2016-09-06 | SCS '06 - Lightning Round 1: Learning in and about Virtual Worlds - Talk 5 | 7:21 | 3 | |
|
2016-09-06 | SCS '06 - Microsoft Research Welcome | 11:58 | 5 | |
|
2016-09-06 | Enhancing Text Representation through Knowledge-Based Feature Generation [1/12] | 1:18:28 | 19 | |
|
2016-09-06 | SCS '06 - Lightning Round 1: Learning in and about Virtual Worlds - Talk 2 | 6:25 | 6 | |
|
2016-09-06 | SCS '06 - Icebreaker - Part 2 | 10:23 | 19 | |
|
2016-09-06 | Refinding Information on the Web: What do we do? | 1:04:00 | 19 | Guide |
|
2016-09-06 | SCS '06 - Lightning Round 1: Learning in and about Virtual Worlds - Talk 3 | 6:41 | 4 | |
|
2016-09-06 | SCS '06 - Lightning Round 1: Learning in and about Virtual Worlds - Talk 1 | 6:05 | 9 | |
|
2016-09-06 | Edgenet 2006 - A Data Model for Policy | 23:08 | 12 | |
|
2016-09-06 | Why People Around the World Really Are Different, and the Hidden Clues to Understanding Us All [1/2] | 1:19:01 | 8,415 | |
|
2016-09-06 | SCS '06 - Introductions and Icebreaker - Part 1 | 2:56 | 14 | |
|
2016-09-06 | Dispersion of Mass and the Complexity of Randomized Algorithms | 59:33 | 62 | |
|
2016-09-06 | Edgenet 2006 - Experimental Design for Flexible Network Diagnosis | 18:42 | 10 | |
|
2016-09-06 | Edgenet 2006 - Experiences Managing Networks in IBM HPC Grid Infrastructure and Enterprise VoIP | 20:50 | 10 | |
|
2016-09-06 | Edgenet 2006 - Is an Office Without Wires Feasible? | 23:13 | 22 | |
|
2016-09-06 | Applications of First-order Integer Arithmetic to the Verification of Programs with Lists | 1:13:00 | 183 | |
|
2016-09-06 | Pushing Group Communication to the Edge Will Enable Radically New Distributed Applications | 19:19 | 13 | |
|
2016-09-06 | Edgenet 2006 - Virtual LAN as a Network Control Mechanism | 18:58 | 14 | |
|
2016-09-06 | Edgenet 2006 - New Directions in Enterprise Network Management | 20:37 | 7 | |
|
2016-09-06 | Edgenet 2006 - Problems and Solutions in Enterprise Network Control | 21:13 | 46 | |
|
2016-09-06 | Memex Summit (Digital Memories Workshop) - Digital Memories Software | 47:24 | 129 | |
|
2016-09-06 | Brain Computer Interface Systems: Progress and Opportunities | 1:00:00 | 498 | |
|
2016-09-06 | Need: How PowerPoint Adversely Mediates Thought and Possible Remedies [1/7] | 1:13:28 | 44 | |
|
2016-09-06 | Edgenet 2006 - Managing Corporate WiFi Networks Using DAIR | 23:20 | 285 | |
|
2016-09-06 | Edgenet 2006 - The Case for Comprehensive Diagnostics | 30:25 | 3 | |
|
2016-09-06 | Edgenet 2006 - The Protection Problem in Enterprise Networks | 21:13 | 7 | |
|
2016-09-06 | Edgenet 2006 - Wireless Network Measurement Challenges | 24:28 | 30 | |
|
2016-09-06 | Graph Cuts without Eigenvectors | 39:50 | 747 | |
|
2016-09-06 | Searching for Privacy [1/2] | 1:07:19 | 77 | |
|
2016-09-06 | Algorithms for Data Management and Migration | 1:08:10 | 41 | |
|
2016-09-06 | Edgenet 2006 - Customer Insight: CSO's Perspective on Network Policies | 17:22 | 1 | |
|
2016-09-06 | Trading Convexity for Scalability | 48:26 | 126 | |
|
2016-09-06 | Congressional Panel and Dialogue | 1:34:02 | 4 | |
|
