|
Microsoft Research Cambridge Talks Admins
Name: | Microsoft Research Cambridge Talks Admins |
Affiliation: | Microsoft |
E-mail: | (only provided to users who are logged into talks.cam) |
Last login: | Wed Sep 18 12:54:11 +0000 2024 |
Public lists managed by Microsoft Research Cambridge Talks Admins
Talks given by Microsoft Research Cambridge Talks Admins
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Microsoft Research Cambridge Talks Admins
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Microsoft Research Cambridge Talks Admins actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Beyond Flatland: A Geometric Take on Matching Methods for Treatment Effect Estimation & Efficient World Models with Context-Aware Tokenization
- The second generation of meta-learning methods
- Assisting in the response to the COVID19 pandemic using internet data, Dr Elad Yom-Tov - MSR Cambridge, Lecture Series
- Distributed distributional codes for learning successor features in partially observable environments
- Adaptive laser fabrication for future photonic technologies
- Sankie: Using Data to Build Better Systems and Services
- Ultrafast laser writing of integrated waveguides toward quantum sources
- Machine Learning Meetup
- Deep (Inter-)Active Learning for NLP: Cure-all or Catastrophe?
- Deep (Inter-)Active Learning for NLP: Cure-all or Catastrophe?
- Algorithmic Differentiation (AD) Beyond Back Propagation
- Moonshot Thinking to Unleash Innovation, Dr Pablo Rodriguez - Telefonica Alpha: MSR Cambridge, Lecture Series
- The Mobile Computing Platform after Smartphones - Prof Romit Roy Choudhury: MSR Cambridge, Lecture Series
- Photonic-chip-based soliton microcombs
- Advanced polarized light microscopy for mapping molecular orientation
- Three case studies for coexisting mechanisms in protein-pattern forming systems
- Modeling User Experience in Games: Lessons Learned
- Physical security and side channel attacks in Arm based SoCs
- Using reason and evidence to do the most good
- How good is your classifier? Revisiting the role of evaluation metrics in machine learning
- Antennas for light and their applications in classical optics
- PRECOG: PREdiction Conditioned On Goals in Visual Multi-Agent Settings
- Photons in the cloud: communicating and storing data
- Photonics for Computing: from Optical Interconnects to Neuromorphic Architectures
- Pizza & AI June 2019
- Pizza & AI April 2019
- Canopus and RCanopus: Scalable Consensus for Permissioned Blockchains
- Canopus and RCanopus: Scalable Consensus for Permissioned Blockchains
- An introduction to clustering and the expectation maximisation algorithm Part 2
- An introduction to clustering and the expectation maximisation algorithm Part 1
- MSR Cambridge Cloud Talk Series; Structured light: seeing less to see more in optical microscopy
- What difference does one tonne make?
- Open Issues in Build Systems
- Neural Code Comprehension: A Learnable Representation of Code Semantics
- Pizza & AI February 19
- An Introduction to Simple Markov Models
- Pizza & AI January 2019
- What Can Fair ML Learn from Economic Theories of Distributive Justice?
- Idris 2: Type Driven Development of Idris
- AI + Pizza October 2018
- Flux: Elegant Machine Learning with Julia
- AI + Pizza September 2018
- Simulation for Intelligent Systems
- AI+Pizza July 2018
- Neural Ordinary Differential Equations
- Interpretability in Machine Learning: What it means, How we're getting there
- Combating Student Mental Illness with Technology—from the Imagine Cup UK Finals
- AI+Pizza June 2018
- DiCE: The Infinitely Differentiable Monte-Carlo Estimator
- Herding Nulls – and other C# stories from the future
- Windows Insider Program
- AI+Pizza April 2018
- AI+Pizza February 2018
- AI+Pizza January 2018
- Optimal algorithms for smooth and strongly convex distributed optimization in networks
- Bayesian Generative Adversarial Networks
- Let’s speed up the Internet, fast!
- Rethinking the Quantified Self to make personal data engaging and useful
- Probabilistic and Deep Models for 3D Reconstruction
- Manifest Sharing with Session Types
- Coin Betting for Backprop without Learning Rates and More
- How Can NLP Help Cure Cancer?
- AI and Healthcare Open Evening at Microsoft Research
- Composition and Inheritance in Declarative Configuration Languages
- Composition and Inheritance in Declarative Configuration Languages
- Nonlinear ICA using temporal structure: a principled framework for unsupervised deep learning
- Microsoft & the Future of Education Technology & Learning
- Predicting 3D Volume and Depth from a Single View
- Predicting 3D Volume and Depth from a Single View
- Security and Privacy in Machine Learning
- Security and Privacy in Machine Learning
- Engineering the Future: Engineering in Artificial Intelligence at Microsoft Research Cambridge
- Computing In Schools: How Your Skills Can Change Lives
- Queueing with Redundant Requests: A more realistic model
- Managing Privacy Tradeoffs in the Internet
- Resource Allocation for Next Generation of Radio Access Networks: how effective are my schedulers?
