{"id":7,"date":"2014-02-22T05:09:12","date_gmt":"2014-02-22T05:09:12","guid":{"rendered":"http:\/\/www.floraine.org\/researchmeetup-2014\/?page_id=7"},"modified":"2014-04-05T08:10:39","modified_gmt":"2014-04-05T08:10:39","slug":"agenda","status":"publish","type":"page","link":"https:\/\/www.floraine.org\/researchmeetup-2014\/agenda\/","title":{"rendered":"Agenda"},"content":{"rendered":"<p><strong>April 5th<\/strong><\/p>\n<p><strong>10:00 &#8211; 10:20am Welcome (Breakfast\/Coffee)<\/strong><\/p>\n<p><strong>10:20 &#8211; 11:40am EE-related research talk (Packard 101)<\/strong><\/p>\n<p><strong>Speakers:<br \/>\n(Talk abstracts can be found at the end of the page)<\/strong><\/p>\n<blockquote><p><strong>Improving Resource Efficiency in Cloud Computing<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~cdel\/\">Christina Delimitrou<\/a> (Stanford &#8211; Computer Architecture)<\/p>\n<p><strong>Adaptive Antennas in a Dynamic GPS Environment<\/strong><br \/>\n<a href=\"http:\/\/stanford.edu\/~emcmilin\/\">Emily McMilin<\/a> (Stanford &#8211; GPS \/ Electromagnetism)<\/p>\n<p><strong>Information flows in control systems<\/strong><br \/>\n<a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"http:\/\/www.eecs.berkeley.edu\/~gireeja\/\">Gireeja Ranade<\/a><span style=\"line-height: 1.714285714; font-size: 1rem;\"> (Berkeley &#8211; Theory)<\/span><\/p>\n<p><strong>Characterizing Parallel Graph Analysis Algorithms<br \/>\n<\/strong><a href=\"http:\/\/www.stanford.edu\/~nrodia\/\">Nicole Rodia<\/a> (Stanford &#8211; Computer Architecture)<\/p><\/blockquote>\n<div>\n<div><strong style=\"line-height: 1.714285714; font-size: 1rem;\">11:50 &#8211; 1:50pm <strong>Lunch\/Panel with Professors (Packard Atrium)<\/strong><\/strong><\/div>\n<div style=\"padding-left: 30px;\">Prof. Ada Poon (Stanford EE), Prof.\u00a0Debbie G. Senesky (Stanford EE), Prof. Fei-Fei Li (Stanford CS) Prof.\u00a0Virginia Willams (Stanford CS),\u00a0Prof. Sheryl Root (CMU)<\/div>\n<\/div>\n<p><strong><br \/>\n2:00 &#8211; 3:40pm\u00a0<strong>CS-related research talk\u00a0<\/strong>\u00a0(<strong>Packard 101)<\/strong><\/strong><\/p>\n<p><strong>Speaker:<br \/>\n<strong>(Talk abstracts can be found at the end of the page)<\/strong><br \/>\n<\/strong><\/p>\n<blockquote><p><span style=\"line-height: 1.714285714; font-size: 1rem;\"><strong>Regulating Vulns: Options for Controlling the Gray Market in Zero-Day Vulnerabilities<\/strong><br \/>\n<a href=\"http:\/\/justsecurity.org\/author\/fidlermailyn\/\">Mailyn Fidler<\/a> (Stanford &#8211; Science, Technology and Society)<\/span><\/p>\n<p><strong>Detecting stealthy, distributed SSH brute-forcing<\/strong><br \/>\n<a href=\"http:\/\/www.cs.berkeley.edu\/~mobin\/\">Mobin Javed<\/a> (Berkeley &#8211; Network Security)<\/p>\n<p><strong>Understanding Regulation of Gene Translation using Probabilistic Modeling<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~cpop\/\">Cristina Pop<\/a> (Stanford &#8211; Computational Biology)<\/p>\n<p><strong>A case for nonconvex optimization<br \/>\n<\/strong><a href=\"http:\/\/www.stat.berkeley.edu\/~ploh\/Home.html\">Po-Ling Loh<\/a> (Berkeley &#8211; Machine Learning)<\/p>\n<p><strong>Induced Lexico-Syntactic Patterns Improve Information Extraction from Online Medical Forums<\/strong><br \/>\n<a href=\"http:\/\/www.cs.stanford.edu\/people\/sonal\/\">Sonal Gupta<\/a> (Stanford &#8211; Natural Language Processing)<\/p><\/blockquote>\n<p><strong style=\"line-height: 1.714285714; font-size: 1rem;\">3:40 &#8211; 4:30pm Poster Session (Packard Atrium)<\/strong><span style=\"line-height: 1.714285714; font-size: 1rem;\"><br \/>\n<\/span><\/p>\n<p><strong>Presenter:\u00a0<\/strong><\/p>\n<blockquote><p><strong>Text to 3D Scene Generation<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~angelx\/\">Angel X. Chang<\/a> (Stanford &#8211; NLP)<\/p>\n<p><strong>Downton Abbey without Hiccups: Tales from Netflix<\/strong><a href=\"http:\/\/www.stanford.edu\/~huangty\/\"><br \/>\nTe-Yuan