Search for tag: "sure"

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello A day ago 2 views 0  

James Park - Shape Machine and Parametrics

11:15 - 11:30 AM - Shape Machine and Parametrics James Park, BSArch, MArch PhD Student and Research Assistant Shape Computation Lab Georgia Institute of Technology

From  Kathryn Gentilello A day ago 2 views 0  

Tzu-Chieh Kurt Hong - Shape Machine and Interpreters

11:00- 11:15AM - Shape Machine and Interpreters Tzu-Chieh Kurt Hong, BE, ME PhD Student and Research Assistant Shape Computation Lab Georgia Institute of Technology

From  Kathryn Gentilello A day ago 2 views 0  

Cvetelina Hill - Shape Machine and Shape Signature

10:45 - 11:00 AM - Shape Machine and Shape Signature Cvetelina Hill, MS Math PhD Student School of Mathematics Georgia Institute of Technology

From  Kathryn Gentilello A day ago 2 views 0  

Alanson Sample - Reinventing the Physical Layer to Create Interactive Sensing and Computing Systems

Harnessing electromagnetic waves has changed how we live, work, and play. While the semiconductor industry has enabled faster, cheaper, and lower power wireless computing devices, there is the…

From  Kathryn Gentilello A week ago 4 views 0  

Kira Barton - Advancements in Modeling, Sensing and Control for High-Resolution Additive Manufacturing

Additive manufacturing (AM) describes a class of processes that perform a layer-by-layer “bottom-up” fabrication approach as opposed to traditional top-down, subtractive fabrication such…

From  Kathryn Gentilello A week ago 3 views 0  

Konstantin Batygin - Planet Nine From Outer Space

At the outskirts of the solar system, beyond the orbit of Neptune, lies an expansive field of icy debris known as the Kuiper belt. The orbits of the individual asteroid-like bodies within the Kuiper…

From  Kathryn Gentilello A week ago 4 views 0  

Shimeng Yu - Neuro-Inspired Computing with Synaptic and Neuronal Devices

Neuro-inspired computing is a new computing paradigm that emulates the neural network for information processing. To enable the large-scale neuromorphic system, it is important to develop compact…

From  Kathryn Gentilello A week ago 3 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello A week ago 7 views 0  

John Baez - Mathematical Mysteries of the Periodic Table

Why do atoms behave the way they do? Why do electrons form “shells,” as seen in the periodic table? Why does the first shell hold 2 electrons, the second 8, and the third 18: twice the…

From  Kathryn Gentilello A week ago 3 views 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello 3 Weeks ago 9 views 0  

Jayakanth Ravichandran - Dimensional Control of Light-Matter Interaction in Perovskite Chalcogenides

Perovskite Chalcogenides are a new class of semiconductors which have tunable band gap in the visible to infrared part of the electromagnetic spectrum. Besides this band gap tunability, they offer a…

From  Kathryn Gentilello 3 Weeks ago 1 views 0  

Hanjun Dai - Adversarial Attack on Graph-Structured Data

Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to…

From  Kathryn Gentilello 3 Weeks ago 12 views 0  

Johannes Schmidt-Hieber - Mathematics for Deep Neural Networks: Energy landscape and open problems (Lecture 5/5)

To derive a theory for gradient descent methods, it is important to have some understanding of the energy landscape. In this lecture, an overview of existing results is given. The second part of the…

From  Kathryn Gentilello 3 Weeks ago 17 views 0  

Johannes Schmidt-Hieber - Mathematics for Deep Neural Networks: Statistical theory for deep ReLU networks (Lecture 4/5)

We outline the theory underlying the recent bounds on the estimation risk of deep ReLU networks. In the lecture, we discuss specific properties of the ReLU activation function that relate to skipping…

From  Kathryn Gentilello 3 Weeks ago 12 views 0  

Cherie R. Kagan - Designer Colloidal Nanocrystal Materials for Electronic and Optical Applications

Semiconductor and plasmonic nanocrystals are known for their size and shape dependent photo-luminescence and localized surface plasmon resonances, respectively. In this talk, I will describe the use…

From  Kathryn Gentilello A month ago 10 views 0