### Video

Subscribe to our YouTube channel!

### Aylin Yener - Information-Theoretic Security

Posted: Wednesday, March 29, 2017A part of the 2016 Summer School held at Duke University Presented by Aylin Yener

### Krishna Narayanan - The Peeling Decoder: Theory and Applications

Posted: Wednesday, March 29, 2017A part of the 2016 Summer School held at Duke University Presented by: Krishna Narayanan

### Natasha Devroye - The Interference Channel

Posted: Wednesday, March 29, 2017A part of the 2016 Summer School held at Duke University Presented by: Natasha Devroye

### Helmut Bölcskei: Padovani Lecturer - The Mathematics of Deep Learning

Posted: Wednesday, March 29, 2017A part of the 2016 Summer School hosted at Duke University Presented by: Helmut...

### René Vidal - Global Optimality in Matrix and Tensor Factorization, Deep Learning, and Beyond

Posted: Wednesday, March 29, 2017Presented at the 2016 Summer School held at Duke University Presented by: René Vidal

### Alcine & Hornbuckle - Designing and Securing a Weather Station to Increase Crop Production in Cameroon

Posted: Wednesday, January 18, 2017Computer controlled weather stations are useful in the production of crops in developing countries such as Cameroon. It is essential to build a computer controlled weather station because it will increase the mappi...

### Sergio Verdú - Teaching IT

Posted: Monday, December 5, 2016### Andrea Goldsmith - Technology Hurdles and Killer Apps en Route to the Wireless Future

Posted: Monday, December 5, 2016### Andrea Goldsmith - The Road Ahead for Wireless Technology: Dreams and Challenges

Posted: Monday, December 5, 2016Stanford University's Andrea Goldsmith talks about the possible innovations and breakthroughs of a "wireless future" and the challenges that must be met i...

### Micheal Luby - A Mathematical Theory of Distributed Storage

Posted: Thursday, August 25, 2016Abstract: We describe a natural and general model of distributed storage. To ensure that a message stored in the system remains recoverable as nodes fail and are replaced with new nodes, a repairer continuall...

### Christopher Sims - Information Theory in Economics

Posted: Monday, June 13, 2016Christopher Sims, Harold H. Helm '20 Professor of Economics and Banking at Princeton University, discusses the application of information theory to economics.

### Mainak Chowdhury - The Intersection of Science of Information and Clinical Care for Cancer and Rare Diseases

Posted: Tuesday, March 1, 2016Cancer therapeutics have seen many success stories over the past few decades. However while some forms of cancer respond very well to treatment, a sizeable majority of cancers are not that responsive, contributing ...

### Wojciech Szpankowski - Shannon Information Theory and Beyond

Posted: Monday, November 9, 2015Presented as the innuagural Arden L. Bement Jr. Distinguished Lecture Professor and Center Director Wojciech Szpankowski, Saul Rosen Professor of Computer Science, outlines the work of the Center for Science of Inf...

### Paul Siegel - Constrained Codes for Multilevel Flash Memory

Posted: Thursday, October 1, 2015Presented at the North American School of Information Theory 2015

### Farooq Khan - Architecting Tb/s Wireless

Posted: Tuesday, September 1, 2015Presented at the North American School of Information Theory 2015

### Information Theory: Academic and Industry Perspectives Panel Discussion

Posted: Tuesday, September 1, 2015Presented at the North American School of Information Theory 2015

### Urbashi Mitra - Biological Communication Channels: Engineered and Natural

Posted: Tuesday, September 1, 2015Presented at the North American School of Information Theory 2015

### Venkatesan Guruswami - List and Local Error-Correction

Posted: Tuesday, September 1, 2015Presented at the North American School of Information Theory 2015

### Todd Coleman - Mentoring and Success Panel Discussion

Posted: Friday, August 28, 2015Presented at the North American School of Information Theory 2015

