יום שני, 30.12.2019, 12:30
In the metric compression problem, we are given n points in a metric space, and the goal is to construct a compact representation (sketch)of the points, such that the distance between every pair can be approximate lyre covered from the sketch, up to a small distortion of (1 +/- epsilon). Such sketches are widely used for fast nearest neighbor search in high-dimensional Euclidean spaces. We give a new algorithm for sketching Euclidean metric spaces. It provably achieves the optimal compression bo...
[ לנוסח המלא ]
יום רביעי, 25.12.2019, 14:30
We present the first general and practical solution of the fluent API problem – an
algorithm, that given a deterministic language (equivalently, LR(k), k≥0 language)
encodes it in an unbounded parametric polymorphism type system employing only a
polynomial number of types. The theoretical result is accompanied by an actual tool
Fling – a fluent API compiler-compiler in the venue of YACC, tailored for embedding
DSLs in Java.
...
[ לנוסח המלא ]
יום שלישי, 24.12.2019, 14:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Leveraging Programmable Switches for In-network Computing The network line rate is constantly on the rise to support the exploding amounts of data. This means that we have less time to process individual packets, despite a growing demand for better network telemetry. Moreover, CPU speeds are not rising at the same rate as we near the end of Moore’s law, making it harder to rely on software computations. Programmable hardware switches are an emerging technology that enables flexible packet proc...
[ לנוסח המלא ]דניאל גנקין (אונ' מישיגן)
יום שלישי, 24.12.2019, 12:30
The security and architecture communities will remember 2018 as the year of side channels. Starting from Spectre and Meltdown, time and again we have seen how basic performance-improving features can be exploited to violate fundamental hardware security guarantees. In this talk, I will survey two recent results on hardware side channel attacks. The first, Fallout, continues a series of Meltdown-type vulnerabilities, showing that speculative execution attacks are possible even on post-Meltdown ha...
[ לנוסח המלא ]
יום שלישי, 24.12.2019, 10:30
In recent years, new forms of communication between people and devices have revolutionized
our daily lives. The Internet has become the leading platform for human interaction (e.g.,
social networks), commerce, information, and also control of physical devices (e.g.,
Internet of Things). This new connectivity creates new security and privacy risks for
individual users and organizations. It also increases the complexity and diversity of the
different security and cryptographic solutions we need to...
[ לנוסח המלא ]עומרי ויינשטיין (אונ' קולומביה)
יום שני, 23.12.2019, 12:30
In 2010, Patrascu proposed the Multiphase problem, as a candidate for proving polynomial lower bounds on the operational time of dynamic data structures. Patrascu conjectured that any data structure for the Multiphase problem must make n cell-probes in either the update or query phase, and showed that this would imply similar unconditional lower bounds on many important dynamic data structure problems. Alas, there has been almost no progress on this conjecture in the past decade since its introd...
[ לנוסח המלא ]
יום ראשון, 22.12.2019, 10:30
Learning systems have become ever more pervasive in our lives. By controlling the flow of information, they play an increasingly significant role in shaping decisions made by us,
about us, and for us. But systems are still developed under paradigms in which human actors are abstracted away, limiting their effectiveness.
In this talk I will argue for the need to infuse into machine learning the tangible presence of humans, and present two projects addressing this need. In the first project, I...
[ לנוסח המלא ]
יום חמישי, 19.12.2019, 12:30
Approximating ranks, quantiles, and distributions over streaming data is a central task in data analysis and monitoring. Given a stream of n items from a data universe U (equipped with a total order), the task is to compute a sketch (data structure) of size poly(log(n), 1/ε). Given the sketch and a query item y ∈ U, one should be able to approximate its rank in the stream, i.e., the number of stream elements smaller than y.
Most works to date focused on additive εn error approxim...
[ לנוסח המלא ]
יום רביעי, 18.12.2019, 12:30
Existing proofs that deduce P=BPP from circuit lower bounds convert randomized algorithms to deterministic ones with a large polynomial slowdown in running time. In this talk, I will show that if we assume exponential lower bounds against nondeterministic circuits, we can convert any randomized algorithm running in time T to a deterministic one running in time T^{2+����} for an arbitrarily small constant ����. Under complexity-theoretic assumptions, such a slowdown is nearly opti...
[ לנוסח המלא ]
יום רביעי, 18.12.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
In recent years, new forms of communication between people and devices have revolutionized our daily lives. The Internet has become the leading platform for human interaction (e.g., social networks), commerce, information, and also control of physical devices (e.g., Internet of Things). This new connectivity creates new security and privacy risks for individual users and organizations. It also increases the complexity and diversity of the different security and cryptographic solutions we need to...
[ לנוסח המלא ]
יום שלישי, 17.12.2019, 14:30
There is a recent surge of interest in performing computations on encrypted data. Techniques such as secure multi-party computations and fully-homomorphic encryption enable rich privacy-preserving applications. On the other hand, building such applications is hard due to the cryptographic expertise required to build them correctly, securely, and
efficiently. Excitingly, a compiler that raises the level of programming abstraction while performing a slew of domain-specific optimizations can make ...
[ לנוסח המלא ]סער ברקאי (הנדסת חשמל, טכניון)
יום שני, 16.12.2019, 13:30
חדר 701, בניין מאייר, הפקולטה להנדסת חשמל
Although distributed computing can significantly reduce the training time of deep neural networks, scaling the training process while maintaining high efficiency and final accuracy is challenging. Cloud computing, which is becoming increasingly popular as a platform for distributed training of deep neural networks, is prone to straggler workers who significantly increase training time in synchronous environments. Therefore, asynchronous distributed training is preferable in terms of training tim...
[ לנוסח המלא ]רון עמית (הנדסת חשמל, טכניון)
יום שני, 16.12.2019, 12:30
Efficient learning requires prior knowledge (inductivebias). The algorithm designer can manually insert a prior based on hisintuition, but ideally, we would like to automatically infer the mostbeneficial prior. In meta-learning an agent extracts a ‘learned prior’ fromseveral observed learning tasks, which in turn, can be used to facilitate thelearning of new related tasks. The prior should capture the common structureacross learned tasks while allowing sufficient flexibility to adapt tonovel...
[ לנוסח המלא ]
יום ראשון, 15.12.2019, 15:00
Establishing a low network latency connection to stock exchanges has been the desire of trader for years. A well-known example is the extremely expensive construction of an ultra-low latency fiber optic cable between New York and Chicago just for reducing three millisecond in the round trip time. Yet, the exact possible usage and potential profitability of such high end network connection remains mostly unclear.
In this Thesis, we address this point by studying the impact of latency on the...
[ לנוסח המלא ]נתנאל רביב - (California Institute of Technology
יום ראשון, 15.12.2019, 14:30
Data is one of the most important assets of the information age, and its societal impact is undisputed. Yet, rigorous methods of assessing the quality of data are lacking. In this talk, we propose a formal definition for the quality of a given static dataset. We assess a dataset's quality by a quantity we call the expected diameter, which measures the expected disagreement between two randomly chosen hypotheses that explain it, and has recently found applications in active learning. We utilize a...
[ לנוסח המלא ]
יום רביעי, 11.12.2019, 12:30
I will speak about an unexpected correspondence between a beautiful theory, due to Lovasz, about homomorphisms and graph limits
and a popular heuristic for the graph isomorphism problem known as the Weisfeiler-Leman algorithm. I will also relate this to graph kernels
in machine learning. Indeed, the context of this work is to design and understand similarity measures between graphs and discrete structures.
(Joint work with Jan Böker, Holger Dell, and Gaurav Rattan.)
...
[ לנוסח המלא ]
יום שלישי, 10.12.2019, 14:30
Effective data analysis often depends on data that is known to different sources,
including private data whose owners cannot disclose. The task at hand is to perform
effective analysis of the data while preserving its privacy. This talk will describe
efficient cryptographic protocols, some of them based on variants of private set
intersection (PSI), that can be applied to perform private analysis of data.
Short Bio:
============
Benny Pinkas is a member of the Bar Ilan Cryptography Group and ...
[ לנוסח המלא ]ג'לאני נלסון (אונ' ברקלי)
יום שני, 09.12.2019, 12:30
In the 'frequent items' problem one sees a sequence of items in a stream (e.g. a stream of words coming into a search query engine like Google) and wants to report a small list of items containing all frequent items. In the 'change detection' problem one sees two streams, say one from yesterday and one from today, and wants to report a small list of items containing all those whose frequencies changed significantly. For both of these problems, we would like algorithms that use memory substantial...
[ לנוסח המלא ]
יום רביעי, 04.12.2019, 12:30
The PPSZ algorithm, due to Paturi, Pudlak, Saks and Zane, is currently the fastest known algorithm for the k-SAT problem, for every k>3. For 3-SAT, a tiny improvement over PPSZ was obtained by Hertli. We introduce a biased version of the PPSZ algorithm using which we obtain an improvement over PPSZ for every k≥3. For k=3 we also improve on Herli’s result and get a much more noticeable improvement over PPSZ, though still relatively small. In particular, for Unique 3-SAT, we improve the curren...
[ לנוסח המלא ]
יום שלישי, 03.12.2019, 14:30
In the Bounded Degree Matroid Basis Problem, we are given a matroid and a hypergraph on
the same ground set, together with costs for the elements of that set as well as lower and
upper bounds f(e) and g(e) for each hyperedge e. The objective is to find a minimum-cost
basis B such that f(e) ...
[ לנוסח המלא ]עומרי סנדיק (אונ' תל-אביב)
יום שלישי, 03.12.2019, 10:00
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
We present a method for determining which facial parts (mouth, nose, etc.) best characterize an individual, given a set of that individual's portraits. We introduce a novel distinctiveness analysis of a set of portraits, which leverages the deep features extracted by a pre‐trained face recognition CNN and a hair segmentation FCN, in the context of a weakly supervised metric learning scheme. Our analysis enables the generation of a polarized class activation map (PCAM) for an individual's portr...
[ לנוסח המלא ]קונסטנטין מאקאריצ'ב (Northwestern University)
יום שני, 02.12.2019, 12:30
Consider an instance of Euclidean k-means or k-medians clustering. We show that the cost of the optimal solution is preserved up to a factor of (1+ε) under a projection onto a random - dimensional subspace. Further, the cost of every clustering is preserved within (1+ε). Our bound on the dimension is nearly optimal. Additionally, our result applies to Euclidean k-clustering with the distances raised to the p-th power for any constant p.
Dr. Makarychev is an Associate Professor ...
[ לנוסח המלא ]
יום רביעי, 27.11.2019, 12:30
Interactive oracle proofs are a hybrid between interactive proofsand probabilistically-checkable proofs, where the prover is allowed to interactwith a verifier by sending relatively long messages to the verifier, who inturn is only allowed to query a few of the bits that were sent.
In this work we construct, for any NP relation for whichmembership can be decided in polynomial-time and bounded polynomial space (e.g.,SAT, Hamiltonicity, Clique, Vertex-Cover, etc.), interactive orac...
[ לנוסח המלא ]נטע רוזן-שיף (האונ' העברית בירושלים)
יום רביעי, 27.11.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
The Network Time Protocol (NTP) synchronizes time across computer systems over the Internet. Unfortunately, NTP is highly vulnerable to “time shifting attacks”, in which the attacker’s goal is to shift forward/backward the local time at an NTP client. NTP’s security vulnerabilities have severe implications for time-sensitive applications and for security mechanisms, including TLS certificates, DNS and DNSSEC, RPKI, Kerberos, BitCoin, and beyond. While technically NTP supports cryptograph...
[ לנוסח המלא ]
יום שלישי, 26.11.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Photos and videos are now a main mode of communication, used to tell stories, share experiences and convey ideas. However, common media editing tools are often either too complex to master, or oversimplified and limited.
In this talk I will present my strategy towards the creation of media editing techniques that are easy to learn, yet expressive enough to reflect unique creative objectives. We will mostly discuss one specific domain --- human heads --- which are both extremely common...
