Data Science & Deep Learning: Optimal Euclidean Metric Compression in High Dimensions

Tal Wagner (MIT)

Monday, 30.12.2019, 12:30

Taub 301 Taub Bld.

In the metric compression problem, we are given n points in a metric space, and the goal is to construct a compact representation (sketch)of the points, such that the distance between every pair can be approximate lyre covered from the sketch, up to a small ...

[Full version]

[Full version]

Fling – A Fluent API Generator

Ori Roth

Wednesday, 25.12.2019, 14:30

Room 601 Taub Bld.

We present the first general and practical solution of the fluent API problem – an algorithm, that given a deterministic language (equivalently, LR(k), k≥0 language) encodes it in an unbounded parametric polymorphism type system employing only a polynomial number of types. The theoretical result is ...

[Full version]

[Full version]

ceClub: Leveraging Programmable Switches for In-network Computing

Ran Ben-Basat (Harvard University)

Tuesday, 24.12.2019, 14:30

Electrical Eng. Building 861

Leveraging Programmable Switches for In-network Computing The network line rate is constantly on the rise to support the exploding amounts of data. This means that we have less time to process individual packets, despite a growing demand for better network telemetry. Moreover, CPU speeds are ...

[Full version]

[Full version]

Hardware Security Seminar: When it leaks, it Pours: On the (Sad) State of Today’s Hardware Security

Daniel Genkin (University of Michigan)

Tuesday, 24.12.2019, 12:30

Room 601 Taub Bld.

The security and architecture communities will remember 2018 as the year of side channels. Starting from Spectre and Meltdown, time and again we have seen how basic performance-improving features can be exploited to violate fundamental hardware security guarantees. In this talk, I will survey two ...

[Full version]

[Full version]

Breaking and Fixing Real World Crypto

Eyal Ronen - CS-Lecture

Tuesday, 24.12.2019, 10:30

Room 337 Taub Bld.

In recent years, new forms of communication between people and devices have revolutionized our daily lives. The Internet has become the leading platform for human interaction (e.g., social networks), commerce, information, and also control of physical devices (e.g., Internet of Things). This new connectivity creates ...

[Full version]

[Full version]

Theory Seminar: An Adaptive Step Toward the Multiphase Conjecture

Omri Weinstein (Columbia University)

Monday, 23.12.2019, 12:30

Taub 301 Taub Bld.

In 2010, Patrascu proposed the Multiphase problem, as a candidate for proving polynomial lower bounds on the operational time of dynamic data structures. Patrascu conjectured that any data structure for the Multiphase problem must make n cell-probes in either the update or query phase, and ...

[Full version]

[Full version]

Behavioral Machine Learning

Nir Rosenfeld - CS-Lecture

Sunday, 22.12.2019, 10:30

Room 337 Taub Bld.

Learning systems have become ever more pervasive in our lives. By controlling the flow of information, they play an increasingly significant role in shaping decisions made by us, about us, and for us. But systems are still developed under paradigms in which human actors are ...

[Full version]

[Full version]

Theory Seminar: Relative Error Streaming Quantiles

Zohar Karnin (Amazon)

Thursday, 19.12.2019, 12:30

Room 601 Taub Bld.

Approximating ranks, quantiles, and distributions over streaming data is a central task in data analysis and monitoring. Given a stream of n items from a data universe U (equipped with a total order), the task is to compute a sketch (data structure) of size poly(log(n), ...

[Full version]

[Full version]

Theory Seminar: Nearly Optimal Pseudorandomness From Hardness

Dean Doron (Stanford University)

Wednesday, 18.12.2019, 12:30

Taub 201 Taub Bld.

Existing proofs that deduce P=BPP from circuit lower bounds convert randomized algorithms to deterministic ones with a large polynomial slowdown in running time. In this talk, I will show that if we assume exponential lower bounds against nondeterministic circuits, we can convert any randomized algorithm ...

[Full version]

[Full version]

ceClub: Breaking (and Fixing) Real World Crypto

Eyal Ronen (Tel-Aviv University)

Wednesday, 18.12.2019, 11:30

Electrical Eng. Building 861

In recent years, new forms of communication between people and devices have revolutionized our daily lives. The Internet has become the leading platform for human interaction (e.g., social networks), commerce, information, and also control of physical devices (e.g., Internet of Things). This new connectivity creates ...

[Full version]

[Full version]

Cryptographic Computations need Compilers

Madan Musuvathi - COLLOQUIUM LECTURE

Tuesday, 17.12.2019, 14:30

Room 337 Taub Bld.

There is a recent surge of interest in performing computations on encrypted data. Techniques such as secure multi-party computations and fully-homomorphic encryption enable rich privacy-preserving applications. On the other hand, building such applications is hard due to the cryptographic expertise required to build them correctly, ...

[Full version]

[Full version]

Mitigating Gradient Staleness in Asynchronous Environments

Saar Barkai (EE, Technion)

Monday, 16.12.2019, 13:30

Electrical Eng. Building 701

Although distributed computing can significantly reduce the training time of deep neural networks, scaling the training process while maintaining high efficiency and final accuracy is challenging. Cloud computing, which is becoming increasingly popular as a platform for distributed training of deep neural networks, is prone ...

[Full version]

[Full version]

Data Science & Deep Learning: Meta-Learning by Adjusting Priors Based on Extended PAC-Bayes Theory

Ron Amit (EE, Technion)

Monday, 16.12.2019, 12:30

Taub 301 Taub Bld.

Efficient learning requires prior knowledge (inductivebias). The algorithm designer can manually insert a prior based on hisintuition, but ideally, we would like to automatically infer the mostbeneficial prior. In meta-learning an agent extracts a ‘learned prior’ fromseveral observed learning tasks, which in turn, can be ...

[Full version]

[Full version]

Quantifying the Impact of Latency on High Frequency Trading

Yehonatan Rubin

Sunday, 15.12.2019, 15:00

Room 601 Taub Bld.

Establishing a low network latency connection to stock exchanges has been the desire of trader for years. A well-known example is the extremely expensive construction of an ultra-low latency fiber optic cable between New York and Chicago just for reducing three millisecond in the round ...

[Full version]

[Full version]

Coding Theory: What Is The Value Of Data? On Mathematical Methods for Data Quality Estimation

Netanel Raviv (California Institute of Technology)

Sunday, 15.12.2019, 14:30

Room 601 Taub Bld.

Data is one of the most important assets of the information age, and its societal impact is undisputed. Yet, rigorous methods of assessing the quality of data are lacking. In this talk, we propose a formal definition for the quality of a given static dataset. ...

[Full version]

[Full version]

Theory Seminar: Lovasz Meets Weisfeiler and Leman

Martin Grohe (RWTH Aachen University)

Wednesday, 11.12.2019, 12:30

Taub 201 Taub Bld.

I will speak about an unexpected correspondence between a beautiful theory, due to Lovasz, about homomorphisms and graph limits and a popular heuristic for the graph isomorphism problem known as the Weisfeiler-Leman algorithm. I will also relate this to graph kernels in machine learning. Indeed, ...

[Full version]

[Full version]

MPC Beyond the Generic Model - Private Intersection Analytics

Benny Pinkas - COLLOQUIUM LECTURE

Tuesday, 10.12.2019, 14:30

Room 337 Taub Bld.

Effective data analysis often depends on data that is known to different sources, including private data whose owners cannot disclose. The task at hand is to perform effective analysis of the data while preserving its privacy. This talk will describe efficient cryptographic protocols, some of ...

[Full version]

[Full version]

Data Science & Deep Learning: Some New Approaches to The heavy Hitters Problem

Jelani Nelson (UC Berkeley)

Monday, 9.12.2019, 12:30

Taub 301 Taub Bld.

In the 'frequent items' problem one sees a sequence of items in a stream (e.g. a stream of words coming into a search query engine like Google) and wants to report a small list of items containing all frequent items. In the 'change detection' problem ...

[Full version]

[Full version]

Theory Seminar: Faster k-SAT Algorithms using biased-PPSZ

Or Zamir (Tel-Aviv University)

Wednesday, 4.12.2019, 12:30

Taub 201 Taub Bld.

The PPSZ algorithm, due to Paturi, Pudlak, Saks and Zane, is currently the fastest known algorithm for the k-SAT problem, for every k>3. For 3-SAT, a tiny improvement over PPSZ was obtained by Hertli. We introduce a biased version of the PPSZ algorithm using which ...

[Full version]

[Full version]

Degree-Bounded Polymatroids, with Applications to the Many-Visits TSP

Matthias Mnich - COLLOQUIUM LECTURE

Tuesday, 3.12.2019, 14:30

Room 337 Taub Bld.

In the Bounded Degree Matroid Basis Problem, we are given a matroid and a hypergraph on the same ground set, together with costs for the elements of that set as well as lower and upper bounds f(e) and g(e) for each hyperedge e. The objective ...

[Full version]

[Full version]

Pixel Club: What's in a Face? Metric Learning for Face Characterization

Omry Sendik (Tel-Aviv University)

Tuesday, 3.12.2019, 10:00

Electrical Eng. Building 1061

We present a method for determining which facial parts (mouth, nose, etc.) best characterize an individual, given a set of that individual's portraits. We introduce a novel distinctiveness analysis of a set of portraits, which leverages the deep features extracted by a pre‐trained face recognition ...

[Full version]

[Full version]

Data Science & Deep Learning: Performance of Johnson-Lindenstrauss Transform for k-Means and k-Medians Clustering

Konstantin Makarychev (Northwestern University)

Monday, 2.12.2019, 12:30

Taub 301 Taub Bld.

Consider an instance of Euclidean k-means or k-medians clustering. We show that the cost of the optimal solution is preserved up to a factor of (1+ε) under a projection onto a random - dimensional subspace. Further, the cost of every clustering is preserved within (1+ε). ...

[Full version]

[Full version]

Theory Seminar: Local Proofs Approaching the Witness Length

Noga Ron-Zewi (Haifa University)

Wednesday, 27.11.2019, 12:30

Taub 201 Taub Bld.

Interactive oracle proofs are a hybrid between interactive proofsand probabilistically-checkable proofs, where the prover is allowed to interactwith a verifier by sending relatively long messages to the verifier, who inturn is only allowed to query a few of the bits that were sent. In this ...

[Full version]

[Full version]

ceClub: Preventing (Network) Time Travel with Chronos

Neta Rozen-Schiff (The Hebrew University of Jerusalem)

Wednesday, 27.11.2019, 11:30

Electrical Eng. Building 861

The Network Time Protocol (NTP) synchronizes time across computer systems over the Internet. Unfortunately, NTP is highly vulnerable to “time shifting attacks”, in which the attacker’s goal is to shift forward/backward the local time at an NTP client. NTP’s security vulnerabilities have severe implications for ...

[Full version]

[Full version]

Pixel Club: Tools for Visual Expression and Communication

Ohad Fried (Stanford University)

Tuesday, 26.11.2019, 11:30

Electrical Eng. Building 1061

Photos and videos are now a main mode of communication, used to tell stories, share experiences and convey ideas. However, common media editing tools are often either too complex to master, or oversimplified and limited. In this talk I will present my strategy towards the ...