- Engineering the Future: an open evening for women in engineering
- Information-Theoretic Bounded Rationality
- Into the Mountains: The Extraordinary True Story of Survival in the Andes and its Aftermath
- Opportunistic Storage Maintenance (SOSP’15)
- End-user programmers need first-class software engineering tools
- Modern Deep Learning through Bayesian Eyes
- From Boolean to Quantitative Methods in Formal Verification
- Rethinking Storage and Networking in Next Generation Racks
- Talking with Reddit: Exploring limitations of recurrent neural network conversational systems.
- Incremental Neuroevolution of Reactive and Deliberative 3D Agents
- Title to be confirmedMaking sense of language: It's okay to count
- Probabilistic Line Searches for Stochastic Optimisation.
- The structures of induction and co-induction.
- "Protecting the forward edge: Is that light at the end of the tunnel?"
- Plug into the Supercloud
- Solving Second-Order Constraints with Program Synthesis
- Capturing and simulating the interaction of light with the world around us.
- Standing on the Shoulders of a Giant: One Person’s Experience of Turing’s Impact
- Bonsai: Reactive Tools for Data Science
- Rendering Eyes for Eye-Tracking
- Generative Models for Shape and Appearance
- Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures
- VISC: VIRTUAL INSTRUCTION SET COMPUTING
- Intelligible Machine Learning Models for HealthCare
- Queues don’t matter when you can Jump them!
- Declarative query processing in imperative managed runtimes
- "... and then just encode it to SAT."
- Enabling Connected Cars through Named Data.
- Probability and Prejudice: Bridging the Gap Between Machine Learning and Programming Languages
- Formal verification approach to modelling biochemical systems
- An Efficient Solver for string and regular expression constraints
- A Visual Programming Language for building Artificial Biochemistries in Haskell
- Unveiling the Secrets of High-Performance Datacenters
- Pushing the Limits of Localization and Capacity in Today's Wi-Fi Networks
- Social Media Predictive Analytics: Methods and Applications
- Can you convince me why your software works?
- Convex low-rank models: from matrices to tensors
- Relational Machine Learning for Knowledge Graphs.
- Supporting the Mobile Nomadic User through Projected User Interfaces
- Ensembles for Discovery of Compact Structures and Learning Back-propagation Forests.
- Content Placement as a Key to Leveraging Geo-Distributed Infrastructures
- Text To Programs: Automating Computer Tasks from Natural Language Descriptions
- Automatic differentiation and machine learning
- Supporting Proxemic Interactions with Multi-Scale Electric Field Sensing
- Supporting Proxemic Interactions with Multi-Scale Electric Field Sensing
- Programming and Proving with Fine-Grained Concurrent Resources
- Design and Evaluation of Proxemic-Aware Environments to Support Epistemic Activities
- Workshop: Machine Learning in Cambridge 2015
- Death, Identity, and the Social Network
- Considering Tools for Artists, Creative Processes, and Design Ideation
- Beyond acceleration: time, narratives, and the design of multiple worlds
- Un-Computing: Shaking off the ‘Computer’ Baggage
- Solving QBF by Counterexample-Guided Abstraction Refinement
- Protecting encrypted cookies from compression side-channel attacks
- Context-aware programming languages
- Towards Full-Stack Security Analysis of Web Applications
- The Difficulty of Preventing Code Reuse Attacks
- Modeling, Quantifying, and Limiting Adversary Knowledge
- Concurrent Algorithms for Emerging Hardware Platforms
- The Turing trap. How the universal computer is making the internet less secure.
- Meta-Interpretive Learning and Program Induction
- Manifold correspondence: a signal processing perspective
- Predictable and Dependable Low-power Wireless Networks
- Engineering at Microsoft Research - Open Evening
- Microsoft Distinguished Research Lecture - Laws of Programming with Concurrency
- Laws of Programming with Concurrency
- Causal Inference and Domain Adaptation
- Cutting tail latency in cloud data stores via adaptive replica selection
- Genome-wide transcriptional control of blood cell type identity
- Democratizing Electronics: Tools, Examples, and Contexts for Supporting the Construction of Personally-Meaningful Interactive Artifacts
- Dynamic PDP vs. Dynamic POR: Are they really different?
- Bedrock: A Software Development Ecosystem Inside a Proof Assistant
- Checking microarchitectural implementations of weak memory
- Machine Learning in an Exchange Environment
- Platforms and Applications for "Big and Fast" Data Analytics
- Coping with the Intractability of Graphical Models
- Microsoft Distinguished Research Lecture Series - Technological Innovation in Healthcare
- The Physical Web
- On Basing One-Way Functions on NP-Hardness
- Taming GPU threads with F# and Alea.GPU
- Reasoning about GADT Pattern Matching in Haskell
- Robust Distance Queries on Massive Networks
- An Approximate Differentiable Renderer
- Ancient lives, new discoveries: eight mummies, eight lives, eight stories
- Logic programming beyond Prolog
- RDFox — A Modern Materialisation-Based RDF System
- Lottery Auctions
- A link between lambda calculus and maps
- First-person Hyperlapse Videos
- Do Deep Nets Really Need To Be Deep?
