Oxford Computer Science Conference
The Oxford Computer Science Conference 2016 will take place on Friday, 10th June, 2016 (7th week of Trinity Term) in the Wolfson Building on Parks Road, in Lecture Theatre B.
We are pleased to announce that this year's keynote speaker will be Dr. James Mickens, Associate Professor of Computer Science at the Harvard John A. Paulson School of Engineering & Applied Sciences, Harvard University.
Established in 2004, the Conference was originally held biennially and has since become an annual event.
All students, faculty and staff members of the department are welcome to attend the conference for which there is no registration fee. Tea, coffee and lunch will be provided free of charge.
The deadline for submission of micro abstracts has now passed. Registration for attendance at the conference and/or dinner has now closed.
Programme
Start |
End |
Session |
9:00 |
9:05 |
Welcome Address: Chad Heitzenrater, General Chair |
9:05 |
10:20 |
Session: Theory (Chair: Matt Smith) |
On Planar Valued CSPs Peter Fulla and Stanislav Živný |
||
Profunctor Optics: Making Sense of Data Accessors Matthew Pickering |
||
Exact Learning of Polynomial Automata Aditya Sharad and James Worrell |
||
10:20 |
10:40 |
Break |
10:40 |
11:55 |
Session: Privacy (Chair: Elizabeth Phillips) |
The Privacy Paradox and the Internet-of-Things Meredydd Williams and Jason Nurse |
||
PPTMA: Privacy-Preserving Targeted Mobile Advertising Yang Liu and Andrew Simpson |
||
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis Vincent Taylor and Ivan Martinovic |
||
11:55 |
12:30 |
Lightning Talks (Chair: Charlie Kingston) |
Investigating the Impact of Gender Differences on Cyber Security Skills Paula Fiddi, Marina Jirotka and Ivan Flechais |
||
Small-scale cyber security Emma Osborn |
||
Distributed Anytime Generic Inference Abhishek Dasgupta |
||
Cyber Insurance: A Tale of Two Jurisdictions Daniel Woods |
||
Security protocols - are they secure?! Nick Moore |
||
On the Fly Construction of Perceptually Uniform Color Spaces from User Surveys William Rathje |
||
Cyber Security Oxford Katherine Fletcher |
||
12:30 |
14:00 |
Lunch and Poster Session |
Data-efficient Bayesian verification of parametric Markov chains Elizabeth Polgreen, Viraj Wijesuriya, Sofie Haesaert and Alessandro Abate |
||
Personal Proxies for Decentralized Web Applications Mario Gemoll |
||
Classifying Uveitis Biologics Registry Data using Data Analytic Techniques Kamaliah Kamarudin and Min Chen |
||
Modelling Smart Buildings Dynamics Nathalie Cauchi and Alessandro Abate |
||
Sonification for Network Monitoring: a Research Agenda Louise Axon |
||
Are we managing the risk of sharing Cyber Situational Awareness? A UK Public Sector Case Study Michael Davies and Menisha Patel |
||
Optimal Bounds for the No-Show Paradox via SAT Solving Felix Brandt, Christian Geist and Dominik Peters |
||
14:00 |
14:40 |
Keynote: Surviving The Hardware Apocalypse (I’m Coming To Your House) Dr. James Mickens, Harvard University |
14:40 |
15:30 |
Session: Security (Chair: Martin Dehnel-Wild) |
Realistic, Strong and Provable Key Exchange Security Luke Garratt |
||
The Days Before Zero Day: Investment Models for Secure Software Engineering Chad Heitzenrater and Andrew Simpson |
||
15:30 |
15:50 |
Break |
15:50 |
17:05 |
Session: Miscellaneous (Chair: Kevin Milner) |
Ghostbuster: A Tool for Simplifying and Converting GADTs Trevor McDonell, Timothy Zakian, Matteo Cimini and Ryan Newton |
||
Extracting Social Structure from Dark Web Forum Metadata Elizabeth Phillips |
||
The Sensitivity to Boundary Errors of Image Segmentation Evaluation Measures Varduhi Yeghiazaryan and Irina Voiculescu |
||
17:05 |
17:30 |
Poster Judging and Awards Presentation |
17:30 |
|
Reception |
19:00 |
|
Drinks and Dinner at Lady Margaret Hall |
Programme Committee
- Chad Heitzenrater, General Chair
- Charlie Kingston, Conference co-Chair
- Aditya Sharad, Conference co-Chair
- Martin Dehnel-Wild, Financial Chair