Microsoft Research | In 1991, Microsoft Corp. became the first software company to create its own computer science research organization. Microsoft Research (MSR) has developed into a unique entity among corporate research labs, balancing an open academic model with an effective process for transferring its research to product development teams. Microsoft recognizes that to create the foundation for future technology breakthroughs, it is necessary to support long-term computer science research that is not bound by product cycles. Today, the world-renowned scientists of Microsoft Research make up one of the largest, fastest-growing and most highly respected software research organizations in the world — one that will help define and redefine the computing experience for millions of people for decades to come. |  | | (Computational) Linguistics and the Web: Hot research questionsI've spent the last ten years trying to feed technologies and insights from Linguistics and Computational Linguistics into the infrastructure of the Web. In this talk I'll give brief but intense intro ... 1. Vision: Extraordinary Computing Experiences & 2. Robots for the Masses: Fiction or RealityPart I: Vision: Extraordinary Computing Experiences
Imagine walking into a room with your camera phone, seeing a book you like, and in one snap of the camera the book is yours. This and many other ap ... 2D, 3D and Surface Texture Analysis and SynthesisTexture synthesis has been widely recognized as an important research topic. In this talk, I present a series of graphics or vision related projects that focus on texture analysis and synthesis. These ... 50/50 by 2020 -- Living Anita's Vision and the Importance of Gender Equity in TechnologyAnita Borg Institute Mission: To increase the impact of women on all aspects of technology, to increase the positive impact of technology on the lives of the world's women, and to help communities, in ... 802.11i Security Analysis: Can We Build a Secure WLAN?Abstract: Security has become a serious concern in wireless local area networks. In order to eliminate the vulnerabilities in previous security mechanisms, IEEE Task Group i has designed 802.11i to pr ... A CLP Approach to Modelling SystemsWe present a formal method for modelling the operational behavior of various kinds of systems of concurrent processes. A first objective is that the method be broadly applicable.
We choose to mode ... A Crowd of One: The Future of Individual IdentityHow do I know you are who you say you are? Why should I trust you? Where do we get our identities, our sense of who we are? What happens when our identities become digital? If we examine the historica ... A Dynamic Pari-Mutuel Market for Hedging, Wagering, and Information AggregationI will describe a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a continuous double auc ... A Framework for Runtime Verification of Concurrent ProgramsThis talk is about the VYRD project, a verification framework for concurrent programs that combines ideas from model checking and testing. In Norse mythology, the three Vyrd sisters weave together the ... A Framework for Unrestricted Whole-Program OptimizationIn current compilers, the vast majority of optimization routines operates within procedure boundaries. Since individual procedures do not usually present the ideal scope to optimization, significant p ... A Frequency Analysis of Light TransportWe present a signal-processing framework for light transport. We study the frequency content of radiance and how it is affected by phenomena such as shading, occlusion, and travel in free space. This ... A Game Developer's Perspective On ParallelismThe game console market has gone highly concurrent, and the PC market is heading that way fast as well. The software development side of the game business has been reeling to catch up and deal with th ... A General Linear Camera Model with ApplicationsI will present a General Linear Camera (GLC) model that unifies many previous camera models into a single representation. The GLC model describes all perspective (pinhole), orthographic, and many mult ... A Grand Challenge on Network Information TheoryShannon's information theory was a towering achievement of 20th century science and laid a theoretical foundation for understanding how to design communication systems, and to judge their optimality. ... A Hardware-Based CIL-MachineNo Description Available ... A Large-Margin Framework for Learning Structured Prediction ModelsWe present a novel statistical estimation framework for structured models based on the large margin principle underlying support vector machines. We consider standard probabilistic models, such as Mar ... A Learning-based Approach to SummarizationResearch in summarization has been handicapped by a lack of agreement on how to generate a standard summary (which can serve as a reference in the evaluation of alternative approaches). Part of the pr ... A Life Decoded: My Genome, My LifeOne of the great landmarks in the history of science occurred when J. Craig Venter published the first sequence and analysis of the human genome, and did it earlier and for less money than the governm ... A Low-Level Approach to Reuse for Programming-Language InfrastructureNew ideas in programming languages are best evaluated experimentally. But experimental evaluation is helpful only if there is an implementation that is efficient enough to encourage programmers to use ... A Lower Bound for Cooperative Broadcast in the Presence of NoiseIn a noisy broadcast channel, processors communicate as follows: in each time step, a pre-designated processor broadcasts a bit. Each of the other processors receives a bit, but the received bit is in ... A Multi-Corpus Evaluation of Dynamic Markov Coding for Spam FilteringIn the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's 'A Plan for Spam' - did quite well. Machine learning techniques reported elsewhere to pe ... A P-Adic Algorithm to Compute the Hilbert Class PolynomialA classical approach of constructing elliptic curves that can be used for cryptographic purposes relies on the theory of complex multiplication. A key ingredient in the algorithm is to compute the Hil ... A Passion for Calendars -- From the Maya to MarsHow many days were there in 1752? Is there a year 0? When was there a February 30th? Why did an aluminum company lose $1,000,000 on New Year's Eve? Who thinks 1900 was a leap year? Why is Passover lat ... A Platform for Computational Comparative Genomics on the WebWe have been developing a Web-based system for comparing multiple genomes, PLATCOM, where users can choose genomes and perform analysis of the selected genomes with a suite of computational tools. PLA ... A Rewriting Logic SamplerRewriting logic is a simple computational logic very well suited as a semantic framework within which many different models of computation, systems and languages can be naturally modeled. It is also a ... A Sample of Monte Carlo Methods in Robotics and VisionApproximate inference by sampling from an appropriately constructed posterior has recently seen a dramatic increase in popularity in both the robotics and computer vision community. I will describe a ... A Search Engine for Natural Language ApplicationsMany modern natural language-processing applications utilize search engines to locate large numbers of Web documents or to compute statistics over the Web corpus. Yet Web search engines are designed a ... A Search Engine for the Real World, or, A Top-Down Approach to VisionWe consider the problem of finding instances of visual object categories (such as a cup or a pen) in cluttered, real-world environments. We propose a hierarchical approach, whereby we first categorize ... A Simple Solution to the $k$-core ProblemWe study the $k$-core of a random (multi) graph on $n$ vertices with a given degree sequence. We let $n$ tend to infinity. Then, under some regularity conditions on the degree sequences, we give condi ... A Systemic Approach to Appraisal: Identifying Opinion and Sentiment in TextSentiment analysis aims to identify the subjective content of text: what kinds of opinions are being expressed, and how? This is a relatively new field with many applications in information extraction ... A Unification of Menger's and Edmonds' Theorems and Network Coding TheoremsThe {\em multicast capacity} is the maximum rate that a sender can communicate common information to a set of receivers in a network. A fundamental theorem in graph theory by Menger determines the uni ... A Variant of Lehmer's ConjectureLet f be a fixed cusp form of weight at least 2. We show that for a set of n of density one, there is a common factor between n and the n-th Fourier coefficient of f. ... A Virtualization Architecture for Wireless Network CardsThere are a number of scenarios where it is desirable to have a wireless device connect to multiple networks simultaneously. Currently, this is possible only by using multiple wireless network cards i ... A Voice-Enabled Procedure Navigator for the International Space StationOnboard the International Space Station, astronauts execute thousands of complex procedures to maintain life support systems, check out space suits, conduct science experiments and perform medical exa ... A Voice-Enabled Procedure Navigator for the International Space StationOnboard the International Space Station, astronauts execute thousands of complex procedures to maintain life support systems, check out space suits, conduct science experiments and perform medical exa ... A Web Interface to Large, High-Resolution X-Ray Computed Tomography Data SetsHigh-resolution X-ray computed tomography (HRXCT) provides highly detailed three-dimensional data on the exterior form and interior structure of solid objects. The data produced by the UTCT Lab facili ... A World Filled With Cameras: Security at the Cost of Freedom? Or Can We Have Both?Since the tragic events of 9/11 we keep hearing security experts demand tighter restrictions on daily life, while civil libertarians preach we should accept risk in order to avoid an overbearing 'Big ... Abducted: How People Come to Believe They Were Kidnapped By AliensThey are tiny. They are tall. They are gray. They are green. They survey our world with enormous glowing eyes. To conduct their shocking experiments, they creep in at night to carry humans off to thei ... Abducted: How People Come to Believe They Were Kidnapped By AliensThey are tiny. They are tall. They are gray. They are green. They survey our world with enormous glowing eyes. To conduct their shocking experiments, they creep in at night to carry humans off to thei ... Abstraction Methods for LivenessIt is a known fact that finitary state abstraction methods, such as predicate abstraction, are inadequate for verifying general liveness properties or even termination of sequential programs. In this ... Accelerated Democracy: How Technology Might Change Votinghttp://www.accelerateddemocracy.net
How might campaigns and government change if voters received personalized electronic updates when politicians fulfilled or violated their campaign promises? What ... Accelerating Architectural-Level Full-System Multiprocessor Simulations Using FPGAsAn architectural-level, full-system simulator such as Virtutech Simics is a powerful and versatile research enabler for both architectural exploration and advanced OS/compiler development. Its main sh ... Acoustic Analysis and Modeling of Pathological VoicesDisorders in voice are common and presently have been increasing due to unhealthy habits and vocal abuse. As well, there are a great range of diseases which cause modification of the speech, for examp ... Adaptation=Vulnerability under RoQ AttacksOver the past few years, Denial of Service (DoS) attacks have emerged as a serious vulnerability for almost every Internet service. An adversary bent on limiting access to a network resource could sim ... Addressing the Memory Bottleneck in Packet Processing SystemsProgrammable network elements are the building blocks of the emerging 'Global Environment for Networking Innovations (GENI) initiative -- targeted at developing the next generation of networking and d ... Advancing Women in Science and Engineering at the University of MichiganI will focus on the Institutional Transformation program at the University of Michigan, which aims to improve the work environment for women faculty in science and engineering. I will outline the natu ... Algorithms for Data Management and MigrationI will describe some algorithms for addressing some fundamental optimization problems that arise in the context of data storage and management. In the first part of the talk we will address the follow ... All Rise: Somebodies, Nobodies and the Politics of DignityAn undiagnosed disorder is at large in the world. It afflicts individuals, groups, and nations. It distorts our personal relationships, erodes our will to learn, taxes our economic productivity, stoke ... America in the King Years, 1965 - 1968Taylor Branch has referred to Dr. Martin Luther King, Jr. as a modern American founding father. Over the past twenty five years, Taylor Branch has written three volumes dedicated to the life of Dr. Ki ... America in the King Years, 1965 - 1968Taylor Branch has referred to Dr. Martin Luther King, Jr. as a modern American founding father. Over the past twenty five years, Taylor Branch has written three volumes dedicated to the life of Dr. Ki ... An Abstract Decision Procedure for Algebraic Data TypesThe theory of algebraic data types is a valuable modeling tool for software verification. In the past, decision procedures have been proposed for both the full theory and its universal fragment. Howev ... An Axiomatic Approach to Ranking SystemsThis talk will survey some of our recent work on the axiomatic approach to ranking systems. Ranking systems are systems in which agents rank each other to produce a social ranking. In the axiomatic ap ... An Examination of User Behaviour During Web Information TasksSince the inception of electronic environments, researchers have been interested in how to provide better support for the tasks people perform in these environments. While several studies have examine ... An Interface to Support Multi-faceted Information Seeking and Targeted Relevance FeedbackIn the seminar, I will describe a user study of a novel information seeking interface that provides support for multi-faceted information seeking and targeted relevance feedback. The user interface is ... An Overview of Recent CMU Research on Model-Based Face ProcessingA face model is a mapping from a set of parameters to an image of a face. The most well-known face models are Active Appearance Models and 3D Morphable Models. Computer vision applications of face mod ... Analysis of Multiagent Teams using Distributed POMDPsMany current large-scale multiagent team implementations can be characterized as following the ``belief-desire-intention'' (BDI) paradigm, with explicit representation of team plans. Despite their pro ... Analyzing Mobile Ad Hoc Network Protocols via Probabilistic Model CheckingAd hoc networks are formed as collections of nodes that communicate over wireless channels. The dynamic and distributed nature of such networks means that randomization is often used to improve effici ... Anansi Boys and MirrormaskNeil will be talking about his new book, Anansi Boys, and his new movie, Mirrormask.
Anansi Boys is Gaiman's latest novel and the follow up to American Gods. Readers across America and around the ... Anomalous Diffusion and Polya RecurrenceAfter a brief introduction a survey of some recent results will be given of ergodic and stochastic properties of Sinai billiards. In particular, Polya’s celebrated recurrence theorem, known to hold ... Anomaly Detection in Large Networks using Approximation TechniquesA tremendous enthusiasm for amassing enormous amounts of network measurement data has spurred the development of numerous applications that incorporate data mining techniques. In this talk we question ... Anonymity in Peer-to-Peer SystemsAs more of our activities are carried out online, technologies for protecting our privacy are becoming increasingly important. I will discuss one such technology -- anonymity -- in the context of peer ... Applications of First-Order Integer Arithmetic to the Verification of Programs with ListsThe arithmetic of natural numbers with addition and divisibility has been shown undecidable as a consequence of the fact that multiplication of natural numbers can be interpreted into this theory, as ... Applied Nonparametric Bayes and Statistical Machine LearningBayesian approaches to learning problems have many virtues, including their ability to make use of prior knowledge and their ability to link related sources of information, but they also have many vic ... Applying Data Mining Techniques to Computer SystemsModern computer systems desire several properties, such as high performance, reliability and manageability. To deliver these properties requires a lot of human effort which is costly and error-prone. ... Approximability of the Unique Coverage ProblemIn this talk, we consider a natural maximization version of the well-known set cover problem, called unique coverage: given a collection of sets, find a sub-collection that maximizes the number of ele ... Approximate Inference Techniques for Identity UncertaintyMany interesting tasks, such as vehicle tracking, data association, and mapping, involve reasoning about the objects present in a domain. However, the observations on which this reasoning is to be bas ... Approximation Algorithms for Discrete Stochastic Optimization ProblemsWe will survey recent work in the design of approximation algorithms for several discrete stochastic optimization problems, with a particular focus on 2-stage problems with recourse. In each of the pr ... Approximation Algorithms for Embedding with Extra Information and Ordinal RelaxationThis talk considers approximation algorithms for embedding: constructing a global geometry that is approximately consistent with a given local geometry, which is typically represented by distances bet ... Approximation Algorithms for Unique GamesUnique games are constraint satisfaction problems that can be viewed as a generalization of MAX CUT to a larger domain:
We are given a graph G = (V,E) on n vertices and a permutation P_{uv} on the ... Are Aspects Really Needed For Aspect-Oriented Programming?In this talk I will argue that we don't need the 'aspect' as a separate abstraction mechanism for aspect-oriented program design, and there are good reasons to believe we might be better off without i ... Are You Ready to Succeed?: Unconventional Strategies to Achieving Personal Mastery in Business and LifeDo you come passionately alive at work and relish the role that work plays in your life? If not, Dr. Srikumar Rao has an invitation for you. His work has set hundreds of people on paths of self-discov ... Are You Ready to Succeed?: Unconventional Strategies to Achieving Personal Mastery in Business and LifeDo you come passionately alive at work and relish the role that work plays in your life? If not, Dr. Srikumar Rao has an invitation for you. His work has set hundreds of people on paths of self-discov ... ASM View of Abstract CryptographyThe computational model of cryptography views agents as PPT algorithms operating on strings. In the abstract model, agents are working on syntactic representations of messages, using a fixed set of ru ... Aspect.NET - An Aspect-Oriented Programming Tool for .NET ... Asymptotic Enumeration of Spanning Trees via Traces and Random WalksMethods of enumeration of spanning trees in a finite graph and relations to various areas of mathematics and physics have been investigated for more than 150 years. We will review the history and appl ... Attack-Resistant Algorithms for Massive NetworksIn this talk, we will describe new attack-resistant algorithms for peer-to-peer networks. Our attack model is rather strong in that we assume that an omniscient and computationally unbounded adversary ... Attacks On and From P2P File-Sharing SystemsMany popular file-sharing systems have been the targets of massive attack. Furthermore, given the large number of peers in many file sharing systems, they can potentially be leveraged to create large- ... Automated Reconstruction of 3D City Models from Laser Scans and Camera ImagesI will present a fast approach to automated generation of textured 3D city models with both high details at ground level and complete coverage for bird’s-eye view. A ground-based facade model is acq ... Automated Termination Analysis of Programs using Term RewritingThe question whether a given program terminates for all its inputs is one of the fundamental problems in program verification. Thus it has been researched quite thoroughly in the past and many techniq ... Automatic Failure Diagnosis in Large-Scale SystemsAs modern computer systems grow in both size and complexity, so has the need for automatic analysis and computer-aided administration of these systems. With recent booms in computing power and efficie ... Automatic Identification and Classification of Protein DomainsAmong their many other roles, proteins are the scaffolds, workhorses, and computational devices of all organisms. For many pratical purposes, a protein is a string of charaters in a 20 letter alphabet ... Automatically Proving the Termination of C ProgramsIn this talk I will discuss Terminator, the first known automatic program termination proven to support large programs with arbitrarily nested loops or recursive functions, and imperative features suc ... Automating the Construction of Compiler Heuristics using Machine LearningDesigning optimizing compilers is a black art. Compiler writers are expected to create effective and inexpensive solutions to NP-hard problems such as instruction scheduling and register allocation. T ... Automatizability and LearnabilityWe consider the complexity of properly learning concept classes, i.e. when the learner must output a hypothesis of the same form as the unknown concept. We present the following new upper and lower bo ... Back Channels: Power and the Active Audience ... Bayesian Inference of GrammarsMark Johnson (Joint work with Sharon Goldwater and Tom Griffiths) Even though Maximum Likelihood Estimation (MLE) of Probabilistic Context-Free Grammars (PCFGs) is well-understood (the Inside-Outside ... Bayesian Methods for Unsupervised Language LearningUnsupervised learning of linguistic structure is a difficult task. Frequently, standard techniques such as maximum-likelihood estimation yield poor results or are simply inappropriate (as when the cla ... Bayesian topic modelsElectronic documents provide vast amounts of information, but need to be organized in a way that lets people use that information. Topic models provide one way of approaching this problem, automatical ... Because It Is There: Kili the Right Wayhttp://www.mountainmadness.com/intl/africa/africa.htm
http://www.hec.org/club/clothingbank2.htm
It is midnight at 11,000 feet on Mount Kilimanjaro when a bedraggled figure of a man approaches thr ... Behavior-Based Malware DetectionIn recent years, viruses and worms have started to pose threats at Internet scale in an intelligent, organized manner, enrolling millions of unsuspecting and unprepared PC owners in spamming, denial-o ... Behind the Code with Anders Hejlsberg This episode features industry luminary, Anders Hejlsberg. Before coming to Microsoft in 1996 he was well noted for his work as the principal engineer of Turbo Pascal and the chief architect of the D ... Behind the Code with Anders HejlsbergThis episode features industry luminary, Anders Hejlsberg. Before coming to Microsoft in 1996 he was well noted for his work as the principal engineer of Turbo Pascal and the chief architect of the De ... Behind the Code with Catharine van IngenWhat do global warming, a scientific instrument weighing about 4500 tons and bill collection have in common? The once Berkeley 'hippie chick' turned Software Architect Catharine van Ingen.
