ACM Distinguished Speakers Porgram:  talks by and with technology leaders and innovators

Computing Topic:
Web Topics
Encompasses hypermedia, World Wide Web, and other network-based approaches to modeling knowledge. See ACM's Special Interest Group, SIGWEB.

Available Speakers on this Topic


Available Lectures

  • A Digital Socioscope:
    How can Twitter data be used to study individual-level human behavior and social interaction on a global scale? This talk introduces the audience to the methods, opportunities, and challenges of using Twitter data to analyze phenomena ranging ...
  • A Transaction Model and Multiversion Concurrency Control For Mobile:
    Transaction management on Mobile Database Systems (MDS) has to cope with a number of constraints such as limited bandwidth, low processing power, unreliable communication, and mobility etc. As a result of these constraints, traditional concurre...
  • Blockchain Security, Privacy and Compliance:

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of security", or is there a set of high-risk vulnerabi...

  • Crowdsourcing for Entity-centric Information Access:
    Crowdsourcing is a novel approach used to obtain data processing at scale. In this talk I will introduce the dynamics of crowdsourcing platforms and provide examples of their use to build hybrid human-machine systems. I will then present ZenCrowd: an...
  • Cryptography and its Applications to Networking and e-Commerce:
    With the arrival of the Information Age, cryptography has grown to be an essential tool for a wide segment of networking and industry. It can be used to protect all forms of electronic communications used in everyday activities.  Cryptogr...
  • Demystifying Social Media for Marketing Needs:
    Social Media is on the rise and many SMEs are overwhelmed with the platform choices available. It takes a while to figure out which medium is best for a particular SME. This talk is directed towards determining the best possible platform for an organ...
  • Design and Adaptation for Cross-Device, Context-dependent User Interfaces:
    This course  aims to help user interface designers and developers to understand the issues involved in multi-device, context-dependent interactive applications, which can be accessed through wearable, mobile and stationary devices even exploitin...
  • Dynamic Data Replication Using Aperidoc Updates in MANET:
    Traditional replication schemes are passive in nature, and rarely
    consider the characteristics of mobile ad hoc network environment. In
    this talk, I will present three dynamic data replication schemes for
    mobile ad-hoc netw...
  • Economic Models for Data Management in Mobile P2P Computing:

    Data Management in Mobile Peer to Peer (M-P2P) systems needs dynamic data management due to mobility and fragile wireless connection connecting resource constraint devices. Traditional methods of data management and services in mobile P2P...

  • End-User Development: an Emerging Field for Empowering People:
    End-User Development is a set of methods, techniques, and tools that allow users of software systems, who are acting as non-professional software developers, at some point to create, modify or extend a software artefact  The purpose of this talk...
  • Foretold Futures from Digital Footprints: Artificial Intelligence, Behavior Prediction, and Privacy:
    For a few years, we have been developing algorithms to predict individual attributes like personality traits, political preferences, and demographics. More recently, we have shown that AI combined with social data can predict future behavior - before...
  • Functional Programming:
    Most of the mainstream languages have supported the imperative style of programming for a very long time. Functional programming has been around for a few decades but it's finally gaining popularity. What does it mean to program in the functional...
  • Inclusive Technologies:



    Nearly 1 of every 5 people either currently has a disability or will develop a one in their lifetime.  For these individuals, inability to use digital devices and servic...
  • Information Retrieval Challenge Problems:

    The Text REtrieval Conference (TREC) is a series of workshops designed to advance the state-of-the-art in information retrieval by providing the infrastructure necessary for large-scale evaluation of retrieval methodologies. Each TREC consists ...

  • Introduction to Computational Social Science:
    Due to the increasing availability of large-scale data on human behavior collected on the social web, as well as advances in analyzing larger and larger data sets, interest in applying computer science methods to address research questions in ...
  • Java 8 Lambda Expressions, the Pathway to Functional Style:
    Java 8 has been one of the most significant changes to the language. It is not simply the introduction of some new syntax, but a fundamental different way of thinking that we're used to when programming in Java. In this presentation, the author o...
  • Knowledge Representation in the Era of Deep Learning, Watson and the Semantic Web:
    A burst in optimism (and unwarranted fear) has grown around a number of technologies that are high impact and able to solve problems that have challenged AI researchers for years.  The over-enthusiasm that often follows such breakthroughs has ca...
  • LIKEs-R-Us: Analyzing LIKEs in Social Media:
    The recent dramatic increase in the usage and prevalence of social media has led to the creation and sharing of a significant amount of information in various formats such as texts, photos, or videos. When it comes to information consumption, people ...
  • Let's Get Lazy: Explore the Real Power of Streams:
    When we hear functional programming we often hear about immutability and higher-order functions. They are definitely important, but the real power of functional programming is in function composition and lazy evaluation. Using examples from Haskel, S...
  • Model-based User Interface Design: Where we are, Where we are headed:
    Model-based approaches  represent the intersection between user interface design and more systematic approaches by providing designers with the means to represent and manipulate abstractions of goal-oriented activities and interactions. ...
  • Multimodal web user interfaces. :
    Web applications are not limited to graphical interaction, they are now open to vocal, tactile, gestural, and multimodal interaction. This lecture provides an overview of these interaction modalities for web applications, mobile computing, and for mu...
  • Open Linked Data and Semantic Web: Towards the Web of Knowledge:
    What is open linked data? How is it connected with the future of the Web? In this talk, we will discuss the concept of open linked data and the advantages of creating an ecosystem for structuring, delivering and consuming data in open format. We will...
  • Reactive Programming:
    Why a new programming model? The computing platform and the demands on applications have significantly changed in the past few years. We can't be creating applications like we once did. Applications today have to be responsive, resilient, need to...
  • Service Oriented Architecture - Business Perspective:

    SOA is one software architecture methodology which highlights the need for IT and business alignment. This goes on to such an extent that senior management is supposed to be the key stakeholders in this exercise for...