[ לנוסח המלא ]
יום שני, 25.11.2019, 12:30
A fundamental quantity associated with a Markov chain is its mixing time. Can we estimate this quantity empirically from a single long sample path? This might appear to present an impossible circularity, since the mixing time controls our ability to infer global properties of the chain from a single path -- and this is the very unknown quantity we're trying to estimate! We present a way out of this conundrum, providing a fully empirical procedure, with efficiently computable confidence intervals...
[ לנוסח המלא ]טיגראן טונויאן (מדעי המחשב, טכניון)
יום רביעי, 20.11.2019, 12:30
SINR (aka physical model) is a model of wireless communication that has been studied from algorithmic perspective in the last decade, and is considered as a more realistic alternative to the traditional graph-based models. I will introduce the model and discuss some basic scheduling problems. At a high level, these can be thought of as coloring or independent set problems in some special fractional graphs....
[ לנוסח המלא ]
יום שני, 18.11.2019, 12:30
This paper defines the notion of class discrepancy for families of functions. It shows that low discrepancy classes admit small offline and streaming coresets. We provide general techniques for bounding the class discrepancy of machine learning problems. As corollaries of the general technique we bound the discrepancy (and therefore coreset complexity) of logistic regression, sigmoid activation loss, matrix covariance, kernel density and any analytic function of the dot product or the squared di...
[ לנוסח המלא ]
יום ראשון, 17.11.2019, 15:30
Traditional query optimizer is crucially dependent on cardinality estimation, which enables choosing among different plan alternatives by using the cardinality estimation of intermediate results within query execution plans. Therefore, the query optimizer must use reasonably good estimates. However, estimates produced by all widely-used database cardinality estimation models are routinely significantly wrong, resulting in not choosing the best plans, leading to slow executions.
In this work w...
[ לנוסח המלא ]
יום חמישי, 14.11.2019, 11:00
The overlapping correlation clustering problem has multiple real-world applications in diverse areas such as: social networks (community detection), biology (protein analysis) and information retrieval (categorising documents).
Correlation clustering is a problem of assigning data points into distinct groups (clusters) based on similarity. When assigning two similar data points to the same cluster or assigning two different data points to different clusters, we score this assignment as succes...
[ לנוסח המלא ]
יום רביעי, 13.11.2019, 12:30
Lifting theorems are theorems that relate the query
complexity of a function $f : \{0, 1\}^{n} \rightarrow \{0, 1\}$ to the
communication complexity of the composed function fgn, for some “gadget” $g :
\{0, 1\}^{b} \times \{0, 1\}^{b} \rightarrow \{0, 1\}$. Such theorems allow
transferring lower bounds from query complexity to the communication complexity,
and have seen numerous applications in the recent years. In addition, such
theorems can be viewed as a strong gen...
[ לנוסח המלא ]
יום שלישי, 12.11.2019, 14:30
When this logician moved to theoretical computer science, this did not seem such a big
deal to him. The transition was seamless. The transition to software engineering was
radical. Microsoft research invited me to come, start a group and use my ideas to build
tools. That was enticing and frightening. The chances of success seemed remote. But it
worked, thanks to the engineering talent that my group was lucky to attract. Our Spec
Explorer became indispensable when EU demanded that Microsoft ...
[ לנוסח המלא ]תמיר חזן (תעשייה וניהול, טכניון)
יום שני, 11.11.2019, 12:30
Reparameterization of variational auto-encoders with continuous random variables is an effective method for reducing the variance of their gradient estimates. Our work optimizes the discrete VAE objective directly, using its Gumbel-Max reparameterization. This optimization technique propagates gradients through the reparameterized argmax, and replaces MCMC sampling by the difference of gradients of two argmax predictions. This realization provides the means to learn latent representations in cas...
[ לנוסח המלא ]
יום ראשון, 10.11.2019, 13:30
המרכז הרב-תכליתי, בניין טאוב למדעי המחשב
Learning to generate music is an ongoing AI challenge. A more difficult challenge is the generation of musical pieces that match human-specific preferences. In this work we focus on personalized, symbol-based, monophonic generation of harmony-constrained jazz improvisations. To tackle this objective, we introduce a pipeline consisting of the following steps: supervised learning using a corpus of solos, high-resolution user preference metric learning, and optimized generation using planning (beam...
[ לנוסח המלא ]עומרי בן-אליעזר (אונ' תל-אביב)
יום רביעי, 06.11.2019, 12:30
Suppose we receive a stream of data, sampling each arriving data element with some predetermined probability. It is well known that if the elements in the stream are chosen in advance, then a constant number of random samples suffice to make the sampled subset “represent” the whole stream with good probability. However, what if the elements are chosen adaptively, by an adversary that knows exactly, at any point along the stream, which elements were sampled previously? Does the same sample si...
[ לנוסח המלא ]
יום שלישי, 05.11.2019, 14:30
Artificial neural networks are nowadays routinely trained to solve challenging learning
tasks, but our theoretical understanding of this phenomenon remains quite limited. One
increasingly popular approach, which is aligned with practice, is to study how making the
network sufficiently large (a.k.a. ''over-parameterized'') makes the associated training
problem easier. In this talk, I'll describe some of the possibilities and challenges in
understanding neural networks using this approach.
...
[ לנוסח המלא ]דניאל סודרי (הנדסת חשמל, טכניון)
יום שני, 04.11.2019, 12:30
In many common datasets, neural networks can achieve zero training loss yet generalize well to unseen data. Recent works suggest that this because standard training algorithms (e.g., GD or SGD) have an implicit regularization which is biased towards specific solutions, which tend to have good generalization. I will review such "algorithmic biases", how they affect the functional capabilities of the neural networks, and how this relates to generalization in simple models....
[ לנוסח המלא ]
יום שני, 04.11.2019, 11:00
How does the brain beget the mind? How do molecules, cells and synapses effect reasoning, intelligence, language, science? Despite dazzling progress in experimental neuroscience we do not seem to be making progress in the overarching question -- the gap is huge and a completely new approach seems to be required. As Richard Axel recently put it: "We don't have a logic for the transformation of neural activity into thought." What kind of formal system would qualify as this "logic"? In this talk I ...
[ לנוסח המלא ]
יום חמישי, 31.10.2019, 11:30
This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. Exploiting the cache barrier command for Flash storage, we overhaul the IO scheduler, the dispatch module, and the filesystem so that these layers are orchestrated to preserve the ordering condition impos...
[ לנוסח המלא ]
יום רביעי, 30.10.2019, 12:30
The talk is about anti-concentration of the inner product of two independent random vectors in Euclidean space. We shall discuss a proof, and some applications ...
[ לנוסח המלא ]
יום שלישי, 29.10.2019, 16:30
בניין טאוב למדעי המחשב, הטכניון
הפקולטה למדעי המחשב בטכניון
חוגגת 50 שנה ומזמינה אתכם לאירוע CS City - פסטיבל של מדע וטכנולוגיה לכל המשפחה
אשר יתקיים ביום שלישי, 29 באוקטובר 2019 החל מהשעה 16:30
בבניין טאוב למדעי המחשב, הטכניון.
ה...
[ לנוסח המלא ]
יום רביעי, 23.10.2019, 15:00
Election databases are the main elements of a recently introduced framework that aims to create bridges between the computational social choice and the data management communities. An election database consists of incomplete information about the preferences of voters, in the form of partial orders, alongside with standard database relations that provide contextual information. Earlier work in computational social choice focused on the computation of possible winners and necessary winners that a...
[ לנוסח המלא ]
יום רביעי, 23.10.2019, 13:30
Managing data inconsistency has been one of the major challenges in the research and practice of database management. Database inconsistency arises for different reasons and in different applications. Nowadays, many applications obtain information from imprecise sources (e.g., social encyclopedias, social networks, and sensors attached to appliances) via imprecise procedures (e.g., natural-language processing, signal processing, and image analysis). Inconsistency may also arise when integrating ...
[ לנוסח המלא ]
יום רביעי, 23.10.2019, 12:30
A tree code is a combinatorial object introduced by Schulman in the early 90s as a key ingredient in interactive coding. Schulman proved the existence of tree codes with constant alphabet size, but the problem of explicitly constructing a tree code remained elusive. We present an explicit binary tree code with constant distance and alphabet size polylog(n), where n is the depth of the tree. This improves over the (Evans-Klugerman-Schulman 1994) construction that requires an exponentially larger ...
[ לנוסח המלא ]
יום שני, 16.09.2019, 11:30
Inverse problems in imaging are extensively studied, with a variety of strategies, tools, and theory that have been accumulated over the years. Recently, this field has been immensely influenced by the emergence of deep-learning techniques. One such contribution, which is the focus of this paper, is the Deep Image Prior (DIP) work by Ulyanov, Vedaldi, and Lempitsky (2018). DIP offers a new approach towards the regularization of inverse problems, obtained by forcing the recovered image to be synt...
[ לנוסח המלא ]
יום ראשון, 15.09.2019, 10:30
Large training datasets are required to achieve competitive performance in most natural language tasks.
The acquisition process for these datasets is labor intensive, expensive, and time consuming. This process is also prone to human errors.
In this work, we show that cross-cultural differences can be harnessed for natural language text classification.
We present a transfer-learning framework that leverages widely-available unaligned bilingual corpora for classification tasks, using no ...
[ לנוסח המלא ]
יום חמישי, 12.09.2019, 16:00
Product descriptions play an important role in the e-commerce ecosystem, conveying information to buyers about merchandise they may purchase. Yet, on leading e-commerce websites, with high volumes of new items offered for sale every day, product descriptions are often lacking or missing altogether, and when they do appear, they lack personalization to the user.
We suggest to mitigate these issues by generating short crowd-based product descriptions from user reviews and then explore how to pe...
[ לנוסח המלא ]
יום רביעי, 11.09.2019, 11:30
Maintaining an accurate trained model on an infinite data stream is challenging due to concept drifts that render a learned model inaccurate.
Updating the model periodically can be expensive, and so traditional approaches for computationally limited devices involve a variation of online or incremental learning, which tend to be less robust.
The advent of heterogeneous architectures and Internet-connected devices gives rise to a new opportunity. A weak processor can call upon a stronger proce...
[ לנוסח המלא ]
יום רביעי, 11.09.2019, 09:00
אודיטוריום 1, בניין טאוב למדעי המחשב
ביום רביעי, 11 בספטמבר, 2019 יקיים המרכז להנדסת
מחשבים בטכניון (TCE) את הכנס השנתי הבינלאומי התשיעי
בנושא: Autonomous Systems ויתמקד בהופעתם של מערכות
אוטונומיות, כולל מכוניות המניעות עצמן, רחפני אספקה אוטומטיים ורובוטים שירות
הנחשבים בעיני ר...
[ לנוסח המלא ]
יום ראשון, 08.09.2019, 14:30
Non-volatile memory is expected to co-exist or replace DRAM in upcoming architectures. Durable concurrent data structures for non-volatile memories are essential building blocks for constructing adequate software for use with these architectures. In this paper, we propose a new approach for durable concurrent sets and use this approach to build the most efficient durable hash tables available today. Evaluation shows a performance improvement factor of up to \maxImprovement{} over existing techno...
[ לנוסח המלא ]
יום ראשון, 08.09.2019, 12:30
We construct a new interactive polynomial commitment scheme using groups of unknown order. The interactive evaluation argument is public-coin and has logarithmic communication in the degree of the polynomial. The scheme does not require a trusted setup if instantiated with class groups. We apply this as a cryptographic compiler to polynomial IOPs in order to obtain preprocessing public-coin interactive arguments of knowledge with succinct online communication (without trusted setup). Instantiate...
[ לנוסח המלא ]
יום חמישי, 05.09.2019, 10:00
In the field of population genetics, it is known that collected observations are not independent, as they all share a common ancestor. Current state-of-the-art association tests use Monte Carlo simulations to account for these dependency structures. However, these simulations are not scalable and are cumbersome to use for the evaluation of only a few parameters.
In our work, we introduce a generalized, simulation-free analytical test that accounts for hierarchical sample dependency structures...
