{"id":199613,"date":"2008-11-18T12:43:58","date_gmt":"2008-11-18T12:43:58","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/events\/summer-school-2008\/"},"modified":"2025-08-06T12:03:09","modified_gmt":"2025-08-06T19:03:09","slug":"summer-school-2008","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/summer-school-2008\/","title":{"rendered":"Summer School 2008"},"content":{"rendered":"\n\n<h3>Related Links<\/h3>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.facebook.com\/group.php?gid=28074587109\" target=\"_blank\">MSR Summer School 2008 Facebook Group<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/academic-program\/phd-scholarship-europe-middle-east-africa\/\">PhD Scholarship Programme<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/event\/summer-school-2007\">Summer School 2007<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cl.cam.ac.uk\/\" target=\"_blank\" rel=\"noopener\">Cambridge University Computer Laboratory<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-200406 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-300x194.jpg\" alt=\"group_photo.jpg\" width=\"300\" height=\"194\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-300x194.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-768x496.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-1024x661.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>The third Microsoft Research Summer School was held at Microsoft Research in Cambridge, U.K., on 7 July through 11 July 2008. It included a series of talks of academic interest and posters sessions that gave invited students the opportunity to present their work to Microsoft researchers and a number of Cambridge academics.<\/p>\n<p>The 2008 Summer School was organised in partnership with the Cambridge University Computer Laboratory. Invited students included all first year PhD students of the Computer Laboratory and all Microsoft Research 2007 PhD Scholars.<\/p>\n<p>Lectures and posters sessions were public and open to all research staff and students from the University of Cambridge.<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8358\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8358\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8357\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tTuesday, 8 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8357\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8358\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong>Research career &#8211; Industry vs. academia, Andrew Herbert (Microsoft Research)<\/strong><\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonpeytonjones-writingapaper.pptx\"><strong>How to write a great research paper<\/strong><\/a>, Simon Peyton-Jones (Microsoft Research)<\/strong><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonpeytonjones-givingatalk.pptx\"><strong>How to give a great research talk<\/strong><\/a><b>, Simon Peyton-Jones (Microsoft Research)<\/b><\/p>\n<p>Writing papers and giving talks are key skills for any researcher, but they aren\u2019t easy. In this pair of presentations, I\u2019ll describe simple guidelines that I follow for writing papers and giving talks, which I think may be useful to you too. I don\u2019t have all the answers \u2013 far from it \u2013 and I hope that the presentation will evolve into a discussion in which you share your own insights, rather than a lecture.<\/p>\n<hr \/>\n<p><strong>Presentations of past students:<\/strong><\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alessandroduminuco.pptx\"><strong>Towards a peer-to-peer file backup system<\/strong><\/a>, Alessandro Duminuco (Institut Eur\u00e9com)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Peer-to-Peer systems have received a lot of attention in recent years. The key property of Peer-to-Peer systems is self-scaling, i.e. as more peers become part of the system not only the service demand increases but also the service capacity. The research community has shown an increasing interest in the use of P2P systems for file storage. This application can be very attractive for two main reasons: (i) centralized solutions are expensive (ii) common PCs are equipped with high-capacity local disks, often underutilized. The design of a Peer-to-Peer storage system is not a trivial task and presents a considerable number of challenging problems. I will illustrate briefly some of the issues involved, explaining some of the solutions I proposed so far during my Ph.D. thesis.<\/p>\n<hr \/>\n<\/blockquote>\n<ul>\n<li><strong>Generalizing the discrete analyses of genetic networks using constraints, Fabien Corblin (Universit\u00e9 Joseph Fourier)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Our work generalizes the current existing discrete approaches for analyzing the properties of genetic networks as proposed by Thomas using concepts that are available in constraint programming (CP). Thomas\u2019 networks can be formalized, generalized and implemented using constraints. At the limit the proposed approach combines both aspects of simulation and reverse engineering. The ultimate goal of this work is to allow biologists to explore the combined effects of various types of hypotheses such as the assumed gene interactions and the expected dynamic behavior. We have developed a constraint program that utilizes the assumed hypotheses expressed as data. When the data is interpreted by a CP processor the proposed system is capable of responding to multiple queries that encompass simulation, reverse engineering and hybrid combination of the two. After a presentation of our approach, I will show you the constraint program in action with the following functionalities: combination of simulation and reverse-engineering, addition of hypotheses about the combination of interactions over the genes of the network, creation of mutants, relaxation of constraints in case of incoherence (the data having contradictory effects), and consequently suggestion of refinement of the model.<\/p>\n<hr \/>\n<\/blockquote>\n<ul>\n<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-georgweibenbacher.ppt\"><strong>Why breaking other kids\u2019 toys (in time) is an achievement in computer science<\/strong><\/a>, Georg Wei\u00dfenbacher (ETH Zurich)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Automated software verification is a superb challenge. Unfortunately, in the many years of research in this field, few actual products (if any) have been proven correct beyond doubt. We can, however, look back to a long history of spectacular successes in software falsification (think Ariane 5). The problem is that bugs are usually buried deep in the software and traditional testing techniques just don\u2019t dig deep enough. I will talk about an approach that accelerates the digging, allowing us to dig deeper for bugs and &#8220;break the toy&#8221; before somebody else breaks it unintentionally. I\u2019ll also explain how finding deep bugs in abstract software models can help verifying the actual software.<\/p>\n<hr \/>\n<\/blockquote>\n<ul>\n<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-kaikohlhoff.ppt\"><strong>Computational prediction of three-dimensional protein structure from NMR chemical shifts<\/strong><\/a>, Kai Kohlhoff (University of Cambridge)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Proteins are involved in virtually every biochemical reaction in a living cell. A protein\u2019s function is strongly dependent on its three-dimensional structure and there is a large interest in the pharmaceutical industry to understand the native structure of proteins in order to perform targeted drug design. Existing experimental techniques offer high spatial resolution, but tend to be costly and time-consuming. A novel method, CamShift-MD, will be presented that is based on relatively easy to perform chemical shift measurements from nuclear magnetic resonance spectroscopy. This method predicts protein structure by introducing restraints into molecular dynamics computer simulations. CamShift-MD offers a new way of automatically generating protein structures based on a combination of experiment and theory. It has the potential to solve structures for which traditional methods are not suitable, such as highly dynamical non-native states. Moreover, the method can be used to determine protein ensembles. Unlike a single, rigid structure, such ensembles reveal information about the distribution of conformations and dynamics of molecules in solution, providing us with a better picture of the behaviour of proteins in the cellular environment.<\/p>\n<\/blockquote>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8360\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8360\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8359\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tWednesday, 9 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8359\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8360\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong>Giving a good presentation, Ken Shaw (Benchmark Communication Techniques)<\/strong><\/p>\n<p>Lecture, Presentation or Conversation? We will examine: Who your audience is; What they want; Why you are addressing them; How you handle practical issues like nerves, body language, speech & voice, humour, visual aids etc.; What is success? What is plan B if everything goes wrong; How you recover.<\/p>\n<hr \/>\n<p><strong>Mind-reading machines, Peter Robinson (University of Cambridge)<\/strong><\/p>\n<p>Facial displays are an important channel for the expression of emotions, and are often thought of as projections of a person\u2019s mental state. Computer systems generally ignore this information. Mind-reading interfaces infer users\u2019 mental states from facial expressions, giving them a degree of emotional intelligence. We use video processing to track two dozen features on the user\u2019s face. These are then interpreted using statistical techniques through a hierarchy of analyses as basic actions, head and facial gestures, and finally groups of mental states. The talk will describe an implementation of facial affect inference, together with an evaluation and some preliminary results of using the system to monitor car drivers.