Matthew Ireland
| Name: | Matthew Ireland |
| Affiliation: | Churchill College |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 12 Oct 2022, 2:32 p.m. |
Public lists managed by Matthew Ireland
Talks given by Matthew Ireland
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Matthew Ireland
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Matthew Ireland actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Introduction to GANs
- Autoencoders
- Treaps - Power and Simplicity of Randomisation
- FluBot
- The Asynchronous Computability Theorem
- Serving Webpages with Client-side Frameworks
- Attention in sequence-to-sequence models
- Nelder-Mead Optimization
- Recommender systems
- Genetic Algorithms
- Electronic Analogue Computers
- Typesetting with TeX and LaTeX
- Dimensionality Redution
- L1TF/Foreshadow Attack
- Implementation of persistent arrays
- Introduction to programming with OpenGL
- Learning-to-Rank for Information Retrieval
- Introduction to LoRaWAN
- Neuroevolution & NEAT
- Data anonymization and differential privacy
- Nelder-Mead Optimization
- Evolution algorithms
- Shadow Mapping in Real-Time 3D Graphics
- Image Enhancement
- Forward and Deferred Rendering
- Alternative Memory Technologies to DRAM and SRAM (for on-chip cache design)
- Computer Viruses
- btrfs
- Constraint Programming
- Adversarial attacks against reinforcement learning agents
- Raymarching
- Turning Points in Programming
- Searchable Encryption
- Cloud Gaming
- Censorship and Surveillance Resistance Systems
- Programming with monads
- How to Land on the Moon: The Apollo Guidance Computer
- Multidimensional scaling
- String-matching Algorithms
- Data-Oriented Design
- Understanding the Source Coding Theorem: A Talk on Shannonâs Entropy
- Designing a type system: an introduction
- A Graph of All Mathematics
- Differentiable rendering
- SLAM Problem: Dealing with Augmented Reality
- Covert channels (a networks perspective)
- Acoustic Fingerprinting and Music Identification
- Netflix and Recommender Systems
- Deep Learning for Vision: Lecture and Workshop
- Text Summarisation with TextRank
- CycleGANs
- Why theory matters in biology
- Quantum Cryptography
- The Nature of Entropy
- The busy beaver game: a simple yet non-computable function
- Variational Autoencoders
- Anti-malware software and trusting trust
- Fingerprint matching
- The Perfect Snake AI
- Proofs: From a Complexity Theoretic Perspective
- Balanced Allocations : Balls into Bins
- Halting Problem and Gödel's Incompleteness Theorem
- On the Use of Typing for Static Logical Verification: RCF and Refinement Types
- Censorship Resistance Systems
- Software design anti-patterns
- Expander Graphs
- Paxos: How can we all agree?
- AI in Graphics
- Range Minimum Query & Lowest Common Ancestor
- Hypercomputation
- Representing words for NLP (An introduction to Semantic Vector Space Models and GloVe)
- Neural Architecture Search - a gateway to AutoML
- Difficult games for computers: Arimaa
- The CAP theorem and its limitations
- Less is more
- Hyper-converged infrastructure
- The Nature of Entropy
- Breaking and Making the Internet
- Quantum computing in the Real World
- Segment Trees
- Generative Adversarial Networks
- Adversarial Machine Learning
- The AKS primality test explained
- What are the goals of 5G?