[Full version]

[Full version]

Theory Seminar: Scheduling Algorithms in the SINR Model for Wireless Networks

Tigran Tonoyan (CS. Technion)

Wednesday, 20.11.2019, 12:30

Taub 201 Taub Bld.

SINR (aka physical model) is a model of wireless communication that has been studied from algorithmic perspective in the last decade, and is considered as a more realistic alternative to the traditional graph-based models. I will introduce the model and discuss some basic scheduling problems. ...

[Full version]

[Full version]

ceClub: Beresheet's Journey to The Moon

Noam Leiter (AE. Technion)

Wednesday, 20.11.2019, 11:30

Electrical Eng. Building 861

SpaceIL made history when Beresheet, the first privately funded spacecraft, have reached the Moon with a minute budget of 100M$. After eight years of planning, Beresheet's journey started on February 22nd, 2019, when SpaceIL's lunar lander has been launched to space on top of a ...

[Full version]

[Full version]

Data Science & Deep Learning: Discrepancy, Coresets, and Sketches in Machine Learning

Edo Liberty

Monday, 18.11.2019, 12:30

Taub 301 Taub Bld.

This paper defines the notion of class discrepancy for families of functions. It shows that low discrepancy classes admit small offline and streaming coresets. We provide general techniques for bounding the class discrepancy of machine learning problems. As corollaries of the general technique we bound ...

[Full version]

[Full version]

Machine Learning of SQL Queries Containment Rate and Result Cardinality

Rojeh Hayek

Sunday, 17.11.2019, 15:30

Room 601 Taub Bld.

Traditional query optimizer is crucially dependent on cardinality estimation, which enables choosing among different plan alternatives by using the cardinality estimation of intermediate results within query execution plans. Therefore, the query optimizer must use reasonably good estimates. However, estimates produced by all widely-used database cardinality ...

[Full version]

[Full version]

Overlapping Correlation Clustering in Theory

Ayelet Kravi

Thursday, 14.11.2019, 11:00

Room 601 Taub Bld.

The overlapping correlation clustering problem has multiple real-world applications in diverse areas such as: social networks (community detection), biology (protein analysis) and information retrieval (categorising documents). Correlation clustering is a problem of assigning data points into distinct groups (clusters) based on similarity. When assigning two ...

[Full version]

[Full version]

Theory Seminar: Query-to-Communication Lifting Using Low-Discrepancy Gadgets

Or Meir (Haifa University)

Wednesday, 13.11.2019, 12:30

Taub 201 Taub Bld.

Lifting theorems are theorems that relate the query complexity of a function $f : \{0, 1\}^{n} \rightarrow \{0, 1\}$ to the communication complexity of the composed function fgn, for some “gadget” $g : \{0, 1\}^{b} \times \{0, 1\}^{b} \rightarrow \{0, 1\}$. Such theorems allow transferring ...

[Full version]

[Full version]

Is there Logic in Software Engineering?

Yuri Gurevich - COLLOQUIUM LECTURE

Tuesday, 12.11.2019, 14:30

Room 337 Taub Bld.

When this logician moved to theoretical computer science, this did not seem such a big deal to him. The transition was seamless. The transition to software engineering was radical. Microsoft research invited me to come, start a group and use my ideas to build tools. ...

[Full version]

[Full version]

Data Science & Deep Learning: Direct Optimization through arg max for Discrete Variational Auto-Encoder

Tamir Hazan (IE, Technion)

Monday, 11.11.2019, 12:30

Taub 301 Taub Bld.

Reparameterization of variational auto-encoders with continuous random variables is an effective method for reducing the variance of their gradient estimates. Our work optimizes the discrete VAE objective directly, using its Gumbel-Max reparameterization. This optimization technique propagates gradients through the reparameterized argmax, and replaces MCMC sampling ...

[Full version]

[Full version]

Using Neural Networks to Create Personalized Jazz Improvisations

Nadav Bhonker

Sunday, 10.11.2019, 13:30

Multidisciplinary Learning Student Center, CS Taub

Learning to generate music is an ongoing AI challenge. A more difficult challenge is the generation of musical pieces that match human-specific preferences. In this work we focus on personalized, symbol-based, monophonic generation of harmony-constrained jazz improvisations. To tackle this objective, we introduce a pipeline ...

[Full version]

[Full version]

Theory Seminar: The Adversarial Robustness of Sampling

Omri Ben Eliezer (Tel-Aviv University)

Wednesday, 6.11.2019, 12:30

Taub 201 Taub Bld.

Suppose we receive a stream of data, sampling each arriving data element with some predetermined probability. It is well known that if the elements in the stream are chosen in advance, then a constant number of random samples suffice to make the sampled subset “represent” ...

[Full version]

[Full version]

Training Neural Networks: The Bigger the Better?

Ohad Shamir - COLLOQUIUM LECTURE

Tuesday, 5.11.2019, 14:30

Room 337 Taub Bld.

Artificial neural networks are nowadays routinely trained to solve challenging learning tasks, but our theoretical understanding of this phenomenon remains quite limited. One increasingly popular approach, which is aligned with practice, is to study how making the network sufficiently large (a.k.a. ''over-parameterized'') makes the associated ...

[Full version]

[Full version]

Data Science & Deep Learning: Algorithmic Bias in Neural Networks: From Parameters to Function Space

Daniel Soudry (EE, Technion)

Monday, 4.11.2019, 12:30

Taub 301 Taub Bld.

In many common datasets, neural networks can achieve zero training loss yet generalize well to unseen data. Recent works suggest that this because standard training algorithms (e.g., GD or SGD) have an implicit regularization which is biased towards specific solutions, which tend to have good ...

[Full version]

[Full version]

A Calculus for Brain Computation

Prof. Christos Papadimitriou, Special Guest Talk, Harvey Prize Winner

Monday, 4.11.2019, 11:00

Room Auditorium 2 Taub Bld.

How does the brain beget the mind? How do molecules, cells and synapses effect reasoning, intelligence, language, science? Despite dazzling progress in experimental neuroscience we do not seem to be making progress in the overarching question -- the gap is huge and a completely new ...

[Full version]

[Full version]

CSpecial Talk: Barrier-enabled IO stack for Flash Storage

Youjip Won (School of Electrical Engineering, KAIST)

Thursday, 31.10.2019, 11:30

Room 601 Taub Bld.

This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. Exploiting the cache ...

[Full version]

[Full version]

Theory Seminar: Anti-concentration in Most Directions

Amir Yehudayoff (Technion)

Wednesday, 30.10.2019, 12:30

Taub 201 Taub Bld.

The talk is about anti-concentration of the inner product of two independent random vectors in Euclidean space. We shall discuss a proof, and some applications

[Full version]

[Full version]

CS Jubilee Event

Tuesday, 29.10.2019, 16:30

CS Taub Building, Technion

Technion CS celebrates jubilee and invites you to CS City - a festival of science and technology for the whole family which will be held on Tuesday, October 29, 2019 starting at 4:30 pm at the CS Taub Building, Technion. Participation is free, but pre-registration ...

[Full version]

[Full version]

Query Evaluation in Election Databases

Muhammad Tibi

Wednesday, 23.10.2019, 15:00

Room 601 Taub Bld.

Election databases are the main elements of a recently introduced framework that aims to create bridges between the computational social choice and the data management communities. An election database consists of incomplete information about the preferences of voters, in the form of partial orders, alongside ...

[Full version]

[Full version]

The Complexity of Database Inconsistency Measures

Ester Livshits

Wednesday, 23.10.2019, 13:30

Room 601 Taub Bld.

Managing data inconsistency has been one of the major challenges in the research and practice of database management. Database inconsistency arises for different reasons and in different applications. Nowadays, many applications obtain information from imprecise sources (e.g., social encyclopedias, social networks, and sensors attached to ...

[Full version]

[Full version]

Theory Seminar: Explicit Binary Tree Codes with Polylogarithmic Size Alphabet

Gil Cohen

Wednesday, 23.10.2019, 12:30

Taub 201 Taub Bld.

A tree code is a combinatorial object introduced by Schulman in the early 90s as a key ingredient in interactive coding. Schulman proved the existence of tree codes with constant alphabet size, but the problem of explicitly constructing a tree code remained elusive. We present ...

[Full version]

[Full version]

DeepRED: Deep Image Prior Powered by RED

Gary Mataev

Monday, 16.9.2019, 11:30

Taub 401 Taub Bld.

Inverse problems in imaging are extensively studied, with a variety of strategies, tools, and theory that have been accumulated over the years. Recently, this field has been immensely influenced by the emergence of deep-learning techniques. One such contribution, which is the focus of this paper, ...

[Full version]

[Full version]

Cross-Cultural Transfer Learning for Text Classification

Dor Ringel

Sunday, 15.9.2019, 10:30

Room 601 Taub Bld.

Large training datasets are required to achieve competitive performance in most natural language tasks. The acquisition process for these datasets is labor intensive, expensive, and time consuming. This process is also prone to human errors. In this work, we show that cross-cultural differences can be ...

[Full version]

[Full version]

Generating Personalized Product Descriptions from User Reviews

Guy Elad

Thursday, 12.9.2019, 16:00

Room 601 Taub Bld.

Product descriptions play an important role in the e-commerce ecosystem, conveying information to buyers about merchandise they may purchase. Yet, on leading e-commerce websites, with high volumes of new items offered for sale every day, product descriptions are often lacking or missing altogether, and when ...

[Full version]

[Full version]

Online Linear Models for Edge Computing

Hadar Sivan

Wednesday, 11.9.2019, 11:30

Room 601 Taub Bld.

Maintaining an accurate trained model on an infinite data stream is challenging due to concept drifts that render a learned model inaccurate. Updating the model periodically can be expensive, and so traditional approaches for computationally limited devices involve a variation of online or incremental learning, ...

[Full version]

[Full version]

The 9th Annual International TCE Conference on Autonomous Systems

Wednesday, 11.9.2019, 09:00

CS Taub Build. Auditorium 1

On Wednesday, September 11, TCE center will host this year the 9th annual Henry Taub International Conference on Autonomous Systems and will focus on the advent of autonomous systems including self-driving cars, automatic delivery drones, and service robots considered by many a major revolution of ...

[Full version]

[Full version]

Efficient Lock-Free Durable Sets

Yoav Zuriel

Sunday, 8.9.2019, 14:30

Room 701 Taub Bld.

Non-volatile memory is expected to co-exist or replace DRAM in upcoming architectures. Durable concurrent data structures for non-volatile memories are essential building blocks for constructing adequate software for use with these architectures. In this paper, we propose a new approach for durable concurrent sets and ...

[Full version]

[Full version]

Theory Seminar: Transparent Polynomial Commitments and SNARKs

Ben Fisch (Stanford University)

Sunday, 8.9.2019, 12:30

Taub 201 Taub Bld.

We construct a new interactive polynomial commitment scheme using groups of unknown order. The interactive evaluation argument is public-coin and has logarithmic communication in the degree of the polynomial. The scheme does not require a trusted setup if instantiated with class groups. We apply this ...

