MPI-INF Logo
Campus Event Calendar

Calendar

 



Previous Page | Next Page | Show: 1day | 2 days | 1 week | 2 weeks | 1 month | year


Calendar IconFebruary 2015
MondayTuesdayWednesdayThursdayFridaySaturdaySunday
26
10:30-11:30Accepted invitation IconAlessandro Panconesi: "Trace Complexity of Information Diffusion"
G26 - 112
27
28
29
14:00-15:00Accepted invitation IconProf. Dr. Heiko Mantel: "Reliable Security Guarantees for Concurrent Programs: Pitfalls, Solutions and Challenges"
E1 5 - 0.02
30
14:00-14:45Accepted invitation IconOliver Bimber: "Towards a transparent and flexible image sensor"
E1 4 - 019
31
1
2
14:00-16:00Accepted invitation IconHannah Bast: "CANCELED: Semantic Search: Past, Present, Future"
E1 4 - 024
3
4
12:15-13:15Accepted invitation IconAndreas Bulling: "There is more to gaze than meets the eye: novel uses of gaze in context-aware computing and human-computer interaction"
E1 5 - 002
5
11:00-11:45Accepted invitation IconMiguel Costa: "Information Search in Web Archives"
E1 4 - 433
14:00-15:00Accepted invitation IconFelix Freiling: "Governmental IT Intrusions for Law Enforcement: State of the Art andAlternatives"
E1 5 - 0.02
6
7
8
9
10
13:00-13:30Accepted invitation IconReza Saei: "Maximal Induced Matchings in Triangle-Free Graphs"
E1 4 - 024
11
12
10:30-11:45Accepted invitation IconJohannes Hoffart: "Discovering and Disambiguating Named Entities in Text"
E1 5 - 0.29
14:00-15:15Accepted invitation IconWolfgang Nejdl: "ALEXANDRIA - Temporal Retrieval, Exploration and Analytics in Web archives - Asking Humans for Help"
E1 5 - 0.29
13
13:30-14:30Accepted invitation IconVladlen Koltun: "Reconstructing Complete 3D Models from Single Images"
E1 4 - R 0.19
14
15
16
17
10:30-12:00Accepted invitation IconDr. Eva Darulova: "Programming with Numerical Uncertainties"
E1 5 - 029
13:00-13:30Accepted invitation IconM.-F. Roy: "Talk by M.F. Roy on Hilbert's 17th problem HAS BEEN CANCELED"
E1 4 - 024
14:00-15:00Accepted invitation IconJens-Matthias Bohli: "Outsourced Proofs of Retrievability"
E1 5 - 029
18
19
10:30-11:30Accepted invitation IconLaura Brandimarte: "Privacy, Security, and Online Disclosures:Combining HCI and Behavioral Science to Design Visceral Cues for Detection of Online Threats"
E1 5 - 029
14:00-15:00Accepted invitation IconBart Preneel: "Cryptography and Information Security in the post-Snowden era"
E1 5 - 0.02
20
21
22
23
09:00-11:00Accepted invitation IconHosnieh Sattar: "Prediction of search targets from fixations in open-world settings"
E1 4 - R024
09:00-11:00Accepted invitation IconYang He: "Pedestrian Detection and Online Tracking from Monocular Images"
E1 4 - R024
09:00-11:00Accepted invitation IconKireeti Bodduna: "Efficient Noise Elimination Algorithms for Images and Graphics"
E1 4 - r024
09:00-11:00Accepted invitation IconAnurag Pandey: "Testing Algebraic Independence of Polynomials over Finite Fields"
E1 4 - r024
09:00-11:00Accepted invitation IconSreyasi Nag Chowdhury: "Contextual Media Retrieval Using Natural Language Queries"
E1 4 - r024
11:20-13:20Accepted invitation IconKashyap Popat: "Leveraging Unlabelled Corpora for Sentiment Analysis"
E1 4 - r024
11:20-13:20Accepted invitation IconAbdalghani Abujabal: "Mining Past, Present, and Future"
E1 4 - r024
11:20-13:20Accepted invitation IconNeha Warikoo: "Regulatory network of fadr – crp in Mycobacterium tuberculosis: A computational approach"
E1 4 - r024
11:20-13:20Accepted invitation IconTim Kehl: "GeneTrail2 - A comprehensive web service for enrichment analysis"
E1 4 - r024
11:20-13:20Accepted invitation IconAzim Dehghani Amirabad: "Models to predict miRNAs-transcript target interactions"
E1 4 - r024
13:00-13:30Accepted invitation IconMoti Medina: "Distributed Maximum Matching in Bounded Degree Graphs"
E1 4 - 024
15:00-16:00Accepted invitation IconCheng Li: "Building fast and consistent replicated systems: from principles to practice"
E1 5 - 029
24
11:00-13:00Accepted invitation IconHannah Bast: "Semantic Search: Past, Present, Future"
E1 4 - 024
13:00-13:30Accepted invitation IconYun Kuen Cheung: "Asynchronous Market Dynamics and Asynchronous Gradient Descent"
E1 4 - 024
25
26
10:30-11:30Accepted invitation IconAniket Kate: "Minimal Trusted Hardware Assumptions for Privacy-Preserving Systems"
E1 5 - 029
13:00-13:45Accepted invitation IconHang Zhou: "Graph Reconstruction and Verification"
E1 4 - 024
27
28
1