2016-09-06 | Constructing Broad-Coverage Knowledge Repositories by Collecting Knowledge from Volunteers | 1:01:49 | 49 | |
|
2016-09-06 | Controlling Overlap in Content-Oriented XML Retrieval | 53:10 | 67 | |
|
2016-09-06 | Inferring Class Invariants in object-oriented languages via abstract interpretation | 1:06:44 | 238 | |
|
2016-09-06 | Technology Design to Foster Collaboration: A Multidisciplinary Approach | 42:15 | 10 | Vlog |
|
2016-09-06 | Towards Concept-Based Text Understanding and Mining | 1:05:53 | 139 | |
|
2016-09-06 | Component Programming with Object-Oriented Signals | 1:25:00 | 455 | |
|
2016-09-06 | On the Capacity of Information Networks | 55:24 | 27 | Guide |
|
2016-09-06 | One-forms and Tutte-like Embeddings | 1:01:38 | 546 | |
|
2016-09-06 | Personal Passion and Professional Excellence ΓÇô You canΓÇÖt have one without the other! | 1:12:18 | 15 | |
|
2016-09-06 | Social Mobile Applications, Location, Privacy and the Capital of Nevada [1/16] | 1:12:14 | 21 | |
|
2016-09-06 | Search Engines Considered Harmful: In Search of an Unbiased Web Ranking | 1:15:55 | 157 | |
|
2016-09-06 | Science Friction: Where the Known Meets the Unknown | 1:07:33 | 72 | |
|
2016-09-06 | Exploring Mars by 4-Wheel Drive | 1:13:06 | 16 | |
|
2016-09-06 | Concave utility functions on finite sets | 1:01:00 | 301 | |
|
2016-09-06 | Opportunities and Challenges in End-to-End Verification of Software Systems | 58:22 | 112 | |
|
2016-09-06 | Computing with Selfish Agents [1/2] | 1:17:35 | 56 | |
|
2016-09-06 | Tools and Techniques for Prototyping Future Interactions [1/2] | 1:00:56 | 44 | |
|
2016-09-06 | Mathematical Sketching: A New Approach for Creating and Exploring Dynamic Illustrations | 1:19:40 | 517 | |
|
2016-09-06 | A learning-based approach to summarization | 42:58 | 22 | |
|
2016-09-06 | Virtual machines: the ultimate tool for computer forensics | 1:01:39 | 530 | |
|
2016-09-06 | Headwinds and Tailwinds:  Where is the U.S. economy going? | 1:07:20 | 31 | |
|
2016-09-06 | Paradigms of Worm Defense & Thoughts from an Ivory Tower | 1:35:28 | 18 | |
|
2016-09-06 | Machine Learning Methods for Discovery of Regulatory Elements in Bacteria | 58:44 | 139 | |
|
2016-09-06 | Eyes on Multimodal Interaction | 56:44 | 149 | |
|
2016-09-06 | From Promoter to Expression ΓÇô A Probabilistic Framework for Inferring Regulatory Mechanisms | 1:13:55 | 43 | |
|
2016-09-06 | Automated Reconstruction of 3D City Models from Laser Scans and Camera Images | 1:15:59 | 317 | |
|
2016-09-06 | Bergman complexes, Coxeter arrangements, and graph associahedra | 1:10:59 | 351 | |
|
2016-09-06 | Biomal Human Emotion Recognition and Peer Steaming Projects at  Ryerson Multimedia Research Lab | 1:17:56 | 85 | |
|
2016-09-06 | Interfaces for Staying in the Flow         [1/3] | 1:00:31 | 8 | |
|
2016-09-06 | Place Lab: Device Positioning Using Radio Beacons in the Wild | 1:17:01 | 256 | |
|
2016-09-06 | Cost-sharing mechanisms for Network Design | 50:08 | 54 | |
|
2016-09-06 | Market-Based Programming Paradigms for Sensor Networks | 1:07:45 | 46 | |
|
2016-09-06 | Convex Geometry of Orbits | 1:03:08 | 202 | |
