the department of computer science at columbia university

50
CS overview - Fall 2005 The Department of Computer The Department of Computer Science at Columbia Science at Columbia University University Henning Schulzrinne, Chair Dept. of Computer Science Columbia University 2005

Upload: miach

Post on 23-Jan-2016

45 views

Category:

Documents


0 download

DESCRIPTION

The Department of Computer Science at Columbia University. Henning Schulzrinne, Chair Dept. of Computer Science Columbia University 2005. Columbia Computer Science in Numbers. ~34 full-time faculty and lecturers + visitors, postdocs, adjunct faculty, joint appointments (EE, IEOR), … - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Department of Computer Science at Columbia University

CS overview - Fall 2005

The Department of Computer The Department of Computer Science at Columbia UniversityScience at Columbia University

Henning Schulzrinne, ChairDept. of Computer Science

Columbia University2005

Page 2: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Columbia Computer Science in Columbia Computer Science in NumbersNumbers

~34 full-time faculty and lecturers + visitors, postdocs, adjunct faculty,

joint appointments (EE, IEOR), … 125 PhD students (~10 new

arrivals) 221 MS students (120 new arrivals) 148 CS undergraduate majors

+ 49 computer engineering students

Page 3: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Faculty: 34 (31 tenure track, 3 lecturers) + 3 jointFaculty: 34 (31 tenure track, 3 lecturers) + 3 joint

Aho Allen Carloni Feiner

Gravano Gross Grunschlag

McKeown

KenderKaiser

Nayar Ramamoorthi

Servedio Schulzrinn

e

Ross Nowick

StolfoShortliffe

Keromytis

NiehMalkin

Hirschberg

Rubenstein

Yemini

Misra

Wozniakowski Unger

Stein

Jebara

Belhumeur Edwards

Traub Yannakakis

Cannon Galil

Grinspun

Bellovin

Page 4: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Interacting withHumans

(5)

Interacting withHumans

(5)

DesigningDigital Systems

(4)

DesigningDigital Systems

(4)

Systems(11)

Systems(11)

Interacting withthe Physical World

(9)

Interacting withthe Physical World

(9)

ComputerScienceTheory

(8)

Research

Making Senseof Data

(7)

Making Senseof Data

(7)

Page 5: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Research areasResearch areasInteracting with the Physical World

graphics, robotics, vision Allen, Belhumeur, Feiner, Grinspun, Grunschlag, Jebara, Kender, Nayar, Ramamoorthi

Interacting with Humans

user interfaces, natural language and speech processing, collaborative work, personalized agents

Feiner, Hirschberg, Kaiser, Kender, McKeown

Systems networks, distributed systems, security, compilers, software engineering, programming languages, OS

Aho, Bellovin, Edwards, Kaiser, Keromytis, Malkin, Misra, Nieh, Schulzrinne, Stolfo, Yemini

Designing Digital Systems

digital and VLSI design, CAD, asynchronous circuits, embedded systems

Carloni, Edwards, Nowick, Unger

Making Sense of Data

databases, data mining, Web search, machine learning applications

Cannon, Gravano, Jebara, Kaiser, Ross, Servedio, Stolfo

Computer Science Theory

cryptography, quantum computing, complexity, machine learning theory, graph theory, algorithms

Aho, Galil, Gross, Malkin, Servedio, Traub, Wozniakowski, Yannakakis

Page 6: The Department of Computer Science at Columbia University

CS overview - Fall 2005

CCLS: A Research Center in CSCCLS: A Research Center in CS

The Center for Computational Learning Systems (CCLS) aims to be a world leader in learning and data mining research and the application of this research to natural language understanding, the World Wide Web, bioinformatics, systems security and other emerging areas. CCLS will emphasize interdisciplinary efforts with other departments at Columbia, and will leverage Columbia's CS Department's strengths in learning, data mining and natural language processing, extending the effective size and scope of the Department's research effort.