Cathari ... Behind the Code with Jim Gray This episode features Jim Gray. He is a 'Technical Fellow' in the Scalable Servers Research Group (Sky Server, Terra Server) and manager of Microsoft's Bay Area Research Center (BARC). Jim has been c ... Behind the Code with Jim GrayThis episode features Jim Gray. He is a 'Technical Fellow' in the Scalable Servers Research Group (Sky Server, Terra Server) and manager of Microsoft's Bay Area Research Center (BARC). Jim has been ca ... Behind the Code with Mohsen AgsenA rolling stone gathers no moss. What it does gather, however, is a great deal of experience. During his long career at Microsoft, Mohsen Agsen has been actively avoiding gathering moss. LAN manager, ... Behind the Code with Peter SpiroDon't get a real job until you're 30. This is Technical Fellow Peter Spiro's advice, and something he fell just short of doing. Discover how this forestry student got a job at Digital Equipment Corpor ... Behind the Code with Rico MarianiFor eighteen years at Microsoft, Rico Mariani’s contagious enthusiasm for technology has inspired countless others to write better and faster code. Most people inside Microsoft know this software ar ... Behind the Code with Rob ShortOccasionally the office of the CTO, David Vaskevitch, sits down with some of Microsoft's most influential technical employees to capture their stories. Instead of examining specific technologies, BTC ... Belief Updating in Spoken Language InterfacesOver the last decade, advances in natural language processing technologies have paved the way for the emergence of complex spoken language interfaces. A persistent and important problem in the develop ... Bergman Complexes, Coxeter Arrangements, and Graph AssociahedraRoughly speaking, a Bergman complex of a matroid is a matroidal analogue of a tropical variety, and a positive Bergman complex of an oriented matroid is an oriented matroid analogue of a positive trop ... BETA.NETNo Description Available ... Beyond Brainstorming: Eight Secrets for Generating Big, Bold, Creative and Profitable IdeasIt's no secret that new ideas fuel profitability. Even when companies hire top talent and teach best skills, few are able to affect the bottom line unless their employees can generate and execute new ... Billions: Selling to the New Chinese Consumer Doctoroff will be discussing the sociological and anthropological work behind his book Billions. Specifically, how to create brands that appeal to the New Chinese Consumer -- all 1.3 billion of them. ... Billions: Selling to the New Chinese ConsumerDoctoroff will be discussing the sociological and anthropological work behind his book Billions. Specifically, how to create brands that appeal to the New Chinese Consumer -- all 1.3 billion of them. ... Bio-Workflow Using BiztalkWorkflow is an important enabling technology for eScience. Research into workflow systems for eScience has yielded several specialized workflow engines. We have been investigating the nature of scient ... Biomal Human Emotion Recognition and Peer Steaming Projects at Ryerson Multimedia Research LabThis talk will describe the work in image, video and multimedia processing carried out at Multimedia Research Lab at Ryerson University. Our work focuses on four topics: human computer interaction, st ... Blink: The Power of Thinking Without ThinkingHow do we make decisions -- good and bad -- and why are some people so much better at it than others? Utilizing case studies as diverse as speed dating, pop music, and the shooting of Amadou Diallo, G ... Body for Life for WomenPamela Peeke is an internationally recognized expert on women's health. She will be at Microsoft primarily to discuss her latest work: Body for Life for Women. Her research has focused on gender diffe ... Brain Computer Interface Systems: Progress and OpportunitiesA brain computer interface (BCI) allows users to communicate without movement. BCIs infer user intent through direct measures of brain activity, usually via EEGs. BCIs are the only means of communicat ... Brazil: After Neo-LiberalismWhat has prompted Brazil, like most of Latin America, to move away from neo-liberalism? Why do the U.S. mainstream media and the Bush Administration view this political shift with suspicion? Why is su ... Breaking Development Barriers with "Better Than Worst-Case" DesignThis talk introduces the audience to a novel design methodology that addresses the correctness and reliability challenges of deep-submicron silicon. The focus is on a new design strategy, called Bette ... Breaking the Frame: Novel Strategies for Interactive Computer GraphicsWe have been rethinking the fundamental sampling strategies used in interactive computer graphics. This rethinking has led to such interesting questions as, 'How should we display an image in which so ... Bridging Art and Architecture: How Emergent Digital Media Have Transformed Our LandscapesBridging art and architecture, Christian Moeller's work explores how emergent digital media have transformed our landscapes of experience across multiple scales, from the fleeting granular image to th ... Bridging Computer Science and Behavioral Science: Research ExamplesAs computers and the Internet become tools and 'places' for social interaction, computer scientists and behavioral scientists can work together to explore the social and behavioral aspects of this new ... Bulldozers, Termites, and Chainsaws: Finding a Gradual Path to ParallelismThe transition to multicore is effectively a gamble that application programmers will start writing all of their code in parallel, or that workloads will change to make it simple to generate many thre ... Can Parallel Computing Finally Impact Mainstream Computing?The PRAM-On-Chip research project at UMD is reviewed. The project is guided by a fact, an old insight, a recent one and a premise. The fact: Billion transistor chips are here, up from less than 30,000 ... Candidate Talk: Accelerating High Performance Computing Applications with Reconfigurable LogicWith microprocessors hitting the power wall, alternative architectures are receiving substantial attention. Two factors make FPGAs promising, particularly for high performance computing applications: ... Candidate Talk: Critical percolation on finite graphsBond percolation on a graph G with parameter p in [0,1] is the random subgraph G_p of G obtained by independently deleting each edge with probability 1-p and retaining it with probability p. For many ... Candidate talk: Domain Adaptation with Structural Correspondence LearningStatistical language processing tools are being applied to an ever-wider and more varied range of linguistic data. Researchers and engineers are using statistical models to organize and understand fin ... Candidate Talk: Query Lower Bounds for Matroids via Group RepresentationsFinding an common independent set in two matroids is one of the classical problems of combinatorial optimization, including the well-known bipartite matching problem as a special case. In the early 19 ... Candidate Talk: The Limiting Shape of Internal DLA with Multiple SourcesStart with n particles at each of k points in the integer lattice Z^d, and let each particle perform simple random walk until it reaches an unoccupied site. The law of the resulting random set of occu ... Candidate Talk: Virgil: Objects on the Head of a PinEmbedded microcontrollers are becoming increasingly prolific, serving as the primary or auxiliary processor in products and research systems from microwaves to sensor networks. Microcontrollers repres ... Capacity and Fairness Issues in Enterprise-class Wireless Mesh NetworksToday's wireless LAN deployments are limited to providing communication between mobile clients and access points. A comprehensive wired backbone still needs to be deployed to inter-connect these acces ... Capture and Recreation of Spatial Audio for HCI and Virtual Reality CategoryAfter a brief introduction to my broader research, this talk will focus on research on the capture of spatial sound, and its reproduction over headphones and speakers. Humans are very good at discerni ... Capturing PeopleCapture and representation of a persons appearance during movement in a form that can be manipulated for highly realistic computer animation in games and film is an open research problem. This talk wi ... Casual Games DiscussionThe casual games sector has been growing rapidly in the last few years. There is however no clear view on what ?casual? actually means. In the discussions of casual games, ?casual? is often taken to r ... Change or Die: Overcoming the Five Myths of Change at Work and in LifeChange or die. What if you were given that choice? What if it weren?t just the hyperbolic rhetoric that conflates corporate performance with life or death? What if a well informed, trusted authority f ... Change the Way You See Everything: Asset-Based ThinkingDr. Kathryn Cramer, founder of The Cramer Institute, has developed and brought to life a revolutionary (and refreshingly simple) concept called Asset-Based Thinking - a practical approach to taking th ... Characterizing Generic Global RigidityConsider a graph embedded in D-dimensional Euclidian space, with edges drawn as straight lines. We say that this embedding of the graph is globally rigid if it there is no other embedding of the graph ... Characterizing Truthful Market DesignWe characterize the family of truthful double-sided auctions. Despite the importance of double-sided auctions to market design, there is no characterization of truthful double-sided auctions. This pap ... Checking Consistency of Concurrent Data Types on Relaxed Memory ModelsConcurrency libraries can facilitate the development of multi-threaded programs by providing concurrent implementations of familiar data types such as queues or sets. On multiprocessors, optimized alg ... Checking Well-Definedness of XQueriesXQuery is the upcoming standard language for querying XML data. The dynamic semantics of XQuery is defined in such a way that the evaluation of an XQuery expression may 'crash' (raise a run-time error ... China's Challenges: Domestic Dilemmas vs.Global Ambitions1. Is China expanding its global reach faster than its people can absorb change at home?
2. Where are the fissures on the home front that could spark sudden changes to China's global ambitions?
... China's Challenges: Domestic Dilemmas vs.Global Ambitions1. Is China expanding its global reach faster than its people can absorb change at home?
2. Where are the fissures on the home front that could spark sudden changes to China's global ambitions?
... Chinese Economic Growth: Past, Present and Future A brief overview of the Chinese economy since economic reform began in 1978 is given, followed by an assessment of the current economic situation. The challenges facing the administration of Presiden ... Client-Side Echo Cancellation for Multi-Party Audio ConferencingWe introduce a new structure for multi-party audio conferencing, where the MCU (Multipoint Conferencing Unit) mixes all the received signals and rebroadcast the same stream to all clients. Each client ... Clustering Algorithms for Perceptual Image HashingA perceptual image hash function maps an image to a short binary string based on an image's appearance to the human eye. Perceptual hashing is useful in image databases, watermarking, and content auth ... CMPLE - Melting the Ice Between CoresChip Multiprocessors have emerged as the common choice for processor manufacturers to take advantage of CMOS scaling trends that lead to greater numbers of smaller transistors on a single chip. CMP ar ... Coding Techniques for Data-Storage SystemsTraditional Coding Theory, inspired by Shannon's motivations in communication problems, has been very successful in proposing meaningful abstractions (e.g Hamming distance, code rate, decoding complex ... Coding Theory: Survey of Recent Progress and Open QuestionsCoding theory emerged in the late 1940's, thanks to the works of Shannon and Hamming, as the theory supporting 'reliable transmission of information (in the presence (fear?) of noise)'. More than fift ... Cohomology in Grothendieck Topologies and Lower Bounds in Boolean ComplexityCohomology, in particular counting Betti numbers, was a known technique in algebraic complexity theory in the late 1970's and early 1980's. Speculation arose as to whether such methods could attack lo ... Collaboration in Directly Mediated Interaction Environments ... Collaborative Algorithms for a Class of Clustered Wireless NetworksIn this talk, we propose collaborative algorithms for wireless networks. Assuming that nodes communicate using frequency division multiple access, we propose collaborative bandwidth allocation strateg ... Combinatorial Approach to Data MiningIn many algorithmic problems like nearest neighbor search, clustering, near-duplicate detection or decentralized navigation input dataset is described either by some explicit representation (e.g. vect ... Combining Static and Dynamic Analysis for Bug FindingMany static and dynamic program analyses have been developed to improve program quality. Several of them are well known and widely used in practice. It is not entirely clear, however, how to put these ... Communication Technology: Interruption and OverloadOver the last 50 years there have been dramatic changes in the way we communicate at work. Information and other people are easier to access than ever before. This has led to problems of communication ... Community Through PicturesNo Description Available ... Community Through PicturesNo Description Available ... Compiler and Microarchitectural Techniques for Leakage Power ReductionLeakage power has become an increasingly important issue in processor hardware and software design. With the main component of leakage, the sub-threshold current, exponentially increasing with decreas ... Complex Arithmetic for Hardware Implementation: Division and Square RootWe adapt the radix-r digit-recurrence division algorithm to complex division and square root. By prescaling the operands, we make the selection of result digits practical. This leads to a simple hardw ... Component Programming with Object-Oriented SignalsThis talk presents a component glue code language called SuperGlue. Components in programs with interactive processing requirements, such as user interface programs, often interact by continuously vie ... Computational Aspects of Biological Information Workshop Session 1ReCombinatorics: Combinatorial Structure and Algorithms for Studying Recombination in Populations, Dan Gusfield, 12/5/2007 ... Computational Aspects of Biological Information Workshop Session 1From Gene Trees to Species Phylogenies, Luay Nakhleh, 12/6/2007 ... Computational Aspects of Biological Information Workshop Session 2Scaling, Genome Rearrangement, Phylogeny Reconstruction, Li-San Wang, 12/6/2007 ... Computational Aspects of Biological Information Workshop Session 3Big Trees From Short Sequences, Sebastien Roch, 12/6/2007 ... Computational Aspects of Biological Information Workshop Session 3Reconstructing Phylogenies: How? How Well? Why?, Joseph Felsenstein, 12/5/2007 ... Computational Aspects of Biological Information Workshop Session 4Graphical Models for HIV Vaccine Design and Genome-Wide Association Studies, David Heckerman, Jonathan Carlson, Yun Song, 12/5/2007 ... Computational Aspects of Biological Information Workshop Session 5Finding Regulatory Structure, Richard M. Karp 12/6/2007 ... Computational Aspects of Biological Information Workshop Session 5Simulation-Free Algorithms for Mapping Evolutionary Innovations onto Phylogenies, Vladimir Minin, 12/5/2007 ... Computational Data Grid for Scientific and Biomedical ApplicationsThe goal of this project is to develop a Microsoft Windows-based Computer Grid infrastructure that will support high performance scientific computing and integration of multi source biometric applicat ... Computational History in Action: Discovering GutenbergGutenberg is credited with having invented the typographic printing process in the West around 1450. Printing has been regarded as an exception to the general principle that technological advances hap ... Computationally-Intensive Biomedical Research Projects Supported by the National Institutes of HealthThe need for computational partnerships in biomedical research has increased sharply in recent years as the Human Genome project and other high-throughput biomedical research has underscored important ... Computationally-Intensive Biomedical Research Projects Supported by the National Institutes of HealthThe need for computational partnerships in biomedical research has increased sharply in recent years as the Human Genome project and other high-throughput biomedical research has underscored important ... Computer ConsciousnessThe complexity of modern computation has led to the paradoxical situation where we have ever more unreliable systems built out of ever more reliable hardware. In the real world, users of Windows, MS O ... Computer Science Clinic and Research at Harvey Mudd CollegeHarvey Mudd College is a small, highly selective, school for undergraduates, with a focus on the sciences, engineering, and mathematics. The capstone experience for students majoring in computer scien ... Computers Versus Common SenseIt's way past 2001 now, where the heck is HAL? For several decades now we've had high hopes for computers amplifying our mental abilities -- not just giving us access to relevant stored information, b ... Computing Hilbert Modular Forms over Real Quadratic FieldsI will present an algorithm which computes Hilbert modular forms on real quadratic fields. The computations exploit the Jacquet-Langlands correspondence to switch to definite quaternions algebras and ... Computing with Selfish AgentsMany complex systems of our day involve autonomous participants who act in their own self-interest and therefore might lie if it benefits them to do so. The goal in the field of mechanism design is to ... Concave Utility Functions on Finite SetsConcave utility functions are widely used in applied economics and in economic theory. A complete characterization of preferences representable by such utility functions has been known for some time, ... Conditional Models for Combining Diverse Knowledge Sources in Information RetrievalCombining the outputs from multiple retrieval sources/engines is of great importance to a number of retrieval tasks such as multimedia retrieval, web retrieval and meta-search. For example, meta-searc ... Conference XP - Access Grid UpdateConference XP - Access Grid Update ... Conference XP - Automated Tracking of Student BehaviorsConference XP - Automated Tracking Student Behaviors ... Conference XP - Brasil ReportConference XP - Brasil Report ... Conference XP - CloseConference XP - Close ... Conference XP - Conference XP Futures DiscussionConference XP - Conference XP Futures Discussion ... Conference XP - Internet2 Collaboration ProgramsConference XP - Internet2 Collaboration Programs ... Conference XP - Project UpdateConference XP - Project Update ... Conference XP - Release 4.0 Technical UpdateConference XP - Release 4.0 Technical Update ... Conference XP - ResearchChannel Update and Real Time HD Encoding DiscussionConference XP - ResearchChannel Update and Real Time HD Encoding Discussion ... Conference XP - SenseCamConference XP - SenseCam ... Conference XP - Tutored Video Instruction with Conference XP and Classroom PresenterConference XP - Tutored Video Instruction with Conference XP and Classroom Presenter ... Conference XP - Virrtual Product Development Team UpdateConference XP - Virrtual Product Development Team Update ... Conference XP - WelcomeConference XP - Welcome ... Confronting Reality: Doing What Matters to Get Things Done RightCan you realistically make the money you hope to in the game you're playing?
The fundamentals of how a business makes money are being rapidly and permanently altered by sweeping structural changes ... Congestion Games: Optimization in CompetitionCongestion games are a natural approach to model resource allocation among selfish or myopic players. In a congestion game there is a set of resources, and a strategy of a player corresponds to the se ... Consolidarity: Exploring Patterns of Social Commonality Among File Directories at WorkConsolidarity: Exploring Patterns of Social Commonality Among File Directories at Work ... Constructing and Evaluating Sensor-Based Statistical Models of Human InterruptibilityWhile people can typically make a rapid assessment of another person’s interruptibility, current systems generally have no way to consider whether an interruption is appropriate. Current systems the ... Content Delivery in the Modern InternetIn recent years, the Internet has experienced an astronomical increase in the use of specialized content delivery systems, such as peer-to-peer file-sharing systems (e.g., Kazaa, Gnutella, or Napster) ... Continuous Coordination: Bridging Formal and Informal Coordination with PalantirModern software engineering tools exhibit a fundamental paradox: they are meant to support the collaborative activity of software development, but cause individuals and groups to work independently fr ... Continuous Queries over Data StreamsContinuous queries are a common interface for monitoring dynamically changing data, including data streams. Applications include tracking financial trends, network health monitoring, and sensor deploy ... Controlling Overlap in Content-Oriented XML RetrievalThe representation of documents in XML provides an opportunity for information retrieval systems to take advantage of document structure, returning individual document components when appropriate, rat ... Convergence in Competitive GamesIn order to study the effects of the lack of coordination in games, we can compute the ratio between the optimal social function and the social function in a Nash equilibrium, i.e, we can find the pri ... Convex Geometry of OrbitsThe talk will focus on the study of metric properties of convex bodies B and their polars B^o, where B is the convex hull of an orbit under the action of a compact group G. Examples include the Travel ... Cooperative Data and Computation Partitioning for Distributed ArchitecturesThe recent design shift towards chip multiprocessors has spawned a significant amount of research in the area of program parallelization. Performance gains in the future will require programmer and co ... Copyright and P2P: Global Collision, National ResponsesThe talk will focus on the different legal issues involved in ascertaining whether those whose business is based on the exploitation of P2P enabling software should bear liability for copyright infrin ... Cords: 3D Curve Primitives that Wrap Around GeometryThe modeling of curves that come in contact with 3D scene geometry presents a challenging problem for users of graphics systems. While embedding curves with physical properties for simulation offers o ... Correlation Decay in Statistical Physics and Applications to Counting ProblemsWe propose a new approach for the problems of enumerating the number of independent sets and proper colorings in low degree graphs with large girth. Our algorithms are not based on a commonly used Mar ... Cost-Sharing Mechanisms for Network DesignToday's Internet seamlessly connects billions of users that mostly pursue selfish motives in both, single-handed and collaborative ways. By design the Internet is anarchic and hence, it is devoid of a ... Counterexamples in the Central Limit Theory of Markov ChainsMy involvements in the study of central limit theorems for Markov chains tend to be of the following form: I learn from Jeff Rosenthal about something that is believed to hold, and a counterexample th ... Counting Independent Sets Up to the Tree ThresholdWe present a novel tree representation for the hard-core lattice gas model (weighted independent sets) on a general graph. We use this representation to show that for any graph of maximum degree D, th ... Crashing the Gate: Netroots, Grassroots, and the Rise of People-Powered Politics ... Creating Diverse Ensemble Classifiers to Reduce SupervisionFor many predictive modeling tasks, acquiring supervised training data for building accurate classifiers is often difficult or expensive. Training data may either be limited, or often additional data ... Creating the Personal SupercomputerAs computing power has increased so have the complexities of our computer simulations. We’re at a point now where many scientists, engineers, and researchers are hitting the upper limit of their hig ... Culture and Prosperity: The Truth About MarketsWhy does one economy succeed and another fail? Can one nation’s secret to success be exported to another? What causes markets to fuel prosperity in one country, and wreak disaster in another?
Do ... Customizing the Computational Capabilities of ProcessorsConsumers will always demand more performance from their computer systems. Real-time ray tracing and speech recognition are just two of the many compelling applications that remain outside of the comp ... Cyberinfrastructure for E-ScienceNo Description Available ... Cyberinfrastructure for E-ScienceNo Description Available ... Dartmouth Digital DormA new project at Dartmouth College is being developed to take advantage of its unique position as a living lab for advances in mobile computing. Later this year, Dartmouth College will build two large ... Data Abstraction without Control Abstraction in Software Model CheckingData abstraction through predicate abstraction in software model checking requires a theorem proving step to create an abstract version of the program control structure. While this process is effectiv ... Data Harvesting: A Random Coding Approach to Rapid Dissemination and Efficient Storage of DataIn this talk, we will see how Random Linear Coding (RLC) based protocols can provide huge gains in two somewhat related problems in large distributed systems: the problem of disseminating information ... Data Mining & Machine Learning to Empower Business StrategyThis talk will focus on my recent work for the Acquisition and Retention team at MSN, in which we address the business problem of successfully predicting customer behavior far enough ahead that the pr ... Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size DistributionKnowing the distribution of the sizes of traffic flows passing through a network link helps a network operator to characterize network resource usage, infer traffic demands, detect traffic anomalies, ... Data Structure RepairPrograms often make assumptions about the states of the data structures that they manipulate. Errors that cause these data structures to become inconsistent can therefore be especially damaging, since ... Databases in Grid Applications: Locally in DistributionThis talk focuses on two areas that experience in building database-oriented e-science applications has shown to be important. Firstly, methods of promoting data locality are vital due to the high cos ... Dealing with Darwin: How Great Companies Innovate at Every Phase of their EvolutionGeoffrey A. Moore, author of four bestselling business books
March 7, 2006 ... Dealing with Data: Classification, Clustering and RankingThis talk will be focused on the following three pieces of work that we have done: (1) How to utilize unlabeled data in classification? In many real-world machine learning problems, such as web catego ... Debian: Anatomy of an Open Source ProjectThe Debian Project is widely considered one of the most successful and influential open source projects in the world: over 1,000 volunteer programmers are currently involved in Debian development, and ... Decision Procedures for Recursive Data Structures with Integer ArithmeticDecision procedures exists for many specialized logical domains as well as for many data structures frequently appearing in programs. Programs, even very simple kind, however, often involve multiple d ... Declarative Querying of Sensor Networks Through Automatic Service PlanningAs sensor networks become more and more ubiquitous, engineers face the challenge of making the sensor data accessible to the common person. For example, a building manager might want to be alerted to ... Deep Economy: The Wealth of Communities and the Durable FutureFor the first time in human history, "more" is no longer synonymous with "better"-indeed, for many of us, they have become almost opposites. We need to move beyond growth as the paramount economic ide ... Defying Categorization: DXARTSWhat is virtuosity in technology based art? Will advanced emulations make screen based computing obsolete?
Why do we need a PhD in the digital and experimental arts?
