2016-09-06 | Cloud Computing for e-Science | 1:04:16 | 27 | |
|
2016-09-06 | Thread-saft dynamic binary translation using transactional memory | 53:02 | 131 | |
|
2016-09-06 | Scheduling for multi-carrier wireless systems | 52:13 | 124 | |
|
2016-09-06 | Reachability Under Uncertainty & Bayesian Inverse Reinforcement Learning | 1:09:07 | 700 | |
|
2016-09-06 | Exploring large social networks with matrix-based representations | 1:08:24 | 95 | |
|
2016-09-06 | Defining and Enforcing Privacy in Data Publishing | 1:04:46 | 1,941 | |
|
2016-09-06 | Zero Overhead Verification of Software Programs & On Range Search in Distributed Sensor Networks | 1:13:42 | 41 | |
|
2016-09-06 | XNA Game Studio Workshop - Session One | 2:38:50 | 120 | |
|
2016-09-06 | Reconfigurable Computing: Architectural and Design Tool Challenges | 1:12:16 | 843 | |
|
2016-09-06 | Knowledge sharing and awareness in collaborative computing: Experimental research methods | 1:05:20 | 129 | |
|
2016-09-06 | Multimodal Processing of Human Behavior in Intelligent Instrumented Spaces | 1:07:13 | 99 | |
|
2016-09-06 | Energy Based Models: From Relational Regression to Similarity Metric Learning | 58:50 | 758 | |
|
2016-09-06 | Multi-layer architectures for secure communication: information theoretic perspectives | 1:08:30 | 29 | Guide |
|
2016-09-06 | Virtual Earth Summit - Session 4 | 1:10:29 | 5 | |
|
2016-09-06 | The Drunkard's Walk: How Randomness Rules our Lives | 57:21 | 11,371 | |
|
2016-09-06 | Hiding global invariants by local reasoning in region logic | 1:06:45 | 59 | Vlog |
|
2016-09-06 | Disjunctive Invariants for Modular Static Analysis | 57:33 | 11 | |
|
2016-09-06 | Noise robust blind system identification and subband equalization of room transfer functions | 39:53 | 199 | |
|
2016-09-06 | Virtual Earth Summit - Session 1 | 1:30:49 | 15 | |
|
2016-09-06 | Predicting Bugs by Analyzing Software History | 1:14:08 | 1,942 | |
|
2016-09-06 | Virtual Earth Summit - Session 3 | 1:06:00 | 6 | |
|
2016-09-06 | Blog Reading and Blog Readers: Tools and Practices [1/19] | 49:12 | 19 | Vlog |
|
2016-09-06 | Formal Methods Research in Support of the Next Generation Air Transportation System | 1:13:03 | 252 | |
|
2016-09-06 | Virtual Earth Summit - Session 6 | 1:02:44 | 47 | |
|
2016-09-06 | Partially Disjunctive Shape Analysis | 1:18:07 | 13 | |
|
2016-09-06 | Machina Coelestis: Computationally Enabled, Data Intensive Astronomy for the 21st Century | 1:14:46 | 26 | |
|
2016-09-06 | OSIsoft PI System Overview | 1:37:56 | 5,976 | |
|
2016-09-06 | Virtual Earth Summit - Session 5 | 58:21 | 14 | |
|
2016-09-06 | On Best-Response Bidding in Ad Auctions | 1:27:25 | 57 | |
|
2016-09-06 | Streamroller: A Unified Compilation and Synthesis System for Streaming Applications | 1:02:16 | 14 | |
|
2016-09-06 | Levy Processes and Applications to Machine Learning | 1:09:20 | 5,419 | |
|
2016-09-06 | TCP and P2P: supporting Internet from layer 4 and layer 7 | 1:25:26 | 126 | |
|
2016-09-06 | Fighting concurrency bugs | 1:03:39 | 205 | |
|
2016-09-06 | Virtual Earth Summit - Welcome - Overview of the Summit, One Minute Introductions | 46:43 | 12 | |
|
