Robots at the End of their Tether

Friday, October 16, 2015 - 02:20 pm
Swearingen Faculty Lounge
Abstract: There are lots of practical reasons why one might attach a tether to a mobile robot (providing power from off-board sources, high-speed communication to a base-station, etc.) but, since the tether constrains the motion of the robot, doing so makes the problem of moving the robot trickier than it would be otherwise. This talk will explore the motion planning problem for a planar robot connected via a cable to a fixed point in R^2. I'll describe how to visualize the configuration space manifold for such a robot, showing that it has regularity which can be used to produce a neat representation. This representation describes the manifold via (1) a discrete structure that characterizes the cable's position (2) an element within a single continuous cell. Further, when the tether has a constraint on its curvature, I'll show how Dubins’s theory of curves can be combined with work on planning with topological constraints to concisely represent the configuration space manifold, resulting in a data-structure that facilitates search for optimal paths. Bio: Dylan Shell is a computer scientist with broad interests. He's an Associate Professor in the Department of Computer Science and Engineering at Texas A&M University, where he runs a laboratory focused on robotics and artificial intelligence. His research group aims to synthesize and analyze complex, intelligent behavior in distributed systems that exploit their physical embedding to interact with the physical world in a variety of ways. He has published papers on multi-robot task allocation, robotics for emergency scenarios, biologically inspired multiple robot systems, multi-robot routing, estimation of group-level swarm properties, minimalist manipulation, rigid-body simulation and contact models, human-robot interaction, and robotic theatre. His work has been funded by DARPA and the NSF; and he has been the recipient of the Montague Teaching award, the George Bekey Service award, and the NSF Career.

Last Lecture Series: Information, Intelligence, Cryptanalysis, and Responsibility:

Wednesday, October 7, 2015 - 07:00 pm
Gressette Room of Harper College 3rd floor.

Information, Intelligence, Cryptanalysis, and Responsibility: From Mary, Queen of Scots, to Edward Snowden

Duncan Buell Information has always been of value to governments, and governments have always tried to protect their own information and obtain that of other governments. In the Internet age, it is increasingly the case that not just government but also individual information—telephone, email, healthcare, and purchasing records--is available in a “public” sense to those organizations that have access to the communications infrastructure of the planet. There is a very legitimate need for citizens to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures. There is also a very legitimate need for the government to provide for the common defense. What we will hope to provide is a discussion of how simplistic and superficial reports are usually not enough to enable citizens to come to useful conclusions about what our national policy needs to be. We will offer no solutions and no silver bullets. But ultimately, we in this democracy are responsible for our government, and we must make not just decisions but informed decisions. These can be harder to come by when the underlying information is intentionally (and perhaps sometimes legitimately) obfuscated. Duncan Buell is a computer scientist in the Department of Computer Science and Engineering at USC, where he has served as department chair and interim dean. He has published research in number theory, parallel computation, information retrieval, and digital humanities. Prior to coming to USC as department chair in 2000, he was employed by the Institute for Defense Analyses in Maryland, conducting high performance computing and computational mathematics research in support of the National Security Agency. He is a Fellow of the American Association for the Advancement of Science and has been since 1969 a member of the American Civil Liberties Union. Part of the USC Last Lecture Series. More information.

4th Gamecock Computing Research Symposium

Friday, October 2, 2015 - 02:10 pm
Faculty lounge (1A03) of Swearingen.
In this symposium, CSE Ph.D., master and undergraduate students will give poster presentations to report their research progress. You are welcome to attend this event, hear their presentations and discuss with them on their research topics. Food/drinks will be provided.

