The Computing Community Consortium (CCC) recently released the Wide-Area Data Analytics workshop report. The workshop was organized by Rachit Agarwal (Cornell University) and CCC Council Member Jen Rexford (Princeton University) to identify challenges and opportunities in data analytics and related research given that modern datasets are often distributed across many locations. In some cases, datasets are naturally distributed because they are collected from multiple locations, such as sensors spread throughout a geographic region. In other cases, datasets are distributed across different data centers to improve scalability or reliability, or to reduce cost; these distributed locations could be a mix of public clouds, private data centers, and edge computing sites. “The […]
Computing Community Consortium Blog
The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.
Archive for the ‘workshop reports’ category
CCC Wide-Area Data Analytics Workshop Report Released
June 18th, 2020 / in workshop reports / by Khari DouglasSCIENCE Article on Driving Computer Performance After Moore’s Law
June 16th, 2020 / in Announcements, CCC, research horizons, Research News, resources, workshop reports / by Helen WrightThe following is a guest blog from CCC Member Tom Conte of Georgia Tech. A recent article in SCIENCE, authored by Charles E. Leiserson, Neil Thompson, Joel Emer, Bradley Kuszmaul, Butler Lampson, Daniel Sanchez and Tao Schardl, entitled “There’s plenty of room at the Top: What will drive computer performance after Moore’s law?” discusses the way forward after the end of technology scaling. (The title is a play on Richard Feynman’s 1959 address to the American Physical Society, “There’s Plenty of Room at the Bottom,” wherein Feynman observed that miniaturization would lead to what we now call Moore’s Law.) So, what comes after Moore’s Law? The article discusses improvements in […]
CCC Embedded Security Workshop Report Released
May 19th, 2020 / in CCC, conference reports, Security, workshop reports / by Khari DouglasThe Computing Community Consortium (CCC) recently released the Leadership in Embedded Security workshop report. The workshop was organized by former CCC Council Member Kevin Fu (University of Michigan), Wayne Burleson (UMass Amherst), and Farinaz Koushanfar (UC, San Diego). It brought together around fifty academics, industrial researchers, and government agency program managers who work close to the topic of embedded security. The workshop included deep dive group discussions as well as short visionary talks by several international speakers to lend perspectives on successful strategies for funding embedded security research overseas. The report, titled Grand Challenges for Embedded Security Research in a Connected World, focuses on the challenges and potential research opportunities across five […]
Fairness and Machine Learning
April 29th, 2020 / in Announcements, CCC, Privacy, research horizons, Research News, resources, workshop reports / by Helen WrightContributions to this post were provided by Alexandra Chouldechova (Carnegie Mellon University), Sampath Kannan (University of Pennsylvania), and Aaron Roth (University of Pennsylvania). The Computing Community Consortium held a workshop on Fair Representations and Fair Interactive Learning in 2018, which was led by Aaron Roth from University of Pennsylvania and Alexandra Chouldechova from Carnegie Mellon University. A group of 50 industry, academic, and government experts convened in Philadelphia to explore the roots of algorithmic bias. The workshop report has been highlighted on the front page of the May 2020 CACM Issue, which includes a snapshot of the report that interviewed both Roth and Chouldechova. We tend to believe that algorithmic […]
Thermodynamic Computing Workshop Report Released
November 4th, 2019 / in Announcements, CCC, research horizons, resources, workshop reports / by Khari DouglasThe Computing Community Consortium (CCC) recently released the Thermodynamic Computing workshop report, the output of the CCC’s January 2019 visioning workshop of the same name. The workshop was organized by Tom Conte (Georgia Tech), Erik DeBenedictis (former Sandia National Laboratories), Natesh Ganesh (University of Massachusetts Amherst), Todd Hylton (UC San Diego), Susanne Still (University of Hawaii), John Paul Strachan (Hewlett Packard Lab HPE), R. Stanley Williams (Texas A&M). It brought together physical theorists, electrical and computer engineers, electronic/ionic device researchers, and theoretical biologists to explore a novel idea: computing as an open thermodynamic system. The report begins by explaining the need for thermodynamic computers: with the end of Moore’s Law and Dennard […]
CCC Workshop Report Released: Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility
September 16th, 2019 / in Announcements, CCC, workshop reports / by Helen WrightDavid Ott (VMware Research) and Chris Peikert (University of Michigan) provided contributions to this post. On January 31-February 1, 2019, the Computing Community Consortium (CCC) held a workshop in Washington, D.C. to discuss research challenges associated with PQC migration entitled, “Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility.” Workshop organizers, David Ott (VMware) and Chris Peikert (University of Michigan), are pleased to announce the release of the final workshop report. The implications of sufficiently powerful quantum computers for widely used public-key cryptography is well documented and increasingly discussed by the security community. Specifically, widely used RSA, ECDSA, ECDH, and DSA cryptosystems will need to be replaced by […]