Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Our research
Content type
+
Downloads (448)
+
Events (422)
 
Groups (145)
+
News (2657)
 
People (737)
 
Projects (1069)
+
Publications (12200)
+
Videos (5468)
Labs
Research areas
Algorithms and theory47205 (63)
Communication and collaboration47188 (63)
Computational linguistics47189 (10)
Computational sciences47190 (69)
Computer systems and networking47191 (118)
Computer vision208594 (19)
Data mining and data management208595 (7)
Economics and computation47192 (25)
Education47193 (82)
Gaming47194 (21)
Graphics and multimedia47195 (63)
Hardware and devices47196 (66)
Health and well-being47197 (29)
Human-computer interaction47198 (152)
Machine learning and intelligence47200 (84)
Mobile computing208596 (14)
Quantum computing208597 (16)
Search, information retrieval, and knowledge management47199 (61)
Security and privacy47202 (24)
Social media208598 (10)
Social sciences47203 (41)
Software development, programming principles, tools, and languages47204 (33)
Speech recognition, synthesis, and dialog systems208599 (9)
Technology for emerging markets208600 (4)
1–25 of 5468
Sort
Show 25 | 50 | 100
1234567Next 
Jeannette Wing, Maria Klawe, and Jane Margolis
Introduction: Jeannette Wing, Corporate Vice President at Microsoft Research Maria Klawe, President of Harvey Mudd College: Challenges for Computer Science at the University and K-12 Level Jane Margolis, Senior Researcher at UCLA: Bringing All Students into the Loop of Computer Science Knowledge
Video details
Date: 2 March 2015
Duration: 02:06:38
Collection: MSR Diversity
Kenneth D. Forbus
Multimodal Learning from Bespoke DataBig Data and Deep Learning have rightly received a lot of attention, since their combination has led to breakthroughs in performance on some very hard problems. But there are many learning problems for which people don't need even a hundred examples, much less a million – learning the rules of tic-tac-toe, for example, or teaching a new assistant how to fill out a form. Understanding how to learn rapidly from a small number of examples is crucial both for understanding human cognition and to create...
Video details
Date: 27 February 2015
Duration: 01:05:32
Collection: MSR Talk Series
Yi-Ping Hung
Crossing between Reality and Virtuality – On Virtual Touring of Dunhuang ArtWith the rapid advance of new technologies, human will soon be able to cross the boundary between the reality and virtuality easily. In this talk, I shall introduce an interactive multimedia system, called iM-cave, for virtually touring the famous Dunhuang Grotto, also known as 'Mogao Caves' or 'Caves of the Thousand Buddhas', which is a treasure of Chinese Buddhist culture and art, recorded in historical sources existing over 1,700 years. In the iM-cave system, we have developed a tangible figurine for...
Video details
Date: 26 February 2015
Duration: 01:00:52
Collection: MSR Talk Series
Anja Thieme
Designing Technology for Mental Health and WellbeingMental health and wellbeing are fundamental to our quality of life, enabling us to be resilient against everyday stresses, work productively, and experience life as meaningful. Mental health has become a major concern for society in recent years due to an increase in the occurrence of mental illness and the devastating effects it has on the individual and economy worldwide. This talk introduces the design process and concept of the Spheres of Wellbeing, a set of hybrid digital-physical objects that were...
Video details
Date: 26 February 2015
Duration: 00:51:31
Collection: UK Cambridge - Lecture/Seminar
Helene Steiner
Contextualised interaction in and with our environmentHuman behavior is in synergy with the environment we live in. This environment mediates the human experience,interaction and perception.Interfaces are promoting this interaction with our direct surrounding, they give the chance of bridging the gap not only between our physical and digital but also the natural and artificial worlds.My research focuses on different ways and opportunities to interplay with our surrounding and investigates different opportunities of embedding technology in it. The focus is on...
Video details
Date: 26 February 2015
Duration: 00:49:56
Collection: UK Cambridge - Lecture/Seminar
Microsoft Band enhancements include machine learning boostMicrosoft researchers' innovations add a virtual keyboard and voice replies to Microsoft Band, along with machine-learning enhancements to canned responses.​
Video details
Date: 25 February 2015
Duration: 00:03:01
Publisher: Microsoft
Michael Golembewski
Considering Tools for Artists, Creative Processes, and Design IdeationThis presentation describes a body of practice-led research relating to the development of technologies for gallery-focused fine artists. It describes the critical models, observational studies, design processes, and practical activities informing the creation of an exemplar software-based artists’ tool. This tool, an application named Foamcore Modelmaker, provides a means of pre-visualising the various gallery spaces in which artists might show their work, both via on-screen representation, and also...
Video details
Date: 25 February 2015
Duration: 00:54:54
Collection: UK Cambridge - Lecture/Seminar
Amy Wilkinson
The CreatorHow do some people turn ideas into enterprises or initiatives that endure? Why do some people succeed when so many others fail? The Creator's Code unlocks the six essential skills that turn small notions into big companies or successful efforts within established companies. Over the course of five years, Amy Wilkinson conducted rigorous interviews and analyzed research across many different fields. From the creators of the companies ranging from Yelp to Chobani to Zipcar, she found that entrepreneurial...
