Adding presentor name and making thumbnails clickable.
This commit is contained in:
parent
d93d5186a7
commit
76bde620c2
171
media/index.xml
171
media/index.xml
|
@ -11,7 +11,144 @@
|
||||||
CD or DVD should you so choose.
|
CD or DVD should you so choose.
|
||||||
<ul class="media">
|
<ul class="media">
|
||||||
|
|
||||||
<!--<mediaitem title="Software Transactional Memory and Haskell">
|
<mediaitem title="Deep Learning With Multiplicative Interactions">
|
||||||
|
<abstract><p>
|
||||||
|
Deep networks can be learned efficiently from unlabeled data. The layers of
|
||||||
|
representation are learned one at a time using a simple learning module,
|
||||||
|
called a "Restricted Boltzmann Machine" that has only one layer of latent
|
||||||
|
variables. The values of the latent variables of one module form the data for
|
||||||
|
training the next module. Although deep networks have been quite successful
|
||||||
|
for tasks such as object recognition, information retrieval, and modeling
|
||||||
|
motion capture data, the simple learning modules do not have multiplicative
|
||||||
|
interactions which are very useful for some types of data.
|
||||||
|
</p><p>
|
||||||
|
The talk will show how a third-order energy function can be factorized to
|
||||||
|
yield a simple learning module that retains advantageous properties of a
|
||||||
|
Restricted Boltzmann Machine such as very simple exact inference and a very
|
||||||
|
simple learning rule based on pair-wise statistics. The new module contains
|
||||||
|
multiplicative interactions that are useful for a variety of unsupervised
|
||||||
|
learning tasks. Researchers at the University of Toronto have been using this
|
||||||
|
type of module to extract oriented energy from image patches and dense flow
|
||||||
|
fields from image sequences. The new module can also be used to allow motions
|
||||||
|
of a particular style to be achieved by blending autoregressive models of
|
||||||
|
motion capture data.
|
||||||
|
</p></abstract>
|
||||||
|
<presentor>Dr. Geoff Hinton</presentor>
|
||||||
|
<thumbnail file="ghinton-deep-learning-thumb-small.jpg" />
|
||||||
|
<mediafile file="ghinton-deep-learning.avi" type="Talk (XviD)" />
|
||||||
|
<mediafile file="ghinton-deep-learning.ogg" type="Talk (Ogg/Theora)" />
|
||||||
|
<mediafile file="ghinton-deep-learning.mp4" type="Talk (MP4)" />
|
||||||
|
<mediafile file="ghinton-deep-learning.mpg" type="Talk (MPG)" />
|
||||||
|
<flvfile file="ghinton-deep-learning.flv" />
|
||||||
|
</mediaitem>
|
||||||
|
|
||||||
|
<mediaitem title="Wilderness Programming">
|
||||||
|
<abstract><p>
|
||||||
|
Paul Lutus describes his early Apple II software development days, conducted
|
||||||
|
from the far end of a 1200-foot power cord, in a tiny Oregon cabin. Paul
|
||||||
|
describes how he wrote a best-seller (Apple Writer) in assembly language,
|
||||||
|
while dealing with power outages, lightning storms and the occasional curious
|
||||||
|
bear.
|
||||||
|
</p><p>
|
||||||
|
Paul also describes his subsequent four-year solo around-the-world sail in a
|
||||||
|
31-foot boat. And be ready with your inquiries -- Paul will answer your
|
||||||
|
questions.
|
||||||
|
</p><p>
|
||||||
|
Paul Lutus has a wide background in science and technology. He designed
|
||||||
|
spacecraft components for the NASA Space Shuttle and created a mathematical
|
||||||
|
model of the solar system used during the Viking Mars lander program. Then, at
|
||||||
|
the beginning of the personal computer revolution, Lutus switched career paths
|
||||||
|
and took up computer science. His best-known program is "Apple Writer," an
|
||||||
|
internationally successful word processing program for the early Apple
|
||||||
|
computers.