Women in Computing - Game Night Thursday

Thursday, October 1, 2015 - 07:00 pm
Swearingen 3A75
Come join WiC for a fun evening of games! Take a quick study break to hang out and meet other students in computing at USC. We'll be bringing some of our favorite board games (Apples to Apples, Settlers, Taboo) and feel free to bring your own! And as always, pizza will be provided! All are welcome to join (not just women)! Please RSVP via the link below. When: Thursday, October 1st at 7:00 pm Where: Swearingen 3A75 https://www.facebook.com/events/917449478309225/

SC Engineering Grads Making a Dent In Films and Video Games

Tuesday, September 29, 2015 - 07:00 pm
Amoco Hall
Follow the path of two USC computer engineering students as they move from undergraduates to founding a company through USC's technology incubator. After mixed success with various products and services, the company creates a software product called SpeedTree, which is used by hundreds of game developers including EA, Ubisoft, Activision, Bungie, Microsoft, and Sony. SpeedTree then migrates to the visual effects industry and is used in more than 50 feature films and 30 television productions, earning its developers a technical Academy Award. Engineering and career lessons learned over their 15-year entrepreneurial journey will be shared from the perspective of someone who was right where you are just 20 short years ago.
Chris King helped found Interactive Data Visualization Inc. and developed SpeedTree, software that helps create the rich environments in movies and video games. Speedtree's original success in video games was with the company's work on The Elder Scrolls IV: Oblivion, and later it debuted in the film industry with Avatar. King and his colleagues have gone on to receive a Technical Achievement Award at the February 2015 Academy Awards, and continue to develop, support, and promote their software throughout the industry. Talk sponsored by

History and Prospects for the Center for Computational Robotics

Friday, September 25, 2015 - 11:30 am
Swearingen 3A75
Prof. Michael N. Huhns Abstract: The Center for Computational Robotics is the outgrowth of two previous research Centers, all with the goal of advancing the capabilities of physical and information systems. The activites of the previous centers can provide a context and perspectives that set the directions for the new Center. This seminar will describe these directions and outline the disciplines needed: from mechanics to ethics. Drs. Jason O’Kane, Yiannis Rekleitis, and Jenay Beer are excited to announce the forming of the Center for Computational Robotics (CCR). We are kicking off a monthly CCR seminar brownbag series this Friday 9/25 from 11:30am-12:30pm. Speaker Prof. Mike Huhns will discuss the history of the Center (formally Center for Information Technology), and we will hold a discussion about the directions for the new research focus. Please join us in Swearingen 3A75

Resume Workshop

Wednesday, September 16, 2015 - 06:45 pm
2A31 of Swearingen
ACM and WiC are hosting a Resume Workshop next Wednesday, September 16th, at 6:45pm in 2A31 of Swearingen. In order to have enough pizza for everyone, we are asking for people to RSVP on Facebook at: https://www.facebook.com/events/1480529815581991/ Below is some information provided by our guest speaker, David Grim: Last year everyone had fun and learned lots. Based on last year’s experience, below is an overview of what your members can expect: Ca$h prize$ - Some prizes will be awarded for:
  • Signing in (Name, CELL #, GMAIL ADDRESS)
  • Resume - Bring or email résumé (David@AllenAssociates.net)
  • Answering questions. (Hint – for repeat attendees we will ask some of the same questions))
  • Looking into the salary crystal ball. What can you expect to earn 5 & 10 years from graduation.
Like last year we will offer résumé ideas on what has worked in the past including:
  • Tips that will get the attention of the BEST companies.
  • Information Technology résumé formatting (It is different than a standard résumé. What works for a French major is different than for I.T., oui vs wii)
  • Information Technology résumé content (We have proven methods that will improve responses from hiring companies.)
  • Cover Letters (Our approach will save I.T. folks time.)
  • Thank you letters (Our approach will save I.T. folks time.)
  • Planning for success in the interview process.
  • What is a GUARANTEED interview question?

Women in Computing Meeting: Learn about internships!

Thursday, September 10, 2015 - 07:00 pm
Swearingen room 2A14/2A16
Did you have a really cool internship this summer? Maybe you did cutting-edge research, or went to a tech conference? We want to hear about your summer! Women in Computing is hosting Summer Rehash, where you can give a flash talk about your summer experience and hear about what your classmates accomplished. As always, pizza is provided! All are welcome. For those students who have never interned before, this will be a great chance to learn about various opportunities! When: Thursday, September 10th at 7:00 pm Where: Location TBD RSVP: https://www.facebook.com/events/1491987947783407/ Sign up to talk: http://goo.gl/forms/lh9xKWLzuQ Check out the Speaker Guidelines: http://bit.ly/1XroX5g