Educational technologies are becoming increasingly prevalent in a variety of settings. Designing educational technologies is a challenging interdisciplinary process because they need to function in real educational settings in which a number of instructional goals interact. In this talk, I will present a principle-based methodology to ground the design of educational technologies in the instructional requirements of the specific educational setting.
Bay Area alumni of the UW-Madison Dept. of Computer Sciences have been invited to a special reception at Microsoft. There will be camaraderie, networking and talks by emeritus professor Charles Fischer and alumnus Abhinav Gupta of Rocket Fuel. Refreshments will be served. Co-hosted by the CS department, its Board of Visitors and the UW Foundation. Parking is available around the building at Microsoft.
Modern technologies are increasingly capable, interconnected, and used in diverse aspects of our lives. Securing these devices is critical: attackers can leverage their properties to perform attacks with greater ease and at a larger scale, and attacks can result in novel or amplified harms to users and bystanders. It is necessary to approach securing these devices from a human-centric perspective in order to design application-specific security solutions that maximally protect the relevant human assets via defenses of appropriately calibrated costs.
As part of National Robotics Week, the Human-Computer Interaction Laboratory proudly hosts an afternoon open house. Drop in any time between 1 and 4 p.m. (plan on spending 15-45 minutes). The open house will feature research demos and presentations by the lab and the robot team, including a demo of our humanoid robot, Nao, our Quadcopter, and our telepresence robotics. All members of the public -- including K-12 students, parents and teachers -- are invited to attend, interact with robots and hear about our research.
As our world becomes more computerized and interconnected, computer security and privacy will continue to increase in importance. Addressing security and privacy challenges requires reaching across a broad range of technologies, multiple layers of abstraction, and many aspects of computer science. In this talk, I will focus specifically on two examples of security and privacy challenges that I have addressed in my work by designing and building new systems that better match user expectations.