Microsoft Research

×
332 тыс
подписчики
50.5 млн
просмотры
9 256
видео
24 Окт 2008
создан
22.06.16 1:31:54
Subset Selection Problems - Part 1
Subset selection problem means finding a small subset of given data that maximizes diversity or information content or some other submodular function depending on the context.
1 626
53.8
22.06.16 51:46
Computational Limits to Human Thinking in a Society With Too Much Information And Too Little Time
This talk is about Computational Limits to Human Thinking. Human beings make errors, tend to forget, are impatient and look for least effort solutions.
163
22.06.16 1:28:18
From LSI to Probabilistic Topic Models: An introduction to Topic Models - Part 2
Topic models attempt to discover themes, or Topics, from large collection of documents.
305
25.1
22.06.16 59:32
Cluster Trees and Neighborhood Graphs
What information does the clustering of a finite data set reveal about the underlying distribution from which the data were sampled?
586
32.2
22.06.16 1:07:56
Learning, Mixing, and Complexity- A Free Ride on the Second Law
The principle of maximum entropy states that, given some data, among all hypothetical probability distributions that agree with the data, the one of maximum entropy best represents the current state
195
22.06.16 1:06:51
Entity Mining at Microsoft Bing Hyderabad
Entity mining is one of the hot topics in the area of web mining and information retrieval.
569
23.3
22.06.16 1:00:35
From LSI to Probabilistic Topic Models: An introduction to Topic Models
Topic models attempt to discover themes, or Topics, from large collection of documents.
2 293
54.2
22.06.16 43:17
Computing on Encryption Data: Functional Encryption and More
Computing on Encryption Data: Functional Encryption and More
1 152
42.3
22.06.16 44:29
Advances in Quantum Algorithms & Devices: Quantum versus classical annealing
I will discuss several recent findings about the computational power of quantum annealing, either on quantum hardware or as “simulated quantum annealing” by quantum Monte Carlo (QMC) simulations on
604
24.8
22.06.16 51:38
Subset Selection Problems - Part 2
Subset selection problem means finding a small subset of given data that maximizes diversity or information content or some other submodular function depending on the context.
266
22.06.16 1:04:57
Bedrock: A Software Development Ecosystem Inside a Proof Assistant
The benefits of formal correctness proofs for software are clear intuitively, but the high human costs of proof construction have generally been viewed as prohibitive.
2 336
17.7
22.06.16 56:47
Can you convince me why your software works?
The rise of practical solvers for satisfiability checking (both propositional and first-order logics) has revolutionized the field of automatic program verification.
61
22.06.16 55:15
Considering Tools for Artists, Creative Processes, and Design Ideation
This presentation describes a body of practice-led research relating to the development of technologies for gallery-focused fine artists.
86
22.06.16 21:51
Information-based approaches for Bayesian optimization.
Bayesian optimization provides a principled, probabilistic approach for global optimization.
1 253
41.4
22.06.16 52:55
A Case for using Trend Filtering over Splines
This talk will be about fast optimization algorithms (specifically specialized ADMM) for a common practical problem - estimating piecewise constant/linear/quadratic fits to time series data.
496
27.1
22.06.16 58:40
SAT-based Techniques for Optimization and Synthesis.
The SAT technology has been tremendously successful at solving a wide range of real-world problems, including hardware and software verification, bioinformatics, planning and scheduling.
770
21.1
22.06.16 43:10
Advances in Quantum Algorithms & Devices: Position-based cryptography
Advances in Quantum Algorithms & Devices: Position-based cryptography
252
22.06.16 1:29:23
Industry Embraces Open Source-What This Means for Academia
Open source is a powerful way of advancing software development and sharing data for experimentation.
32
22.06.16 55:15
Declarative query processing in imperative managed runtimes
The falling price of main memory has led to the development and growth of in-memory databases.
120
22.06.16 49:42
Tierless Programming and Reasoning for Software-Defined Networks
Tierless Programming and Reasoning for Software-Defined Networks
93
22.06.16 1:05:53
Truth in Advertising: The Hidden Cost of Mobile Ads
The "free app" distribution model has been extremely popular with end users and developers. Developers use mobile ads to generate revenue and cover the cost of developing these free apps.
208
22.06.16 1:03:27
The Varied Forms of Verification with Z3
The Z3 theorem prover is Microsoft's main engine of logic and it is used in a variety of projects.
5 674
30.2
22.06.16 1:24:07
Code Hunt Workshop - Day 1 Session 1
1st Code Hunt Workshop Microsoft Research, Redmond, WA Conference Room 99/1919 February 9-10, 2015 Goals of the workshop are: - To expose the state of the platform and data of Code Hunt and its
222
22.06.16 1:01:02
Bonsai: Reactive Tools for Data Science
I will present Bonsai, a general purpose visual programming language (GPVPL) for rapid prototyping of reactive data acquisition and control systems.
579
21.1
22.06.16 54:12
Program Synthesis from Refinement Types
The key to scalable program synthesis is modular verification, which enables pruning inviable candidates for each component of the target program independently.
1 041
22.8
22.06.16 58:25
Many-Core Compiler Fuzzing
Parallel programming models for many-core systems, such as the OpenCL programming model, claim to allow the construction of portable many-core software.
246
22.06.16 1:02:37
VISC: Virtual Instruction Set Computing
Although many systems use virtual instruction sets to improve security, portability and productivity, two important classes of software – high performance applications and security-sensitive systems
412
19.3
22.06.16 1:18:14
Rebooting CS50
CS50 is Harvard University's introductory course for majors and non-majors alike, a one-semester amalgam of courses generally known as CS1 and CS2.
176
22.06.16 1:01:04
Micro-Policies: A Framework for Tag-Based Security Monitors
Current cybersecurity practice is inadequate to defend against the threats faced by society.
48
22.06.16 57:08
The Turing trap. How the universal computer is making the internet less secure.
Data breaches and cyber-attacks are making the headlines on a daily basis, yet impenetrable network storage solutions are conspicuous by their absence.
156
9 276 видеоназад275далее
жизньигрыфильмывесельеавтотехномузыкаспортедаденьгистройкаохотаогородзнанияздоровьекреативдетское