Sunday, 06.04.2025, 14:30
Nanopore sequencing is emerging as a powerful tool for storing digital information in DNA molecules. This technique offers several advantages over traditional methods, making it an attractive area of research. In this work, we focus on a simplified model of the nanopore sequencing process, represented as a channel.
This channel operates by taking a DNA sequence and analyzing it one segment at a time. It uses a sliding window of a specific length, denoted by ℓ, to...
[ Full version ]
Tuesday, 08.04.2025, 11:00
OMICS-based screening offers a promising approach for untargeted drug discovery. Mass-spectrometry metabolomics and proteomics were recently used for inferring drug mechanisms of action and off-target effects, analyzing the cellular response to treatment with numerous clinically approved drugs and tool compounds. In this talk, we present a novel high-throughput LC-MS metabolomics screening pipeline and a deep-learning method specifically designed for cellular metabolism.
...
[ Full version ]
Hila Chefer (Tel Aviv University)
Tuesday, 08.04.2025, 11:30
506, Zisapel Building &
Zoom
Despite remarkable advances, visual generative models are still far from faithfully modeling the world, struggling with fundamental aspects such as spatial relations, physics, motion, and dynamic interactions.
In this talk, I present a line of work that tackles these challenges, based on a deep understanding of the inner mechanisms that drive models. I will begin by analyzing state-of-the-art visual generators, gaining insights into the underlying reasons for their limi...
[ Full version ]
Wednesday, 09.04.2025, 11:30
In this talk, I present three research directions from my PhD.
1. Geometric Learning for Structured Data. Firstly, we introduce a simple, spectral-geometric approach for matrix completion on graphs. Our approach couples the priors implicitly induced by gradient descent with explicitly imposed spectral-geometric priors and achieves strong performance in drug-target interaction prediction and recommendation systems applications. Secondly, we introduce inductive/generaliza...
[ Full version ]
Thursday, 10.04.2025, 12:30
Submodular functions arise in various fields, including combinatorics, graph theory, information theory, and economics. This thesis addresses two key problems in submodular maximization and presents new algorithmic contributions. The first focuses on the Online Submodular Welfare problem, where bidders with submodular utility functions compete for items arriving sequentially. We propose a randomized algorithm that achieves a tight competitive ratio of 1/4 under adversarial arri...
[ Full version ]
Thursday, 10.04.2025, 13:00
Nonvolatile Memory (NVM) technologies offer new avenues for building high-performance and crash-consistent applications by combining byte-addressable DRAM-like characteristics with non-volatility. However, these features introduce complex challenges in ensuring data consistency, especially under concurrent access scenarios.
This paper introduces PRD, a specialized tool designed to detect persistency races - specific type of concurrency bugs in PM environments that can l...
[ Full version ]
Monday, 21.04.2025, 12:30
You are invited to a master's degree exposure meeting intended for outstanding undergraduates.
The meeting will take place on Monday, April 21, 2025 at 12:30 in Auditorium 012 (Floor 0) at the Faculty of Computer Science.
Please register at the link by April 15, 2025...
[ Full version ]
Wednesday, 14.05.2025, 12:30
The CS Research Day for graduate studies will be held on Wednesday, May 14, 2025 between 12:30-14:30, at the lobby of the CS Taub Building.
Research Day events are opportunity for our graduate students to expose their researches using posters and presentations to CS faculty and all degrees students, Technion distinguished representatives and to high-ranking delegates from the hi-tech leading industry companies in Israel and abroad.
The participating researches w...
[ Full version ]
Wednesday, 02.04.2025, 15:30
We consider a spatial voting model where both candidates and voters are positioned in the d-dimensional Euclidean space, and each voter ranks candidates based on their proximity to the voter's ideal point. We focus on the scenario where the given information about the locations of the voters' ideal points is incomplete; for each dimension, only an interval of possible values is known.
In this context, we investigate the computational complexity of determining the possib...
[ Full version ]
Dr. Nadav Amit (Technion)
Wednesday, 02.04.2025, 11:30
Meyer building 1061 &
Zoom
Despite huge pages dramatically reducing CPU frontend stalls from address translation, their use for executable code remains limited due to operating system constraints and impracticality of rebuilding system binaries with special alignment. Current solutions that copy code into huge pages break essential system functionality - preventing memory sharing between processes, disrupting debugging tools, and interfering with memory management operations.
In this talk, I will...