Could art be critical for the ... Dense Triangle-Free DigraphsGiven a directed tournament, the condition of being triangle-free (having no directed cycles of length at most three) forces the digraph to be acyclic. What can one say then about triangle-free digrap ... Dependable Messaging in Sensor NetworksThe sensing, computing, communication, and actuation capabilities of wireless sensor networks are increasingly enabling us to observe and control the physical world. Along with opportunities, sensorne ... Deputy: Dependent Types for Safe Systems SoftwareProgramming language tools offer powerful mechanisms for improving the safety and reliability of systems code. This talk presents Deputy, a type system and compiler for enforcing type and memory safet ... Dereverberation Suppression for Improved Speech Recognition and Human PerceptionThe factors that harm the speech recognition results for un-tethered users are the ambient noise and the reverberation. While we have pretty sophisticated noise suppression algorithms, the de-reverber ... Design and development of a content-based music search engineIf you go to Amazon.com or the Apple Itunes store, your ability to search for new music will largely be limited by the `query-by-metadata' paradigm: search by song, artist or album name. However, when ... Designing Ad Auctions: An Algorithmic PerspectiveSearch engines, such as MSN, Google, and Yahoo, have revolutionized the use of the Internet by individuals. Their dramatic revenues are supported by a second revolution: in the way businesses advertis ... Designing Adaptive Embedded SystemsAdaptive System Design
1) Understanding human learning on a complex navigation task,
2) Building models of conflict evolution from events data extracted from wire reports,
3) Building regulatory ce ... Designing and Evaluating Glanceable Peripheral DisplaysMultitasking is an important part of the way we work, but serious problems result from fragmenting our work with constant interruptions and task switches. Imagine an interface that helps you maintain ... Designing Extensible IP Router SoftwareMany problems with today's Internet routing infrastructure slow BGP convergence times exacerbated by timer-based route scanners, the difficulty of evaluating new protocols are not architectural or pro ... Designing InteractionsDigital technology has changed the way we interact with everything from the games we play to the tools we use at work. Bill Moggridge designed the first laptop computer (the GRID Compass, 1981) and ha ... Deterministic Network Coding by Matrix CompletionNetwork coding is a new research area that centers on a fundamental and practical question: How much data can be transmitted through a communication network? Computer scientists have traditionally add ... Developing GEMSTONE, A Next Generation CyberinfrastructureWe are developing an integrated framework for accessing grid resources that supports scientific exploration, workflow capture and replay, and a dynamic services-oriented architecture. The framework, c ... Developing Physically-Based, Dynamic Vocal Tract Models Using ArtiSynthWe describe the process of using ArtiSynth, a 3D biomechanical simulation platform, to build models of the vocal tract and upper airway which are capable of simulating speech sounds. ArtiSynth allows ... Developing the Best Life and Death Solver in GoComputer Go is one of the ultimate challenges for games research. Despite of a lot of efforts for building state of the art programs, Go is still resistant to current AI techniques, even for solving s ... Developmental Programming and Distributed Robot ControlThe Laboratory for Perceptual Robotics at UMass Amherst is studying how sensors and effectors can be recruited into working robot systems using an idea we call the "control basis." This framework prov ... Developments in Dynamic Graph AlgorithmsIn this talk I will survey the latest development in dynamic algorithms for fundamental graph problems, such as shortest paths, reachability and connectivity. In the last five years there were many ST ... Dialogue Session: Worklife Balance and the Retention of TalentCarol Evans will introduce worklife balance and flexible work programs from multiple Fortune 500 companies. She will discuss: best practices and best bets of their programs
- barriers and issues oft ... Digital Simplicity Through Activity-Based ComputingThere are many indicators that people feel technology is speeding up and complicating their lives. In response, many individuals reject certain computing and communications technologies when given the ... Director of MIT's Auto-ID Laboratory and a Professor of Information EngineeringThis talk will focus on the problems of bringing real time visibility to physical objects by using active and passive RFID. The use of RFID technology to track products through the supply chain was pr ... Discovering Heap Anomalies in the WildDespite the best efforts of programmers, programs still ship with bugs. Many of these bugs manifest as anomalies the heap. This talk discusses two low-overhead synergistic techniques for discovering h ... Discriminative Graphical Models for Structured Data PredictionStructured data prediction is the problem of assigning labels (or segmentations) given the observations with particular inherent structures, such as parsing for English sentences or structure predicti ... Discriminative Learning and Spanning Tree Algorithms for Dependency ParsingIn recent years discriminative learning techniques have seen a surge of interest in the NLP community due their ability to tractably incorporate millions of dependent and linguistically rich features. ... Dispersion of Mass and the Complexity of Randomized AlgorithmsHow much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness probably helps, we analyze a notion of dispersion and ... Distinguishing Chambers of the Moment PolytopeI will discuss a problem that lies in the intersection of symplectic geometry and combinatorics. Given a compact symplectic manifold equipped with a Hamiltonian torus action, we can define a convex po ... Distributed Hash Tables for Large-Scale Cooperative ApplicationsDistributed hash tables are a way to organize the storage and network resources of many Internet hosts to create a single storage system. The promise of DHTs lies in their potential to create a distri ... Distributed Implementations of Vickrey-Clarke-Groves MechanismsMechanism design (MD) provides a useful method to implement outcomes with desirable properties in systems with self-interested computational agents. One drawback, however, is that computation is impli ... Distributed Multi-Robot Exploration and MappingEfficient exploration of unknown environments is a fundamental problem in multi-robot coordination. As autonomous exploration and map building becomes increasingly robust on single robots, the next ch ... Distributed Spectrum Access: Protocols and PrototypeIn this two-part talk, we will first present techniques for harnessing unused capacity in wireless networks. The key operating concept is that of connectionless protocols, where nodes do not communica ... Doing a Mao and the Xray Paradox: How Can Humanity Overcome Organization?In 2002 Max McKeown discussed, at Microsoft, ?Why the World Hates Microsoft and Why We Should Care? and in 2004 he explored ways in which ?Indifference is Death? to innovation and performance. This ti ... DopplerSource: .NET Framework for Accessing Doppler Radar Data ... DRM and MSFT: A Product No Customer WantsMSFT kicked ass by being unafraid to clobber IBM's business model with MSDOS. Now it stands astride the globe like a titan, laughing the face of the world's roughest, toughest antitrust regulators. Wh ... DTN Routing and Capacity Enhancement in an Outdoor Mobile EnvironmentDelay-Tolerant Networks (DTNs) enable routing when mobile nodes are sparsely populated and connect only intermittently. These include networks that attempt to survive large-scale natural disasters, se ... Dynamic Algebraic AlgorithmsThe algebraic methods had turned out to be very useful in many graph applications, starting from transitive closure computations and ending on counting perfect matchings. The constructed algorithms us ... Dynamic Inference of Abstract TypesAn abstract type groups variables that are used for related purposes in a program. We describe a dynamic unification-based analysis for inferring abstract types. Initially, each run-time value gets a ... Dynamic Languages for .NET ... Dynamic Mechanism DesignI will consider the design of efficient and profit-maximizing Bayesian incentive-compatible mechanisms for general dynamic environments with private information. In the environment, agents observe a s ... Dynamic Point Samples for Free-Viewpoint VideoIn free-viewpoint video (FVV), multiple video streams are used to re-render a time-varying scene from arbitrary viewpoints. Free navigation with respect to time and space in streams of visual data mig ... Dynamic Semantics of Programming Languages and Applications to TestingIn my talk I will report on the work in progress. The initial idea of the project was to test available compilers of C-like languages. Our plan is the following:
1. Choose a reasonable subset of t ... Dynamics and Equilibria: Communication Complexity and Adaptive HeuristicsPart 1: "The Communication Complexity of Uncoupled Nash Equilibrium Procedures", by Sergiu Hart and Yishay Mansour
http://www.ma.huji.ac.il/hart/abs/comcom.html
We study the question of how long ... Dynamics, Emergence and SimulationAchieving complex results through engineering simplicity. ... Dynamosaics: Dynamic Mosaics with Non-Chronological TimeWith the limited field of view of human vision, our perception of most scenes is built over time while our eyes are scanning the scenes. In the case of static scenes this process can be modeled by pan ... Edgenet 2006 - A Data Model for PolicyPolicy is the foundation for self-managing systems, IT control and governance/compliance monitoring. How do we design a policy language, or policy schema, that is rich enough to be useful but simple e ... Edgenet 2006 - Customer Insight: CSO's Perspective on Network PoliciesEdgenet 2006 - Customer Insight: CSO's Perspective on Network Policies ... Edgenet 2006 - Experimental Design for Flexible Network DiagnosisThis summit brings together experts in academia and industry to discuss the problems facing the designers and managers of enterprise networks. Also, for the first time, we will sponsor a number of gra ... Edgenet 2006 - Is An Office Without Wires Feasible?A wireless office is an office without wired Ethernet connectivity, or rather, one with the least number of machines connected by wires. What happens if we re-design the network in an office ? remove ... Edgenet 2006 - Issues in Enterprise NetworksOperator View Points - discussion of enterprise/campus networks from the people that run them. ... Edgenet 2006 - Keynote - Model-Based Management of Distributed ServicesTraditional systems management has not been successful, and with ever-increasing scale, complexity and agility the problem keeps getting worse. The central problem is a lack of knowledge of the manage ... Edgenet 2006 - Managing Corporate WiFi Networks Using DAIRWe present a framework for monitoring and managing enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios.
Pr ... Edgenet 2006 - Measuring and Monitoring Microsoft's Enterprise NetworkIn this talk I will describe some recent work at MSR Cambridge to measure Microsoft's enterprise network as seen from our site. I will describe our collection method, the problems we faced, and the so ... Edgenet 2006 - New Directions in Enterprise Network ManagementIn this talk, we will review current and past techniques for managing and trouble-shooting enterprise networks, and their drawbacks and limitations. Furthermore, we will review initial ideas for an al ... Edgenet 2006 - Problems and Solutions in Enterprise Network ControlEnterprise networks today are fundamentally complex, as they bring together a heterogeneous collection of hosts and network devices, ranging from security cameras, to Ethernet switches, to IP routers, ... Edgenet 2006 - The Case for Comprehensive DiagnosticsThe Internet has achieved great creative success, opening our eyes to radically new communication capabilities and distributed control opportunities. Yet for all the critical and commercial success of ... Edgenet 2006 - The Protection Problem in Enterprise NetworksAttempts to retrofit access controls into enterprise networks have met with varied success. Often doing so has a deleterious effect, resulting in complex, brittle networks that are engineered around c ... Edgenet 2006 - Virtual LAN as a Network Control MechanismModern Ethernet switches, even low-end ones, come with various advanced features such as IGMP snooping, VLAN, class-based traffic prioritization, host access control, etc. Most of these features can b ... Edgenet 2006 - Wireless Network Measurement ChallengesWireless networks, including Wi-Fi infrastructure and mesh networks, are becoming ubiquitous. It is critical to measure these networks to gain a better understanding of the traffic on the networks, th ... Education for a Brighter FutureMany students from developing countries dream about working for a place like Microsoft. Unfortunately, even basic education can be hard to attain when families are in poverty. Vietnam is one place whe ... Effective and Efficient User Interaction for Long QueriesThe queries that users pose to web search engines range from two to four terms in length. Much effort has been spent on handling these queries, with considerable success. Apart from advances in retrie ... Effective Scientific Data Management through Provenance CollectionScience has evolved over the past several decades, from an empirical and theoretical approach to one that includes computational simulations and modeling. Scientific discoveries are increasingly prope ... Effective Static Race Detection for JavaConcurrent programs are notoriously difficult to write and debug, a problem that is becoming acute as concurrency becomes more common. A fundamental and particularly insidious concurrency bug is a rac ... Effective Use of Microsoft Word for Academic WritingMillions of academic writers worldwide struggle with typesetting of their documents every day. Hundreds of methods, tricks, and practices evolve in different research groups. Two of the most popular t ... Efficient Actions in Dynamic Auction EnvironmentWe model an environment, where bidders private values may change over time as a result of both costly private actions and exogenous shocks. Examples of private actions include investment and entry dec ... Efficient and Robust Routing in the Presence of Computing InterestsA fundamental characteristic of many networks is that they are controlled by independent parties. These parties must cooperate to provide global connectivity even though they often have competing inte ... Efficient Data Dissemination in Bandwidth-Asymmetric P2P NetworksAs broadband Internet becomes widely available, Peer-to-Peer (P2P) applications over the Internet become increasingly popular. One example of P2P applications, is video multicast in which, a source no ... Einstein: His Life and UniverseAlbert Einstein is a great icon of our age: the kindly refugee from oppression whose wild halo of hair, twinkling eyes, engaging humanity, and extraordinary brilliance made his face a symbol and his n ... Einstein: His Life and UniverseAlbert Einstein is a great icon of our age: the kindly refugee from oppression whose wild halo of hair, twinkling eyes, engaging humanity, and extraordinary brilliance made his face a symbol and his n ... Elliptic Nets with Applications to CryptographyAn elliptic divisibility sequence is an integer recurrence sequence related to the multiples of a rational point on an elliptic curve. We generalise this definition to higher dimensions: an elliptic n ... Email Activity Management: A Machine Learning ApproachOur use of ordinary desktop applications is often a manifestation of the activities with which we are engaged. Planning a conference trip involves visits to airline and hotel sites, travel expense for ... Embedded Formal Verification Assistants in the .NET Framework ... Embedded Networked Sensing Redux ... Emotion Recognition in Speech Signal: Experimental Study, Development and ApplicationsIn this talk I will overview my research on emotion expression and emotion recognition in speech signal and its applications. Two proprietary databases of emotional utterances were used in this resear ... Empirical Evaluation of Agile Software Development Processes: Industrial Case StudiesWith the recent emergence of agile software development technologies like XP, many organizations, small and large, have adopted XP or a subset of its practices. This talk describes the empirical evalu ... Enabling Internet Malware Investigation and Defense Using VirtualizationInternet malware remains a top threat to the Internet today, as clearly demonstrated by the recent large-scale Internet worm outbreaks (e.g., the MSBlaster worm in 2003 and the Sasser worm in 2004). M ... Enabling NASA's New Vision for Space Exploration through Human-Centered Intelligent SystemsOver the past few months, NASA has been in the news numerous times both for the exciting discoveries of the pair of Mars Rovers as well as the country's Vision for Space Exploration. This vision focus ... Enabling What-If Explorations in Distributed SystemsWith a large percentage of total system cost going to system administration tasks, self-management remains a difficult and important goal in systems. As a step towards the self-management vision, I wi ... End-User Control in the Smart HomeIn recent years, there has been a lot of interest in applying ubiquitous computing technology in the home, looking at improving the lives of the home occupants. While most of this smart home research ... Ender?s Game for Science and Engineering: Games for Real, for Now, or we Lose the Brain WarThe U.S. is currently in a global competition for science and engineering talent. Only a small fraction of our populace pursues careers as scientists or engineers, in direct contrast with emerging cou ... Energy and Bandwidth Efficiency in Wireless NetworksIn this talk we consider the bandwidth efficiency and energy efficiency of wireless ad hoc networks. Energy consumption of the receiver necessary to process each coded bit is considered as well as the ... Engineering Performance Using Control Theory: A One Day How-To: Introduction and Theory Part 19:00-9:45 - Introduction: Control system architecture, goals, and metrics. 9:45-10:15 - Theory Part 1: Signals, Z-Transforms ... Engineering Performance Using Control Theory: A One Day How-To: Theory Part 2Transfer functions, Analyzing composed systems, Q&A / Buffer. ... Enhancing Security of Real-World Systems with a Better Understanding of the ThreatsSecurity is always a battle between attackers and defenders. Understanding the adversaries and threats is a crucial effort in building secure systems. My thesis research focuses on analyzing, modeling ... Enhancing Text Representation Through Knowledge-Based Feature GenerationImagine an automatic news filtering system that tracks company news. Given the news item 'FDA approves ciprofloxacin for victims of anthrax inhalation', how can the system know that the drug mentioned ... Enhancing the Markov Chain Monte Carlo MethodThe Markov Chain Monte Carlo method is arguably the most powerful algorithmic tool available for approximate counting problems. Most known algorithms for such problems follow the paradigm of defining ... Entanglement Entropy in Extended Systems ... Environmental Science from SatellitesImagery from Earth-orbiting satellites provides a rich but voluminous source of raw data for scientific investigation of environmental processes and trends. Analyses of the data are, however, generall ... Environmental Science from SatellitesImagery from Earth-orbiting satellites provides a rich but voluminous source of raw data for scientific investigation of environmental processes and trends. Analyses of the data are, however, generall ... Environmentally Immersive Programming ... EnviroSuite: An Environmentally-Immersive Programming Framework for Sensor NetworksThis talk describes EnviroSuite: a sensor-network programming framework that introduces a new paradigm, called environmentally-immersive programming (EIP), to significantly simplify the development of ... Error Detection Using Shape Analysis with Local ReasoningShape analyses are static analyses aimed at extracting invariants that describe the 'shapes' of dynamically allocated recursive structures. Although existing shape analyses have been successful at ver ... eScience - The Revolution is StartingNo Description Available ... eScience Workshop 2005 - Welcome ... Estimating Geometric Scene Context from a Single ImageHumans have an amazing ability to instantly grasp the overall 3D structure of a scene -- ground orientation, relative positions of major landmarks, etc -- even from a single image. This ability is com ... Ethane: A Protection Architecture for Enterprise NetworksConnectivity in enterprise networks is provided by technologies not designed to offer protection. As a response to growing security demands, network designers have attempted to retrofit access control ... Evaluating Retrieval System EffectivenessOne of the primary motivations for the Text REtrieval Conference (TREC) was to standardize retrieval system evaluation. While the Cranfield paradigm of using test collections to compare system output ... Event-Driven Simultaneous CompilationThe coming wave of multi-core, multithreaded processors will create a parallelism crisis. That is, the performance potential of these processors will only be realized when we can find sufficient threa ... Everything Bad is Good for You: How Today's Popular Culture is Actually Making Us SmarterThe $10 billion video gaming industry is now the second-largest segment of the entertainment industry in the United States, outstripping film and far surpassing books. Reality television shows featuri ... Everything is Miscellaneous: The Power of the New Digital DisorderHuman beings are information carnivores: we are constantly collecting, labeling, and organizing data-yet our previous "systems" cannot keep up with the levels of information we now receive. The Dewey ... Evolutionarily Stable Strategies of Random Games, and the Vertices of Random PolygonsAn evolutionarily stable strategy (ESS) is an equilibrium strategy that is immune to invasions by rare alternative ("mutant") strategies. Unlike Nash equilibria, ESS do not always exist in finite game ... Exact 2-CSP Optimization Using Matrix MultiplicationWe investigate the complexity of exactly solving NP-hard optimization problems involving at most two variables per constraint, such as MAX-CUT, MAX-2-SAT, and MIN-BISECTION. For years it was not known ... Examining Representation, Classification, and Personalization Using a Unified FrameworkInformation retrieval and filtering (IRF) in dynamic environments such as the WWW poses many challenges. At the root of the challenges lie the twin factors of data diversity and data evolution. These ... Exceptional Situations and Program ReliabilitySoftware quality and reliability are increasingly important, but software remains buggy. Static analyses can find bugs before a product ships, but I believe they are only one stage in a larger process ... Exceptions and side-effects in atomic blocksIn recent work we've been looking at the design and implementation of a new 'atomic' keyword as an extension to the Java programming language. It allows programmers to perform a series of heap accesse ... Exhaustive Phase Order Search Space Exploration and EvaluationChoosing the most appropriate optimization phase ordering has been a long standing problem in compiler optimizations. For most applications or functions different orders of applying optimization phase ... Exiting the Cleanroom: On Ecological Validity and Ubiquitous ComputingOver the past decade and a half, considerable time and money has been invested in the realization of ubiquitous computing. Yet iterative design is still difficult and rare, which limits the speed with ... Explicit-Symbolic Modeling for Formal VerificationIn this talk we present a model that combines explicit and symbolic representations in an explicit-symbolic model checking tool. Both explicit and symbolic models have been successfully used in the ve ... Exploiting Comparable CorporaOne of the major bottlenecks in the development of Statistical Machine Translation systems for most language pairs is the lack of bilingual parallel training data. Currently available parallel corpora ... Exploiting Hardware/Software Interactions for Embedded Systems DesignEmbedded systems are often subject to real-time constraints. Such systems require determinism to ensure that task deadlines are met. Schedulability analysis provides a firm basis to ensure that tasks ... Exploiting Multiple Cores Today: Scalability and Reliability For Off-the-Shelf SoftwareMultiple core CPUs are here and will soon be ubiquitous. The prevailing notion is that we need to rewrite applications not originally designed to support multiple processors to make them multithreaded ... Exploiting Redundancy for Robust SensingOver the last few years, we have seen a number of real-world systems using live data from sensors (e.g., sensor motes and webcams). A crucial requirement of these systems is high availability. However ... Exploiting the Transients of Adaptation for RoQ Attacks on Internet ResourcesIn this work, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated ... Exploring Mars by 4-Wheel DriveThe Mars Exploration Rovers are searching for answers about the history of water on Mars. Finding those answers will help scientists determine if life ever was on the Red Planet. The rovers, which lan ... Exploring Mars by 4-Wheel DriveThe Mars Exploration Rovers are searching for answers about the history of water on Mars. Finding those answers will help scientists determine if life ever was on the Red Planet. The rovers, which lan ... Exploring the Social Institutional Dimensions of MoSoSo Design ... Exposing the National Water Information System to GIS through Web ServicesThe National Water Information System (NWIS) is a hydrology data repository with stream flow, water quality, and groundwater observations maintained by the United States Geological Survey (USGS). The ... Expressive Speech-Driven Facial AnimationComputer graphics and animation is a very broad and multidisciplinary area of research. It serves as a visual tool for other areas of research, such as entertainment, scientific visualization and medi ... ExScal: Elements of an Extreme Scale Wireless Sensor NetworkProject ExScal fielded a 1000+ node wireless sensor network and a 200+ node peer-to-peer ad hoc network of 802.11 devices in a 1.3km by 300m remote area in Florida, USA during December 2004. In compar ... Extending Rotor with Structural Reflection to Support Reflective Languages ... Extending the Internet Architecture to Sensor Networks: Some Open QuestionsNo Description Available ... Extensible Object-Theories in HOL-OCLspecification and programming languages. The package incrementally compiles an object-oriented data model to a theory containing object-universes, constructors, and accessors functions, coercions betw ... Externalities in Online AdvertisingMost models for online advertising assume that each ad has an inherent clickthrough-rate/conversion-rate, regardless of other ads served in the same session. This ignores an important externality effe ... Extracting Product Features and Opinions from ReviewsConsumers are often forced to wade through many on-line reviews in order to make an informed product choice. This paper introduces OPINE, an unsupervised information-extraction system which mines revi ... Extractors for a Constant Number of Polynomially Small Min-Entropy Independent Sourcesdeterministically extract high quality randomness from several independent sources of low quality randomness.
