דלג לתוכן (מקש קיצור 's')
Logo of Technion
Logo of CS Department
אירועים

אירועים והרצאות בפקולטה למדעי המחשב ע"ש הנרי ומרילין טאוב

Deep Learning Models for Language: What they learn, where they fail, and how to make them more robust
event speaker icon
Yonatan Belinkov - CS-Lecture
event date icon
יום שני, 31.12.2018, 10:30
event location icon
חדר 337 טאוב.
Deep learning has become pervasive in everyday life, powering language applications like Apple's Siri, Amazon's Alexa, and Google Translate. The inherent limitation of these deep learning systems, however, is that they often function as a ''black box'', preventing researchers and users from discerning the roles of different components and what they learn during the training process. In this talk, I will describe my research on interpreting deep learning models for language along three lines. First, ...
[לנוסח המלא]
יום עיון בקריפטולוגיה 2018
event date icon
יום שני, 31.12.2018, 09:00
event location icon
אודיטוריום מכון המים, טכניון
יום העיון בקריפטולוגיה 2018, המאורגן בידי מרכז המחקר לאבטחת סייבר ע"ש הירושי פוג'יאוורה, יתקיים ביום שני, 31 בדצמבר 2018, בין השעות 16.20-9.00, באודיטוריום מכון המים, הטכניון. רוב ההרצאות יינתנו בעברית אך חלקן יינתנו באנגלית ובהפסקה תתקיים תצוגת פוסטרים: מוזמנים סטודנטים לתארים מתקדמים וכל המעוניין להציג בה את מחקרם ולהזמין את מקומם מראש בהקדם האפשרי בכתובת: cyber at technion.ac.il פרטים נוספים ותוכנית מלאה, כולל תקצירי הרצאות, הרשמה מראש (ללא תשלום אך נדרשת) והוראות הגעה. כולם מוזמנים!
[לנוסח המלא]
Coding Theory: Covering Sets for Limited-Magnitude Errors
event speaker icon
איגור שפרלינסקי (אונ' ניו סאות' ויילס)
event date icon
יום ראשון, 30.12.2018, 14:30
event location icon
טאוב 601
For a set M = {−µ, −µ + 1, . . . , λ} \ {0} with non-negative integers λ, µ Small covering sets play an important role in codes correcting limited-magnitude errors. We use some number theoretic methods to give an explicit construction of a (λ, µ; q)-covering set S which is of the size q1+o(1) max{λ, µ}−1/2 for almost all integers q ? 1 and of optimal order of magnitude (that is up ...
[לנוסח המלא]
Certifiable Algorithms in Automated Verification
event speaker icon
Shaull Almagor - CS-Lecture
event date icon
יום חמישי, 27.12.2018, 10:30
event location icon
חדר 601 טאוב.
In formal verification, one uses mathematical tools in order to prove that a system satisfies a given specification. A limitation of traditional formal-verification algorithms and tools concerns the certification of positive results: while a verifier may answer that a system satisfies its specification, a designer often needs some palpable evidence, or certificate, of correctness. I will discuss the notion of certificates in several applications of formal verification, and present two works addressing the above limitation ...
[לנוסח המלא]
Theory Seminar: Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time
event speaker icon
אלעזר גולדברג (מכללה אקדמית ת"א-יפו)
event date icon
יום רביעי, 26.12.2018, 12:30
event location icon
טאוב 201
Edit distance is a measure of similarity of two strings based on the minimum number of character insertions, deletions, and substitutions required to transform one string into the other. The edit distance can be computed exactly using a dynamic programming algorithm that runs in quadratic time. Andoni, Krauthgamer and Onak (2010) gave a nearly linear time algorithm that approximates edit distance within approximation factor poly(log n). In this talk, I'll present a recent result in ...
[לנוסח המלא]
Pixel Club: Underwater Wide-Field Tomography of Sediment Resuspension
event speaker icon
עדי וייניגר (הנדסת חשמל, טכניון)
event date icon
יום שלישי, 25.12.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Sediment resuspension is the transport of previously settled particles from the seafloor back into the overlying water. Measuring these abrupt and spatially varying events is challenging. Existing in-situ approaches are very localized. We presented a novel underwater wide field imaging system designed to (a) observe the seafloor and the water medium above it from a distance, (b) sense sediment resuspension events, and (c) algorithmically quantify the resuspension. Our technology quantifies the amount of material lifted, ...
[לנוסח המלא]
Predicting a Better Future for Asynchronous SGD with DANA
event speaker icon
עידו חכימי
event date icon
יום שני, 24.12.2018, 11:00
event location icon
טאוב 601
Distributed training can significantly reduce the training time of neural networks. Despite its potential, however, distributed training has not been widely adopted due to the difficulty of scaling the training process. Existing methods suffer from slow convergence and low final accuracy when scaling to large clusters, and often require substantial re-tuning of hyper-parameters. We propose DANA, a novel approach that scales to large clusters while maintaining similar final accuracy and convergence speed to that of ...
[לנוסח המלא]
Coding Theory: Constrained Code and Its Applications for Flash Memories.
event speaker icon
וו ואן קו (סינגפור)
event date icon
יום ראשון, 23.12.2018, 14:30
event location icon
טאוב 601
Constrained codes have been studied actively for a long time with numerous applications in data recording and data communication systems. Recently, various types of one-dimensional and two-dimensional constrained codes have attracted significant attention owing to some applications for flash memories. ICI-free codes (Amit Berman and Yitzhak Birk - 2010), balanced q-ary ICI-free codes (Minghai Qin, Eitan Yaakobi and Paul Siegel - 2014), and weakly constrained codes(Sarit Buzaglo and Paul Siegel - 2017) are such codes. ...
[לנוסח המלא]
Towards Interpretable Deep Learning for Natural Language Processing
event speaker icon
Roy Schwartz - CS-Lecture
event date icon
יום חמישי, 20.12.2018, 10:30
event location icon
חדר 337 טאוב.
Despite their superb empirical performance, deep learning models for natural language processing (NLP) are often considered black boxes, as relatively little is known as to what accounts for their success. This lack of understanding turns model development into a slow and expensive trial-and-error process, which limits many researchers from developing state-of-the-art models. Customers of deep learning also suffer from this lack of understanding, because they are using tools that they cannot interpret. In this talk ...
[לנוסח המלא]
Theory Seminar: Almost Polynomial Hardness of Node-Disjoint Paths in Grids
event speaker icon
ג'וליה צ'וזוי (TTIC)
event date icon
יום רביעי, 19.12.2018, 12:30
event location icon
טאוב 201
In the classical Node-Disjoint Paths (NDP) problem, we are given an n-vertex graph G, and a collection of pairs of its vertices, called demand pairs. The goal is to route as many of the demand pairs as possible, where to route a pair we need to select a path connecting it, so that all selected paths are disjoint in their vertices. The best current algorithm for NDP achieves an $O(\sqrt{n})$-approximation, while, until recently, the best ...
[לנוסח המלא]
Pixel Club: Computational Optimal Transport for Data Sciences
event speaker icon
גבריאל פיירה (CNRS)
event date icon
יום שלישי, 18.12.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Optimal transport (OT) has become a fundamental mathematical tool at the interface between calculus of variations, partial differential equations and probability. It took however much more time for this notion to become mainstream in numerical applications. This situation is in large part due to the high computational cost of the underlying optimization problems. There is a recent wave of activity on the use of OT-related methods in fields as diverse as computer vision, computer graphics, ...
[לנוסח המלא]
Coding Theory: New constructions of batch codes
event speaker icon
איליה וורובייב (מוסקבה)
event date icon
יום ראשון, 16.12.2018, 14:30
event location icon
טאוב 601
A primitive k-batch code encodes a string x of length n into string y of length N, such that each multiset of k symbols from x has k mutually disjoint recovering sets from y. The definition of such codes is motivated by applications to load balancing in distributed storage and private information retrieval. We develop new constructions of linear primitive batch codes based on finite geometries. In some parameter regimes, our codes have lower redundancy ...
[לנוסח המלא]
Towards the Next Generation of Proof Assistants: Enhancing the Proofs-as-Programs Paradigm
event speaker icon
Liron Cohen - CS-Lecture
event date icon
יום ראשון, 16.12.2018, 10:30
event location icon
חדר 701 טאוב.
As software has grown increasingly critical to our society's infrastructure, mechanically-verified software has grown increasingly important, feasible, and prevalent. Proof assistants have seen tremendous growth in recent years because of their success in the mechanical verification of high-value applications in many areas, including cyber security, cyber-physical systems, operating systems, compilers, and microkernels. These proof assistants are built on top of constructive type theory whose computational interpretation is given by the proofs-as-programs paradigm, which establishes a ...
[לנוסח המלא]
Beyond SGD: Data Adaptive Methods for Machine Learning
event speaker icon
Kfir Levy - CS-Lecture
event date icon
יום חמישי, 13.12.2018, 10:30
event location icon
חדר 337 טאוב.
The tremendous success of the Machine Learning paradigm heavily relies on the development of powerful optimization methods. The canonical algorithm for training learning models is SGD (Stochastic Gradient Descent), yet this method has its limitations. It is often unable to exploit useful statistical/geometric structure, it might degrade upon encountering prevalent non-convex phenomena, and it is hard to parallelize. In this talk I will discuss an ongoing line of research where we develop alternative methods that ...
[לנוסח המלא]
CSpecial Talk: Efficient Identification of Malicious Flows and Networks
event speaker icon
רן בן-בשט (אונ' הרווארד)
event date icon
יום רביעי, 12.12.2018, 13:30
event location icon
טאוב 601
Distributed Denial of Service (DDoS) attacks are doubling in both number and volume on a yearly basis. These pose a critical threat to financial institutions and cloud providers that struggle to keep their services available and secure. To mitigate the attacks, operators rely on middleboxes that analyze the traffic and identify malicious flows and subnets. A key technique used for this identification is the Hierarchical Heavy Hitters (HHH) measurement, that singles out networks which send ...
[לנוסח המלא]
Theory Seminar: Fairness through Computationally-Bounded Awareness
event speaker icon
מיכאל קים (אונ' סטנפורד)
event date icon
יום רביעי, 12.12.2018, 12:30
event location icon
טאוב 201
As algorithmic prediction systems have become more widespread, so too have concerns that these systems may be discriminatory against groups of people protected by laws and ethics. We present a recent line of work that takes a complexity theoretic perspective towards combating discrimination in prediction systems. We'll focus on fair classification within the versatile framework of Dwork et al. [ITCS'12], which assumes the existence of a metric that measures similarity between pairs of individuals. Unlike ...
[לנוסח המלא]
VNF Latency Aware Placement in Multi-Access Edge Computing Environment
event speaker icon
דור הריס
event date icon
יום שלישי, 11.12.2018, 14:00
event location icon
טאוב 601
Multi-access Edge Computing (MEC) is a new network architecture that allows applications and network services to be executed at the edge of the network. This is done by running these services on commodity servers that are placed in close proximity to the network edge and to the cellular base stations in wireless networks. This architecture provides high bandwidth and low latency for network functions and other applications. However, the availability of the resources at the ...
[לנוסח המלא]
Pixel Club: Re-rendering Reality: Enhancing Vision and Hearing
event speaker icon
טלי דקל (גוגל ואנו' קיימברידג')
event date icon
יום שלישי, 11.12.2018, 11:30
event location icon
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
We all capture the world around us through digital data such as images, videos and sound. However, in many cases, we are interested in certain properties of the data that are either not available or difficult to perceive directly from the input signal. My goal is to “Re-render Reality”, i.e., develop algorithms that analyze digital signals and then create a new version of it that allows us to see and hear better. In this talk, ...
[לנוסח המלא]
MMSE Approximation For Sparse Coding Algorithms Using Stochastic Resonance
event speaker icon
דרור סימון
event date icon
יום שני, 10.12.2018, 15:00
event location icon
טאוב 201
Sparse coding refers to the pursuit of the sparsest representation of a signal in a typically overcomplete dictionary. From a Bayesian perspective, sparse coding provides a Maximum a Posteriori (MAP) estimate of the unknown vector under a sparse prior. Various nonlinear algorithms are available to approximate the solution of such problems. In this work, we suggest enhancing the performance of sparse coding algorithms by a deliberate and controlled contamination of the input with random noise, ...
[לנוסח המלא]
Coding Theory: Improved Decoding of Folded Reed-Solomon and Multiplicity Codes
event speaker icon
מארי ווטרס (אונ' סטנפורד)
event date icon
יום ראשון, 9.12.2018, 14:30
event location icon
טאוב 601
List-decoding is an important primitive in the theory of error correcting codes, and it has long been a goal to obtain explicit constructions of capacity-achieving, efficiently list-decodable codes. Folded Reed-Solomon Codes (Guruswami-Rudra 2008) and Multiplicity codes (Guruswami-Wang 2011, Kopparty 2012) are two such constructions. However, previous analysis of these codes could not guarantee optimal parameters. In particular, the “list-size” of these codes was only shown to be polynomial, while ideally it would be constant. Over ...
[לנוסח המלא]
CGGC Seminar: A NURBS-based Multi-stage Approach for Shape Optimization of Mixing Elements in Single-screw Extruder
event speaker icon
סבסטיאן אוסטרהולץ (אונ' אאכן)
event date icon
יום רביעי, 5.12.2018, 13:30
event location icon
טאוב 401
Today, extrusion is a one of the most important techniques for manufacturing continuous polymer profiles. Despite their widespread use, extruded products initially often suffer from both poor shape quality and material inhomogeneities due to inadequate process design. In an industrial environment, the elements of the extrusion line are therefore subject to extensive running-in trials. During these trials, both geometry and process conditions are iteratively adapted until the product attains the required quality. It is the ...
[לנוסח המלא]
Coding Theory: Load Balanced Fractional Repetition Codes
event speaker icon
שאשוואט סילאס (אונ' סטנפורד)
event date icon
יום ראשון, 2.12.2018, 14:30
event location icon
טאוב 601
We introduce load-balanced fractional repetition (LBFR) codes, which are a strengthening of fractional repetition (FR) codes. LBFR codes have the additional property that multiple node failures can be sequentially repaired by downloading no more than one block from any other node. This allows for better use of the network, and can additionally reduce the number of disk reads necessary to repair multiple nodes. We characterize LBFR codes in terms of their adjacency graphs, and use ...
[לנוסח המלא]
Theory Seminar: The Power of Distributed Verifiers in Interactive Proofs
event speaker icon
אילון יוגב (מדעי המחשב, טכניון)
event date icon
יום רביעי, 28.11.2018, 12:30
event location icon
טאוב 201
We explore the power of interactive proofs with a distributed verifier. In this setting, the verifier consists of $n$ nodes and a graph $G$ that defines their communication pattern. The prover is a single entity that communicates with all nodes by short message. The goal is to verify that the graph $G$ belongs to some language in a small number of rounds, and with small communication bound, \ie the proof size. This interactive model was ...
[לנוסח המלא]
ceClub: New Paradigms for Cryptographic Hashing
event speaker icon
אילן קומרגודסקי (אונ' קורנל)
event date icon
יום רביעי, 28.11.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Cryptographic hash functions are the basis of many important and far reaching results in cryptography, complexity theory, and beyond. In particular, hash functions are the primary building block of fundamental applications like digital signatures and verifiable computation, and they are the tool underlying the proofs-of-work which drive blockchains. Because of the central role of cryptographic hash functions in both theory and practice, it is crucial to understand their security guarantees, toward basing applications on the ...
[לנוסח המלא]
Coding Theory: Coding over Sets for DNA Storage
event speaker icon
אנדראס לנץ (אונ' מינכן)
event date icon
יום ראשון, 25.11.2018, 14:30
event location icon
טאוב 601
In this talk, we will present error-correcting codes for the storage of data in synthetic deoxyribonucleic acid (DNA). We investigate a storage model where a data set is represented by an unordered set of M sequences, where each sequence is a vector of length L over Z_q. Errors within that model are losses of whole sequences and point errors inside the sequences, such as insertions, deletions and substitutions. We derive lower bounds on the minimum ...
[לנוסח המלא]
CGGC Seminar: Real-time Viscous Thin Films
event speaker icon
אורסטיס ונטזוס וסער רז (מדעי המחשב, טכניון)
event date icon
יום חמישי, 22.11.2018, 09:00
event location icon
טאוב 401
We propose a novel discrete scheme for simulating viscous thin films at real-time frame rates. Our scheme is based on a new formulation of the gradient flow approach, that leads to a discretization based on local stencils that are easily computable on the GPU. Our approach has physical fidelity, as the total mass is guaranteed to be preserved, an appropriate discrete energy is controlled, and the film height is guaranteed to be non-negative at all ...
