Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Our research
Content type
+
Downloads (448)
+
Events (422)
 
Groups (145)
+
News (2657)
 
People (737)
 
Projects (1069)
+
Publications (12193)
+
Videos (5463)
Labs
Research areas
Algorithms and theory47205 (63)
Communication and collaboration47188 (63)
Computational linguistics47189 (10)
Computational sciences47190 (69)
Computer systems and networking47191 (118)
Computer vision208594 (19)
Data mining and data management208595 (7)
Economics and computation47192 (25)
Education47193 (82)
Gaming47194 (21)
Graphics and multimedia47195 (63)
Hardware and devices47196 (66)
Health and well-being47197 (29)
Human-computer interaction47198 (152)
Machine learning and intelligence47200 (84)
Mobile computing208596 (14)
Quantum computing208597 (16)
Search, information retrieval, and knowledge management47199 (61)
Security and privacy47202 (24)
Social media208598 (10)
Social sciences47203 (41)
Software development, programming principles, tools, and languages47204 (33)
Speech recognition, synthesis, and dialog systems208599 (9)
Technology for emerging markets208600 (4)
1–25 of 5463
Sort
Show 25 | 50 | 100
1234567Next 
Kenneth D. Forbus
Multimodal Learning from Bespoke DataBig Data and Deep Learning have rightly received a lot of attention, since their combination has led to breakthroughs in performance on some very hard problems. But there are many learning problems for which people don't need even a hundred examples, much less a million – learning the rules of tic-tac-toe, for example, or teaching a new assistant how to fill out a form. Understanding how to learn rapidly from a small number of examples is crucial both for understanding human cognition and to create...
Video details
Date: 27 February 2015
Duration: 01:05:32
Collection: MSR Talk Series
Microsoft Band enhancements include machine learning boostMicrosoft researchers' innovations add a virtual keyboard and voice replies to Microsoft Band, along with machine-learning enhancements to canned responses.​
Video details
Date: 25 February 2015
Duration: 00:03:01
Publisher: Microsoft
Michael Golembewski
Considering Tools for Artists, Creative Processes, and Design IdeationThis presentation describes a body of practice-led research relating to the development of technologies for gallery-focused fine artists. It describes the critical models, observational studies, design processes, and practical activities informing the creation of an exemplar software-based artists’ tool. This tool, an application named Foamcore Modelmaker, provides a means of pre-visualising the various gallery spaces in which artists might show their work, both via on-screen representation, and also...
Video details
Date: 25 February 2015
Duration: 00:54:54
Collection: UK Cambridge - Lecture/Seminar
Amy Wilkinson
The CreatorHow do some people turn ideas into enterprises or initiatives that endure? Why do some people succeed when so many others fail? The Creator's Code unlocks the six essential skills that turn small notions into big companies or successful efforts within established companies. Over the course of five years, Amy Wilkinson conducted rigorous interviews and analyzed research across many different fields. From the creators of the companies ranging from Yelp to Chobani to Zipcar, she found that entrepreneurial...
Video details
Date: 24 February 2015
Duration: 00:56:54
Collection: Visiting Speaker Series
Jeff Shrager
Molecular Tumor Boards: What they are; What they do; What they needFor some time my colleagues and I have been studying cancer tumor boards, now rapidly becoming molecularized by the molbio/omics/big-data revolutions. A Molecular Tumor Board (MTB) is essentially an engineering team charged with giving real-time guidance to a human being facing a life-threatening disease. However, unlike 'real' engineering teams, who have numerous tools and strong theories to guide them in their designs, MTBs are pretty much stuck with search engines, which are rather weak reasoning aides....
