Contact - cse services - The University of Texas at Arlington

advertisement
Faculty Research Areas
Labs/Centers
Meetings
Fall 2007
1
Areas
 Artificial Intelligence
 Bio-Informatics
 Databases
 Graphics, Image Processing and Multimedia
 Networks
 Pervasive Computing
 Software Engineering
 Systems and Architecture
 Security
Fall 2007
2
Artificial Intelligence
Manfred Huber
Farhad Kamangar
Fall 2007
3
Manfred Huber
Research Projects
• Personal Service Robots
• Hierarchical Skill Acquisition
• CONNECT - Information Technologies
for the Disabled
Contact:
huber@cse.uta.edu
(GACB114)
Fall 2007
4
Farhad Kamangar
Research Projects
• Computer Vision
• Neural Networks
• Robotics
• CONNECT - Information Technologies
for the Disabled
Contact:
kamangar@cse.uta.edu (GACB 112)
Fall 2007
5
Bio-Informatics
Dr. Jean Gao
338 Nedderman Hall
Phone: (817) 272-3628
E-mail: gao@cse.uta.edu
URL: http://crystal.uta.edu/~gao
Dr. Nikola Stojanovic
301 Nedderman Hall
Phone: (817) 272-7627
E-mail: nick@cse.uta.edu
URL: http://ranger.uta.edu/~nick
Fall 2007
6
Biology in One Slide
Human
3 billion bases
Genome: 25,000 - 30,000 genes
~5% in functional regions
~200,000 exons
~50% repeat content
Modified from Serafim Batzoglou, 2003, reproduced with permission
Fall 2007
7
The Role of Computation in Modern Biology
Essential
 DNA sequencing and assembly
 Microarray analysis (Dr. Gao)
 Protein 3D reconstruction
• Applications
Complementary
–Gene finding, genome annotation
–Protein Identification, Mass Spectrometry (Dr. Gao)
–Phylogeny, comparative genomics (Dr. Stojanovic)
–Discovery of regulatory sites and pathways (Dr. Stojanovic)
–DNA sequencing and assembly
–Sequence analysis (comparison, annotation)
–Microarray analysis
–Evolutionary analysis
–Promoter hunting
–Pathway detection
–And many more…
• Tools
–String algorithms
–Alignment algorithms
–Hidden Markov models
–Statistical algorithms
–And many more…
Fall 2007
8
Databases
Sharma Chakravarthy
Ramez Elmasri
Leonidas Fegaras
Gautham Das
Fall 2007
9
Information Technology Laboratory (NH 232)
Prof. Sharma Chakravarthy
Email: sharma@cse.uta.edu, URL: http://itlab.uta.edu/sharma
Funding Sources: NSF, Spawar, Rome Lab, ONR, DARPA, TI, MCC
Select Projects
Select Publications
 Active Technology
1.
(Push Paradigm using ECA
Rules)
 WebVigiL: General
Purpose Change
Monitoring for the web
http://berlin.uta.edu:8081/webvigil
 Mining: Graph, Text,
Association Rules
 Stream Processing
 Information Filtering
& classification
 Prediction of Event
Patterns/Sequences
 Information Security
 Data warehousing
People
2.
3.
4.
Q. Jiang, R. Adaikkalavan, and S Chakravarthy, NFMi: An InterDomain Network Fault Management System, ICDE, 2005
Q. Jiang, and S. Chakravarthy, Scheduling Strategies for
Processing Continuous Queries Over streams, BNCOD July 2004.
S. Chakravarthy, R. Beera, and R. Balachandran, DB-Subdue:
Database Approach to Graph Mining. in PAKDD, 2004.
S. Chakravarthy, A. Sanka, J. Jacob, N. Pandrangi, A LearningBased Approach for Fetching Pages in WebVigiL, SAC, 2004.
5. P. Mishra, S. Chakravarthy: Performance Evaluation and
Analysis of K-Way Join Variants for Association Rule
Mining. BNCOD 2003
6.