[לנוסח המלא]
CSpecial Talk: Constructing a Trapped Ion Quantum Computer
event speaker icon
ווילפריד הנסינגר (מרכז סאסקס לטכנולוגיות קואנטום)
event date icon
יום רביעי, 21.11.2018, 15:00
event location icon
טאוב 601
Quantum computers may be able to solve certain problems that are so complicated that even the fastest supercomputer would take millions of years to provide an answer. Entanglement and superposition are quantum phenomena which can be tamed in order to build such a machine. Optimising financial transactions, machine learning, creating new medicines, understanding protein folding and breaking codes are just some of the problems where the existence of a quantum computer could change everything. The ...
[לנוסח המלא]
Theory Seminar: Colouring Directed Hamilton Cycles Online
event speaker icon
ג'וזף בריגס (מתמטיקה, טכניון)
event date icon
יום רביעי, 21.11.2018, 12:30
event location icon
טאוב 201
Consider a directed analogue of the random graph process on $n$ vertices, whereby the $n^2-n$ directed edges are ordered uniformly at random and revealed one at a time, giving a nested sequence of directed graphs $D_0,D_1,\dots,D_m, \dots$. In this setting, one may ask about events that hold with probability $1-o(1)$ (whp) as $n$ tends to infinity. In particular, for a fixed $q=O(1)$, we wish to study the hitting time for the emergence of $q$ edge-disjoint ...
[לנוסח המלא]
ceClub: Vulnerability, Security and Privacy at the Edge of Computing
event speaker icon
Anupam Chattopadhyay (Nanyang Technological University)
event date icon
יום רביעי, 21.11.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
The steady rise of intelligence and autonomy over a scale of distributed, connected and smart components is heralding the era of Internet-of-Intelligence. Without adequate safeguards in place, such components can lead to terrible consequences. In this talk, I will discuss three aspects - namely, vulnerability, security and privacy of such edge–computing scenarios. The vulnerability aspect will show how a simple setup can derail sophisticated unmanned aerial vehicles. The security angle will be discussed through a ...
[לנוסח המלא]
איך תהפכו תואר לקריירה? הזמנה לסדנת חיפוש עבודה
event speaker icon
יונתן יניב (YOTPO)
event date icon
יום שלישי, 20.11.2018, 18:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
אנו שמחים להזמין אתכם למפגש ראשון בסדרת מפגשים בנושא קריירה וחיפוש עבודה, שייערכו בפקולטה.   איך הופכים תואר לקריירה?  ד"ר יונתן יניב, בוגר הפקולטה, חוקר אלגוריתמים ומערכות לומדות בחברת YOTPO –  בשיחה על: -  בחירות והחלטות על קורסים ופרוייקטים במהלך התואר -  בחירת מסלול לימודים -  סוגי המשרות (סטודנט, ג'וניור)   האירוע יתקיים ביום שלישי, 20 בנובמבר, בשעה 18:30 בחדר 337, בניין טאוב למדעי המחשב.   הסדנא ייעודית לסטודנטים לתואר ראשון במדעי המחשב.   להשתתפות ...
[לנוסח המלא]
Pixel Club: Understanding Scene Semantics from Vehicles
event speaker icon
עידן גלר וקובי בנטולילה (מובילאיי)
event date icon
יום שלישי, 20.11.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Going from driving assistance to autonomous driving, requires a deeper understanding of the surroundings of the vehicle. Driving assistance systems provide technological solutions that help with the driving process, while these systems usually provide multiple features that enhance driving safety (such as automate lighting, adaptive cruise control, collision avoidance, etc.), they are still very simplistic with respect to their level of scene understanding. Autonomous driving, raises much more complex problems: Is the detected person a ...
[לנוסח המלא]
CSpecial Talk: Neuro-Symbolic Program Synthesis
event speaker icon
אלכס פולוזוב (מיקרוסופט)
event date icon
יום שני, 19.11.2018, 12:00
event location icon
חדר 337, בניין טאוב למדעי המחשב
Program synthesis, the task of automatically finding a program that satisfies a given user intent specification, has been successfully applied to aid commercial data wrangling, software engineering, and question answering. While data-driven (deep learning) and symbolic (formal logic) techniques are both commonly used for program synthesis, both of them have their strengths and weaknesses. Symbolic techniques guarantee correctness of the generated program with respect to the specification, but are difficult to design, develop, and tune. ...
[לנוסח המלא]
Coding Theory: Spatially-Coupled LDPC Codes With Random Access
event speaker icon
אשד רם (טכניון)
event date icon
יום ראשון, 18.11.2018, 14:30
event location icon
טאוב 601
One of the most promising error correcting schemes is the family of Spatially-Coupled (SC) LDPC codes. SC-LDPC codes achieve capacity universally on memoryless binary symmetric channels, and their special structure can be exploited to implement low-latency high-throughput decoders. In this talk, a new type of SC-DPC codes motivated by practical storage applications is presented. These new codes can be decoded locally at the level of sub-blocks that are much smaller than the full code block, ...
[לנוסח המלא]
Theory Seminar: Bounded Independence Plus Noise and its Applications to Coding Theory and Pseudorandomness
event speaker icon
צ'ין הו לי (אונ' נורת'ווסטרן)
event date icon
יום רביעי, 14.11.2018, 12:30
event location icon
טאוב 201
We show that bounded independent distributions under perturbation of noise fool product tests, which are products of bounded functions defined on disjoint inputs. These results have found applications in coding theory and pseudorandomness. In this talk, I will talk about communication and space lower bounds for decoding linear codes, and how to construct pseudorandom generators for product tests and space-bounded computation. Based on joint works with Elad Haramaty and Emanuele Viola.
[לנוסח המלא]
ceClub: Smart Distributed Storage for the Datacenter
event speaker icon
זולט איסטבן (IMDEA, מדריד, ספרד)
event date icon
יום רביעי, 14.11.2018, 11:30
event location icon
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
There is a widening gap in the datacenter between data growth and stagnating CPU performance. This gap limits our ability to solve more complex problems and prompts us to revisit both the architecture of servers and the ways we manage and process data. In my work, I aim to narrow this gap using specialization and HW/SW co-design. As a specific example, I will talk about building energy-efficient distributed storage for large-scale data processing applications. Most ...
[לנוסח המלא]
COLLOQUIUM LECTURE - Facing Old New Frontiers in Visual Object Recognition Using Deep Learning
event speaker icon
Daphna Weinshall
event date icon
יום שלישי, 13.11.2018, 14:30
event location icon
חדר 337 טאוב.
The emergence of very effective deep learning techniques in recent years has affected almost all areas of research remotely related to AI, and computer vision in particular has been changed irreversibly. In this talk I will focus on visual object recognitions. The incredible recent progress in this area, and the availability of very effective public domain tools for object recognition in images, allows us to reopen old questions and approach them from new directions with ...
[לנוסח המלא]
FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
event speaker icon
מרינה מינקין
event date icon
יום ראשון, 11.11.2018, 17:30
event location icon
Electrical Eng. Building 1061
Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in recent Intel x86 processors, gained significant traction in recent years. A long track of research papers, and increasingly also real-world industry applications, take advantage of the strong hardware-enforced confidentiality and integrity guarantees provided by Intel SGX. Ultimately, enclaved execution holds the compelling potential of securely offloading sensitive computations to untrusted remote platforms. In this talk, I will present Foreshadow, a practical software-only microarchitectural ...
[לנוסח המלא]
Coding Theory: Functional PIR and Batch Codes
event speaker icon
ייווי זאנג (מדעי המחשב, טכניון)
event date icon
יום ראשון, 11.11.2018, 14:30
event location icon
טאוב 601
Codes with locality and/or availability have been extensively studied in recent years, including locally repairable codes (LRC), PIR codes, batch codes, etc. Usually in such a code of dimension s, we focus on the recovering sets only for the s information symbols. We propose a natural generalization of PIR and batch codes, named functional PIR codes and functional batch codes, by analyzing the recovering sets for arbitrary vectors of length s. In this talk we ...
[לנוסח המלא]
LOFT: Lock-Free Transactional Data Structures
event speaker icon
אבנר אליזרוב
event date icon
יום ראשון, 11.11.2018, 11:00
event location icon
טאוב 601
Concurrent data structures are widely used in modern multi-core architectures, providing atomicity (linearizability) for each concurrent operation. However, it is often desirable to execute several operations on multiple data structures atomically. We present a design of a transactional framework supporting linearizable transactions of multiple operations on multiple data structures in a lock-free manner. Our design uses a helping mechanism to obtain lock-freedom, and an advanced lock-free contention management mechanism to mitigate the effects of aborting ...
[לנוסח המלא]
Theory Seminar: Lossless Dimension Expanders via Linearized Polynomials and Subspace Designs
event speaker icon
ניקולאס רש (אונ' קרנגי מלון)
event date icon
יום רביעי, 7.11.2018, 12:30
event location icon
טאוב 201
or a vector space F^n over a field F, an (η, ß)-dimension expander of degree d is a collection of d linear maps Γ_j : F^n \to F^n such that for every subspace U of F^n of dimension at most ηn, the image of U under all the maps, ∑_{j=1}^d Γ_j(U), has dimension at least ßdim(U). Over a finite field, a random collection of d=O(1) maps Γ_j over excellent “lossless” expansion with high probability: ß ...
[לנוסח המלא]
Indoor Positioning of a Robotic Vehicle Using a Single Camera and a Floorplan
event speaker icon
ג'ון נונאן
event date icon
יום שלישי, 6.11.2018, 15:00
event location icon
טאוב 601
Global localization for robotic vehicles is an essential backbone for robust autonomous navigation. While GPS systems offer effective solutions in outdoor environments, they are inadequate for providing positioning in indoor settings. In order to solve this problem, we investigate a special vision-based approach. Vision systems are particularly advantageous due to the amount of information they supply about the scene. To offer a system which has low cost and fast setup, we utilize a monocular camera. ...
[לנוסח המלא]
COLLOQUIUM LECTURE - Learning-Driven Network Protocols
event speaker icon
Michael Schapira
event date icon
יום שלישי, 6.11.2018, 14:30
event location icon
חדר 337 טאוב.
Machine learning (ML) has deeply impacted many areas of computer science, including computer vision, natural language processing, computational biology, and beyond. Yet, computer networking has largely withstood the ML tide until recently. Recent advances suggest that this might be changing. We ask whether/when traditional network protocol design, which traditionally relies on the application of algorithmic insights by human experts, can be replaced by a data-driven, ML-guided approach. We will investigate this question in the context ...
[לנוסח המלא]
Pixel Club: Multicolor Localization Microscopy by Deep Learning
event speaker icon
ערן הרשקו (הנדסת חשמל, טכניון)
event date icon
יום שלישי, 6.11.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Deep learning has become an extremely effective tool for image classification and image restoration problems. Here, we apply deep learning to microscopy, and demonstrate how neural networks can exploit the chromatic dependence of the point-spread function to classify the colors of single emitters imaged on a grayscale camera. While existing single-molecule methods for spectral classification require additional optical elements in the emission path, e.g. spectral filters, prisms, or phase masks, our neural net correctly identifies ...
[לנוסח המלא]
Coding Theory: On the List-decodability of Random Linear Rank-metric Codes
event speaker icon
ניקולאס רש (אונ' קרנגי מלון)
event date icon
יום ראשון, 4.11.2018, 14:30
event location icon
טאוב 601
At its core, coding theory studies how many elements of a (finite) vector space one can pack subject to the constraint that the elements are well-spread. Typically, the notion of closeness is that of Hamming distance, that is, the distance between two vectors is the number of coordinates on which they differ. In a rank-metric code, codewords are matrices over a finite field and the distance between codewords is the rank of their difference. A ...
[לנוסח המלא]
CGGC Seminar: Tangent Estimation of 3D Digital Curves
event speaker icon
קספר פלוטה (מדעי המחשב, טכניון)
event date icon
יום ראשון, 4.11.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
In this talk I will discuss a new tangent estimator for 3D digital curves. The proposed estimator is based on 3D digital line recognition, and it is an extension of a similar 2D tangent estimator proposed for tangent estimating along digital contours. The main advantages of this new tangent estimator are its speed and its asymptotic convergence – the estimated tangents converge to the ground truth as the resolution increases.
[לנוסח המלא]
Theory Seminar: Random Binary Search Trees with Concurrent Insertions
event speaker icon
גיאורג ג'יאקופיס (INRIA)
event date icon
יום רביעי, 31.10.2018, 12:30
event location icon
טאוב 201
We consider the following simple random experiment to determine the impact of concurrency on the performance of binary search trees: n randomly permuted keys arrive one at a time. When a new key arrives, it is first placed into a buffer of size c. Whenever the buffer is full, or when all keys have arrived, an adversary chooses one key from the buffer and inserts it into the binary search tree. The ability of the ...
[לנוסח המלא]
Coding Theory: Codes, Computation, and Privacy
event speaker icon
נתנאל רביב (California Institute of Technology)
event date icon
יום ראשון, 28.10.2018, 14:30
event location icon
טאוב 601
Data intensive tasks have been ubiquitous ever since the data science revolution. The immensity of contemporary datasets no longer allows computations to be done on a single machine, and distributed computations are inevitable. Since most users cannot afford to maintain a network of commodity servers, burdensome computations are often outsourced to third party cloud services. However, this approach opens a Pandora's box of potential woes, such as malicious intervention in computations, privacy infringement, and workload ...
[לנוסח המלא]
Exploring the signal manifold of super-imposed pulses
event speaker icon
צ'רלס סוטון
event date icon
יום חמישי, 25.10.2018, 14:00
event location icon
טאוב 401
Large points cloud X in $R^{n\times D}$ are often assumed to be sampled from a k-dimensional manifold where $k 1$). However, there is no evidence that this technique extends to other manifolds. This work aims to verify how the multi-scale singular value analysis of a manifold can extend to any manifold. In this work, we focus our effort on signal manifolds of super-imposed pulses (SIPS), due to their generic nature and widespread use in signal ...
[לנוסח המלא]
Theory Seminar: Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
event speaker icon
דייוויד וו (אונ' סטנפורד)
event date icon
יום רביעי, 24.10.2018, 12:30
event location icon
טאוב 201
Pseudorandom functions (PRFs) are one of the fundamental building blocks in cryptography. Traditionally, there have been two main approaches for PRF design: the "practitioner's approach" of building concretely-efficient constructions based on known heuristics and prior experience, and the "theoretician's approach" of proposing constructions and reducing their security to a previously-studied hardness assumption. While both approaches have their merits, the resulting PRF candidates vary greatly in terms of concrete efficiency and design complexity. In this work, ...
[לנוסח המלא]
Pixel Club: Ultrasound Imaging with Deep Neural Networks
event speaker icon
אורטל סנוף (מדעי המחשב, טכניון)
event date icon
יום שלישי, 23.10.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Medical ultrasound (US) is a widespread imaging modality owing its popularity to cost efficiency, portability, speed, and lack of harmful ionizing radiation. At the same time, there are trade-offs among different US imaging qualities such as frame-rate, resolution, signal-to-noise-ratio and contrast. So far, these trade-offs have been compensated by mostly traditional model-based signal-processing methods. In the wake of the recent revival of artificial neural networks (NN), or more specifically, deep convolutional neural networks (CNN) for ...
[לנוסח המלא]
TCE Guest Lecture: Future of Computing – Domain Specific Accelerators
event speaker icon
ויליאם ג'. דאלי (אונ' סטנפורד)
event date icon
יום רביעי, 17.10.2018, 14:30
event location icon
חדר 280, בניין מאייר, הפקולטה להנדסת חשמל
Scaling of computing performance enables new applications and greater value from computing. With the end of Moore’s Law and Dennard Scaling, continued performance scaling will be due primarily to specialization. Graphics processing units are an ideal platform on which to build domain-specific accelerators. They provide very efficient, high performance communication and memory subsystems - which are needed by all domains. Specialization is provided via “cores”, such as tensor cores or ray-tracing cores that accelerate specific ...
[לנוסח המלא]
Pixel Club: A Local Block Coordinate Descent Algorithm for the Convolutional Sparse Coding Model
event speaker icon
אב זיסלמן (מדעי המחשב, טכניון)
event date icon
יום שלישי, 16.10.2018, 11:00
event location icon
טאוב 401
The Convolutional Sparse Coding (CSC) model has recently gained considerable traction in the signal and image processing communities. By providing a global, yet tractable, model that operates on the whole image, the CSC was shown to overcome several limitations of the patch-based sparse model while achieving superior performance in various applications. Contemporary methods for learning the CSC dictionary often rely on the Alternating Direction Method of Multipliers (ADMM) in the Fourier domain for the computational ...
