2016-08-17 | Building a global phenology model | 49:26 | 72 | Vlog |
|
2016-08-17 | Can you read this? If you cannot read, we can help you. If you can read, you can help us. | 50:38 | 817 | Let's Play |
|
2016-08-17 | Surface Haptics: Virtual Touch on Physical Surfaces | 51:28 | 2,826 | |
|
2016-08-17 | TouchDevelop for Windows Phone: Write code for your phone on your phone! | 43:53 | 175 | |
|
2016-08-17 | Living in a de-material world: The design and maintenance of sustainable social networks | 1:05:10 | 37 | |
|
2016-08-17 | Metric and Ultrametric Modelling of Semantics and Change for Decision Making | 58:57 | 157 | |
|
2016-08-17 | Day 1 recap and discussion | 16:21 | 11 | Discussion |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Mercé Crosas | 12:22 | 20 | |
|
2016-08-17 | Mechanism Design for a Risk Averse Seller | 1:09:17 | 123 | |
|
2016-08-17 | The KinectΓÇÖs Body Part Recognition Algorithm on an FPGA | 53:14 | 360 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Ashfaq Munshi | 8:59 | 108 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Jessica Mezei | 10:38 | 44 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Peter Binfield | 11:23 | 4 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Jason Priem | 12:10 | 31 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Lee Dirks | 9:37 | 20 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Jevin West | 10:18 | 42 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Alex Wade | 10:50 | 28 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Sarah Greene | 11:02 | 7 | |
|
2016-08-17 | Welcome and Introductions: 2011 eScience Workshop-Transforming Scholarly Communication | 17:47 | 10 | |
|
2016-08-17 | Invited Demonstrations (Session II; 10 minutes/demonstrator) Alberto Accomazzi | 10:43 | 17 | |
|
2016-08-17 | Cryptanalysis Workshop Session 1 | 2:11:19 | 1,199 | |
|
2016-08-17 | Sparsest Cut, Discrete Differentiation, and Local Rigidity of Sets in the Plane | 52:24 | 377 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Moshe Pritsker | 12:29 | 272 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Chris Lintott | 10:44 | 66 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Charles Parnot | 8:56 | 86 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Phil Bourne | 9:40 | 17 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Tim Clark | 11:30 | 11 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) David DeRoure | 10:05 | 25 | |
|
2016-08-17 | Invited Demonstrations (Session I; 10 minutes/demonstrator) Rafael Sidi | 10:12 | 28 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop - You ainΓÇÖt seen nothing yet! | 47:20 | 10 | |
|
2016-08-17 | Serendipity and Spam | 1:03:15 | 23 | |
|
2016-08-17 | Graphical Models for Characterizing Context | 57:41 | 49 | |
|
2016-08-17 | Structured Prediction Models for High-level Computer Vision Tasks | 56:37 | 170 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop- WhatΓÇÖs Next? | 35:39 | 1 | |
|
2016-08-17 | Netalyzr: Network Measurement as a Network Security Problem | 58:55 | 313 | |
|
2016-08-17 | Information-Greedy Global Optimisation | 1:01:05 | 50 | Guide |
|
2016-08-17 | Abstractions in Satisfiability Solvers | 1:07:01 | 229 | |
|
2016-08-17 | Efficient Oblivious Automata Evaluation and Its Application | 1:17:42 | 104 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop - Why do humans keep undermining System Research! | 31:09 | 35 | |
|
2016-08-17 | The Mathematical Challenge of Large Networks | 1:12:35 | 54 | |
|
2016-08-17 | Modeling Conversations in Social Media | 38:18 | 214 | |
|
2016-08-17 | Validation of a Quantum Simulator | 57:01 | 156 | |
|
2016-08-17 | Andrew Herbert Career Celebration Workshop - Verifying Cryptographic Code in C | 28:36 | 36 | |
|
2016-08-17 | SOLOMON: Seeking the Truth Via Copying Detection | 1:11:47 | 83 | |
|
2016-08-17 | Failure is a Four-Letter Word ΓÇô A Parody in Empirical Research | 34:21 | 65 | |
|
2016-08-17 | Program Transformations for Holistic Query Optimization | 1:04:13 | 195 | |
|
2016-08-17 | 3D Surface Reconstruction Using a Generalized Distance Function | 1:15:00 | 6,727 | |
|
2016-08-17 | Secure Biometric Computation and Outsourcing | 1:00:14 | 131 | |
|
2016-08-17 | Strong Eventual Consistency and Conflict-free Replicated Data Types | 1:14:05 | 5,542 | |
|
2016-08-17 | Solving Hard Problems in Science and Education with Game-based Symbiosis of Humans and Computers | 1:34:13 | 59 | |
|
2016-08-17 | Personalized Services in a Privacy-Preserving Datacenter | 56:14 | 9 | |
|
