Question and remarks can be send to
RMCS20@liacs.leidenuniv.nl.
We make the course material is available on
Blackboard.
The official description of the course can be found in the
eProspectus/studiegids.
Course Schedule
Lectures
Date |
Title |
04 Feb 2020 |
Introduction, How to summarise a paper |
18 Feb 2020 |
Guest lecture: Scientific publishing and peer review (prof. dr. Holger Hoos) |
25 Feb 2020 (Updated!) |
How to write a proposal? |
10 Mar 2020 |
Guest lecture Methods of qualitative and quantitative research (dr. Felienne Hermans) |
21 Apr 2020 |
How to give a scientific presentation? |
26 & 27 May 2020 |
Student symposium |
Deadlines
Topic |
Deadlines |
Bidding on a paper (for the summarising assignment) |
10 Feb 23:59 |
Paper summary |
02 Mar 23:59 |
Proposal (based on the bids) |
06 Apr 23:59 |
Bidding on the proposal (for peer review) |
13 Apr 23:59 |
Presentation insights after visiting a scientific presentation |
20 Apr 23:59 |
Peer Review (graded) |
27 Apr 23:59 |
Paper Bidding
The paper bidding is closed.
The result of the paper distribution is listed in the following table.
Please let us know if you there are any problems or you are unhappy with the
choices made.
Group |
Paper |
1 |
A Few Useful Things to Know about Machine Learning |
2 |
The Unified Logging Infrastructure for Data Analytics at Twitter |
3 |
On the Difficulty of Nonograms |
9 |
An Efficient Geographical Addressing Scheme for the Internet |
10 |
How Kids Code and How We Know: An Exploratory Study on the Scratch Repository |
11 |
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition |
12 |
Languages of The Future |
13 |
Don’t Until the Final Verb Wait: Reinforcement Learning for Simultaneous Machine Translation |
14 |
Spotify — Large Scale, Low Latency, P2P Music-on-Demand Streaming |
15 |
Delta Pointers: Buffer Overflow Checks Without the Checks |
16 |
Metaheuristic macro scale traffic flow optimisation from urban movement data |
17 |
General Game Playing: Overview of the AAAI Competition |
18 |
Guidelines of Business Process Modeling |
19 |
Identification of a Common Different Gene Expression Signature in Ischemic Cardiomyopathy |
20 |
The Theory of Tetris, Nieuwsbrief van de Nederlandse Vereniging voor Theoretische Informatica |
21 |
Dermatologist-level classification of skin cancer with deep neural networks - one of the leading AI examples at the moment |
22 |
Developing a Reference Method for Game Production by Method Comparison |
23 |
Agile and Software Product Line Methods: Are They So Different? |
24 |
The Kissing Problem: How to End a Gathering When Everyone Kisses Everyone Else Goodbye |
25 |
Heads-up Limit Hold’em Poker is Solved |
27 |
All Your GPS Are Belong To Us:Towards Stealthy Manipulation of Road Navigation Systems |
30 |
Identifying Stops and Moves in WiFi Tracking Data |
32 |
Deep Learning |
33 |
Simple and Space-Efficient Minimal Perfect Hash Functions |
36 |
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse |
37 |
The benefits and costs of writing a POSIX kernel in a high-level language |
39 |
Subgroup Discovery |
40 |
Early Programming Education and Career Orientation: the Effects of Gender, Self-Efficacy, Motivation and Stereotypes |