Program Obfuscation: The Power of Unreadable Code

Nir Bitansky - CS-Lecture - Note unusual day

Wednesday, 30.12.2015, 14:30

Room 337-8 Taub Bld.

Parallel Additive Fast Fourier Transform Algorithms

Matan Hamilis

Wednesday, 30.12.2015, 13:30

Taub 601

Additive Fast Fourier Transforms and the finite fields in which they work have a main role in many algebraic applications. One of these applications is to implement a whole PCP system to obtain a succinct proof of computational integrity. In this work we modifty a ...

[Full version]

[Full version]

Technical Talk on Validating Gmail by Google

Yachin Pnueli (Google R&D)

Wednesday, 30.12.2015, 12:30

Taub 9

Google will give a technical talk on Validating Gmail and Maintaining Gmail's data, on Wednesday, December 30th, 2015, at 12:30, in Class 9, Taub Building for Computer Science. Please register ahead.

[Full version]

[Full version]

Theory Seminar: Hardness in P

Amir Abboud (Stanford University)

Wednesday, 30.12.2015, 12:30

Taub 201

The class P attempts to capture the efficiently solvable computational tasks. It is full of practically relevant problems, with varied and fascinating combinatorial structure. In this talk, I will give an overview of a rapidly growing body of work that seeks a better understanding of ...

[Full version]

[Full version]

ceClub: Schemes for Network Survivability in QoS-Supporting Architectures

Jose Yallouz (EE, Technion)

Wednesday, 30.12.2015, 11:30

EE Meyer Building 861

Coping with network failures has been recognized as an issue of major importance in terms of security, stability and prosperity. It has become clear that current networking standards fall short of coping with the complex challenge of surviving failures. The need to address this challenge ...

[Full version]

[Full version]

Fast Sublinear Algorithms for Error Detection and Correction

Noga Ron-Zewi - CS-Lecture

Tuesday, 29.12.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: Edge Detection and other tasks on a Computational Budget: A Sublinear Approach

Boaz Nadler (Weizmann Institute of Science)

Tuesday, 29.12.2015, 11:30

EE Meyer Building 1061

Collecting large amounts of data is now common in multiple applications. In certain cases, particularly involving real-time processing, we might, however, not even be able to analyze all of it. This raises the following question: How well can we perform some task under severe computational ...

[Full version]

[Full version]

ceClub: Game theory applied to Protection Against SIS Epidemics in Networks

Eitan Altman (INRIA)

Monday, 28.12.2015, 11:30

EE Meyer Building 1061

Defining an optimal protection strategy against viruses, spam propagation or any other kind of contamination process is an important feature for designing new networks and architectures. In this work, we consider decentralized optimal protection strategies when a virus is propagating over a network through a ...

[Full version]

[Full version]

Towards the Deployment of Cooperative Game-Theoretic Solutions

Yair Zick - CS-Lecture

Sunday, 27.12.2015, 14:30

Room 337-8 Taub Bld.

Nothing but net? content and network factors in information diffusion

Oren Tsur - CS-Lecture

Thursday, 24.12.2015, 14:30

Room 337-8 Taub Bld.

Interactive Information Theory

Gillat Kol - CS-Lecture - Note unusual day

Wednesday, 23.12.2015, 14:30

Room 337-8 Taub Bld.

Theory Seminar: Functional Lower Bounds
for Depth-4 Arithmetic Circuits
and Connections to ACC

Ramprasad Saptharishi (Tel-Aviv University)

Wednesday, 23.12.2015, 12:30

Taub 201

Recent years have seen a surge of activity in the field of arithmetic circuit lower bounds. Although there has been a tremendous improvement in our understanding of arithmetic circuits, they do not translate to analogues in the boolean world. In this talk, In this talk, ...

[Full version]

[Full version]

ceClub: Challenges in Blockchain Protocols

Ittay Eyal (Cornell University)

Wednesday, 23.12.2015, 11:30

EE Meyer Building 861

The study of security in decentralized large-scale distributed systems has made a large leap forward with the introduction of cyber-currencies, starting with Bitcoin. This talk will discuss three results tackling central challenges that were exposed by this progress. Cyber-currencies, as the name implies, implement secure ...

[Full version]

[Full version]

Amazon Web Services (AWS)

Wednesday, 23.12.2015, 09:30

EE Meyer Building 1003

Amazon Web Services (AWS) first AWSome Day will take place at the Technion on Tuesday, December 23st. between 9:00 to 16:00 at the EE Meyer Building 1003. The free one-day training event will be delivered by AWS Educational Instructors, and is ideal for technical leaders, ...

[Full version]

[Full version]

Pixel Club: On the Expressive Power of Deep Learning: A Tensor Analysis

Nadav Cohen (Hebrew University of Jerusalem)

Tuesday, 22.12.2015, 11:30

EE Meyer Building 1061

It has long been conjectured that hypothesis spaces suitable for data that is compositional in nature, such as text or images, may be more efficiently represented with deep hierarchical architectures than with shallow ones. Despite the vast empirical evidence, formal arguments to date are limited ...

[Full version]

[Full version]

Technical Talk on Tradeoff Analytics

Ateret Anaby-Tavor (Watson IBM)

Sunday, 20.12.2015, 18:30

Room 337-8 Taub Bld.

Which computer to purchase? Which job to pick? What's the basics of decision making and how technology helps us in hard decision making. More details in the attached poster.

[Full version]

[Full version]

Reasoning about Infinite-State Systems

Sharon Shoham - CS-Lecture

Sunday, 20.12.2015, 14:30

Room 337-8 Taub Bld.

Theory Seminar: Learning: Generalization and Simplification
of Binary-labeled Classes

Shay Moran (CS, Technion)

Wednesday, 16.12.2015, 12:30

Taub 201

Generalization and simplification are two basic facets of learning. Learning theory gives several mathematical manifestations of these facets. We will present two of these: (i) A generalization model: Probably Approximately Correct learning [Vapnik-Chervonenkis ’71, Valiant ’84], and (ii) A simplification model: Sample compression schemes [Littlestone-Warmuth ...

[Full version]

[Full version]

ceClub: Improving Parallel Programs with Architectural Insights

Adam Morrison (CS, Technion)

Wednesday, 16.12.2015, 11:30

EE Meyer Building 861

Developers and researchers design parallel systems and concurrent algorithms using models---both formal and mental---that abstract away details of the underlying hardware. In practice, however, these hidden hardware/software interactions often have a dominating impact on performance. In this talk, I will show how understanding the interplay ...

[Full version]

[Full version]

When Can Limited Randomness Be Used in Repeated Games?

Moni Naor - COLLOQUIUM LECTURE

Tuesday, 15.12.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: Computational Multi-focus Imaging Combining Sparse Model with Color Dependent Phase Mask

Harel Haim (Tel-Aviv University)

Tuesday, 15.12.2015, 11:30

EE Meyer Building 1061

A method for extended depth of field imaging based on image acquisition through a thin binary phase plate followed by fast automatic computational post-processing is presented. By placing a wavelength dependent optical mask inside the pupil of a conventional camera lens, one acquires a unique ...

[Full version]

[Full version]

CGGC M.Sc. Seminar: Piecewise Linear Tangent Vector Fields on Triangulated Surfaces

Alexandre Djerbetian (CS, Technion)

Sunday, 13.12.2015, 13:30

Room 337-8, Taub Bld.

Tangent vector field processing on discrete surfaces poses many challenges, one of the first being the choice of representation. The popular choice of piecewise-constant vector fields per face leads to very simple expressions and algorithms, at the price of lower accuracy and difficulties in defining ...

[Full version]

[Full version]

Communication Aspects in MapReduce

Shantanu Sharma (Ben-Gurion University)

Sunday, 13.12.2015, 11:30

Taub 401

We deal with design of models and algorithms for MapReduce. In MapReduce, an input is replicated to several reducers, and hence, the replication of an input dominates the communication cost, which is a performance measure of a MapReduce algorithm. Our MapReduce model is favorable for ...

[Full version]

[Full version]

CGGC Seminar: Introduction to Constraint System Decomposition

Boris van Sosin (CS, Technion)

Sunday, 6.12.2015, 13:30

Room 337-8, Taub Bld.

I this talk, we will introduce the concept of constraint system decomposition and show how it is beneficial for solving problems in computational geometry. We will also present the geometric and algebraic approaches to constraint decomposition and discuss their advantages and disadvantages with respect to ...

[Full version]

[Full version]

Theory Seminar: An Instance of Subset Sum Hardfor Cutting Planes(An Invitation to Proof Complexity)

Yuval Filmus (CS, Technion)

Wednesday, 2.12.2015, 12:30

Taub 201

Proof complexity started its life as an attempt to prove that NP is different from coNP. The main goal of the area is to show that no proof system can prove that all negative instances of 3SAT are unsatisfiable using polynomial size proofs. However, this ...

[Full version]

[Full version]

Applications of Dimensionality Reduction Techniques in Genetics

Eran Halperin - COLLOQUIUM LECTURE - Note unusual hour

Tuesday, 1.12.2015, 15:00

Room 337-8 Taub Bld.

Pixel Club: Hinge-Minimax Learner for the Intersection of K-hyperplanes

Margarita Osadchy (Haifa University)

Tuesday, 1.12.2015, 11:30

EE Meyer Building 1061

In this work we consider non-linear classifiers that positively classify a point when it resides in the intersection of $k$ hyperplanes. We learn these classifiers by minimizing the minimax risk of the negative training examples and the sum of hinge-loss of the positive training examples. ...

[Full version]

[Full version]

Technion and CS-TCE Intel Challenge

Wednesday, 25.11.2015, 13:30

EE Meyer Building 1003

You are invited to attend finals of 3rd Intel coding challenge on Wednesday, November 25, 2015, 13:30-17:00, at the EE Meyer Bulding, in lobby 280 and after the break in room 1003. The Intel Coding challenge is open to undergraduate students of Technion CS and ...

[Full version]

[Full version]

Theory Seminar: Welfare Maximization with Limited Interaction

Omri Weinstein (Princeton University)

Wednesday, 25.11.2015, 12:30

Taub 201

We continue the study of welfare maximization in unit-demand (matching) markets, in a distributed information model where agent's valuations are unknown to the central planner, and therefore communication is required to determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed that if the market ...

