Microsoft Research

×
331 тыс
подписчики
50.4 млн
просмотры
9 254
видео
24 Окт 2008
создан
17.08.16 1:52:46
Monterey Workshop - Day 2, session 4
Gianna Reggio - A Problem Frame-based approach to cope with predictable and unpredictable changes: the case of the hybrid translation Janos Sztipanovits - Software Verification for Cyber Physical
10
17.08.16 1:14:42
Welcome and Workshop Kickoff, | The University of Washington eScience Institute
Dennis Gannon ΓÇô Welcome and Workshop Kickoff Ed Lazowska ΓÇô The University of Washington eScience Institute
10
17.08.16 54:41
Bite Me: A Love Story
The undead rise again in Bite Me, the third book in Christopher MooreΓÇÖs wonderfully twisted vampire saga.
68
17.08.16 1:21:57
Cloud Computing: Interactive Data Analytics; Chemical Property Prediction; Geoinformatics Workflows
1. Interactive and Fault-tolerant Data Analytics in the Cloud ΓÇô Magdalena Balazinska, University of Washington 2.
259
17.08.16 1:12:41
Amazon Web Services
1. Amazon Web Services (AWS) Deepak Singh, Amazon
11
17.08.16 1:22:52
Towards Predictable Cloud; The Cloud for University City Campus; Cloud Projects in Engineering
1. Towards Predictable Cloud Computing ΓÇô Andreas Polze, Hasso-Plattner-Institute 2. The Cloud for University City Campus ΓÇô Danilo Montesi, University of Bologna 3.
39
17.08.16 57:59
General Session Keynote
General session keynote: David Patterson, University of California at Berkeley
37
17.08.16 1:27:59
Internet Capacity Sharing: Fairer, Simpler, Faster?
The idea that TCP shares out Internet capacity fairly is a dangerous myth. The same applies to fair queuing. The danger?
23
17.08.16 1:27:19
Applications of Power Demand Routing in Distributed Systems
This talk will cover our work exploring the role of software in modulating the flow of electric power within Internet systems, to reduce operating costs and environmental impact.
71
17.08.16 55:06
Understanding User-generated Content on Social Media
In this talk I will cover some of my dissertation research that is devoted to the study of textual user-generated content on social media platforms.
357
9.6
17.08.16 48:27
Mining capacity from concurrent transmissions
There is almost a never-ending quest to push the capacity limit for wireless networks to support growing applications.
28
17.08.16 39:06
A Practical Learning to Rank Approach for Smoothing DCG in Web Search Relevance
Discounted cumulative gain (DCG) is now widely used for measuring the performance of ranking functions especially in the context of Web search.
1 889
25.9
17.08.16 1:02:58
Lahar: Warehousing Markovian Streams
In this talk, I present Lahar, a warehousing system for a general class of imprecise, sequential data called Markovian streams.
9
17.08.16 46:53
Monterey Workshop - Day 3, session 2
10:30-11:15 Software Certification: The Case Against Safety-Cases Alan Wassyng, Mark Lawford and Tom Maibaum 11:15-12:00 How to Certify Software Architectures for Reliable Reconfiguration Valdis
30
17.08.16 59:15
Towards physical basis for Ambient Intelligence
Ever since Mark Weiser and Philips connected systems intelligence with cognitive intelligence and formed the basis for the development of the ΓÇÿinternet of thingsΓÇÖ, much has been written about
91
17.08.16 1:28:20
Natural Language Processing in Multiple Domains: Linking the Unknown to the Known
The key to creating scalable, robust natural language processing (NLP) systems is to exploit correspondences between known and unknown linguistic structure.
220
17.08.16 41:08
Monterey Workshop - Day 2, session 1
Presentation Session 3 - Runtime Reconfiguration 9:15-10:00 Towards IT systems capable of managing their health Jose Fortes and Selvi Kadirvel
10
17.08.16 1:06:35
LabelMe: online image annotation and applications
Central to the development of computer vision systems is the collection and use of annotated images spanning our visual world.
11 681
155.4
17.08.16 59:35
Documenting Observations of Daily Living for Chronic Health Conditions
Improvements in modern healthcare have allowed many formerly fatal conditions to become survivable but chronic.
101
17.08.16 1:09:08
New Learning Frameworks for Information Retrieval
Information retrieval and access have become central technologies for managing and leveraging the ongoing explosion of digital content.
351
58.2
17.08.16 1:24:30
Example Based Large Vocabulary Speech Recognition
Research into Example Based Speech Recognition got revived over the past decade.
541
89.7
17.08.16 59:23
Size Estimation of Approximate Predicates
Ever-increasing amounts of text are produced by end-users or collected from multiple sources.
59
17.08.16 1:00:53
Computing Nash equilibria: The plot thickens
Myerson has argued that the Nash equilibrium lies at the foundations of modern economic thought, and yet the dark computational side of the concept keeps getting gloomier.
237
17.08.16 1:00:15
Efficient Random Walk Computation, and Ranking Mechanisms on the Web
Random walks are a fundamental tool used widely across several areas of computer science - theory, web algorithms, distributed networks, as well as mathematics and statistical physics.
455
75.3
17.08.16 1:23:49
Understanding Deep Architectures and the Effect of Unsupervised Pre-training
Much recent research has been devoted to learning algorithms for deep architectures such as Deep Belief Networks and stacks of auto-encoder variants, with impressive results obtained in several
401
18.8
17.08.16 54:57
Stealing Cycles from the Cloud
In recent times, cloud computing services, such as Amazon EC2, and Microsoft Azure have become very popular.
110
17.08.16 1:10:38
ILDJIT: A Compilation Framework for CIL Bytecode
The use of a virtual machine language, instead of machine code, is by now a well-established and successful technique for porting programs across different hardware platforms, without incurring into
181
17.08.16 1:05:33
MSR Workshop on Voting Technology - Session 2
11:30 - 12:30 Ben Adida, Harvard Medical School Introduction to verifiable election technologies
20
17.08.16 2:06:57
Barcelona Super Center tutorial - Session 2
The purpose of the seminar is to describe the StarSs programming model, the status of the different implementations and why we consider that it provides a global solution to the challenges raised by
3
17.08.16 1:00:26
Usable Cyber Trust Indicators
When systems rely on a 'human in the loop' to carry out a security-critical function, cyber trust indicators are often employed to communicate when and how to perform that function.
25
9 276 видеоназад179далее
жизньигрыфильмывесельеавтотехномузыкаспортедаденьгистройкаохотаогородзнанияздоровьекреативдетское