We construct an extractor that can extract from a constant (c) number of independent s ... Extremal Set Theory, Boolean Functions, and Occam's RazorExtremal set theory deals with families of sets given some conditions on their intersections. In this talk we'll see how casting these questions in the setting of the discrete cube {0,1}^n enables us ... Face Recognition: Opportunities and ChallengesHuman face recognition is a challenging biometric information processing task that has attracted much attention recently. The facial image of the same person varies with age, pose, lighting, facial ex ... Fast Belief Propagation for Early VisionMarkov random field (MRF) models provide a robust and unified framework for early vision problems such as stereo, optical flow and image restoration. Inference algorithms based on graph cuts and belie ... Fast Database and Data Streaming Operations Using Graphics ProcessorsWe present novel techniques to utilize the high computational power of graphics processing units (GPUs) to significantly accelerate many of the traditional general purpose algorithms on CPUs. As graph ... Fast Infinite-State Model Checking in Integer-Based SystemsIn this talk we discuss the use of logic for reachability analysis for infinite-state systems. Infinite-state systems are formalised using transition systems over a first-order structure. We establish ... Faster Decoding with Synchronous Grammars and n-gram Language ModelsFaster Decoding with Synchronous Grammars and n-gram Language Models (and how these techniques can be applied back to parsing) Joint work with David Chiang (USC/ISI). A major obstacle in syntax-based ... Feature Selection through LassoInformation technology advances are making data collection possible in most if not all fields of science and engineering and beyond. Statistics as a scientific discipline is challenged and enriched by ... Feedback Arc Sets and Girth in DigraphsGiven a directed graph G with girth at least m+1 (and no parallel edges), let b(G) denote the size of the smallest subset X of the edges of G so that G \ X has no directed cycles, and let c(G) be the ... Fitting a C^M Smooth Function to DataFix m,n positive integers. Problem: Compute efficiently a C^m function F on R^n, whose graph passes through (or close to) finitely many given points in R^(n+1), with the C^m norm of F (nearly) as smal ... Fixing the String Kernel - A Semi-Definite Programming ApproachKernel-based learning methods revolve around the notion of a Gram matrix between data points. These square, symmetric, positive semi-definite matrices can informally be regarded as encoding pairwise s ... Flexible Dynamic Linking for .NET ... Flow Control in Wireless NetworksFlow control, including congestion control for data and rate control for multimedia, is an important issue for information transmission in wireless networks.
In this talk, we proposed a solution f ... Folklore of Network Protocol Design (Anita Borg Lecture)It's natural to assume that network protocol design is a well-known science, where the designers of today's standards take care to understand the tricks and pitfalls learned from previous protocols. T ... Formal Commercial ContractsThe presentation consists of three parts: First, we briefly consider the problems faced by enterprises in handling commercial contracts today, then we present a foundational enterprise model, the Reso ... Fostering Open Source Social MomentsNo Description Available ... Fountain Codes over Arbitrary Channels and Threshold PhenomenaGiven a vector of k input symbols, a fountain code produces a potentially limitless stream of output symbols, each generated independently and at random. These codes have applications in scalable data ... Framework for Domain-Specific Optimization at RuntimeNo Description Available ... FreeSoDA ... Friendly Virtual Machines: Leveraging a Feedback-Control Model for Application AdaptationWith the increased use of 'Virtual Machines' (VMs) as vehicles that isolate applications running on the same host, it is necessary to devise techniques that enable multiple VMs to share underlying res ... From Dust to Doctors: Wireless Sensor Networks for Medical ApplicationsWireless sensor network research is being performed to address medical applications. In particular, a common vision found in the research arena is to provide sensing and wireless communication for ass ... From Dust to Doctors: Wireless Sensor Networks for Medical ApplicationsWireless sensor network research is being performed to address medical applications. In particular, a common vision found in the research arena is to provide sensing and wireless communication for ass ... From Local to Global Visual Similarity in Space and in TimeAnalysis and detection of objects in images or actions in video sequences require a complex notion of similarity across visual data. Existing approaches are often based on extracting informative param ... From Models to Systems: Applications of Model-based Design to Modern Large-Scale SystemsModern large-scale system design poses a unique challenge to traditional software methodologies. These systems have complex functional and non-functional requirements along many interacting axes: arch ... From Promoter to Expression - A Probabilistic Framework for Inferring Regulatory MechanismsInferring regulatory mechanisms based on in silico analysis of regulatory elements has been the target of much research efforts in recent years. Specific aims include identifying combinatorial interac ... From Sensors to Semantics: Intelligent Context for Situated ComputingThe multiplication of computing devices with which a person in the developed world interacts has grown rapidly. From laptops and mobile phones to automobiles and urban infrastructure, bits are being c ... From TimeSync to EmStar: What's Really Hard in Sensor Networks?Recent advances in miniaturization and low-cost, low-power design have led to active research in large-scale networks of small, wireless, low-power sensors and actuators. Sensor networks have enormous ... From Wayback Machine to Weblab: New Opportunities for Social ResearchThe Cornell project is creating tools for research on social and information networks based on a largely untapped dataset: the Internet Archive's 40-billion page collection of Web pages. These snapsho ... Fusion of Optical and Radio Frequency Techniques: Cameras, Projectors and Wireless TagsUsing a combination of techniques in optical and radio frequency domains, one can significantly improve the functionality of cameras for sensing, projectors for augmentation and RFIDs for location sen ... Future Hype: The Myths of Technology ChangeThe PC and Internet are not that big a deal. The truth is that a new technology is not inevitable, technology change is not exponential, and the PC and Internet are no more important to society than ... G2 Microsystems Presents to MicrosoftThere has been significant activity on the application of wireless technologies to solve asset management problems across a number of industries. Research analysts indicate that wireless sensors, real ... Gadgets for Good: How Computer Researchers Can Help Save Lives in Poor CountriesThe widening economic gap between countries is paralleled by disparities in health outcomes. A stark example is that the life expectancy from birth is estimated to be 46 years in Sub-Saharan Africa co ... Games@MSR - The Pleasures of Virtual/Fantasy Warfare: Learning from Counter-StrikeThe social activity which surrounds the playing of MMO types games, like Ultima Online, Asheron?s Call or EverQuest, or first person shooter games, like Counter-Strike or Battlefield 2 has been well e ... Garbage Collection without PagingGarbage collection offers numerous software engineering advantages, but interacts poorly with virtual memory managers. Existing garbage collectors require far more pages than the application's working ... Garbage-First Garbage Collection (and a Related Compiler Optimization)Garbage-First is a server-style garbage collector, targeted for multi-processors with large memories, that meets a 'soft real-time goal' with high probability, while achieving high throughput. Whole-h ... Gardens Point Generics (GPG) ... GCspy for Rotor ... Generalized Algebraic Data Types and All ThatGeneralized algebraic data types (GADTs) extend algebraic data types by a form of type refinement connected to pattern matchings. There are numerous useful examples which exploit this feature such as ... Generating Parallel Transforms Using SpiralSpiral (www.spiral.net) is a program generation system for linear transforms such as the discrete Fourier transform, discrete cosine transforms, filters, and others. For a user-selected transform, Spi ... Generation of dense linear algebra software for shared memory and multicore architecturesWhen writing scientific computing software, programmers often need to identify which algorithm would perform best in a given situation. In dense linear algebra, the answer depends on a large number of ... Generative Models of DiscourseDiscourse is the study of how the meaning of a document is built out the meanings of its sentences. As such it is the inter-sentential analogue of semantics. In this talk we consider the following abs ... Generic Entity ResolutionEntity resolution (ER) is a problem that arises in many information integration scenarios: We have two or more sources containing records on the same set of real-world entities (e.g., customers). Howe ... Generic Programming in the Parallel Boost Graph LibraryWe present a library of generic software components for parallel and distributed computations on graphs, based on the Boost Graph Library (BGL). The BGL consists of a rich set of generic graph algorit ... Geometric Optics, Duality and Congestion in SensornetsWhen many sensors, spread over an area, communicate by shortest-path, straight-line routing, those who are centrally located are overburdened by communication overhead; this is known as the "busy cent ... Geometry and Expansion: A Survey of Recent ResultsPartitioning a graph into two (or more) large pieces while minimizing the size of the “interface” between them is a fundamental combinatorial problem. Graph partitions or separators are central ob ... Getting Started in PodcastingIf you're ready to start a podcast to promote your product or technology, you'll want to come and meet Jake Luddington, author of the Podcasting Starter Kit, as he walks you through how to get started ... Gibbs Measures on Trees and Random GraphsUnderstanding Gibbs measures on trees and their spatial mixing thresholds (uniqueness, strong spatial mixing, reconstruction) can give insight into the behavior of Gibbs measures on general graphs, in ... Giving Campaign Lunch: Woodland Park ZooLisa Dabek, Paul Balle, Monica Lake, Karen Ofsthus
October 23, 2007 ... Graph Cuts without EigenvectorsGraph clustering---clustering the nodes of a graph---is a fundamental problem arising in many machine learning and data mining applications. The last few years have seen a surge of interest in spectra ... Graph Powers and CapacitiesThe Shannon capacity of a channel, and its corresponding characteristic graph, is a well-studied parameter, with applications in Theoretical Computer Science, Information Theory and Combinatorics.
... Grid Computing Using .NETThe broad goal of our WSRF.NET project at the University of Virginia is to facilitate Grid computing on the .NET platform. In this talk, we give an update on our progress in exploiting and extending t ... Group Forming and Grassroots Organizing TechnologyThe internet enables radically more effective means of bottom up grassroots organizing. The Dean Campaign and MoveOn are early examples of what is possible when citizens are empowered through web-tech ... Gumstix: It's A Small Yet Fully Functional ComputerWhy small computers? What are the trends? How well are they doing? Marketing VP and serial startup entrepreneur Don Anderson will tell us the Gumstix story. Gumstix, Inc. (http://www.gumstix.com/) is ... Hardware-Software Co-Design for General-Purpose ProcessorsThe shift toward multi-core processors is the most obvious implication of a greater trend toward efficient computing. In the past, hardware designers were willing to spend superlinear area and power f ... Havoc on Ntfs'Brian will talk about his experience this summer developing and using the Havoc annotation-based tool to target resource leaks, data races and teardown races in the Ntfs code base, finding ~50 potenti ... Headwinds and Tailwinds: Where is the U.S. Economy Going?Is productivity growth a tailwind or a headwind? What are the dominant forces likely to affect economic prospects in the short run? How dangerous are the twin deficits—the budget and trade deficits ... Heap assertions on demandSystems code is prone to termination errors. Inferring preconditions excluding such errors is both tedious and hard. This is true in particular for heap manipulating functions. Both, a precondition an ... Hierarchical Phrase-Based Translation with Suffix Arrays.A major engineering challenge in statistical machine translation systems is the efficient representation of extremely large translation rulesets. In phrase-based models, this problem can be addressed ... High Fidelity Image-Based ModelingThis talk addresses a novel multi-view stereo algorithm that takes a set of calibrated photographs and outputs a (quasi) dense set of rectangular patches covering the surfaces of an object or a scene ... How does the ASTREE analyzer deal with digital filters?The ASTREE analyzer is an abstract interpretation-based static analyzer tailored to prove the absence of run time errors (division by 0, out of bounds, overflow, null pointer dereference, ...) in crit ... How Helpful is Network Coding?With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding i ... How Likely is Buffon's Needle to Meet a Cantor Square?Let C_n be the n?th generation in the construction of the middle-half Cantor set. The Cartesian square K_n of C_n consists of 4^n squares of side-length 1/(4^n). The chance that a long needle thrown a ... How Low Can Safe Languages Go?Safe languages try to increase software reliability and security by checking for errors at compile time and run time. For example, Java and C# check types (mostly at compile time) and check array boun ... How to Disembed a ProgramThis paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (XmP). Unlike a smart-card, the XmP contains no ROM at all. While exporting all the device's ... How to Give a Great Research TalkWe’ve all heard lots of research talks, some good and some bad. While it helps to have good research to present, even good research can be presented badly. The ability to effectively present your re ... How to make Discretionary Access Control Resistant to Trojan HorsesModern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandatory Access Control (MA ... How to Make Love the Bruce Campbell Way ... How to Make Love the Bruce Campbell Way ... How to Survive a Robot Uprising: Tips to Defend Yourself Against the Coming RebellionDo scenarios of robots malfunctioning, rebelling, or escaping from top secret labs strike fear into your heart? Dangerous robots come in many forms: from tiny insects to giant walking droids. Daniel H ... Human ComputationTasks like image recognition are trivial for humans, but continue to challenge even the most sophisticated computer programs. This talk introduces a paradigm for utilizing human processing power to so ... Human Detection and Pose from Images and VideosJoint work with Navneet Dalal and Ankur Agarwal.
I'll give an overview of some of our work on human detection and human motion estimation. Regarding human detection, we have developed several feat ... Human-Level Performance on Word Analogy Questions by Latent Relational AnalysisThis talk introduces Latent Relational Analysis (LRA), a method for measuring relational similarity. LRA has potential applications in many areas, including information extraction, word sense disambig ... Identifying Similar Past Events in a Continuous Monitoring SystemStream processing engines (SPEs) are a new type of data management systems that provide continuous, low latency processing of data streams. These tools are useful in many application domains including ... Imitating the Immune SystemAt CBS, we have during the recent years developed a number of web tools to be used in immunological research. These tools are all linked at http://www.cbs.dtu.dk/services and include a predictor of pr ... Imitating the Immune SystemAt CBS, we have during the recent years developed a number of web tools to be used in immunological research. These tools are all linked at http://www.cbs.dtu.dk/services and include a predictor of pr ... Impala: A Middleware System for Managing Autonomic, Mobile, Wireless Sensor NetworksSensor networks are computer systems with many sensing/compute nodes working to gather information about their environment, process and fuse that information, and in some cases, actuate control mechan ... Implementation of a Non-Strict Functional Language on Rotor ... Improved Gapped Alignment in BLAST Genomic SearchHomology search is a key tool for understanding the role, structure, and biochemical function of genomic sequences. BLAST is the most popular homology search tool and is used to run millions of querie ... Improving Packet Delivery Efficiency Using Multi-Radio Diversity in Wireless LANsData transmissions in Wireless Local Area Networks (WLANs) often suffer from corruptions that arise from the notoriously complex and time-varying signal propagation characteristics of the wireless med ... Improving Rotor for Dynamically Typed LanguagesNo Description Available ... Improving Routing Scalability Through Mobile Geographic Hashing MANETsMobile wireless ad hoc networks (MANETs) have important applications including military command and control, collaborative and distributed computing, emergency services and sensing networks. Scalable ... Improving Software Security with Precise Static and Runtime AnalysisThe landscape of security vulnerabilities has changes dramatically in the last several years. As Web-based applications become more prominent, familiar buffer overruns are far outnumbered by Web appli ... Improving the Reliability of Commodity Operating SystemsDespite decades of research in fault tolerance, commodity operating systems, such as Windows and Linux, continue to crash. In this talk, I will describe a new reliability subsystem for operating syste ... Incorporating Trust into Web Authority#Error ... Increasing Concurrency using EDGE ArchitecturesFor the past 15 years microprocessor performance has largely been driven by improvements in clock frequency, which has doubled every two years. However, due to microarchitectural pipelining limits and ... India's Emerging CompetitivenessGurcharan Das, former CEO of Procter & Gamble India, is a renowned columnist, novelist, playwright, and management consultant. He is the author of numerous books, including the international bestselle ... India's Emerging CompetitivenessGurcharan Das, former CEO of Procter & Gamble India, is a renowned columnist, novelist, playwright, and management consultant. He is the author of numerous books, including the international bestselle ... Indifference is Death: Responsibility, Leadership, & InnovationIntel’s employees are getting bored (Andy Grove just said so) and that boredom has led to missed deadlines, reduced innovation, and poor quality. With indifference comes a casual lack of concern for ... Inferring Class Invariants in Object-Oriented Languages Via Abstract InterpretationIn this talk we present a static analysis, based on abstract interpretation, for the automatic inference of class invariants in Object-oriented languages. Intuitively, a class invariant is a property ... Inferring Information Status for Reference Generation in Open DomainsMulti-document summarization involves heavy information compression. Important events need to be summarized, while at the same time, the protagonists need to be described in sufficient detail that the ... Information Interfaces: Blending Information Visualization and Human-Computer InteractionOver the past ten years, the Internet and the WWW have expanded our access to an incredible amount of information. While there can be a tremendous benefit in this, too often people are overwhelmed by ... Information Wants to be Free (but is Everywhere in Chains)Half of my title comes of course from Stewart Brand; the other half from Rousseau. I argue that it is an inescapable ontological property of information that it can escape from scarcity, that it calls ... Integrating Haskell with .NET Using RotorNo Description Available ... Integrating OLAP and Ranking: The Ranking-Cube MethodologyRecent years have witnessed an enormous growth of data in business, industry, and Web applications. Database search often returns a large collection of results, which poses challenges to both efficien ... Integration and Visualization in BioInformaticsOne of the greatest benefits of escience, the use of distributed computing and data resources for scientific discovery, is the opportunity for scientists to begin working with data sets that would hav ... Interaction Design for One-Handed Use of Mobile DevicesNo Description Available ... Interaction Design Projects for Health and WellnessCome see six interaction design project in the area of Health and Wellness. This year the University of Washington's graduate Interaction Design Studio is participating in the Microsoft's Design Expo ... Interactive Machine Learning: Leveraging Human IntelligenceAdvances in processor speed and in machine learning algorithms have brought machine learning within the interactive time scale. It is now possible on many problems for a user to annotate data, train a ... Interfaces for Staying in the FlowThe common notion of 'staying in the flow' implies the ability to concentrate on a task, being immersed and engaged to the point where the perception of time slows. An artist, athlete or reader might ... Interfaces That Influence GroupsCollaborating groups have enormous potential to produce higher quality output than individuals working alone, due to the pooling of resources, information, and skills. Yet social psychologists have de ... Internet Background RadiationMonitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses---thus we term the traffic ``background radiation.'' B ... Interruptions on Software Teams: A Comparison of Paired and Solo ProgrammersThis study explores interruption patterns among software developers who program in pairs versus those who program solo. Ethnographic observations indicate that interruption length, content, type, occu ... Inventing Virtual Reading Teachers and Virtual Speech TherapistsAdvances in computing and interface technologies have made possible the development of a new generation of human computer interfaces that enable natural face to face conversational interaction with vi ... Inversion Transduction Grammar with Linguistic ConstraintsBilingual word alignment, the task of finding word-to-word connections between a sentence and its translation, is an important part of knowledge acquisition for statistical machine translation. An Inv ... IP Network Traffic Matrix Inference and Anomaly DetectionI will describe progress in IP network traffic matrix inference, arguably one of the most important technical problems in the engineering and management of large-scale IP networks. In particular, I wi ... Is Linux Maintainable?We present the results of four research projects in empirical open-source software engineering.
First, we describe a longitudinal study of 365 versions of Linux. The number of instances of common ... JET: Join-Exit Tree for Time Efficient Contributory Group Key ManagementIn secure group communications, the time cost associated with key updates for member join and departure is an important aspect of quality of service, especially in large groups with highly dynamic mem ... Juicing the Orange: How to Turn Creativity into a Powerful Competitive AdvantageToo many companies think creativity means throwing money into marketing efforts and giving lip service to "out of the box" thinking. But such efforts rarely have a positive impact on the bottom line. ... Keynote: From Smart Dust to Reliable NetworksNo Description Available ... Kneser-Ney smoothing with a correcting function for small data setsWe present a technique which improves the Kneser- Ney smoothing algorithm on small data sets for bigrams and we develop a numerical algorithm which computes the parameters for the heuristic formula wi ... Laboratory for Recognition and Organization of SpeechThe Laboratory for Recognition and Organization of Speech and Audio investigates novel applications of signal processing and machine learning to extract information from audio signals including speech ... Lambda Legal: Making the Case for EqualityCivil rights activist Kevin Cathcart, Executive Director of Lambda Legal, will provide historical overview of the Lesbian, Gay, Bisexual and Transgender (LGBT) issues that are now center stage in the ... Lambda Table: High Resolution Tiled Display Table for Interacting with Large VisualizationsNo Description Available ... Language Search Engines and Machine Translation: Making MT and Human Translators SmarterTim Hunt and Aaron Davis of Lingotek will lecture on the use of Language Search Engines as a platform for improving both human translation and machine translation. They will demonstrate a language sea ... Large Margin Generative ModelsGenerative models such as Bayesian networks, exponential family distributions and mixtures are elegant formalisms to setup and specify prior knowledge about a learning problem. However, the standard s ... Large-scale 3D Reconstruction from VideoThis talk examines methods for estimating scene structure and camera motion from very long video sequences. We propose a novel method for incrementally augmenting a reconstruction as new images or mea ... Lattice-Based Discriminative Training: Theory and PracticeLattice-based discriminative training techniques such as MMI and MPE have been increasingly widely used in recent years. I will review these model based discriminative training technique and also the ... Learning and Inferring Transportation RoutinesI will give the presentation I gave at the AAAI conference this year. We introduce a hierarchical Markov model that can learn and infer a user’s daily movements through the community. The model uses ... Learning Models of Human Activities and Interactions using Multi-Modal Wearable SensorsIf computers are to become proactive and assistive, they will need to sense and infer human activities and interactions in unconstrained real world settings. This presents us with the challenge of bui ... Learning to Label ImagesThe problem of image labeling, in which each pixel is assigned to one of a finite set of labels, is a difficult problem, as it entails deciding which components of an image belong to the same object a ... Learning using Large DatasetsThe statistical learning theory suggests to choose large capacity models that barely avoid over-fitting the training data. In that perspective, all datasets are small. Things become more complicated w ... Leaving Microsoft to Change the WorldFor nearly a decade, John Wood rode the '90's tech boom to a leadership position at Microsoft where he "had it all": the big paycheck, the corporate apartment and proximity to software giant Bill Gate ... Leaving Microsoft to Change the WorldFor nearly a decade, John Wood rode the '90's tech boom to a leadership position at Microsoft where he "had it all": the big paycheck, the corporate apartment and proximity to software giant Bill Gate ... Leveraging Fine-Grained Multithreading for Efficient SIMD Control FlowRecent advances in graphics processing units (GPUs) have resulted in massively parallel hardware that is easily programmable and widely available in commodity desktop computer systems. GPUs typically ... Life Under Your Feet: Using WSN in Soil Ecology ... Lifelong user models, memory and learningThere is a huge and rapidly growing amount of digital information about people. It is distributed across personal data stores, private corporate and government stores as well as on the very public web ... Linked Decompositions of Networks and Polya Urns with ChoiceWe propose a novel graph decomposition that enables a scalable form of internet routing with roughly sqrt(n) memory and logarithmic delay. Subnetworks are required to be small and with small diameter, ... Live Long and Prosper! Exercise, Nutrition and Supplements for Optimal Energy and ProductivitySlide deck available PowerPoint Genetic engineering, memory in a pill and life as a cyborg are so close -- and yet not quite a part of the average preventative regimen. While we're waiting check out t ... Load Management and Fault-Tolerance in a Distributed Stream Processing SystemRecently, a new class of data management applications has emerged in areas such as sensor-based environmental monitoring, financial services, network monitoring, and military applications. These 'stre ... Local Chromatic Number of Quadrangulation of SurfacesA quadrangulation of a surface is a graph embedded in the surface such that every face is a quadrangle. Clearly, such graphs in the plane are bipartite, but some quadrangulations of the torus are 3-ch ... Locating Family Values: A Field Trial of the Whereabouts ClockIn this talk I'll draw on work from my visit to Microsoft Cambridge earlier this year, in collaboration with the SDS group. The paper is a report of the results of a long-term, multi-site field trial ... Location-Based Activity RecognitionKnowledge of a person's location provides important context information for many applications, ranging from services such as E911 to personal guidance systems that help cognitively-impaired individual ... Log-Based Architectures: Using Chip Multiprocessors to Help Software Behave CorrectlySoftware tends to misbehave more often than we would like due to bugs and security attacks. The good news is that there are a variety of dynamic program monitoring tools (which we call "lifeguards") t ... LogTM: Log-Based Transactional MemoryTRANSACTIONAL MEMORY (TM) aims to simplify parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes providing versio ... Looking Beyond Performance: Processors for Time TravelThe processor industry is at an inflection point. In the past, performance was the driving force behind the processor industry. But in the coming many-core era, improving programmability and reliabili ... Lost in Space: The Fall of NASA and the Dream of the New Space AgeIn Lost in Space: The Fall of NASA and the Dream of a New Space Age, Greg Klerkx argues that ever since the triumphant Apollo missions, the Space Age has been stuck in the wrong orbit… and that NASA ... Lost in Space: The Fall of NASA and the Dream of the New Space AgeIn Lost in Space: The Fall of NASA and the Dream of a New Space Age, Greg Klerkx argues that ever since the triumphant Apollo missions, the Space Age has been stuck in the wrong orbit… and that NASA ... Low Distortion Embeddings for Edit DistanceWe show a computationally efficient low distortion embedding of the binary cube endowed with edit distance into $\ell_1$. This yields solutions to various computational problems involving edit distanc ... Lower Bounds for Linear Degeneracy TestingConsider the following fundamental problem, called r-linear-degeneracy-testing (rLDT): Given an input of n real numbers, do any r of them sum up to 0?
