Qualcomm regularly hosts professors to present technical lectures to project teams at our research facilities.
|
Date
|
Title
|
University
|
Professor
|
|
4/4/2013
|
Sparse Coding in Brains and Machines, Exploiting insight from Neroscience to improve Data Analysis with sparsity Models
|
Georgia Tech
|
Christopher Rozell
|
|
3/11/2013
|
Von Neumann and Neuromorphic Systesms Astop Spontorinic and Resistive Devices
|
U of Pittsburg
|
Helen LI
|
|
3/6/13
|
Light Weight Coordination of Heterogeneous Wireless Devices
|
University of Michigan
|
Kang Shin
|
|
3/1/13
|
Efficeient Interactive 3D Reconstruction on Mobile Devices
|
Georgia Tech
|
Andrew Ziegler
|
|
2/28/2013
|
Virtual and Augemented Reality at Calit2
|
UCSD
|
Jurgen P. Schulze
|
|
2/26/13
|
|
Duke University
|
David Smith
|
|
2/15/2013
|
Getting the Best out of your Wireless Spectrum
|
Purdue
|
Xiaojun Lin
|
|
2/15/2013
|
Multi Rating Data Streaming
|
Chinese University of Hong Kong
|
Raymond Yeung
|
|
2/14/2013
|
A fresh Look at Wireless Security and Multimedia
|
University of Toronto
|
Shish Khisti
|
|
2/12/2013
|
Robust Hashing and it's Applications to Content Identification
|
UIUC
|
Pierre Moulin
|
|
2/8/2013
|
Modeling and Optimizing Heterogeneous Cellular Network Capacity
|
U of Texas, Austin
|
Jeff Andrews
|
|
2/14/2013
|
Beyond Point to Point Coding
|
UCSD
|
Young Han Kim
|
|
2/1/2013
|
Utilizing Mobile Phones in Characterizing and Leveraging Peoples Movements
|
UIUC
|
Klara Nahrstedt
|
|
1/25/2013
|
Computing with Brain Circuits
|
Duke University
|
Miguel Nicolelis
|
|
1/8/2013
|
Four Decades of Swing and Miss: Why Computer Vision Can and Must Deliver
|
University of Maryland
|
Rama Chellappa
|
|
1/7/2013
|
Real Privacy: Context and Individual Control as the path to Genuine Privacy Protection for the 21st Century
|
MIT
|
Dr. Daniel Weitzner
|
|
Date
|
Title
|
University
|
Professor
|
|
7/12/2012
|
Design and Test of FinFET Circuits and Architectures
|
Princeton
|
Prof. N. K. Jha and Ajoy Bhoj
|
|
4/20/2012
|
Comprehensive Analysis of Android Applications
|
UC Riverside
|
Michaelis Faloutsos, Julian Neamtiu
|
|
4/5/2012
|
Behavioral Detection of Malware on Mobile Handsets
|
University of Michiga
|
Kang Shin
|
|
3/30/2012
|
Systematizing and Defending Against Mobile Malware Threats
|
Xuxian Jiang
|
Dawn Song
|
|
3/20/2012
|
Smartphone Security (TBD
|
North Carolina State
|
Jiang North
|
|
Date
|
Title
|
University
|
Professor
|
|---|
|
3/28/2012
|
Mobile Phones Sensing and Study of Mobile Phone Market applications and Permisions
|
Cambridge
|
Cecilia Mascolo, Ilias Leontiadis
|
|
11/20/2011
|
Android Energy Consumption: Designer Choice, Programmer Choice and user Choice
|
Cambridge
|
Dr. Rice
|
|
7/11/2011
|
Abstractins for Comminciation systems Design
|
Cambridge
|
Dr. Dirk Trossen
|
|
5/4/2011
|
The emotional computer
|
Cambridge
|
Peter Robinson
|
|
Date
|
Title
|
University
|
Professor
|
|---|
|
3/22/2011
|
Service-Centric Networking with a New Service-Access Layer
|
Princeton
|
Mike Freedman
|
|
3/11/2011
|
Practical Considerations for Hybrid Transactional Memory
|
U. of Rochester
|
Michael Scott
|
|
2/28/2011
|
History and future of telecom revolution in India
|
CEDT
|
HS Jamidani
|
|
2/25/2011
|
Challenges in Cyberphysical Systems
|
UIUC
|
P.R Kumar
|