Microsoft Research

×
330 тыс
подписчики
50.3 млн
просмотры
9 254
видео
24 Окт 2008
создан
06.09.16 1:31:20
Abstraction Methods for Liveness
It is a known fact that finitary state abstraction methods, such as predicate abstraction, are inadequate for verifying general liveness properties or even termination of sequential programs.
73
06.09.16 58:21
Effective and Efficient User Interaction for Long Queries [1/17]
The queries that users pose to web search engines range from two to four terms in length. Much effort has been spent on handling these queries, with considerable success.
10
06.09.16 1:02:56
Fault Localization in Large-Scale Computing Systems
We describe a new fault localization technique for software bugs in large-scale computing systems.
235
06.09.16 48:28
Delegatable Anonymous Credentials
Anonymous credential systems allow users to anonymously obtain credentials from organizations, and to anonymously and unlinkably prove possesion of valid credentials.
665
19.8
06.09.16 1:01:47
Enhancing the P racticality and R eachability of Interactive Technology
As researchers, one of our common goals is to expand our reach and our capabilities as human beings through the development of new technologies and new ideas.
9
06.09.16 1:15:59
Computational methods for the detection of positive and lineage-specific selection from genomic data
In recent years, abundant DNA sequence data has led to widespread interest in computational methods for detecting sequences that are evolving faster, slower, or by different patterns of evolution
549
91
06.09.16 1:18:43
State of the Art and Future Trends in Mobile Phone-based Augmented Reality
The talk will outline the history of the Handheld Augmented Reality (AR) project at Graz University of Technology to point out how mobile-phone AR evolved and which further developments are to be
93
06.09.16 1:18:56
Candidate talk: Computing Nash Equilibria
In view of the recent hardness results for mixed Nash equilibria, there has been increased interest in computing approximate equilibrium points, albeit progress has been slow.
112
06.09.16 55:06
Exploiting Hardware/Software Interactions for Embedded Systems Design
Embedded systems are often subject to real-time constraints. Such systems require determinism to ensure that task deadlines are met.
178
06.09.16 1:25:25
The Semantic Web in Action
Six years ago in Scientific American, Tim Berners-Lee, James Hendler and Ora Lassila unveiled a nascent vision of the Semantic Web: a highly interconnected network of data that could be easily
217
06.09.16 1:11:26
Leveraging Fine-Grained Multithreading for Efficient SIMD Control Flow
Recent advances in graphics processing units (GPUs) have resulted in massively parallel hardware that is easily programmable and widely available in commodity desktop computer systems.
397
65.8
06.09.16 1:16:00
I-Room - Intelligent Collaborative Spaces for Emergency Response [1/3]
Our long term aim is to contribute to a future Helpful
6
06.09.16 57:58
Query Lower Bounds for Matroids via Group Representations
Finding an common independent set in two matroids is one of the classical problems of combinatorial optimization, including the well-known bipartite matching problem as a special case.
124
06.09.16 1:13:16
New Algorithmic Ideas for Search, Ads, and Recommendations. [1/2]
Similarity search is the problem of preprocessing a database of N objects in such a way that given a query object, one can effectively determine its nearest neighbors in database.
20
06.09.16 1:02:29
A Family of License Languages
This is a methodology colloquium talk.
21
06.09.16 1:16:54
Approximation Algorithms for Discrete Stochastic Optimization Problems
We will survey recent work in the design of approximation algorithms for several discrete stochastic optimization problems, with a particular focus on 2-stage problems with recourse.
1 018
42.1
06.09.16 1:11:05
Virtual Coupling Schemes for Position Coherency in Networked Haptic Virtual Environments
In networked haptic environments ΓÇö used in surgical simulation training, maintenance task training, force-feedback enabled network games, etc.ΓÇö multiple users remotely collaborate sharing the
472
39
06.09.16 1:23:20
Dynamic Mechanism Design [1/2]
I will consider the design of efficient and profit-maximizing Bayesian incentive-compatible mechanisms for general dynamic environments with private information.
951
28.5
06.09.16 1:35:22
Design Thinking and Design Research [1/3]
This talk describes what Stanford is doing in Design; including a description of the graduate Joint Program in Design, the new Hasso Platner Institute of Design (the d.school), and the Design for
1 439
23.6
06.09.16 1:03:51
Predicting Secret Keys via Branch Prediction
We give an overview of a new software side-channel attack, enabled by the branch prediction capability common to all modern high-performance CPUs.
227
06.09.16 1:13:14
Pricing Games in Networks
Network games play a fundamental role in understanding behaviour in many domains, ranging from communication networks through markets to social networks.
47
06.09.16 26:13
Kneser-Ney smoothing with a correcting function for small data sets
We present a technique which improves the Kneser- Ney smoothing algorithm on small data sets for bigrams and we develop a numerical algorithm which computes the parameters for the heuristic formula
2 174
90.2
06.09.16 1:11:20
The Limiting Shape of Internal DLA with Multiple Sources
Start with n particles at each of k points in the integer lattice Z^d, and let each particle perform simple random walk until it reaches an unoccupied site.
35
06.09.16 1:04:53
The Case for Opportunistic Communication
The ability to exploit transient communication opportunities allows mobile systems to trade off higher performance and dramatically lower energy and monetary costs for an increase in algorithmic
94
06.09.16 1:15:17
Building natural language parsers
This talk takes a long view on how we approach the problem of parsing natural language.
186
06.09.16 1:20:11
Coding Techniques for Data-Storage Systems
Traditional Coding Theory, inspired by Shannon's motivations in communication problems, has been very successful in proposing meaningful abstractions (e.g Hamming distance, code rate, decoding
288
06.09.16 1:25:34
338
22.2
06.09.16 1:02:40
Critical percolation on finite graphs
Bond percolation on a graph G with parameter p in [0,1] is the random subgraph G_p of G obtained by independently deleting each edge with probability 1-p and retaining it with probability p.
865
35.6
06.09.16 1:08:38
Programming with Time Using Graphical Data Flow
Diverse control and measurement applications, such as mobile phone testing, process optimization, and distributed sonic arrays all require precise timing and synchronization.
309
34
06.09.16 1:01:36
Design and development of a content-based music search engine
If you go to Amazon.com or the Apple Itunes store, your ability to search for new music will largely be limited by the `query-by-metadata' paradigm: search by song, artist or album name.
562
23.1
9 276 видеоназад123далее
жизньигрыфильмывесельеавтотехномузыкаспортедаденьгистройкаохотаогородзнанияздоровьекреативдетское