Colloquium

×

Error message

  • Deprecated function: Creation of dynamic property LdapUserConf::$createLDAPAccounts is deprecated in LdapUserConf->load() (line 265 of /var/lib/drupal7/modules/ldap/ldap_user/LdapUserConf.class.php).
  • Deprecated function: Creation of dynamic property LdapUserConf::$createLDAPAccountsAdminApproval is deprecated in LdapUserConf->load() (line 266 of /var/lib/drupal7/modules/ldap/ldap_user/LdapUserConf.class.php).

The IDC CS Colloquium
 

Aharon Bar Hillel: "Large scale feature selection for visual representation learning"

Training accurate visual classifiers from large data sets critically depend on learning the right representation for the problem. I will discuss a representation learning framework based on an iterative interaction of two components: a feature generator suggesting candidate features, and a feature selector choosing among them.

24/12/2015 - 13:30

Klim Efremenko: "Coding For Interactive Communication"

Classic error correcting codes are designed to encode messages sent over a noisy channel from one party to another. They are optimized to correct a large number of errors, while still having efficient encoding and decoding algorithms. However, most modern communication is interactive, where two or more parties are actively sending messages based on the information they received. Classic error correcting codes fail to achieve optimal parameters for interactive communication, and in some cases fail to achieve any error correction at all.

10/12/2015 - 13:30

Alon Rosen: "On the Cryptographic Hardness of Finding a Nash Equilibrium"

The notion of Nash equilibrium (NE) is fundamental to game theory. While a mixed Nash equilibrium is guaranteed to exist in any game, there is no known polynomial-time algorithm for finding one. The tractability of the problem has received much attention in the past decade, in large part due to its theoretical and philosophical significance.

26/11/2015 - 13:30

Yaniv Ben-Itzhak: "EnforSDN: Network Policy Enforcement with SDN"

Data-Centers have been emerged in the past few years. Organizations such Google, Microsoft, and Amazon offer different services which are served by their data-centers. In order to provide sufficient and versatile service, commercial data-centers are always researching and developing for better scaling, performance, security, virtualization, management, and topologies.

03/12/2015 - 13:30

Elette Boyle: "Is there an Oblivious RAM Lower Bound?"

An Oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (JACM 1996), is a (probabilistic) RAM that hides its access pattern, i.e. for every input the observed locations accessed are similarly distributed. Great progress has been made in recent years in minimizing the overhead of ORAM constructions, with
the goal of obtaining the smallest overhead possible.

12/11/2015 - 13:30

Danny Seidner: "The BYOC course - VHDL implementation of a simplified MIPS CPU in a lab course"

This talk describes a computer structure lab course in which the students implement a simplified MIPS CPU. The course is called Build Your Own Computer, BYOC, and is meant to be a continuation course for the basic and theoretical Computer Structure course given in almost any Computer Structure program. It follows a similar approach used in the basic Computer Structure Course and gives the students a practical experience in implementing a CPU and in the methods and approach used for HW FPGA design.

05/11/2015 - 13:30

Moshe Deutsch: "From Crisis to Dawn: Formal Specification and Design - a manner of rigour, precision & modularity"

The deployment of Formal Methods for Software Engineering, paved the way for a remarkably powerful (Mathematical) analysis at, each stage of the SW Development Process. Indeed, the Mathematics provides us with an adequate level of rigour, not only to precisely Specify & Design SW Systems, but also to meticulously reason about their Properties. This provides a very high level of confidence in the Correctness, Safety and Reliability of the final SW Product.

04/06/2015 - 13:30

Zohar Yakhini: "Statistics in ranked lists with applications to bioinformatics"

Statistics in ranked lists plays an important role in analyzing molecular biology measurement data. For example—differential expression analysis yields ranked lists of genes. These ranked lists are analyzed to infer rules and properties. Statistical enrichment methods are of specific interest in this context allowing for the identification of gene sets or sequence elements that are over-represented in the top of measurement derived ranked lists.

07/05/2015 - 13:30

Roy Ofer: "Resource Allocation Games with Multiple Resource Classes"

Media streaming is among the most popular services provided over the Internet. The lack of a central authority that controls the users, motivates the analysis of Media on Demand (MoD) services using game theoretic concepts. In this work we define and study the corresponding resource-allocation game, where users correspond to self-interested players who choose a MoD server with the objective of minimizing their individual cost. A server provides both storage and broadcasting needs.

30/04/2015 - 13:30