Artificial Intelligence, Machine Learning, Computer Vision, Natural language processing

Available Speakers on this Topic

Ricardo Baeza-Yates – Palo Alto, CA, United States

  • Bias and the Web
    The Web is the most powerful communication medium and the largest public data repository that humankind has created. Its content ranges from great reference sources such as Wikipedia to ugly fake...
  • Big Data or Right Data? Opportunities and Challenges
    Big data nowadays is a fashionable topic, independently of what people mean when they use this term. But being big is just a matter of volume, although there is no clear agreement in the size...
  • Distributed Web Search
    In the ocean of Web data, Web search engines are the primary way to access content. As the data is on the order of petabytes, current search engines are very large centralized systems based on...
  • Semantic Search
    Semantic search lies in the cross roads of information retrieval and natural language
    processing and is the current frontier of search technology. The first part consists in...

Indrajit Bhattacharya – Kolkata, India

  • Introduction to Monte Carlo Methods for Probabilistic Inference
    Probabilistic Models provide a framework for representing and reasoning with complex domains with many uncertain and interdependent variables and form one of the foundations of Artificial...
  • Introduction to Probabilistic Graphical Models
    Probabilistic Graphical Models (PGM) provide a unifying framework for representing and reasoning with complex domains with many uncertain and interdependent variables and form one of the...
  • Principles of Technical Writing
    While research students receive intensive and extensive training about the fundamentals of topics relevant for their research, their formal education rarely covers the topic of research...
  • Statistical Topic Models
    Over the last decade, probabilistic topic models have emerged as an extremely powerful and popular tool for analyzing large collections of unstructured data. While originally proposed for textual...

Debnath Bhattacharyya – Visakhapatnam, India

  • Design and Analysis of Graphical Password
    Most common computer authentication method is traditional ‘User Name’ and ‘password’. There are numerous Biometric authentication methods also proposed. In...

Siddhartha Bhattacharyya – Kolkata, India

  • Quantum Entanglement and the W State
    Quantum Computing promises to be the computing of the future. Quantum entanglement is the property which generally gives rise to non-local interaction among bipartite correlated states....
  • Quantum Inspired Automatic Image Clustering
    Cluster analysis is a popular technique whose aim is to segregate a set of data points into groups, called clusters where the number of clusters are predefined. Automatic determination of...
  • Understanding Quantum Backpropagation
    Backpropagation techniques are widely used in neural networks for the purpose of weight adjustment and system error compensation. The lecture discusses the basics of backpropagation...

Debnath Bhattacharyya – Visakhapatnam, India

  • Unsupervised Learning in Data Mining
    The meaning of Unsupervised learning is to find hidden structure in unlabeled data. Approaches of Unsupervised learning can be used in Data Mining. Clustering is an important and popular approach...

Albert Bifet – Paris, France

Michael Bronstein – Lugano, Switzerland

  • Computational metric geometry
    Many important problems in computer vision and pattern recognition revolve around the notion of "similarity" or "distance". Metric geometry is a branch of theoretical...
  • Geometric deep learning
    In recent years, more and more data science applications have to deal with a somewhat unusual kind of data residing on non-Euclidean geometric domains such as manifolds or graphs. For...
  • Spectral methods for 3D data analysis
    In recent years, geometric data is gaining increasing interest both in the academia and industry. In computer graphics and vision, this interest is owed to the rapid development of 3D acquisition...
  • Start thinking in 3D!
    The last decade has witnessed a series of technological breakthroughs in the acquisition, processing, and analysis of 3D geometric data, enabling applications that are revolutionizing our way of...

Li Chen – Washington, DC, United States

Cristina Conati – Vancouver, BC, Canada

Kerstin Dautenhahn – Hatfield, United Kingdom

Gianluca Demartini – Sheffield, United Kingdom

Charlie Fink – New York, NY, United States

João Portela Gama – Porto, Portugal

  • Data Stream Mining for Ubiquitous Environments
     Data stream mining is, nowadays, a mature topic in data mining. Nevertheless, most of the works focus on centralized approaches to learn from sequences of instances generated from...
  • Evolving Social Networks: trajectories of communities

    In recent years we witnessed an impressive advance in the social networks field, which became a ”hot” topic and a focus of considerable attention. The...

  • Real-Time Data Mining
    Nowadays, there are applications in which the data are modelled best not as persistent tables, but rather as transient data streams. In this keynote, we discuss the limitations of current...

Jennifer Golbeck – College Park, MD, United States

Michael Gschwind – Yorktown Heights, NY, United States

  • Accelerating Deep Learning
    As computing systems transform to become more responsive to human needs, Machine Learning and Deep Learning are poised to become key drivers of new cognitive computing systems....
  • The Evolution of Artificial Intelligence

    As computing systems transform to become more responsive to human needs, cognitive computing systems are posed to revolutionize computing.  Artificial Neural...