Huang<\/a> (Stanford &#8211; Computer Networking)<\/p>\n<p><strong>Mapping Match+Action Tables to Switches<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~lavanyaj\/\">Lavanya Jose<\/a> \/ Lisa Yan (Stanford &#8211; Computer Networking)<\/p>\n<p><strong>Machine Learning to identify transmitters in real-world spectrum measurements<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~achowdhe\/\">Aakanksha Chowdhery<\/a> (Stanford Alumni\/Microsoft &#8211; Communication)<\/p>\n<p><strong>Understanding Regulation of Gene Translation using Probabilistic Modeling<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~cpop\/\">Cristina Pop<\/a>\u00a0(Stanford &#8211; Computational Biology)<\/p>\n<p><strong>Discovering Low Work Function Materials for Thermionic Energy Conversion<\/strong><br \/>\nSharon Chou (Stanford &#8211;\u00a0Surface Engineering)<\/p><\/blockquote>\n<p><strong style=\"line-height: 1.714285714; font-size: 1rem;\">4:30 &#8211; 5:00pm Walk to Stanford Golf Course<\/strong><\/p>\n<p><strong>5:00 &#8211; 7:00pm\u00a0Dinner with Industrial professionals (at <strong>Stanford Golf Course<\/strong>)<br \/>\n<\/strong><\/p>\n<p><strong>Industrial Professionals:<\/strong><br \/>\n<a href=\"http:\/\/www.eecs.berkeley.edu\/~aditi\/\">Aditi Muralidharan<\/a> (Google, Berkeley PhD Alumnus)<br \/>\n<a href=\"http:\/\/nlp.stanford.edu\/~pichuan\/\">Pi-Chuan Chang<\/a> (AltSchool, Stanford PhD Alumnus)<br \/>\n<a href=\"http:\/\/www.floraine.org\/\">Floraine Berthouzoz<\/a> (Adobe, Berkeley PhD Alumnus)<br \/>\n<a href=\"http:\/\/sing.stanford.edu\/maria\/\">Maria Kazandjieva<\/a> (Netflix, Stanford PhD Alumnus)<br \/>\nKshipra Bhawalkar\u00a0(Google, Stanford PhD Alumnus)<br \/>\n<a href=\"http:\/\/www.stanford.edu\/~achowdhe\/\">Aakanksha Chowdhery<\/a>\u00a0(Microsoft Research, Stanford PhD Alumnus)<br \/>\n<span style=\"line-height: 1.714285714; font-size: 1rem;\">Ya-Lin Huang (Yelp, Georgia Tech PhD Alumnus)<\/span><\/p>\n<p><strong>Talk Abstract:<\/strong><\/p>\n<p><strong>EE talks:<\/strong><\/p>\n<p style=\"padding-left: 30px;\"><strong>Improving Resource Efficiency in Cloud Computing<br \/>\n<\/strong><a href=\"http:\/\/www.stanford.edu\/~cdel\/\">Christina Delimitrou<\/a>\u00a0(Stanford &#8211; Computer Architecture)<\/p>\n<p style=\"padding-left: 30px;\">Cloud computing promises flexibility and high performance for users and lower costs for operators. However, datacenters today operate at very low utilization, wasting power and posing scalability limitations. There are several reasons behind datacenter underutilization, including exaggerated resource reservations, workload interference and platform heterogeneity.<br \/>\nIn this work we present Quasar a cluster management system that is both resource-efficient and QoS-aware. Quasar moves away from the traditional reservation-based approach in cluster management to a more performance-centric approach. It also leverages efficient data mining techniques to extract application preferences in terms of resources without resorting to exhaustive workload profiling. We have evaluated Quasar on a large EC2 cluster under various workload scenarios and have shown that it improves utilization by 47% without degrading per-application performance.<\/p>\n<p style=\"padding-left: 30px;\"><strong style=\"font-size: 1rem; line-height: 1.714285714;\">Adaptive Antennas in a Dynamic GPS Environment<br \/>\n<\/strong><a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"http:\/\/stanford.edu\/~emcmilin\/\">Emily McMilin<\/a><span style=\"line-height: 1.714285714; font-size: 1rem;\"> (Stanford &#8211; GPS \/ Electromagnetism)<\/span><\/p>\n<p style=\"padding-left: 30px;\">As a GPS signal travels 20,000km+ from a satellite to us, the signal is spread thin, in order to blanket almost an entire hemisphere of earth with its faint glow. In fact this signal is, at best, about 20dB below the thermal noise floor, or in other words, its power is about 100 times weaker than the noise generated by electrons bouncing around inside of our radio receivers. Nonetheless, not only must the GPS signal fight to be heard over these noisy electrons, it must also be prepared to face accidental interference and intentional jamming and spoofing.