[ לנוסח המלא ]
יום שלישי, 03.09.2019, 12:30
The purpose of this research is to explore an innovative approach to the declarative and imperative paradigms of programming languages. To demonstrate this approach, we have developed a prototype domain-specific language inspired by the scripts of theatrical plays, hence dubbed Tʜᴀᴘʟ. Tʜᴀᴘʟ's intended use is in the context of animation generation in “slide-show” presentations. There are two different ways to integrate animations in a presentation. The first is to embed an animati...
[ לנוסח המלא ]
יום חמישי, 29.08.2019, 16:30
Massively parallel, throughput-oriented processors are becoming increasingly common. Maximizing the benefit of these processors requires algorithms to be implemented differently than the sequential algorithms that most software developers are familiar with. This change is often very time-consuming and is not guaranteed to give an increase in performance matching the amount of effort.
This work proposes an approach to predict the performance gain from porting an algorithm from the CPU to the G...
[ לנוסח המלא ]
יום רביעי, 21.08.2019, 11:30
Real-world networks are dynamic in nature -- nodes may join or leave the network at any time, and communication links may appear or disappear constantly. In this dynamic setting, we study the problem of triangle detection, where the nodes of a network need to determine, distributively, whether or not the network contains a triangle. We examine several variants of this problem, and present algorithms and impossibility results. Then, we extend our results to larger cliques.
...
[ לנוסח המלא ]
יום חמישי, 15.08.2019, 11:00
Concurrent data structures provide fundamental building blocks for concurrent programming. Standard concurrent data structures may be extended by allowing a sequence of operations to be submitted as a batch for later execution. A sequence of such operations can then be executed more efficiently than the standard execution of one operation at a time.
We propose a novel algorithmic extension to the prevalent FIFO queue data structure that exploits such batching scenarios. An implementation in C...
[ לנוסח המלא ]
יום רביעי, 14.08.2019, 11:00
Numerical geometry comprises of principled computational methods that utilize theoretical insights from geometry along with the engineering concepts from numerical methods, for tackling various problems in geometric data analysis. In contrast, computational methods from recent advances in deep learning exhibit a black box nature where essential and meaningful features are learned from examples of training data leading to state-of-the-art results. This thesis explores a synergy between these two ...
[ לנוסח המלא ]
יום שלישי, 13.08.2019, 14:00
Jigsaw puzzle solving is an intriguing problem, having a wide variety of applications in archaeology, biology, document restoration and others.
This paper focuses on a specific variant of the problem - solving puzzles with eroded boundaries.
Such erosion makes the problem extremely difficult, since most existing solvers utilize solely the information at the boundaries.
Nevertheless, this variant is important since erosion and missing data often occur at the boundaries.
This paper int...
[ לנוסח המלא ]
יום שני, 12.08.2019, 16:00
Suboptimal resource utilization among public and private cloud providers prevents them from maximizing their economic potential. Long-term allocated resources are often idle when they might have been subleased for a short period. Alternatively, arbitrary resource overcommitment may lead to unpredictable client performance.
We propose a mechanism for fixed availability (traditional) resource allocation alongside stochastic resource allocation in the form of shares. We show its benefit for priv...
[ לנוסח המלא ]
יום שני, 12.08.2019, 14:30
חדר 815, בניין מאייר, הפקולטה להנדסת חשמל
The information in the weights of deep networks plays a key role in understanding their behavior. When used as a regularizer during training (either explicitly or implicitly) it induces generalization through the PAC-Bayes bound. Rather than being computed and minimized explicitly, it can be directly controlled by injecting noise in the weights, a process known as Information Dropout. It can also be shown that stochastic gradient descent (SGD), when taken to the continuous limit and interpreted ...
[ לנוסח המלא ]
יום שלישי, 06.08.2019, 14:30
Recent years have seen great progress in automated synthesis techniques that can automatically generate code based on some intent expressed by the user, but communicating this intent remains a major challenge. When the expressed intent is coarse-grained (for example, restriction on the expected type of an expression), the synthesizer often produces a long list of results for the user to choose from, shifting the heavy-lifting to the user. An alternative approach is programming by example (PBE), ...
[ לנוסח המלא ]
יום שני, 29.07.2019, 10:00
The omnipresence of increasingly large deep networks derives primarily from their empirical successes. Indeed, empirical evidence places a strong emphasis on operating at scale, more parameters and layers, in order to help both optimization and generalization. This counter-intuitive trend has eluded theoretical analysis. In this work, we present a PAC-Bayesian generalization bound for the Gaussian dropout that only requires an on-average loss function bound and on-average norm-gradient bounds b...
[ לנוסח המלא ]
יום שני, 22.07.2019, 10:00
Different methods where presented through the years to find good solutions for the Matrix Completion Problem. This problem appears in many tasks in life where a sparse signal, which lies on a grid of two non- Euclidean domains (Graphs or manifolds), should be predicted or completed. A classic example of this problem is the “Netflix Problem” which appears in the field of “Recommendation Systems” or “recommender systems”. In those systems recommendations of specific items are given to ...
[ לנוסח המלא ]
יום ראשון, 14.07.2019, 11:00
This talk will present our approach for enumerating the
results of queries in monadic second-order (MSO) on trees. Our goal is
to first preprocess the input tree in linear time, and then enumerate
the answers with delay linear in the size of each answer, i.e.,
constant-delay for queries with free first-order variables. Our approach
is also tractable in the query when represented by a tree automaton (not
necessarily deterministic).
The approach works by computing a circuit that gives a factorize...
[ לנוסח המלא ]ליליה דניאל (הנדסת חשמל, טכניון)
יום רביעי, 10.07.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Applications' memory consumption is growing rapidly, which increases their dependence on the memory system. Since each virtual-to-physical memory translation in modern systems requires cache lookups or multiple memory accesses, the run time overhead of virtual memory translation is on the rise. Meanwhile, the increasing prevalence of the cloud ecosystem and server consolidation moves more applications to run in virtual machines. This further aggravates the overhead of memory translation; in virt...
[ לנוסח המלא ]
יום ראשון, 07.07.2019, 11:30
Whereas deterministic protocols are typically guaranteed to obtain particular goals of interest, probabilistic protocols typically provide only probabilistic guarantees.
In this talk we initiate an investigation of the interdependence between actions and subjective beliefs of agents in a probabilistic setting.
In particular, we study what probabilistic beliefs an agent should have when performing actions, in a protocol that must satisfy a given probabilistic constraint.
It is show...
[ לנוסח המלא ]
יום חמישי, 04.07.2019, 14:30
Rank-metric codes (RMCs) over finite fields were introduced some 40 years ago by Delsarte, Gabidulin and Roth. Interest in RMCs was revived in recent years due to the application of such codes to network coding. In 1991, another simple construction of a class of RMCs was presented by Roth, which is optimal when the field is algebraically closed. These codes are based on diagonal interleaving of maximum-distance separable (MDS) codes. In 2017, a decoding scheme was presented for these codes. In a...
[ לנוסח המלא ]
יום רביעי, 03.07.2019, 11:30
Rigid registration is the problem of finding the optimal rigid motion and correspondence between two shapes, so that they are as similar as possible in terms of an appropriate energy.
We will describe several popular algorithms for this problem: PCA alignment and ICP, which are very efficient but are not globally optimal, as well as sampling and branch and bound (BnB) algorithms which exhibit slow convergence but are globally optimal.
Next we suggest our quasi BnB algorithm a...
[ לנוסח המלא ]
יום ראשון, 30.06.2019, 14:30
In this talk, we will look at decoding Reed-Muller codes beyond their minimum distance when the errors are random (i.e., in the binary symmetric channel). A beautiful result of Saptharishi, Shpilka and Volk showed that for binary Reed-Muller codes of length n and degree n - O(1), one can correct polylog(n) random errors in poly(n) time (which is well beyond the worst-case error tolerance of O(1)). We give two new algorithms for this problem, both of which show that the previous error-correction ...
[ לנוסח המלא ]מיכל אדלשטיין (מדעי המחשב, טכניון)
יום ראשון, 30.06.2019, 10:30
חדר 337, בניין טאוב למדעי המחשב
Shape correspondence is a fundamental task in shape analysis. Given two shapes, the goal is to compute a semantic correspondence between points on them. Shape correspondence is required when two shapes are analyzed jointly, which is common in many applications such as texture and deformation transfer, statistical shape analysis and shape classification. Automatically computing shape correspondence is a difficult problem, especially when the shapes are significantly different.
In thi...
[ לנוסח המלא ]
יום חמישי, 27.06.2019, 13:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Modern cloud architectures rely on each server running a software-defined networking stack to implement policy and virtualization. However, these networking stacks are becoming increasingly complex as features are added and as network speeds increase. Running these stacks on CPU cores takes away processing power from VMs, increasing the cost of running cloud services, and adding latency and variability to network performance, which has led us to invest in technologies to accelerate SDN in NIC ha...
[ לנוסח המלא ]יאניס מאוס (מדעי המחשב, טכניון)
יום רביעי, 26.06.2019, 12:30
It is widely known that in the well-studied \LOCAL model of distributed computing, introduced by Linial [FOCS '87], many of the classic distributed graph problems (including maximal independent set (MIS) and MaxDegree+1-vertex coloring), have very efficient (and simple) randomized but exponentially slower deterministic algorithms. Understanding and potentially narrowing down this exponential gap is considered to be one of the central long-standing open questions in the area of distributed graph ...
[ לנוסח המלא ]מור יוסף-ריבלין (מדעי המחשב, טכניון)
יום רביעי, 26.06.2019, 11:00
A fundamental question in learning to classify 3D shapes is how to treat the data in a way that would allow us to construct efficient and accurate geometric processing and analysis procedures. Here, we restrict ourselves to networks that operate on point clouds. There were several attempts to treat point clouds as non-structured data sets by which a neural network is trained to extract discriminative properties. The idea of using 3D coordinates as class identifiers motivated us to extend this l...
[ לנוסח המלא ]
יום שלישי, 25.06.2019, 12:30
קומת הכניסה - בניין טאוב למדעי המחשב
מעבדות הפקולטה למדעי המחשב:
המעבדה לפיתוח תוכנה ומערכות (SSDL), המעבדה לסייבר ואבטחת מידע (CYBER) ותקשורת
מחשבים (LCCN) מזמינות אתכם לבקר ביריד האביב של פרוייקטים בתחומי IOT, תוכנה, אפליקציות אנדרואיד,
AI, סייבר, אבטחת מידע ורשת...
[ לנוסח המלא ]
יום שני, 24.06.2019, 15:00
קומת הכניסה - בניין טאוב למדעי המחשב
יום המחקר התשיעי לתארים מתקדמים בפקולטה למדעי המחשב יתקיים ביום
ראשון, 24 ביוני,
2019, בין השעות 15:00-17:00, בלובי של בניין טאוב למדעי המחשב.
יום מחקר הוא הזדמנות עבור משתלמי הפקולטה להציג את מחקריהם באמצעות פוסטרים
ומצגות בפני אנשי סגל ומנהלים בכירים ב...
[ לנוסח המלא ]
יום שני, 24.06.2019, 14:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Datacenter congestion control remains to be a hard problem. The root of the problem is that the ability of end-hosts to react to congestion is fundamentally limited by the timeliness and precision of congestion signals from the network. Unfortunately, despite decades of research, the community is still in quest of such timely and precise congestion signals. In this talk, I will discuss a possible new approach to datacenter congestion control problem: designing network fabrics that never drop pac...
[ לנוסח המלא ]טל שינקאר (מדעי המחשב, טכניון)
יום ראשון, 23.06.2019, 14:30
In this talk, a new family of codes called clustering-correcting codes is presented. This family of codes is motivated by the special structure of data that is stored in DNA-based storage systems. The data stored in these systems has the form of unordered sequences, also called strands, and every strand is synthesized thousands to millions of times, where some of these copies are read back during sequencing. Due to the unordered structure of the strands, an important task in the decoding process...
[ לנוסח המלא ]סער רז (מדעי המחשב, טכניון)
יום ראשון, 23.06.2019, 13:30
חדר 337, בניין טאוב למדעי המחשב
I'll discuss our novel discrete scheme for simulating viscous thin films in 2D at real-time frame rates.
