Subscribe to our YouTube channel!
Abstract:
Many phenomena in the real world can be phrased in terms of networks. Examples include the World-Wide Web, social interactions and Internet, but also the interaction patterns betwee...
A part of the 2016 Summer School held at Duke University
Presented by Aylin Yener
A part of the 2016 Summer School held at Duke University
Presented by: Krishna Narayanan
A part of the 2016 Summer School held at Duke University
Presented by: Natasha Devroye
A part of the 2016 Summer School hosted at Duke University
Presented by: Helmut...
Presented at the 2016 Summer School held at Duke University
Presented by: René Vidal
Computer controlled weather stations are useful in the production of crops in developing countries such as Cameroon. It is essential to build a computer controlled weather station because it will increase the mappi...
Stanford University's Andrea Goldsmith talks about the possible innovations and breakthroughs of a "wireless future" and the challenges that must be met i...
Abstract:
We describe a natural and general model of distributed storage. To ensure that a message stored in the system remains recoverable as nodes fail and are replaced with new nodes, a repairer continuall...
Christopher Sims, Harold H. Helm '20 Professor of Economics and Banking at Princeton University, discusses the application of information theory to economics.
Cancer therapeutics have seen many success stories over the past few decades. However while some forms of cancer respond very well to treatment, a sizeable majority of cancers are not that responsive, contributing ...
Presented as the innuagural Arden L. Bement Jr. Distinguished Lecture Professor and Center Director Wojciech Szpankowski, Saul Rosen Professor of Computer Science, outlines the work of the Center for Science of Inf...
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
As part of the 2015 Summer School: 8th Annual North American School of Information Theory NASIT
Presented at the North American School of Information Theory 2015
Presented at the North American School of Information Theory 2015
Abstract: In order to develop novel and more efficient therapeutic approaches we need to understand disease mechanisms, which in turn requires the collection and analysis of biologically-relevant information. Unfor...
Mark Daniel Ward - An Introduction to the Science of Information
Recorded on April 5, 2012 for the Wabash Area Lifetime Learning Association (WALLA...
Since their inception nearly three decades ago, cybernetic models have been used to analyze the dynamic control of metabolism based off of goals relevant to the organisms functioning. In the case of single cellular...
The most recent graduation data from the National Science Foundation (NSF) reports that in 2012 Computer Science fields had women earning 22% of the bachelor’s degrees awarded, Blacks at 10%, Latinos/Hispanic at ...
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Recorded August 7, 2014 as part of the 2014 CSoI Summer School - UCSD
Presented at the 2014 CSoI Summer Schoo...
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Presented at the 2014 CSoI Summer School
Mikhail Tikhonov's (Princeton University) interview regarding his poster presented at the 2013 North American School of Information The...
Recorded as part of the University of Illinois at Urbana-Champaign Science of Information Day, April 11th, 2014.
A talk about a developing center on computational genomics at UIUC, and advancements in genomics and interdisciplinary research.
Recorded as part of the
I will talk about compression when the goal is to concisely represent sequences in a way that allows to determine whether they are similar to a given query sequence. The problem arises in an increasing variety of c...
The functional organization of cortex area V4 in the mammalian ventral visual pathway is far from being well understood. V4 plays an important role in the recognition of shapes and objects and in visual attention, ...
Sequence census methods couple high-throughput DNA sequencing to biochemical assays and are transforming standard functional genomics assays into powerful
genome-wide probes of biochemical activity. At th...
I will describe some work that I have been involved with over the years that is focused on media delivery and media streaming. The presentation in particular overviews the RaptorQ (IETF RFC 6330) and MPEG-DASH (ISO...
Apart of the 2012 All Hands Meeting
Professor Koyuturk gave a tutorial on complex diseases and the application of information theory to better understand complexity in biological systems.
Presented at the
Beginning with Shannon's small 2-node network from 1948, Professor Effros' tutorial looks at the capacities and challenges of large networks. Information theory offers small network solutions for a large network wo...
Dr. Sojanin, a Bell Labs Research Scientist, gave the 2013 Padovani Lecture at the North American School of Information Theory on t...
Postdoctoral scholar Jonathan Ponniah continues part 2 of the talk on strategy of clean slate approach to wireless network security looking at details of the strategy and results. Professor PR Kumar gave
Professor Kumar gives part 1 talk on strategy of clean slate approach to wireless network security. In Part 1, Dr. Kumar covers the conceptual notions and overarching problems with wireless security. Kumar's studen...
