2016-06-22 | NIPS Poster Spotlight Session 8 | 13:36 | 103 | |
|
2016-06-22 | Bing Code Search Add-in for Visual Studio 2013 | 2:46 | 129 | |
|
2016-06-22 | Keynote - A Better Way to Deliver Innovation? | 1:02:55 | 62 | |
|
2016-06-22 | Symposium: Algorithms Among Us - Percy Liang | 16:09 | 386 | |
|
2016-06-22 | Audience Choice Talks (Torch Club) | 1:09:38 | 12 | |
|
2016-06-22 | Computational Video: Methods for Video Segmentation and Video Stabilization, and their Applications. | 1:03:15 | 3,135 | |
|
2016-06-22 | Symposium: Algorithms Among Us - Nick Bostrom | 22:51 | 890 | |
|
2016-06-22 | Oral Session: A Reduced-Dimension fMRI Shared Response Model | 18:15 | 566 | |
|
2016-06-22 | How to Give a Great Research Talk | 59:52 | 2,040 | Guide |
|
2016-06-22 | Oral Session: COEVOLVE- A Joint Point Process Model for Info Diffusion and Network Co-evolution | 23:07 | 570 | |
|
2016-06-22 | Closing Talk | 27:47 | 22 | |
|
2016-06-22 | Closing Remarks | 7:40 | 8,930 | |
|
2016-06-22 | Build a Great website and handy Virtual Tools - Session 1 | 2:58:21 | 144 | |
|
2016-06-22 | Panel Discussion: Fostering Interdisciplinary Talents | 1:01:16 | 13 | Discussion |
|
2016-06-22 | Social Computing Symposium 2015: Audience Choice Talks II | 1:17:10 | 38 | |
|
2016-06-22 | Social Computing Symposium 2015: Audience Choice Talks I | 57:26 | 83 | |
|
2016-06-22 | eScience 2014: Panel - Going Native | 1:15:03 | 60 | |
|
2016-06-22 | Research Challenges in Internet Governance | 1:28:14 | 226 | |
|
2016-06-22 | Build a Great website and handy Virtual Tools - Session 3 | 2:04:19 | 20 | |
|
2016-06-22 | eScience 2014: Panel - The Strategic Importance of eScience | 1:23:21 | 15 | |
|
2016-06-22 | Paradoxes of Openness and Distinction in the Sharing Economy | 1:00:55 | 936 | |
|
2016-06-22 | The Demand for New Knowledge and Interdisciplinary Education at Yonsei University | 27:44 | 36 | |
|
2016-06-22 | Social Computing Symposium 2015: Consequences of Crowdsourcing - Group Debate | 49:47 | 28 | |
|
2016-06-22 | Strategic Thinking for Researchers | 56:46 | 580 | |
|
2016-06-22 | eScience 2014: Welcome, 2014 Jim Gray eScience Award Announcement, Opening Keynote | 1:23:00 | 30 | |
|
2016-06-22 | Computational Thinking in the Sciences and Beyond | 54:07 | 39 | |
|
2016-06-22 | Social Computing Symposium 2015: Short Talks & Demos - Anthony Coscia | 20:10 | 26 | |
|
2016-06-22 | Social Computing Symposium 2015: Medical Devices for Everyone | 25:17 | 12 | |
|
2016-06-22 | Inclusive Cities: Transforming the Lives of Delhi's Urban Poor | 1:14:52 | 124 | |
|
2016-06-22 | Un-Computing: Shaking off the "Computer" Baggage | 56:27 | 80 | |
|
2016-06-22 | Social Computing Symposium 2015: Consequences of Crowdsourcing | 26:35 | 19 | |
|
2016-06-22 | Social Computing Symposium 2015: Sensor Salon | 16:06 | 26 | |
|
2016-06-22 | Social Computing Symposium 2015: Short Talks & Demos | 15:08 | 9 | |
|
2016-06-22 | Social Computing Symposium 2015: The world's largest online workplace | 8:03 | 11 | |
