THIS SITE

Information for

Events

Friday, September 21, 2018 — 1:30 PM EDT

Ahmed Khan, Master’s candidate
David R. Cheriton School of Computer Science

Neurobiologically-plausible learning algorithms for recurrent neural networks that can perform supervised learning are a neglected area of study. Equilibrium propagation is a recent synthesis of several ideas in biological and artificial neural network research that uses a continuous-time, energy-based neural model with a local learning rule. However, despite dealing with recurrent networks, equilibrium propagation has only been applied to discriminative categorization tasks.

Friday, September 21, 2018 — 2:00 PM EDT

Omar Zia Khan, Senior Applied Scientist
Microsoft

Monday, September 24, 2018 — 1:30 PM EDT

Nicole McNabb, Master’s candidate
David R. Cheriton School of Computer Science

Monday, September 24, 2018 — 3:30 PM EDT

Hamid Tizhoosh, SDE
University of Waterloo

The history of artificial intelligence (AI) contains several ebbs and flows and is marked by many colorful personalities. We review major milestones in the development of machine learning, starting from principal component analysis to deep networks, and point to a multitude of pivotal developments that have strongly contributed to drawing the historical path of AI. 

Tuesday, September 25, 2018 — 1:00 PM EDT

Daniel Recoskie, PhD candidate
David R. Cheriton School of Computer Science

Wednesday, September 26, 2018 — 11:00 AM EDT

Mohamed Malek Naouach, Master’s candidate
David R. Cheriton School of Computer Science

Wednesday, September 26, 2018 — 12:30 PM EDT

Haotian Zhang, PhD candidate
David R. Cheriton School of Computer Science

Friday, September 28, 2018 — 10:00 AM to 2:30 PM EDT

Join us

On Friday, September 28 we will launch the new Cybersecurity and Privacy Institute.

The Institute brings together under one umbrella Waterloo’s 40 security researchers from across the University. These renowned experts are collaborating to uncover new approaches to security and privacy while also partnering with corporations and government to advance the application and implementation of cybersecurity and privacy technologies.

Monday, October 22, 2018 — 4:00 PM EDT

Carolyn Lamb, PhD candidate
David R. Cheriton School of Computer Science

This thesis is driven by the question of how computers can generate poetry, and how that poetry can be evaluated. We survey existing work on computer-generated poetry and interdisciplinary work on how to evaluate this type of computer-generated creative product. 

S M T W T F S
26
27
28
29
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
6
  1. 2018 (163)
    1. November (1)
    2. October (2)
    3. September (23)
    4. August (17)
    5. July (20)
    6. June (13)
    7. May (25)
    8. April (34)
    9. March (24)
    10. February (3)
    11. January (1)
  2. 2017 (37)
    1. December (2)
    2. November (5)
    3. October (3)
    4. September (4)
    5. July (4)
    6. June (3)
    7. May (2)
    8. April (2)
    9. March (6)
    10. February (4)
    11. January (2)
  3. 2016 (21)
  4. 2015 (36)
  5. 2014 (33)
  6. 2013 (23)
  7. 2012 (4)
  8. 2011 (1)
  9. 2010 (1)
  10. 2009 (1)
  11. 2008 (1)