2016-09-06 | Machine Understanding of Human Audio/ visual Affective Expressions | 1:28:32 | 115 | |
|
2016-09-06 | Enriching Speech Translation: Exploiting Information Beyond Words | 1:05:35 | 39 | Guide |
|
2016-09-06 | Hardware-Software Co-Design for General-Purpose Processors [1/14] | 1:24:29 | 1,664 | |
|
2016-09-06 | Interaction Design Based on Human Capabilities for Contemporary and Emerging Technologies | 1:03:20 | 67 | Vlog |
|
2016-09-06 | Developing, Optimizing and Hosting Data Driven Web Applications | 1:14:40 | 123 | |
|
2016-09-06 | P2P and Online Social Networking Research at Mirage Group | 1:36:07 | 59 | |
|
2016-09-06 | A Compositional Method for Verifying Software Transactional Memory | 1:18:14 | 49 | |
|
2016-09-06 | Semantic Components: A Model for Enhancing Retrieval of Domain-Specific Information | 1:17:08 | 135 | Guide |
|
2016-09-06 | Demystifying Internet Traffic | 1:13:54 | 38 | |
|
2016-09-06 | Disk Failure: How It Happens And What To Do About It | 1:08:11 | 60 | |
|
2016-09-06 | A Constraint Solver: Finding Models and Cores of Large Relational Specifications | 56:51 | 487 | |
|
2016-09-06 | Software & Architectural Techniques for Cache Leakage Reduction in Nanometer-scale Embedded Systems | 1:16:39 | 75 | |
|
2016-09-06 | Data-driven methods in Description-based Audio Information Processing | 1:04:53 | 34 | Guide |
|
2016-09-06 | Single Image Dehazing | 57:58 | 3,242 | |
|
2016-09-06 | EE Talk - How to Make Things Happen: Mastering Project Management | 1:22:55 | 2,433 | Guide |
|
2016-09-06 | XNA Game Studio Workshop - Session Two | 1:47:41 | 36 | |
|
2016-09-06 | Path Projection for User-Centered Static Analysis Tools | 1:06:45 | 16 | |
|
2016-09-06 | e-Heritage Project | 52:35 | 50 | |
|
2016-09-06 | Small Loans, Big Dreams: How Nobel Prize Winner Muhammad Yunus & Microfinance are Changing the World | 1:03:06 | 199 | |
|
2016-09-06 | Reducing the Risk of Pragmatic Reuse Tasks | 1:16:02 | 11 | |
|
2016-09-06 | Reliable Communication for Datacenters | 1:00:50 | 47 | |
|
2016-09-06 | End-to-end Security for Web Applications : A Language-based Approach | 1:08:08 | 117 | |
|
2016-09-06 | Statistical Inference for Efficient Microarchitectural Analysis | 1:12:59 | 25 | |
|
2016-09-06 | ZebraNet and Beyond: Collaboration in Sparse Mobile Networks | 1:00:06 | 40 | |
|
2016-09-06 | Game and Market Equilibria | 1:17:58 | 69 | |
|
2016-09-06 | Extensible Overlay Networks for Stream Processing and Dissemination | 1:05:42 | 31 | |
|
2016-09-06 | Power-Aware Platform Design for Wireless Sensor Networks | 1:13:33 | 172 | |
|
2016-09-06 | Opportunistic Spectrum Access via Dynamic Resource Allocation | 1:22:10 | 445 | |
|
2016-09-06 | Numerical algorithms in material science | 38:13 | 183 | |
|
2016-09-06 | Kluge: The Haphazard Construction of the Human Mind | 1:00:53 | 261 | |
|
2016-09-06 | Optimal Marketing Strategies over Social Networks | 45:07 | 527 | |
|
2016-09-06 | Earth: The Sequel- The Race to Reinvent Energy and Stop Global Warming | 55:08 | 244 | |
|
2016-09-06 | Learning Rules for Textual Entailment | 1:03:16 | 297 | |
|
2016-09-06 | Dynamics of real networks: patterns and algorithms | 1:19:31 | 85 | |
