Microsoft Research

×
330 тыс
подписчики
50.4 млн
просмотры
9 254
видео
24 Окт 2008
создан
06.09.16 47:14
The art and technology of electronic textiles
The Art and Technology of Electronic Textiles The Intersection of Material Making and Computation What will a programmable painting or textile be like? How will it work?
502
20.6
06.09.16 1:13:28
Quantum Loop Gas Approach to Topological Phases of Correlated Electrons
I will describe a representation of topological states and related critical points which elucidates their relationship to gauge theories, statistical mechanics, and quantum computation.
298
06.09.16 1:17:45
Computational History In Action: Discovering Gutenberg's Printing Process
Gutenberg is credited with having invented the typographic printing process in the West around 1450.
5 698
51
06.09.16 53:46
A World Filled With Cameras: Security at the Cost of Freedom? Or Can We Have Both?
Since the tragic events of 9/11 we keep hearing security experts demand tighter restrictions on daily life, while civil libertarians preach we should accept risk in order to avoid an overbearing Big
22
06.09.16 57:25
Resisting Denial of Service Attacks by Puzzle Outsourcing
One proposed approach to deter denial of service attacks is to require clients to solve computational puzzles before connecting to a server.
50
06.09.16 44:31
Transition Invariants
Proof rules for the temporal verification of concurrent programs rely on auxiliary assertions.
680
113
06.09.16 1:27:53
Declarative querying of sensor networks through automatic service planning
As sensor networks become more and more ubiquitous, engineers face the challenge of making the sensor data accessible to the common person.  For example, a building manager might want to be alerted
15
06.09.16 1:27:26
Folklore of Network Protocol Design (Anita Borg Lecture)
It's natural to assume that network protocol design is a well-known science, where the designers of today's standards take care to understand the tricks and pitfalls learned from previous protocols.
656
11.8
06.09.16 1:04:05
Toolkit for Construction and Maintenance of Extensible Proof Search Tactics
Theorem provers for higher-order logics often use tactics to implement automated proof search. Often some basic tactics are designed to behave very differently in different contexts.
30
06.09.16 1:01:14
Me++
With Me++ the author of City of Bits and e-topia completes an informal trilogy examining the ramifications of information technology in everyday life.
200
06.09.16 1:00:09
Structural Comparison of Executable Objects
Comparing two executable objects has many different and interesting applications, ranging from offensive security (such as attacking systems) and defensive security (analyzing malware) to legal
641
53.1
06.09.16 1:24:09
Indifference is Death: Responsibility, Leadership, & Innovation
The opposite of love is not hate, itΓÇÖs indifference. The opposite of art is not ugliness, itΓÇÖs indifference. The opposite of faith is not heresy, itΓÇÖs indifference.
103
06.09.16 1:10:09
TQFTs and tight contact structures on 3-manifolds      
Topological quantum field theory methodology provides interesting perspectives on the classification of tight contact structures on 3-manifolds.
106
06.09.16 1:10:07
Wireless Embedded Networks/The Ecosystem and Cool Challenges
Wireless Embedded Networks span a much broader field than just Sensor
19
06.09.16 50:53
Data Mining & Machine Learning to empower business strategy
This talk will focus on my recent work for the Acquisition and Retention team at MSN, in which we address the business problem of successfully predicting customer behavior far enough ahead that the
62
06.09.16 1:05:58
Some uses of orthogonal polynomials
One thing which will be explained is the evaluation of a determinant originally stated by Sylvester and rediscovered by Mark Kac.  The determinant is tridiagonal with x on the diagonal, 1,2,...,N
2 256
29.7
06.09.16 1:10:20
Approximation Algorithms for Embedding with Extra Information and Ordinal Relaxation
This talk considers approximation algorithms for embedding: constructing a global geometry that is approximately consistent with a given local geometry, which is typically represented by distances
349
19
06.09.16 1:11:30
Evaluating Retrieval System Effectiveness
One of the primary motivations for the Text REtrieval Conference (TREC) was to standardize retrieval system evaluation.
2 067
76.2
06.09.16 1:07:33
Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources
In this work, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity.
41
06.09.16 1:07:51
Specification-Based Annotation Inference
A great wealth of information about a program may be implicit in the source code itself; for example, in C and C++ this includes parameter usage and -ness, buffer extents, potential taint, and
67
06.09.16 1:23:00
Emotion Recognition in Speech Signal: Experimental Study, Development and Applications
In this talk I will overview my research on emotion expression and emotion recognition in speech signal and its applications.
734
60.8
06.09.16 1:25:38
Text summarization: News and Beyond
Redundancy in large text collections, such as the web, creates both problems and opportunities for natural language systems.
298
06.09.16 59:26
Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution
Knowing the distribution of the sizes of traffic flows passing through a network link helps a network operator to characterize network resource usage, infer traffic demands, detect traffic
440
73
06.09.16 53:16
Learning and Inferring Transportation Routines
I will give the presentation I gave at the AAAI conference this year. We introduce a hierarchical Markov model that can learn and infer a userΓÇÖs daily movements through the community.
59
06.09.16 47:35
Raising the Bar: Integrity and Passion in Life and Business: The Story of Clif Bar, Inc.
In April 2000, Gary Erickson, co-founder of Clif Bar, turned down a $60 million offer to buy his company.
767
31.6
06.09.16 1:12:34
Revelationary Computing, Proactive Displays and The Experience UbiComp Project
People often reveal aspects about themselves in the physical world, through the clothes they wear, the places they go, and the people with whom they associate.  Increasingly, people reveal aspects
14
06.09.16 1:13:10
The Design of A Formal Property-Specification Language
In recent years, the need for formal specification languages is growing rapidly as the functional validation environment in semiconductor design is changing to include more and more validation
575
47.4
06.09.16 53:51
Runtime Refinement Checking for Concurrent Data Structures
Runtime Refinement Checking for Concurrent Data Structures (the VYRD* project: VerifYing Refinement by Runtime Detection) The goal of the VYRD Project is to develop a runtime verification framework
76
06.09.16 1:03:02
Data Harvesting: A Random Coding Approach to Rapid Dissemination and Efficient Storage of Data
In this talk, we will see how Random Linear Coding (RLC) based protocols can provide huge gains in two somewhat related problems in large distributed systems: the problem of disseminating
28
06.09.16 57:58
Lost in Space: The Fall of NASA and the Dream of a New Space Age
In Lost in Space: The Fall of NASA and the Dream of a New Space Age, Greg Klerkx argues that ever since the triumphant Apollo missions, the Space Age has been stuck in the wrong orbit… and that
162
9 276 видеоназад146далее
жизньигрыфильмывесельеавтотехномузыкаспортедаденьгистройкаохотаогородзнанияздоровьекреативдетское