- Spectre and Meltdown
- Monads
- AI: How it works, and why it could be working against us
- PID Controllers
- How to implement an encryption system badly: InfoSec lessons from WW2
- Recommender systems
- Recommendation Systems
- Email Spam Detection and Filtering: Keeping Your Mailbox Clean
- Monads: Simple AND Usable
- Resource Management in Programming Languages
- Where Compilers Optimizations Go Wrong
- Typesetting with TeX and LaTeX
- Torrenting for Free
- How DNSSEC secures DNS
- Particle Swarm Optimisation
- Spell Checking: A comparison of approaches
- Lua: designing a language to be embeddable
- Pedestrian detection and tracking
- Practical Decisions in Neural Network Design
- Mental Poker
- Kolmogorov Complexity and Gödelâs Incompleteness Theorems
- Requirements in Application Development
- The Signal Protocol for end-to-end encryption in chat clients
- Communication Complexity
- Asynchronous Computation
- Internet censorship and Tor
- Constraint Satisfaction Problems
- Reliable Transmission in Broadcast Networks
- MapReduce
- The NTP Algorithm in Detail
- Google's Transformer: A Novelty to Language Understanding
- Programming with Monads
- Maze Generation and Solving Algorithms
- Sarcasm Identification in Natural Language Processing
- Practical Type Systems
- The KarhunenâLoĂšve Transform and Principal Component Analysis
- Bufferbloat
- An introduction to Reinforcement Learning
- Genetic Algorithms
- Adversarial Machine Learning
- Introduction to coding and information theories and the noisy-channel coding theorem
- Btrfs
- The Achilles' heel: a cautionary tale
- Convert Channels and their Analysis
- Emulating Early Computers
- Google Translate
- How not to hit pedestrians if you're a self driving car
- Title to be confirmed
- Pretending to be a computer
- Using Neural Networks to Generate Image Captions
- On-line recognition of handwritten equations in a nutshell
- Bitcoin as a currency
- Chess Engines
- How to Render Stuff with OpenGL
- Voting systems
- Space-partitioning Data- Structures and their Applications
- Real-time Computer Graphics: An overview of popular approaches and techniques
- Closed Timelike Curves and Complexity Theory
- Concurrency in C++
- An Introduction to Secure Hash Algorithms
- Music Recommender Systems
- What did I just hear? An introduction to Speech Recognition using Hidden Markov Models
- Combinators
- Monads and Comonads
- Anti-aliasing Techniques for Real-time Graphics Applications
- Image Segmentation: Breaking it down
- Yao's protocol for secure computation
- Introduction to Blockchain
- C++ Templates, Concepts and Modules
- Text Data Mining using Topic Modeling
- A comparison of three modern filesystems
- Things you thought you couldn't do in Java
- Localisation for Robotics
- MIDI: What it is and how it changed the world of music
- Capture the Flag 101 - practical systems and web security
- Don't like the sound of your voice? You can do something about that!
- Electronic mail
- Composing by Numbers: An Introduction to Algorithmic Melody Generation
- Computer Timekeeping
- 2-SAT
- Rinocloud
- The Current State of Virtual Reality
- Meta-Programming
- Constraint Programming
- Maze Generation Algorithms
- Network Coding: An introduction to network coding and random linear codes
- Title to be confirmed
- Iterative Development: the Lowest Common Ancestor Problem
- Deep Learning with the Analytical Engine
- Lenstra's elliptic curve factorization method
- Arduino and Genuino Hardware Programming
- AI in Board Games 2: The Settlers of Catan
- Deep Learning in Practice
- Title to be confirmed
- Title to be confirmed
- Whimsical Networking: the Past, the Present, and the Future
- Fault tolerant systems
- Safe modern C++
- Randomised computation
- Sonic Pi: Keeping the Rhythm
- The Colossus computer and code breaking in WW2
- Deep Learning (II) -- A comprehensive survey
- Algorithmic Musical Composition in the Style of J. S. Bach
- How Sharding is Accomplished in MongoDB
- Tracking the Hand using Computer Vision
- Where did that come from? An introduction to Sound Localisation
- Distributed hash tables
- Deep Learning
- Zero Knowledge Protocols
- Pass Go and collect $200: how slot machines are advancing the state of the art in computer go AI
- Balls into Bins: A Sequential Resource Allocation Problem
- A Look into the Fascinating World of Matrix Computations
- A Talk on Paradoxes
- Title to be confirmed
- Title to be confirmed
- On the pitfalls and traps of programming languages
- An Introduction to Wireless Sensor Systems
- A Primer in Machine Learning
- Reversible computing
- Molecular programming â moving from electronic computation to molecular systems
- Methods for Lossless Data Compression
- Exploring the Static Semantics of the Standard ML Core Language
- Uncovering the Secrets of Rumor Spreading
- Title to be confirmed
- An Introduction to Analogue Computing
- "Programming" Problems
- IPv6
- Adaptive Filters
- Solving games - the what, how and why.
- Consensus in distributed systems
- The structure and dynamics of networks
- The Impartial Game of Nim and the Sprague Grundy Theorem
![[Talks.cam]](/static/images/talkslogosmall.gif)