[Full version]

[Full version]

ceClub: Infrastructure Sharing in Cellular Networks

Francesco Malandrino (Hebrew University of Jerusalem)

Wednesday, 25.11.2015, 11:30

EE Meyer Building 861

The talk summarizes the main challenges and opportunities of infrastructure sharing in present and future cellular networks. We begin by assessing, through real-world demand and deployment traces, how sharing can improve the efficiency of present-day networks, especially in rural areas. We then move to next-generation ...

[Full version]

[Full version]

TCE Guest Lecture: Robust Estimator for Multiple Inlier Structures

Peter Meer (Rutgers University)

Tuesday, 24.11.2015, 11:30

Room 337-8, Taub Bld.

In the generalized projection-based M-estimator (gpbM), published a few years ago, multiple structures with different scales were estimated without the scale parameter specified for each inlier structure. However, the gpbM can be defined from much simpler assumptions. From M trials based on the elemental subsets, ...

[Full version]

[Full version]

Using Network Models to predict Disease Outbreaks, Bioterrorism, and Drug Deaths

Ben Reis - COLLOQUIUM LECTURE - Note unusual day

Wednesday, 18.11.2015, 14:30

Room 337-8 Taub Bld.

Theory Seminar: How to Compress Asymmetric Communication

Sivaramakrishnan Natarajan Ramamoorthy (University of Washington)

Wednesday, 18.11.2015, 12:30

Taub 201

We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If I_A denotes the number of bits of information revealed by the first party, I_B denotes the information revealed by the second party, and C is the number ...

[Full version]

[Full version]

ceClub: Forwarding in Computer Cluster Networks

Eitan Zahavi (Technion)

Wednesday, 18.11.2015, 11:30

EE Meyer Building 861

Large Computer Clusters are the infrastructure behind The Cloud and Web2 services. These large clusters host highly parallel programs like distributed databases and MapReduce. The parallelism is required for handling the Big Data stored on these clusters. But applications with high degree of parallelism stress ...

[Full version]

[Full version]

TCE Guest Lecture: From Objective Functions in Computer Vision to Robust Inlier Structures (Part III)

Peter Meer (Rutgers University)

Wednesday, 18.11.2015, 10:30

Taub 601

In these three lectures a (personal) view is given on how from linear/nonlinear objective functions at the input, one can built non robust or robust estimation. If a higher dimensional linear space is considered for nonlinear inputs, one could, directly in total least squares; or ...

[Full version]

[Full version]

Pixel Club: Similarity is in the EYE of the Beholder

George Leifman (MIT)

Tuesday, 17.11.2015, 11:30

EE Meyer Building 1061

Defining and calculating similarity between objects or images is one of the key topics in computer vision and computer graphics. After reviewing my early work on similarity for shape analysis, I will present my recent work, which focuses on the human EYE. The eye is ...

[Full version]

[Full version]

CGGC Seminar: EvoluteTools T.MAP –Mesh Parametrizationfor Rhinoceros 3D

Alexander Schiftner (Evolute GmbH)

Sunday, 15.11.2015, 13:30

Room 337-8, Taub Bld.

The task of parametrizing meshes and, as one important application, quad re-meshing, has been studied extensively in recent years. In this talk I will give an overview of a recent implementation called EvoluteTools T.MAP, which provides mesh parametrization to the wide user community of Rhinoceros ...

[Full version]

[Full version]

Theory Seminar: Randomized Proof-Labeling Schemes

Mor Baruch (Tel-Aviv University)

Wednesday, 11.11.2015, 12:30

Taub 201

Proof-labeling schemes, introduced by Korman, Kutten and Peleg [PODC 2005], are a mechanism to certify that a network configuration satisfies a given boolean predicate. Such mechanisms find applications in many contexts, for example, the design of fault-tolerant distributed algorithms. In a proof-labeling scheme, predicate verification ...

[Full version]

[Full version]

TCE Guest Lecture: From Objective Functions in Computer Vision to Robust Inlier Structures (Part II)

Peter Meer (Rutgers University)

Wednesday, 11.11.2015, 10:30

Taub 601

In these three lectures a (personal) view is given on how from linear/nonlinear objective functions at the input, one can built non robust or robust estimation. If a higher dimensional linear space is considered for nonlinear inputs, one could, directly in total least squares; or ...

[Full version]

[Full version]

Vertex Sparsification of Cuts, Flows, and Distances

Robert Krauthgamer - COLLOQUIUM LECTURE

Tuesday, 10.11.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: Visual Vibrometry: Using Cameras as Displacement Sensors

Miki Rubinstein (Google)

Tuesday, 10.11.2015, 11:30

EE Meyer Building 1061

Over the last few years we have been developing techniques for analyzing small motions in videos. Our techniques are based on an Eulerian approach for motion processing, which does not explicitly compute motion vectors (as traditionally done in computer vision), but rather analyzes intensity changes ...

[Full version]

[Full version]

WomenTechPro Lecture

Talya Lavi (UX\UI, HP Software & President UXPA Isreal)

Sunday, 8.11.2015, 18:30

Taub 9

WomenTechPRO Community will host an expert on UX user experience: Dr. Talya Lavie , a leading group of UX \ UI in the HP Software and president of UXPA Israel, will talk about UX engineers and on the science behind the user experience and ergonomics, ...

[Full version]

[Full version]

Theory Seminar: On Monotonicity Testing and Boolean Type Isoperimetric Inequalities

Dor Minzer (Tel-Aviv University)

Wednesday, 4.11.2015, 12:30

Taub 201

We show a directed and robust analogue of a Boolean isoperimetric type theorem of Talagrand. As an application, we give a monotonicity testing algorithm that makes O(\sqrt{n}/\eps^2) non-adaptive queries to a function f, always accepts a monotone function and rejects a function that is \eps-far ...

[Full version]

[Full version]

ceClub: Towards an Inexpensive, Reliable and Intelligent

Yue Li (CalTech)

Wednesday, 4.11.2015, 11:30

EE Meyer Building 861

Archival data once written are rarely accessed by user, and need to be reliably retained for long periods of time. The challenge of using inexpensive NAND flash to archive cold data was posed recently for saving data center costs. Solid state drives are faster, more ...

[Full version]

[Full version]

TCE Guest Lecture: From Objective Functions in Computer Vision to Robust Inlier Structures (Part I)

Peter Meer (Rutgers University)

Wednesday, 4.11.2015, 10:30

Taub 601

In these three lectures a (personal) view is given on how from linear/nonlinear objective functions at the input, one can built non robust or robust estimation. If a higher dimensional linear space is considered for nonlinear inputs, one could, directly in total least squares; or ...

[Full version]

[Full version]

Group Testing, Compressed sensing and Algorithmic applications

Ely Porat - COLLOQUIUM LECTURE

Tuesday, 3.11.2015, 14:30

Room 337-8 Taub Bld.

TECH TALK BY FACEBOOK

FACEBOOK

Tuesday, 3.11.2015, 12:30

Taub 9

Please see more details in the attached poster.

[Full version]

[Full version]

Pixel Club: The Watershed as a Case Study of “Why Doing Mathematics is Interesting in Practice”

Laurent Najman (Université Paris-Est Marne-la-Vallée)

Tuesday, 3.11.2015, 11:30

Room 337-8, Taub Bld.

The watershed algorithm, as proposed by Ch. Lantuéjoul in 1978 and as implemented by L. Vincent and P. Soille in 1991 for image segmentation has been in applications an extremely popular tool ever since, but it is nowadays not so popular at the research level ...

[Full version]

[Full version]

Pixel Club: Learning to Hash

Alex Bronstein (Tel-Aviv University)

Tuesday, 3.11.2015, 11:30

Room 337-8, Taub Bld.

In view of the recent huge interest in image classification and object recognition problems and the spectacular success of deep learning and random forests in solving these tasks, it seems astonishing that much more modest efforts are being invested into related, and often more difficult, ...

[Full version]

[Full version]

Theory Seminar: Fair-and-Square:Cake-cutting in Two Dimensions

Erel Segal-Halevi (Bar-Ilan University)

Wednesday, 28.10.2015, 12:30

Taub 201

A geometer, an economist and a Ph.D. student are asked to divide a land-estate fairly among several people. The geometer partitions the land to nicely-shaped parcels - equal-size squares. But the people are unhappy, because squares in different locations have different values (a square near ...

[Full version]

[Full version]

ceClub: Pushing the Time Space Trade-off in Standard Compression

Danny Harnik (IBM)

Wednesday, 28.10.2015, 11:30

EE Meyer Building 1007

In this talk I'll present work on data compression that touches both on the theory of fast compression design and practical aspects as dictated by market and product requirements. I will describe the background, the challenges and our solutions for pushing the time limits of ...

[Full version]

[Full version]

Pixel Club: Supervised Learning of Bag-of-features Descriptors, Using Sparse Coding

Roee Litman (Tel-Aviv University)

Tuesday, 27.10.2015, 11:30

EE Meyer Building 1061

We present a method for supervised learning of shape descriptors for shape retrieval applications. Many content- based shape retrieval approaches follow the bag-of-features (BoF) paradigm commonly used in text and image retrieval by first computing local shape descriptors, and then representing them in a `geometric ...

[Full version]

[Full version]

Pixel Club: Underwater Microscopes: From the Lab to the Field

Jules Jaffe (UC San Diego)

Monday, 26.10.2015, 11:30

EE Meyer Building 815

Although microscopic processes play a vital role in marine ecosystems and hence, global ecology, the in situ tools to observe them have not existed. Underwater microscopes can play an important role in observing such processes if the difficulties of providing undisturbed measurements can be overcome. ...

[Full version]

[Full version]

Efficient Content Delivery in P2P networks

Alexander Libov

Wednesday, 21.10.2015, 14:30

Taub 601

Internet video streaming already accounts for over 64% all global IP traffic and is projected to increase in the foreseeable future. Consequently, improving the delivery mechanisms of video streaming is an important challenge with real-world consequences that has seen a plethora of protocols and systems ...

[Full version]

[Full version]

TODAY! New Projects Fair for the Winter Semester 2015 at CS

Wednesday, 21.10.2015, 14:30

CS Taub Building Lobby

CS labs invite you to visit the new project fair on Wednesday, October 21st, 2015, 14:30-16:30 at the Taub Building Lobby. The fair will present the new projects offered by the labs for the winter semester as well as other and activities performed at the ...