P. Mishra, S. Chakravarthy: Performance Evaluation of SQL-OR
Variants for Association Rule Mining. DaWaK 2003
7. N. Pandrangi, J. Jacob, A. Sanka, S. Chakravarthy: WebVigiL:
User Profile-Based Change Detection for HTML/XML
Documents. BNCOD 2003: 38-57
8. R. Adaikkalavan, S. Chakravarthy: SnoopIB: Interval-Based
Event Specification and Detection for Active Databases. ADBIS
2003
9. Q. Jiang, S. Chakravarthy: Queueing Analysis of Relational
Operators for Continuous Data Streams. CIKM 2003:
10. H. Engstrom, S. Chakravarthy and B. Lings, A Systematic
Approach to Selecting Maintenance Policies in a Data
Warehouse Environment, EDBT, March 2002
….
Mr. Qingchun Jiang
Mr. Raman
Adaikkalavan
Mr. Dhawal Bhatia
Mr. Akshay Arora
Mr. Srihari
Padmanaban
Mr. Vihang Garg
Mr. Sunith Shrestha
Ms. Gunpreet Jaggi
Mr. Nikhil Deshpande
Mr. Balakumar Kendai
Group Meeting:
1 to 2:30 Pm Friday
in 315 NH
Fall 2007
10
Ramez Elmasri
Professor
 Databases
 Distributed XML Querying and Caching
 Object-Oriented Databases
 Keyword-based XML Query Processing
 Sensor Networks
 Energy-Efficient Querying of Sensor Networks
 Combining RFID and Sensor Networks
 Indexing of Sensor Networks Data
 Bioinformatics
 Modelling Complex Bioinformatics and Biomedical Data
 Mediators for Accessing Heterogeneous Data Sources
Fall 2007
11
Leonidas Fegaras
Areas of interest:
 Databases




Associate Professor
(PhD: UMass 1993)
Web Databases and XML
Object-Oriented Databases
Query Processing and Optimization
Data Management on Peer-to-Peer Systems
 Programming Languages
 Functional Programming
 Program Optimization
Fall 2007
12
Research Review
Gautam Das
 Database Exploration
 Web/Information Retrieval searching techniques in databases
 OLAP, Data Warehouse, Approximate Query Processing
 Data Mining
 Clustering, Classification, Similarity models, Time-Series
Analysis
 Algorithms
 Graph Algorithms, Computational Geometry
More information available at
http://ranger.uta.edu/~gdas/website/research.htm
Fall 2007
13
Graphics Image Proc., Multimedia
Ishfaq Ahmad
Multimedia Authoring, Compression,
Communication
Video Processing,
Next Generation TV
Network Security
Parallel Algorithms
Dr. Gutemberg Guerra-Filho
Computer Vision, Graphics, and Robotics
Fall 2007
14
Prof. Ishfaq Ahmad
 Dr. Ahmad works closely with federal
agencies, Arlington police and multimedia
industry.
 Several projects in power-aware video
compression, multimedia systems, next
generation TV are being pursued in his lab.
Fall 2007
15
High-Performance
Ishfaq Ahmad
 Resources Management in Parallel
and Distributed Systems
Power Management in Data Center
and Distributed Systems
Fall 2007
16
Institute for Research in
Security (IRIS)
Ishfaq Ahmad
A Multi-disciplinary center focusing on
infrastructure, people, and environmental security
http://www.iris.uta.edu/
Fall 2007
17
Networks
Sajal Das
Mohan Kumar
Gergley Zaruba
Hao Che
Yonghe Liu
Kalyan Basu
Fall 2007
18
Sajal K. Das
Center for Research in Wireless Mobility
and Networking (CReWMaN)
Sajal K. Das, Kalyan Basu, Mohan Kumar
Yonghe Liu, Hao Che
das@cse.uta.edu
URL: http://crewman.uta.edu
Woolf Hall 411,413,
Tel: 2-7409
[Networking, Mobile Computing and Parallel Computing Research Group]
Fall 2007
19
Mohan Kumar
Pervasive and Mobile Computing
Sensor Systems

Pervasive Computing






Uniform Information Access in




Distributed, mobile and pervasive systems
Caching, prefetching, and broadcasting
Data management
Peer-to-Peer (P2P) Systems




Middleware
Service creation, composition and deployment
Prototype development
Sensor networks and smart environments
Information Fusion in pervasive/sensor environments
Information and service sharing
Efficient communication and collaboration
Security and privacy
Recommended courses before
starting thesis work:
CSE5311, CSE5346,CSE5306 and
CSE5347/5355
Directed Study
Active and Overlay Networking


Novel protocols
Role in mobile, pervasive and P2P computing
Fall 2007
20
Student Skills/Requirements
• Must be motivated
• Have strong CS and E background – algorithms, networking and systems
• Have excellent Math and Programming Skills
• Must be creative and willing to take on a challenge
What should new students do?