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8362\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8362\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8361\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tThursday, 10 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8361\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8362\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-jacklang.ppt\"><strong>Rough guide to being an entrepreneur<\/strong><\/a>, Jack Lang (University of Cambridge)<\/strong><\/p>\n<p>At some stage you might want to exploit your ideas by starting a company, just as Bill Gates and Paul Allen did in 1975. It might even be the next Microsoft, or bought by them. I\u2019ll give an overview of the process, explain some of the success factors investors look for, and how to go about writing a business plan and getting off the ground.<\/p>\n<hr \/>\n<p><strong>Grand challenges in computer science, Tony Hoare (Microsoft Research)<\/strong><\/p>\n<p>One way to do great research is to work with a great team, collaborating over an extended timescale, to find answers to fundamental questions that lie at the very basis of your branch of science. I will call such a project a Grand Challenge.<\/p>\n<p>Grand Challenges have long been common in Astronomy (the Hubble telescope) and in Physics (the large hadron collider), and more recently in Genetics (the enumeration of the human genome). Here are six Grand Challenges that have recently been singled out by UK computer scientists for the attention of the research community:<\/p>\n<ul>\n<li>\u2018in vivo = in silico\u2019\u2013 multi-level simulation of the behaviour of biological organisms<\/li>\n<li>\u2018memories for life\u2019\u2013 rapid recall of a lifetime\u2019s memories<\/li>\n<li>\u2018architecture of the mind and brain\u2019\u2013 simulation of the relation between them<\/li>\n<li>\u2018non-classical computation\u2019\u2013 a search for a theory that covers the wide range of computing phenomena in nature<\/li>\n<li>\u2018ubiquitous computing\u2019\u2013 principles of engineering of the swarms of computers that surround us<\/li>\n<li>\u2018dependable systems evolution\u2019\u2013 programs that are proved correct by the computer before running them<\/li>\n<\/ul>\n<p>Can you think of any more? I will talk in more detail about the last of these, which has been my own life-long research interest.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-richardblack.ppsx\"><strong>How does the Internet work?<\/strong><\/a>, Richard Black (Microsoft Research)<\/strong><\/p>\n<p>Could you explain how the Internet works in simple terms to someone else? Are there any gaps in your understanding, or questions you have? In this talk I\u2019ll be giving an introductory description to how it all works.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-wouterspek.ppt\"><strong>How to apply for funding? In search of the holy grail<\/strong><\/a>, Wouter Spek (European Science Foundation)<\/strong><\/p>\n<p>Wouldn\u2019t it be nice to have unlimited sources of funding for your research? Wouldn\u2019t it be nice to have the freedom to operate? Wouldn\u2019t is be nice not to be bothered with constant applying and competing for financial sources? These are some of the topics we will discuss, we will talk about unmet needs and I will give you some pointers how to address the issue of finance and finance acquisition.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8364\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8364\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8363\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tFriday, 11 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8363\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8364\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong>Take control or how to manage your supervisor, Tristram Hooley (vitae)<\/strong><\/p>\n<p>This session will look at how to make supervision work well for you. It will argue that to get the most out of your relationship with your supervisor you will need to be proactive and assertive. In particular the session will encourage you to think about the following issues:<\/p>\n<ul>\n<li>The relative rights and responsibilities of the supervisor and supervisee<\/li>\n<li>What your supervisor cares about and how you can move up in their priorities<\/li>\n<li>Strategies that you can use to manage the supervision and make them more useful<\/li>\n<li>What to do if things go wrong<\/li>\n<\/ul>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-dushyanthnarayanan.pptx\"><strong>Write off-loading: Practical power management for enterprise storage<\/strong><\/a>, Dushyanth Narayanan (Microsoft Research)<\/strong><\/p>\n<p>In enterprise data centres power usage is a problem impacting server density and the total cost of ownership. Storage uses a significant fraction of the power budget and there are no widely deployed power-saving solutions for enterprise storage systems. The traditional view is that enterprise workloads make spinning disks down ineffective because idle periods are too short. We analyzed block-level traces from 36 volumes in an enterprise data centre for one week and concluded that significant idle periods exist, and that they can be further increased by modifying the read\/write patterns using write off-loading. Write off-loading allows write requests on spun-down disks to be temporarily redirected to persistent storage elsewhere in the data centre. The key challenge is doing this transparently and efficiently at the block level, without sacrificing consistency or failure resilience. We describe our write off-loading design and implementation that achieves these goals. We evaluate it by replaying portions of our traces on a rack-based testbed. Results show that just spinning disks down when idle saves 28\u201336% of energy, and write off-loading further increases the savings to 45\u201360%.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-stevehodges.pdf\"><strong>Surface computing: the post-PC experience<\/strong><\/a>, Steve Hodges (Microsoft Research)<\/strong><\/p>\n<p>The long-established \u2018desktop\u2019 computing metaphor continues to drive a lot of our interactions with computers, But at the same time, new interaction paradigms are being developed and we believe that these will increasingly complement the traditional computing experience. To this end, at Microsoft Research we are exploring a number of new interaction technologies along with the novel form factors, user experiences and usage scenarios they enable. This talk will present some of our work on \u2018surface computing\u2019, a new approach to interaction which doesn\u2019t required a keyboard or mouse for input, but which is inherently multi-user and which allows direct manipulation of digital content with hands, fingers and via tangible objects.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-klaus-peterzauner.pdf\"><strong>Enzymatic computing<\/strong><\/a>, Klaus Peter Zauner (University of Southampton)<\/strong><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8366\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8366\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8365\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 1\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8365\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8366\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alejandroarbelaez.pdf\">Adaptive combinatorial search<\/a>\u00a0&#8211;\u00a0Alejandro Arbelaez, INRIA<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alidapalmisano.pptx\">The cycle of modeling, modeling of the cycle <\/a>&#8211;\u00a0Alida Palmisano, CoSBi<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alvarofialho.pdf\">Adaptive evolutionary computation <\/a>&#8211;\u00a0\u00c1lvaro Fialho, INRIA<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-amitabharoy.pptx\">Adaptive software lock elision<\/a>\u00a0&#8211;\u00a0Amitabha Roy, University of Cambridge<\/li>\n<li>Exact JPEG recompression and forensics using interval arithmetic &#8211;\u00a0Andrew Lewis, University of Cambridge<\/li>\n<li>Highly sensitive de novo identification of peptides from tandem mass spectra by linear optimization and kinetic modeling &#8211;\u00a0Axel Rack, Freie Universit\u00e4t Berlin<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bencalderhead.pdf\">Illuminating circadian rhythms with Bayesian inference<\/a>\u00a0&#8211;\u00a0Ben Calderhead, University of Glasgow<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bencepasztor.pdf\">Code reprogramming and dissemination in mobile WSN<\/a>\u00a0&#8211;\u00a0Bence Pasztor, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bogdanciubotaru.pdf\">Quality-oriented handover scheme for adaptive multimedia streaming in heterogeneous wireless network environment<\/a> &#8211;\u00a0Bogdan Ciubotaru, Dublin College University<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ekaterinashutova.pdf\">Probabilistic interpretation of figures of speech<\/a>\u00a0&#8211;\u00a0Ekaterina Shutova, University of Cambridge<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8368\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8368\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8367\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 2\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8367\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8368\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-christianrichardt.pdf\">Video abstraction and stylisation <\/a>&#8211;\u00a0Christian Richardt, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-danieleborsaro.pdf\">Time-aware routing in wireless sensor networks<\/a> &#8211;\u00a0Daniele Borsaro, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-davidmiller.pdf\">Towards