<\/p>\n<p style=\"padding-left: 30px;\">Despite the antenna\u2019s privileged position as the first line of defense against interferers, jammers and spoofers, most adaptive techniques such as detection and mitigation, are realized in the radio receiver backend, in the digital domain. Processing the signal purely in the digital domain can be computationally costly and unjustifiably complex as compared to processing in the analog domain. Furthermore, these techniques tend to rely on antenna arrays spanning multiple wavelengths in dimension, or a single antenna following some trajectory through space.<\/p>\n<p style=\"padding-left: 30px;\">In contrast, we seek to achieve adaptability by manipulating the current distribution on a single, motion-less, sub-wavelength antenna. Specifically we will exploit analog signal processing at the antenna to achieve a low-cost solution, and use a single antenna to achieve a small form-factor solution. A primary technique for achieving adaptability in single antenna systems is the use of discrete circuit components on or near the antenna. Circuit components manipulating currents in the RF analog domain can achieve \u201csignal processing\u201d directly on the antenna. Thus these antennas would harden the receiver by assisting other elements in the radio chain. Alternatively, they could be used alone to reduce vulnerability in otherwise unprotected consumer-friendly products.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Information flows in control systems<\/strong><br \/>\n<a href=\"http:\/\/www.eecs.berkeley.edu\/~gireeja\/\">Gireeja Ranade<\/a>\u00a0(Berkeley &#8211; Theory)<br \/>\nAs the &#8220;Internet of things&#8221; grows we have more devices embedded with sensors that have the ability to communicate and interact seamlessly with each other and their surroundings (e.g. self-driving cars or smart home devices such as thermostats or vacuum cleaners).<br \/>\nTo design control for systems that adapt in real-time or change at high-speeds, we need to understand situations where the system model itself is changing, i.e. systems with parameter uncertainties.<\/p>\n<p style=\"padding-left: 30px;\">Parameter uncertainty manifests as a multiplicative noise in system models and cannot be understood using traditional additive noise approaches. In contrast to previous results, we find that multiplicative noise can serve as a &#8216;scrambling&#8217; bottleneck for information flow in systems and obscures our ability to observe or control the system. Surprisingly, actively controlling the system allows us to simultaneously learn the system state. Parameter uncertainty may also be mitigated with knowledge about the system parameters, and we will explore the notion of the &#8220;value of information&#8221; in control systems. These principles can help dictate design decisions, like whether a laser or a radar sensor would be more valuable for a self-driving car?<\/p>\n<p style=\"padding-left: 30px;\"><strong>Characterizing Parallel Graph Analysis Algorithms<\/strong><br \/>\n<a href=\"http:\/\/www.stanford.edu\/~nrodia\/\">Nicole Rodia<\/a>\u00a0(Stanford &#8211; Computer Architecture)<\/p>\n<p style=\"padding-left: 30px;\">The growing importance of large-scale graph-based applications, which encompasses areas such as social networks, bioinformatics, and web search, necessitates efficient and high-performance parallel computing for graph analysis. I use execution-driven simulation and performance counters on an x86 multicore processor to characterize social and information network analysis algorithms. This informs how to improve graph analysis performance and efficiency using micro-architectural and algorithmic techniques.