Contact Kumar and/or students Brent Lagasse, Sagar Tamhane or Bridget Beamon in the
PICOLab
Teaching
CSE 5311 Design and Analysis of Algorithms
Spring/Fall Semesters
CSE 6345 Mobile/Pervasive Computing
Spring or Fall Semester
Mohan Kumar
PICO Research Lab and CReWMaN
Department of Computer Science and Engineering
http://ranger.uta.edu/~kumar
http://pico.uta.edu/
Room: 333NH; Office Hours: Tuesday 1:30-3:00 PM and Wednesday 2:30 Pm – 4:00 PM or
by appointment
Email: kumar at cse.uta.edu
Fall 2007
21
Gergely Zaruba
Research Projects
 Personal Area Networks
 Heterogeneous Wireless Networks
 Architecture, Admission Control and Handoff
 Optical Networks
 Optical Burst Switching, Routing, QoS Provisioning
 Traffic Modelling
Contact:
kamangar@cse.uta.edu
(GACB 112)
Fall 2007
22
Hao Che
 Embedded hardware/software design for NG
network processors
 Traffic engineering
 Implementation issues and software
development
 MPLS path protection and fast rerouting
 Routing redundancy
 Traffic modeling for wireless networks
Contact:
http://crystal.uta.edu/~hche/
Fall 2007
23
Yonghe Liu
 Sensor network and security
 Prototyping and experimental study
 Theoretic design and analysis
 Cross layer optimization
 Channel dependent performance
 Software security
 Design and analysis
In need of
 Strong mathematic skill (probability/signal processing/number
theory/etc), or
 Strong programming skill (hardware/software)
Contact:
http://ranger.uta.edu/~yonghe/
Fall 2007
24
Software Engineering
David Kung
Yu Lei
Arthur Reyes
David Levine
Fall 2007
25
David Kung
 Agent-Oriented Software Engineering
 Testing Object-Oriented Software
 Expert System for Design Patterns
 Formal Methods for Quality Assurance
 Fault Tolerance and Automatic Recovery
Using Dynamic Class Diversity
Contact:
http://ranger.uta.edu/~kung/kung.html
Fall 2007
26
Yu Lei
 Concurrent and real-time software systems
 Race analysis, Deterministic Execution
Environment, Reachability Testing, State
Exploration-Based Verification
 Automated software testing
 Object-Oriented Testing, Component-Based
Testing, Combinatorial Testing
Contact:
http://ranger.uta.edu/~ylei
Fall 2007
27
Software Engineering
 Software has become pervasive in modern
society
 Directly contributes to quality of life
 Malfunctions cost billions of dollars every year,
and have severe consequences in a safe-critical
environment
 All about building better software in
better ways, especially for large-scale
development
 Requirements, design, coding, testing,
maintenance, configuration, documentation,
deployment, and etc.
Fall 2007
28
SERC
 Faculty: Drs. David Kung and Jeff Lei
 Major Research Projects
 Agent-oriented software engineering
 Object-oriented software testing and
maintenance (OOTWorks)
 Automated analysis, testing, and verification of
concurrent software systems (RichTest)
 Combinatorial testing of software systems
(FireEye)
 Structural testing of security systems
Fall 2007
29
Arthur Alexander Reyes, Ph.D.
