Turing Award A note given in BCC class on April 23, 2014

Slides:



Advertisements
Similar presentations
SHA-1 Secure Hash Algorithm 1. SHA-1 – Brief Introduction 家族是美國國家安全局 (NSA) 設計,美國國家標 準與技術研究院 (NIST) 發佈的一系列密碼雜湊函 數,發表於 1993 年 從一個最大 2 64 位元的訊息中產生一串 160.
Advertisements

©Brooks/Cole, 2003 Introduction to Computer Science Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University,
表一: 學年度東海大學推薦派赴姐妹校交換學生表 長期交換學生派出交換生比率派出交換生比率 ACUCA 交 換學生提供 名頍 ( 交換一學 期 ) 短期交換 學生人數 長短 期交 換生 人數 總計 東海 註 冊學 生 總數 長期 交換 名頍 佔總 學生 數比 率 交換人 數佔總 學生數 比率.
李 三 保李 三 保 校友獎項分類:學術卓越類 畢業系別:物理學系 入學年度: 1966 年 推薦單位:物理學系.
活動時間: 99 年 05 月 07 號 ( 五 ) 上午 9.20~12.10 活動地點:校本部科技大樓 4 樓 3401 E 化教學教室 電子系 - 光電實驗室 即時實驗現場互動.
期末專題 - 吊人頭遊戲 第 35 組 組員 : 電機系 49841XXXX XXX 電機系 49841OOOO OOO.
五小專案 黃詩晴 章乃云. 目錄 計算機 智慧盤 拼圖 記憶大挑戰 數學題庫 心得 參考文獻.
台大公衛學系選修課 課程名稱:經濟學 ECONOMICS 授課內容: 課程簡介、經濟學問題與觀念 日期: 2003 年 9 月 17 日.
1 主講人:劉炯朗教授 講題: Evaluation of Core Competence of College Students 971 教學研討會 教學研討會
2005/9/21 政黨與選舉 1 政黨的定義與功能 美國早期政黨政治. 2005/9/21 政黨與選舉 2.
1 94 學年度碩士班新生座談 擬定 修正. 2 李之中 Chi-Chung Lee Assistant professor Department of Information Management, Chung Hwa University Office.
Keynote Talk Ubiquitous Computing 無間資訊空間 主講 : 吳其彥 教授.
CS1103 電機資訊工程實習 Department of Computer Science National Tsing Hua University.
Lecture 1 – Since Industrial Revolution… History of Economic Thoughts, Fall 2008 Department of Economics Shih Hsin University Yi-Hsiue Wang.
電腦優化 黃柏漢 羅元富 黃得瑋.
Lecture 1 – Since Industrial Revolution… History of Economic Thoughts, Fall 2009 Department of Economics Shih Hsin University Yi-Hsiue Wang.
CMB and Hyperspace 宇宙背景輻射與高空間 Parents of the Science 數學與物理的交互作用 高文芳交大物理所.
: Playing War ★★★★☆ 題組: Problem Set Archive with Online Judge 題號: 11061: Playing War 解題者:陳盈村 解題日期: 2008 年 3 月 14 日 題意:在此遊戲中,有一類玩家一旦開始攻擊, 就會不停攻擊同一對手,直到全滅對方或無法再.
自動機 (Automata) Time: 1:10~2:00 Monday: practice exercise, quiz 2:10~4:00 Wednesday: lecture Textbook: (new!) An Introduction to Formal Languages and Automata,
: Selfdescribing Sequence ★★★ 題組: Problem Set Archive with Online Judge 題號: Problem C: Selfdescribing Sequence 解題者:林峰世 解題日期: 2006 年 3 月 21 日 題意:
企鵝真可愛 陳厚君 製作人:.
2015/6/23 Education in East Asia: “The Good, the Bad, the Ugly” Hamish McRae, The World in 2020: Power, Culture and Prosperity, Harvard Business School.
工學院傑出教學獎候選人 陳 智, 教授 材料科學與工程系.
現代密碼學 Contemporary Cryptography. 2 Course Information Instructor: 左瑞麟 (Raylin Tso) Office: 大仁樓
QED and the men who made it, 對抗 ∞ 的戰爭 高文芳 交大物理所 愛因斯坦 愛迪生 與 project/portraits/edison.jpg csa/pegasus/einstein.jpg.
Factoring Algorithms Ref: D. Stinson, Cryptography - Theory and Practice, 2001.
-95 學年度傑出校友 學術卓越類 劉 江 美國芝加哥校友會推薦. University of North Carolina at Chapel Hill PhD in statistics(1976) Northwestern University Medical School,National.
征服王朝 ( dynasties of conquest ) 征服王朝 ( dynasties of conquest )
1 Knapsack Cryptosystems 2 ◎ Merkle-Hellman Knapsack Cryptosystem 觀察: (1) 0/1 knapsack problem (i.e. sum of subset) 例:已知 C = 14, A = (1, 10, 5, 22, 3)
Set Theory Sets 許多數學上的討論中(例如: algebra 、 analysis 、 geometric 等等) 經常藉助集合論中的符號或術語來說 明。集合論是十九世紀後期由 Boole ( 布爾; 1815~1864) 及 Cantor ( 康托爾; 1845 ~ 1918) 所發展出來的。
1 Discrete and Combinatorial Mathematics R. P. Grimaldi, 5 th edition, 2004 Course Information.