optical PCI<\/a> &#8211;\u00a0David Miller, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-derekmurray.pdf\">Spread-spectrum computation<\/a> &#8211;\u00a0Derek Murray, University of Cambridge<\/li>\n<li>Proof engineering: Refactoring proof &#8211;\u00a0Eliot Setzer, University of Edinburgh<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-eugeniogiordano.ppt\">Vehicular ad hoc networks<\/a> &#8211;\u00a0Eugenio Giordano, University of Bologna<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-florianzuleger.pdf\">Automatic derivation of loop bounds<\/a> &#8211;\u00a0Florian Zuleger, Technical University Darmstadt<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-francoisgarillot-handout.pdf\">Mechanized foundations of finite group theory<\/a> &#8211;\u00a0Francois Garillot, INRIA<\/li>\n<li>New apparatus for characterising molecular computing substrates\u00a0&#8211;\u00a0Gareth Jones, University of Southampton<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ianleung-anilsorathia.pdf\">Contact network modeling of flu epidemics<\/a>&#8211;\u00a0Anilkumar Sorathiya & Ian Leung, University of Cambridge<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8370\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8370\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8369\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 3\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8369\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8370\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-chrislovell.pdf\">MSR India 2012 Summer School on Distributed Algorithms, Systems, and Programming<\/a>\u00a0&#8211;\u00a0Chris Lovell, University of Southampton<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-jonathanmak.pdf\">Dynamic dependency graphs \u2013 How much parallelism is out there?<\/a>\u00a0&#8211;\u00a0Jonathan Mak, University of Cambridge<\/li>\n<li>Pan-tropical modelling of the impact of land use change on water quantity provision and low flows &#8211;\u00a0Jorge Pe\u00f1a Arancibia, King\u2019s College London<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-julienquintard.pdf\">The Infinit file system<\/a>\u00a0&#8211;\u00a0Julien Quintard, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-laurelriek.pdf\">Designing robots for people<\/a>\u00a0&#8211;\u00a0Laurel Riek, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-mattridsdale.pdf\">Diagrammatic reasoning across multiple domains: The automatic construction of useful diagrams<\/a>\u00a0&#8211;\u00a0Matthew Ridsdale, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-micheleforlin.pdf\">Noise from in-silico biology: A statistical perspective<\/a>\u00a0&#8211;\u00a0Michele Forlin, CoSBi<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-nicktaylor.pdf\">Supporting village community through connected situated displays<\/a>\u00a0&#8211;\u00a0Nick Taylor, University of Lancaster<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-olgamorawczynski.pdf\">Examining the adoption and usage of m-banking applications in low-income communities: The case of M-PESA in Kenya<\/a> &#8211;\u00a0Olga Morawczynski, University of Edinburgh<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8372\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8372\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8371\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 4\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8371\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8372\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-olivierteboul.pptx\">Shape grammar and image based 3D reconstruction of buildings<\/a>\u00a0&#8211;\u00a0Olivier Teboul, \u00c9cole Centrale Paris<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-pauldunphy.pdf\">The realities of graphical passwords<\/a>\u00a0&#8211;\u00a0Paul Dunphy, Newcastle University<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-philipphennig.pdf\">Learning the temperature of a game<\/a>\u00a0&#8211;\u00a0Philipp Hennig, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-richardrussell.pdf\">Automated planning with goal utility dependencies within a satisfiability framework<\/a>\u00a0&#8211;\u00a0Richard Russell, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-robertolarcher.pdf\">From BlenX to SBML<\/a>\u00a0&#8211;\u00a0Roberto Larcher, CoSBi<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ruoshuiliu.ppt\">Deployment of wireless sensor networks<\/a>\u00a0&#8211;\u00a0Ruoshui Liu, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-sebastianfaust.ppt\">Provable security at implementation-level<\/a>\u00a0&#8211;\u00a0Sebastian Faust, Katholieke Universiteit Leuven<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-sherifakoush.pdf\">Renewable energy in data centres<\/a>\u00a0&#8211;\u00a0Sherif Akoush, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonyoussef.ppt\">Stochastic modelling of single cell assay data<\/a>\u00a0&#8211;\u00a0Simon Youssef, Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen<\/li>\n<li>Interactive visualization, annotation and processing of terabyte-scale 3D image volumes &#8211;\u00a0Tahir Mansoori, University of Oxford<\/li>\n<li>A robust video receiver allowing WIMAX video broadcasting and indoor WIFI retransmission &#8211;\u00a0Usman Ali, Sup\u00e9lec<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>This type of discussions was requested by the students who attended the 2006 Summer School and the students who attended the 2007 Summer School enjoyed them very much. The goal is to make the students think and discuss about a topic or issue of importance and get to know each other.<\/p>\n<p>Each group will be asked to share briefly to the other groups the outcome of their discussion.<\/p>\n<h3>Ethics in scientific research<\/h3>\n<p>Discussion leader: Andrew Fitzgibbon (Microsoft Research)<\/p>\n<h3>Scientific method in computing research<\/h3>\n<p>Discussion leader: Jon Crowcroft (University of Cambridge)<\/p>\n<h3>Computer science education<\/h3>\n<p>Discussion leader: Kevin Bond (Aylesbury Grammar School, Cambridge)<\/p>\n<h3>Impact of research<\/h3>\n<p>Discussion leader: Wolfgang Emmerich (University College London)<\/p>\n<h3>Being a post-doc &#8211; Academia vs. industry<\/h3>\n<p>Discussion leader: Andrew Phillips (Microsoft Research)<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Related Links MSR Summer School 2008 Facebook Group (opens in new tab) PhD Scholarship Programme (opens in new tab) Summer School 2007 (opens in new tab) Cambridge University Computer Laboratory (opens in new tab) Opens in a new tab The third Microsoft Research Summer School was held at Microsoft Research in Cambridge, U.K., on 7 [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2008-07-07","msr_enddate":"2008-07-11","msr_location":"Cambridge, England, U.K.","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":true,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13547],"msr-region":[239178],"msr-event-type":[197947],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-199613","msr-event","type-msr-event","status-publish","hentry","msr-research-area-systems-and-networking","msr-region-europe","msr-event-type-universities","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"Summer School 2008\",\"backgroundColor\":\"grey\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"Summary\"} --><!-- wp:freeform --><h3>Related Links<\/h3>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.facebook.com\/group.php?gid=28074587109\" target=\"_blank\">MSR Summer School 2008 Facebook Group<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/academic-program\/phd-scholarship-europe-middle-east-africa\/\">PhD Scholarship Programme<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/event\/summer-school-2007\">Summer School 2007<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cl.cam.ac.uk\/\" target=\"_blank\" rel=\"noopener\">Cambridge University Computer Laboratory<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-200406 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-300x194.jpg\" alt=\"group_photo.jpg\" width=\"300\" height=\"194\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-300x194.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-768x496.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-1024x661.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>The third Microsoft Research Summer School was held at Microsoft Research in Cambridge, U.K., on 7 July through 11 July 2008. It included a series of talks of academic interest and posters sessions that gave invited students the opportunity to present their work to Microsoft researchers and a number of Cambridge academics.<\/p>\n<p>The 2008 Summer School was organised in partnership with the Cambridge University Computer Laboratory. Invited students included all first year PhD students of the Computer Laboratory and all Microsoft Research 2007 PhD Scholars.<\/p>\n<p>Lectures and posters sessions were public and open to all research staff and students from the University of Cambridge.<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Agenda\"} --><!-- wp:freeform --><p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8358\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8358\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8357\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tTuesday, 8 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8357\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8358\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong>Research career &#8211; Industry vs. academia, Andrew Herbert (Microsoft Research)<\/strong><\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonpeytonjones-writingapaper.pptx\"><strong>How to write a great research paper<\/strong><\/a>, Simon Peyton-Jones (Microsoft Research)<\/strong><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonpeytonjones-givingatalk.pptx\"><strong>How to give a great research talk<\/strong><\/a><b>, Simon Peyton-Jones (Microsoft Research)<\/b><\/p>\n<p>Writing papers and giving talks are key skills for any researcher, but they aren\u2019t easy. In this pair of presentations, I\u2019ll describe simple guidelines that I follow for writing papers and giving talks, which I think may be useful to you too. I don\u2019t have all the answers \u2013 far from it \u2013 and I hope that the presentation will evolve into a discussion in which you share your own insights, rather than a lecture.