News Category: Colloquia
Showing 10 of 20 results
-
Classification and prediction of matrix structured data with applications to recommendation systems or identifying anti-socials and bot-nets – Saber Shokat Fadaee –
Date: Monday, September 26, 2016 Time: 4:00pm – 5:00pm Location: 366 West Village H Abstract Matrix representations are a natural way to represent many forms of networked and tabulated data. […]
-
Estimating causal effect of ads in a real-time bidding platform – Prasad Chalasani – 9.26.16
Date: Monday, September 26, 2016 Time: 12:00pm – 1:00 pm Location: 366 West Village H Host: Ravi Sundaram Abstract A real-time bidding platform responds to incoming ad-opportunities (“bid requests”) by […]
-
New proof techniques for adaptive security – Zahra Jafargholi – 8.25.16
Master’s Thesis Defense Abstract Selective security refers to the case where the attacker decides on some parameters of the attack before the attack even begins. In contrast, adaptive security refers […]
-
Analysis of Named Entity Recognition & Entity Linking in Historical Text – Kunal Asarsa – 8.12.16
Master’ Thesis Defense Abstract Named Entity Recognition is a Natural Language Processing (NLP) technique that is used to identify names of people, places, organizations, and more from a given piece […]
-
Introduction to side-channel cryptanalysis (and some recent results) – Francois-Xavier Standaert – 8.11.16
Abstract Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the […]
-
Discriminative Learning of Infection Models – Nir Rosenfeld – 3.3.16
Abstract Infection and diffusion processes over networks arise in many domains. These introduce many challenging prediction tasks, such as influence estimation, trend prediction, and epidemic source localization. The standard approach […]
-
Emerging trends in big data – Michael Franklin – 3.3.16 – Distinguished Lecture
Abstract Big Data software has created quite a stir recently, largely driven by open source environments such as Hadoop and Spark. In this talk, I’ll begin by giving an […]
-
Life as a Target – Richard M. George – 2.24.16
Abstract Dickie George spent 41 years working for the National Security Agency as a cryptographer. As a member of the Intelligence Community, he learns to live as a target. The […]
-
Network protocols: myths, missteps, and mysteries – Radia Perlman – 2.5.16 – Distinguished Lecture
Abstract The main point of this lecture is to encourage critical thinking. So much of what “everyone knows” about network protocols is, actually false. For instance, why do we need […]
-
Guilt-free interactive data analysis: the reusable holdout – Omer Reingold – 1.26.16 – Distinguished Lecture
Abstract A great deal of effort has been made to reduce the risk of spurious scientific discoveries, from the use of holdout sets and sophisticated cross-validation techniques, to procedures for […]
Showing 10 of 20 results