CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.

Slides:



Advertisements
Similar presentations
GMD German National Research Center for Information Technology Darmstadt University of Technology Perspectives and Priorities for Digital Libraries Research.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to Computer Science CS 21a: Introduction to Computing I Department of Information Systems and Computer Science Ateneo de Manila University.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
- October 22, 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Ambient Computational Environments Sprint Research Symposium March 8-9, 2000 Professor Gary J. Minden The University of Kansas Electrical Engineering and.
Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty.
Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
NSF Foundations of Hybrid and Embedded Software Systems UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI A New System Science.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
CS overview - Fall 2006 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
Computer Science Prof. Bill Pugh Dept. of Computer Science.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Pervasive Pixels Henning Schulzrinne (PI) Steven K. Feiner Gail Kaiser John Kender Kathleen McKeown Department of Computer Science Columbia University.
CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
- October 22, 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Robots at Work Dr Gerard McKee Active Robotics Laboratory School of Systems Engineering The University of Reading, UK
For further information: Infrastructure and Information Science Infrastructure: –Civil Infrastructure Engineering –Transportation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Information Technology
1 CMPE1 Hands-on Computer Engineering Stephen Petersen Richard Hughey.
TEMPUS JEP : TEACHING BUSINESS INFORMATION SYSTEMS CURRICULUM DEVELOPMENT Information Technology courses Second Project Meeting, Belgrade, January.
Introduction to Computer and Programming CS-101 Lecture 6 By : Lecturer : Omer Salih Dawood Department of Computer Science College of Arts and Science.
CS 21a: Intro to Computing I Department of Information Systems and Computer Science Ateneo de Manila University.
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
Designing Active Directory for Security
COLUMBIA UNIVERSITY Computer Engineering Program The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Computer Engineering:
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CS orientation - Fall 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MECHATRONICS Lecture 02 Slovak University of Technology Faculty of Material Science and Technology in Trnava.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.
Haptic Interfaces and Force-Control Robotic Application in Medical and Industrial Contexts Applicants Prof. Doo Yong Lee, KAIST Prof. Rolf Johansson,
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
CS overview - Fall 2008 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Algorithmic, Game-theoretic and Logical Foundations
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Database Research Overview Database Systems R&D Center Dept. of Computer & Information Science & Engineering College of Engineering University of Florida.
Henning Schulzrinne, Chair Department of Computer Science December 1, 2005 Computer Science at Columbia University.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Columbia University Department of Computer Science Henning Schulzrinne 2001 NSF CISE/EIA RI PI’s Workshop.
Sub-fields of computer science. Sub-fields of computer science.
Department of Computer Science
Computer Science Courses
Columbia University Department of Computer Science
Big Ideas in Computer Science
CS 21a: Intro to Computing I
PLANNING A SECURE BASELINE INSTALLATION
Computer Science Dr Hwang Chair, Computer Science Department
Presentation transcript:

CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University 2005

CS overview - Fall 2005 Columbia Computer Science in Numbers ~34 full-time faculty and lecturers + visitors, postdocs, adjunct faculty, joint appointments (EE, IEOR), … 125 PhD students (~10 new arrivals) 221 MS students (120 new arrivals) 148 CS undergraduate majors + 49 computer engineering students

CS overview - Fall 2005 Faculty: 34 (31 tenure track, 3 lecturers) + 3 joint AhoAllen CarloniFeiner GravanoGross Grunschlag McKeown KenderKaiser NayarRamamoorthi Servedio Schulzrinne Ross Nowick StolfoShortliffe Keromytis NiehMalkin Hirschberg Rubenstein Yemini Misra Wozniakowski Unger Stein Jebara Belhumeur Edwards Traub Yannakakis CannonGalil Grinspun Bellovin

CS overview - Fall 2005 Interacting with Humans (5) Interacting with Humans (5) Designing Digital Systems (4) Designing Digital Systems (4) Systems (11) Systems (11) Interacting with the Physical World (9) Interacting with the Physical World (9) Computer Science Theory (8) Research Making Sense of Data (7) Making Sense of Data (7)

