• ECE 290 Seminar: Fundamental Nanopower Analog Circuits

    Presenter: Joey Sankman, Analog/Power Designer, Analog Devices Description: With the rising interest in edge computing, and the addition of AI/ML functionality, nanopower circuits are in great demand to reduce the quiescent power consumption of remote sensors. In this tutorial, fundamental building blocks for nanopower circuits will be covered, including startup-less low-voltage references, low-frequency clocks, and […]

  • AM Seminar: Linear Stochastic Emulators of the Ocean Circulation based on Balanced Truncation: A Caution, perhaps, for Machine Learning?

    Jack Baskin Engineering, 372

    Presenter: Professor Andy Moore, UCSC Ocean Sciences Description: Linear inverse models have enjoyed considerable popularity in the geosciences, particularly in the arena of climate research and climate prediction, for several decades as a straightforward approach to dimension reduction and streamlining computational efficiency. The most common approach is to truncate the system by retaining the leading […]

  • When Less is More: Applications of Type-Based Underapproximate Reasoning

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA

    Presenter: Suresh Jagganathan, Purdue University Abstract: Unlike program verifiers, symbolic execution and property-based testing tools underapproximate program behavior: they aim to report only real bugs (no false positives), at the cost of potentially missing some (false negatives). Recent work has sought to place such tools on a more formal footing, primarily through the development of incorrectness […]

    Free
  • CSE Colloquium: Making Systems Secure with Information Flow

    Engineering 2 Engineering 2 1156 High Street, Santa Cruz, CA

    Presenter: Andrew Myers, Cornell University Abstract: Modern civilization depends on complex, interconnected software systems that must safeguard trustworthy or private data. We have ever-growing mountains of code yet lack principled ways to build large systems that are secure. What is missing is a way to securely build these systems compositionally: module by module and layer […]

    Free
Last modified: Nov 17, 2025