Title: Columbia
1- Columbias Vision for Tomorrows Global
Intelligent Systems - Henning Schulzrinne, Chair
- Department of Computer Science
- October 13, 2005
Bill Gates/CS Faculty Roundtable
2Computer Science Research Highlights
- Comprehensive research, with areas of focus
- Leading research in
- Natural language processing
- Mobile and wireless computing
- Designing digital systems
- Network security
- Growing Research Impact
3Faculty 35 (32 tenure track, 3 lecturers) 3
joint
Carloni
Feiner
Edwards
Aho
Allen
Belhumeur
Cannon
Galil
Bellovin
Gravano
Gross
Grunschlag
Kender
Kaiser
Keromytis
Hirschberg
Jebara
Grinspun
McKeown
Nayar
Ramamoorthi
Ross
Nowick
Nieh
Malkin
Rubenstein
Misra
Yannakakis
Servedio
Schulzrinne
Stolfo
Shortliffe
Unger
Stein
Wozniakowski
Traub
Yemini
4Columbia Computer Science Research
UI, NLP, collab work
graphics, robotics, vision
networks, security, OS, software eng
quantum computing, crypto, learning, algorithms
databases, data mining, machine learning
CAD, async circuits, embedded systems
5Interacting with Humans Newsblaster
- Automatic summarization of articles on the same
event - Generation of summary sentences
- Tracking events across days
- Foreign news ? English summaries
Faculty Kathy McKeown
6Interacting with Humans Newsblaster
- Research Findings
- Quality of facts gathered significantly better
- With Newsblaster than with no summaries
- User satisfaction higher
- With Newsblaster sentence summaries than Google
style 1-sentence summaries - Summaries contributed important facts
- With Newsblaster than Google summaries
- Full multi-document summarization more powerful
than - documents alone or single sentence
summarization
7Interacting with Humans Detecting Deceptive
Speech
- Problem
- Can we detect deception from spoken language cues
only? - Method
- Collect corpus of deceptive/non-deceptive speech
- Extract acoustic, prosodic and lexical features
automatically - E.g., disfluencies, response latency, high pitch
range, lower intensity, laughter, personal
pronouns - Run Machine Learning experiments to create
automatic prediction models and test on held-out
data - Results
- Baselines
- Best general human performance in literature
ranges from criminals (65 accuracy) down to
parole officers (40) - Majority class, our data (predict truth) 61
- Mean human performance, our data 60
- Our (automatic) results 69
Faculty Julia Hirschberg
8Interacting with Humans Learning to Match Authors
Entity Resolution of Anonymized Publications 7
Teams UMass, Maryland, Fair-Isaac, Illinois,
Rutgers, CMU, Columbia
Key 1 - Permutational Text Kernels 2 -
Permutational Clustering 3 - SVM
Source 2005 KDD Challenge
Faculty Tony Jebara
9Systems Distributed Channel Allocation in Mobile
Mesh Networks
- Multi-radio mesh node
- Channel scarcity ? need automated channel
allocation in 802.11 mesh networks - Allocates radios by self-stabilizing algorithm
based on graph coloring
- Results
- First self-organizing mechanism implementation
- Network self-organizes in seconds
- Network throughput improvement of 20-100 cf.
static channel allocation
Collaborators Victor Bahl and Jitendra Padhye _at_
MSR
Faculty Misra/Rubenstein
10Systems Evolution of VoIP
how can I make it stop ringing?
does it do call transfer?
long-distance calling, ca. 1930
going beyond the black phone
amazing the phone rings
catching up with the digital PBX
1996-2000
2000-2003
2004-
Faculty Henning Schulzrinne
11Systems Creating new services for VoIP
- Old telecom model
- Programmers create mass-market applications
- new service each decade
- Our (web) model
- Users and administrators create universe of
tailored applications - Incorporate human context
- location, mood, actions,
- FrontPage for service creation
- Based on presence, location, privacy preferences
- Learn based on user actions
12Systems Self-healing Software
- Problem zero-day attacks
- Approach Enable systems to react and self-heal
in response to unanticipated attacks and
failures, via - Coordinated access control in large-scale systems
- Block-level system reconfiguration
- Self-healing software systems
- Application communities enable large numbers of
identical applications to collaboratively monitor
their health and share alerts - Prototypes worms, software survivability
Faculty Angelos Keromytis, Sal Stolfo
13Systems Developing Profiles of Attackers
Surveillance detected at site B
Surveillance detected at site A
Site B
Site A
Common sources of scans for all three sites
Site C
Surveillance detected at site C
Profile and signature generation for defense
- Worms use hit lists to reduce spread time
- Gathered in stealth
- ?Collaborative and distributed intrusion
detection - Leverage header and payload anomaly
Faculty Sal Stolfo
14Theory Leveraging Cryptography
- Traditional cryptography ? provable security of
protocols, but assumes a clean, controlled model - Key exposure causes more security breaches than
cryptanalysis - smartcards, PDAs can easily leak keys
- ? Expand theoretical foundations to capture
provable security against strong, realistic
attackers, including - Key exposure
- Key tampering
- Security against side channel attacks (power,
timing analysis) - Security in an Internet-like setting
- when attacker can coordinate across several
protocols
Faculty Tal Malkin
15Columbias Growing Computer Science Research
Impact
government
Industrial
research gifts
- Technology impact through
- start-ups
- security, network management, thin clients,
VoIP, - standardization
- VoIP, security,
- education
16Conclusion
- Broad-based research motivated by real problems
- Breaking new ground in several key areas, e.g.
- Natural language processing
- New network services and models
- Network security
- Graphics vision
- Columbia has a growing impact on computer science
as demonstrated in successfully bringing new
technology to the field