<node id="582820">
  <nid>582820</nid>
  <type>news</type>
  <uid>
    <user id="30267"><![CDATA[30267]]></user>
  </uid>
  <created>1476904598</created>
  <changed>1505738478</changed>
  <title><![CDATA[Turing Award Winner to Discuss Mind-Based Computation at ARC-IISP Distinguished Lecture]]></title>
  <body><![CDATA[<p>Having trouble remembering all of your passwords? Then you&rsquo;ll want to attend the ARC-IISP Distinguished Lecture October 27 with Turing Award recipient&nbsp;and internationally renowned computer scientist <a href="http://amturing.acm.org/award_winners/blum_4659082.cfm">Manuel Blum</a>.</p>

<p>The <a href="http://arc.gatech.edu/">Algorithms and Randomness Center</a>&nbsp;(ARC) and the <a href="http://iisp.gatech.edu/">Institute for Information Security and Privacy</a> are hosting Blum who will present a lecture titled, &ldquo;<a href="http://www.cc.gatech.edu/calendar/day/2016/10/27/19985" target="_blank">Human Computation with an Application to Passwords</a>.&rdquo; The event begins at 11 a.m. in room 1443 of the Klaus Building.</p>

<p>During his presentation Blum, who serves as the Bruce Nelson Professor of Computer Science at Carnegie Mellon University, will explore documented facets of long- and short-term human memory that have implications on what people can and cannot remember.</p>

<p>With this, Blum will then share his insights into how people &ndash; working only in their minds &ndash;can &ldquo;transform website names into random-looking passwords that are provably hard to forge.&rdquo; Although creating and remembering online passwords is a focus, Blum&rsquo;s notions also apply to other problems that people might want to solve in their heads such as solutions for speed chess, crossword puzzles, cryptographic problems, and other analytical challenges.</p>

<p>Blum will greet attendees prior to the lecture during a 30-minute reception, which begins at 10:30 a.m.</p>

<p>Blum is recognized as a pioneer in the field of theoretical computer science. Throughout his career his research has focused on the single unifying theme of finding positive, practical results of living in a world where computational resources are restricted.</p>

<p>A member of numerous science and computing organizations, such as the National Academy of Sciences and the Institute of Electrical and Electronics Engineers, Blum has received several awards. These include a University of California at Berkeley Distinguished Teaching Award, their Faculty Research Award, the Sigma Xi&rsquo;s Monie A. Ferst Award, and the Carnegie Mellon Herbert A. Simons Teaching Award.</p>

<p>Blum&rsquo;s lecture is part of a unique back-to-back presentation. He and <a href="http://www.scs.gatech.edu/news/582709/renowned-computer-scientist-lenore-blum-present-annual-imlay-lecture">Professor Lenore Blum</a>&nbsp;are both speaking at Georgia Tech on October 27. Lenore Blum will present the Georgia Tech College of Computing&rsquo;s annual John P. Imlay Jr. Distinguished Lecture on at 5 p.m. The&nbsp;Blum&#39;s are married and both are MIT alumni.</p>

<p><strong>About The Institute for Information Security and Privacy</strong></p>

<p>The Institute for Information Security and Privacy (IISP) at Georgia Tech connects government, industry, and academia to solve the grand challenges of cybersecurity. As a coordinating body for nine information security labs dedicated to academic and solution-oriented applied research, the IISP leverages intellectual capital from across Georgia Tech and its external partners to address vital solutions for national security, economic continuity, and individual safety.</p>

<p><strong>About The </strong><strong>Algorithms and Randomness Center</strong></p>

<p>Algorithms and Randomness Center (ARC) is charged with identifying problems with natural connections to algorithms and randomness. As part of this think tank, professors, researchers and students not only devise, extend and solidify theories of algorithms, they create practical solutions for scientists here at Georgia Tech and around the world.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2016-09-19T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[1995 Turing Award Winner Manuel Blue will present his latest insight regarding mind-based computation during the 2016 ARC-IISP Distinguished Lecture]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[devin.young@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Devin M. Young,</p>

<p>Communications Assistant</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
          <item>50876</item>
          <item>50877</item>
          <item>70263</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Special Events and Guest Speakers]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Digital Media and Entertainment]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>133</tid>
        <value><![CDATA[Special Events and Guest Speakers]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>143</tid>
        <value><![CDATA[Digital Media and Entertainment]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
          <item>50876</item>
          <item>50877</item>
          <item>70263</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
          <item><![CDATA[School of Interactive Computing]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
          <item><![CDATA[ARC]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1051</tid>
        <value><![CDATA[Computer Science]]></value>
      </item>
          <item>
        <tid>4265</tid>
        <value><![CDATA[ARC]]></value>
      </item>
          <item>
        <tid>166940</tid>
        <value><![CDATA[SCS]]></value>
      </item>
          <item>
        <tid>166941</tid>
        <value><![CDATA[School of Computer Science]]></value>
      </item>
          <item>
        <tid>172515</tid>
        <value><![CDATA[Human-Computation]]></value>
      </item>
          <item>
        <tid>10419</tid>
        <value><![CDATA[passwords]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