CS overview - Fall 2005 Research areas Interacting with the Physical World graphics, robotics, vision Allen, Belhumeur, Feiner, Grinspun, Grunschlag, Jebara, Kender, Nayar, Ramamoorthi Interacting with Humans user interfaces, natural language and speech processing, collaborative work, personalized agents Feiner, Hirschberg, Kaiser, Kender, McKeown Systems networks, distributed systems, security, compilers, software engineering, programming languages, OS Aho, Bellovin, Edwards, Kaiser, Keromytis, Malkin, Misra, Nieh, Schulzrinne, Stolfo, Yemini Designing Digital Systems digital and VLSI design, CAD, asynchronous circuits, embedded systems Carloni, Edwards, Nowick, Unger Making Sense of Data databases, data mining, Web search, machine learning applications Cannon, Gravano, Jebara, Kaiser, Ross, Servedio, Stolfo Computer Science Theory cryptography, quantum computing, complexity, machine learning theory, graph theory, algorithms Aho, Galil, Gross, Malkin, Servedio, Traub, Wozniakowski, Yannakakis

CS overview - Fall 2005 CCLS: A Research Center in CS The Center for Computational Learning Systems (CCLS) aims to be a world leader in learning and data mining research and the application of this research to natural language understanding, the World Wide Web, bioinformatics, systems security and other emerging areas. CCLS will emphasize interdisciplinary efforts with other departments at Columbia, and will leverage Columbia's CS Department's strengths in learning, data mining and natural language processing, extending the effective size and scope of the Department's research effort.

CS overview - Fall 2005 Research Making Sense of Data (7) Making Sense of Data (7)

CS overview - Fall 2005 Columbia’s Database Group Faculty Luis Gravano Ken Ross Mihalis Yannakakis Ph.D. Students John Cieslewicz Wisam Dakka Alpa Jain Julia Stoyanovich Databases, data mining, information retrieval, web search

CS overview - Fall 2005 Some Projects in Gravano’s “Subgroup” Snowball, an information-extraction system QProber, a system for classifying and searching “hidden-web” databases SDARTS, a protocol and toolkit for metasearching/distributed information retrieval RANK: “top-k” query processing

CS overview - Fall 2005 Interacting with Humans (5) Interacting with Humans (5) Interacting with the Physical World (9) Interacting with the Physical World (9) Research

CS overview - Fall 2005 Mobile Robotics Robotic Crystal Mounting 3-D Site Modeling Graspit! Simulator Computer Aided Surgery

CS overview - Fall 2005 Current Projects: 1. 3-D Modeling: Combining laser scanning and computer vision to create photorealistic models. Current NSF ITR project includes scanning Beauvais Cathedral in France and ancient ruins in Sicily 2. Robotic and human hand simulation using our Graspit! simulator which includes full dynamics, grasp quality measures, and grasp learning 3. Microscale protein crystal mounting using visual control. Microscope camera used to track/pick up very small crystals for x-ray diffraction 4. AVENUE mobile scanning robot: automating the site modeling process using GPS, wireless network, computer vision and range scanning 5. New insertable stereo cameras with pan, tilt and translation for minimally- invasive surgery People: Postdocs: Atanas Georgiev and Andrew Miller GRA’s: Paul Blaer, Alejandro Troccoli, Ben Smith M.S.: Rafi Pelosoff, Alex Haubald Prof. Peter Allen

CS overview - Fall 2005 Goal: Creating intelligent machines and systems Collaborative Research: Currently working with: Molecular Biology (crystal mounting) Art History (3D Modeling) Biomechanics (human hand simulation) Surgery (next-generation surgical imaging) One of the labs affiliated with CVGC (Columbia Vision and Graphics Center) Research opportunities include a wide range of software, hardware and systems projects. Expertise in robotics, graphics, or vision is helpful

CS overview - Fall 2005 Insertable Imaging and Effector Platforms for Robotic Surgery Peter Allen Dennis Fowler (Dept. of Surgery) Andrew Miller

CS overview - Fall 2005 Current Paradigm Current Laparoscopic Paradigm Multiple holes/insertion points Ports needed for each camera, instrument involved Limited range of motion at incision Pushing long sticks into small openings is still the idea!!! Assistant(s) needed to control camera Monocular viewing Works well - but can we do better?

CS overview - Fall 2005 Next Generation Imaging Device Insertable unit 5 Degrees-of-freedom: 2 pan, 1 tilt, 2 translate Stereo Cameras More mobility for imaging Frees up incision port for other tooling

CS overview - Fall 2005 Single Camera Prototype Video Diameter: 18mm; Length: 19cm Camera opening: 5.8cm Pan: 120°; Tilt: 130°; Translation: 5cm

CS overview - Fall 2005 Computer Graphics and User Interfaces Lab S. Feiner, H. Benko, G. Blaskó, S. Güven, D. Hallaway, E. Ishak, S. White Wearable UIs Augmented reality Virtual reality

CS overview - Fall 2005 Computer Graphics and User Interfaces Lab S. Feiner, H. Benko, G. Blaskó, S. Güven, D. Hallaway, E. Ishak, S. White Automated generation of graphics Display layout Coordination with text generation

CS overview - Fall 2005 Topics Support Vector Machines and Kernel Methods Representation Learning x x x  ’’ **

CS overview - Fall 2005 Computer Vision, Tracking People and Understanding Video Discriminative Graphical Models Topics

CS overview - Fall 2005 Computer Graphics Group Profs. Grinspun & Ramamoorthi Fundamental methods and math Rendering: how does the world appear to us? Rendering: how does the world appear to us?