[Full version]

[Full version]

Theory Seminar: Bloom Filters in Adversarial Environments

Eylon Yogev (Weizmann Institute of Science)

Wednesday, 21.10.2015, 12:30

Taub 201

Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usually, their efficiency and/or correctness are analyzed using probabilistic tools under the assumption that the inputs and queries are independent of the internal randomness of the data structure. In this talk, I'll ...

[Full version]

[Full version]

ceClub: PowerSpy: Location Tracking using Mobile Device Power Analysis

Yan Michalevsky (Standford University)

Wednesday, 21.10.2015, 11:30

EE Meyer Building 861

Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone's aggregate power consumption over a period of a ...

[Full version]

[Full version]

When Physics Met Information - a Model for the Emergence of Coded Life

Tal Mor - COLLOQUIUM LECTURE

Tuesday, 20.10.2015, 14:30

Room 337-8 Taub Bld.

Entity search in Facebook

Irena Grabovitch-Zuyev

Wednesday, 14.10.2015, 16:00

Taub 601

Facebook is the most popular online social network, with more than a billion active users. As such, Facebook has become a significant source of information and searching within its mass content has become a necessity. Nevertheless, very little research has been done on Facebook Search, ...

[Full version]

[Full version]

CGGC Seminar: Solid Modelling for VLSI Design

Elisha Sacks (Computer Science, Purdue University)

Wednesday, 7.10.2015, 13:00

Taub 401

Solid modelling is a core technology in VLSI process and device modelling. Intel has found that commercial software can be unreliable and slow. An important example is computing an offset of a polyhedron. Prior work on robust computational geometry makes assumptions that conflict with the ...

[Full version]

[Full version]

Efficient Detection Of Flow Anomalies With Limited Monitoring Resources

Jalil Moraney

Thursday, 17.9.2015, 13:00

Taub 601

The real time detection of flow anomalies is a critical part of wide range of management and security applications in many Cloud and NFV systems. Solutions that are based on per-flow records become impossible due to the increasing traffic volumes and the limited available resources ...

[Full version]

[Full version]

CGGC Seminar: Solid Modelling for VLSI Design

Elisha Sacks (Computer Science, Purdue University)

Monday, 7.9.2015, 13:00

Taub 401

Solid modelling is a core technology in VLSI process and device modelling. Intel has found that commercial software can be unreliable and slow. An important example is computing an offset of a polyhedron. Prior work on robust computational geometry makes assumptions that conflict with the ...

[Full version]

[Full version]

The 4th TCE Summer School on Cyber and Computer Security

Sunday, 6.9.2015, 09:00

EE Meyer Building 1003

The 4th TCE Summer School on Cyber and Computer Security will be held on Sunday-Wednesday, September 6th-9th, 2015. Location: Room 1003, Meyer Building (EE), Technion, Haifa. Attendance is free, but registration is required Registration and preliminary program available here Topics include innovation and entrepreneurship in ...

[Full version]

[Full version]

Pixel Club: Image Processing Strategies for 3d Structure Determination of Proteins

Gabriel Frank (NIH)

Thursday, 3.9.2015, 11:30

EE Meyer Building 1061

Structural biology seeks to determine the structure of proteins and other macromolecular assemblies in order to understand of their function. Ground-breaking advances in detectors’ technology and image processing is revolutionizing this field by enabling the application of electron microscopy for 3D structure determination. In this ...

[Full version]

[Full version]

Theory Seminar: How to Refute a Random CSP

David Witmer (Carnegie Melon)

Monday, 10.8.2015, 10:30

Taub 601

Consider a random constraint satisfaction problem (CSP) over $n$ variables with $m$ constraints, each being a predicate $P$ applied to $k$ random literals. When $m \gg n$ the instance will be unsatisfiable with high probability, and the natural associated algorithmic task is to find a ...

[Full version]

[Full version]

3rd TCE Summer School

Sunday, 2.8.2015, 11:30

Computer Engineering Center, Fishbach Building, Technion

NetFPGA Summer Course 2015 Speakers: Noa Zilberman & Yury Audzevich Host: Mark Silberstein NetFPGA is an open source platform enabling researchers and instructors to build high-speed hardware-accelerated networking systems. The NetFPGA is the de-factor experimental platform for line-rate implementations of network research and it has ...

[Full version]

[Full version]

A Programming Language Perspective on Transactional Memory Consistency

Sandeep Hans

Wednesday, 29.7.2015, 11:00

Taub 601

Transactional memory (TM) eases the task of writing concurrent applications by letting the programmer designate certain code blocks as atomic. One of the main challenges in stating the correctness of TM systems is the need to provide guarantees on the system state observed by live ...

[Full version]

[Full version]

CYBERDAY 2015

Wednesday, 29.7.2015, 09:00

CS Taub Build. Auditorium 1

On Wednesday. July 29, 2015 we will hold the CYBERDAY workshop on Cyber and Computer Security in the Computer Science department at the Technion together with the Technion computer engineering center. Information, program and registration are available in http://cyberday.org/ The workshop will be held in ...

[Full version]

[Full version]

'Cause I'm Strong Enough: Reasoning about Consistency Choices in Distributed Systems

Prof. Alexey Gotsman - SPECIAL LECTURE - Note unusual location

Tuesday, 28.7.2015, 14:30

Room 601 Taub Bld.

Multi-variate Abstractions of Algebraic Geometry Codes, With Applications

Yohay Kaplan

Wednesday, 15.7.2015, 11:00

Taub 601

Polynomials over finite fields, and specifically the error correcting codes they induce, have been used extensively in all areas of theoretical computer science. These consist of the evaluation of univariate or multivariate (known as Reed-Solomon(RS) or Reed-Muller(RM) codes, respectively) polynomials on the points of some ...

[Full version]

[Full version]

Scenario Based Programming for Mobile Applications

Anat Berkman

Tuesday, 14.7.2015, 13:30

Taub 701

We introduce a novel method for creating mobile applications, integrating the Android SDK into PlayGo, a scenario-based behavioral programming framework. The framework we implemented allows creating mobile applications simply by using a visual GUI editor, and then incrementally “playing in” scenarios that construct the application ...

[Full version]

[Full version]

Pixel Club: Advanced Texture Decomposition in the Spectral TV Domain

Dikla Horesh (EE, Technion)

Tuesday, 14.7.2015, 11:30

EE Meyer Building 1061

The total variation (TV) functional is today a fundamental regularizing tool in image processing. It is employed for denoising, deconvolution, optical-flow, tomographic reconstruction, texture and image analysis and more. Recently a spectral TV framework was introduced which extends linear filtering techniques and eigenvalue analysis to ...

[Full version]

[Full version]

ceClub: Cached Compression of Packet Classifiers

Janos Tapolcai & Gabor Retvari (Budapest University of Technology and Economics (BME)

Wednesday, 8.7.2015, 11:30

EE Meyer Building 861

Packet classification is a building block in many network services such as routing, filtering, intrusion detection, accounting, monitoring, load-balancing and policy enforcement. Compression has gained attention recently as a way to deal with the expected increase of classifiers size. Typically, compression schemes try to reduce ...

[Full version]

[Full version]

Theory Seminar: Sampling in Space Restricted Settings

Anup Bhattacharya (IIT Delhi)

Wednesday, 1.7.2015, 12:30

Taub 201

We consider the random sampling problem in the streaming setting. The algorithm returns, at any time t, an item chosen uniformly at random from all items seen till time t. Our model allows storage for only one item at a time in the stream. We ...

[Full version]

[Full version]

ceClub: Adopting Software-Defined Networking: Challenges and Recent Developments

Kirill Kogan (IMDEA Networks Institute)

Wednesday, 1.7.2015, 11:30

EE Meyer Building 1061

Initially, SDN has been promoted as a simpler and more flexible way of managing networks than traditional approaches. However, it is unlikely that a single SDN controller vendor will have best-in-class implementation of all network services, so the coexistence of several managing controllers will be ...

[Full version]

[Full version]

Pixel Club: Homotopic Morphing of Planar Curves

Nadav Dym (Weizmann Institute of Science)

Tuesday, 30.6.2015, 11:30

EE Meyer Building 1061

We present an algorithm for morphing between planar curves (with identical turning number), such that the morph is guaranteed to be a regular homotopy. This means that pinching will not occur in the intermediate curves, or in other words, global intersections are allowed but not ...

[Full version]

[Full version]

Pixel Club:Transport-Aware Cameras

Prof. Kyros Kutulakos (CS, University of Toronto)

Monday, 29.6.2015, 14:30

EE Meyer Building 1061

Conventional cameras record all light falling onto their sensor regardless of the path that light followed to get there. In this talk I will present an emerging family of video cameras that can be programmed to record just a fraction of the light coming from ...

[Full version]

[Full version]

Arduino Project Fair at CS

Sunday, 28.6.2015, 13:30

Room 337-8, Taub Bld.

CS students in the course "Project in Advanced Programming" invite you to an Arduino project fair on Sunday, June 28, 2015, between 13 00-16.30, in room 337 (3rd floor) of CS Taub Building. The fair will exhibit new Arduino pojects designed to facilitate life in ...

[Full version]

[Full version]

CGGC Seminar: Linear and Nonlinear Elasticity Methods for Shape Matching

Konard Simon (Weizmann Institute of Science)

Sunday, 28.6.2015, 13:30

Taub 701

Shape matching is the problem of finding a meaningful transformation between two (or more) shapes that have a priori unknown correspondences. It is the key ingredient for many applications in computer vision, medical imaging and graphics. These applications comprise, for example, shape interpolation, shape retrieval, ...

[Full version]

[Full version]

TCE EVENT: Professor Workshop on Internet of Things and Digital Signal Processing - POSTPONED!

Igal Eliyahu (senior FAE, ARM Israel)

Sunday, 28.6.2015, 09:30

CS Taub Building

The Technion Computer Engineering Center proudly presents ARM University Day to be held at the Technion on Sunday, June 28th, 2015. This Professor Workshop is held by the ARM University Programme, in partnership with the Technion – Computer Engineering Center, and is aimed at providing ...

[Full version]

[Full version]

CS Annual Fair In Software Engineering

Thursday, 25.6.2015, 13:30

Room 337-8, Taub Bld.

