{"id":260,"date":"2022-04-15T13:00:14","date_gmt":"2022-04-15T13:00:14","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/04\/15\/newly-appointed-ieee-computer-society-distinguished-speakers\/"},"modified":"2022-04-15T13:00:14","modified_gmt":"2022-04-15T13:00:14","slug":"newly-appointed-ieee-computer-society-distinguished-speakers","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/04\/15\/newly-appointed-ieee-computer-society-distinguished-speakers\/","title":{"rendered":"Newly Appointed IEEE Computer Society Distinguished Speakers"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive wp-image-268392 alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/04\/11220728\/2022-distinguished-lecturers-300x300.jpg\" alt=\"2022 distinguished lecturers\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/04\/11220728\/2022-distinguished-lecturers-300x300.jpg 300w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/04\/11220728\/2022-distinguished-lecturers-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/04\/11220728\/2022-distinguished-lecturers-100x100.jpg 100w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/04\/11220728\/2022-distinguished-lecturers.jpg 500w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>The IEEE Computer Society has selected a new group of Distinguished Visitors! These visitors are appointed to provide technical talks to our global network of 500+ Professional Sections and Student Branch Chapters. Last year these speakers gave a combined 94 presentations to chapters on topics ranging from cybersecurity to artificial intelligence, and computer architecture among others, as well as offered online webinars through the Distinguished Lecturer Webinar Series.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">The newly selected Distinguished Visitors include:<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">David A Fisher<\/strong> \u2013 Founder and chief technologist at Reasoning Technology LLC and an emeritus professor at Carnegie Mellon University (CMU). He has a Ph.D. in computer science from CMU, an M.S.E from Moore School of Electrical Engineering at the University of Pennsylvania, and a B.S. in mathematics from CMU.\u00a0 His available presentations are \u201cWhy Software Fails and Why AI Cannot Help,\u201d \u201cOmega\u2014A Declarative Programming Language,\u201d and \u201cPBT\u2014A Sound Deductive Logic for Computing.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Erol Gelenbe<\/strong> \u2013 Professor in the Institute of Theoretical and Applied Informatics of the Polish Academy of Sciences, honorary professor of the University of Electronic Science and Technology of China, and affiliated with the I3S CNRS Laboratory of the University of C\u00f4te d\u2019Azur (Nice), and the CNRS Abraham de Moivre Laboratory, Imperial College (London). He offers the following presentations: \u201cSmart Cognitive Systems are Needed to Feed the QoS, Security, and Energy Consumption Bounds of the Future\u201d and \u201cEnergy Consumption by ICT: Facts, Measurements, and Trends.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Pablo Ibarg\u00fcengoytia \u2013 <\/strong>Retired researcher from the Instituto de Investigaciones El\u00e9ctricas (Electrical Research Institute) now called National Institute of Electricity and Clean Energies (INEEL). He received his Ph.D. in computer science from the University of Salford in the United Kingdom, and his Master of Science in electrical engineering from the University of Minnesota. Dr. Ibarg\u00fcengoytia can present on \u201cArtificial Intelligence Applications in the Energy Sector\u201d and \u201cUses of Artificial Intelligence for Wind Parks.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Manish Gupta<\/strong> \u2013 Professor at Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, and founder of DA-IICT Centre for Entrepreneurship and Incubation and Guptalab. Dr. Gupta is available to speak on \u201cHow to store Elephants,\u201d \u201cA Story of Quantum Error Correction\u201d and \u201cThe Magic of DNA.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Martin Gilje Jaatun<\/strong> \u00a0\u2013 Senior scientist at SINTEF Digital in Trondheim, Norway, and an adjunct professor at the University of Stavanger. He graduated from the Norwegian Institute of Technology (NTH) in 1992 and holds a Ph.D. from the University of Stavanger. Dr. Jaatun\u2019s presentations include: \u201cAn Introduction to Cybersecurity and Industrial Applications,\u201d \u201cIntroduction to Software Security\u201d and \u201c5 things that You Should Not Use Blockchain for.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Joaquim Jorge<\/strong> \u00a0\u2013 Holds a Ph.D. in Computer Science from Rensselaer Polytechnic Institute (NY). A Full Professor at IST, the School of Engineering of Universidade de Lisboa (UL), Portugal, he teaches virtual &amp; augmented reality (VR\/AR), computer graphics (CG), and HCI. Dr. Jorge offers presentations on \u201cApproaches and Challenges to Virtual and Augmented Reality in Health Care and Rehabilitation,\u201d \u201cThe Future of Media Interfaces,\u201d and \u201cGame Over? New Approaches to Teaching Engineering Courses.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Raja Jurdak<\/strong>\u2013 Professor of distributed systems, chair in applied data sciences, and director of the trusted networks lab at the School of Computer Science, Queensland University of Technology. He has over 18 years of experience in network and mobility modeling, internet of things (IoT), and blockchain, having established and led the world-leading Distributed Sensing Systems Group at CSIRO\u2019s Data61. Dr. Jurdak can present on \u201cBlockchain for Cyber-physical Systems,\u201d \u201cBlockchain for Distributed Energy Management,\u201d and \u201cMobility and Diffusion in Dynamic Networks.