Error message

The page you requested does not exist. For your convenience, a search was performed using the query content.

Page not found

Search results

  1. Recent Computer Science Ph.D. graduates (AY 2008-2009)

    ... Automatically Organized from Lectures (PAOL), a content capture system that automatically captures lectures. PAOL-captured ... presentations are created to give students access to class content after the class and through the table of contents allow students to ...

  2. Designing Efficient Context-Aware Mobile Systems

    ... apps such as Facebook that present users with the latest content fetched from the remote servers.  We present an algorithm that ... refresh an app so as to present a user with the freshest content. Finally, we demonstrate the utility of a wristband equipped with ...

  3. Spring 16 Course Descriptions

    ... operating system. Topics will include: producing dynamic content using a server-based language, content serving databases and XML documents, session state management, ...

  4. Foundations of Computing

    ... solve real technological problems, including how to deliver content efficiently and cost-effectively on the Internet, how to automatically ... the investigation of algorithmic problems with geometric content. Its focus is on rigidity, flexibility and motion for constrained ...

  5. Deep-learned Generative Representations of 3D Shape Families

    ... novice and casual users to quickly and easily generate 3D content.  In this work, I will present deep learning algorithms that are ... design cycle of 3D products and let detail-enriched visual content creation become easy for casual modelers. Advisor: Vangelis ...

  6. Get Another Label? Improving Data Quality and Machine Learning Using Multiple, Noisy Labelers

    ... variables on data items, such as "PG-13" for "Adult Content Rating on this Web Page." With the increasing popularity of ... focus on crowdsourcing and on mining user-generated content on the Internet. He received his Ph.D. degree in Computer Science ...

  7. Understanding Politically Motivated Adversaries: Targeted Threats and Censorship Product Fingerprinting

    ... with more effort placed on socially engineering the e-mail content. Based on this observation, we develop the Targeted Threat Index (TTI), ... Conference (characterizing interconnectivity of large content providers). Computer Science Building, Room 151 ...

  8. CS Women Lunch

    ... with more effort placed on socially engineering the e-mail content. Based on this observation, we develop the Targeted Threat Index (TTI), ... Conference (characterizing interconnectivity of large content providers). Computer Science Building, Room 150 ...

  9. Designing Efficient and Accurate Behavior-Aware Mobile Systems

    ... such as Facebook that present users with the latest content fetched from the remote servers. We show that our proposed algorithm delivers application content to the user that is on an average fresh within 3 minutes. An ...

  10. Spring 13 Course Descriptions

    ... operating system. Topics will include: producing dynamic content using a server-based language, content serving databases and XML documents, session state management, ...

Pages