This problem is fundamental in computational ... Machine Learning Exploration Of Brain fMRI Data To Study Inhibitory Control MechanismsFunctional Magnetic Resonance Imaging (fMRI) has enabled scientists to look into the active human brains. This has revealed exciting insights into the spatial and temporal changes underlying a broad r ... Machine Learning Methods for Discovery of Regulatory Elements in BacteriaI will present novel machine learning methods for the discovery of important DNA sequence elements encoded in bacterial genomes. Knowledge of these elements provides insight into important problems in ... Machine Learning Methods for Structured and Collective ClassificationStructured classification deals with a family of problems where a response variable possessing meaningful internal structure has to be predicted from a set of input variables. This includes prediction ... Making Concurrency MainstreamThe most widely used concurrent software techniques, which are based on threads, monitors (or approximations to monitors), and semaphores, yield incomprehensible and untestable software. Bugs due to r ... Making Networks More RobustA network lies at the heart of many enterprises, connecting the computers that manage the business's data and support its employees with information and communications. Yet, modern networks are far fr ... Making NEXRAD Precipitation Data Available to the Hydrology CommunityNext Generation Doppler Radar (NexRad) has enabled the possibility of collecting high-resolution precipitation data across the country that is of high value to hydrologists studying, amongst other thi ... Making Semiconductors Ferromagnetic: Reasons, Challenges, and OpportunitiesIt has recently been discovered that incorporating Mn into the lattice of a III-V semiconductor (such as GaAs) will render the semiconductor ferromagnetic. The ferromagnetism of these alloys occurs be ... Making Wireless LANs Faster and FairerToday's 802.11 WLANs, which facilitate both 802.11b and 802.11g devices, often experience rate diversity in which multiple nodes attempt to transmit on the shared channel using different speeds. In th ... Managing Uncertainty Using Probabilistic DatabasesUncertainty is a fundamental problem underlying several modern database applications: exploratory queries in databases, data integration, querying information extracted from the Web, queries over sens ... Market-Based Programming Paradigms for Sensor NetworksSensor networks present a novel programming challenge: that of achieving robust global behavior despite limited resources, varying node locations and capabilities, and changing network conditions. Cur ... Mathematical Analysis of ProgramsNumerical programs are imperative programs over integer and real quantities. Such programs are ubiquitous. Common examples include scientific and systems programs, models of control systems such as ti ... Mathematical Sketching: A New Approach for Creating and Exploring Dynamic IllustrationsDiagrams and illustrations are often used to help explain mathematical concepts. They are commonplace in mathematical and physics textbooks providing a form of physical intuition to otherwise abstract ... Maximizing the Spread of Influence in a Social NetworkA social network - the graph of relationships and interactions within a group of individuals – plays a fundamental role as a medium for the spread of information, ideas, and influence among its memb ... ME++With Me++ the author of City of Bits and e-topia completes an informal trilogy examining the ramifications of information technology in everyday life. William Mitchell describes the transformation of ... Measurement and Monitoring in Wireless Sensor NetworksWireless sensor network is one of the emerging technology trends in the coming decades. These networks will consist of a large collection of embedded sensors, collaboratively providing robust distribu ... Measurement-Driven Modeling and Design of Internet-Scale SystemsThe Internet is huge, complex, and rapidly evolving. Understanding how today's Internet-scale systems work is challenging, but crucial when designing the networks and applications of tomorrow. In this ... Media Computation: Introducing Computing Contextualized in Video and Audio ProcessingThe manipulation of pixels and samples to create video effects (like chromakey and the Star Trek ?Transporter?) and audio effects (like echoes and reversing), that are commonly used in gaming, serves ... MediatorsMediators are reliable parties that can act on behalf of agents that give them the right of play. Unllike mechanism designers, mediators can not design new games, but are designed to lead to desired b ... Memex Summit (Digital Memories Workshop)Memex Summit (Digital Memories Workshop) ... Memex Summit (Digital Memories Workshop) - College and as Assistive TechnologyMemex Summit (Digital Memories Workshop) - College and as Assistive Technology ... Memex Summit (Digital Memories Workshop) - Content-Based Similarity Search with MyLifeBitsMemex Summit (Digital Memories Workshop) - Content-Based Similarity Search with MyLifeBits ... Memex Summit (Digital Memories Workshop) - Digital Memories SoftwareMemex Summit (Digital Memories Workshop) - Digital Memories Software ... Memex Summit (Digital Memories Workshop) - Group DiscussionMemex Summit (Digital Memories Workshop) - Group Discussion ... Memex Summit (Digital Memories Workshop) - IntroductionMemex Summit (Digital Memories Workshop) - Introduction ... Memex Summit (Digital Memories Workshop) - MyHealthBits: Advanced Personal Health RecordMemex Summit (Digital Memories Workshop) - MyHealthBits: Advanced Personal Health Record ... Memex Summit (Digital Memories Workshop) - Personal Audio Life LogsMemex Summit (Digital Memories Workshop) - Personal Audio Life Logs ... Memex Summit (Digital Memories Workshop) - SenseCam and Memory RehabilitationMemex Summit (Digital Memories Workshop) - SenseCam and Memory Rehabilitation ... Memex Summit (Digital Memories Workshop) - SenseCam Work at Dublin City UniversityMemex Summit (Digital Memories Workshop) - SenseCam Work at Dublin City University ... Memex Summit (Digital Memories Workshop) - What Did We See? & WikiGISdescription ... Memory Model = Instruction Reordering + Store AtomicityWe present a novel framework for defining memory models in terms of two properties: thread-local Instruction Reordering axioms and Store Atomicity (SA), which describes inter-thread communication via ... Menger's Theorem for Infinite GraphsWe prove an old conjecture of Erdos, saying that Menger's theorem is valid also for infinite graphs, in the following strong form: given sets A and B of vertices in a graph (possibly directed, possibl ... Mentoring: The People Who Lead Us Toward Our Purpose in LifeYour second grade teacher. Your Rabbi. Your dad. Your best friend. Your first boss. Your college wrestling coach. We all have people in our lives who helped us find our way, who helped us become who w ... Microphone Array for Audience Capture in Lecture RoomsCapturing the sound from the audience during broadcasting and/or recording lectures presents challenges due to increased distance between the microphone(s) and the speaker which worsens the signal-to- ... Mine Query/Click Log for Collaborative Internet SearchJuly 18th, 2007 ... MobileASL: Making Cell Phones Accessible to the Deaf CommunityVideo phones are quickly replacing TTYs as the preferred method of communicating from home and afar in the Deaf community. Current video phone technology uses the broadband internet and not the low ba ... Mobility for Sensing Uncertainty Reduction in Sensor NetworksOne of the major design concerns in sensor networks is their sensing performance. This talk considers the problem of discovering desirable network configurations in a distributed manner for improving ... Model Checking of Predicate Abstracted Programs without BDDsIn recent years, software model checking has been offered as a viable solution to the 'bug hunt' in software. Although only in its infancy, software model checking has shown promise in tackling this v ... Model Drive Development of Enterprise ApplicationsModern enterprises critically depend on a large number of business applications that need to interact with each other. These applications typically have a long life during which they need to cope with ... Model-based Testing with Labeled Transition SystemsSystematic testing of software plays an important role in the quest for improved software quality. Testing, however, turns out to be an error-prone, expensive, and time-consuming process. Model based ... Modeling and Analysis of Access Control SurvivabilityIn traditional models of access control systems, the emphasis is on validating security as safety properties, defined over state-transition graphs that represent system behavior. The goal of access co ... Modeling and Facilitating Human CommunicationAt the Interactive Systems Laboratories, our efforts have centered on human communications and on how computer systems can mediate or facilitate human communication. We have recently launched the 'int ... Modeling Intention in Email: Speech Acts, Information Leaks and User Ranking MethodsEmail management has a fundamental role in work productivity. In this talk I will present evidence that machine learning techniques can be effectively used to improve email management by modeling diff ... Modeling Science: Topic models of Scientific Journals and Other Large Document CollectionsA surge of recent research in machine learning and statistics has developed new techniques for finding patterns of words in document collections using hierarchical probabilistic models. These models a ... Models as Structures: The Structural Semantics of Model-based DesignModel-based design encourages architects to use customized architectural languages that precisely target their problem domains. These languages, coined domain-specific modeling languages (DSMLs), are ... Modular Static Analysis with Sets and RelationsWe present a new approach for statically analyzing data structure consistency properties. Our approach is based on specifying interfaces of data structures using abstract sets and relations. This enab ... Monitoring Distributed Data StreamsMonitoring data streams in a distributed system is the focus of much research in recent years. Most of the proposed schemes, however, deal with monitoring simple aggregated values, such as the frequen ... MOP: A Generic and Efficient Runtime Verification FrameworkWe present a tool-supported formal software development framework in which runtime monitoring is a basic design principle, called monitoring-oriented programming (MOP). In MOP, the developer specifies ... More Natural Programming Through User StudiesThe Natural Programming Project is working on making programming languages and environments easier to learn, more effective, and less error prone. We are taking a human-centered approach, by first stu ... More than Human: Embracing the Promise of Biological EnhancementMSN Search GPM Ramez Naam talks about his new book, More Than Human (http://www.morethanhuman.org/).
More Than Human is about our growing power to alter our minds, bodies, and life spans through t ... Moving VoIP Beyond the PhoneMost current commercial and research efforts focus on making VoIP work as well as the current landline and mobile phone, by improving aspects from QoS to security. As important as these are, it is imp ... MS-PAC Amb. Paul Bremer MSPAC LunchMY YEAR IN IRAQ: The Struggle to Build a Future of Hope is the only senior insider's perspective on the crucial period following the collapse of Saddam Hussein's regime. Told with unrelenting candor b ... MS-PAC Amb. Paul Bremer MSPAC LunchMY YEAR IN IRAQ: The Struggle to Build a Future of Hope is the only senior insider's perspective on the crucial period following the collapse of Saddam Hussein's regime. Told with unrelenting candor b ... MSIL User Manual ... MSPAC Discussion and Book Signing with Senator John Kerry and Teresa Heinz KerryPlease join the MSPAC for a discussion and book signing with John Kerry and Teresa Heinz Kerry, Tuesday, April 3rd from 10:30am-11:30am in the Elliot and Shilshole rooms of building #36. The Kerrys wi ... MSPAC Discussion and Book Signing with Senator John Kerry and Teresa Heinz KerryPlease join the MSPAC for a discussion and book signing with John Kerry and Teresa Heinz Kerry, Tuesday, April 3rd from 10:30am-11:30am in the Elliot and Shilshole rooms of building #36. The Kerrys wi ... MSR Technical Education Series: Designing .NET Class LibrariesThis class presents best practices for designing frameworks that are reusable object-oriented libraries. The guidelines are applicable to frameworks ranging in size and in their scale of reuse from la ... Multi-Engine Machine Translation Guided by Explicit Word MatchingIn this talk, I will describe a recent new approach that we have been developing for synthetically combining the output of several different Machine Translation (MT) engines operating on the same inpu ... Multimedia Streaming in Self-Organized Mesh NetworksNew forms of networking technologies such as overlay, peer-to-peer, and mesh networks, promise the emergence of a new generation of global-scale intelligent networks. The constituent nodes of these ne ... Multiple View Geometry and L-infinity OptimizationIn this talk, a framework for solving geometric reconstruction problems in computer vision will be presented based on the L-infinity norm. Instead of using the common sum-of-squares cost-function, tha ... Multiprocessor Architectures for ProgrammabilityWhile multiprocessor hardware is finally becoming ubiquitous, enticing most programmers to write parallel programs is going to be very challenging. For this reason, I believe that the main problem tha ... Music Information Retrieval: Query-By-Humming and Source EstimationA key problem facing us in the 21st century is information retrieval and management - how to retrieve, process, and store the information one seeks from the huge and ever-growing mass of available dat ... Music Information Retrieval: Query-By-Humming and Source EstimationA key problem facing us in the 21st century is information retrieval and management - how to retrieve, process, and store the information one seeks from the huge and ever-growing mass of available dat ... Music-Specific Audio Content AnalysisAdvances in storage technology and audio compression have made possible the storage of large collections of music on personal computers and devices. In order to develop effective tools for browsing an ... Musicophilia: Tales of Music and the BrainThere are a range of human reactions to music: from indifference to rapture, from "amusia" (the inability to recognize certain aspects of music) to a synesthetic response that imbues every musical not ... Naked Conversations: How Blogs are Changing the Way Businesses Talk with CustomersShel Israel and Microsoft's own Robert Scoble will discuss how blogs are changing the way businesses talk with customers. They will discuss what they learned from their reearch and interviews with mor ... Natural Scene Categorization in Humans and ComputersFor both humans and machines, the ability to learn and categorize natural scenes as well as the objects within is an essential and important functionality. The bulk of this talk will focus on a comput ... Neighbourhood Component AnalysisSay I give you a dataset of N points {x_n} in D dimensions. Can you find for me (up to rotation and isotropic scaling) a projection matrix A (of size d by D) such that when you apply nearest neighbour ... Net.TV is not TV (as we know it)! The Economics of Open ContentNearly every aspect of television and video today is in transition -- production and storage are moving from tape to disk, distribution is moving from broadcast networks to the Internet, schedules are ... Network Market Design for Efficient Resource AllocationMany systems are characterized by complex (and often strategic) interactions between subsystems. Such systems occur in communication networks, power networks, wireless and sensor networks, etc. The st ... Network Visualization: Two new strategies and their case study evaluationsNetwork visualization has been a lively topic for a half century, but the intense challenges from many facets of this problem demand diverse solutions. While the popular force-directed approaches prod ... New Approaches for Building Cryptographic Hash FunctionsCryptographic hash functions are a fundamental primitive, utilized in numerous security applications. With the recent attacks against many widely deployed hash functions (e.g., MD5, SHA-1), the search ... New Directions in Pointer AnalysisPointer analysis is critical for effectively analyzing programs written in languages like C, C++, and Java, which make heavy use of pointers and pointer-based data structures. Unfortunately, pointer a ... New Directions in Robust Automatic Speech RecognitionAs speech recognition technology is transferred from the laboratory to the marketplace, robustness in recognition is becoming increasingly important. This talk will review and discuss several classica ... New Directions in Static Analysis for Error-Detection and Garbage CollectionPointer analysis is critical for effectively analyzing programs written in languages like C, C++, and Java, which make heavy use of pointers and pointer-based data structures. Unfortunately, pointer a ... New Locally Decodable Codes and Private Information Retrieval SchemesA q-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only q bits of the codew ... New Market Models and AlgorithmsThe notion of a ''market'' has undergone a paradigm shift with the Internet -- totally new and highly successful markets have been defined and launched by companies such as Google, Yahoo!, Amazon, MSN ... New Trends in Parametric Models from 1 to the 3-D Case ... Niche Envy: Marketing Discrimination in the Digital AgeWe have all been to websites that welcome us by name, offering us discounts, deals or special access to content. For the most part, it feels good--to be valued as a customer, even as we realize that w ... No Ifs, Ands, or Buts: Uncovering the Simplicity of ConditionalsSchematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogonally. They unify the fu ... Not Even WrongBy the age of two, Collins' son, Morgan, could read and multiply but would not respond to his own name. When he was diagnosed with autism, Collins and his wife resisted then slowly let go of their den ... Off the Beaten Path in Pervasive ComputingMany of our current research projects at MERL are squarely in the pervasive-computing realm, such as: interactive multi-user tabletop displays, operator-identifying automotive controls, digital home n ... On Graph KernelsWe consider the following two problems: a) How can we best compare two graphs? and b) How can we compare two nodes in a given graph? We present some algorithms based on the notion of random walks and ... On the Capacity of Information NetworksTraditionally, routers in a communication network forward each data packet to a single neighbor. Under this assumption, information in a communication network flows much like a fluid though a system o ... On the Compressibility of NP Instances and Cryptographic ApplicationsWe initiate the study of compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problems. We ... On the Measure of Intersecting Families, Spectral MethodsA family of sets is called intersecting if the intersection of every two sets in the family is non empty. Many of the fundamental theorems in extremal set theory deal with the maximal size of an inter ... One Dimensional DLADiffusion Limited Aggregation (DLA) is a notoriously difficult model for crystal growth introduced in 1981 by Sander and Witten. We consider a variation on DLA in 1 dimension generated by a random wal ... One-Forms and Tutte-Like EmbeddingsIn 1962, Tutte presented a simple algorithm to draw a planar graph using straight lines. This algorithm has become the primary method that is used in computer graphics for flattening meshes. Mesh flat ... Online Approximation Techniques for Spatial DataSpatial Database Management Systems (SDBMS), e.g., Geographical Information Systems, that manage spatial objects such as points, lines, and hyper-rectangles, often have very high query processing cost ... Online Ascending Auctions for Gradually Expiring ItemsWe consider online auction mechanisms for the allocation of $M$ items that are identical to each other except for the fact that they have different expiration times, and each item must be allocated be ... Online Auctions, Strategyproofness and Random ValuationsWe discuss the limited-supply online auction problem, in which an auctioneer has k goods to sell and bidders arrive and depart dynamically, from a theoretical point of view and show how Economics, Sch ... Opportunistic Spectrum Access via Dynamic Resource AllocationRecent advances in software defined radio and cognitive radio have given wireless devices the ability and opportunity to dynamically access spectrum, thereby potentially significantly improving spectr ... Opportunities and Challenges in End-to-End Verification of Software SystemsI'll start out by taking a brief tour that covers my past experience on various projects and how those experiences shape my current view of the importance and practicality of end-to-end system verific ... Opportunities and Challenges in Sensing, Inference and Context-aware ComputingSmall computing devices are increasingly being equipped with sensors, large storage capacities, and capable, low-power processors. When combined with recent advances in statistical modeling techniques ... Optimal Dynamic AuctionsWe consider a dynamic auction problem motivated by the traditional single-leg, multi-period revenue management problem. A seller with Q units to sell, faces potential buyers who arrive and depart over ... Optimal Marketing Strategies over Social NetworksHow can a monoplist seller use social network effects to increase revenue earned? We identify a family of strategies called 'influence and exploit' strategies that are easy to implement, easy to optim ... oPtions: The Secret Life of Steve JobsWelcome to the mind and world of Fake Steve Jobs: Fake Steve, the counter-intuitive management guru: "Obviously we can't literally put our employees' lives at risk. But we have to make them feel that ... Overview of the Science Fiction MuseumDonna Shirley, Director of the new Science Fiction Museum and Hall of Fame which opened June 18 at the Seattle Center, will give an overview of the museum. SFM is not only an entertaining and instruct ... P2P and Online Social Networking Research at Mirage GroupIn this talk, I present an overview of three projects in my research group. 1) The PRIME project focuses on fundamental issues in the design and evaluations of P2P streaming mechanisms. I present a fe ... PageRank and the Random Surfer ModelIn recent years there has been considerable interest in analyzing random graph models for the Web. We consider two such models - the Random Surfer model introduced by Blum et al. and the PageRank-base ... Pair Programming Re-DesignSeveral academic and industry studies have documented substantial improvements in code design and defect rate when programs are written by pairs of programmers (two people working shoulder-to-shoulder ... Panel - Extracting Signal from Noise in Social NetworkingNo Description Available ... Paradigms of Worm Defense & Thoughts from an Ivory TowerThis is two presentations concatenated together:
Paradigms of Worm Defense: A viable worm defense will be composed of multiple components: Automatic detection, analysis and response, prevention, t ... ParaEval: Using Paraphrases to Improve Machine Translation and Summarization EvaluationsThe machine translation and text summarization communities have both benefitted greatly from the introduction of automated evaluation procedures. Automatic evaluation methods facilitate faster turnaro ... Parallel Execution Models for Future Multicore ArchitecturesWith uniprocessor performance increases leveling off, and with the semiconductor industry moving towards multicore processors, novel ways of parallelizing the execution of a variety of computing appli ... Parallel, Real-Time Garbage Collection in Rotor ... Parameterized Model Checking of Protocols: Two DevelopmentsThis talk will consist of two somewhat independent sub-talks. Both discuss research motivated by parameterized model checking of shared-memory protocols, but they are somewhat orthogonal.