- Discursis: A Computational Methodology for the Analysis of Communication Data
- A Case for using Trend Filtering over Splines
- Local Deep Kernel Learning for Efficient Non-linear SVM Prediction
- Micro-Policies: A Framework for Tag-Based Security Monitors
- End of Internship Talk: F# Type Providers: DBpedia and the Combinator Framework
- Hedging Against Uncertainty via Multiple Diverse Predictions
- Beyond Mindless Labeling: *Really* Leveraging Humans to Build Intelligent Machines
- Compositional Models
- Representing microbial communities in Earth system models
- Towards Zero Latency Photonic Switching
- Computational Video: Methods for Video Segmentation and Video Stabilization, and their Applications.
- Systems, Science and FreeBSD
- The Integral Image Method for Fisheye Images
- FsLab: Doing data science with F#
- A Verified Compiler for Probability Density Functions
- Byte Night Cambridge
- Image representation for synthesis and recognition using multilinear algebra
- The Brave New World of Next-Generation NoSQL Data Stores
- Steps toward usable verification
- Majority is not Enough: Bitcoin Mining is Vulnerable
- Practical Techniques for Auto-Active Verification
- FSCL: homogeneous programming and execution for heterogeneous platforms
- How to Give a Great Research Talk
- The Once and Future Internet
- How to Write a Great Research Paper
- Local Temporal Reasoning
- A Modular Integration of SAT/SMT Solvers to Coq through Proof Witnesses
- Geo-replicated storage with scalable deferred update replication
- Tips and Tools for Scientific Research Success
- efwefd
- Algebra of Parameterised Graphs
- Computer Vision for Movie Making and Infographics
- A Collapsible Approach to Higher Order Verification
- Thinking for Programmers: Rising Above the Code
- The Art of Corporate Storytelling
- Mid-level Likelihoods and Constraints for 3D Scene Interpretation
- Protecting Programs During Resource Retrieval
- The shadowy life of many webcams
- The Art of Corporate Storytelling
- Seeing in depth: computations and cortical networks
- Crafting Visualizations
- Sustainable IT and IT for Sustainability
- Bandits with Switching Costs: T^{2/3} Regret
- Publish/Subscribe for Large-Scale Social Interaction: Design, Analysis and Resource Provisioning
- Decision Making and Inference under Limited Information and Large Dimensionality
- Incremental Parallel and Distributed Systems
- IC3 Modulo Theories via Implicit Predicate Abstraction
- Rich semantic representations for detailed visual recognition
- Globally Optimizing Graph Partitioning Problems Using Message Passing
- Characterizing and Improving Last-Mile Performance Using Home Networking Infrastructure
- Performance Optimizations for Compiler-based Error Detection Methodologies
- Automatic Differentiation - Part One: A Revisionist History and the State of the Art
- Scaling Deep Learning
- Using ConvNets, MALIS and crowd-sourcing to map the retinal connectome
- Data Driven Student Feedback For MOOCs: Global Scale Education for the 21st century
- Part Detection and Species Identification
- The Performance of Deferred-Acceptance Heuristic Auctions
- Trouble-makers: Audio-video distortions as a relational resource in couples’ video calls
- Mechanism design for Cloud Computing and Crowdsourcing
- Achieving the Full Potential of State Machine Replication: High Throughput, Low Latency, Constant Availability
- Designing Controller Abstractions for Software-Defined Networks
- Rethinking State-Machine Replication for Multicore Architectures
- Computational foundations of Bayesian inference and probabilistic programming
- An Online Allocation Mechanism with Pre-Commitment and its Application to Electric Vehicle Charging
- Generative probabilistic programming: applications and new ideas
- Topological Data Analysis: potential applications to computer vision
- Declarative Static Program Analysis
- FaRM: Fast Remote Memory
- The persistence of structure: Layers, time, and the estimation of optical flow
- Efficient Preconditioning of Laplacian Matrices for Computer Graphics
- A Combinatorial Prediction Market for the US Elections
- Bayesian Machine Learning for Controlling Autonomous Systems
- Bayesian Machine Learning for Controlling Autonomous Systems
- Real time control with lots of humans in the loop
- Typed functional probabilistic programming: ready for practical use?
- Reasoning about Eventual Consistency
- Principles and Techniques of Automatic Differentiation
- Hardware Neural Network Accelerators
- Programming Approximate Systems
- Image Classification Using a Background Prior
- Automatic Differentiation - Part Two: AD meets SDG and PLT
- Automatic DifferentiationPart One: A Revisionist History and the State of the Art
- Depot: from Byzantine fault tolerance to eventual consistency in a single system
- Randomized tree ensembles: output kernels and variable importances
- Language based web security: the operational semantics approach
- Language based web security: the operational semantics approach
- Algebraic methods in computer vision and automatic generation of efficient algebraic solvers
- Multimodal Gaze-Supported Interaction
- Discovering the Structure of Visual Categories from Weak Annotations
- Memristors: The Future of Computer Memory and Neuromorphic Circuits?
