Tag Archive: CCC

Embedded Security Workshop

The Cybersecurity Taskforce of the CCC proposes to hold an “embedded security” visioning workshop co-located with USENIX Security in Baltimore on August 13, 2018.

Workshop on Quantum Computing

While it has been known for some time that quantum computers could in principle solve problems that are intractable on today’s supercomputers such as breaking public key cryptography and solving hard computational chemistry problems, the field of quantum computing is still at an early stage. Recent progress in realizing small scale quantum computers is encouraging and these devices may scale up further in the near future. However, currently, only very few opportunities exist to bring quantum computing experts together with experts from other computer science fields with much to offer: programming languages, compiler design, computer architecture, and design automation in an exchange of ideas.

CCC at AAAS

The Computing Community Consortium (CCC) has attended and hosted sessions at the American Association for the Advancement of Science (AAAS) Annual Meeting since 2013. AAAS is the world’s largest multidisciplinary scientific society dedicated to advancing science for the benefit of all people.Below you can find information about CCC participation during each year and links to slides, resources, and related CCC white papers.

Sociotechnical Interventions for Health Disparity Reduction: A Research Agenda

In this cross-disciplinary workshop, we will bring together leading researchers in computing, health informatics, and behavioral medicine to develop an integrative research agenda regarding sociotechnical interventions to reduce health disparities and improve the health of socio-economically disadvantaged populations. As part of these discussions, approaches for guarding against unintended consequences of general interventions will also be explored. To do so, this workshop will focus on integrating insights and findings from each of these fields, identifying gaps in understanding between fields, and surfacing opportunities for future interdisciplinary research to address relevant challenges.

Digital Computing Beyond Moore’s Law

The historical increases in computing performance and reductions in power consumption, size, weight and cost of computing devices are ingrained in the fabric of the research community. These improvements have fueled innovation across scientific domains, health, industry, and government. But clock speeds have been relatively flat for over a decade and current transistor scaling will be reaching limits that are both technological and economic over the next decade. While alternative models of computation are being explored, including quantum and neuro-inspired, digital computing will remain the dominant computational technology for the foreseeable future.

Computing Research: Addressing National Priorities and Societal Needs 2017

Over the past 11 years, the Computing Community Consortium has hosted dozens of research visioning workshops to imagine, discuss, and debate the future of computing and its role in addressing societal needs. The second CCC Computing Research symposium draws these topics into a program designed to illuminate current and future trends in computing and the potential for computing to address national challenges.

Leadership in Science Policy Institute

The Computing Research Association’s Computing Community Consortium offers its Leadership in Science Policy Institute to educate computing researchers on how science policy in the U.S. is formulated and how our government works. LiSPI features presentations and discussions with science policy experts, current and former Hill staff, and relevant agency and Administration personnel about mechanics of the legislative process, interacting with agencies, advisory committees, and the federal case for computing.

Sociotechnical Cybersecurity Workshop 2

Information and Communications Technology (ICT) has taken a central role in modern society. Unfortunately, malicious hackers and cybercrime have become a stubborn and expensive part of the ICT landscape. This has made providing cybersecurity a defining challenge for our era. Many strategic plans and National Academies of Sciences (NAS) studies have been written, and billions of dollars have been spent on the development and deployment of innovative cybersecurity solutions, but our network infrastructure, devices and organizations are increasingly insecure against threats.