MPI-INF Logo
Campus Event Calendar

Calendar

 



Previous Page | Next Page | Show: 1day | 2 days | 1 week | 2 weeks | 1 month | year


Calendar IconFebruary 2017
MondayTuesdayWednesdayThursdayFridaySaturdaySunday
30
31
13:00-13:30Accepted invitation IconJesper Nederlof: "Faster Space Efficient Algorithms for Subset Sum and Knapsack"
E1 4 - MPI-INF - 024
1
12:15-13:15Accepted invitation IconShida Beigpour: "Inverse Rendering"
E1 5 - 002
2
3
4
5
6
10:00-11:00Accepted invitation IconDr. Maria Christakis: "Guiding program analyzers toward unsafe executions"
G26 - 111
15:00-16:00Accepted invitation IconSairam Gurajada: "Distributed Querying of Large Labeled Graphs"
E1 5 - 0.29
7
13:00-13:45Accepted invitation IconThorsten Theobald: "Some developments in spectrahedral computation"
E1 4 - MPI-INF - 024
8
10:00-11:30Accepted invitation IconArthur Gervais: "On the Security and Scalability of Proof of Work Blockchains"
E1 5 - 029
9
10
11
12
13
14
13:00-13:30Accepted invitation IconVincenzo Bonifaci: "On the Convergence Time of a Natural Dynamics for Linear Programming"
E1 4 - MPI-INF - 024
15
10:00-11:00Accepted invitation IconNadia Polikarpova: "Type-Driven Program Synthesis"
G26 - 111
16
13:00-13:30Accepted invitation IconLuca Becchetti: "Friend or foe? Population Protocols for Community Sensitive Labeling"
E1 4 - MPI-INF - 024
17
10:30-12:00Accepted invitation IconAli Mashtizadeh: "Adventures in Systems Reliability: Replication and Replay"
E1 5 - 029
18
19
20
10:00-11:30Accepted invitation IconSimina Branzei: "Computational fair division and mechanism design"
E1 5 - 029
21
10:30-11:30Accepted invitation IconRenato Mancuso: "Safe, Real-Time Software Reference Architectures for Cyber-Physical Systems"
G26 - 111
10:30-11:30Accepted invitation IconTimothy H. Edgar: "Cybersecurity and civil liberties - how the new U.S. government will approach cyber threats"
E9 1 - 007
11:30-12:30Accepted invitation IconTimothy H. Edgar, Prof. Backes, Prof. Rossow, Mathias Gisch, Ninja Marnau: "State of the net: Weaponized information, manipulated elections – How can IT security safeguard civil liberties & political independence?"
E9 1 - 007
22
10:30-12:00Accepted invitation IconMagnus Myreen: "A New Verified Compiler Backend for CakeML"
E1 5 - 029
23
24
25
26
27
28
10:00-11:00Accepted invitation IconAdish Singla: "Learning With and From People"
G26 - 111
11:00-12:00Accepted invitation IconMaarten de Rijke: "The Birth of Collective Memories: Analyzing Emerging Entities in Text Streams"
E1 4 - 024
15:00-16:00Accepted invitation IconErdal Kuzey: "Populating knowledge bases with temporal information"
E1 4 - 024
1
12:15-13:15Accepted invitation IconPaul Francis: "The Diffix Framework: Noise Revisited, Again"
E1 5 - 002
2
13:00-13:30Accepted invitation IconAdi Rosén: "Semi-Streaming Set Cover"
E1 4 - MPI-INF - 024
3
10:00-11:00Accepted invitation IconMijung Park: "Variational Bayes In Private Settings"
G26 - 111
4
5