[ Full version ]
Eitan Richardson (Lightricks, The Hebrew University)
Tuesday, 01.04.2025, 11:30
506 Zisapel Building &
Zoom
We introduce LTX-Video, a transformer-based latent diffusion model that adopts a holistic approach to video generation by seamlessly integrating the responsibilities of the Video-VAE and the denoising transformer.
Unlike existing methods, which treat these components as independent, LTX-Video aims to optimize their interaction for improved efficiency and quality. At its core is a carefully designed Video-VAE that achieves a high compression ratio of 1:192, with spatiote...
[ Full version ]
Tuesday, 01.04.2025, 11:00
Proteins exist as a dynamic ensemble of multiple conformations, and these motions are often crucial for their functions. However, current structure prediction methods predominantly yield a single conformation, overlooking the conformational heterogeneity revealed by diverse experimental modalities.
This work presents a framework for building experiment-grounded protein structure generative models that infer conformational ensembles consistent with measured experimental ...
[ Full version ]
Monday, 31.03.2025, 12:30
Stream frequency measurements are fundamental in many data stream applications such as financial data trackers, intrusion detection systems, and network monitoring. Count-Min Sketch and its variants have been widely adopted for this task due to their space efficiency and ability to provide approximate frequency estimates with bounded error guarantees. However, these sketches suffer from a limitation: they have a fixed memory usage determined by the desired accuracy, unable to a...
[ Full version ]
Wednesday, 26.03.2025, 10:30
Surface reconstruction and shape matching are critical challenges in 3D geometry, underpinning the creation of detailed digital models and enabling the robust alignment of complex shapes - capabilities that drive advancements in computer vision, robotics, and medical imaging.
In this talk, we introduce a method that leverages a novel view synthesis algorithm (3DGS) to reconstruct 3D surfaces from real-world data, outperforming existing techniques. We then tackle the cha...
[ Full version ]
Tuesday, 25.03.2025, 11:30
506, Zisapel Building &
Zoom
Shaping light plays a crucial role in science and technology, enabled by advancements in spatial-light modulator (SLM) technology. In this talk, we will explore two key applications: WFS microscopy for deep tissue imaging and holographic displays.
In the first part, we will discuss wavefront shaping systems and how they enable deep tissue imaging by correcting aberrations caused by tissue inhomogeneity. However, estimating optimal modulations remains challenging du...
[ Full version ]
Monday, 24.03.2025, 11:30
The open-source community offers a vast and continually expanding array of large language models (LLMs), accompanied by diverse benchmarks to evaluate their performance. While this wealth ecosystem provides users with many models that may align with their objectives, the sheer number of options makes selection complex and time-consuming. A model may appear proficient in a given domain, yet underperform on specific instances.
We introduce a straightforward, efficient, an...
[ Full version ]
Tuesday, 18.03.2025, 11:30
Cardiac T1 mapping is a crucial quantitative MRI technique for diagnosing diffuse myocardial diseases. Traditional methods rely on breath-hold sequences and ECG-based cardiac triggering, but these approaches face challenges with patient compliance, limiting their clinical effectiveness. Image registration can enable motion-robust T1 mapping, but intensity variations between time points complicate the process.
We introduce MBSS-T1, a subject-specific self-supervised mode...
[ Full version ]
Monday, 17.03.2025, 13:30
As program synthesizers become integrated into IDEs, programmers combine synthesized code and manually written code within the same project. We therefore built a Programming-by-Example (PBE) synthesizer that documents the example specifications provided to it alongside the result snippet that satisfies them.
We also modified the IDE to treat these example scopes as localized tests for the code they surround, in case they or the code are edited. Unles...
[ Full version ]
Wednesday, 12.03.2025, 12:00
Deep neural networks are known to be susceptible to adversarial perturbations, small perturbations that alter the network's output and exist under strict norm limitations. Universal adversarial perturbations aim to alter the model's output on a set of out-of-sample data and present a more realistic use case, as awareness of the model's exact input is not required. In addition, patch adversarial attacks denote the setting where the adversarial pertubations are limited to consist...
[ Full version ]
Sunday, 09.03.2025, 09:30
Mesh realization focuses on developing algorithms for fabricating digital curved shapes in the real world. The goal is to derive a framework for realizing 3D shapes using various materials — such as wood, paper, or yarn — while keeping the process as automatic as possible and still allowing the user to make design choices. Material properties (i.e., their possible local deformations) guide the mathematical formulation of the underlying optimization problems.