### Ivana Maric - Information Theoretic Concepts of 5G

Posted: Friday, August 28, 2015Presented at the North American School of Information Theory 2015

### Tom Marzetta - Massive MIMO and Beyond

Posted: Friday, August 28, 2015Presented at the North American School of Information Theory 2015

### Diego Mesa - Introduction to Scientific Computing with IPython

Posted: Friday, August 28, 2015As part of the 2015 Summer School: 8th Annual North American School of Information Theory NASIT

### Stephen Boyd - Convex Optimization and Applications

Posted: Friday, August 28, 2015Presented at the North American School of Information Theory 2015

### Kayal Madhivanan and Swetha Ramadesikan - Quantitative Analysis of Biological Data

Posted: Wednesday, May 27, 2015Abstract: In order to develop novel and more efficient therapeutic approaches we need to understand disease mechanisms, which in turn requires the collection and analysis of biologically-relevant information. Unfor...

### Mark Daniel Ward - An Introduction to the Science of Information

Posted: Monday, May 4, 2015Mark Daniel Ward - An Introduction to the Science of Information Recorded on April 5, 2012 for the Wabash Area Lifetime Learning Association (WALLA...

### Extracting Complex Trends in Gene Expression from Metabolite Data - A Cybernetic Approach

Posted: Wednesday, March 11, 2015Since their inception nearly three decades ago, cybernetic models have been used to analyze the dynamic control of metabolism based off of goals relevant to the organisms functioning. In the case of single cellular or...

### Corey Schimpf - Women and Minorities in the Computing Fields: Precollege and College Years

Posted: Wednesday, March 11, 2015The most recent graduation data from the National Science Foundation (NSF) reports that in 2012 Computer Science fields had women earning 22% of the bachelor’s degrees awarded, Blacks at 10%, Latinos/Hispanic at ...

### Pulkit Grover - Analyzing Info-flows in Engineered and Neuronal Circuits using "Energetic Information Theory"

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Tamara Berdyyeva – Neural Mechanisms & Analysis of Normal and Abnormal Behavior

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Ananth Grama – Computational Biology and Information

Posted: Thursday, October 16, 2014Recorded August 7, 2014 as part of the 2014 CSoI Summer School - UCSD Presented at the 2014 CSoI Summer Schoo...

### Ayse Saygin – Cognitive Neuroscience

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Tatyana Sharpee - Information-Theoretic Principles in Learning and Decision Making

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Takaki Komiyama – Imaging Neural Ensembles During Learning

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Todd Coleman - Information and Neuroscience

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### David Kleinfield – The Nature and Control of Blood Flow Through the Cortex

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Robert Gray - Half Century Hindsights

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Zhiying Wang - Coding for Information Storage

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Shankar Subramaniam – Systems Biology & Bioinformatics

Posted: Thursday, October 16, 2014Presented at the 2014 CSoI Summer School

### Mikhail Tikhonov- Genetic Network Complexity: Weights Matter more than Topology

Posted: Tuesday, June 24, 2014Mikhail Tikhonov's (Princeton University) interview regarding his poster presented at the 2013 North American School of Information The...

### Wen-mei W. Hwu - Application of Accelerators and Parallel Computing to Sequencing Data

Posted: Friday, June 13, 2014Recorded as part of the University of Illinois at Urbana-Champaign Science of Information Day, April 11th, 2014.

### Sergio Verdú - (Re)Reading Shannon

Posted: Friday, June 13, 2014Recorded during the 2012 Science of Information Summer School Stanford University May 30th, 20...

### Steve Lumetta - Center on Computational Genomics

Posted: Friday, June 13, 2014A talk about a developing center on computational genomics at UIUC, and advancements in genomics and interdisciplinary research. Recorded as part of the

### Tsachy Weissman - Compression for Similarity Queries

Posted: Thursday, January 9, 2014I will talk about compression when the goal is to concisely represent sequences in a way that allows to determine whether they are similar to a given query sequence. The problem arises in an increasing variety of c...

