Microsoft Research Cambridge Talks Admins
| Name: | Microsoft Research Cambridge Talks Admins |
| Affiliation: | Microsoft |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 18 Sep 2024, 12:54 p.m. |
Public lists managed by Microsoft Research Cambridge Talks Admins
- AI+Pizza
- Datalog for Program Analysis: Beyond the Free Lunch
- Frontiers in Artificial Intelligence Series
- Microsoft Research Cambridge, public talks
- Microsoft Research Machine Learning and Perception Seminars
- Optics for the Cloud
- The Microsoft AI Residency
- Type the title of a new list here
- Type the title of a new list here
Talks given by Microsoft Research Cambridge Talks Admins
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Microsoft Research Cambridge Talks Admins
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Microsoft Research Cambridge Talks Admins actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Beyond Flatland: A Geometric Take on Matching Methods for Treatment Effect Estimation & Efficient World Models with Context-Aware Tokenization
- The second generation of meta-learning methods
- Assisting in the response to the COVID19 pandemic using internet data, Dr Elad Yom-Tov - MSR Cambridge, Lecture Series
- Distributed distributional codes for learning successor features in partially observable environments
- Adaptive laser fabrication for future photonic technologies
- Sankie: Using Data to Build Better Systems and Services
- Ultrafast laser writing of integrated waveguides toward quantum sources
- Machine Learning Meetup
- Deep (Inter-)Active Learning for NLP: Cure-all or Catastrophe?
- Deep (Inter-)Active Learning for NLP: Cure-all or Catastrophe?
- Algorithmic Differentiation (AD) Beyond Back Propagation
- Moonshot Thinking to Unleash Innovation, Dr Pablo Rodriguez - Telefonica Alpha: MSR Cambridge, Lecture Series
- The Mobile Computing Platform after Smartphones - Prof Romit Roy Choudhury: MSR Cambridge, Lecture Series
- Photonic-chip-based soliton microcombs
- Advanced polarized light microscopy for mapping molecular orientation
- Three case studies for coexisting mechanisms in protein-pattern forming systems
- Modeling User Experience in Games: Lessons Learned
- Physical security and side channel attacks in Arm based SoCs
- Using reason and evidence to do the most good
- How good is your classifier? Revisiting the role of evaluation metrics in machine learning
- Antennas for light and their applications in classical optics
- PRECOG: PREdiction Conditioned On Goals in Visual Multi-Agent Settings
- Photons in the cloud: communicating and storing data
- Photonics for Computing: from Optical Interconnects to Neuromorphic Architectures
- Pizza & AI June 2019
- Pizza & AI April 2019
- Canopus and RCanopus: Scalable Consensus for Permissioned Blockchains
- Canopus and RCanopus: Scalable Consensus for Permissioned Blockchains
- An introduction to clustering and the expectation maximisation algorithm Part 2
- An introduction to clustering and the expectation maximisation algorithm Part 1
- MSR Cambridge Cloud Talk Series; Structured light: seeing less to see more in optical microscopy
- What difference does one tonne make?
- Open Issues in Build Systems
- Neural Code Comprehension: A Learnable Representation of Code Semantics
- Pizza & AI February 19
- An Introduction to Simple Markov Models
- Pizza & AI January 2019
- What Can Fair ML Learn from Economic Theories of Distributive Justice?
- Idris 2: Type Driven Development of Idris
- AI + Pizza October 2018
- Flux: Elegant Machine Learning with Julia
- AI + Pizza September 2018
- Simulation for Intelligent Systems
- AI+Pizza July 2018
- Neural Ordinary Differential Equations
- Interpretability in Machine Learning: What it means, How we're getting there
- Combating Student Mental Illness with Technologyâfrom the Imagine Cup UK Finals
- AI+Pizza June 2018
- DiCE: The Infinitely Differentiable Monte-Carlo Estimator
- Herding Nulls â and other C# stories from the future
- Windows Insider Program
- AI+Pizza April 2018
- AI+Pizza February 2018
- AI+Pizza January 2018
- Optimal algorithms for smooth and strongly convex distributed optimization in networks
- Bayesian Generative Adversarial Networks
- Letâs speed up the Internet, fast!
- Rethinking the Quantified Self to make personal data engaging and useful
- Probabilistic and Deep Models for 3D Reconstruction
- Manifest Sharing with Session Types
- Coin Betting for Backprop without Learning Rates and More
- How Can NLP Help Cure Cancer?
- AI and Healthcare Open Evening at Microsoft Research
- Composition and Inheritance in Declarative Configuration Languages
- Composition and Inheritance in Declarative Configuration Languages
- Nonlinear ICA using temporal structure: a principled framework for unsupervised deep learning
- Microsoft & the Future of Education Technology & Learning
- Predicting 3D Volume and Depth from a Single View
- Predicting 3D Volume and Depth from a Single View
- Security and Privacy in Machine Learning
- Security and Privacy in Machine Learning
- Engineering the Future: Engineering in Artificial Intelligence at Microsoft Research Cambridge
- Computing In Schools: How Your Skills Can Change Lives
- Queueing with Redundant Requests: A more realistic model
- Managing Privacy Tradeoffs in the Internet
- Resource Allocation for Next Generation of Radio Access Networks: how effective are my schedulers?
