401. | Probabilistic Latent Variable Decompositions for Image and Audio Analysis | 1:32:05 | |
|
402. | Differential Privacy - Lecture 4 | 1:32:01 | |
|
403. | Learnings from Human Perception | 1:32:00 | |
|
404. | Challenges in Geo-Distributed Data Center and Application Design | 1:31:59 | |
|
405. | Control Theory and Computing: An unconsummated union | 1:31:58 | |
|
406. | The Linear Algebraic Structure of Word Meanings | 1:31:56 | |
|
407. | The Linear Algebraic Structure of Word Meanings | 1:31:56 | |
|
408. | Model Compression | 1:31:55 | |
|
409. | Subset Selection Problems - Part 1 | 1:31:54 | |
|
410. | MSR India Research Overview | 1:31:53 | |
|
411. | Edgenet 2006 - Issues in Enterprise Networks | 1:31:53 | |
|
412. | Virtual Goods, Real Pleasure: Game Mechanics and Virtual Economies | 1:31:53 | |
|
413. | Inventing Virtual Reading Teachers and Virtual Speech Therapists | 1:31:51 | |
|
414. | The Future of Reading, Writing + Scholarship | 1:31:50 | |
|
415. | Cloud Futures -- Talk 4 | 1:31:45 | |
|
416. | Evolutionary Dynamics of Cooperation | 1:31:42 | |
|
417. | Visual Recognition | 1:31:39 | |
|
418. | Workforce of the Future | 1:31:36 | |
|
419. | AstroInformatics 2012: Day 3 Session 3 | 1:31:35 | |
|
420. | Advertising | 1:31:35 | |
|
421. | Envisioning Fluid Cross-Device Experiences | 1:31:34 | |
|
422. | Not All Frames Are Created Equal: Temporal Sparsity for Robust and Efficient ASR | 1:31:32 | |
|
423. | The Economics of Software Dependability | 1:31:31 | |
|
424. | Augmented and Virtual Productivity Experiences | 1:31:27 | |
|
425. | Provable Algorithms for ML/AI Problems | 1:31:26 | |
|
426. | Statistical Spoken Language Generation of Stylistic Variation | 1:31:24 | |
|
427. | Redesigning Learning: An International Research Story | 1:31:23 | |
|
428. | Leftover Hash Lemma, Revisited | 1:31:20 | |
|
429. | Abstraction Methods for Liveness | 1:31:20 | |
|
430. | Graph Drawing 2012 Day 3 - Session 1 | 1:31:19 | |
|
431. | Universal Design: How to Attract More Diverse Researchers | 1:31:18 | |
|
432. | Big Data Platforms | 1:31:16 | |
|
433. | Nanotechnology Assay Development for Environmental and Medical Applications | 1:31:15 | Vlog |
|
434. | Asynchronous & Broadcast-Efficient MPC | 1:31:14 | |
|
435. | Patent Law's Perfect Storm | 1:31:12 | |
|
436. | Systems 1 | 1:31:05 | |
|
437. | Microsoft Academic Search: Next-Generation Scholarly Discovery | 1:31:03 | |
|
438. | Approaching the end of Moore's Law: time to reinvent the system stack? Morning Sessions II | 1:31:03 | |
|
439. | The 33rd UW/MS Symposium in Computational Linguistics | 1:31:02 | |
|
440. | Engineering Performance Using Control Theory: A One Day How-To: Theory Part 2 | 1:30:59 | |
|
441. | Gender, Competitiveness and Career Choices | 1:30:58 | |
|
442. | Compiler and Microarchitectural Techniques for Leakage Power Reduction | 1:30:57 | |
|
443. | Data Science Education at the Heart of the 21st Century University | 1:30:56 | |
|
444. | Gender, Competitiveness and Career Choices | 1:30:56 | |
|
445. | Citizen Science on Windows Phone 7 Platform | 1:30:55 | |
|
446. | Managing the Rights and Usage of Digital Resources | 1:30:53 | |
|
447. | Data Storage and Processing in Parallel Array Engines | 1:30:53 | |
|
448. | An Introduction to Concentration Inequalities and Statistical Learning Theory | 1:30:52 | |
|
449. | Frontiers in Machine Learning: Machine Learning Reliability and Robustness | 1:30:52 | |
|
450. | Strategies for Enhancing Ethnic and Gender Diversity in Engineering and Computer Science | 1:30:50 | |
|
451. | Virtual Earth Summit - Session 1 | 1:30:49 | |
|
452. | Exploring Reinforcement Learning Methods from Algorithm to Application | 1:30:48 | |
