Columbia - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Columbia

Description:

... with areas of focus Leading research in Natural language processing Mobile and wireless ... Mesh Networks Systems: Evolution ... intrusion detection ... – PowerPoint PPT presentation

Number of Views:83
Avg rating:3.0/5.0
Slides: 17
Provided by: csColumb
Category:

less

Transcript and Presenter's Notes

Title: Columbia


1
  • Columbias Vision for Tomorrows Global
    Intelligent Systems
  • Henning Schulzrinne, Chair
  • Department of Computer Science
  • October 13, 2005

Bill Gates/CS Faculty Roundtable
2
Computer Science Research Highlights
  • Comprehensive research, with areas of focus
  • Leading research in
  • Natural language processing
  • Mobile and wireless computing
  • Designing digital systems
  • Network security
  • Growing Research Impact

3
Faculty 35 (32 tenure track, 3 lecturers) 3
joint




Carloni
Feiner
Edwards
Aho
Allen
Belhumeur
Cannon
Galil
Bellovin
Gravano
Gross
Grunschlag
Kender
Kaiser
Keromytis
Hirschberg
Jebara
Grinspun
McKeown
Nayar
Ramamoorthi
Ross
Nowick
Nieh
Malkin
Rubenstein
Misra
Yannakakis
Servedio
Schulzrinne
Stolfo
Shortliffe
Unger
Stein
Wozniakowski
Traub
Yemini
4
Columbia Computer Science Research
UI, NLP, collab work
graphics, robotics, vision
networks, security, OS, software eng
quantum computing, crypto, learning, algorithms
databases, data mining, machine learning
CAD, async circuits, embedded systems
5
Interacting with Humans Newsblaster
  • Automatic summarization of articles on the same
    event
  • Generation of summary sentences
  • Tracking events across days
  • Foreign news ? English summaries

Faculty Kathy McKeown
6
Interacting with Humans Newsblaster
  • Research Findings
  • Quality of facts gathered significantly better
  • With Newsblaster than with no summaries
  • User satisfaction higher
  • With Newsblaster sentence summaries than Google
    style 1-sentence summaries
  • Summaries contributed important facts
  • With Newsblaster than Google summaries
  • Full multi-document summarization more powerful
    than
  • documents alone or single sentence
    summarization

7
Interacting with Humans Detecting Deceptive
Speech
  • Problem
  • Can we detect deception from spoken language cues
    only?
  • Method
  • Collect corpus of deceptive/non-deceptive speech
  • Extract acoustic, prosodic and lexical features
    automatically
  • E.g., disfluencies, response latency, high pitch
    range, lower intensity, laughter, personal
    pronouns
  • Run Machine Learning experiments to create
    automatic prediction models and test on held-out
    data
  • Results
  • Baselines
  • Best general human performance in literature
    ranges from criminals (65 accuracy) down to
    parole officers (40)
  • Majority class, our data (predict truth) 61
  • Mean human performance, our data 60
  • Our (automatic) results 69

Faculty Julia Hirschberg
8
Interacting with Humans Learning to Match Authors
Entity Resolution of Anonymized Publications 7
Teams UMass, Maryland, Fair-Isaac, Illinois,
Rutgers, CMU, Columbia
Key 1 - Permutational Text Kernels 2 -
Permutational Clustering 3 - SVM
Source 2005 KDD Challenge
Faculty Tony Jebara
9
Systems Distributed Channel Allocation in Mobile
Mesh Networks
  • Multi-radio mesh node
  • Channel scarcity ? need automated channel
    allocation in 802.11 mesh networks
  • Allocates radios by self-stabilizing algorithm
    based on graph coloring
  • Results
  • First self-organizing mechanism implementation
  • Network self-organizes in seconds
  • Network throughput improvement of 20-100 cf.
    static channel allocation

Collaborators Victor Bahl and Jitendra Padhye _at_
MSR
Faculty Misra/Rubenstein
10
Systems Evolution of VoIP
how can I make it stop ringing?
does it do call transfer?
long-distance calling, ca. 1930
going beyond the black phone
amazing the phone rings
catching up with the digital PBX
1996-2000
2000-2003
2004-
Faculty Henning Schulzrinne
11
Systems Creating new services for VoIP
  • Old telecom model
  • Programmers create mass-market applications
  • new service each decade
  • Our (web) model
  • Users and administrators create universe of
    tailored applications
  • Incorporate human context
  • location, mood, actions,
  • FrontPage for service creation
  • Based on presence, location, privacy preferences
  • Learn based on user actions

12
Systems Self-healing Software
  • Problem zero-day attacks
  • Approach Enable systems to react and self-heal
    in response to unanticipated attacks and
    failures, via
  • Coordinated access control in large-scale systems
  • Block-level system reconfiguration
  • Self-healing software systems
  • Application communities enable large numbers of
    identical applications to collaboratively monitor
    their health and share alerts
  • Prototypes worms, software survivability

Faculty Angelos Keromytis, Sal Stolfo
13
Systems Developing Profiles of Attackers
Surveillance detected at site B
Surveillance detected at site A
Site B
Site A
Common sources of scans for all three sites
Site C
Surveillance detected at site C
Profile and signature generation for defense
  • Worms use hit lists to reduce spread time
  • Gathered in stealth
  • ?Collaborative and distributed intrusion
    detection
  • Leverage header and payload anomaly

Faculty Sal Stolfo
14
Theory Leveraging Cryptography
  • Traditional cryptography ? provable security of
    protocols, but assumes a clean, controlled model
  • Key exposure causes more security breaches than
    cryptanalysis
  • smartcards, PDAs can easily leak keys
  • ? Expand theoretical foundations to capture
    provable security against strong, realistic
    attackers, including
  • Key exposure
  • Key tampering
  • Security against side channel attacks (power,
    timing analysis)
  • Security in an Internet-like setting
  • when attacker can coordinate across several
    protocols

Faculty Tal Malkin
15
Columbias Growing Computer Science Research
Impact
government
Industrial
research gifts
  • Technology impact through
  • start-ups
  • security, network management, thin clients,
    VoIP,
  • standardization
  • VoIP, security,
  • education

16
Conclusion
  • Broad-based research motivated by real problems
  • Breaking new ground in several key areas, e.g.
  • Natural language processing
  • New network services and models
  • Network security
  • Graphics vision
  • Columbia has a growing impact on computer science
    as demonstrated in successfully bringing new
    technology to the field
Write a Comment
User Comments (0)
About PowerShow.com