2016-08-17 | Leveraging Structure to Efficiently Make Good Decisions in an Uncertain World | 1:11:54 | 29 | |
|
2016-08-17 | Research on Scholarly Practices and Communication at Cornell Information Science | 1:01:30 | 102 | |
|
2016-08-17 | SSLShader: Cheap SSL Acceleration with Commodity Processors | 1:05:16 | 209 | |
|
2016-08-17 | Toward Automated Debugging for Datacenter Applications | 1:14:14 | 32 | |
|
2016-08-17 | Optimal Pricing in Networks with Externalities | 53:51 | 148 | |
|
2016-08-17 | HOW THE DIGITAL UNIVERSE GOT ITS SPOTS | 1:07:12 | 124 | |
|
2016-08-17 | 3D Reconstruction meets GPGPU meets Image Analysis | 53:57 | 86 | |
|
2016-08-17 | Percolation on Self-Dual Polygon Configurations | 1:06:02 | 125 | |
|
2016-08-17 | Automated Traceability Techniques for Software Engineering and e-Science | 57:19 | 334 | |
|
2016-08-17 | Digital Archeology of Software | 1:02:13 | 304 | Vlog |
|
2016-08-17 | Executable Knowledge for Molecular Systems Biology | 1:14:06 | 189 | Vlog |
|
2016-08-17 | WISPs, Computational RFID and the Internet of Things | 1:21:14 | 931 | |
|
2016-08-17 | High-level Languages for Low-level Systems | 54:50 | 328 | |
|
2016-08-17 | Decision Making under Uncertainty | 59:42 | 839 | |
|
2016-08-17 | Recognizing a Million Voices: Low Dimensional Audio Representations for Speaker Identification | 1:51:22 | 6,023 | |
|
2016-08-17 | Distributed Implementations of Component-based Systems Using Source-to-source Transformations in BIP | 35:01 | 108 | |
|
2016-08-17 | Coping with Uncertain Data: Multi-Source Integration and Fuzzy Lookups | 1:24:14 | 274 | |
|
2016-08-17 | Providing Richer Descriptions for Images | 1:00:37 | 23 | |
|
2016-08-17 | Building and Evaluating Creative Interaction | 1:17:38 | 39 | |
|
2016-08-17 | Enforcing topological constraints in energy-based image segmentation | 54:52 | 317 | Vlog |
|
2016-08-17 | Probabilistic Approximation Theorems in Game Theory; The Theory of Crowdsourcing | 1:19:02 | 6,251 | |
|
2016-08-17 | Longitudinal Evaluation of API Usability and Designing Support for Collaborative Search | 59:56 | 14 | |
|
2016-08-17 | On a first-order primal-dual algorithm with applications to convex problems in computer vision | 1:10:00 | 3,143 | |
|
2016-08-17 | Two Vignettes in Computational Finance | 1:09:26 | 382 | |
|
2016-08-17 | MSR Overview: Introduction & Logistics, Overview, The 4th Paradigm; Tech Surveys | 2:24:45 | 82 | Vlog |
|
2016-08-17 | Inductive Synthesis of Recursive Functional Programs | 1:05:24 | 466 | |
|
2016-08-17 | Precise Identification of Problems for Structural Test Generation | 35:03 | 31 | |
|
2016-08-17 | Why is Sports Photography Hard? (and what we can do about it) | 59:34 | 3,084 | |
|
2016-08-17 | Semantic image understanding: from the web, in large scale and with real-world data | 1:01:08 | 655 | |
|
2016-08-17 | Large matrices beyond singular value decomposition | 56:43 | 450 | |
|
2016-08-17 | Database Cracking | 55:43 | 797 | |
|
2016-08-17 | AI and the Promise of Interactive Storytelling | 1:23:22 | 982 | |
|
2016-08-17 | Natural Interfaces in the field | 1:03:55 | 30 | |
|
