Abstract: Graphs and hypergraphs are prevalent in many real world applications arising from online social platforms, recommendation systems, knowledge bases, computational biology and materials science. How to represent...
Abstract: Graphs and hypergraphs are prevalent in many real world applications arising from online social platforms, recommendation systems, knowledge bases, computational biology and materials science. How to represent...
Abstract: Real-world graphs abound with structures: peer-to-peer networks have bounded growth; road networks are planar; social networks have small separators. How do we take these structures to algorithmic advantage? In...
Abstract: Self-driving vehicles will bring us safer, cleaner, and more convenient transportation. To make this dream come true, we need our autonomous system to perceive, plan, and execute effectively in unstructured...
Abstract: Individuals and organizations increasingly analyze data by writing code. Yet, these analyses are often fragile and messy, relying on fragmented and unannotated scripts which can be difficult to piece together or...
Abstract: Entanglement is an essential component of quantum computation, information, and communication. Its applications range from quantum key distribution and secret sharing to quantum sensing. These applications drive...
As data science has broadened its scope in recent years, a number of domains have applied computational methods for classification and prediction to evaluate individuals in high-stakes settings. These developments have...
Recent advances in artificial intelligence have spurred a growing debate on how to think about ethics in a world of semi-intelligent machines. This debate, however, has lacked counterfactual measures comparing people's...
UMass ACM & ACM ICPC will be hosting their first competitive programming competition on Friday, February 28th, 6pm-8pm at the CS Building 150/151. Undergraduate and graduate students of all majors are welcome to...
Abstract: Growing amounts of collected and processed data, on the one hand, and throughput, real-time response, and privacy constraints, on the other hand, increasingly lead to computing systems in which the entirety of...