### Bin Yu - Modeling Visual cortex V4 in Naturalistic Conditions

Posted: Thursday, January 9, 2014The functional organization of cortex area V4 in the mammalian ventral visual pathway is far from being well understood. V4 plays an important role in the recognition of shapes and objects and in visual attention, ...

### Micheal Luby - Media Delivery: A Personal Perspective

Posted: Thursday, January 9, 2014I will describe some work that I have been involved with over the years that is focused on media delivery and media streaming. The presentation in particular overviews the RaptorQ (IETF RFC 6330) and MPEG-DASH (ISO...

### Lior Pacher - Sequencing Based Functional Genome

Posted: Thursday, January 9, 2014Sequence census methods couple high-throughput DNA sequencing to biochemical assays and are transforming standard functional genomics assays into powerful genome-wide probes of biochemical activity. At th...

### Graph Inference and Compression via Random Walks - Courtade

Posted: Monday, September 23, 2013Apart of the 2012 All Hands Meeting

### Frank DeVilbiss - Investigation on Metabolic Phenomena Using Information Theory

Posted: Monday, September 23, 2013### Thomas Courtade - A Fresh Look at Boolean Functions

Posted: Monday, September 23, 2013### Rui Ma - Information Theory and Neuroscience

Posted: Friday, September 20, 2013### center video STC 2013 conference

Posted: Monday, August 19, 2013### Pre-requisities for online course

Posted: Thursday, July 18, 2013### Probability Theory - Overview

Posted: Thursday, July 18, 2013### Encryption - Overview

Posted: Thursday, July 18, 2013### Broad Overview

Posted: Thursday, July 18, 2013### Entropy and Data Compression - Overview

Posted: Thursday, July 18, 2013### Main books referenced

Posted: Thursday, July 18, 2013### Asymptotic Equipartition Property - Overview

Posted: Thursday, July 18, 2013### Mathematical Theory of Communication - Overview

Posted: Thursday, July 18, 2013### Mehmet Koyuturk - Complex Diseases and Information Theory

Posted: Thursday, July 11, 2013Professor Koyuturk gave a tutorial on complex diseases and the application of information theory to better understand complexity in biological systems. Presented at the

### Michelle Effros - Information Theory for Large Networks

Posted: Thursday, July 11, 2013Beginning with Shannon's small 2-node network from 1948, Professor Effros' tutorial looks at the capacities and challenges of large networks. Information theory offers small network solutions for a large network wo...

### Emina Soljanin - Padovani Lecture - The Secret Lives of Codes: From Theory to Practice and Back

Posted: Thursday, July 11, 2013Dr. Sojanin, a Bell Labs Research Scientist, gave the 2013 Padovani Lecture at the North American School of Information Theory on t...

### Scott Aaronson - Quantum Computing and Information

Posted: Thursday, July 11, 2013Professor Aaronson provides a dynamic journey through the field of quantum mechanics and computing for information theorists. Presented at the

### Jonathan Ponniah - A Clean Slate Approach to Security of Wireless Networks Part 2

Posted: Thursday, July 11, 2013Postdoctoral scholar Jonathan Ponniah continues part 2 of the talk on strategy of clean slate approach to wireless network security looking at details of the strategy and results. Professor PR Kumar gave

### P.R. Kumar - A Clean Slate Approach to Security of Wireless Networks Part 1

Posted: Thursday, July 11, 2013Professor Kumar gives part 1 talk on strategy of clean slate approach to wireless network security. In Part 1, Dr. Kumar covers the conceptual notions and overarching problems with wireless security. Kumar's studen...

### Abram Magner- Investigating Symmetries of Uniform Attachment Graphs

Posted: Monday, June 24, 2013Abram Magner's interview regarding his poster presented at the 2013 North American School of Information Theory. Poster Co-...

