2016-09-06 | Ender’s Game for Science: Games for Real, for Now, or we Lose the Brain War            | 1:03:47 | 30 | |
|
2016-09-06 | Behind the Code with Catharine van Ingen | 58:57 | 241 | |
|
2016-09-06 | Characterizing Generic Global Rigidity | 49:41 | 224 | |
|
2016-09-06 | How does the ASTREE analyzer deal with digital filters? | 1:05:54 | 374 | |
|
2016-09-06 | School of Interactive Arts and Technology at Simon Fraser University | 53:00 | 378 | |
|
2016-09-06 | Monitoring Distributed Data Streams | 1:16:48 | 79 | |
|
2016-09-06 | Gumstix: It's A Small Yet Fully Functional Computer | 48:58 | 299 | |
|
2016-09-06 | The Microsoft SenseCam and Other Lifelogging Devices | 1:01:17 | 344 | Vlog |
|
2016-09-06 | Dynamic Algebraic Algorithms | 50:51 | 209 | |
|
2016-09-06 | Symmetry Detection and Symmetrization | 46:31 | 614 | |
|
2016-09-06 | MSR Symposium on Computational Photography: Session 4 | 1:47:22 | 133 | |
|
2016-09-06 | Raksha: A Flexible Information Flow Architecture for Software Security | 58:54 | 266 | Guide |
|
2016-09-06 | Which graphs are extremal graphs? | 1:03:18 | 723 | |
|
2016-09-06 | Language Search Engines and Machine Translation: Making MT and Human Translators Smarter | 1:27:24 | 82 | |
|
2016-09-06 | The Space Elevator and Our Future            | 1:23:29 | 60 | |
|
2016-09-06 | A Grand Challenge on Network Information Theory [1/2] | 1:03:56 | 142 | Guide |
|
2016-09-06 | The Final Conclusion of the Dune Series | 48:33 | 23,988 | |
|
2016-09-06 | The Potential of Play: Game Innovation, Expression and Learning | 58:14 | 29 | |
|
2016-09-06 | Send: Think Before You Click | 1:08:03 | 18 | |
|
2016-09-06 | New Approaches for Building Cryptographic Hash Functions | 56:32 | 88 | |
|
2016-09-06 | Mediators | 1:08:27 | 69 | |
|
2016-09-06 | Distributed Spectrum Access: Protocols & Prototype | 1:21:01 | 42 | |
|
2016-09-06 | Program Composition by Non-Programmers           | 1:13:34 | 54 | |
|
2016-09-06 | Games@MSR - The Pleasures of Virtual/Fantasy Warfare: Learning from Counter-Strike | 1:34:44 | 8 | |
|
2016-09-06 | Opportunities and Challenges in Sensing, Inference and Context-aware Computing | 54:32 | 214 | |
|
2016-09-06 | Supporting Scalable Online Statistical Processing | 58:32 | 6 | |
|
2016-09-06 | MSR Symposium on Computational Photography: Session 2 | 1:12:28 | 39 | |
|
2016-09-06 | MSR Symposium on Computational Photography: Session 1 | 1:05:21 | 101 | |
|
2016-09-06 | MSR Symposium on Computational Photography: Session 3 [1/2] | 1:09:36 | 39 | |
|
2016-09-06 | Squaring the triangle: Games, Second Life and Libraries [1/2] | 1:02:26 | 112 | |
|
2016-09-06 | The promise, the limits, and the beauty of software | 1:26:27 | 155 | |
|
2016-09-06 | Bayesian Methods for Unsupervised Language Learning | 1:19:49 | 422 | |
|
2016-09-06 | Games, gamers, and digital entertainment in the home: sociological studies of computation and play | 47:37 | 34 | |
|
2016-09-06 | Generative Models of Discourse | 1:16:33 | 183 | |
|
2016-09-06 | Consolidarity: Exploring Patterns of Social Commonality Among File Directories at Work | 1:06:02 | 32 | |
|
2016-09-06 | High Fidelity Image-Based Modeling | 54:14 | 337 | |
