Capturing the underlying attributes of the data with their latent representations (i.e., PCA) often benefits various downstream tasks such as statistical test and classification in many domains. At the same time, the process of identifying the latent representations appropriate to the data and/or analysis is itself an important task.
Abstract: Fitting a model to a collection of observations is one of the quintessential problems in machine learning. Since any model is only approximately valid, an estimator that is useful in practice must also be robust in the presence of model misspecification. It turns out that there is a striking tension between robustness and computational efficiency. Even for the most basic high-dimensional tasks, until recently the only known estimators were either hard to compute or could only tolerate a negligible fraction of errors.
Abstract: Can we provably immunize protocols against coordinated attacks on the internet? Can we verify that computation is performed correctly while preserving the privacy of underlying data? Can we enable mutually distrusting participants to securely compute on distributed private data? These are some of the core challenges that lie at the heart of modern cryptography and secure protocol design.
In this talk, I will discuss my research that builds non-interactive secure protocols to address these challenges based on widely believed cryptographic hardness assumptions.
Job Description: Programming support for ongoing development of an integrated farm systems simulation model written in Python. Joint project between UW-Madison Biological Systems Engineering Department and USDA-ARS Dairy Forage Research Center. Hourly appointment for 30-40 hr/week during the summer and 10-20 hr/week during the school year. Regular evaluation of task completion and work quality. Compensation is $15-17/hr depending on experience. Application deadline: March 31, 2018.
Apply your recent degree and solid foundation in Computer Science in this key customer facing role supporting Miles Data enterprise
customers in the delivery of leading-edge solutions that enable the tracking of assets in the supply chain. The Systems Engineer is
responsible for assisting an Account Manager during the sales process, as well as designing and implementing solutions. The System
Engineer must develop a deep knowledge of the products that Miles Data Technologies sells and supports, including label printing
Program obfuscation is method for transforming (or “scrambling”) any computer program into one that is functionally equivalent, yet “unintelligible”. It not only promises to be a powerful tool for software protection, but has also reshaped the theory of cryptography in the last few years, with previously unimagined cryptographic applications, and additionally has intriguing application in complexity theory.
Current Computer Sciences declared majors: You are invited to attend a presentation and informal chat with Professors Akella and Swift (Computer Sciences) on March 14th from 11:30AM - 12:30PM in CS 1240.
Join us for pizza as you hear about what they teach and the research they do with the Department of Computer Sciences. This will be followed by a question and answer session about the topics he teaches/researches, general questions about the CS major and job potential, what is hot/not in the area of Computer Sciences, or any other general advice he can give.