CANCELLED! We apologize for any inconvenience.CANCELLED! Bayesian Suffix Trees: Learning and Using Discrete Time Series
CANCELLED! We apologize for any inconvenience.CANCELLED! Evidence of Intrinsic Negative Capacitance in Ferroelectric Hafnium Zirconium Oxide
Celebrate the end of the quarter and the holidays!
Join us at the [lab64 CA, 'Max] HoLLiday' Party!
lab64 Snowflake Contest designs featured!Lab64 Party~ Build a LED Snowflake
The distance between the real and the digital is clearest at the interface layer. The ways that our bodies interact with the physical world are rich and elaborate while digital interactions are far more limited.Perceptual Engineering
The upcoming series features presentations by distinguished guest speakers from industry about practical innovations from Asia related to the use of artificial intelligence in smart physical systems, e.g.Fall '18 theme: AI in Smart Physical Systems: Will Asia Lead the Way?
In this talk I will present planning and decision-making techniques for safely and efficiently maneuvering autonomous aerospace vehicles during proximity operations, manipulation tasks, and surface locomotion.Planning and Decision Making for Autonomous Spacecraft and Space Robots
As prices for solar photovoltaics and battery energy storage plummet, grids around the globe are undergoing tremendous changes.Electricity Network Design and Operation in an Era of Solar and Storage
Optical imaging probes like otoscopes and laryngoscopes are essential tools used by doctors to see deep into the human body.Plenoptic Medical Cameras
Leela is a semantic artificially intelligent agent modeled on the theories of Jean Piaget. She builds increasingly abstract semantic models of the world from her experiences of exploration, play, and experimentation.Leela: a Semantic Intelligent Agent
Privacy is the problem of ensuring limited leakage of information about sensitive features while sharing information (utility) about non-private features to legitimate data users.Information-theoretic Privacy: A holistic view via leakage measures, robust privacy guarantees, and adversarial models for mechanism design