- Engineering the Future: an open evening for women in engineering
- Information-Theoretic Bounded Rationality
- Into the Mountains: The Extraordinary True Story of Survival in the Andes and its Aftermath
- Opportunistic Storage Maintenance (SOSPâ15)
- End-user programmers need first-class software engineering tools
- Modern Deep Learning through Bayesian Eyes
- From Boolean to Quantitative Methods in Formal Verification
- Rethinking Storage and Networking in Next Generation Racks
- Talking with Reddit: Exploring limitations of recurrent neural network conversational systems.
- Incremental Neuroevolution of Reactive and Deliberative 3D Agents
- Title to be confirmedMaking sense of language: It's okay to count
- Probabilistic Line Searches for Stochastic Optimisation.
- The structures of induction and co-induction.
- "Protecting the forward edge: Is that light at the end of the tunnel?"
- Plug into the Supercloud
- Solving Second-Order Constraints with Program Synthesis
- Capturing and simulating the interaction of light with the world around us.
- Standing on the Shoulders of a Giant: One Personâs Experience of Turingâs Impact
- Bonsai: Reactive Tools for Data Science
- Rendering Eyes for Eye-Tracking
- Generative Models for Shape and Appearance
- Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures
- VISC: VIRTUAL INSTRUCTION SET COMPUTING
- Intelligible Machine Learning Models for HealthCare
- Queues donât matter when you can Jump them!
- Declarative query processing in imperative managed runtimes
- "... and then just encode it to SAT."
- Enabling Connected Cars through Named Data.
- Probability and Prejudice: Bridging the Gap Between Machine Learning and Programming Languages
- Formal verification approach to modelling biochemical systems
- An Efficient Solver for string and regular expression constraints
- A Visual Programming Language for building Artificial Biochemistries in Haskell
- Unveiling the Secrets of High-Performance Datacenters
- Pushing the Limits of Localization and Capacity in Today's Wi-Fi Networks
- Social Media Predictive Analytics: Methods and Applications
- Can you convince me why your software works?
- Convex low-rank models: from matrices to tensors
- Relational Machine Learning for Knowledge Graphs.
- Supporting the Mobile Nomadic User through Projected User Interfaces
- Ensembles for Discovery of Compact Structures and Learning Back-propagation Forests.
- Content Placement as a Key to Leveraging Geo-Distributed Infrastructures
- Text To Programs: Automating Computer Tasks from Natural Language Descriptions
- Automatic differentiation and machine learning
- Supporting Proxemic Interactions with Multi-Scale Electric Field Sensing
- Supporting Proxemic Interactions with Multi-Scale Electric Field Sensing
- Programming and Proving with Fine-Grained Concurrent Resources
- Design and Evaluation of Proxemic-Aware Environments to Support Epistemic Activities
- Workshop: Machine Learning in Cambridge 2015
- Death, Identity, and the Social Network
- Considering Tools for Artists, Creative Processes, and Design Ideation
- Beyond acceleration: time, narratives, and the design of multiple worlds
- Un-Computing: Shaking off the âComputerâ Baggage
- Solving QBF by Counterexample-Guided Abstraction Refinement
- Protecting encrypted cookies from compression side-channel attacks
- Context-aware programming languages
- Towards Full-Stack Security Analysis of Web Applications
- The Difficulty of Preventing Code Reuse Attacks
- Modeling, Quantifying, and Limiting Adversary Knowledge
- Concurrent Algorithms for Emerging Hardware Platforms
- The Turing trap. How the universal computer is making the internet less secure.
- Meta-Interpretive Learning and Program Induction
- Manifold correspondence: a signal processing perspective
- Predictable and Dependable Low-power Wireless Networks
- Engineering at Microsoft Research - Open Evening
- Microsoft Distinguished Research Lecture - Laws of Programming with Concurrency
- Laws of Programming with Concurrency
- Causal Inference and Domain Adaptation
- Cutting tail latency in cloud data stores via adaptive replica selection
- Genome-wide transcriptional control of blood cell type identity
- Democratizing Electronics: Tools, Examples, and Contexts for Supporting the Construction of Personally-Meaningful Interactive Artifacts
- Dynamic PDP vs. Dynamic POR: Are they really different?
- Bedrock: A Software Development Ecosystem Inside a Proof Assistant
- Checking microarchitectural implementations of weak memory
- Machine Learning in an Exchange Environment
- Platforms and Applications for "Big and Fast" Data Analytics
- Coping with the Intractability of Graphical Models
- Microsoft Distinguished Research Lecture Series - Technological Innovation in Healthcare
- The Physical Web
- On Basing One-Way Functions on NP-Hardness
- Taming GPU threads with F# and Alea.GPU
- Reasoning about GADT Pattern Matching in Haskell
- Robust Distance Queries on Massive Networks
- An Approximate Differentiable Renderer
- Ancient lives, new discoveries: eight mummies, eight lives, eight stories
- Logic programming beyond Prolog
- RDFox â A Modern Materialisation-Based RDF System
- Lottery Auctions
- A link between lambda calculus and maps
- First-person Hyperlapse Videos
- Do Deep Nets Really Need To Be Deep?