[לנוסח המלא]
Label Expansion - Integrating Prior Knowledge to Large Label Set Tasks
event speaker icon
דור זהר
event date icon
יום חמישי, 11.10.2018, 14:30
event location icon
טאוב 301
In many Natural Language Processing classification tasks, the label space consists of the entire vocabulary, and therefore might have hundreds of thousands of labels. Important tasks such as language modeling, machine translation and dialog systems all have vocabulary label sets. Due to Zipf's law, a large number of words in the vocabulary will have only a few appearances in the corpus, hindering the ability to learn proper representations for these words. This work utilizes a ...
[לנוסח המלא]
Pixel Club: Approximation Algorithms for Aligning Points to Lines with Applications to Visual Tracking
event speaker icon
איברהים ג'ובראן (אונ' חיפה)
event date icon
יום שני, 8.10.2018, 11:00
event location icon
טאוב 401
We consider the pose-estimation problem of aligning (rotating and translating) a set of n points to a corresponding set of n lines, both on the plane. The goal is to minimize the sum of distances between the matched point-line pairs over all possible translations, rotations, and matching functions. These natural problems occur e.g. in localization of GPS data (aligning points to a map), 2D images (object to RGB pixels) or stars (to sky patterns, e.g. ...
[לנוסח המלא]
בית-ספר קיץ השביעי בנושא אבטחת סייבר
event date icon
יום שלישי, 2.10.2018, 09:30
event location icon
טכניון
מרכז המחקר לאבטחת סייבר ע"ש הירושי פוג'יווארה יקיים את בית-ספר קיץ השביעי על אבטחת סייבר ומחשבים: "Trusted Execution and Hardware Side Channels" הכנס יתקיים בימים ג'-ה', 4-2 באוקטובר, 2018, בטכניון, חיפה. מארגני הכנס: פרופ' מרק זילברשטיין  – טכניון פרופ' יוסי אורן  – אוניברסיטות בן-גוריון דוברים: Ittai Anati, Intel Israel Herbert Bos, VU Amsterdam Christof Fetzer, TU Dresden Daniel Genkin, University of Michigan Taesoo Kim, Georgia Tech Eyal Ronen, Weismann Institute of Science Avishai Wool, Tel-Aviv ...
[לנוסח המלא]
Trivariate volumes - Algorithms and Applications
event speaker icon
פאדי מצארווי
event date icon
יום ראשון, 16.9.2018, 13:30
event location icon
טאוב 337
This work investigates algorithms and data structures for volumetric representation (V-reps) of 3D objects, representing the interior of the object in addition to its boundaries, extending the contemporary Boundary representation (B-rep) common scheme. In recent years, there is a growing and emerging need for a volumetric representation of 3D objects. Specifically, with the development of Iso-geometric Analysis (IGA) and advanced manufacturing technologies employing heterogeneous materials, such as 3D-printing and additive manufacturing (AM) of functionally graded ...
[לנוסח המלא]
CGGC Seminar: Improving the Upper Bound on the Number of Polycubes
event speaker icon
מירא שלח (אונ' סטנפורד)
event date icon
יום רביעי, 12.9.2018, 13:30
event location icon
טאוב 401
A d-dimensional polycube is a facet-connected set of cells (cubes) on the d-dimensional cubical lattice. Let Ad(n) denote the number of d-dimensional polycubes (distinct up to translations) with n cubes, and λd denote the limit of the ratio Ad(n+1)/Ad(n) as n approaches infinity. The exact value of λd is still unknown rigorously for d ≥ 2; the asymptotics of λd, as d approaches infinity, also remained elusive as of today. In this talk, I will ...
[לנוסח המלא]
CGGC Seminar: From Geometry to Simulation and Back: Numerical Design in Primary Manufacturing Processes
event speaker icon
סטפני אלגטי (אונ' אאכן)
event date icon
יום רביעי, 5.9.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Using a mold or die, primary shaping manufacturing processes form material from an initially unshaped state (usually melt) into a desired shape. Examples of such a process are extrusion or high-pressure die casting — processes that are responsible for many products of our everyday life, from pipes to yoghurt cups. From the design perspective, what these processes have in common is that the exact design of the mold cannot be determined directly and intuitively from ...
[לנוסח המלא]
Characterization of Cellular Metabolism throughout the Cell Cycle in Cancer: An Integrated Experimental-Computational Approach
event speaker icon
אויניונג אן
event date icon
יום שלישי, 4.9.2018, 14:00
event location icon
טאוב 601
Cellular metabolic demands change throughout the cell cycle. Nevertheless, a characterization of how metabolic fluxes adapt to the changing demands throughout the cell cycle is lacking. The rate of metabolic reactions and pathways in living cells, also referred to as metabolic flux, is not a directly measurable quantity. The most direct approach for quantifying intracellular metabolic flux is isotope tracing coupled with computational metabolic flux analysis. This has become a central technique in studies of ...
[לנוסח המלא]
Trusted Execution Environments
event speaker icon
אסף רוזנבאום
event date icon
יום רביעי, 29.8.2018, 10:00
event location icon
טאוב 601
As the cyber security threat continues to grow, we need to better defend our systems. One of the ways to improve the security of a computer system is to isolate its critical assets from the main execution environment. These critical assets are handled in a Trusted Execution Environment, which can protect them even when the main execution environment is compromised. One of the leading technologies enabling trusted execution environment is ARM TrustZone. In this talk ...
[לנוסח המלא]
Pixel Club: A Deep Learning Approach for Generic Image Segmentation
event speaker icon
אורן שייר (הנדסת חשמל, טכניון)
event date icon
יום ראשון, 19.8.2018, 10:30
event location icon
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Recent advances in deep learning and convolutional neural networks (CNNs) have had a profound impact on almost every computer vision task. However, generic (non-semantic) image segmentation is a notable exception despite it being one of the most fundamental and widely studied tasks in this field. In this talk, we revisit the generic segmentation task and propose Deep Generic Segmentation (DGS) -- a new deep learning approach combined with conditional random fields (CRFs). Our method differs ...
[לנוסח המלא]
CGGC Seminar: Automatic View Placement in 3D toward Hierarchical Non-linear Presentations
event speaker icon
דניאל רודין (מדעי המחשב, טכניון)
event date icon
יום ראשון, 5.8.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Moving from the concept of discrete sequences of 2D slides towards smooth 3D multimodal hierarchical presentations promises many improvements in quality and effectiveness of presentations. On the other hand, such a move poses many difficulties, one of which is how to arrange content in a 3D space. This task becomes further complicated when the story-graph of the presentation is evolving and is more complex than a single linear story-path. In this work, we propose a ...
[לנוסח המלא]
Hardware Security Seminar: Discovered@Technion -- Breaking the Bluetooth Pairing
event speaker icon
ליאור נוימן (מדעי המחשב, טכניון)
event date icon
יום ראשון, 29.7.2018, 09:30
event location icon
טאוב 601
Bluetooth is a widely deployed platform for wireless communications between mobile devices. It uses authenticated Elliptic Curve Diffie-Hellman for its key exchange. We show that the authentication provided by the Bluetooth pairing protocols is insufficient and does not provide the promised MitM protection. We present a new variant of an Invalid Curve Attack that preserves the x-coordinate of the public keys. The attack compromises the encryption keys of all of the current Bluetooth authenticated pairing ...
[לנוסח המלא]
Prototype-Based Drug Discovery using Conditional Diversity Networks
event speaker icon
שחר הראל
event date icon
יום ראשון, 22.7.2018, 13:30
event location icon
טאוב 301
Designing a new drug is an expensive and lengthy process. The first stage is drug discovery, in which potential drugs are identified before selecting a candidate drug to progress to clinical trials. As the space of potential molecules is very large (10^23-10^60), a common technique during drug discovery is to start from a molecule which already has some of the desired properties. An interdisciplinary team of scientists generates hypothesis about the required changes to the ...
[לנוסח המלא]
Multi-Task Learning for Text Processing on the Web
event speaker icon
רבקה מלכה
event date icon
יום חמישי, 19.7.2018, 15:00
event location icon
טאוב 601
Text processing on the web is challenging due to the use of informal and ungrammatical language. Yet, this is a very prominent domain for Natural Language Processing, due to the growing volume of textual information that is communicated through Internet pages and social media platforms. In this thesis we describe a particular form of text processing on the web - syntactic parsing of web queries. We present two novel contributions: (1) We extend the transition ...
[לנוסח המלא]
Metabolic Modeling for Bioengineering
event speaker icon
אדוארד ויטקין
event date icon
יום ראשון, 1.7.2018, 14:30
event location icon
טאוב 601
Efficient and sustainable conversion of biomass into valuable products is a major challenge for bioengineering. The composition of the feedstock biomass and the ability of microorganisms to efficiently ferment it are two most critical factors influencing the process efficiency. Intelligent design that addresses both these factors can greatly benefit from organism metabolic models and from using them in simulations and in computer-assisted optimization of the fermentation processes. In this talk we will cover several aspects ...
[לנוסח המלא]
Theory Seminar: An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both
event speaker icon
רותם צברי (מכון ויצמן למדע)
event date icon
יום רביעי, 27.6.2018, 12:30
event location icon
טאוב 201
In Attribute-Based Signatures an authority can generate multiple signing keys, where each key is associated with a constraint f. A key respective to f can sign a message x only if f(x)=0. The security requirements are unforgeability and key privacy (signatures should not expose the specific signing key used). In Homomorphic Signatures, given a signature for a data-set x, one can evaluate a signature for the pair (f(x),f), for functions f. In context-hiding HS, evaluated ...
[לנוסח המלא]
Real-time Learning using Core-Sets: Autonomous Drones for Rami Levy
event speaker icon
Dan Feldman - COLLOQUIUM LECTURE
event date icon
יום שלישי, 26.6.2018, 14:30
event location icon
חדר 337 טאוב.
A coreset (or core-set) of a dataset is its semantic compression with respect to a set of classifiers, such that learning the (small) coreset provably yields an approximate classifier of the original (full) dataset. Composable coresets also allow handling streaming and distributed data, e.g. using a cloud or swarm of drones. In this talk I will forge a link between coresets for fundamentals problems in machine (active and deep) learning -- to problems in real-time ...
[לנוסח המלא]
היום! יריד הפרוייקטים השנתי במדעי המחשב
event date icon
יום שלישי, 26.6.2018, 13:00
event location icon
כניסת הקומה וקומה 1 - בניין טאוב למדעי המחשב
מעבדות הפקולטה למדעי המחשב מזמינות אתכם לבקר ביריד הפרוייקטים השנתי שיתקיים ביום שלישי, 26 ביוני 2018, החל מ-13:00 בקומת הכניסה ובקומה 1 של בניין טאוב למדעי המחשב. פרטים נוספים בכרזה המצורפת. כולם מוזמנים!
[לנוסח המלא]
Properties of Minimal-Perimeter Polyominoes
event speaker icon
גיל בן-שחר
event date icon
יום שלישי, 26.6.2018, 10:30
event location icon
טאוב 601
A polyomino is an edge-connected set of cells on the square lattice. The problem of counting poyominoes dates back to the 1950s when it was studied in parallel in the fields of combinatorics and statistical physics. The study of polyominoes usually classifies polyominoes by their area, which is the number of cells the polyomino contains. Less explored is the perimeter of a polyomino, which is the set of empty cells adjacent to the polyomino. Several ...
[לנוסח המלא]
New Lower Bounds for Communication Models under Bandwidth Restrictions
event speaker icon
סרי חורי
event date icon
יום שני, 25.6.2018, 13:30
event location icon
טאוב 601
In this talk I will sketch two lower bound techniques for distributed models under bandwidth restrictions. The first is via reductions from the two party communication model, which is a well known technique for achieving lower bounds in distributed computing. I will show a new gadget for this framework that allows us to prove stronger lower bounds. As an example for this gadget, I will present a new lower bound for computing the exact or ...
[לנוסח המלא]
CGGC Seminar: An Explicit Structure-preserving Numerical Scheme for EPDiff
event speaker icon
אורסטיס ונטזוס (מתמטיקה, טכניון)
event date icon
יום ראשון, 24.6.2018, 13:30
event location icon
טאוב 401
We present a new structure-preserving numerical scheme for solving the Euler–Poincaré Differential (EPDiff) equation on arbitrary triangle meshes. Unlike existing techniques, our method solves the difficult non-linear EPDiff equation by constructing energy preserving, yet fully explicit, update rules. Our approach uses standard differential operators on triangle meshes, allowing for a simple and efficient implementation.
[לנוסח המלא]
Hardware Security Seminar: Intel SGX keys Management and Trusted Computing Base (TCB) Recovery
event speaker icon
איליה אלכסנדרוביץ (אינטל)
event date icon
יום ראשון, 24.6.2018, 09:30
event location icon
טאוב 601
Bugs, possibly leading to security flaws, are inevitable in the extremely complex modern processors. Some of such bugs may be later fixed in the field by patching processor firmware. In this presentation we will review mechanisms provided by the Intel Software Guard Extensions (SGX) architecture to recover from security vulnerabilities and to re-establish trust in the recovered platform. Bio: Ilya Alexandrovich is a Principal Engineer in the Intel Core Architecture Group. Since joining Intel eight ...
[לנוסח המלא]
Theory Seminar: On Distributional Collision Resistant Hashing
event speaker icon
אילון יוגב (מכון ויצמן למדע)
event date icon
יום רביעי, 20.6.2018, 12:30
event location icon
טאוב 201
Collision resistant hashing is a fundamental concept that is the basis for many of the important cryptographic primitives and protocols. Collision resistant hashing is a family of compressing functions such that no efficient adversary can find {\em any} collision given a random function in the family. In this work we study a relaxation of collision resistance called \emph{distributional} collision resistance, introduced by Dubrov and Ishai (STOC '06). This relaxation of collision resistance only guarantees that ...
[לנוסח המלא]
Novel Image and Video Super-Resolution Relying on Denoising Algorithms
event speaker icon
אלון בריפמן
event date icon
יום שלישי, 19.6.2018, 11:00
event location icon
טאוב 601
Single Image Super-Resolution (SISR) aims to recover a high-resolution image from a given low resolution version of it (the given image is assumed to be a blurred, down- sampled and noisy version of the original image). Video Super Resolution (VSR) targets series of given images, aiming to fuse them to create a higher resolution outcome. Although SISR and VSR seem to have a lot in common, as only the input domain changes between the two, ...
[לנוסח המלא]
היום! יום מחקר 2018 בפקולטה למדעי המחשב
event date icon
יום שני, 18.6.2018, 15:00
event location icon
כניסת הקומה - בניין טאוב למדעי המחשב
יום המחקר השמיני לתארים מתקדמים בפקולטה למדעי המחשב יתקיים ביום ראשון, 18 ביוני, 2018, בין השעות 15:00-17:00, בלובי של בניין טאוב למדעי המחשב. יום מחקר הוא הזדמנות עבור משתלמי הפקולטה להציג את מחקריהם באמצעות פוסטרים ומצגות בפני אנשי סגל ומנהלים בכירים בטכניון ותלמידים לכל התארים בפקולטה, כמו גם בפני נציגים רמי-דרג מחברות מובילות בתעשייה העילית בארץ ובעולם. המחקרים המשתתפים ביום המחקר יהיו בנושאים שונים: Cryptology and Cyber, Data Centers and Clouds, Graphics, Intelligent Systems and ...
[לנוסח המלא]
CGGC Seminar: Multi-chart Generative Surface Modeling
event speaker icon
חלי בן-חמו (מכון ויצמן למדע)
event date icon
יום ראשון, 17.6.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
We introduce a 3D shape generative model based on deep neural networks. A new image-like (i.e., tensor) data representation for genus-zero 3D shapes is devised. It is based on the observation that complicated shapes can be well represented by multiple parameterizations (charts), each focusing on a different part of the shape. The new tensor data representation is used as input to Generative Adversarial Networks for the task of 3D shape generation. The 3D shape tensor ...
[לנוסח המלא]
הכנס השנתי הבינלאומי השמיני להנדסת מחשבים בטכניון בנושא למידה עמוקה: תיאוריה ומעשה
event date icon
יום חמישי, 14.6.2018, 08:30
event location icon
חדר 280, בניין מאייר, הפקולטה להנדסת חשמל
הכנס השנתי הבינלאומי השמיני להנדסת מחשבים בטכניון בנושא הנדסת מחשבים בטכניון בנושא למידה עמוקה: תיאוריה ומעשה יתקיים בימים חמישי, 14 ביוני, 2018 בחדר 280, בניין מאייר, הפקולטה להנדסת חשמל, הטכניון. מארגני הכנס הם דניאל סודרי מהפקולטה להנדסת חשמל ורן אל-יניב מהפקולטה למדעי המחשב ובין המשתתפים:     Lior Wolf, Tel Aviv University, Israel · Michal Irani, Weizmann Institute of Science, Israel · Nathan Srebro,Taub Distinguished Visitor, Toyota Technological Institute at Chicago, USA · Uri Shalit, Technion, ...