[Full version]

[Full version]

Tree-Test: an association test for observations on a directed tree

Gal Novich

Thursday, 5.9.2019, 10:00

Room 601 Taub Bld.

In the field of population genetics, it is known that collected observations are not independent, as they all share a common ancestor. Current state-of-the-art association tests use Monte Carlo simulations to account for these dependency structures. However, these simulations are not scalable and are cumbersome ...

[Full version]

[Full version]

Thapl - A Theaterical Programming Language

Matan Peled

Tuesday, 3.9.2019, 12:30

Room 601 Taub Bld.

The purpose of this research is to explore an innovative approach to the declarative and imperative paradigms of programming languages. To demonstrate this approach, we have developed a prototype domain-specific language inspired by the scripts of theatrical plays, hence dubbed Tʜᴀᴘʟ. Tʜᴀᴘʟ's intended use is ...

[Full version]

[Full version]

Performance Prediction of Programs on Heterogeneous and Massively Parallel Architectures

Uri Shomroni

Thursday, 29.8.2019, 16:30

Room 601 Taub Bld.

Massively parallel, throughput-oriented processors are becoming increasingly common. Maximizing the benefit of these processors requires algorithms to be implemented differently than the sequential algorithms that most software developers are familiar with. This change is often very time-consuming and is not guaranteed to give an increase ...

[Full version]

[Full version]

Distributed Clique Detection in Dynamic Networks

Matthias Bonne

Wednesday, 21.8.2019, 11:30

Room 601 Taub Bld.

Real-world networks are dynamic in nature -- nodes may join or leave the network at any time, and communication links may appear or disappear constantly. In this dynamic setting, we study the problem of triangle detection, where the nodes of a network need to determine, ...

[Full version]

[Full version]

BQ: A Lock-Free Queue with Batching

Gal Milman

Thursday, 15.8.2019, 11:00

Room 601 Taub Bld.

Concurrent data structures provide fundamental building blocks for concurrent programming. Standard concurrent data structures may be extended by allowing a sequence of operations to be submitted as a batch for later execution. A sequence of such operations can then be executed more efficiently than the ...

[Full version]

[Full version]

Learning for Numerical Geometry

Gautam Pai

Wednesday, 14.8.2019, 11:00

Taub 401 Taub Bld.

Numerical geometry comprises of principled computational methods that utilize theoretical insights from geometry along with the engineering concepts from numerical methods, for tackling various problems in geometric data analysis. In contrast, computational methods from recent advances in deep learning exhibit a black box nature where ...

[Full version]

[Full version]

Solving Jigsaw Puzzles with Eroded Boundaries Using GAN Inpainting

Dov Bridger

Tuesday, 13.8.2019, 14:00

Room 601 Taub Bld.

Jigsaw puzzle solving is an intriguing problem, having a wide variety of applications in archaeology, biology, document restoration and others. This paper focuses on a specific variant of the problem - solving puzzles with eroded boundaries. Such erosion makes the problem extremely difficult, since most ...

[Full version]

[Full version]

Market Driven Multi-Resource Allocation

Liran Funaro

Monday, 12.8.2019, 16:00

Room 301 Taub Bld.

Suboptimal resource utilization among public and private cloud providers prevents them from maximizing their economic potential. Long-term allocated resources are often idle when they might have been subleased for a short period. Alternatively, arbitrary resource overcommitment may lead to unpredictable client performance. We propose a ...

[Full version]

[Full version]

Pixel Club: The Information in the Weights of a Deep Network

Stefano Soatto (UCLA)

Monday, 12.8.2019, 14:30

Electrical Eng. Building 815

The information in the weights of deep networks plays a key role in understanding their behavior. When used as a regularizer during training (either explicitly or implicitly) it induces generalization through the PAC-Bayes bound. Rather than being computed and minimized explicitly, it can be directly ...

[Full version]

[Full version]

Program Synthesis for Programmers

Hila Peleg

Tuesday, 6.8.2019, 14:30

Room 601 Taub Bld.

Recent years have seen great progress in automated synthesis techniques that can automatically generate code based on some intent expressed by the user, but communicating this intent remains a major challenge. When the expressed intent is coarse-grained (for example, restriction on the expected type of ...

[Full version]

[Full version]

On the Generalization of Gaussian Dropout using PAC-Bayesian bounds and Log-Sobolev Inequalities

Yaniv Nemcovsky

Monday, 29.7.2019, 10:00

Room 601 Taub Bld.

The omnipresence of increasingly large deep networks derives primarily from their empirical successes. Indeed, empirical evidence places a strong emphasis on operating at scale, more parameters and layers, in order to help both optimization and generalization. This counter-intuitive trend has eluded theoretical analysis. In this ...

[Full version]

[Full version]

A Learning Approach to Geometric Matrix Completion

Maria Schmidt

Monday, 22.7.2019, 10:00

Room 601 Taub Bld.

Different methods where presented through the years to find good solutions for the Matrix Completion Problem. This problem appears in many tasks in life where a sparse signal, which lies on a grid of two non- Euclidean domains (Graphs or manifolds), should be predicted or ...

[Full version]

[Full version]

Enumeration for MSO Queries on Trees via Circuits

Prof. Antoine Amarilli - SPECIAL GUEST LECTURE

Sunday, 14.7.2019, 11:00

Room 301 Taub Bld.

This talk will present our approach for enumerating the results of queries in monadic second-order (MSO) on trees. Our goal is to first preprocess the input tree in linear time, and then enumerate the answers with delay linear in the size of each answer, i.e., ...

[Full version]

[Full version]

ceClub: Preserving Locality across Virtual and Physical Address Spaces to Accelerate Address Translation

Lilia Daniel (EE, Technion)

Wednesday, 10.7.2019, 11:30

Electrical Eng. Building 861

Applications' memory consumption is growing rapidly, which increases their dependence on the memory system. Since each virtual-to-physical memory translation in modern systems requires cache lookups or multiple memory accesses, the run time overhead of virtual memory translation is on the rise. Meanwhile, the increasing prevalence ...

[Full version]

[Full version]

Probably Strongly Believed

Nitzan Zamir

Sunday, 7.7.2019, 11:30

Room 601 Taub Bld.

Whereas deterministic protocols are typically guaranteed to obtain particular goals of interest, probabilistic protocols typically provide only probabilistic guarantees. In this talk we initiate an investigation of the interdependence between actions and subjective beliefs of agents in a probabilistic setting. In particular, we study what ...

[Full version]

[Full version]

On the Number of Factorizations of Polynomials with Application to List-Decoding of Rank-Metric Codes

Rachel Nirit Berman

Thursday, 4.7.2019, 14:30

Taub 601

Rank-metric codes (RMCs) over finite fields were introduced some 40 years ago by Delsarte, Gabidulin and Roth. Interest in RMCs was revived in recent years due to the application of such codes to network coding. In 1991, another simple construction of a class of RMCs ...

[Full version]

[Full version]

CGGC Seminar: Linearly Converging Quasi Branch and Bound Algorithms for Global Rigid Registration

Nadav Dym (Duke University)

Wednesday, 3.7.2019, 11:30

Taub 401 Taub Bld.

Rigid registration is the problem of finding the optimal rigid motion and correspondence between two shapes, so that they are as similar as possible in terms of an appropriate energy. We will describe several popular algorithms for this problem: PCA alignment and ICP, which are ...

[Full version]

[Full version]

Coding Theory: Syndrome Decoding of Reed-Muller Codes and Tensor Decomposition over Finite Fields

Aditya Potukuchi (Rutgers University)

Sunday, 30.6.2019, 14:30

Room 601 Taub Bld.

In this talk, we will look at decoding Reed-Muller codes beyond their minimum distance when the errors are random (i.e., in the binary symmetric channel). A beautiful result of Saptharishi, Shpilka and Volk showed that for binary Reed-Muller codes of length n and degree n ...

[Full version]

[Full version]

CGGC Seminar: Automatic Non-Isometric Shape Correspondence using a Genetic Algorithm

Michal Edelstein (CS, Technion)

Sunday, 30.6.2019, 10:30

Room 337 Taub Bld.

Shape correspondence is a fundamental task in shape analysis. Given two shapes, the goal is to compute a semantic correspondence between points on them. Shape correspondence is required when two shapes are analyzed jointly, which is common in many applications such as texture and deformation ...

[Full version]

[Full version]

ceClub: Accelerating Software Defined Networking in Microsoft Azure

Daniel Firestone (Azure Host Networking)

Thursday, 27.6.2019, 13:30

Electrical Eng. Building 861

Modern cloud architectures rely on each server running a software-defined networking stack to implement policy and virtualization. However, these networking stacks are becoming increasingly complex as features are added and as network speeds increase. Running these stacks on CPU cores takes away processing power from ...

[Full version]

[Full version]

Theory Seminar: On the Role of Randomness in Local Distributed Graph Algorithm

Yannic Maus, (CS, Technion)

Wednesday, 26.6.2019, 12:30

Taub 201 Taub Bld.

It is widely known that in the well-studied \LOCAL model of distributed computing, introduced by Linial [FOCS '87], many of the classic distributed graph problems (including maximal independent set (MIS) and MaxDegree+1-vertex coloring), have very efficient (and simple) randomized but exponentially slower deterministic algorithms. Understanding ...

[Full version]

[Full version]

Pixel Club: Momen(e)t : Flavor the Moments in Learning to Classify Shapes

Mor Joseph-Rivlin (CS, Technion)

Wednesday, 26.6.2019, 11:00

Taub 401 Taub Bld.

A fundamental question in learning to classify 3D shapes is how to treat the data in a way that would allow us to construct efficient and accurate geometric processing and analysis procedures. Here, we restrict ourselves to networks that operate on point clouds. There were ...

[Full version]

[Full version]

Today! Project Fair in IoT, Software, Android Apps, AI, Cyber, Computer Security, and Networks

Tuesday, 25.6.2019, 12:30

CS Taub Lobby

CS Labs: Systems and Software Development Laboratory (SSDL), Cyber and Computer Security Laboratory (CYBER), The Laboratory for Computer Communication and Networking (LCCN) invite you to visit the Spring Project Fair in IoT, Software, Android Apps, AI, Cyber, Computer Security, and Networks, including demos and presentations ...

[Full version]

[Full version]

TODAY! CS RESEARCH DAY 2019

Monday, 24.6.2019, 15:00

CS Taub Lobby

The 9th CS Research Day for graduate studies will be held on Monday, June 24, 2019 between 15:00-17:00, at the lobby of the CS Taub Building. Research Day events are opportunity for our graduate students to expose their researches using posters and presentations to CS ...

[Full version]

[Full version]

ceClub: Networks that Never Drop Packets

Rachit Agarwal (Cornell University)

Monday, 24.6.2019, 14:30

Electrical Eng. Building 861

Datacenter congestion control remains to be a hard problem. The root of the problem is that the ability of end-hosts to react to congestion is fundamentally limited by the timeliness and precision of congestion signals from the network. Unfortunately, despite decades of research, the community ...