In the f ... Part 1: NCWIT - Introduction and WelcomeAs addressed in recent, high profile studies, the U.S. faces a critical shortage in its information technology talent pool and serious under-representation of women and minorities is a key contributin ... Part 2: NCWIT - Executive Branch Panel and DialogueAs addressed in recent, high profile studies, the U.S. faces a critical shortage in its information technology talent pool and serious under-representation of women and minorities is a key contributin ... Part 3: NCWIT - Congressional Panel and DialogueAs addressed in recent, high profile studies, the U.S. faces a critical shortage in its information technology talent pool and serious under-representation of women and minorities is a key contributin ... Part 4: NCWIT - Remarks by Senator ObamaAs addressed in recent, high profile studies, the U.S. faces a critical shortage in its information technology talent pool and serious under-representation of women and minorities is a key contributin ... Pastiche: Decentralized, Low Cost Backup Using Untrusted Internet StorageThe cost and inconvenience of backup are unavoidable and often prohibitive. Large-scale solutions require aggregation of substantial demand to justify the costs of managing a large, centralized reposi ... Path invariantsThe success of software verification depends on the ability to find a suitable abstraction of a program automatically. We propose a method for automated abstraction refinement which overcomes some lim ... Path Projection for User-Centered Static Analysis ToolsThe research and industrial communities have made great strides in developing sophisticated defect detection tools based on static analysis. However, to date most of the work in this area has focused ... Pathfinder/MonetDB: Making xQuery Scale Using the Relational ApproachUsing a relational DBMS as back-end engine for an XQuery processing system leverages relational query optimization and scalable query processing strategies provided by mature DBMS engines in the XML d ... Paths Beyond Local Search: A Tight Bound for Randomized Fixed-Point Computationdescription ... Patterns as SignsObject-oriented design patterns have been one of the most important and successful ideas in software design over the last ten years, and have been well adopted both in industry and academia. A number ... People Pen and ComputersPen and paper are key aspects of our everyday life. This simple system is easy to use, reliable and versatile. Yet, it also stands on the margins of the digital world as info gathered on pen and paper ... PerelmanThis will be a series of three lectures on Perelman's work, aimed at a general mathematical audience. The first lecture will briefly review Thurston's conjecture and its consequences, and then go thro ... Perelman's Work on the Thurston's Geometrization Conjecture - 2This will be a series of three lectures on Perelman's work, aimed at a general mathematical audience. The first lecture will briefly review Thurston's conjecture and its consequences, and then go thro ... Perelman's Work on the Thurston's Geometrization Conjecture - 3This will be a series of three lectures on Perelman's work, aimed at a general mathematical audience. The first lecture will briefly review Thurston's conjecture and its consequences, and then go thro ... Personal Passion and Professional Excellence - You CanBrilliance is more than just being smart – when you are Brilliant you are approaching your professional and personal life energized, in control and achieving results never imagined. When you are Bri ... Persuasive Games: The Expressive Power of VideogamesVideo games are often perceived as brain-draining flights of fantasy that have no meaning beyond escapism and yet it is an industry that takes in more than $7 billion a year. In fact, there can be muc ... Phase-Aware Program ProfilingThe ever increasing network bandwidth and availability has made the vision of ubiquitous computing a reality: Users can access the Internet's vast offerings anytime and anywhere. Moreover, battery-pow ... Place Lab: Device Positioning Using Radio Beacons in the WildLocation awareness is an important capability for mobile computing. Yet inexpensive, pervasive positioning—a requirement for wide-scale adoption of location-aware computing—has been elusive. Place ... Play Between Worlds: Exploring Online Game CultureIn Play Between Worlds, T. L. Taylor examines multiplayer gaming life as it is lived on the borders, in the gaps--as players slip in and out of complex social networks that cross online and offline sp ... Point-Based Methods in Shape Modeling and Physical SimulationPoint-based methods have a long history in graphics for rendering, but their use in modeling and simulation is more recent. Shape representations based on sampled points faithfully reflect several 3-D ... Positive Externalities ... Power Management from Handhelds to DataCenters: Chasing the Next 10X ImprovementsEnergy and power are increasingly becoming critical challenges in the design of future computing systems. The SmartPower project at hp labs seeks to address these challenges through holistic solutions ... Predicting Secret Keys via Branch PredictionWe give an overview of a new software side-channel attack, enabled by the branch prediction capability common to all modern high-performance CPUs. The penalty paid (extra clock cycles) for a miss-pred ... Predicting the 'Unpredictable'This is a survey of results about the accuracy of prediction when the predictor has no prior knowledge about the process that s/he must forecast. No prior knowledge means just that; no information abo ... Predicting Value from DesignEarly design decisions in software projects profoundly affect both the properties and the costs of the eventual implementation. It is much easier and cheaper to change these decisions during design th ... Probabilistic Latent Variable Decompositions for Image and Audio AnalysisIn this talk we present a model which can decompose probability densities into sets of shift invariant components. We will show how this model is very well suited for audio and image problems and will ... Probabilistic Models for Parsing ImagesA grand challenge of computer vision is to understand and parse natural images into boundaries, surfaces and objects. To solve this problem we would inevitably need to work with visual entities and cu ... Process Extraction in an Abstract Logic of EventsIn 2003 Mark Bickford and I defined and formalized a logic of events for specifying distributed computing tasks and for reasoning about distributed systems. The Logic of Events is a very abstract acc ... Program Composition by Non-ProgrammersProgramming by children and other non-experts is usually conceived of as a task that begins with the primitives of the programming language and works upward toward working programs. A promising altern ... Program Verification via Three-Valued Logic AnalysisSoftware errors cost the US economy billions of dollars each year. According to reasonable estimates, a third of the cost can be saved through the use of enhanced tools for software quality. My disser ... Programming by SketchingWhen code is synthesized from a concise specification, the result is less coding and more correctness. Sketching seeks to bring synthesis to everyday programming by allowing to sketch the desired code ... Programming by SketchingWhen code is synthesized from a concise specification, the result is less coding and more correctness. Sketching seeks to bring synthesis to everyday programming by allowing to sketch the desired code ... Project Fabulous: Turning Grumbling into EnergyIn addition to providing an update on the 'culture change' work described in June's Holistic System of Systems talk, and describing the theoretical basis for an approach to inducing cultural change, t ... Protocol Composition LogicsThe design and analysis of network protocols that use cryptographic primitives is one of the most fundamental and challenging areas of security research. In this talk, I will present logical methods f ... Provably Optimal Solutions to Geometric Vision ProblemsIn the past, the main methods for solving problems in Multiview Vision Geometry have been iterative techniques, which may suffer from falling into local minima, and trouble with convergence. Recent re ... Pseudorandom Walks in Directed Graphs and the RL vs. L QuestionA long-standing open question in complexity theory is whether there are problems that randomized algorithms can solve using (asymptotically) less space than possible by any deterministic algorithm. An ... Purpose: The Starting Point of Great CompaniesWhat is at the core of every great company? How do leaders and companies create sustained competitive advantage? In Purpose, Nikos Mourkogiannis shows that companies have forgotten one of the most imp ... QoS-Based Resource ManagementIn this talk, I first describe 'Resource Kernel' (RK), a QoS-aware real-time Operating system infrastructure implemented on Linux. Next, I discuss a distributed middleware prototype based on a concept ... Quantum Loop Gas Approach to Topological Phases of Correlated ElectronsI will describe a representation of topological states and related critical points which elucidates their relationship to gauge theories, statistical mechanics, and quantum computation ... Query Processing for Large-Scale XML Message BrokeringEmerging distributed information systems such as Web services, personalized content delivery, and event monitoring require increasingly flexible and adaptive infrastructures. Recently, the publish/sub ... Querying Breast Cancer Image DatabasesBreast cancer remains a leading cause of cancer deaths among women in many parts of the world. In the United States alone, over forty thousand women die of the disease each year. Mammography is curren ... Querying Breast Cancer Image DatabasesBreast cancer remains a leading cause of cancer deaths among women in many parts of the world. In the United States alone, over forty thousand women die of the disease each year. Mammography is curren ... RAIL2 - Runtime Assembly Instrumentation Library 2#Error ... Raising the Bar: Integrity and Passion in Life and Business: The Story of Clif Bar, Inc.In April 2000, Gary Erickson, co-founder of Clif Bar, turned down a $60 million offer to buy his company. Now he’s working harder than ever, rather than enjoying a luxurious retirement on a tropical ... Raksha: A Flexible Information Flow Architecture for Software SecurityHigh-level semantic vulnerabilities such as SQL injection and cross-site scripting have surpassed buffer overflows as the most prevalent security exploits. The breadth and diversity of software vulner ... Random Forests and the Data Sparseness Problem in Language ModelingIn this talk, we explore the use of Random Forests (RFs) in language modeling, the problem of predicting the next word based on words already seen. The goal in this work is to develop a new language m ... Random Matrices and Spectral Clustering AbstractTheoretical analysis of Spectral Clustering is often based on the theory of random matrices which assumes that all entries of the data matrix (with each row representing a data object) are independent ... Randomly Coloring Planar Graphs with Fewer Colors Than the Maximum DegreeJoint work with Thomas P. Hayes and Eric Vigoda ... RAPUNSEL & CREOL - Games that Teach Kids to ProgramRAPUNSEL is an on-line computer game/learning system to enable children, especially underprivileged groups and girls, learn to program computers. It is being developed by researchers at the Media Rese ... Rate Control Protocal (RCP): Congestion Control to Make Flows Complete QuicklyUsers typically want their flows to complete as quickly as possible. This makes Flow Completion Time (FCT) an important - arguably the most important - performance metric for the user. Yet research on ... Reasoning About Reliability and Security Using Boolean MethodsDetecting and correcting errors before run-time is increasingly important in today's ubiquitous computing environment. Decision procedures for first-order logics are widely applicable in design verifi ... Recent Developments in Linguistics - And in the UW Department of LinguisticsThe field of linguistics has seen a remarkable broadening of interests on the part of grammatical theorists in recent years. Not long ago, grammarians confined themselves purely to constructing rules ... Recent Progress in Group Editors and Operational Transformation AlgorithmsGroup editors are a classic example of Internet-based productivity applications. They allow a group of distributed human users to edit a shared multimedia document over a computer network. Consistency ... Records, Sums, Cases, and Exceptions: Row-polymorphism at WorkI will present the design of a programming language (called MLPolyR) whose type system makes significant use of row polymorphism (Rémy, 1991). MLPolyR (Blume et al. 2006) is a dialect of ML and provi ... Recovering Human Shape and Motion from Video SequencesIn recent years, because cameras have become inexpensive and ever more prevalent, there has been increasing interest in modeling human shape and motion from image data. Such an ability has many applic ... Recurrence of the Simple Random Walk PathA simple random walk (SRW) on a graph is a Markov chain whose state space is the vertex set and the next state distribution is uniform among the neighbors of the current state. A graph is called recur ... Reducing Errors in Computer Recognition of Handwritten MaterialResearch activities at our research centre will be described, including handwriting recognition, OCR and legibility of printfonts. After that, this talk will focus on methods of reducing errors in han ... Refinement of Thread-Modular VerificationThread-modular verification à la Flanagan and Qadeer is a promising approach for avoiding the state explosion during the verification of concurrent programs. The method is polynomial in the number of ... Regular Extrapolation of Behavioral Models-Searching for Regular Patterns by ObservationIn current practice, only rarely precise and reliable documentation of a system's behaviour is produced during its development. Revisions and last minute changes invalidate design sketches, and while ... Regular Symbolic Analysis of Dynamic Networks of Pushdown SystemsWe introduce abstract models for multithreaded programs based on dynamic networks of pushdown systems. We address the problem of symbolic reachability analysis for these models. More precisely, we con ... Relational Databases in the Social and Health Sciences: The View from DemographyThere is an ongoing explosion in the amount and complexity of data collected by social and health scientists. Many of these are temporal data that describe time-evolving populations of individual peop ... Reliability Estimation During Architectural DesignModeling and estimating software reliability during testing is useful in quantifying the quality and dependability of the developed software systems. However, such measurements applied so late in the ... Reliable Feedback from Clicking Behavior in Adaptive WWW SearchA central goal of information retrieval is the design of functions that rank documents according to their relevance to a query. In this talk, we present an approach to automatically learning such rank ... Repositioning Computer Science: Increasing Diversity and Creativity in CS EducationDecreased enrollment in Computer Science has led many universities, businesses and government institutions to take a closer look at the field and how it is perceived. As computers become increasingly ... Resisting Denial of Service Attacks by Puzzle OutsourcingOne proposed approach to deter denial of service attacks is to require clients to solve computational puzzles before connecting to a server. Unfortunately, standard puzzle schemes impose a higher cost ... Resource Management of Heterogeneous Wireless NetworksWireless communication today supports heterogeneous wireless devices with a number of different wireless network interfaces (WNICs). The goal of our work is to design novel scheduling and routing algo ... Resource-Based NLP (by Hitoshi Isahara) and Construction of Large JapaneseResource-Based NLP (by Hitoshi Isahara) Abstract: At NICT, we develop widely-applicable and high-performance NLP technologies and linguistic resources, which we make available to public to facilitate ... Rethinking Database Systems for Modern ArchitectureComputer systems have enjoyed an exponential growth in processor speed for the last 20 years, while DRAM main memory speed improves only moderately. Today a cache miss to main memory takes hundreds of ... Rethinking Processor and System ArchitectureModern technology presents chip designers with challenges that will fundamentally alter how processors work and how we design all aspects of computer systems. The first portion of my talk presents a d ... Revelationary Computing, Proactive Displays and The Experience UbiComp ProjectPeople often reveal aspects about themselves in the physical world. Increasingly, people reveal aspects about themselves in the digital world. Ubiquitous Computing makes it increasingly possible to ac ... Robust Constrained GSC Algorithm for Microphone Array ProcessingSound capturing in an automotive environment without using a close-talk microphone is a challenging problem. First of all, the noise level inside a car is significantly higher than the noise level in ... Robust Face Recognition via Sparse RepresentationImage-based object recognition is one of the quintessential problems for computer vision, and human faces are arguably the most important class of objects to recognize. Despite extensive studies and p ... Rock 'n Roll: Earthquake & Disaster PreparednessWithout an impending disaster, it's difficult to motivate people to get prepared. Yet all it takes is for a major earthquake, hurricane, terrorist attack, fire, flood, storm or even a power outage, to ... Root Numbers and RanksNo Description Available ... RoSCtor: Software Construction Within Rotor ... Routing Tradeoffs in Dynamic Peer-to-Peer NetworksDistributed Hash Tables (DHTs) are useful tools for building large scale distributed systems. DHTs provide a hash-table-like interface to map a key to its responsible node among the current set of par ... SaC: Off-the-Shelf Support for Data-Parallelism on MulticoresThe advent of multicore processors has raised new demand for expressing and exploiting concurrency in the software mass market. This talk summarizes previous work on the data parallel, functional arra ... SAFECode: A Platform for Developing Reliable Software in Unsafe LanguagesA vast majority of current software is written in weakly typed languages such as C and C++. These unsafe languages provide very weak semantic guarantees due to the possibility of undetected memory err ... SANGAM: A System for Integrating Web Services to Investigate Stimulus-Circuitry-Gene CouplingIn 1993, NIH launched the Human Brain Project (HBP) to develop and support neuroinformatics as a new science to make experimental data pertaining to the brain publicly available on the Internet. The s ... SANGAM: A System for Integrating Web Services to Investigate Stimulus-Circuitry-Gene CouplingIn 1993, NIH launched the Human Brain Project (HBP) to develop and support neuroinformatics as a new science to make experimental data pertaining to the brain publicly available on the Internet. The s ... Satisfaction: How Every Great Company Listens to the Voice of the CustomerDoes customer satisfaction equal greater profits? Does the customer know what she wants? How can we turn simply 'satisfied' customers into vocal advocates for our businesses? Is there such a thing as ... Scalability and Extensibility in the Denali Virtual Machine MonitorVirtual machine monitors (VMMs) such as VMWare are useful for addressing a wide range of systems problems, including server partitioning, migration, intrusion detection, configuration debugging, and f ... Scalable Automated Methods for Software ReliabilityTesting with manually generated test cases is the primary technique used in industry to improve reliability of software--in fact, such testing is reported to account for over half of the typical cost ... Scalable Dynamic Analysis for Automated Fault LocationTechniques for generation, storage, and analysis of execution traces are critical to addressing many complex problems. For example, execution traces can be analyzed to drive automated techniques for l ... Scalable Knowledge HarvestingPerformance of many Natural Language Processing (NLP) systems have reached a plateau using existing techniques. There seems to be a general consensus that systems have to integrate semantic knowledge ... Scalable Program Analysis Using Boolean SatifiabilityStatic program analysis has long suffered from a fundamental trade-off between precision and scalability, and today the analyses that scale to the largest programs invariably are not the most precise ... Scaling Laws and Tradeoffs in Peer-to-Peer Live Multimedia StreamingIt is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized to support other peers, ... School of Interactive Arts and Technology at Simon Fraser UniversityThe game industry is becoming a multi-billion dollar industry with revenues overcoming those of the movie industry. Recently, thousands of people around the world camped out in front of stores for day ... Science Education in the 21st Century: Using the Tools of Science to Teach ScienceWe are excited to announce that the 2001 Noble Laureate Professor for Physics, Professor Carl Wieman, will be visiting campus next Thursday, November 15th and will share details of his current work to ... Science Friction: Where the Known Meets the UnknownPsychologist and science historian Shermer has put together fourteen articles and personal essays that he has written over the past decade in order to examine how science operates under pressure, duri ... SCOOP: Concurrent Object-Oriented Programming for Rotor ... SCS '06 - Closing Keynotes - Part 1SCS '06 - Closing Keynotes - Part 1 ... SCS '06 - Icebreaker - Part 2SCS '06 - Icebreaker - Part 2 ... SCS '06 - Introductions and Icebreaker - Part 1SCS '06 - Introductions and Icebreaker - Part 1 ... SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 1SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 1 ... SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 2SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 2 ... SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 3SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 3 ... SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 4SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 4 ... SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 5SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 5 ... SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 6SCS '06 - Lightning Round 1: Learning in and About Virtual Worlds - Talk 6 ... SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 1SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 1 ... SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 2SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 2 ... SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 3SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 3 ... SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 4SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 4 ... SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 5SCS '06 - Lightning Round 2: Mobile/Pervasive Social Computing - Talk 5 ... SCS '06 - Lightning Round 2: Session PlanningSCS '06 - Lightning Round 2: Session Planning ... SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 1SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 1 ... SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 2SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 2 ... SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 3SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 3 ... SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 4SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 4 ... SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 5SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 5 ... SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 6SCS '06 - Lightning Round 3: Interactions in Online "Spaces" - Part 6 ... SCS '06 - Lightning Round 3: Session PlanningSCS '06 - Lightning Round 3: Session Planning ... SCS '06 - Microsoft Research WelcomeSCS '06 - Microsoft Research Welcome ... SCS '06 - Reporting Back to Main GroupSCS '06 - Reporting Back to Main Group ... SCS '06 - Wrap-Up and Next StepsSCS '06 - Wrap-Up and Next Steps ... Search Engines Considered Harmful: In Search of an Unbiased Web RankingIn this talk, we discuss the widespread use of Web search engines and its potential impact on the ecology of the Web. Recent studies show that a significant portion of Web accesses are referred by sea ... Search: Use of Relevance Feedback and Estimating Effectiveness of SearchesThis talk consists of two parts focussed on two distinct but related themes. In the first part we look at the problem of searching on devices with small displays and explore relevance feedback approac ... Second Generation Sensor Querying#Error ... Secure Content Distribution Using Untrusted ServersA publisher can make content available to many readers through replication on remote, untrusted computers. Yet a reader should have confidence that content is authentic, and publishers should be able ... Secure Virtual Architecture: A Novel Foundation for Operating System SecurityThis talk describes Secure Virtual Architecture (SVA), an efficient and robust approach to provide a safe execution environment for an entire commodity operating system, such as Linux and its hosted a ... Security and Privacy in Radio Frequency IdentificationRadio Frequency Identification (RFID) refers to using tiny devices called "tags" to carry information about people or things. The technology offers great promise, with applications in everything from ... Seduced by Success: How the Best Companies Survive the 9 Traps of WinningSuccess can be a serious business vulnerability, and often a company?s fall from grace can be traced to decisions made in its time of greatest achievement. General Motors, IBM, Kodak, Rubbermaid-these ... Self-Migration by Self-InflationWhen live-migrating an operating system from one virtual machine to another, what it the least amount of privileges needed? Can we guarantee the integrity and access to service of innocent virtual mac ... Self-Monitoring of Thread Interactions in Multithreaded SystemsMultithreaded systems provide infrastructure capable of executing multiple software threads in parallel. Such systems range from the conventional multiprocessors to the recent simultaneous multithread ... Semantic Anchoring of Domain Specific Modeling LanguagesModel-based software and system design is based on the end-to-end use of formal, composable and manipulable models in the product life-cycle. Model Integrated Computing (MIC) developed at the Instit ... Semi-Supervised Clustering: Probabilistic Models, Algorithms and ExperimentsClustering is one of the most common data mining tasks, used frequently for data categorization and analysis in both industry and academia. The focus of our research is on semi-supervised clustering, ... Semi-Unsupervised Learning of Taxonomic and Non-Taxonomic Relationships from the WebDue to the size of the World Wide Web, it is necessary to develop tools for automatic or semi-automatic analyses of web data, such as finding patterns and implicit information in the web, a task usual ... Send: Think Before You ClickWith email we can send a message to nearly anyone, anytime, from anywhere?but that doesn?t always mean that we should. In fact, email communication presents new challenges-both in terms of writing ski ... Service Placement in Stream-Based Overlay NetworksThe emergence of data stream applications that collect, process, and deliver real-time stream data to multiple consumers in the Internet has created a need for an overlay network designed specifically ... SETI@home and Public Participation Distributed ComputingWerthimer will discuss the possibility of life in the universe and the search for radio signals from other civilizations. SETI@home analyzes data from the world's largest radio telescope using desktop ... ShaRE: A Run-Time System for High-Performance Virtualized RoutersOver the past decade, new uses and commercialization have pushed the Internet well beyond the expectations of its designers. Yet, the network architecture and services provided by the Internet have ch ... Sharp Thresholds for Random Constraint Satisfaction ProblemsWe consider a wide family of models for random constraint satisfaction problems. This family includes random k-SAT, random k-colourability and many other well-studied generalizations. Our goal is to d ... Short TalksThe Virtues of Vice: Metaphysical Data Independence for Sensors Presented by: Mike Franklin, UC Berkeley