<\/p>\n<hr \/>\n<p><strong>Presentations of past students:<\/strong><\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alessandroduminuco.pptx\"><strong>Towards a peer-to-peer file backup system<\/strong><\/a>, Alessandro Duminuco (Institut Eur\u00e9com)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Peer-to-Peer systems have received a lot of attention in recent years. The key property of Peer-to-Peer systems is self-scaling, i.e. as more peers become part of the system not only the service demand increases but also the service capacity. The research community has shown an increasing interest in the use of P2P systems for file storage. This application can be very attractive for two main reasons: (i) centralized solutions are expensive (ii) common PCs are equipped with high-capacity local disks, often underutilized. The design of a Peer-to-Peer storage system is not a trivial task and presents a considerable number of challenging problems. I will illustrate briefly some of the issues involved, explaining some of the solutions I proposed so far during my Ph.D. thesis.<\/p>\n<hr \/>\n<\/blockquote>\n<ul>\n<li><strong>Generalizing the discrete analyses of genetic networks using constraints, Fabien Corblin (Universit\u00e9 Joseph Fourier)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Our work generalizes the current existing discrete approaches for analyzing the properties of genetic networks as proposed by Thomas using concepts that are available in constraint programming (CP). Thomas\u2019 networks can be formalized, generalized and implemented using constraints. At the limit the proposed approach combines both aspects of simulation and reverse engineering. The ultimate goal of this work is to allow biologists to explore the combined effects of various types of hypotheses such as the assumed gene interactions and the expected dynamic behavior. We have developed a constraint program that utilizes the assumed hypotheses expressed as data. When the data is interpreted by a CP processor the proposed system is capable of responding to multiple queries that encompass simulation, reverse engineering and hybrid combination of the two. After a presentation of our approach, I will show you the constraint program in action with the following functionalities: combination of simulation and reverse-engineering, addition of hypotheses about the combination of interactions over the genes of the network, creation of mutants, relaxation of constraints in case of incoherence (the data having contradictory effects), and consequently suggestion of refinement of the model.<\/p>\n<hr \/>\n<\/blockquote>\n<ul>\n<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-georgweibenbacher.ppt\"><strong>Why breaking other kids\u2019 toys (in time) is an achievement in computer science<\/strong><\/a>, Georg Wei\u00dfenbacher (ETH Zurich)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Automated software verification is a superb challenge. Unfortunately, in the many years of research in this field, few actual products (if any) have been proven correct beyond doubt. We can, however, look back to a long history of spectacular successes in software falsification (think Ariane 5). The problem is that bugs are usually buried deep in the software and traditional testing techniques just don\u2019t dig deep enough. I will talk about an approach that accelerates the digging, allowing us to dig deeper for bugs and &#8220;break the toy&#8221; before somebody else breaks it unintentionally. I\u2019ll also explain how finding deep bugs in abstract software models can help verifying the actual software.<\/p>\n<hr \/>\n<\/blockquote>\n<ul>\n<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-kaikohlhoff.ppt\"><strong>Computational prediction of three-dimensional protein structure from NMR chemical shifts<\/strong><\/a>, Kai Kohlhoff (University of Cambridge)<\/strong><\/li>\n<\/ul>\n<blockquote>\n<p>Proteins are involved in virtually every biochemical reaction in a living cell. A protein\u2019s function is strongly dependent on its three-dimensional structure and there is a large interest in the pharmaceutical industry to understand the native structure of proteins in order to perform targeted drug design. Existing experimental techniques offer high spatial resolution, but tend to be costly and time-consuming. A novel method, CamShift-MD, will be presented that is based on relatively easy to perform chemical shift measurements from nuclear magnetic resonance spectroscopy. This method predicts protein structure by introducing restraints into molecular dynamics computer simulations. CamShift-MD offers a new way of automatically generating protein structures based on a combination of experiment and theory. It has the potential to solve structures for which traditional methods are not suitable, such as highly dynamical non-native states. Moreover, the method can be used to determine protein ensembles. Unlike a single, rigid structure, such ensembles reveal information about the distribution of conformations and dynamics of molecules in solution, providing us with a better picture of the behaviour of proteins in the cellular environment.<\/p>\n<\/blockquote>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8360\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8360\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8359\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tWednesday, 9 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8359\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8360\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong>Giving a good presentation, Ken Shaw (Benchmark Communication Techniques)<\/strong><\/p>\n<p>Lecture, Presentation or Conversation? We will examine: Who your audience is; What they want; Why you are addressing them; How you handle practical issues like nerves, body language, speech &amp; voice, humour, visual aids etc.; What is success? What is plan B if everything goes wrong; How you recover.<\/p>\n<hr \/>\n<p><strong>Mind-reading machines, Peter Robinson (University of Cambridge)<\/strong><\/p>\n<p>Facial displays are an important channel for the expression of emotions, and are often thought of as projections of a person\u2019s mental state. Computer systems generally ignore this information. Mind-reading interfaces infer users\u2019 mental states from facial expressions, giving them a degree of emotional intelligence. We use video processing to track two dozen features on the user\u2019s face. These are then interpreted using statistical techniques through a hierarchy of analyses as basic actions, head and facial gestures, and finally groups of mental states. The talk will describe an implementation of facial affect inference, together with an evaluation and some preliminary results of using the system to monitor car drivers.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8362\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8362\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8361\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tThursday, 10 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8361\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8362\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-jacklang.ppt\"><strong>Rough guide to being an entrepreneur<\/strong><\/a>, Jack Lang (University of Cambridge)<\/strong><\/p>\n<p>At some stage you might want to exploit your ideas by starting a company, just as Bill Gates and Paul Allen did in 1975. It might even be the next Microsoft, or bought by them. I\u2019ll give an overview of the process, explain some of the success factors investors look for, and how to go about writing a business plan and getting off the ground.<\/p>\n<hr \/>\n<p><strong>Grand challenges in computer science, Tony Hoare (Microsoft Research)<\/strong><\/p>\n<p>One way to do great research is to work with a great team, collaborating over an extended timescale, to find answers to fundamental questions that lie at the very basis of your branch of science. I will call such a project a Grand Challenge.<\/p>\n<p>Grand Challenges have long been common in Astronomy (the Hubble telescope) and in Physics (the large hadron collider), and more recently in Genetics (the enumeration of the human genome). Here are six Grand Challenges that have recently been singled out by UK computer scientists for the attention of the research community:<\/p>\n<ul>\n<li>\u2018in vivo = in silico\u2019\u2013 multi-level simulation of the behaviour of biological organisms<\/li>\n<li>\u2018memories for life\u2019\u2013 rapid recall of a lifetime\u2019s memories<\/li>\n<li>\u2018architecture of the mind and brain\u2019\u2013 simulation of the relation between them<\/li>\n<li>\u2018non-classical computation\u2019\u2013 a search for a theory that covers the wide range of computing phenomena in nature<\/li>\n<li>\u2018ubiquitous computing\u2019\u2013 principles of engineering of the swarms of computers that surround us<\/li>\n<li>\u2018dependable systems evolution\u2019\u2013 programs that are proved correct by the computer before running them<\/li>\n<\/ul>\n<p>Can you think of any more? I will talk in more detail about the last of these, which has been my own life-long research interest.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-richardblack.ppsx\"><strong>How does the Internet work?<\/strong><\/a>, Richard Black (Microsoft Research)<\/strong><\/p>\n<p>Could you explain how the Internet works in simple terms to someone else? Are there any gaps in your understanding, or questions you have? In this talk I\u2019ll be giving an introductory description to how it all works.