Audience: General Public
-

Data Science and Analytics Info Session
Data analysts are in high demand Even as hiring slows in certain tech sectors, organizations across industries are actively seeking professionals with data expertise. The ability to extract insights from […]
-

AI Business Practices Info Session
Transform your workplace with practical AI skills. In an era of rapid digital change, non‑technical professionals need to know how to deploy AI tools and strategies efficiently—without needing to code. […]
-

Wang, Y. (CSE) – Toward Practical and Effective Large Language Model Unlearning
The growing integration of Large Language Models (LLMs) into real-world applications has heightened concerns about their trustworthiness, as models may reveal private information, reproduce copyrighted content, propagate biases, or generate […]
-

Jamilan, S. (CSE) – Profile-guided Compiler Optimizations for Data Center Workloads
Modern applications, such as data center workloads, have become increasingly complex. These applications primarily operate on massive datasets, which involve large memory footprints, irregular access patterns, and complex control and […]
-

Singh, A. (ECE) – Quantum Key Distribution Using Entangled Pairs with Random Grouping
Quantum Key Distribution (QKD) provides information-theoretic security for cryptographic key establishment, but existing protocols exhibit limited noise tolerance, restricting their applicability in practical quantum channels with finite resources. This work […]
-

Garg, S. (CSE) – MAPPING ANNOTATIONS FROM NETLIST TO SOURCE CODE
Hardware design flows have become increasingly complex as modern chips integrate billions of transistors and rely on aggressive synthesis optimizations to meet performance, area, and power targets. While these transformations […]
-

Ferdous, N. (CSE) – SPECSIM : A Simulation Infrastructure Mitigating Transient Timing Attacks
Transient execution attacks are serious security threats in modern-day processors. Out-of-order execution compels the processor to access data that should not be otherwise perceived. Leakage of that secret information creates […]
-

Laffan, N. (CM) – Digital Memory Tools and Their Impact On Collective Remembering
Today, both individual and collective memories are increasingly mediated by digital platforms. Both are fundamentally enmeshed in platform ecosystems that orient around commercial imperatives very much at odds with community […]
-

Zhu, R. (ECE) – From Neuromorphic Principles to Efficient Neural Language Architectures
While Large Language Models exhibit remarkable capabilities, their reliance on the standard Transformer architecture imposes prohibitive computational costs and quadratic memory complexity. To bridge the gap between biological efficiency and […]
-

de Priester, J. (ECE) – Hybrid Reinforcement Learning
Reinforcement Learning (RL) is a machine learning paradigm that trains a decision maker, or policy, by learning from interaction with an environment. The power of RL lies in its ability […]