[Full version]

[Full version]

Coding Theory: Clustering-Correcting Codes

Tal Shinkar (CS, Technion)

Sunday, 23.6.2019, 14:30

Room 601 Taub Bld.

In this talk, a new family of codes called clustering-correcting codes is presented. This family of codes is motivated by the special structure of data that is stored in DNA-based storage systems. The data stored in these systems has the form of unordered sequences, also ...

[Full version]

[Full version]

CGGC Seminar: Viscous Thin Films in Real Time

Saar Raz (CS, Technion)

Sunday, 23.6.2019, 13:30

Room 337 Taub Bld.

I'll discuss our novel discrete scheme for simulating viscous thin films in 2D at real-time frame rates. Our scheme is based on a new formulation of the gradient flow approach, that leads to a discretization based on local stencils that are easily computable on the ...

[Full version]

[Full version]

Pixel Club: Geometric Feature Descriptors based on Partial Differential Equations

Robert Dachsel (Brandenburg University of Technology)

Thursday, 20.6.2019, 13:30

Room 337 Taub Bld.

Abstract: One of the main tasks in three-dimensional shape analysis is to retrieve similarities between two or more non-rigid objects in terms of point-to-point correspondences. For the descriptor based approach, it is useful to construct a simplified shape representation called feature descriptor. A successful descriptor ...

[Full version]

[Full version]

Theory Seminar: Planar Diameter via Metric Compression

Merav Parter (Weizmann Institute of Science)

Wednesday, 19.6.2019, 12:30

Taub 201 Taub Bld.

We develop a new approach for distributed distance computation in planar graphs that is based on a variant of the metric compression problem recently introduced by Abboud et al. [SODA'18]. In our variant of the Planar Graph Metric Compression Problem, one is given an $n$-vertex ...

[Full version]

[Full version]

Multiscale Models for Image Classification and Physics with Deep Networks

Prof. Stéphane Mallat - SPECIAL GUEST LECTURE

Tuesday, 18.6.2019, 14:30

Room 337 Taub Bld.

Approximating high-dimensional functionals with low-dimensional models is a central issue of machine learning, image processing, physics and mathematics. Deep convolutional networks are able to approximate such functionals over a wide range of applications. This talk shows that these computational architectures take advantage of scale separation, ...

[Full version]

[Full version]

AI as an Accelerator to Great Scientific Research

Stuart Feldman- SPECIAL GUEST LECTURE

Sunday, 16.6.2019, 14:30

Room 337 Taub Bld.

The new and highly effective techniques frequently associated with Artificial Intelligence, including machine learning, pattern recognition, natural language processing, robotics, image analysis, and nonlinear optimization will have profound effects on the ways research is done and the sorts of projects that are feasible. There is ...

[Full version]

[Full version]

Coding Theory: Zero-error Communication over a Two-Way Channel

Yujie Gu (Tel-Aviv University)

Sunday, 16.6.2019, 14:30

Room 601 Taub Bld.

In this talk, we consider the problem of communicating over a discrete memoryless two-way channel using non-adaptive schemes, under a zero probability of error criterion. We derive inner and outer bounds on the zero-error capacity region, based on random coding, linear programming, and linear codes.

[Full version]

[Full version]

Special Distinguished Lecture: Putting Ethical AI to the Vote

Ariel Procaccia (CMU)

Sunday, 16.6.2019, 11:30

Bloomfield 527

I will present the 'virtual democracy' framework for the design of ethical AI. In a nutshell, the framework consists of three steps: first, collect preferences from voters on example dilemmas; second, learn models of their preferences, which generalize to any (previously unseen) dilemma; and third, ...

[Full version]

[Full version]

Mitigating One-Sided Biases in Natural Language Understanding Datasets

Yonatan Belinkov - CS-Lecture

Sunday, 16.6.2019, 10:30

Room 601 Taub Bld.

Many natural language understanding (NLU) tasks consist of identifying the relationship between two objects, such as a paragraph and a question (reading comprehension), an image and a question (visual question answering), or a premise and a hypothesis (natural language inference). These tasks supposedly require a ...

[Full version]

[Full version]

Preventing Collusion in Cloud Computing Auctions

Shunit Agmon

Thursday, 13.6.2019, 14:30

Taub 601

In recent years, cloud providers have been moving towards offering their clients separate cloud resources for short periods of time instead of offering bundles of resources for longer periods. In parallel, the providers are moving towards using economic mechanisms, such as auctions, to allocate these ...

[Full version]

[Full version]

CGGC Seminar: Generative Design & Engineering

Suraj Musuvathy (Siemens Corporation Corporate Technology)

Thursday, 13.6.2019, 11:00

Taub 401

Recent advances in manufacturing techniques have greatly expanded the types and complexity of shapes that can be produced. At the same time, advances in AI (esp. machine learning) and physics driven algorithms (e.g., topology optimization) have enabled novel methods and workflows for design engineering. A ...

[Full version]

[Full version]

Workshop: SeeByondReality

Thursday, 13.6.2019, 09:00

Room 337 Taub Bld.

You are invited to a workshop on Image Processing, Computer Vision, Computer Graphics and Virtual Reality which will be held on Thursday, June 13, 2019, in Room 337, 09:00-12:20, CS Taub Building. More details and full program in the attached poster Please pre-register. You are ...

[Full version]

[Full version]

Theory Seminar: On Symmetry and Initialization for Neural Network

Ido Nahum (Mathematics, Technion)

Wednesday, 12.6.2019, 12:30

Taub 201 Taub Bld.

This work provides an additional step in the theoretical understanding of neural networks. We consider neural networks with one hidden layer and show that when learning symmetric functions, one can choose initial conditions so that standard SGD training efficiently produces generalization guarantees. We empirically verify ...

[Full version]

[Full version]

ceClub: Full-System Computer Architecture Using Open-Source Hardware and FPGA-Accelerated Simulation

Alon Amid (University of Berkeley)

Wednesday, 12.6.2019, 11:30

Electrical Eng. Building 861

In this talk, I will describe several research projects developed in the Berkeley Architecture Research group which utilize FPGA-accelerated simulation and open-source hardware, demonstrating the possibilities and accessibility of full-system computer architecture research using these tools and methodologies. FireSim is an easy-to-use, open-source, FPGA-accelerated cycle-accurate ...

[Full version]

[Full version]

CSpecial Talk: Circumventing Lower Bounds in Machine Learning using An Oracle Model: Applications to Boosting, Online And Private Learning

Alon Gonen (Princeton University )

Tuesday, 11.6.2019, 15:30

Taub 601

The last decade saw a tremendous empirical success of machine learning algorithms, which often can not be explained theoretically using a worst-case analysis. Therefore, it is a great challenge to identify reasonable assumptions under which the theory is aligned with the practice. In this talk ...

[Full version]

[Full version]

SYNTECH: Synthesis Technologies for Reactive Systems Software Engineers

Shahar Maoz - COLLOQUIUM LECTURE

Tuesday, 11.6.2019, 14:30

Room 337 Taub Bld.

Reactive synthesis is an automated procedure to obtain a correct-by-construction reactive system from a given declarative, temporal specification. Examples of these systems include the software controllers of robotic systems. Despite recent advancements on the theory and algorithms of reactive synthesis, e.g., efficient synthesis for the ...

[Full version]

[Full version]

Pixel Club: A Monte Carlo Framework for Rendering Speckle Statistics in Scattering Media

Chen Bar & Marina Alterman (EE, Technion)

Monday, 10.6.2019, 14:30

Electrical Eng. Building 1061

We present a Monte Carlo rendering framework for the physically-accurate simulation of speckle patterns arising from volumetric scattering of coherent waves. These noise-like patterns are characterized by strong statistical properties, such as the so-called memory effect. These properties are at the core of imaging techniques ...

[Full version]

[Full version]

CGGC Seminar: Volumetric Untrimming: Precise Decomposition of Trimmed Trivariates into Tensor Products

Fady Massarwi (CS, Technion)

Monday, 10.6.2019, 14:00

Room 337 Taub Bld.

3D objects, modeled using Computer Aided Geometric Design (CAGD) tools, are traditionally represented using a boundary representation (B-rep), and typically use spline functions to parameterize these boundary surfaces. However, recent development in physical analysis, in isogeometric analysis (IGA) in specific, necessitates a volumetric parametrization of ...

[Full version]

[Full version]

TOY: A Total ordering Optimistic sYstem for Permissioned Blockchains

Yehonatan Buchnik

Thursday, 6.6.2019, 12:30

Taub 601

Blockchains are distributed secure ledgers to which transactions are issued continuously and each block of transactions is tightly coupled to its predecessors. Permissioned blockchains place special emphasis on transactions throughput. In this paper we present TOY, which leverages the iterative nature of blockchains in order ...

[Full version]

[Full version]

CSpecial Talk: Exploring New Frontiers in Container Technology

James Bottomley (IBM Research)

Thursday, 6.6.2019, 11:30

Room 337 Taub Bld.

Containers (or Operating System based Virtualization) are an old technology; however, the current excitement (and consequent investment) around containers provides interesting avenues for research on updating the way we build and manage container technology. The most active area of research today, thanks to concerns raised ...

[Full version]

[Full version]

Theory Seminar: Network Coding Gaps for Completion Time of Multiple Unicasts

David Wajc (CMU)

Wednesday, 5.6.2019, 12:30

Taub 201

Arguably the most common network communication problem is multiple-unicasts: Distinct packets at different nodes in a network need to be delivered to a destination specific to each packet, as fast as possible. The famous multiple-unicast conjecture posits that, for this natural problem, there is no ...

[Full version]

[Full version]

CSpecial Tutorial: Understanding the Bitcoin Protocol. Seriously. (two-hour tutorial)

Martín Ugarte (University of Chile)

Tuesday, 4.6.2019, 14:30

Taub 401

In the last six years, Bitcoin has obtained a good deal of attention, reaching in May 2019 a market capitalization of more than one hundred and fifty billion (US) dollars and a daily trading volume of hundreds of millions of dollars. Although Bitcoin is considered ...

[Full version]

[Full version]

Bayesian Algorithms for Vision Acuity Tests

David Nissan Cohen

Tuesday, 4.6.2019, 11:30

Taub 601

Visual acuity (VA) tests are widely used in ophthalmology to measure vision quality, but even modern tests still rely on an algorithm created in 1976 \cite{Bailey1976}. This algorithm is basically the original VA test algorithm from 1873 \cite{Snellen1873}, with minor modifications. The tests measure VA ...

[Full version]

[Full version]

Computational Integrity: from theory to practice

Michael Riabzev

Monday, 3.6.2019, 12:30

Taub 601

Computation integrity (CI) protocols allow a strong prover to convince a skeptic verifier it has knowledge of an input satisfying a program. Although theoretical CI constructions are well known for almost 30 years, industrial adaption has only recently started. In this seminar we will go ...

[Full version]

[Full version]

Uncertainty and its Applications in Deep Neural Networks

Yonatan Geifman

Sunday, 2.6.2019, 15:30

Taub 601

Deep neural networks (DNNs) have recently shown great success in many machine learning domains and problems. However, applying these models for mission critical tasks still has many safety issues due to prediction uncertainty and prediction errors. This talk covers several related results concerning uncertainty estimation, ...