...
[ Full version ]
Tuesday, 04.03.2025, 11:30
In this seminar, I will discuss several fundamental challenges and limitations associated with high-perceptual-quality image restoration methods, and propose practical restoration and compression schemes. Specifically, I will first examine deterministic image restoration algorithms and show why striving for high output quality while maintaining consistency with the input measurements inevitably leads to algorithmic instability and vulnerability to adversarial attacks.
S...
[ Full version ]
Sunday, 02.03.2025, 14:30
Machine learning models play a key role for service providers looking to gain market share in consumer markets. However, traditional learning approaches do not take into account the existence of additional providers, who compete with each other for consumers. Our work aims to study learning in this market setting, as it affects providers, consumers, and the market itself.
We begin by analyzing such markets through the lens of the learning objective, and show that accura...
[ Full version ]
Dr. Daniel Amir (Technion)
Wednesday, 26.02.2025, 11:30
As Moore's Law slows down, packet switch capabilities are falling behind datacenter demands. This has made optical circuit switches increasingly attractive in datacenter networks. These switches have already seen significant commercial use in the form of hybrid networks, which combine both packet switches and circuit switches. Recent advances in optical circuit switching technology can now operate fast enough to potentially fully replace packet switches, when combined with nove...
[ Full version ]
Leopold Grinberg (AMD & Brown University)
Wednesday, 26.02.2025, 10:00
Leopold Grinberg is a Fellow Software Systems Design Engineer at Advanced Micro Devices (AMD) and an Adjunct Lecturer in Applied Mathematics at Brown University.
He earned his PhD in Applied Mathematics from Brown University in 2009 and holds a master’s degree in Mechanical Engineering from Ben-Gurion University of the Negev, awarded in 2003
He focuses on High Performance Computing - systems and applications. Specifically, his current obje...
[ Full version ]
Thursday, 20.02.2025, 09:00
Churchill Building & Taub 1
Interested in undergraduate studies?
Information about undergraduate study tracks at the Faculty of Computer Science at the Technion at the link
An open day at the Technion will be held on February 20, 2025
To register for the open day at the ...
[ Full version ]
Prof. Rafael Pass (Tel-Aviv University)
Wednesday, 19.02.2025, 11:30
Whether secure Cryptography exists is one of the most important open problems in Computer Science: Cryptographic schemes today rely on unproven computational hardness assumption.
We will survey a recent thread of work (Liu-Pass,FOCS’20, Liu-Pass-STOC'21,.., Ball-Liu-Pass-Mazor, FOCS’23, Liu-Pass’EUROCRYPTO’24) showing *equivalences* between the existence of some of the most basic cryptographic primitives, and the hardness of various computational...
[ Full version ]
Wednesday, 19.02.2025, 10:00
We propose an efficient pipeline to register, detect, and analyze changes in 3D models of coral reefs captured over time. Corals have complex structures with intricate geometric features at multiple scales. 3D reconstructions of corals (e.g., using Pho- togrammetry) are represented by dense triangle meshes with millions of vertices. Hence, identifying correspondences quickly using conventional state-of-the-art algorithms is challenging. To address this gap we employ the Globall...
[ Full version ]
Monday, 17.02.2025, 12:30
Taub, floor 0, Piano Auditorium
Abstract: As the capabilities of LLMs have grown, so has interest in using them to understand how language works in the human brain. Some have even suggested that LLMs do or should mimic how language is divided in the human brain: Mahowald et al. (2024)&n...
[ Full version ]
Monday, 17.02.2025, 10:30
Shape interpolation is essential in graphics and geometry processing. For instance, smoothly transitioning between two poses of the same shape is crucial for animation, while morphing multiple shapes helps with design exploration. Since the blended shapes often differ, some distortion is unavoidable.
We introduce an interpolation method for planar shapes based on logarithmic metric blending. Our approach extends previous work on pullback metrics, enabling the use of var...
[ Full version ]
Wednesday, 12.02.2025, 14:00
Adversarial training aims to defend against adversaries - malicious opponents aiming to harm predictive performance in any way possible. This strict perspective can result in overly conservative training. As an alternative, we propose modeling opponents as pursuing their own goals rather than working directly against the classifier. Employing tools from strategic modeling, our approach incorporates knowledge of the opponent's potential incentives as inductive bias for learning....