Our scheme is based on a new formulation of the gradient flow approach, that leads to a discretization based on local stencils that are easily computable on the GPU.
I'll also discuss our recent work toward a real-time 3D scheme for simulation of the effect on meshes, based on simplifications of a previous scheme.
...
[ לנוסח המלא ]רוברט דאשל (אונ' ברנדרבורג)
יום חמישי, 20.06.2019, 13:30
חדר 337, בניין טאוב למדעי המחשב
Abstract: One of the main tasks in three-dimensional shape analysis is to retrieve similarities between two or more non-rigid objects in terms of point-to-point correspondences.
For the descriptor based approach, it is useful to construct a simplified shape representation called feature descriptor. A successful descriptor class can be motivated by physical phenomena governed by partial differential equations (PDEs). The talk shows how different types of PDEs and discretization aspects may lead ...
[ לנוסח המלא ]מרב פרטר (מכון ויצמן למדע)
יום רביעי, 19.06.2019, 12:30
We develop a new approach for distributed distance computation in planar graphs that is based on a variant of the metric compression problem recently introduced by Abboud et al. [SODA'18]. In our variant of the Planar Graph Metric Compression Problem, one is given an $n$-vertex planar graph $G=(V,E)$, a set of $S \subseteq V$ source terminals lying on a single face, and a subset of target terminals $T \subseteq V$. The goal is to compactly encode the $S\times T$ distances.
One of our...
[ לנוסח המלא ]
יום שלישי, 18.06.2019, 14:30
Approximating high-dimensional functionals with low-dimensional models
is a central issue of machine learning, image processing, physics and
mathematics. Deep convolutional networks are able to approximate such
functionals over a wide range of applications. This talk shows that
these computational architectures take advantage of scale separation,
symmetries and sparse representations. We introduce simplified
architectures which can be analyzed mathematically. Scale separations
is p...
[ לנוסח המלא ]סטיוארט פלדמן (Schmidt Futures)
יום ראשון, 16.06.2019, 14:30
חדר 337, בניין טאוב למדעי המחשב
The new and highly effective techniques frequently associated with Artificial Intelligence, including machine learning, pattern recognition, natural language processing, robotics, image analysis, and nonlinear optimization will have profound effects on the ways research is done and the sorts of projects that are feasible. There is a broad spectrum of approaches with differing risks and experience, ranging from
• using machine learning as effective tools for extracting patterns from ...
[ לנוסח המלא ]
יום ראשון, 16.06.2019, 14:30
In this talk, we consider the problem of communicating over a discrete memoryless two-way channel using non-adaptive schemes, under a zero probability of error criterion. We derive inner and outer bounds on the zero-error capacity region, based on random coding, linear programming, and linear codes. ...
[ לנוסח המלא ]
יום ראשון, 16.06.2019, 11:30
I will present the 'virtual democracy' framework for the design of ethical AI. In a nutshell, the framework consists of three steps: first, collect preferences from voters on example dilemmas; second, learn models of their preferences, which generalize to any (previously unseen) dilemma; and third, at runtime, predict the voters' preferences on the current dilemma, and aggregate these virtual 'votes' using a voting rule to reach a decision. I will focus on two instantiations of this approach: a ...
[ לנוסח המלא ]
יום ראשון, 16.06.2019, 10:30
Many natural language understanding (NLU) tasks consist of identifying the relationship
between two objects, such as a paragraph and a question (reading comprehension), an image
and a question (visual question answering), or a premise and a hypothesis (natural
language inference). These tasks supposedly require a deep understanding of the
information in the two objects and inference of the relationship between them. However,
recent work has demonstrated that many NLU datasets contain one-sided b...
[ לנוסח המלא ]
יום חמישי, 13.06.2019, 14:30
In recent years, cloud providers have been moving towards offering their clients separate cloud resources for short periods of time instead of offering bundles of resources for longer periods. In parallel, the providers are moving towards using economic mechanisms, such as auctions, to allocate these resources. Vickrey-Clarke-Groves (VCG) auctions are likely to be used for that purpose. These auctions are incentive compatible: by allocating the resource to the highest bidders first, they maximiz...
[ לנוסח המלא ]
יום חמישי, 13.06.2019, 11:00
Recent advances in manufacturing techniques have greatly expanded the types and complexity of shapes that can be produced. At the same time, advances in AI (esp. machine learning) and physics driven algorithms (e.g., topology optimization) have enabled novel methods and workflows for design engineering. A new class of techniques collectively called Generative Engineering are being developed to revamp traditional design and manufacturing systems to enable industries to leverage the full capabilit...
[ לנוסח המלא ]
יום חמישי, 13.06.2019, 09:00
חדר 337, בניין טאוב למדעי המחשב
הנכם מוזמנים ליום עיון משותף לפקולטה למדעי המחשב וחברת רפאל בנושאים: עיבוד תמונה, ראייה ממוחשבת, גרפיקה ממוחשבת ומציאות מדומה, אשר יתקיים ביום ה', 13 ביוני, 2019, 09:00-12:20, בחדר 337,
בניין טאוב למדעי המחשב.
פרטים נוספים ותוכנית מלאה בכרזה המצורפת.
נא ...
[ לנוסח המלא ]עידו נחום (מתמטיקה, טכניון)
יום רביעי, 12.06.2019, 12:30
This work provides an additional step in the theoretical understanding of neural networks. We consider neural networks with one hidden layer and show that when learning symmetric functions, one can choose initial conditions so that standard SGD training efficiently produces generalization guarantees. We empirically verify this and show that this does not hold when the initial conditions are chosen at random. The proof of convergence investigates the interaction between the two layers of the netw...
[ לנוסח המלא ]
יום רביעי, 12.06.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
In this talk, I will describe several research projects developed in the Berkeley Architecture Research group which utilize FPGA-accelerated simulation and open-source hardware, demonstrating the possibilities and accessibility of full-system computer architecture research using these tools and methodologies. FireSim is an easy-to-use, open-source, FPGA-accelerated cycle-accurate hardware simulation platform that runs on Amazon EC2 F1. FireSim automatically transforms and instruments op...
[ לנוסח המלא ]אלון גונן (אונ' פרינסטון)
יום שלישי, 11.06.2019, 15:30
The last decade saw a tremendous empirical success of machine learning algorithms, which often can not be explained theoretically using a worst-case analysis. Therefore, it is a great challenge to identify reasonable assumptions under which the theory is aligned with the practice. In this talk I will advocate learning in an oracle model, which provides an elegant and extremely useful methodology for this purpose. Namely, instead of explicitly characterizing some desired "niceness" properties of ...
[ לנוסח המלא ]
יום שלישי, 11.06.2019, 14:30
Reactive synthesis is an automated procedure to obtain a correct-by-construction reactive system from a given declarative, temporal specification. Examples of these systems include the software controllers of robotic systems. Despite recent advancements on the theory and algorithms of reactive synthesis, e.g., efficient synthesis for the GR(1) fragment of linear temporal logic, many challenges remain in bringing reactive synthesis technologies to the hands of software engineers. The SYNTECH proj...
[ לנוסח המלא ]חן בר ומרינה אלתרמן (הנדסת חמשל, טכניון)
יום שני, 10.06.2019, 14:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
We present a Monte Carlo rendering framework for the physically-accurate simulation of speckle patterns arising from volumetric scattering of coherent waves. These noise-like patterns are characterized by strong statistical properties, such as the so-called memory effect. These properties are at the core of imaging techniques for applications as diverse as tissue imaging, motion tracking, and non-line-of-sight imaging. Our rendering framework can replicate these properties computationally, in a ...
[ לנוסח המלא ]פאדי מצארווי (מדעי המחשב, טכניון)
יום שני, 10.06.2019, 14:00
חדר 337, בניין טאוב למדעי המחשב
3D objects, modeled using Computer Aided Geometric Design (CAGD) tools, are traditionally represented using a boundary representation (B-rep), and typically use spline functions to
parameterize these boundary surfaces. However, recent development in physical analysis, in isogeometric analysis (IGA) in specific, necessitates a volumetric parametrization of the interior of the object. IGA is performed directly by integrating over the spline spaces of the volumetric spline representation of the ob...
[ לנוסח המלא ]
יום חמישי, 06.06.2019, 12:30
Blockchains are distributed secure ledgers to which transactions are issued continuously and each block of transactions is tightly coupled to its predecessors. Permissioned blockchains place special emphasis on transactions throughput. In this paper we present TOY, which leverages the iterative nature of blockchains in order to improve their throughput in optimistic execution scenarios. TOY trades latency for throughput in the sense that in TOY the last f + 1 blocks of each node’s blockchain a...
[ לנוסח המלא ]ג'יימס בוטומלי (י.ב.מ. מחקר)
יום חמישי, 06.06.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
Containers (or Operating System based Virtualization) are an old
technology; however, the current excitement (and consequent
investment) around containers provides interesting avenues for
research on updating the way we build and manage container technology.
The most active area of research today, thanks to concerns raised by
groups supporting other types of virtualization, is in improving the
security properties of containers.
The first step in improving security is actually ...
[ לנוסח המלא ]
יום רביעי, 05.06.2019, 12:30
Arguably the most common network communication problem is multiple-unicasts: Distinct packets at different nodes in a network need to be delivered to a destination specific to each packet, as fast as possible.
The famous multiple-unicast conjecture posits that, for this natural problem, there is no performance gap between routing and network coding, at least in terms of throughput. We study the same network coding gap, but in terms of completion time.
While throughput corre...
[ לנוסח המלא ]מרטין אוגרטה (אונ' צ'ילה)
יום שלישי, 04.06.2019, 14:30
In the last six years, Bitcoin has obtained a good deal of attention, reaching in May 2019 a market capitalization of more than one hundred and fifty billion (US) dollars and a daily trading volume of hundreds of millions of dollars. Although Bitcoin is considered mostly as a financial asset, the protocol published in 2008 by the anonymous Satoshi Nakamoto goes far beyond: it achieves consensus in an open, decentralized and trust-less network. In this tutorial, we will discuss in detail how this...
[ לנוסח המלא ]
יום שלישי, 04.06.2019, 11:30
Visual acuity (VA) tests are widely used in ophthalmology to measure vision quality, but even modern tests still rely on an algorithm created in 1976 \cite{Bailey1976}. This algorithm is basically the original VA test algorithm from 1873 \cite{Snellen1873}, with minor modifications. The tests measure VA by requiring the examinee to identify different letters from a table that is positioned in a fixed distance. In this thesis, we present a novel way to assess VA by using a computerized software w...
[ לנוסח המלא ]
יום שני, 03.06.2019, 12:30
Computation integrity (CI) protocols allow a strong prover to convince a skeptic verifier it has knowledge of an input satisfying a program.
Although theoretical CI constructions are well known for almost 30 years, industrial adaption has only recently started.
In this seminar we will go over recent progress in industrial adaption, challenges addressed by our work, and the connection to blockchain based systems.
...
[ לנוסח המלא ]
יום ראשון, 02.06.2019, 15:30
Deep neural networks (DNNs) have recently shown great success in many machine learning domains and problems. However, applying these models for mission critical tasks still has many safety issues due to prediction uncertainty and prediction errors. This talk covers several related results concerning uncertainty estimation, selective classification (also known as classification with reject option) and active learning for deep neural networks.
We discuss first a selective classification method...
[ לנוסח המלא ]מאריה אבו סיני (מדעי המחשב, טכניון)
יום ראשון, 02.06.2019, 14:30
The sequence reconstruction problem corresponds to a model in which a sequence from some code is transmitted over several noisy channels. The channels are almost independent as it is only required that their outputs are different. The main problem under this paradigm is to determine the minimum number of channels required to reconstruct the transmitted sequence. This problem is equivalent to finding the maximum intersection size between two balls of any possible two inputs, where the balls are a...
