Last year, a question-answering system built at IBM, named Watson, won the game show Jeopardy! The system combines a large database of knowledge with natural language processing abilities. IBM researchers are now investigating how to use Watson in specialized domains, including health care. On November 9, Alfio Gliozzo, a member of the research staff at the IBM T.J. Watson Research Center, gave a talk at ICSI about the future of Watson. We have now made the slides available.
This is the second in a series of blog posts debunking some common misunderstandings about online privacy. The images used in these posts have been adapted from a tutorial given by Gerald Friedland at ACM Multimedia in Nara, Japan in October.
Many people assume that their online communication is private. While one-to-one communication online may be intended as private, if it is not encrypted, it is not private. Whenever information is sent online, there is the possibility that someone other than the intended recipient can view it. Encryption helps prevent the information from being seen by a third party, so sensitive information (such as emails, chat, or video calls containing information that you want to keep between you and the recipient) should always be encrypted.
Kalle Palomäki recently joined ICSI's Speech Group. He is here on ICSI's Finnish visiting program, which is funded by the Finnish Funding Agency for Technology and Innovation through Aalto University and the Helsinki Institute for Information Technology.
This is the first in a series of blog posts debunking some common misunderstandings about online privacy. The images used in these posts have been adapted from a tutorial given by Gerald Friedland at ACM Multimedia in Nara, Japan in October.
On October 25, Gaël Richard, a professor at Télécom ParisTech, gave a talk on greedy algorithms for representing audio signals. We've now made the slides available. Below is the abstract.
In 1988, ICSI ramped up to full staff, and Morgan began in his role as leader of the Realization Group. The group would focus both on building massively systems and on applications in speech recognition.
The group’s early successes were in designing and building machines powerful enough to do speech recognition. In 1989, the group designed an array of digital signal processing chips in a ring topology that used programmable gate arrays to interconnect processors.
This week, we'll be posting a two-part profile of Nelson Morgan, so make sure to check back for the rest of the story.
Morgan has led speech recognition research at ICSI since the Institute’s inauguration in 1988. Morgan also served as director for thirteen years starting in 1999, the year the agreement that had established ICSI expired. Morgan volunteered for the challenge of broadening and stabilizing the Institute’s funding base, and in 2012, at the end of his tenure, the Institute is doing better financially than it has in years. But then Morgan has always enjoyed a challenge.
Researchers from ICSI attended several conferences including ACM Multimedia 2012, the 133th Audio Engineering Society (AES) Convention, the 19th ACM Conference on Computer and Communications Society, the ACM Workshop on Crowdsourcing for Multimedia (CrowdMM 2012), the MediaEval 2012 Workshop, and the 12th European Conference on Computer Vision (ECCV 2012).
Speech Group researchers and their collaborators at UC Berkeley received distinctive mention at the MediaEval 2012 Workshop for their video location estimation system. Read more here.
An article by Deputy Director and Speech Group leader Nelson Morgan on speech research appeared in Speech Technology magazine.
You can stay up to date on all the happenings at ICSI by subscribing to our news feed and our blog feed, as well as following us on Facebook, Twitter, and YouTube.
Financial records of three vendors that sell unauthorized and counterfeit pharmaceuticals over the Internet show, among other things, that they rely on a relatively small number of affiliate advertisers to drive traffic to their sites. An analysis of the records by Networking researchers and their collaborators gives a rare insider’s view of the finances of illicit online activity.