October 1st, 2014
Thinking about pursuing a CS job, winter term, or internship in the future?
Join us Tuesday, Oct 7 from 12:15-1:15pm in King 337 to meet with CS faculty and Richard Berman from Oberlin’s Career Center to talk about:
- Strategies for finding positions
- What industries employ computer scientists
- CS-related jobs that aren’t just software engineering
- Reaching out to CS alumni
- Deciding between grad school vs. industry
- When to start looking for jobs
- How the faculty and staff at Oberlin can help you
RSVP by Monday with Jackie in King 223 and sign up for pizza!
More jobs than students in CS
April 9th, 2014
Join us on Friday, April 9 for a 12-1pm talk by Beenish Chaudhry entitled: “Putting Healthcare in Your Hands” in King 235.
Abstract: Our healthcare system is undergoing a seismic shift that is breaking the old information asymmetry – where doctors had all the information and patients had very little – now technology is being used to collect data to give patients an easy way to access key facts and gain knowledge for decisions about health. While we know how to target this information for the affluent and their lifestyles, what are we doing for those with low socioeconomic background? In this talk, you will learn about technology design challenges and solutions for this population, and what needs to be done in the future.
February 11th, 2014
Join professors Kate Jones-Smith (physics & astronomy), Chelsea Martinez (chemistry), Cynthia Taylor (computer science), and Leslie Kwakye (neuroscience) for a panel discussion on their careers in the sciences.
We invite scientists and non-scientists alike to attend and participate in what we hope will be an interesting, informative, and fun event.
When: Tuesday, February 11 at 4:45pm to 6:00pm
Where: Norman C. Craig Lecture Hall, Science Center
The session is part of the Roots & STEM events series exploring the human makeup of science, technology, engineering, and mathematics.
January 29th, 2014
Mark Allman, International Computer Science Institute will give a talk. The Domain Name System (DNS) is a crucial piece of the Internet’s fabric, charged with mapping human-friendly names into network addresses. This talk highlights several recent projects that aim to explore and understand how the modern DNS ecosystem has organically developed. We will first tackle the complexity of the system and then illustrate how that complexity causes potential security vulnerabilities. Finally, we will briefly sketch several possible mitigations to these security issues– which is the subject of ongoing work.
FEB. 11, 12:20 p.m. King 239 Refreshments will be served.
November 26th, 2013
Peter F. and Dan B. will be hosting Python Night on Tuesday, December 3rd at 7pm.
Come an learn new tricks for programming in Python including:
- list comprehensions
- higher-order functions (+ map, filter, reduce)
- sets and other useful data structures
- with statements/context managers
- the power of the python syntax
Now with Pizza! RSVP via the form sent out by CSMC. See you there!
November 12th, 2013
On Thursday, November 14 there will be a talk by Dr. Matt Kretchmar of Denison University entitled Automated Identification of Text Message Authors: Was that really you who sent that text message?
Reception with light refreshments at 4:00pm in King 225, talk to follow at 4:30pm in King 239
Abstract: This talk is about the application of machine learning techniques to the problem of classifying authors of text messages. We use kernel-based support vector machines to build an automated classifier that uses statistical idiosyncrasies to distinguish one sender from others.
The talk is aimed at general undergraduate students in both mathematics and computer science.
October 30th, 2013
Wednesday, November 6 NOON King 237
Thomas G. Dietterich of Oregon State University will present:
Opportunities for Machine Learning in Ecological Science and Ecosystem Management
How can computer science address the many challenges of managing the
earth's ecosystems sustainably? Viewed as a control problem, ecosystem
management is challenging for two reasons. First, we lack good models
of the function and structure of the earth's ecosystems.
Second, it is difficult to compute optimal management policies because ecosystems
exhibit complex spatio-temporal interactions at multiple scales.
This talk will discuss some of the many challenges and opportunities
for machine learning research in computational sustainability. These
include sensor placement, data interpretation, model fitting,
computing robust optimal policies, and finally executing those
policies successfully. I'll provide examples from current work
and discuss open problems in each of these areas.
All of these sustainability problems involve spatial modeling and
optimization, and all of them can be usefully conceived in terms of
facilitating or preventing flows along edges in spatial networks. For
example, encouraging the recovery of endangered species involves
creating a network of suitable habitat and encouraging spread along
the edges of the network. Conversely, preventing the spread of
diseases, invasive species, and pollutants involves preventing flow
along edges of networks. Addressing these problems will require
advances in several areas of machine learning and optimization.
October 28th, 2013
Information Session for CSCI Majors Thursday, Oct. 31
12:15-1:15 King 327 Food and Drinks Provided
Have your questions answered by Staff and Faculty FROM AIT.
For more information about the program visit www.ait-budapest.com
September 30th, 2013
Monday Oct 7 Noon King 239
Disabling the MacBook Webcam Indicator LED
Disabling the MacBook Webcam Indicator LED Modern computers contain a surprising number of processors distinct from the CPUs, each dedicated to a specific task. These processors along with their perhipherals form embedded systems inside standard desktop and laptop systems which are frequently overlooked when evaluating the security of computer systems. In this talk, I’ll describe a security analysis of one such embeddedsystem: the Apple iSight webcam. The iSight contains, as a privacy feature, an indicator LED which provides a visual cue that the camera is turned on. I’ll describe how the hardware that controls the LED can be bypassed, enabling video to be captured without any indication to the user. I’ll also show how the iSight can be leveraged by malware to break out of a Virtual Machine sandbox.
Stephen Checkoway, is an Assistant Research Professor in the Johns
Hopkins University Department of Computer Science and a member of the
Johns Hopkins University Information Security Institute where he
teaches courses on computer security and software vulnerabilities. His
work includes security analyses of automotive emedded systems and
computer voting systems as well as offensive and defensive computer
security research. Checkoway earned bachelor’s degrees in mathematics
and computer sciences from the University of Washington in 2005 and a
Ph.D. in computer science in 2012 from the University of California,
RSVP in the CSCI office King 223 for Pizza lunch
September 24th, 2013
Monday NOVEMBER 4 Noon-1:00 p.m. King 325
RSVP Required. Sign up in the CSCI office King 223 for Pizza lunch.
- Strategies for finding WT internships, summer jobs, and permanent jobs
- What industries employe computer scientists
- CS-related jobs that aren’t just software engineering
- reaching out to CS alumni
- deciding grad school vs. industry
- How faculty/staff @Oberlin can assist you