[ לנוסח המלא ]בוריס סוסין (מדעי המחשב, טכניון)
יום ראשון, 02.06.2019, 13:30
חדר 337, בניין טאוב למדעי המחשב
Manufacturing techniques such as hot-wire cutting, wire-EDM, wire-saw cutting, and flank CNC machining all belong to a class of processes called line-cutting where the cutting tool moves tangentially along the reference geometry. From a geometric point of view, line-cutting brings a unique set of challenges in guaranteeing that the process is collision-free. In this work, given a set of cut-paths on a freeform geometry as the input, we propose a conservative algorithm for finding collision-free...
[ לנוסח המלא ]מיכל דורי (מדעי המחשב, טכניון)
יום רביעי, 29.05.2019, 12:30
I will discuss our recent shortest paths algorithms in the distributed congested clique model. Our first contribution is a (2+epsilon)-approximation algorithm for all-pairs shortest paths (APSP) requiring only polylogarithmic number of rounds. This is the first sub-polynomial constant approximation for APSP in this model. We also significantly improve upon the state-of-the-art for approximate multi-source shortest paths and diameter, as well as exact single-source shortest paths (SSSP). Our mai...
[ לנוסח המלא ]עודד גרין (Invidia ארה"ב)
יום רביעי, 29.05.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Graph processing is typically considered to be a memory-bound rather than compute-bound problem. One common line of thought is that more available memory bandwidth corresponds to better graph processing performance. However, in this talk, I will show that this is not necessarily the case. I will demonstrate that the key factor in the utilization of the memory system for graph algorithms is not the raw bandwidth, or even latency of memory requests, but instead is the number of memory channels ava...
[ לנוסח המלא ]
יום שלישי, 28.05.2019, 14:30
Artificial neural networks have recently revolutionized the field of machine learning, demonstrating striking empirical success on tasks such as image understanding, speech recognition and natural language processing. However, we still do not have sufficient theoretical understanding of how such models can be successfully learned. Two specific questions in this context are: how can neural nets be learned despite the non-convexity of the learning problem, and how can they generalize well despite ...
[ לנוסח המלא ]נועם יאיר (הנדסת חשמל, טכניון(
יום שלישי, 28.05.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
A prominent property of natural images is that groups of similar patches within them tend to lie on low-dimensional subspaces. This property has been previously used for image denoising, with particularly notable success via weighted nuclear norm minimization (WNNM). In this work, we extend the WNNM method into a general image restoration algorithm, capable of handling arbitrary degradations (e.g. blur, missing pixels, etc.). Our approach is based on a novel regularization term which simultaneou...
[ לנוסח המלא ]גאורג ראדו (אונ' ברנדנברוג)
יום ראשון, 26.05.2019, 14:30
חדר 337, בניין טאוב למדעי המחשב
The aim of photometric stereo is to estimate shape and appearance of a
three-dimensional object from multiple input images taken from the
same point of view but under different lighting conditions. The most
common techniques are conceptually close to the classic photometric
stereo problem, meaning that the modelling encompasses a linearisation
step and that the shape information is computed in terms of surface
normals. Instead of linearising we aim to stick to the original
f...
[ לנוסח המלא ]וואי הנג'יה (אונ' בן-גוריון)
יום ראשון, 26.05.2019, 14:30
A robust positioning pattern is a large array that allows a mobile device to locate its position by reading a possibly corrupted small window around it. In this talk, we focus on the 1-dimensional case, i.e., robust positioning sequences (RPS). We present constructions of RPSs along with efficient locating algorithms. In particular, we construct a class of q-ary RPSs which are robust to a constant fraction of errors and have asymptotically optimal rate. We also obtain a class of binary RPSs whic...
[ לנוסח המלא ]
יום רביעי, 22.05.2019, 12:30
In the classical derandomization problem, we are given a description of a Boolean circuit, and want to deterministically approximate its acceptance probability, up to a small constant error (say, 1/6). This problem is intimately related to circuit lower bounds, and extensive efforts have been devoted in the last four decades to solving it, even for very weak circuit classes.
This survey talk is focused on a relaxed version of the problem, which was introduced a few years ago by Gol...
[ לנוסח המלא ]
יום רביעי, 22.05.2019, 09:00
Instead of using full cycle-accurate simulations, recent virtual memory studies frequently utilize linear models to predict application runtimes from TLB misses. The benefit of the latter methodology is that it is easier and much faster than the former, but its correctness has never been validated. In fact, previous studies were not even able to measure their prediction errors, because they defined the linear models by collecting at most two empirical data points: the application runtimes when u...
[ לנוסח המלא ]
יום שלישי, 21.05.2019, 13:30
Dynamically-typed programming languages such as Python, Ruby and JavaScript are widely used, and much effort is spent on making them efficient. One substantial research effort in this direction is the enabling of parallel code execution.
As a first step towards efficiently synchronizing such languages, we look at concurrent data-structures that may modify their memory layout dynamically (e.g. increase their size or change their shape). In this talk we propose a novel Layout Lock that incurs ...
[ לנוסח המלא ]נירית נוסבאום (הנדסת חשמל, טכניון)
יום שלישי, 21.05.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Hyperspectral imaging allows measuring the spectrum of each pixel in the image of a scene. This modality has diverse applications, ranging from agriculture and geoscience, to biomedical imaging and surveillance. However, most existing methods require dedicated cameras, which make use of extra optical elements (prisms, fibers, lenslet arrays, etc.). These solutions are often expensive and cumbersome to deploy in many settings. In this work, we introduce a simple hyperspectral imaging approach, wh...
[ לנוסח המלא ]האן קאי (אונ' ג'יאנוטונג)
יום ראשון, 19.05.2019, 14:30
In this talk, we consider locally repairable codes which are optimal with respect to the Singleton-type bound presented by Prakash \emph{et al.}
New upper bounds on the length of such optimal codes are derived.
The new bounds both improve and generalize previously known bounds. We also talk about optimal codes, whose length is order-optimal
when compared with the new upper bounds. The length of the codes is super-linear in the alphabet size.
...
[ לנוסח המלא ]אמיליאנו סירילו (מדעי ה מחשב, טכניון)
יום ראשון, 19.05.2019, 13:30
חדר 337, בניין טאוב למדעי המחשב
Floater–Hormann interpolants constitute a family of barycentric rational interpolants based on the blend of local polynomial interpolants of degree d that have recently proved to be a viable alternative to more classical interpolation methods, such as polynomials and splines, especially in the equispaced setting.
In the first part of this seminar we focus on the approximation of the derivatives of a function f with classical Floater–Hormann interpolants and show how their k-th deriv...
[ לנוסח המלא ]דניאל עזוז (מדעי המחשב, טכניון)
יום חמישי, 16.05.2019, 10:30
Shape correspondence is a fundamental task in shape analysis, with a variety of applications in computer graphics and computer vision. Example applications include statistical shape interpolation, texture, segmentation and deformation transfer, and application of deep learning to 3D shapes. Formulating the desired geometric properties of the correspondence is a challenging task, as the quality of the result can be easily evaluated by a human observer, yet is challenging to quantify. Additionally...
[ לנוסח המלא ]
יום חמישי, 16.05.2019, 10:30
Shape correspondence is a fundamental task in shape analysis, with a variety of applications in computer graphics and computer vision. Example applications include statistical shape interpolation, texture, segmentation and deformation transfer, and application of deep learning to 3D shapes. Formulating the desired geometric properties of the correspondence is a challenging task, as the quality of the result can be easily evaluated by a human observer, yet is challenging to quantify. Additionally...
[ לנוסח המלא ]
יום רביעי, 15.05.2019, 12:30
חדר 337, בניין טאוב למדעי המחשב
We show that Folded Reed-Solomon codes achieve list decoding capacity with constant list sizes, independent of the block length. Prior work yielded list sizes that are polynomial in the block length, and relied on elaborate subspace evasive machinery to reduce the list sizes to constant.
We further show that multiplicity codes exhibit similar behavior, and use this to obtain capacity achieving locally list decodable codes with query complexity significantly lower than was known before...
[ לנוסח המלא ]אלכס מנוסקין (הנדסת חשמל, טכניון)
יום רביעי, 15.05.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
With their introduction in 2009, cryptocurrencies brought the promise of a global decentralized payment system. However, protocol limitations prevent them from managing the required throughput. Previous work overcame protocol limitations and used low-degree sharding to allow for parallelization. All these systems rely on efficient validation of the transactions, in each shard or globally.
We present Ostraka, an architecture for arbitrary scaling of blockchain nodes that does not affect...
[ לנוסח המלא ]
יום שלישי, 14.05.2019, 14:30
We will consider the SITA server farm scheduling policies which were
introduced and studied by Harchol-Balter and her collaborators. In
particular we will discuss a recent INFOCOM17 paper of Doncel, Aalto
and Ayesta and relate one of the tables there to the work of Riemann
on the functional equation of the zeta function. We will also consider
certain disk drive scheduling problems (travelling salesman on a disk drive)
and then relate it to space-time geometry and in particular to gravitati...
[ לנוסח המלא ]
יום שני, 13.05.2019, 15:00
חדר 337, בניין טאוב למדעי המחשב
חברי סגל ותלמידי תארים מתקדמים מוזמנים לסדנת
Machine Learning on AWS Cloud, ביום שני, 13 במאי, 2019,
15:00-18:30, בחדר 337, בניין טאוב למדעי המחשב.
פרטים נוספים ותוכנית בכרזה ובמסמך המצורפים.
נא לאשר הגעה באימייל אל: awstomer at amazon.com...
[ לנוסח המלא ]
יום שלישי, 07.05.2019, 11:00
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Artificial illumination plays a vital role in human civilization. In computer vision, artificial light is extensively used to recover 3D shape, reflectance, and further scene information. However, in most computer vision applications using artificial light, some additional structure is added to the illumination to facilitate the task at hand. In this work, we show that the ubiquitous alternating current (AC) lights already have a valuable inherent structure that stems from bulb flicker. By passi...
[ לנוסח המלא ]
יום שני, 06.05.2019, 13:00
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Mobile sensing is an emerging research area with many applications, including environmental monitoring and medical imaging. For example, tomography, which is used extensively in medical imaging, can be re-formulated by means of sampling along trajectories in the sinogram domain.
We propose a model that accounts for finite-energy functions and present continuous-domain analysis accordingly. We then consider the problem of reconstructing CT scans within the mobile sensing framework. W...
[ לנוסח המלא ]צ'אנג שאנגואן (אונ' תל-אביב)
יום ראשון, 05.05.2019, 14:30
Consider the following hat guessing game:
nn players are placed on nn vertices of a graph, each wearing a hat whose color is arbitrarily chosen from a set of qq possible colors. Each player can see the hat colors of his neighbors, but not his own hat color. All of the players are asked to guess their own hat colors simultaneously, according to a predetermined guessing strategy and the hat colors they see, where no communication between them is allowed. Given a graph GG, its hat guessing ...
[ לנוסח המלא ]
יום רביעי, 01.05.2019, 12:30
אנו שמחים להזמין אתכם לרביעי בסדרת מפגשים בנושא קריירה וחיפוש עבודה
שיתקיים ביום רביעי, 1 במאי
2019, בשעה
12:30
בכיתה 7,
בניין טאוב למדעי המחשב. ...
[ לנוסח המלא ]
יום רביעי, 01.05.2019, 12:30
We study the communication complexity of welfare maximization in combinatorial auctions with m items and two subadditive bidders. A 12-approximation can be guaranteed by a trivial randomized protocol with zero communication, or a trivial deterministic protocol with O(1) communication. We show that outperforming these trivial protocols requires exponential communication, settling an open question of [DobzinskiNS10, Feige09].
Specifically, we show that any (randomized) protocol guarante...
[ לנוסח המלא ]עודד נאור (הנדסת חשמל, טכניון)
יום רביעי, 01.05.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
In recent years, cryptocurrencies, and blockchain as their underlying technology have emerged. They act as a decentralized ledger, i.e., an append-only log, where payments are recorded. One of the key limitations of almost all blockchains is the overall throughput, e.g., in Bitcoin, the first cryptocurrency, the overall throughput is about 7 transactions per second (TPS), whereas VISA’s maximum throughput is between three to four orders of magnitude higher. One of the main reasons this problem...