CS Software Engineering students invite you to attend the CS Annual Fair in Software Engineering which will be held by the project teams on Thursday-Noon, June 25 2015, between 11:30-13:30, in room 337 (3rd Floor), CS Taub Building as follows: Robotwitter - Respond automatically to ...

[Full version]

[Full version]

Google talk on Virtual Reality

Wednesday, 24.6.2015, 17:00

Room 337-8 Taub Bld.

Google talk on Virtual Reality and Project Tango, and experience the technology first hand. Program: 17:00 - Stepping stones to a software engineering career (for 1st and 2nd year) 18:15 - Virtual reality tech talk and demo

[Full version]

[Full version]

Application Fair at CS

Wednesday, 24.6.2015, 14:30

Room 337-8, Taub Bld.

CS students in the course "Project in Advanced Programming" and the course "Project in Computer Communication" invite you to an android applications fair on Wednesday, June 24, 2015, between 14 00-16.00, in room 337 (3rd floor) of CS Taub Building. The fair will exhibit new ...

[Full version]

[Full version]

Theory Seminar: Decoding Reed-Muller Codes from Many Random Errors

Ben Lee Volk (Tel-Aviv University)

Wednesday, 24.6.2015, 12:30

Taub 201

Reed-Muller codes encode an m-variate polynomial of degree r by its evaluations over all points in {0,1}^m. The distance of the code is 2^{m-r}, so in the worst case it is impossible to correct more that half that number of errors. For the model of ...

[Full version]

[Full version]

Get Ready To The 2015 Segel-Students End Of Year Party

Wednesday, 24.6.2015, 12:30

CS Taub Building

The 2015 Segel-Sudent End of Year Party will be held on Thursday, June 24, 2015, between 12:30-14:30, at the CS Taub Lobby. Free beer, volleyball game with CS Team (on the lawn) plenty of fun are guaranteed. You are all invited!

[Full version]

[Full version]

ceClub: Finding Yourself is the Key - Biometric Key Derivation Which Keep Your Privacy

Orr Dunkelman (Haifa University)

Wednesday, 24.6.2015, 11:30

Class 9, Floor 1, Taub Bld.

Biometric authentication is more secure than using regular passwords, as biometrics cannot be "forgotten" and allegedly contain high entropy. Thus, many constructions rely on biometric features for authentication, and use them as a source for "good" cryptographic keys. At the same time, biometric systems carry ...

[Full version]

[Full version]

Pixel Club: Image Annotation using Deep Learning and Fisher Vectors

Lior Wolf (Tel-Aviv University)

Tuesday, 23.6.2015, 11:30

Room 337-8 Taub Bld.

We present a system for solving the holy grail of computer vision -- matching images and text and describing an image by an automatically generated text. Our system is based on combining deep learning tools for images and text, namely Convolutional Neural Networks, word2vec, and ...

[Full version]

[Full version]

CGGC Seminar: Orientation Analysis of 3D Objects Toward Minimal Support Volume in 3D-printing

Ben Ezair (CS, Technion)

Sunday, 21.6.2015, 13:30

Room 337-8 Taub Bld.

In this work, we examine how the support structure in 3D-printing can be optimized, by changing a model's orientation. Specifically, we explore the effect that the orientation of a printed object has on the volume of the needed support structure, directly below the model. We ...

[Full version]

[Full version]

Theory Seminar: Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation

Ran Cohen (Bar-Ilan University)

Wednesday, 17.6.2015, 12:30

Taub 201

In the setting of secure multiparty computation, a set of parties wish to compute a joint function of their private inputs. The computation should preserve security properties such as privacy, correctness, independence of inputs, fairness and guaranteed output delivery. In the case of no honest ...

[Full version]

[Full version]

Model Checking Techniques for Behavioral UML Models

Yael Meller

Wednesday, 17.6.2015, 11:30

Taub 601

The Unified Modeling Language (UML) is a widely accepted modeling language for embedded and safety critical systems. As such ,the correct behavior of systems represented as UML models is crucial. Model checking is a successful automated verification technique for checking whether a given system satisfies ...

[Full version]

[Full version]

ceClub: Unveiling the Secrets of High-Performance Datacenters

Michael Schapira (Hebrew University of Jerusalem)

Wednesday, 17.6.2015, 11:30

EE Meyer Building 861

Many architectures for high-performance datacenters have been proposed to meet the ever-growing traffic demands. Surprisingly, recent studies show that even random datacenter topologies outperform much more sophisticated designs, achieving near-optimal throughput and bisection bandwidth, high resiliency to failures, incremental expandability, high cost efficiency, and more. ...

[Full version]

[Full version]

Quantum computers - is the future here?

Tal Mor - COLLOQUIUM LECTURE

Tuesday, 16.6.2015, 14:30

Room 337-8, Taub Bld.

Pixel Club: Colour Filtering in the Retina for Improved Sensitivity

Erez Ribak (Physics, Technion)

Tuesday, 16.6.2015, 11:30

EE Meyer Building 1061

In order to see single photoreceptor cells in the retina, we used hardware and software tools, getting close to the resolution limit, a tenfold improvement. Transparent layers which come in front of the photoreceptors are barely seen by direct imaging, but they play a major ...

[Full version]

[Full version]

CGGC Seminar: Neumann Domains (a.k.a Morse-Smale complexes)

Ram Band (Math, Technion)

Sunday, 14.6.2015, 13:30

Taub 401

A Laplacian eigenfunction on a two-dimensional manifold dictates some natural partitions of the manifold; the most apparent one being the well studied nodal domain partition. An alternative partition is revealed by considering a set of distinguished gradient flow lines of the eigenfunction - those which ...

[Full version]

[Full version]

Fast Approximate Max Flow Computation

Christoph Lenzen - SPECIAL LECTURE - Note unusual time and place

Sunday, 14.6.2015, 13:30

Room Class 4, Floor 1, Taub Bld.

CGGC Seminar: Morse-Smale Complexes and Persistence applied to Shape Segmentation

Alexandre Djerbetian (CS, Technion)

Sunday, 14.6.2015, 12:30

Taub 401

Given a human shape, we would like to detect and separate the arms, the head, the legs, but also the fingers and the toes. However, one has to bear in mind that fingers are still part of the arms. This hierarchy can be very simply ...

[Full version]

[Full version]

Theory Seminar: The Computational Power of Optimization in Online Learning

Tomer Koren (Technion)

Wednesday, 10.6.2015, 12:30

Taub 201

Vapnik’s fundamental theorem of statistical learning establishes a computational equivalence between optimization (Empirical Risk Minimization) and statistical learning. Is the same true for learning in games? We give a precise answer to this question and describe consequences to the computational complexity of solving zero-sum games ...

[Full version]

[Full version]

ceClub: TeamBoost: Enhanced Cloud Connectivity Through Collaborative MPTCP

Osnat (Ossi) Mokryn (Haifa University and Academic TLV)

Wednesday, 10.6.2015, 11:30

EE Meyer Building 1007

We present TeamBoost, a collaborative Multi-Path TCP (MPTCP) solution enabling a client device to leverage its nearby devices over a local network, i.e., WiFi. The client harnesses its nearby devices autonomous connectivity to deliver and relay TCP sub streams of traffic to and from the ...

[Full version]

[Full version]

Pixel Club: Clouds in The Cloud

Danny Veikherman (EE, Technion)

Tuesday, 9.6.2015, 11:30

EE Meyer Building 1061

Light-field imaging can be scaled up to a very large area, to map the Earth's atmosphere in 3D. Multiview spaceborne instruments suffer low spatio-temporal-angular resolution, and are very expensive and unscalable. We develop sky light-field imaging, by a wide, scalable network of wide-angle cameras looking ...

[Full version]

[Full version]

Augmenting 2D planar maps to 3D

Nir Hershko

Sunday, 7.6.2015, 13:30

Taub 337

Maps of the world around us are used daily for many purposes such as navigation or location-based services. However, our experience with maps is usually limited to a 2D top-down projection. Using a 3D map instead have some advantages, such as easier navigation and orientation, ...

[Full version]

[Full version]

Algorithmic Exam Generation

Omer Geiger

Wednesday, 3.6.2015, 14:00

Taub 601

Given a class of students, and a pool of questions in the domain of study, what subset will constitute a ``good'' exam? Millions of educators are dealing with this difficult problem worldwide, yet the task of composing exams is still performed manually. In this work ...

[Full version]

[Full version]

Theory Seminar: A Simple and Approximately Optimal Mechanism for an Additive Buyer

Moshe Babaioff (Microsoft Research)

Wednesday, 3.6.2015, 12:30

Taub 201

We consider a monopolist seller with n heterogeneous items, facing a single buyer. The buyer has a value for each item drawn independently according to (non-identical) distributions, and his value for a set of items is additive. The seller aims to maximize his revenue. It ...

[Full version]

[Full version]

Processing Real-time Data Streams on GPU-Based Systems

Uri Verner

Wednesday, 3.6.2015, 11:30

Taub 337 (CeClub)

Real-time stream processing of Big Data has an increasing demand in modern data centers. There, a continuous torrent of data, created from different streaming data-sources like social networks, video streams, and financial markets, is being processed and analyzed to produce valuable insights about its content, ...

[Full version]

[Full version]

TCE Guest Lecture: A Gentle Introduction to Scala Programming Language

Martin Odersky (EPFL)

Wednesday, 3.6.2015, 09:00

CS Taub Build. Auditorium 1

Scala is a language that fuses functional and object-oriented programming in a practical package. It interoperates seamlessly with Java and its tools. Scala is now used in a rapidly increasing number of open source projects and companies. It provides the core infrastructure for sites such ...

[Full version]

[Full version]

Pixel Club: Morphology-Guided Graph Search for Untangling Objects in Microscopy Images

Tammy Riklin Raviv (EE, Ben Gurion University)

Tuesday, 2.6.2015, 11:30

EE Meyer Building 1061

In the talk I will present a novel framework for high-throughput cell lineage analysis in time-lapse microscopy images. The proposed algorithm ties together two fundamental aspects of cell lineage construction, namely cell segmentation and tracking, via a Bayesian inference of dynamic models. The proposed contribution ...

[Full version]

[Full version]

Motion Planning in the Presence of Mobile Obstacles

Avraham stiefel

Sunday, 31.5.2015, 15:30

Taub 401

We take a new approach to motion planning specifically designed for handling mobile obstacles. Previous methods are modified versions of the algorithms for static obstacles, but with speed-ups designed to ensure real-time operation. Because of this logic, each iteration requires a complete reconstruction of the ...