[לנוסח המלא]
Theory Seminar: Deterministic Meeting in Networks
event speaker icon
Andrzej Pelc (Université du Québec en Outaouais, Canada)
event date icon
יום רביעי, 13.6.2018, 12:30
event location icon
טאוב 201
The task of rendezvous (also called gathering) calls for a meeting of two or more mobile entities, starting from different positions in some environment. Those entities are called mobile agents or robots, and the environment can be a network modelled as a graph or a terrain in the plane, possibly with obstacles. The rendezvous problem has been studied in many different scenarios. Two among many adopted assumptions particularly influence the methodology to be used to ...
[לנוסח המלא]
ceClub: Making Triangle Counting Fast - Introducing Logarithmic Radix Binning & Vectorized Tri-Counting
event speaker icon
עודד גרין (מכון טכנולוגי, גיאורגיה)
event date icon
יום רביעי, 13.6.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Triangle counting is a scalable analytic that benefits from a large number of processors. Similar to many other graph analytics, the control flow for each thread of triangle counting algorithms is determined by the input graph. This data dependency makes both load-balancing and compiler optimization much more challenging. Vectorization of such codes is even more complex. The recent branch-avoiding model shows how to remove such control flow restrictions by replacing branches with an equivalent set ...
[לנוסח המלא]
Privacy, and Why You Should Care
event speaker icon
Katrina Ligett - COLLOQUIUM LECTURE
event date icon
יום שלישי, 12.6.2018, 14:30
event location icon
חדר 337 טאוב.
Over the past decade, the computer science research community has converged around a formal notion of data privacy, known as differential privacy, and has made substantial progress in establishing the theoretical foundations of this notion. In this talk, I will give a brief overview of differential privacy and the relevant mathematical toolkit, and then we will discuss the implications and frontiers of this research space. Can differential privacy ever be practical? How might it be ...
[לנוסח המלא]
When Dictionary Learning Meets Graph Signal Processing
event speaker icon
יעל ינקלבסקי
event date icon
יום שלישי, 12.6.2018, 11:30
event location icon
טאוב 337
Dictionary Learning techniques aim to find sparse signal representations that capture prominent characteristics in the given data. For signals residing on non-Euclidean topologies, represented by weighted graphs, an additional challenge is incorporating the underlying geometric structure of the data domain into the learning process. In this talk, we introduce an approach that aims to infer and preserve the local intrinsic geometry of the data. Combining ideas from spectral graph theory, manifold learning and sparse representations, ...
[לנוסח המלא]
System-Aware Compression: Optimizing Imaging Systems from the Compression Standpoint
event speaker icon
יהודה דר
event date icon
יום שלישי, 12.6.2018, 10:15
event location icon
טאוב 337
In typical imaging systems, an image/video is first acquired, then compressed for transmission or storage, and eventually presented to human observers using different and often imperfect display devices. While the resulting quality of the perceived output image may severely be affected by the acquisition and display processes, these degradations are usually ignored in the compression stage, leading to an overall sub-optimal system performance. In this work we propose a compression methodology to optimize the system's ...
[לנוסח המלא]
Coding Theory: Recent Results in Covert Communication
event speaker icon
סידהארט ג'אגי (אונ' הונג-קונג)
event date icon
יום ראשון, 10.6.2018, 14:30
event location icon
טאוב 601
Covert communication considers the following problem -- if Alice wishes towhisper to Bob while ensuring that the eavesdropper Eve cannot even detect whether or not Alice is whispering, how much can she whisper. Ensuring such a stringent security requirement can be met requires new ideas from information theory, coding theory, and cryptography. In this talk I will survey the state of the existing literature (recent information-theoretic capacity-style results for a variety of settings), and then ...
[לנוסח המלא]
CGGC Seminar: Subdivision Directional Fields
event speaker icon
אמיר וקסמן (אונ' אוטרכט)
event date icon
יום ראשון, 10.6.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Subdivision surfaces are a mainstream methodology in computer graphics and geometry processing to create smooth surfaces with a multiresolution hierarchy. The recent popularity of Isogeometric Analysis brought a renewed interest in such surfaces for the purpose of solving differential equations. We define subdivision methods for piecewise-constant directional fields and show how such methods can be used for robust and efficient vector field processing on subdivision surfaces.
[לנוסח המלא]
Theory Seminar: Sub-logarithmic Distributed Oblivious RAM with Small Block Size
event speaker icon
תאמר מור (מדעי המחשב, טכניון)
event date icon
יום רביעי, 6.6.2018, 12:30
event location icon
טאוב 201
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM, where the data is stored in m non-colluding servers. Extensive research over the last few decades have succeeded to reduce the bandwidth overhead of ORAM schemes, both in the single-server and the multi-server setting, from O(\sqrt{N}) to O(1). However, all known protocols ...
[לנוסח המלא]
Matching Visual Data
event speaker icon
Shai Avidan - COLLOQUIUM LECTURE
event date icon
יום שלישי, 5.6.2018, 14:30
event location icon
חדר 337 טאוב.
Matching pixels is used in various computer vision applications such as template matching, tracking and image editing. I will give an overview of my work in this field with an emphasize on two components. The first is how to represent the data, and the second is what similarity measure to use. I will demonstrate the results on several applications including object tracking and image editing. Bio: Shai Avidan is an Associate Professor at the School ...
[לנוסח המלא]
כנס Qubit 2018
event date icon
יום ראשון, 3.6.2018, 09:30
event location icon
בניין טאוב למדעי המחשב
מרכז המחקר לאבטחת סייבר ע"ש הירושי פוג'יאוורה שמח להזמניכם לכנס: Qubit 2018 - Quantum Communication: Celebrating Bennett & Brassard's Wolf Prize for Physics>אשר יתקיים בפקולטה למדעי המחשב בטכניון ביום ראשון, 3 ביוני 2018. מארגני הכנס:אלי ביהם, טכניון טל מור, טכניון בין הדוברים יהיו: Keynote: Charles Bennett, IBM Research Center: "Why DIY Randomness is Better Than DI Randomness" Keynote: Gilles Brassard, de Montréal: "Cryptography In A Quantum World"  Lev Vaidman, Tel-Aviv University: "Counterfactual Communication" Tal Mor, ...
[לנוסח המלא]
Theory Seminar: Approximation Algorithms for Dynamic NFV Workload
event speaker icon
ירון פיירסטיין (מדעי המחשב, טכניון)
event date icon
יום רביעי, 30.5.2018, 12:30
event location icon
טאוב 201
The dynamic NFV placement problem captures one of the main challenges facing the telecom industry following the emergence of the Network Function Virtualization (NFV) networking paradigm, that is, deciding the placement of network functions while taking into consideration the dynamic nature of networks and workloads. We model the problem as a generalization of the classic Uncapacitated Facility Location (UFL) problem, where we consider both multiple types of commodities and dynamic clients whose location changes over ...
[לנוסח המלא]
ceClub: Space Bounds for Reliable Coded Storage, and Beyond
event speaker icon
אלכסנדר שפיגלמן (הנדסת חשמל, טכניון)
event date icon
יום רביעי, 30.5.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
The bulk of the talk will deal with space requirements of reliable storage algorithms in asynchronous distributed systems. A number of recent works have used codes in order to achieve a better storage cost than the well-known replication approach. However, a closer look reveals that they incur extra costs in certain scenarios. Specifically, if multiple clients access the storage concurrently, then existing asynchronous code- based algorithms may store a number of copies of the data ...
[לנוסח המלא]
Accelerating Innovation Through Analogy Mining
event speaker icon
Dafna Shahaf - COLLOQUIUM LECTURE
event date icon
יום שלישי, 29.5.2018, 14:30
event location icon
חדר 337 טאוב.
The availability of large idea repositories (e.g., the U.S. patent database) could significantly accelerate innovation and discovery by providing people with inspiration from solutions to analogous problems. However, finding useful analogies in these large, messy, real-world repositories remains a persistent challenge for either human or automated methods. In this work we explore the viability and value of learning simpler structural representations which specify the purpose of a product and the mechanisms by which it achieves ...
[לנוסח המלא]
Pixel Club: The Perception-Distortion Tradeoff
event speaker icon
יוחאי בלאו (הנדסת חשמל, טכניון)
event date icon
יום שלישי, 29.5.2018, 11:30
event location icon
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Image restoration algorithms are typically evaluated by some distortion measure (e.g. PSNR, SSIM, IFC, VIF) or by human opinion scores that quantify perceived perceptual quality. In this work, we prove mathematically that distortion and perceptual quality are at odds with each other. Specifically, we study the optimal probability for correctly discriminating the outputs of an image restoration algorithm from real images. We show that as the mean distortion decreases, this probability must increase (indicating worse ...
[לנוסח המלא]
ניהול מו"מ: איך לנהל מו"מ על חוזה העסקה
event speaker icon
שרה קרוא (Talent management specialist)
event date icon
יום שני, 28.5.2018, 17:00
event location icon
חדר 337 טאוב.
אנו שמחים להזמין אתכם לשישי בסדרת מפגשים בנושא קריירה וחיפוש עבודה שיתקיים ביום שני, 28 במאי 2018, בשעה 17:00 בחדר 337, בניין טאוב למדעי המחשב. שרה קרוא, (Talent management specialist), תרצה על "ניהול מו"מ: איך לנהל משא ומתן על חוזה העסקה".   להשתתפות אנא הי מראש.   כולם מוזמנים!
[לנוסח המלא]
CGGC Seminar: Integer-Only Cross Field Computation
event speaker icon
נחום פרחי (מדעי המחשב, טכניון)
event date icon
יום ראשון, 27.5.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
We propose a new iterative algorithm for computing smooth cross fields on triangle meshes that is simple, easily parallelizable on the GPU and finds solutions with lower energy and fewer cone singularities than state-of-the-art methods. Our approach is based on a formal equivalence, which we prove, between two formulations of the optimization problem. This equivalence allows us to eliminate the real variables and design an efficient grid search algorithm for the cone singularities. We leverage ...
[לנוסח המלא]
Theory Seminar: Approximate Modularity Revisited
event speaker icon
מיכל טלגם-כהן (מדעי המחשב, טכניון)
event date icon
יום רביעי, 23.5.2018, 12:30
event location icon
טאוב 201
Set functions with convenient properties (such as submodularity) often arise in algorithmic game theory, and allow for improved properties of optimization algorithms and mechanisms. It is natural to ask (e.g., in the context of data driven applications) how robust such properties are, and whether small deviations from them can be tolerated. We consider two such questions in the important special case of linear set functions. One question that we address is whether any set function ...
[לנוסח המלא]
Pixel Club: Numerical Methods in Visual Computing: what we can learn from each other
event speaker icon
אורי אשר (אונ' קולומביה הבריטית)
event date icon
יום רביעי, 23.5.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Visual computing is a wide area that includes computer graphics and image processing, where the "eyeball-norm" rules. I will briefly discuss two case studies involving numerical methods and analysis applied to this area. The first case study involves motion simulation and calibration of soft objects such as plants, skin, and cloth. The governing elastodynamics PDE system, discretized in space already at the variational level using co-rotated FEM, leads to a large, expensive to assemble, dynamical ...
[לנוסח המלא]
ceClub: RISC-V - Why a new CPU Architecture?
event speaker icon
עודד למפל (מלאנוקס)
event date icon
יום רביעי, 23.5.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Who needs a new Instruction Set Architecture (ISA)? Architectures have reached some unspoken Truce through Markets Segment dominance (IA64 - PC and Server market, ARM - Mobile market). IA and ARM have ruled the PC/Server and Mobile markets, respectively, for years and have prevailed aggressive competitive assaults Some Markets are still pursuing a standard (ARM and Various DSPs - IoT market, GPGPU (Nvidia) and TPU (Google) - IA/ML applications) IoT and IA/ML segments have not ...
[לנוסח המלא]
Pixel Club: OATM: Occlusion Aware Template Matching by Consensus Set Maximization
event speaker icon
סיימון קורמן (מכון ויצמן למדע)
event date icon
יום שלישי, 22.5.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
We present a novel approach to template matching that is efficient, can handle partial occlusions, and comes with provable performance guarantees. A key component of the method is a reduction that transforms the problem of searching a nearest neighbor among N high-dimensional vectors, to searching neighbors among two sets of order sqrt{N} vectors, which can be found efficiently using range search techniques. This allows for a quadratic improvement in search complexity, and makes the method ...
[לנוסח המלא]
Theory Seminar: Learning Software Constraints via Installation Attempts
event speaker icon
רן בן-בשט (מדעי המחשב, טכניון
event date icon
יום רביעי, 16.5.2018, 12:30
event location icon
טאוב 201
Modern software systems are expected to be secure and contain all the latest features, even when new versions of software are released multiple times an hour. Each system may include many interacting packages. The problem of installing multiple dependent packages has been extensively studied in the past, yielding some promising solutions that work well in practice. However, these assume that the developers declare all the dependencies and conflicts between the packages. Often, the entire repository ...
[לנוסח המלא]
ceClub: Security and Reliability Using OS
event speaker icon
נועם שלו (הנדסת חשמל,טכניון)
event date icon
יום רביעי, 16.5.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Computer systems have been developed tremendously over the past few years and as a result new challenges arise in the fields of security and reliability. In this talk I will present two approaches that utilize the operating system for providing solutions to urgent challenges in these fields. First, I will speak about the Core Surprise Removal (CSR) algorithm which explores the uncharted field of providing reliability in face of hardware faults and makes a unique ...
[לנוסח המלא]
Pixel Club: Deep Learning for Biomedical Imaging: Can We Get Better, Higher or Faster?
event speaker icon
תמי ריקלין רביב (אונ' בן-גוריון)
event date icon
יום שלישי, 15.5.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Recent progress in imaging technologies leads to a continuous growth in biomedical data, which can provide better insight into important clinical and biological questions. Advanced machine learning techniques, such as artificial neural networks are brought to bear on addressing fundamental medical image computing challenges such as segmentation, classification and reconstruction, required for meaningful analysis of the data. Nevertheless, the main bottleneck, which is the lack of annotated examples or ‘ground truth’ to be used for ...
[לנוסח המלא]
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
event speaker icon
תאמר מור
event date icon
יום שני, 14.5.2018, 14:30
event location icon
טאוב 601
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM, where the data is stored in m non-colluding servers. Extensive research over the last few decades have succeeded to reduce the bandwidth overhead of ORAM schemes, both in the single-server and the multi-server setting, from O(\sqrt{N}) to O(1). However, all known protocols ...
[לנוסח המלא]
CGGC Seminar: Rigid Motions on 3D Digital Space
event speaker icon
קספר פלוטה (אונ' פריס)
event date icon
יום ראשון, 13.5.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
In digital geometry, Euclidean objects are represented by their discrete approximations e.g., subsets of the lattice of integers. Rigid motions of such sets have to be defined as maps from and onto a given discrete space. One way to design such motions is to combine continuous rigid motions defined on Euclidean space with a digitization operator. However, digitized rigid motions often no longer satisfy properties of their continuous siblings. Indeed, due to digitization, such transformations ...
[לנוסח המלא]
Hardware Security Seminar: Main Cyber Security Challenges in Vehicles and in Vehicle-to-vehicle Communication
event speaker icon
יוני כהנא (ג'נרל מוטורס ישראל)
event date icon
יום ראשון, 13.5.2018, 09:30
event location icon
טאוב 601
The review will include the main modern cyber security challenges that exists in vehicles today and in the coming future. There will specific focus on security aspects in vehicle-to-vehicle communication (v2v or C2C) , includes privacy , authenticity and integrity of the communication in the relevant scenarios Bio: Yoni is managing the product Cyber Security Group in General Motors Israel that in-charge to secure crucial elements in the vehicle. Yoni was the chairman of the ...
[לנוסח המלא]
Efficient Extreme Classification
event speaker icon
איתי עברון
event date icon
יום רביעי, 9.5.2018, 13:30
event location icon
טאוב 601
In extreme classification problems, machine learning algorithms are required to map instances to labels from an extremely large label set. We build on a recent extreme classification framework with logarithmic time and space, and on a general approach for error correcting output coding (ECOC), and introduce a flexible and efficient approach accompanied by bounds. Our framework employs output codes induced by graphs, and offers a tradeoff between accuracy and model size. We show how to ...