|
453. | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | 1:30:47 | |
|
454. | The Simple Essence of Automatic Differentiation - Conal Elliott | 1:30:45 | |
|
455. | Cloud Security and Privacy | 1:30:45 | |
|
456. | Workshop on Quantum Algorithms and Devices - Part 2 | 1:30:44 | |
|
457. | Using Program Verification Tools in Teaching | 1:30:41 | |
|
458. | Panel: Scientific Data: the Current Landscape, Challenges, and Solutions | 1:30:40 | |
|
459. | Systems 2 | 1:30:37 | |
|
460. | Designing Adaptive Embedded Systems | 1:30:36 | |
|
461. | Explorations on Multi-lingual Neural Machine Translation | 1:30:35 | |
|
462. | Harry Shum: Faculty Summit 2014 Keynote | 1:30:34 | |
|
463. | Tactical Iraqi - how learning a foreign language can be fun on a computer | 1:30:34 | |
|
464. | Opening Keynote: Faculty Summit 2014 | 1:30:34 | |
|
465. | Opportunities for Libraries | 1:30:34 | |
|
466. | Machine Reading Using Neural Machines | 1:30:33 | |
|
467. | Engineering Performance Using Control Theory: A How-To: Control Analysis & Real world applications | 1:30:33 | |
|
468. | What We Know and What You Can Do: Learning How to Turn Gender Research into Diversity Action | 1:30:29 | |
|
469. | Digital Humanities 1: Big Archaeology / The Archive Without Walls | 1:30:27 | Vlog |
|
470. | Data Science | 1:30:24 | |
|
471. | AstroInformatics 2012: Day 2 Session 3 | 1:30:24 | |
|
472. | How To Write a Paper to Optimize its Chances for Publication Success, Part 1 | 1:30:24 | Guide |
|
473. | PANEL: Software Research Twenty Years On | 1:30:21 | |
|
474. | Extending F* in F*: Proof automation and Metaprogramming for Typeclasses | 1:30:15 | |
|
475. | Question Answering | 1:30:14 | |
|
476. | Algorithms for discovering repeated patterns and computing pitch names in music | 1:30:14 | |
|
477. | Frontiers in Machine Learning: Security and Machine Learning | 1:30:12 | |
|
478. | Is NUI 'Natural' for Scientists? | 1:30:12 | |
|
479. | The State of Techniques for Solving Large Imperfect-Information Games, Including Poker | 1:30:10 | Guide |
|
480. | Graph Drawing 2012 Day 3 - Session 3 | 1:30:09 | |
|
481. | Underestimating the challenge of cognitive disabilities (and digital literacy) | 1:30:09 | |
|
482. | Technical Computing @ Microsoft: Lecture Series on the History of Parallel Computing | 1:30:08 | |
|
483. | The Thousand Brains Theory | 1:30:07 | |
|
484. | Robust Mechanism Design | 1:30:07 | |
|
485. | Crowdsourcing Change: The Role of Computing in Tackling Major | 1:30:06 | |
|
486. | The Economics of Computing | 1:30:04 | |
|
487. | Market Design meets User Interface Design | 1:30:03 | |
|
488. | Large-scale Models of Consumer Choice and Counterfactual Inference | 1:30:02 | |
|
489. | Devices and Networking Summit - Session 8, Designing Compelling Devices | 1:30:02 | |
|
490. | LampsonFest - Bob Metcalfe, Bob Sproull, & Alan Kay | 1:30:02 | |
|
491. | Modeling high-dimensional sequences with recurrent neural networks | 1:30:02 | |
|
492. | A proof rule for multi-threaded programs | 1:30:00 | |
|
493. | Free: The Future of a Radical Price | 1:29:57 | |
|
494. | Bandwidth Allocation in TCP Friendliness and P2P Streaming | 1:29:56 | |
|
495. | Scientific Programming for Biologists (and Everyone Else) | 1:29:55 | |
|
496. | Botness 2016 - Day 2, Part 2: Unconference Session Report Backs, Afternoon Short Talks | 1:29:52 | |
|
497. | Programming Models and Systems Design for Deep Learning | 1:29:52 | |
|
498. | From Exceptional to Everyone - Microsoft's Efforts to Democratize Blended Learning | 1:29:50 | |
|
499. | Big Data and Bayesian Nonparametrics | 1:29:50 | |
|
500. | Wired Shut: Copyright and the Shape of Digital Culture | 1:29:44 | |
|