|
2016-09-06 | Attribute-Based Security and Messaging | 1:19:45 | 2,496 | |
|
2016-09-06 | Statistical Spoken Language Generation of Stylistic Variation | 1:31:24 | 65 | |
|
2016-09-06 | The Quest for the Minimal Hardness Assumptions | 56:04 | 30 | |
|
2016-09-06 | Delimited and Composable Continuations in PLT Scheme | 38:31 | 1,036 | |
|
2016-09-06 | Critical Data Protection for Reliability and Security | 1:17:09 | 40 | |
|
2016-09-06 | Multi-view approaches for camera calibration and image-based modeling | 1:08:27 | 1,577 | |
|
2016-09-06 | Securing the Web With Decentralized Information Flow Control | 1:21:04 | 271 | Guide |
|
2016-09-06 | Reconstruction and visualization of large photo collections | 1:17:51 | 250 | |
|
2016-09-06 | Media Computation: Introducing Computing Contextualized in Video and Audio Processing | 1:08:02 | 116 | |
|
2016-09-06 | MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition | 1:18:16 | 25 | |
|
2016-09-06 | Computational Insights Into the Social Life of Zebras and Other Animals | 1:11:40 | 42 | |
|
2016-09-06 | Debugging Reinvented: Asking and Answering Why and Why Not Questions about Program Behavior [1/17] | 1:17:18 | 164 | |
|
2016-09-06 | CitySense: A Vision for an Urban-Scale Wireless Sensor Testbed | 1:04:11 | 216 | |
|
2016-09-06 | Why task-structure matters: The effects of task and social forces on software development | 1:14:28 | 60 | |
|
2016-09-06 | Robust Face Recognition via Sparse Representation | 1:08:27 | 2,446 | |
|
2016-09-06 | How to make Discretionary Access Control Resistant to Trojan Horses | 1:17:41 | 310 | Guide |
|
2016-09-06 | Modeling Intention in Email: Speech Acts, Information Leaks and User Ranking Methods [1/2] | 1:13:47 | 13 | |
|
2016-09-06 | Techniques and Tools for Engineering Secure Web Applications | 1:00:09 | 18 | |
|
2016-09-06 | Should Machines Emulate Human Speech Recognition? | 1:26:57 | 63 | |
|
2016-09-06 | PLOW: A Collaborative Task Learning Agent | 1:06:39 | 82 | |
|
2016-09-06 | Building Bodies of Knowledge about Software Development Practices | 1:18:16 | 83 | |
|
2016-09-06 | The Manticore Project | 1:12:41 | 91 | |
|
2016-09-06 | Abstractions for event-driven design [1/14] | 1:07:01 | 26 | |
|
2016-09-06 | Generation of dense linear algebra software for shared memory and multicore architectures | 57:32 | 132 | |
|
2016-09-06 | The Computation of Economic equilibria [1/2] | 57:29 | 73 | |
|
2016-09-06 | Class Morphing: Safely Shaping a Class in the Image of Others [1/3] | 1:07:49 | 29 | |
|
2016-09-06 | Deep Photo and Gigapixel Images | 58:19 | 61 | |
|
2016-09-06 | Automated Revision of Distributed and Real-Time Programs | 1:15:57 | 16 | |
|
2016-09-06 | Candidate talk: Knowledge Analysis towards Automatic Question Answering for Discussion Forums | 53:27 | 14 | Discussion |
|
2016-09-06 | Improving Data Recovery From Embedded Networked Sensing Systems with Fault Detection and Diagnosis | 1:17:00 | 57 | |
|
2016-09-06 | A Discriminative Kernel-based Model to Rank Images from Text Queries | 1:22:49 | 24 | |
|
2016-09-06 | Concurrency Simple and Safe? State of SCOOP | 1:10:21 | 99 | |
|