|
||||||
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Paul Lutus</presentor>
|
||||||
|
<thumbnail file="plutus-wilderness-programming-thumb-small.jpg" />
|
||||||
|
<mediafile file="plutus-wilderness-programming.avi" type="Talk (XviD)" />
|
||||||
|
<mediafile file="plutus-wilderness-programming.ogg" type="Talk (Ogg/Theora)" />
|
||||||
|
<mediafile file="plutus-wilderness-programming.mp4" type="Talk (MP4)" />
|
||||||
|
<mediafile file="plutus-wilderness-programming.mpg" type="Talk (MPG)" />
|
||||||
|
<flvfile file="plutus-wilderness-programming.flv" />
|
||||||
|
</mediaitem>
|
||||||
|
|
||||||
|
<mediaitem title="The Best Algorithms are Randomized Algorithms">
|
||||||
|
<abstract><p>
|
||||||
|
For many problems, randomized algorithms are either the fastest algorithm or the
|
||||||
|
simplest algorithm; sometimes they even provide the only known algorithm.
|
||||||
|
Randomized algorithms have become so prevalent that deterministic algorithms
|
||||||
|
could be viewed as a curious special case. In this talk I will describe some
|
||||||
|
startling examples of randomized algorithms for solving some optimization
|
||||||
|
problems on graphs.
|
||||||
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Dr. Nick Harvey</presentor>
|
||||||
|
<thumbnail file="nick-harvey-random-thumb-small.jpg" />
|
||||||
|
<mediafile file="nick-harvey-random.avi" type="Talk (XviD)" />
|
||||||
|
<mediafile file="nick-harvey-random.ogg" type="Talk (Ogg/Theora)" />
|
||||||
|
<mediafile file="nick-harvey-random.mp4" type="Talk (MP4)" />
|
||||||
|
<mediafile file="nick-harvey-random.mpg" type="Talk (MPG)" />
|
||||||
|
<flvfile file="nick-harvey-random.flv" />
|
||||||
|
</mediaitem>
|
||||||
|
|
||||||
|
<mediaitem title="QIP=PSPACE">
|
||||||
|
<abstract><p>
|
||||||
|
The interactive proof system model of computation is a cornerstone of complexity
|
||||||
|
theory, and its quantum computational variant has been studied in quantum
|
||||||
|
complexity theory for the past decade. In this talk I will discuss an exact
|
||||||
|
characterization of the power of quantum interactive proof systems that I
|
||||||
|
recently proved in collaboration with Rahul Jain, Zhengfeng Ji, and Sarvagya
|
||||||
|
Upadhyay. The characterization states that the collection of computational
|
||||||
|
problems having quantum interactive proof systems consists precisely of those
|
||||||
|
problems solvable with an ordinary classical computer using a polynomial amount
|
||||||
|
of memory (or QIP = PSPACE in complexity-theoretic terminology). This
|
||||||
|
characterization implies the striking fact that quantum computing does not
|
||||||
|
provide any increase in computational power over classical computing in the
|
||||||
|
context of interactive proof systems.
|
||||||
|
|
||||||
|
</p><p>I will not assume that the audience for this talk has any familiarity with
|
||||||
|
either quantum computing or complexity theory; and to be true to the spirit of
|
||||||
|
the interactive proof system model, I hope to make this talk as interactive as
|
||||||
|
possible -- I will be happy to explain anything related to the talk that I can
|
||||||
|
that people are interested in learning about.
|
||||||
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Dr. John Watrous</presentor>
|
||||||
|
<thumbnail file="jwatrous-qip-thumb-small.jpg" />
|
||||||
|
<mediafile file="jwatrous-qip.avi" type="Talk (XviD)" />
|
||||||
|
<mediafile file="jwatrous-qip.ogg" type="Talk (Ogg/Theora)" />
|
||||||
|
<mediafile file="jwatrous-qip.mp4" type="Talk (MP4)" />
|
||||||
|
<mediafile file="jwatrous-qip.mpg" type="Talk (MPG)" />
|
||||||
|
<flvfile file="jwatrous-qip.flv" />
|
||||||
|
</mediaitem>
|
||||||
|
|
||||||
|
<mediaitem title="An Introduction to Vector Graphics Libraries with Cairo">
|
||||||
|
<abstract><p>
|
||||||
|
Cairo is an open source, cross platform, vector graphics library with the
|
||||||
|
ability to output to many kinds of surfaces, including PDF, SVG and PNG
|
||||||
|
surfaces, as well as X-Window, Win32 and Quartz 2D backends.