|
2016-06-22 | Social Computing Symposium 2015: We are Dynamic: Powering Collective Action for Crowd Workers | 6:11 | 20 | |
|
2016-06-22 | Communication with Imperfectly Shared Randomness | 1:11:27 | 194 | |
|
2016-06-22 | Social Computing Symposium 2015: SCS Ads | 6:18 | 18 | |
|
2016-06-22 | The Eureka Myth: Creators, Innovators and Everyday Intellectual Property | 1:06:34 | 275 | |
|
2016-06-22 | Practical Privacy for Web Users with COWL | 1:26:14 | 149 | |
|
2016-06-22 | Massively Empowered Classrooms (MEC) | 27:10 | 88 | |
|
2016-06-22 | Risk Aware Approach to Data Confidentiality in Cloud Computing | 1:27:24 | 211 | |
|
2016-06-22 | Experiences with Scaling Blockchain-based Data Stores | 1:19:27 | 1,174 | |
|
2016-06-22 | An Efficient Solver for string and regular expression constraints | 1:00:09 | 454 | |
|
2016-06-22 | Making the Most of Your Samples | 1:00:45 | 78 | |
|
2016-06-22 | Subset Selection Problems - Part 1 | 1:31:54 | 1,566 | |
|
2016-06-22 | Computational Limits to Human Thinking in a Society With Too Much Information And Too Little Time | 51:46 | 140 | Guide |
|
2016-06-22 | From LSI to Probabilistic Topic Models: An introduction to Topic Models - Part 2 | 1:28:18 | 287 | |
|
2016-06-22 | Cluster Trees and Neighborhood Graphs | 59:32 | 547 | |
|
2016-06-22 | Learning, Mixing, and Complexity- A Free Ride on the Second Law | 1:07:56 | 190 | |
|
2016-06-22 | Entity Mining at Microsoft Bing Hyderabad | 1:06:51 | 544 | |
|
2016-06-22 | From LSI to Probabilistic Topic Models: An introduction to Topic Models | 1:00:35 | 2,245 | |
|
2016-06-22 | Computing on Encryption Data: Functional Encryption and More | 43:17 | 1,051 | |
|
2016-06-22 | Advances in Quantum Algorithms & Devices: Quantum versus classical annealing | 44:29 | 571 | |
|
2016-06-22 | Subset Selection Problems - Part 2 | 51:38 | 253 | |
|
2016-06-22 | Bedrock: A Software Development Ecosystem Inside a Proof Assistant | 1:04:57 | 2,181 | |
|
2016-06-22 | Can you convince me why your software works? | 56:47 | 55 | |
|
2016-06-22 | Considering Tools for Artists, Creative Processes, and Design Ideation | 55:15 | 77 | |
|
2016-06-22 | Information-based approaches for Bayesian optimization. | 21:51 | 1,147 | Guide |
|
2016-06-22 | A Case for using Trend Filtering over Splines | 52:55 | 458 | |
|
2016-06-22 | SAT-based Techniques for Optimization and Synthesis. | 58:40 | 724 | |
|
2016-06-22 | Advances in Quantum Algorithms & Devices: Position-based cryptography | 43:10 | 227 | |
|
2016-06-22 | Industry Embraces Open Source-What This Means for Academia | 1:29:23 | 31 | |
|
2016-06-22 | Declarative query processing in imperative managed runtimes | 55:15 | 104 | |
|
2016-06-22 | Tierless Programming and Reasoning for Software-Defined Networks | 49:42 | 88 | |
|
2016-06-22 | Truth in Advertising: The Hidden Cost of Mobile Ads | 1:05:53 | 195 | |
|
2016-06-22 | The Varied Forms of Verification with Z3 | 1:03:27 | 5,294 | |