[לנוסח המלא]
Theory Seminar: Complexity Analysis for Relational Queries over Text
event speaker icon
ליאת פטרפרוינד (מדעי המחשב, טכניון)
event date icon
יום רביעי, 9.5.2018, 12:30
event location icon
טאוב 201
A recent principled approach to information extraction from text views the query as an ordinary relational query, but not on ordinary relations; instead, the relations are tuples of intervals, or "spans," extracted from text documents. A prominent example is Fagin et al.'s "regular spanners," which are the closure of regular expressions with capture variables (used for tokenization, n-grams, segmentation, etc.) under the relational algebra. In this talk I will present several research directions motivated by ...
[לנוסח המלא]
Frugal Counting
event speaker icon
ירון קסנר
event date icon
יום רביעי, 9.5.2018, 11:30
event location icon
טאוב 601
In this talk we will present improvements to the accuracy, memory and speed of counting algorithms. Counters are one of the most basic building blocks in networking, big data analytics and other fields. To cope with increasing line rates, counters must be accessed quickly and be kept on small fast memory. Further, to reach concise and exhaustive conclusions about data, accurate estimations must be kept for large numbers of counters. We first present a closed ...
[לנוסח המלא]
ceClub: But Why Does It Work? A "Rational Protocol Design" Treatment of Bitcoin
event speaker icon
חואן גאראי (אונ' טקסס)
event date icon
יום רביעי, 9.5.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
As the first and most popular decentralized cryptocurrency to date, Bitcoin has ignited much excitement, not only for its novel realization of a central bank-free financial instrument, but also as an alternative approach to classical problems in distributed computing and cryptographic protocols, such as reaching consensus in the presence of misbehaving parties. In this talk, after a brief introduction to the innovative and distributedly-maintained data structure known as the "blockchain," we first present the first ...
[לנוסח המלא]
סדנת שרתים מרוחקים
event date icon
יום שני, 7.5.2018, 18:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
הפקולטה למדעי המחשב שמחה להזמינכם לשלישית בסדרת סדנאות ללימוד כלים יישומיים לעבודה על קוד, פיתוח וניהול פרוייקטים, והפעם בנושא: "עבודה עם שרתים מרוחקים: איך מגישים תרגילים בלי להישאר לישון בחווה" בהשתתפות יונית גרובר-חזני, מהנדסת DEVOPSE ב-WAZE. בתוכנית: - טיפים לעבודה משורת הפקודה - איך מתחברים למחשבים אחרים, למה זה כדאי גם לא רק בשביל הגשת תרגילים - למה אין הבדל גדול בין מחשב באותו חדר למחשב בצד השני של העולם הסדנה תתקיים ביום שני, 7 ...
[לנוסח המלא]
Pixel Club: The Steerable Graph Laplacian and its Application to Filtering Image Datasets
event speaker icon
בוריס לנדא (אונ' תל-אביב)
event date icon
יום שני, 7.5.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
In recent years, improvements in various scientific image acquisition techniques gave rise to the need for adaptive processing methods, particularly aimed for large data-sets corrupted by noise and deformations. Motivated by challenges in cryo-electron microscopy (cryo-EM), we consider the problem of reducing noise in a dataset of images admitting a certain unified structure. In particular, we consider datasets of images sampled from an underlying low-dimensional manifold (i.e. an image-valued manifold), where the images are obtained ...
[לנוסח המלא]
האקתון האביב במדעי המחשב
event date icon
יום חמישי, 3.5.2018, 09:00
event location icon
בניין טאוב למדעי המחשב
הפקולטה למדעי המחשב מזמינה אתכם להרכיב צוות מנצח ולהתחיל לעבוד על רעיון מבריק להאקתון האביב שיתקיים בימים חמישי-שישי, 3-4 במאי, 2018, בבניין טאוב.למדעי המחשב. בתוכנית: 24 שעות של עבודה בצוותים, בליווי מדריכים מובילים, כיבוד ופרסים כספיים (לזוכים במקום הראשון יוענקו 5,000 ₪). אנא הירשמו מראש עד 15 באפריל, מספר המקומות מוגבל. מחכים לכם!
[לנוסח המלא]
Theory Seminar: Distributed PCP Theorems for Hardness of Approximation in P
event speaker icon
אביעד רובינשטיין (אונ' סטנפורד)
event date icon
יום רביעי, 2.5.2018, 12:30
event location icon
טאוב 201
We present a new model of probabilistically checkable proof (PCP), which we call "Distributed PCP": A satisfying assignment (x in {0,1}^n) to a SAT instance is shared between two parties (Alice knows x_1, ... x_{n/2}, and Bob knows x_{n/2+1},...,x_n). Their goal is to jointly write a PCP for x, while exchanging little or no information. Using our new framework, we obtain, for the first time, PCP-like hardness of approximation results for problems in P. Based ...
[לנוסח המלא]
Genetics media
event speaker icon
Yaniv Erlich - COLLOQUIUM LECTURE - RESCHEDULED FROM 10/4/18
event date icon
יום שלישי, 1.5.2018, 14:30
event location icon
חדר 337 טאוב.
In the last decade, the human population has produced zettabytes (10^21) of digital data. This creates immense opportunities and challenges for biology research. In this talk, I will present two research directions on the intersection between genetics and data, which we dub "genetic media". First, I will speak about crowd sourcing massive genetic data using social media. We collected over 80 million profiles from the largest social-media website driven by genealogy and constructed a single ...
[לנוסח המלא]
Template Matching with Deformable Diversity Similarity
event speaker icon
איתמר תלמי
event date icon
יום שלישי, 1.5.2018, 11:30
event location icon
טאוב 337
We propose a novel measure for template matching named Deformable Diversity Similarity -- based on the diversity of feature matches between a target image window and the template. We rely on both local appearance and geometric information that jointly lead to a powerful approach for matching. Our key contribution is a similarity measure, that is robust to complex deformations, significant background clutter, and occlusions. Empirical evaluation on the most up-to-date benchmark shows that our method ...
[לנוסח המלא]
פצח את קוד הראיון שלך
event speaker icon
דור גרוס (פייסבוק ישראל)
event date icon
יום שני, 30.4.2018, 17:00
event location icon
חדר 337 טאוב.
אנו שמחים להזמין אתכם לחמישי בסדרת מפגשים בנושא קריירה וחיפוש עבודה שיתקיים ביום שני, 30 באפריל 2018, בשעה 17:00 בחדר 337, בניין טאוב למדעי המחשב. מר דוד גרוס, מהנדס תוכנה בפייסבוק ישראל, ירצה על "פיצוח קוד הראיון שלך": כיצד להתכונן ולהצליח בראיון עבודה   להשתתפות אנא הי מראש.   כולם מוזמנים!
[לנוסח המלא]
יורוקריפט 2018
event date icon
יום ראשון, 29.4.2018, 18:00
event location icon
תל-אביב
EUROCRYPT 2018 הוא הכנס הבינלאומי השנתי ה-37 בתחום התיאוריה ויישומי טכניקות ההצפנה אשר ידון בכל היבטי הקריפטולוגיה, כולל יסודות תיאורטיים, פריסה של תוכניות קריפטוגרפיות, קריפטאנליזה של סטנדרטים נפוצים, פרוטוקולים קריפטוגרפיים, קריפטוגרפיה קוונטית ומטבעות קריפטוגרפיים. השנה יתקיים הכנס בתל-אביב בין התאריכים 29 באפריל - 3 במאי 2018, והוא אחד מכנסי הדגל של האיגוד הבינלאומי לחקר ההצפנה (IACR) ומאורגן על-ידי מרכז המחקר לאבטחת סייבר ע"ש הירושי פוג'יווארה בטכניון. פרטים נוספים יפורסמו בקרוב.
[לנוסח המלא]
קריירת מחקר בתעשייה
event date icon
יום ראשון, 29.4.2018, 15:30
event location icon
מועדון משתלמים, בניין טאוב למדעי המחשב
אנו שמחים להזמין אתכם למפגש ייעודי לסטודנטים לתארים מתקדמים, שיעסוק הפעם בקריירת מחקר בתעשייה: האם יש מחקר בתעשייה בישראל? מהם סוגי המשרות ומסלולי קריירה הקיימים. המפגש יתקיים ביום ראשון, 29 באפריל 2018, בשעה 15:30 במועדון משתלמים, קומה2, בניין טאוב למדעי המחשב. בתוכנית: פרופ' דני רז הפקולטה למדעי המחשב מיכל אהרון Sr. director research, Oath, Yahoo דבי כהן Google Research Scientist קירה רדינסקי Chief Scientist (IL) & Director of Data Science, ebBay יונתן יניב Researcher, Yotpo ...
[לנוסח המלא]
On Graph Learning
event speaker icon
חסן עבאסי
event date icon
יום חמישי, 26.4.2018, 11:00
event location icon
טאוב 701
A graph learning problem is a problem of finding a hidden graph $G=(V,E)$ using edge-detecting queries, where an edge-detecting query $Q_G(S)$, for $S \subseteq V$ is: does S contain at least one edge of G? The main question is how many queries do we need to find all the edges. Graph learning is a well-studied problem. It has been studied for general graphs, and also for specific graph families (i.e. matching, stars, cliques and others). ...
[לנוסח המלא]
On Graph Learning
event speaker icon
חסן עבאסי
event date icon
יום חמישי, 26.4.2018, 11:00
event location icon
טאוב 701
A graph learning problem is a problem of finding a hidden graph $G=(V,E)$ using edge-detecting queries, where an edge-detecting query $Q_G(S)$, for $S \subseteq V$ is: does S contain at least one edge of G? The main question is how many queries do we need to find all the edges. Graph learning is a well-studied problem. It has been studied for general graphs, and also for specific graph families (i.e. matching, stars, cliques and others). ...
[לנוסח המלא]
Theory Seminar: Distributed Spanner Approximation
event speaker icon
מיכל דורי (מדעי המחשב, טכניון)
event date icon
יום רביעי, 25.4.2018, 12:30
event location icon
טאוב 201
A k-spanner is a sparse subgraph that preserves distances up to a multiplicative factor of k. First introduced in the late 80's, spanners have been central for numerous applications, such as synchronization, compact routing tables, approximate shortest paths, and more. This talk focuses on distributed construction of approximate minimum spanners, presenting both algorithmic and hardness results, in the classical LOCAL and CONGEST models of distributed computing. In both models vertices exchange messages in synchronous rounds, ...
[לנוסח המלא]
היום! יום פתוח לתארים מתקדמים במדעי המחשב
event date icon
יום רביעי, 25.4.2018, 12:15
event location icon
חדר 337, בניין טאוב למדעי המחשב
היום הפתוח לקראת ההרשמה לשנה"ל תשע"ט מזמין בוגרי תואר ראשון מצטיינים מכל האוניברסיטאות להגיע לטכניון ולהתרשם מהפקולטות למדעי המחשב, לפגוש חברי סגל וסטודנטים לתארים מתקדמים ולשמוע הרצאה מרתקת מפי משה לוינגר, מנהל בכיר, י.ב.מ. מחקר, חיפה: "האם תואר מתקדם אכן מקדם?" . האירוע יתקיים ביום ד', 25 באפריל 2018, בין השעות 12:15-15:00, בבניין טאוב למדעי המחשב, חדר 337 (קומה 3). תוכנית היום תכלול סקירה על הלימודים ותנאי הקבלה וכן הרצאות מדעיות. לכל מועמד תתאפשר פגישה ...
[לנוסח המלא]
1+1=3: Combining Object Storage with Other Data Services
event speaker icon
Michael Factor - COLLOQUIUM LECTURE
event date icon
יום שלישי, 24.4.2018, 14:30
event location icon
חדר 337 טאוב.
AI, Cognitive, Analytics, IoT all run on data. This data is needed by data scientists, line of business, developers, CDOs and others. Without data, in fact, one can do very little that is interesting or of value. Object storage, the default storage for the PBs and EBs of unstructured data in clouds, has brought huge efficiencies to storing and managing data. In this presentation, we will provide an overview of object storage, using IBM's Cloud ...
[לנוסח המלא]
Pixel Club: On GANs and GMMs
event speaker icon
איתן ריצ'רדסון (האונ' העברית)
event date icon
יום שלישי, 24.4.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
GANs have recently gained attention due to their success in generating realistic new samples of natural images, yet the extent to which such models capture the statistics of full images is poorly understood. In this work we present a simple method to evaluate generative models based on relative proportions of samples that fall into predetermined bins. Applying our method to GANs shows that they typically fail to capture very basic properties of the distribution. As ...
[לנוסח המלא]
כנס: The Information Era: Past, Present and Future
event date icon
יום שלישי, 24.4.2018, 09:00
event location icon
אודיטוריום 2, בניין טאוב למדעי המחשב
הפקולטה למדעי המחשב שמחה להזמינכם לכנס עמותת מרקוני בנושא: The Information Era: Past, Present and Future אשר יתקיים ביום שלישי, 24 באפריל, 2018 באודיטוריום 2, בניין טאוב למדעי המחשב. אורח הכבוד יהיה פרופ' אנדרו ויטרבי, ממייסדי קוואלקום, שישתתף בפאנל היסטורי עם פרופ' יעקב זיו ופרופ' אברהם למפל, לציון 70 שנות אינפורמציה ותקשורת.  הכנס בשיתוף קרן מרקוני, עיריית חיפה והפקולטה להנדסת חשמל בטכניון.  ההשתתפות אינה כרוכה בתשלום אך דורשת הרשמה מראש. פרטים נוספים ותוכנית הכנס.
[לנוסח המלא]
Two Researches on Lattice Animals
event speaker icon
יופיי ז'נג
event date icon
יום ראשון, 22.4.2018, 13:30
event location icon
טאוב 301
Lattice animals are connected subgraphs of a lattice. In this talk, we consider two types of lattices, the $d$-dimensional hypercubic lattice and the triangular lattice, where the animals are frequently referred to as $d$-dimensional polycubes and polyiamonds, respectively. Denote the number of $d$-dimensional polycubes of volume $n$ and perimeter defect $k$ as $B(n,k,d)$, where $k$ is the deviation from the maximum perimeter. To-date, no formulae of $B(n,k,d)$ are known. In the first part of the ...
[לנוסח המלא]
Textual Membership Queries
event speaker icon
יונתן זרצקי
event date icon
יום שלישי, 17.4.2018, 12:30
event location icon
טאוב 601
Labeling textual data by humans can become very time-consuming and expensive, yet critical for the success of an automatic text classification system. In order to minimize the human-labeling efforts, we propose a novel active learning (AL) solution, which does not rely on existing sources of unlabeled data. It uses a small amount of of labeled data as the core set for the synthesis of useful membership queries (MQs) - unlabeled instances synthesized by a computer, ...
[לנוסח המלא]
Hardware Security Seminar: Software and Hardware Based Approached for Fine Grain Memory Protection
event speaker icon
אבי מנדלסון (מדעי המחשב, טכניון)
event date icon
יום ראשון, 15.4.2018, 09:30
event location icon
טאוב 601
Future servers are expected to have huge amount of volatile and nonvolatile main memory that can be directly accessed by the processors. Managing such a memory hierarchy is a major concern of computer and of hardware security architects. Thus, while computer architects are aiming at increasing the page and region size, which is being controlled by a single entry at of the TLB (e.g., 1G page size), hardware security architects aims at protecting variable size ...
[לנוסח המלא]
Theory Seminar: Voronoi Diagrams for Planar Graphs
event speaker icon
אורן ויינמן (אונ' חיפה)
event date icon
יום רביעי, 11.4.2018, 12:30
event location icon
טאוב 201
Given a set of points (sites) in the plane, a Voronoi diagram is a partitioning of the plane into regions such that each region contains one site and all points closer to this site than to any other site. Voronoi diagrams have practical and theoretical applications in a large number of fields. In this talk, I will overview the exciting new uses of Voronoi diagrams for planar graph algorithms. In particular, I will describe an ...
[לנוסח המלא]
Pixel Club: Viewpoint Estimation - Insights & Model
event speaker icon
גלעד דיבון (הנדסת חשמל, טכניון)
event date icon
יום רביעי, 11.4.2018, 11:30
event location icon
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
This thesis addresses the problem of viewpoint estimation of an object in a given image, where the objects belong to several known categories. Convolutional Neural Networks were recently applied to this problem, leading to large improvements of state-of-the-art results. Two major approaches have been pursued: a regression approach, which handles the continuous values of view points naturally, and a classification approach, which discretized the space of viewpoints. We follow the second approach and present five ...
[לנוסח המלא]
MAGIC SQUARES WONDER CUBES and OTHER SAME SUM OBJECTS
event speaker icon
Prof. Emeritus Azaria Paz - Distinguished Guest Lecture
event date icon
יום שלישי, 10.4.2018, 14:30
event location icon
חדר 337 טאוב.