- Discursis: A Computational Methodology for the Analysis of Communication Data
- A Case for using Trend Filtering over Splines
- Local Deep Kernel Learning for Efficient Non-linear SVM Prediction
- Micro-Policies: A Framework for Tag-Based Security Monitors
- End of Internship Talk: F# Type Providers: DBpedia and the Combinator Framework
- Hedging Against Uncertainty via Multiple Diverse Predictions
- Beyond Mindless Labeling: *Really* Leveraging Humans to Build Intelligent Machines
- Compositional Models
- Representing microbial communities in Earth system models
- Towards Zero Latency Photonic Switching
- Computational Video: Methods for Video Segmentation and Video Stabilization, and their Applications.
- Systems, Science and FreeBSD
- The Integral Image Method for Fisheye Images
- FsLab: Doing data science with F#
- A Verified Compiler for Probability Density Functions
- Byte Night Cambridge
- Image representation for synthesis and recognition using multilinear algebra
- The Brave New World of Next-Generation NoSQL Data Stores
- Steps toward usable verification
- Practical Techniques for Auto-Active Verification
- Majority is not Enough: Bitcoin Mining is Vulnerable
- FSCL: homogeneous programming and execution for heterogeneous platforms
- How to Give a Great Research Talk
- The Once and Future Internet
- How to Write a Great Research Paper
- Local Temporal Reasoning
- A Modular Integration of SAT/SMT Solvers to Coq through Proof Witnesses
- Geo-replicated storage with scalable deferred update replication
- Tips and Tools for Scientific Research Success
- efwefd
- Algebra of Parameterised Graphs
- Computer Vision for Movie Making and Infographics
- A Collapsible Approach to Higher Order Verification
- Thinking for Programmers: Rising Above the Code
- The Art of Corporate Storytelling
- Mid-level Likelihoods and Constraints for 3D Scene Interpretation
- Protecting Programs During Resource Retrieval
- The shadowy life of many webcams
- The Art of Corporate Storytelling
- Seeing in depth: computations and cortical networks
- Crafting Visualizations
- Sustainable IT and IT for Sustainability
- Bandits with Switching Costs: T^{2/3} Regret
- Publish/Subscribe for Large-Scale Social Interaction: Design, Analysis and Resource Provisioning
- Decision Making and Inference under Limited Information and Large Dimensionality
- Incremental Parallel and Distributed Systems
- IC3 Modulo Theories via Implicit Predicate Abstraction
- Rich semantic representations for detailed visual recognition
- Globally Optimizing Graph Partitioning Problems Using Message Passing
- Characterizing and Improving Last-Mile Performance Using Home Networking Infrastructure
- Performance Optimizations for Compiler-based Error Detection Methodologies
- Automatic Differentiation - Part One: A Revisionist History and the State of the Art
- Scaling Deep Learning
- Using ConvNets, MALIS and crowd-sourcing to map the retinal connectome
- Data Driven Student Feedback For MOOCs: Global Scale Education for the 21st century
- Part Detection and Species Identification
- The Performance of Deferred-Acceptance Heuristic Auctions
- Trouble-makers: Audio-video distortions as a relational resource in couplesâ video calls
- Mechanism design for Cloud Computing and Crowdsourcing
- Achieving the Full Potential of State Machine Replication: High Throughput, Low Latency, Constant Availability
- Designing Controller Abstractions for Software-Defined Networks
- Rethinking State-Machine Replication for Multicore Architectures
- Computational foundations of Bayesian inference and probabilistic programming
- An Online Allocation Mechanism with Pre-Commitment and its Application to Electric Vehicle Charging
- Generative probabilistic programming: applications and new ideas
- Topological Data Analysis: potential applications to computer vision
- Declarative Static Program Analysis
- FaRM: Fast Remote Memory
- The persistence of structure: Layers, time, and the estimation of optical flow
- Efficient Preconditioning of Laplacian Matrices for Computer Graphics
- A Combinatorial Prediction Market for the US Elections
- Bayesian Machine Learning for Controlling Autonomous Systems
- Bayesian Machine Learning for Controlling Autonomous Systems
- Real time control with lots of humans in the loop
- Typed functional probabilistic programming: ready for practical use?
- Reasoning about Eventual Consistency
- Principles and Techniques of Automatic Differentiation
- Hardware Neural Network Accelerators
- Programming Approximate Systems
- Image Classification Using a Background Prior
- Automatic Differentiation - Part Two: AD meets SDG and PLT
- Automatic DifferentiationPart One: A Revisionist History and the State of the Art
- Depot: from Byzantine fault tolerance to eventual consistency in a single system
- Randomized tree ensembles: output kernels and variable importances
- Language based web security: the operational semantics approach
- Language based web security: the operational semantics approach
- Algebraic methods in computer vision and automatic generation of efficient algebraic solvers
- Multimodal Gaze-Supported Interaction
- Discovering the Structure of Visual Categories from Weak Annotations
- Memristors: The Future of Computer Memory and Neuromorphic Circuits?
