2016-09-06 | Toward Practical Dynamic Software Updating for C | 1:13:33 | 284 | |
|
2016-09-06 | Point-Based Methods in Shape Modeling and Physical Simulation | 1:08:08 | 155 | |
|
2016-09-06 | Continuous Queries over Data Streams | 1:16:46 | 1,120 | |
|
2016-09-06 | A high-level fusion method to fuse disparate high-resolution airborne sensor data | 1:26:19 | 236 | |
|
2016-09-06 | How to Make Love the Bruce Campbell Way [1/25] | 37:40 | 17,494 | |
|
2016-09-06 | New trends in parametric models from 1 to the 3-D case [1/10] | 1:23:41 | 80 | |
|
2016-09-06 | More Natural Programming Through User Studies | 1:03:48 | 23 | |
|
2016-09-06 | New Directions in Robust Automatic Speech Recognition | 1:27:02 | 433 | |
|
2016-09-06 | Some Open Problems in Large Volume Data Mining in Biomedical Applications | 1:12:30 | 62 | |
|
2016-09-06 | Entanglement Entropy in Extended Systems | 1:16:03 | 521 | |
|
2016-09-06 | Support Vector Machines for Structured Outputs | 1:09:27 | 1,072 | |
|
2016-09-06 | Reliable Feedback from Clicking Behavior in Adaptive WWW Search [1/11] | 1:16:36 | 80 | |
|
2016-09-06 | Improved gapped alignment in BLAST genomic search | 51:38 | 190 | |
|
2016-09-06 | The Curse of Dimensionality for Local Learning | 1:06:52 | 777 | |
|
2016-09-06 | Instruction-based Prediction Techniques in Operating Systems | 1:17:02 | 39 | Tutorial |
|
2016-09-06 | Advancing Women in Science and Engineering at the University of Michigan | 1:07:26 | 21 | |
|
2016-09-06 | A Framework for Unrestricted Whole-Program Optimization | 1:22:10 | 61 | |
|
2016-09-06 | Locality and Phases: Dynamic Structures of Large-Scale Program Behavior | 1:14:35 | 52 | |
|
2016-09-06 | The Physical and Mental States of Users Anytime and in Their Natural Environments | 1:22:01 | 46 | |
|
2016-09-06 | Skoll: Distributed Continuous Quality Assurance | 1:17:54 | 12 | |
|
2016-09-06 | Everything Bad Is Good for You: How Today's Popular Culture Is Actually Making Us Smarter | 1:04:23 | 5,740 | |
|
2016-09-06 | Service Placement in Stream-Based Overlay Networks | 1:10:25 | 54 | |
|
2016-09-06 | Protocol Composition Logics | 42:28 | 225 | Vlog |
|
2016-09-06 | THE FUTURE IS NOT FRAMED | 1:12:03 | 13 | |
|
2016-09-06 | Model Checking of Predicate Abstracted Programs without BDDs [1/2] | 1:00:58 | 229 | |
|
2016-09-06 | Social Computing Symposium - Panel - Extracting Signal from Noise in Social Networking | 1:07:12 | 3 | |
|
2016-09-06 | Menger's theorem for infinite graphs | 51:48 | 746 | |
|
2016-09-06 | 2D, 3D and Surface Texture Analysis and Synthesis | 57:13 | 616 | |
|
2016-09-06 | Anonymity in Peer-to-peer Systems | 51:29 | 204 | |
|
2016-09-06 | Patterns as Signs | 1:21:47 | 15 | |
|
2016-09-06 | Social Computing Symposium - Positive Externalities | 28:12 | 4 | |
|
2016-09-06 | Analyzing Mobile ad hoc Network Protocols via Probabilistic Model Checking [1/26] | 1:01:40 | 263 | |
|
2016-09-06 | Are aspects really needed for aspect-oriented programming? | 1:13:58 | 311 | |
|
2016-09-06 | Live Long and Prosper! Exercise, Nutrition and Supplements for Optimal Energy and Productivity | 1:23:02 | 103 | |
