2016-09-07 | Hadoop Architecture and its usage at Facebook | 1:09:22 | 2,204 | |
|
2016-09-07 | 2009 eScience: Performing Science in the Cloud: A Haplotype Phasing Case Study | 33:46 | 73 | |
|
2016-09-07 | 2009 eScience: Generalized eScience Collaboration through Sharepoint | 31:07 | 3 | |
|
2016-09-07 | 2009 eScience: Collaborative Data Analysis with Taverna Workflows | 25:45 | 123 | |
|
2016-09-07 | 2009 eScience: Understanding and Maturing the Data-Intensive Scalable Computing Storage Substrate | 25:50 | 14 | |
|
2016-09-07 | 2009 eScience: Integrating Streaming Data and Semantic Repositories | 24:05 | 10 | |
|
2016-09-07 | 2009 eScience: The Vedea Visualization Language | 30:33 | 171 | |
|
2016-09-07 | Growth and Phase Transitions in Isolated and Interacting Networks | 1:21:13 | 147 | |
|
2016-09-07 | Woodland Park brings the Zoo to you! - Giving Campaign Presentation | 56:34 | 25 | |
|
2016-09-07 | 2009 eScience: Provenir ontology: Towards a Framework for eScience Provenance Management | 34:40 | 29 | |
|
2016-09-07 | 2009 eScience: Facilitating Next Generation Data Intensive Science using Semantic Technologies | 29:24 | 19 | |
|
2016-09-07 | Replica Symmetry and Combinatorial Optimization | 59:03 | 630 | |
|
2016-09-07 | 2009 eScience: Web Service Extension of Computational Biology Application Suite | 37:23 | 20 | |
|
2016-09-07 | 3D Geographical Environments & Geospatial Data Exploration using Flight Simulators and Geodatabases | 26:56 | 46 | |
|
2016-09-07 | 2009 eScience: Towards complete functional and structural imaging of cortical circuits | 31:58 | 12 | |
|
2016-09-07 | 2009 eScience: Data Intensive Scalable Computing: Applying Google-Style Computing to eScience | 19:09 | 29 | |
|
2016-09-07 | 2009 eScience: Tools and Techniques for Computational Biology | 16:27 | 96 | |
|
2016-09-07 | 2009 eScience: Listening to Nature: Acoustic Monitoring of the Environment | 29:57 | 75 | |
|
2016-09-07 | UW/Microsoft 19th Quarterly Symposium in Computational Linguistics | 1:25:20 | 201 | |
|
2016-09-07 | 2009 eScience: Scaling Simulations Through Declarative Processing, | 31:27 | 11 | |
|
2016-09-07 | 2009 eScience: Author identity and social networking at arXiv | 26:06 | 12 | |
|
2016-09-07 | 2009 eScience: Simple Provenance in Scientific Databases | 22:10 | 50 | |
|
2016-09-07 | The Laws of Disruption: Harnessing the New Laws of Disruption that Govern Life and Business | 1:10:08 | 68 | |
|
2016-09-07 | Generating Intelligent Multimedia Presentations from Semantic Mashups using OAI-ORE and SMIL | 33:02 | 71 | |
|
2016-09-07 | 2009 eScience: Enhancing BLAST Comprehension with SilverMap | 21:24 | 5 | |
|
2016-09-07 | Comparing Mechanisms by their Vulnerability to Manipulation | 1:24:27 | 85 | |
|
2016-09-07 | 2009 eScience: Scalable Solution for a Comprehensive Appraisals of Contemporary Documents | 24:19 | 5 | |
|
2016-09-07 | 2009 eScience: Comment by Sketch: A picture says a million words | 19:11 | 7 | |
|
2016-09-07 | The History of Uranium | 48:36 | 3,310 | |
|
2016-09-07 | 2009 eScience: Software Support for Hybrid Computing | 25:12 | 9 | |
|
2016-09-07 | 2009 eScience: Computational Methods for Large Scale DNA Data Analysis | 14:21 | 32 | |
|
2016-09-07 | 2009 eScience: Tools for Scalable Genome Haplotying in the Windows Azure Cloud | 16:30 | 17 | |