  • Social Machines: The Coming Collision of Artificial Intelligence, Social Networking, and Humanity :
    As technology has increasingly brought computing off of the laptop and into our social domain, we see society more and more impacted by the interactions allowed by mobile technologies and  increasingly ubiquitous communications.  These new ...
  • Software Analytics: Data Analytics for Software Engineering :
    A huge wealth of various data exists in software life cycle, including source code, feature specifications, bug reports, test cases, execution traces/logs, and real-world user feedback, etc. Data plays an essential role in modern software development...
  • Super Humans on Demand: Software Architect and Their Role:

    Expectation from Software Architects is manifold. At times, jotting down all the responsibilities of an ideal software architect could lead to creation of awe in the mind of the readers.

    THE POWER OF SEARCH ENGINES:

    Search engines are the premier tools when it comes to finding information on the Internet. Newer technological developments show how search is changing from the query-results paradigm to search as an underlying technology for a great variety o...
  • Talking to Computers - A Solved Problem?:
    Life would be so much easier if computers could read and understand our directions in English, talk to people, and perhaps also compose stories and poems for them. Siri and Cortana notwithstanding, this talk discusses the challenges involved in makin...
  • Teaching and Learning Programming and Software Engineering via Interactive Gaming :
    Pex4Fun (http://www.pex4fun.com/) and Code Hunt (https://www.codehunt.com/), released by Microsoft Research, offer a web-based educational gaming platform for teaching and learning programming and software engineering. Such platform can be used to te...
  • Text Analytics for Mobile App Security and Beyond :
    Mobile apps are accompanied by a rich amount of natural language text: app descriptions, app user reviews, update/release notes, etc. Such natural language text is essential in conveying important information about the apps (such as expected function...
  • The Age Wave:

    Are technology difficulties an inescapable fact of ageing?  Or are there factors that can equip future generations of older adults with skills that will erase or lessen these difficulties?  Globally, older a...

  • The Human Side of Cyber Security:
    Security experts often claim that people are the most unreliable part of their systems. I argue that the problem is not people behaving insecurely, but security systems that are designed with no concern for their users. More importantly, the adversar...
  • The Law of Cyberspace, Computers, and Technology:
    The presentation focuses on the emerging fields of cyberspace and computer and technology law. Included are topics such as the law of the Internet; protection of computer software and technology through copyrights, trademarks, patents, and trad...
  • The Power and Perils of Parallel Streams:
    Java 8 makes it really easy to convert a stream to a parallel stream, to run tasks concurrently. When come thing is that easy we tend to ask "what's the catch" and that's a very important question. Just because it's easy does no...
  • The Power of Big Data:
    More and more data is being generated around us by every activity we do in our daily life. Such large amounts of data are changing the way we do things and are used to make data-driven decisions by companies and organisations. From mobile phones, wea...
  • The Semantic Web:
    For more than a decade now, the Semantic Web community has been listening to one critic after another explain why the technology will not work.  The good news is that we have now exceeded the expectations of all of our early critics, and the tec...
  • The Text REtrieval Conference:
    The Text REtrieval Conference (TREC) project at the National Institute of Standards and Technology has created standard test sets and evaluation methodology to support the development of methods for content-based access to material structured ...
  • The Web: A Nostalgic View of the Past and Informed Hopes for the Future:
    This lecture draws upon the speaker’s 30-year love affair with WWW technology – from his first exposure at CERN in 1989 and the first US Web site at SLAC in 1991 to his current involvement with Web Science, the Semantic Web, and the Web O...
  • The role of automatic tool support in usability and accessibility evaluation of Web applications:
    Evaluation is an increasingly important part of the user interface design process. However, evaluation can be expensive in terms of time and human resources, and automation is therefore a promising way to augment existing approaches. This talk...
  • The upward and downward links between credibility, trust and authority:
    The Internet and its main tools (Google, Wikipedia, Facebook, Tweeter) deeply raise and renew fundamental questions, that everyone asks almost everyday: Is this information or content true? Can I trust this author or source? These questions are not n...
  • Troubles in Deciding?  How Recommender Technology Can Help Consumers Choose:
    As online stores offer practically an infinite shelf space, recommender systems are playing an increasingly important role in helping users search and discover items that they truly want. But are they also helping them make better decisions? ...
  • Twelve Ways to Make Code Suck Less:
    The quality of the code we create has a significant impact on our ability to change the software in the future. As programmers succumb to time and deliver pressures, the quality of code may get neglected. The code then becomes hard to maintain and th...
  • Understanding Ontologies and Ontology Engineering:
    Computer science borrows the term ontology from a branch of philosophy (metaphysics) that studies the nature of “being” and “existence.” For philosophers, ontology aims at explaining all things in the world by systematically e...
  • User-Centric Social Multimedia Computing:
    Social multimedia has three fundamental elements of user, multimedia content and interaction. Social multimedia computing aims to connect user and multimedia content by analyzing the interaction, and accordingly address three problems of multimedia c...
  • Using Social Media Data Mining for Social Causes:
    There is a hell of a lot of data available on Social Media. Simultaneously, there has been rise of crises situations across the world. Social Media can play a vital role in contributing positively without invading into private arenas of indivi...
  • Using Social Media for Health Studies:
    Given that users share all kinds of minutiae on social media, can this noisy, crowd-sourced data be used for health studies? This talk presents a number of recent examples that show the feasibility of using social media to study health both at...
Featured Speaker


Keith Cheverst
Lancaster University

Get Involved!
Help improve the DSP by nominating a speaker or providing feedback to ACM.