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-wouterspek.ppt\"><strong>How to apply for funding? In search of the holy grail<\/strong><\/a>, Wouter Spek (European Science Foundation)<\/strong><\/p>\n<p>Wouldn\u2019t it be nice to have unlimited sources of funding for your research? Wouldn\u2019t it be nice to have the freedom to operate? Wouldn\u2019t is be nice not to be bothered with constant applying and competing for financial sources? These are some of the topics we will discuss, we will talk about unmet needs and I will give you some pointers how to address the issue of finance and finance acquisition.<\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8364\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8364\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8363\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tFriday, 11 July 2008\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8363\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8364\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<p><strong>Take control or how to manage your supervisor, Tristram Hooley (vitae)<\/strong><\/p>\n<p>This session will look at how to make supervision work well for you. It will argue that to get the most out of your relationship with your supervisor you will need to be proactive and assertive. In particular the session will encourage you to think about the following issues:<\/p>\n<ul>\n<li>The relative rights and responsibilities of the supervisor and supervisee<\/li>\n<li>What your supervisor cares about and how you can move up in their priorities<\/li>\n<li>Strategies that you can use to manage the supervision and make them more useful<\/li>\n<li>What to do if things go wrong<\/li>\n<\/ul>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-dushyanthnarayanan.pptx\"><strong>Write off-loading: Practical power management for enterprise storage<\/strong><\/a>, Dushyanth Narayanan (Microsoft Research)<\/strong><\/p>\n<p>In enterprise data centres power usage is a problem impacting server density and the total cost of ownership. Storage uses a significant fraction of the power budget and there are no widely deployed power-saving solutions for enterprise storage systems. The traditional view is that enterprise workloads make spinning disks down ineffective because idle periods are too short. We analyzed block-level traces from 36 volumes in an enterprise data centre for one week and concluded that significant idle periods exist, and that they can be further increased by modifying the read\/write patterns using write off-loading. Write off-loading allows write requests on spun-down disks to be temporarily redirected to persistent storage elsewhere in the data centre. The key challenge is doing this transparently and efficiently at the block level, without sacrificing consistency or failure resilience. We describe our write off-loading design and implementation that achieves these goals. We evaluate it by replaying portions of our traces on a rack-based testbed. Results show that just spinning disks down when idle saves 28\u201336% of energy, and write off-loading further increases the savings to 45\u201360%.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-stevehodges.pdf\"><strong>Surface computing: the post-PC experience<\/strong><\/a>, Steve Hodges (Microsoft Research)<\/strong><\/p>\n<p>The long-established \u2018desktop\u2019 computing metaphor continues to drive a lot of our interactions with computers, But at the same time, new interaction paradigms are being developed and we believe that these will increasingly complement the traditional computing experience. To this end, at Microsoft Research we are exploring a number of new interaction technologies along with the novel form factors, user experiences and usage scenarios they enable. This talk will present some of our work on \u2018surface computing\u2019, a new approach to interaction which doesn\u2019t required a keyboard or mouse for input, but which is inherently multi-user and which allows direct manipulation of digital content with hands, fingers and via tangible objects.<\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-klaus-peterzauner.pdf\"><strong>Enzymatic computing<\/strong><\/a>, Klaus Peter Zauner (University of Southampton)<\/strong><\/p>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Posters\"} --><!-- wp:freeform --><p>\t<div data-wp-context='{\"items\":[]}' data-wp-interactive=\"msr\/accordion\">\n\t\t\t\t\t<div class=\"clearfix\">\n\t\t\t\t<div\n\t\t\t\t\tclass=\"btn-group align-items-center mb-g float-sm-right\"\n\t\t\t\t\tdata-bi-aN=\"accordion-collapse-controls\"\n\t\t\t\t>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Expand all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllExpanded\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onExpandAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tExpand all\t\t\t\t\t<\/button>\n\t\t\t\t\t<span aria-hidden=\"true\"> | <\/span>\n\t\t\t\t\t<button\n\t\t\t\t\t\tclass=\"btn btn-link m-0\"\n\t\t\t\t\t\tdata-bi-cN=\"Collapse all\"\n\t\t\t\t\t\tdata-wp-bind--aria-controls=\"state.ariaControls\"\n\t\t\t\t\t\tdata-wp-bind--aria-expanded=\"state.ariaExpanded\"\n\t\t\t\t\t\tdata-wp-bind--disabled=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-class--inactive=\"state.isAllCollapsed\"\n\t\t\t\t\t\tdata-wp-on--click=\"actions.onCollapseAll\"\n\t\t\t\t\t\ttype=\"button\"\n\t\t\t\t\t>\n\t\t\t\t\t\tCollapse all\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<ul class=\"msr-accordion\">\n\t\t\t\t\t\t\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8366\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8366\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8365\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 1\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8365\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8366\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alejandroarbelaez.pdf\">Adaptive combinatorial search<\/a>\u00a0&#8211;\u00a0Alejandro Arbelaez, INRIA<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alidapalmisano.pptx\">The cycle of modeling, modeling of the cycle <\/a>&#8211;\u00a0Alida Palmisano, CoSBi<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alvarofialho.pdf\">Adaptive evolutionary computation <\/a>&#8211;\u00a0\u00c1lvaro Fialho, INRIA<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-amitabharoy.pptx\">Adaptive software lock elision<\/a>\u00a0&#8211;\u00a0Amitabha Roy, University of Cambridge<\/li>\n<li>Exact JPEG recompression and forensics using interval arithmetic &#8211;\u00a0Andrew Lewis, University of Cambridge<\/li>\n<li>Highly sensitive de novo identification of peptides from tandem mass spectra by linear optimization and kinetic modeling &#8211;\u00a0Axel Rack, Freie Universit\u00e4t Berlin<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bencalderhead.pdf\">Illuminating circadian rhythms with Bayesian inference<\/a>\u00a0&#8211;\u00a0Ben Calderhead, University of Glasgow<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bencepasztor.pdf\">Code reprogramming and dissemination in mobile WSN<\/a>\u00a0&#8211;\u00a0Bence Pasztor, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bogdanciubotaru.pdf\">Quality-oriented handover scheme for adaptive multimedia streaming in heterogeneous wireless network environment<\/a> &#8211;\u00a0Bogdan Ciubotaru, Dublin College University<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ekaterinashutova.pdf\">Probabilistic interpretation of figures of speech<\/a>\u00a0&#8211;\u00a0Ekaterina Shutova, University of Cambridge<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8368\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8368\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8367\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 2\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8367\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8368\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-christianrichardt.pdf\">Video abstraction and stylisation <\/a>&#8211;\u00a0Christian Richardt, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-danieleborsaro.pdf\">Time-aware routing in wireless sensor networks<\/a> &#8211;\u00a0Daniele Borsaro, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-davidmiller.pdf\">Towards optical PCI<\/a> &#8211;\u00a0David Miller, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-derekmurray.pdf\">Spread-spectrum computation<\/a> &#8211;\u00a0Derek Murray, University of Cambridge<\/li>\n<li>Proof engineering: Refactoring proof &#8211;\u00a0Eliot Setzer, University of Edinburgh<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-eugeniogiordano.ppt\">Vehicular ad hoc networks<\/a> &#8211;\u00a0Eugenio Giordano, University of Bologna<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-florianzuleger.pdf\">Automatic derivation of loop bounds<\/a> &#8211;\u00a0Florian Zuleger, Technical University Darmstadt<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-francoisgarillot-handout.pdf\">Mechanized foundations of finite group theory<\/a> &#8211;\u00a0Francois Garillot, INRIA<\/li>\n<li>New apparatus for characterising molecular computing substrates\u00a0&#8211;\u00a0Gareth Jones, University of Southampton<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ianleung-anilsorathia.pdf\">Contact network modeling of flu epidemics<\/a>&#8211;\u00a0Anilkumar Sorathiya &amp; Ian Leung, University of Cambridge<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8370\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8370\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8369\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 3\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8369\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8370\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-chrislovell.pdf\">MSR India 2012 Summer School on Distributed Algorithms, Systems, and Programming<\/a>\u00a0&#8211;\u00a0Chris Lovell, University of Southampton<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-jonathanmak.pdf\">Dynamic dependency graphs \u2013 How much parallelism is out there?