Error message

The page you requested does not exist. For your convenience, a search was performed using the query about.

Page not found

Search results

  1. Gaming the System: How and When Students Become Disengaged

    ... Faculty Host: Beverly Woolf Two studies are described about how student behaviors associated with engagement differ across different ...

  2. DLS Michael Reiter: Side Channels in Multi-tenant Environments

    ... In these attacks, one tenant learns sensitive information about another tenant simply by running on the same hardware with it, but ...

  3. Data Science Tea

    ... and precision medicine Abstract: What can we learn about our societies and ourselves by decoding the genomes of hundreds of ...

  4. Big Data "Inference": Combining Hierarchical Bayes and Machine Learning to Improve Photometric Redshifts

    ... (photometry) for billions of galaxies. To learn things about these galaxies, however, we need to convert these data into physical ...

  5. Tech Tango 2018

    ... invited guests. Don't miss this opportunity to learn about exciting career options in a relaxed, group setting. (No dancing ...

  6. Towards a Science for Security

    ... largely on defending against known attacks. We learn about the latest attack and find a patch to defend against it. So our defenses ...

  7. Unified Streaming Algorithms via Precision Sampling

    ... how it allows us to calculate a wide variety of statistics about a long one-pass data stream in sublinear space.  The algorithm stores ...

  8. Graph Construction for Manifold Discovery

    ... several new directions of study based on varied assumptions about the structure of both the data and downstream task. I will also develop a ...

  9. Robotics, Computer Vision, and Graphics

    ... recognizing the face of an approaching person to learning about dynamics by bouncing a ball. In robotics, our expertise ranges from ...

  10. Introductory Lectures on Security and Privacy

    ... series for undergraduate students interested in learning about the different fields of Cybersecurity. The lectures will be taught to ...

Pages