|
||||||
|
</p><p>
|
||||||
|
Unlike the raster graphics used with programmes and libraries such as The
|
||||||
|
Gimp and ImageMagick, vector graphics are not defined by grids of pixels,
|
||||||
|
but rather by a collection of drawing operations. These operations detail
|
||||||
|
how to draw lines, fill shapes, and even set text to create the desired
|
||||||
|
image. This has the advantages of being infinitely scalable, smaller in file
|
||||||
|
size, and simpler to express within a computer programme.
|
||||||
|
</p><p>
|
||||||
|
This talk will be an introduction to the concepts and metaphors used by
|
||||||
|
vector graphics libraries in general and Cairo in particular.
|
||||||
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Nathaniel Sherry</presentor>
|
||||||
|
<thumbnail file="nsasherr-cairo-thumb-small.jpg" />
|
||||||
|
<mediafile file="nsasherr-cairo.avi" type="Talk (XviD)" />
|
||||||
|
<mediafile file="nsasherr-cairo.ogg" type="Talk (Ogg/Theora)" />
|
||||||
|
<mediafile file="nsasherr-cairo.mp4" type="Talk (MP4)" />
|
||||||
|
<mediafile file="nsasherr-cairo.mpg" type="Talk (MPG)" />
|
||||||
|
<flvfile file="nsasherr-cairo.flv" />
|
||||||
|
</mediaitem>
|
||||||
|
|
||||||
|
<mediaitem title="Software Transactional Memory and Haskell">
|
||||||
<abstract><p>
|
<abstract><p>
|
||||||
Concurrency is hard. Well maybe not hard, but it sure is annoying to get right. Even the
|
Concurrency is hard. Well maybe not hard, but it sure is annoying to get right. Even the
|
||||||
simplest of synchronization tasks are hard to implement correctly when using synchronization
|
simplest of synchronization tasks are hard to implement correctly when using synchronization
|
||||||
|
@ -24,13 +161,14 @@
|
||||||
done today.
|
done today.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Brennan Taylor</presentor>
|
||||||
<thumbnail file="b4taylor-stm-thumb-small.jpg" />
|
<thumbnail file="b4taylor-stm-thumb-small.jpg" />
|
||||||
<mediafile file="b4taylor-stm.avi" type="Talk (XviD)" />
|
<mediafile file="b4taylor-stm.avi" type="Talk (XviD)" />
|
||||||
<mediafile file="b4taylor-stm.ogg" type="Talk (Ogg/Theora)" />
|
<mediafile file="b4taylor-stm.ogg" type="Talk (Ogg/Theora)" />
|
||||||
<mediafile file="b4taylor-stm.mp4" type="Talk (MP4)" />
|
<mediafile file="b4taylor-stm.mp4" type="Talk (MP4)" />
|
||||||
<mediafile file="b4taylor-stm.mpg" type="Talk (MPG)" />
|
<mediafile file="b4taylor-stm.mpg" type="Talk (MPG)" />
|
||||||
<flvfile file="b4taylor-stm.flv" />
|
<flvfile file="b4taylor-stm.flv" />
|
||||||
</mediaitem>-->
|
</mediaitem>
|
||||||
|
|
||||||
<mediaitem title="Programming Quantum Computers">
|
<mediaitem title="Programming Quantum Computers">
|
||||||
<abstract><p>
|
<abstract><p>
|
||||||
|
@ -39,6 +177,8 @@
|
||||||
He will give a brief introduction to quantum computing and why it matters, followed
|
He will give a brief introduction to quantum computing and why it matters, followed
|
||||||
by a talk on programming quantum computers. This is followed by tours of IQC Labs.
|
by a talk on programming quantum computers. This is followed by tours of IQC Labs.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Dr. Raymond Laflemme and Various</presentor>
|
||||||
<thumbnail file="iqc1-thumb-small.jpg" />
|
<thumbnail file="iqc1-thumb-small.jpg" />
|
||||||
<mediafile file="iqc1.avi" type="Talk (XviD)" />
|
<mediafile file="iqc1.avi" type="Talk (XviD)" />
|
||||||
<mediafile file="iqc1.ogg" type="Talk (Ogg/Theora)" />
|
<mediafile file="iqc1.ogg" type="Talk (Ogg/Theora)" />
|
||||||
|
@ -68,6 +208,8 @@
|
||||||
</p>
|
</p>
|
||||||
<p>The slides for this talk can be found <a href="http://mirror.csclub.uwaterloo.ca/csclub/pr-functional-lexing-parsing-slides.pdf">here</a> as a pdf.
