Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty.

Slides:



Advertisements
Similar presentations
News and Blog Analysis with Lydia Steven Skiena Dept. of Computer Science SUNY Stony Brook
Advertisements

4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Component-Based Software Engineering Oxygen Paul Krause.
- October 22, 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty.
CS4705 Natural Language Processing Fall What will we study in this course? How can machines recognize and generate text and speech? – Human language.
Massive Data Analysis Lab (MassDAL) S. Muthukrishnan CS Dept.
CS overview - Fall 2006 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Pervasive Pixels Henning Schulzrinne (PI) Steven K. Feiner Gail Kaiser John Kender Kathleen McKeown Department of Computer Science Columbia University.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
CS overview - Fall 2005 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
- October 22, 2004 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
Network, Operations and Security Area Tony Rimovsky NOS Area Director
Introduction to Computer and Programming CS-101 Lecture 6 By : Lecturer : Omer Salih Dawood Department of Computer Science College of Arts and Science.
CS598CXZ Course Summary ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
The Internet and E-Commerce Back to Table of Contents.
Research at Department of Computer and Systems Sciences – DSV.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
SMUCSE 8344 Wireless Mesh. SMUCSE 8344 The Premise.
Networks for Security Applications Defense Security Innovation Quebec City, Nov. 16, 2007 Prof. Howard M. Schwartz.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Sharad Oberoi and Susan Finger Carnegie Mellon University DesignWebs: Towards the Creation of an Interactive Navigational Tool to assist and support Engineering.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Wireless Networks Breakout Session Summary September 21, 2012.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Cryptography and Network Security (CS435) Part One (Introduction)
Research Topics CSC Parallel Computing & Compilers CSC 3990.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
COGNITIVE RADIO NETWORKING AND RENDEZVOUS Presented by Vinay chekuri.
Cooperation & Competition in building the Web, « the universe of network-accessible information » Jean-François Abramatic Chief Product Officer ILOG.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
CS overview - Fall 2008 The Department of Computer Science at Columbia University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
1 Language, Science and Data Science Kathleen McKeown Department of Computer Science Columbia University.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Computer New Student Orientation. Overview Our degree programs Jobs in the Computing Field Student Projects Faculty Research.
1 CS145 Lecture 24 What’s next?. 2  What questions does Computer Science study?  Where is programming and Computer Science headed? –With special emphasis.
1 CS145 Lecture 26 What’s next?. 2 What software questions do we study? Where is software headed?
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Network, Operations and Security Area Tony Rimovsky NOS Area Director
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Henning Schulzrinne, Chair Department of Computer Science December 1, 2005 Computer Science at Columbia University.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
  Computer vision is a field that includes methods for acquiring,prcessing, analyzing, and understanding images and, in general, high-dimensional data.
AQUAINT Mid-Year PI Meeting – June 2002 Integrating Robust Semantics, Event Detection, Information Fusion, and Summarization for Multimedia Question Answering.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY IT with a human touch 2010.
Columbia University Department of Computer Science Henning Schulzrinne 2001 NSF CISE/EIA RI PI’s Workshop.
Models of Models: Digital Forensics and Domain-Specific Languages
University of Maryland College Park
Department of Computer Science
Computer Science Courses
Columbia University Department of Computer Science
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Predicting Miscellaneous Electrical Loads (MELs) in Commercial Buildings: A Time Series Analysis Presented by: Behzad Esmaeili, Ph.D. April 26th, 2018.
Jana Diesner, PhD Associate Professor, UIUC
Computer Science Courses in the Major
Presentation transcript:

Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty Roundtable

Columbia CS Computer Science Research Highlights Comprehensive research, with areas of focus Leading research in –Natural language processing –Mobile and wireless computing –Designing digital systems –Network security Growing Research Impact

Columbia CS Faculty: 35 (32 tenure track, 3 lecturers) + 3 joint AhoAllen CarloniFeiner GravanoGross Grunschlag McKeown KenderKaiser NayarRamamoorthi Servedio Schulzrinne Ross Nowick StolfoShortliffe Keromytis NiehMalkin Hirschberg Rubenstein Yemini Misra Wozniakowski Unger Stein Jebara Belhumeur Edwards Traub Yannakakis CannonGalil Grinspun Bellovin

Columbia CS Interacting with The Physical World (9) Interacting with Humans (5 faculty) Systems (11) Designing Digital Systems (4) Making Sense of Data (7) Computer Science Theory (8) Columbia Computer Science Research graphics, robotics, vision UI, NLP, collab work networks, security, OS, software eng CAD, async circuits, embedded systems databases, data mining, machine learning quantum computing, crypto, learning, algorithms