|
2016-09-06 | The Benefit of Adaptivity in Stochastic Optimization [1/6] | 59:24 | 108 | |
|
2016-09-06 | Bridging art and architecture: How emergent digital media have transformed our landscapes | 1:16:55 | 22 | |
|
2016-09-06 | Effective Use of Microsoft Word for Academic Writing | 1:24:46 | 1,503 | |
|
2016-09-06 | Impala: A Middleware System for Managing Autonomic, Mobile, Wireless Sensor Networks | 1:08:48 | 275 | |
|
2016-09-06 | Transactional Coherence & Consistency | 1:19:38 | 195 | |
|
2016-09-06 | Pathfinder/MonetDB: making XQuery scale using the relational approach | 1:09:04 | 119 | |
|
2016-09-06 | ASM View of Abstract Cryptography | 55:05 | 279 | |
|
2016-09-06 | Deterministic Network Coding by Matrix Completion | 57:15 | 184 | |
|
2016-09-06 | Predicting Value from Design | 1:20:44 | 4 | |
|
2016-09-06 | Online Ascending Auctions for Gradually Expiring Items | 1:24:19 | 40 | |
|
2016-09-06 | Recent Progress in Group Editors and Operational Transformation Algorithms | 1:18:27 | 343 | |
|
2016-09-06 | The SDSC Notebook: a data management, collaboration and application development environment | 1:13:09 | 6 | |
|
2016-09-06 | Clustering Algorithms for Perceptual Image Hashing | 51:06 | 1,562 | |
|
2016-09-06 | Blink: The Power of Thinking Without Thinking | 56:12 | 244,016 | |
|
2016-09-06 | Human-Level Performance on Word Analogy Questions by Latent Relational Analysis | 1:10:41 | 133 | Vlog |
|
2016-09-06 | Common Sense Reasoning for Interactive Applications | 57:30 | 239 | |
|
2016-09-06 | Self-Migration by Self-Inflation | 39:01 | 35 | |
|
2016-09-06 | A Systemic Approach to Appraisal: Identifying Opinion and Sentiment in Text | 1:00:51 | 3,038 | |
|
2016-09-06 | Structure and stability of complex networks. | 1:11:42 | 294 | |
|
2016-09-06 | Confronting Reality: Doing What Matters to Get Things Done Right | 39:15 | 518 | |
|
2016-09-06 | Recent Developments in Linguistics -- And in the UW Department of Linguistics | 37:24 | 341 | |
|
2016-09-06 | Dartmouth Digital Dorm           | 1:27:54 | 16 | |
|
2016-09-06 | A CLP Approach to Modelling Systems | 1:15:50 | 80 | Let's Play |
|
2016-09-06 | Dynamosaics: Dynamic Mosaics with Non-Chronological Time | 53:46 | 192 | Vlog |
|
2016-09-06 | Automatic Failure Diagnosis in Large-Scale Systems | 1:00:49 | 62 | |
|
2016-09-06 | The Economics of Software Dependability | 1:31:31 | 148 | |
|
2016-09-06 | An Overview of Recent CMU Research on Model-Based Face Processing | 1:27:22 | 281 | |
|
2016-09-06 | Resource acquisition via an unsupervised WSD system | 26:44 | 44 | |
|
2016-09-06 | Fast Infinite-State Model Checking in Integer-Based Systems | 1:17:58 | 80 | |
|
2016-09-06 | WeΓÇÖre Friends, Right?: Inside KidsΓÇÖ Culture [1/4] | 1:25:10 | 1,190 | |
|
2016-09-06 | Accelerated Democracy: How technology might change voting | 1:21:46 | 21 | Vlog |
|
2016-09-06 | When Can Formal Methods Make a Real Difference? | 1:04:31 | 63 | |
|
2016-09-06 | Dynamic Semantics of Programming Languages and Applications to Testing | 33:24 | 1,253 | |
|
2016-09-06 | Type-Safe, Generative, Binding Macros | 1:04:08 | 59 | |
|
