MPI-INF Logo
Campus Event Calendar

Calendar

 



Previous Page | Next Page | Show: 1day | 2 days | 1 week | 2 weeks | 1 month | year


Calendar IconNovember 2014
MondayTuesdayWednesdayThursdayFridaySaturdaySunday
27
28
29
30
13:00-13:45Accepted invitation IconD1: "D1 Group Meeting"
E1 4 - 024
14:00-15:00Accepted invitation IconFrank Piessens: "Runtime enforcement of security policies on black box reactive programs: theory and practice"
E1 5 - 0.02
16:00-17:00Accepted invitation IconKoushik Sen: "MultiSE: Multi-Path Symbolic Execution using Value Summaries"
G26 - 111
31
1
2
3
4
15:30-16:30Accepted invitation IconNoah Smith: "Machine Learning about People from their Language"
E1 5 - 002
5
10:30-11:30Accepted invitation IconIngmar Weber: "Using Twitter to study Food Consumption and Fitness Behavior"
E1 5 - 029
12:15-13:15Accepted invitation IconChristian Rossow: "Amplification DDoS: Abusing 30-Year-Old Internet Protocols for Denial-of-Service Attacks"
E1 5 - 002
6
10:00-11:00Accepted invitation IconIlya Reshetouski: "Kaleidoscopic Imaging"
E1 4 - 019
13:00-14:00Accepted invitation IconDr. Kai Lawonn: "Illustrative Visualization of Medical Data Sets"
E1 4 - 019
7
8
9
10
11:15-12:15Accepted invitation IconRoger Wattenhofer: "Network Complexity & Complex Networks"
E 1.5 - 002
11
11:30-13:00Accepted invitation IconAnne-Marie Kermarrec: "Scalable personalization infrastructures"
E1 5 - 002
18:00-19:30Accepted invitation IconProf. Dr. Michael Backes, MPI-SWS, Prof. Dr. Paul Francis, MPI-SWS, Staatssekretär Jürgen Lennartz, Thomas Schauf (BVDW), Moderation: Reinhard Karger, DFKI: "Wenn Maschinen zu smart werden - Wie sicher sind unsere Daten?"
E1 5 - 002
12
10:30-12:00Accepted invitation IconRachid Guerraoui: "Generalized Universality"
G26 - 111
13
13:00-13:30Accepted invitation IconD1: "D1 Group Meeting"
E1 4 - 024
13:00-14:00Accepted invitation IconProf. Baoquan Chen: "Urban Sensing and Visualization"
E1 4 - 019
14
15
16
17
10:30-11:30Accepted invitation IconMarcos K. Aguilera: "Yesquel: scalable SQL storage for Web applications"
E1 5 - 029
13:15-14:00Accepted invitation IconPascal Vincent: "Learning representations with autoencoders: a brief overview and a few novel perspectives"
E1 4 - 024
14:00-15:00Accepted invitation IconOksana Denysyuk: "Randomized Solutions to Renaming under Crashes and Byzantine Faults"
E1 5 - 029
18
11:00-12:00Accepted invitation IconEric Heitz: "Multi-scale appearance for realistic and efficient rendering of complex surfaces"
E1 4 - 019
13:00-13:30Accepted invitation IconEunjung Kim: "Algorithmic Applications of Tree-Cut Width"
E1 4 - 024
19
20
13:00-13:30Accepted invitation IconValia Mitsou: "The computational complexity of two card games with theoretical applications"
E1 4 - 024
13:00-14:00Accepted invitation IconStephan Wenger: "Regularized optimization methods for reconstruction and modeling in computer graphics"
E1 4 - 019
14:00-15:00Accepted invitation IconDr. Marc Fischlin: "Cryptographic Standards vs. Cryptographically Secure Standards"
E1 5 - 002
14:00-15:00Accepted invitation IconScott Kilpatrick: "mhmm: Making Haskell More Modular"
E1 5 - 029
21
15:00-16:00Accepted invitation IconAastha Mehta: "Thoth: Practical Data flow protection in a search engine"
E1 5 - 422
22
23
24
25
13:00-13:45Accepted invitation IconJugal Garg: "Leontief Exchange Markets Can Solve Multivariate Polynomial Equations, Yielding FIXP and ETR Hardness"
E1 4 - 024
26
11:00-12:00Accepted invitation IconRobert West: "Exploiting Social Network Structure for Person-to-Person Sentiment Analysis"
E1 5 - 029
27
28
11:00-12:00Accepted invitation IconChristian KURZ: "Constrained Camera Motion Estimation and 3D Reconstruction"
E1 4 - 0.19
11:00-12:00Accepted invitation IconProf. Dr. Adrian Perrig: "Exciting Security Research Opportunity: Next-generation Internet"
E1 5 - 0.02
29
30