Gururaj H L – Mysuru, India

Laura M Haas – San Jose, CA, United States

James A Hendler – Troy, NY, United States

Min-Yen Kan – Singapore, Singapore

John Kaufhold – Arlington, VA, United States

  • Deep Learning Past, Present and Near Future
    In the past 5 years, deep learning has become one of the hottest topics in the intersection of data science, society, and business. Google, Facebook, Baidu and other companies have embraced...

Fernando Koch – Melbourne, Australia

Sven Koenig – Los Angeles, CA, United States

  • Cooperative Auctions for Agent or Robot Coordination
    Teams of agents are more robust and potentially more efficient than single agents. However, coordinating teams of agents so that they can successfully complete their mission is a...
  • Making Good Decisions Quickly
    Several disciplines, including artificial intelligence, operations research and others, study how to make timely and good decisions. In this talk, I argue that it is possible to combine ideas from...
  • Planning for Large-Scale Multi-Robot Systems
    Multi-robot systems are now being used in industry. For example, hundreds of robots navigate autonomously in Amazon fulfillment centers to move inventory pods all the way from their storage...
  • Recent Advances in Path Planning
    Path planning is an important technology for a large number of applications, and most computer scientists are familiar with Dijkstra's algorithm. In this talk, I discuss recent advances in...

Ponnurangam Kumaraguru – New Delhi, India

Ashish Kundu – Yorktown Heights, NY, United States

Oge Marques – Boca Raton, FL, United States

Sharath Pankanti – Yorktown Heights, NY, United States

  • Actionable Video Content Summarization: Lessons from Practical Case Studies
    For the first time in the history of universe, the video data generated by humans has exceeds all other forms of the data. While no one denies the utility of the information hidden within...
  • Biometrics
    The determination of identity can be accomplished by three generic means. Conventionally, an exclusive possession (either a physical, e.g., key or electronic, e.g., cookie), knowledge (e.g.,...
  • Multi-media Compliance: A practical paradigm for managing business integrity
    In virtually every business context there is a need to establish some form of monitoring system to ensure that employees comply with business processes and policies. Compliance failures range from...
  • Public Sector Surveillance
    Situation awareness is the key to security. Awareness requires information that spans multiple scales of space and time. The increasing need for sophisticated surveillance systems and the move to...
  • Retail video analytics
    The retail industry grosses trillions of USD revenue annually worldwide and provides numerous opportunities for innovation to facilitate real-world business operations. Applications include: loss...

Gyana R Parija – New Delhi, India

Robert P. Schumaker – New Britain, CT, United States

Xipeng Shen – Raleigh, NC, United States

G R Sinha – Hyderabad, India

Biplav Srivastava – Yorktown Heights, NY, United States

Shan Suthaharan – Greensboro, NC, United States

Rakesh Verma – Houston, TX, United States

  • Phish or Not is the Question
    All of us have received emails threatening us with dire consequences, if we do not increase our mail quota or reset our account, and intent on stealing our digital identities.  I myself...
  • Security Analytics - The New Frontier in Cyber Security ?
    Techniques from Data Analytics, by which I mean: Natural Language Processing, Data Mining, Machine Learning and Statistics, are being applied increasingly to security challenges such as phishing,...
  • Talking to Computers - A Solved Problem?
    Life would be so much easier if computers could read and understand our directions in English, talk to people, and perhaps also compose stories and poems for them. Siri and Cortana...

Toby Walsh – Kensington, NSW, Australia

  • Allocation in Practice
    How do we allocate scarce sources? How do we fairly allocate costs? These are two pressing challenges facing society today. I discuss three recent projects concerning resource and cost allocation....
  • Deceased Organ Matching
    Thousands of people in Australia are waiting for a donated kidney. Matching donated organ to people on the waiting list is becoming increasingly challenging as road safety improves. In 1989, the...
  • Killer robots: the third revolution in warfare
    The age of autonomous killing machines is closer than you think, and scientists and computer experts are deeply worried. Already autonomous weapons systems are under development, and some...
  • Many Fears About AI Are Wrong
    Should you be worried about progress in Artificial Intelligence? Will Artificial Intelligence destroy jobs? Should we fear killer robots? Does Artificial Intelligence threaten our very...
  • What AI Can (and Can't) Do
    AI is transforming our lives. What can it do? What will it do? What should we welcome or fear? It is clear that he next industrial revolution has started. However, there are many misconceptions...
  • Where the hard computational problems are?
    Some computational problems are easy. We can sort numbers quickly for example. Other problems are hard. Scheduling jobs, routing trucks, these are all hard problems to solve. I will survey...

Yu Wang – Beijing, China

Tao Xie – Raleigh, IL, United States