<\/p>\n<p><strong>CS Talks:<\/strong><\/p>\n<p style=\"padding-left: 30px;\"><strong>Regulating Vulns: Options for Controlling the Gray Market in Zero-Day Vulnerabilities<\/strong><br \/>\n<a href=\"http:\/\/justsecurity.org\/author\/fidlermailyn\/\">Mailyn Fidler<\/a>\u00a0(Stanford &#8211; Science, Technology and Society)<br \/>\nThe emergent \u201cgray-market\u201d global trade in zero-day vulnerabilities involves governments purchasing vulnerabilities for cyber attack and espionage purposes. This market poses negative security consequences and raises questions about what regulatory mechanisms might best address these consequences.<\/p>\n<p style=\"padding-left: 30px;\">Zero-day vulnerabilities are flaws discovered in existing software programs about which neither the responsible company nor the public knows. These vulnerabilities are exploitable on the \u201czero-th\u201d day of their existence, and their secrecy and immediate exploitability make them valuable tools. Zero-days were previously the domains of software security researchers, who reported zero-days to responsible companies for free or a small reward, or of hackers, who profited by selling them on the black market for largely criminal purposes.<\/p>\n<p style=\"padding-left: 30px;\">Governments, particularly the U.S. government, have started purchasing zero-day vulnerabilities for use in cyber attack and cyber espionage, paying high prices, building a stockpile, and feeding a thriving gray market. Prices on the gray market range from about $16,000 to $250,000 per vulnerability, usually much higher than prices on the black and white markets. The NSA employs in-house researchers to find zero-days, but the U.S. government also allocated $25 million for purchase of zero-day vulnerabilities in fiscal year 2013. The U.S. government used zero-day vulnerabilities in Stuxnet, the cyber attack against Iranian centrifuges, and in programs such as NSA\u2019s FoxAcid, which compromises targeted computers.<\/p>\n<p style=\"padding-left: 30px;\">Although some contend the U.S. government has compelling national security reasons to participate in the zero-day market, others criticize the practice for its broader cybersecurity consequences. The current public understanding of U.S. government policy is that the government does not notify affected companies about vulnerabilities it identifies or purchases. This practice leaves companies and citizens vulnerable to exploitation if other parties discover the flaw, which undermines citizen cybersecurity in pursuit of other national security objectives. The success of government identification, purchase, and deployment of zero-day vulnerabilities depends on the continued vulnerability of everyone else. Similarly, high gray market prices divert trade from the white market, making the white market less lucrative than when it only competed with the black market. On an international level, the burgeoning gray market means U.S. adversaries with low cyber capacities can access \u201cready made\u201d cyber attack tools, potentially more rapidly achieving the capability to threaten U.S. interests in cyberspace.<\/p>\n<p style=\"padding-left: 30px;\">Given these negative consequences, my research investigates options for regulating the zero-day gray market. Examining both domestic and international approaches, I analyze a suite of tools ranging from \u201csoft\u201d to \u201chard\u201d law. On the domestic side, I examine criminalization, U.S.-based export controls, and inter-agency transparency-building initiatives. On the international side, I analyze potential initiatives within existing international organizations, non-binding but normative restrictions on exports through the Wassenaar Agreement, and the possibility of a binding treaty. Currently, my research demonstrates that each option has significant drawbacks, but these options are part of ongoing policy discussions. Analyzing the potential and downsides of each option is intended to serve as a useful resource for policymakers.