Microsoft Research

×
330 тыс
подписчики
50.4 млн
просмотры
9 254
видео
24 Окт 2008
создан
06.09.16 1:18:16
The price of anarchy of serial cost sharing and other methods
Users share an increasing marginal cost technology. A cost sharing method specifies non negative and non transferable cost shares covering costs.
74
06.09.16 1:19:15
Coding Theory: Survey of Recent Progress and Open Questions [1/9]
Coding theory emerged in the late 1940's, thanks to the works of Shannon and Hamming, as the theory supporting reliable
90
06.09.16 1:14:15
Programming by Sketching
When code is synthesized from a concise specification, the result is less coding and more correctness.
1 156
42.4
06.09.16 1:09:47
Garbage Collection without Paging
Garbage collection offers numerous software engineering advantages, but interacts poorly with virtual memory managers.
128
06.09.16 57:09
Translation Validation of Optimizing Compilers
There is a growing awareness, both in industry and academia, of the crucial role of formally verifying the translation from high-level source-code into low-level object code that is typically
398
21.8
06.09.16 1:15:48
The Berkeley Wireless Research Center Platforms
This talk will overview the research of BWRC and highlight recent accomplishments. BWRC is a pioneer in a new wave of university-industry-government partnerships.
278
06.09.16 1:34:55
Building Better Places -- Second Life, Collaborative Creation, and 5 Missing Pieces
Second Life is a digital world completely built and owned by its residents.
77
06.09.16 1:10:02
Fountain Codes over Arbitrary Channels and Threshold Phenomena
Given a vector of k input symbols, a fountain code produces a potentially limitless stream of output symbols, each generated independently and at random.
679
44.9
06.09.16 1:14:42
Repositioning Computer Science: Increasing Diversity and Creativity in CS Education
Decreased enrollment in Computer Science has led many universities, businesses and government institutions to take a closer look at the field and how it is perceived.
78
06.09.16 1:06:11
Root numbers and ranks
For any finite field k with odd characteristic and F = k(u), we construct a non-isotrivial elliptic curve over F(t) such that all of its F-fibers have root number 1 (and hence even rank, under BSD)
176
06.09.16 3:00:21
Tutorial on Foundations of Probabilistic Answers to Queries
Probabilistic query answering is a set of techniques used in several, very recent database applications: exploratory queries in databases, novel IR-style approaches to data integration, querying
130
06.09.16 1:03:52
Generic Entity Resolution
Entity resolution (ER) is a problem that arises in many information integration scenarios: We have two or more sources containing records on the same set of real-world entities (e.g., customers). 
4 764
22.7
06.09.16 59:31
Regular Extrapolation of Behavioural Models-Searching for Regular Patterns by Observation
In current practice, only rarely precise and reliable documentation of a system's behaviour is produced during its development.
18
06.09.16 1:20:07
The Stanford Data Stream Management System
This talk will describe our development of the Stanford Stream Data Manager (STREAM), a system for executing complex continuous queries over multiple continuous data streams.
1 776
22.4
06.09.16 1:08:12
Self-Replicating Machines, Open Source Hardware, & the Relationship Between Information & Structure
We have just survived a brief period in history where we all disembodied ourselves from the physical world and focused on the digital and the informational.
634
13.8
06.09.16 1:15:19
Dereverberation Suppression for Improved Speech Recognition and Human Perception
The factors that harm the speech recognition results for un-tethered users are the ambient noise and the reverberation.
365
60.3
06.09.16 1:00:02
Using Machine Learning to Verify Systems
Automated verification of software systems is a challenging problem because of their large (and often infinite) state-space.
392
43.2
06.09.16 1:15:26
ExScal: Elements of an Extreme Scale Wireless Sensor Network
Project ExScal fielded a 1000+ node wireless sensor network and a 200+ node peer-to-peer ad hoc network of 802.11 devices in a 1.3km by 300m remote area in Florida, USA during December 2004.
50
06.09.16 1:00:49
Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems
We introduce abstract models for multithreaded programs based on dynamic networks of pushdown systems. We address the problem of symbolic reachability analysis for these models.
149
06.09.16 1:20:25
Scalable Program Analysis Using Boolean Satisfiability
Static program analysis has long suffered from a fundamental trade-off between precision and scalability, and today the analyses that scale to the largest programs invariably are not the most
102
06.09.16 1:13:01
Slepian-Wolf coded quantization for Wyner-Ziv coding
This talk presents a Slepian-Wolf coded quantization (SWCQ) framework for Wyner-Ziv coding.
737
245
06.09.16 1:16:21
Spoken Language Support for Software Development
Many programmers who suffer from repetitive strain injuries (RSI) and other more severe motor impairments have difficulty staying productive in a work environment that all but requires long hours
110
06.09.16 1:43:30
Designing Extensible IP Router Software
Many problems with today's Internet routing infrastructure slow BGP convergence times exacerbated by timer-based route scanners, the difficulty of evaluating new protocols are not architectural or
158
06.09.16 1:10:28
Estimating Geometric Scene Context from a Single Image [1/3]
Humans have an amazing ability to instantly grasp the overall 3D structure of a scene ΓÇô ground orientation, relative positions of major landmarks, etc -- even from a single image.
69
06.09.16 1:26:16
Singularity of random Bernoulli matrices
Let M_n be an n by n random matrix, whose entries are i.i.d. Bernoulli random variables (taking value 1 and -1 with probability half). Let p_n be the probability that M_n is singular.
312
25.7
06.09.16 1:01:52
Scalable Knowledge Harvesting
Performance of many Natural Language Processing (NLP) systems have reached a plateau using existing techniques.
44
06.09.16 1:23:18
Modeling and Analysis of Access Control Survivability
In traditional models of access control systems, the emphasis is on validating security as safety properties, defined over state-transition graphs that represent system behavior.
48
06.09.16 1:21:04
XML Full-Text Search and Scoring [1/25]
One of the key benefits of XML is its ability to represent a mix of structured and text data.
4 273
1424
06.09.16 1:19:18
A Large-Margin Framework for Learning Structured Prediction Models
We present a novel statistical estimation framework for structured models based on the large margin principle underlying support vector machines.
154
9 276 видеоназад139далее
жизньигрыфильмывесельеавтотехномузыкаспортедаденьгистройкаохотаогородзнанияздоровьекреативдетское