1 / 16

Columbia's Vision for Global Intelligent Systems

Learn about Columbia Computer Science's comprehensive research, with a focus on natural language processing, mobile computing, network security, and designing digital systems for tomorrow's global intelligent systems. Explore research highlights and faculty expertise.

Download Presentation

Columbia's Vision for Global Intelligent Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Columbia’s Vision for Tomorrow’s Global Intelligent Systems Henning Schulzrinne, Chair Department of Computer Science October 13, 2005 Bill Gates/CS Faculty Roundtable

  2. Computer Science Research Highlights • Comprehensive research, with areas of focus • Leading research in • Natural language processing • Mobile and wireless computing • Designing digital systems • Network security • Growing Research Impact Columbia CS

  3. Faculty: 35 (32 tenure track, 3 lecturers) + 3 joint Carloni Edwards Feiner Aho Allen Belhumeur Bellovin Cannon Galil Gravano Grinspun Gross Grunschlag Hirschberg Jebara Kaiser Kender Keromytis Malkin McKeown Misra Nayar Nieh Nowick Ramamoorthi Ross Rubenstein Yannakakis Schulzrinne Servedio Shortliffe Stolfo Stein Unger Traub Wozniakowski Yemini Columbia CS

  4. Columbia Computer Science Research Interacting with Humans (5 faculty) Interacting with The Physical World (9) Systems (11) Computer Science Theory (8) Making Sense of Data (7) Designing Digital Systems (4) UI, NLP, collab work graphics, robotics, vision networks, security, OS, software eng quantum computing, crypto, learning, algorithms databases, data mining, machine learning CAD, async circuits, embedded systems Columbia CS

  5. Interacting with Humans: Newsblaster Automatic summarization of articles on the same event Generation of summary sentences Tracking events across days Foreign news  English summaries Faculty: Kathy McKeown Columbia CS

  6. Interacting with Humans: Newsblaster Research Findings • Quality of facts gathered significantly better • With Newsblaster than with no summaries • User satisfaction higher • With Newsblaster sentence summaries than Google style 1-sentence summaries • Summaries contributed important facts • With Newsblaster than Google summaries • Full multi-document summarization more powerful than documents alone or single sentence summarization Columbia CS

  7. Interacting with Humans: Detecting Deceptive Speech • Problem: • Can we detect deception from spoken language cues only? • Method: • Collect corpus of deceptive/non-deceptive speech • Extract acoustic, prosodic and lexical features automatically • E.g., disfluencies, response latency, high pitch range, lower intensity, laughter, personal pronouns • Run Machine Learning experiments to create automatic prediction models and test on held-out data • Results: • Baselines: • Best general human performance in literature ranges from criminals (65% accuracy) down to parole officers (40%) • Majority class, our data (predict truth): 61% • Mean human performance, our data: 60% • Our (automatic) results: 69% Faculty: Julia Hirschberg Columbia CS

  8. Interacting with Humans: Learning to Match Authors Error rate 1 3 2 Columbia Entity Resolution of Anonymized Publications 7 Teams: UMass, Maryland, Fair-Isaac, Illinois, Rutgers, CMU, Columbia Key 1 - Permutational Text Kernels 2 - Permutational Clustering 3 - SVM Source: 2005 KDD Challenge Faculty: Tony Jebara Columbia CS

  9. Systems: Distributed Channel Allocation in Mobile Mesh Networks Windows XP Channel Allocation Protocol TCP/IP MCL* NDIS** DevCon 802.11card A 802.11card B CEPSR research building • Multi-radio mesh node • Channel scarcity  need automated channel allocation in 802.11 mesh networks • Allocates radios by self-stabilizing algorithm based on graph coloring • Results • First self-organizing mechanism & implementation • Network self-organizes in seconds • Network throughput improvement of 20-100%cf. static channel allocation Collaborators: Victor Bahl and Jitendra Padhye @ MSR Faculty: Misra/Rubenstein Columbia CS

  10. Systems: Evolution of VoIP “how can I make it stop ringing?” long-distance calling, ca. 1930 “does it do call transfer?” going beyond the black phone “amazing – the phone rings” catching up with the digital PBX 1996-2000 2000-2003 2004- Faculty: Henning Schulzrinne Columbia CS

  11. Systems: Creating new services for VoIP • Old telecom model: • Programmers create mass-market applications • new service each decade • Our (web) model: • Users and administrators create universe of tailored applications • Incorporate human context: • location, mood, actions, … • “FrontPage for service creation” • Based on presence, location, privacy preferences • Learn based on user actions Columbia CS

  12. Systems: Self-healing Software Problem: zero-day attacks Approach: Enable systems to react and self-heal in response to unanticipated attacks and failures, via: Coordinated access control in large-scale systems Block-level system reconfiguration Self-healing software systems Application communities: enable large numbers of identical applications to collaboratively monitor their health and share alerts Prototypes: worms, software survivability Faculty: Angelos Keromytis, Sal Stolfo Columbia CS

  13. Systems: Developing Profiles of Attackers Surveillance detected at site B Surveillance detected at site A Site A Site B Common sources of scans for all three sites Site C Surveillance detected at site C Profile and signature generation for defense • Worms use hit lists to reduce spread time • Gathered in stealth • Collaborative and distributed intrusion detection • Leverage header and payload anomaly Faculty: Sal Stolfo Columbia CS

  14. Theory: Leveraging Cryptography Traditional cryptography  provable security of protocols, but assumes a clean, controlled model Key exposure causes more security breaches than cryptanalysis smartcards, PDAs can easily leak keys  Expand theoretical foundations to capture provable security against strong, realistic attackers, including: Key exposure Key tampering Security against side channel attacks (power, timing analysis) Security in an Internet-like setting when attacker can coordinate across several protocols Faculty: Tal Malkin Columbia CS

  15. Columbia’s Growing Computer Science Research Impact • Technology impact through • start-ups • security, network management, thin clients, VoIP, … • standardization • VoIP, security, … • education Columbia CS

  16. Conclusion • Broad-based research motivated by real problems • Breaking new ground in several key areas, e.g.: • Natural language processing • New network services and models • Network security • Graphics & vision • Columbia has a growing impact on computer science as demonstrated in successfully bringing new technology to the field Columbia CS

More Related