|
2016-09-07 | Programmers and the Web: Understanding and Supporting DevelopersΓÇÖ Use of Online Resources | 1:03:56 | 108 | |
|
2016-09-07 | Economics Meets UI Design: Toll Bridge Pricing and P2P Backup Markets | 1:17:21 | 62 | |
|
2016-09-07 | Touch , Tabletop, and Tangible Blocks | 57:36 | 60 | |
|
2016-09-07 | Connected: The Surprising Power of Our Social Networks and How They Shape our Lives | 1:16:56 | 71 | |
|
2016-09-07 | Control Theory and Computing: An unconsummated union | 1:31:58 | 713 | |
|
2016-09-07 | Particle Packing Problems for Fun and Profit | 1:10:52 | 181 | |
|
2016-09-07 | Position-based Cryptography [1/2] | 44:52 | 453 | |
|
2016-09-07 | Improving diagramming software usability with automatic routing and placement tools | 56:07 | 90 | |
|
2016-09-07 | Enhancing Cloud SLA with Security: A secure, Searchable, and Practical Cloud Storage System | 1:00:55 | 245 | |
|
2016-09-07 | Contracting with Asymmetric Externalities | 58:08 | 52 | |
|
2016-09-07 | Elections and Strategic Voting: Condorcet and Borda | 1:42:35 | 243 | |
|
2016-09-07 | Building Systems That Enforce Measurable Security Goals | 1:28:55 | 45 | |
|
2016-09-07 | Conjunctive Grammars and Synchronized Alternating Pushdown Automata | 1:12:22 | 220 | |
|
2016-09-07 | Borrowing Brilliance: The Six Steps to Business Innovation by Building on the Ideas of Others | 1:00:54 | 2,007 | |
|
2016-09-07 | Automated reasoning in non-classical logics with the polarized inverse method | 1:07:01 | 311 | Vlog |
|
2016-09-07 | Where computer vision needs help from computer science | 1:23:57 | 96 | Let's Play |
|
2016-09-07 | Parallel Programming with Chorus | 1:05:12 | 79 | |
|
2016-09-07 | Seeing Software | 52:31 | 103 | |
|
2016-09-07 | Efficient and Effective File Replication and Consistency Maintenance in P2P Systems | 1:08:28 | 475 | |
|
2016-09-07 | Where to Go: Interpreting Natural Directions Using Global Inference | 56:16 | 44 | |
|
2016-09-07 | Algorithms Meet Art, Puzzles, and Magic | 1:32:51 | 79 | |
|
2016-09-07 | Free: The Future of a Radical Price | 1:29:57 | 198 | |
|
2016-09-07 | Provably-Efficient Adaptive Scheduling with Parallelism Feedback | 1:09:09 | 143 | |
|
2016-09-07 | Personal Health Information among Competing Public Goods | 1:12:32 | 21 | Guide |
|
2016-09-07 | Model-Checking Modulo Theories: Declarative Framework and Pragmatic Issues | 1:10:56 | 102 | |
|
2016-09-07 | Theory Tea Meeting Talk: On Local Dynamics for Two Equilibrium Concepts | 53:09 | 40 | |
|
2016-09-07 | Finding Loop Invariants Using a Theorem Prover | 51:25 | 1,392 | |
|
2016-09-07 | Bandwidth Allocation in TCP Friendliness and P2P Streaming | 1:29:56 | 171 | |
|
2016-09-07 | Improving the Development of Interactive Software Through New Language Features and Patterns | 1:04:42 | 19 | |
|
2016-09-07 | Better Multiple Intents Re-ranking | 42:36 | 89 | |
|
2016-09-07 | Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures | 52:01 | 30 | |
|
2016-09-07 | Twig: A Simple, AI-friendly, Character World for Believable Agents | 1:04:08 | 197 | |
|
2016-09-07 | Speech signals separation with microphone array | 1:21:18 | 2,588 | |
|
2016-09-07 | NxOpinion: A Novel Integrated and Predictive Solution for Global Healthcare Delivery | 1:19:56 | 129 | |
