Our research
Content type
+
Downloads (437)
+
Events (394)
 
Groups (150)
+
News (2571)
 
People (821)
 
Projects (1053)
+
Publications (11914)
+
Videos (5152)
Labs
Research areas
Algorithms and theory47205 (58)
Communication and collaboration47188 (54)
Computational linguistics47189 (8)
Computational sciences47190 (69)
Computer systems and networking47191 (111)
Computer vision208594 (14)
Data mining and data management208595 (7)
Economics and computation47192 (24)
Education47193 (81)
Gaming47194 (20)
Graphics and multimedia47195 (56)
Hardware and devices47196 (55)
Health and well-being47197 (28)
Human-computer interaction47198 (133)
Machine learning and intelligence47200 (78)
Mobile computing208596 (6)
Quantum computing208597 (3)
Search, information retrieval, and knowledge management47199 (61)
Security and privacy47202 (24)
Social media208598 (5)
Social sciences47203 (37)
Software development, programming principles, tools, and languages47204 (30)
Speech recognition, synthesis, and dialog systems208599 (4)
Technology for emerging markets208600 (2)
1–24 of 24
Sort
Show 25 | 50 | 100
1
Get to know Microsoft ResearchA quick peek at what's new at Microsoft Research.
Video details
Date: 17 April 2014
Duration: 00:01:26
Publisher: Microsoft
Saikat Guha
Saikat Guha talks about how it is possible to deliver relevant ads to mobile phone users, while preserving their privacy.
Video details
Date: 17 December 2013
Duration: 00:03:51
Publisher: Microsoft
Zero-Effort Payments (ZEP)The goal of Zero-Effort Payments (ZEP) is to rethink mobile payments. We are enabling a scenario in which mobile users can pay with 'zero-effort': without interacting with their smartphone or opening their wallet. Upon approaching the cashier, the user is identified based on a combination of face recognition, Bluetooth/BLT radios, and human assistance (i.e., relying on the cashier's input to confirm the user's identity). ZEP has been deployed at Microsoft twice: a two-deployment at TechFest 2011 and a 4.5...
Video details
Date: 17 October 2011
Duration: 00:00:55
Publisher: Microsoft
Cryptography Resilient to Physical AttacksYael Kalai, researcher at Microsoft Research New England discusses how, with all the progress made in the field of cryptography, security continues to be breached. Complicating matters are hackers, who are becoming increasingly sophisticated, almost making security worse than it was more than 20 years ago. Communications remains the largest field of encryption leaks. Physical attacks can consist of timing attacks, power attacks, and acoustic attacks, while tampering attacks include fault and radiation...
Video details
Date: 27 September 2011
Duration: 00:11:28
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Video details
Date: 27 September 2011
Duration: 00:10:56
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Machine Learning and CrowdsourcingAdam Kalai of Microsoft Research New England—in association with Serge Belongie of the University of California, San Diego; Ce Liu of Microsoft Research New England; George Pierrakos of University of California, Berkeley; Ohad Shamir of Microsoft Research New England; and Omer Tamuz of the Weizman Institute of Science—explains the research focus and issues with machine learning and crowdsourcing. Much of machine learning works with similarity: how similar two separate items are to one another. Having...
Video details
Date: 27 September 2011
Duration: 00:14:42
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Retroactive SecurityClassic security uses access control, and, essentially, that does not work. Current systems are designed to say “no” and otherwise limit access, while another reason is code bugs. Real-world security currently is retroactive, an example being the financial system, in which mistakes or breaks can be undone after they occur. Typical access controls consist of both physical and principal boundaries, isolation of an item or information, control of access into this isolation, and policies stating who can have...
Video details
Date: 27 September 2011
Duration: 00:10:33
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Video details
Date: 27 September 2011
Duration: 00:08:12
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Welcome to Microsoft Research CambridgeAndrew Blake, Microsoft distinguished scientist and managing director of Microsoft Research Cambridge, welcomes staff and gives an overview of Microsoft Research’s global labs. The mission of those labs are to expand the state of the art in each of the areas in which research is performed, to transfer innovative technologies rapidly into Microsoft products, and to ensure that Microsoft products have a future. Roger Needham helped with the original setup of Microsoft Research Cambridge in 1997, with Andrew...
Video details
Date: 27 September 2011
Duration: 00:31:13
Publisher: Microsoft
A public right to hear: Understanding what it means and why it matters onlineMicrosoft Researcher Mike Ananny discusses what personal freedom is, its evolving importance in online environments, and the role big-data systems play this emerging field.
Video details
Date: 27 September 2011
Duration: 00:13:01
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Health Care Decisions in the Information AgeBenjamin Handel of UC Berkley focuses on how individuals interact with the medical care sector to make important decisions. This involves using the information available and the incentives they face. The incentives can be financial and non-financial for both the consumer and the physician. For the consumer there can be the incentive of deductibles and high costs associated with switching plans. For physicians, fees are assigned to procedures. IT support in the health field is far behind IT support in other...