[ Full version ]
Wednesday, 12.02.2025, 11:30
In the field of video compression, the pursuit for better quality at lower bit rates remains a long-lasting goal. Recent developments have demonstrated the potential of Implicit Neural Representation (INR) as a promising alternative to traditional transform-based methodologies. Video INRs can be roughly divided into frame-wise and pixel-wise methods according to the structure the network outputs. While the pixel-based methods are better for upsampling and parallelization, frame...
[ Full version ]
Marwa Mouallem (Technion)
Wednesday, 12.02.2025, 11:30
A myriad of authentication mechanisms embody a continuous evolution from verbal passwords in ancient times to contemporary multi-factor authentication: Cryptocurrency wallets advanced from a single signing key to using a handful of well-kept credentials, and for online services, the infamous “security questions” were all but abandoned. Nevertheless, digital asset heists and numerous identity theft cases illustrate the urgent need to revisit the fundamentals of user ...
[ Full version ]
Wednesday, 12.02.2025, 11:30
Meyer 1061 (ECE building) &
Zoom
A myriad of authentication mechanisms embody a continuous evolution from verbal passwords in ancient times to contemporary multi-factor authentication: Cryptocurrency wallets advanced from a single signing key to using a handful of well-kept credentials, and for online services, the infamous “security questions” were all but abandoned. Nevertheless, digital asset heists and numerous identity theft cases illustrate the urgent need to revisit the fundamentals of user ...
[ Full version ]
Tuesday, 11.02.2025, 14:00
The extraction of neural networks poses a significant challenge to the security and intellectual property of AI models, enabling adversaries to recreate proprietary architectures, breach confidentiality, and exploit model functionality. In this seminar talk, I will introduce a novel attack that reconstructs both the structure and exact parameters of black-box convolutional neural networks (CNNs), using only query-based access. This technique is the first to recover the precise ...
[ Full version ]
Tuesday, 11.02.2025, 11:00
Labeling schemes are a prevalent paradigm in various computing settings. In such schemes, an oracle is given an input graph and produces a label for each of its nodes, enabling the labels to be used for various tasks. In this talk, I will address the question of what happens in a labeling scheme if some labels are erased, e.g., due to communication loss with the oracle or hardware errors. I will present a new resilient labeling scheme which improves upon the state of the art in...
[ Full version ]
Monday, 10.02.2025, 15:30
In the age of abundant data, deep learning has emerged as a leading tool for predictive tasks, consistently setting new benchmarks in areas such as computer vision. One such task is 3D Object Detection (3DOD), where the goal is to estimate the locations of objects within a 3D space using inputs like RGB images and LiDAR point clouds. This task is crucial for applications in advanced driver-assistance systems, autonomous vehicles, and robotic navigation. Despite the promise of d...
[ Full version ]
Monday, 10.02.2025, 11:00
Property Directed Reachability (Pdr), also known as IC3, is a state-of-the-art model checking algorithm widely used for verifying safety properties. While Pdr is effective in finding inductive invariants, its underlying proof system, Resolution, limits its ability to construct short proofs for certain verification problems.
In this talk we present PdrER, a generalization of Pdr that uses Extended Resolution (ER), a proof system exponentially stronger than Resolution. Us...
[ Full version ]
Wednesday, 05.02.2025, 11:30
Edge computing extends cloud capabilities to the proximity of end-users, offering ultra-low latency, which is essential for real-time applications. Unlike traditional cloud systems that suffer from latency and reliability constraints due to distant datacenters, edge computing employs a distributed model, leveraging local edge datacenters to process and store data.
This talk explores key challenges in edge computing across three domains: workloads, storage, and service a...
[ Full version ]
Wednesday, 05.02.2025, 09:00
Electrical and Computer Engineering Faculty
We are happy to invite you to the Tech.AI Robotics Conference, happening on February 5, 2025. This exciting event will explore the critical crossroads of artificial intelligence and robotics: from smart home systems and autonomous vehicles to a...
[ Full version ]
Wednesday, 29.01.2025, 17:00
We study budgeted variants of the well known Matching, Matroid Independent Set, and Matroid Intersection problems. While the three problems admit polynomial-time approximation schemes (PTAS) [Berger et al. (Math. Programming, 2011), Chekuri, Vondrak and Zenklusen (SODA 2011)], it has been an intriguing open question whether these problems admit a Fully PTAS (FPTAS), or even an Efficient PTAS (EPTAS). In this work, we show that the three problems admit an EPTAS. On the ...
