TCS A1: Strategic Information Culture Carrier in Theoretical Computer Science Training PhD:s for industry Backbone of CS Engineering program Algorithms.

Slides:



Advertisements
Similar presentations
Interdisciplinary Research: Opportunities and Challenges
Advertisements

June 6, 2004 COMPUTER SCIENCE TEACHERS ASSOCIATION REPORT FOR ACMs SIGS John White ACM CEO.
Assessment Report Computer Science School of Science and Mathematics Kad Lakshmanan Chair Sandeep R. Mitra Assessment Coordinator.
ACM & Computing Education in India A Summary & A Proposal Mathai Joseph & Madhavan Mukund ACM Education Council Meeting Denver, Co, 16 September 2011.
Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas.
Cyber Education Project Accreditation Committee November 2014.
Fairmount College of Liberal Arts and Sciences Department of Mathematics & Statistics Mission The mission of the undergraduate program in Mathematics and.
Blekinge Institute of Technology. A YOUNG INSTITUTE  Founded in 1989  One of three independent institutes of technology  Three campuses.
PROGRAMMING AND CRYPTOGRAPHY Wilber R. Rivas Del Rio High School San Felipe Del Rio CISD Dr. Guofei Gu Director of SUCCESS laboratory Secure Communication.
School of Business University of Bridgeport Admissions Presentation Robert Gilmore, Ph.D. Associate Dean School of Business.
NTUST National Taiwan University of Science and Technology 2009 School of Management.
Automated Changes of Problem Representation Eugene Fink LTI Retreat 2007.
IST DEVELOPMENT IN LATVIA
1 Center for Industrial and Applied Mathematics: Participating Groups Core Analysis (Michael Benedicks) Discrete Math. and Combinatorics (Anders Björner)
 The field of statistics provides the scientist with some of the most useful techniques for evaluating ideas, testing theory, and discovering the.
Concordia University Department of Computer Science and Software Engineering Click to edit Master title style ADVANCED PROGRAMING PRACTICES Introduction.
Why get a Ph.D? You like the title of “Dr. Professor.” You never want to leave the University. You want to teach. You want a research career.
Overview of the MS Program Jan Prins. The Computer Science MS Objective – prepare students for advanced technical careers in computing or a related field.
Occupational Career Project By Jimmy Evans. I want to pursue a career in computer engineering. Specifically something in computer software. I think a.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Written by Elizabeth Salyers. Lawyer Police/Detective Criminal Investigator/Special Agents.
1 Sustaining Technical Programs The NSF’s Advanced Technological Education Program and American Competitiveness Mike Lesiecki, MATEC A Member of the Academic.
Computer Science Education in Japan Bush, M. E. (2004). Computer science education in Japan. CACM, 47(8),
AdaBoost Robert E. Schapire (Princeton University) Yoav Freund (University of California at San Diego) Presented by Zhi-Hua Zhou (Nanjing University)
Do we need theoretical computer science in software engineering curriculum: an experience from Uni Novi Sad Bansko, August 28, 2013.
HOW DO INFORMATION SYSTEM SUPPORT THE MAJOR BUSINESS FUNCTION?
1 UTeach Professional Development Courses. 2 UTS Step 1 Early exposure to classroom environment (can be as early as a student’s first semester)
TAUCHI – Tampere Unit for Computer-Human Interaction Finnish Graduate Schools - Competition and Cooperation in Ph.D. Education Poika Isokoski and Kari-Jouko.
1 Welcome to KTH KTH Royal Institute of Technology Excellence in Education, Research and Entrepreneurship.
Human Resource Management
Symposium 2001June 24, 2001 Curriculum Is Just the Beginning Chris Stephenson University of Waterloo.
ABET’s coming to Rose! Your involvement Monday, Nov 5, 2012.
Software Engineering ‘The establishment and use of sound engineering principles (methods) in order to obtain economically software that is reliable and.
CSC – School of Computer Science and Communication.
Learning by Doing (LBD) based Course Content Development (in Areas of CS and ECE) International Institute of Information Technology Hyderabad, India 1.
Faculty of Science Institute of Astronomy SWOT Institute of Astronomy
Sandra H. Harpole February 6,2012.  Dr. George Hazzelrigg ◦ Competitive Proposal Writing ◦
University of Colorado Denver Department of Mathematical and Statistical Sciences Graduate program in Applied Mathematics Applications Continuous models:
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
Managing Opportunities Lori A. Clarke Department of Computer Science University of Massachusetts, Amherst.
Entrepreneurial Research University – 16 Sep 2008 Estonian Computer Science: How to Make it Relevant? Marlon Dumas Institute of Computer Science University.
Computer Sciences at NYU Open House January 2004 l Graduate Study at New York University l The MS in Computer Sciences l The MS in Information Systems.
DEVELOPMENT OF BASE COMPETENCIES IN VALUATION IN “TRANSILVANIA” UNIVERSITY OF BRASOV SILVIA SUMEDREA Ph.D., associate professor “Transilvania” University.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
ELECTRICAL ENGINEERS KENDALL HIMEL INTRO TO ENGINEERING 4TH.
Leslie Valiant “truly a heroic figure in theoretical computer science”- ACM Turing Award Committee Nafe Alsawfta CSCE 221 Spring 2014.
Faculty Well-Being North Carolina State University March 10, 2009 Committee on Faculty Well-Being.
Alexei A.Gaivoronski January 2006 TIØ4137 Financial Optimization 1 Financial Optimization and Risk Management Professor Alexei A. Gaivoronski Department.
University Organizational Model Teaching Teaching Departments provide stability Departments provide stability Programs can come and go Programs can come.
UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY IT with a human touch 2010.
Accreditation of study programs at the Faculty of information technologies Tempus SMGR BE ESABIH EU standards for accreditation of study.
State and Future of Computing Mary Lou Soffa
KTH ROYAL INSTITUTE OF TECHNOLOGY. Sweden's oldest and largest university of technology More than 12,000 full-time students More than 1,900 PhD Students.
Advanced Programing practices
Physics Faculty, Kabul University
PhD at CSE: Overview CSE department offers Doctoral degree in the Computer Science (CS) or Computer Engineering areas (CpE) at both MS to PhD and BS to.
Esin Gulari Division Director Chemical and Transport Systems
I. About MCUT 06 1.
Computer Science Department, University of Missouri, Columbia
Professional Codes of Ethics
Second headline (your name)
Computer Science at UW-Parkside
Project Management: Inspections and Reviews Formal Specifications
Welcome to KTH KTH Royal Institute of Technology Excellence in Education, Research and Entrepreneurship.
Department of Statistics & Actuarial Science
Visions for Theoretical Computer Science
Data-Driven Decision-Making
Why Study MCA. What is MCA? Master of Computer Applications (MCA) is a three-year (six semesters) professional Master's Degree Course in India. The course.
Presentation transcript:

TCS A1: Strategic Information Culture Carrier in Theoretical Computer Science Training PhD:s for industry Backbone of CS Engineering program Algorithms and Complexity Computer and Information Security and Safety Language Technology Uncertainty management Following both CUDOS (Merton) and PLACE (Ziman) Ethoses

Foundational studies Algorithms and complexity: Can computation problem P be solved efficiently? If so, how? If not, can it be solved efficiently with high probability, approximatetly correct, etc.? How to prove that it can’t? Cryptography and information security: Can I prove that electronic voting results are correct without revealing individual votes? Similar in auctions. Program safety and security: rapid formal verification, theory of testing Uncertainty and Language technology

Utility-driven research Software security (EU S3MS, 4WARD) Program analysis and testing Software safety Language tools: anonymization of public documents, Swedish and minority languages Realistic decision support: CC/psychiatry/primary health care Effects-Based operations

Strategic Impact Trained PhD:s (many with postdocs at MIT, ETH,..) at Saab, Ericsson, Swedish Defense, Ernest&Young, Cinnober Financial Technology, Nasdaq Omx Spotify, Google, scholars at KTH, UU, MHD, Imperial College, Cornell university, 200 Master’s theses since year 2003: trained CS engineers everywhere. Spectacular performances can recruit good students: Cipher Challenge, ACM ICPC, 24-hour Extreme Challenge Security: exploitable technology area

Some results: Per Austrin: Towards sharp inapproximability for any 2- CSP, FOCS 2007 (Machtey Award) Mika Cohen, Mads Dam: A Complete axiomatization of Knowledge and Cryptography, LICS 2007 Jakob Nordström: Narrow proofs may be spacious: separating space and width in resolution, STOC 2006 (Lewin best student papers award) Douglas Wikström: A sender-verifiable mix-net and a new proof of a shuffle (ASIACRYPT 2005) (author got an Ingvar Carlsson award in 2007) Torbjörn Granlund: GMP: Code for multiple precision arithmetic on most of the worlds computers.

SWOC Strength: Competence, reputation, breadth Weakness: Financing, KTH organization Opportunity: Regroup around security and safety issues, competitive Master’s programs in theory/security/software Challenge/threat: Little CSC involvment in KTH strategic discussions, student recruitment, PhD student financing, inappropriate KTH organization.

SWOC Strength: Competence, reputation, breadth Competence: Four (and more coming) full professors, five Docents Reputation: Membership in International panels: Gödel, Nevanlinna prizes, University, department and research proposal/program evaluations, selections and promotions. Best (Swedish) engineering teacher prize. Breadth: Spans discrete math/complexity/logic/automata/semantics/inference/ statistics/…

SWOC Strength: Competence, reputation, breadth Weakness: Financing, KTH organization Financing from internal faculty grants and Swedish research councils have decreased dramatically. Alternative financing (Vinnova, Vårdal) is random, and no feedback to applicants is typically given. It is not completely obvious that the KTH organization of ICT/CS is appropriate.

SWOC Strength: Competence, reputation, breadth Weakness: Financing, KTH organization Opportunity: Regroup around security and safety issues, competitive Master’s programs in theory/security/software. Work has just started.

SWOC Strength: Competence, reputation, breadth Weakness: Financing, KTH organization Opportunity: security and safety issues, competitive Master’s programs Challenge/threat: Little CSC involvement in KTH strategic discussions, student recruitment, PhD student financing, inappropriate KTH organization.