[Full version]

[Full version]

Coding Theory: Reconstruction of Sequences in DNA Storage

Maria Abu Sini (CS, Technion)

Sunday, 2.6.2019, 14:30

Taub 601

The sequence reconstruction problem corresponds to a model in which a sequence from some code is transmitted over several noisy channels. The channels are almost independent as it is only required that their outputs are different. The main problem under this paradigm is to determine ...

[Full version]

[Full version]

CGGC Seminar: Accessibility for Line-Cutting in Freeform Surfaces

Boris van Sosin (CS, Technion)

Sunday, 2.6.2019, 13:30

Room 337 Taub Bld.

Manufacturing techniques such as hot-wire cutting, wire-EDM, wire-saw cutting, and flank CNC machining all belong to a class of processes called line-cutting where the cutting tool moves tangentially along the reference geometry. From a geometric point of view, line-cutting brings a unique set of challenges ...

[Full version]

[Full version]

Theory Seminar: Fast Approximate Shortest Paths in the Congested Clique

Michal Dory (CS, Technion)

Wednesday, 29.5.2019, 12:30

Taub 201

I will discuss our recent shortest paths algorithms in the distributed congested clique model. Our first contribution is a (2+epsilon)-approximation algorithm for all-pairs shortest paths (APSP) requiring only polylogarithmic number of rounds. This is the first sub-polynomial constant approximation for APSP in this model. We ...

[Full version]

[Full version]

ceClub: Memory Channels Are Needed for High Performance Data Analytics

Oded Green (Nvidia USA)

Wednesday, 29.5.2019, 11:30

Electrical Eng. Building 861

Graph processing is typically considered to be a memory-bound rather than compute-bound problem. One common line of thought is that more available memory bandwidth corresponds to better graph processing performance. However, in this talk, I will show that this is not necessarily the case. I ...

[Full version]

[Full version]

Deep Learning: Optimization, Generalization and Architectures

Amir Globerson - COLLOQUIUM LECTURE - RESCHEDULED

Tuesday, 28.5.2019, 14:30

Room 337 Taub Bld.

Artificial neural networks have recently revolutionized the field of machine learning, demonstrating striking empirical success on tasks such as image understanding, speech recognition and natural language processing. However, we still do not have sufficient theoretical understanding of how such models can be successfully learned. Two ...

[Full version]

[Full version]

Pixel Club: Multi-Scale Weighted Nuclear Norm Image Restoration

Noam Yair (EE, Technion)

Tuesday, 28.5.2019, 11:30

Electrical Eng. Building 1061

A prominent property of natural images is that groups of similar patches within them tend to lie on low-dimensional subspaces. This property has been previously used for image denoising, with particularly notable success via weighted nuclear norm minimization (WNNM). In this work, we extend the ...

[Full version]

[Full version]

Pixel Club: Photometric Stereo by Non-convex Minimisation

Georg Radow (Brandenburg University of Technology)

Sunday, 26.5.2019, 14:30

Room 337 Taub Bld.

The aim of photometric stereo is to estimate shape and appearance of a three-dimensional object from multiple input images taken from the same point of view but under different lighting conditions. The most common techniques are conceptually close to the classic photometric stereo problem, meaning ...

[Full version]

[Full version]

Coding Theory: Nearly Optimal Robust Positioning Sequences

Wei Hengjia (Ben-Gurion University)

Sunday, 26.5.2019, 14:30

Taub 601

A robust positioning pattern is a large array that allows a mobile device to locate its position by reading a possibly corrupted small window around it. In this talk, we focus on the 1-dimensional case, i.e., robust positioning sequences (RPS). We present constructions of RPSs ...

[Full version]

[Full version]

Theory Seminar: How to Detect Extreme Bias: An Overview of Quantified Derandomization

Roei Tell (Weizmann Institute of Science)

Wednesday, 22.5.2019, 12:30

Taub 201

In the classical derandomization problem, we are given a description of a Boolean circuit, and want to deterministically approximate its acceptance probability, up to a small constant error (say, 1/6). This problem is intimately related to circuit lower bounds, and extensive efforts have been devoted ...

[Full version]

[Full version]

Estimating Application Runtimes Using TLB Performance Metrics

Mohammad Agbarya

Wednesday, 22.5.2019, 09:00

Taub 601

Instead of using full cycle-accurate simulations, recent virtual memory studies frequently utilize linear models to predict application runtimes from TLB misses. The benefit of the latter methodology is that it is easier and much faster than the former, but its correctness has never been validated. ...

[Full version]

[Full version]

A Study of Synchronization Optimizations for Parallel Dynamic Languages and Transactional Processing

Arie Tal

Tuesday, 21.5.2019, 13:30

Taub 601

Dynamically-typed programming languages such as Python, Ruby and JavaScript are widely used, and much effort is spent on making them efficient. One substantial research effort in this direction is the enabling of parallel code execution. As a first step towards efficiently synchronizing such languages, we ...

[Full version]

[Full version]

Pixel Club: Color and Multi-Spectral Sensing Using a Coded Aperture Camera

Nirit Nussbaum (EE, Technion)

Tuesday, 21.5.2019, 11:30

Electrical Eng. Building 1061

Hyperspectral imaging allows measuring the spectrum of each pixel in the image of a scene. This modality has diverse applications, ranging from agriculture and geoscience, to biomedical imaging and surveillance. However, most existing methods require dedicated cameras, which make use of extra optical elements (prisms, ...

[Full version]

[Full version]

Coding Theory: On Optimal Locally Repairable Codes with Super-Linear Length

Han Cai (Southwest Jiaotong University)

Sunday, 19.5.2019, 14:30

Taub 601

In this talk, we consider locally repairable codes which are optimal with respect to the Singleton-type bound presented by Prakash \emph{et al.} New upper bounds on the length of such optimal codes are derived. The new bounds both improve and generalize previously known bounds. We ...

[Full version]

[Full version]

CGGC Seminar: Barycentric Rational Interpolation of a Function and Its Derivatives

Emiliano Cirillo (CS, Technion)

Sunday, 19.5.2019, 13:30

Room 337 Taub Bld.

Floater–Hormann interpolants constitute a family of barycentric rational interpolants based on the blend of local polynomial interpolants of degree d that have recently proved to be a viable alternative to more classical interpolation methods, such as polynomials and splines, especially in the equispaced setting. In ...

[Full version]

[Full version]

CGGC Seminar: Non Isometric Shape Correspondence

Danielle Ezuz (CS, Technion)

Thursday, 16.5.2019, 10:30

Taub 401

Shape correspondence is a fundamental task in shape analysis, with a variety of applications in computer graphics and computer vision. Example applications include statistical shape interpolation, texture, segmentation and deformation transfer, and application of deep learning to 3D shapes. Formulating the desired geometric properties of ...

[Full version]

[Full version]

Non Isometric Shape Correspondence

Danielle Ezuz

Thursday, 16.5.2019, 10:30

Taub 401

Shape correspondence is a fundamental task in shape analysis, with a variety of applications in computer graphics and computer vision. Example applications include statistical shape interpolation, texture, segmentation and deformation transfer, and application of deep learning to 3D shapes. Formulating the desired geometric properties of ...

[Full version]

[Full version]

Theory Seminar: Improved List Decoding of Algebraic Codes

Noga Ron-Zewi (Haifa University)

Wednesday, 15.5.2019, 12:30

Room 337 Taub Bld. (Note unusual room)

We show that Folded Reed-Solomon codes achieve list decoding capacity with constant list sizes, independent of the block length. Prior work yielded list sizes that are polynomial in the block length, and relied on elaborate subspace evasive machinery to reduce the list sizes to constant. ...

[Full version]

[Full version]

ceClub: The Technion Computer Engineering Club

Alex Manuskin (EE, Technion)

Wednesday, 15.5.2019, 11:30

Electrical Eng. Building 861

With their introduction in 2009, cryptocurrencies brought the promise of a global decentralized payment system. However, protocol limitations prevent them from managing the required throughput. Previous work overcame protocol limitations and used low-degree sharding to allow for parallelization. All these systems rely on efficient validation ...

[Full version]

[Full version]

Some systems engineering problems and a little bit of theory

Eitan Bachmat - COLLOQUIUM LECTURE - RESCHEDULED

Tuesday, 14.5.2019, 14:30

Room 337 Taub Bld.

We will consider the SITA server farm scheduling policies which were introduced and studied by Harchol-Balter and her collaborators. In particular we will discuss a recent INFOCOM17 paper of Doncel, Aalto and Ayesta and relate one of the tables there to the work of Riemann ...

[Full version]

[Full version]

Machine Learning on AWS Cloud Workshop

Monday, 13.5.2019, 15:00

Room 337 Taub Bld.

Faculty and Graduate students are invited to a workshop on “Machine Learning on the AWS Cloud” on Monday, May 13, 2019, 15:00-18:30, in room 337, CS Taub Building. More details and program in the attached poster and document. Please RSVP by email to: awstomer at ...

[Full version]

[Full version]

Pixel Club: Leveraging Hidden Structure in Unstructured Illumination

Mark Sheinin (EE, Technion)

Tuesday, 7.5.2019, 11:00

Electrical Eng. Building 1061

Artificial illumination plays a vital role in human civilization. In computer vision, artificial light is extensively used to recover 3D shape, reflectance, and further scene information. However, in most computer vision applications using artificial light, some additional structure is added to the illumination to facilitate ...

[Full version]

[Full version]

Pixel Club: On Mobile Sensing of Spatial Fields

Ariel Shallom (EE, Technion)

Monday, 6.5.2019, 13:00

Electrical Eng. Building 861

Mobile sensing is an emerging research area with many applications, including environmental monitoring and medical imaging. For example, tomography, which is used extensively in medical imaging, can be re-formulated by means of sampling along trajectories in the sinogram domain. We propose a model that accounts ...

[Full version]

[Full version]

Coding Theory: The Hat Guessing Number of Graphs

Chong Shangguan (Tel-Aviv University)

Sunday, 5.5.2019, 14:30

Taub 601

Consider the following hat guessing game: nn players are placed on nn vertices of a graph, each wearing a hat whose color is arbitrarily chosen from a set of qq possible colors. Each player can see the hat colors of his neighbors, but not his ...

[Full version]

[Full version]

CSpecial Talk: Crush Your Coding Interview

Dor Gross (Facebook Israel)

Wednesday, 1.5.2019, 12:30

Taub 7

We are happy to invite your to the fourth of series of meetings on career and job seeking which will be held at CS, on Wednesday, May 1, at 12:30, in Taub Classroom 7, CS Taub Building. Mr. David Gross, Program Engineer in Facebook Israel ...

[Full version]

[Full version]

Theory Seminar: Complement-Free Couples Must Communicate: A Hardness Result for Two-Player Combinatorial Auctions

Tomer Ezra (Tel-Aviv University)

Wednesday, 1.5.2019, 12:30

Taub 201

We study the communication complexity of welfare maximization in combinatorial auctions with m items and two subadditive bidders. A 12-approximation can be guaranteed by a trivial randomized protocol with zero communication, or a trivial deterministic protocol with O(1) communication. We show that outperforming these trivial ...

