Pathways 2024 participants

Computing for all

We combine Computer Science, Statistics, Data Science, and Cybersecurity to enhance multidisciplinary learning and research for undergrads and grads. Cross campus and industry collaborations involve faculty, students, scientists, artists, health care researchers, historians, and engineers.

Undergraduate & Graduate Courses

See our courses in Computer Science, Statistics, Data Science, and Cybersecurity ranging from computing foundations to theory and statistics to systems and artificial intelligence.

courses

Announcements

  • Orit Shaer [Talk] Orit Shaer: Tangible, Embodied, and AI-Augmented Interaction for Work and Learning (10/14/2025) - When: Friday, October 24, 3:00 PM Where: Tyler 055 Abstract: For several decades, tangible and embodied interaction (TEI)—human-computer interaction that engages our bodies and physical environment—has been the topic of intense research. My recent book Weaving Fire into Form: Aspirations for Tangible and Embodied Interaction (Spring 2022, ACM Books), co-authored with Brygg Ullmer, Caroline Hummels, […]
  • Ritambhara Singh [Talk] Rithmbhara Singh: Spatial and temporal modeling of single-cell gene expression using deep learning (10/3/2025) - When: Friday, October 17, 3:00 PM Where: Tyler 055 Abstract: Our current understanding of the regulation of cells is akin to solving a jigsaw puzzle. Many genomic factors governing cell development have been identified, resulting in vast data collection efforts. For example, obtaining single-cell-level spatial DNA organization or gene expression measurements at a continuous time […]
  • Daniel Votipka [Talk] Daniel Votipka — Vulnerability Discovery for All: A Human-Centric Approach to Software Vulnerability Discovery (9/30/2025) - When: Friday, October 10, 3:00 PM Where: Tyler 055 Abstract: Software vulnerabilities persist as an important and costly challenge. Significant effort has been exerted toward automatic vulnerability discovery, but human intelligence generally remains required, and will remain necessary for the foreseeable future. Unfortunately, the pool of experts qualified to perform vulnerability discovery is small and […]
more