|
<p>The slides for this talk can be found <a href="http://mirror.csclub.uwaterloo.ca/csclub/pr-functional-lexing-parsing-slides.pdf">here</a> as a pdf.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
|
||||||
|
<presentor>Dr. Prabhakar Ragde</presentor>
|
||||||
<thumbnail file="pr-functional-lexing-parsing-thumb-small.jpg" />
|
<thumbnail file="pr-functional-lexing-parsing-thumb-small.jpg" />
|
||||||
<mediafile file="pr-functional-lexing-parsing.avi" type="XviD" />
|
<mediafile file="pr-functional-lexing-parsing.avi" type="XviD" />
|
||||||
<mediafile file="pr-functional-lexing-parsing.ogg" type="Ogg/Theora" />
|
<mediafile file="pr-functional-lexing-parsing.ogg" type="Ogg/Theora" />
|
||||||
|
@ -95,6 +237,7 @@
|
||||||
and computational techniques that come into play.</p>
|
and computational techniques that come into play.</p>
|
||||||
<p>The slides for this talk can be found <a href="http://mirror.csclub.uwaterloo.ca/csclub/kaplan-mathematical-art-slides.pdf">here</a> as a pdf.</p>
|
<p>The slides for this talk can be found <a href="http://mirror.csclub.uwaterloo.ca/csclub/kaplan-mathematical-art-slides.pdf">here</a> as a pdf.</p>
|
||||||
</abstract>
|
</abstract>
|
||||||
|
<presentor>Dr. Craig Kaplan</presentor>
|
||||||
<thumbnail file="kaplan-mathematical-art-thumb-small.jpg" />
|
<thumbnail file="kaplan-mathematical-art-thumb-small.jpg" />
|
||||||
<mediafile file="kaplan-mathematical-art.avi" type="XviD" />
|
<mediafile file="kaplan-mathematical-art.avi" type="XviD" />
|
||||||
<mediafile file="kaplan-mathematical-art.ogg" type="Ogg/Theora" />
|
<mediafile file="kaplan-mathematical-art.ogg" type="Ogg/Theora" />
|
||||||
|
@ -180,24 +323,26 @@
|
||||||
<abstract><p>
|
<abstract><p>
|
||||||
TODO
|
TODO
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Andrei Barbu</presentor>
|
||||||
<thumbnail file="abarbu2-thumb-small.jpg" />
|
<thumbnail file="abarbu2-thumb-small.jpg" />
|
||||||
<mediafile file="abarbu2.avi" type="XviD" />
|
<mediafile file="abarbu2.avi" type="XviD" />
|
||||||
<mediafile file="abarbu2.ogg" type="Ogg/Theora" />
|
<mediafile file="abarbu2.ogg" type="Ogg/Theora" />
|
||||||
<mediafile file="abarbu2.mp4" type="MP4" />
|
<mediafile file="abarbu2.mp4" type="MP4" />
|
||||||
<mediafile file="abarbu2.mpg" type="MPG" />
|
<mediafile file="abarbu2.mpg" type="MPG" />
|
||||||
<flvfile file="abarbu2.flv" />
|
<flvfile file="abarbu2.flv" />
|
||||||
</mediaitem>
|
</mediaitem>
|
||||||
|
|
||||||
<mediaitem title="Why you should care about functional programming with Haskell">
|
<mediaitem title="Why you should care about functional programming with Haskell">
|
||||||
<abstract><p>
|
<abstract><p>
|
||||||
TODO
|
TODO
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Andrei Barbu</presentor>
|
||||||
<thumbnail file="abarbu1-thumb-small.jpg" />
|
<thumbnail file="abarbu1-thumb-small.jpg" />
|
||||||
<mediafile file="abarbu1.avi" type="XviD" />
|
<mediafile file="abarbu1.avi" type="XviD" />
|
||||||
<mediafile file="abarbu1.ogg" type="Ogg/Theora" />
|
<mediafile file="abarbu1.ogg" type="Ogg/Theora" />
|
||||||
<mediafile file="abarbu1.mp4" type="MP4" />
|
<mediafile file="abarbu1.mp4" type="MP4" />
|
||||||
<mediafile file="abarbu1.mpg" type="MPG" />
|
<mediafile file="abarbu1.mpg" type="MPG" />
|
||||||
<flvfile file="abarbu1.flv" />
|
<flvfile file="abarbu1.flv" />
|
||||||
</mediaitem>
|
</mediaitem>
|
||||||
|
|
||||||
<mediaitem title="Off-the-Record Messaging: Useful Security and Privacy for IM">
|
<mediaitem title="Off-the-Record Messaging: Useful Security and Privacy for IM">
|
||||||
|
@ -219,6 +364,7 @@ outline the properties of Useful Security and Privacy Technologies that
|
||||||
motivated OTR's design, compare it to other IM security mechanisms, and
|
motivated OTR's design, compare it to other IM security mechanisms, and
|
||||||
talk about its ongoing development directions.
