Computer Science Visit Computer Science to view up-to-the-minute information http://www.stevens.edu/ses/about_soe/news/ Custom nmaheswa@stevens.edu (Nikhil Maheswaraiah) Copyright 2011, Stevens Institute of Technology http://www.stevens.edu/ses/ses/images/sit_logo.jpg Computer Science http://www.stevens.edu/ses/about_soe/news/ http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4063 CS Department Seminar: Prof. Alejandro Russo, Chalmers University of Technology December 6, 2013<br><br> Title: Towards synthesizing sound information-flow systemsSpeaker: Prof. Alejandro Russo, Chalmers University of TechnologyDate: December 6th, 2013 at 3:00pmLocation: Babbio Center 310 Abstract:Information-flow security has recently become relevant to preserve confidentiality of data in popular platforms (e.g. mobile platforms, web services, etc.). A great series of work has been devoted to dynamically control information-flow control using programming language semantics. Sometimes, extending such systems to add new language construct is not trivial, or worse, it might be error prone. In this light, we present the first steps towards a monadic calculus to enforce the non-interference policy, i.e., that secrets are not leaked into <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4063">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4063 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4062 CS Department Seminar: Prof. Justin Cappos, NYU-Poly December 2, 2013<br><br> Title: NetCheck: Network Diagnoses from Blackbox TracesSpeaker: Prof. Justin Cappos, NYU-PolyDate: December 2nd, 2013 at 2:00pmLocation: Babbio Center 221 Abstract:This talk introduces NetCheck, a tool to diagnose network problems in large and complex applications. NetCheck uses traces from existing blackbox tracing mechanisms, such as strace, to diagnosis network problems in real world applications. NetCheck can diagnose faults without any specific information about the underlying network or application. NetCheck does this by (1) totally ordering the distributed set of input traces, and by (2) utilizing a network model to identify points in the totally ordered execution where the traces deviated from the <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4062">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4062 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4059 CS Department Seminar: Prof. Stefano Zanero, Politecnico di Milano November 19, 2013<br><br> Title: Tracking and Characterizing Botnets Using Automatically Generated DomainsSpeaker: Prof. Stefano Zanero, Politecnico di MilanoDate/time: Tuesday, November 19, 12:00pm-1:00pmLocation: Babbio Center 221Host: Georgios PortokalidisAbstract:Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures that are difficult to track or deactivate. Considerable attention has been given to recognizing automatically generated domains (AGDs) from DNS traffic, in order to identify previously unknown AGDs, which helps in the task of disrupting botnets&rsquo; communication capabilities. Unfortunately, until now such approaches would require to deploy low-level DNS sensors to access data whose collection poses practical and privacy issues, making their adoption problematic. Instead, <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4059">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4059 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4054 CS Department Seminar: Dr. John Langford, Microsoft Research NY November 13, 2013<br><br> Title: Extreme MulticlassDate/time: Wednesday, November 13, 11:00am-12:00pmLocation: Babbio Center 310 Abstract:Standard multiclass classification techniques require O(k) computation during train and test where k is the number of classes, yet the information theoretic lower bound is O(log k). This gap matters little when k is on the order of 10 or 100, but at 10^4 or 10^6 it matters a great deal. I will discuss the theory of extreme multiclass classification including consistency, robustness, efficiency, and structure learning.Bio:John Langford is a machine learning research scientist, a field which he says "is shifting from an academic discipline to an industrial tool". He is <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4054">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4054 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4052 CS Department Seminar: Prof. Li Zhang, University of Wisconsin-Madison October 21, 2013<br><br> Title: Small Image Sensors and Big Visual Data Date: October 21, 2013 at 2:00pm Location: Babbio Center 221 Abstract: This talk will discuss small image sensor designs and big visual data parsing and their applications. We live in a technology world in which cameras are shrinking in size and photos and videos are exploding in quantity. My research has been dealing with technical challenges in both areas. I will show a single-chip design for compressive sensing of high-speed high-dynamic-range videos. The design has the potential benefit of achieving nearly 100% light throughput and uses reduced sampling rate to reduce power consumption. I will