<\/a>\u00a0&#8211;\u00a0Jonathan Mak, University of Cambridge<\/li>\n<li>Pan-tropical modelling of the impact of land use change on water quantity provision and low flows &#8211;\u00a0Jorge Pe\u00f1a Arancibia, King\u2019s College London<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-julienquintard.pdf\">The Infinit file system<\/a>\u00a0&#8211;\u00a0Julien Quintard, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-laurelriek.pdf\">Designing robots for people<\/a>\u00a0&#8211;\u00a0Laurel Riek, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-mattridsdale.pdf\">Diagrammatic reasoning across multiple domains: The automatic construction of useful diagrams<\/a>\u00a0&#8211;\u00a0Matthew Ridsdale, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-micheleforlin.pdf\">Noise from in-silico biology: A statistical perspective<\/a>\u00a0&#8211;\u00a0Michele Forlin, CoSBi<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-nicktaylor.pdf\">Supporting village community through connected situated displays<\/a>\u00a0&#8211;\u00a0Nick Taylor, University of Lancaster<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-olgamorawczynski.pdf\">Examining the adoption and usage of m-banking applications in low-income communities: The case of M-PESA in Kenya<\/a> &#8211;\u00a0Olga Morawczynski, University of Edinburgh<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t<li class=\"m-0\" data-wp-context='{\"id\":\"accordion-content-8372\"}' data-wp-init=\"callbacks.init\">\n\t\t<div class=\"accordion-header\">\n\t\t\t<button\n\t\t\t\taria-controls=\"accordion-content-8372\"\n\t\t\t\tclass=\"btn btn-collapse\"\n\t\t\t\tdata-wp-bind--aria-expanded=\"state.isExpanded\"\n\t\t\t\tdata-wp-on--click=\"actions.onClick\"\n\t\t\t\tid=\"accordion-button-8371\"\n\t\t\t\ttype=\"button\"\n\t\t\t>\n\t\t\t\tPosters Session 4\t\t\t<\/button>\n\t\t<\/div>\n\t\t<div\n\t\t\taria-labelledby=\"accordion-button-8371\"\n\t\t\tclass=\"msr-accordion__content\"\n\t\t\tdata-wp-bind--inert=\"!state.isExpanded\"\n\t\t\tdata-wp-run=\"callbacks.run\"\n\t\t\tid=\"accordion-content-8372\"\n\t\t>\n\t\t\t<div class=\"msr-accordion__body\">\n\t\t\t\t<ol>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-olivierteboul.pptx\">Shape grammar and image based 3D reconstruction of buildings<\/a>\u00a0&#8211;\u00a0Olivier Teboul, \u00c9cole Centrale Paris<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-pauldunphy.pdf\">The realities of graphical passwords<\/a>\u00a0&#8211;\u00a0Paul Dunphy, Newcastle University<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-philipphennig.pdf\">Learning the temperature of a game<\/a>\u00a0&#8211;\u00a0Philipp Hennig, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-richardrussell.pdf\">Automated planning with goal utility dependencies within a satisfiability framework<\/a>\u00a0&#8211;\u00a0Richard Russell, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-robertolarcher.pdf\">From BlenX to SBML<\/a>\u00a0&#8211;\u00a0Roberto Larcher, CoSBi<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ruoshuiliu.ppt\">Deployment of wireless sensor networks<\/a>\u00a0&#8211;\u00a0Ruoshui Liu, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-sebastianfaust.ppt\">Provable security at implementation-level<\/a>\u00a0&#8211;\u00a0Sebastian Faust, Katholieke Universiteit Leuven<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-sherifakoush.pdf\">Renewable energy in data centres<\/a>\u00a0&#8211;\u00a0Sherif Akoush, University of Cambridge<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonyoussef.ppt\">Stochastic modelling of single cell assay data<\/a>\u00a0&#8211;\u00a0Simon Youssef, Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen<\/li>\n<li>Interactive visualization, annotation and processing of terabyte-scale 3D image volumes &#8211;\u00a0Tahir Mansoori, University of Oxford<\/li>\n<li>A robust video receiver allowing WIMAX video broadcasting and indoor WIFI retransmission &#8211;\u00a0Usman Ali, Sup\u00e9lec<\/li>\n<\/ol>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Discussion Themes\"} --><!-- wp:freeform --><p>This type of discussions was requested by the students who attended the 2006 Summer School and the students who attended the 2007 Summer School enjoyed them very much. The goal is to make the students think and discuss about a topic or issue of importance and get to know each other.<\/p>\n<p>Each group will be asked to share briefly to the other groups the outcome of their discussion.<\/p>\n<h3>Ethics in scientific research<\/h3>\n<p>Discussion leader: Andrew Fitzgibbon (Microsoft Research)<\/p>\n<h3>Scientific method in computing research<\/h3>\n<p>Discussion leader: Jon Crowcroft (University of Cambridge)<\/p>\n<h3>Computer science education<\/h3>\n<p>Discussion leader: Kevin Bond (Aylesbury Grammar School, Cambridge)<\/p>\n<h3>Impact of research<\/h3>\n<p>Discussion leader: Wolfgang Emmerich (University College London)<\/p>\n<h3>Being a post-doc &#8211; Academia vs. industry<\/h3>\n<p>Discussion leader: Andrew Phillips (Microsoft Research)<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"Summary","content":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo.jpg\"><img class=\"size-medium wp-image-200406 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-group_photo-300x194.jpg\" alt=\"group_photo.jpg\" width=\"300\" height=\"194\" \/><\/a>The third Microsoft Research Summer School was held at Microsoft Research in Cambridge, U.K., on 7 July through 11 July 2008. It included a series of talks of academic interest and posters sessions that gave invited students the opportunity to present their work to Microsoft researchers and a number of Cambridge academics.\r\n\r\nThe 2008 Summer School was organised in partnership with the Cambridge University Computer Laboratory. Invited students included all first year PhD students of the Computer Laboratory and all Microsoft Research 2007 PhD Scholars.\r\n\r\nLectures and posters sessions were public and open to all research staff and students from the University of Cambridge."},{"id":1,"name":"Agenda","content":"[accordion]\r\n\r\n[panel header=\"Tuesday, 8 July 2008\"]\r\n\r\n<strong>Research career - Industry vs. academia, Andrew Herbert (Microsoft Research)<\/strong>\r\n\r\n<hr \/>\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonpeytonjones-writingapaper.pptx\"><strong>How to write a great research paper<\/strong><\/a>, Simon Peyton-Jones (Microsoft Research)<\/strong>\r\n\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonpeytonjones-givingatalk.pptx\"><strong>How to give a great research talk<\/strong><\/a><b>, Simon Peyton-Jones (Microsoft Research)<\/b>\r\n\r\nWriting papers and giving talks are key skills for any researcher, but they aren\u2019t easy. In this pair of presentations, I\u2019ll describe simple guidelines that I follow for writing papers and giving talks, which I think may be useful to you too. I don\u2019t have all the answers \u2013 far from it \u2013 and I hope that the presentation will evolve into a discussion in which you share your own insights, rather than a lecture.\r\n\r\n<hr \/>\r\n\r\n<strong>Presentations of past students:<\/strong>\r\n<ul>\r\n \t<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alessandroduminuco.pptx\"><strong>Towards a peer-to-peer file backup system<\/strong><\/a>, Alessandro Duminuco (Institut Eur\u00e9com)<\/strong><\/li>\r\n<\/ul>\r\n<blockquote>Peer-to-Peer systems have received a lot of attention in recent years. The key property of Peer-to-Peer systems is self-scaling, i.e. as more peers become part of the system not only the service demand increases but also the service capacity. The research community has shown an increasing interest in the use of P2P systems for file storage. This application can be very attractive for two main reasons: (i) centralized solutions are expensive (ii) common PCs are equipped with high-capacity local disks, often underutilized. The design of a Peer-to-Peer storage system is not a trivial task and presents a considerable number of challenging problems. I will illustrate briefly some of the issues involved, explaining some of the solutions I proposed so far during my Ph.D. thesis.\r\n\r\n<hr \/>\r\n\r\n<\/blockquote>\r\n<ul>\r\n \t<li><strong>Generalizing the discrete analyses of genetic networks using constraints, Fabien Corblin (Universit\u00e9 Joseph Fourier)<\/strong><\/li>\r\n<\/ul>\r\n<blockquote>Our work generalizes the current existing discrete approaches for analyzing the properties of genetic networks as proposed by Thomas using concepts that are available in constraint programming (CP). Thomas\u2019 networks can be formalized, generalized and implemented using constraints. At the limit the proposed approach combines both aspects of simulation and reverse engineering. The ultimate goal of this work is to allow biologists to explore the combined effects of various types of hypotheses such as the assumed gene interactions and the expected dynamic behavior. We have developed a constraint program that utilizes the assumed hypotheses expressed as data. When the data is interpreted by a CP processor the proposed system is capable of responding to multiple queries that encompass simulation, reverse engineering and hybrid combination of the two. After a presentation of our approach, I will show you the constraint program in action with the following functionalities: combination of simulation and reverse-engineering, addition of hypotheses about the combination of interactions over the genes of the network, creation of mutants, relaxation of constraints in case of incoherence (the data having contradictory effects), and consequently suggestion of refinement of the model.