Optimal Coding for Streaming Authentication
July 20, 2012 - Ran Gelles, UCLASecure Minimal Architecture for Remote Attestation of Embedded Devices
June 25, 2012 - Gene TsudikThe Computational Power of Chemical Reaction Networks
April 26, 2012 - Rebecca Schulman, Johns Hopkins UniversityModeling People from Billions of Photos
April 17, 2012 - Ira Kemelmacher-Shlizerman, University of WashingtonUnderstanding the impact of genetic variation on molecular mechanisms of transcriptional regulation
April 10, 2012 - Roger Pique-Regi, University of ChicagoMachine Learning for Complex Social Processes
April 3, 2012 - Hanna Wallach, University of Massachusetts Amherst- Student Seminar
Designing a Low-Power Mobile Sensing System for Wireless Healthcare Applications
March 30, 2012 - JeongGil Ko, Johns Hopkins University Machine Learning in the Loop
March 30, 2012 - John Langford, Yahoo ResearchCloud Data Protection for the Masses
March 29, 2012 - Elaine Shi, University of California, BerkeleyLearning to Detect Malcious URLs
March 27, 2012 - Justin Ma, University of California, Berkeley- Student Seminar
Crowdsourcing Annotation for Machine Learning in Natural Language Processing Tasks
March 16, 2012 - Omar Zaidan, Johns Hopkins University Towards Scalable User-Agnostic Attack Defense
March 15, 2012 - Zhichun "ZC" Li, NEC Research LabsCybersecurity: How did we get here and how do we get out of here?
March 13, 2012 - Carl Landwehr, University of MarylandScalable Bayesian learning for complex tensor-valued data
March 6, 2012 - Alan Qi, Purdue UniversityEfficient Search and Learning for Language Understanding and Translation
March 2, 2012 - Liang Huang, Information Sciences Institute/ University of Southern CaliforniaComputational approaches for the DNA sequencing data deluge
March 1, 2012 - Ben Langmead, Johns Hopkins UniversityProbabilistic Programming: Beyond Graphical Models
February 28, 2012 - David Wingate, MITMachine Learning in the Bandit Setting: Algorithms, Evaluation, and Case Studies
February 21, 2012 - Lihong Li, Yahoo Research- Don P. Giddens Lecture
From Overlays to Clouds: Inventing a New Network Paradigm
February 16, 2012 - Yair Amir, Johns Hopkins Univeristy Securing The Next Generation Web Platform
February 14, 2012 - Prateek Saxena, University of California, Berkeley- Distinguished Lecturer
From Scripts to Programs
February 9, 2012 - Matthias Felleisen, Northeastern University - Student Seminar
Scalable Database Query Processing
February 9, 2012 - Nolan Li, Johns Hopkins University Motor, Voters, and the Future of Embedded Security
February 7, 2012 - Stephen Checkoway, University of California, San DiegoMissing heritability: new statistical and algorithmic approaches
February 2, 2012 - Or Zuk, The Broad InstituteAlgorithms for learning latent variable models
January 31, 2012 - Daniel Hsu, Microsoft Research- Student Seminar
Indexing and Processing Spatial Range Functions in Data-Intensive Scientific Databases
January 27, 2012 - Eric Perlman, Johns Hopkins University - Student Seminar
Data management in environmental monitoring sensor networks
January 21, 2012 - Jayant Gupchup, Johns Hopkins University