[Full version]

[Full version]

Streaming Property Testing of Visibly Pushdown Languages

Michel de Rougemont - SPECIAL LECTURE - Note unusual hour

Thursday, 28.5.2015, 15:30

Room 337-8 Taub Bld.

The Ring of Gyges: Using Smart Contracts for Crime

Ari Juels - COLLOQUIUM LECTURE

Thursday, 28.5.2015, 14:30

Room 337-8 Taub Bld.

Theory Seminar: From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting

Ilan Komargodski (Weizmann Institute of Science)

Wednesday, 27.5.2015, 12:30

Taub 201

We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of x_1, ..., x_t to compute f(x_1, ..., x_t) but nothing else. Our construction ...

[Full version]

[Full version]

ceClub: Coded Retransmission in Wireless Networks Via Abstract MDPs

Mark Shifrin (Ben Gurion University)

Wednesday, 27.5.2015, 11:30

EE Meyer Building 861

We consider a transmission scheme with a single transmitter and multiple receivers over a faulty broadcast channel. For each receiver, the transmitter has a unique infinite stream of packets, and its goal is to deliver them at the highest throughput possible. While such multiple-unicast models ...

[Full version]

[Full version]

TODAY! First Project Fair at CS

Tuesday, 26.5.2015, 15:30

CS Taub Building

We are happy to invite you to the first project fair at CS on Tuesday, May 26 2015, between 15:30-17:30 at the CS Taub lobby, The event will host top executives from the hi-tech industry. The participating students will get a great opportunity to present ...

[Full version]

[Full version]

Moore's Law: Yesterday, Today and Tomorrow

Mark Bohr - TCE Guest Talk

Tuesday, 26.5.2015, 14:30

CS Taub Build. Auditorium 2

Our industry has reaped the benefits of Moore's Law for 50 years now, making integrated circuits that have grown from tens to billions of transistors and performing an increased range of functions from memory to logic to signal processing. Scaled transistors have provided significant improvements ...

[Full version]

[Full version]

Pixel Club: Micron level NMR Imaging

Nir Sochen (Tel-Aviv University)

Tuesday, 26.5.2015, 11:30

EE Meyer Building 1061

We will give a new derivation of the Bloch-Torrey equation that governs the behaviour of water molecules in porous media and biological tissues. We will show that this new derivation reveals new term that was ignored in the past. We further show how one can ...

[Full version]

[Full version]

CGGC Seminar: Geometric Tools for Isogeometric Analysis

Fady Massarwi (CS, Technion)

Monday, 25.5.2015, 14:00

Taub 401

Isogeometric analysis (IGA) has brought new problems to the field of Computer Aided Geometry for Design (CAGD); in return the latter brings to the computation of solution of PDEs new methods and algorithms. The present work develops both aspects. In the first one, IGA has ...

[Full version]

[Full version]

ceClub: Thunderstrike: EFI firmware bootkits for Apple MacBooks

Trammell Hudson (Two Sigma)

Monday, 25.5.2015, 11:30

Room 337-8 Taub Bld.

In this presentation we demonstrate the installation of persistent firmware modifications into the EFI boot ROM of Apple's popular MacBooks. The bootkit can be easily installed by an evil-maid via the externally accessible Thunderbolt ports and can survive reinstallation of OSX as well as hard ...

[Full version]

[Full version]

Pixel Club: Anti-Bayesian Statistical Pattern Recognition

John Oommen (Carleton University, Ottawa)

Thursday, 21.5.2015, 11:30

EE Meyer Building 1061

The gold standard for a classifier is the condition of optimality attained by the Bayesian classifier. Within a Bayesian paradigm, if we are allowed to compare the testing sample with only a single point in the feature space from each class, the optimal Bayesian strategy ...

[Full version]

[Full version]

Pixel Club: Object Recognition, Symmetry Detection, Jigsaw Puzzles, and Cancer

Peter J. Olver (University of Minnesota)

Wednesday, 20.5.2015, 15:00

Room 337-8 Taub Bld.

I will survey developments in the application of invariants of various types, including invariant histograms and differential invariant signatures, for object recognition and symmetry detection in images. I will present some recent progress, including applications to automated jigsaw puzzle assembly, in both 2D and 3D, ...

[Full version]

[Full version]

Theory Seminar: Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs

Tom Gur (Weizmann Institute of Science)

Wednesday, 20.5.2015, 12:30

Taub 201

Proofs of proximity are probabilistic proof systems in which the verifier only queries a sub-linear number of input bits, and soundness only means that, with high probability, the input is close to an accepting input. In their minimal form, called Merlin-Arthur proofs of proximity (MAP), ...

[Full version]

[Full version]

ceClub: Ownership-Aware Software-Defined Backhauls in Next-Generation Cellular Networks

Francesco Malandrino (Hebrew University of Jerusalem)

Wednesday, 20.5.2015, 11:30

EE Meyer Building 1007

Future cellular networks will be owned by multiple parties, e.g., two mobile operators, each of which controls some elements of the access and backhaul infrastructure. In this context, it is important that as much traffic as possible is processed by the same party that generates ...

[Full version]

[Full version]

Optimization and Reoptimization in Scheduling Problems

Yael Mordechai

Tuesday, 19.5.2015, 16:30

Taub 601

Parallel machine scheduling has been extensively studied in the past decades, with applications ranging from production planning to job processing in large computing clusters. We study some of these fundamental optimization problems, as well as their reoptimization variants. In this talk, we present improved bounds ...

[Full version]

[Full version]

Pixel Club: Moving Frames and their Applications

Peter J. Olver (University of Minnesota)

Monday, 18.5.2015, 11:30

Room 337-8 Taub Bld.

The classical method of moving frames was developed by Elie Cartan into a powerful tool for studying the geometry of submanifolds under certain geometrical transformation groups. In this talk, I will present a new foundation for moving frame theory based on equivariant maps. The method ...

[Full version]

[Full version]

CGGC Seminar: Detection of Critical Points of Multivariate Piecewise Polynomial Systems

Yoni Mizrahi (CS, Technion)

Sunday, 17.5.2015, 13:30

Taub 401

We propose a general scheme for detecting critical locations (of dimension zero) of piecewise polynomial multivariate equation systems. Our approach generalizes previously known methods for locating tangency events or self-intersections, in contexts such as surface-surface intersection (SSI) problems and the problem of tracing implicit plane ...

[Full version]

[Full version]

Online Semidefinite Programming

Noa Elad

Wednesday, 13.5.2015, 14:30

Taub 601

We define a new class of semi-definite programs in which the input arrives online. We use the primal dual method to develop an algorithm for this setting of semi-definite programs while maintaining the monotonicity requirements of an online algorithm. Our algorithm achieves logarithmic competitive ratios ...

[Full version]

[Full version]

Tech Talk by Apple: Discover What's Possible

Aharon Aharon (Apple)

Wednesday, 13.5.2015, 12:30

EE Meyer Building 1003 (10th floor)

A tech lecture by Aharon Aharon from Apple will be held on Wednesday, May 13 2015, at 12:30, in Auditorium 1003 (10th floor), EE Meyer Building. You are all welcome.

[Full version]

[Full version]

Theory Seminar: Explicit Strong LTCs with inverse poly-log rate and constant soundness

Michael Viderman (Intel Israel)

Wednesday, 13.5.2015, 12:30

Taub 201

An error-correcting code $C \subseteq \F^n$ is called $(q,\epsilon)$-strong locally testable code (LTC) if there exists a tester that makes at most $q$ queries to the input word. This tester accepts all codewords with probability 1 and rejects all non-codewords $x\notin C$ with probability at ...

[Full version]

[Full version]

TCE & ceClub Guest Lecture: Decentralizing Authorities into Scalable Strongest-Link Cothorities

Prof. Bryan Ford (Yale University)

Wednesday, 13.5.2015, 11:30

EE Meyer Building 861

Online infrastructure often depends on security-critical authorities such as logging, time, and certificate services. Authorities, however, are vulnerable to the compromise of one or a few centralized hosts yielding "weakest-link" security. We propose collective authorities or cothorities, an architecture enabling thousands of participants to witness, ...

[Full version]

[Full version]

TCE Guest Lecture: Deterministically Deterring Timing Attacks in Deterland

Prof. Bryan Ford (Yale University)

Tuesday, 12.5.2015, 12:00

EE Meyer Building 815

The massive parallelism and resource sharing embodying today’s cloud business model not only exacerbate the security challenge of timing channels, but also undermine the viability of defenses based on resource partitioning. This paper proposes hypervisor-enforced timing mitigation to control timing channels in cloud environments. This ...

[Full version]

[Full version]

TCE Guest Lecture: Hiding in a Panopticon: Grand Challenges in Internet Anonymity

Prof. Bryan Ford (Yale University)

Monday, 11.5.2015, 11:30

EE Meyer Building 1061

Many people have legitimate needs to avoid their online activities being tracked and linked to their real-world identities - from citizens of authoritarian regimes, to everyday victims of domestic abuse or law enforcement officers investigating organized crime. Current state-of-the-art anonymous communication systems are based on ...

[Full version]

[Full version]

CGGC Seminar: Digital Humans

Sofien Bouaziz (Computer Graphics and Geometry Laboratory, École Polytechnique Fédérale de Lausanne)

Sunday, 10.5.2015, 13:30

Room 337-8 Taub Bld.

Recent advances in realtime performance capture and virtual reality have brought within reach a new form of human communication. Capturing dynamic facial expressions of a user and retargeting these expressions to a digital character in realtime allows enacting arbitrary virtual avatars with live feedback. Compared ...

[Full version]

[Full version]

TCE Guest Lecture: Fine Grain Memory Deduplication

Mark Horowitz (Stanford University)

Thursday, 7.5.2015, 11:30

EE Meyer Building 1003 (10th floor)

Memory is a large component of computer system cost and current trends indicate this cost is increasing as a fraction of the total. Emerging applications such as in-memory databases, virtual machines, and big-data key-value stores demand more memory relative to compute. Some of these high-memory ...

[Full version]

[Full version]

Theory Seminar: Publicly Verifiable Software Watermarking

Aloni Cohen (MIT)

Wednesday, 6.5.2015, 12:30

Taub 201

Abstract: Software Watermarking is the process of transforming a program into a functionally equivalent “marked” program in such a way that it is computationally hard to remove the mark without destroying functionality. Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan and Yang (CRYPTO 2001) defined software watermarking ...

