Search for tag: "libraries"

Alanson Sample - Reinventing the Physical Layer to Create Interactive Sensing and Computing Systems

Harnessing electromagnetic waves has changed how we live, work, and play. While the semiconductor industry has enabled faster, cheaper, and lower power wireless computing devices, there is the…

From  Kathryn Gentilello 3 Days ago 3 views 0  

Kira Barton - Advancements in Modeling, Sensing and Control for High-Resolution Additive Manufacturing

Additive manufacturing (AM) describes a class of processes that perform a layer-by-layer “bottom-up” fabrication approach as opposed to traditional top-down, subtractive fabrication such…

From  Kathryn Gentilello 3 Days ago 3 views 0  

Ashok Goel, Rob Kadel, Lauren Margulieux, Brittany Aiello - Blended Learning in Practice: A Guide for Practitioners and Researchers

A Guide for Practitioners and Researchers (MIT Press) A guide to both theory and practice of blended learning offering rigorous research, case studies, and methods for the assessment of educational…

From  Kathryn Gentilello 4 Days ago 9 views 0  

Cody Fleming - Safety of Autonomous Systems: Challenges in Coordination, Consistency, and Integration

Recent issues with the Boeing 737-MAX point to challenges in software engineering and the algorithms that the software must implement. However, the 737-MAX is a microcosm of several other problems…

From  Kathryn Gentilello 4 Days ago 3 views 0  

Shimeng Yu - Neuro-Inspired Computing with Synaptic and Neuronal Devices

Neuro-inspired computing is a new computing paradigm that emulates the neural network for information processing. To enable the large-scale neuromorphic system, it is important to develop compact…

From  Kathryn Gentilello 5 Days ago 2 views 0  

J. Mark Souther - Mobilizing History: Reflections on a Decade of Digital Humanities Practice on Two Continents

This event will combine the traditional lecture and a live-recorded interview with the producers of the “Lost in the Stacks” podcast, as Souther reflects on his experience in modeling…

From  Kathryn Gentilello 5 Days ago 4 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello 5 Days ago 6 views 0  

Sanjeev Srivastava - AI Driven Design Approach

Design Space Exploration (DSE) is an activity that is performed to systematically analyze several design points and then select the design(s) based on parameters of interest and design requirements.…

From  Kathryn Gentilello 5 Days ago 3 views 0  

Na Ji - Imaging the brain at high spatiotemporal resolution

Physics has long employed optical methods to probe and manipulate matter on scales from the infinitesimal to the immense. To understand the brain, we need to monitor physiological processes of single…

From  Kathryn Gentilello 2 Weeks ago 1 views 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello 2 Weeks ago 7 views 0  

Leslie Kaelbling - Doing for Our Robots What Nature Did for Us

We, as robot engineers, have to think hard about our role in the design of robots and how it interacts with learning, both in “the factory” (that is, at engineering time) and in…

From  Kathryn Gentilello 2 Weeks ago 5 views 0  

Jayakanth Ravichandran - Dimensional Control of Light-Matter Interaction in Perovskite Chalcogenides

Perovskite Chalcogenides are a new class of semiconductors which have tunable band gap in the visible to infrared part of the electromagnetic spectrum. Besides this band gap tunability, they offer a…

From  Kathryn Gentilello 2 Weeks ago 1 views 0  

Hanjun Dai - Adversarial Attack on Graph-Structured Data

Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to…

From  Kathryn Gentilello 2 Weeks ago 12 views 0  

Johannes Schmidt-Hieber - Mathematics for Deep Neural Networks: Energy landscape and open problems (Lecture 5/5)

To derive a theory for gradient descent methods, it is important to have some understanding of the energy landscape. In this lecture, an overview of existing results is given. The second part of the…

From  Kathryn Gentilello 3 Weeks ago 17 views 0