2016-09-06 | Error Detection using Shape Analysis with Local Reasoning | 1:12:15 | 37 | |
|
2016-09-06 | Social Network Analysis meets the Semantic Web: What FOAF Reveals About LiveJournal | 1:27:15 | 533 | |
|
2016-09-06 | Distributed Multi-robot Exploration and Mapping | 1:13:43 | 481 | |
|
2016-09-06 | 1.Vision: Extraordinary Computing Experiences & 2. Robots for the Masses: Fiction or Reality | 1:20:39 | 37 | |
|
2016-09-06 | Modeling and Facilitating Human Communication [1/5] | 1:27:01 | 29 | |
|
2016-09-06 | Reducing Errors in Computer Recognition of Handwritten Material | 1:15:57 | 94 | |
|
2016-09-06 | Information wants to be free (but is everywhere in chains) | 41:41 | 235 | Guide |
|
2016-09-06 | Quantum Loop Gas Approach to Topological Phases of Correlated Electrons | 1:13:28 | 284 | Vlog |
|
2016-09-06 | The art and technology of electronic textiles | 47:14 | 443 | Vlog |
|
2016-09-06 | Computational History In Action: Discovering Gutenberg's Printing Process | 1:17:45 | 5,534 | |
|
2016-09-06 | A World Filled With Cameras: Security at the Cost of Freedom? Or Can We Have Both? | 53:46 | 18 | |
|
2016-09-06 | Resisting Denial of Service Attacks by Puzzle Outsourcing | 57:25 | 44 | |
|
2016-09-06 | Transition Invariants | 44:31 | 659 | |
|
2016-09-06 | Declarative querying of sensor networks through automatic service planning | 1:27:53 | 11 | |
|
2016-09-06 | Folklore of Network Protocol Design (Anita Borg Lecture) | 1:27:26 | 593 | |
|
2016-09-06 | Toolkit for Construction and Maintenance of Extensible Proof Search Tactics | 1:04:05 | 26 | |
|
2016-09-06 | ME++ | 1:01:14 | 190 | |
|
2016-09-06 | Structural Comparison of Executable Objects | 1:00:09 | 632 | |
|
2016-09-06 | Indifference is Death: Responsibility, Leadership, & Innovation | 1:24:09 | 91 | |
|
2016-09-06 | TQFTs and tight contact structures on 3-manifolds       | 1:10:09 | 91 | |
|
2016-09-06 | Wireless Embedded Networks/The Ecosystem and Cool Challenges | 1:10:07 | 18 | |
|
2016-09-06 | Data Mining & Machine Learning to empower business strategy | 50:53 | 53 | |
|
2016-09-06 | Some uses of orthogonal polynomials | 1:05:58 | 2,084 | |
|
2016-09-06 | Approximation Algorithms for Embedding with Extra Information and Ordinal Relaxation | 1:10:20 | 326 | Guide |
|
2016-09-06 | Evaluating Retrieval System Effectiveness | 1:11:30 | 1,941 | |
|
2016-09-06 | Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources | 1:07:33 | 40 | |
|
2016-09-06 | Specification-Based Annotation Inference | 1:07:51 | 57 | |
|
2016-09-06 | Emotion Recognition in Speech Signal: Experimental Study, Development and Applications | 1:23:00 | 691 | |
|
2016-09-06 | Text summarization: News and Beyond | 1:25:38 | 281 | |
|
2016-09-06 | Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution | 59:26 | 405 | |
|
2016-09-06 | Learning and Inferring Transportation Routines | 53:16 | 58 | |
|
2016-09-06 | Raising the Bar: Integrity and Passion in Life and Business: The Story of Clif Bar, Inc. | 47:35 | 619 | |
|
2016-09-06 | Revelationary Computing, Proactive Displays and The Experience UbiComp Project | 1:12:34 | 12 | Let's Play |
|