|
talk about its ongoing development directions.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Ian Goldberg</presentor>
|
||||||
<thumbnail file="ian-goldberg-otr-thumb-small.jpg" />
|
<thumbnail file="ian-goldberg-otr-thumb-small.jpg" />
|
||||||
<mediafile file="ian-goldberg-otr.avi" type="XviD" />
|
<mediafile file="ian-goldberg-otr.avi" type="XviD" />
|
||||||
<mediafile file="ian-goldberg-otr.ogg" type="Ogg/Theora" />
|
<mediafile file="ian-goldberg-otr.ogg" type="Ogg/Theora" />
|
||||||
|
@ -249,6 +395,7 @@ jeopradize informational privacy. Dr. Ann Cavoukian talks about how to use techn
|
||||||
included instant messaging, RFID tags and Elliptical Curve Cryptography (ECC). Then Dr. Cavoukian explained the “7 Privacy – Embedded Laws” followed
|
included instant messaging, RFID tags and Elliptical Curve Cryptography (ECC). Then Dr. Cavoukian explained the “7 Privacy – Embedded Laws” followed
|
||||||
by a discussion on a biometrics solution to encryption.
|
by a discussion on a biometrics solution to encryption.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Dr. Ann Cavoukian</presentor>
|
||||||
<thumbnail file="privacy-thumb-small.jpg" />
|
<thumbnail file="privacy-thumb-small.jpg" />
|
||||||
<mediafile file="privacy.avi" type="XviD" />
|
<mediafile file="privacy.avi" type="XviD" />
|
||||||
<mediafile file="privacy.ogg" type="Ogg/Theora" />
|
<mediafile file="privacy.ogg" type="Ogg/Theora" />
|
||||||
|
@ -287,6 +434,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
Dr. Bjarne Stroustrup is the original designer and implementer of the
|
Dr. Bjarne Stroustrup is the original designer and implementer of the
|
||||||
C++ Programming Language.
|
C++ Programming Language.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Dr. Bjarne Stroustrup</presentor>
|
||||||
<thumbnail file="stroustrup-thumb-small.jpg" />
|
<thumbnail file="stroustrup-thumb-small.jpg" />
|
||||||
<mediafile file="stroustrup.avi" type="XviD" />
|
<mediafile file="stroustrup.avi" type="XviD" />
|
||||||
<mediafile file="stroustrup.ogg" type="Ogg/Theora" />
|
<mediafile file="stroustrup.ogg" type="Ogg/Theora" />
|
||||||
|
@ -335,6 +483,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
are available under the <a href="http://creativecommons.org/licenses/nd/1.0/">
|
are available under the <a href="http://creativecommons.org/licenses/nd/1.0/">
|
||||||
Creative Commons NoDerivs 1.0</a> license.
|
Creative Commons NoDerivs 1.0</a> license.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Richard M. Stallman</presentor>
|
||||||
<other>
|
<other>
|
||||||
<h2>Q&A</h2>
|
<h2>Q&A</h2>
|
||||||
<p>
|
<p>
|
||||||
|
@ -366,6 +515,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
</p><p>
|
</p><p>
|
||||||
The slides from the talk are available here: <a href="http://mirror.csclub.uwaterloo.ca/csclub/ingimp_uw_csc_talk_6_27_2007.pdf">ingimp_uw_csc_talk_6_27_2007.pdf</a>.