2016-08-17 | Synthesizing from Components: Building from Blocks | 46:07 | 101 | |
|
2016-08-17 | An Intuitive and Efficient Semantics for Concurrent Programming Languages | 1:07:36 | 142 | |
|
2016-08-17 | Decentralizing Attribute-Based Encryption | 1:05:50 | 3,704 | |
|
2016-08-17 | Higher Order Principal Components: Complexity and Applications | 1:05:12 | 49 | |
|
2016-08-17 | Object-Centered Visual Recognition | 56:31 | 393 | |
|
2016-08-17 | Beyond Naming: Image Understanding via Physical, Functional and Causal Relationships | 1:04:27 | 52 | |
|
2016-08-17 | Student Achievement System | 1:16:43 | 69 | |
|
2016-08-17 | Exploiting Myopic Learning | 57:39 | 66 | |
|
2016-08-17 | Extracting and Querying Probabilistic Information in BayesStore | 1:08:22 | 127 | Guide |
|
2016-08-17 | Modeling Audio and Visual Cues for Real-world Event Detection | 1:10:31 | 309 | |
|
2016-08-17 | Hidden Markets: Designing Efficient but Simple Electronic Markets | 1:00:36 | 61 | |
|
2016-08-17 | Static and Dynamic Program Analysis: Synergies and Applications | 1:15:40 | 364 | |
|
2016-08-17 | Machine Learning for WLAN Positioning | 38:01 | 970 | |
|
2016-08-17 | Non-Interactive Verifiable Computing | 59:16 | 492 | |
|
2016-08-17 | A couple of results about JavaScript | 58:21 | 45 | |
|
2016-08-17 | How to Compute in a Selfish Society | 1:13:18 | 246 | |
|
2016-08-17 | How to win Friends and Influence People, Truthfully | 1:07:50 | 222 | Guide |
|
2016-08-17 | Microsoft Overview: Library & Bing, Pivot Viewer & Silverlight, Office Labs, Xbox / Kinect | 1:21:02 | 60 | |
|
2016-08-17 | Improving the Future by Examining the Past | 51:35 | 139 | |
|
2016-08-17 | Symmetry-Aware Predicate Abstraction for Shared-Variable Concurrent Programs | 1:10:07 | 268 | |
|
2016-08-17 | Using Technology the Cherokee Way | 59:40 | 61 | Vlog |
|
2016-08-17 | Statistical Physics, Interpolation Method and Scaling Limits in Sparse Random Graphs | 1:02:22 | 230 | |
|
2016-08-17 | An Elementary Proof of the Restricted Invertibility Theorem | 57:30 | 249 | |
|
2016-08-17 | Personal Space and Automatically Learned Social Networks | 46:54 | 15 | |
|
2016-08-17 | Cloud Enabled Mobile Computing - An Introduction. Lecture 3 Location and Context | 14:18 | 25 | |
|
2016-08-17 | Cloud Enabled Mobile Computing - An Introduction. Lecture 1 Definitions and Technology | 17:06 | 161 | |
|
2016-08-17 | On the Fourier Spectrum of Symmetric Boolean Functions | 1:12:49 | 274 | |
|
2016-08-17 | Randomized Broadcast and Possible Connection to other Models | 44:11 | 15 | |
|
2016-08-17 | The Reconstruction Problem on the Tree | 1:23:19 | 87 | |
|
2016-08-17 | Information and Interactive Communication | 1:03:28 | 29 | Guide |
|
2016-08-17 | The Impact of Visualization on Search and Discovery; ScienceCinema; Speech Processing Quaero | 1:43:43 | 35 | |
|
2016-08-17 | Interactive Illustrations; Delivering Interactive 3D Moleculars; Interactive Multimedia Publishing | 1:50:16 | 25 | |
|
2016-08-17 | Semantics of Innovation in Visualization; PivotViewer; Visualization of Ecological Data | 1:23:12 | 29 | Vlog |
|