2016-08-17 | Blame for All | 1:06:29 | 248 | |
|
2016-08-17 | Coupled dynamics of traits and populations in response to environmental change | 1:08:46 | 54 | |
|
2016-08-17 | Geometry and Theoretical Computer Science | 1:18:37 | 391 | |
|
2016-08-17 | On the Preimage Resistance of SHA-1 | 35:33 | 615 | |
|
2016-08-17 | Automated FPGA Verification and Debugging | 1:17:22 | 2,249 | |
|
2016-08-17 | Mechanism Design without Money via Stable Matching | 58:15 | 178 | |
|
2016-08-17 | SpecNet: Spectrum Sensing Sans Fronti`eres | 40:26 | 55 | |
|
2016-08-17 | Non-Visual Mainstream Smartphone and Camera Interactions for Blind and Low-Vision Users | 49:46 | 538 | |
|
2016-08-17 | Laws of Concurrent Programming | 1:04:56 | 3,602 | |
|
2016-08-17 | Badge Inference for Transparent Personalization | 39:15 | 7 | |
|
2016-08-17 | DieHarder: Securing the Heap | 48:04 | 432 | |
|
2016-08-17 | Scalable, Consistent, and Elastic Database Systems for Cloud Platforms | 1:14:31 | 195 | |
|
2016-08-17 | Strategies for scaling up data mining algorithms | 46:35 | 72 | |
|
2016-08-17 | Applications of Grammatical Inference in Security and Program Analysis | 1:09:23 | 404 | |
|
2016-08-17 | User-Tailored Privacy for Internationally Operating Personalized Websites | 1:20:01 | 12 | |
|
2016-08-17 | Theories, Solvers and Static Analysis by Abstract Interpretation | 1:16:20 | 3,943 | |
|
2016-08-17 | Opinion Dynamics and Influence in Social Networks | 1:16:31 | 720 | |
|
2016-08-17 | Understanding Visual Scenes: Where are We? | 37:20 | 1,452 | |
|
2016-08-17 | Energy Functionals: Choices and Consequences For Medical Image Segmentation | 57:26 | 157 | |
|
2016-08-17 | Abelian Sandpiles and the Harmonic Model | 52:15 | 1,170 | |
|
2016-08-17 | Full-rank Gaussian Modeling of Convolutive Audio Mixtures Applied to Source Separation | 1:24:19 | 308 | |
|
2016-08-17 | MADDER and Self-Tuning Data Analytics on Hadoop with Starfish | 1:21:02 | 115 | |
|
2016-08-17 | Approximation Algorithms for Correlated Knapsacks and Non-Martingale Bandits | 1:03:22 | 389 | |
|
2016-08-17 | ChatArt: Interactive Pictographic Chat | 25:54 | 57 | |
|
2016-08-17 | Nonnegative k-sums, fractional covers, and probability of small deviations | 1:05:28 | 77 | |
|
2016-08-17 | Injective Tensor Norms: Hardness and Reductions | 1:08:27 | 45 | |
|
2016-08-17 | Monitoring Untrusted Modern Applications with Collective Record and Replay | 58:52 | 20 | |
|
2016-08-17 | Practical Boogie (on the example of VCC) | 58:31 | 487 | |
|
2016-08-17 | Coherent Depth in Stereo Vision | 41:14 | 1,347 | |
|
2016-08-17 | Multi-microphone Dereverberation and Intelligibility Estimation in Speech Processing | 1:26:28 | 638 | |
|
2016-08-17 | From Personalized Retinal Image Mapping to Large Scale Parallel Image Processing | 1:09:15 | 229 | |
|
2016-08-17 | Coding4Fun XAPfest! | 1:16:04 | 38 | |
|
2016-08-17 | Your Abstractions are Worth Powerless! Non-Volatile Storage and Computation on Embedded Devices | 1:12:25 | 84 | |
|
2016-08-17 | Near Optimal Online Algorithms and Fast Approximation Algorithms for Resource Allocation Problems | 46:10 | 836 | |
|
2016-08-17 | Interpreting the Community: Information Practices and/for Deviance | 40:19 | 29 | Guide |
|
2016-08-17 | Pretty Good Democracy for a variety of voting schemes | 1:03:16 | 163 | |
|
2016-08-17 | Learning Valuation Functions | 1:11:34 | 226 | |
|
2016-08-17 | Applying Semantic Analyses to Content-based Recommendation and Document Clustering | 43:16 | 1,180 | |
|
2016-08-17 | Fusing Mobile, Sensor, and Social Computing in the Cloud To Enable Context-Aware Applications | 1:01:56 | 89 | |
|
2016-08-17 | The Past, Present, and Future of Video Telephony | 1:07:32 | 1,261 | |
|
2016-08-17 | Multi-People Tracking through Global Optimization | 57:56 | 74 | |
|
2016-08-17 | Bridging Shannon and Hamming: Codes for Computationally Simple Channels | 1:04:43 | 203 | |
|
2016-08-17 | Using Program Verification Tools in Teaching | 1:30:41 | 480 | |
|
2016-08-17 | Crowdsourcing for Statistical Machine Translation | 1:55:06 | 236 | |
|
2016-08-17 | Computational Science Research in Latin America | 1:33:51 | 53 | |
|
2016-08-17 | The Laplacian Paradigm: Emerging Algorithms for Massive Graphs | 1:06:47 | 844 | | Paradigm
|
2016-08-17 | YouΓÇÖre the Manager but IΓÇÖm the Mayor: Understanding Foursquare Check-ins in Claimed Venues | 48:02 | 6 | |
|
2016-08-17 | Beyond the Gaussian Universality Class | 1:04:13 | 254 | |
|
2016-08-17 | Microsoft Academic Search: Next-Generation Scholarly Discovery | 1:31:03 | 566 | |
|