### Deck of Cards Example

Posted: Saturday, June 1, 2013### Shannon's First Theorem Part 1

Posted: Thursday, May 30, 2013### Calculating Entropy Practice Problem

Posted: Tuesday, May 28, 2013### Calculating Entropy & Average Code Length Practice Problems

Posted: Friday, May 24, 2013### Information Channels Part 4, Conditional & Joint Entropies

Posted: Friday, May 24, 2013### Information Channels Part 5, Joint Entropy & Mutual Information

Posted: Friday, May 24, 2013### Information Channels Part 8, Asymmetric Channels

Posted: Friday, May 24, 2013### Information Channels Part 1, Binary Symmetric Channels

Posted: Friday, May 24, 2013### Information Channels Part 2, Binary Symmetric Channels

Posted: Friday, May 24, 2013### Information Channels Part 3, Binary Symmetric Channel Example Problems

Posted: Friday, May 24, 2013### Information Channels Part 7, Mutual Information

Posted: Friday, May 24, 2013### Information Channels Part 6, Mutual Information

Posted: Friday, May 24, 2013### Substitution Ciphers Part 1

Posted: Thursday, May 23, 2013### The RSA Algorithm Under the Hood Part 4

Posted: Thursday, May 23, 2013### Playfair Cipher 1 Part 3

Posted: Thursday, May 23, 2013### Universal Coding

Posted: Thursday, May 23, 2013### Strengthening Vigenere Ciphers Part 4

Posted: Thursday, May 23, 2013### Public Key Cryptography Part 2, Discrete Logarithms and DiffieHellman Key Exchange

Posted: Thursday, May 23, 2013### Public Key Cryptography Part 1, OneWay Functions and Discrete Logarithms

Posted: Thursday, May 23, 2013### The RSA Algorithm Under the Hood Part 3, Greatest Common Divisor and Fermat's Little Theorem

Posted: Thursday, May 23, 2013### The RSA Algorithm Under the Hood Part 2, Prime Numbers, Euclidean Algorithm, & Greatest Common Divis

Posted: Thursday, May 23, 2013### Vigenere Ciphers Part 2

Posted: Thursday, May 23, 2013### The RSA Algorithm Under the Hood Part 1, Prime Numbers, Euclidean Algorithm, & Greatest Common Divis

Posted: Thursday, May 23, 2013### Cryptography Theory and Entropy Part 1

Posted: Thursday, May 23, 2013### The RSA Algorithm Under the Hood Part 6

Posted: Thursday, May 23, 2013### Cryptography Theory and Entropy Part 3

Posted: Thursday, May 23, 2013### LempelZiv Coding Part 2

Posted: Thursday, May 23, 2013### Cryptography Theory and Entropy Part 2

Posted: Thursday, May 23, 2013### LempelZiv Coding Part 1

Posted: Thursday, May 23, 2013### The RSA Algorithm Under the Hood Part 5

Posted: Thursday, May 23, 2013### Huffman coding Part 2

Posted: Wednesday, May 22, 2013### Huffman Coding Part 3

Posted: Wednesday, May 22, 2013### Huffman Coding Part 1

Posted: Wednesday, May 22, 2013### Shannon's First Theorem Part 3

Posted: Wednesday, May 22, 2013### The Kraft Inequality and Code Length Part 1

Posted: Wednesday, May 22, 2013### Shannons First Theorem Part 2

Posted: Wednesday, May 22, 2013### Bits as a measure Part 3

Posted: Wednesday, May 22, 2013### Bits as a Measure Part 2

Posted: Wednesday, May 22, 2013### Bits as a Measure Part 1

Posted: Wednesday, May 22, 2013### Nancy Lynch - Distributed Computing Theory for Wireless Networks and Mobile Systems

Posted: Monday, April 8, 2013Center for Science of Information presents as part of the Prestige Lect...