Page 7: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Research

Making Senseof Data

(7)

Making Senseof Data

(7)

Page 8: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Columbia’s Database GroupColumbia’s Database Grouphttp://www.cs.columbia.edu/databasehttp://www.cs.columbia.edu/database

FacultyLuis GravanoKen RossMihalis Yannakakis

Ph.D. StudentsJohn CieslewiczWisam DakkaAlpa JainJulia Stoyanovich

Databases, data mining,information retrieval, web search

Page 9: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Some Projects in Gravano’s “Subgroup”Some Projects in Gravano’s “Subgroup” http://www.cs.columbia.edu/~gravanohttp://www.cs.columbia.edu/~gravano

Snowball, an information-extraction systemhttp://snowball.cs.columbia.edu

QProber, a system for classifying and searching “hidden-web” databaseshttp://qprober.cs.columbia.edu

SDARTS, a protocol and toolkit for metasearching/distributed information retrievalhttp://sdarts.cs.columbia.edu

RANK: “top-k” query processinghttp://rank.cs.columbia.edu

Page 10: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Interacting withHumans

(5)

Interacting withHumans

(5)

Interacting withthe Physical World

(9)

Interacting withthe Physical World

(9)

Research

Page 11: The Department of Computer Science at Columbia University

CS overview - Fall 2005 Mobile RoboticsRobotic Crystal Mounting

3-D Site Modeling

Graspit! Simulator

Computer AidedSurgery

Page 12: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Current Projects:1. 3-D Modeling: Combining laser scanning and computer vision to

create photorealistic models. Current NSF ITR project includes scanning Beauvais Cathedral in France and ancient ruins in Sicily

2. Robotic and human hand simulation using our Graspit! simulator which includes full dynamics, grasp quality measures, and grasp learning

3. Microscale protein crystal mounting using visual control. Microscope camera used to track/pick up very small crystals for x-ray diffraction

4. AVENUE mobile scanning robot: automating the site modeling process using GPS, wireless network, computer vision and range scanning

5. New insertable stereo cameras with pan, tilt and translation for minimally-invasive surgery

People:• Postdocs: Atanas Georgiev and Andrew Miller• GRA’s: Paul Blaer, Alejandro Troccoli, Ben Smith• M.S.: Rafi Pelosoff, Alex Haubald

Prof. Peter Allen

Page 13: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Goal: Creating intelligent machines and systemsCollaborative Research: Currently working with:• Molecular Biology (crystal mounting)• Art History (3D Modeling)• Biomechanics (human hand simulation)• Surgery (next-generation surgical imaging)One of the labs affiliated with CVGC (Columbia Vision and

Graphics Center)Research opportunities include a wide range of software, hardware and systems projects.

Expertise in robotics, graphics, or vision is helpful

Page 14: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Insertable Imaging and Effector Platforms for Robotic Surgery

Peter Allen Dennis Fowler (Dept. of

Surgery)Andrew Miller

http://www.cs.columbia.edu/roboticshttp://www.cs.columbia.edu/robotics

Page 15: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Current Current Laparoscopic Paradigm Paradigm

Multiple holes/insertion points Ports needed for each camera,

instrument involved Limited range of motion at

incision Pushing long sticks into small

openings is still the idea!!! Assistant(s) needed to control

camera Monocular viewing Works well - but can we do

better?

Page 16: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Next Generation Imaging Device

•Insertable unit•5 Degrees-of-freedom: 2 pan, 1 tilt, 2 translate•Stereo Cameras•More mobility for imaging•Frees up incision port for other tooling

Page 17: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Single Camera Prototype

Video

Diameter: 18mm; Length: 19cmCamera opening: 5.8cmPan: 120°; Tilt: 130°; Translation: 5cm

Page 18: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Computer Graphics and User Interfaces LabComputer Graphics and User Interfaces LabS. Feiner, H. Benko, G. Blaskó, S. Güven, D. Hallaway,S. Feiner, H. Benko, G. Blaskó, S. Güven, D. Hallaway,E. Ishak, S. WhiteE. Ishak, S. White

Wearable UIs Augmented

reality Virtual reality

Page 19: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Computer Graphics and User Interfaces LabComputer Graphics and User Interfaces LabS. Feiner, H. Benko, G. Blaskó, S. Güven, D. Hallaway,S. Feiner, H. Benko, G. Blaskó, S. Güven, D. Hallaway,E. Ishak, S. WhiteE. Ishak, S. White