2016-09-06 | Edgenet 2006 - Measuring and Monitoring MicrosoftΓÇÖs Enterprise Network | 21:42 | 13 | |
|
2016-09-06 | Memex Summit (Digital Memories Workshop) - Personal Audio Life Logs | 32:00 | 31 | |
|
2016-09-06 | Off the Beaten Path in Pervasive Computing | 1:10:18 | 29 | |
|
2016-09-06 | Memex Summit (Digital Memories Workshop) | 27:03 | 19 | |
|
2016-09-06 | CMPLE - Melting the Ice Between Cores | 1:16:25 | 8 | |
|
2016-09-06 | Capturing People | 1:01:03 | 111 | |
|
2016-09-06 | New Market Models and Algorithms | 1:04:12 | 196 | |
|
2016-09-06 | Introduction and Welcome | 1:03:45 | 4 | |
|
2016-09-06 | Data Abstraction without Control Abstraction in Software Model Checking | 55:04 | 328 | |
|
2016-09-06 | Executive Branch Panel and Dialogue | 59:00 | 13 | |
|
2016-09-06 | The Equations: Icons of Knowledge | 1:16:00 | 182 | |
|
2016-09-06 | Designing Adaptive Embedded Systems | 1:30:36 | 41 | |
|
2016-09-06 | Memex Summit (Digital Memories Workshop) - Introduction | 5:01 | 9 | |
|
2016-09-06 | Semantic Anchoring of Domain Specific Modeling Languages | 1:10:30 | 248 | |
|
2016-09-06 | Multi-Camera tracking with a Probabilistic Occupancy Grid | 57:12 | 965 | |
|
2016-09-06 | Simultaneous optimization and fairness | 56:40 | 58 | |
|
2016-09-06 | Flow Control in Wireless Networks | 1:18:50 | 160 | |
|
2016-09-06 | Synchronization and Concurrency for User-level Systems | 1:18:45 | 317 | |
|
2016-09-06 | Winning the DARPA Grand Challenge [Robotics] | 1:04:25 | 723 | |
|
2016-09-06 | Addressing the Memory Bottleneck in Packet Processing Systems [1/285] | 1:15:50 | 48 | |
|
2016-09-06 | Play Between Worlds: Exploring Online Game Culture | 1:02:55 | 324 | |
|
2016-09-06 | Adaptation=Vulnerability under RoQ Attacks [1/2] | 1:05:55 | 10 | |
|
2016-09-06 | End-User Control in the Smart Home | 53:48 | 34 | |
|
2016-09-06 | Exiting the cleanroom: on ecological validity and ubiquitous computing | 41:25 | 37 | Vlog |
|
2016-09-06 | Memory Model = Instruction Reordering + Store Atomicity | 1:10:41 | 715 | Tutorial |
|
2016-09-06 | From Wayback Machine to WebLab: New Opportunities for Social Research | 55:13 | 29 | |
|
2016-09-06 | Remarks by Senator Obama | 12:03 | 3,696 | |
|
2016-09-06 | Automating the Construction of Compiler Heuristics using Machine Learning | 58:28 | 633 | Tutorial |
|
2016-09-06 | Capacity and Fairness Issues in Enterprise-class Wireless Mesh Networks | 1:02:53 | 89 | |
|
2016-09-06 | Towards Accurate Internet Distance Prediction | 1:22:26 | 40 | |
|
2016-09-06 | Guanxi (The Art of Relationships) : Microsoft, China, and Bill Gates's Plan to Win the Road Ahead | 49:44 | 595 | |
|
2016-09-06 | Increasing Concurrency using EDGE Architectures | 57:56 | 156 | |
|
2016-09-06 | Decision Procedures for Recursive Data Structures with Integer Arithmetic | 1:11:37 | 75 | |
|
2016-09-06 | Supporting Construction, Analysis, and Understanding of Software Models. | 1:09:29 | 52 | |
|
2016-09-06 | Program Verification via Three-Valued Logic Analysis | 1:16:10 | 375 | Vlog |
|
2016-09-06 | Efficient Data Dissemination in Bandwidth-Asymmetric P2P Networks | 57:32 | 63 | |