|
The slides from the talk are available here: <a href="http://mirror.csclub.uwaterloo.ca/csclub/ingimp_uw_csc_talk_6_27_2007.pdf">ingimp_uw_csc_talk_6_27_2007.pdf</a>.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Dr. Michael Terry</presentor>
|
||||||
<thumbnail file="mterry2-thumb-small.jpg" />
|
<thumbnail file="mterry2-thumb-small.jpg" />
|
||||||
<mediafile file="mterry2.avi" type="XviD" size="521M" />
|
<mediafile file="mterry2.avi" type="XviD" size="521M" />
|
||||||
<mediafile file="mterry2.ogg" type="Ogg/Theora" size="535M" />
|
<mediafile file="mterry2.ogg" type="Ogg/Theora" size="535M" />
|
||||||
|
@ -379,6 +529,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
Ralph Stanton reflects on the founding of the University of
|
Ralph Stanton reflects on the founding of the University of
|
||||||
Waterloo Math Faculty.
|
Waterloo Math Faculty.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Ralph Stanton</presentor>
|
||||||
<thumbnail file="ralph-stanton-thumb-small.jpg" />
|
<thumbnail file="ralph-stanton-thumb-small.jpg" />
|
||||||
<mediafile file="ralph-stanton.avi" type="XviD" />
|
<mediafile file="ralph-stanton.avi" type="XviD" />
|
||||||
<mediafile file="ralph-stanton-xvid.avi" type="DivX" />
|
<mediafile file="ralph-stanton-xvid.avi" type="DivX" />
|
||||||
|
@ -423,6 +574,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
The talk is only available in Ogg Theora, in keeping with Richard
|
The talk is only available in Ogg Theora, in keeping with Richard
|
||||||
Stallman's wishes.
|
Stallman's wishes.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Richard M. Stallman</presentor>
|
||||||
<thumbnail file="audio-file.png" />
|
<thumbnail file="audio-file.png" />
|
||||||
<mediafile file="rms_ucsd.ogg" type="Ogg Theora" size="148MB" />
|
<mediafile file="rms_ucsd.ogg" type="Ogg Theora" size="148MB" />
|
||||||
</mediaitem>
|
</mediaitem>
|
||||||
|
@ -434,6 +586,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
polygons on screen, as well as simple cropping techniques to improve
|
polygons on screen, as well as simple cropping techniques to improve
|
||||||
efficiency. Translation and rotation of polygons will also be discussed.
|
efficiency. Translation and rotation of polygons will also be discussed.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>The Prof</presentor>
|
||||||
<thumbnail file="the-prof-graphics-thumb-small.jpg" />
|
<thumbnail file="the-prof-graphics-thumb-small.jpg" />
|
||||||
<mediafile file="the-prof-graphics.avi" type="DivX" size="272M" />
|
<mediafile file="the-prof-graphics.avi" type="DivX" size="272M" />
|
||||||
<mediafile file="the-prof-graphics-xvid.avi" type="XviD" size="272M" />
|
<mediafile file="the-prof-graphics-xvid.avi" type="XviD" size="272M" />
|
||||||
|
@ -448,6 +601,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
most insights and guard the confidences of the individuals involved, none
|
most insights and guard the confidences of the individuals involved, none
|
||||||
of the companies will be identified.
|
of the companies will be identified.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Larry Smith</presentor>
|
||||||
<thumbnail file="larry-smith-talk2-thumb-small.jpg" />
|
<thumbnail file="larry-smith-talk2-thumb-small.jpg" />
|
||||||
<mediafile file="larry-smith-talk2.avi" type="DivX" size="332M" />
|
<mediafile file="larry-smith-talk2.avi" type="DivX" size="332M" />
|
||||||
<mediafile file="larry-smith-talk2-xvid.avi" type="XviD" size="332M" />
|
<mediafile file="larry-smith-talk2-xvid.avi" type="XviD" size="332M" />
|
||||||
|
@ -518,6 +672,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
providing hands-on workshops and lectures on Windows NT internals and
|
providing hands-on workshops and lectures on Windows NT internals and
|
||||||
security to various companies.