A MAGIC SQUARE is an arrangement of nxn disjoint integers on an nxn square in a way such that the n rows, the n columns and the two diagonals of the square sum to the same constant which is called THE MAGIC CONSTANT. We will consider in this lecture magic squares with n=3 only. We introduce a new generalization of magic squares where 6 non equivalent positive magic squares having the same magic constant are ...
[לנוסח המלא]
Parallel Execution Using Memory Versioning and Renaming
event speaker icon
ערן גלעד
event date icon
יום שלישי, 10.4.2018, 14:00
event location icon
טאוב 601
The memory interface is a striking example of a hardware/software interface that is ill-suited for parallelism, and specifically for parallel access to the program's state. Even on modern computers, that interface follows the design described in the von Neumann architecture more than 70 years ago. This interface design is fundamentally sequential and suited for serial instruction execution. Indeed, modern memory systems allow multiple cores to read and write state concurrently, and the underlying implementation can ...
[לנוסח המלא]
Pixel Club: Video Scene Detection Using Optimal Sequential Grouping
event speaker icon
דניאל רוטמן (IBM)
event date icon
יום שלישי, 10.4.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Video scene detection is the task of temporally dividing a video into its semantic sections called "scenes" - a series of video shots depicting a high-level concept or story (action/drama scene, news segment etc.). This is an important preliminary step for effective analysis of heterogeneous video content, and can help with building a table-of-contents, enabling fast browsing and skipping between scenes, and identifying the contextual boundaries of the content in the video. In this talk ...
[לנוסח המלא]
סדנת: "מתכנתים בצוותא"
event date icon
יום שני, 9.4.2018, 18:30
event location icon
חדר 337 טאוב.
הפקולטה למדעי המחשב שמחה להזמינכם לשנייה בסדרת סדנאות ללימוד כלים יישומיים לעבודה על קוד, פיתוח וניהול פרוייקטים, והפעם בנושא: "איך עובדים על פרוייקט קוד ביחד (ונשארים חברים)": - איך מחלקים עבודה כשאין זמן להיפגש? - מה עושים כשאחד השותפים חזק/חלש מאחרים? - כיצד עובדים בשיטת תכנות בארבע ידיים ומקלדת אחת (Pair Programming)? - כיצד מתאמים ציפיות בעבודה קבוצתית? הסדנה תתקיים ביום שני, 9 באפריל, 2018, בחדר 337,  בשעה 18:30 ותימשך כשעה וחצי. השתתפות מותנית בהרשמה ...
[לנוסח המלא]
Compile-Time LL(1) Parsing in Java's Typesystem
event speaker icon
אורי רוט
event date icon
יום רביעי, 28.3.2018, 13:30
event location icon
טאוב 401
A recent result shows that the Java type system and its type-checker are mighty enough to emulate deterministic pushdown automata (DPDAs), and hence, capable (disregarding cost) to recognize deterministic context free languages (DCFGs). The problem is of concrete practical value, since, as it turns out, this recognition is essential for automatic generation of fluent APIs from their specification. This work advances the state of knowledge, in presenting, for the first, an efficient (specif- ically linear ...
[לנוסח המלא]
Quality and Algebraic Representation of Tests
event speaker icon
דור מעין
event date icon
יום רביעי, 28.3.2018, 12:30
event location icon
טאוב 401
The quality of unit tests gains substantial importance in modern software systems. We explore the way in which Junit tests are written in real world Java systems. We analyse 112 Java repositories and measure the quality of unit tests by finding patterns which indicate good practices of coding. Our results show that the quality of real world unit tests is low, and that in many cases, unit tests don’t follow the well-known recommendations for writing ...
[לנוסח המלא]
Serializability Reasoning for Eventual Consistency
event speaker icon
Dimitar Dimitrov - GUEST LECTURE
event date icon
יום שלישי, 27.3.2018, 14:30
event location icon
חדר 337 טאוב.
High-availability requirements in modern software triggered the widespread adoption of eventually consistent data stores. Unfortunately, reasoning about the correctness of programs running under eventual consistency is a challenging task, largely due to the possibility of very weak system behaviors. In this talk, I will present new automated techniques that help developers precisely identify problematic weak behaviors. Our starting point will be to adopt conflict serializability as a correctness criterion. We then give a new generalized ...
[לנוסח המלא]
Pixel Club: "Zero-Shot" Super-Resolution using Deep Internal Learning
event speaker icon
אסף שוחר (מכון ויצמן למדע)
event date icon
יום שלישי, 27.3.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Deep Learning has led to a dramatic leap in Super-Resolution (SR) performance in the past few years. However, being supervised, these SR methods are restricted to specific training data, where the acquisition of the low-resolution (LR) images from their high-resolution (HR) counterparts is predetermined (e.g., bicubic downscaling), without any distracting artifacts (e.g., sensor noise, image compression, non-ideal PSF, etc). Real LR images, however, rarely obey these restrictions, resulting in poor SR results by SotA (State ...
[לנוסח המלא]
When Codes for Storage Systems Meet Storage Systems
event speaker icon
Gala Yadgar - CS-Lecture
event date icon
יום שלישי, 27.3.2018, 10:30
event location icon
חדר 601 טאוב.
Large-scale storage systems lie at the heart of the big data revolution. As these systems grow in scale and capacity, their complexity grows accordingly, building on new storage media, hybrid memory hierarchies, and distributed architectures. Numerous layers of abstraction hide this complexity from the applications, but also hide valuable information that could improve the system's performance considerably. I will demonstrate how to bridge this semantic gap in the context of erasure codes, which are used ...
[לנוסח המלא]
אירוע מחקר מטעם eBay במדעי המחשב
event date icon
יום חמישי, 22.3.2018, 10:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
חברת תקיים אירוע ייעודי לסטודנטים לתארים מתקדמים ביום חמישי, 22 במרס, 2018, בין השעות 10:30-12:00, בחדר 337, בניין טאוב למדעי המחשב. בתוכנית דברי פתיחה עם עידו גיא, ראש המחקר בישראל, הרצאת מחקר עם דר' קירה רדינסקי, מדענית ראשית ב- וסבב שאלות ותשובות. תוכנית מלאה ופרטים נוספים במודעה המצורפת. המעוניינים להשתתף מתבקשים להירשם מראש.   כולם מוזמנים!  
[לנוסח המלא]
היום! שלב הגמר - תחרות הפרוייקט המצטיין בחסות אמדוקס 2018
event date icon
יום רביעי, 21.3.2018, 12:30
event location icon
אודיטוריום 2, בניין טאוב למדעי המחשב
הנכם מוזמנים להצגת הפרוייקטים שעלו לגמר בתחרות הפרוייקט המצטיין 2018. הצוותים המתמודדים יציגו את מחקריהם ויענו לשאלות השופטים והקהל. האירוע יתקיים ביום רביעי, 21 במרס, 2018, בין השעות 12:30-15:00, באודיטוריום טאוב 2, בניין טאוב למדעי המחשב כולם מוזמנים לעודד, לתמוך ולהיחשף לפרוייקטים מצטיינים.
[לנוסח המלא]
Theory Seminar: The Firing Squad Problem Revisited
event speaker icon
שלמה מורן (מדעי המחשב, טכניון)
event date icon
יום רביעי, 21.3.2018, 12:30
event location icon
טאוב 201
In the classical firing squad problem, an unknown number of nodes represented by identical finite states machines is arranged on a line and in each time unit each node may change its state according to its neighbors' states. Initially all nodes are passive, except one specific node located at an end of the line, which issues a fire command. This command needs to be propagated to all other nodes, so that eventually all nodes simultaneously ...
[לנוסח המלא]
Cued Person Identification From Motion
event speaker icon
איגור קביאטקובסקי
event date icon
יום רביעי, 21.3.2018, 11:30
event location icon
טאוב 601
We introduce a new approach for identifying individuals based on their motion patterns in interactive scenarios. We formalize the identification process in the context of a sequential message exchange session between the subject and the system. The subject is modeled with a probabilistic generative model inspired by the Human Information Processing (HIP) paradigm. At each stage, the system presents a visual stimulus (a cue) to the subject and records their motion response. The cue is ...
[לנוסח המלא]
Cued Person Identification From Motion
event speaker icon
איגור קביאטקובסקי
event date icon
יום רביעי, 21.3.2018, 11:30
event location icon
טאוב 601
We introduce a new approach for identifying individuals based on their motion patterns in interactive scenarios. We formalize the identification process in the context of a sequential message exchange session between the subject and the system. The subject is modeled with a probabilistic generative model inspired by the Human Information Processing (HIP) paradigm. At each stage, the system presents a visual stimulus (a cue) to the subject and records their motion response. The cue is ...
[לנוסח המלא]
Pixel Club: Why is it So Difficult to Obtain Medical Images for R&D ?!
event speaker icon
נחום קריתי (אונ' תל-אביב)
event date icon
יום ראשון, 18.3.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Research in medical image analysis, especially after the deep-learning revolution, relies on access to medical image databases. Specific categories of medical images have been made available as “challenges” to facilitate scientific benchmarking. Nevertheless, R&D of real-world clinical technologies usually requires data acquired while diagnosing and treating particular classes of patients using specific protocols and equipment. Such data cannot be normally found in common challenges, and can only be obtained from hospitals and health care providers. ...
[לנוסח המלא]
Improved Bounds for Online Multi-level Aggregation
event speaker icon
אוהד טלמון
event date icon
יום רביעי, 7.3.2018, 11:30
event location icon
טאוב 601
We consider a multi-level aggregation problem in a weighted rooted tree, studied recently by Bienkowski et al. In this problem requests arrive over time at the nodes of the tree, and each request specifies a non-decreasing waiting costs. A request is served by sending it to the root before its deadline at a cost equal to the weight of the path from the node in which it resides to the root. However, requests from different ...
[לנוסח המלא]
ceClub: Cascading Denial-of- Service Attacks on Wi-Fi Networks
event speaker icon
דוד סטרובינסקי (אונ' בוסטון)
event date icon
יום רביעי, 7.3.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
We unveil the existence of a vulnerability in Wi-Fi (802.11) networks, which allows an adversary to remotely launch a Denial-of- Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards and extensive ns-3 ...
[לנוסח המלא]
Sensory Routines for Indoor Autonomous Quad-Copter
event speaker icon
אמיר גבע
event date icon
יום שלישי, 6.3.2018, 15:30
event location icon
טאוב 601
Quad-Copters are versatile unmanned aircraft that are used for a myriad of tasks from manual aerial photography to autonomous surveillance. After their initial success in outdoors scenarios, indoor autonomous activity has recently been getting attention in research. Unlike the outdoor environment, which offers cheap and easy localization in the form of GPS, and usually lacks meaningful obstacles, indoor autonomous flight lacks a common means of localization and the tight spaces are fraught with every day ...
[לנוסח המלא]
Sensory Routines for Indoor Autonomous Quad-Copter
event speaker icon
אמיר גבע
event date icon
יום שלישי, 6.3.2018, 15:30
event location icon
טאוב 601
Quad-Copters are versatile unmanned aircraft that are used for a myriad of tasks from manual aerial photography to autonomous surveillance. After their initial success in outdoors scenarios, indoor autonomous activity has recently been getting attention in research. Unlike the outdoor environment, which offers cheap and easy localization in the form of GPS, and usually lacks meaningful obstacles, indoor autonomous flight lacks a common means of localization and the tight spaces are fraught with every day ...
[לנוסח המלא]
Sensory Routines for Indoor Autonomous Quad-Copter
event speaker icon
אמיר גבע
event date icon
יום שלישי, 6.3.2018, 15:30
event location icon
טאוב 601
Quad-Copters are versatile unmanned aircraft that are used for a myriad of tasks from manual aerial photography to autonomous surveillance. After their initial success in outdoors scenarios, indoor autonomous activity has recently been getting attention in research. Unlike the outdoor environment, which offers cheap and easy localization in the form of GPS, and usually lacks meaningful obstacles, indoor autonomous flight lacks a common means of localization and the tight spaces are fraught with every day ...
[לנוסח המלא]
Sensory Routines for Indoor Autonomous Quad-Copter
event speaker icon
אמיר גבע
event date icon
יום שלישי, 6.3.2018, 15:30
event location icon
טאוב 601
Quad-Copters are versatile unmanned aircraft that are used for a myriad of tasks from manual aerial photography to autonomous surveillance. After their initial success in outdoors scenarios, indoor autonomous activity has recently been getting attention in research. Unlike the outdoor environment, which offers cheap and easy localization in the form of GPS, and usually lacks meaningful obstacles, indoor autonomous flight lacks a common means of localization and the tight spaces are fraught with every day ...
[לנוסח המלא]
Sensory Routines for Indoor Autonomous Quad-Copter
event speaker icon
אמיר גבע
event date icon
יום שלישי, 6.3.2018, 15:30
event location icon
טאוב 601
Quad-Copters are versatile unmanned aircraft that are used for a myriad of tasks from manual aerial photography to autonomous surveillance. After their initial success in outdoors scenarios, indoor autonomous activity has recently been getting attention in research. Unlike the outdoor environment, which offers cheap and easy localization in the form of GPS, and usually lacks meaningful obstacles, indoor autonomous flight lacks a common means of localization and the tight spaces are fraught with every day ...
[לנוסח המלא]
Hardware Security Seminar: The Journey of Intel® Software Guard Extension (SGX)
event speaker icon
איתי ענתי (אינטל)
event date icon
יום ראשון, 4.3.2018, 09:30
event location icon
טאוב 601
In 2015, Intel launched its 6th generation Core, codenamed Skylake, that implements a new ISA for security – Intel® SGX. The talk will provide a short intro to SGX for the unfortunates who have not been exposed to Intel® SGX yet, but will focus mainly around the architectural enhancements since its first introduction and some of the design choices that were made. Short Bio: Ittai Anati is a Senior Principal Engineer at Intel Corporation’s CPU ...
[לנוסח המלא]
Hash Code 2018 של גוגל במדעי המחשב
event date icon
יום חמישי, 1.3.2018, 18:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
גוגל תארח את Hub for the Online Qualification Round of Hash Code 2018 - בפקולטה למדעי המחשב, ביום ה', 1 במרס 2018, ב-18:30 (זמן אירופה), בחדר 337, בניין טאוב למדעי המחשב. המעוניינים לקחת חלק מתבקשים להירשם מראש.
[לנוסח המלא]
Boosting Selective Regression with Ensembles
event speaker icon
עמית גרוס
event date icon
יום ראשון, 25.2.2018, 08:30
event location icon
טאוב 601
Using selective regression, it is possible to increase accuracy of predictions by abstaining from answering when there is insufficient knowledge. This work is about increasing the accuracy of selective regression even further and using simple selective models to create a more complex one, by using an ensemble of selective regressors. We demonstrate how to achieve improved accuracy by using two methods to build our ensemble. In the first approach, we first split the samples in ...
[לנוסח המלא]
End to End Deep Neural Network Frequency Demodulation of Speech Signals
event speaker icon
דן אלבז
event date icon
יום רביעי, 21.2.2018, 16:30
event location icon
טאוב 601
Frequency modulation (FM) is a form of radio broadcasting which is widely used nowadays and has been for almost a century. The widest use of FM is for radio broadcasting, which is commonly used for transmitting audio signal representing voice. Due to the effect of various distortions, noise conditions and other impairments imposed on the transmitted signal, the detection reliability severely deteriorates. As a result thereof, the intelligibility and quality of the detected speech decreases ...
[לנוסח המלא]
Access Patterns and Adaptive Caching
event speaker icon
אוהד נח איתן
event date icon
יום חמישי, 15.2.2018, 13:30
event location icon
טאוב 601
Trying to predict which items are likely to be accessed in the near future is the basis for most cache management policies. Storage workloads are often characterized by their level of frequency bias and their level of recency bias. The former captures how well the access frequency serves as a predictor for future accesses while the latter indicates how well does access recency predicts the future. Existing cache management policies have been grappling with the ...
[לנוסח המלא]
IOMMU-resistant DMA attacks
event speaker icon
גיל קופפר
event date icon
יום רביעי, 14.2.2018, 18:00
event location icon
טאוב 601
The direct memory access (DMA) mechanism allows I/O devices to independently access the memory without CPU involvement, improving performance but exposing systems to malicious DMA attacks. Hardware vendors therefore introduced IOMMUs (I/O memory management units), allowing operating systems to defend themselves by restricting DMAs to specific memory locations. When configured correctly, the latest generation of IOMMUs is thus considered an appropriate solution to the problem. We challenge this perception and uncover a new type of ...