\r\n\r\n<hr \/>\r\n\r\n<\/blockquote>\r\n<ul>\r\n \t<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-georgweibenbacher.ppt\"><strong>Why breaking other kids\u2019 toys (in time) is an achievement in computer science<\/strong><\/a>, Georg Wei\u00dfenbacher (ETH Zurich)<\/strong><\/li>\r\n<\/ul>\r\n<blockquote>Automated software verification is a superb challenge. Unfortunately, in the many years of research in this field, few actual products (if any) have been proven correct beyond doubt. We can, however, look back to a long history of spectacular successes in software falsification (think Ariane 5). The problem is that bugs are usually buried deep in the software and traditional testing techniques just don\u2019t dig deep enough. I will talk about an approach that accelerates the digging, allowing us to dig deeper for bugs and \"break the toy\" before somebody else breaks it unintentionally. I\u2019ll also explain how finding deep bugs in abstract software models can help verifying the actual software.\r\n\r\n<hr \/>\r\n\r\n<\/blockquote>\r\n<ul>\r\n \t<li><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-kaikohlhoff.ppt\"><strong>Computational prediction of three-dimensional protein structure from NMR chemical shifts<\/strong><\/a>, Kai Kohlhoff (University of Cambridge)<\/strong><\/li>\r\n<\/ul>\r\n<blockquote>Proteins are involved in virtually every biochemical reaction in a living cell. A protein\u2019s function is strongly dependent on its three-dimensional structure and there is a large interest in the pharmaceutical industry to understand the native structure of proteins in order to perform targeted drug design. Existing experimental techniques offer high spatial resolution, but tend to be costly and time-consuming. A novel method, CamShift-MD, will be presented that is based on relatively easy to perform chemical shift measurements from nuclear magnetic resonance spectroscopy. This method predicts protein structure by introducing restraints into molecular dynamics computer simulations. CamShift-MD offers a new way of automatically generating protein structures based on a combination of experiment and theory. It has the potential to solve structures for which traditional methods are not suitable, such as highly dynamical non-native states. Moreover, the method can be used to determine protein ensembles. Unlike a single, rigid structure, such ensembles reveal information about the distribution of conformations and dynamics of molecules in solution, providing us with a better picture of the behaviour of proteins in the cellular environment.<\/blockquote>\r\n[\/panel]\r\n\r\n[panel header=\"Wednesday, 9 July 2008\"]\r\n\r\n<strong>Giving a good presentation, Ken Shaw (Benchmark Communication Techniques)<\/strong>\r\n\r\nLecture, Presentation or Conversation? We will examine: Who your audience is; What they want; Why you are addressing them; How you handle practical issues like nerves, body language, speech &amp; voice, humour, visual aids etc.; What is success? What is plan B if everything goes wrong; How you recover.\r\n\r\n<hr \/>\r\n\r\n<strong>Mind-reading machines, Peter Robinson (University of Cambridge)<\/strong>\r\n\r\nFacial displays are an important channel for the expression of emotions, and are often thought of as projections of a person\u2019s mental state. Computer systems generally ignore this information. Mind-reading interfaces infer users\u2019 mental states from facial expressions, giving them a degree of emotional intelligence. We use video processing to track two dozen features on the user\u2019s face. These are then interpreted using statistical techniques through a hierarchy of analyses as basic actions, head and facial gestures, and finally groups of mental states. The talk will describe an implementation of facial affect inference, together with an evaluation and some preliminary results of using the system to monitor car drivers.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Thursday, 10 July 2008\"]\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-jacklang.ppt\"><strong>Rough guide to being an entrepreneur<\/strong><\/a>, Jack Lang (University of Cambridge)<\/strong>\r\n\r\nAt some stage you might want to exploit your ideas by starting a company, just as Bill Gates and Paul Allen did in 1975. It might even be the next Microsoft, or bought by them. I\u2019ll give an overview of the process, explain some of the success factors investors look for, and how to go about writing a business plan and getting off the ground.\r\n\r\n<hr \/>\r\n\r\n<strong>Grand challenges in computer science, Tony Hoare (Microsoft Research)<\/strong>\r\n\r\nOne way to do great research is to work with a great team, collaborating over an extended timescale, to find answers to fundamental questions that lie at the very basis of your branch of science. I will call such a project a Grand Challenge.\r\n\r\nGrand Challenges have long been common in Astronomy (the Hubble telescope) and in Physics (the large hadron collider), and more recently in Genetics (the enumeration of the human genome). Here are six Grand Challenges that have recently been singled out by UK computer scientists for the attention of the research community:\r\n<ul>\r\n \t<li>\u2018in vivo = in silico\u2019\u2013 multi-level simulation of the behaviour of biological organisms<\/li>\r\n \t<li>\u2018memories for life\u2019\u2013 rapid recall of a lifetime\u2019s memories<\/li>\r\n \t<li>\u2018architecture of the mind and brain\u2019\u2013 simulation of the relation between them<\/li>\r\n \t<li>\u2018non-classical computation\u2019\u2013 a search for a theory that covers the wide range of computing phenomena in nature<\/li>\r\n \t<li>\u2018ubiquitous computing\u2019\u2013 principles of engineering of the swarms of computers that surround us<\/li>\r\n \t<li>\u2018dependable systems evolution\u2019\u2013 programs that are proved correct by the computer before running them<\/li>\r\n<\/ul>\r\nCan you think of any more? I will talk in more detail about the last of these, which has been my own life-long research interest.\r\n\r\n<hr \/>\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-richardblack.ppsx\"><strong>How does the Internet work?<\/strong><\/a>, Richard Black (Microsoft Research)<\/strong>\r\n\r\nCould you explain how the Internet works in simple terms to someone else? Are there any gaps in your understanding, or questions you have? In this talk I\u2019ll be giving an introductory description to how it all works.\r\n\r\n<hr \/>\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-wouterspek.ppt\"><strong>How to apply for funding? In search of the holy grail<\/strong><\/a>, Wouter Spek (European Science Foundation)<\/strong>\r\n\r\nWouldn\u2019t it be nice to have unlimited sources of funding for your research? Wouldn\u2019t it be nice to have the freedom to operate? Wouldn\u2019t is be nice not to be bothered with constant applying and competing for financial sources? These are some of the topics we will discuss, we will talk about unmet needs and I will give you some pointers how to address the issue of finance and finance acquisition.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Friday, 11 July 2008\"]\r\n\r\n<strong>Take control or how to manage your supervisor, Tristram Hooley (vitae)<\/strong>\r\n\r\nThis session will look at how to make supervision work well for you. It will argue that to get the most out of your relationship with your supervisor you will need to be proactive and assertive. In particular the session will encourage you to think about the following issues:\r\n<ul>\r\n \t<li>The relative rights and responsibilities of the supervisor and supervisee<\/li>\r\n \t<li>What your supervisor cares about and how you can move up in their priorities<\/li>\r\n \t<li>Strategies that you can use to manage the supervision and make them more useful<\/li>\r\n \t<li>What to do if things go wrong<\/li>\r\n<\/ul>\r\n\r\n<hr \/>\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-dushyanthnarayanan.pptx\"><strong>Write off-loading: Practical power management for enterprise storage<\/strong><\/a>, Dushyanth Narayanan (Microsoft Research)<\/strong>\r\n\r\nIn enterprise data centres power usage is a problem impacting server density and the total cost of ownership. Storage uses a significant fraction of the power budget and there are no widely deployed power-saving solutions for enterprise storage systems. The traditional view is that enterprise workloads make spinning disks down ineffective because idle periods are too short. We analyzed block-level traces from 36 volumes in an enterprise data centre for one week and concluded that significant idle periods exist, and that they can be further increased by modifying the read\/write patterns using write off-loading. Write off-loading allows write requests on spun-down disks to be temporarily redirected to persistent storage elsewhere in the data centre. The key challenge is doing this transparently and efficiently at the block level, without sacrificing consistency or failure resilience. We describe our write off-loading design and implementation that achieves these goals. We evaluate it by replaying portions of our traces on a rack-based testbed. Results show that just spinning disks down when idle saves 28\u201336% of energy, and write off-loading further increases the savings to 45\u201360%.\r\n\r\n<hr \/>\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-stevehodges.pdf\"><strong>Surface computing: the post-PC experience<\/strong><\/a>, Steve Hodges (Microsoft Research)<\/strong>\r\n\r\nThe long-established \u2018desktop\u2019 computing metaphor continues to drive a lot of our interactions with computers, But at the same time, new interaction paradigms are being developed and we believe that these will increasingly complement the traditional computing experience. To this end, at Microsoft Research we are exploring a number of new interaction technologies along with the novel form factors, user experiences and usage scenarios they enable. This talk will present some of our work on \u2018surface computing\u2019, a new approach to interaction which doesn\u2019t required a keyboard or mouse for input, but which is inherently multi-user and which allows direct manipulation of digital content with hands, fingers and via tangible objects.