|
security to various companies.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Alex Ionescu</presentor>
|
||||||
<thumbnail file="alex-ionescu-thumb-small.jpg" />
|
<thumbnail file="alex-ionescu-thumb-small.jpg" />
|
||||||
<mediafile file="alex-ionescu.avi" type="DivX" size="451M" />
|
<mediafile file="alex-ionescu.avi" type="DivX" size="451M" />
|
||||||
<mediafile file="alex-ionescu-xvid.avi" type="XviD" size="451M" />
|
<mediafile file="alex-ionescu-xvid.avi" type="XviD" size="451M" />
|
||||||
|
@ -566,6 +721,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
<a href="http://mirror.csclub.uwaterloo.ca/csclub/bill-gates-1989-big.jpg" target="_blank">
|
<a href="http://mirror.csclub.uwaterloo.ca/csclub/bill-gates-1989-big.jpg" target="_blank">
|
||||||
<img src="http://mirror.csclub.uwaterloo.ca/csclub/bill-gates-1989.jpg" /></a>
|
<img src="http://mirror.csclub.uwaterloo.ca/csclub/bill-gates-1989.jpg" /></a>
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Bill Gates</presentor>
|
||||||
<thumbnail file="audio-file.png" />
|
<thumbnail file="audio-file.png" />
|
||||||
<mediafile file="bill-gates-1989.mp3" type="mp3" size="85M" />
|
<mediafile file="bill-gates-1989.mp3" type="mp3" size="85M" />
|
||||||
<mediafile file="bill-gates-1989.flac" type="flac" size="540M" />
|
<mediafile file="bill-gates-1989.flac" type="flac" size="540M" />
|
||||||
|
@ -592,6 +748,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
Gord Cormack talks about the science, logistics, and politics of Spam
|
Gord Cormack talks about the science, logistics, and politics of Spam
|
||||||
Filter Evaluation.
|
Filter Evaluation.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Dr. Gord Cormack</presentor>
|
||||||
<thumbnail file="cormack-spam-thumb-small.jpg" />
|
<thumbnail file="cormack-spam-thumb-small.jpg" />
|
||||||
<mediafile file="cormack-spam-xvid.avi" type="XviD" size="473M" />
|
<mediafile file="cormack-spam-xvid.avi" type="XviD" size="473M" />
|
||||||
<mediafile file="cormack-spam.avi" type="DiVX" size="473M" />
|
<mediafile file="cormack-spam.avi" type="DiVX" size="473M" />
|
||||||
|
@ -616,6 +773,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
The Computer Science Club would like to thank the CS-Commons Committee for
|
The Computer Science Club would like to thank the CS-Commons Committee for
|
||||||
co-sponsoring this talk.
|
co-sponsoring this talk.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Simon Law</presentor>
|
||||||
<thumbnail file="simon-talk-thumb-small.jpg" />
|
<thumbnail file="simon-talk-thumb-small.jpg" />
|
||||||
<mediafile file="simon-talk-xvid.avi" type="XviD" size="178M" />
|
<mediafile file="simon-talk-xvid.avi" type="XviD" size="178M" />
|
||||||
<mediafile file="simon-talk.avi" type="DivX" size="178M" />
|
<mediafile file="simon-talk.avi" type="DivX" size="178M" />
|
||||||
|
@ -634,6 +792,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
ubiquitous computing to advertising. Simon Woodside (founder) will discuss
|
ubiquitous computing to advertising. Simon Woodside (founder) will discuss
|
||||||
what it's like to start a business and how the imaging code works.
|
what it's like to start a business and how the imaging code works.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Simon Woodside</presentor>
|
||||||
<thumbnail file="semacode-thumb-small.jpg" />
|
<thumbnail file="semacode-thumb-small.jpg" />
|
||||||
<mediafile file="semacode.avi" type="DivX" size="180M"/>
|
<mediafile file="semacode.avi" type="DivX" size="180M"/>
|
||||||
<mediafile file="semacode-xvid.avi" type="XviD" size="180M"/>
|
<mediafile file="semacode-xvid.avi" type="XviD" size="180M"/>
|
||||||
|
@ -653,6 +812,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
Note: the slides are hard to make out in the video, so make sure to
|
Note: the slides are hard to make out in the video, so make sure to
|
||||||
download the slides as well.
