The Millennium Fulcrum Edition 3.0 NOTE: This is a hypertext formatted version of the Project Gutenberg edition. For more information, check the small print or check out the full ascii text. The ...
Homepage of Michael KaessAbstract Underwater perception and 3D surface reconstruction are challenging problems with broad applications in construction, security, marine archaeology, and environmental ...
We were interviewed about our work by WESA (the NPR radio station in Pittsburgh), and we were featured live on the local radio station KQV 1410 AM. Abstract Photo-editing software restricts the ...
From smart phones, to multi-core CPUs and GPUs, to the world's largest supercomputers, parallel processing is ubiquitous in modern computing. The goal of this course is to provide a deep understanding ...
"We look at people like Jack Pidgeon or the public school teacher who stretched the envelope for 30 years as exceptions, as anachronisms, because only the toughest can make a life of it. And that's ...
SCS faculty members Carolyn Rosé and Jun-Yan Zhu recently received endowed chairs to recognize their research contributions and support their future work.
Students in the new, experimental AI Tools for Software Development course learn how to apply a software engineering mindset to make AI tools more reliable.
I am looking for new students. My current research focus is enabling robots to learn strategies (tricks, hacks) to do tasks from direct instruction, googling and using the web, observation, and ...
This data set contains WWW-pages collected from computer science departments of various universities in January 1997 by the World Wide Knowledge Base (Web->Kb) project of the CMU text learning group.
What about ChatGPT and related large AI Systems? How will they impact us all? As a longtime researcher in AI, I'm excited about the ways in which these new AI systems can improve our healthcare, ...
New SCS research shows that GitHub users increasingly buy or trade for fake stars, then use their ill-gotten gains to attract unsuspecting users so they can steal their cryptocurrency, swipe their ...
The lecture notes will be available after each lecture to assist with studying -- please read them as they often contain material that goes beyond just what we covered in lecture! For supplemental ...