[ לנוסח המלא ]
יום שלישי, 30.04.2019, 14:30
Automated agents that interact proficiently with people can be useful in supporting, training or replacing people in complex tasks. The inclusion of people presents novel problems for the design of automated agents’ strategies. People do not necessarily adhere to the optimal, monolithic strategies that can be derived analytically. Their behavior is affected by a multitude of social and psychological factors. In this talk I will show how combining machine learning techniques for human modellin...
[ לנוסח המלא ]
יום שני, 29.04.2019, 11:00
A deep learning approach to numerically approximate the solution to the Eikonal equation is introduced.
The proposed method is built on the fast marching scheme which comprises of two components: a local numerical solver and an update scheme. We replace the formulaic local numerical solver with a trained neural network to provide highly accurate estimates of local distances for a variety of different geometries and sampling conditions. Our learning approach generalizes not only to flat Euclid...
[ לנוסח המלא ]דוד כהן (מדעי המחשב, טכניון)
יום ראשון, 28.04.2019, 14:00
We propose a controllable geometric flow that decomposes the interior volume of a triangular mesh into a collection of encapsulating layers, which we denote by a generalized foliation. For star-like genus zero surfaces we show that our formulation leads to a foliation of the volume with leaves that are closed genus zero surfaces, where the inner most leaves are spherical. Our method is based on the three-dimensional Hele-Shaw free-surface injection flow, which is applied to a conformally inverte...
[ לנוסח המלא ]
יום ראשון, 28.04.2019, 14:00
We propose a controllable geometric flow that decomposes the interior volume of a triangular mesh into a collection of encapsulating layers, which we denote by a generalized foliation. For star-like genus zero surfaces we show that our formulation leads to a foliation of the volume with leaves that are closed genus zero surfaces, where the inner most leaves are spherical. Our method is based on the three-dimensional Hele-Shaw free-surface injection flow, which is applied to a conformally inverte...
[ לנוסח המלא ]
יום ראשון, 28.04.2019, 11:00
Many intractable computational problems on graphs admit tractable algorithms when applied to trees or forests. In such cases, a tree decomposition of the input graph often facilitates an effective solution. Therefore, tree decompositions are critical for graph problems in the fields of databases, game theory, statistical analysis, bioinformatics and more. The goal of this research is to build an efficient tool for enumerating (producing) a large space of tree decompositions for solvers of graph ...
[ לנוסח המלא ]
יום שישי, 19.04.2019, 12:15
היום הפתוח לקראת ההרשמה לשנה"ל תש"פ מזמין בוגרי תואר
ראשון מצטיינים מכל האוניברסיטאות להגיע לטכניון ולהתרשם מהפקולטות למדעי המחשב,
לפגוש חברי סגל וסטודנטים לתארים מתקדמים ולשמוע הרצאה מרתקת מפי דר' טל כהן,
דירקטור פיתוח תוכנה, גוגל: "האם תואר מת...
[ לנוסח המלא ]
יום רביעי, 17.04.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Modern machine learning models exhibit super-human accuracy on tasks from image classification to natural-language processing, but accuracy does not tell the entire story of what these models have learned. Does a model memorize and leak its training data? Does it contain hidden backdoor functionality? In this talk, I will explain why common metrics of model quality may hide potential security and privacy vulnerabilities, and outline recent results and open problems at the junction of machine lea...
[ לנוסח המלא ]
יום ראשון, 14.04.2019, 16:30
Question Answering (QA) is one of the core tasks in natural language understanding. This task requires the ability to process and understand natural language questions and documents, as well as to extract the answers to these questions.
There are several settings for the QA task, which provide varying levels of difficulty. In the most simple setting, a question is paired with a context which is guaranteed to contain sufficient evidence to answer the question. A more difficult setting is call...
[ לנוסח המלא ]פאדי מצארווי (ביוסנס וובסטר)
יום ראשון, 14.04.2019, 13:30
חדר 337, בניין טאוב למדעי המחשב
This talk presents some of the geometrical aspects involved in treating irregular heart beat rhythm (Arrythmia) using Carto 3 System. Carto 3 is a product of Biosense-Webster, a global leader in the science of diagnosing and treating heart rhythm disorders. CARTO 3 System enables accurate visualization of multiple catheters in a patient’s heart and pinpoints exact location/orientation of a catheter. During arrythmia procedure, a 3D electro-anatomical reconstruction of the heart is built and co...
[ לנוסח המלא ]גיא רוטבלום (מכון ויצמן למדע)
יום רביעי, 10.04.2019, 12:45
We prove a new connection between gentle measurement (where one wants to measure n quantum states, in a way that damages the states only by a little) and differential privacy (where one wants to query a database about n users, in a way that reveals only a little about any individual user). The connection is bidirectional, though with loss of parameters in going from DP to gentle measurement. Exploiting this connection, we present a new algorithm for approximating the outcomes of many measurement...
[ לנוסח המלא ]צביקה ברקרסקי (מכון ויצמן למדע)
יום רביעי, 10.04.2019, 12:30
The talk will survey new developments that use cryptographic tools in order to use a quantum computer even if it is operated by an untrusted party. Applications include: proofs of quantumness, certifiable randomness, privately outsourcing quantum computation (via quantum fully homomorphic encryption) and delegating quantum computation. ...
[ לנוסח המלא ]
יום שני, 08.04.2019, 13:30
Information Extraction (IE) is the task of extracting structured information from textual data. We explore a programming paradigm that is supported by several IE systems where relations extracted by atomic extractors undergo a relational manipulation. In our efforts toward achieving a better understanding of IE systems, we study queries in the framework of document spanners that was introduced by Fagin et al. A spanner is a function that extracts from a document (string) a relation over text int...
[ לנוסח המלא ]אלדד הבר (אונ' קולומביה הבריטית)
יום שני, 08.04.2019, 12:30
חדר 337, בניין טאוב למדעי המחשב
Partial differential equations (PDEs) are indispensable for modeling many physical phenomena and also commonly used for solving image processing tasks. In the latter area, PDE-based approaches interpret image data as discretizations of multivariate functions and the output of image processing algorithms as solutions to certain PDEs. Posing image processing problems in the infinite dimensional setting provides powerful tools for their analysis and solution. Over the last few decades, the reinterp...
[ לנוסח המלא ]
יום ראשון, 07.04.2019, 14:30
Machine learning algorithms have difficulties to generalize over a small set of examples. Humans can perform such a task by exploiting vast amount of background knowledge they possess. One method for enhancing learning algorithms with external knowledge is through feature generation. We introduce a new algorithm for generating features based on a collection of auxiliary datasets. We assume that, in addition to the training set, we have access to a additional datasets. We do not assume that t...
[ לנוסח המלא ]
יום ראשון, 07.04.2019, 09:00
אודיטוריום 2, בניין טאוב למדעי המחשב
יום עיון בחירות אלקטרוניות (e-lections 2019) באירגונם של פרופ'
אלי ביהם, אור דונקלמן ומרכז המחקר
לאבטחת סייבר ע"ש הירושי פוג'יאוורה, יתקיים ביום ראשון, 7 באפריל 2019 בטכניון.
האירוע יציג הרצאות הקשורות לבחירות אלקטרוניות ולהשפעת עולם...
[ לנוסח המלא ]ונקטה קופולה (מכון ויצמן למדע)
יום רביעי, 03.04.2019, 12:30
There are two well studied security notions for public key encryption schemes: security against passive adversaries and security against active adversaries. In this talk, we will discuss a new generic transformation that can upgrade the security of an encryption scheme from passive security to active security. For this transformation, we use a special family of pseudorandom generators (PRGs) called hinting PRGs.
I will first introduce these special PRGs, followed by an outline of ou...
[ לנוסח המלא ]
יום שלישי, 02.04.2019, 15:30
Model checking is an automatic verification method that accepts a system model and a specification, and checks whether the model satisfies the specification. CTL is a branching temporal logic suitable for specifying behaviors of both software and hardware systems.
In this work, we present a novel approach that combines on-the-fly verification with abstraction in order to obtain an efficient model checking.
On-the-fly verification ensures that only parts that are needed for determining the...
[ לנוסח המלא ]
יום שלישי, 02.04.2019, 14:30
In this talk I will tell you how analyzing economic markets where agents have cognitive
biases has led to better understanding of the communication complexity of local search
procedures.
We begin the talk with studying combinatorial auctions with bidders that exhibit
endowment effect. In most of the previous work on cognitive biases in algorithmic game
theory (e.g., [Kleinberg and Oren, EC'14] and its follow-ups) the focus was on
analyzing the implications and mitigating their negative c...
[ לנוסח המלא ]
יום שני, 01.04.2019, 11:30
We consider the Graph Balancing problem, where we are given an undirected multigraph with edge weights and orientation costs. The goal is to find an orientation of the edges that minimizes the worst weighted incoming degree of a vertex (also known as makespan) while minimizing the total orientation cost. Graph Balancing is an interesting special case of the well-known Generalized Assignment Problem (GAP), which is perhaps one of the most famous and extensively studied problems in scheduling theo...
[ לנוסח המלא ]
יום חמישי, 28.03.2019, 11:00
חדר 337, בניין טאוב למדעי המחשב
The hexahedral meshing problem is the volumetric analog of the quad meshing problem, with analogous applications in finite element modeling. One might expect that frame field–based methods, which have proven effective in quad meshing, would extend naturally to the volumetric case. Unfortunately, several problems arise in attempting this extension. The geometry of frames becomes significantly more complicated, making optimization over frames more challenging. Moreover, field and mesh topology i...
[ לנוסח המלא ]
יום רביעי, 27.03.2019, 12:30
We study the Excluded Grid Theorem, a fundamental structural result in graph theory, that was proved by Robertson and Seymour in their seminal work on graph minors. The theorem states that there is a function f, such that for every integer g > 0, every graph of treewidth at least f(g) contains the (g×g)-grid as a minor. For every integer g>0, let f(g) be the smallest value for which the theorem holds. Establishing tight bounds on f(g) is an important graph-theoretic question. Robertson and Seym...
[ לנוסח המלא ]ענבר סרוסי (אונ' תל-אביב)
יום שלישי, 26.03.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
Unravelling underlying complex structures from limited resolution measurements is a known problem arising in many scientific disciplines. We study a stochastic dynamical model with a multiplicative noise. It consists of a stochastic differential equation living on a graph, similar to approaches used in population dynamics or directed polymers in random media. This model has numerous applications, such as population growth, economic growth, and optimal control. We present a new application of thi...
[ לנוסח המלא ]
יום שני, 25.03.2019, 13:30
Blockchain protocols are notoriously bad at scaling. Most protocols do work reasonably well when used in a small scale. Yet, as the network size grows, resources are added and overall computing power increases, most protocols simply do not scale. This is largely due to the fact that the entire process is fully replicated by all participants. Surpassing some desired redundancy threshold, this offers no advantage.
We tackle the issue by introducing a formal general framework for sharding blockc...
[ לנוסח המלא ]בנג'מין ווסרמן (אונ' מינכן)
יום ראשון, 24.03.2019, 13:30
Fictitious domain methods are an elegant way to circumvent a tedious discretization process, mostly meshing. The core idea is to embedded the geometrically complex model into a fictitious domain, which has zero stiffness assigned. The complexity of the model is then recovered on the integration level, where the only information required from the model is an unambiguous, reliable point membership classification (PMC) on the integration points. This point membership classification can be easily ca...
[ לנוסח המלא ]
יום רביעי, 20.03.2019, 12:30
We consider fault-tolerant boolean formulas in which the output of a faulty gate is short-circuited to one of the gate’s inputs. A recent result by Kalai et al. [FOCS 2012] converts any boolean formula into a resilient formula of polynomial size that works correctly if less than a fraction 1/6 of the gates (on every input-to-output path) are faulty. We improve the result of Kalai et al., and show how to efficiently fortify any boolean formula against a fraction 1/5 of short-circuit gates per p...