|
2016-06-22 | Code Hunt Workshop - Day 1 Session 1 | 1:24:07 | 191 | |
|
2016-06-22 | Bonsai: Reactive Tools for Data Science | 1:01:02 | 519 | |
|
2016-06-22 | Program Synthesis from Refinement Types | 54:12 | 973 | |
|
2016-06-22 | Many-Core Compiler Fuzzing | 58:25 | 227 | |
|
2016-06-22 | VISC: Virtual Instruction Set Computing | 1:02:37 | 389 | Tutorial |
|
2016-06-22 | Rebooting CS50 | 1:18:14 | 168 | |
|
2016-06-22 | Micro-Policies: A Framework for Tag-Based Security Monitors | 1:01:04 | 43 | |
|
2016-06-22 | The Turing trap. How the universal computer is making the internet less secure. | 57:08 | 134 | |
|
2016-06-22 | Madoko: a scholarly markdown | 1:04:30 | 6,603 | |
|
2016-06-22 | Code Hunt Workshop - Day 2 Session 6 | 1:27:34 | 24 | |
|
2016-06-22 | Question Answering | 1:30:14 | 3,140 | |
|
2016-06-22 | Code Hunt Workshop - Day 1 Session 2 | 1:17:26 | 34 | |
|
2016-06-22 | Code Hunt Workshop - Day 2 Session 4A | 1:21:00 | 70 | |
|
2016-06-22 | P: A Domain-Specific Language for Asynchronous Event-Driven Programming | 1:00:29 | 1,169 | |
|
2016-06-22 | Checking microarchitectural implementations of weak memory | 1:01:43 | 163 | |
|
2016-06-22 | Code Hunt Workshop - Day 2 Session 4B | 42:40 | 101 | |
|
2016-06-22 | Code Hunt Workshop - Day 1 Session 3 | 37:43 | 34 | |
|
2016-06-22 | The Laws of Programming with Concurrency | 50:52 | 7,020 | |
|
2016-06-22 | Designing Technology for Mental Health and Wellbeing | 51:52 | 867 | Vlog |
|
2016-06-22 | DNN-Based Online Speech Enhancement Using Multitask Learning and Suppression Rule Estimation | 58:23 | 3,211 | |
|
2016-06-22 | Computing Reliably with Molecular Walkers | 1:02:04 | 1,255 | |
|
2016-06-22 | Challenges in automated verification and synthesis for molecular programming | 16:27 | 77 | |
|
2016-06-22 | Decompositions of Natural Signals Still Need Fresh Ideas | 1:07:01 | 113 | |
|
2016-06-22 | Provable Non-convex Projections for High-dimensional Learning Problems -Part2 | 1:37:45 | 377 | |
|
2016-06-22 | Optimal Design for Social Learning | 1:15:38 | 210 | |
|
2016-06-22 | Introduction to Machine Learning in Python with Scikit-Learn | 1:16:19 | 5,243 | |
|
2016-06-22 | Lab tutorial: Learning about Shape | 1:00:23 | 236 | Tutorial |
|
2016-06-22 | Improving Behavioral Health Intervention Technologies: Harnessing the Human Side of Apps | 56:49 | 233 | Vlog |
|
2016-06-22 | Charles River Crypto Day - The Power of Negations in Cryptography | 1:12:19 | 493 | |
|
2016-06-22 | Scalable Kernel Methods via Doubly Stochastic Gradients | 1:10:54 | 1,259 | |
|
2016-06-22 | Molecular Tumor Boards: What they are; What they do; What they need | 50:25 | 1,167 | |
|
2016-06-22 | The Contextual Bandits Problem: A New, Fast, and Simple Algorithm | 1:00:56 | 11,958 | |
|
2016-06-22 | Cell cycle switching by an algorithm | 13:18 | 23 | |
|
2016-06-22 | Provable Non-convex Projections for High-dimensional Learning Problems - Part1 | 1:05:54 | 601 | |
|