- A Bigger and Faster Bitcoin: an Analysis of High-Rate Bitcoin Transaction Processing
- Type Refinement in the Abstract
- Reflection methods for user-friendly submodular optimization
- A Framework for Automatically Enforcing Privacy Policies
- Anomaly Detection in the Field
- Compositionality in Vision and Language
- Five machine learning research topics at Oxford CS
- Active Pedestrian Safety: from Research to Reality
- Managing the Network with Merlin
- Robust Models of Mouse Movement on Dynamic Web Search Results Pages
- How Watson Learns Superhuman Jeopardy! Strategies
- Inextensibility constraints for 3D reconstruction of deformable objects
- Auctioning based Coordinated TV White Space Spectrum Sharing for Home Networks
- Big Data and Dark Silicon: Taming Two IT Inflection Points on a Collision Course
- Disciplined Approximate Computing: From Language to Hardware, and Beyond
- QUIC Graphs: Relational Invariant Generation for Containers
- Is The Rise of Cloud Storage, Cloud Computing and Social Networks a Consequence of a Failed OS (Operating System) Design?
- Want Effective Security Solutions? Let's Re-Think The Design Approach
- Static Analysis of Cache Side Channels
- Proving Equivalences Between Prolog Semantics in Coq
- Foundations of Neuromechanical Systems Biology: Combining engineering, biology, and mathematics to understand how we move
- Deep Gaussian Processes
- Censorship Circumvention: Staying Ahead in a Cat-and-Mouse Game
- 3D Reconstruction using Point-Based Fusion
- Improving Time-of-Flight Range Data Quality
- The Relationship Between Separation Logic and Implicit Dynamic Frames
- Strategies for General Recognition
- Fast and Guaranteed Learning of Overlapping Communities via Tensor Methods
- Datalog for Program Analysis: Beyond the Free Lunch
- The cost of principles
- Optimizing Placement of Services for Real Time Communication
- KAT on a Wire: A Foundation for Network Programming
- SWAN: Software-driven wide area network
- Validating SAT Refutations
- Data Structures for Efficient Inference and Optimization in Expressive Continuous Domains
- Bridging the Discrete and the Continuous in Reasoning about Programs
- âWhen is fair sharing optimal?â
- Automated Analysis of Probabilistic Programs
- Noise estimation by PDE-constrained optimisation
- Very high speed networking in VMs and bare metal
- Reaping the Benefits of Partial SDN Deployment in Enterprise Networks
- NetFPGA: The Flexible Open-Source Networking Platform
- Building Better Questionnaires with Probabilistic Modelling
- Language-Integrated Quantum Operations: A Software Architecture for Quantum Computing
- Modular reasoning for modular concurrency
- Theory and Practice of Mix-Nets
- Cryptoforma: Computer-Aided Cryptographic proofs with EasyCrypt
- Understanding and Improving the Efficiency of Failure Resilience for Big Data Frameworks
- From Bounded to Unbounded Proofs of Correctness
- Big Data Analytics with All-or-Nothing Parallel Jobs
- Intelligent Location-Privacy Preserving Mechanisms
- Understanding and Improving Device Access Complexity
- The Ramifications of Sharing in Data Structures
- Building Flexible High-Performance Key-Value Systems
- Static Verification for Web Scripting Languages
- Graph-Based Reasoning in Separation Logic for Fun and Profit
- Programming The Parallelism Zoo
- Towards Algebra-Oriented Programming
- CRASH/SAFE: Clean-slate Co-design of a Secure Host Architecture
- Austerity in MCM - Land : Cutting the computational Budget
- Hypervisor Scheduler Enhancement Using OS-Hardware Interactions
- Fast Variational Inference in the Conjugate Exponential Family
- Proving Termination of Heap-Manipulating Java Programs
- Syntactic Foundations for Machine Learning
- Wireless Networking Using Smart Radios
- Trust and Mistrust on the Internet
- Mechanism design: dealing with interdependencies among agents.
- Privacy and Integrity of Remote Storage and Computation
- Semantics\sqcap Scalability\models\bot? Are Semantics and Scalability Incompatible?
- Optimal Payments in Dominant-Strategy Mechanisms
- Warped Mixture Models for Meaningful Clustering and Bayesian Manifold Learning
- Achieving High Data Rates in Distributed MIMO Systems
- Reasoning About Client Side Web Programs
- New probabilistic methods for inference of natural selection on regulatory sequences in the human genome
- Danielâs Adventures in Computer Vision Land
- Modelling road networks in the Amazon
- Automated Error Diagnosis Using Abductive Inference
- Detecting Sybils without Graphs
- How do we model global plant physiology? A case study of leaf phenology
- Land use / land cover change and malaria risk in the Amazon region
- Stratosphere: Massively parallel dataflow programming
- Dynamic Fair Division of Multiple Resources
- From motion capture of interacting hands to video based rendering.
