• Littschwager, N. (CSE) – A Proposal for Characterizing Replicated Systems and Emulators

    Hybrid Event

    Simulation is a coinductive proof technique to assert the behavioral equivalence of computing systems that has seen fruitful application in distributed systems, concurrent process calculi, and programming languages, since the 1970’s. We have also utilized simulation in our prior work, where we formalized and proved a folklore claim that the state-based and operation-based approaches to […]

  • DeGrendele, C. (AM) – Learning-Augmented and Structure-Preserving Methods for Conservation Law Solvers

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA
    Hybrid Event

    In this work, we develop numerical methods for conservation laws that explore statistical, structure-preserving, and machine-learning-based approaches, each built on top of traditional numerical solvers. First, we develop a general Gaussian-process-based “recipe’’ for constructing high-order linear operators such as interpolation, reconstruction, and derivative approximations. Building on this recipe, we derive a kernel-agnostic convergence theory for […]

  • Garg, S. (CSE) – MAPPING ANNOTATIONS FROM NETLIST TO SOURCE CODE

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA
    Hybrid Event

    Hardware design flows have become increasingly complex as modern chips integrate billions of transistors and rely on aggressive synthesis optimizations to meet performance, area, and power targets. While these transformations improve circuit efficiency, they also erase the correspondence between gate-level netlists and their originating HDL source lines. The loss of traceability makes post-synthesis debugging, timing […]

  • Jamilan, S. (CSE) – Profile-guided Compiler Optimizations for Data Center Workloads

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA
    Hybrid Event

    Modern applications, such as data center workloads, have become increasingly complex. These applications primarily operate on massive datasets, which involve large memory footprints, irregular access patterns, and complex control and data flows. The processor-memory speed gap, combined with these complexities, can lead to unexpected performance inefficiencies in these applications, preventing them from achieving optimal performance. […]

  • de Priester, J. (ECE) – Hybrid Reinforcement Learning

    Jack Baskin Engineering Baskin Engineering 1156 High Street, Santa Cruz, CA
    Hybrid Event

    Reinforcement Learning (RL) is a machine learning paradigm that trains a decision maker, or policy, by learning from interaction with an environment. The power of RL lies in its ability to learn complex strategies without explicit human instruction, which can lead to better solutions that human designers overlook in domains ranging from robotics to scientific […]

  • Ferdous, N. (CSE) – SPECSIM : A Simulation Infrastructure Mitigating Transient Timing Attacks

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA
    Hybrid Event

       Transient execution attacks are serious security threats in modern-day processors. Out-of-order execution compels the processor to access data that should not be otherwise perceived. Leakage of that secret information creates a covert channel for the attacker for various types of transient and speculative attacks. Transient based execution attacks emanate when the secret information is leaked […]

  • Wang, Y. (CSE) – Toward Practical and Effective Large Language Model Unlearning

    Virtual Event

    The growing integration of Large Language Models (LLMs) into real-world applications has heightened concerns about their trustworthiness, as models may reveal private information, reproduce copyrighted content, propagate biases, or generate harmful instructions. These risks, alongside emerging privacy regulations, motivate the need for LLM unlearning, methods that remove the influence of specific data while preserving overall […]

  • Zhu, R. (ECE) – From Neuromorphic Principles to Efficient Neural Language Architectures

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA
    Hybrid Event

    While Large Language Models exhibit remarkable capabilities, their reliance on the standard Transformer architecture imposes prohibitive computational costs and quadratic memory complexity. To bridge the gap between biological efficiency and high-performance AI, we have established foundational work in linearizing attention and maximizing hardware utilization through architectures such as RWKV and MatMul-Free networks. Addressing the remaining […]

  • Singh, A. (ECE) – Quantum Key Distribution Using Entangled Pairs with Random Grouping

    Jack Baskin Engineering Baskin Engineering 1156 High Street, Santa Cruz, CA
    Hybrid Event

    Quantum Key Distribution (QKD) provides information-theoretic security for cryptographic key establishment, but existing protocols exhibit limited noise tolerance, restricting their applicability in practical quantum channels with finite resources. This work introduces a QKD protocol based on entanglement swapping that significantly enhances error tolerance and key generation rates. The protocol encodes six-bit classical symbols into six-qubit […]

  • Tran, L. (BMEB) – Polysome Shadowing: A Long-Read Sequencing Approach to Study Translation

    Biomedical Sciences Building 575 McLaughlin Drive

    Translation is a central and highly regulated step of gene expression, yet there are few quantitative, high-throughput tools to study translation. Existing methods such as sucrose gradients provide only bulk ribosome counts, while Ribo-Seq offers positional information in the genome but destroys long-range structure and transcript expression information. Because of these limitations, many fundamental questions […]

  • Chambers, K. (BMEB) – Using Genomics and Artificial Intelligence to improve prognosis for osteosarcoma patients

    Virtual Event

    Transcriptomic profiling has been transformative in pediatric oncology. Pediatric cancers arise from disrupted developmental programs. Their impaired transcriptional states reflect cell lineage infidelity, aberrant differentiation, and immune-microenvironment interactions distinct from those of adult tumors(Gröbner et al., 2018; X. Ma et al., 2018). Within the osteosarcoma (OS) landscape, despite being the most common bone tumor of […]

  • Laffan, N. (CM) – Digital Memory Tools and Their Impact On Collective Remembering

    Virtual Event

    Today, both individual and collective memories are increasingly mediated by digital platforms. Both are fundamentally enmeshed in platform ecosystems that orient around commercial imperatives very much at odds with community cohesion. The digital archive where our mediated memories are stored does not merely store information but actively inscribes it, often privileging narratives aligned with commercial […]

  • HSI Equity Talk

    Title: Understanding the advising praxes central to student success at a four-year Hispanic-Serving Research Institution Presenter: Dr. Lydia Iyeczohua Zendejas Location: Via Zoom (link provided via RSVP) Abstract: Higher education scholars increasingly recognize academic advising as a critical strategy for supporting the persistence of systemically marginalized students. Since the 1990s, UC Santa Cruz has undergone […]

  • Centering the Experiences of Undocumented Transfer Students at HSIs: A Brown Bag Presentation by Valeria Alonso Blanco

    Huerta Center Conference Room (Casa Latina) 641 Merrill Rd, Santa Cruz,, CA

      The Huerta Center is proud to present a brown bag presentation by Graduate Student Research Awardee Valeria Alonso Blanco. She will present on a qualitative study that explores how undocumented Latinx transfer students navigate institutional support, belonging, and barriers at a four-year Hispanic Serving Institution (HSI). Findings reveal gaps between institutional commitments and student […]

  • Fredrickson, K. (CSE) – Practical Anonymity with Formal Resistance to Traffic Analysis

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA
    Hybrid Event

    Anonymous communication systems hide who is talking to whom, not just what is said. However, existing systems are either vulnerable to traffic analysis attacks–attacks where adversaries observe and correlate the network traffic of users–or are forced to rely on unrealistic and unenforceable assumptions about how users behave. Worse, existing theory lacks tools to rigorously model […]