Video details
Date: 24 February 2015
Duration: 00:56:54
Collection: Visiting Speaker Series
Jeff Shrager
Molecular Tumor Boards: What they are; What they do; What they needFor some time my colleagues and I have been studying cancer tumor boards, now rapidly becoming molecularized by the molbio/omics/big-data revolutions. A Molecular Tumor Board (MTB) is essentially an engineering team charged with giving real-time guidance to a human being facing a life-threatening disease. However, unlike 'real' engineering teams, who have numerous tools and strong theories to guide them in their designs, MTBs are pretty much stuck with search engines, which are rather weak reasoning aides....
Video details
Date: 24 February 2015
Duration: 00:50:04
Collection: MSR Talk Series
Larry Zitnick, William S. Noble, and Reza Eghbali
UW - MSR Machine Learning workshop 2015 - Session 414:15Commonsense, Vision and Language - Larry Zitnick The recent significant advances in computer vision, natural language processing and other related areas has led to a renewed interest in artificial intelligence applications spanning multiple domains. In this talk, I explore the relation between computer vision, language and commonsense reasoning through the application of image caption generation. Specifically, I describe new approaches for generating captions using recurrent neural networks, and the...
Video details
Date: 20 February 2015
Duration: 00:55:18
Collection: UW-MSR Machine Learning Workshop 2015
Brendan McMahan, Lihong Li, Wen Wei Loh, and Safiye Celik
UW - MSR Machine Learning workshop 2015 - Session 313:00Delay-Tolerant Algorithms for Asynchronous Distributed Online Learning - Brendan McMahan We analyze new online gradient descent algorithms for distributed systems with large delays between gradient computations and the corresponding updates. Using insights from adaptive gradient methods, we develop algorithms that adapt not only to the sequence of gradients, but also to the precise update delays that occur. We first give an impractical algorithm that achieves a regret bound that precisely quantifies...
Video details
Date: 20 February 2015
Duration: 00:54:23
Collection: UW-MSR Machine Learning Workshop 2015
Henry Corrigan-Gibbs
Charles River Crypto Day - Building Anonymous Messaging Systems that Encryption can protect the contents of a message being sent over an open network. In many situations, though, hiding the contents of a communication is not enough: parties to a conversation want to conceal the fact that they ever communicated. In this talk, I will explain how anonymity-preserving messaging systems can help ‘hide the metadata’ pertaining to a conversation and I will survey the state of the art in anonymous messaging protocols. A limitation of existing protocols is that they exhibit...
Video details
Date: 20 February 2015
Duration: 01:02:20
Collection: Charles River Crypto Day
Daniela Witten, Kean Ming Tan, and Abram Friesen
UW - MSR Machine Learning workshop 2015 - Session 211:00 Sure Screening for Guassian Graphical Models - Daniela Witten In an undirected graphical model, the nodes represent random variables, and an edge represents conditional dependence between the corresponding pair of nodes. In recent years, the statistical and machine learning communities have focused a lot of attention upon the problem of learning the structure of a graph in the high-dimensional setting. We propose graphical sure screening, or GRASS, an extremely simple and computationally-efficient...
Video details
Date: 20 February 2015
Duration: 00:32:18
Collection: UW-MSR Machine Learning Workshop 2015
Ran Gilad-Bachrach, Ali Farhadi, Saleema Amershi, Tyler Johnson, and Christopher Lin
UW - MSR Machine Learning workshop 2015 - Session 19:30 Opening Remarks - Ran Gilad-Bachrach9:45 Toward Scalable Visual Recognition - Ali Farhadi Recognition is graduating from labs to real-world applications. While it is encouraging to see its potential being tapped, it brings forth a fundamental challenge: scalability. How can we learn a model for any concept that exhaustively covers all its appearance variations, while requiring minimal or no human supervision for compiling the vocabulary of visual variance, gathering the training images and...
Video details
Date: 20 February 2015
Duration: 01:04:00
Collection: UW-MSR Machine Learning Workshop 2015
Huijia (Rachel) Lin
Charles River Crypto Day - Constant-Round Concurrent Zero-knowledge from Indistinguishability ObfuscationWe present a constant-round concurrent zero-knowledge protocol for NP. Our protocol relies on the existence of families of collision-resistant hash functions, one-way permutations, and indistinguishability obfuscators for P/poly (with slightly super-polynomial security).
Video details
Date: 20 February 2015
Duration: 01:10:43
Collection: Charles River Crypto Day
Tal Malkin
Charles River Crypto Day - The Power of Negations in CryptographyThe study of monotonicity and negation complexity for Boolean functions has been prevalent in complexity theory as well as in computational learning theory, but little attention has been given to it in the cryptographic context. Recently, Goldreich and Izsak (2012) have initiated a study of whether cryptographic primitives can be monotone, and showed that one-way functions can be monotone (assuming they exist), but a pseudorandom generator cannot. In this work, we start by filling in the picture and...
