News
Recently there have been renewed interests in single-hidden-layer neural networks (SHLNNs). This is due to its powerful modeling ability as well as the existence of some efficient learning algorithms.
When you store data in the cloud, you entrust the cloud provider with your data. You essentially cross your fingers and hope the provider won’t leak the data, tamper with it, or leave it vulnerable to ...
FT-IR spectroscopy has shown potential as an imaging modality for cancer detection. This method measures the local absorbance of infrared light by a specimen, providing rich, quantitative, molecular ...
Asynchrony is fundamental to a broad class of software systems such as device drivers, cloud infrastructure, interacting web services, and client-server web applications. These software systems ...
What makes a platform suitable to both research and development? It is not simply the artifacts that are generated, but the tools that the platform brings to bear on evaluating the usefulness and ...
The immense scale of the Web has rendered itself as a huge repository storing information about various types of entities (e.g., persons, companies). Much of information retrieval operations on the ...
Many people are working on near-field user-interface devices that detect hover, gesture, and pose. But there is nothing in the space in front of a device to show the user what to do. This project ...
The best generic tool currently known for attacking lattice-based cryptographic primitives is lattice reduction. Lattice reduction is a representation paradigm: it consists in finding a representation ...
Microsoft Research founder Rick Rashid, in his opening keynote address of Microsoft Research Asia’s 15th Computing in the 21st Century Conference, recounts the core principles he established for the ...
Following fast on the heels of its original BLINK app for Windows Phone 8 —which captures a burst of images when you take a photo so you can select the best shot— Microsoft Research Redmond is ...
In this session, three of the women Faculty Fellows discuss what they are doing to change computer science research and inspire the next generation of computer scientists. Hear how their universities ...
In this lecture, we cover the fundamentals of distributed message-passing algorithms with an emphasis on their correctness. In the first part of the lecture, we cover algorithms for synchronous ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results