Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Our research
Content type
+
Downloads (455)
+
Events (487)
 
Groups (150)
+
News (2848)
 
People (721)
 
Projects (1160)
+
Publications (13021)
+
Videos (6120)
Labs
Research areas
Algorithms and theory47205 (79)
Communication and collaboration47188 (63)
Computational linguistics47189 (11)
Computational sciences47190 (69)
Computer systems and networking47191 (129)
Computer vision208594 (23)
Data mining and data management208595 (12)
Economics and computation47192 (26)
Education47193 (84)
Gaming47194 (24)
Graphics and multimedia47195 (67)
Hardware and devices47196 (66)
Health and well-being47197 (32)
Human-computer interaction47198 (157)
Machine learning and intelligence47200 (97)
Mobile computing208596 (20)
Quantum computing208597 (26)
Search, information retrieval, and knowledge management47199 (62)
Security and privacy47202 (32)
Social media208598 (12)
Social sciences47203 (41)
Software development, programming principles, tools, and languages47204 (44)
Speech recognition, synthesis, and dialog systems208599 (10)
Technology for emerging markets208600 (6)
1–25 of 6120
Sort
Show 25 | 50 | 100
1234567Next 
Paul Dourish
How Spreadsheets Shape Organizational Life: A Case Study in the Materialities of InformationMaterial manifestations of digital representations — as bits of a disk, signals in a wire, or images on a screen — shape, constrain, and enable various forms of human and social action. Based on a book in progress that draws on a range of examples including network protocols and database architectures, this talk will focus on example of spreadsheets to make this argument. A number of recent studies have examined the role that Powerpoint plays in organizational life. Organizational scholars like Wanda...
Video details
Date: 18 May 2016
Duration: 01:06:22
Mukund Raghotaman
Regular Programming over Data StreamsThe problem of programming stream transformations is becoming increasingly important with the emergence of large data streams such as from sensors, internet routers, and gene sequences. Many monitoring queries—for example, what is the average number of packets transmitted by a router per second—and policy actions depend on temporal properties, such as recognizing certain patterns of events, and iteratively aggregating results from these patterns. In this presentation, I will describe the model of...
Video details
Date: 9 May 2016
Duration: 01:05:58
Collection: MSR Talk Series
Video figure for linked paper.To help analysts better understand temporal queries, we developed StreamTrace, an interactivevisualization tool that breaks down how a temporal queryprocesses a given dataset, step-by-step. We demonstrate that StreamTrace can help users to verify thatqueries behave as expected and to isolate the regions of aquery that may be causing unexpected results.
Video details
Date: 7 May 2016
Duration: 00:02:02
Publisher: ACM – Association for Computing Machinery
June Andronick
Interrupts in OS Code: LetExisting modelled and verified operating systems (OS's) typically run on uniprocessor platforms and run with interrupts mostly disabled. This makes formal reasoning more tractable: execution is mostly sequential. The eChronos OS is a real-time OS used in tightly constrained devices, running on (uniprocessor) embedded micro-controllers. It is used in the DARPA-funded HACMS program, where it runs the flight control software of a high-assurance quadcopter. To provide low latency, the eChronos OS runs with...
Video details
Date: 6 May 2016
Duration: 01:06:59
Collection: MSR Talk Series
Jeff Selingo and Richard DeMillo
A Revolution in Higher Education: Tales for Unlikely AlliesAffordable access to quality higher education has been a cornerstone of American life since the nation's founding. American higher education is admired around the world as a model of excellence and innovation, but there is a consensus today that higher education in the U.S. is not on a sustainable path. My books Abelard to Apple and Revolution in Higher Education (both from MIT Press) chronicled the events that led to the current state of affairs and describe an optimistic but much changed ecosystem for...
Video details
Date: 5 May 2016
Duration: 00:55:18
Collection: MSR Talk Series
SwimTrain: Never swim alone with this cooperative “exergame” for group fitnessDespite the health benefits, not many people would play soccer by themselves. So why swim by yourself? The Korea Advanced Institute of Science and Technology (KAIST) and Microsoft Research Asia (MSRA) will tell you that now you don’t have to with their new cooperative “exergame”, SwimTrain. Their project is an app for your smartphone, which, with a waterproof case and a pair of underwater headphones, lets swimmers join virtual teams to cooperate and compete. It uses all the great tech packed into your...
Video details
Date: 5 May 2016
Duration: 00:00:24
Publisher: Microsoft
John Doench
Genetic Screens with CRISPR: A New Hope in Functional GenomicsFunctional genomics attempts to understand the genome by disrupting the flow of information from DNA to RNA to protein and then observing how the cell or organism changes in response. Both RNAi and CRISPR technologies are simply hacks of systems that originally evolved to silence viruses, reprogrammed to target genes we’re interested in studying, as decoding the function of genes is a critical step towards understanding how gene dysfunction leads to disease. Here we will discuss the development and...
