Presentation Schedule
Paper | Presenter | |
10/12 | TCP ex Machina: Computer-Generated Congestion Control, Winstein/Balakrishnan, SIGCOMM13 | Yiting Mao |
Keyboard emanations revisited, Zhuang, Zhou, Tygar, CCS05 | Bolun Wang | |
10/14 | Partitioned Logistic Regression for Spam Filtering, Chang et al, KDD08 | Xinyi Zhang |
An Experimental Study of the Learnability of Congestion Control, Sivaraman et al, SIGCOMM14 | Shiliang Tang | |
10/19 | PTE: Predictive Text Embedding through Large-scale Heterogeneous Text Networks, Tang et al, KDD'15 | Sicong Feng |
In-Network PCA and Anomaly Detection, Huang et al, NIPS'07 | Angad Gill | |
10/21 | Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning, Mozafari et al, PVLDB'14 | Kevin Malta |
You are How You Click: Clickstream Analysis for Sybil Detection, Wang et al, UsenixSecurity 2013 | Pritha D. N. | |
10/26 | No class | |
10/28 | No class | |
11/2 | Traffic Prediction in a Bike-Sharing System, Li et al, SIGSPATIAL'15 | Sharath Rao |
Mining Anomalies Using Traffic Feature Distributions, Lakhina et al, SIGCOMM05 | Ana Nika | |
11/4 | Efficient Synthesis of Probabilistic Programs, Nori et al, PLDI 2015 | Debjani Banerjee |
ReBucket: A Method for Clustering Duplicate Crash Reports Based on Call Stack Similarity, Dang et al, ICSE'12 | Zhijing Li | |
11/6 | Communication-Efficient Online Detection of Network-Wide Anomalies, Huang et al, INFOCOM'07 | Tiawna Cayton |
Fingerprinting the Datacenter: Automated Classification of Performance Crises, Bodik et al, Eurosys'10 | Jordan Hughes | |
11/9 | Learning to Identify Regular Expressions that Describe Email Campaigns, Prasse et al, ICML'12 | Omid Askarisichani |
Poisoning Attacks against Support Vector Machines, Biggio et al, ICML'12 | Gang Wang | |
11/11 | No class | Veteran's Day |
11/16 | No papers (Midquarter project presentations) | |
11/18 | From Word Embeddings To Document Distances, Kusner et al, ICML'15 | Brandon Huynh |
Bayesian Watermark Attacks, Shterev et al, ICML'12 | Anastasiya Lazareva | |
11/23 | Detecting large-scale system problems by mining console logs, Xu et al, SOSP'09 | Yanzi Zhu |
Nonparametric Link Prediction in Dynamic Networks, Sarkar et al, ICML'12 | Qingyun Liu | |
11/25 | Finding Advertising Keywords on Web Pages, Yih/Goodman/Carvalho, WWW06 | Nimisha Srinivasa |
Adversarial Machine Learning, Huang et al, AISec'11 | Zenghui Yan | |
Learning for Control from Multiple Demonstrations, Coates et al, ICML'08 | Mas Oug | |
11/30 | Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers, Wang et al, Usenix Security'14 | Ankita Singh |
Sparse Real Estate Ranking with Online User Reviews and Offline Moving Behaviors, Fu et al, ICDM'14 | Sahaj Biyani | |
Narrowing the Gap: Random Forests In Theory and In Practice, | Olaoluwa Osuntokun | |
12/2 | Online Novelty Detection on Temporal Sequences, Ma et al, KDD'03 | Metehan Ozten |
Modeling Virtualized Applications using Machine Learning Techniques, Kundu et al, VEE'12 | Ravi Kumar Suresh Babu | |
Feature-Budgeted Random Forest, Nan et al, ICML 2015 | Oliver Townsend |