Columbia CS Interacting with Humans: Newsblaster Automatic summarization of articles on the same event Generation of summary sentences Tracking events across days Foreign news  English summaries Faculty: Kathy McKeown

Columbia CS Interacting with Humans: Newsblaster Research Findings Quality of facts gathered significantly better –With Newsblaster than with no summaries User satisfaction higher –With Newsblaster sentence summaries than Google style 1- sentence summaries Summaries contributed important facts –With Newsblaster than Google summaries Full multi-document summarization more powerful than documents alone or single sentence summarization

Columbia CS Interacting with Humans: Detecting Deceptive Speech Problem: –Can we detect deception from spoken language cues only? Method: –Collect corpus of deceptive/non-deceptive speech –Extract acoustic, prosodic and lexical features automatically E.g., disfluencies, response latency, high pitch range, lower intensity, laughter, personal pronouns –Run Machine Learning experiments to create automatic prediction models and test on held-out data Results: –Baselines: Best general human performance in literature ranges from criminals (65% accuracy) down to parole officers (40%) Majority class, our data (predict truth): 61% Mean human performance, our data: 60% –Our (automatic) results: 69% Faculty: Julia Hirschberg

Columbia CS Interacting with Humans: Learning to Match Authors Entity Resolution of Anonymized Publications 7 Teams: UMass, Maryland, Fair-Isaac, Illinois, Rutgers, CMU, Columbia Columbia Error rate Key 1 - Permutational Text Kernels 2 - Permutational Clustering 3 - SVM Source: 2005 KDD Challenge Faculty: Tony Jebara

Columbia CS CEPSR research building Channel Allocation Protocol TCP/IP MCL* card A802.11card B NDIS**DevCon Windows XP Multi-radio mesh node Channel scarcity  need automated channel allocation in mesh networks Allocates radios by self-stabilizing algorithm based on graph coloring Results First self-organizing mechanism & implementation Network self-organizes in seconds Network throughput improvement of % cf. static channel allocation Collaborators: Victor Bahl and Jitendra MSR Systems: Distributed Channel Allocation in Mobile Mesh Networks Faculty: Misra/Rubenstein

Columbia CS Systems: Evolution of VoIP “amazing – the phone rings” “does it do call transfer?” “how can I make it stop ringing?” catching up with the digital PBX long-distance calling, ca going beyond the black phone Faculty: Henning Schulzrinne

Columbia CS Systems: Creating new services for VoIP Old telecom model: –Programmers create mass-market applications –new service each decade Our (web) model: –Users and administrators create universe of tailored applications Incorporate human context: –location, mood, actions, … “FrontPage for service creation” –Based on presence, location, privacy preferences –Learn based on user actions

Columbia CS Systems: Self-healing Software Problem: zero-day attacks Approach: Enable systems to react and self-heal in response to unanticipated attacks and failures, via: –Coordinated access control in large-scale systems –Block-level system reconfiguration –Self-healing software systems –Application communities: enable large numbers of identical applications to collaboratively monitor their health and share alerts Prototypes: worms, software survivability Faculty: Angelos Keromytis, Sal Stolfo

Columbia CS Site B Site C Site A Surveillance detected at site A Surveillance detected at site B Surveillance detected at site C Common sources of scans for all three sites Profile and signature generation for defense Faculty: Sal Stolfo Systems: Developing Profiles of Attackers Worms use hit lists to reduce spread time Gathered in stealth  Collaborative and distributed intrusion detection Leverage header and payload anomaly

Columbia CS Theory: Leveraging Cryptography Traditional cryptography  provable security of protocols, but assumes a clean, controlled model –Key exposure causes more security breaches than cryptanalysis smartcards, PDAs can easily leak keys  Expand theoretical foundations to capture provable security against strong, realistic attackers, including: –Key exposure –Key tampering –Security against side channel attacks (power, timing analysis) –Security in an Internet-like setting when attacker can coordinate across several protocols Faculty: Tal Malkin

Columbia CS Columbia’s Growing Computer Science Research Impact Technology impact through start-ups security, network management, thin clients, VoIP, … standardization VoIP, security, … education government Industrial research gifts

Columbia CS Conclusion Broad-based research motivated by real problems Breaking new ground in several key areas, e.g.: –Natural language processing –New network services and models –Network security –Graphics & vision Columbia has a growing impact on computer science as demonstrated in successfully bringing new technology to the field