|
2016-09-06 | The Meaning of the 21st Century: A Blueprint for Ensuring Our Future            | 1:17:54 | 685 | |
|
2016-09-06 | Social Balance on Networks: The Dynamics of Friendship and Hatred [1/30] | 55:28 | 167 | |
|
2016-09-06 | Provably Optimal Solutions to Geometric Vision Problems | 1:00:25 | 45 | |
|
2016-09-06 | Interaction Design Projects for Health and Wellness | 1:41:44 | 840 | |
|
2016-09-06 | Congestion Games: Optimization in Competition | 54:45 | 1,638 | |
|
2016-09-06 | Bayesian topic models | 1:27:07 | 337 | |
|
2016-09-06 | A Passion for Calendars -- From the Maya to Mars | 1:10:13 | 317 | |
|
2016-09-06 | Persuasive Games: The Expressive Power of Videogames            | 1:03:52 | 1,369 | |
|
2016-09-06 | In-Network, Physical Adaptation of Sensor Networks | 1:22:12 | 16 | |
|
2016-09-06 | Secure Virtual Architecture: A Novel Foundation for Operating System Security | 1:17:35 | 162 | |
|
2016-09-06 | Engineering Performance Using Control Theory: A One Day How-To: Theory Part 2 | 1:30:59 | 40 | |
|
2016-09-06 | Effective Scientific Data Management through Provenance Collection | 1:04:43 | 104 | |
|
2016-09-06 | Unified Dimensionality Reduction: Formulation, Solution and Beyond | 1:04:05 | 106 | |
|
2016-09-06 | Engineering Performance Using Control Theory: A How-To: Control Analysis & Real world applications | 1:30:33 | 189 | |
|
2016-09-06 | A Real-World Test-bed for Mobile Adhoc Networks: Methodology, Experimentations, Simulation & Results | 1:00:03 | 348 | |
|
2016-09-06 | Fusion of Optical and Radio Frequency Techniques: Cameras, Projectors and Wireless Tags | 1:08:18 | 116 | |
|
2016-09-06 | Hierarchical Phrase-Based Translation with Suffix Arrays. | 1:14:14 | 250 | |
|
2016-09-06 | Multi-stack automata reachability: A New Tractable Subclass | 1:00:53 | 291 | |
|
2016-09-06 | Seduced by Success: How the Best Companies Survive the 9 Traps of Winning           | 58:17 | 70 | |
|
2016-09-06 | Everything is Miscellaneous: The Power of the New Digital Disorder | 1:21:50 | 218 | |
|
2016-09-06 | Accelerating High Performance Computing Applications with Reconfigurable Logic | 1:09:01 | 137 | Vlog |
|
2016-09-06 | Cooperative Data and Computation Partitioning for Distributed Architectures | 1:13:18 | 39 | |
|
2016-09-06 | Rate Control Protocol (RCP): Congestion Control to Make Flows Complete Quickly | 1:22:34 | 802 | |
|
2016-09-06 | Engineering Performance Using Control Theory: A One Day How-To: Introduction & Theory Part 1 | 1:07:36 | 49 | |
|
2016-09-06 | Paths Beyond Local Search: A Tight Bound for Randomized Fixed-Point Computation | 1:02:39 | 44 | |
|
2016-09-06 | Interaction Design for One-Handed Use of Mobile Devices | 1:18:19 | 91 | |
|
2016-09-06 | Einstein: His Life and Universe | 50:00 | 9,789 | |
|
2016-09-06 | Virtual Reality Therapy: Using immersive virtual reality games to help reduce suffering | 1:11:55 | 565 | Let's Play |
|
2016-09-06 | A Crowd of One: The Future of Individual Identity            | 1:11:28 | 597 | |
|
2016-09-06 | Ubiquitous Reflective Technologies | 48:50 | 18 | Vlog |
|