- Scaling wireless services
- Handling Multitude of Nash Equilibria in Voting Games
- Spectral Edge: Making the Invisible Visible
- Automating Separation Logic Reasoning
- Computing and Autism: How a real-world challenge drives a computing research agenda
- Optimal kernel choice for kernel hypothesis testing
- Next Wave of Telco´s Innovation
- New Frontiers in Gestural Interaction
- From Big Data to Big Decisions
- Big Data and Machine Learning
- TypeScript: JavaScript development at scale
- MIT Media Lab's Information Ecology Group
- A computer-checked proof of the Odd Order theorem
- Towards ad hoc interactions with robots
- From the Information Extraction Pipeline to Global Models, and Back
- Dynamically Enforcing Knowledge-based Security Policies
- Distributed Opportunistic Scheduling: A Control Theoretic Approach
- Probabilistic Latent Tensor Factorisation
- A new metric on kernel matrices with applications to matrix means
- Convergent and Scalable Algorithms for Expectation Propagation Approximate Bayesian Inference
- On Synthesis of Verification Tools
- Fast and Reliable Online Learning to Rank for Information Retrieval
- Scale-Out Processors
- Playing in the Grey Area of Proofs
- Craig Interpretation
- Capture of dynamic scene using multiple cameras provides rich spatial-temporal information that can be used for solving challenging computer vision problems.
- From Pose Estimation to Fine Grained Activity Recognition
- Tell Me Where Youâve Lived and What You Want -- Iâll Tell You What You Like and Need
- Latent Hough Transform for Object Detection
- Satisfiability: connecting logic and probability
- Context sensitive information: Which bits matter in data?
- HyperDex: A Consistent, Fault-tolerant, Searchable NoSQL Store
- Verifying Concurrent Programs with Relaxed Conflict Detection
- Concurrent Data Representation Synthesis
- Achieving High Data Rates in a Distributed MIMO System
- On Agent Failures in Totally Balanced Cooperative Games
- Cube and Conquer: Guiding CDCL SAT Solvers by Lookaheads
- SmartDesign: Living with Geometric Complexity
- Part A: Non-parametric image optimization & Part B: Crowdsourcing gaze data collection
- Causality for Free! Parametricity Implies Causality for Functional Reactive Programs
- Multi-Label Learning with Millions of Categories & Generalized Multiple Kernel Learning with a Million Kernels
- Prediction Strategies without Loss
- How to present a poster at an international conference
- Intellectual Property at Microsoft
- Rough Guide to Being an Entrepreneur
- Body Part Recognition: Making Kinect Robust
- F# Tutorial
- .NET Gadgeteer: A Platform for Custom Devices
- Microsoft Research Connections and Cloud Computing for Science
- Functional first programming in an information-rich world
- How to give a great research talk
- How to write a great research paper
- Microsoft Academic Search
- Proving that programs eventually do something good
- Human Computing and Crowdsourcing in Search
- Towards Predictable Data Centers- Why Johnny can't use the cloud and what can we do about it?
- Machine Learning for medical Image Analysis
- Realizing Touchless Interaction in the Operating Theatre
- Planetary prediction services for society
- Realizing Touchless Interaction in the Operating Theatre
- Functional first programming in an information-rich world
- How reciprocity renders networks irrelevant for cooperation in social dilemmas
- Aggregators and the News Industry: Charging for Access to Content
- Treasure Hunt
- Network Design and Defence
- Blotto On Facebook: The Effect of Social Relations On Strategic Interaction
- Blotto On Facebook: The Effect of Social Relations On Strategic Interaction
- Game theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned
- Decentralized Auctions for Uniformly Semimodular Bidders
- Managing air traffic disruptions through strategic prioritization
- Decentralized Auctions for Uniformly Semimodular Bidders
- Scarce attention and the value of page rank in online search
- Harvesting the Wisdom of Crowds
- Communication networks in markets
- Machine Learning for medical Image Analysis
- Title to be confirmed
- The RCUK Digital Economy Theme â A Catalyst for Change
- Probabilistic Programming and Probabilistic Databases for Large-scale Knowledge-base Construction
- Energy Debugging in Smartphones
- Web Science: Politics, Demographics and More
- The Inverted Multi-Index
- Information Spreading in Social Networks
- Weightedness and Structural Characterization of Hierarchical Simple Games
- Weightedness and Structural Characterization of Hierarchical Simple Games
- Topic Models for Human Activity Understanding
- Learning and Discovery of Clinically Useful Information from Medical Images
- Rekeyable Ideal Cipher from a Few Random Oracles
- Verification and Synthesis by Sciduction
- Confining the Ghost in the Machine: Using Types to Secure JavaScript Sandboxing
- Efficient Cryptography for the Next Generation Secure Cloud
- ABC-Testing
- Computer Assisted Interventions: Challenges in design, development, validation and deployment of novel techniques
- Mathematical modelling on remotely-sensed dynamics of marine primary producers