- A Bigger and Faster Bitcoin: an Analysis of High-Rate Bitcoin Transaction Processing
- Type Refinement in the Abstract
- Reflection methods for user-friendly submodular optimization
- A Framework for Automatically Enforcing Privacy Policies
- Anomaly Detection in the Field
- Compositionality in Vision and Language
- Five machine learning research topics at Oxford CS
- Active Pedestrian Safety: from Research to Reality
- Managing the Network with Merlin
- Robust Models of Mouse Movement on Dynamic Web Search Results Pages
- How Watson Learns Superhuman Jeopardy! Strategies
- Inextensibility constraints for 3D reconstruction of deformable objects
- Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks
- Big Data and Dark Silicon: Taming Two IT Inflection Points on a Collision Course
- Disciplined Approximate Computing: From Language to Hardware, and Beyond
- QUIC Graphs: Relational Invariant Generation for Containers
- Is The Rise of Cloud Storage, Cloud Computing and Social Networks a Consequence of a Failed OS (Operating System) Design?
- Want Effective Security Solutions? Let's Re-Think The Design Approach
- Static Analysis of Cache Side Channels
- Proving Equivalences Between Prolog Semantics in Coq
- Foundations of Neuromechanical Systems Biology: Combining engineering, biology, and mathematics to understand how we move
- Deep Gaussian Processes
- Censorship Circumvention: Staying Ahead in a Cat-and-Mouse Game
- 3D Reconstruction using Point-Based Fusion
- Improving Time-of-Flight Range Data Quality
- The Relationship Between Separation Logic and Implicit Dynamic Frames
- Strategies for General Recognition
- Fast and Guaranteed Learning of Overlapping Communities via Tensor Methods
- Datalog for Program Analysis: Beyond the Free Lunch
- The cost of principles
- Optimizing Placement of Services for Real Time Communication
- KAT on a Wire: A Foundation for Network Programming
- SWAN: Software-driven wide area network
- Validating SAT Refutations
- Data Structures for Efficient Inference and Optimization in Expressive Continuous Domains
- Bridging the Discrete and the Continuous in Reasoning about Programs
- “When is fair sharing optimal?”
- Automated Analysis of Probabilistic Programs
- Noise estimation by PDE-constrained optimisation
- Very high speed networking in VMs and bare metal
- Reaping the Benefits of Partial SDN Deployment in Enterprise Networks
- NetFPGA: The Flexible Open-Source Networking Platform
- Building Better Questionnaires with Probabilistic Modelling
- Language-Integrated Quantum Operations: A Software Architecture for Quantum Computing
- Modular reasoning for modular concurrency
- Theory and Practice of Mix-Nets
- Cryptoforma: Computer-Aided Cryptographic proofs with EasyCrypt
- Understanding and Improving the Efficiency of Failure Resilience for Big Data Frameworks
- From Bounded to Unbounded Proofs of Correctness
- Big Data Analytics with All-or-Nothing Parallel Jobs
- Intelligent Location-Privacy Preserving Mechanisms
- Understanding and Improving Device Access Complexity
- The Ramifications of Sharing in Data Structures
- Building Flexible High-Performance Key-Value Systems
- Static Verification for Web Scripting Languages
- Graph-Based Reasoning in Separation Logic for Fun and Profit
- Programming The Parallelism Zoo
- Towards Algebra-Oriented Programming
- CRASH/SAFE: Clean-slate Co-design of a Secure Host Architecture
- Austerity in MCM - Land : Cutting the computational Budget
- Hypervisor Scheduler Enhancement Using OS-Hardware Interactions
- Fast Variational Inference in the Conjugate Exponential Family
- Proving Termination of Heap-Manipulating Java Programs
- Syntactic Foundations for Machine Learning
- Wireless Networking Using Smart Radios
- Trust and Mistrust on the Internet
- Mechanism design: dealing with interdependencies among agents.
- Privacy and Integrity of Remote Storage and Computation
- Semantics\sqcap Scalability\models\bot? Are Semantics and Scalability Incompatible?
- Optimal Payments in Dominant-Strategy Mechanisms
- Warped Mixture Models for Meaningful Clustering and Bayesian Manifold Learning
- Achieving High Data Rates in Distributed MIMO Systems
- Reasoning About Client Side Web Programs
- New probabilistic methods for inference of natural selection on regulatory sequences in the human genome
- Daniel’s Adventures in Computer Vision Land
- Modelling road networks in the Amazon
- Automated Error Diagnosis Using Abductive Inference
- Detecting Sybils without Graphs
- How do we model global plant physiology? A case study of leaf phenology
- Land use / land cover change and malaria risk in the Amazon region
- Stratosphere: Massively parallel dataflow programming
- Dynamic Fair Division of Multiple Resources
- From motion capture of interacting hands to video based rendering.