Video details
Date: 24 February 2015
Duration: 00:50:04
Collection: MSR Talk Series
Brendan McMahan, Lihong Li, Wen Wei Loh, and Safiye Celik
UW - MSR Machine Learning workshop 2015 - Session 313:00Delay-Tolerant Algorithms for Asynchronous Distributed Online Learning - Brendan McMahan We analyze new online gradient descent algorithms for distributed systems with large delays between gradient computations and the corresponding updates. Using insights from adaptive gradient methods, we develop algorithms that adapt not only to the sequence of gradients, but also to the precise update delays that occur. We first give an impractical algorithm that achieves a regret bound that precisely quantifies...
Video details
Date: 20 February 2015
Duration: 00:54:23
Collection: UW-MSR Machine Learning Workshop 2015
Henry Corrigan-Gibbs
Charles River Crypto Day - Building Anonymous Messaging Systems that Encryption can protect the contents of a message being sent over an open network. In many situations, though, hiding the contents of a communication is not enough: parties to a conversation want to conceal the fact that they ever communicated. In this talk, I will explain how anonymity-preserving messaging systems can help ‘hide the metadata’ pertaining to a conversation and I will survey the state of the art in anonymous messaging protocols. A limitation of existing protocols is that they exhibit...
Video details
Date: 20 February 2015
Duration: 01:02:20
Collection: Charles River Crypto Day
Daniela Witten, Kean Ming Tan, and Abram Friesen
UW - MSR Machine Learning workshop 2015 - Session 211:00 Sure Screening for Guassian Graphical Models - Daniela Witten In an undirected graphical model, the nodes represent random variables, and an edge represents conditional dependence between the corresponding pair of nodes. In recent years, the statistical and machine learning communities have focused a lot of attention upon the problem of learning the structure of a graph in the high-dimensional setting. We propose graphical sure screening, or GRASS, an extremely simple and computationally-efficient...
Video details
Date: 20 February 2015
Duration: 00:32:18
Collection: UW-MSR Machine Learning Workshop 2015
Ran Gilad-Bachrach, Ali Farhadi, Saleema Amershi, Tyler Johnson, and Christopher Lin
UW - MSR Machine Learning workshop 2015 - Session 19:30 Opening Remarks - Ran Gilad-Bachrach9:45 Toward Scalable Visual Recognition - Ali Farhadi Recognition is graduating from labs to real-world applications. While it is encouraging to see its potential being tapped, it brings forth a fundamental challenge: scalability. How can we learn a model for any concept that exhaustively covers all its appearance variations, while requiring minimal or no human supervision for compiling the vocabulary of visual variance, gathering the training images and...
Video details
Date: 20 February 2015
Duration: 01:04:00
Collection: UW-MSR Machine Learning Workshop 2015
Huijia (Rachel) Lin
Charles River Crypto Day - Constant-Round Concurrent Zero-knowledge from Indistinguishability ObfuscationWe present a constant-round concurrent zero-knowledge protocol for NP. Our protocol relies on the existence of families of collision-resistant hash functions, one-way permutations, and indistinguishability obfuscators for P/poly (with slightly super-polynomial security).
Video details
Date: 20 February 2015
Duration: 01:10:43
Collection: Charles River Crypto Day
Tal Malkin
Charles River Crypto Day - The Power of Negations in CryptographyThe study of monotonicity and negation complexity for Boolean functions has been prevalent in complexity theory as well as in computational learning theory, but little attention has been given to it in the cryptographic context. Recently, Goldreich and Izsak (2012) have initiated a study of whether cryptographic primitives can be monotone, and showed that one-way functions can be monotone (assuming they exist), but a pseudorandom generator cannot. In this work, we start by filling in the picture and...
Video details
Date: 20 February 2015
Duration: 01:11:58
Collection: Charles River Crypto Day
Sarah Gallacher
Un-Computing: Shaking off the ‘Computer’ BaggageI learned at an early stage in my computer science research career that when relatives and friends ask me what I do, I shouldn’t try to give them a literal explanation but instead keep it brief, answering with a few simple words...’computing’ or ‘computer science’. However, very often this is met with the response “Oh I don’t like computers, I can’t use them!”. My internal reaction is “Really? But don’t you own a smartphone and an iPad and a Pebble…etc”, (which they exhibit no issues with when fluidly...
