Microsoft Research

×
330 тыс
подписчики
50.4 млн
просмотры
9 254
видео
24 Окт 2008
создан
17.08.16 51:45
2010 Microsoft Research eScience Workshop - Session MA4 - Health & Wellbeing I
Simplifying Oligonucleotide Primer Design Software to Keep Pace with an Ever Increasing Demand for Assay Formats Kenneth 'Kirby' Bloom, Illumina Corporation Integration of Sequence Analysis into
55
17.08.16 47:30
2010 Microsoft Research eScience Workshop - Session MA1 - Senses Across Scales
Exploration of Real-Time Provenance-Aware Virtual Sensors Across Scales for Studying Complex Environmental Systems Yong Liu, National Center for Supercomputing Applications, University of Illinois
3
17.08.16 37:34
2010 Microsoft Research eScience Workshop - Session MA6 - Complex Biological Systems in Action
An Interactive Modeling Environment for Systems Biology of Aging Pat Langley, Arizona State University
37
17.08.16 1:05:57
Rank Bounds for Design Matrices
A (q,k,t)-design matrix is an m by n matrix whose pattern of zeros/non-zeros satisfies the following design-like condition: Each row has at most q non-zeros, each column has at least k non-zeros and
65
17.08.16 1:03:57
Price of Anarchy in Adword Auctions
In this talk we consider the quality of equilibria in Generalized Second Price Auction, a simple model of auctions widely used in the newly developing markets for search advertising .
133
17.08.16 7:56
2010 Microsoft Research eScience Workshop - Jim Gray eScience Award Presentation
Jim Gray eScience Award Presentation This year, Microsoft Research presents the Jim Gray eScience Award to a researcher who has made an outstanding contribution to the field of data-intensive
53
17.08.16 1:08:46
Hera-JVM: A Runtime System for Heterogeneous Multi-Core Architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance.
167
17.08.16 1:07:53
1 331
44
17.08.16 1:10:47
Hardware Trojans in Wireless Cryptographic Integrated Circuits
I will be discussing our research activities in the area of hardware Trojans in wireless cryptographic integrated circuits.
400
13
17.08.16 1:13:14
Stable, Fair Societies As The Natural Product of Local Exchange Networks
Does evolutionary selection operate on groups as well as individuals? Why are exchanges often fair when they could be exploitative? Why are there stable societies at all?
24
17.08.16 1:31:32
Not All Frames Are Created Equal: Temporal Sparsity for Robust and Efficient ASR
Traditional frame-based speech recognition technologies build sequence models of temporally dense vector time series representations that account for the entirety of the speech signal.
42
17.08.16 1:22:03
California Fault Lines: Understanding the Causes and Impact of Network Failures
Of the major factors affecting end-to-end service availability, network component failure is perhaps the least well understood.
152
17.08.16 1:04:45
e-Heritage Projects in Italy, Cambodia, and Japan: Lesson learned
The e-Heritage project converts assets that form our cultural heritage into digital forms so that we can utilize such forms: * For preservation in digital form of our irreplaceable treasures for
45
17.08.16 58:59
Self-Stabilizing Autonomic Recoverers
This talk introduces theoretical foundations for system architectures and algorithms for creating truly robust autonomic systems -- systems that are able to recover automatically from unexpected
40
17.08.16 1:05:28
Embedding spanning trees in random graphs
We prove that if T is a tree on n vertices with maximum degree D and the edge probability p(n) satisfies: np c max{D*log n,n^{\epsilon}} for some positive \epsilon0, then with high probability (w.h.p.
242
17.08.16 1:06:59
Real-time estimation of distributed parameters systems: application to traffic monitoring
The coupling of the physical world with information technology promises to help meet increasing demands for efficient, sustainable, and secure management of our built infrastructure and natural
320
21
17.08.16 1:30:47
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
The privacy of most GSM phone conversations is currently protected by the 20+ years old A5/1 and A5/2 stream ciphers, which were repeatedly shown to be cryptographically weak.
1 442
26.3
17.08.16 1:03:28
Spectral graph sparsification Part 2: [An O(mlog^2 n) algorithm for solving SDD systems]
We present the fastest known algorithm for solving symmetric diagonally dominant (SDD) systems.
114
17.08.16 57:32
MSR New England Social Media Research
Each speaker will give a 12 minute presentation of their work and then there will be an open discussion.
21
17.08.16 46:52
Exploiting Sparsity in Unsupervised Classification
We talk about two unsupervised classification projects in which the provided data have a low dimensional structure.
72
17.08.16 1:05:52
Computational Social Science in Medicine
ΓÇ£Medicine is a social scienceΓÇ¥, this has been the mantra of public health since 1848. Today, medicine is a computational social science.
142
17.08.16 2:26:01
Virtual Machine Reset Vulnerabilities; Subspace LWE; Cryptography Against Continuous Memory Attacks
Virtual Machine Reset Vulnerabilities and Hedged Cryptography Tom Ristenpart, UC San Diego Virtual machines are widely used to, for example, support cloud computing services and improve home desktop
293
17.08.16 1:07:51
Adaptive Submodularity: A New Approach to Active Learning and Stochastic Optimization
Solving stochastic optimization problems under partial observability, where one needs to adaptively make decisions with uncertain outcomes, is a fundamental but notoriously difficult challenge.
1 065
19.4
17.08.16 58:59
Spectral graph sparsification Part 1: -- (The Combinatorial Multigrid Solver)
We discuss the latest developments on linear system solvers for very large sparse Symmetric Diagonally Dominate system (SDD).
348
28.6
17.08.16 43:57
Glauber Dynamics for the 2D Ising Model at Low Temperature
Consider the standard Ising model on a finite n x n grid at low temperature.
988
40.8
17.08.16 48:00
Sheriff: Detecting and Eliminating False Sharing
False sharing is an insidious problem for multi-threaded programs running on multicore processors, where it can silently degrade performance and scalability.
495
20.3
17.08.16 58:36
National Renewable Energy Lab, renewable energy and the compute space
This lecture will provide an overview of the scope and evaluation of renewable energy resources from the National Renewable Energy Labs located in Golden, CO.
30
17.08.16 1:03:36
Insights into Ad-sponsored Mobile Software
Started within MSR as a research effort, The Zumobi Network has evolved into a publisher of premium mobile apps (Motor Trend, MSNBC, Popular Science, and 30 more).
26
17.08.16 1:13:34
End-User Creation of Mashups and Cross-Device UI Prototypes
I will discuss two projects that I have worked on whose goals are to bring more of the power of programming to non-programmers.
12
17.08.16 1:47:47
Fully Homomorphic Encryption; Bi-Deniable Encryption; We Have The Technology, Now Where Next?
Fully Homomorphic Encryption over the Integers Vinod Vaikuntanathan, Microsoft Research We construct a simple fully homomorphic encryption scheme, using only elementary modular arithmetic.
1 362
34.6
9 276 видеоназад172далее
жизньигрыфильмывесельеавтотехномузыкаспортедаденьгистройкаохотаогородзнанияздоровьекреативдетское