Professor Aaronson provides a dynamic journey through the field of quantum mechanics and computing for information theorists.
Presented at the
Abram Magner's interview regarding his poster presented at the 2013 North American School of Information Theory.
Poster Co-...
Center for Science of Information presents as part of the Prestige Lect...
Presented at the 2012 NSF Site Visit and All Hands Meeting
Presented at the 2012 NSF Site Visit and All Hands Meeting
Presented at the 2012 NSF Site Visit and All Hands Meeting
Apart of the 2012 Science of Information Summer School
Presented at the 2012 Science of Information Summer School
Unfortunately, presentation slides are not available for this vi...
Presented as apart of the 2012 Science of Information Summer School
Presented as apart of the 2012 Science of Information Summer School
\"Electronic tattoos may sound like something invented for Star Trek, but Dr. Todd Coleman shows us they're real today. Coleman has developed band-aid like, wirelessly powered \"tattoo electronics,\" which can be u...
Functional magnetic resonance imaging (fMRI) detects the location of functions in the brain better than any other method we have today. While localization is necessary, it is not sufficient for understanding how th...
Interviews from Postdoctoral and PhD scholars involved with the Center for Science of Information, discussing the benefits of the Center and the challenges that they strive to identify and overcome through their in...
Pre-requisite: Calculus, Probability Theory Overview: This is an advanced module providing insight into understanding properties of outputs of samples from random variables. ...
Pre-requisite: Probability Theory and Mathematical Theory of Communication
Overview: This module provides the basic ideas behind compression of data and decoding messages. Th...
As part of the Prestige Lecture Series on Information
Associatio...
Recorded during the 2012 Science of Information Summer School
Presented as apart of the 2012 student research workshop.
Presented as apart of the 2012 student research workshop.
Part of 2012 Science of Information Summer School
Part of 2012 Science of Information Summer School
Part of 2012 Science of Information Summer School
Part of 2012 Science of Information Summer School
Part of 2012 Science of Information Summer School
Center for Science of Information Prestige Lecture Series presents
Lee Hood, President, Institute for Systems Biology
Systems Biology Approaches to Biology and Disease and the Emergence of Proact...
Recorded at the 2012 Information Theory and Applications Workshop (ITA 2012), San Diego, CA
Similar to the talk given January 2012
ITW 2011 - Paraty, Brazil
IEEE Information Theory Workshop
Panel
New Perspectives for Information Theory
Chair : Sergio Verdú
Speakers: Venkat Anantharam, Giuseppe Caire, Max...
Relying on examples from my own and other labs, I will discuss the challenges that modern biology faces today. Extraordinary technological advances in the field of biology impose an overwhelming pace of data productio...
In the first of the sequence of three lectures, I will provide a high level overview of biological processes and systems, and associated modeling techniques. In particular, I will describe sequence based modeling, seq...
Abstract: Many applications call for estimating probabilities of rare, even previously unseen, events. We outline the problem's theory, applications, and relation to works by Fisher, Shakespeare, L...
Every student of a basic algorithms course is taught that, on average, the complexity of Quicksort [or the path-length of a Binary Search Tree] is O(n log n), that of QuickSelect is O(n), and that of RadixSort is O...
This is the video of the Prestige Lecture Series presentation event.
Abstract:...
As we move towards cyberphysical systems, temporal considerations in information delivery will play an ever larger role. Timeliness of delivery of packets will be just as important as throughput or reliability. Acc...
Optimizing the growth rate of investment is considered a controversial investment goal, perhaps because it is an asymptotic criterion or perhaps because its implementation requires maximizing the expected logarithm...
Presented April 16th, 2007 as part of the Prestige Lecture Series
Presented February 12, 2007 as part of the Prestige Lecture Series
Presented on Feb. 26th, 2007 as part of the Prestige Lecture Series
The rise of quantum information science -- including quantum communication theory, quantum cryptography, and quantum computation -- has forced us to re-examine some of our basic ideas about information. In what sen...
Motivated by the intriguing functionality of gene regulatory networks we study chemical reactions (biological) circuits. We observe that those circuits are vastly different when compared to existing computing struc...
Andrea Goldsmith's plenary talk at ISIT 2014, IEEE International Symposium on Information Theory, June 29 - July 4 2014, Honolulu Convention Center, Honolulu, HI, USA.
Presented Oct. 2nd, 2006 as part of the Prestige Lecture Series
In the second of the three-part series of lectures, I will present algorithms for sequence analysis. I will start with a brief description of sequence alignment, multiple alignment, and motif-finding algorithms. I ...