|
2016-09-06 | Social Computing Symposium - Visualizing Social Interactions and Collaboration History | 31:28 | 17 | |
|
2016-09-06 | Social Computing Symposium - Back Channels: Power and the Active Audience | 20:32 | 17 | |
|
2016-09-06 | Social Computing Symposium - Exploring the Social Institutional Dimensions of MoSoSo Design | 22:15 | 2 | |
|
2016-09-06 | A Search Engine for Natural Language Applications | 1:01:33 | 194 | |
|
2016-09-06 | Social Computing Symposium - Fostering Open Source Social Moments | 19:27 | 2 | |
|
2016-09-06 | Beyond Brainstorming: Eight Secrets for Generating Big, Bold, Creative and Profitable Ideas [1/72] | 1:27:00 | 85 | |
|
2016-09-06 | ShaRE: A Run-time System for High-performance Virtualized Routers | 1:08:00 | 29 | |
|
2016-09-06 | Social Computing Symposium - Community Through Pictures | 20:15 | 2 | |
|
2016-09-06 | A Frequency analysis of Light Transport | 51:08 | 280 | |
|
2016-09-06 | Social Computing Symposium - Thirty Years of Social Computing: Are We Finally Ready to Scale? | 22:02 | 8 | |
|
2016-09-06 | Mathematical Analysis of Programs | 1:00:44 | 60 | |
|
2016-09-06 | Online Approximation Techniques for Spatial Data | 1:09:28 | 108 | |
|
2016-09-06 | Social Computing Symposium - Social Metadata and Tagging - From Trees to Tags | 24:32 | 4 | |
|
2016-09-06 | Social Computing Symposium - Social Metadata and Tagging - Tesla, Tagging for the DeskTop | 17:03 | 7 | |
|
2016-09-06 | Automatic Identification and Classification of Protein Domains | 1:21:21 | 197 | |
|
2016-09-06 | Social Computing Symposium - What is Community anyway? | 13:14 | 4 | |
|
2016-09-06 | Supporting Informal Collaboration in Groupware | 1:05:01 | 92 | |
|
2016-09-06 | Rethinking Database Systems for Modern Architectures | 1:00:18 | 66 | |
|
2016-09-06 | Query Processing for Large-Scale XML Message Brokering | 1:03:32 | 118 | |
|
2016-09-06 | Semi-supervised Clustering: Probabilistic Models, Algorithms and Experiments | 1:20:13 | 1,507 | |
|
2016-09-06 | QoS-Based Resource Management [1/4] | 1:15:17 | 117 | |
|
2016-09-06 | Verifying Safety Policies with Size Properties and Alias Controls | 47:48 | 14 | |
|
2016-09-06 | Reformulating the HMM as a trajectory model | 58:42 | 176 | |
|
2016-09-06 | Reasoning about Reliability and Security Using Boolean Methods | 1:07:48 | 64 | |
|
2016-09-06 | How low can safe languages go? | 1:17:52 | 60 | |
|
2016-09-06 | Exceptional Situations and Program Reliability | 1:17:18 | 29 | |
|
2016-09-06 | Model drive development of enterprise applications | 53:53 | 87 | |
|
2016-09-06 | Self-Monitoring of Thread Interactions in Multithreaded Systems | 1:04:28 | 32 | |
|
2016-09-06 | Exploiting Redundancy for Robust Sensing | 1:11:21 | 665 | |
|
2016-09-06 | Multiple View Geometry and L-infinity Optimization | 53:38 | 352 | |
|
2016-09-06 | Pseudorandom Walks in Directed Graphs and the RL vs. L Question [1/3] | 59:58 | 123 | |
|
2016-09-06 | Applied Nonparametric Bayes and Statistical Machine Learning | 1:15:19 | 405 | |
|
2016-09-06 | Reliability Estimation during Architectural Design | 54:47 | 149 | |