 Autonomous Vehicles Laboratory
 Faculty Advisor, along with MAE, IE faculty
 AUVSI Student UAV Competition
2004 team didn’t place
2005 team won 1st Place Overall
2006 team won 3rd Place Overall
 Teaches
 CSE 4310/5323 Software Eng. Processes
 CSE 4321 Software Testing
 CSE 4392 Game Development (new)
 http://ranger.uta.edu/~reyes/
Fall 2007
30
High Throughput Computational
Science: Clusters and Grids::
David Levine
David Levine, CSE@UTA
Projects: (Computers applied to:)
High Energy Physics, Bioinformatics,
Medical Informatics, People with
Disabilities, Streaming Processing,
Other…
Fall 2007
31
Embedded Systems :: Roger Walker
Embedded Systems for Transportation
Applications:
 Real-time Multi-core Systems for Embedded
Applications
 Stochastic Modeling From Sensor Measurements
 Development of Special Measurement Systems
for Transportation Related Applications
Contact:
http://ranger.uta.edu/~walker/
Fall 2007
32
Information Security
Donggang Liu
Matt Wright
Nan Zhang
Fall 2007
33
Wireless and System Security ::
Donggang Liu
 Security in wireless sensor networks
 key management, security of services such as
localization, routing, clustering etc.
 Integrity of wireless embedded devices
 Code integrity, tamper-resistant techniques
 Software and system security
 Security testing, detection of malicious code
Contact:
http://ranger.uta.edu/~dliu
Fall 2007
34
Network Security and Privacy::
Matthew Wright
 Anonymous Communications
 timing analysis, performance, new defenses
 Stepping-Stone Detection
 Interplay between attack and defense
 Incentives in Security and Privacy
 Trust in complex, ad-hoc environments
Contact:
http://ranger.uta.edu/~mwright
Fall 2007
35
Data Security and Privacy ::
Nan Zhang
 Security/Privacy in
Databases and Data
Mining
 Privacy-Preserving
Data Mining and
OLAP
 Secure Data Sharing
Contact:
http://ranger.uta.edu/~nzhang
Fall 2007
36
Data Security and Privacy ::
Nan Zhang
 Internet Security/Privacy
 Worm Detection
 Smart Adversaries
Contact:
http://ranger.uta.edu/~nzhang
Fall 2007
37
Assist Laboratory
F. Kamangar, M. Huber, D. Levine, G. Zaruba
Computer Science and Engineering Department
The University of Texas at Arlington
Fall 2007
38
Information Technologies for Persons
with Disabilities and Health Care
• Assistance for Persons with
Disabilities
• Communication devices and
technologies
• Intelligent assistive devices
• IT for improved care
• Information Technologies for
Healthcare and Aging
• Automatic health monitoring
• Intelligent environments
• IT to improve uniform
communication needs
Fall 2007
39
Connect - Intelligent Communication
Technologies for Disability & Health Care
• Intelligent communication
services connect individuals
with care providers and with
important information
• Seamlessly connected devices
• Adaptive interfaces
• Universal underlying
software architecture
• Intelligent information
analysis and interpretation
• Seamless, omnipresent
access to information
Wireless Communication
Provider
Servers, Databases, Web pages
Internet
Technical support
Human Service Providers
Clients
Fall 2007
40
Assistive Technologies
• Computer Technologies Can
Enhance Assistive Devices
• Ayuda – Intelligent wheelchair
• Autonomous navigation
capabilities
• Environment sensing
• Integration of computer control
and user instructions
• Force feedback technologies to
enhance interaction capabilities
for persons with physical
disabilities
Fall 2007
41
Health Monitoring and Intelligent
Environments for Aging in Place
• Wirelessly Connected Sensors
Provide Health Information and
can Improve Quality of Life
• Health sensors can monitor conditions
and detect problems
• Wireless communications permit
continuous monitoring
• Prediction and modeling technologies
facilitate automatic analysis of the data
• Communication technologies allow
connectivity to physician
• Sensors in the environment allow