show <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4052">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4052 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4046 CS Department Seminar: Tim (Jia-Yu) Pan, Google October 16, 2013<br><br> Title: Click Fraud - Challenges and Remedies Date: 11:0AM 10/16/2013 Location:BC310 Abstract: Online advertising is an essential element of Internet economy. Detecting and preventing click fraud is crucial to the prosperity of online advertising. In this presentation, I will first give an overview of online advertising and click fraud. Then, I will talk about several systems and applications that have been developed and deployed in fighting click fraud. Bio: Tim (Jia-Yu) Pan is currently working on the Ad Traffic Quality team at Google Inc. His research interests include anomaly detection, clustering techniques, WWW technology, and data mining on multimedia and graphs. He has received three best <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4046">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4046 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4045 CS Department Seminar: Michalis Polychronakis, Columbia University October 7, 2013<br><br> Title: Practical Defenses Against Return-Oriented Programming Date/time: Monday, October 7, 2pm-3pm Abstract: The wide adoption of exploit mitigation technologies based on non-executable memory pages, has given rise to a new breed of attacks that employ return-oriented programming (ROP) to achieve arbitrary code execution without the injection of any code. After a brief introduction into return-oriented programming, in this talk I will present two complementary defenses against ROP attacks for Windows systems: in-place code randomization, a practical software diversification technique that can be applied directly on third-party binaries, and kBouncer, a transparent, low-overhead runtime ROP mitigation technique. Bio: Michalis Polychronakis is an Associate Research Scientist in <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4045">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4045 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4029 CS distinguished lecture: Dr. Chid Apte, Director of Analytics Research, IBM Research October 2, 2013<br><br> <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4029"><img src="http://www.stevens.edu/ses/images/fileadmin/images/106.jpg" width="100" height="100" border="0" align="left" hspace="15" vspace="15" alt=""></a><br> Abstract:Business Analytics is broadly defined as the use of data and computation to make optimal business decisions. While ideas and methods from more than half a century of computational mathematics research have been selectively exploited to build business optimization solutions in the past, the focus has recently shifted significantly and quickly to data-intensive and data-driven analytics. Extracting actionable insights from large-scale volume, variety, and velocity of data, in context, beyond what was previously possible, is being enabled by modern machine learning and data mining methodologies, and driving new approaches to building optimization-based decision-support systems. This talk will present a perspective <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4029">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=4029 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3962 CS Seminar: Prof. Tina Eliassi-Rad, Measuring Tie Strength in Implicit Social Networks April 17, 2013<br><br> Speaker: Prof. Tina Eliassi-Rad (Rutgers University)Time: 1:00pm-2:00pmLocation: Babbio Center 304 Abstract:Given a set of people and a set of events attended by them, we address the problem of measuring connectedness or tie strength between each pair of persons. The underlying assumption is that attendance at mutual events gives an implicit social network between people. We take an axiomatic approach to this problem. Starting from a list of axioms, which a measure of tie strength must satisfy, we characterize functions that satisfy all the axioms. We then show that there is a range of tie-strength measures that satisfy this characterization.A measure of <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3962">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3962 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3955 CS department distinguished lecture: Dr Larry Davis, Computer Vision: History and Challenges April 8, 2013<br><br> Title: Computer Vision: History and Challenges Speaker: Dr. Larry Davis (University of Maryland) Time: Monday, April 8th, 2:00pm-3:00pm Location: E222 Abstract: The field of computer vision was started in the 1960&rsquo;s, in large part driven by applications in document image analysis (mail sorting). Fifty years later, there are many thousands of researchers and engineers around the world conducting fundamental and applied research in computer vision in applications areas ranging from astronomy to zoology. The talk will begin with an overview of the field from an applications perspective, highlighting some of the successes and open