### Tom Courtade - A Fresh Look at Boolean Functions

Posted: Wednesday, March 13, 2013Presented at the 2012 NSF Site Visit and All Hands Meeting

### Tom Courtade - Graph Inference/Compression via Random Walks

Posted: Wednesday, March 13, 2013Presented at the 2012 NSF Site Visit and All Hands Meeting

### Frank DeVilbiss - Investigation on Metabolic Phenomena Using Information Theory

Posted: Monday, March 11, 2013Presented at the 2012 NSF Site Visit and All Hands Meeting

### Sheila Rosenburg Spotlight

Posted: Tuesday, February 12, 2013Apart of the 2012 Science of Information Summer School

### Hands-on Biozon Project

Posted: Tuesday, February 5, 2013Presented at the 2012 Science of Information Summer School Unfortunately, presentation slides are not available for this vi...

### Biology for Engineers Part 2 of 2

Posted: Tuesday, February 5, 2013Presented as apart of the 2012 Science of Information Summer School

### Biology for Engineers Part 1 of 2

Posted: Tuesday, February 5, 2013Presented as apart of the 2012 Science of Information Summer School

### TEDxTalk: Where Will the Chips of Tomorrow Take Us?

Posted: Wednesday, January 23, 2013\"Electronic tattoos may sound like something invented for Star Trek, but Dr. Todd Coleman shows us they're real today. Coleman has developed band-aid like, wirelessly powered \"tattoo electronics,\" which can be u...

### Probability Theory Part 2 Probability Defined

Posted: Thursday, December 6, 2012### Probability Theory Part 1 Events and Outcomes

Posted: Thursday, December 6, 2012### Probability Theory Part 4 Independent Events & Disjointness

Posted: Thursday, December 6, 2012### Probability Theory Part 3 Sample Space & Outcomes Examples

Posted: Thursday, December 6, 2012### honr399 25 111024

Posted: Thursday, November 29, 2012### honr399 24 111021

Posted: Thursday, November 29, 2012### CSoI Faculty member Jack Gallant Speaking at 2012 Allen Institute for Brain Science Symposium

Posted: Wednesday, November 28, 2012Functional magnetic resonance imaging (fMRI) detects the location of functions in the brain better than any other method we have today. While localization is necessary, it is not sufficient for understanding how th...

### Mathematical Theory of Communication Part 6 - Channels

Posted: Monday, November 26, 2012### Probability Theory Part 20 - Biased coin

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 5 - Kraft Inequality

Posted: Monday, November 26, 2012### Probability Theory Part 18 - Intro to Entropy

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 4 - Shannon's 1st Theorem

Posted: Monday, November 26, 2012### Probability Theory Part 17 - Roulette and Expected Value of a Function of a Random Variable

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 2 - Entropy with Variance

Posted: Monday, November 26, 2012### Probability Theory Part 16 - Dice Example

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 3 - Huffman Coding

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 1 - Coding

Posted: Monday, November 26, 2012### Probability Theory Part 15 - Expected Value of Random Variables

Posted: Monday, November 26, 2012### Lempel Ziv 77 Part 2 - C++ Program

Posted: Monday, November 26, 2012### Lempel Ziv 77 Part 1

Posted: Monday, November 26, 2012### C++ Program - Application

Posted: Monday, November 26, 2012### AEP Part 2

Posted: Monday, November 26, 2012### Postdoctoral scholars and student interviews - Center for Science of Information

Posted: Monday, November 26, 2012Interviews from Postdoctoral and PhD scholars involved with the Center for Science of Information, discussing the benefits of the Center and the challenges that they strive to identify and overcome through their in...

