milojicic (2020-2022)
Generalize or Die: System Software for Memristor-based Accelerators for Deep Learning
Chuck Easttom (2020-2022)
The impact of Emergence, Nonlinear Dynamics, and Chaos theory on engineering
Current Status of Quantum Computing
David Alan Grier (2020-2022)
The Generations of Computing and the Coming Data Age
Anarchist with a Pintrest Account (also entitled “The Digital YMCA”)
Human Computers, Crowdworkers, and the ever presence of the gig economy
Swarup Bhunia (2020-2022)
Security of the Internet of Things: Are We Paranoid Enough?
Innovations in IoT for a Safe, Secure, and Sustainable Future
Computing in Memory for Data-Intensive Kernels
Nancy Mead (2020-2022)
Threat Modeling Research and Machine Learning
Using Malware Analysis to Identify Overlooked Security Requirements (MORE)
Lessons Learned from an Industry/Government/Academic Collaboration in Educating Secure Software Developers
P.A. Subrahmanyam (2020-2022)
Decentralized (Self-Sovereign) Identities & the Trillion Dollar market: Why the Buzz?
Private vs. Public Blockchains: Myths vs. Reality.
The need for a Quantitative Approach to Blockchain Infrastructure & Application design.
Machine Learning & Analytics: Applications in FinTech & Security
IEEE Computer Society and ACM Share Distinguished Speakers Programs
IEEE-Computer Society and ACM are sharing their invited speaker programs, to further the dissemination of technical knowledge of computing fields that greatly benefit both memberships. ACM chapter volunteers can host a speaker from IEEE Computer Society’s Distinguished Visitors Program (DVP), with access to top technology leaders and innovators from nearly every sector of the computing industry, by following the instructions on the DVP site. Make sure you identify yourself as an ACM Chapter.
ACM provides a popular offering of first-quality speakers serving its professional and student chapters. The Distinguished Speakers Program (DSP) owes its success to the many volunteers and staff members of the ACM who generously contribute their time and talent. Organizers of an Computer Society chapter, conference, or event can host a speaker from ACM’s DSP by following the instructions on the DSP site. Make sure you identify yourself as an ACM chapter or event.