[ Full version ]
Or Zamir (Tel-Aviv University)
Wednesday, 29.01.2025, 13:00
Estimating the second frequency moment of a stream up to (1 ± ε) multiplicative error requires at most O(log n / ε²) bits of space, due to a seminal result of Alon, Matias, and Szegedy. It is also known that at least Ω(log n + 1/ε²) space is needed.
We prove a tight lower bound of Ω(log(nε²) / ε²) for all ε = Ω(1/√n).
Notably, when ε > n^(-1/2 + c), wher...
[ Full version ]
Wednesday, 29.01.2025, 12:30
The Faculty of Computer Science invites you to a dedicated event for graduate students of StarkWare, a leader in blockchain technologies - "Engineering the Future of Blockchain"
This coming Wednesday, January 29, 25, at 12:30, in the Piano Auditorium (note the change in the lecture location).
What's on the program:12:30 How StarkWare is leading the blockchain revolution with innovative solutions13:30 Applying algorithms ...
[ Full version ]
Wednesday, 29.01.2025, 11:30
Over the past decade, an increasing number of systems and devices have gained Internet connectivity and been enhanced with sensing capabilities and AI. While these advancements have created a world of smarter, more automated, and highly connected devices, they have also introduced significant security and privacy challenges that cannot be effectively addressed with traditional countermeasures.
In the first part of this talk, we will explore the security and privac...
[ Full version ]
Wednesday, 29.01.2025, 11:00
Over the past decade, several studies have shown that DNA-based storage systems can potentially become the standard for data archival due to their high data density and durability. However, the current bottleneck involves the synthesis and sequencing costs, along with a lack of coding solutions to address the unique error characteristics of DNA-based systems.
This work tackles multiple challenges that hinder the practical implementation of DNA storage. First, we explore...
[ Full version ]
Oded Stein (USC’s Viterbi School of Engineering)
Wednesday, 29.01.2025, 10:30
Geometric data and signal processing have made remarkable progress in recent years, and the advent of modern AI tools promises an even brighter future. Many classical and contemporary methods, however, use vast amounts of data, substantial processing power, and considerable natural resources to achieve their results. These approaches can be expensive, environmentally harmful, and ultimately unsustainable. This talk explores efforts to do more with less in geometry processing by...
[ Full version ]
Or Patashnik (Tel Aviv University)
Tuesday, 28.01.2025, 10:30
Image generative models are advancing rapidly, producing images of remarkable realism and fidelity. However, existing models often lack precise control over the generated content, limiting their image editing capabilities and the integration of real content into synthesized imagery. In this talk, I will demonstrate how a deep understanding of the inner mechanisms of large-scale pretrained generative models enables the design of powerful techniques for a variety of image manipul...
[ Full version ]
Monday, 27.01.2025, 15:30
In a recent work, Cormode, Dall'Agnol, Gur and Hickey (CCC, 2024) introduced the model of Zero-Knowledge Streaming Interactive Proofs (zkSIPs). Loosely speaking, such proof-systems enable a prover to convince a streaming verifier that the input x, to which it has read-once streaming access, satisfies some property, in such a way that nothing beyond the correctness of the claim is revealed. Cormode et al. also gave constructions of zkSIPs to some specifi...
[ Full version ]
Wednesday, 22.01.2025, 17:00
The AI revolution is expanding from the cloud directly to our personal computers, and you are invited to join a 3-hour hands-on workshop where you can experience the latest advances and capabilities.
During the workshop, you will delve into the new technologies of Intel’s AI-PCs, build chatbots, produce photos and videos, and discover how to create music on your laptop.
The workshop is intended for anyone interested in expanding their knowledge in th...
[ Full version ]
Wednesday, 22.01.2025, 13:00
How can we trust the correctness of a learned model on a particular input of interest? Model accuracy is typically measured on average over a distribution of inputs, giving no guarantee for any specific input. This talk introduces Self-Proving models, a new class of models that formally prove the correctness of their outputs via an Interactive Proof system. We will formally define Self-Proving models and their per-input (worst-case) guarantees. We will then present algorithms f...
[ Full version ]
Wednesday, 22.01.2025, 11:00
Digital pathology has emerged as a transformative field, enabling automated imaging and computational analysis of thin tissue biopsy slices or body fluids. These samples are typically stained to enhance contrast in biological structures and reveal their morphology under microscopic magnification. Digitally scanning these stained samples produces gigapixel-scale images, known as whole slide images (WSIs), which pose significant challenges for computational analysis using deep le...
