
Unlocking big genetic data sets
Study coauthored by David Blei and published in Nature Genetics describes using TeraStructure, an algorithm capable of analyzing up to 1 million genomes, to infer ancestral makeup of 10,000 individuals.
Study coauthored by David Blei and published in Nature Genetics describes using TeraStructure, an algorithm capable of analyzing up to 1 million genomes, to infer ancestral makeup of 10,000 individuals.
Floraform, a design system from Nervous System, simulates differentially growing elastic surfaces to craft unique 3D-printed jewelry.
They will build a system to detect outages by monitoring flow of out-of-band data (Twitter feeds, communications networks) so outages can be detected even if grid monitoring system is disabled.
The site, which harnesses donated genetic test results for scientific research, has new features and is already working with the National Breast Cancer Coalition.
In podcast, Stolfo discusses current and future uses of artificial intelligence to detect security intrusions.
Paper by David Blei, Allison J. B. Chaney, Hanna Wallach, and Matthew Connelly describes using a Bayesian modeling technique to characterize and isolate significant events in 2M US diplomatic cables from the 1970s.
Paper led by Yaniv Erlich describes storing 2.1Mbytes in synthetic DNA molecules, copying data multiple times using biochemical reactions info, later retrieving info without a single error.
For the lasting impact of contributions in furthering the theory or development of secure systems, Steven M. Bellovin has been … Continue reading Steven Bellovin is this year’s recipient of the ESORICS Outstanding Research Award
Second prize is for combating VR sickness by subtly modifying the field of view, and an honorable mention is for a technique to show wearers of head-worn displays how to rotate a 3D object.
“Turn-taking cues in task-oriented dialogue” is named by International Speech and Communications Association as best paper published in Computer Speech and Language, 2011–2015.
Computing in Context has added a new track for the School of International and Public Affairs (SIPA) to teach computational … Continue reading Computing in Context, a computer science course for liberal arts majors, expands with new SIPA track
He previously de-anonymized participants in a large genomic study by cross-referencing their donated genetic information to DNA information in publicly available databases.
In the segment Is Privacy Dead, beginning at 26:00, Erlich demonstrates security gaps in maintaining genetic anonymity.
In huge data sets, it is impossible to clean everything. ActiveClean analyzes prediction models and prioritizes mistakes by how much they hurt the model.
Topics covered wide range of technical, ethical, and privacy implications of people having access to their DNA information.