Bathroom Activity Monitoring Based on Sound
Presented by: Jianfeng Chen et al., Institute ... Should Machines Emulate Human Speech Recognition?Machine-based, automatic speech recognition (ASR) systems decode the acoustic signal by associating each time frame with a set of phonetic-segment possibilities. And from such matrices of segment prob ... SID Grid: Collaborative Experimentation in a Sensor-Rich Laboratory ... Signal Processing Work of University of CagliariProf. Daniel D. Giusto, University of Cagliari: the Multimedia Communications Lab (10min) Prof. Luigi Raffo, University of Cagliari: the Microelectronics Lab (10 min) (MS Student) Simone Secchi, Run-t ... Simple Practical Methods for Estimating Distances in Large and Sparse Datasets Like the WebRandom projections are a popular method for estimating distances. Instead of computing L2 distances over a big data matrix, we multiply the big matrix with a very sparse random matrix (over [-1 0 1]) ... Simultaneous Optimization and FairnessIn this talk, we will sketch the theory of simultaneous optimization for concave profit functions, and point out connections to fairness. More precisely, suppose we would like to simultaneously approx ... Single and Multiple Document Summarization with Graph-Based Ranking AlgorithmsGraph-based ranking algorithms have been traditionally and successfully used in citation analysis, social networks, and the analysis of the link-structure of the World Wide Web. In short, these algori ... Single Image DehazingIn this talk I will present a new method for estimating the optical transmission in hazy scenes given a single input image. Based on this estimation the scattered light is eliminated to increase the v ... Singularity of Random Bernoulli MatricesNo Description Available ... Skoll: Distributed Continuous Quality AssuranceQuality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. The shortcomings of i ... Social and Temporal Structures in Everyday CollaborationEveryday work frequently involves coordinating and collaborating with others, but the structure of collaboration is largely invisible to conventional desktop applications. I am exploring ways to suppo ... Social Balance on Networks: The Dynamics of Friendship and HatredWe study the evolution of social networks that contain both friendly and unfriendly links between individual nodes. The network is endowed with dynamics in which the sense of a link in an imbalanced ( ... Social Catalysts: Enhancing Communication in Mediated SpacesMediated communication between public spaces is a relatively new concept. One current example of this interaction is video conferencing among people within the same organization. Large scale video-con ... Social Metadata and Tagging - From Trees to Tags ... Social Metadata and Tagging - Tesla, Tagging for the DeskTopNo Description Available ... Social Mobile Applications, Location, Privacy and the Capital of NevadaIn this talk, I'll discuss a research trajectory that we have been pursuing at Intel Research Seattle. This trajectory is 'social, mobile applications' or, perhaps more colloquially, 'applications tha ... Social Network Analysis meets the Semantic Web: What FOAF Reveals About LiveJournalThe Friend-of-a-Friend (FOAF) project was begun in 1999 to explore the application of semantic web technologies (RDF/XML) to people's personal details, such as their interests, occupations and persona ... Social Phenomena in Virtual CommunitiesFerdinand T?nnies wrote about 'Gemeinschaft' and 'Gesellschaft' more than 125 years ago and things can hardly get any older than that in the context of the Internet. But the terms are most often trans ... Solar Revolution: The Economic Transformation of the Global Energy IndustrySolar energy will be the cheapest source of energy in nearly all markets and locations because PV (photovoltaic) cells can bypass the aging and fragile electricity grid and deliver its power to the en ... Solving Geometric Matching Problems Using Interval Arithmetic OptimizationI describe how global optimization methods based on interval arithmetic can be used for solving a variety of problems in computational geometry, including the detection of parametric geometric primiti ... Some New Directions in Energy Minimization with Graph CutsAlgorithms based on graph cuts have had a major impact on an important class of vision problems. In these problems, which arise in applications such as stereo, every pixel must be assigned a label fro ... Some Open Problems in Large Volume Data Mining in Biomedical ApplicationsRecent advances in sensor technologies have enabled long term recordings of numerous physiologic parameters in patients, generating very large data sets. This phenomena extends to implantable sensors ... Some Recent Advances in Gaussian Mixture Modeling for Speech RecognitionState-of-the-art Hidden Markov Model (HMM) based speech recognition systems typically use Gaussian Mixture Models (GMMs) to model the acoustic features associated with each HMM state. Due to computati ... Some Recent Results in Camera Calibration and Shape ReconstructionIn this talk I will give an overview of some recent work done by my research group in the area of camera calibration and 3D reconstruction. In terms of calibration, I will both address photometric and ... Some Recent Results in Camera Calibration and Shape ReconstructionIn this talk I will give an overview of some recent work done by my research group in the area of camera calibration and 3D reconstruction. In terms of calibration, I will both address photometric and ... Some Uses of Orthogonal Polynomials ... Sound Transaction-based Reduction without Cycle DetectionModel checking has been used to find numerous bugs in software systems. This success comes from the tool’s ability to enumerate all possible system states. When the system being examined is multithr ... Source Code Evolution with Interactive TransformationsIn this talk, I will present iXj, a hybrid visual/textual notation for describing source-to-source transformations on Java programs, as well as an integrated environment for creating and executing iXj ... Specification-Based Annotation InferenceA great wealth of information about a program may be implicit in the source code itself; for example, in C and C++ this includes parameter usage and NULL-ness, buffer extents, potential taint, and res ... SpeechPad: Multimodal Text Entry on Mobile DevicesAs the prevalence of SMS/IM increases on cell phones and other mobile devices, the need for efficient and robust text entry interfaces increases. By combining speech and keypad inputs, the SpeechPad p ... Spiritual ComputingCan the next generation of technologies advance the spiritual development of individuals and communities? The speaker will argue that several trends ? Web 2.0 innovations, neuroscience?s interactions ... Spoken Language Support for Software DevelopmentMany programmers who suffer from repetitive strain injuries (RSI) and other more severe motor impairments have difficulty staying productive in a work environment that all but requires long hours typi ... Spontaneous Speech: Challenges and Opportunities for ParsingRecent advances in automatic speech recognition (ASR) provide new opportunities for natural language processing of speech, including applications such as understanding, summarization and translation. ... Spook: Science Tackles the AfterlifeWhat happens when we die? Does the light just go out and that's that—the million-year nap? Or will some part of my personality, my me-ness persist? What will that feel like? What will I do all day? ... Spook: Science Tackles the AfterlifeWhat happens when we die? Does the light just go out and that's that—the million-year nap? Or will some part of my personality, my me-ness persist? What will that feel like? What will I do all day? ... Squaring the triangle: Games, Second Life and LibrariesWhat on earth have the "low cultures" of video games, and running around as a made-up avatar in a make-believe digital world, got to do with the "high culture" world of literacy, books and education? ... Stable Marriage of Poisson and LebesgueGiven a point process M of intensity one in the plane, the well-known Voronoi tesselation assigns a polygon (of different area) to each point of M. The geometry of 'fair' allocations (assigning unit a ... Stacked Graphical Learning for Text MiningIn the talk, I will introduce an efficient statistical machine learning approach for classifying networked data, stacked graphical learning. In stacked graphical learning, a base learner is first appl ... State of the Art and Future Trends in Mobile Phone-based Augmented RealityThe talk will outline the history of the Handheld Augmented Reality (AR) project at Graz University of Technology to point out how mobile-phone AR evolved and which further developments are to be expe ... Static Analysis for Identifying and Allocating Clusters of Immortal Objects ... Statistical Failure Diagnosis in Software and SystemsAs software and systems become increasingly complex, the task of debugging also becomes increasingly difficult. Manual diagnosis can require sifting through millions of lines of code and output logs. ... Statistical Learning and Analysis for Unconstrained Face RecognitionAlthough face recognition has been actively studied during the nineties, the state-of-the-art recognition systems perform poorly when confronted with unconstrained scenarios such as illumination and p ... Statistical Machine Learning for Users ModellingJuly 18th, 2007 ... Storied Experiences: Investing in CultureThis talk presents a new design perspective of time-based interactivity and expression, which Lee calls "Storied Experiences". This discourse referred to as ?storiedness?, explores how objects-and-sys ... Strategic Intuition: The Creative Spark in Human AchievementEveryone knows you need creative thinking or entrepreneurial thinking or innovative thinking to compete in the modern world. All of these kinds of thinking amount to the same thing: you figure out wha ... Strategies for Enhancing Ethnic and Gender Diversity in Engineering and Computer ScienceThis presentation will focus on successful strategies for recruiting and retaining an outstanding and diverse engineering workforce. Examples include best practices for proactive search processes that ... Streamlining Scientific Research via Electronic Laboratory Notebooks and Wireless SensorsThis talk will discuss the use of computing to assist research in an academic laboratory environment. Two projects conducted at the MIT BioInstrumentation Laboratory within the framework of the MIT / ... Structural Comparison of Executable ObjectsComparing two executable objects has many different and interesting applications, ranging from 'offensive' security (such as attacking systems) and 'defensive' security (analyzing malware) to legal qu ... Structure and Stability of Complex NetworksMany studies in recent years have shown that many network, such as the Internet and the WWW, as well as other technological, bilogical, and social networks are scale free networks. That is, they posse ... Structure Discovery and Information Brokerage in Sensor NetworksSensor networks are distributed systems embedded in a physical space. This embedding, as well as the nature of the physical laws governing the phenomena observed or monitored by the network, can great ... Studies of Programmers: How Can They Inform Training and Instruction?After 40-mumble years of higher education-based computer science instruction, what do we know about how students learn computing? What can students accomplish after one year? What common problems exis ... Super Crunchers: Why Thinking-by-Numbers is the New Way to Be SmartToday, number crunching affects your life in ways you might never imagine, as organizations are analyzing massive databases at lighting speed to provide insights into human behavior. From internet sit ... Supervised Dimensionality Reduction with Principal Component AnalysisPrincipal component analysis (PCA) is widely applied for unsupervised dimensionality reduction. When labels of data are available, e.g., in a classification or regression task, PCA is however not able ... Support Vector Machines for Structured OutputsOver the last decade, much of the research on discriminative learning has focused on problems like classification and regression, where the prediction is a single univariate variable. But what if we n ... Supporting Construction, Analysis, and Understanding of Software ModelsSoftware systems of today are pervasive, increasingly complex, and error prone. Software bugs lead to a loss of productivity, denial of service, and security breaches, cost millions of dollars to the ... Supporting Effective Interaction with Tabletop GroupwareCurrent computing systems are primarily designed for a single person working alone at a PC, with support for enabling remote collaboration over a network. However, traditional work practices involve n ... Supporting Informal Collaboration in GroupwareShared-workspace groupware has not become common in the workplace, despite many positive results from the research lab. In this talk I will look at one reason for this lack of success: that most share ... Supporting Introspection: From Circuits to SoftwareModern computer systems are called on to deal with billions of events every second, whether they are instructions executed, memory locations accessed, or packets forwarded. Sifting through these data ... Supporting Scalable Online Statistical ProcessingData warehousing and analytic processing have been active areas of database research and development for nearly two decades, and many experts now consider these problems to be "solved", especially wit ... SwitchWare: Lessons Learned, and Where Next?The SwitchWare project proposed to accelerate network evolution by Introducing programmable nodes into the network, enabling innovations to be introduced by network operators or even network users. An ... Symmetry Detection and SymmetrizationIn the first part of the talk, I will first give a brief overview of recent research in my group on 3D shape analysis, modeling, and animation. The second part will be devoted to symmetry. I will disc ... Synchronization and Concurrency for User-Level SystemsConcurrency in user applications is on the rise. Modern computers have multiple hardware threads per processor and multiple processors per chip, each of which may switch to a different software thread ... Synonym Resolution on the WebThe Web is a vast resource of information on practically anything one can think of. Unfortunately, the information is mostly in unstructured text, making it difficult for machines to process. This tal ... Systemization and Application of Large-Scale Knowledge ResourcesThis talk introduces the five-year COE (Center of Excellence) program “Framework for Systematization and Application of Large-scale Knowledge Resources,” that launched in 2003 at Tokyo Institute o ... Systems Challenges in Tiered Sensor NetworksSomeday soon, a ninth-grade biology class, the EPA, and a police department may each seek information from the sensors in a single instrumented city park. How can the police department collect acousti ... Tactical Iraqi - How Learning a Foreign Language Can Be Fun on a ComputerDr. Johnson will be presenting on his innovative language tool Tactical Iraqi. It is game based on the Unreal engine and a language lab with state of the art AI, modeling and voice recognition. This t ... Talk 1: A Data-Oriented Networking Architecture - Scott Shenker
Talk 2: RCP: Congestion Control to Minimize Download Time - Nandita DukkipatiTalk 1:
The current Internet was designed around a host-to-host communication model, but the vast majority of Internet usage today is data access. In this talk, I indulge in the thought experiment of ... TechFest - Applications of Automated ReasoningSeveral recent and fundamental advances have greatly increased the power of automated reasoning tools. Using these advances, Microsoft developed software such as Static Driver Verifier for finding bug ... TechFest 2007 - Executive KeynoteRick Rashid, senior vice president, Microsoft Research and Rico Malvar, managing director, Microsoft Research, Redmond ... Technical Computing @ Microsoft: Lectures Series on the History of Parallel Computing - Part 1Scalable Parallel Computing on Many/Multicore Systems
This set of lectures will review the application and programming model issues that will one must address when one gets chips with 32-1024 core ... Technical Computing @ Microsoft: Lectures Series on the History of Parallel Computing - Part 2Scalable Parallel Computing on Many/Multicore Systems
This set of lectures will review the application and programming model issues that will one must address when one gets chips with 32-1024 core ... Technical Computing @ Microsoft: Lectures Series on the History of Parallel Computing - Part 3Scalable Parallel Computing on Many/Multicore Systems
This set of lectures will review the application and programming model issues that will one must address when one gets chips with 32-1024 core ... Technical Computing @ Microsoft: Lectures Series on the History of Parallel Computing - Part 4Scalable Parallel Computing on Many/Multicore Systems
This set of lectures will review the application and programming model issues that will one must address when one gets chips with 32-1024 core ... Technology Design to Foster Collaboration: A Multidisciplinary ApproachCollaboration is an important part of nearly all work and educational settings. In practice, however, collaboration is rarely perfect; numerous problems arise, ranging from social loafing to coordinat ... Technology MattersTechnology matters because it is inseparable from being human. We have used tools for more than 100,000 years, and their central purpose has not always been to provide necessities. People excel at usi ... Technology, Technology, Everywhere! ... Temporal Memory StreamingWhile semiconductor scaling has steadily improved processor performance, scaling trends in memory technology have favored improving density over access latency. Because of this processor/memory perfor ... Text Summarization: News and BeyondRedundancy in large text collections, such as the web, creates both problems and opportunities for natural language systems. On the one hand, the presence of numerous sources conveying the same inform ... Textual Entailment as a Framework for Applied SemanticsWe have recently proposed Recognizing Textual Entailment (RTE) as a generic task that captures major semantic inferences across different natural language processing applications. The talk will first ... Textual Entailment: Framework, Learning and ApplicationsTextual Entailment has been proposed recently as a generic framework for modeling semantic variability in many Natural Language Processing applications, such as Question Answering, Information Extract ... The (Mis)Behavior of Markets: A Fractal View of Risk, Ruin and ReturnJuly 18th, 2007 ... The Art and Technology of Electronic TextilesThe Art and Technology of Electronic Textiles The Intersection of Material Making and Computation
What will a programmable painting or textile be like? How will it work? How can the physical materi ... The Automated Lecture Capturing and Broadcasting System in MSR's 1159You may already know that lectures given in 113/1159 are being recorded by an automated lecture capturing system on a daily basis. When there is a lecture in progress, you always have the option to go ... The Benefit of Adaptivity in Stochastic OptimizationConsider the Stochastic Knapsack problem where items have deterministic values but random sizes. The motivation for this problem is in the area of stochastic scheduling where a sequence of jobs should ... The Berkeley Wireless Research Center PlatformsThis talk will overview the research of BWRC and highlight recent accomplishments. BWRC is a pioneer in a new wave of university-industry-government partnerships. Our model involves forging deep relat ... The Bilateral Grid and a Topological Approach to Image Segmentation will present our latest results on image and video processing. First, I will introduce the bilateral grid, a new image representation that enables fast edge-aware image processing. Image data is stor ... The Body Noble and Urban FitnessGet a lean, fit body, feel reenergized and stress-free, and stay in great shape without having to hire a personal trainer, race off to an exercise class, or turn your life upside down. Derek Noble wil ... The Case for Opportunistic CommunicationThe ability to exploit transient communication opportunities allows mobile systems to trade off higher performance and dramatically lower energy and monetary costs for an increase in algorithmic compl ... The Case for Technology for Developing RegionsMoore's Law and the wave of technologies it enabled have led to tremendous improvements in productivity and the quality of life in the First World. Yet, technology has had almost no effect on the four ... The Computation of Economic equilibriaWhen and how can computers ?nd market equilibrium? There are many reasons why this question is interesting, stemming from the fact that computers are better at such a task than people. Natural cases o ... The Connection Project: Toward Supporting Virtual Collocation ... The Cricket Indoor Location SystemIndoor location information enables applications such as resource discovery, navigation, interactive virtual games, and location-enhanced sensing. Current location technologies, such as the GPS system ... The Curse of Dimensionality for Local LearningWe present a series of arguments supporting the claim that a large class of modern learning algorithms based on local kernels are highly sensitive to the curse of dimensionality. These algorithms incl ... The Design of a Formal Property-Specification LanguageIn recent years, the need for formal specification languages is growing rapidly as the functional validation environment in semiconductor design is changing to include more and more validation engines ... The Design ProcessBrendan will come and talk about this design process, show a lot of demos of his work, and be available for questions. ... The Devious Logic of Metaphors ... The Diameter and Mixing Time of Critical Random GraphsLet C_1 denote the largest connected component of the critical Erdos-Renyi random graph G(n,1/n). We show that, typically, the diameter of C_1 is of order n^{1/3} and the mixing time of the lazy simpl ... The Economics of Software DependabilityIn most software applications, investments in software dependability compete with investments in such alternate capabilities as functionality, response time, adaptability, and speed of development. In ... The Ellsberg Paradox and the Neural Foundations of Decision-Making Under CertaintyDecision-making under uncertainty is a fundamental activity at every societal level. The decisions, however, can vary greatly in the amount of information available about the outcome probabilities. In ... The Equations: Icons of KnowledgeThe mysteries of the physical world speak to us through equations -- compact statements about the way nature works, expressed in nature's language, mathematics. Sander Bais will discuss the equations ... The Final Conclusion of the Dune SeriesFrank Herbert wrote over 30 bestselling books during his lifetime, including the now classic six novels set in the Dune universe. The first book, Dune, won both the Nebula and Hugo awards and is still ... The Future is not FramedThe ultimate display will not show images. To drive the display of the future, we must abandon our traditional concepts of pixels, and of images as grids of coherent pixels, and of imagery as a sequen ... The Garbage Collection Advantage: Improving Program LocalityAs improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors move objects, they ha ... The Giant ComponentNo Description Available ... The Global Challenge: Giving Students the Tools and Confidence to Solve Global Problems - TogetherThe Global Challenge, recently sponsored by the National Science Foundation ITEST program, supports young women and minority high school students to develop the knowledge, skills and personal vision t ... The Global Challenge: Giving Students the Tools and Confidence to Solve Global Problems - TogetherThe Global Challenge, recently sponsored by the National Science Foundation ITEST program, supports young women and minority high school students to develop the knowledge, skills and personal vision t ... The Grid-Occam ProjectNo Description Available ... The History and Future of Serious GamesComputer games and videogames have morphed from a cottage business into a global media and software industry. While there have been pockets of derivative activity related to game technology, only in t ... The Human Experiment: Two Years and Twenty Minutes Inside Biosphere 2Constructed between 1987 and 1989 and costing more than $200 million, Biosphere 2 was an experiment to test if and how people could create, live, and work inside a closed biosphere while carrying out ... The IonP2P Project: Empirical Characterizations of P2P SystemsDuring recent years, the pervasive deployment of Peer-to-Peer (P2P) systems had a profound impact on the Internet that is even more tangible than the impact of the Web. Ease of deployment and self-sca ... The Jasons: The Secret History of Science's Postwar EliteWorking in secrecy to solve highly classified problems for the Department of Defense, CIA, and NSA is an elite group of scientific advisors who provide the government with analyses on defense and arms ... The Light Portal: 3D Reconstruction and Visualization over Space and TimeMy research focuses on the problems of reconstruction and visualization of three-dimensional objects from images or video streams. I envision the an end-to-end light portal that can capture and "re-en ... The Man Who Knew Too Much: Alan Turing and the Invention of the ComputerIn his talk, Professor Leavitt will focus on the philosophical, mathematical, and psychological underpinnings of Turing's landmark work, in particular Turing's proof of the insolubility of Hilbert's ' ... The Manticore ProjectThe Manticore project is an effort to design and implement a new functional language for parallel programming. Unlike many earlier parallel languages, Manticore is a heterogeneous