CS overview - Fall 2005 Computer Graphics Group Simulation/animation: how does the world behave? Simulation/animation: how does the world behave?

CS overview - Fall 2005 Computer Graphics Group geometric modeling: representing and computing on geometric objects geometric modeling: representing and computing on geometric objects

CS overview - Fall 2005 Systems (11) Systems (11) Research

CS overview - Fall 2005 Gail Kaiser: Programming Systems Lab Develop and empirically evaluate methodologies and technologies to enable “better, faster, cheaper” development and maintenance of large-scale software systems Seeking PhD, MS or advanced undergraduate students with substantial “real world” systems programming experience Also seeking students with background in electricity distribution and other energy (e.g., power engineering) self-managing systems ("autonomic computing") publish/subscribe event systems security Web technologies collaborative work information management distributed systems software development environments and tools  Projects often multi-disciplinary and joint with other faculty Rocco Servedio External Review Jan 2003

CS overview - Fall 2005 Networking research at Columbia University Columbia Networking Research Center spans EE + CS 15 faculty – one of the largest networking research groups in the US about 40 PhDs spanning optical networks to operating systems and applications theory (performance analysis) to systems (software, protocols)

CS overview - Fall 2005 Network Computing Laboratory Operating Systems Distributed Systems Scheduling and Resource Management Thin-Client and Network Computing Web and Multimedia Systems Performance Evaluation

CS overview - Fall 2005 Network Computing Laboratory Recent Research Projects Zap: Transparent process migration VNAT: Mobile networking GR3: O(1) proportional share scheduling Thinc: WAN remote display protocol Certes: Inferring web client response times

CS overview - Fall 2005 Columbia Intrusion Detection Lab (Sal Stolfo) Attackers continue to improve techniques undeterred – Present COTS security defenses are porous and suffer from the false negative problem There is no one monolithic security solution; security is a design criteria at all layers of the stack and across multiple sites Behavior-based computer security will substantially raise the bar Columbia conducts a broad spectrum of research related to securing critical infrastructure in close collaboration with industry and government with attention to practical and deployable results Visit:

CS overview - Fall 2005 Columbia Intrusion Detection Lab: Anomaly Detection for Zero-Day Attack Worminator Cross Domain Security Alert Sharing infrastructure Modeling of attacker intent, and precursors to attack PAYL – Payload Anomaly Detection Behavior-based detection of “abnormal” traffic Zero-day exploits detected in network packet data flows EMT – Mining Toolkit Forensic analysis of logs for profile and model generation Comparison of profiles/models Detect malicious users/groups and aliases

CS overview - Fall 2005 EMT: Mining Forensic Analysis Prof Sal Stolfo Columbia University Computer Science Department

CS overview - Fall 2005 EMT Forensics Automatic system to acquire data for study in a forensic environment Scalable to 100,000’s of s and attachments Automatically supports forensic tasks to be completed in seconds with analyst control over all variables and features Java-based application for collection, analysis, and reporting in one integrated solution Pluggable architecture with API for easy customized extensions Main View of Archive

CS overview - Fall 2005 What might EMT do… Forensic analysis tasks for regulatory compliance Which accounts are most important Which accounts are behaving anomalously Interesting behaviors between members of a social clique (clique violation or usage violation) Who belongs to very many cliques Who are the most important people in an organization and how do they behave?

CS overview - Fall 2005 What might EMT do… Managing organization information flow Who communicates regularly with whom Who has read my How does flow through my organization How does flow over time?

