MPI-INF Logo
Campus Event Calendar

Calendar

 



Previous Page | Next Page | Show: 1day | 2 days | 1 week | 2 weeks | 1 month | year


Calendar IconJuly 2017
MondayTuesdayWednesdayThursdayFridaySaturdaySunday
26
10:30-12:00Accepted invitation IconGiovanni Luca Ciampaglia: "Finding Fake News"
E1 5 - 029
27
11:00-12:00Accepted invitation IconManolis Koubarakis: "Data Models and Query Languages for Linked Spatiotemporal Data"
E1 4 - 024
28
15:00-16:00Accepted invitation IconAdam Grycner: "Constructing Lexicons of Relational Phrases"
E1 5 - 029
29
11:15-12:15Accepted invitation IconPeter Wonka: "Integer Programming for Layout Problems"
E1 4 - 019
13:00-13:30Accepted invitation IconRuben Hoeksma: "Posted price mechanisms for a random stream of customers"
E1 4 - 024
30
14:00-14:30Accepted invitation IconAttila Kinali: "Damped Sine Based Time Interval Counter - Measuring Time with Pico-Second Precision"
E1 4 - 024
1
2
3
4
5
12:15-13:15Accepted invitation IconQianru Sun: "Your photos expose your social life - Social relation recognition in 5 social domains"
E1 5 - 002
6
11:00-12:00Accepted invitation IconStephan Günnemann: "Robust and Scalable Learning with Graphs"
E1 5 - 029
13:00-13:30Accepted invitation IconAttila Kinali: "The Use of Fault-tolerant Clock Synchronization Algorithms for Time Scales"
E1 4 - 024
16:00-17:00Accepted invitation IconSubhabrata Mukherjee: "Probabilistic Graphical Models for Credibility Analysis in Evolving Online Communities"
E1 5 - 029
7
10:00-11:30Accepted invitation IconKathy Strandburg: "Decision Making and The Value of Explanation"
E1 5 - 005
8
9
10
11:00-12:00Accepted invitation IconDavid Evans: "Adversarial Machine Learning: Are We Playing the Wrong Game?"
E9 1 - Lecture Hall
11
11:00-12:00Accepted invitation IconDemetris Zeinalipour: "Indoor Data Management in Anyplace"
E1 4 - 024
13:00-13:30Accepted invitation IconErik Jan Van Leeuwen: "Parameterized Complexity of Vertex-Partitioning Problems"
E1 4 - 024
12
14:00-15:00Accepted invitation IconDr James Hook: "Max-plus linear regression and low rank matrix approximation"
E1 5 - 029
16:00-17:30Accepted invitation IconDr. Matthias Berg: "IT-Sicherheit mitgestalten beim BSI"
E9 1 - Lecture Hall
13
13:00-13:30Accepted invitation IconJuho Lauri: "NP-completeness results for partitioning a graph into total dominating sets"
E1 4 - 024
14
15
16
17
18
11:00-12:00Accepted invitation IconStavros Tripakis: "Security as a System Design Problem"
E9 1 - lecture hall
19
11:30-12:00Accepted invitation IconKurt Mehlhorn: "Group Meeting"
E1 4 - Rotunda
20
15:00-16:00Accepted invitation IconProf. Gilles Barthe:: "Advances in computer-aided cryptography"
E9 1 - Lecture Hall
21
22
23
24
15:00-15:30Accepted invitation IconPierre-Louis Giscard: "The Theory of Walks"
E1 4 - 024
25
10:30-12:00Accepted invitation IconAlexandra Chouldechova: "Fairer and more accurate, but for whom?"
E1 5 - 005
11:00-12:30Accepted invitation IconNils Ole Tippenhauer: "Physical-Layer Security Aspects of ICS and IoT"
E9 1 - Lecture Hall
13:00-13:30Accepted invitation IconKarl Bringmann: "Improved Algorithms for Computing the Cycle of Minimum Cost-to-Time Ratio in Directed Graphs"
E1 4 - 024
26
27
13:00-13:30Accepted invitation IconSeri Khoury: "New Lower Bounds for the CONGEST model"
E1 4 - 024
28
29
30
31
1
2
3
4
13:30-14:30Accepted invitation IconReinhard Munz: "Towards Use-Ability in Private Data Analytics"
G26 - 111
5
6