|
2016-09-06 | Tractable Learning of Structured Prediction Models | 1:14:26 | 124 | |
|
2016-09-06 | Future Hype: The Myths of Technology Change | 54:33 | 249 | Vlog |
|
2016-09-06 | Improving Packet Delivery Efficiency Using Multi-Radio Diversity in Wireless LANs | 1:04:58 | 38 | |
|
2016-09-06 | Algorithmic Foundations of P2P and Wireless Networks | 1:09:17 | 88 | |
|
2016-09-06 | Semi-unsupervised learning of taxonomic and non-taxonomic relationships from the web | 1:01:08 | 43 | |
|
2016-09-06 | The Weather Makers: How Man is Changing the Climate and What it Means for Life on Earth | 1:07:33 | 1,288 | |
|
2016-09-06 | Touched with Light: Scanned beams display or capture information at video rates | 1:11:40 | 67 | Guide |
|
2016-09-06 | Internet Background Radiation | 1:22:20 | 228 | |
|
2016-09-06 | Understanding and Improving Wireless Networks | 1:05:27 | 36 | |
|
2016-09-06 | SAFECode: A Platform for Developing Reliable Software in Unsafe Languages | 1:17:19 | 29 | |
|
2016-09-06 | Enabling Internet Malware Investigation and Defense Using Virtualization | 1:04:19 | 37 | |
|
2016-09-06 | Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity | 1:09:33 | 330 | Vlog |
|
2016-09-06 | Approximate inference techniques for optimal design in self-assembly and automated programming | 1:35:02 | 70 | |
|
2016-09-06 | Machine Learning Methods for Structured and Collective Classification | 1:18:14 | 291 | |
|
2016-09-06 | Communication Technology: Interruption and Overload | 1:12:09 | 120 | |
|
2016-09-06 | ParaEval: Using Paraphrases to Improve Machine Translation and Summarization Evaluations | 45:49 | 74 | |
|
2016-09-06 | Rethinking Processor and System Architecture | 58:26 | 391 | |
|
2016-09-06 | Crashing the Gate: Netroots, Grassroots, and the Rise of People-Powered Politics | 51:12 | 38 | |
|
2016-09-06 | Improving Routing Scalability through Mobile Geographic Hashing in MANETs | 53:32 | 93 | |
|
2016-09-06 | The Semantic Web: Myth and Reality | 1:05:24 | 91 | |
|
2016-09-06 | Learnable Similarity Functions and Their Applications in Information Integration and Clustering | 1:25:08 | 353 | Guide |
|
2016-09-06 | Process Extraction in an Abstract Logic of Events [1/2] | 1:04:11 | 21 | Vlog |
|
2016-09-06 | Billions: Selling to the New Chinese Consumer | 1:23:48 | 170 | |
|
2016-09-06 | Conditional Models for Combining Diverse Knowledge Sources in Information Retrieval | 1:13:40 | 52 | |
|
2016-09-06 | Scalable Automated Methods for Software Reliability | 59:17 | 145 | |
|
2016-09-06 | Naked Conversations: How blogs are changing the Way businesses Talk with Customers | 1:07:32 | 209 | Vlog |
|
2016-09-06 | Natural Scene Categorization in Humans and Computers | 43:04 | 160 | |
|
2016-09-06 | Pair Programming Re-Design | 1:20:48 | 84 | |
|
2016-09-06 | An Interface to Support Multi-faceted Information Seeking and Targeted Relevance Feedback | 1:04:17 | 20 | Guide |
|
2016-09-06 | Dependable Messaging in Sensor Networks | 1:03:29 | 17 | |
|
2016-09-06 | Discriminative Graphical Models for Structured Data Prediction | 59:17 | 96 | |
|