2016-08-17 | Software Language Design and Engineering: Mobl & Spoofax | 1:14:47 | 457 | |
|
2016-08-17 | Software: Design and Performance | 1:00:56 | 76 | |
|
2016-08-17 | Analysing biological information processing with mechanistic modular models | 57:36 | 122 | Guide |
|
2016-08-17 | Presentation of Jim Gray Award | 13:30 | 15 | |
|
2016-08-17 | Large-scale Retrieval with Ivory and MapReduce | 56:22 | 45 | |
|
2016-08-17 | Spanish forest dynamics: Constraining models with data | 33:14 | 82 | |
|
2016-08-17 | Real versus Realistically Rendered Ground Truth | 40:27 | 354 | |
|
2016-08-17 | How to solve a 112-bit ECDLP using game consoles | 1:00:38 | 599 | Let's Play |
|
2016-08-17 | A First Look at a Commercial Hybrid Content Delivery System | 1:22:32 | 43 | |
|
2016-08-17 | Understanding Roles in Software Organizations | 59:39 | 93 | |
|
2016-08-17 | Natural Interactions & Computing for Global Development at MSR India | 56:34 | 44 | |
|
2016-08-17 | On Queues and Numbers | 1:01:17 | 33 | |
|
2016-08-17 | PAC-Bayesian Machine Learning: Learning by Optimizing a Performance Guarantee | 1:27:09 | 2,943 | |
|
2016-08-17 | Mini Talks on Multimedia, Interaction and Communication | 1:22:05 | 195 | |
|
2016-08-17 | Personal Health Information Management: More than just access to health records | 1:11:03 | 853 | Guide |
|
2016-08-17 | iSAX 2.0: Indexing and Mining One Billion Time Series; Database Cracking | 1:25:35 | 732 | |
|
2016-08-17 | Piecewise Bounds for Estimating Bernoulli-Logistic Latent Gaussian Models | 1:06:49 | 164 | Vlog |
|
2016-08-17 | Topological quantum computing with Majorana Fermions | 1:10:10 | 9,795 | Vlog |
|
2016-08-17 | Building a global phenology model | 49:26 | 72 | Vlog |
|
2016-08-17 | Can you read this? If you cannot read, we can help you. If you can read, you can help us. | 50:38 | 817 | Let's Play |
|
2016-08-17 | Surface Haptics: Virtual Touch on Physical Surfaces | 51:28 | 2,826 | |
|
2016-08-17 | TouchDevelop for Windows Phone: Write code for your phone on your phone! | 43:53 | 175 | |
|
2016-08-17 | Living in a de-material world: The design and maintenance of sustainable social networks | 1:05:10 | 37 | |
|
2016-08-17 | Metric and Ultrametric Modelling of Semantics and Change for Decision Making | 58:57 | 157 | |
|
2016-08-17 | Day 1 recap and discussion | 16:21 | 11 | Discussion |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Mercé Crosas | 12:22 | 20 | |
|
2016-08-17 | Mechanism Design for a Risk Averse Seller | 1:09:17 | 123 | |
|
2016-08-17 | The KinectΓÇÖs Body Part Recognition Algorithm on an FPGA | 53:14 | 360 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Ashfaq Munshi | 8:59 | 108 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Jessica Mezei | 10:38 | 44 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Peter Binfield | 11:23 | 4 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Jason Priem | 12:10 | 31 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Lee Dirks | 9:37 | 20 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Jevin West | 10:18 | 42 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Alex Wade | 10:50 | 28 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Sarah Greene | 11:02 | 7 | |
|
2016-08-17 | Welcome and Introductions: 2011 eScience Workshop-Transforming Scholarly Communication | 17:47 | 10 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Alberto Accomazzi | 10:43 | 17 | |
|
2016-08-17 | Cryptanalysis Workshop Session 1 | 2:11:19 | 1,199 | |
|
2016-08-17 | Sparsest Cut, Discrete Differentiation, and Local Rigidity of Sets in the Plane | 52:24 | 377 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Moshe Pritsker | 12:29 | 272 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Chris Lintott | 10:44 | 66 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Charles Parnot | 8:56 | 86 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Phil Bourne | 9:40 | 17 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Tim Clark | 11:30 | 11 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) David DeRoure | 10:05 | 25 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Rafael Sidi | 10:12 | 28 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop - You ainΓÇÖt seen nothing yet! | 47:20 | 10 | |
|
2016-08-17 | Serendipity and Spam | 1:03:15 | 23 | |
|
2016-08-17 | Graphical Models for Characterizing Context | 57:41 | 49 | |
|