CS overview - Fall 2005 Network Security Lab Prof. Angelos D. Keromytis Applied research in security, networking, operating systems Emphasis on systems and on building stuff Main research projects Self-healing software and software security Application on countering network viruses/worms Network denial of service Currently 6 Ph.D. students (Cook, Locasto, Burnside, Stavrou, Sidiroglou, Androulaki) Closely affiliated faculty: Stolfo, Bellovin, Ioannidis (CCLS), Yung

CS overview - Fall 2005 NSL Projects Self-healing software Enable legacy software to learn from its failures and improve itself over time, without human intervention! Network Worm Vaccine Limit worm infection rate via anomaly detection engine and automatic patching of vulnerable software, based on self-healing concepts Resilience Against Denial of Service Attacks Use network overlays as a mechanism for separating good and “bad” traffic High-speed I/O: The Operating System As a Signaling Mechanism New OS architecture - remove memory and CPU from data path Efficient Cryptography Design and implementation of ciphers for specific environments - use of graphics cards, variable size block ciphers, IXP processor Collaborative Distributed Intrusion Detection Identifying global attack activity as well as “low and slow” scans via shared intrusion alerts across administrative domains

CS overview - Fall 2005 Network Worm Vaccine

CS overview - Fall 2005 Network Worm Vaccine

CS overview - Fall 2005 Network Worm Vaccine

CS overview - Fall 2005 IRT real-time laboratory (IRT) Internet multimedia protocols and systems Internet telephony signaling and services application sharing, 911 systems Ubiquitous communication Peer-to-peer IP telephony Wireless and ad-hoc networks VoIP hand-off acceleration Quality of service multicast, scalable signaling, … Service discovery and location-based services DOS prevention and traceback

CS overview - Fall 2005 Distributed Network Analysis (DNA) Prof. Vishal Misra, Dan Rubenstein Expertise in mathematical modeling of communication/network systems Also do prototyping/experimentation to validate theory Topics: Resilient and Secure Networking Wireless (802.11, Mesh) Sensor Networks Overlay and P2P Networking Server Farms Analytical Techniques Stochastics Algorithms Control Theory, Queueing Theory, Information Theory Whatever else might be needed…

CS overview - Fall 2005 Designing Digital Systems (4) Designing Digital Systems (4) Research

CS overview - Fall 2005 Asynchronous Circuits & Systems Group Asynchronous Circuits & Systems Group Prof. Steven Nowick Research in clockless digital systems Most digital systems are synchronous = have a global clock Potential benefits of asynchronous systems: Modular “plug-and-play” design: assemble components, no global timing concerns Low power: no burning of clock power, components only activated on demand High speed: not restricted by fixed clock speed Challenges: new techniques needed New “CAD” (computer-aided design) software tools to aid designers New circuit design styles

CS overview - Fall 2005 Asynchronous Circuits & Systems Group CAD Tools: Software tools + optimization algorithms Allow automated ‘push-button’ circuit synthesis + optimization For individual controllers (state machines), for entire systems (processors) Circuit Designs: New techniques to design asynchronous circuits (adders, multipliers) Interface circuits: for mixing synchronous + asynchronous subsystems Very high-speed pipelines: several GHz

CS overview - Fall 2005 Computer Science Theory (8) Research

CS overview - Fall 2005 Tal Malkin: Cryptography Crypto group  Theory group  Secure Systems Lab Crypto = construct computation and communication efficient schemes maintaining desired functionality even in adversarial environment (e.g., public key encryption, secure computation, authentication, contract signing, voting, e-commerce, …) Motivation and Goals  security, privacy, social, financial, political needs Solutions  rigorous, theoretical approach Research themes: Definitions (identify, conceptualize, formalize goals) Protocol design (efficiency and provable security) Foundations (complexity, assumptions, limits)  Search for both positive and negative results

CS overview - Fall 2005 Tal Malkin: Examples of Research Topics Protecting against temporal or partial key exposure: key-evolving (e.g., forward-secure) schemes to mitigate damage of key leakage. Protecting against key manipulation or tampering attacks: algorithmic defense against physical attacks on keying material. Private information retrieval: keep user’s interests private even from database holder. Relations among cryptographic primitives: reductions and oracle separations; minimal assumptions for cryptographic tasks. Secure computation of approximations, completeness for multi-party computation, multicast encryption, anonymous routing, intrusion detection, steganography, … For more information: take crypto class this fall, contact Prof. Malkin, check out

CS overview - Fall 2005 Rocco Servedio: Theory of Computing Rocco Servedio: Theory of Computing Main research goal: design and analyze provably correct and efficient learning algorithms for interesting and important classes of functions Boolean formulas AND OR AND ………………………….. x1x1 AND xnxn …………………………………………. Rocco Servedio External Review Jan geometric concepts v4v4 v2v2 v6v6 v1v1 v2v2 v3v decision trees

CS overview - Fall 2005 Rocco Servedio: Theory of Computing Main approach: explore & exploit connections between computational learning theory and other areas of CS theory Complexity theory: representation schemes studied in complexity theory (Fourier representations, polynomial threshold functions) are useful for learning Cryptography: basis for robust hardness results for learning problems Quantum computation: quantum algorithms can efficiently solve learning problems which classical algorithms provably cannot