- Generating Code by Learning
- Building Flexible High-Performance Key-Value Systems
- Learning and Representing: a Jointly Optimal Approach
- The science of guessing
- Efficient Machine Learning with High Order and Combinatorial Structures
- Multiparty Session Types Meet Communicating Automata
- Mean Field Equilibria of Dynamic Auctions with Learning
- From certified languages to their certified implementations
- Empirical evidence in privacy economics
- Towards Networks without Management Complexity
- Towards Networks without Management Complexity
- Supporting Active Reading Activities With a Multi-Slate System
- Mementos, Memento Mori, and More: Digital Assets across the Human Lifespan
- Compositional Inter-Language Relational Verification
- Communication Complexity and When Dubious Data Structures can be Detected
- Non-Interactive Verifiable Computation
- Ethnography: Understanding natural interaction with our communication technologies
- Ethnography: Understanding natural interaction with our communication technologies
- Ethnography: Understanding natural interaction with our communication technologies
- Methods in decision theory for conservation research
- Solutions for a sustainable and desirable future
- Searching, Scanning and Smelling - a portfolio presentation
- Searching, Scanning and Smelling - a portfolio presentation
- Sampling based on local signal analysis: applications to photo-realistic imagery and beyond
- Algebraic Foundations to Effect-Dependent Optimisations
- Your Abstractions are Worth^H^H^H^H^HPowerless!Non-Volatile Storage and Computation on Embedded Devices*(*Batteries Not Included)
- A joint part- and pixel-wise approach to human pose estimation
- Approaches to Multiscale Modelling of Complex Systems
- Machines Learning Human Minds
- Mean Field Equilibria of Dynamic Auctions with Learning
- Efficient Range Querying in Distributed Games
- Understanding variability and temporal trends in biosphere-atmosphere CO2 exchange through integrating models with data
- ORCHID: Human-agent collectives for disaster response and the smart grid
- ORCHID: Human-agent collectives for disaster response and the smart grid
- Towards Practical Randomization in Concurrent Data Structures
- Malleability in Modern Cryptography
- Decision Theory in Conservation Biology, from Systematic Conservation Planning to Scenario-Based policy assessments
- Short and long-term effects of climate, disturbance, and forest management on regional carbon storage and emissions under current and proposed policy plans
- A Population Approach to System Design
- A Population Approach to System Design
- Sequential Decision Making in Experimental Design and Sustainability via Adaptive Submodularity
- Exploring Compression and the Aesthetics of Creativity
- Evaluating User-Adaptive Systems: Lessons from Experiences with a Personalized Meeting Scheduling Assistant
- Exploiting Variable Impedance for Robotics: Mimic or Optimize?
- Exploring Compression and the Aesthetics of Creativity
- Covering problems arising in Gamma Knife radiosurgery
- Security in untrusted storage
- The Undiscovered Continents of Human Potential
- Practical Abstractions for Dynamic and Parallel Software
- Homomorphic Encryption from Ring Learning with Errors
- High-throughput, Multiscale modelling approaches for understanding bacterial signalling
- Naiad: Iterative and Incremental Data-Parallelism using Differential Dataflow
- Closing the gap between weakly and fully supervised methods
- Bound Analysis of Imperative Programs with the Size-change Abstraction
- Concurrency Assertions â Providing the Right Semantics to ASSERT Statements
- Complementing User-Level Coarse-Grain Parallelism with Implicit Speculative Parallelism
- Bayesian Computation Without Tears: Probabilistic Programming and Universal Stochastic Inference
- Beyond the Piece of Cardboard: Learning to Adjust Photographs
- Real versus Realistically Rendered Ground Truth: Can we use Computer Graphics for Performance Evaluation?
- Spanish forest dynamics: Constraining models with data
- CMA-ES â a Stochastic Second-Order Method for Function-Value FreeNumerical Optimization
- PARIS: Probabilistic Alignment of Relations, Instances, and Schema
- The Marriage of Bisimulations and Kripke Logical Relations
- Probabilistic programs and the computability and complexity of Bayesian reasoning
- Information Retrieval based Program Synthesis
- Large-scale Retrieval with Ivory and MapReduce
- Analysing biological information processing with mechanistic modular models
- Poirot â a concurrency sleuth
- Natural Interactions & Computing for Global Development at MSR India
- Exclusive PĂłlya Urns and their applications
- Structured Prediction Models for High-level Computer Vision Tasks
- Information-Greedy Global Optimisation
- Abstractions in Satisfiability Solvers
- The IITM Model and its Application to the Analysis of Real-World Security Protocol
- SpecNet: Spectrum Sensing Sans Fronti`eres
- Mechanism Design without Money via Stable Matching
- "Coupled dynamics of traits and populations in response to environmental change".