[Full version]

[Full version]

ceClub: Teechain: A Secure Asynchronous Blockchain Payment Network

Oded Naor (EE, Technion)

Wednesday, 1.5.2019, 11:30

Electrical Eng. Building 861

In recent years, cryptocurrencies, and blockchain as their underlying technology have emerged. They act as a decentralized ledger, i.e., an append-only log, where payments are recorded. One of the key limitations of almost all blockchains is the overall throughput, e.g., in Bitcoin, the first cryptocurrency, ...

[Full version]

[Full version]

Computer Agents that Interact Proficiently with People

Sarit Kraus - COLLOQUIUM LECTURE

Tuesday, 30.4.2019, 14:30

Room 337 Taub Bld.

Automated agents that interact proficiently with people can be useful in supporting, training or replacing people in complex tasks. The inclusion of people presents novel problems for the design of automated agents’ strategies. People do not necessarily adhere to the optimal, monolithic strategies that can ...

[Full version]

[Full version]

Deep Eikonal Solvers

Moshe Lichtenstein

Monday, 29.4.2019, 11:00

Taub 601

A deep learning approach to numerically approximate the solution to the Eikonal equation is introduced. The proposed method is built on the fast marching scheme which comprises of two components: a local numerical solver and an update scheme. We replace the formulaic local numerical solver ...

[Full version]

[Full version]

CGGC Seminar: Generalized Volumetric Foliation from Inverted Viscous Flow

David Cohen (CS, Technion)

Sunday, 28.4.2019, 14:00

Taub 401

We propose a controllable geometric flow that decomposes the interior volume of a triangular mesh into a collection of encapsulating layers, which we denote by a generalized foliation. For star-like genus zero surfaces we show that our formulation leads to a foliation of the volume ...

[Full version]

[Full version]

Generalized Volumetric Foliation from Inverted Viscous Flow

David Cohen

Sunday, 28.4.2019, 14:00

Taub 401

We propose a controllable geometric flow that decomposes the interior volume of a triangular mesh into a collection of encapsulating layers, which we denote by a generalized foliation. For star-like genus zero surfaces we show that our formulation leads to a foliation of the volume ...

[Full version]

[Full version]

Effective Enumeration of Tree Decompositions for Solver Optimization

Dvir Dukhan

Sunday, 28.4.2019, 11:00

Taub 601

Many intractable computational problems on graphs admit tractable algorithms when applied to trees or forests. In such cases, a tree decomposition of the input graph often facilitates an effective solution. Therefore, tree decompositions are critical for graph problems in the fields of databases, game theory, ...

[Full version]

[Full version]

CS Open Day For Graduate Studies

Friday, 19.4.2019, 12:15

Room 337 Taub Bld.

The 2019 open day invites outstanding undergraduates from all universities to come to the Technion and learn about the Computer Science and Department, to meet faculty and graduate students and to hear a fascinating talk by Dr. Tal Cohen, Director of Program Development at Google: "Do ...

[Full version]

[Full version]

ceClub: What Are Machine Learning Models Hiding?

Vitaly Shmatikov (Cornell Tech)

Wednesday, 17.4.2019, 11:30

Electrical Eng. Building 861

Modern machine learning models exhibit super-human accuracy on tasks from image classification to natural-language processing, but accuracy does not tell the entire story of what these models have learned. Does a model memorize and leak its training data? Does it contain hidden backdoor functionality? In ...

[Full version]

[Full version]

Multi-Hop Paragraph Retrieval for Open-Domain Question Answering

Yair Feldman

Sunday, 14.4.2019, 16:30

Taub 301

Question Answering (QA) is one of the core tasks in natural language understanding. This task requires the ability to process and understand natural language questions and documents, as well as to extract the answers to these questions. There are several settings for the QA task, ...

[Full version]

[Full version]

CGGC Seminar: Geometrical Challenges in Treating Irregular Heart Beat

Fady Massarwi (Biosense Webster)

Sunday, 14.4.2019, 13:30

Room 337 Taub Bld.

This talk presents some of the geometrical aspects involved in treating irregular heart beat rhythm (Arrythmia) using Carto 3 System. Carto 3 is a product of Biosense-Webster, a global leader in the science of diagnosing and treating heart rhythm disorders. CARTO 3 System enables accurate ...

[Full version]

[Full version]

Gentle Measurement of Quantum States and Differential Privacy

Guy Rothblum (Weizmann Institute of Science)

Wednesday, 10.4.2019, 12:45

Taub 201

We prove a new connection between gentle measurement (where one wants to measure n quantum states, in a way that damages the states only by a little) and differential privacy (where one wants to query a database about n users, in a way that reveals ...

[Full version]

[Full version]

Theory Seminar: Using Cryptography to Utilize an Untrusted Quantum Computer

Zvika Brakerski (Weizmann Institute of Science)

Wednesday, 10.4.2019, 12:30

Taub 201

The talk will survey new developments that use cryptographic tools in order to use a quantum computer even if it is operated by an untrusted party. Applications include: proofs of quantumness, certifiable randomness, privately outsourcing quantum computation (via quantum fully homomorphic encryption) and delegating quantum ...

[Full version]

[Full version]

The Complexity of Relational Queries over Extractions from Text

Liat Peterfreund

Monday, 8.4.2019, 13:30

Taub 601

Information Extraction (IE) is the task of extracting structured information from textual data. We explore a programming paradigm that is supported by several IE systems where relations extracted by atomic extractors undergo a relational manipulation. In our efforts toward achieving a better understanding of IE ...

[Full version]

[Full version]

Pixel Club: Deep Neural Networks Motivated by Partial Differential Equations

Eldad Haber (University of British Columbia)

Monday, 8.4.2019, 12:30

Room 337 Taub Bld.

Partial differential equations (PDEs) are indispensable for modeling many physical phenomena and also commonly used for solving image processing tasks. In the latter area, PDE-based approaches interpret image data as discretizations of multivariate functions and the output of image processing algorithms as solutions to certain ...

[Full version]

[Full version]

Knowledge-Based Learning through Feature Generation

Michal Badian

Sunday, 7.4.2019, 14:30

Taub 601

Machine learning algorithms have difficulties to generalize over a small set of examples. Humans can perform such a task by exploiting vast amount of background knowledge they possess. One method for enhancing learning algorithms with external knowledge is through feature generation. We introduce a new ...

[Full version]

[Full version]

e-lections 2019 Event

Sunday, 7.4.2019, 09:00

CS Taub Build. Auditorium 2

e-lections 2019 event, organized by Prof. Eli Biham, Orr Dunkelman, Yossi Oren and the Technion Hiroshi Fujiwara Cyber Security Research Center, will be held on Sunday, April 7, 2019 at the Technion, The event will present lectures related to electronic elections and to the effect ...

[Full version]

[Full version]

Theory Seminar: Upgrading Security of Encryption Schemes

Venkata Koppula (Weizmann Institute of Science)

Wednesday, 3.4.2019, 12:30

Taub 201

There are two well studied security notions for public key encryption schemes: security against passive adversaries and security against active adversaries. In this talk, we will discuss a new generic transformation that can upgrade the security of an encryption scheme from passive security to active ...

[Full version]

[Full version]

On-the-fly Model Checking with Guided Abstraction

Gal Sade

Tuesday, 2.4.2019, 15:30

Taub 601

Model checking is an automatic verification method that accepts a system model and a specification, and checks whether the model satisfies the specification. CTL is a branching temporal logic suitable for specifying behaviors of both software and hardware systems. In this work, we present a ...

[Full version]

[Full version]

From Cognitive Biases to the Communication Complexity of Local Search

Shahar Dobzinski - COLLOQUIUM LECTURE

Tuesday, 2.4.2019, 14:30

Room 337 Taub Bld.

In this talk I will tell you how analyzing economic markets where agents have cognitive biases has led to better understanding of the communication complexity of local search procedures. We begin the talk with studying combinatorial auctions with bidders that exhibit endowment effect. In most ...

[Full version]

[Full version]

Graph Balancing with Orientation Costs

Ran Yeheskel

Monday, 1.4.2019, 11:30

Taub 601

We consider the Graph Balancing problem, where we are given an undirected multigraph with edge weights and orientation costs. The goal is to find an orientation of the edges that minimizes the worst weighted incoming degree of a vertex (also known as makespan) while minimizing ...

[Full version]

[Full version]

CGGC Seminar: Volumetric Frame Fields for Hexahedral Meshing

David Palmer (MIT)

Thursday, 28.3.2019, 11:00

Room 337 Taub Bld.

The hexahedral meshing problem is the volumetric analog of the quad meshing problem, with analogous applications in finite element modeling. One might expect that frame field–based methods, which have proven effective in quad meshing, would extend naturally to the volumetric case. Unfortunately, several problems arise ...

[Full version]

[Full version]

Theory Seminar: Improved Bounds for Excluded Grid Theorem

Zihan Tan (University of Chicago)

Wednesday, 27.3.2019, 12:30

Taub 201

We study the Excluded Grid Theorem, a fundamental structural result in graph theory, that was proved by Robertson and Seymour in their seminal work on graph minors. The theorem states that there is a function f, such that for every integer g > 0, every ...

[Full version]

[Full version]

Pixel Club: Spectral Analysis of a Non-Equilibrium Stochastic System on a General Network

Inbar Seroussi (Tel-Aviv University)

Tuesday, 26.3.2019, 11:30

Room 337 Taub Bld.

Unravelling underlying complex structures from limited resolution measurements is a known problem arising in many scientific disciplines. We study a stochastic dynamical model with a multiplicative noise. It consists of a stochastic differential equation living on a graph, similar to approaches used in population dynamics ...

[Full version]

[Full version]

A Generic Sharding Scheme for Blockchain Protocols

Zuphit Fidelman

Monday, 25.3.2019, 13:30

Taub 601

Blockchain protocols are notoriously bad at scaling. Most protocols do work reasonably well when used in a small scale. Yet, as the network size grows, resources are added and overall computing power increases, most protocols simply do not scale. This is largely due to the ...

[Full version]

[Full version]

CGGC Seminar: Geometry Treatment in Fictitious domain Methods

Benjamin Wassermann (Technical University of Munich)

Sunday, 24.3.2019, 13:30

Taub 401

Fictitious domain methods are an elegant way to circumvent a tedious discretization process, mostly meshing. The core idea is to embedded the geometrically complex model into a fictitious domain, which has zero stiffness assigned. The complexity of the model is then recovered on the integration ...

[Full version]

[Full version]

Theory Seminar: Optimal Short-Circuit Resilient Formulas

Ran Gelles (Bar-Ilan University)

Wednesday, 20.3.2019, 12:30

Taub 201

We consider fault-tolerant boolean formulas in which the output of a faulty gate is short-circuited to one of the gate’s inputs. A recent result by Kalai et al. [FOCS 2012] converts any boolean formula into a resilient formula of polynomial size that works correctly if ...