Automated generation of graphics

Display layout Coordination with

text generation

Page 20: The Department of Computer Science at Columbia University

CS overview - Fall 2005

TopicsSupport Vector Machines and Kernel Methods

Representation Learning

( )0,P Q g

The Admissible Set

( ),P Q g

xxx

’*( )|p x q 1x

1s

2x

2s

3x

3s

4x

4s

0x

0s

1u 2u 3u 4u0u

Page 21: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Computer Vision, Tracking People and Understanding Video

Discriminative Graphical Models

Topics

20y

30y

40y

11y

21y

31y

41y

10y

20x

30x

40x

11x

21x

31x

41x

10s

10x

20s

30s

40s

11s

21s

31s

41s

1,20s 3,4

0s3,41s

1,21s

0s 1s

Page 22: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Computer Graphics GroupComputer Graphics Group

Profs. Grinspun & Ramamoorthi Fundamental methods and math

Rendering:how does the world appear to us?

Rendering:how does the world appear to us?

Page 23: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Computer Graphics GroupComputer Graphics Group

Simulation/animation:how does the world behave?

Simulation/animation:how does the world behave?

Page 24: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Computer Graphics GroupComputer Graphics Group

geometric modeling:representing and computing on geometric objects

geometric modeling:representing and computing on geometric objects

Page 25: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Systems(11)

Systems(11)

Research

Page 26: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Gail Kaiser:Gail Kaiser:Programming Systems LabProgramming Systems Lab

Develop and empirically evaluate methodologies and technologies to enable “better, faster, cheaper” development and maintenance of large-scale software systems

Seeking PhD, MS or advanced undergraduate students with substantial “real world” systems programming experience

Also seeking students with background in electricity distribution and other energy (e.g., power engineering)

self-managing systems ("autonomic computing")

publish/subscribe event systems

security Web technologies collaborative work information management distributed systems software development

environments and tools Projects often multi-

disciplinary and joint with other faculty

Page 27: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Networking research at Columbia Networking research at Columbia UniversityUniversity

Columbia Networking Research Center

spans EE + CS 15 faculty – one of the largest

networking research groups in the US

about 40 PhDs spanning optical networks to

operating systems and applications theory (performance analysis) to

systems (software, protocols)

Page 28: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Network Computing LaboratoryNetwork Computing Laboratoryhttp://www.ncl.cs.columbia.eduhttp://www.ncl.cs.columbia.edu

Operating Systems Distributed Systems Scheduling and Resource

Management Thin-Client and Network

Computing Web and Multimedia Systems Performance Evaluation

Page 29: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Network Computing LaboratoryNetwork Computing LaboratoryRecent Research ProjectsRecent Research Projects

Zap: Transparent process migration VNAT: Mobile networking GR3: O(1) proportional share

scheduling Thinc: WAN remote display protocol Certes: Inferring web client response

times

Page 30: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Columbia Intrusion Detection Lab (Sal Columbia Intrusion Detection Lab (Sal Stolfo)Stolfo)

Attackers continue to improve techniques undeterred – Present COTS security defenses are porous and suffer

from the false negative problem There is no one monolithic security solution; security is

a design criteria at all layers of the stack and across multiple sites

Behavior-based computer security will substantially raise the bar

Columbia conducts a broad spectrum of research related to securing critical infrastructure in close collaboration with industry and government with attention to practical and deployable results

Visit: http://www.cs.columbia.edu/faculty http://www.cs.columbia.edu/ids http://worminator.cs.columbia.edu

Page 31: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Columbia Intrusion Detection Lab: Columbia Intrusion Detection Lab: Anomaly Detection for Zero-Day AttackAnomaly Detection for Zero-Day Attack

