Arati M. Dixit
Qualifications: Ph.D. (major: Computer Engineering, minor: Mathematics), Wayne State University
Title: Associate Professor
Affiliation: Savitribai Phule Pune University
Contact Details: email@example.com, firstname.lastname@example.org
Short CV: Arati M. Dixit received a Ph.D. in Computer Engineering from Wayne State University, Detroit, MI, USA. She has also completed The Certificate in Scientific Computing Program from Wayne State University. She is an Alumni of IIT Bombay with M.Tech. in Computer Science and Engineering. She has done BE in Computer Engineering from University of Pune.
Currently she is an Associate Professor at the Department of Technology, Savitribai Phule Pune University. She a visiting faculty and Research & Development associate at the Department of Computer Engineering, PVPIT, Bavdhan. She has been associated with the academic profession for last 16+ years. She has published more than 80 research papers in reputed refereed national/international conferences and journals. Her areas of interest are Cyber Security, Cyber Physical Systems, Soft Computing, and High Performance Computing. She has been associated with Ph.D. students at Defence Institute of Advanced Technology and Savitribai Phule Pune University. She has been a member of Board of Studies and Research Recommendation Committees with reputed Institutes/Universities.
She is an executive council member of Association for Computing Machinery (ACM) India's ACM-W. ACM-W is ACM Council on Women in Computing. She is the Vice-Chairperson of ACM iSIGCSE(India Special Interest Group on Computer Science Education) as well as ACM Pune Professional Chapter. She is an ACM Senior Member and active ACM-W volunteer supporting and advocating full engagement of women in computing.
Title of Talk 1: Dawn of Women in Computing
Synopsis: Women were very much active members of the community contributing to the field of computing since its inception. Women have been involved with the development of historically significant technology which has created the third wave of - 'Information Age', after the first 'Agricultural Age' and second 'Industrial Age'. The talk would focus to answer few questions like: Have we heard about these women? Who were the major contributors? What have been their major contributions? Are they on the pages of history? How have they carved their names on the pages of history? The talk aims to take into account historical, social, cultural and technological perspective resulting in an impressive dawn of women in computing.
Title of Talk 2: Graph Theoretical Modeling for Engineering Problems and Systems
Synopsis: Mathematical modeling plays a significant role in solving any problem or designing a system. Some of the problems we see around can be represented as a Graph Theoretical Model, which facilitates solving them by simply proposing methodology to solve a 'graph'! As a case study Wireless and Mobile Sensor Network Reliability of Unmanned Ground Vehicles (UGV) is discussed. Taking into account the amount of data being generated to be processed, reconfigurable computing significantly improves the performance of these systems. This talk also gives insight into tools and techniques supporting reconfigurable computing.
Title of Talk 3: Cloud Computing: From Security, Privacy to Forensics Challenges
Synopsis: Cloud computing, as defined by NIST, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. However, the large pool of Cloud offered services like Data as a service, Infrastructure as a Service and many more services; has given rise to some Security, Privacy and Forensics issues. Adequate forensic competence to support investigations of cloud related criminal activities are yet to be established. A high-level discussion of these fundamental challenges and issues are covered in this talk. The Perspectives, Vision, Current State and Path Forward for Cloud Security, Privacy and Forensics are the highlights of this talk.