Video details
Date: 20 February 2015
Duration: 00:56:06
Collection: UK Cambridge - Lecture/Seminar
Mikolas Janota
Solving QBF by Counterexample-Guided Abstraction RefinementQuantified Boolean formulas (QBFs), as a PSPACE-complete problem, represent a powerful formalism but also a computational challenge. In this talk we will look at how QBFs can be solved by the counterexample-guided abstraction refinement paradigm (CEGAR). The presented technique expands the formula into a SAT problem and uses a SAT solver in a blackbox-fashion. In the second part of the talk we will look at some theoretical aspects of this algorithm, which let us understand the significant improvements in...
Video details
Date: 20 February 2015
Duration: 00:57:41
Collection: UK Cambridge - Lecture/Seminar
Nikhil Devanur
Fast Algorithms for Online Stochastic Convex ProgrammingWe introduce the Online Stochastic Convex Programming (CP) problem, a very general version of stochastic online problems which allows arbitrary convex objectives and feasibility constraints. This problem generalizes the well-studied online stochastic packing problem. We present fast algorithms for these problems, which achieve near-optimal guarantees for the i.i.d. and the random permutation models of stochastic inputs. When applied to the special case of online packing, our ideas yield a simpler and...
Video details
Date: 19 February 2015
Duration: 01:04:53
Collection: MSR Talk Series
Gyeonghoon Kim
A Real-time Augmented Reality Processor and a Smart Glasses SystemReal-time augmented reality (AR) is actively studied for the future user interface and experience (UI/UX) in smart glasses platforms. However, due to the small battery size and limited computing power of the current smart glasses, it has failed to implement the real-time markerless AR in the glasses-type form-factor. In the presentation, I propose a real-time and low-power AR processor for advanced and recognition-based AR applications. For the high throughput, the processor adopts task-level pipelined...
Video details
Date: 19 February 2015
Duration: 00:45:59
Collection: MSR Talk Series
Tamara Munzner
MSR Talk Series: Visualization Analysis and DesignBiomaterials Computer-based visualization (vis) systems provide visual >representations of datasets designed to help people carry out tasks more effectively. Visualization is suitable when there is a need to augment human capabilities rather than replace people with computational decision-making methods. The design space of possible vis idioms is huge, and includes the considerations of both how to create and how to interact with visual representations. Vis design is full of trade-offs, and most...
Video details
Date: 19 February 2015
Duration: 01:28:57
Collection: MSR Talk Series
Steve Young
Lab Tutorial: Towards Open-domain Spoken Dialogue SystemsVirtually all current spoken dialogue systems are designed to operate in either a specific carefully defined domain such as restaurant information and appointment booking, or they have very limited conversational ability such as in Siri and Google Now. However, if voice is to become a significant input modality for accessing web-based information and services, then techniques will be needed to enable conversational spoken dialogue systems to operate within open domains. This talk will discuss methods by...
Video details
Date: 19 February 2015
Duration: 01:02:10
Collection: UK Cambridge - Lab Tutorial
Tomas Petricek
Context-aware programming languagesModern computer programs do not run in the void. They run in rich environments that provide important data sources, services and other functionality that is required by the programs. For example, mobile applications access GPS locations, call server-side code over the network, access data from public REST-based services and so on. Yet, programming languages often assume that the initial context is an empty set.In this talk, I'll cover two research directions that make programming languages more...
Video details
Date: 18 February 2015
Duration: 00:57:12
Collection: UK Cambridge - Lecture/Seminar
Sharad Mehrotra
Risk Aware Approach to Data Confidentiality in Cloud ComputingThis talk focuses on the the issue of 'loss of control' that results when users outsource data and computation to the clouds. While loss of control has multiple manifestations, we focus on the data privacy and confidentiality implications when cloud providers are untrusted. Instead of following the well studied (but still unsolved) path of encrypting data when outsourcing and computing on the encrypted domain, the talk advocates a risk-based approach to partitioning computation over hybrid clouds that...