- Vector Commitments with Efficient Protocols for Privacy-preserving Smart Billing Applications
- Energy Functionals: Choices and Consequences For Medical Image Segmentation
- Practical Boogie (on the example of VCC)
- Statistical learning for structural neuroimaging data
- "Egalitarian Gradient Descent": A General Preconditioning Scheme for Deformable Image Registration
- SocialFusion: Fusing Mobile, Sensor, and Social Computing in the Cloud To Enable Next-Generation Context-Aware Applications
- Tunable Static Inference for Generic Universe Types
- Perception by "Patterns" in the Brain
- Stochastic signal encoding strategies in cells
- A Language for Type-Safe Web Programming
- Probing the basis of neuronal branching
- Plant Organs Regeneration: Measuring and Modelling SelfâOrganization
- Principles of Humanoid Locomotion Control
- From Gene Networks to Tissue Engineering: Computational Models of Pattern Formation
- Some recent developments in approximate inference: learning and control
- Search is not only about the Web - An Overview on Printed Document Search and Patent Search
- Scaling transaction processing through data-oriented execution
- How to present a poster at an international conference
- Rough guide to being an entrepreneur
- Gadgeteer
- Blue skies to ground truth: Machine learning for Kinect human motion capture
- Computer science as applied philosophy
- Making the most of your PhD; now and in your career
- How to give a great research talk
- How to write a great research paper
- How to force unsupervised neural networks to discover the right representation of images
- PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure
- Co-opetition in network tasks
- Identifying Peer Effects through Randomized Trials in Networks
- Network cognition and individual behaviour
- Network Formation in the Presence of Contagious Risk
- Competitive Contagion in Networks
- Social networks, institutions, and the process of globalization
- Optimal Communication in Teams
- Social Network, Personality, and Performance
- Coming to Grips with Complexity in Computer-Aided Verification
- Efficient space-variant deconvolution
- Computing for Development: A New High Impact Research Area
- Is my model too complex? Evaluating model formulation using model reduction
- Programmable Self-Assembled DNA-Based Autonomous Molecular Devices
- Fences and Stability in Weak Memory Models
- How to Make Ad Hoc Proof Automation Less Ad Hoc
- Towards a comprehensive assessment of the interactions between the terrestrial biosphere and the climate system
- Active visual category learning
- Bringing Intelligence at the Edges to Accommodate Diversity in the Internet
- Algorithmic Market Design: Spectrum Sales and BitTorrent Communities
- Turing and Darwin: Saving the environment by combining computation and human insight
- Fuzzy thinking: single neuron variation in RNA state space
- Can We Defy Natureâs End?
- The Complexity of the Homotopy Method, Equilibrium Selection, and Lemke-Howson Solutions
- Politics, Preferences and Permutations: Probabilistic Reasoning with Rankings
- Understanding and conserving biodiversity in a changing world
- Modelling, simulating and verifying DNA strand displacement systems
- Delay Reduction for Adaptive Scheduling in Wireless Networks and Aggregated Equilibrium for Resource Sharing Games
- Extracting and Querying Probabilistic Information in BayesStore
- Formal Methods in Synthetic Biology
- Efficient Data Structures for Nonlinear Video Processing
- Towards a Colonic Crypt Model with Realistic, Deformable Geometry
- Modeling and Evaluating Information Retrieval Results
- SSLShader: Cheap SSL Acceleration with Commodity Processors
- Active visual category learning
- Molecular evolution of stochastic switching
- Molecular evolution of stochastic switching
- Spatial Tactile Feedback Support for Mobile Touch-screen Devices
- 3D Reconstruction meets GPGPU meets Image Analysis
- Training Random Forests with Ambiguously Labeled Data
- Representing and Querying Large-scale Uncertainty
- Guessing Program Annotations with Probabilistic Inference
- Delay Reduction for Adaptive Scheduling in Wireless Networks and Aggregated Equilibrium for Resource Sharing Games
- Tracking and Analysis of Animal Movement
- Programming-Language Techniques for Secure Cryptography
- Optimization under Uncertainty: Understanding the Correlation Gap
- High-level Languages for Low-level Systems
- Enforcing topological constraints in energy-based image segmentation
- Research of the new Computer Vision and Mulitmodal Computing at MPI Sarrbruecken
- Executable Knowledge for Molecular Systems Biology
- Longitudinal Evaluation of API Usability and Designing Support for Collaborative Search around the Tabletop
- On a first-order primal-dual algorithm with applications to convex problems in computer vision
- Learning generative models of images by factoring appearance and shape
- âOtherworldâ - Giving Applications a Chance to Survive OS Kernel Crashes
- Software Synthesis using Automated Reasoning
- Efficient cloud operations via job-migration and pricing
- Machine Learning for WLAN Positioning
- Hidden Markets: Designing Efficient but Simple Electronic Markets
- Optimization for Pixel Labeling Problems With Structured Layout
- Energy Minimization with Label Costs and Applications in Multi-Model Fitting
- Parameter Search and Robustness Analysis from Temporal Logic Specifications in Biochemical Reaction Networks
- Reasoning about concurrent stochastic systems
- Frugal Procurement Auction Design
- Simplicity-Expressiveness Tradeoffs in Mechanism Design
- Logic and Probability: The Computational Connection
- Learning and Coordination in Networks
- Making OpenCL simple with Haskell
- Albert Atserias, Universitat Politècnica de Catalunya, Microsoft Research Lectures
- Cooperation, Power and Conspiracies
- Experience and problems with compiling data parallel languages
- Branching vs. Linear Time: Semantical Perspective
- CIEL: a universal execution engine for distributed data-flow computing
- Improving the energy model of stereo matching algorithms
- Propagation of Rumour Through a Social Network
- Network Economics seminar / Diffusion and Cascading Behavior in Random Networks
- Towards Automation of Protein NMR
- How Hard is Competition for Rank?
- Software Lock Elision for x86 Machine Code
- Towards a Non-Commutative Logic of Effects,
- Handling temporal variation of unknown characteristics in streaming data analysis.