|
2016-09-06 | Program Analysis with Binary Decision Diagrams | 1:20:06 | 1,560 | |
|
2016-09-06 | Making Wireless LANs Faster and Fairer | 1:15:34 | 507 | |
|
2016-09-06 | More Than Human : Embracing the Promise of Biological Enhancement | 49:28 | 186 | Vlog |
|
2016-09-06 | Using Open Specifications for XML Web Services to Build Maintainable & Secure Health Care Systems | 59:12 | 43 | |
|
2016-09-06 | Source Code Evolution with Interactive Transformations | 1:10:27 | 95 | |
|
2016-09-06 | Is Linux Maintainable? | 1:03:03 | 1,287 | |
|
2016-09-06 | Pastiche: decentralized, low-cost backup using untrusted, Internet storage | 1:10:27 | 35 | |
|
2016-09-06 | Measurement-driven Modeling and Design of Internet-scale Systems [1/2] | 1:18:25 | 22 | |
|
2016-09-06 | Distributed hash tables for large-scale cooperative applications | 1:17:22 | 1,067 | |
|
2016-09-06 | Talk 1: Convergence research in the UK; Talk 2: Artistic rendering in the convergence area | 48:57 | 8 | |
|
2016-09-06 | Secure content distribution using untrusted servers | 1:06:21 | 26 | |
|
2016-09-06 | 802.11i Security Analysis: Can we build a secure WLAN? | 1:04:29 | 974 | |
|
2016-09-06 | Gadgets for good: How computer researchers can help save lives in poor countries | 1:03:28 | 29 | |
|
2016-09-06 | Inferring Information Status for Reference Generation in Open Domains [1/12] | 1:10:05 | 26 | Guide |
|
2016-09-06 | Improving the Reliability of Commodity Operating Systems [1/2] | 1:19:32 | 171 | |
|
2016-09-06 | Mentoring: The People Who Lead Us Toward Our Purpose in Life | 1:14:48 | 27 | |
|
2016-09-06 | Data Structure Repair | 59:04 | 54 | |
|
2016-09-06 | The neurophysiology of decision making: rate differences and log likelihood ratios | 1:26:44 | 242 | Vlog |
|
2016-09-06 | Can Parallel Computing Finally Impact Mainstream Computing? | 1:11:08 | 29 | |
|
2016-09-06 | Making Networks More Robust | 1:17:26 | 76 | |
|
2016-09-06 | Routing Tradeoffs in Dynamic Peer-to-peer Networks | 1:01:33 | 160 | |
|
2016-09-06 | Enhancing Security of Real-World Systems with a Better Understanding of the Threats | 56:16 | 50 | |
|
2016-09-06 | Understanding and Surviving Internet Path Failures | 1:19:48 | 20 | |
|
2016-09-06 | Toward an Interpersonal Neurobiology of the Developing Mind | 1:18:19 | 111 | Vlog |
|
2016-09-06 | Interfaces that Influence Groups | 1:07:05 | 15 | |
|
2016-09-06 | A Virtualization Architecture for Wireless Network Cards | 1:04:31 | 112 | |
|
2016-09-06 | The Devious Logic of Metaphors | 1:14:14 | 352 | Vlog |
|
2016-09-06 | The Cricket Indoor Location System | 46:10 | 698 | |
|
2016-09-06 | Cords: 3D Curve Primitives that Wrap Around Geometry | 1:04:37 | 37 | |
|
2016-09-06 | Scalability and Extensibility in the Denali Virtual Machine Monitor [1/5] | 1:10:25 | 52 | |
|
2016-09-06 | Efficient and Robust Routing in the Presence of Competing Interests | 1:11:40 | 78 | |
|
2016-09-06 | Load Management and Fault-Tolerance in a Distributed Stream Processing System [1/2] | 1:12:34 | 87 | |
|
2016-09-06 | The Case for Technology for Developing Regions | 1:15:34 | 22 | Vlog |
|