problems in a variety of application domains. Then, I will turn <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3955">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3955 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3961 CS Seminar: Dr. Brion Feinberg, Big Data ... In Real Life April 1, 2013<br><br> Time: 2:00pm-3:00pmLocation: Babbio Center 304Host: Sussane Wetzel Abstract: Lower cost, high performance servers have enabled many new applications utilizing large volumes of data. This presentation will share some of the practical challenges of dealing with enormous data sets, and building and selling commercial products that leverage "big data" capabilities. Bio: Brion Feinberg is an experienced product management executive with an extensive track record for bringing new, innovative technology-focused products and services to market. Currently working as the Chief Product Officer for DAX Technologies, Brion is responsible for the planning, implementation and delivery of the company's products that provide customer experience management for telecommunication service <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3961">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3961 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3954 CS department seminar: Haibin Ling, Multi-target Tracking by Rank-1 Tensor Approximation March 18, 2013<br><br> Title: Multi-target Tracking by Rank-1 Tensor Approximation Speaker: Haibin Ling (http://www.dabi.temple.edu/~hbling/) -- Temple University Time: Monday, March 18th, 2:00pm-3:00pm Location: Babbio Center 304 Abstract: Multi-target tracking (MTT) is an important problem in computer vision and has many applications. We introduce a novel framework for MTT using the rank-1 tensor approximation and propose an L1 norm tensor power iteration solution. In particular, a high order tensor is constructed based on trajectories in the time window, with each tensor element as the affinity of the corresponding trajectory. The assignment variables are the L1 normalized vectors, which are used to approximate the rank-1 tensor. Our approach provides a <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3954">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3954 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3941 CS Department seminar: Michael L. Littman (Brown University) February 14, 2013<br><br> Title: Efficiently Learning to Behave Efficiently Speaker: Michael L. Littman, (http://cs.brown.edu/~mlittman/), Brown University Time: Thursday, February 14th, 4:00pm-5:00pm Location: Babbio Center 210 Host: Jingrui He Abstract: The field of reinforcement learning is concerned with the problem of learning efficient behavior from experience. In real life applications, gathering this experience is time-consuming and possibly costly, so it is critical to derive algorithms that can learn effective behavior with bounds on the experience necessary to do so. This talk presents our successful efforts to create such algorithms via a framework we call KWIK (Knows What It Knows) learning. I'll summarize the framework, our algorithms, their formal validations, and <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3941">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3941 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3927 CS Department Seminar: Peter Bell (hackNY) January 25, 2013<br><br> Title: How to Build an Awesome Career in Software DevelopmentSpeaker: Peter Bell (http://hackNY.org), hackNYTime: Friday, January 25th, 2013, 2:00pm-3:00pmLocation: Babbio Center 304Host: Dan DumchampAbstract:There is a two-tier workforce for software developers. The top developers are always able to pick between interesting offers to work with cool technologies at the hottest companies, whereas many others are happy just to get a gig. Learn the techniques for getting and then picking between interesting job offers to build a compelling career.Bio:Peter is an evangelist and hacker for hackNY. He is an experienced startup technologist, agile coach and CTO. He's finishing up a book <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3927">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3927 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3933 CS Department Seminar: Daniel Scharstein (Middlebury College) January 25, 2013<br><br> Title: Benchmarking Stereo Vision and Optical Flow AlgorithmsSpeaker: Daniel Scharstein (http://www.cs.middlebury.edu/~schar/), Middlebury CollegeTime: Friday, January 25th, 4:00pm-5:00pmLocation: Babbio Center 220Host: Philippos MordohaiAbstract:Stereo vision and optical flow methods attempt to measure scene depth and motion by matching and tracking pixels across images. To evaluate the performance of such methods, we need "ground truth" -- the true depth or true object motion. In this talk I will describe different techniques for creating image datasets with ground truth, including structured lighting, laser and CT scanners, and hidden fluorescent texture. The Middlebury datasets, created in collaboration with undergraduates, are now well-established benchmarks in