[לנוסח המלא]
Network Measurement meets Virtual Switching
event speaker icon
רן בן-בשט
event date icon
יום רביעי, 14.2.2018, 14:30
event location icon
טאוב 601
In modern cloud infrastructures, each physical server often runs multiple virtual machines and employs a software Virtual Switch (VS) to handle their traffic. In addition to switching, the VS performs network measurements, such as identifying the most frequent flows, which are essential for networking applications such as load balancing and intrusion detection. Unlike traditional streaming algorithms, which minimize the space requirements, the bottleneck in virtual switching measurement is the CPU utilization. In this talk, I ...
[לנוסח המלא]
Pixel Club: Probabilistic Gathering of Agents With Simple Sensors
event speaker icon
אריאל בראל (TASP)
event date icon
יום שלישי, 13.2.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
We present novel probabilistic gathering algorithms for agents that can only detect the presence of other agents in front or behind them. The agents act in the plane and are identical and indistinguishable, oblivious and lack any means of direct communication. They do not have a common frame of reference in the plane and choose their orientation (direction of possible motion) at random. The analysis of the gathering process assumes that the agents act synchronously ...
[לנוסח המלא]
Shape Synthesis and Analysis by Deformable Models
event speaker icon
מתן סלע
event date icon
יום חמישי, 8.2.2018, 11:30
event location icon
טאוב 401
The surface separating the interior of a given object or body from its exterior defines a shape. A key challenge in computer vision is to recover the shape from missing, partial, sparse or noisy observations such as images, depth maps or position sensors. Although in theory, surfaces can be arbitrarily embedded in space, the underlying structure of deformable shapes, such as the human face, is often driven by just a few degrees of freedom. For ...
[לנוסח המלא]
Relational Framework for Information Extraction
event speaker icon
יואב נחשון
event date icon
יום רביעי, 7.2.2018, 13:30
event location icon
טאוב 401
Textual data written in some natural language carries concealed and valuable information within. Information Extraction (IE) is the task of automatically extracting this information in a structured representation. Standard relational database systems, who are highly suitable for representing structured information, are in fact incapable of performing deep text analysis, and therefore out-of-database solutions are often applied. However, this approach is prone to laborious development processes, complex and tangled programs, and inefficient control flows. These deficiencies ...
[לנוסח המלא]
SciLMM: Computing heritability with millions of individuals
event speaker icon
טל שור
event date icon
יום רביעי, 7.2.2018, 11:30
event location icon
טאוב 601
The rapid digitization of genealogical and medical records enables the assembly of extremely large pedigree records spanning millions of individuals. Such pedigrees provide the opportunity to answer genetic and epidemiological questions in scales much larger than previously possible. Linear mixed models (LMMs) are often used for analysis of pedigree data. However, LMMs cannot naturally scale to large pedigrees spanning millions of individuals, owing to their steep computational and storage requirements. Here we propose a novel ...
[לנוסח המלא]
Efficiently combining privacy and availability in distributed storage systems
event speaker icon
רומן שור
event date icon
יום רביעי, 7.2.2018, 10:30
event location icon
טאוב 601
When sensitive data is stored in the cloud, the only way to ensure its secrecy is by encrypting it before it is uploaded. Not only is encryption itself computationally expensive but the encryption keys must also be safely stored and the data decrypted whenever it is downloaded. The emerging multi-cloud model, in which data is stored redundantly in two or more independent clouds, provides an opportunity to protect sensitive data with secret-sharing schemes. This approach ...
[לנוסח המלא]
אירוע חגיגי במלאת 40 שנה לאלגוריתם למפל-זיו
event date icon
יום שני, 5.2.2018, 14:00
event location icon
חדר 1003, בניין מאייר, הפקולטה להנדסת חשמל
הנכם מוזמנים לטקס והרצאה מיוחדת במלא 40 שנה לאלגוריתם למפל-זיו, מפי פרופ' מאיר פדר מביה"ס להנדסת חשמל באוניברסיטת תל-אביב, בנושא: "Beyond Compression: Lempel-Ziv in Learning and Prediction". האירוע יתקיים ביום שני, 5 בפברואר, 2018, בשעה 14:00, באודיטוריום 1003, בניין מאייר להנדסת חשמל, הטכניון. בתוכנית: 14:00 - כיבוד קל 14:30 - טקס 15:00 - הרצאה פרטים נוספים. כולם מוזמנים!
[לנוסח המלא]
Theory Seminar: What Cannot Be Learned With Bounded Memory
event speaker icon
דנה מושקוביץ (אונ' טקסס באוסטין)
event date icon
יום רביעי, 31.1.2018, 12:30
event location icon
טאוב 201
How does computational learning change when one cannot store all the examples one sees in memory? This question has seen a burst of interest in the past couple of years, leading to the surprising theorem that there exist simple concepts (parities) that require an extraordinary amount of time to learn unless one has quite a lot of memory. In this work we show that in fact most concepts cannot be learned without sufficient memory. This ...
[לנוסח המלא]
Ranked Enumeration of Tree Decompositions
event speaker icon
נעם רביד
event date icon
יום רביעי, 31.1.2018, 11:30
event location icon
טאוב 601
A tree decomposition of a graph facilitates computations by grouping vertices into bags that are interconnected in an acyclic structure; hence their importance in a plethora of problems such as query evaluation over databases and inference over probabilistic graphical models. The relative benefit from different tree decompositions is measured by diverse (sometime complex) cost functions that vary from one application to another. For generic cost functions like width and fill-in, an optimal tree decomposition can ...
[לנוסח המלא]
ceClub: Closing the Loop on Secure Operating System Design
event speaker icon
עמית לוי (אונ' סטנפורדד)
event date icon
יום רביעי, 31.1.2018, 11:30
event location icon
טאוב 301
Secure system design should be guided by two principles: (1) system security should not impede third-party developers, who are often the main source of innovation, and (2) systems that secure third-party extensions also improve security by reducing the amount of specially-privileged first-party code. Unfortunately, very few systems today adhere to these principles. This is not merely a result of poor system building. It is hard to design highly extensible systems that are both secure and ...
[לנוסח המלא]
Pixel Club: Improving Semantic Classification in Deep Learning Models
event speaker icon
יקיר מטרי (הנדסת חשמל, טכניון)
event date icon
יום שלישי, 30.1.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
We consider the image classification problem using deep models. Most of the works in the recent years consider only the flat precision (FP) measure as a benchmark. We follow a work done in recent years (called DeVISE), where a new measure named Hierarchical Precision (HP) is defined and used to measure the semantic accuracy of a classification model given an underlying hierarchy. While in DeVISE and other following works an extra side-information (e.g. textual corpus) ...
[לנוסח המלא]
Coding Theory: On the Metric Dimension of Cartesian Powers of a Graph
event speaker icon
ניקיטה פוליאנסקי (טכניון)
event date icon
יום ראשון, 28.1.2018, 14:30
event location icon
טאוב 601
A set of vertices S resolves a graph if every vertex is uniquely determined by its vector of distances to the vertices in S. The metric dimension of a graph is the minimum cardinality of a resolving set of the graph. Fix a connected graph G on q ≥ 2 vertices, and let M be the distance matrix of G. We prove that if there exists w ∈ Z q such that \sum_i w_i =0 ...
[לנוסח המלא]
CGGC Seminar: Algorithms for Geometrically-Structured Optimization
event speaker icon
ג'סטין סולומון (MIT)
event date icon
יום ראשון, 28.1.2018, 13:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
Many problems in geometry processing, graph theory, and machine learning involve optimizations whose variables are defined over a geometric domain. The geometry of the domain gives rise to geometric structure in the optimization problem itself. In this talk, I will show how leveraging geometric structure in the optimization problem gives rise to efficient and stable algorithms applicable to a variety of application domains. In particular, I will describe new methods for problems arising in shape ...
[לנוסח המלא]
Inferring Cancer Dependencies on Metabolic Genes from Large-Scale Genetic Screens
event speaker icon
שובל לגזיאל
event date icon
יום חמישי, 25.1.2018, 12:30
event location icon
טאוב 601
Alterations in metabolic activity in tumors provide novel means to selectively target cancer cells. A powerful tool for identifying genes essential for cancer cell proliferation and survival is genome-scale RNAi and CRISPR-based genetic silencing screens. Integration of the measured gene essentiality datasets with genomic characterization of genes was shown to provide mechanistic understanding of tumor-specific gene essentiality. Here, we analyze the essentiality of metabolic enzyme-coding genes in cancer by utilizing measurements from recent large-scale genetic ...
[לנוסח המלא]
Processing Human Language with Recurrent Neural Networks and Multiple Training Signals
event speaker icon
Yoav Goldberg - CS-Lecture
event date icon
יום חמישי, 25.1.2018, 10:30
event location icon
חדר 601 טאוב.
While deep learning methods in Natural Language Processing are arguably overhyped, recurrent neural networks (RNNs), and in particular gated recurrent networks like the LSTM, emerge as very capable learners for sequential data. Thus, my group started using them everywhere. After briefly explaining what they are and why they are and giving a birds-eye overview of our work, I will describe a line of work in which we use LSTM encoders in a multi-task learning scenario. ...
[לנוסח המלא]
ערב חשיפה לרשתות תקשורת
event date icon
יום רביעי, 24.1.2018, 18:30
event location icon
טאוב 401
המעבדה לתקשורת מחשבים (LCCN) בפקולטה למדעי המחשב מזמינה אתכם לערב חשיפה לרשתות תקשורת - להכיר מקרוב את פעילות המעבדה, המחקרים והפרוייקטים שהיא מציעה ואת הצוות המוביל אותם. בהשתתפות: - פרופ' דני רז - ראש המעבדה: הרשת – לא מה שחשבתם - איציק אשכנזי - מהנדס המעבדה: רכיבי רשת מתוכנתים בשפת P4 - דניאל בר-לב - דירקטור ב-MEF CTO: הרשת השלישית - הצגת פרוייקט הסטודנטים לתואר ראשון סיון בן-חיים וניר חכמוביץ (בשיתוף MEF וחברת Cisco העולמית) ...
[לנוסח המלא]
On The Existence of q-Fano Planes
event speaker icon
ניב הוקר
event date icon
יום רביעי, 24.1.2018, 16:30
event location icon
טאוב 601
A q-Steiner System S_q(t,k,n) is set S of k-subspaces in a space of dimension n over a finite field, such that each t-subspace of the same space is contained in exactly one subspace from S. They have applications in random network Coding, but except for one set of parameters for which t>1, their existence is unknown. Specifically, the q-Fano plane S_q(2,3,7) is the smallest structure for which its existence is unknown. In the seminar I ...
[לנוסח המלא]
יריד חשיפה לפרוייקטים במציאות מדומה ורבודה
event date icon
יום רביעי, 24.1.2018, 12:30
event location icon
כניסת הקומה - בניין טאוב למדעי המחשב
המרכז לגרפיקה וחישוב גיאומטרי ) והמעבדה לעיבוד גיאומטרי של תמונות ) מזמינים אתכם ליריד חשיפה והרשמה מוקדמת לקורס: מציאות וירטואלית\רבודה בשיתוף אינטל ורפאל. האירוע יתקיים ביום ד', 24 בינואר 2018, 12:30-14:30, בלובי בניין טאוב למדעי המחשב. כולם מוזמנים!
[לנוסח המלא]
Theory Seminar: The Discrete-logarithm Problem with Preprocessing
event speaker icon
הנרי קוריגן-גיבס (אונ' סטנפורד)
event date icon
יום רביעי, 24.1.2018, 12:30
event location icon
טאוב 201
We study discrete-log algorithms that use preprocessing. In our model, an adversary may use a very large amount of precomputation to produce an "advice" string about a specific group (e.g., NIST P-256). In a subsequent online phase, the adversary's task is to use the preprocessed advice to quickly compute discrete logarithms in the group. Motivated by surprising recent preprocessing attacks on the discrete-log problem, we study the power and limits of such algorithms. In particular, ...
[לנוסח המלא]
ceClub: Recent Developments in Linkography Based Cyber Security
event speaker icon
רוברט מיטצ'ל (Sandia National Laboratories)
event date icon
יום רביעי, 24.1.2018, 11:30
event location icon
טאוב 301
Cyber attacks on critical cyber systems are not decreasing in frequency or complexity. Aggressors choose the time and place of these engagements; protectors must identify, research and develop defensive techniques that provide an asymmetric advantage. A static, data-driven, preventative, automated defense is a losing strategy; an effective defense must be dynamic, behavioral, responsive and capitalize on a human in the loop. We propose human and machine performed linkography to detect, correlate, attribute and predict attacker ...
[לנוסח המלא]
יריד פרוייקטים בפיתוח תוכנה ב-IoT ו-Android
event date icon
יום שלישי, 23.1.2018, 12:30
event location icon
כניסת הקומה - בניין טאוב למדעי המחשב
המעבדה לפיתוח מערכות ותוכנה (SSDL) בפקולטה למדעי המחשב מזמינה אתכם לבקר ביריד פרוייקטים בפיתוח תוכנה ב-IoT ו-Android ובפרוייקט השנתי ולהתרשם מפרוייקטים חדשים אשר יוצגו על-ידי צוותי הפיתוח. האירוע יתקיים ביום שלישי, 23 בינואר 2018, בין השעות 12:30-14:30, בקומת הכניסה, בניין טאוב למדעי המחשב. כולם מוזמנים! להלן הפרוייקטים המציגים: טלמטריה אלחוטית למכונית פורמולה מערכת שמקבלת ממחשב מכונית מרוץ אוטונומית משתני תנועה בזמן אמת, ומציגה אותם על מחשב מרוחק באמצעות פרוטוקול תקשורת חדשני שליטה מרחוק ברובוט עזרה ...
[לנוסח המלא]
On the Expressive Power of ConvNets and RNNs as a Function of their Architecture
event speaker icon
Amnon Shashua - COLLOQUIUM LECTURE -
event date icon
יום שלישי, 23.1.2018, 10:30
event location icon
CS טאוב Build. Auditorium 2
Expressive efficiency refers to the relation between two architectures A and B, whereby any function realized by B could be replicated by A, but there exists functions realized by A, which cannot be replicated by B unless its size grows significantly larger. For example, it is known that deep networks are exponentially efficient with respect to shallow networks, in the sense that a shallow network must grow exponentially large in order to approximate the functions ...
[לנוסח המלא]
A Persistent Queue for Non-Volatile Memory
event speaker icon
מיכל פרידמן
event date icon
יום שני, 22.1.2018, 14:30
event location icon
טאוב 601
Non-volatile memory is expected to coexist with (or even displace) volatile DRAM for main memory in upcoming architectures. This has led to increasing interest in the problem of designing and specifying durable data structures that can recover from system crashes. Data structures may be designed to satisfy stricter or weaker durability guarantees to provide a balance between the strength of the provided guarantees and performance overhead. This seminar proposes three novel implementations of a concurrent ...
[לנוסח המלא]
Coding Theory: Private Information Retrieval in Distributed Storage Systems
event speaker icon
ייווי זאנג (מדעי המחשב, טכניון
event date icon
יום ראשון, 21.1.2018, 14:30
event location icon
טאוב 601
A private information retrieval (PIR) protocol allows a user to retrieve a data item from a database without revealing any information about the identity of the data item to a certain coalition of servers. In this talk, we will go over the recent results on PIR, especially on PIR in MDS-coded databases with colluding servers. We will also mention various other PIR models including PIR with robust/Byzantine servers or PIR with arbitrary collusion patterns.
[לנוסח המלא]
On Polynomial time Constructions of Minimum Height Decision Tree
event speaker icon
וסים מח'ול
event date icon
יום רביעי, 17.1.2018, 14:30
event location icon
טאוב 601
We address the problem of constructing a minimum height decision tree of a class C in polynomial time. This problem has many interesting applications that include, to name a few, computer vision, group testing, exact learning from membership queries, and game theory. We further study the combinatorial measure, the extended teaching dimension, ETD(C) of a class C. We show an algorithm that achieves a ETD(C)-approximation of the optimal height. When the extended dimension is small, ...
[לנוסח המלא]
Theory Seminar: Removal Lemma For Ordered Graphs and Matrices
event speaker icon
עומרי בן-אליעזר )אונ' תל-אביב)
event date icon
יום רביעי, 17.1.2018, 12:30
event location icon
טאוב 201
The triangle removal lemma, proved by Ruzsa and Szemerédi in 1976, states that if a graph contains a small number of triangles then it can be made triangle-free by a small number of edge deletions. The triangle removal lemma found applications in several areas of computer science and mathematics. In a series of works, culminating in a result of Alon and Shapira from 2005, it was shown that in fact, any hereditary graph property P ...