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Krishna Kant<\/strong> \u2013 Professor in the computer and information science department at Temple University in Philadelphia, PA where he directs the center for research in energy and configuration management. He received his Ph.D. in mathematical sciences from the University of Texas at Dallas in 1981. He offers presentations on \u201cConfiguration Management and Diagnosis in Multi-tenant Systems,\u201d and \u201cEnd-to-End Quality of Service in Networked Cloud Storage.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Israel Koren<\/strong> \u2013 Professor emeritus of electrical and computer engineering at the University of Massachusetts, Amherst. He has been a consultant to companies like IBM, Analog Devices, Intel, AMD, and National Semiconductors. Dr. Koren\u2019s presentations include: \u201cDetecting and counteracting benign faults and malicious attacks in cyber-physical systems,\u201d \u201cSoft and Permanent Errors in CMOS Active Pixel Sensors: Analysis, Detection and Tolerance,\u201d and \u201cGreen Computing through Adaptive Multi-core Architectures.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Yuhong Liu \u2013<\/strong>Associate professor in the department of computer engineering at Santa Clara University, received her B.S. and M.S. from Beijing University of Posts and Telecommunications respectively, and Ph.D. from the University of Rhode Island. Dr. Lui speaks on the following: \u201cFacilitating Security and Trust among Multiple Parties through Blockchain Techniques\u201d and \u201cTrust and Privacy Vulnerabilities of Today\u2019s Online Social Networks.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Muhammad Shahab Siddiqui<\/strong> \u2013 Professor in the department of computer science and software engineering at Jinnah University for Women, Karachi, Pakistan. He received his Ph.D. from Hamdard University, Karachi, Pakistan in 2013. He received his MA in women\u2019s studies from CEWS, the University of Karachi in 2005 and his BCS and MCS from FASTICS, Karachi, Pakistan in 1995 and 1999 respectively. He can present on \u201cCommunity Algorithm and its Tools,\u201d and \u201cEnabling Lab.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Nick Tredennick<\/strong> \u2013 Founder and CEO of Jonetix, technology analyst at Gilder publishing, and president of Tredennick, Inc. He received a Ph.D. in electrical engineering from the University of Texas, Austin in 1976. He offers presentations on \u201cLow-Cost, No-Touch IoT Security,\u201d \u201cOptimal Condition Monitoring and Control for the Electrical Grid\u201d and \u201cCreating Silicon Valley 2.0.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Wil van der Aalst<\/strong> \u2013 Full professor at RWTH Aachen University, leading the process and data science (PADS) group. He is also the chief scientist at Celonis, part-time affiliated with the Fraunhofer-Institut f\u00fcr Angewandte Informationstechnik (FIT), and a member of the board of governors of Tilburg University. Dr. van der Aalst can provide presentations on \u201cProcess Mining as the Superglue between Data and Process,\u201d \u201cHybrid Intelligence: To Automate or Not to Automate, That Is the Question\u201d and \u201cRevisiting Petri Nets: Adding Objects While Enforcing Lucency.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Isabel Wagner<\/strong> \u2013 Associate Professor in Computer Science at De Montfort University in Leicester, UK. Dr. Wagner received her Ph.D. in engineering (Dr.-Ing.) and M.Sc. in computer science (Dipl.-Inf. Univ.) from the department of computer science, the University of Erlangen in 2010 and 2005, respectively. Dr. Wagner offers presentations on \u201cBig Tech\u2019s Hunger for data: the Case for Transparency-and-privacy-friendly Solutions,\u201d \u201cMachine Learning for Quantifying Web Privacy\u201d and \u201cPrivacy-enhancing technologies in smart cities.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Shui Yu<\/strong> \u2013 Professor School of Computer Science, University of Technology Sydney, Australia. He obtained his Ph.D. from Deakin University, Australia, in 2004. Dr Yu\u2019s research interest includes big data, security and privacy, networking, and mathematical modeling. Dr. Yu presents on \u201cCybersecurity and Privacy: State-of-Art, Challenges, and Opportunities\u201d and \u201cBig Data Privacy: from Networking and Artificial Intelligence Perspectives.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong style=\"color: #00629b;\">Stefano Zanero<\/strong> \u2013 Currently an associate professor with the dipartimento di elettronica, informazione e bioingegneria. He received a Ph.D. in computer engineering from Politecnico di Milano. His research focuses on malware analysis, cyber-physical security, and cyber-security in general. Dr. Zanero provides presentations on \u201cCrouching Hacker, Killer Robot? Removing FUD from Cyber-physical Security,\u201d \u201cMaking Sense of a Million Samples Per Day: Behavior-based Methods for Automated, Scalable Malware Analysis\u201d and \u201cBreaking the Laws of Robotics: Attacking Industrial Robots.\u201d<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">To learn more about all of the IEEE Computer Society Distinguished Visitors or to learn more about becoming a speaker click here.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Chapters interested in inviting a speaker to an upcoming event click here.<\/p>\n<\/p><\/div>\n<p><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '2406379906149876');\n  fbq('track', 'PageView');\n<\/script><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '721875948349197');\n  fbq('track', 'PageView');\n<\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/insider-membership-news\/2022-distinguished-visitor-speakers\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The IEEE Computer Society has selected a new group of Distinguished Visitors! These visitors are appointed to provide technical&hellip;<\/p>\n","protected":false},"author":1,"featured_media":261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/261"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}