Video details
Date: 17 February 2015
Duration: 01:27:03
Collection: MSR Talk Series
Tarleton Gillespie
Social Media Platforms and the Curation of Public CultureMedia sociologists have long studied the role that private, commercial media providers play in shaping public culture. It has long been apparent that broadcasters and publishers make choices and assumptions that have consequences for the information we encounter, take seriously, or overlook.However, these questions are only beginning to be asked about the networked information environment and the comparable role played by social media. Social networking sites, search engines, and user content platforms are...
Video details
Date: 16 February 2015
Duration: 01:37:28
Collection: Candidate Talk
Colleen Stiles-Shields
Improving Behavioral Health Intervention Technologies: Harnessing the Human Side of AppsHealth apps have become common, with thousands on app stores. Among the most common are those that address mental health problems. However, it is increasingly apparent that these apps are not used, even by those who download them. There are two general strategies that harness human connection to address the problem. The first is to link apps into human processes of care. The Supportive Accountability Model indicates that patients are more likely to engage in behaviors if they know that a valued human...
Video details
Date: 13 February 2015
Duration: 00:56:28
Collection: MSR Talk Series
Piotr Mardziel
Modeling, Quantifying, and Limiting Adversary KnowledgeUsers participating in online services are required to relinquish control over potentially sensitive personal information, exposing them to intentional or unintentional miss-use of said information by the service providers. Users wishing to avoid this must either abstain from often extremely useful services, or provide false information which is usually contrary to the terms of service they must abide by. An attractive middle-ground alternative is to maintain control in the hands of the users and provide a...
Video details
Date: 13 February 2015
Duration: 00:57:07
Collection: UK Cambridge - Lecture/Seminar
Joe Decuir
Internet of Things: Support IP Smart Objects over Bluetooth SmartThe 'Internet of Things' is the latest technical problem and opportunity. At this time there is no one standard; there are at least 150 companies and alliances all proposing to tell us how this will work. The CEO of Samsung is correct: none of us can do this alone. This presentation will describe a particular plan for organizing the IoT space: using IP Smart Object application over a stack including 6LoWPAN, IPv6, Internet Protocol Support Profile (IPSP) and the Bluetooth Smart™ (Bluetooth Low Energy)...
Video details
Date: 10 February 2015
Duration: 00:55:49
Collection: MSR Talk Series
Alex Orso, Judith Bishop, and Nikolai Tillmann
Code Hunt Workshop - Day 2 Session 71st Code Hunt Workshop Microsoft Research, Redmond, WA Conference Room 99/1919 February 9-10, 2015 Goals of the workshop - To expose the state of the platform and data of Code Hunt and its underlying software, Pex (also called Smart Unit Tests now), and - To collectively decide on development work that can be done by all of us in the near future. Some topics of discussion We are already working on or proposing some exciting developments for Code Hunt - Hint generation from cloud data and symbolic...
Video details
Date: 10 February 2015
Duration: 00:53:15
Collection: Code Hunt Workshop
Tao Xie and Alfred Thompson
Code Hunt Workshop - Day 2 Session 61st Code Hunt Workshop Microsoft Research, Redmond, WA Conference Room 99/1919 February 9-10, 2015 Goals of the workshop - To expose the state of the platform and data of Code Hunt and its underlying software, Pex (also called Smart Unit Tests now), and - To collectively decide on development work that can be done by all of us in the near future. Some topics of discussion We are already working on or proposing some exciting developments for Code Hunt - Hint generation from cloud data and symbolic...
Video details
Date: 10 February 2015
Duration: 01:27:13
Collection: Code Hunt Workshop
1–25 of 5463
Sort
Show 25 | 50 | 100
1234567Next 
> Our research