Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Posts Tagged ‘Workshop Report

 

Visions in Theoretical Computer Science Workshop Report: A Report on the TCS Visioning Workshop 2020

July 6th, 2021 / in research horizons, workshop reports / by Maddy Hunter

Roughly every ten years the Theoretical Computer Science (TCS) community comes together for a visioning workshop to discuss recent accomplishments and new challenges in the field of TCS. The workshop acts as an opportunity for reflection within the community and a way of informing interested investors. The newly released Visions in Theoretical Computer Science Workshop Report, written by Shuchi Chawla (University of Wisconsin-Madison), Jelani Nelson (University of California, Berkeley), Chris Umans (California Institute of Technology), and David Woodruff (Carnegie Mellon University) and supported by the Computing Community Consortium, summarizes the key takeaways from the 2020 TCS Visioning Workshop. Organized by the SIGACT Committee for the Advancement of Theoretical Computer Science, […]

Assured Autonomy Workshop Report Released

October 27th, 2020 / in AI, Announcements, CCC, research horizons, Research News, robotics, Security, workshop reports / by Helen Wright

The Computing Community Consortium (CCC) is pleased to announce the release of the Assured Autonomy report, titled Assured Autonomy: Path Toward Living With Autonomous Systems We Can Trust.   The report is the result of a year-long effort by the CCC and over 100 members of the research community, led by Ufuk Topcu (The University of Texas at Austin). Workshop organizers included Nadya Bliss (Arizona State University and CCC), Nancy Cooke (Arizona State University), Missy Cummings (Duke University), Ashley Llorens (Johns Hopkins University, Applied Physics Laboratory), Howard Shrobe (Massachusetts Institute of Technology), and Lenore Zuck (University of Illinois at Chicago).  Given the immense interest and investment in autonomy, a series of […]

CCC Embedded Security Workshop Report Released

May 19th, 2020 / in CCC, conference reports, Security, workshop reports / by Khari Douglas

The Computing Community Consortium (CCC) recently released the Leadership in Embedded Security workshop report. The workshop was organized by former CCC Council Member Kevin Fu (University of Michigan), Wayne Burleson (UMass Amherst), and Farinaz Koushanfar (UC, San Diego). It brought together around fifty academics, industrial researchers, and government agency program managers who work close to the topic of embedded security. The workshop included deep dive group discussions as well as short visionary talks by several international speakers to lend perspectives on successful strategies for funding embedded security research overseas. The report, titled Grand Challenges for Embedded Security Research in a Connected World, focuses on the challenges and potential research opportunities across five […]

CCC Workshop Report- Content Generation for Workforce Training

January 30th, 2020 / in Announcements, CCC, Research News / by Helen Wright

The Computing Community Consortium (CCC) is pleased to announce the release of a new CCC workshop report called Content Generation for Workforce Training. This report is based on presentations and discussions at the CCC workshop Content Generation for Workforce Training that was held March 14-15, 2019 in Atlanta, Georgia, and a follow-up workshop by the same name held July 28, 2019 at the ACM SIGGRAPH conference in Los Angeles. The workshops brought together researchers in a variety of computer disciplines related to content creation and practitioners in workforce training. Efficient workforce training is needed in today’s world in which technology is continually changing the nature of work. Students need to […]

Thermodynamic Computing Workshop Report Released

November 4th, 2019 / in Announcements, CCC, research horizons, resources, workshop reports / by Khari Douglas

The Computing Community Consortium (CCC) recently released the Thermodynamic Computing workshop report, the output of the CCC’s January 2019 visioning workshop of the same name. The workshop was organized by Tom Conte (Georgia Tech), Erik DeBenedictis (former Sandia National Laboratories), Natesh Ganesh (University of Massachusetts Amherst), Todd Hylton (UC San Diego), Susanne Still (University of Hawaii), John Paul Strachan (Hewlett Packard Lab HPE), R. Stanley Williams (Texas A&M). It brought together physical theorists, electrical and computer engineers, electronic/ionic device researchers, and theoretical biologists to explore a novel idea: computing as an open thermodynamic system. The report begins by explaining the need for thermodynamic computers: with the end of Moore’s Law and Dennard […]

CCC Workshop Report Released: Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility

September 16th, 2019 / in Announcements, CCC, workshop reports / by Helen Wright

David Ott (VMware Research) and Chris Peikert (University of Michigan) provided contributions to this post.  On January 31-February 1, 2019, the Computing Community Consortium (CCC) held a workshop in Washington, D.C. to discuss research challenges associated with PQC migration entitled, “Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility.” Workshop organizers, David Ott (VMware) and Chris Peikert (University of Michigan), are pleased to announce the release of the final workshop report. The implications of sufficiently powerful quantum computers for widely used public-key cryptography is well documented and increasingly discussed by the security community. Specifically, widely used RSA, ECDSA, ECDH, and DSA cryptosystems will need to be replaced by […]