Video details
Date: 27 September 2011
Duration: 00:11:36
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Video details
Date: 27 September 2011
Duration: 00:37:44
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Welcome to Microsoft Research IndiaP. Anandan, managing director of Microsoft Research India, gives an overview of Microsoft Research’s mission. The organization’s foremost goal is to advance the science in areas such as cloud computing, computer science, and computing, and to advance the state of science. Investing in basic research provides room for long-term research instead of simply focusing on computing and computer science.
Video details
Date: 27 September 2011
Duration: 00:11:09
Publisher: Microsoft
Video details
Date: 27 September 2011
Duration: 00:12:18
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Danah Boyd
Teen Privacy Strategies in Networked PublicsMicrosoft Researcher danah boyd’s research looks at the myths surrounding teens and privacy and the ways different teens reconcile technology with their public and private lives.
Video details
Date: 27 September 2011
Duration: 00:14:10
Collection: 20th Anniversary Lecture Series
Publisher: Microsoft
Advancing the State of the Art: 20th Anniversary and BeyondAt Microsoft Research, we are celebrating over 20 years of turning ideas into products that continuously improve the way people interact with technology. We advance the state of the art in computer science through exploration and new approaches to solve large, complex problems.
Video details
Date: 26 September 2011
Duration: 00:02:38
Publisher: Microsoft
Video details
Date: 3 June 2011
Duration: 01:27:53
Collection: Cloud Futures Workshop 2011
Nadia Heninger
The Mathematics of Side-Channel AttacksWe will look at a collection of mathematical problems suggested by side-channel attacks against public key cryptosystems, and how the techniques inspired by this work relate to a variety of different applications.First, we discuss the cold boot attack, a side-channel attack against disk encryption systems that uses the phenomenon of DRAM remanence to recover encryption keys from a running computer. In the course of the attack, however, there may be errors introduced in the keys that the attacker obtains. ...
Video details
Date: 28 January 2011
Duration: 01:00:11
Daniel Wichs
Cryptography with Weak, Noisy, Leaky and Tempered KeysTraditionally, to achieve cryptographic security, we require that users generate long perfectly random keys, store them on a perfectly reliable and secure device, and perfectly shield this device to prevent an attacker from observing or tampering its internals. This talk will survey some of my recent work on achieving equally strong security guarantees under imperfect conditions, where some of the above assumptions may not hold. For example, this includes the use of biometrics as cryptographic keys. Such...
Video details
Date: 17 January 2011
Duration: 00:58:01
Mike Hamburg
Generalized Identity-Based EncryptionMy talk will mainly be on new developments in generalized identity-based cryptography. Identity-based cryptography is relatively new technology, less than a decade old, in which a message can be encrypted using any string as a public key. More generally, we could imagine encrypting a message under a policy which specifies under what conditions someone is allowed to read it. I will give a summary and some specific examples of my work in this area. Additionally, I will outline some of my work on fast and...
Video details
Date: 14 January 2011
Duration: 00:50:52
Omer Reingold
One-way functions are the most basic, unstructured form of cryptographic hardness. Yet in a sequence of celebrated results (mostly in the eighties and early nineties), one-way functions were shown to imply a rich collection of cryptographic schemes and protocols (such as digital signatures and secret-key encryption). At the basis of this beautiful mathematical structure, are a few constructions of basic primitives: pseudorandom generators [Hastad-Impagliazzo-Levin-Luby ‘91], universal one-way hash...
Video details
Date: 17 November 2010
Duration: 01:02:42
Fang Yu and Yinglian Xie
Tracking Internet Hosts Using Unreliable IDsToday's Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic typically cannot be held accountable. We will present a system that tracks dynamic bindings between hosts and IP addresses by leveraging application-level data with unreliable IDs. Using a month-long Hotmail user-login trace, we show that this system can attribute most of the activities reliably to the responsible hosts, despite the existence of dynamic IP addresses, proxies, and...
Video details
Date: 6 May 2010
Duration: 00:02:53
Publisher: Microsoft
Tarleton Gillespie
If the character of public discourse, long chaperoned by the broadcast networks and major publishers, is now increasingly in the hands of online media platforms like YouTube, Facebook, and Flickr, then we must ask some quite old questions about how these commercial information providers navigate protecting free speech, meeting community standards, avoiding legal liability for their content, and pursuing their own business imperatives. Though they often make the promise to openly and impartially host all...
Video details
Date: 20 January 2010
Duration: 01:21:56
Frank McSherry
Privacy Integrated QueriesThe tuple-oriented nature of Language Integrated Query (LINQ) lends itself easily to several recent privacy technologies aimed at preserving the privacy of any tuple in the input; no one should be able to observe the presence or absence of any specific tuple.
Video details
Date: 4 March 2008
Duration: 00:13:09
Publisher: Microsoft
1–24 of 24
Sort
Show 25 | 50 | 100
1
> Our research