- Scaling wireless services
- Handling Multitude of Nash Equilibria in Voting Games
- Spectral Edge: Making the Invisible Visible
- Automating Separation Logic Reasoning
- Computing and Autism: How a real-world challenge drives a computing research agenda
- Optimal kernel choice for kernel hypothesis testing
- Next Wave of Telco´s Innovation
- New Frontiers in Gestural Interaction
- From Big Data to Big Decisions
- Big Data and Machine Learning
- TypeScript: JavaScript development at scale
- MIT Media Lab's Information Ecology Group
- A computer-checked proof of the Odd Order theorem
- Towards ad hoc interactions with robots
- From the Information Extraction Pipeline to Global Models, and Back
- Dynamically Enforcing Knowledge-based Security Policies
- Distributed Opportunistic Scheduling: A Control Theoretic Approach
- Probabilistic Latent Tensor Factorisation
- A new metric on kernel matrices with applications to matrix means
- Convergent and Scalable Algorithms for Expectation Propagation Approximate Bayesian Inference
- On Synthesis of Verification Tools
- Fast and Reliable Online Learning to Rank for Information Retrieval
- Scale-Out Processors
- Playing in the Grey Area of Proofs
- Craig Interpretation
- Capture of dynamic scene using multiple cameras provides rich spatial-temporal information that can be used for solving challenging computer vision problems.
- From Pose Estimation to Fine Grained Activity Recognition
- Tell Me Where You’ve Lived and What You Want -- I’ll Tell You What You Like and Need
- Latent Hough Transform for Object Detection
- Satisfiability: connecting logic and probability
- Context sensitive information: Which bits matter in data?
- HyperDex: A Consistent, Fault-tolerant, Searchable NoSQL Store
- Verifying Concurrent Programs with Relaxed Conflict Detection
- Concurrent Data Representation Synthesis
- Achieving High Data Rates in a Distributed MIMO System
- On Agent Failures in Totally Balanced Cooperative Games
- Cube and Conquer: Guiding CDCL SAT Solvers by Lookaheads
- SmartDesign: Living with Geometric Complexity
- Part A: Non-parametric image optimization & Part B: Crowdsourcing gaze data collection
- Causality for Free! Parametricity Implies Causality for Functional Reactive Programs
- Multi-Label Learning with Millions of Categories & Generalized Multiple Kernel Learning with a Million Kernels
- Prediction Strategies without Loss
- How to present a poster at an international conference
- Intellectual Property at Microsoft
- Rough Guide to Being an Entrepreneur
- Body Part Recognition: Making Kinect Robust
- F# Tutorial
- .NET Gadgeteer: A Platform for Custom Devices
- Microsoft Research Connections and Cloud Computing for Science
- Functional first programming in an information-rich world
- How to give a great research talk
- How to write a great research paper
- Microsoft Academic Search
- Proving that programs eventually do something good
- Human Computing and Crowdsourcing in Search
- Towards Predictable Data Centers- Why Johnny can't use the cloud and what can we do about it?
- Machine Learning for medical Image Analysis
- Planetary prediction services for society
- Realizing Touchless Interaction in the Operating Theatre
- Realizing Touchless Interaction in the Operating Theatre
- Functional first programming in an information-rich world
- How reciprocity renders networks irrelevant for cooperation in social dilemmas
- Aggregators and the News Industry: Charging for Access to Content
- Treasure Hunt
- Network Design and Defence
- Blotto On Facebook: The Effect of Social Relations On Strategic Interaction
- Blotto On Facebook: The Effect of Social Relations On Strategic Interaction
- Game theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned
- Decentralized Auctions for Uniformly Semimodular Bidders
- Decentralized Auctions for Uniformly Semimodular Bidders
- Managing air traffic disruptions through strategic prioritization
- Scarce attention and the value of page rank in online search
- Harvesting the Wisdom of Crowds
- Communication networks in markets
- Machine Learning for medical Image Analysis
- Title to be confirmed
- The RCUK Digital Economy Theme – A Catalyst for Change
- Probabilistic Programming and Probabilistic Databases for Large-scale Knowledge-base Construction
- Energy Debugging in Smartphones
- Web Science: Politics, Demographics and More
- The Inverted Multi-Index
- Information Spreading in Social Networks
- Weightedness and Structural Characterization of Hierarchical Simple Games
- Weightedness and Structural Characterization of Hierarchical Simple Games
- Topic Models for Human Activity Understanding
- Learning and Discovery of Clinically Useful Information from Medical Images
- Rekeyable Ideal Cipher from a Few Random Oracles
- Verification and Synthesis by Sciduction
- Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing
- Efficient Cryptography for the Next Generation Secure Cloud
- ABC-Testing
- Computer Assisted Interventions: Challenges in design, development, validation and deployment of novel techniques
- Mathematical modelling on remotely-sensed dynamics of marine primary producers