computer <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3933">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3933 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3915 CS Department Seminar: Jason Corso (http://www.cse.buffalo.edu/~jcorso/), SUNY, Buffalo December 3, 2012<br><br> Title: Advances in Segmentation for Video UnderstandingSpeaker: Jason Corso (http://www.cse.buffalo.edu/~jcorso/), SUNY, BuffaloTime: Monday, December 3nd, 2:00pm-3:00pmLocation Babbio Center 110Host: Gang HuaAbstract:The use of video segmentation as an early processing step in video understanding lags behind the use of image segmentation for image understanding, despite many available video segmentation methods. The reasons for this are likely due to a general lack of critical analysis to help us understand which methods work well in which scenarios, and the simple fact that videos are an order of magnitude bigger than images. In this talk, I will cover recent advances in my group that <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3915">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3915 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3910 CS Department Seminar: Jingyi Yu, University of Delaware November 19, 2012<br><br> Title: Beyond Perspective Cameras: Multi-perspective Imaging, Reconstruction, Rendering and ProjectionSpeaker: Jingyi Yu (http://www.eecis.udel.edu/~yu/), University of Delaware, Newark, DETime: Monday, November 19th, 2:00pm-3:30pmLocation: Babbio Center 110Host: Gang HuaAbstract:A perspective image represents the spatial relationships of objects in a scene as they appear from a single viewpoint. In contrast, a multi-perspective image combines what is seen from several viewpoints into a single image. Despite their incongruity of view, effective multi-perspective images are able to preserve spatial coherence and can depict, within a single context, details of a scene that are simultaneously inaccessible from a single view. In this talk, I will provide <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3910">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3910 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3898 CS Department Seminar: Qiang Ji (RPI) October 29, 2012<br><br> Title: Knowledge Augmented Visual LearningSpeaker: Qiang Ji, (RPI, http://www.ecse.rpi.edu/~qji/)Time: 2:00pm-3:30pm Location: Babbio 110Abstract:Substantial progress has been made in the past decades in computer vision, in particular as a result of the application of machine learning methods. Despite these rapid developments, computer vision remains primitive as compared with human vision. One factor contributing to this is the data-driven nature of the machine learning methods as well as their inability to incorporate prior knowledge into the learning process. The data-driven approaches suffer when the required training data is inadequate in either quantity or quality. This problem can be effectively alleviated with the <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3898">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3898 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3890 CS Department Seminar: Erik Learned-Miller (UMass) October 25, 2012<br><br> Title: Distribution Fields: A Unifying Representation for Low-Level Vision Problems Speaker: Erik Learned-Miller (http://people.cs.umass.edu/~elm/), University of Massachusetts, AmherstTime: Thursday, October 25th, 2:00pm-3:00pmLocation: Babbio Center 203Host: Gang HuaAbstract:Consider the following fundamental problem of low level vision: given a large image I an a patch J from another image, find the "best matching" location of the patch J to image I. We believe the solution to this problem can be significantly improved. A significantly better solution to this problem has the potential to improve a wide variety of low-level vision problems, such as backgrounding, tracking, medical image registration, optical flow, image stitching, <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3890">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3890 http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3889 CS Department Seminar: Neil Daswani (Twitter) October 19, 2012<br><br> Title: Open Problems In Secure Mobile AdvertisingSpeaker: Neil Daswani (Twitter) (http://www.neildaswani.com/)Time: Friday, October 19th, 2:00pm-3:30pmLocation: Babbio 320Host: Susanne Wetzel Abstract:This talk 1) reviews security issues in the area of mobile advertising, 2) focuses on what is distinctive about mobile privacy, mobile malvertising, and mobile click fraud as compared to their non-mobile counterparts, and 3) discusses open problems/issues in the area of secure mobile advertising.Biography:Neil Daswani is currently an engineering manager at Twitter and was formerly the CTO of Dasient, Inc. prior to its acquisition by Twitter. Neil has served in a variety of research, development, teaching, and managerial roles at <a href="http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3889">[Read more...]</a> http://www.stevens.edu/ses/about/news_highlight.php?news_events_id=3889