[Full version]

[Full version]

TODAY! The Finals - 2019 Best Project Contest by Amdocs

Wednesday, 20.3.2019, 12:00

Room 337 Taub Bld.

You are invited to the final stage of the 2019 Best Project Contest. The finalist teams will present and talk about their projects. The event will take place on Wednesday, March 20, 2019, between 12:00-14:30, at the lobby of CS Taub Building. You are all ...

[Full version]

[Full version]

CGGC Seminar: Correspondences between Subdivision Surfaces

Meged Shoham (Technion)

Sunday, 17.3.2019, 13:30

Room 337 Taub Bld.

We present a novel method for computing correspondences between subdivision surfaces, represented as functional maps. We leverage two main advantages of the hierarchical structure: (1) the spectral basis functions, which are multi-resolution by construction, can be succinctly represented on a subdivision surface, and (2) the ...

[Full version]

[Full version]

Solving Archaeological Puzzles

Niv Derech

Sunday, 17.3.2019, 10:30

Taub 201

Puzzle solving is a difficult problem in its own right, even when the pieces are all square and build up a natural image. But what if these ideal conditions do not hold? One such application domain is archaeology, where restoring an artifact from its fragments ...

[Full version]

[Full version]

Statistical Approaches to Reverse Engineering

Omer Katz

Thursday, 14.3.2019, 14:30

Taub 601

Today we are literally surrounded by software. Almost all products and services we use on a daily basis involve some piece of software. The abundance of software has made our lives easier. Unfortunately it also made us susceptible than ever to software vulnerabilities and exploitation. ...

[Full version]

[Full version]

Find A Cure: Learning to Rank Articles for Molecular Queries

Aviram Magen

Thursday, 14.3.2019, 12:00

Taub 401

Billions of dollars a year are spent to develop a new drug. The first step in the drug development process is drug discovery, where in potential molecules are studied before leads are selected and moved to clinical trials. Extensive research is performed to identify studies ...

[Full version]

[Full version]

Differentiable Neural Architecture Search with Arithmetic Complexity Constraint

Yochai Zur

Thursday, 14.3.2019, 11:30

Taub 601

Neural Architecture Search (NAS) aims to facilitate the design of deep networks for a given task. This is part of a larger trend – automated machine learning (AutoML) – that promises to solve or at least alleviate the scarcity of ML experts needed to design ...

[Full version]

[Full version]

Theory Seminar: Theory Seminar:A Crash Course in Quantum Computing - Lecture 2

Tal Mor (CS, Technion)

Wednesday, 13.3.2019, 12:30

Taub 201

In this lecture we will introduce a few quantum complexity classes (BQP, QMA, QIP, and QPIP), the Deutsch-Jozsa algorithm, and Simon's algorithm; we will finally (very briefly) discuss Shor's algorithm for factoring large numbers.

[Full version]

[Full version]

ceClub: Network Vulnerabilities against Disasters

János Tapolcai (Budapest University)

Wednesday, 13.3.2019, 11:30

Electrical Eng. Building 861

We have witnessed worldwide network outages after large-scale natural disasters, such as earthquakes, hurricane, and terrorist attacks. In the talk, I will discuss how to extend the widely implemented single link failure models for regional failures. I will mainly focus on the related theoretical problems ...

[Full version]

[Full version]

CYBERDAY 2019

Tuesday, 12.3.2019, 09:30

Technion

CYBERDAY 2019 event, organized by Prof. Eli Biham, Prof. Sara Bitan, and the Technion Hiroshi Fujiwara Cyber Security Research Center, will be held on Tuesday, March 12, 2019 at the Technion, Keynote speakers: Prof. Bart Preneel (KU Leuven, Belgium) Prof. Adi Shamir (The Weizmann Institute ...

[Full version]

[Full version]

Pixel Club: Connecting Existing Pieces of Evidence in Time and Space for Understanding Real-World Events

Anderson Rocha (University of Campinas, SP - Brazil)

Sunday, 10.3.2019, 14:30

Electrical Eng. Building 1061

In this talk, we will discuss problems associated with synchronizing specific events in space and time (X-coherence), fact-checking, and mining persons, objects and contents of interest from various and heterogeneous sources including — but not limited to — the internet, social media and surveillance imagery. ...

[Full version]

[Full version]

Theory Seminar:A Crash Course in Quantum Computing - Lecture 1

Tal Mor (CS, Technion)

Wednesday, 6.3.2019, 12:30

Taub 201

In this lecture we will introduce the quantum bit (qubit), the basic rules of quantum information/computing, the no-cloning principle, quantum gates for universal quantum computing; finally we will see two protocols, one for quantum teleportation, and one for quantum key distribution.

[Full version]

[Full version]

ceClub: Disaggregated Programmable Switching and Distributed Load Balancing

Shay Vargaftik (EE, Technion)

Wednesday, 6.3.2019, 11:30

Electrical Eng. Building 861

Nowadays, as computer networks continuously increase in size and speed, making efficient use of compute and network resources becomes exceptionally challenging. At the heart of this challenge are scheduling and load balancing techniques that are expected to optimize resource usage and, in turn, minimize costs. ...

[Full version]

[Full version]

Advanced Geometric Methods in Machining and Additive Manufacturing

Ben Ezair

Sunday, 3.3.2019, 13:30

Taub 337

In this thesis, we show how geometry, and specifically parametric freeform geometry, can be used to solve manufacturing related problems. This thesis deals with both additive manufacturing (specifically 3D printing) and the more traditional (subtractive manufacturing) machining process. The first topic handled is the representation ...

[Full version]

[Full version]

Latent Entities Extraction: How to Extract Entities that Do Not Appear in the Text?

Eylon Shoshan

Sunday, 3.3.2019, 12:00

Taub 601

Named-entity Recognition (NER) is an important task in the NLP field, and is widely used to solve many challenges. However, in many scenarios, not all of the entities are explicitly mentioned in the text. Sometimes they could be inferred from the context or from other ...

[Full version]

[Full version]

Pixel Club: Recent Achievements in Bidirectional Heuristic Search

Ariel Felner (Ben-Gurion University)

Thursday, 28.2.2019, 14:00

Electrical Eng. Building 1061

In bidirectional heuristic search the search proceeds from both the start and the goal simultaneously.The state of the art in bidirectional search has changed significantly a very short time period; we now can answer questions about unidirectional and bidirectional search that until very recently we ...

[Full version]

[Full version]

GAIA: An OS Page Cache for Heterogeneous Systems

Tanya Brokhman

Wednesday, 27.2.2019, 11:30

Electrical Eng. Building 861

We propose a principled approach to integrating GPU memory with an OS page cache. We design GAIA, a weakly-consistent page cache that spans CPU and GPU memories. GAIA enables the standard mmap system call to map files into the GPU address space, thereby enabling data-dependent ...

[Full version]

[Full version]

Lazy Evaluation Methods for Complex Event Processing

Ilya Kolchinsky

Tuesday, 26.2.2019, 12:30

Taub 601

Rapid advances in data-driven applications over recent years have intensified the need for efficient mechanisms capable of real-time monitoring and detecting arbitrarily complex patterns in massive data streams. Complex event processing (CEP) is a prominent technology widely employed for performing this task in many areas, ...

[Full version]

[Full version]

Pixel Club: Image Restoration by Iterative Denoising and Backward Projections

Tom Tirer (Tel-Aviv University)

Tuesday, 26.2.2019, 11:30

Room 337 Taub Bld.

Inverse problems appear in many applications, such as image deblurring, inpainting and super-resolution. The common approach to address them is to design a specific algorithm (or recently - a deep neural network) for each problem. The Plug-and-Play (P&P) framework, which has been recently introduced, allows ...

[Full version]

[Full version]

Understanding the Context of micro-actions on the Web

Elad Kravi

Thursday, 21.2.2019, 10:00

Taub 601

The wide usage of smartphones encourages users to ubiquitously and constantly interact with web applications like microblogs and search engines. Examples of atomic interactions, referred as micro-actions, include posing a query, sending a textual message, sharing a photo etc. Analysis of micro-actions is beneficial for ...

[Full version]

[Full version]

Approximation Algorithms for the Maximum Carpool Matching and Submodular Maximization

Gilad Kutiel

Wednesday, 20.2.2019, 15:00

Taub 601

In the Maximum Carpool Matching problem we seek for the best way a group of people can share their ride based on their personal preferences (music, smoking, etc...). Submodularity is a property of set functions. The problem of maximizing a submodular function appears in many ...

[Full version]

[Full version]

Pixel Club: Improving Patch Similarity Measure Using Order Preserving Criterion and Learned Context Features

Stav Shapiro (CS & EE, Technion)

Tuesday, 19.2.2019, 11:30

Room 337 Taub Bld.

Patch matching and local treatment of images has proven to be a successful strategy for problems such as image denoising, inpainting, super-resolution, image editing and the list could go on and on. Naturally, the size of the patch is a crucial parameter of the patch ...

[Full version]

[Full version]

Pixel Club: The Contextual Loss

Roey Mechrez (EE, Technion)

Tuesday, 12.2.2019, 11:30

Electrical Eng. Building 1061

Feed-forward CNNs trained for image transformation problems rely on loss functions that measure the similarity between the generated image and a target image. Most of the common loss functions assume that these images are spatially aligned and compare pixels at corresponding locations. However, for many ...

[Full version]

[Full version]

Distribution-free models of social and information networks

Prof. Tim Roughgraden - SPECIAL DISTINGUISHED LECTURE - note unusual date

Thursday, 7.2.2019, 14:30

Room 337 Taub Bld.

The mathematical study of social and information networks has historically centered around generative models for such networks (preferential attachment, the Chung-Lu random graph model, Kronecker graphs, etc.). This talk proposes distribution-free models of social and information networks - novel classes of graphs that capture all ...

[Full version]

[Full version]

Understanding Reader Backtracking Behavior in Online News Articles

Uzi Smadja

Tuesday, 29.1.2019, 12:30

Taub 401

Rich engagement data can shed light on how people interact with online content and how such interactions may be determined by the content of the page. In this work, we investigate a specific type of interaction, backtracking, which refers to the action of scrolling back ...

[Full version]

[Full version]

ceClub: Practical Reliability of Systems

Dana Drachsler-Cohen (ETH, Zurich)

Tuesday, 29.1.2019, 11:30

Electrical Eng. Building 861

Recent years have seen the emergence of new kinds of software including deep learning, programmable computer networks, and blockchains. Unfortunately, these systems have been shown to suffer from critical safety and security errors, affecting their wider adoption. The goal of my research is to develop ...

[Full version]

[Full version]

Pixel Club: Embrace The Noise-Mining Clinical Reports to Gain a Broad Understanding of Chest X-rays

Jonathan Laserson (Zebra Medical Vision)

Tuesday, 29.1.2019, 11:30

Room 337 Taub Bld.

The chest X-ray scan is by far the most commonly performed radiological examination for screening and diagnosis of many cardiac and pulmonary diseases. It is also one of the hardest to interpret, with disagreement rating of around 30% even for experienced radiologists. At Zebra, we ...