2016-09-06 | Customizing the Computational Capabilities of Processors | 1:09:17 | 12 | |
|
2016-09-06 | Virgil: Objects on the Head of a Pin | 1:12:50 | 49 | |
|
2016-09-06 | Video Synopsis: Making an Infinite Video Shorter | 50:35 | 427 | |
|
2016-09-06 | Linked Decompositions of Networks and Polya Urns with Choice | 1:03:08 | 52 | |
|
2016-09-06 | The Light Portal: 3D Reconstruction and Visualization over Space and Time | 58:40 | 59 | |
|
2016-09-06 | Distributed Speculative Execution: A Programming Model for Reliability and Increased Performance | 1:20:09 | 161 | |
|
2016-09-06 | Director of MITΓÇÖs Auto-ID Laboratory and a professor of Information Engineering | 1:03:41 | 51 | |
|
2016-09-06 | Path invariants | 44:53 | 162 | |
|
2016-09-06 | Records, sums, cases, and exceptions: Row-polymorphism at work [1/9] | 1:01:09 | 358 | |
|
2016-09-06 | Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation | 1:22:00 | 121 | |
|
2016-09-06 | The Bilateral Grid and a Topological Approach to Image Segmentation | 1:10:22 | 1,465 | Vlog |
|
2016-09-06 | Software Development Practices and Knowledge Sharing: A Comparison of XP & Waterfall Team Behaviors | 1:23:48 | 109 | |
|
2016-09-06 | How likely is BuffonΓÇÖs needle to meet a Cantor square? | 1:13:14 | 304 | |
|
2016-09-06 | Dense triangle-free digraphs | 36:17 | 333 | |
|
2016-09-06 | MOP: A Generic and Efficient Runtime Verification Framework | 1:07:24 | 232 | |
|
2016-09-06 | An Examination of User Behaviour during Web Information Tasks | 44:44 | 111 | Guide |
|
2016-09-06 | Modeling Science: Topic models of Scientific Journals and Other Large Document Collections | 52:39 | 79 | |
|
2016-09-06 | Exhaustive Phase Order Search Space Exploration and Evaluation | 1:13:54 | 19 | |
|
2016-09-06 | Supervised Dimensionality Reduction with Principal Component Analysis | 1:07:22 | 582 | |
|
2016-09-06 | Network Market Design for Efficient Resource Allocation | 1:02:11 | 241 | |
|
2016-09-06 | Probabilistic Latent Variable Decompositions for Image and Audio Analysis | 1:32:05 | 362 | |
|
2016-09-06 | Improving Software Security with Precise Static and Runtime Analysis | 1:25:11 | 89 | |
|
2016-09-06 | What Analytical Performance Modeling Teaches Us About Computer Systems Design | 1:12:39 | 1,636 | |
|
2016-09-06 | A search engine for the real world, or, a top-down approach to vision | 59:55 | 19 | |
|
2016-09-06 | Approximate Inference Techniques for Identity Uncertainty | 1:04:03 | 94 | |
|
2016-09-06 | Edgenet 2006 - Issues in Enterprise Networks | 1:31:53 | 13 | |
|
2016-09-06 | Towards a Memory Model for C++ | 1:16:50 | 771 | |
|
2016-09-06 | Edgenet 2006 - Keynote - Model-Based Management of Distributed Services | 1:10:38 | 22 | |
|
2016-09-06 | SCS '06 - Wrap-up and Next Steps | 15:00 | 3 | |
|
2016-09-06 | Technology Matters | 1:11:06 | 409 | Vlog |
|
2016-09-06 | SCS '06 - Closing Keynotes - Part 2 | 13:06 | 8 | |
|
2016-09-06 | People Pen and Computers | 1:23:17 | 172 | |
|
2016-09-06 | Juicing the Orange: How to turn Creativity into a Powerful Competitive Advantage [1/3] | 1:01:17 | 212 | |
|
2016-09-06 | Computing Hilbert modular forms over real quadratic fields | 1:35:07 | 214 | |
|