### Mathematical Theory of Communication Part 9 - Information Theory Textbooks

Posted: Monday, November 26, 2012### AEP Part 1

Posted: Monday, November 26, 2012### Probability Theory Part 19 - Entropy of a Random Variable

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 8 - Mutual Information

Posted: Monday, November 26, 2012### Probability Theory Part 24 - Random Variables

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 7B - Conditional and Joint Entropy Part 2

Posted: Monday, November 26, 2012### Probability Theory Part 22 - Random Word Example

Posted: Monday, November 26, 2012### Mathematical Theory of Communication Part 7A - Conditional and Joint Entropy Part 1

Posted: Monday, November 26, 2012### Probability Theory Part 23 - Discrete Value of Random Variables

Posted: Monday, November 26, 2012### honr399 23 111019

Posted: Tuesday, November 20, 2012### honr399 22 111017

Posted: Tuesday, November 20, 2012### honr399 13 110926

Posted: Thursday, November 15, 2012### Probability Theory Part 14 - Conditional Mass

Posted: Thursday, November 15, 2012### honr399 11 110921

Posted: Thursday, November 15, 2012### honr399 9 110916

Posted: Thursday, November 15, 2012### honr399 21 111014

Posted: Thursday, November 15, 2012### honr399 20 111012

Posted: Thursday, November 15, 2012### honr399 14 110928

Posted: Thursday, November 15, 2012### honr399 16 111003

Posted: Thursday, November 15, 2012### honr399 12 110923

Posted: Thursday, November 15, 2012### honr399 15 110930

Posted: Thursday, November 15, 2012### honr399 10 110919

Posted: Thursday, November 15, 2012### Asymptotic Equipartition Property Module

Posted: Monday, November 12, 2012Pre-requisite: Calculus, Probability Theory Overview: This is an advanced module providing insight into understanding properties of outputs of samples from random variables. ...

### Data Compression Module

Posted: Monday, November 12, 2012Pre-requisite: Probability Theory and Mathematical Theory of Communication Overview: This module provides the basic ideas behind compression of data and decoding messages. Th...

### Tomasz Imielinski - Association Rules: Twenty Years and Beyond

Posted: Monday, October 22, 2012As part of the Prestige Lecture Series on Information Associatio...

### Probability Theory Part 13 - Random Variable Independence

Posted: Thursday, October 18, 2012### Probability Theory Part 12 - Joint Cumulative Distribution Function

Posted: Thursday, October 18, 2012### Problem set Probability Theory Basic Notions Module

Posted: Thursday, October 18, 2012### honr399 8 110909

Posted: Thursday, October 18, 2012### Probability Theory Part 8 - Baye's Theorem

Posted: Thursday, October 18, 2012### Probability Theory Part 11 - Cumulative Distribution Function

Posted: Thursday, October 18, 2012### Probability Theory Part 7 - Independence

Posted: Thursday, October 18, 2012### Probability Theory Part 10 - Probability Mass Function

Posted: Thursday, October 18, 2012### Probability Theory Part 6 - Conditional Probability

Posted: Thursday, October 18, 2012### Probability Theory Part 9B - Random Variables 2

Posted: Thursday, October 18, 2012### Probability Theory Part 9A - Random Variables

Posted: Thursday, October 18, 2012### Rui Ma Spotlight

Posted: Wednesday, October 10, 2012### Probability Theory Part 5B

Posted: Monday, September 10, 2012### Probability Theory Part 4

Posted: Monday, September 10, 2012### Probability Theory Part 5A

Posted: Monday, September 10, 2012### summer workshop interviews

Posted: Friday, August 24, 2012Recorded during the 2012 Science of Information Summer School

### Thomas Courtade - Lossy Compression for BigData: A First Step

Posted: Wednesday, August 15, 2012### Probability Theory Part 3

Posted: Monday, August 6, 2012### Probability Theory Part 1

Posted: Monday, August 6, 2012### Probability Theory Part 2

Posted: Monday, August 6, 2012### 2012 Student Research Workshop Intros

Posted: Saturday, June 30, 2012Presented as apart of the 2012 student research workshop.

### 2012 Student Research Workshop Student & Post-Doc Outros

Posted: Saturday, June 30, 2012Presented as apart of the 2012 student research workshop.