[ Full version ]
Ofir Press (Princeton University)
Wednesday, 22.01.2025, 10:30
Language models (LMs) are increasingly used to assist users in day to day tasks such as programming (Github Copilot) or search (Google's AI Overviews). But can we build language model systems that are able to autonomously complete entire tasks end-to-end? In this talk I'll discuss our efforts to build autonomous LM systems, focusing on the software engineering domain. I'll present SWE-bench, our novel method for measuring the performance of automatic programming systems on thei...
[ Full version ]
Tuesday, 21.01.2025, 17:30
Continuing the career workshop marathon!
After you have become familiar with the types of jobs available, it is time to upgrade your resume.
We invite you to the My First Resume Workshop - How to Turn a Blank Page into an Opportunity, hosted by Bar Yaakovi, a graduate of the FacultyTuesday, 21.1, starting at 5:30 PM at Taub 337
About the speaker:Bar Yaakovi holds a bachelor's degree in computer science from the T...
[ Full version ]
Or Patashnik (Tel Aviv University)
Tuesday, 21.01.2025, 11:30
Room 1061 Meyer Building &
Zoom
Image generative models are advancing rapidly, producing images of remarkable realism and fidelity. However, existing models often lack precise control over the generated content, limiting their image editing capabilities and the integration of real content into synthesized imagery. In this talk, I will demonstrate how a deep understanding of the inner mechanisms of large-scale pretrained generative models enables the design of powerful techniques for a variety of image manipul...
[ Full version ]
Yossi Gandelsman (UC Berkeley)
Tuesday, 21.01.2025, 10:30
In this talk, I present an approach for interpreting the internal computation in deep vision models. I show that these interpretations can be used to detect model bugs and to improve the performance of pre-trained deep neural networks (e.g., reducing hallucinations from image captioners and detecting and removing spurious correlations in CLIP) without any additional training. Moreover, the obtained understanding of deep representations can unlock new model capabilities (e.g., n...
[ Full version ]
Thursday, 16.01.2025, 12:00
When learning is used to inform decisions about humans, such as for loans, hiring, or admissions, this can incentivize users to strategically modify their features to obtain positive predictions. A key assumption is that modifications are costly, and are governed by a cost function that is exogenous and predetermined. We challenge this assumption, and assert that the deployment of a classifier is what creates costs. Our idea is simple: when users seek positive predictions,...
[ Full version ]
Wednesday, 15.01.2025, 13:00
Constraint satisfaction problems (CSPs in short) are among the most important computational problems studied in TCS. This talk will focus on a recent line of study addressing the complexity of approximating satisfiable instances of CSPs, and connections of this study to multi-player parallel repetition theorems, property testing and extremal combinatorics.
Based mostly on joint works with Amey Bhangale, Subhash Khot and Yang P. Liu....
[ Full version ]
Wednesday, 15.01.2025, 12:30
Deduplication is widely utilized in many modern large scale storage systems and provide an effective solution for both secondary and primary storage. Therefore, there is a rising need for deduplication storage to support advanced features such as data indexing for information retrieval. To our knowledge, no indexing solution for deduplicated storage utilizes the deduplication and current indexing methods process duplicates.
In this work, we propose IDEA, Inverted Dedupl...
[ Full version ]
Wednesday, 15.01.2025, 12:30
Final Company is coming to the faculty for a spotlight day and technology lectureNext Wednesday, January 15 starting at 12:30 at Taub
Looking for your next step? Want to hear about algo-trading, options and probabilities?Final Company is coming with recruitment teams and engineers who will tell you everything – from career to technology.
What awaits you?• 12:30 | Taub Lobby – Meeting with researchers...
[ Full version ]
Tuesday, 14.01.2025, 11:30
Tuesday, January 14, 2025 at 11:30Meyer Building Room 1061 & Zoom
This talk will explore advances in 3D scene reconstruction, focusing...
[ Full version ]
Noam Mazor (Tel Aviv University)
Tuesday, 14.01.2025, 10:30
Computational analogs of information-theoretic notions have given rise to some of the most intriguing phenomena in theoretical computer science. For example, pseudorandomness allows us to bypass Shannon's lower bounds on the key length of encryption schemes. Moreover, computational analogs of entropy and randomness are key tools in the construction of pseudorandom generators and have become foundational concepts in complexity theory and cryptography.One such computational a...
