Error message

The page you requested does not exist. For your convenience, a search was performed using the query about.

Page not found

Search results

  1. Letter From the Chair (Summer 2013)

    ... 10 of Significant Bits, and we'll be sending more details about the program and registration soon. October is prime leaf peeping season, ... sessions (every first Friday of the month) to discuss issues about the academic programs, internships, job and career planning, and other ...

  2. Recent Computer Science Ph.D. graduates (AY 2008-2009)

    ... as well as the cost of drawing incorrect conclusions about differences between engines in both the training and testing phases of ... component classifiers collectively by sharing information about training set selection. This allows our algorithm to build ensembles ...

  3. Letter from the Chair (Winter 2014)

    ... with activity. The 18th was a day of panels and discussion about the impact of computing on computer science research, on research in ... Over the years, a number of alumni have asked about keeping their UMass email account. So this month, we are introducing an ...

  4. Jacobs Studies Biological and Artificial Intelligence

    ... that improve our lives and also new ways of thinking about our own minds." One question that has always fascinated Jacobs is ... in novel circumstances. This finding led him to think about how people integrate information from different information sources. A ...

  5. Enabling Accurate Analysis of Private Network Data

    ... the data, but the data are not being shared due to concerns about privacy. Despite much research in privacy-preserving data analysis, ... framework, we show that only a small amount of background about local network structure is needed to re-identify an "anonymous" ...

  6. Handling the Facebook Avalanche

    ... , with more than 100M users. This talk is about how we handle the avalanche of "Instant Personalization" data, ... using only the first-degree friend network.  We'll talk about how we accomplished this using a combination of on-demand friend data ...

  7. Designing Efficient Context-Aware Mobile Systems

    ... devices. These contexts provide a rich source of information about an individual user and its surroundings such as individual's daily ... with a smartphone to gain additional behavioral insights about the user? In this thesis, we first design a context-query engine that ...

  8. Trust and Protection in the Illinois Browser Operating System

    ... to the overall browsing experience. I will also talk about some of my group's recent work in defending against malicious hardware. ...

  9. Privacy-aware Collaboration Among Untrusted Resource-constrained Devices

    ... information so that service providers can obtain knowledge about a given population of consumers. While a priori, users assume that their ... I address the problem of obtaining useful information about a population using data that is gathered by resource-constrained devices ...

  10. Student & Alumni Networking Night

    08 Nov Thinking about life after UMass? If you want "real world" answers and advice about your career ask someone who has been there! Network with a diverse group ...

Pages