[Full version]

[Full version]

Applying Machine Learning for Identifying Attacks at Run-time

Nurit Devir

Monday, 28.1.2019, 10:00

Taub 601

With the increase in malicious activity over the Internet, it has become extremely important to build tools for automatic detection of such activity. There have been attempts to use machine learning to detect network attacks, but the difficulty in obtaining positive (attack) examples, led to ...

[Full version]

[Full version]

Learning Word Relatedness over Time

Guy Rosin

Sunday, 27.1.2019, 15:00

Taub 601

Search systems are often focused on providing relevant results for the "now", assuming both corpora and user needs that focus on the present. However, many corpora today reflect significant longitudinal collections ranging from 20 years of the Web to hundreds of years of digitized newspapers ...

[Full version]

[Full version]

Theory Seminar: Weak Zero-Knowledge Beyond the Black-Box Barrier

Omer Paneth (MIT)

Wednesday, 23.1.2019, 12:30

Taub 201

The round complexity of zero-knowledge protocols is a long-standing open question, yet to be settled under standard assumptions. So far, the question has appeared equally challenging for relaxations such as weak zero-knowledge and witness hiding. Protocols satisfying these relaxed notions under standard assumptions have at ...

[Full version]

[Full version]

TONIGHT! Exposure Evening to Communication Networks

Tuesday, 22.1.2019, 18:30

Room 337 Taub Bld.

The CS Computer Communication Lab (LCCN) invites you to an exposure evening to communication networks - to get to know the laboratory activity, the research and the projects it offers and the team that leads them, to listen to lectures and take part in discussions ...

[Full version]

[Full version]

Project Fair in IoT, Android, Ransomware and Networks

Tuesday, 22.1.2019, 12:30

Transparent Hall, Beit Hastudent

CS Labs: Systems and Software Development Laboratory (SSDL), Cyber and Computer Security Laboratory (CYBER), The Laboratory for Computer Communication and Networking (LCCN) invite you to visit the Yearly Project Fair on IoT, Android, Ransomware and Networks. The fair will be held on Tuesday, January 22, ...

[Full version]

[Full version]

Pixel Club: On The Resistance of Neural Networks to Label Noise

Amnon Drory (Tel-Aviv University)

Tuesday, 22.1.2019, 11:30

Room 337 Taub Bld.

Neural Networks have been shown to be remarkably resistant to label noise. This means that you can train a network using a data set that contains a significant fraction of wrongly-labelled samples, and the network will still be able to accurately predict the label for ...

[Full version]

[Full version]

Pixel Club: Isospectralization, Or How To Hear Shape, Style, and Correspondence

Arianna Rampini (Sapienza, University of Rome)

Monday, 21.1.2019, 11:30

Room 337 Taub Bld.

The question whether one can recover the shape of a geometric object from its Laplacian spectrum (‘hear the shape of the drum’) is a classical problem in spectral geometry with a broad range of implications and applications. While theoretically the answer to this question is ...

[Full version]

[Full version]

Decentralized Monetary Policy for Crypocurrencies

Alon Shtaierman

Monday, 21.1.2019, 11:00

Taub 601

The rapid increase in the popularity of cryptocurrencies brought with it not only questions regarding the quality of the technology itself, but also the economic phenomena surrounding them. Bitcoin in particular has proven itself to be a very volatile commodity~[Baek and Elbeck, Applied Economics 2015], ...

[Full version]

[Full version]

Theory Seminar: On Complexity of Closest Pair Problem

Karthik C.S.(Weizmann Institute of Science)

Wednesday, 16.1.2019, 12:30

Taub 201

Given a set of points in a metric space, the Closest Pair problem asks to find a pair of distinct points in the set with the smallest distance. In this talk, we address the fine-grained complexity of this problem which has been of recent interest. ...

[Full version]

[Full version]

Stream Frequency Over Interval Queries

Rana Shahout

Wednesday, 16.1.2019, 11:30

Taub 601

Stream frequency measurements are fundamental in many data stream applications such as financial data trackers, intrusion-detection systems, and network monitoring. Typically, recent data items are more relevant than old ones, a notion we can capture through a sliding window abstraction. This paper considers a generalized ...

[Full version]

[Full version]

COLLOQUIUM LECTURE - Consolidating and Exploring Open Textual Knowledge

Ido Dagan

Tuesday, 15.1.2019, 14:30

Room 337 Taub Bld.

How can we capture effectively the information expressed in multiple texts? How can we allow people, as well as computer applications, to easily explore it? The current semantic NLP pipeline typically ends at the single sentence or text level, putting the burden on applications to ...

[Full version]

[Full version]

Pixel Club: On the Expressive Power of ConvNets and RNNs as a Function of their Architecture

Or Sharir (Hebrew University of Jerusalem)

Tuesday, 15.1.2019, 11:30

Room 337 Taub Bld.

The driving force behind convolutional and recurrent networks — two of the most successful deep learning architectures to date — is their expressive power. Despite its wide acceptance and vast empirical evidence, formal analyses supporting this belief are scarce. The primary notions for formally reasoning ...

[Full version]

[Full version]

Coding Theory: Iterative Programming of Noisy Memory Cells

Michal Horovitz (Migal - Research Institute)

Sunday, 13.1.2019, 14:30

Taub 601

A model which mimics the programming operation of memory cells was first presented by Bunte and Lapidoth. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read ...

[Full version]

[Full version]

Theory Seminar: Prophet Inequalities for Independent Random Variables from an Unknown Distribution

Paul Duetting (London School of Economics)

Wednesday, 9.1.2019, 12:30

Taub 201

A central object in optimal stopping theory is the single-choice prophet inequality for independent, identically distributed random variables: Given a sequence of random variables X_1,…,X_n drawn independently from a distribution F, the goal is to choose a stopping time τ so as to maximize α ...

[Full version]

[Full version]

ceClub: Bitcoin-like Blockchain Architectures, Validation without per-Transaction Private Key Signatures

David Chaum (The inventor of digital cash)

Wednesday, 9.1.2019, 11:30

Electrical Eng. Building 861

Widely recognized as the inventor of digital cash, David is also known for other fundamental innovations in cryptography, including privacy and secure election technology. David is currently leading the Elixxir blockchain project, a private, scalable platform capable of processing a high volume of payments, messages ...

[Full version]

[Full version]

Acquisition and Prediction of Gestures' Surface EMG Data Using Sequential Deep Learning Methods

Idan Hasson

Tuesday, 8.1.2019, 11:30

Taub 601

As technology becomes highly integrated into nearly every aspect of life, and in many cases is indispensable, maintaining relative hand functionality is crucial. A transradial amputation is a partial amputation of the arm below the elbow that can greatly impede one’s ability to perform every ...

[Full version]

[Full version]

Pixel Club: Variational Plane-Sweeping for Robust Multi-Image Alignment

Yuval Goldfracht (Marine Imaging Lab, University of Haifa)

Tuesday, 8.1.2019, 11:30

Electrical Eng. Building 1061

We tackle the problem of multiple image alignment and 3D reconstruction under extreme noise. Photographs acquired in scenes with large intensity variations or in scattering media have significant spatial variance in signal-to-noise-ratio (SNR), where in some image regions it is significantly below the level current ...

[Full version]

[Full version]

Natural Language Programming: Turning Texts into Executable Code

Reut Tsarfaty - GUEST LECTURE

Tuesday, 8.1.2019, 10:30

Room 201 Taub Bld.

Can we program computers in our native tongue? This idea, termed natural language programming (NLPRO), has attracted attention almost since the inception of computers themselves. From the point of view of software engineering (SE), efforts to program in natural language (NL) have relied thus far ...

[Full version]

[Full version]

Deep Anomaly Detection Using Geometric Transformations

Izhak Golan

Monday, 7.1.2019, 11:30

Taub 601

We consider the problem of anomaly detection in images, and present a new detection technique. Given a sample of images, all known to belong to a ``normal'' class (e.g., dogs), we show how to train a deep neural model that can detect out-of-distribution images (i.e., ...

[Full version]

[Full version]

ceClub: Neural Code Comprehension: A Learnable Representation of Code Semantics

Tal Ben-Nun (ETH Zurich)

Monday, 7.1.2019, 11:30

Electrical Eng. Building 1061

In the era of “Big Code”, research is being conducted into automating the understanding of computer programs. Most of the current works borrow techniques from natural language processing and deep learning, which have been successful recently, attempting to process the code directly or using syntactic ...

[Full version]

[Full version]

Coding Theory: Private Information Retrieval: From Replicated to Arbitrary Linear Coded Data

Siddhartha Kumar (Simula UiB)

Sunday, 6.1.2019, 14:30

Taub 601

Private information retrieval (PIR) is a technique of retrieving data from servers in a distributed storage system (DSS), without revealing the identity of the data to the servers. A scheme that achieves the PIR property is referred to as a PIR protocol and is characterized ...

[Full version]

[Full version]

When Existing Techniques Preserve Differential Privacy

Or Sheffet - CS-Lecture

Sunday, 6.1.2019, 10:30

Room 601 Taub Bld.

It is no secret that online companies, hospitals, credit-card companies and governments hold massive datasets composed of our sensitive personal details. Information from such datasets is often released using some privacy preserving heuristics, which have been repeatedly shown to fail. That is why in recent ...

[Full version]

[Full version]

On Optimization and Expressiveness in Deep Learning

Nadav Cohen - CS-Lecture

Thursday, 3.1.2019, 10:30

Room 337 Taub Bld.

Understanding deep learning calls for addressing three fundamental questions: expressiveness, optimization and generalization. Expressiveness refers to the ability of compactly sized deep neural networks to represent functions capable of solving real-world problems. Optimization concerns the effectiveness of simple gradient-based algorithms in solving non-convex neural network ...

[Full version]

[Full version]

Theory Seminar: Function-Inversion Problem: Barriers and Opportunities

Dima Kogan (Stanford University)

Wednesday, 2.1.2019, 12:30

Room 201 Taub Bld.

n the function-inversion problem, an algorithm gets black-box access to a function $f:[N] \to [N]$ and takes as input a point $y \in [N]$, along with $S$ bits of auxiliary information about $f$. After running for time $T$, the algorithm must output an $x \in ...

[Full version]

[Full version]

ceClub: Learning-Assisted Hardware Security

Inna P.-Vaisband (University of Illinois)

Wednesday, 2.1.2019, 11:30

EE Meyer Building 861

Hardware security of integrated circuits (ICs) is a significant concern in many emerging market segments, such as intelligent transportation, innovative health care, sophisticated security systems, and smart energy applications. In particular, modern side-channel attacks that exploit information leaked by physical IC implementation pose a serious ...

[Full version]

[Full version]

COLLOQUIUM LECTURE - Toward Human-centered Programming Language Design

Joshua Sunshine

Tuesday, 1.1.2019, 14:30

Room 337 Taub Bld.

Programming languages are a tool for human thought, expression, and work yet they are principally designed using mathematical and engineering techniques. In this talk, I will describe how our group has applied human-centered design techniques --- interviews, participatory design exercises, and qualitative analysis of developer ...

[Full version]

[Full version]