[ לנוסח המלא ]
יום רביעי, 20.03.2019, 12:00
הנכם מוזמנים להצגת הפרוייקטים שעלו לגמר בתחרות
הפרוייקט המצטיין 2019. הצוותים המתמודדים
יציגו את מחקריהם ויענו לשאלות השופטים והקהל.
האירוע יתקיים ביום רביעי, 20 במרס, 2019, בין השעות 12:00-14:30, בלובי בניין טאוב ל...
[ לנוסח המלא ]
יום ראשון, 17.03.2019, 13:30
חדר 337, בניין טאוב למדעי המחשב
We present a novel method for computing correspondences between subdivision surfaces, represented as functional maps. We leverage two main advantages of the hierarchical structure: (1)
the spectral basis functions, which are multi-resolution by construction, can be succinctly represented on a subdivision surface, and (2) the pointwise map reconstruction can be done hierarchically. Using these properties, we design a computational pipeline for finding correspondences between high resolution mesh...
[ לנוסח המלא ]
יום ראשון, 17.03.2019, 10:30
Puzzle solving is a difficult problem in its own right, even when the pieces are all square and build up a natural image. But what if these ideal conditions do not hold? One such application domain is archaeology, where restoring an artifact from its fragments is highly important. From the point of view of computer vision, archaeological puzzle solving is very challenging, due to three additional difficulties: the fragments are of general shape; they are abraded, especially at the boundaries (wh...
[ לנוסח המלא ]
יום חמישי, 14.03.2019, 14:30
Today we are literally surrounded by software. Almost all products and services we use on a daily basis involve some piece of software. The abundance of software has made our lives easier. Unfortunately it also made us susceptible than ever to software vulnerabilities and exploitation.
A big part of the effort to secure software is often carried out by researchers external to the team that developed the software. A crucial tool in their tool bag for finding vulnerabilities and securing system is...
[ לנוסח המלא ]
יום חמישי, 14.03.2019, 12:00
Billions of dollars a year are spent to develop a new drug. The first step in the drug development process is drug discovery, where in potential molecules are studied before leads are selected and moved to clinical trials.
Extensive research is performed to identify studies that might be relevant to the potential molecule or its substructures.
As the molecule is novel, no respective research has been published about it, and therefore identifying relevant papers about it’s different character...
[ לנוסח המלא ]
יום חמישי, 14.03.2019, 11:30
Neural Architecture Search (NAS) aims to facilitate the design of deep networks for a given task.
This is part of a larger trend – automated machine learning (AutoML) – that promises to solve or at least alleviate the scarcity of ML experts needed to design custom architectures.
We are working on a differentiable search method unlike conventional approaches of applying evolution or reinforcement learning methods.
Recent works show that it is possible to reduce a convolutional neural network ...
[ לנוסח המלא ]טל מור (מדעי המחשב, טכניון)
יום רביעי, 13.03.2019, 12:30
In this lecture we will introduce a few quantum complexity classes (BQP, QMA,
QIP, and QPIP), the Deutsch-Jozsa algorithm, and Simon's algorithm; we will
finally (very briefly) discuss Shor's algorithm for factoring large
numbers.
...
[ לנוסח המלא ]ג'נוס טפולוקאי (אונ' בודפשט)
יום רביעי, 13.03.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
We have witnessed worldwide network outages after large-scale natural disasters, such as earthquakes, hurricane, and terrorist attacks. In the talk, I will discuss how to extend the widely implemented single link failure models for regional failures. I will mainly focus on the related theoretical problems in the domain of combinatorics and computational geometry. First, I will show that operators need to prepare their network only against a small number of failure-states. Second, I introduce a ...
[ לנוסח המלא ]
יום שלישי, 12.03.2019, 09:30
יום עיון בסייבר ואבטחת מידע 2019
יום העיון בסייבר ואבטחת מידע 2019 באירגונם של פרופ'
אלי ביהם, פרופ' שרה ביתן ומרכז המחקר
לאבטחת סייבר ע"ש הירושי פוג'יאוורה, יתקיים ביום שלישי, 12 במרס 2019 בטכניון.
מרצים אורחים:
...
[ לנוסח המלא ]אנדרסון רוחה (אונ' קמפינאס, ברזיל)
יום ראשון, 10.03.2019, 14:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
In this talk, we will discuss problems associated with synchronizing specific events in space and time (X-coherence), fact-checking, and mining persons, objects and contents of interest from various and heterogeneous sources including — but not limited to — the internet, social media and surveillance imagery. For that, we seek to harness information from various media sources and synchronize the multiple textual and visual information pieces around the position of an event or object as well ...
[ לנוסח המלא ]טל מור (מדעי המחשב, טכניון)
יום רביעי, 06.03.2019, 12:30
In this lecture we will introduce the quantum bit (qubit), the basic rules of
quantum information/computing, the no-cloning principle, quantum gates for
universal quantum computing; finally we will see two protocols, one
for quantum teleportation, and one for quantum key distribution.
...
[ לנוסח המלא ]שי ורגפטיק (הנדסת חשמל, טכניון)
יום רביעי, 06.03.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Nowadays, as computer networks continuously increase in size and speed, making efficient use of compute and network resources becomes exceptionally challenging. At the heart of this challenge are scheduling and load balancing techniques that are expected to optimize resource usage and, in turn, minimize costs. In this talk we shall address two such emerging network challenges.
In the first part of the talk we shall present dRMT (disaggregated Reconfigurable Match-Action Table), a new...
[ לנוסח המלא ]
יום ראשון, 03.03.2019, 13:30
In this thesis, we show how geometry, and specifically parametric freeform geometry, can be used to solve manufacturing related problems. This thesis deals with both additive manufacturing (specifically 3D printing) and the more traditional (subtractive manufacturing) machining process.
The first topic handled is the representation and manufacturing of functionally graded material (FGM) objects in 3D printing. Specifically, this thesis presents the use of parametric (trimmed) volumes to manu...
[ לנוסח המלא ]
יום ראשון, 03.03.2019, 12:00
Named-entity Recognition (NER) is an important task in the NLP field, and is widely used to solve many challenges.
However, in many scenarios, not all of the entities are explicitly mentioned in the text. Sometimes they could be inferred from the context or from other indicative words. Consider the following sentence:
CMA can easily hydrolyze into free acetic acid. Although water is not mentioned explicitly, one can infer that H2O is an entity involved in the process.
In this work, we p...
[ לנוסח המלא ]אריאל פלנר (אונ' בן-גוריון)
יום חמישי, 28.02.2019, 14:00
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
In bidirectional heuristic search the search proceeds from both the start and the goal simultaneously.The state of the art in bidirectional search has changed significantly a very short time period; we now can answer questions about unidirectional and bidirectional search that until very recently we were unable to answer. This talk is designed to provide an accessible overview of the recent research in bidirectional search in the context of the broader efforts over the last 50 years. We give pa...
[ לנוסח המלא ]
יום רביעי, 27.02.2019, 11:30
We propose a principled approach to integrating GPU memory with an OS page
cache. We design GAIA, a weakly-consistent page cache that spans CPU and GPU
memories. GAIA enables the standard mmap system call to map files into the GPU
address space, thereby enabling data-dependent GPU accesses to large files and
efficient write-sharing between the CPU and GPUs. Under the hood, GAIA (1)
integrates lazy release consistency among physical memories into the OS page cache
while maintaining backward compa...
[ לנוסח המלא ]
יום שלישי, 26.02.2019, 12:30
Rapid advances in data-driven applications over recent years have intensified the need for efficient mechanisms capable of real-time monitoring and detecting arbitrarily complex patterns in massive data streams. Complex event processing (CEP) is a prominent technology widely employed for performing this task in many areas, including online finance, security monitoring, credit card fraud detection, and IoT (Internet of Things) technologies. An increasingly active and rapidly developing area of ac...
[ לנוסח המלא ]
יום שלישי, 26.02.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
Inverse problems appear in many applications, such as image deblurring, inpainting and super-resolution. The common approach to address them is to design a specific algorithm (or recently - a deep neural network) for each problem. The Plug-and-Play (P&P) framework, which has been recently introduced, allows solving general inverse problems by leveraging the impressive capabilities of existing denoising algorithms. While this fresh strategy has found many applications, a burdensome parameter tuni...
[ לנוסח המלא ]
יום חמישי, 21.02.2019, 10:00
The wide usage of smartphones encourages users to ubiquitously and constantly interact with web applications like microblogs and search engines. Examples of atomic interactions, referred as micro-actions, include posing a query, sending a textual message, sharing a photo etc. Analysis of micro-actions is beneficial for understanding the context of a micro-action and can be used for improving existing services and offering new ones. For example, by detecting whether a search is performed from a l...
[ לנוסח המלא ]
יום רביעי, 20.02.2019, 15:00
In the Maximum Carpool Matching problem we seek for the best way a group of people can share their ride based on their personal preferences (music, smoking, etc...).
Submodularity is a property of set functions. The problem of maximizing a submodular function appears in many applications such as viral marketing, information gathering, image segmentation, document summarization, and speeding up satisfiability solvers.
Both the Maximum Carpool Matching and the Submodular Function Maximizatio...
[ לנוסח המלא ]סתיו שפירו (מדעי המחשב והנדסת חשמל, טכניון)
יום שלישי, 19.02.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
Patch matching and local treatment of images has proven to be a successful strategy for problems such as image denoising, inpainting, super-resolution, image editing and the list could go on and on. Naturally, the size of the patch is a crucial parameter of the patch matching algorithm. Practically, working with large patches often results in a deterioration of reconstruction performance. This is due the curse of dimensionality -- an increase in the patch-size requires an exponential increase of...
[ לנוסח המלא ]רועי מחרז (הנדסת חשמל, טכניון)
יום שלישי, 12.02.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Feed-forward CNNs trained for image transformation problems rely on loss functions that measure the similarity between the generated image and a target image. Most of the common loss functions assume that these images are spatially aligned and compare pixels at corresponding locations. However, for many tasks, aligned training pairs of images will not be available. We present an alternative loss function that does not require alignment, thus providing an effective and simple solution for a new s...
[ לנוסח המלא ]
יום חמישי, 07.02.2019, 14:30
The mathematical study of social and information networks has
historically centered around generative models for such networks
(preferential attachment, the Chung-Lu random graph model, Kronecker
graphs, etc.). This talk proposes distribution-free models of social and
information networks - novel classes of graphs that capture all
plausible such networks. Our models are motivated by triadic closure,
the property that vertices with one or more mutual neighbors tend to
also be neighbors; t...
[ לנוסח המלא ]
יום שלישי, 29.01.2019, 12:30
Rich engagement data can shed light on how people interact with online content and how such interactions may be determined by the content of the page. In this work, we investigate a specific type of interaction, backtracking, which refers to the action of scrolling back in a browser while reading an online news article. We leverage a dataset of close to 700K instances of more than 15K readers interacting with online news articles, in order to characterize and predict backtracking behavior. We fi...
[ לנוסח המלא ]דנה דרקסלר-כהן (ETH, Zurich)
יום שלישי, 29.01.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Recent years have seen the emergence of new kinds of software including deep learning, programmable computer networks, and blockchains. Unfortunately, these systems have been shown to suffer from critical safety and security errors, affecting their wider adoption. The goal of my research is to develop new automated program verification and synthesis techniques which ensure safety and reliability of these systems.
In this talk, I will start by introducing AI2, the first automated verifier for ne...
[ לנוסח המלא ]יונתן לזרסון (Zebra Medical Vision)
יום שלישי, 29.01.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
The chest X-ray scan is by far the most commonly performed radiological examination for screening and diagnosis of many cardiac and pulmonary diseases. It is also one of the hardest to interpret, with disagreement rating of around 30% even for experienced radiologists. At Zebra, we have access to millions of X-ray scans, as well as their accompanied anonymized textual reports written by hospital radiologists. Can this data be used to teach an algorithm to identify significant clinical findings f...
[ לנוסח המלא ]
יום שני, 28.01.2019, 10:00
With the increase in malicious activity over the Internet, it has become extremely important to build tools for automatic detection of such activity. There have been attempts to use machine learning to detect network attacks, but the difficulty in obtaining positive (attack) examples, led to using one-class methods for anomaly detection. In this work we present a novel framework for using multiclass learning to induce an attack detector that identifies attacks at run time.
