Turing Award A note given in BCC class on April 10, 2018

Slides:



Advertisements
Similar presentations
SHA-1 Secure Hash Algorithm 1. SHA-1 – Brief Introduction 家族是美國國家安全局 (NSA) 設計,美國國家標 準與技術研究院 (NIST) 發佈的一系列密碼雜湊函 數,發表於 1993 年 從一個最大 2 64 位元的訊息中產生一串 160.
Advertisements

CAPTCHA: Using Hard AI Problems for Security 12 Jun 2007 Ohad Barak (a.k.a. jo) Luis Von Ahn, EuroCrypt 2003.
Book 5 Lesson 1 How long Have you Lived in Pingxi? 現在完成式.
©Brooks/Cole, 2003 Introduction to Computer Science Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University,
表一: 學年度東海大學推薦派赴姐妹校交換學生表 長期交換學生派出交換生比率派出交換生比率 ACUCA 交 換學生提供 名頍 ( 交換一學 期 ) 短期交換 學生人數 長短 期交 換生 人數 總計 東海 註 冊學 生 總數 長期 交換 名頍 佔總 學生 數比 率 交換人 數佔總 學生數 比率.
活動時間: 99 年 05 月 07 號 ( 五 ) 上午 9.20~12.10 活動地點:校本部科技大樓 4 樓 3401 E 化教學教室 電子系 - 光電實驗室 即時實驗現場互動.
五小專案 黃詩晴 章乃云. 目錄 計算機 智慧盤 拼圖 記憶大挑戰 數學題庫 心得 參考文獻.
台大公衛學系選修課 課程名稱:經濟學 ECONOMICS 授課內容: 課程簡介、經濟學問題與觀念 日期: 2003 年 9 月 17 日.
1 主講人:劉炯朗教授 講題: Evaluation of Core Competence of College Students 971 教學研討會 教學研討會
1 94 學年度碩士班新生座談 擬定 修正. 2 李之中 Chi-Chung Lee Assistant professor Department of Information Management, Chung Hwa University Office.
Keynote Talk Ubiquitous Computing 無間資訊空間 主講 : 吳其彥 教授.
CS1103 電機資訊工程實習 Department of Computer Science National Tsing Hua University.
Lecture 1 – Since Industrial Revolution… History of Economic Thoughts, Fall 2008 Department of Economics Shih Hsin University Yi-Hsiue Wang.
Lecture 1 – Since Industrial Revolution… History of Economic Thoughts, Fall 2009 Department of Economics Shih Hsin University Yi-Hsiue Wang.
CMB and Hyperspace 宇宙背景輻射與高空間 Parents of the Science 數學與物理的交互作用 高文芳交大物理所.
自動機 (Automata) Time: 1:10~2:00 Monday: practice exercise, quiz 2:10~4:00 Wednesday: lecture Textbook: (new!) An Introduction to Formal Languages and Automata,
: Selfdescribing Sequence ★★★ 題組: Problem Set Archive with Online Judge 題號: Problem C: Selfdescribing Sequence 解題者:林峰世 解題日期: 2006 年 3 月 21 日 題意:
2015/6/23 Education in East Asia: “The Good, the Bad, the Ugly” Hamish McRae, The World in 2020: Power, Culture and Prosperity, Harvard Business School.
QED and the men who made it, 對抗 ∞ 的戰爭 高文芳 交大物理所 愛因斯坦 愛迪生 與 project/portraits/edison.jpg csa/pegasus/einstein.jpg.
Winners of Turing Award 2004 Presenter: Yung-Hsing Peng Date:
Factoring Algorithms Ref: D. Stinson, Cryptography - Theory and Practice, 2001.
-95 學年度傑出校友 學術卓越類 劉 江 美國芝加哥校友會推薦. University of North Carolina at Chapel Hill PhD in statistics(1976) Northwestern University Medical School,National.
征服王朝 ( dynasties of conquest ) 征服王朝 ( dynasties of conquest )
1 Knapsack Cryptosystems 2 ◎ Merkle-Hellman Knapsack Cryptosystem 觀察: (1) 0/1 knapsack problem (i.e. sum of subset) 例:已知 C = 14, A = (1, 10, 5, 22, 3)
Set Theory Sets 許多數學上的討論中(例如: algebra 、 analysis 、 geometric 等等) 經常藉助集合論中的符號或術語來說 明。集合論是十九世紀後期由 Boole ( 布爾; 1815~1864) 及 Cantor ( 康托爾; 1845 ~ 1918) 所發展出來的。
主辦單位 : 東吳大學會計學系、中華會計教育學會 地 點 : 東吳大學城中區第二大樓 2123 主辦單位 : 東吳大學會計學系、中華會計教育學會 地 點 : 東吳大學城中區第二大樓 2123 守護事業、珍惜大自然豐富資源的前瞻資訊網 九十五年十月十八日 ( 三 )