- Generating Code by Learning
- Learning and Representing: a Jointly Optimal Approach
- Building Flexible High-Performance Key-Value Systems
- Efficient Machine Learning with High Order and Combinatorial Structures
- The science of guessing
- Multiparty Session Types Meet Communicating Automata
- Mean Field Equilibria of Dynamic Auctions with Learning
- From certified languages to their certified implementations
- Empirical evidence in privacy economics
- Towards Networks without Management Complexity
- Towards Networks without Management Complexity
- Supporting Active Reading Activities With a Multi-Slate System
- Mementos, Memento Mori, and More: Digital Assets across the Human Lifespan
- Compositional Inter-Language Relational Verification
- Communication Complexity and When Dubious Data Structures can be Detected
- Non-Interactive Verifiable Computation
- Ethnography: Understanding natural interaction with our communication technologies
- Ethnography: Understanding natural interaction with our communication technologies
- Ethnography: Understanding natural interaction with our communication technologies
- Methods in decision theory for conservation research
- Solutions for a sustainable and desirable future
- Searching, Scanning and Smelling - a portfolio presentation
- Searching, Scanning and Smelling - a portfolio presentation
- Sampling based on local signal analysis: applications to photo-realistic imagery and beyond
- Algebraic Foundations to Effect-Dependent Optimisations
- Your Abstractions are Worth^H^H^H^H^HPowerless!Non-Volatile Storage and Computation on Embedded Devices*(*Batteries Not Included)
- A joint part- and pixel-wise approach to human pose estimation
- Approaches to Multiscale Modelling of Complex Systems
- Machines Learning Human Minds
- Mean Field Equilibria of Dynamic Auctions with Learning
- Efficient Range Querying in Distributed Games
- Understanding variability and temporal trends in biosphere-atmosphere CO2 exchange through integrating models with data
- ORCHID: Human-agent collectives for disaster response and the smart grid
- ORCHID: Human-agent collectives for disaster response and the smart grid
- Towards Practical Randomization in Concurrent Data Structures
- Malleability in Modern Cryptography
- Decision Theory in Conservation Biology, from Systematic Conservation Planning to Scenario-Based policy assessments
- Short and long-term effects of climate, disturbance, and forest management on regional carbon storage and emissions under current and proposed policy plans
- A Population Approach to System Design
- A Population Approach to System Design
- Sequential Decision Making in Experimental Design and Sustainability via Adaptive Submodularity
- Exploring Compression and the Aesthetics of Creativity
- Evaluating User-Adaptive Systems: Lessons from Experiences with a Personalized Meeting Scheduling Assistant
- Exploiting Variable Impedance for Robotics: Mimic or Optimize?
- Exploring Compression and the Aesthetics of Creativity
- Covering problems arising in Gamma Knife radiosurgery
- Security in untrusted storage
- The Undiscovered Continents of Human Potential
- Practical Abstractions for Dynamic and Parallel Software
- Homomorphic Encryption from Ring Learning with Errors
- High-throughput, Multiscale modelling approaches for understanding bacterial signalling
- Naiad: Iterative and Incremental Data-Parallelism using Differential Dataflow
- Closing the gap between weakly and fully supervised methods
- Bound Analysis of Imperative Programs with the Size-change Abstraction
- Concurrency Assertions – Providing the Right Semantics to ASSERT Statements
- Complementing User-Level Coarse-Grain Parallelism with Implicit Speculative Parallelism
- Bayesian Computation Without Tears: Probabilistic Programming and Universal Stochastic Inference
- Beyond the Piece of Cardboard: Learning to Adjust Photographs
- Real versus Realistically Rendered Ground Truth: Can we use Computer Graphics for Performance Evaluation?
- Spanish forest dynamics: Constraining models with data
- CMA-ES – a Stochastic Second-Order Method for Function-Value FreeNumerical Optimization
- PARIS: Probabilistic Alignment of Relations, Instances, and Schema
- The Marriage of Bisimulations and Kripke Logical Relations
- Probabilistic programs and the computability and complexity of Bayesian reasoning
- Information Retrieval based Program Synthesis
- Large-scale Retrieval with Ivory and MapReduce
- Analysing biological information processing with mechanistic modular models
- Poirot — a concurrency sleuth
- Natural Interactions & Computing for Global Development at MSR India
- Exclusive Pólya Urns and their applications
- Structured Prediction Models for High-level Computer Vision Tasks
- Information-Greedy Global Optimisation
- Abstractions in Satisfiability Solvers
- The IITM Model and its Application to the Analysis of Real-World Security Protocol
- SpecNet: Spectrum Sensing Sans Fronti`eres
- Mechanism Design without Money via Stable Matching
- "Coupled dynamics of traits and populations in response to environmental change".
