From the course catalog:
Reading, discussion and presentation of research papers in an area of computer science. Each student will write a survey paper and must regularly attend the Computer Science Colloquium.
|Week||Monday (PO-01)||Wednesday (PO-02)||Reading||Presenters (PO-01)||Presenters (PO-02)|
|2||08-31||09-02||Producing Wrong Data Without Doing Anything Obviously Wrong!||Addy||Daniel|
|3||09-07||09-09||The Moral Character of Cryptographic Work||Emma, Jenna||Jack|
|4||09-14||09-16||Software Aspects of Strategic Defense Systems, Unfalsifiability of Security Claims||Maddy||Jorge A.|
|5||09-21||09-23||Runaway Feedback Loops in Predictive Policing||Jenna, Ruben||Jorge R.|
|6||09-28||09-30||Obfuscation of Executable Code to Improve Resistance to Static Disassembly||Douglas|
|7||10-05||10-07||Automated Inference on Criminality using Face Images and revision with response||Addy||Jorge A.|
|8||10-12||10-14||Experimental Security Analysis of a Modern Automobile||Maddy, Ruben||Adam|
|9||10-19||10-21||Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests||Georgia, Emma||Daniel|
|10||10-26||10-28||AUTOMAN: A Platform for Integrating Human-Based and Digital Computation||Marcel||Jack|
|11||11-02||11-04||On The Limits of Steganography||Georgia||Adam|
|12||11-09||11-11||Software Engineering Code of Ethics, Menlo Report Companion||Marcel|
|13||11-16||11-18||Toward a Critical Technical Practice: Lessons Learned in Trying to Reform AI||Douglas|
|14||11-23||Quietly lying on the floor in the dark|
NB that the links are to local copies of the paper. Searching the title will find you official versions.
See the central CS 190 website for more information about senior projects, the LaTeX exercise, and the deadlines for survey paper.
If you don’t turn in a final paper, you won’t get any credit for the survey paper milestones, putting you at risk of failing the course.