On the Robustness to Misspecification of α-Posteriors and Their Variational Approximations
![](https://i.ytimg.com/vi/Kcf97Fh2xw4/mqdefault.jpg)
35:00
Secure Distributed Matrix Multiplication
![](https://i.ytimg.com/vi/AvWqX_xmo8Q/mqdefault.jpg)
44:51
The Curious Incident of Developing Artificial General Intelligence
![](https://i.ytimg.com/vi/zHjdd--W6o4/mqdefault.jpg)
1:00:36
The Mathematics of Causal Inference, with Reflections on Machine Learning and the Logic of Science
![](https://i.ytimg.com/vi/4M8_Oo7lpiA/mqdefault.jpg)
1:08:14
Cryptography: From Mathematical Magic to Secure Communication
![](https://i.ytimg.com/vi/26Iqd_Pv94U/mqdefault.jpg)
56:37
Song Mei: Revisiting neural network approximation theory in the age of generative AI
![](https://i.ytimg.com/vi/WyeomuU2vQw/mqdefault.jpg)
45:35
Learning Theory of Transformers: Generalization and Optimization of In-Context Learning
![](https://i.ytimg.com/vi/eOKoUM32kM8/mqdefault.jpg)
1:09:24
New Challenges in Geomechanics: The Role of Modeling in Geotechnical Engineering Practice
![](https://i.ytimg.com/vi/VE2ITg_hGnI/mqdefault.jpg)
1:02:06