[ Full version ]
Monday, 13.01.2025, 17:30
It's time to take your career a step further!
A career marathon is underway, and you are invited to our first meeting - an exposure workshop for jobs in the industry - taking stock at Buzz Words -Monday, 13.1, at 17:30 in the Piano Auditorium
Want to understand what's behind the coveted titles in the industry?In this workshop, we will take stock of the variety of job types, dive into innovative technologies and products,...
[ Full version ]
Wednesday, 08.01.2025, 18:30
You are invited to the evening of "Research on the Bar" - three faculty members giving TED talks at eye level.
Don't miss the opportunity to get to know the researchers and new research groups, in an open atmosphere with beers and snacks.
Wednesday, January 8, 2025 starting at 6:30 PM at Taub 2.
Dr. Brit Youngmann - Put your trust in the data (and not in the person who processed it)
Dr. Or Litany - ...
[ Full version ]
Wednesday, 08.01.2025, 13:00
The Huge Object model is a distribution testing model in which we are given access to independent samples from an unknown distribution over the set of strings {0,1}^n, but are only allowed to query a few bits from the samples. We investigate the problem of testing whether a distribution is supported on m elements in this model. It turns out that the behavior of this property is surprisingly intricate, especially when also considering the question of adaptivity. We prove lower a...
[ Full version ]
Wednesday, 08.01.2025, 12:30
Graduate launge, 2nd floor
Join us for our Internship Spotlight Day, where we’ll introduce the TII AI/IR Research Center recently established in Haifa, discuss our work in Generative AI and share details about our 2025 Internship Program.
Date: Wednesday, January 8 Time: 12:30–14:15 Agenda: 12:30-13:00: Get-together 13:00-13:50 : Introduction &a...
[ Full version ]
Tuesday, 07.01.2025, 18:30
Come be part of the Technion's Capture The Flag-CTF group!
And this week: a guest lecture on the topic of artificial intelligence security! Building and Breaking AI Security, hosted by Amit Levy and Rom Himmelstein – AI security researchers at the Technion
“The Model They Told You Not to Worry About” How weaknesses in language models can cause systems to crash and even expose personal information?
Don't have previous experience with lan...
[ Full version ]
Tuesday, 07.01.2025, 10:30
Developing better Language Models would benefit a myriad of communities. However, it is prohibitively costly. The talk would describe collaborative approaches to pretraining such as model merging, allowing combining several specialized models into one. Then introduce efficient evaluation to reduce overheads and touch on other accessible and collaborative aspects that best harness the expertise and diversity ...
[ Full version ]
Monday, 06.01.2025, 13:00
Classical shape descriptors such as Heat Kernel Signature (HKS), Wave Kernel Signature (WKS), and Signature of Histograms of Orientations (SHOT), while widely used in shape analysis, exhibit sensitivity to mesh connectivity, sampling patterns, and topological noise.
While differential geometry offers a promising alternative through its theory of differential invariants, which are theoretically guaranteed to be robust shape descriptors, the computation of these invariant...
[ Full version ]
Yanai Elazar (The University of Washington)
Monday, 06.01.2025, 10:30
Generative models, such as ChatGPT and DALL-E, are used by millions of people daily for tasks ranging from programming and content creation to resume filtering. These models often create the impression of being “intelligent,” which can incentivize careless use in critical applications. While generative models are empowering, they appear to be black boxes, and their misuse can result in harmful or unlawful outcomes.
In this talk, I will present algorithms and...
[ Full version ]
Wednesday, 01.01.2025, 16:30
Artificial intelligence (AI) offers immense potential to accelerate scientific discoveries crucial for combating climate change. However, this powerful tool comes with a significant environmental cost due to its substantial energy consumption and carbon emissions. This talk explores the research challenge of harnessing AI's capabilities while minimizing its ecological footprint. Bio: Dr. Tamar Eilam is an IBM Fellow and Chief Scientist for Sustaina...
[ Full version ]
Wednesday, 01.01.2025, 11:30
We explore the framework of contract design through a computational perspective. Contract design is a fundamental pillar of microeconomics, addressing the essential question of how to incentivize people to work. The significance of contract design was acknowledged by the Nobel Prize awarded to Hart and Holmström, and it applies to various real-life scenarios, such as determining bonuses for employees, setting commission structures for sales representatives, and designing p...
[ Full version ]