### Quantum Shannon Theory

Posted: Friday, June 1, 2012Part of 2012 Science of Information Summer School

### Sparse Problems in Bioinformatics

Posted: Thursday, May 31, 2012Part of 2012 Science of Information Summer School

### Interactive Information Theory and Its Use in Brain-Machine Interfaces

Posted: Thursday, May 31, 2012Part of 2012 Science of Information Summer School

### (Re)reading Shannon

Posted: Wednesday, May 30, 2012Part of 2012 Science of Information Summer School

### Information Theory: From Communications to DNA Sampling

Posted: Wednesday, May 30, 2012Part of 2012 Science of Information Summer School

### Reliable Communication Amid Uncertainty

Posted: Wednesday, May 30, 2012Part of 2012 Science of Information Summer School

### Backing Off From Infinity

Posted: Wednesday, May 30, 2012Part of 2012 Science of Information Summer School

### Lee Hood - System Approaches to Biology and Medicine and the emergence of proactive P4 medicine

Posted: Thursday, April 19, 2012Center for Science of Information Prestige Lecture Series presents Lee Hood, President, Institute for Systems Biology Systems Biology Approaches to Biology and Disease and the Emergence of Proact...

### Marcelo Weinberger - Information Theory in an Industrial Lab

Posted: Friday, March 30, 2012Recorded at the 2012 Information Theory and Applications Workshop (ITA 2012), San Diego, CA

### HONR399 Class 7: Luenberger Ch. 1 honr399-7-110907.mp4

Posted: Thursday, March 29, 2012### HONR399 Class 6: Floridi Ch. 7 honr399-6-110902.mp4

Posted: Wednesday, March 28, 2012### HONR399 Week 2 Class 1: Google and Learning honr399-4-110829.mp4

Posted: Tuesday, March 27, 2012### HONR399 Class 5: Discussion of Floridi, Ch. 6 honr399-5-110831.mp4

Posted: Tuesday, March 27, 2012### honr399-3-110826.mp4

Posted: Tuesday, March 27, 2012### HONR 399 Monday August 22, 2011 1-110822

Posted: Friday, March 23, 2012### HONR 399 Week 1 Class 2 110824

Posted: Friday, March 23, 2012### Introduction to the Center for Science of Information

Posted: Monday, February 13, 2012### Joachim Buhmann - Context Sensitive Information: Model Validation by Information Theory

Posted: Tuesday, February 7, 2012Similar to the talk given January 2012

### Dr. Claudio Aguilar, Science of Information and Cell Biology

Posted: Friday, December 16, 2011### csoi-year-in-review-2011.mp4

Posted: Tuesday, November 29, 2011### HONR399 Class 31: RSA Example

Posted: Wednesday, November 9, 2011### HONR399 Class 30: RSA Algorithm

Posted: Tuesday, November 8, 2011### Panel: New Perspectives for Information Theory

Posted: Wednesday, November 2, 2011ITW 2011 - Paraty, Brazil IEEE Information Theory Workshop Panel New Perspectives for Information Theory Chair : Sergio Verdú Speakers: Venkat Anantharam, Giuseppe Caire, Max...

### HONR399 Class 29: Prime Numbers, Euclidean Algorithm, Greatest Common Divisor

Posted: Wednesday, November 2, 2011### HONR399 Class 28: Special Guest Luciano Floridi

Posted: Tuesday, November 1, 2011### HONR399 Class 27: Diffie-Hellman Algorithm, Maple

Posted: Sunday, October 30, 2011### HONR399 Class 26: Encryption, Public Keys, Modulus Operator

Posted: Wednesday, October 26, 2011### Student Spotlight: Bridging Electrical Engineering and Neuroscience

Posted: Tuesday, October 25, 2011### HONR399 Class 6: Floridi Ch. 7 (1 of 3)

Posted: Friday, September 2, 2011### HONR399 Class 6: Floridi Ch. 7 (3 of 3)

Posted: Friday, September 2, 2011### HONR399 Class 6: Floridi Ch. 7 (2 of 3)

Posted: Friday, September 2, 2011### Reading Shannon, Part II, by Sergio Verdu at the IEEE Information Theory Society 2010 School of IT, Part II

Posted: Sunday, July 31, 2011Windows Movie Video (WMV) shot at the IEEE Information Theory Society 2010 School of IT - Part II

### Sergio Verdú - Reading Shannon (Part 1)

Posted: Friday, July 29, 2011Recorded at the IEEE Information Theory Society 2010 School of IT. Note: following the link downloads the movie file.