[Full version]

[Full version]

ceClub: Secure Network Coding Schemes for Wireless and Data Storage Networks

Alex Sprintson (Texas A&M University)

Wednesday, 6.5.2015, 11:30

EE Meyer Building 861

Weakly secure codes aim to hide information about individual packets as well as small groups of packets from an eavesdropper that can intercept wireless transmissions or has access to a small number of storage nodes. Such codes are a practical alternative to traditional information-theoretic schemes ...

[Full version]

[Full version]

Oblivious Algorithms - How to Serve in the Dark

Yossi Azar - Colloquium Lecture

Tuesday, 5.5.2015, 14:30

Room 337-8 Taub Bld.

CGGC Seminar: Solid Sweeps in Computer Aided Geometric Design

Jinesh Machchhar (CS, Technion)

Sunday, 3.5.2015, 13:30

Room 337-8 Taub Bld.

Solid sweep is the envelope of the swept volume of a given solid moving along a one parameter family of rigid motions in 3 dimensional space. Solid sweep is a powerful and versatile surface design tool which has found uses in many areas like CNC-machining ...

[Full version]

[Full version]

Coding for New Applications in Storage Media

Artyom Sharov

Wednesday, 29.4.2015, 16:30

Taub 601

Conventional magnetic recording media are composed of basic magnetizable two-dimensional units called grains, which might be random in size and shape. Recently, a new technological enhancement was proposed, which enables magnetizing areas as small as the size of grains. This novelty effectively created a different ...

[Full version]

[Full version]

TODAY! Amdocs Best Project Contest - The Finals

Wednesday, 29.4.2015, 16:30

CS Taub Build. Auditorium 2

You are invited to the final stage of the 2014 Amdocs Best Project Contest. The competing teams will present and talk about their projects. The event will take place on Wednesday, April 29, 2015, 16:30-18:30, in Auditorium 2, CS Taub Building. You are all invited ...

[Full version]

[Full version]

Startup Fair and Recruitment at CS

Wednesday, 29.4.2015, 12:30

CS Taub Lobby & Auditorium 2

CS invites you to a STARTUP FAIR and recruitment by the presenting firms: Click-tale, Forter, Kamimnario, Ravello, Outbrain, Taxi, Wix.com and more. In addition, lectures will be given by the firms representatives. The event will take place on Wednesday, April 29, 2016, between 12:30-14:30 at ...

[Full version]

[Full version]

Theory Seminar: Cops, Robbers, and Threatening Skeletons (Padded Decomposition for Minor-Free Graphs)

Ofer Neiman (Ben-Gurion University)

Wednesday, 29.4.2015, 12:30

Taub 401

We prove that any graph excluding $K_r$ as a minor can be partitioned into clusters of diameter at most $\Delta$ while removing at most $O(r/\Delta)$ fraction of the edges. This improves over the results of Fakcharoenphol and Talwar, who building on the work of Klein, ...

[Full version]

[Full version]

I/O Page Faults

Ilya Lesokhin

Wednesday, 29.4.2015, 12:30

Taub 601

Most modern computer systems use demand paging based virtual memory. Address translation for virtual memory support in I/O devices is known to be useful. It allows SR-IOV (single root I/O virtualization) direct device assignment in virtualization scenarios and kernel bypassing access to I/O devices by ...

[Full version]

[Full version]

ceClub: Scaling Concurrent Log-Structured Data Stores

Eshcar Hillel (Yahoo! Labs)

Wednesday, 29.4.2015, 11:30

Taub 9

Log-structured data stores (LSM-DSs) are widely accepted as the state-of-the-art implementation of key-value stores. They replace random disk writes with sequential I/O, by accumulating large batches of updates in an in-memory data structure and merging it with the on-disk store in the background. While LSM-DS ...

[Full version]

[Full version]

Pixel Club: Interactive Annotation by Randomly Perturbing Max-solvers

Tamir Hazan (CS, Haifa University)

Tuesday, 28.4.2015, 11:30

EE Meyer Building 1061

Predictions in modern inference problems can be increasingly understood in terms of high-dimensional structures such as arrangements of objects in computer vision, parses in natural language processing or molecular structures in computational biology. To interactively annotate an image, one needs to efficiently sample possible interactions ...

[Full version]

[Full version]

ceClub: Catapulting beyond Moore’s Law: Using FPGAs to Accelerate Data Centers

Derek Chiou (Microsoft)

Monday, 27.4.2015, 11:30

EE Meyer Building 861

In this talk, I will describe a joint Microsoft Research and Bing project to study the possibility of using field programmable gate arrays to accelerate cloud applications. We developed an FPGA card that plugs into a Microsoft designed cloud server and used it to accelerate ...

[Full version]

[Full version]

Pixel Club: Efficient Coding vs. Efficient Reconstruction in the Visual Cortex

Yacov Hel-Or ( School of CS, Interdisciplinary Center, Herzliya)

Tuesday, 21.4.2015, 11:30

EE Meyer Building 1061

Several interesting observations about the Human Visual System have been investigated in recent years: 1. Sensory data is encoded in the visual cortex using color opponent space (luminance / chrominance space). 2. The distribution of RGB cones over the retina is non-uniform and highly biased ...

[Full version]

[Full version]

Theory Seminar: Definability and Hankel Matrices

Nadia Labai (CS, Technion)

Wednesday, 15.4.2015, 12:30

Taub 401

In this talk we show how logic can be eliminated from several meta-theorems relating the definability of graph parameters in sublogics of Second Order Logic to their computational complexity over certain graph classes. A famous example of such a meta-theorem is Courcelle's theorem, stating that ...

[Full version]

[Full version]

ceClub: How Code Regularity Affects Code Complexity

Dror Feitelson (Hebrew University of Jerusalem)

Wednesday, 15.4.2015, 11:30

Taub 9 (ROOM UPDATED)

It is naturally easier to comprehend simple code relative to complicated code. We suggest that code regularity — where the same structures are repeated time after time — may significantly reduce complexity, because once one figures out the basic repeated element it is easier to ...

[Full version]

[Full version]

TODAY! Open Day For Graduate Studies At Technion Computer Science and Electrical Engineering

Wednesday, 15.4.2015, 10:30

Room 337-8 Taub Bld. & EE Meyer Building 1003

The 2015 open day invite outstanding undergraduates from all universities to come to the Technion and learn about the faculties of Electrical Engineering and Computer Science, meet faculty and graduate students and hear a fascinating talk by Dr. Aya Sofer, Director at IBM Research - ...

[Full version]

[Full version]

Towards High-Throughput Wildlife Tracking: The ATLAS Wildlife Localization System

Sivan Toledo - COLLOQUIUM LECTURE

Tuesday, 14.4.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: General Deformations of Point Configurations Viewed By a Pinhole Model Camera

Yirmeyahu Kaminski (Math, Holon Institute of Technology)

Tuesday, 14.4.2015, 11:30

EE Meyer Building 1061

This work is a theoretical study of the following Non-Rigid Structure from Motion problem. What can be computed from a monocular view of a parametrically deforming set of points? We treat various variations of this problem for affine and polynomial deformations with calibrated and uncalibrated ...

[Full version]

[Full version]

Extracting Code from Programming Tutorial Videos

Shir Yadid

Monday, 13.4.2015, 16:30

Taub 401

The amount of programming tutorial videos on the web increases on a daily basis. Video hosting sites such as YouTube host millions of video lectures, with many programming tutorials for various languages and platforms. Automatically understanding the content of such videos is desirable for many ...

[Full version]

[Full version]

Feature Generation by Recursive Induction

Lior Friedman

Monday, 13.4.2015, 15:30

Taub 401

Induction algorithms have steadily improved over the years, resulting in powerful methods for learning. However, these methods are constrained to use knowledge within the supplied feature vectors. Recently, a large collection of common-sense and domain specific relational knowledge bases have become available on the web. ...

[Full version]

[Full version]

Algorithms for Parameterized Graph Problems with Applications to Biological Network Queries

Meirav Zehavi

Wednesday, 1.4.2015, 15:30

Taub 401

There is a growing, vital need for fast algorithms for problems that are unlikely to admit efficient solutions, based on classical computational complexity theory. Parameterized Complexity is an exciting paradigm for coping with computationally hard problems, which is amazingly doable mathematically on a routine basis. ...

[Full version]

[Full version]

The nom Profit-Maximizing Operating System

Muli Ben-Yehuda

Wednesday, 1.4.2015, 14:30

Taub 601

In the near future, cloud providers will sell their users virtual machines with CPU, memory, network, and storage resources whose prices constantly change according to market-driven supply and demand conditions. Running traditional operating systems in these virtual machines is a poor fit: traditional operating systems ...

[Full version]

[Full version]

Efficient and Scalable Kernel IOMMU Management Designs

Omer Peleg

Wednesday, 1.4.2015, 13:00

Taub 601

IOMMUs provided by modern hardware allow the OS to enforce memory protection controls on the DMA operations of its I/O devices. An IOMMU translation management design must scalably handle frequent concurrent updates of IOMMU translations made by multiple cores, as occur in high throughput I/O ...

[Full version]

[Full version]

ceClub: Introducing Intel Software Guard Extensions (Intel SGX)

Ittai Anati (Intel)

Wednesday, 1.4.2015, 11:30

Room 337-8 Taub Bld.

Intel Software Guard Extensions (Intel SGX) is an extension to Intel Architecture designed to increase the security of software. In this approach, rather than attempting to identify and isolate all the malware on the platform, legitimate software can be sealed inside an enclave and protected ...

[Full version]

[Full version]

Internet security: Past, Present and Future

Michael Waidner - RESCHEDULED - COLLOQUIUM LECTURE -

Tuesday, 31.3.2015, 13:00

Room Class 5 Taub Bld.

Pixel Club: RGBD-Fusion: Real-Time High Precision Depth Recovery

Roy Or-El (EE, Technion)

Tuesday, 31.3.2015, 11:30

Room 337-8 Taub Bld.

The popularity of low-cost RGB-D scanners is increasing on a daily basis. Nevertheless, existing scanners often cannot capture subtle details in the environment. We present a novel method to enhance the depth map by fusing the intensity and depth information to create more detailed range ...

