Waikato University crest

Department of
Computer Science
Tari Rorohiko

Computing and Mathematical Sciences

Recent Seminars

Events Index

Prototyping Mobile Experiences Fast and Effectively

David Mannl
Mobile UX Architect, Fairfax Media, Auckland
Tuesday 21 April 2015
Learn all about the tools, techniques and methodologies on how to rapidly turn an app idea into an interactive prototype that runs on an actual device. This session is targeted at designers and developers of all skill levels. All other students are welcome to join as well. Do you have the next billion dollar app idea just waiting to be pitched to the world?


Smartness is Suddenly Everywhere

Farhad Mehdipour
Kyushu University, Japan
Wednesday 8 April 2015
This talk gives an overview of emerging computing paradigms, key enabling technologies for realizing them, and a few example applications. The emphasis will be on solutions that integrate computing and networking systems to the physical world being sensed and controlled by sensors and actuators. A big picture of a smart computing system including its different components and requirements associated with the type of target application is presented. It will be shown how the growth of the system may lead to an ever-increasing data stream and big data emergence. Moreover, two example applications including a smart system for environment monitoring and the Smart Grid will be introduced and compared with respect to the variant smartness essentials. Challenges and solutions for developing components of those systems including an energy-efficient wireless sensor network, as well as data processing, mining and knowledge discovery systems will be discussed throughout this talk.


Dynamic impact assessment for disruption-aware intrusion alert prioritization and response selection

Harris Lin
Ames Laboratory, U.S. Department of Energy, Iowa State University, USA
Tuesday 17 February 2015
Striking the balance between cyber security and convenience has been a long-standing challenge: while a strict security policy prevents intrusion, it may severely disrupt critical services of an organization through automated blocking. Traditionally, static whitelists are manually maintained to capture such critical services which should not be interfered with, or which are trusted out of necessity. However, it is extremely difficult to be accurate and exhaustive as in reality they change over time. In this talk we discuss a machine learning based approach that aims to model the relationship between the target organization and the external resources, and dynamically suggest changes to the whitelists. We extract features from network flow summaries, bipartite graph analysis, and the contents of web pages crawled from the hostname of the resources. The resulting model trained using the WEKA data mining framework could also be used as part of intrusion alert prioritization, response selection, as well as exfiltration discovery.


Collaboration opportunities with Imersia

Roy Davies and Michael Rinck
Imersia Ltd, Auckland
Friday 13 February 2015
Dr. Davies will give a 30 minute presentation on the challenges and opportunities Imersia faces right now. Afterwards he would like to explore collaboration avenues with researchers from Waikato, especially from the fields of:
  • Artificial Intelligence: Reinforcement Learning and Natural Language Processing,
  • Cloud Computing: Security and Scalability,
  • Mobile Recommender Systems, and
  • Mobile Augmented Reality.
Possible examples are:
  • Student Projects (as in Comp314),
  • Student Internships (both undergrad and post-grad level), and
  • Grad Student Projects (specifically Ph.D. level, funding is an option).
Collaboration on higher levels is a goal for the long term, such as joint applications for the MBIE smart ideas fund.


Unlocking the Secrets of 4.5 Billion Pages: An HathiTrust Research Center Update

J. Stephen Downie
University of Illinois at Urbana-Champaign, USA
Tuesday 20 January 2015
This seminar provides an update on the recent developments and activities of the HathiTrust Research Center (HTRC). The HTRC is the research arm of the HathiTrust, an online repository dedicated to the provision of access to a comprehensive body of published works for scholarship and education.

The HathiTrust is a partnership of over 100 major research institutions and libraries working to ensure that the cultural record is preserved and accessible long into the future. Membership is open to institutions worldwide.

Over 12.5 million volumes (4.5 billion pages) have been ingested into the HathiTrust digital archive from sources including Google Books, member university libraries, the Internet Archive, and numerous private collections. The HTRC is dedicated to facilitating scholarship using this enormous corpus through enabling access to the corpus, developing research tools, fostering research projects and communities, and providing additional resources such as enhanced metadata and indices that will assist scholars to more easily exploit the HathiTrust corpus.

This lecture will outline the mission, goals and structure of the HTRC. It will also provide an overview of recent work being conducted on a range of projects, partnerships and initiatives. Projects include Workset Creation for Scholarly Analysis project (WCSA, funded by the Andrew W. Mellon Foundation) and the HathiTrust + Bookworm project (HT+BW, funded by the National Endowment for the Humanities). HTRC’s involvement with the NOVEL text mining project and the Single Interface for Music Score Searching and Analysis (SIMSSA) project, both funded by the SSHRC Partnership Grant programme, will be introduced. The HTRC’s new feature extraction and Data Capsule initiatives, part of its ongoing work its ongoing efforts to enable the non-consumptive analyses of copyrighted materials will also be discussed. The talk will conclude with a brief discussion of the ways in which scholars can work with and through the HTRC.


Events Index