### Challenges in the Biology Front or How the Theory of Information Can Save Lives

Posted: Monday, July 25, 2011Relying on examples from my own and other labs, I will discuss the challenges that modern biology faces today. Extraordinary technological advances in the field of biology impose an overwhelming pace of data productio...

### Bioinformatics Series

Posted: Tuesday, July 12, 2011In the first of the sequence of three lectures, I will provide a high level overview of biological processes and systems, and associated modeling techniques. In particular, I will describe sequence based modeling, seq...

### Alon Orlitsky - Foreseeing the Unseen: Probability Estimation over Large Alphabets

Posted: Monday, April 19, 2010Abstract: Many applications call for estimating probabilities of rare, even previously unseen, events. We outline the problem's theory, applications, and relation to works by Fisher, Shakespeare, L...

### Brigitte Vallee - Information Theory: Models, Algorithms, Analysis

Posted: Monday, April 12, 2010Every student of a basic algorithms course is taught that, on average, the complexity of Quicksort [or the path-length of a Binary Search Tree] is O(n log n), that of QuickSelect is O(n), and that of RadixSort is O...

### Natasha Devroye - Fundamental Limits of Cognitive Networks

Posted: Monday, February 22, 2010This is the video of the Prestige Lecture Series presentation event. Abstract:...

### PR Kumar - Temporal Guarantees Over Wireless Networks

Posted: Monday, February 2, 2009As we move towards cyberphysical systems, temporal considerations in information delivery will play an ever larger role. Timeliness of delivery of packets will be just as important as throughput or reliability. Acc...

### Madhu Sudan - Towards Universal Semantic Communication

Posted: Monday, April 16, 2007Presented April 16th, 2007 as part of the Prestige Lecture Series

### Nicholas Yannelis - Contracts Under Asymmetric Information

Posted: Monday, February 12, 2007Presented February 12, 2007 as part of the Prestige Lecture Series

### Andrew Barron - The Interplay of Information Theory, Probability and Statistics

Posted: Wednesday, February 7, 2007Presented on Feb. 26th, 2007 as part of the Prestige Lecture Series

### Ben Schumacher - What is Information? Insights from Quantum Physics

Posted: Monday, November 13, 2006The rise of quantum information science -- including quantum communication theory, quantum cryptography, and quantum computation -- has forced us to re-examine some of our basic ideas about information. In what sen...

### Jehoshua Bruck - The Logic of Biological Networks

Posted: Monday, October 30, 2006Motivated by the intriguing functionality of gene regulatory networks we study chemical reactions (biological) circuits. We observe that those circuits are vastly different when compared to existing computing struc...

### Andrea Goldsmith - To Infinity and Beyond: New Frontiers in Wireless Information Theory

Posted: Wednesday, December 31, 1969Andrea Goldsmith's plenary talk at ISIT 2014, IEEE International Symposium on Information Theory, June 29 - July 4 2014, Honolulu Convention Center, Honolulu, HI, USA.

### Ananth Grama - Algorithms for Sequence Analysis

Posted:In the second of the three-part series of lectures, I will present algorithms for sequence analysis. I will start with a brief description of sequence alignment, multiple alignment, and motif-finding algorithms. I wil...

### Sergio Verdu - Information Theory Today

Posted:Presented Oct. 2nd, 2006 as part of the Prestige Lecture Series