[Full version]

[Full version]

CGGC Seminar: Provably Good Planar Mappings

Roi Poranne (Weizmann Institute of Science)

Monday, 30.3.2015, 13:30

Room 337-8 Taub Bld.

The problem of planar mapping and deformation is central in computer graphics, where applications range from image warping and character animation, to non-rigid registration and shape analysis. I will present a framework for adapting general, smooth, function bases for constructing provably good planar mappings. The ...

[Full version]

[Full version]

2015 Yahoo! Labs Israel Technion Grad Student Event

Sunday, 29.3.2015, 14:30

CS Taub Build. Auditorium 2

You are kindly invited to the 2015 Yahoo! Labs Israel Technion Grad Student Event on Sunday March 29, 2015, Taub Building, Technion Campus as follows: 14:30-15:00 at CS Taub, Auditorium 2 Welcome by Prof. Irad Yavneh, CS Dean Welcome by Dr. Yoelle Maarek, VP Research, ...

[Full version]

[Full version]

ceClub: Deep learning with NVIDIA GPUs

Jonathan Cohen (NVIDIA Corporation)

Thursday, 26.3.2015, 13:30

Taub 6

NVIDIA GPUs are powering a revolution in machine learning. With the rise of deep learning algorithms, in particular deep convolutional neural networks, computers are learning to see, hear, and understand the world around us in ways never before possible. Image recognition and detection systems are ...

[Full version]

[Full version]

HackPRO 2015

Thursday, 26.3.2015, 10:00

CS Taub Building

You are invited to HacktonPro2015 from CS and WomenTechPRO. The event will take place on Thursday-Friday, March 26-27 2015, at the CS Taub Building, Technion and will spread on 24 hours of creation and development of the most creative ideas with the help of expert ...

[Full version]

[Full version]

Theory Seminar: Local Correlation Breakers and Applications to Three-Source Extractors and Mergers

Gil Cohen (Weizmann Institute of Science)

Wednesday, 25.3.2015, 12:30

Moved to Taub 401

We introduce and construct a pseudo-random object which we call a local correlation breaker (LCB). Informally speaking, an LCB uses a weak-source of randomness to "break" local correlations between random variables. As an application of LCBs, we construct a 3-source extractor for entropies delta*n, O(log ...

[Full version]

[Full version]

ceClub: Variability SmartBalance: A Sensing-Driven Linux Load Balancer for Energy Efficiency of Heterogeneous MPSoCs

Prof. Alex Nicolau (University of California, Irvine)

Wednesday, 25.3.2015, 11:30

Taub 6

A short overview of the NSF Variability Expedition will be given, followed by an overview of a particular result: SmartBalance. Due to increased demand for higher performance and better energy efficiency, MPSoCs are deploying heterogeneous architectures with architecturally differentiated core types. However, the traditional Linux-based ...

[Full version]

[Full version]

Zerocash: Decentralized Anonymous Payments from Bitcoin

Eli Ben-Sasson - Colloquium Lecture

Tuesday, 24.3.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: Approximate Exemplar-SVM

Uri Mor (EE, Technion)

Monday, 23.3.2015, 10:30

EE Meyer Building 1061

We propose an approach to reduce the runtime of Exemplar-SVM when multiple detectors are to be applied to the same image. Our underlying assumption is that image windows of similar appearance will yield similar detection responses. Therefore, rather than applying all the detectors to all ...

[Full version]

[Full version]

CGGC Seminar: Persistent Homology

Alexandre Djerbetian (CS, Technion)

Sunday, 22.3.2015, 13:30

Room 337-8 Taub Bld.

Shapes are usually described by their geometrical characteristics. Obviously, a rabbit doesn't look like a horse, because of its curvature for instance. However, some characteristics of a shape are independent of its geometry. A rugby ball is still a ball, and a doughnut looks like ...

[Full version]

[Full version]

Transfer Learning using Decision Forests

Noam Segev

Thursday, 19.3.2015, 14:00

Taub 601

Transfer learning techniques are concerned with the creation of high performance predictive models, challenged with sparsely labeled training examples and using related learning tasks for which sufficient training sets are available. Transfer learning can be motivated by a common scenario in which we obtain a ...

[Full version]

[Full version]

Code Similarity via Natural Language Descriptions

Meital Zilberstein

Wednesday, 18.3.2015, 12:30

Taub 601

Code similarity is a central challenge in many programming related applications, such as code search, automatic translation, and programming education. We present a novel approach for establishing the similarity of code fragments by computing textual similarity between their corresponding textual descriptions. In order to find ...

[Full version]

[Full version]

Theory Seminar: The Topology of Wireless Communication

Merav Parter (Weizmann Institute of Science)

Wednesday, 18.3.2015, 12:30

Taub 401

We study the topological properties of wireless communication maps and their usability in algorithmic design. We consider the SINR model, which compares the received power of a signal at a receiver against the sum of strengths of other interfering signals plus background noise. To model ...

[Full version]

[Full version]

ceClub: Random Graph Models for Random Key Predistribution in WSNs

Prof. Armand M. Makowski (University of Maryland)

Wednesday, 18.3.2015, 11:30

EE Meyer Building 1007

I will start with a quick background on wireless sensor networks (WSNs), and some of the security challenges created by their unique features. Random key pre-distribution schemes address some of the difficulties by randomly assigning secure keys to sensor nodes prior to network deployment. The ...

[Full version]

[Full version]

Online Learning and Competitive Analysis: a Unified Approach

Shahar Chen

Tuesday, 10.3.2015, 12:30

Taub 601

Online learning and competitive analysis are two widely studied frameworks for online decision-making settings. Despite the frequent similarity of the problems they study, there are significant differences in their assumptions, goals and techniques, hindering a unified analysis and richer interplay between the two. In this ...

[Full version]

[Full version]

Pixel Club: Ricci flow for Image Processing and Computer Vision

Ezri Sonn (EE, Technion)

Tuesday, 10.3.2015, 11:30

EE Meyer Building 1061

A discrete model of the Ricci flow for images is presented, using a purely combinatorial method for calculating the Ricci curvature, based on R. Forman's work on generalized Laplacians for cell complexes. The adaptation of Forman's curvature function for cell complexes to images is natural ...

[Full version]

[Full version]

CGGC Seminar: Designing N-PolyVector Fields with Complex Polynomials

Amir Vaxman (Vienna University of Technology)

Sunday, 8.3.2015, 13:30

Room 337-8 Taub Bld.

N-PolyVector fields are introduced, which are a generalization of N-RoSy fields for which the vectors are neither necessarily orthogonal nor rotationally symmetric. A novel representation for N-PolyVectors as the root sets of complex polynomials is given, in addition to the analysis of their topological and ...

[Full version]

[Full version]

Multi-Threaded Coordination Methods for Constructing Non-blocking Data Structures

Anastasia Braginsky

Wednesday, 25.2.2015, 15:00

Taub 601

Shared-memory multiprocessors execute concurrently multiple threads of computation that communicate and synchronize through shared memory. Typically, this communication and synchronization is done via concurrent data structures. The efficiency of these data structures is crucial to performance. Furthermore, new challenges arise in designing scalable concurrent data ...

[Full version]

[Full version]

Towards an Autonomous Sailing Trainer

Ella Bolshinsky

Wednesday, 25.2.2015, 12:30

Taub 601

This work aims to design and implement a software/hardware bundle that could serve as a technical sailing trainer for the sailors of the Laser dinghy sailboat (or single-handed, main sail boats). This trainer should allow sailors, especially in the youth level, to practice in a ...

[Full version]

[Full version]

Situated Learning and Understanding of Natural Language

Yoav Artzi - CS-Lecture

Tuesday, 24.2.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: GMD: Global Model Detection via Inlier Rate Estimation

Roee Litman (EE, Tel-Aviv University)

Tuesday, 24.2.2015, 11:30

Room 337-8 Taub Bld.

This work presents a novel approach for detecting inliers in a given set of correspondences (matches). It does so without explicitly identifying any consensus set, based on a method for inlier rate estimation (IRE). Given such an estimator for the inlier rate, we also present ...

[Full version]

[Full version]

Pixel Club: Direct and Dense 3D Reconstruction from Autonomous Quadrotors

Prof. Daniel Cremers (Computer Science and Mathematics, the Technical University of Munich)

Thursday, 19.2.2015, 10:00

Room 337-8 Taub Bld.

The reconstruction of the 3D world from images is among the central challenges in computer vision. Starting in the 2000s, researchers have pioneered algorithms which can reconstruct camera motion and sparse feature-points in real-time. In my talk, I will show that one can autonomously fly ...

[Full version]

[Full version]

ceClub: Advance Reservation Games

Prof. David Starobinski (Boston University)

Wednesday, 18.2.2015, 11:30

EE Meyer Building 861

Advance reservation (AR) services form a pillar of many branches of the economy, including transportation, lodging, dining, and, more recently, cloud computing. In this work, we use game theory to analyze an AR system in which customers differ in their lead (arrival) times and the ...

[Full version]

[Full version]

Static Mining of Synchronization Patterns

Evgeny Abramovich

Wednesday, 11.2.2015, 12:30

Taub 601

We present a static analysis for mining synchronization patterns from a large number of code samples. Our analysis uses automata-based abstraction to capture sequences of API operations and synchronization operations. By combining information about the sequence of API calls with synchronization operations, we uncover the ...

[Full version]

[Full version]

Fault-Tolerant Information Spreading Algorithms

Tariq Toukan

Wednesday, 11.2.2015, 11:30

Taub 401

We consider a distributed system of $n$ nodes communicating in the synchronous Vertex-Congest model. In this model, in each round, each node sends the same message of size $O(\log n)$ to all neighbors. We investigate the problem of information spreading, where each node has an ...

[Full version]

[Full version]

Pixel Club: On Chirp-based Ultrasound Systems

Roie Pri-Or (EE, Technion)

Tuesday, 10.2.2015, 11:30

EE Meyer Building 1061

The work addresses the two main challenges that have so far prevented adaption of chirp transmission in medical ultrasound, despite its potential to achieve a significantly enhanced SNR. The first is associated with the high sidelobe level resulting from signal compression using a matched filter. ...