Worminator Cross Domain Security Alert

Sharing infrastructure Modeling of attacker intent, and

precursors to attack

PAYL – Payload Anomaly Detection

Behavior-based detection of “abnormal” traffic

Zero-day exploits detected in network packet data flows

EMT – Email Mining Toolkit Forensic analysis of email logs

for profile and model generation

Comparison of profiles/models Detect malicious users/groups

and aliases

0101010010110101010010101010101001010110001101011010100010110100010000

0101010010110101010010101010101001010110001101011010100010110100010000

0101010010110101010010101010101001010110001101011010100010110100010000

0101010010110101010010101010101001010110001101011010100010110100010000

0101010010110101010010101010101001010110001101011010100010110100010000

0101010010110101010010101010101001010110001101011010100010110100010000

E.....@ .t.B.D ...)...P.D {.P.@ .....G ET./d efa u lt.id a ? XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

PAYLPAYL C o lu m b ia U n iv e rs ity ID S g ro u ph ttp ://w w w .c s .c o lu m b ia .e d u / id s

Page 32: The Department of Computer Science at Columbia University

CS overview - Fall 2005

EMT: Email Mining Forensic EMT: Email Mining Forensic AnalysisAnalysis

Prof Sal StolfoColumbia University

Computer Science Department

212.939.7080/[email protected]

Page 33: The Department of Computer Science at Columbia University

CS overview - Fall 2005

EMT ForensicsEMT Forensics

Automatic system to acquire email data for study in a forensic environment

Scalable to 100,000’s of emails and attachments

Automatically supports forensic tasks to be completed in seconds with analyst control over all variables and features

Java-based application for email collection, analysis, and reporting in one integrated solution

Pluggable architecture with API for easy customized extensions

Main View of Email Archive

Page 34: The Department of Computer Science at Columbia University

CS overview - Fall 2005

What might EMT do…What might EMT do…

Forensic analysis tasks for regulatory compliance

Which accounts are most important

Which accounts are behaving anomalously

Interesting behaviors between members of a social clique (clique violation or usage violation)

Who belongs to very many cliques

Who are the most important people in an organization and how do they behave?

Page 35: The Department of Computer Science at Columbia University

CS overview - Fall 2005

What might EMT do…What might EMT do…

Managing organization information flow Who

communicates regularly with whom

Who has read my email

How does email flow through my organization

How does email flow over time?

Page 36: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Network Security LabNetwork Security LabProf. Angelos D. KeromytisProf. Angelos D. Keromytis

Applied research in security, networking, operating systems Emphasis on systems and on building stuff

Main research projects Self-healing software and software security

Application on countering network viruses/worms

Network denial of service Currently 6 Ph.D. students (Cook, Locasto,

Burnside, Stavrou, Sidiroglou, Androulaki) Closely affiliated faculty: Stolfo, Bellovin,

Ioannidis (CCLS), Yung

http://nsl.cs.columbia.edu/

Page 37: The Department of Computer Science at Columbia University

CS overview - Fall 2005

NSL ProjectsNSL Projects Self-healing software

Enable legacy software to learn from its failures and improve itself over time, without human intervention!

Network Worm Vaccine Limit worm infection rate via anomaly detection engine and

automatic patching of vulnerable software, based on self-healing concepts

Resilience Against Denial of Service Attacks Use network overlays as a mechanism for separating good and

“bad” traffic High-speed I/O: The Operating System As a Signaling

Mechanism New OS architecture - remove memory and CPU from data path

Efficient Cryptography Design and implementation of ciphers for specific environments -

use of graphics cards, variable size block ciphers, IXP processor Collaborative Distributed Intrusion Detection

Identifying global attack activity as well as “low and slow” scans via shared intrusion alerts across administrative domains

Page 38: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Network Worm VaccineNetwork Worm Vaccine

Page 39: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Network Worm VaccineNetwork Worm Vaccine

Page 40: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Network Worm VaccineNetwork Worm Vaccine

Page 41: The Department of Computer Science at Columbia University

CS overview - Fall 2005

IRT real-time laboratory (IRT)IRT real-time laboratory (IRT)http://www.cs.columbia.edu/IRThttp://www.cs.columbia.edu/IRT

Internet multimedia protocols and systems Internet telephony signaling and services

application sharing, 911 systems Ubiquitous communication Peer-to-peer IP telephony

Wireless and ad-hoc networks VoIP hand-off acceleration

Quality of service multicast, scalable signaling, …

Service discovery and location-based services

DOS prevention and traceback

Page 42: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Distributed Network Analysis (DNA)Distributed Network Analysis (DNA)Prof. Vishal Misra, Dan RubensteinProf. Vishal Misra, Dan Rubenstein

