Content Placement as a Key to Leveraging Geo-Distributed Infrastructures
The evolution of computing infrastructure points to a future with massively geo-distributed infrastructures deployed at hundreds or even thousands of locations.
39
Randomized Rounding for the Largest j-Simplex Problem
The maximum volume j-simplex problem asks to compute the j-dimensional simplex of maximum volume inside the convex hull of a given set of n points in d-dimensional space.
277
What Drives Curiosity? Robotics Technologies on the Mars Science Rover
No Abstract Available
465
21.8
Measuring Rhetoric: Statistical Language Models in Social Science
Social scientists are embracing the idea of using `text as data’ as a way to quantify and evaluate social theories.
121
Microsoft Research Gender Diversity Lecture Series 2: Diversity in the Computing Field
Introduction: Jeannette Wing, Corporate Vice President at Microsoft Research Maria Klawe, President of Harvey Mudd College: Challenges for Computer Science at the University and K-12 Level Jane
1 424
36.2
WIPTTE: Reflections on Classroom Presenter
Richard Anderson: Reflections on Classroom Presenter Classroom Presenter is a TabletPC application developed to allow instructors to give more flexible presentations through the introduction of
34
From formal verification to high-performance constraint solving
SAT and SAT Modulo Theories (SMT) are workhorses of formal verification. But they are also highly effective for constraint solving and optimization.
1 391
28.6
Solving QBF by Counterexample-Guided Abstraction Refinement
Quantified Boolean formulas (QBFs), as a PSPACE-complete problem, represent a powerful formalism but also a computational challenge.
748
24.5
Unbalanced Random Matching Markets: The Stark Effect of Competition
Stability is used often as a criterion in organizing clearinghouses for two-sided matching markets, where agents on both sides of the market have preferences over potential matches.
334
55.3
Mining Web Data for Public Health
Recent years have seen the adoption of new Web data sources in a wide range of health areas.
358
39.2
Charles River Crypto Day - Building Anonymous Messaging Systems that Hide the Metadata
No Abstract Available
142
Belief propagation with strings.
Strings and string operations are very widely used, particularly in applications that involve text, speech or sequences.
617
50.9
Next Generation Zinc Rechargeable Batteries
Note this is more of a company meeting with an informal technical lecture.
7 870
49.1
Revenue Efficient Mechanisms for Online Advertising
nline advertising is an essential part of Internet and the main source of revenue for lots of web-centric companies such as search engines, news websites, Internet social networks, and other types
132
Making a difference. One app at a time: Disability, Distinction, and Domestic Access
No Abstract Available
51
Studio 99 Present: Collected Works of Artist Laurie Frick
Please help us welcome Laurie Frick, an installation artist who creates physical instantiations of personal, and private data for thought and discussion.
38
Theory Day Session 2
Ofer Dekel - Bandit Convex Optimization: SqrtT Regret in One Dimension Bandit convex optimization is a sequential decision making game with partial information.
198
Modular Total Correctness Verification of Fine-Grained Concurrent Programs with Exceptions and I/O
Many powerful higher-order logics have been proposed for the modular specification and verification of fine-grained concurrent imperative programs.
188
Engineering Serendipity
Innovation is fundamentally social. Study after study has shown that the best ideas are more likely to arise from a casual chat around the water cooler or coffee shop than any scheduled meeting.
112
Theory Day Session 1
Noam Nisan - On the borders of Border's Theorem Border's theorem characterizes the possible (interim) allocation probabilities in a single item auction.
345
38
On understanding types, data abstraction and effects
On understanding types, data abstraction and effects
142
Interdisciplinarity: A View from Theoretical Computer Science
Interdisciplinarity: A View from Theoretical Computer Science
88
Automorphisms of Graphons
Convergent dense sequences of graphs and their limit objects called graphons were introduced by Borgs, Chayes, Lovasz, Sos, Szegedy and Vesztergombi.
487
26.7