Video details
Date: 4 May 2016
Duration: 00:46:40
Betsy DiSalvo and Blair MacIntyre
Studio Pedagogy in Computer Classes with Projection ARSTEM education often involves computer-based work, from modeling and simulation in engineering, to programming in computer science, to Mathematica work in mathematics classes. Even using novel pedagogy like pair programming, the opportunities for collaboration, awareness of others' work, and social learning is limited to who can see the screen. We address this issue in the AR Studio Class project, which leverages Augmented Reality presentation and sensing technology to integrate studio art and design...
Video details
Date: 4 May 2016
Duration: 01:13:34
Collection: MSR Talk Series
Daniel Ahlberg
Competing Growth and UrnsWe study survival among two competing types in two settings: a planar growth model related to two-neighbour bootstrap percolation, and a system of urns with graph-based interactions. In the urn scheme, each vertex of a graph G has an associated urn containing some number of either blue or red balls (but not both). At each time step, a ball is chosen uniformly at random from all those currently present in the system, a ball of the same colour is added to each neighbouring urn, and balls in the same urn but...
Video details
Date: 3 May 2016
Duration: 01:08:49
Collection: MSR Talk Series
Paul Gibbons
The Science of Successful Organizational Change: How Leaders Set Strategy, Change Behavior, and Create an Agile CultureWhy most of what you read about change management is nonsense... Is it time to euthanize Change Management, and replace the concept with Change-Agile Businesses and Change Leadership? Why? More importantly, how? Turbulent environments demand constant change, but the mindset, skills, and behaviors taught to business leaders are unhelpful and sometimes flatly misleading. What is more, many high-profile approaches to change do not help: they are based on untested belief systems, unreliable methods, and...
Video details
Date: 28 April 2016
Duration: 01:01:56
Collection: Visiting Speaker Series
Daniel Shapiro
Negotiating the Nonnegotiable: How to Resolve Your Most Emotionally Charged ConflictsBefore you get into your next conflict, read Negotiating the Nonnegotiable. It is not just 'another book on conflict resolution,' but a crucial step-by-step guide to resolve life's most emotionally challenging conflicts - whether between spouses, a parent and child, a boss and an employee, or rival communities or nations. These conflicts can feel nonnegotiable because they threaten your identity and trigger what Shapiro calls the Tribes Effect, a divisive mind-set that pits you against the other side. Once...
Video details
Date: 25 April 2016
Duration: 01:02:34
Collection: Visiting Speaker Series
A video that demonstrate the ability of Open Test Platform for LTE/LTE-U to connect an off-the-shelf LTE dongle.
Video details
Date: 25 April 2016
Duration: 00:01:06
Publisher: Microsoft
Vasilis Gkatzelis
Approximating the Nash Social Welfare with Indivisible ItemsWe study the problem of allocating a set of indivisible items among agents with additive valuations with the goal of maximizing the geometric mean of the agents' valuations, i.e., the Nash social welfare. This problem is known to be NP-hard, and our main result is the first efficient constant-factor approximation algorithm for this objective. We first observe that the integrality gap of the natural fractional relaxation is unbounded, so we propose a different fractional allocation which implies a tighter...
Video details
Date: 20 April 2016
Duration: 00:56:49
Collection: MSR Talk Series
Ziming Zhang
Shared Latent Models for Zero-Shot LearningWe develop a framework for zero-shot learning (ZSL) with a goal towards understanding recognition for scenarios where certain class-specific training data could be limited or unavailable. We explore ZSL as a prototypical instance of multimedia recognition to understand how multi-domain data (e.g. words, phrases, attributes) can help overcome lack of training data in the target domain (e.g. videos, images). We develop ZSL and its variations to investigate the value of having different degrees of information...
Video details
Date: 19 April 2016
Duration: 00:54:50
Collection: Candidate Talk
James Martens
2nd-order Optimization for Neural Network TrainingNeural networks have become the main workhorse of supervised learning, and their efficient training is an important technical challenge which has received a lot of attention. While stochastic gradient descent (SGD) with momentum works well enough in many situations, its performance declines dramatically as networks become deeper and more complex. Given their success in other domains, 2nd-order optimization methods seem like a promising alternative. Unfortunately, the cost of inverting the curvature...
Video details
Date: 13 April 2016
Duration: 01:26:58
Rachit Agarwal
Building Systems that Query on Compressed DataWeb services today want to support sophisticated queries, with stringent interactivity constraints. Many recent studies have argued that in-memory query execution is one of the keys to achieving query interactivity. However, as web services scale to larger data sizes, executing queries in memory becomes increasingly challenging. As a result, existing systems fall short of supporting sophisticated interactive queries at scale.In this talk, we present Succinct, a distributed data store that supports...