|
2016-09-07 | Improving Software Production Environments with Non-Invasive, Quantitative Experience Collection | 1:13:21 | 180 | |
|
2016-09-07 | Pairing-based Non-interactive Zero-Knowledge Proofs | 1:02:39 | 2,980 | |
|
2016-09-07 | Using Declarative Languages for Fast and Easy Program Analysis | 1:25:56 | 543 | |
|
2016-09-07 | The JSON Saga | 1:26:24 | 2,056 | |
|
2016-09-07 | First Steps to NetViz Nirvana: Evaluating Social Network Analysis with NodeXL | 49:30 | 240 | |
|
2016-09-07 | Public Key Cryptosystems: Stronger Security from General Assumptions | 1:13:05 | 245 | |
|
2016-09-07 | A Framework for Combined Bayesian Analysis and Optimization for | 1:21:51 | 45 | |
|
2016-09-07 | Towards Provably Secure and Correct Systems | 1:06:21 | 64 | |
|
2016-09-07 | A Dive into the Panorama Business | 52:25 | 41 | |
|
2016-09-07 | Random Kitchen Sinks: Replacing Optimization with Randomization in Learning | 1:06:22 | 3,885 | |
|
2016-09-07 | Regression Verification: Proving the Equivalence of Similar Programs | 1:01:25 | 217 | |
|
2016-09-07 | Inferring Social Networks Automatically from Sensor Data | 1:27:01 | 22 | |
|
2016-09-07 | Metaprogramming AJAX Apps with Static Types [1/3] | 1:12:52 | 23 | |
|
2016-09-07 | Thinking Interactively with Visualization | 1:03:32 | 44 | |
|
2016-09-07 | Grey: Making Logic-Based Access Control Practical and Usable | 1:00:52 | 164 | Vlog |
|
2016-09-07 | J is for JavaScript | 38:53 | 170 | |
|
2016-09-07 | What we now know about phishing websites | 1:07:08 | 34 | |
|
2016-09-07 | Say Everything: How Blogging Began, What It's Becoming, and Why It Matters | 1:04:05 | 64 | Vlog |
|
2016-09-07 | Evolutionary Dynamics of Cooperation | 1:31:42 | 189 | |
|
2016-09-07 | Design Meets Disability | 1:19:38 | 495 | |
|
2016-09-07 | Internet Access Using Dense Self-Managing Wireless Networks | 1:02:32 | 36 | |
|
2016-09-07 | Bargaining and Arbitration in Strategic Games with Private Information | 1:28:43 | 79 | Guide |
|
2016-09-07 | From biology to robots: the RobotCub project | 1:11:27 | 104 | Vlog |
|
2016-09-07 | SANDstorm, Elliptic Curves, and a Bit of Fun | 1:03:45 | 65 | |
|
2016-09-07 | 60 GHz Single-Chip CMOS Digital Radios and Phased Array Solutions for Gaming and Connectivity | 1:14:48 | 621 | |
|
2016-09-07 | Research on Cognitive Radio Networks at Real-Time Computing Laboratory | 1:05:13 | 3,082 | |
|
2016-09-07 | Message-Passing for Graph-Structured Linear Programs: Proximal Methods and Rounding Schemes [1/122] | 47:07 | 147 | |
|
2016-09-07 | A Spoken Language Interpretation Component for a Robot Dialogue System | 1:17:09 | 167 | Vlog |
|
2016-09-07 | Rules of Thumb: 52 Principles for Winning at Business Without Losing Your Self | 1:05:27 | 97 | |
|
2016-09-07 | Virtual Goods, Real Pleasure: Game Mechanics and Virtual Economies | 1:31:53 | 427 | |
|
2016-09-07 | Investigation of Complex Social Systems from Communication Data: Scaling from 10^2 to 10^8 | 1:18:22 | 32 | |
|
2016-09-07 | Fine-grained Non-intrusive Sensing of Resource Usage in Buildings | 59:03 | 41 | |
|
2016-09-07 | CCCP: Secure remote storage for computational RFIDs | 25:52 | 113 | |
|
2016-09-07 | Rethinking Internet Traffic Management Using Optimization Theory | 1:01:40 | 398 | |
|