Video details
Date: 20 February 2015
Duration: 01:11:58
Collection: Charles River Crypto Day
Sarah Gallacher
Un-Computing: Shaking off the ‘Computer’ BaggageI learned at an early stage in my computer science research career that when relatives and friends ask me what I do, I shouldn’t try to give them a literal explanation but instead keep it brief, answering with a few simple words...’computing’ or ‘computer science’. However, very often this is met with the response “Oh I don’t like computers, I can’t use them!”. My internal reaction is “Really? But don’t you own a smartphone and an iPad and a Pebble…etc”, (which they exhibit no issues with when fluidly...
Video details
Date: 20 February 2015
Duration: 00:56:06
Collection: UK Cambridge - Lecture/Seminar
Mikolas Janota
Solving QBF by Counterexample-Guided Abstraction RefinementQuantified Boolean formulas (QBFs), as a PSPACE-complete problem, represent a powerful formalism but also a computational challenge. In this talk we will look at how QBFs can be solved by the counterexample-guided abstraction refinement paradigm (CEGAR). The presented technique expands the formula into a SAT problem and uses a SAT solver in a blackbox-fashion. In the second part of the talk we will look at some theoretical aspects of this algorithm, which let us understand the significant improvements in...
Video details
Date: 20 February 2015
Duration: 00:57:41
Collection: UK Cambridge - Lecture/Seminar
Nikhil Devanur
Fast Algorithms for Online Stochastic Convex ProgrammingWe introduce the Online Stochastic Convex Programming (CP) problem, a very general version of stochastic online problems which allows arbitrary convex objectives and feasibility constraints. This problem generalizes the well-studied online stochastic packing problem. We present fast algorithms for these problems, which achieve near-optimal guarantees for the i.i.d. and the random permutation models of stochastic inputs. When applied to the special case of online packing, our ideas yield a simpler and...
Video details
Date: 19 February 2015
Duration: 01:04:53
Collection: MSR Talk Series
Gyeonghoon Kim
A Real-time Augmented Reality Processor and a Smart Glasses SystemReal-time augmented reality (AR) is actively studied for the future user interface and experience (UI/UX) in smart glasses platforms. However, due to the small battery size and limited computing power of the current smart glasses, it has failed to implement the real-time markerless AR in the glasses-type form-factor. In the presentation, I propose a real-time and low-power AR processor for advanced and recognition-based AR applications. For the high throughput, the processor adopts task-level pipelined...
Video details
Date: 19 February 2015
Duration: 00:45:59
Collection: MSR Talk Series
Tamara Munzner
MSR Talk Series: Visualization Analysis and DesignBiomaterials Computer-based visualization (vis) systems provide visual >representations of datasets designed to help people carry out tasks more effectively. Visualization is suitable when there is a need to augment human capabilities rather than replace people with computational decision-making methods. The design space of possible vis idioms is huge, and includes the considerations of both how to create and how to interact with visual representations. Vis design is full of trade-offs, and most...
Video details
Date: 19 February 2015
Duration: 01:28:57
Collection: MSR Talk Series
Steve Young
Lab Tutorial: Towards Open-domain Spoken Dialogue SystemsVirtually all current spoken dialogue systems are designed to operate in either a specific carefully defined domain such as restaurant information and appointment booking, or they have very limited conversational ability such as in Siri and Google Now. However, if voice is to become a significant input modality for accessing web-based information and services, then techniques will be needed to enable conversational spoken dialogue systems to operate within open domains. This talk will discuss methods by...
Video details
Date: 19 February 2015
Duration: 01:02:10
Collection: UK Cambridge - Lab Tutorial
Tomas Petricek
Context-aware programming languagesModern computer programs do not run in the void. They run in rich environments that provide important data sources, services and other functionality that is required by the programs. For example, mobile applications access GPS locations, call server-side code over the network, access data from public REST-based services and so on. Yet, programming languages often assume that the initial context is an empty set.In this talk, I'll cover two research directions that make programming languages more...
Video details
Date: 18 February 2015
Duration: 00:57:12
Collection: UK Cambridge - Lecture/Seminar
Sharad Mehrotra
Risk Aware Approach to Data Confidentiality in Cloud ComputingThis talk focuses on the the issue of 'loss of control' that results when users outsource data and computation to the clouds. While loss of control has multiple manifestations, we focus on the data privacy and confidentiality implications when cloud providers are untrusted. Instead of following the well studied (but still unsolved) path of encrypting data when outsourcing and computing on the encrypted domain, the talk advocates a risk-based approach to partitioning computation over hybrid clouds that...
Video details
Date: 17 February 2015
Duration: 01:27:03
Collection: MSR Talk Series
Tarleton Gillespie
Social Media Platforms and the Curation of Public CultureMedia sociologists have long studied the role that private, commercial media providers play in shaping public culture. It has long been apparent that broadcasters and publishers make choices and assumptions that have consequences for the information we encounter, take seriously, or overlook.However, these questions are only beginning to be asked about the networked information environment and the comparable role played by social media. Social networking sites, search engines, and user content platforms are...
Video details
Date: 16 February 2015
Duration: 01:37:28
Collection: Candidate Talk
1–25 of 5468
Sort
Show 25 | 50 | 100
1234567Next 
> Our research