- Lifted Message Passing: A Step Towards Gaining a 'Big Picture' View on AI
- Realizability and Parametricity in Pure Type Systems: An application
- Polynomial Learning of Distribution Families
- Verification of Imperative Programs Through Characteristic Formulae
- Bayesian Inference with Kernels
- How can we model complex ecosystems with stochastic interactions between individuals at different spatial and temporal scales? Some case studies
- Modelling ecological systems under environmental change.
- Three Small Steps ... to Reconceiving Machine Learning
- Using SAT Solvers for Cryptographic Problems
- Using SAT Solvers for Cryptographic Problems
- Async in Visual Basic and C# - worth the Await!
- Statistical Significance Analysis of Motif Discovery
- A relationship-based approach to the verification of multi-object invariants
- LCA Overview and Open Source Expert
- Affective Technology
- Affective Technology
- Probabilistic models for time-series with different underlying dynamics regimes with application to robot imitation learning
- Engineering Genetic Circuits
- Engineering Genetic Circuits
- Food Webs, and how they got that way
- SSH: A Case Study of Cryptography in Theory and Practice
- Testing and fault localization in constraint programs
- Towards Systematic Design of Enterprise Networks
- Noise and the two-thirds power law
- Golden-i, a head-mounted computer
- Frugality in set-system auctions
- The Little Engine(s) that could: Scaling Online Social Networks
- Search methods based on Monte-Carlo simulation
- Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank
- Game-theoretic logic learning in scientific domains
- Concurrency and Communication: Lessons from the SHIM Project
- Post-Silicon Validation: New Frontiers for Formal Verification Research
- GPU programming: bugs, pitfalls and the importance of correctness in biomedical and scientific applications
- Using transformed domains to sparsify Gaussian Processes
- Using transformed domains to sparsify Gaussian Processes
- How can we use digital pens in a collaborative environment?
- Local Action Traces and Abstract Concurrent Separation Logic
- Frameworks for segmentation, classification, and nonstationary image processing with applications to disease assessment
- International Workshop on Tractability; 5-6 July 2010
- Symbolic Techniques in Propositional Satisfiability Solving
- Energy as Syntax - an attempt at a thermodynamical framework for combinatorial molecular networks
- Geometry of Synthesis: Semantics-directed hardware compilation
- Diffuse Programming
- Images as Sets of Locally Weighted Features
- Hermes: Clustering Users in Large-Scale E-mail Services
- Practical performance models for complex, popular applications
- Before pixels
- A proof rule for multi-threaded programs
- Prof. Robert Nowak, University of Wisconsin; MSR Lectures
- Derek Dreyer, MPI-SWS; Microsoft Research Lectures
- On Bayes-Nash implementation of combinatorial auctions: structure and efficiency
- Abstract Interpretation for Liveness using Metric Spaces
- Visual Computing for Next-Generation Display and Imaging
- Static Verification of Concurrent Programs using Reduction and Abstraction
- Static Verification of Concurrent Programs using Reduction and Abstraction
- The State of Secondary Level Computer Science Education in the USA
- Deep Web Data: Analysis, Extraction, and Modelling
- On the stability of flow-aware CSMA
- Incremental Modelling and Verification of the PCI Express Transaction and Data-Link Layers
- A comparison of some recent task-centric parallel programming models
- Secrets of the Microsoft SQL Server Query Optimizer
- Building Algorithms for FPGAs
- Learning, Planning and Representing Knowledge from Primitive Experience
- Submodularity and Valued Constraint Satisfaction Problems
- Stanislav Zivny, University of Oxford; Micrsoft Research Lectures
- Opportunistic Spectrum Access with Multiple Users: Learning under Competition
- Sparse Model Recovery via Iterative Algorithms
- Proactive Resilience Revisited: Resisting Intrusions means more than Byzantine Fault Tolerance
- Incremental Modelling and Verification of the PCI Express Transaction and Data-Link Layers
- Abandoning Prenex Clausal Normal Form in QBF Solving
- Michael Weber, University of Twente; Microsoft Research Lectures
- Datalog+/- : A Framework for Tractable Query Answering over Ontologies
- Stationary Subspace Analysis
- You are not a gadget
- L_p-Spherically Symmetric and L_p-nested Distributions for Patches of Natural Images
- Efficient Bayesian Model Comparison with Differential Equations: a Population MCMC Approach via the Thermodynamic Integral
- Riemannian Manifold Hamiltonian Monte Carlo
- Inferring Signaling Pathway Topologies from Multiple Perturbation Measurements of Specific Biochemical Species : A model-based approach
- Proving the Correctness of Abstract Concurrency Control and Recovery
- Nesting Transactions: Why and What Do We Need?
- Data redundancy and maintenance in peer-to-peer file backup systems
- Use phase signals to promote lifetime extension for desktop PCs
- Towards focusing research and innovations on local needs: If wireless technologies are to connect the wireless continent
- Learning Deep Architectures
- Cops, Crops and Mobile Phones: Machine Learning in Africa
- Towards a Network Measurement Science
![[Talks.cam]](/static/images/talkslogosmall.gif)