主辦單位 : 東吳大學會計學系、中華會計教育學會 地 點 : 東吳大學城中區第二大樓 2123 主辦單位 : 東吳大學會計學系、中華會計教育學會 地 點 : 東吳大學城中區第二大樓 2123 守護事業、珍惜大自然豐富資源的前瞻資訊網 九十五年十月十八日 ( 三 )
Content and Organization a manuscript
1 Identity-based Cryptography for Securing Mobile Phone Calls Matthew Smith, Christian Schridde, Bj ¨orn Agel, Bernd Freisleben 2009 International Conference.
Counting Spanning Trees Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan
National Tsing Hua University Electronic Packaging/CAE Labs. National Tsing Hua University Electronic Packaging/CAE Labs. National Tsing Hua University.
A New High Speed, Low Power Adder; Using Hybrid Analog-Digital Circuit Taherinejad, N.; Abrishamifar, A.; Circuit Theory and Design, ECCTD 2009.
Turing Award Kun-Mao Chao Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan A note given.
演算法 ( 課號 : ) 內容 : 本課程是電機工程學系計算機類課程之必選課,對象以對利 用計算機來解決問題有興趣的同學為主。本課程主要是教授 基本的演算法分析與設計技巧,並整理及比較目前最重要之 演算法。 Theme: What is the best algorithm for.
Modern Cryptographic Topics
Alan M. Turing ( ) A Natalie Cluck Presentation.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
! !美洲華語 李雅莉老師製作 TextVocabularyidiomStoryChallenge $100 $200 $300 $400 $500 $600 $100 $200 $300 $400 $500 $600 $100 $200 $300 $400 $500 $600 $100 $200.
Introduction to Probability Theory ‧ 3- 1 ‧ Speaker: Chuang-Chieh Lin Advisor: Professor Maw-Shang Chang National Chung Cheng University Dept. CSIE, Computation.
Taipei Tech / University of Cincinnati Dual-Drgree Program 台北科技大學與辛辛那提大學碩士雙聯學位 1 、碩士雙聯學位學程:取得台北科大及辛辛那提大學二校之碩士學位。 2 、辛辛那提大學機械碩士班在美國 2014 年之排名為 60 名。 3 、費用:辛辛那提大學提供豐富的獎學金,學生費用第一學期約.
Internet Technology Laboratory Department of Computer and Communication Kun Shan University  官方網站:
1 94 學年度碩士班新生座談. 2 李之中 Chi-Chung Lee Assistant professor Department of Information Management, Chung Hwa University Office : M302-1 Phone : 03- coming.
Introduction to Computer Science Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan ( 台大資訊工程系.
12.1 Future Business Plans 未來公司的計劃 12.2 News Article: Global Green Energy 全球環保的能源.
103-1 教育部提升外語計畫 [ 全校職場專業英語簡報競賽 ] [ 題目 ] 明新科技大學 [ 科系 ] [ 班級 ] [ 姓名 ]
The Imitation Game Kun-Mao Chao Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan A note.
2016/6/91 TWNIC 委辦 DNSSEC 測試計畫 國立中央大學電算中心 103/01/09.
十月一日是國慶 qing\ 節。 Level 2 第一課 開學 New exercises online Character analysis Character differentiation.
Online Courses A note given in BCC class on May 10, 2016
A CMOS Biosensor System-on-Chip for Mobile Applications
Turing Award A note given in BCC class on March 7, 2017
A note given in BCC class on March 15, 2016
CS 380: Artificial Intelligence
The Largest Known Prime Number
Turing Award A note given in BCC class on April 10, 2018
CSCE 190 Computing in the Modern World Judea Pearl ACM A. M
Turing Award A note given in BCC class on March 20, 2013
The Theory of Computation
Facebook’s WhatsApp Purchase
Space-Saving Strategies for Computing Δ-points
Space-Saving Strategies for Analyzing Biomolecular Sequences
Turing Award A note given in BCC class on March 28, 2019
Ronald L. Rivest MIT ShafiFest January 13, 2019
Trees Kun-Mao Chao (趙坤茂)
Great Moments of Theory at UC Berkeley (visit day edition)
Presentation transcript:

Turing Award A note given in BCC class on April 23, 2014 Kun-Mao Chao (趙坤茂) Department of Computer Science and Information Engineering National Taiwan University, Taiwan A note given in BCC class on April 23, 2014

計算機科學大事紀 西元1937年 亞蘭杜林(Alan Turing)提出了杜林機(Turing Machine)的概念 Alan Turing在二次大戰時設計, 破解了德國的Enigma密碼

Turing Award Nobel prize in computer science ACM's most prestigious technical award is given to an individual selected for contributions of a technical nature made to the computing community. The contributions should be of lasting and major technical importance to the computer field 西元1966年開始

Turing Award Donald Knuth 1974 Steven Cook 1982 Ken Thompson & Dannis Ritchie 1983 John E. Hopcroft 1986 姚期智院士在西元2000年時, 獲頒Turing Award (唯一華人得主) Vinton G. Cerf and Robert E. Kahn (TCP/IP;Fathers of the Internet) 2004 Judea Pearl (Bayesian networks) 2011 Shafi Goldwasser and Silvio Micali 2012

Alan Turing & Me 這是我在美國數學學會的族譜 Alan Turing H.A. Newton  E.H. Moore (1885 Yale Univ.)  Oswald Veblen (1903 U. of Chicago)  Alonzo Church (1927 Princeton)  Bob Ritchie (1961 Princeton)  Webb Miller (1968 Washington)  Kun-Mao Chao (1993 Penn State) 這是我在美國數學學會的族譜 http://www.genealogy.ams.org/html/id.phtml?id=84608 Alan Turing

John E. Hopcroft 2012/12/22

Turing Award 2012 (announced on March 13, 2013) Shafi Goldwasser and Silvio Micali CSAIL, MIT Source: MIT News

The Pioneering Work of Goldwasser and Micali They were credited for “revolutionizing the science of cryptography” and developing the gold standard for enabling secure Internet transactions. probabilistic encryption the simulation paradigm demonstrating a system’s security the idea of “zero-knowledge” proofs Source: MIT News

“I am very proud to have won the Turing Award,” Goldwasser says “I am very proud to have won the Turing Award,” Goldwasser says. “Our work was very unconventional at the time. We were graduate students and let our imagination run free, from using randomized methods to encrypt single bits to enlarging the classical definition of a proof to allow a small error to setting new goals for security. Winning the award is further testimony to the fact that the cryptographic and complexity theoretic community embraced these ideas in the last 30 years.” Source: MIT News

“I am honored by this recognition and thankful to the computer science community,” Micali adds. “As graduate students, we took some serious risks and faced a few rejections, but also received precious encouragement from exceptional mentors. I am also proud to see how far others have advanced our initial work.” Source: MIT News

Turing Award 2013 (announced on March 18, 2014) Leslie Lamport Microsoft Research

Leslie Lamport A pioneer in distributed systems Comments from his colleagues His writings The Seattle Times

LaTeX TeX by Donald Knuth & LaTeX by Leslie Lamport I wrote two books and edited one using LaTeX.