Beyond Jeopardy! Adapting Watson to New Domains Using Distributional Semantics

Thursday, November 29, 2012

Last year, a question-answering system built at IBM, named Watson, won the game show Jeopardy! The system combines a large database of knowledge with natural language processing abilities. IBM researchers are now investigating how to use Watson in specialized domains, including health care. On November 9, Alfio Gliozzo, a member of the research staff at the IBM T.J. Watson Research Center, gave a talk at ICSI about the future of Watson. We have now made the slides available.

Internet Privacy Misunderstandings, Part 2

Friday, November 23, 2012

This is the second in a series of blog posts debunking some common misunderstandings about online privacy. The images used in these posts have been adapted from a tutorial given by Gerald Friedland at ACM Multimedia in Nara, Japan in October.

internet privacy misunderstanding 2

Many people assume that their online communication is private. While one-to-one communication online may be intended as private, if it is not encrypted, it is not private. Whenever information is sent online, there is the possibility that someone other than the intended recipient can view it. Encryption helps prevent the information from being seen by a third party, so sensitive information (such as emails, chat, or video calls containing information that you want to keep between you and the recipient) should always be encrypted.

Finnish Visitor Kalle Palomaeki Joins Speech Group

Monday, November 19, 2012

Kalle Palomaeki, a visitor in ICSI's Speech GroupKalle Palomäki recently joined ICSI's Speech Group. He is here on ICSI's Finnish visiting program, which is funded by the Finnish Funding Agency for Technology and Innovation through Aalto University and the Helsinki Institute for Information Technology.

Internet Privacy Misunderstandings, Part 1

Friday, November 16, 2012

Internet privacy misunderstanding 1This is the first in a series of blog posts debunking some common misunderstandings about online privacy. The images used in these posts have been adapted from a tutorial given by Gerald Friedland at ACM Multimedia in Nara, Japan in October.

Greedy Pursuits Algorithms for Representing Audio Signals, with Applications to Compression, Source Separation, and Audio Fingerprint

Thursday, November 15, 2012

Slides about research on audio processingOn October 25, Gaël Richard, a professor at Télécom ParisTech, gave a talk on greedy algorithms for representing audio signals. We've now made the slides available. Below is the abstract.

Profile: Nelson Morgan - Part 2

Wednesday, November 7, 2012
This is part two of a profile on Nelson Morgan. You can read part one here.

In 1988, ICSI ramped up to full staff, and Morgan began in his role as leader of the Realization Group. The group would focus both on building massively systems and on applications in speech recognition.

The group’s early successes were in designing and building machines powerful enough to do speech recognition.  In 1989, the group designed an array of digital signal processing chips in a ring topology that used programmable gate arrays to interconnect processors.

Profile: Nelson Morgan - Part 1

Monday, November 5, 2012

ICSI Deputy Director Nelson MorganThis week, we'll be posting a two-part profile of Nelson Morgan, so make sure to check back for the rest of the story.

Morgan has led speech recognition research at ICSI since the Institute’s inauguration in 1988. Morgan also served as director for thirteen years starting in 1999, the year the agreement that had established ICSI expired. Morgan volunteered for the challenge of broadening and stabilizing the Institute’s funding base, and in 2012, at the end of his tenure, the Institute is doing better financially than it has in years. But then Morgan has always enjoyed a challenge.

October 2012 Highlights

Thursday, November 1, 2012

A few highlights from October 2012:

You can stay up to date on all the happenings at ICSI by subscribing to our news feed and our blog feed, as well as following us on Facebook, Twitter, and YouTube.

An Inside View of the Online Pharmaceuticals Industry

Tuesday, October 30, 2012

Financial records of three vendors that sell unauthorized and counterfeit pharmaceuticals over the Internet show, among other things, that they rely on a relatively small number of affiliate advertisers to drive traffic to their sites. An analysis of the records by Networking researchers and their collaborators gives a rare insider’s view of the finances of illicit online activity.

Pages