\r\n\r\n<hr \/>\r\n\r\n<strong><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-klaus-peterzauner.pdf\"><strong>Enzymatic computing<\/strong><\/a>, Klaus Peter Zauner (University of Southampton)<\/strong>\r\n\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":2,"name":"Posters","content":"[accordion]\r\n\r\n[panel header=\"Posters Session 1\"]\r\n<ol>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alejandroarbelaez.pdf\">Adaptive combinatorial search<\/a>\u00a0-\u00a0Alejandro Arbelaez, INRIA<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alidapalmisano.pptx\">The cycle of modeling, modeling of the cycle <\/a>-\u00a0Alida Palmisano, CoSBi<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-alvarofialho.pdf\">Adaptive evolutionary computation <\/a>-\u00a0\u00c1lvaro Fialho, INRIA<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-amitabharoy.pptx\">Adaptive software lock elision<\/a>\u00a0-\u00a0Amitabha Roy, University of Cambridge<\/li>\r\n \t<li>Exact JPEG recompression and forensics using interval arithmetic -\u00a0Andrew Lewis, University of Cambridge<\/li>\r\n \t<li>Highly sensitive de novo identification of peptides from tandem mass spectra by linear optimization and kinetic modeling -\u00a0Axel Rack, Freie Universit\u00e4t Berlin<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bencalderhead.pdf\">Illuminating circadian rhythms with Bayesian inference<\/a>\u00a0-\u00a0Ben Calderhead, University of Glasgow<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bencepasztor.pdf\">Code reprogramming and dissemination in mobile WSN<\/a>\u00a0-\u00a0Bence Pasztor, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-bogdanciubotaru.pdf\">Quality-oriented handover scheme for adaptive multimedia streaming in heterogeneous wireless network environment<\/a> -\u00a0Bogdan Ciubotaru, Dublin College University<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ekaterinashutova.pdf\">Probabilistic interpretation of figures of speech<\/a>\u00a0-\u00a0Ekaterina Shutova, University of Cambridge<\/li>\r\n<\/ol>\r\n[\/panel]\r\n\r\n[panel header=\"Posters Session 2\"]\r\n<ol>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-christianrichardt.pdf\">Video abstraction and stylisation <\/a>-\u00a0Christian Richardt, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-danieleborsaro.pdf\">Time-aware routing in wireless sensor networks<\/a> -\u00a0Daniele Borsaro, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-davidmiller.pdf\">Towards optical PCI<\/a> -\u00a0David Miller, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-derekmurray.pdf\">Spread-spectrum computation<\/a> -\u00a0Derek Murray, University of Cambridge<\/li>\r\n \t<li>Proof engineering: Refactoring proof -\u00a0Eliot Setzer, University of Edinburgh<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-eugeniogiordano.ppt\">Vehicular ad hoc networks<\/a> -\u00a0Eugenio Giordano, University of Bologna<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-florianzuleger.pdf\">Automatic derivation of loop bounds<\/a> -\u00a0Florian Zuleger, Technical University Darmstadt<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-francoisgarillot-handout.pdf\">Mechanized foundations of finite group theory<\/a> -\u00a0Francois Garillot, INRIA<\/li>\r\n \t<li>New apparatus for characterising molecular computing substrates\u00a0-\u00a0Gareth Jones, University of Southampton<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ianleung-anilsorathia.pdf\">Contact network modeling of flu epidemics<\/a>-\u00a0Anilkumar Sorathiya &amp; Ian Leung, University of Cambridge<\/li>\r\n<\/ol>\r\n[\/panel]\r\n\r\n[panel header=\"Posters Session 3\"]\r\n<ol>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-chrislovell.pdf\">MSR India 2012 Summer School on Distributed Algorithms, Systems, and Programming<\/a>\u00a0-\u00a0Chris Lovell, University of Southampton<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-jonathanmak.pdf\">Dynamic dependency graphs \u2013 How much parallelism is out there?<\/a>\u00a0-\u00a0Jonathan Mak, University of Cambridge<\/li>\r\n \t<li>Pan-tropical modelling of the impact of land use change on water quantity provision and low flows -\u00a0Jorge Pe\u00f1a Arancibia, King\u2019s College London<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-julienquintard.pdf\">The Infinit file system<\/a>\u00a0-\u00a0Julien Quintard, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-laurelriek.pdf\">Designing robots for people<\/a>\u00a0-\u00a0Laurel Riek, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-mattridsdale.pdf\">Diagrammatic reasoning across multiple domains: The automatic construction of useful diagrams<\/a>\u00a0-\u00a0Matthew Ridsdale, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-micheleforlin.pdf\">Noise from in-silico biology: A statistical perspective<\/a>\u00a0-\u00a0Michele Forlin, CoSBi<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-nicktaylor.pdf\">Supporting village community through connected situated displays<\/a>\u00a0-\u00a0Nick Taylor, University of Lancaster<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-olgamorawczynski.pdf\">Examining the adoption and usage of m-banking applications in low-income communities: The case of M-PESA in Kenya<\/a> -\u00a0Olga Morawczynski, University of Edinburgh<\/li>\r\n<\/ol>\r\n[\/panel]\r\n\r\n[panel header=\"Posters Session 4\"]\r\n<ol>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-olivierteboul.pptx\">Shape grammar and image based 3D reconstruction of buildings<\/a>\u00a0-\u00a0Olivier Teboul, \u00c9cole Centrale Paris<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-pauldunphy.pdf\">The realities of graphical passwords<\/a>\u00a0-\u00a0Paul Dunphy, Newcastle University<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-philipphennig.pdf\">Learning the temperature of a game<\/a>\u00a0-\u00a0Philipp Hennig, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-richardrussell.pdf\">Automated planning with goal utility dependencies within a satisfiability framework<\/a>\u00a0-\u00a0Richard Russell, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-robertolarcher.pdf\">From BlenX to SBML<\/a>\u00a0-\u00a0Roberto Larcher, CoSBi<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-ruoshuiliu.ppt\">Deployment of wireless sensor networks<\/a>\u00a0-\u00a0Ruoshui Liu, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-sebastianfaust.ppt\">Provable security at implementation-level<\/a>\u00a0-\u00a0Sebastian Faust, Katholieke Universiteit Leuven<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-sherifakoush.pdf\">Renewable energy in data centres<\/a>\u00a0-\u00a0Sherif Akoush, University of Cambridge<\/li>\r\n \t<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/en-us-events-2008summerschool-simonyoussef.ppt\">Stochastic modelling of single cell assay data<\/a>\u00a0-\u00a0Simon Youssef, Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen<\/li>\r\n \t<li>Interactive visualization, annotation and processing of terabyte-scale 3D image volumes -\u00a0Tahir Mansoori, University of Oxford<\/li>\r\n \t<li>A robust video receiver allowing WIMAX video broadcasting and indoor WIFI retransmission -\u00a0Usman Ali, Sup\u00e9lec<\/li>\r\n<\/ol>\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":3,"name":"Discussion Themes","content":"This type of discussions was requested by the students who attended the 2006 Summer School and the students who attended the 2007 Summer School enjoyed them very much. The goal is to make the students think and discuss about a topic or issue of importance and get to know each other.\r\n\r\nEach group will be asked to share briefly to the other groups the outcome of their discussion.\r\n<h3>Ethics in scientific research<\/h3>\r\nDiscussion leader: Andrew Fitzgibbon (Microsoft Research)\r\n<h3>Scientific method in computing research<\/h3>\r\nDiscussion leader: Jon Crowcroft (University of Cambridge)\r\n<h3>Computer science education<\/h3>\r\nDiscussion leader: Kevin Bond (Aylesbury Grammar School, Cambridge)\r\n<h3>Impact of research<\/h3>\r\nDiscussion leader: Wolfgang Emmerich (University College London)\r\n<h3>Being a post-doc - Academia vs. industry<\/h3>\r\nDiscussion leader: Andrew Phillips (Microsoft Research)"}],"msr_startdate":"2008-07-07","msr_enddate":"2008-07-11","msr_event_time":"","msr_location":"Cambridge, England, U.K.","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"July 7, 2008","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":null,"event_excerpt":"The third Microsoft Research Summer School was held at Microsoft Research in Cambridge, U.K., on 7 July through 11 July 2008. It included a series of talks of academic interest and posters sessions that gave invited students the opportunity to present their work to Microsoft researchers and a number of Cambridge academics. The 2008 Summer School was organised in partnership with the Cambridge University Computer Laboratory. Invited students included all first year PhD students of&hellip;","msr_research_lab":[199561],"related-researchers":[],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/199613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":3,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/199613\/revisions"}],"predecessor-version":[{"id":1147462,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/199613\/revisions\/1147462"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=199613"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=199613"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=199613"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=199613"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=199613"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=199613"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=199613"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=199613"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=199613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}