|
download the slides as well.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Eric LaForest</presentor>
|
||||||
<thumbnail file="ericlaforest-thumb-small.jpg" />
|
<thumbnail file="ericlaforest-thumb-small.jpg" />
|
||||||
<mediafile file="eric-laforest2-720-480.avi" type="DiVX" size="357M"/>
|
<mediafile file="eric-laforest2-720-480.avi" type="DiVX" size="357M"/>
|
||||||
<mediafile file="ericlaforest-xvid.avi" type="XViD" size="309M"/>
|
<mediafile file="ericlaforest-xvid.avi" type="XViD" size="309M"/>
|
||||||
|
@ -668,6 +828,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
significance. Particular attention will be paid to the challenge of
|
significance. Particular attention will be paid to the challenge of
|
||||||
acquiring cross domain knowledge and setting up effective collaboration.
|
acquiring cross domain knowledge and setting up effective collaboration.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Larry Smith</presentor>
|
||||||
<thumbnail file="larry-killer-applications-thumb-small.jpg" />
|
<thumbnail file="larry-killer-applications-thumb-small.jpg" />
|
||||||
<mediafile file="larry-killer-applications.avi" size="686M" type="DiVX" />
|
<mediafile file="larry-killer-applications.avi" size="686M" type="DiVX" />
|
||||||
<mediafile file="larry-killer-applications-xvid.avi" size="686M" type="XviD" />
|
<mediafile file="larry-killer-applications-xvid.avi" size="686M" type="XviD" />
|
||||||
|
@ -676,6 +837,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
</mediaitem>
|
</mediaitem>
|
||||||
|
|
||||||
<mediaitem title="Larry Smith: Computing's Next Great Empires">
|
<mediaitem title="Larry Smith: Computing's Next Great Empires">
|
||||||
|
<presentor>Larry Smith</presentor>
|
||||||
<thumbnail file="audio-file.png" />
|
<thumbnail file="audio-file.png" />
|
||||||
<mediafile file="larry-smith-talk.ogg" type="Ogg" />
|
<mediafile file="larry-smith-talk.ogg" type="Ogg" />
|
||||||
<mediafile file="larry-smith-talk.mp3" type="MP3" />
|
<mediafile file="larry-smith-talk.mp3" type="MP3" />
|
||||||
|
@ -693,6 +855,7 @@ Safeguarding Your Privacy in a Networked World."
|
||||||
Particularly illuminating are his responses to advocates of
|
Particularly illuminating are his responses to advocates of
|
||||||
free/open-source software.
|
free/open-source software.
|
||||||
</p></abstract>
|
</p></abstract>
|
||||||
|
<presentor>Rico Mariani</presentor>
|
||||||
<thumbnail file="rico-thumb-small.jpg" />
|
<thumbnail file="rico-thumb-small.jpg" />
|
||||||
<mediafile file="rico.avi" type="XviD" size="534M" />
|
<mediafile file="rico.avi" type="XviD" size="534M" />
|
||||||
<mediafile file="rico.ogg" type="Ogg/Theora" size="528M" />
|
<mediafile file="rico.ogg" type="Ogg/Theora" size="528M" />
|
||||||
|
|
|
@ -44,7 +44,18 @@
|
||||||
</xsl:with-param>
|
</xsl:with-param>
|
||||||
</xsl:call-template>
|
</xsl:call-template>
|
||||||
<xsl:variable name="thumb-url" select="concat('http://mirror.csclub.uwaterloo.ca/csclub/' ,thumbnail/@file)" />
|
<xsl:variable name="thumb-url" select="concat('http://mirror.csclub.uwaterloo.ca/csclub/' ,thumbnail/@file)" />
|
||||||
<li class="media"><img class="media" src="{$thumb-url}" /><a href= "{@title}"><xsl:value-of select="@title" /></a></li>
|
<li class="media">
|
||||||
|
<a href= "{@title}">
|
||||||
|
<span>
|
||||||
|
<img class="media" src="{$thumb-url}" />
|
||||||
|
<span style="display: inline-block">
|
||||||
|
<b><xsl:value-of select="presentor" />:</b>
|
||||||
|
<br/>
|
||||||
|
<xsl:value-of select="@title" />
|
||||||
|
</span>
|
||||||
|
</span>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
</xsl:template>
|
</xsl:template>
|
||||||
|
|
||||||
<xsl:template name="makemediaitem">
|
<xsl:template name="makemediaitem">
|
||||||
|
|
Loading…
Reference in New Issue