automation of important functions and
assistance
• Monitoring and assistance for Aging in
Place
Fall 2007
42
AI and Robotics Laboratory
M. Huber, F. Kamangar
Computer Science and Engineering Department
The University of Texas at Arlington
Fall 2007
43
Adaptation and Learning in
Robots and Computer Systems
• Personal Service Robots
• Service robots have to interact with
people
• Programmability by unskilled users
• Robustness in real world situations
• Variable Autonomy
• Robots have to be easy to program
• Robots should understand any kind
of user command
• Cognitive Development
• Computer systems have to learn how
to act and reason in the world
Fall 2007
44
Robot Imitation – Programming by
Demonstration
• Learning to Sense
• Imitating robots have to be able to
interpret their observations
• Learning to Relate Human
Demonstrations to Robot
Actions
• Learning to extract the important
aspects of human actions
• Translating human actions into
corresponding robot controls
• Learning to Interpret Task
Requirements
• Robots have to be able to learn to
ignore dangerous commands
Fall 2007
45
Hierarchical Skill Learning /
Cognitive Development
• Learning Behavioral
Strategies
• Adaptation to unknown
conditions
• Automatic extraction of
subtasks
• Hierarchical Learning
• Learning with abstract actions
• Learning using state
abstractions
• Facilitation of incrementally
more complex behavior
Fall 2007
46
Robot Activities and Platforms
• Robot Soccer (RoboCup)
• Autonomous robotic soccer with
robot dogs
• Student team
• Computer Game Trials
• UCT – Urban Combat Testbed
Fall 2007
47
HERACLEIA
Fall 2007
48
Participating Faculty
Professor Fillia Makedon
Bioinformatics
Mobile and Pervasive Computing
Professor Heng Huang
Bioinformatics
Multimedia and Video Processing
Fall 2007
49
HERACLEIA Security Projects
Open Collaboration System:
How can we enable any entity to join a collaboration group in a P2P
environment?
 Entities can log on to system with any names they want.
 Collaborative groups can be created by any entity and share files in
a P2P fashion.
 Our OC System supports operations on groups, roles and shared
files.
Certified Authority Project:


Short-lived certificates(SLC) are used to prevent unofficial information propagation which can
take place due to various causes
We use forward secure signatures in SLCs and cut off the cost for the revocation.
Fall 2007
50
HERACLEIA Sensor Localization Projects
Geographical Distributed
Localization (GDL) :
 Localization is a fundamental
Problem in Wireless Sensor
Networks.
 Our GDL protocols support both
static and mobile node localization
 We use a novel computational model
for localization.
Wormhole Detection Project:
 How can we protect Wireless
Sensor Networks in hostile
environments?
 We have developed a distributed
wormhole detection algorithm based
on static GDL to detect as well as
locate wormholes inside the
network.
Fall 2007
51
HERACLEIA Location Privacy Projects
Location privacy in sensor networks:
 How can we protect the location
privacy of the sources of
messages in a sensor network?
 We create routing traps to
confuse the attackers.
Sensor network anonymity project:
 Location sensors can be attached to
people’s cell phone and medical sensors
can be attached to human body to
monitor vital signs.
 In such sensor networks, anonymity of
participants needs to be protected.
 We use one-way hash chains to
refresh IDs of sensor nodes.
Fall 2007
52
HERACLEIA Negotiation Projects
SCENS Project:
SCENS (Secure Content
Exchange Negotiation System)
is a meta-data based negotiation
system for agreeing data
sharing conditions among parties
who do not know each other. It
can be accessed at:
http://heracleia.uta.edu/scens
Sensor Test Bed:
 Using programmable motes as
sensors in a wireless network.
 To run experiments in assisted
living
 To test algorithms on a sensor net
Fall 2007
53
Download