Programming & Coding 1. Quotes “The most important property of a program is whether it accomplishes the intention of its user.” ― C.A.R. Hoare (Turing.
1 Identity-based Cryptography for Securing Mobile Phone Calls Matthew Smith, Christian Schridde, Bj ¨orn Agel, Bernd Freisleben 2009 International Conference.
Counting Spanning Trees Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan
Turing Award Kun-Mao Chao Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan A note given.
SystemsDatabasesTheoryProgramming Languages Software.
演算法 ( 課號 : ) 內容 : 本課程是電機工程學系計算機類課程之必選課,對象以對利 用計算機來解決問題有興趣的同學為主。本課程主要是教授 基本的演算法分析與設計技巧,並整理及比較目前最重要之 演算法。 Theme: What is the best algorithm for.
Leslie Valiant Margaret Neterval (mon2hu) and Emily McClure (eem9dp)
Modern Cryptographic Topics
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter.
Alan M. Turing ( ) A Natalie Cluck Presentation.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
HISTORY OF INTERNET. THE BEGINNING OF THE INTERNET It will help in discussing the beginnings of the Internet to define what the Internet is. Now, you.
Introduction to Probability Theory ‧ 3- 1 ‧ Speaker: Chuang-Chieh Lin Advisor: Professor Maw-Shang Chang National Chung Cheng University Dept. CSIE, Computation.
Internet Technology Laboratory Department of Computer and Communication Kun Shan University  官方網站:
1 94 學年度碩士班新生座談. 2 李之中 Chi-Chung Lee Assistant professor Department of Information Management, Chung Hwa University Office : M302-1 Phone : 03- coming.
Introduction to Computer Science Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan ( 台大資訊工程系.
103-1 教育部提升外語計畫 [ 全校職場專業英語簡報競賽 ] [ 題目 ] 明新科技大學 [ 科系 ] [ 班級 ] [ 姓名 ]
The Imitation Game Kun-Mao Chao Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan A note.
2016/6/91 TWNIC 委辦 DNSSEC 測試計畫 國立中央大學電算中心 103/01/09.
十月一日是國慶 qing\ 節。 Level 2 第一課 開學 New exercises online Character analysis Character differentiation.
Online Courses A note given in BCC class on May 10, 2016
A CMOS Biosensor System-on-Chip for Mobile Applications
Turing Award A note given in BCC class on March 7, 2017
(or how to build a webpage)
A note given in BCC class on March 15, 2016
methods and simple tools e.g., abacus
Lecture 1: Facts of network technologies developments
CS 380: Artificial Intelligence
methods and simple tools e.g., abacus
The Largest Known Prime Number
CSCE 190 Computing in the Modern World Judea Pearl ACM A. M
Turing Award A note given in BCC class on April 23, 2014
Turing Award A note given in BCC class on March 20, 2013
Using the Internet, Making the Most of the Web’s Resources
The Theory of Computation
Facebook’s WhatsApp Purchase
Space-Saving Strategies for Computing Δ-points
Space-Saving Strategies for Analyzing Biomolecular Sequences
Turing Award A note given in BCC class on March 28, 2019
Ronald L. Rivest MIT ShafiFest January 13, 2019
Trees Kun-Mao Chao (趙坤茂)
Great Moments of Theory at UC Berkeley (visit day edition)
Lecture 1: Facts of network technologies developments
Lecture 1: Facts of network technologies developments
Presentation transcript:

Turing Award A note given in BCC class on April 10, 2018 Kun-Mao Chao (趙坤茂) Department of Computer Science and Information Engineering National Taiwan University, Taiwan A note given in BCC class on April 10, 2018

計算機科學大事紀 西元1937年 亞蘭杜林(Alan Turing)提出了杜林機(Turing Machine)的概念 Alan Turing在二次大戰時設計, 破解了德國的Enigma密碼

Turing Award Nobel prize in computer science ACM's most prestigious technical award is given to an individual selected for contributions of a technical nature made to the computing community. The contributions should be of lasting and major technical importance to the computer field 西元1966年開始 ACM announced on November 13, 2014 that the funding level for the ACM A.M. Turing Award is now $1,000,000, to be provided by Google Inc. The new amount is four times its previous level.

Turing Award Donald Knuth 1974 Steven Cook 1982 Ken Thompson & Dannis Ritchie 1983 John E. Hopcroft 1986 姚期智院士在西元2000年時, 獲頒Turing Award (唯一華人得主) Vinton G. Cerf and Robert E. Kahn (TCP/IP;Fathers of the Internet) 2004 Judea Pearl (Bayesian networks) 2011 Shafi Goldwasser and Silvio Micali 2012

My ticket Flyer

Alan Turing & Me 這是我在美國數學學會的族譜 Alan Turing H.A. Newton  E.H. Moore (1885 Yale Univ.)  Oswald Veblen (1903 U. of Chicago)  Alonzo Church (1927 Princeton)  Bob Ritchie (1961 Princeton)  Webb Miller (1968 Washington)  Kun-Mao Chao (1993 Penn State) 這是我在美國數學學會的族譜 http://www.genealogy.ams.org/html/id.phtml?id=84608 Alan Turing

John E. Hopcroft 2012/12/22

Turing Award 2012 (announced on March 13, 2013) Shafi Goldwasser and Silvio Micali CSAIL, MIT Source: MIT News

The Pioneering Work of Goldwasser and Micali They were credited for “revolutionizing the science of cryptography” and developing the gold standard for enabling secure Internet transactions. probabilistic encryption the simulation paradigm demonstrating a system’s security the idea of “zero-knowledge” proofs Source: MIT News

“I am very proud to have won the Turing Award,” Goldwasser says “I am very proud to have won the Turing Award,” Goldwasser says. “Our work was very unconventional at the time. We were graduate students and let our imagination run free, from using randomized methods to encrypt single bits to enlarging the classical definition of a proof to allow a small error to setting new goals for security. Winning the award is further testimony to the fact that the cryptographic and complexity theoretic community embraced these ideas in the last 30 years.” Source: MIT News

“I am honored by this recognition and thankful to the computer science community,” Micali adds. “As graduate students, we took some serious risks and faced a few rejections, but also received precious encouragement from exceptional mentors. I am also proud to see how far others have advanced our initial work.” Source: MIT News

Turing Award 2013 (announced on March 18, 2014) Leslie Lamport Microsoft Research

Leslie Lamport A pioneer in distributed systems Comments from his colleagues His writings The Seattle Times

LaTeX TeX by Donald Knuth & LaTeX by Leslie Lamport I wrote two books and edited one using LaTeX.

Turing Award 2014 (announced on March, 2015) Michael Stonebraker MIT

Turing Award 2015 (announced on March 2, 2016) Whitfield Diffie and Martin Hellman

ACM Marks 50 Years of the ACM A.M. Turing Award Since its inauguration in 1966, the ACM A. M. Turing Award has recognized major contributions of lasting importance in computing. Referred to as the “Nobel Prize of computing.” The celebration was held in San Francisco on June 23 - 24, 2017. More: http://www.acm.org/turing-award-50

Turing Award 2016 (announced on April 4, 2017) Tim Berners-Lee

Turing Award 2017 (announced on March 22, 2018) John Hennessy and Dave Patterson