Video details
Date: 12 April 2016
Duration: 01:01:53
Collection: Candidate Talk
Varun Jampani
Learning to Propagate Information Across PixelsNatural images exhibit high information correlation across pixels. Bilateral filtering provide a simple yet powerful framework for information propagation across pixels. The common use-case is to manually choose a parametric filter type, usually a Gaussian filter. In this work, we generalise the paramterization using a high-dimensional linear approximation and derive a gradient descent algorithm so the filter parameters can be learned from data. We demonstrate the use of learned bilateral filters in...
Video details
Date: 11 April 2016
Duration: 01:11:49
Ranjit Kumaresan
Privacy-Preserving Smart ContractsCryptographic technologies such as encryption and authentication provide stability to modern electronic commerce. Recent technologies such as Bitcoin have the potential to further enhance the way we conduct electronic commerce. In this talk, I will describe a recent line of work that develops a robust theory of privacy-preserving contracts that are self-enforcing and do not require third-party intervention. Starting from Bitcoin-inspired abstractions, the theory enables building provably secure and...
Video details
Date: 7 April 2016
Duration: 01:12:15
Lisa Servon
What do a Mexican immigrant living in the South Bronx, a twenty-something graduate student, and a telemarketer in Dallas have in common? All three are victims of our dysfunctional mainstream bank and credit system. As banks have grown larger and focused less on serving ordinary consumers, many have begun to get their financial needs meet from alternative financial services providers like check cashers and predatory lenders. Although these businesses are labeled as predatory and sleazy, their customers...
Video details
Date: 6 April 2016
Duration: 01:00:07
Whitney Johnson
Disrupt Yourself: Putting the Power of Disruptive Innovation to WorkCompanies don't disrupt. People do. Pursuing a disruptive course isn't just a nice thing to do, there's a compelling business case: the odds of success are 6x higher and the revenue opportunity is 20x greater. The most fundamental unit of disruption is the individual. The best way to drive corporate innovation is through personal disruption. Because the cycle of disruption is non-linear, the S-curve that we typically use is reimagined to gauge how quickly a new product or service will be adopted. There...
Video details
Date: 5 April 2016
Duration: 00:48:24
Collection: Visiting Speaker Series
Tarah Wheeler Van Vlack
Women in Tech: Take Your Career to the Next Level with Practical Advice and Inspiring StoriesWomen who are considering getting in to tech or taking their tech careers to the next level face are looking for practical advice and inspiring stories and they often have similar questions: What are the secrets of salary negotiation? And what is the best format for tech resumes? How do you ace the interview? How do you compare contracting and salaried tech work? The secrets of mentorship will be discussed, along with pointers on starting your own company.
Video details
Date: 4 April 2016
Duration: 00:51:54
Collection: Visiting Speaker Series
He Wang
I am a Mobile Device and I can Sense my UserMobile devices like smartphones and smartwatches are beginning to 'stick' to the human body. Given that these devices are equipped with a variety of sensors, they are becoming a natural platform to understand various aspects of human behavior. This talk will focus on just one dimension of human behavior, namely 'location'. I will begin by discussing my research on localizing humans in indoor environments, a problem that requires precise tracking of human footsteps. I will then move into localizing and...
Video details
Date: 31 March 2016
Duration: 00:57:53
Collection: Candidate Talk
Shimon Whiteson
Lab Tutorial: Multi-Objective Decision MakingMany real-world problems require making decisions that involve multiple possibly conflicting objectives. To succeed in such tasks, intelligent agents need algorithms that can efficiently find different ways of balancing the trade-offs that such objectives present. In this talk, I provide an introduction to decision-theoretic planning in the presence of multiple objectives. First, I present an overview of multi-objective decision-theoretic formalisms and show that different assumptions about these problems...
Video details
Date: 31 March 2016
Duration: 01:01:27
Wei Yu
We proposed a doubly stochastic primal-dual coordinate optimization algorithm for regularized empirical risk minimization that can be formulated as a saddle-point problem using convex conjugate functions. Different from the existing coordinate methods, the proposed method randomly samples both primal and dual coordinates to update solutions. The convergence of our method is established in both the solution's distance to optimality and the primal-dual objective gap. When applied to the data matrix...
Video details
Date: 30 March 2016
Duration: 00:50:37
Collection: MSR Talk Series
Esha Ghosh
Efficient Zero-Knowledge Authenticated Data StructuresWith the advent of cloud storage and computing, adopting cloud services to reduce operational, maintenance and storage costs, is becoming increasingly common — both for individuals and corporations. However, the fact that the data owner is not in physical possession of the data anymore raises important challenges in terms of integrity of data. Moreover, this is more than just a theoretical risk, since third party service providers are typically allowed to access the remotely stored data. Such risks raise...
Video details
Date: 30 March 2016
Duration: 00:54:00
Collection: MSR Talk Series
1–25 of 6120
Sort
Show 25 | 50 | 100
1234567Next 
> Our research