The next generation of developer tools for data programming
Traditional software development activities (like editing, testing, debugging, and others) often need to be carried out by individuals who are not typical software developers. Tools as diverse as spreadsheets, Jupyter notebooks, and deep learning frameworks…
The next generation of developer tools for data programming webinar
In this webinar led by Partner Researcher Dr. Ben Zorn, follow the path of the revolution that empowers more people to easily leverage computational resources for problem solving. You will examine the incredible opportunities and technical…
An Ethical Crisis in Computing?
Computer scientists think often of “Ender’s Game” these days. In this award-winning 1985 science-fiction novel by Orson Scott Card, Ender is being trained at Battle School, an institution designed to make young children into military…
The BBC micro: bit: from the U.K. to the world
Quickr: Cost-Effective Data Analytics at Scale
Quickr explores cost-effective data analytics at scale, breaking new ground in research on offering approximate answers for complex ad-hoc queries.
Project Everest
Project Everest aims to build and deploy a verified HTTPS stack, constructing a high-performance, standards-compliant, and verified implementation of the full HTTPS ecosystem.
AI Security Engineering—Modeling/Detecting/Mitigating New Vulnerabilities
AI and machine learning present a litany of unmitigated security threats. Research is pivoting from contrived vulns to weaponized exploitation. As a security engineer, how do I protect and defend my services against these threats?…
Auditing Outsourced Services
How can users of a cloud service verify that the service truly performs as promised? This question is vital today because clouds are complicated black boxes, running in different administrative domains from users. Their correctness…
Gaussian Process for Any Neural Architecture
Gaussian Process for Any Neural Architecture: Reference Implementations This repo is a companion to the paper linked below, which shows that the Gaussian process behavior arises in wide, randomly initialized, neural networks regardless of architecture.…