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Detecting stealthy, distributed SSH brute-forcing<\/strong><br \/>\n<a href=\"http:\/\/www.cs.berkeley.edu\/~mobin\/\">Mobin Javed<\/a>\u00a0(Berkeley &#8211; Network Security)<\/p>\n<div>\n<p style=\"padding-left: 30px;\">A longstanding challenge for detecting malicious activity has been the problem of how to identify attacks spread across numerous sources, such that the individual activity of any given source remains modest, and thus potentially not particularly out of the ordinary. These scenarios can arise whenever a detector employs a\u00a0threshold\u00a0used to flag that a given candidate attack source has exhibited a suspiciously high level of activity (e.g., when conducting scanning or DoS flooding). Attackers can respond to such detection\u00a0procedures by employing multiple sources in order to thin out their activity to prevent any single source from exceeding the threshold; their attack becomes\u00a0distributed\u00a0and therefore potentially\u00a0stealthy, i.e., hard to detect based on any individualized analysis.<\/p>\n<p style=\"padding-left: 30px;\">In this work we present a general strategy for potentially detecting such stealthy, distributed activity.\u00a0 We apply our approach to the problem of detecting\u00a0distributed SSH brute-forcing: attackers employing a number of systems that each try different username\/password combinations against a site\u2019s SSH login servers, hoping that one of them will stumble across a working combination made possible by a careless user.\u00a0Using the detector, we find dozens of instances of such attacks in an extensive 8-year dataset collected from a site with several thousand SSH users. Many of the attacks\u2014some of which last months\u2014would be quite difficult to detect individually. While a number of the attacks reflect indiscriminant global probing, we also find attacks that targeted only the local site, as well as occasional attacks that succeeded.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p style=\"padding-left: 30px;\"><strong>Understanding Regulation of Gene Translation using Probabilistic Modeling<br \/>\n<\/strong><a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"http:\/\/www.stanford.edu\/~cpop\/\">Cristina Pop<\/a><span style=\"line-height: 1.714285714; font-size: 1rem;\">\u00a0(Stanford &#8211; Computational Biology)<\/span><\/p>\n<p style=\"padding-left: 30px;\">The translation of RNA into protein is an important step in gene expression. During translation, a molecule called the ribosome scans the RNA sequence, pausing with varying rates at each set of three bases (a codon) to translate it into an amino acid that joins the protein chain being synthesized. An emerging technique called ribosomal profiling gives a noisy count of how many ribosomes are observed at each codon on each gene at a snapshot in time. We present a rigorous machine learning model, motivated by queuing theory, that can extract from this data the rates at which the ribosome pauses and the protein synthesis rate per gene. We use these quantities to examine which codons are slowly translated and which biological features imply good efficiency.<\/p>\n<p style=\"padding-left: 30px;\">Because several codons can translate to the same amino acid, codon usage is biased, especially in highly-expressed genes, suggesting either that efficient translation imposed evolutionary pressure that formed codon usage bias, or that we can use preferred codons to enhance efficiency. Using our model and experimental validation on mutants, we suggest that a faster codon does not necessarily lead to a more efficiently-translated gene in physiological conditions, but rather that the causality is reversed. We propose that signals such as the structure of the RNA and motifs at the start of the gene influence efficiency.