- Vector Commitments with Efficient Protocols for Privacy-preserving Smart Billing Applications
- Energy Functionals: Choices and Consequences For Medical Image Segmentation
- Practical Boogie (on the example of VCC)
- Statistical learning for structural neuroimaging data
- "Egalitarian Gradient Descent": A General Preconditioning Scheme for Deformable Image Registration
- SocialFusion: Fusing Mobile, Sensor, and Social Computing in the Cloud To Enable Next-Generation Context-Aware Applications
- Tunable Static Inference for Generic Universe Types
- Perception by "Patterns" in the Brain
- Stochastic signal encoding strategies in cells
- A Language for Type-Safe Web Programming
- Probing the basis of neuronal branching
- Plant Organs Regeneration: Measuring and Modelling Self‐Organization
- Principles of Humanoid Locomotion Control
- From Gene Networks to Tissue Engineering: Computational Models of Pattern Formation
- Some recent developments in approximate inference: learning and control
- Search is not only about the Web - An Overview on Printed Document Search and Patent Search
- Scaling transaction processing through data-oriented execution
- How to present a poster at an international conference
- Rough guide to being an entrepreneur
- Gadgeteer
- Blue skies to ground truth: Machine learning for Kinect human motion capture
- Computer science as applied philosophy
- Making the most of your PhD; now and in your career
- How to give a great research talk
- How to write a great research paper
- How to force unsupervised neural networks to discover the right representation of images
- PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure
- Co-opetition in network tasks
- Identifying Peer Effects through Randomized Trials in Networks
- Network cognition and individual behaviour
- Network Formation in the Presence of Contagious Risk
- Competitive Contagion in Networks
- Social networks, institutions, and the process of globalization
- Optimal Communication in Teams
- Social Network, Personality, and Performance
- Coming to Grips with Complexity in Computer-Aided Verification
- Efficient space-variant deconvolution
- Computing for Development: A New High Impact Research Area
- Is my model too complex? Evaluating model formulation using model reduction
- Programmable Self-Assembled DNA-Based Autonomous Molecular Devices
- Fences and Stability in Weak Memory Models
- How to Make Ad Hoc Proof Automation Less Ad Hoc
- Towards a comprehensive assessment of the interactions between the terrestrial biosphere and the climate system
- Active visual category learning
- Bringing Intelligence at the Edges to Accommodate Diversity in the Internet
- Algorithmic Market Design: Spectrum Sales and BitTorrent Communities
- Turing and Darwin: Saving the environment by combining computation and human insight
- Fuzzy thinking: single neuron variation in RNA state space
- Can We Defy Nature’s End?
- The Complexity of the Homotopy Method, Equilibrium Selection, and Lemke-Howson Solutions
- Understanding and conserving biodiversity in a changing world
- Politics, Preferences and Permutations: Probabilistic Reasoning with Rankings
- Modelling, simulating and verifying DNA strand displacement systems
- Delay Reduction for Adaptive Scheduling in Wireless Networks and Aggregated Equilibrium for Resource Sharing Games
- Extracting and Querying Probabilistic Information in BayesStore
- Formal Methods in Synthetic Biology
- Efficient Data Structures for Nonlinear Video Processing
- Towards a Colonic Crypt Model with Realistic, Deformable Geometry
- Modeling and Evaluating Information Retrieval Results
- SSLShader: Cheap SSL Acceleration with Commodity Processors
- Active visual category learning
- Molecular evolution of stochastic switching
- Molecular evolution of stochastic switching
- Spatial Tactile Feedback Support for Mobile Touch-screen Devices
- 3D Reconstruction meets GPGPU meets Image Analysis
- Training Random Forests with Ambiguously Labeled Data
- Representing and Querying Large-scale Uncertainty
- Guessing Program Annotations with Probabilistic Inference
- Delay Reduction for Adaptive Scheduling in Wireless Networks and Aggregated Equilibrium for Resource Sharing Games
- Tracking and Analysis of Animal Movement
- Programming-Language Techniques for Secure Cryptography
- Optimization under Uncertainty: Understanding the Correlation Gap
- High-level Languages for Low-level Systems
- Enforcing topological constraints in energy-based image segmentation
- Research of the new Computer Vision and Mulitmodal Computing at MPI Sarrbruecken
- Executable Knowledge for Molecular Systems Biology
- Longitudinal Evaluation of API Usability and Designing Support for Collaborative Search around the Tabletop
- On a first-order primal-dual algorithm with applications to convex problems in computer vision
- Learning generative models of images by factoring appearance and shape
- “Otherworld” - Giving Applications a Chance to Survive OS Kernel Crashes
- Software Synthesis using Automated Reasoning
- Efficient cloud operations via job-migration and pricing
- Machine Learning for WLAN Positioning
- Hidden Markets: Designing Efficient but Simple Electronic Markets
- Optimization for Pixel Labeling Problems With Structured Layout
- Energy Minimization with Label Costs and Applications in Multi-Model Fitting
- Parameter Search and Robustness Analysis from Temporal Logic Specifications in Biochemical Reaction Networks
- Reasoning about concurrent stochastic systems
- Frugal Procurement Auction Design
- Simplicity-Expressiveness Tradeoffs in Mechanism Design
- Logic and Probability: The Computational Connection
- Learning and Coordination in Networks
- Making OpenCL simple with Haskell
- Albert Atserias, Universitat Politècnica de Catalunya, Microsoft Research Lectures
- Cooperation, Power and Conspiracies
- Experience and problems with compiling data parallel languages
- Branching vs. Linear Time: Semantical Perspective
- CIEL: a universal execution engine for distributed data-flow computing
- Improving the energy model of stereo matching algorithms
- Propagation of Rumour Through a Social Network
- Network Economics seminar / Diffusion and Cascading Behavior in Random Networks
- Towards Automation of Protein NMR
- How Hard is Competition for Rank?
- Software Lock Elision for x86 Machine Code
- Towards a Non-Commutative Logic of Effects,
- Handling temporal variation of unknown characteristics in streaming data analysis.