2016-08-17 | Telling Stories in the Cloud; Communications from the Particle Frontier; Video Analytics | 1:08:14 | 13 | |
|
2016-08-17 | On Users' Mental Models of Security Controls | 1:11:34 | 92 | |
|
2016-08-17 | Why Don't Software Developers Use their Tools? | 1:05:01 | 25 | |
|
2016-08-17 | The Mathematics of Side-Channel Attacks | 1:00:34 | 1,862 | |
|
2016-08-17 | PyPy's Approach to Implementing Dynamic Languages Using a Tracing JIT Compiler | 1:06:02 | 489 | |
|
2016-08-17 | Fine-Grained Power Modeling for Smartphones Using System Call Tracing | 1:04:59 | 138 | |
|
2016-08-17 | Reputational Bargaining Under Knowledge of Rationality | 1:02:50 | 40 | |
|
2016-08-17 | We Will be Right With You: Managing Customers Expectations with Vague Promises and Cheap Talk | 1:10:43 | 113 | |
|
2016-08-17 | Information That Matters: Investigating Relevance of Entities in Social Media Networks | 1:06:32 | 84 | Guide |
|
2016-08-17 | Efficient Bayesian Algorithmic Mechanism Design | 1:03:20 | 465 | |
|
2016-08-17 | Extreme Learning Machine: Learning Without Iterative Tuning | 1:33:32 | 2,603 | |
|
2016-08-17 | Extracting Knowledge from Networks: Rumors, Superstars, and Communities | 1:05:35 | 69 | |
|
2016-08-17 | Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms | 54:09 | 109 | |
|
2016-08-17 | Limit Theorems in Pseudorandomness and Learning Theory | 1:00:11 | 77 | |
|
2016-08-17 | Empirical Software Engineering, Version 2.0 | 53:14 | 426 | |
|
2016-08-17 | A Master Bijection for Planar Maps, and Its Applications | 50:00 | 73 | |
|
2016-08-17 | Password-based Authenticated Key Exchange at the Cost of Diffie-Hellman | 57:30 | 827 | |
|
2016-08-17 | Generalized Identity-Based Encryption | 51:15 | 674 | |
|
2016-08-17 | Cryptography with Weak, Noisy, Leaky and Tempered Keys | 58:24 | 99 | |
|
2016-08-17 | Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms | 1:02:03 | 97 | |
|
2016-08-17 | Broadcast Based Peer Review in Open Source Software Development Projects | 55:59 | 45 | Review |
|
2016-08-17 | Optimization under Uncertainty: Understanding the Correlation Gap | 1:01:49 | 953 | |
|
2016-08-17 | Computational Social Choice: Algorithmic, Strategic, and Combinatorial Aspects | 56:33 | 735 | |
|
2016-08-17 | Harvesting and Querying the World's Knowledge | 49:48 | 9 | |
|
2016-08-17 | The FT-Mollification Method | 59:06 | 168 | |
|
2016-08-17 | Getting More: How to Negotiate to Achieve Your Goals in the Real World | 1:05:14 | 21,530 | Guide |
|
2016-08-17 | HPC Virtual Worlds: Experimental Black Hole Dynamics on Parallel Computers | 54:37 | 19 | |
|
2016-08-17 | Optimal Moment Estimation in Data Streams | 53:03 | 552 | |
|
2016-08-16 | Microsoft Health Tech Today: Patient-friendly Apps | 6:42 | 187 | |
|
2016-08-16 | Conditional Action Programmer demo | 2:47 | 187 | |
|
2016-08-16 | The Edge of Artificial Intelligence - AI Experimentation Platform Overview | 44:45 | 918 | |
|
2016-08-16 | What is Code Hunt? | 2:58 | 4,427 | |
|
2016-08-16 | End of Internship Talks | 58:51 | 195 | |
|
2016-08-16 | Data Science Summer School 2016 - Fare Share: Flow and Efficiency in NYC's Taxi System | 33:13 | 341 | |
|