Search for tag: "security and safety"

Yin Tat Lee - Solving Linear Programs in the Current Matrix Multiplication Time

We show how to solve linear programs with accuracy epsilon in time n^{omega+o(1)} log(1/epsilon) where omega~2.3728639 is the current matrix multiplication constant. This hits a natural barrier of…

From  Kathryn Gentilello A month ago 5 views 0  

Will Perkins - Abstract polymer models, the cluster expansion, and applications

I will give two lectures introducing abstract polymer models and the cluster expansion from statistical physics. I will describe some of the original applications of these tools in statistical…

From  Kathryn Gentilello A month ago 1 views 0  

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello A month ago 21 views 0  

James L. Patton - Deception, ExoNets, SmushWare, and Organic Data: New Frontiers In Neuro-Rehabilitation

Making use of visual display technology and human-robotic interfaces, many researchers have illustrated various opportunities to distort visual and physical realities. We have had success with…

From  Kathryn Gentilello A month ago 4 views 0  

Ryan Diestelhorst - The Future of Computer-Aided Engineering

New advancements in cloud computing and machine learning have created an opportunity for a revolutionary advancement in how hardware engineering is performed. In this talk, Ryan Diestelhorst will…

From  Kathryn Gentilello A month ago 7 views 0  

Frederick Benaben - An AI Framework Used in Crisis Management and Decision Making

Model-Driven Engineering (MDE) is meant, above other usages mainly in software design, to support the process of system design, especially the transitions and the coherency between models of…

From  Kathryn Gentilello A month ago 13 views 0