{"id":45,"date":"2025-11-26T20:59:27","date_gmt":"2025-11-26T20:59:27","guid":{"rendered":"http:\/\/cwit.ca\/2026\/?page_id=45"},"modified":"2026-05-07T16:13:07","modified_gmt":"2026-05-07T16:13:07","slug":"plenary-speakers","status":"publish","type":"page","link":"http:\/\/cwit.ca\/2026\/index.php\/plenary-speakers\/","title":{"rendered":"Keynote Speakers"},"content":{"rendered":"\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"748\" src=\"http:\/\/cwit.ca\/2026\/wp-content\/uploads\/2025\/11\/Natasha2.jpg\" alt=\"\" class=\"wp-image-53 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p><strong>Natasha Devroye<\/strong>, University of Illinois Chicago<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Title:&nbsp;<\/strong>Can We Learn from Learned Error-Correcting Codes?<\/p>\n<\/blockquote>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>A recent line of work has emerged that uses machine learning \/ AI to learn the encoders and\/or decoders of error-correcting codes. This is often done for AWGN channels in both the forward error correction and feedback settings. Do these codes learn dramatically new non-linear codes? When or why might they outperform model-based or algorithmically designed codes? This talk will survey recent trends in learned error-correcting encoders, present open problems, and outline some of my work on &#8220;interpreting\u2019\u2019 a few such codes.&nbsp; Our interpretations can sometimes approximate the encoders and\/or decoder black boxes, offer insights into training, lead to orders-of-magnitude reductions in the number of involved parameters, and provide an understanding of how error correction is performed.&nbsp; However, can we actually learn something new from these learned codes?<\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"215\" height=\"296\" src=\"http:\/\/cwit.ca\/2026\/wp-content\/uploads\/2025\/11\/Olgica.png\" alt=\"\" class=\"wp-image-48 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p><strong>Olgica Milenkovic, University of Illinois Urbana\u2013Champaign<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Title:&nbsp;E<\/strong>rror-Correction for Nanopore Readouts: From Contextual Deletions to Substring Permutations<\/p>\n<\/blockquote>\n<\/div><\/div>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>The problem of designing codes for deletion- and permutation-error correction has received renewed interest due to applications in DNA-based data storage systems that use nanopore sequencers as readout \u00a0platforms. In almost all instances, these errors are assumed to be imposed independently of each other and of the sequence context. Such assumptions are not valid in practice because nanopore errors tend to occur within specific contexts and are caused by system implementation issues. We introduce two new problems to address these issues, pertaining to contextual nanopore deletion-error correction and intra-substring permutation error-correction. In the former case, we assume that single deterministic deletions follow (complete) runlengths of length exceeding some predefined threshold. Our results in this case include both bounds on the rate of the code and code constructions, based on forbidden-substring encoding, string correlations and generalizations of VT codes. In the latter case, we assume that symbols in one or more nonoverlapping substrings of a string can undergo arbitrary or cyclic permutations. The results highlight the redundancy reductions of permutation-correction codes compared to well-known burst correction codes such as Fire codes, the proofs of which rely on probability concentration arguments.<br><\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"495\" src=\"http:\/\/cwit.ca\/2026\/wp-content\/uploads\/2025\/11\/Henry2.jpg\" alt=\"\" class=\"wp-image-52 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p><strong>Henry Pfister<\/strong>, Duke University<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Title:&nbsp;Diffusion Models Through the Lens of Information Theory<\/p>\n<\/blockquote>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Diffusion models have become a dominant paradigm in generative modeling. Their connection to information theory has been noted with increasing frequency since their introduction in 2015 and has recently come into sharper focus. They are typically described in terms of a forward-backward paradigm, where a forward process dissipates information by passing a sample through a family of noisy channels, and a backward process reverses this evolution in distribution via Bayes\u2019 rule. In this talk, I will connect this perspective to classical information-theoretic conservation laws such as EXIT, GEXIT, and I-MMSE, which were developed by our community in the 2000s. In the ideal setting, with known distributions and optimal estimators, these conservation laws hold exactly and lead to equivalent information measures across a broad class of degraded channel paths. In the data-driven setting, the relevant tools are conservation laws for mismatched estimation, and performance is limited by estimation error stemming from limited training data and restricted model capacity. The interaction between the channel family, approximation error, and overall performance then becomes more subtle. Our viewpoint unifies masked and Gaussian diffusion within a common framework and clarifies what happens in practical regimes, where learned denoisers are not matched to the true posteriors. The resulting picture helps explain why some channel paths are better than others in practice, even when they are equivalent in the ideal setting.<br><\/p>\n<\/details>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1090\" height=\"1472\" src=\"http:\/\/cwit.ca\/2026\/wp-content\/uploads\/2025\/11\/Yury2.jpg\" alt=\"\" class=\"wp-image-54 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p><strong>Yury Polyanskiy<\/strong>, MIT<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Title:&nbsp;Quantization for LLMs and Matrix Multiplication<\/p>\n<\/blockquote>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Abstract<\/summary>\n<p>Modern AI is built on a single computational primitive \u2014 matrix multiplication \u2014 which consumes the majority of its time and energy. One way to reduce this cost is to lower the precision of the operands, decreasing both communication and arithmetic overhead. In this talk I will describe the information-theoretic tradeoffs that arise in quantized matrix multiplication, and show how information-theoretic insights enable the design of more efficient algorithms for quantizing real-world LLMs down to 2-4 bits per parameter without significant loss of performance.<\/p>\n<\/details>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":60,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-45","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/pages\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":9,"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/pages\/45\/revisions"}],"predecessor-version":[{"id":147,"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/pages\/45\/revisions\/147"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/media\/60"}],"wp:attachment":[{"href":"http:\/\/cwit.ca\/2026\/index.php\/wp-json\/wp\/v2\/media?parent=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}