- Lifted Message Passing: A Step Towards Gaining a 'Big Picture' View on AI
- Realizability and Parametricity in Pure Type Systems: An application
- Polynomial Learning of Distribution Families
- Verification of Imperative Programs Through Characteristic Formulae
- Bayesian Inference with Kernels
- How can we model complex ecosystems with stochastic interactions between individuals at different spatial and temporal scales? Some case studies
- Modelling ecological systems under environmental change.
- Three Small Steps ... to Reconceiving Machine Learning
- Using SAT Solvers for Cryptographic Problems
- Using SAT Solvers for Cryptographic Problems
- Async in Visual Basic and C# - worth the Await!
- Statistical Significance Analysis of Motif Discovery
- A relationship-based approach to the verification of multi-object invariants
- LCA Overview and Open Source Expert
- Affective Technology
- Affective Technology
- Probabilistic models for time-series with different underlying dynamics regimes with application to robot imitation learning
- Engineering Genetic Circuits
- Engineering Genetic Circuits
- Food Webs, and how they got that way
- SSH: A Case Study of Cryptography in Theory and Practice
- Testing and fault localization in constraint programs
- Towards Systematic Design of Enterprise Networks
- Noise and the two-thirds power law
- Golden-i, a head-mounted computer
- Frugality in set-system auctions
- The Little Engine(s) that could: Scaling Online Social Networks
- Search methods based on Monte-Carlo simulation
- Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank
- Game-theoretic logic learning in scientific domains
- Concurrency and Communication: Lessons from the SHIM Project
- Post-Silicon Validation: New Frontiers for Formal Verification Research
- GPU programming: bugs, pitfalls and the importance of correctness in biomedical and scientific applications
- Using transformed domains to sparsify Gaussian Processes
- Using transformed domains to sparsify Gaussian Processes
- How can we use digital pens in a collaborative environment?
- Local Action Traces and Abstract Concurrent Separation Logic
- Frameworks for segmentation, classification, and nonstationary image processing with applications to disease assessment
- International Workshop on Tractability; 5-6 July 2010
- Symbolic Techniques in Propositional Satisfiability Solving
- Energy as Syntax - an attempt at a thermodynamical framework for combinatorial molecular networks
- Geometry of Synthesis: Semantics-directed hardware compilation
- Diffuse Programming
- Images as Sets of Locally Weighted Features
- Hermes: Clustering Users in Large-Scale E-mail Services
- Practical performance models for complex, popular applications
- Before pixels
- A proof rule for multi-threaded programs
- Prof. Robert Nowak, University of Wisconsin; MSR Lectures
- Derek Dreyer, MPI-SWS; Microsoft Research Lectures
- On Bayes-Nash implementation of combinatorial auctions: structure and efficiency
- Abstract Interpretation for Liveness using Metric Spaces
- Visual Computing for Next-Generation Display and Imaging
- Static Verification of Concurrent Programs using Reduction and Abstraction
- Static Verification of Concurrent Programs using Reduction and Abstraction
- The State of Secondary Level Computer Science Education in the USA
- Deep Web Data: Analysis, Extraction, and Modelling
- On the stability of flow-aware CSMA
- Incremental Modelling and Verification of the PCI Express Transaction and Data-Link Layers
- A comparison of some recent task-centric parallel programming models
- Secrets of the Microsoft SQL Server Query Optimizer
- Building Algorithms for FPGAs
- Learning, Planning and Representing Knowledge from Primitive Experience
- Stanislav Zivny, University of Oxford; Micrsoft Research Lectures
- Submodularity and Valued Constraint Satisfaction Problems
- Opportunistic Spectrum Access with Multiple Users: Learning under Competition
- Sparse Model Recovery via Iterative Algorithms
- Proactive Resilience Revisited: Resisting Intrusions means more than Byzantine Fault Tolerance
- Incremental Modelling and Verification of the PCI Express Transaction and Data-Link Layers
- Abandoning Prenex Clausal Normal Form in QBF Solving
- Michael Weber, University of Twente; Microsoft Research Lectures
- Datalog+/- : A Framework for Tractable Query Answering over Ontologies
- Stationary Subspace Analysis
- You are not a gadget
- L_p-Spherically Symmetric and L_p-nested Distributions for Patches of Natural Images
- Efficient Bayesian Model Comparison with Differential Equations: a Population MCMC Approach via the Thermodynamic Integral
- Riemannian Manifold Hamiltonian Monte Carlo
- Inferring Signaling Pathway Topologies from Multiple Perturbation Measurements of Specific Biochemical Species : A model-based approach
- Proving the Correctness of Abstract Concurrency Control and Recovery
- Nesting Transactions: Why and What Do We Need?
- Data redundancy and maintenance in peer-to-peer file backup systems
- Use phase signals to promote lifetime extension for desktop PCs
- Towards focusing research and innovations on local needs: If wireless technologies are to connect the wireless continent
- Learning Deep Architectures
- Cops, Crops and Mobile Phones: Machine Learning in Africa
- Towards a Network Measurement Science
|