[לנוסח המלא]
ceClub: Redesigning Bitcoin's Fee Market
event speaker icon
רון לביא (תעשייה וניהול, טכניון)
event date icon
יום רביעי, 17.1.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
The security of the Bitcoin system is based on having a large amount of computational power in the hands of honest miners. Such miners are incentivized to join the system and validate transactions by the payments issued by the protocol to anyone who creates blocks. As new bitcoins creation rate decreases (halving every 4 years), the revenue derived from transaction fees start to have an increasingly important role. We argue that Bitcoin's current fee market ...
[לנוסח המלא]
למה יזמות? וצעדים ראשונים
event speaker icon
מריוס נכט (צ'ק פוינט)
event date icon
יום שלישי, 16.1.2018, 18:30
event location icon
חדר 1003, בניין מאייר, הפקולטה להנדסת חשמל
מרכז היזמות בטכניון, הפקולטה להנדסת חשמל והפקולטה למדעי המחשב מזמינים אתכם להרצאת אורח של מריוס נכט, ממייסדי חברת צ'ק פוינט ויו"ר החברה, ואשר בשנים האחרונות משקיע פעיל במיזמים בתחום הביומד, כולל תרופות, מיכשור רפואי ושירותי בריאות דיגיטליים. נכט ישתף אתכם בניסיונו העשיר וידבר על למה בכלל יזמות ועל הצעדים הראשונים בעולם הזה. מוזמנים סטודנטים מכל הפקולטות, בכל התארים.
[לנוסח המלא]
Personalization is a Two-Way Street
event speaker icon
Ronny Lempel - COLLOQUIUM LECTURE
event date icon
יום שלישי, 16.1.2018, 14:30
event location icon
חדר 337 טאוב.
Recommender systems are first and foremost about matching users with items the systems believe will delight them. The "main street" of personalization is thus about modeling users and items, and matching per user the items predicted to best satisfy the user. This holds for both collaborative filtering and content-based methods. In content discovery engines, difficulties arise from the fact that the content users natively consume on publisher sites does not necessarily match the sponsored content ...
[לנוסח המלא]
Pixel Club: Large Scale Recovery of Scattering Media: The Atmosphere as a Case Study
event speaker icon
עמית איידס (הנדסת חשמל, טכניון)
event date icon
יום שלישי, 16.1.2018, 14:30
event location icon
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
The composition of the earth's atmosphere has a vital effect on life on earth. Accordingly, the task of monitoring its contents, i.e. aerosol and cloud concentrations, draws much interest in science and engineering. Currently, the methods employed in monitoring the atmosphere require expensive equipment, retrieve only partial data or use simplified models (e.g. horizontally uniform atmosphere). To address these shortcomings, in this thesis, we propose both a novel system and new algorithms to sense and ...
[לנוסח המלא]
Pixel Club: One-Sided Unsupervised Domain Mapping via Distance Correlations
event speaker icon
שגיא בן-נעים (אונ' תל-אביב)
event date icon
יום שלישי, 16.1.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
In unsupervised domain mapping, the learner is given two unmatched datasets A and B. The goal is to learn a mapping G_AB that translates a sample in A to the analog sample in B. Recent approaches have shown that when learning simultaneously both G_AB and the inverse mapping G_BA, convincing mappings are obtained. In this work, we present a method of learning G_AB without learning G_BA. This is done by learning a mapping that maintains ...
[לנוסח המלא]
Concurrent Approximate Frugal Counting
event speaker icon
דולב אדס
event date icon
יום ראשון, 14.1.2018, 13:30
event location icon
טאוב 601
Counting network flows’ statistics is at the heartof network monitoring, network security, and similar networkfunctionalities.Virtualization in datacenters as well as networkfunction virtualization (NFV) trends push traditional hardwareimplementations intovirtual switchesrunning as software onthe host’s CPU.The problem is that Bloom filter based datastructures for maintaining flows’ statistics such as count-minsketch and spectral Bloom filter are not optimal for softwareimplementations. TinyTable is a recent alternative which wasshown to be better adapted for being run in software, as itonly ...
[לנוסח המלא]
טקס הענקת מלגות לסטודנטיות מצטיינות
event date icon
יום חמישי, 11.1.2018, 15:00
event location icon
חדר 337, בניין טאוב למדעי המחשב
הנכם מוזמנים לטקס הענקת מלגות לסטודנטיות מצטיינות בפקולטה למדעי המחשב ולהנדסת חשמל בטכניון מטכם חברת אינטל ו-DELL-EMC. האירוע יתקיים ביום חמישי, 11 בינואר 2018, בחדר 337 (קומה שלישית) בבניין טאוב למדעי המחשב בטכניון. פרטים נוספים ותוכנית מלאה במודעה המצורפת. כולם מוזמנים!
[לנוסח המלא]
Scalable Data Extraction Via Program Synthesis
event speaker icon
עדי עומָרי
event date icon
יום חמישי, 11.1.2018, 12:30
event location icon
טאוב 601
Web extraction is an important research topic that has been studied extensively, receiving a lot of attention and focus. Large amounts of data are produced and consumed online in a continuous and growing rate. The ability to collect and analyze these data has become essential for enabling a wide range of applications and improving the effectiveness of modern businesses. Web extraction methods facilitate the collection and analysis of these data by transforming the human friendly ...
[לנוסח המלא]
Theory Seminar: Testing Bounded Arboricity
event speaker icon
דנה רון (אונ' תל-אביב)
event date icon
יום רביעי, 10.1.2018, 12:30
event location icon
טאוב 201
In this work we consider the problem of testing whether a graph has bounded arboricity. The family of graphs with bounded arboricity includes, among others, bounded-degree graphs, all minor-closed graph classes (e.g. planar graphs, graphs with bounded treewidth) and randomly generated preferential attachment graphs. Graphs with bounded arboricity have been studied extensively in the past, in particular since for many problems they allow for much more efficient algorithms and/or better approximation ratios. We present a ...
[לנוסח המלא]
ceClub: Coded Caching for Content Distribution Networks
event speaker icon
ברק פרבמן (הנדסת חשמל, טכניון)
event date icon
יום רביעי, 10.1.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Caching is the most effective practice for reducing delays and congestion in networks aimed at content distribution. In this work we address the setup of multiple Internet service providers (ISPs) sharing a federated cache. When multiple ISPs with different demands share a cache, storage cost can be reduced when the cache is coded, that is, storing objects that are XORs of multiple content objects. The talk will present our results on low-complexity methods for coded ...
[לנוסח המלא]
Computational Challenges and Algorithms in Planning for Robotic Systems
event speaker icon
Oren Salzman - CS-Lecture
event date icon
יום רביעי, 10.1.2018, 10:30
event location icon
חדר 644 טאוב.
In recent years, robots have played an active role in everyday life: medical robots assist in complex surgeries, low-cost commercial robots clean houses and fleets of robots are used to efficiently manage warehouses. A key challenge in these systems is motion planning, where we are interested in planning a collision-free path for a robot in an environment cluttered with obstacles. While the general problem has been studied for several decades now, these new applications introduce ...
[לנוסח המלא]
Bridging the Gap between End-users and Knowledge Sources: Discovery, Selection and Utilization
event speaker icon
Yael Amsterdamer - COLLOQUIUM LECTURE
event date icon
יום שלישי, 9.1.2018, 14:30
event location icon
חדר 337 טאוב.
Increasingly adopted Web-based knowledge sources, such as knowledge graphs and crowdsourcing platforms, pose a great challenge in making them accessible to non-expert end-users. In particular, being unaware of the properties, structure and contents of available knowledge sources, end-users may not know which sources to use and in what manner. In this talk I will present several directions towards bridging this gap. First, we assist users in identifying adequate knowledge sources, via a declarative framework that ...
[לנוסח המלא]
Pixel Club: Weakly Supervised Learning for Mammogram Classification
event speaker icon
רמי בן-ארי (IBMׁ)
event date icon
יום שלישי, 9.1.2018, 11:30
event location icon
חדר 337, בניין טאוב למדעי המחשב
In several clinical routines such as mammography, the early detection of breast cancer has an enormous impact in the patient survival. Radiologists nowadays are overwhelmed by the imaging data coming from numerous screening and diagnostic tools. This puts pressure on the early detection of breast cancer has an enormous impact in the patient survival. Radiologists nowadays are overwhelmed by the imaging data coming from numerous screening and diagnostic tools. This puts pressure on the radiologists ...
[לנוסח המלא]
Cryptography Outside the Black Box
event speaker icon
Omer Paneth - CS-Lecture
event date icon
יום שלישי, 9.1.2018, 10:30
event location icon
חדר 601 טאוב.
Computational problems whose input is a program are central in Cryptography, as well as Complexity, Learning, and Optimization. The nature of such problems crucially depends on the way the program is accessed -- as a black box or explicitly by its implementation. In which settings can we exploit code to gain an advantage over black-box access? In Cryptography, we explore this question from two opposing perspectives: - Protecting Code: Can we obfuscate a program's code ...
[לנוסח המלא]
Designing Robust Sensing Matrix for Compressive Sensing and a Speeding-Up Convergence Method via SESOP with Multigrid
event speaker icon
טאו הונג
event date icon
יום שני, 8.1.2018, 14:30
event location icon
טאוב 601
In the previous research, people tend to optimize the sensing matrix to improve the signal reconstruction accuracy for compressive sensing (CS) system. However, they assume the signal is exactly sparse which is not true in practice. So we try to find a way to design a sensing matrix which is robust to the case when the signal is not exactly sparse. Moreover, we also take the complexity of sensing a signal into account in designing ...
[לנוסח המלא]
אירוע יאהו במדעי המחשב
event date icon
יום שני, 8.1.2018, 12:00
event location icon
חדר 337, בניין טאוב למדעי המחשב
חברת יאהו תקיים אירוע שנתי בפקולטה ביום שני, 8 בינואר, 2018, בין השעות 12:00-14:00, בחדר 337, בניין טאוב למדעי המחשב. בתוכנית הרצאת מחקר, שולחנות עגולים וכיבוד. תוכנית מלאה ופרטים נוספים במודעה המצורפת. כולם מוזמנים!
[לנוסח המלא]
Selective Classification for Deep Neural Networks
event speaker icon
יונתן גייפמן
event date icon
יום ראשון, 7.1.2018, 13:30
event location icon
טאוב 601
Selective classification techniques (also known as reject option) have not yet been considered in the context of deep neural networks (DNNs). These techniques can potentially significantly improve DNNs prediction performance by trading-off coverage. We propose a method to construct a selective classifier given a trained neural network. Our method allows a user to set a desired risk level. At test time, the classifier rejects instances as needed, to grant the desired risk (with high probability). ...
[לנוסח המלא]
Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples
event speaker icon
גייל וייס
event date icon
יום חמישי, 4.1.2018, 12:30
event location icon
טאוב 601
We address the problem of extracting an automaton from a trained recurrent neural network (RNN). We present a novel algorithm that uses exact learning and abstract interpretation to perform efficient extraction of a minimal automaton describing the state dynamics of a given RNN. We use Angluin's L* algorithm as a learner and the given RNN as an oracle, employing abstract interpretation of the RNN for answering equivalence queries. Our technique allows automaton-extraction from the RNN ...
[לנוסח המלא]
Evolving hardware and operating system interfaces through programmability
event speaker icon
Nadav Amit - CS-Lecture
event date icon
יום חמישי, 4.1.2018, 10:30
event location icon
חדר 601 טאוב.
Hardware and operating system interfaces should ideally enable to build performant systems that are also robust and secure. Alas, these goals frequently conflict, necessitating unavoidable compromises that promote one goal at the expense of another. I nevertheless contend that existing compromises---while inherently imperfect---are often suboptimal, and that improved tradeoffs can be devised using programmable software interfaces and hardware. I support this claim by presenting how programmable software interfaces can help to efficiently bridge the semantic ...
[לנוסח המלא]
איך להפסיק לפחד משינויי קוד: ניהול גרסאות עם git
event speaker icon
מאיה אנדרסון (יבמ מחקר)
event date icon
יום רביעי, 3.1.2018, 18:30
event location icon
יפורסם
הנכם מוזמנים לראשון בסדרת מפגשים במסגרת בסדנה טכנית בנושאים שונים, ביום רביעי, 3 בינואר 2018, בשעה 18:30. ההרצאה הראשונה מפי מאיה אנדרסון מ-י.ב.מ מחקר: איך להפסיק לפחד משינויי קוד: ניהול גרסאות עם git ההשתתפות מחייבת הרשמה מראש ומיקום ההרצאה יימסר בדוא"ל עם אישור ההרשמה.   כולם מוזמנים!
[לנוסח המלא]
קריירה אקדמית, איך עושים זאת?
event date icon
יום רביעי, 3.1.2018, 15:00
event location icon
חדר 337 טאוב.
אנו שמחים להזמין אתכם לשלישי בסדרת מפגשים בנושא קריירה וחיפוש עבודה, שייערך בפקולטה ביום רביעי, בינואר 2018, בשעה 15:00 בחדר 337, בניין טאוב למדעי המחשב. בתוכנית: 15:00 - פרופ' עירד יבנה: דברי פתיחה 15:05 - פרופ' מירי בן-חן: הרצאה על קידום מקצועי באקדמיה 15:35 - פאנל בנושא "קריירה אקדמית" בהשתתפות פרופ' מירי בן-חן, פרופ' בני קימלפלד, פרופ' איתן יעקבי ופרופ' עירד יבנה הסדנא ייעודית לסטודנטים לתארים מתקדמים במדעי המחשב.   להשתתפות אנא הי מראש.   ...
[לנוסח המלא]
Theory Seminar: Locally-Iterative Coloring below Szegedy-Vishwanathan’s Barrier
event speaker icon
מיכאל אלקין (אונ' בן-גוריון)
event date icon
יום רביעי, 3.1.2018, 12:30
event location icon
טאוב 201
We consider graph coloring and related problems in the distributed message-passing model. **Locally-iterative** algorithms are especially important in this setting. These are algorithms in which each vertex decides about its next color only as a function of the current colors in its 1-hop neighborhood. In STOC'93 Szegedy and Vishwanathan showed that any locally-iterative (\Delta + 1)-coloring algorithm requires Omega(\Delta \log \Delta + \log^* n) rounds, unless there exists "a very special type of coloring that ...
[לנוסח המלא]
ceClub: Side Channel Attacks on Implementations of Curve25519
event speaker icon
דניאל גנקין ויובל ירום (אונ' פנסילבניה, מרילנד ואדלייד)
event date icon
יום רביעי, 3.1.2018, 11:30
event location icon
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
In recent years, applications increasingly adopt security primitives designed from the start with built-in side channel protection. A concrete example is Curve25519, which has been recently standardized in RFC-7748. Dealing away with obvious leakage sources such as key-dependent branches and memory accesses, RFC-7748 dictates that implementations should use a highly regular Montgomery ladder scalar-by-point multiplication, a unified, branchless double-and-add formula and a constant-time argument swap within the ladder. Moreover, as Curve25519 provides innate protection from ...
[לנוסח המלא]
Theory Talk: The Edited Truth
event speaker icon
סאליט קליין (MIT)
event date icon
יום שלישי, 2.1.2018, 12:30
event location icon
'
We introduce two new cryptographic notions in the realm of public and symmetric key encryption. * Encryption with invisible edits is an encryption scheme with two tiers of users: “privileged” and “unprivileged”. Privileged users know a key pair (pk,sk) and “unprivileged” users know a key pair (pk_e,sk_e) which is associated with an underlying edit e to be applied to messages encrypted. When an unprivileged user attempts to decrypt a ciphertext generated by a privileged user ...
[לנוסח המלא]
Pixel Club: Sparse Continuous Wavelet Transforms via a Wavelet-Plancherel Theory
event speaker icon
רון לביא (אונ' תל-אביב)
event date icon
יום שלישי, 2.1.2018, 11:30
event location icon
טאוב 401
It is well known that certain classes of signals can be effectively represented using a wavelet basis or a wavelet frame, keeping only a sparse number of coefficients. For example, Shearlet (discrete) frames are optimally sparse for cartoon like images. In this talk I will extend this approach to continuous wavelet systems, which comprise a continuum of "dictionary" elements. To overcome some of the challenges in the continuous realm, I will present an extension of ...
[לנוסח המלא]
CGGC Seminar: Two Modeling Primitives for Computer Aided Geometric Design
event speaker icon
ג'נש מששר (מדעי המחשב, טכניון)
event date icon
יום שני, 1.1.2018, 14:00
event location icon
טאוב 401
Computer Aided Geometric Design concerns development of algorithms and accompanying software, towards design of parts and structures with a high degree of numerical precision. Target application domains include design of automobiles, aircrafts and buildings, among others. In this talk we discuss two kernel level modeling primitives. First, we propose a comprehensive algorithmic framework for computation of solid sweeps. This involves computing the boundary of the swept volume generated by moving the input solid along the ...
[לנוסח המלא]