<\/p>\n<p style=\"padding-left: 30px;\"><strong>A case for nonconvex optimization<br \/>\n<\/strong><a href=\"http:\/\/www.stat.berkeley.edu\/~ploh\/Home.html\">Po-Ling Loh<\/a>\u00a0(Berkeley &#8211; Machine Learning)<br \/>\nRecent years have brought about a flurry of work on convex relaxations of nonconvex problems. For instance, the convex l_1 norm is used as a convex surrogate for the nonconvex l_0 penalty, which counts the number of nonzeros in a vector. Convex objectives have the attractive property that local optima are also global optima, and these optima may be found efficiently.<\/p>\n<p style=\"padding-left: 30px;\">We present results following a line of current work that advocates the use of nonconvex regularizers. Although the resulting objective functions possess multiple local and global optima, we show that for interesting classes of functions arising from statistical estimation problems, both local and global optima are statistically consistent. Our work is the first of its kind to provide sufficient conditions under which local and global optima are clustered together, and presents a favorable case in the realm of nonconvex methods for statistical estimation.<\/p>\n<p style=\"padding-left: 30px;\">This is joint work with Martin Wainwright.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Induced Lexico-Syntactic Patterns Improve Information Extraction from Online Medical Forums<br \/>\n<\/strong><a href=\"http:\/\/www.cs.stanford.edu\/people\/sonal\/\">Sonal Gupta<\/a>\u00a0(Stanford &#8211; Natural Language Processing)<\/p>\n<p style=\"padding-left: 30px;\">Despite the increasing quantity of Patient Authored Text (PAT), such as online discussion threads, tools for identifying medical entities in PAT are limited. When applied to PAT, existing tools either fail to identify specific entity types or perform poorly. Identification of SC and DT terms in PAT would enable exploration of efficacy and side effects for not only pharmaceutical drugs, but also for home remedies and components of daily care. In our work, we reliably extract two entity types, symptoms &amp; conditions (SCs) and drugs &amp; treatments (DTs), from PAT by learning lexico-syntactic patterns from data annotated with seed dictionaries. We use SC and DT term dictionaries compiled from online sources to label several discussion forums from MedHelp (www.medhelp.org). We then iteratively induce lexico-syntactic patterns corresponding strongly with each entity type to extract new SC and DT terms. Our system is able to extract symptom descriptions and treatments absent from our original dictionaries, such as \u2018LADA\u2019, \u2018stabbing pain\u2019, and \u2018Cinnamon pills\u2019. It outperforms the dictionaries by 4-7% for identifying DT and 2-3% for identifying SC on two forums from MedHelp. We show improvements over MetaMap, OBA, a conditional random field based classifier, and a previous pattern learning approach. To the best of our knowledge, this is the first paper to extract SC and DT entities from PAT. We exhibit learning of informal terms often used in PAT but missing from typical dictionaries.<\/p>\n<p style=\"padding-left: 30px;\">Joint work with Diana MacLean, Jeffrey Heer, and Christopher Manning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>April 5th 10:00 &#8211; 10:20am Welcome (Breakfast\/Coffee) 10:20 &#8211; 11:40am EE-related research talk (Packard 101) Speakers: (Talk abstracts can be found at the end of the page) Improving Resource Efficiency in Cloud Computing Christina Delimitrou (Stanford &#8211; Computer Architecture) Adaptive Antennas in a Dynamic GPS Environment Emily McMilin (Stanford &#8211; GPS \/ Electromagnetism) Information flows [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-7","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":45,"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/pages\/7\/revisions\/91"}],"wp:attachment":[{"href":"https:\/\/www.floraine.org\/researchmeetup-2014\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}