2016-08-17 | Structured Prediction Models for High-level Computer Vision Tasks | 56:37 | 170 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop- WhatΓÇÖs Next? | 35:39 | 1 | |
|
2016-08-17 | Netalyzr: Network Measurement as a Network Security Problem | 58:55 | 313 | |
|
2016-08-17 | Information-Greedy Global Optimisation | 1:01:05 | 50 | Guide |
|
2016-08-17 | Abstractions in Satisfiability Solvers | 1:07:01 | 229 | |
|
2016-08-17 | Efficient Oblivious Automata Evaluation and Its Application | 1:17:42 | 104 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop - Why do humans keep undermining System Research! | 31:09 | 35 | |
|
2016-08-17 | The Mathematical Challenge of Large Networks | 1:12:35 | 54 | |
|
2016-08-17 | Modeling Conversations in Social Media | 38:18 | 214 | |
|
2016-08-17 | Validation of a Quantum Simulator | 57:01 | 156 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop - Verifying Cryptographic Code in C | 28:36 | 36 | |
|
2016-08-17 | SOLOMON: Seeking the Truth Via Copying Detection | 1:11:47 | 83 | |
|
2016-08-17 | Failure is a Four-Letter Word ΓÇô A Parody in Empirical Research | 34:21 | 65 | |
|
2016-08-17 | Program Transformations for Holistic Query Optimization | 1:04:13 | 195 | |
|
2016-08-17 | 3D Surface Reconstruction Using a Generalized Distance Function | 1:15:00 | 6,727 | |
|
2016-08-17 | Secure Biometric Computation and Outsourcing | 1:00:14 | 131 | |
|
2016-08-17 | Strong Eventual Consistency and Conflict-free Replicated Data Types | 1:14:05 | 5,542 | |
|
2016-08-17 | Solving Hard Problems in Science and Education with Game-based Symbiosis of Humans and Computers | 1:34:13 | 59 | |
|
2016-08-17 | Personalized Services in a Privacy-Preserving Datacenter | 56:14 | 9 | |
|
2016-08-17 | Blame for All | 1:06:29 | 248 | |
|
2016-08-17 | Coupled dynamics of traits and populations in response to environmental change | 1:08:46 | 54 | |
|
2016-08-17 | Geometry and Theoretical Computer Science | 1:18:37 | 391 | |
|
2016-08-17 | On the Preimage Resistance of SHA-1 | 35:33 | 615 | |
|
2016-08-17 | Automated FPGA Verification and Debugging | 1:17:22 | 2,249 | |
|
2016-08-17 | Mechanism Design without Money via Stable Matching | 58:15 | 178 | |
|
2016-08-17 | SpecNet: Spectrum Sensing Sans Fronti`eres | 40:26 | 55 | |
|
2016-08-17 | Non-Visual Mainstream Smartphone and Camera Interactions for Blind and Low-Vision Users | 49:46 | 538 | |
|
2016-08-17 | Laws of Concurrent Programming | 1:04:56 | 3,602 | |
|
2016-08-17 | Badge Inference for Transparent Personalization | 39:15 | 7 | |
|
2016-08-17 | DieHarder: Securing the Heap | 48:04 | 432 | |
|
2016-08-17 | Scalable, Consistent, and Elastic Database Systems for Cloud Platforms | 1:14:31 | 195 | |
|
2016-08-17 | Strategies for scaling up data mining algorithms | 46:35 | 72 | |
|
2016-08-17 | Applications of Grammatical Inference in Security and Program Analysis | 1:09:23 | 404 | |
|
2016-08-17 | User-Tailored Privacy for Internationally Operating Personalized Websites | 1:20:01 | 12 | |
|
2016-08-17 | Theories, Solvers and Static Analysis by Abstract Interpretation | 1:16:20 | 3,943 | |
|
2016-08-17 | Opinion Dynamics and Influence in Social Networks | 1:16:31 | 720 | |
|
2016-08-17 | Understanding Visual Scenes: Where are We? | 37:20 | 1,452 | |
|
2016-08-17 | Energy Functionals: Choices and Consequences For Medical Image Segmentation | 57:26 | 157 | |
|
2016-08-17 | Abelian Sandpiles and the Harmonic Model | 52:15 | 1,170 | |
|
2016-08-17 | Full-rank Gaussian Modeling of Convolutive Audio Mixtures Applied to Source Separation | 1:24:19 | 308 | |
|
2016-08-17 | MADDER and Self-Tuning Data Analytics on Hadoop with Starfish | 1:21:02 | 115 | |
|
2016-08-17 | Approximation Algorithms for Correlated Knapsacks and Non-Martingale Bandits | 1:03:22 | 389 | |
|
2016-08-17 | ChatArt: Interactive Pictographic Chat | 25:54 | 57 | |
|
2016-08-17 | Nonnegative k-sums, fractional covers, and probability of small deviations | 1:05:28 | 77 | |
|
2016-08-17 | Injective Tensor Norms: Hardness and Reductions | 1:08:27 | 45 | |
|
2016-08-17 | Monitoring Untrusted Modern Applications with Collective Record and Replay | 58:52 | 20 | |
|
2016-08-17 | Practical Boogie (on the example of VCC) | 58:31 | 487 | |
|
2016-08-17 | Coherent Depth in Stereo Vision | 41:14 | 1,347 | |
|
2016-08-17 | Multi-microphone Dereverberation and Intelligibility Estimation in Speech Processing | 1:26:28 | 638 | |
|
2016-08-17 | From Personalized Retinal Image Mapping to Large Scale Parallel Image Processing | 1:09:15 | 229 | |
|