We designed a netw...
[ לנוסח המלא ]
יום ראשון, 27.01.2019, 15:00
Search systems are often focused on providing relevant results for the "now", assuming both corpora and user needs that focus on the present. However, many corpora today reflect significant longitudinal collections ranging from 20 years of the Web to hundreds of years of digitized newspapers and books. Understanding the temporal intent of the user and retrieving the most relevant historical content has become a significant challenge. Common search features, such as query expansion, leverage the ...
[ לנוסח המלא ]
יום רביעי, 23.01.2019, 12:30
The round complexity of zero-knowledge protocols is a long-standing open question, yet to be settled under standard assumptions. So far, the question has appeared equally challenging for relaxations such as weak zero-knowledge and witness hiding. Protocols satisfying these relaxed notions under standard assumptions have at least four messages, just like full-fledged zero knowledge. The difficulty in improving round complexity stems from a fundamental barrier: none of these notions can be achieve...
[ לנוסח המלא ]
יום שלישי, 22.01.2019, 18:30
חדר 337, בניין טאוב למדעי המחשב
המעבדה לתקשורת מחשבים (LCCN) בפקולטה למדעי המחשב מזמינה אתכם לערב חשיפה לרשתות תקשורת - להכיר מקרוב את פעילות המעבדה, המחקרים והפרוייקטים שהיא מציעה ואת הצוות המוביל אותם, לשמוע הרצאות ולהשתתף בדיונים בנושא, כמפורט במודעה המצורפת.
האיר...
[ לנוסח המלא ]
יום שלישי, 22.01.2019, 12:30
האולם השקוף , בית הסטודנט
מעבדות הפקולטה למדעי המחשב:
המעבדה לפיתוח תוכנה ומערכות (SSDL), המעבדה לסייבר ואבטחת מידע (CYBER) ותקשורת
מחשבים (LCCN) מזמינות אתכם לבקר ביריד הפרוייקטים השנתי בתחומי IOT, אנדרואיד, כופרה ורשתות.
היריד יתקיים ביום שלישי, 22 בינ...
[ לנוסח המלא ]אמנון דורי (אונ' תל-אביב)
יום שלישי, 22.01.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
Neural Networks have been shown to be remarkably resistant to label noise. This means that you can train a network using a data set that contains a significant fraction of wrongly-labelled samples, and the network will still be able to accurately predict the label for a previously unseen sample. Our results show that a main factor in explaining this resistance is that networks learn from a local group of training samples, similarly to a K-Nearest Neighbors algorithm. We are able to provide a mat...
[ לנוסח המלא ]אריאנה רמפיני (אונ' רומא)
יום שני, 21.01.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
The question whether one can recover the shape of a geometric object from its
Laplacian spectrum (‘hear the shape of the drum’) is a classical problem in spectral geometry
with a broad range of implications and applications. While theoretically the answer to this
question is negative (there exist examples of iso-spectral but non-isometric manifolds) little
is known about the practical possibility of using the spectrum for shape reconstruction and
optimization. In this talk, I will intro...
[ לנוסח המלא ]
יום שני, 21.01.2019, 11:00
The rapid increase in the popularity of cryptocurrencies brought with it not only questions regarding the quality of the technology itself, but also the economic phenomena surrounding them. Bitcoin in particular has proven itself to be a very volatile commodity~[Baek and Elbeck, Applied Economics 2015], and a poor currency, according to the definition of money [Kocherlakota, Journal of Economic Theory]. This has given rise to numerous alternative cryptocurrency models, which set about to improve...
[ לנוסח המלא ]Karthik C.S (מכון ויצמן למדע)
יום רביעי, 16.01.2019, 12:30
Given a set of points in a metric space, the Closest Pair problem asks to find a pair of distinct points in the set with the smallest distance. In this talk, we address the fine-grained complexity of this problem which has been of recent interest. At the heart of all our proofs is the construction of a dense bipartite graph with special embedding properties and are inspired by the construction of locally dense codes.
The talk is based on a joint work with Pasin Manurangsi.
...
[ לנוסח המלא ]
יום רביעי, 16.01.2019, 11:30
Stream frequency measurements are fundamental in many data stream applications such as financial data trackers, intrusion-detection systems, and network monitoring. Typically, recent data items are more relevant than old ones, a notion we can capture through a sliding window abstraction. This paper considers a generalized sliding window model that supports stream frequency queries over an interval given at query time. This enables
drill-down queries, in which we can examine the behavior of the ...
[ לנוסח המלא ]
יום שלישי, 15.01.2019, 14:30
How can we capture effectively the information expressed in multiple texts? How can we
allow people, as well as computer applications, to easily explore it? The current
semantic NLP pipeline typically ends at the single sentence or text level, putting the
burden on applications to consolidate and present related information across multiple
texts. Further, semantic representations, which may provide the basis for text
consolidation, are often based on non-trivial schemata which require exper...
[ לנוסח המלא ]
יום שלישי, 15.01.2019, 11:30
חדר 337, בניין טאוב למדעי המחשב
The driving force behind convolutional and recurrent networks — two of the most successful deep learning architectures to date — is their expressive power. Despite its wide acceptance and vast empirical evidence, formal analyses supporting this belief are scarce. The primary notions for formally reasoning about expressiveness are efficiency and inductive bias. Efficiency refers to the ability of a network architecture to realize functions that require an alternative architecture to be much l...
[ לנוסח המלא ]מיכל הורוביץ (Migal - Research Institute)
יום ראשון, 13.01.2019, 14:30
A model which mimics the programming operation of memory cells was first presented by Bunte and Lapidoth. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read the cell state in order to determine its programming success, and in case of programming failure, to reprogram the cell again. Reprogramming a cell can reduce the bit error rate, however this comes with the pric...
[ לנוסח המלא ]
יום רביעי, 09.01.2019, 12:30
A central object in optimal stopping theory is the single-choice prophet inequality for independent, identically distributed random variables: Given a sequence of random variables X_1,…,X_n drawn independently from a distribution F, the goal is to choose a stopping time τ so as to maximize α such that for all distributions F we have E[X_τ] ≥ α⋅E[max_t X_t]. What makes this problem challenging is that the decision whether τ = t may only depend on the values of the random variables X_1,...
[ לנוסח המלא ]
יום רביעי, 09.01.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
Widely recognized as the inventor of digital cash, David is also known for other fundamental innovations in cryptography, including privacy and secure election technology. David is currently leading the Elixxir blockchain project, a private, scalable platform capable of processing a high volume of payments, messages and file transfers. David will discuss Elixxir's breakthrough mixed network and multi-party computation architecture and how the technology addresses the current scaling and priva...
[ לנוסח המלא ]
יום שלישי, 08.01.2019, 11:30
As technology becomes highly integrated into nearly every aspect of life, and in many cases is indispensable, maintaining relative hand functionality is crucial. A transradial amputation is a partial amputation of the arm below the elbow that can greatly impede one’s ability to perform every day tasks at home and at work. With the growing dependency on hand functionality and gesture formation to keep up with technological use, the disparity in functional ability between those that are healthy ...
[ לנוסח המלא ]יובל גולדפרכט (אונ' חיפה)
יום שלישי, 08.01.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
We tackle the problem of multiple image alignment and 3D reconstruction under extreme noise. Photographs acquired in scenes with large intensity variations or in scattering media have significant spatial variance in signal-to-noise-ratio (SNR), where in some image regions it is significantly below the level current methods cope with. Modern alignment schemes, based on similarity measures, feature matching and optical flow are often pairwise, or assume global alignment. Nevertheless, under extre...
[ לנוסח המלא ]
יום שלישי, 08.01.2019, 10:30
Can we program computers in our native tongue? This idea, termed natural
language programming (NLPRO), has attracted attention almost since the
inception of computers themselves. From the point of view of software
engineering (SE), efforts to program in natural language (NL) have relied
thus far on controlled natural languages (CNL) -- small unambiguous
fragments of English with restricted grammars and limited expressivity. Is
it possible to replace these CNLs with truly natural, human language...
[ לנוסח המלא ]
יום שני, 07.01.2019, 11:30
We consider the problem of anomaly detection in images, and present a new detection technique. Given a sample of images, all known to belong to a ``normal'' class (e.g., dogs), we show how to train a deep neural model that can detect out-of-distribution images (i.e., non-dog objects). The main idea behind our scheme is to train a multi-class model to discriminate between dozens of geometric transformations applied on all the given images. The auxiliary expertise learned by the model generates fe...
[ לנוסח המלא ]
יום שני, 07.01.2019, 11:30
חדר 1061, בניין מאייר, הפקולטה להנדסת חשמל
In the era of “Big Code”, research is being conducted into automating the understanding of computer programs. Most of the current works borrow techniques from natural language processing and deep learning, which have been successful recently, attempting to process the code directly or using syntactic representations (e.g., ASTs and AST paths). However, to comprehend program semantics robustly, structural features of code have to be taken into account as well, including function calls, branch...
[ לנוסח המלא ]סידהרתא קומאר (Simula UiB)
יום ראשון, 06.01.2019, 14:30
Private information retrieval (PIR) is a technique of retrieving data from servers in a distributed storage system (DSS), without revealing the identity of the data to the servers. A scheme that achieves the PIR property is referred to as a PIR protocol and is characterized by its PIR rate, which the ratio of downloaded data and the size of the requested data. The supremum of PIR rates achieved by any PIR protocol in a DSS that stores data using arbitrary coded data is referred to as the PIR cap...
[ לנוסח המלא ]
יום ראשון, 06.01.2019, 10:30
It is no secret that online companies, hospitals, credit-card companies
and governments hold massive datasets composed of our sensitive personal
details. Information from such datasets is often released using some
privacy preserving heuristics, which have been repeatedly shown to fail.
That is why in recent years the notion of differential privacy has been
gaining much attention, as an approach for conducting data-analysis that
adheres to a strong and mathematically rigorous notion o...
[ לנוסח המלא ]
יום חמישי, 03.01.2019, 10:30
Understanding deep learning calls for addressing three fundamental
questions: expressiveness, optimization and generalization.
Expressiveness refers to the ability of compactly sized deep neural
networks to represent functions capable of solving real-world problems.
Optimization concerns the effectiveness of simple gradient-based
algorithms in solving non-convex neural network training programs.
Generalization treats the phenomenon of deep learning models not
overfitting despite...
[ לנוסח המלא ]
יום רביעי, 02.01.2019, 12:30
n the function-inversion problem, an algorithm gets black-box access to a
function $f:[N] \to [N]$ and takes as input a point $y \in [N]$, along with
$S$ bits of auxiliary information about $f$. After running for time $T$, the
algorithm must output an $x \in [N]$ such that $f(x) = y$, if one exists. This
problem, first studied by Hellman (1980), has manifold applications to
cryptanalysis.
Hellman’s algorithm for this problem achieves the time-space tradeoff $S = T =
\tilde{O}(...
[ לנוסח המלא ]אינה פ. וייסבנד (אונ' שיקגו)
יום רביעי, 02.01.2019, 11:30
חדר 861, בניין מאייר, הפקולטה להנדסת חשמל
Hardware security of integrated circuits (ICs) is a significant concern in many emerging market segments, such as intelligent transportation, innovative health care, sophisticated security systems, and smart energy applications. In particular, modern side-channel attacks that exploit information leaked by physical IC implementation pose a serious threat to the security of secret data on-chip. In this talk, a theoretical framework will be presented for actively detecting power analysis attacks (...
[ לנוסח המלא ]
יום שלישי, 01.01.2019, 14:30
Programming languages are a tool for human thought, expression, and work
yet they are principally designed using mathematical and engineering
techniques. In this talk, I will describe how our group has applied
human-centered design techniques --- interviews, participatory design
exercises, and qualitative analysis of developer forums --- in the design
of three research programming systems (Plaid, Glacier, and Obsidian).
I will speak frankly about the strengths and weaknesses of these appro...
[ לנוסח המלא ]