language that suppor ... The Meaning of the 21st Century: A Blueprint for Ensuring Our FutureHumanity has a 50-50 chance of surviving this century, according to the eminent cosmologist Sir Martin Rees, Britain?s Astronomer Royal. Grim odds indeed, but James Martin, one of the great intellects ... The Microsoft SenseCam and Other Lifelogging DevicesThe SenseCam is a personal, wearable camera developed by Microsoft Research in Cambridge, UK, and used as a lifelogging device in projects like MyLifeBits. Its use in applications like MLB and and the ... The MIT Spoken Lecture Processing ProjectThe increasing availability of online audio/visual academic lecture material enables new and exciting ways for disseminating knowledge that can potentially change the way people learn. Ideally automat ... The Nemerle Project ... The Neurophysiology of Decision Making: Rate Differences and Log Likelihood RatiosWith little sophistication, the spike rates from sensory neurons can be used to approximate useful statistics for decision making. In the context of deciding between two sensory hypotheses, a simple d ... The New Argonauts: Regional Advantage in a Global EconomyLike the Greeks who sailed with Jason in search of the Golden Fleece, the new Argonauts-foreign born, technically skilled entrepreneurs who travel back and forth between Silicon Valley and their home ... The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial and Terrorist DisastersCould ?normal accidents,? the notion of multiple and expected failures, be a built-in part of our society?s complex systems? If so, we need to reevaluate our plans for disaster preparedness and consid ... The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial and Terrorist DisastersCould ?normal accidents,? the notion of multiple and expected failures, be a built-in part of our society?s complex systems? If so, we need to reevaluate our plans for disaster preparedness and consid ... The Perfect Thing: How the iPod Shuffles Commerce, Culture, and CoolnessWith more than 60 million units sold and counting, the iPod is not merely one of the most successful products ever created, but a cultural, economic, and technological phenomenon that has rebooted the ... The Personal Rover Project: Robotics for the MassesThe Personal Rover Project is a comprehensive effort to develop and deploy a low-cost rover platform for diverse environments, including the home. This rover serves as an exploration-centered, creativ ... The Potential of Play: Game Innovation, Expression and LearningIn the shadow of the commercial game entertainment industry, independent and serious game makers are exploring the nature of games, play and learning in projects that have the potential to change the ... The Power of a Positive No: How to Say No and Still Get to YesIn thirty years of negotiation work, William Ury has learned that the most essential skill in negotiating and resolving conflicts is the one the vast majority of us have the most difficulty mastering: ... The Price of Anarchy of Serial Cost Sharing and Other MethodsUsers share an increasing marginal cost technology. A cost sharing method specifies non negative and non transferable cost shares covering costs. We look at the worst surplus gain (relative to the eff ... The promise, the limits, and the beauty of softwareWithin this generation, software has changed the way that individuals collaborate, organizations do business, economies operate, and cultures interact. Software-intensive systems can amplify human int ... The Role of Empirical Study in Software EngineeringAlthough most scientific and engineering disciplines view empiricism as a basic aspect of their discipline, that view has not been the tradition in software engineering. There should be a symbiotic re ... The Role of Skill in Internet UseToday's college students have constant access to information and communication technologies. Yet we know very little about how students are incorporating digital media into their everyday lives. Recen ... The Role of Template Engines in Code GenerationThe documentation for systems that generate or translate programs often use exemplars to describe their output format. These exemplars should become part of the translator itself as formal 'templates' ... The Scaling Limit of Diaconis-Fulton AdditionGiven finite sets A and B in the lattice, the Diaconis-Fulton sum is a random set obtained by starting one particle at every point of their symmetric difference, and two particles at every point of th ... The Science of Finding True FulfillmentBerns argues the more complicated and challenging a life you pursue the more likely it is that you will be satisfied. Investigating the brain and its hunger for new experiences, Dr. Gregory Berns surv ... The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our CultureBattelle's blog: www.battellemedia.com
What does the world want? According to John Battelle, a company that answers that question in all its shades of meaning can unlock the most intractable riddl ... The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our CultureBattelle's blog: www.battellemedia.com
What does the world want? According to John Battelle, a company that answers that question in all its shades of meaning can unlock the most intractable riddle ... The Semantic Web in ActionSix years ago in Scientific American, Tim Berners-Lee, James Hendler and Ora Lassila unveiled a nascent vision of the Semantic Web: a highly interconnected network of data that could be easily accesse ... The Semantic Web: Myth and RealityThe extraordinary human construct that is the World Wide Web is a truly Disruptive Technology. There are now hundreds of millions of users, billions of indexed web resources, it is used in every count ... The Sharp Form of the Strong Szego TheoremThis talk will discuss a proof of the Strong Szego theorem on the second term in the asymptotics of Toeplitz determinants. After a brief discussion of the history, I'll discuss the elementary argument ... The Space Elevator and Our FutureThe Space Elevator is a radical technology for accessing space. The concept was first published in 1960 and was subsequently popularized in science fiction stories. After the discovery of carbon nanot ... The Stanford Data Stream Management SystemThis talk will describe our development of the Stanford Stream Data Manager (STREAM), a system for executing complex continuous queries over multiple continuous data streams. The STREAM system support ... The Trouble with PhysicsTheoretical physicist Smolin argues that the study of physics has lost its way in the past two decades, largely because string theory has captured the imagination of both the public and some prominent ... The Truth is Out There: Aggregating Answers from Multiple Web SourcesJuly 18th, 2007 ... The TStreams Model: A new approach to parallel programmingA common approach in designing parallel languages is to provide some high level handles to manipulate the use of the parallel platform. This exposes some aspects of the target platform, for example, s ... The Weather Makers: How Man is Changing the Climate and What it Means for Life on EarthSometime this century the day will arrive when the human influence on the climate will overwhelm all other natural factors. Over the past decade, the world has seen the most powerful El Ni?o ever reco ... The WiFi eTransit VillageAs a foundational research project of the Federal Transit Administration, the GeoGraphics Laboratory at Bridgewater State College has developed of a web-based transit technology prototype focused on t ... The Zecosystem: Cyberinfrastructure Education and Discovery for the Next GenerationLearning experiences of the future will be multi-sensory, engage technologies and significant computational power continuously and invisibly, and will be completely engaging. The Zecosystem will offer ... Thirty Years of Social Computing: Are We Finally Ready to Scale?No Description Available ... This is Your Brain on Music: The Science of a Human ObsessionA fascinating exploration of the relationship between music and the mind, and the role of melodies in shaping our lives
Whether you load your iPod with Bach or Bono, music has a significant role in ... This is Your Brain on Music: The Science of a Human ObsessionA fascinating exploration of the relationship between music and the mind, and the role of melodies in shaping our lives
Whether you load your iPod with Bach or Bono, music has a significant role in y ... Tool Support for Proof EngineeringModern integrated development environments (IDEs) provide programmers with a variety of sophisticated tools for program visualization and manipulation. These tools assist the programmer in understandi ... Toolkit for Construction and Maintenance of Extensible Proof Search TacticsTheorem provers for higher-order logics often use tactics to implement automated proof search. Often some basic tactics are designed to behave very differently in different contexts. As new axioms, de ... Tools and Techniques for Prototyping Future InteractionsUser interface tools aid in the design and development of interactive systems. The next generation of user interfaces is moving off the desktop: these emerging interfaces employ novel input techniques ... Tools and Techniques for Understanding and Defending Real SystemsMy research philosophy is to approach security not as a problem to be solved, but as a battle for defenders (such as antivirus professionals, law enforcement, and next-generation security technology d ... Touched with Light: Scanned Beams Display or Capture Information at Video RatesPeople like to look at images and interact with them. We will show how scanned beam technology can either display, or capture images, and that this makes it unique when compared to other display techn ... Toward an Interpersonal Neurobiology of the Developing MindWill a better understanding of the human brain enable engineers to build better interfaces and operating systems? Dan Siegel will discuss neurobiology and its implications for computing. He will intro ... Toward Human Computer Information RetrievalClassical information retrieval had yielded novel techniques for applying computers to retrieval problems, including WWW search engines.
The classical model of retrieval is one of matching queries ... Toward Practical Dynamic Software Updating for CSoftware systems are imperfect, so software updates are a fact of life. While typical software updates require stopping and restarting the program in question, many systems cannot afford to halt servi ... Toward the Next Generation Interaction Space: Tangible Space InitiativePreviously, human computer interaction (HCI) issues in ubiquitous or pervasive computing and virtual and augmented reality have been largely carried out in separate research communities. Given major a ... Towards a Memory Model for C++Many C and C++ programs use threads interfaces such as pthreads or the win32 threads API, either for program structuring, or to take advantage of multiprocessors. Although at least the pthreads specif ... Towards Accurate Internet Distance PredictionInternet distance prediction provides proximity information without extensive network probings. Recent studies have revealed that the quality of existing prediction mechanisms is short of being satisf ... Towards Agnostically Learning HalfspacesA longstanding open problem in computational learning theory is that of learning halfspaces in the agnostic model of Kearns, Schapire and Sellie (which model can also be viewed as learning with advers ... Towards Concept-Based Text Understanding and MiningMost information in the world exists in the format of text, such as news articles and web pages. Different lines of research have been conducted to allow a computer system to pinpoint knowledge from t ... Towards Expressive and Scalable Publish/SubscribePublish/subscribe (pub/sub) is a powerful paradigm, which enables asynchronous interaction in large distributed applications ranging from Enterprise Application Integration (EAI) to Internet-scale new ... Towards HardLANs: Building Network Intrusion Detection to 1 Gbps and BeyondWith the advent of worms, passive malcode, and sophisticated attackers, the 'Big Firewall' model of security has failed. To build robust commercial networks in the future, security will need to move i ... TQFTs and Tight Contact Structures on 3-ManifoldsTopological quantum field theory methodology provides interesting perspectives on the classification of tight contact structures on 3-manifolds. It turns out that there are interesting unsolved proble ... Tractable Learning of Structured Prediction ModelsStructured prediction is a fundamental machine learning task involving classification or regression in which the output variables are mutually dependent or constrained. Such dependencies and constrain ... Trade-Offs in Cost-SharingAuctions often involve multiple objectives in conflict. We focus on cost-sharing mechanisms for network design problems. Such auctions incur a cost dependent on the subset of players serviced. We woul ... Traits in C# ... Transactional Coherence & ConsistencyWith uniprocessor systems running into ILP limits and fundamental VLSI constraints, parallel architectures provide a realistic path towards scalable performance. Nevertheless, shared memory multiproce ... Transactional, Persistent, Managed Runtime EnvironmentsNo Description Available ... Transition InvariantsProof rules for the temporal verification of concurrent programs rely on auxiliary assertions. We propose a (sound and relatively complete) proof rule whose auxiliary assertions are transition invaria ... Translation Validation of Optimizing CompilersThere is a growing awareness, both in industry and academia, of the crucial role of formally verifying the translation from high-level source-code into low-level object code that is typically performe ... Tutorial on Foundations of Probabilistic Answers to QueriesProbabilistic query answering is a set of techniques used in several, very recent database applications: exploratory queries in databases, novel IR-style approaches to data integration, querying infor ... Type Systems for Multithreaded SoftwareDeveloping correct multithreaded software is very challenging, due to the potential for unintended interference between threads. We present type systems for verifying two key non-interference properti ... Type-Safe, Generative, Binding MacrosMacros are powerful tools that can facilitate resuse. But, with few exceptions, macros have traditionally been viewed as operations on syntax trees or even on plain strings. This view makes macros see ... Typed Compilation of .NET Common Intermediate Language ... Ubiquitous Context-Aware Computing: Experience and Emerging ChallengesStanding at the crossroads of the ActiveCampus Project and the Campus of the Future Project, it is appropriate to pause and consider what we've learned, and what that foretells. I will argue that a ne ... Ubiquitous Reflective TechnologiesI am constructing a deep understanding of people¹s emotional relationships with products, environments, and experience and using this understanding to inform better design, reflection, and teamwork w ... Uncoupled Dynamics and Strategic EquilibriumThe dynamical system in the repeated play of a game is "uncoupled" if each player initially knows only his own payoff function. We study the effects of this natural assumption on the possibility and i ... Uncovering Semantic Similarities Between Query TermsIn this talk, we propose a new measure for the semantic similarity of query terms based on the statistical correlation of their frequency functions. We develop an efficient way to approximate this mea ... Understanding and Designing for Physically Large DisplaysPhysically large displays are becoming prevalent in the workplace. Although many researchers have articulated qualitative benefits of large displays, little has been done to quantify and exploit these ... Understanding and Improving Wireless NetworksThe ubiquity of wireless networks has led to massive efforts to understand and improve wireless network performance, and to leverage wireless technology to provide exciting new applications to users. ... Understanding and Surviving Internet Path FailuresThe Internet has experienced an exponential growth in recent years, so has its complexity, which can lead to more network-layer instabilities. What we urgently need today is a better understanding of ... Understanding Customers: Shaping Our Future Through Understanding Social ChangeHow do you make sure you can see and understand the critical social processes of your customers-both the millions who have adapted to the emerging social age and the millions who haven't yet made this ... Understanding Customers: Shaping Our Future Through Understanding Social ChangeHow do you make sure you can see and understand the critical social processes of your customers-both the millions who have adapted to the emerging social age and the millions who haven't yet made this ... Understanding Human Movements to Enhance HCI EnvironmentsProfessor Yoky Matsuoka’s research at Carnegie Mellon University is directed toward developing devices and algorithms to understand, assist, and enhance human motor control capabilities. Recent proj ... Understanding Human Movements to Enhance HCI EnvironmentsProfessor Yoky Matsuoka’s research at Carnegie Mellon University is directed toward developing devices and algorithms to understand, assist, and enhance human motor control capabilities. Recent proj ... Understanding Visual Scenes in 200 msec: Results from Human and Modeling ExperimentsOne of the remarkable aspects of human image understanding is that we are able to recognize the meaning of a novel image very quickly and independently of the complexity of the image. This talk will r ... Unified Dimensionality Reduction: Formulation, Solution and BeyondIn this talk, I will address the feature dimensionality reduction problem within a unified framework from three aspects: 1) Graph Embeddingand Extensions: A unified framework for general dimensionalit ... Universal techniques to analyze preferential attachment trees: Global and Local analysisWe use embeddings in continuous time Branching processes to derive asymptotics for various statistics associated with different models of preferential attachment. This powerful method allows us to ded ... UnknowableThe last time Bruce gave a talk here he riffed off articles in the morning’s newspaper and I laughed so hard I cried. He is on tour for his new book, Zenith Angle, but I expect he’ll talk about wh ... Upcrossing Inequalities for Stationary SequencesLet $g$ be a function which assigns to each stationary process $X_n$ and to each sample $X_1, X_2 ,..., X_n$ of the process a real number $g(X_1, ... ,X_n)$, which may also depend on the distribution ... Usabilitea: Improving Access Where Interaction Design and Semantic Web MeetMany of us interested in supporting effective access to online information are looking at the Semantic Web as a promising technology to improve web-based information sharing and discovery.
New mod ... User Centric and Infrastucture Aspects of Pervasive ComputingAs an introduction, the known challenges of pervasive/ubiquitous computing (UbiComp) are rephrased following a categorization into five main areas, abbreviated as S.C.A.L.E. Next, the talk briefly int ... Using .NET and Web Services to Build an e-Science Application: Looking for White Dwarfs ... Using ACTIVboard In Interactive PresentationsMelissa Whit, the Washington Rep for Promethean, will be bringing in a Promethean ACTIVboard to demonstrate to us. ... Using Machine Learning to Verify SystemsAutomated verification of software systems is a challenging problem because of their large (and often infinite) state-space. In this talk, we explore techniques from computational learning theory for ... Using Shared Displays to Create a Collaborative Classroom Learning Environment ... Using Statistical Monitoring to Detect Failures in Internet ServicesToday, we are increasingly building large and complex systems whose workings we do not understand, and this lack of understanding translates into systems that are hard to manage and have low availabil ... UW/Microsoft 8th Symposium in Computational LinguisticsWilliam Lewis, Manuela Noske, Dong Yu ... Variable-Aperture PhotographyIn this talk I will describe three projects that harness the potential of variable-aperture photography -- capturing multiple photos by manipulating basic lens controls such as aperture and focus. I w ... Variance Analyses from Invariance AnalysesAn invariance assertion for a program location "n" is a formula that always holds at "n" during execution of the program. Program invariance analyses infer invariance assertions that can be useful whe ... Verifying Safety Policies with Size Properties and Alias ControlsMany software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typing) has been successfully a ... Video Synopsis: Making an Infinite Video ShorterThe power of video over still images is the ability to represent dynamic activities. But video browsing and retrieval are inconvenient due to inherent spatio-temporal redundancies, where some time per ... Viewing Privacy as a Security PropertyIn recent years user privacy has become an issue for computer system designers, service providers, and an active field of study in academia. Yet it is often seen as a side-issue, or an add-on to alrea ... Vinegar: Leading Indicators in Query LogsJuly 18th, 2007 ... Virtual Coupling Schemes for Position Coherency in Networked Haptic Virtual Environments#Error ... Virtual Customer Environments & Customer Involvement in Innovation and Value CreationThe infusion of new information technologies in customer-firm interactions has redefined the roles customers can play in value creation and product innovation. Several companies (e.g. Microsoft, HP, P ... Virtual Machines: The Ultimate Tool for Computer ForensicsThe field of computer forensics seeks to help investigators reconstruct what happened during a computer intrusion. Did an attacker break in, and if so, how? What havoc did the attacker wreak after bre ... Virtual Reality Therapy: Using Immersive Virtual Reality Games to Help Reduce SufferingMy colleague Dave Patterson and I originated the technique of letting pediatric burn patients escape into virtual reality during painful medical procedures at Harborview Burn Center in Seattle (with h ... VISP: Visualizing Information Search ProcessesJuly 18th, 2007 ... Visual Classification by a Hierarchy of Semantic FragmentsWe describe visual classification by a hierarchy of semantic fragments. In fragment-based classification, objects within a class are represented by common sub-structures selected during training. Here ... Visual Recognition and Tracking for Perceptive InterfacesDevices should be perceptive, and respond directly to their human user and/or environment. In this talk I'll present new computer vision algorithms for fast recognition, indexing, and tracking that ma ... Visualizing Social Interactions and Collaboration HistoryNo Description Available ... WACE 2005 - GaiaNo Description Available ... WACE 2005 - Keynote ... Waitomo: Web-Programming with Objects and InterfacesWaitomo is an experimental programming language derived from Java. It aims to strengthen the guarantees of type safety by eliminating the need for casting without sacrificing the flexibility of the ob ... Wavelets in Real-time RenderingWhen we look at the world, we see objects, or more precisely, we perceive the ?instant imaging? of these objects which are actively interacting with the dynamic lighting environment. There are various ... Web Services for HPC - Making Seamless Computing a RealitySeamless HPC has been a goal of Computer and Computational Scientists for over a decade. Allowing researchers to focus on their research and not the quirks of complex HPC environments has been a dream ... Welcome - Overview of the dayJuly 18th, 2007 ... What Analytical Performance Modeling Teaches Us About Computer Systems DesignComputer systems design is based on many commonly-held beliefs and heuristics, many of which have never been challenged:
* Thousands of server farm "load balancing" policies do exactly that: they ... What Is "Community" Anyway? ... What Makes for Success in Science and Engineering Collaboratories? ... What the Web Means for ScienceThe web is turning the publishing world upside down, and scientific publishing is no exception. But this is just part of an even bigger trend in which networked computing is revolutionizing the very p ... When Can Formal Methods Make a Real Difference?This talk will consider a few cases from the ACM Risks Forum archives for which the sensible use of formal methods could have made a decisive difference in avoiding serious consequences -- with respec ... When Separation Logic Met JavaSeparation logic is a promising new approach to modular reasoning, but so far it has primarily been applied to low-level C-like languages. To extend separation logic to allow modular reasoning about o ... Where Google and Libraries MeetWith the beta releases of Google Scholar and Google Book Search, Google is positioning itself in the library space as a key resource for many library patrons. This paper will look in more detail at th ... Which graphs are extremal graphs?Consider a problem in extremal graph theory of the following type: find the maximum density of a subgraph F in a graph, where the density of one or more other subgraphs are fixed. More generally, we m ... Why Almost All K-Colorable Graphs Are EasyColoring a $k$-colorable graph using $k$ colors ($k\geq 3$) is a notoriously hard problem. Considering average case analysis allows for better results. In this work we consider the uniform distributio ... Winning the DARPA Grand Challenge [Robotics]The DARPA Grand Challenge has been the most significant challenge to the robotics community in more than a decade. It required to build an autonomous robot capable of traversing 132 miles of punishing ... Wireless Embedded Networks/The Ecosystem and Cool ChallengesWireless Embedded Networks span a much broader field than just 'Sensor Networks' as popularized by recent press. Today's presentation will cover:
- a brief overview of Ember Corporation
- an over ... Wireless Network Coding for Multiple Unicast SessionsA recent approach, COPE, for improving the throughput of unicast traffic in wireless multi-hop networks exploits the broadcast nature of the wireless medium through opportunistic network coding. In th ... Words, Links, and Patterns: Novel Representations for Web-Scale Text MiningTextual data is everywhere, in email and scientific papers, in online newspapers and e-commerce sites. The Web contains more than 200 terabytes of text not even counting the contents of dynamic textua ... WorldWind ... XML Full-Text Search and ScoringOne of the key benefits of XML is its ability to represent a mix of structured and text data. Querying XML is a well-explored topic with powerful database-style query languages such as XPath/XQuery se ... Xtatic: Native XML Processing for C#No Description Available ... You Can (Almost) Have it Both! Low Distortion Texture Mapping with Circle PatternsCreating a map from an arbitrary surface to a flat domain is the age old problem of cartography. In computer graphics applications this problem is often presented as the quest for low distortion mappi ... Zero Configuration Networking with BonjourThe desirability of making IP networking easy to use has been obvious for many years, but achieving that goal has proved elusive. One day, Stuart Cheshire got tired of the Stanford Computer Science Ph ...
| |