[Full version]

[Full version]

Geometric algorithms for image and surface analysis

Anastasia Dubrovina-Karni

Tuesday, 3.2.2015, 11:30

Taub 337

Various problems involving image and shape representation, analysis and processing share the following common denominator: the complexity and the accuracy of the solution depend on the specific problem formulation and data representation being used. We propose to utilize geometric problem formulations together with novel data ...

[Full version]

[Full version]

Compact Data structures and Applications

Gil Einziger

Wednesday, 28.1.2015, 16:30

Taub 601

This talk surveys several state of the art techniques to approximate sets and multi sets efficiently. While Bloom filters and their variants are well researched, this talk argues that compact hash table encoding is a better approach. To back up this claim, we introduce two ...

[Full version]

[Full version]

Flexible Resource Allocation for Networks and Clouds

Sivan Albagli

Wednesday, 28.1.2015, 15:00

Taub 601

We consider flexible resource allocation problems in networks and cloud services, where the goal is to optimally utilize a limited amount of a resource (e.g., cloud servers, bandwidth, or storage capacity) available along a given time interval. Such practical scenarios give rise to variants of ...

[Full version]

[Full version]

ceClub: Designing Extremely Efficient Computers

Shahar Kvatinsky (Stanford University)

Wednesday, 28.1.2015, 11:30

EE Meyer Building 1061

For decades technology scaling has decreased the cost of computing to the point where it can be included in almost anything. We have become accustomed to computing becoming faster, cheaper, and lower power, so we simply assume it will continue. While scaling has never been ...

[Full version]

[Full version]

Pixel Club: Image Upscaling Using Geometrically-Aligned Local Self-Similarity

Noam Elron (The Hebrew University of Jerusalem)

Tuesday, 27.1.2015, 11:30

Room 337-8 Taub Bld.

The local self-similarity (LSS) image prior provides a reliable and efficient source for example patches in natural images. We present a new image upscaling method in which the LSS prior is: (i) fulfilled exactly along image singularities, e.g., edges, and (ii) its use is maximized ...

[Full version]

[Full version]

ceClub: Towards Automated Concurrent Memory Reclamation

Alex Matveev (MIT)

Monday, 26.1.2015, 13:30

Room 337-8 Taub Bld.

The concurrent memory reclamation problem is that of devising techniques to allow a deallocating thread to verify that no other concurrent threads, in particular ones executing read-only traversals, have a reference to the block being deallocated. To date, there is no satisfactory solution to this ...

[Full version]

[Full version]

Unstructured Jumps and Compressed Size as Defect-Prediction Metrics

Eli Sennesh

Sunday, 25.1.2015, 16:30

Taub 601

With the advent of easier to parse languages such as Java, and the availability on the Internet of open-source software repositories, complete with versioning histories, empirical studies at scale of software engineering metrics and measurements have become possible and feasible. We take up the questions ...

[Full version]

[Full version]

Lightweight Monitoring of Distributed Streams

Arnon Lazerson

Thursday, 22.1.2015, 13:30

Taub 601

As data becomes dynamic, large, and distributed, there is increasing demand for what have become known as distributed stream algorithms. Since continuously collecting the data to a central server and processing it there incurs very high communication and computation complexities, it is desirable to define ...

[Full version]

[Full version]

Inauguration of the Renewed CS SSDL Lab

Thursday, 22.1.2015, 12:30

Room 337-8 Taub Bld.

You are invited to visit the renewed SSDL (Systems and Software Development Laboratory) and in the Xbox hall. The opening will be on Thursday, January 22, between 12:30-13:00, at the second floor of Taub Building. The inauguration ceremony, in cooperation with Microsoft, and project presentation ...

[Full version]

[Full version]

Google Technical Talk: Google Live Results

Tal Cohen (Google's Israel R&D Center)

Wednesday, 21.1.2015, 12:30

Taub 7

How does Google provide instant answers to user queries such as: "What's the weather tomorrow?", "Who won the Miami Heat game last night?" or "Apple stock price"? Come to our technical talk about Google Live Results on Wednesday, January 21 at 12:30 in classroom 7 ...

[Full version]

[Full version]

Theory Seminar: Communication over Highly Connected Noisy Networks

Ran Gelles (Princeton University)

Wednesday, 21.1.2015, 12:30

Taub 401

We consider the task of multiparty computation performed over networks in the presence of random noise. Given an $n$-party protocol that takes $R$ rounds assuming noiseless communication, the goal is to find a coding scheme that takes $R'$ rounds and computes the same function with ...

[Full version]

[Full version]

ceClub: Accurate Summation of Floating-Point Numbers on GPUs

Uri Verner (CS, Technion)

Wednesday, 21.1.2015, 11:30

Room 337-8 Taub Bld.

Two problems with parallel summation of floating-point numbers on GPUs are loss of precision and non-reproducible results. The precision loss is due to round-off error propagation, and the lack of bit-accurate consistency across platforms and setups can be attributed to the non-associative nature of floating-point ...

[Full version]

[Full version]

Hankel Matrices and Definability

Nadia Labai

Wednesday, 14.1.2015, 16:30

Taub 601

In automata theory, a Hankel matrix $H(f,\circ)$ is an infinite matrix where the rows and columns are labeled with words $w$ over a fixed alphabet $\Sigma$, and the entry $H(f,\circ)_{u,v}$ is given by $f(u \circ v)$, where $f$ is a real-valued word function and $\circ$ ...

[Full version]

[Full version]

ceClub: Designing Technology for Blind People

Shiri Azenkot (Jacobs Technion-Cornell Institute)

Wednesday, 14.1.2015, 13:30

Room 337-8 Taub Bld.

Blind people face challenges when using mainstream technology that relies heavily on visual feedback. Consider your mobile phone as an example. How would you interact with it without looking at the screen? In my talk, I’ll present the state-of-the-art in access technology and discuss social ...

[Full version]

[Full version]

On Auto-stereogram Perception, or the Best Patterns for Magic-Eyes Pictures

Alfred M. Bruckstein - COLLOQUIUM LECTURE

Tuesday, 13.1.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: Extended Lucas-Kanade Tracking

Shaul Oron (EE, Tel-Aviv University)

Tuesday, 13.1.2015, 11:30

Room 337-8 Taub Bld.

The Lucas-Kanade (LK) method is a classic tracking algorithm exploiting target structural constraints thorough template matching. Extended Lucas Kanade or ELK casts the original LK algorithm as a maximum likelihood optimization and then extends it by considering pixel object / background likelihoods in the optimization. ...

[Full version]

[Full version]

Coding For Interactive Communication

Klim Efremenko - CS-Lecture -

Monday, 12.1.2015, 14:30

Room 337-8 Taub Bld.

CGGC Seminar: Voronoi diagram of line segments and convex polygons with convex polygon-offset distance functions

Minati De (CS, Technion)

Sunday, 11.1.2015, 14:30

Taub 401

Voronoi diagrams are one of the most powerful data structures in computational geometry. Barequet, Dickerson, and Goodrich [D&CG 2001] introduced the notion of polygon-offset distance function for points. The polygon-offset distance function is more natural than scaling and is useful to model many problems which ...

[Full version]

[Full version]

Synthesis and Verification in a Software Defined World

Sharon Shoham Buchbinder - CS-Lecture

Sunday, 11.1.2015, 14:30

Room 337-8 Taub Bld.

When Exactly Do Quantum Computers Provide a Speedup?

Scott Aaronson - Colloquium Lecture

Thursday, 8.1.2015, 14:30

Room 337-8 Taub Bld.

Parallel Repetition From Fortification

Dana Moshkovitz - Colloquium Lecture -

Thursday, 8.1.2015, 12:30

Room 337-8 Taub Bld.

How to Verify Computations without Reexecuting Them

Guy Rothblum - CS-Lecture -

Wednesday, 7.1.2015, 14:30

Room 337-8 Taub Bld.

ceClub: Write Once, Get 50% Free: Saving SSD Erase Costs Using WOM Codes

Gala Yadgar (CS, Technion)

Wednesday, 7.1.2015, 13:00

Taub 4

NAND flash, used in modern SSDs, is a write once medium, where each memory cell must be erased prior to writing. The lifetime of an SSD is limited by the number of erasures allowed on each cell. Thus, minimizing erasures is a key objective in ...

[Full version]

[Full version]

Theory Seminar: Prioritized Metric Structures and Embedding

Arnold Filtser (Ben-Gurion University)

Wednesday, 7.1.2015, 12:30

Taub 401

Metric data structures (distance oracles, distance labeling schemes, routing schemes) and low-distortion embeddings provide a powerful algorithmic methodology, which has been successfully applied for approximation algorithms [LLR95], online algorithms [BBMN11], distributed algorithms [KKMPT12] and for computing sparsifiers [ST04]. However, this methodology appears to have a ...

[Full version]

[Full version]

Uncertainty, Strategy, and Bounded Rationality

Reshef Meir - CS-Lecture

Tuesday, 6.1.2015, 14:30

Room 337-8 Taub Bld.

Pixel Club: SimNets: A Generalization of Convolutional Networks

Nadav Cohen (The Hebrew University of Jerusalem)

Tuesday, 6.1.2015, 11:30

Room 337-8 Taub Bld.

We present a deep layered architecture that generalizes classical convolutional neural networks (ConvNets). The architecture, called SimNets, is driven by two operators, one being a similarity function whose family contains the convolution operator used in ConvNets, and the other is a new soft max-min-mean operator ...

[Full version]

[Full version]

Exponential Separation of Information and Communication

Gillat Kol- CS-Lecture -

Monday, 5.1.2015, 14:30

Room Class 6, Floor 1, Taub Bld.

Thinking out of the Encryption Box

Itai Dinur - CS-Lecture -

Sunday, 4.1.2015, 12:00

Room 337-8 Taub Bld.

ceClub: Pretty Bad Privacy: Pitfalls of DNS Encryption

Haya Shulman (Technische Universität Darmstadt)

Sunday, 4.1.2015, 11:30

EE Meyer Building 1007

As awareness for privacy of Domain Name System (DNS) is increasing, a number of mechanisms for encryption of DNS packets were proposed. We study the prominent defences, focusing on the privacy guarantees, interoperability with the DNS infrastructure, and the efficiency overhead. In particular: - We ...

[Full version]

[Full version]

Aspects of Submodular Maximization Subject to a Matroid Constraint

Moran Feldman - CS-Lecture

Thursday, 1.1.2015, 14:30

Room 337-8 Taub Bld.