Expertise in mathematical modeling of communication/network systems

Also do prototyping/experimentation to validate theory Topics:

Resilient and Secure Networking Wireless (802.11, Mesh) Sensor Networks Overlay and P2P Networking Server Farms

Analytical Techniques Stochastics Algorithms Control Theory, Queueing Theory, Information Theory Whatever else might be needed…

Page 43: The Department of Computer Science at Columbia University

CS overview - Fall 2005

DesigningDigital Systems

(4)

DesigningDigital Systems

(4)

Research

Page 44: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Asynchronous Circuits & Systems GroupAsynchronous Circuits & Systems Grouphttp://http://www.cs.columbia.edu/~nowick

Prof. Steven Nowick ([email protected]) Research in clockless digital systems

Most digital systems are synchronous = have a global clock

Potential benefits of asynchronous systems: Modular “plug-and-play” design: assemble components,

no global timing concerns Low power: no burning of clock power, components only

activated on demand High speed: not restricted by fixed clock speed

Challenges: new techniques needed New “CAD” (computer-aided design) software tools to

aid designers New circuit design styles

Page 45: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Asynchronous Circuits & Systems Asynchronous Circuits & Systems GroupGroup

CAD Tools: Software tools + optimization algorithms Allow automated ‘push-button’ circuit synthesis +

optimization For individual controllers (state machines), for entire

systems (processors) Circuit Designs:

New techniques to design asynchronous circuits (adders, multipliers)

Interface circuits: for mixing synchronous + asynchronous subsystems

Very high-speed pipelines: several GHz

Page 46: The Department of Computer Science at Columbia University

CS overview - Fall 2005

ComputerScienceTheory

(8)

Research

Page 47: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Tal Malkin: CryptographyTal Malkin: Cryptography

Crypto group Theory group Secure Systems Lab Crypto = construct computation and communication efficient

schemes maintaining desired functionality even in adversarial environment

(e.g., public key encryption, secure computation, authentication, contract signing, voting, e-commerce, …)

Motivation and Goals security, privacy, social, financial, political needs

Solutions rigorous, theoretical approach Research themes:

Definitions (identify, conceptualize, formalize goals) Protocol design (efficiency and provable security) Foundations (complexity, assumptions, limits) Search for both positive and negative results

Page 48: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Tal Malkin: Examples of Research Tal Malkin: Examples of Research TopicsTopics

Protecting against temporal or partial key exposure: key-evolving (e.g., forward-secure) schemes to mitigate damage of key leakage.

Protecting against key manipulation or tampering attacks: algorithmic defense against physical attacks on keying material.

Private information retrieval: keep user’s interests private even from database holder.

Relations among cryptographic primitives: reductions and oracle separations; minimal assumptions for cryptographic tasks.

Secure computation of approximations, completeness for multi-party computation, multicast encryption, anonymous routing, intrusion detection, steganography, …

For more information: take crypto class this fall, contact Prof. Malkin, check out http://www.cs.columbia.edu/~tal

Page 49: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Rocco Servedio: Theory of Rocco Servedio: Theory of ComputingComputinghttp://www.cs.columbia.edu/~rocco

Main research goal: design and analyze provably correct and efficient learning algorithms for interesting and important classes of functions

Boolean formulas

+

+++

+

-- - --

-

-- -- -

- --

-

AND

OR OR OR

AND …………………………..

x1

AND

xn

………………………………………….

+

geometric concepts

v4

v2 v6

v1 v2 v3

0

0

1 1 0 0 1

decision trees

Page 50: The Department of Computer Science at Columbia University

CS overview - Fall 2005

Rocco Servedio: Theory of Rocco Servedio: Theory of ComputingComputing

Main approach: explore & exploit connections between computational learning theory and other areas of CS theory

Complexity theory: representation schemes studied in complexity theory (Fourier representations, polynomial threshold functions) are useful for learning

Cryptography: basis for robust hardness results for learning problems

Quantum computation: quantum algorithms can efficiently solve learning problems which classical algorithms provably cannot