Improving Yield of Energy Resources – AI Driven Approach
As we are building smart energy infrastructure that includes various forms of hybrid energy resources including electric vehicles, solar, battery storage etc., it firstly requires data to be collected from these disparate energy sources and…
Three Microsoft fellowship programs support academics and the future of the computer science field
To help academics advance their research, Microsoft has supported hundreds of fellows through the Microsoft Research PhD Fellowship. This year we are expanding our funding support by creating two new fellowships: one designed to support…
Watch the live stream of the 2018 Microsoft Research Faculty Summit – Systems/Fueling Future Disruptions
The Systems focused Microsoft Research Faculty Summit is just around the corner on August 1-2, 2018! This year’s summit will highlight how Systems are the infrastructure Fueling Future Disruptions by delivering an engaging program exploring…
Top students contemplate the shape of the AI future at PhD Summer School
Beautiful summer weather, ice cold Pimm’s and the idyllic scenery along the River Cam greeted over 100 PhD students from across the EMEA (Europe, Middle East and Africa) region who had traveled to Cambridge, England,…
ACM announces creation of Chuck Thacker Breakthrough in Computing Award
ACM – the Association for Computing Machinery – has created a new major award to honor 2009 A.M. Turing Laureate Charles P. “Chuck” Thacker. The award honors Thacker’s pioneering contributions to computing, considered by the…
Deep Learning at Mote Scale
The Internet of Things (IoT) is poised to revolutionize our world. Billions of microcontrollers and sensors have already been deployed for predictive maintenance, connected cars, precision agriculture, personalized fitness and wearables, smart housing, cities, healthcare,…
Rethinking IoT Analytics with Universal Monitoring
Many IoT analytics tasks require accurate estimates of metrics for many applications such as heavy hitters, anomaly detection (e.g., entropy of source addresses), and security (e.g., DoS detection). Obtaining accurate estimates given CPU, memory, energy,…