CACM VIDEO PROMOTIONS
Video producer for the Communications of the ACM based in New York.
This is the communications team of The Association for Computing Machinery. These video assignments include setting up and conducting interviews with senior academeic authors, producing appropriate visuals, sound tracks, voice over and final selection of interview content. Script preparation, presentation and overall design of video is required. Each video accommpanies articles in the published online journal.
BIOMETRIC APPROACH FOR GENDER GAP MAY 2020
Women are underrepresented in the fields of science, technology, engineering, and mathematics (STEM) in most countries. This study used Bibliometric approaches to detect the gender gap and to determine possible reasons for it.
Cyber Warranties: Market Fix or Marketing Trick?
Reviewing how Cyber warranties may succeed in avoiding the sales phenomenon ‘ The Market for Lemons’
Face2face Real-Time Face Capture and Reenactment of RGB Videos
Face2Face is an approach for real-time facial reenactment of a monocular target video sequence for example a YouTube. The research project proposes online transfer of facial expressions of a source actor captured by an RGB sensor to a target actor.
Compressed Linear Algebra for Declarative Large-Scale Machine Learning
Reviewing how Large-scale Machine Learning (ML) algorithms. Why is it crucial for performance to fit the data into single-node or distributed main memory to enable fast matrix-vector operations? The paper reviews this.
A variety of Internet online services are designed based on contests. A central question in contest theory is: How to allocate prizes to maximize a desired objective? The objective may be to maximize the utility of production to the agent who solicits solutions to a task, or to the whole society.
Information Hiding: Challenges for Forensic Experts
Information hiding is a research domain that covers a wide spectrum of methods that are used to make (secret) data difficult to notice. Due to improvements in network defenses such techniques are recently gaining an increasing attention from actors like cybercriminals, terrorist and state-sponsored groups as they allow to store data or to cloak communication in a way that is not easily discoverble
Computing History outside UK and USA some selected Landmarks from Continental Europe
A review of european computing history from a Zurich based historian. A rich background to some of the innovations from 17th century to early 19th century.