Build a Great website and handy Virtual Tools - Session 2
Would you like to build a great website by yourself?
15
What can we solve with a Quantum Computer?
In 1982, Richard Feynman first proposed using a quantum computer founded on the laws of quantum physics to simulate physical systems and achieve exponential computational speed-ups over conventional
93 811
41.8
Password Aging Policies and Quantifying Security Advantages
Many enterprise security policies enforce "password aging", i.e., require that users change their passwords each fixed intervals such as 90 days.
160
Vision to Language
The recent advances in computer vision, natural language processing and other related areas has led to a renewed interest in artificial intelligence applications spanning multiple domains.
42
Science Fiction: Catalyst for Reality
Remember the first time science and technology captivated you? Maybe it was the sight of an airplane or a helicopter in flight. Or perhaps it was an episode of Star Trek or writings of Jules Verne.
108
Of Teams and Automation: Lessons in Social Coding from Github
Social coding is a phrase made popular by GitHub, the online collaborative coding platform home to millions of users and repositories.
62
Computational Imaging and Illumination for 3D Acquisition: Research at the NU Comp Photo Lab
Computational imaging and illumination plays a central role in many modern three-dimensional imaging techniques.
350
116.3
Some Limitations and Possibilities Toward Data-Driven Optimization
As we grow highly dependent on big data for making predictions, we translate these predictions into models that help us make informed decisions.
180
Privacy Protection, Personalized Medicine and Genetic Testing
Personalized medicine - where the treatment is as individual as the patient - has been discussed as the future of medicine.
147
Personalized Health with Gaussian Processes
Modern data connectivity gives us different views of the patient which need to be unified for truly personalized health care.
731
20
A Scalable Cloud-Sensor Architecture for the Internet of Things
Recent advances in IoT and pervasive and ubiquitous computing provide a glimpse into our future and reveal exciting visions of many "smart" things: smart cities, smart homes, smart cars, all in
476
79
How Different is Different: A Perspective on Music Similarity in Indian Art Music
No Abstract Available
45
A Visual Programming Language for building Artificial Biochemistries in Haskell
We describe an expressive visual programming language for defining behaviors manifested by actors reified in a 2D virtual world which can be compiled into programs comprised of combinators which are
297
WIPTTE: Sponsor Talks: Surface Pro Digital Pen Design
1:00 pm - 2:00 pm Vineet Thuvara, Daryl Wilson - Surface Pro Digital Pen Design
151
Peer-to-Peer Rental Markets in the Sharing Economy
In my talk, I will discuss three distinct studies I have worked on, spending a little more time on the first one.
2 095
30
Inverting RANSAC: Global Model Detection via Inlier Rate Estimation
This work presents a novel approach for detecting inliers in a given set of correspondences (matches).
470
38.7
Social Media Predictive Analytics: Methods and Applications
Large-scale real-time social media analytics provides a novel set of conditions for the construction of predictive models.
557
22.9
Software Support for Efficient Use of Modern Parallel Systems
No Abstract Available
51
Microsoft Research Gender Diversity Lecture Series 1 Kickoff: Implicit Biases and Stereotype Threat
Introduction: Eric Horvitz, Managing Director Microsoft Research Redmond Lab, and Scott Saponas, MSR Researcher Stephen Bernard, Professor Indiana University: Implicit Biases Catherine Ashcraft
440
14.3
Automatic differentiation and machine learning
Derivatives, mostly in the form of gradients and Hessians, are ubiquitous in machine learning.
3 550
27.1
Toward Causal Machine Learning
In machine learning, we use data to automatically find dependences in the world, with the goal of predicting future observations.
7 906
23.6
Fast Dual-Tree k-means with Bounded Single-Iteration Runtime
k-means is a widely used clustering algorithm, but for k clusters and a dataset size of N, each iteration of Lloyd's algorithm costs O(kN) time.
517
15.3
Fast Interpolating Bounded Model Checking
Bounded Model Checking (BMC) is well known for its simplicity and ability to find counterexamples.
618
33.9
Internet of Things: Support IP Smart Objects over Bluetooth Smart
The "Internet of Things" is the latest technical problem and opportunity.
220
UW - MSR Machine Learning workshop 2015 - Session 1
9:30 Opening Remarks - Ran Gilad-Bachrach 9:45 Toward Scalable Visual Recognition - Ali Farhadi Recognition is graduating from labs to real-world applications.
154
Towards a Learning Theory of Causation
We pose causal inference as the problem of learning to classify probability distributions.
328
17.8
A Real-time Augmented Reality Processor and a Smart Glasses System
Real-time augmented reality (AR) is actively studied for the future user interface and experience (UI/UX) in smart glasses platforms.
823
136.8
Automating Program Transformations based on Examples of Systematic Edits
The cost of software maintenance is rising dramatically and has been estimated to account for more than 90% of the total cost for software.
38