Protecting against data breaches; living with mistakes.
A guided tour of data-center networking.
Why rumors spread so quickly in social networks.
Why computer scientists should care about cyber conflict and U.S. national security policy.
An influential theoretician.
Security of the internet and the known unknowns.
A measure of control.
Trust extension for commodity computers.
Smarter photography.
Game changer.
The cybersecurity risk.
The fox and the hedgehog: technical perspective.
Data mining meets city hall.
Data services.
USACM and U.S. legislation.
The halting problem in the clear light of probability.
Exact matrix completion via convex optimization.
Puzzled.
Q&A.
Analyzing medical data.
The myth of the elevator pitch.
Reconstructing the unknown, balancing structure and uncertainty: technical perspective.
Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs.
Scale failure.
Modeling people and places with internet photo collections.
Real-time computer vision with OpenCV.
Don't throw the baby out with the bathwater.
The GCT program toward the