Post on 15-Jan-2016
description
Fall 2007 1
Faculty Research AreasLabs/Centers
Meetings
Fall 2007 2
Areas
Artificial Intelligence Bio-Informatics Databases Graphics, Image Processing and Multimedia Networks Pervasive Computing Software Engineering Systems and Architecture Security
Fall 2007 3
Artificial Intelligence
Manfred HuberFarhad Kamangar
Fall 2007 4
Manfred Huber
Research Projects• Personal Service Robots• Hierarchical Skill Acquisition• CONNECT - Information
Technologies for the Disabled
Contact: huber@cse.uta.edu (GACB114)
Fall 2007 5
Farhad Kamangar
Research Projects• Computer Vision• Neural Networks• Robotics• CONNECT - Information
Technologies for the Disabled
Contact: kamangar@cse.uta.edu
(GACB 112)
Fall 2007 6
Bio-Informatics
Dr. Nikola Stojanovic301 Nedderman Hall
Phone: (817) 272-7627E-mail: nick@cse.uta.eduURL: http://ranger.uta.edu/~nick
Dr. Jean Gao338 Nedderman Hall
Phone: (817) 272-3628E-mail: gao@cse.uta.eduURL: http://crystal.uta.edu/~gao
Fall 2007 7
Biology in One Slide
Modified from Serafim Batzoglou, 2003, reproduced with permission
Human 3 billion basesGenome: 25,000 - 30,000 genes ~5% in functional regions
~200,000 exons ~50% repeat content
Fall 2007 8
The Role of Computation in Modern Biology
Essential DNA sequencing and assembly Microarray analysis (Dr. Gao) Protein 3D reconstruction
• Tools–String algorithms–Alignment algorithms–Hidden Markov models–Statistical algorithms–And many more…
• Applications–DNA sequencing and assembly–Sequence analysis (comparison, annotation)–Microarray analysis–Evolutionary analysis–Promoter hunting–Pathway detection–And many more…
Complementary–Gene finding, genome annotation–Protein Identification, Mass Spectrometry (Dr. Gao)–Phylogeny, comparative genomics (Dr. Stojanovic)–Discovery of regulatory sites and pathways (Dr. Stojanovic)
Fall 2007 9
Databases
Sharma ChakravarthyRamez ElmasriLeonidas FegarasGautham Das
10 Fall 2007
Information Technology Laboratory (NH 232)Prof. Sharma ChakravarthyEmail: sharma@cse.uta.edu, URL: http://itlab.uta.edu/sharma
Funding Sources: NSF, Spawar, Rome Lab, ONR, DARPA, TI, MCC
Select Projects
Active Technology
(Push Paradigm using ECA Rules)
WebVigiL: General Purpose Change Monitoring for the web http://berlin.uta.edu:8081/webvigil
Mining: Graph, Text, Association Rules
Stream Processing
Information Filtering & classification
Prediction of Event Patterns/Sequences
Information Security
Data warehousing
Select Publications
1. Q. Jiang, R. Adaikkalavan, and S Chakravarthy, NFMi: An Inter-Domain Network Fault Management System, ICDE, 2005
2. Q. Jiang, and S. Chakravarthy, Scheduling Strategies for Processing Continuous Queries Over streams, BNCOD July 2004.
3. S. Chakravarthy, R. Beera, and R. Balachandran, DB-Subdue: Database Approach to Graph Mining. in PAKDD, 2004.
4. S. Chakravarthy, A. Sanka, J. Jacob, N. Pandrangi, A Learning-Based Approach for Fetching Pages in WebVigiL, SAC, 2004.
5. P. Mishra, S. Chakravarthy: Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining. BNCOD 2003
6. P. Mishra, S. Chakravarthy: Performance Evaluation of SQL-OR Variants for Association Rule Mining. DaWaK 2003
7. N. Pandrangi, J. Jacob, A. Sanka, S. Chakravarthy: WebVigiL: User Profile-Based Change Detection for HTML/XML Documents. BNCOD 2003: 38-57
8. R. Adaikkalavan, S. Chakravarthy: SnoopIB: Interval-Based Event Specification and Detection for Active Databases. ADBIS 2003
9. Q. Jiang, S. Chakravarthy: Queueing Analysis of Relational Operators for Continuous Data Streams. CIKM 2003:
10. H. Engstrom, S. Chakravarthy and B. Lings, A Systematic Approach to Selecting Maintenance Policies in a Data Warehouse Environment, EDBT, March 2002
….
People
Mr. Qingchun Jiang Mr. Raman AdaikkalavanMr. Dhawal BhatiaMr. Akshay AroraMr. Srihari PadmanabanMr. Vihang GargMr. Sunith Shrestha Ms. Gunpreet JaggiMr. Nikhil DeshpandeMr. Balakumar Kendai
Group Meeting: 1 to 2:30 Pm Friday in 315 NH
Fall 2007 11
Ramez ElmasriProfessor
Databases Distributed XML Querying and Caching Object-Oriented Databases Keyword-based XML Query Processing
Sensor Networks Energy-Efficient Querying of Sensor Networks Combining RFID and Sensor Networks Indexing of Sensor Networks Data
Bioinformatics Modelling Complex Bioinformatics and Biomedical Data Mediators for Accessing Heterogeneous Data Sources
Fall 2007 12
Leonidas FegarasAssociate Professor(PhD: UMass 1993)
Areas of interest: Databases
Web Databases and XML Object-Oriented Databases Query Processing and Optimization Data Management on Peer-to-Peer Systems
Programming Languages Functional Programming Program Optimization
Fall 2007 13
Research Review Gautam Das
Database Exploration Web/Information Retrieval searching techniques in
databases OLAP, Data Warehouse, Approximate Query Processing
Data Mining Clustering, Classification, Similarity models, Time-
Series Analysis Algorithms
Graph Algorithms, Computational Geometry
More information available athttp://ranger.uta.edu/~gdas/website/research.htm
Fall 2007 14
Graphics Image Proc., Multimedia
Ishfaq AhmadMultimedia Authoring, Compression, CommunicationVideo Processing, Next Generation TVNetwork SecurityParallel Algorithms
Dr. Gutemberg Guerra-Filho
Computer Vision, Graphics, and Robotics
Fall 2007 15
Dr. Ahmad works closely with federal agencies, Arlington police and multimedia industry.
Several projects in power-aware video compression, multimedia systems, next generation TV are being pursued in his lab.
Prof. Ishfaq Ahmad
Fall 2007 16
High-Performance
Ishfaq Ahmad Resources Management in Parallel and Distributed SystemsPower Management in Data Center and Distributed Systems
Fall 2007 17
http://www.iris.uta.edu/
Institute for Research in Security (IRIS)
Ishfaq AhmadA Multi-disciplinary center focusing on infrastructure, people, and environmental security
Fall 2007 18
Networks
Sajal DasMohan KumarGergley ZarubaHao CheYonghe LiuKalyan Basu
Fall 2007 19
Sajal K. DasCenter for Research in Wireless Mobility
and Networking (CReWMaN)
Sajal K. Das, Kalyan Basu, Mohan Kumar Yonghe Liu, Hao Che
das@cse.uta.edu
URL: http://crewman.uta.eduWoolf Hall 411,413,
Tel: 2-7409[Networking, Mobile Computing and Parallel Computing Research Group]
Fall 2007 20
Pervasive Computing Middleware Service creation, composition and deployment Prototype development Sensor networks and smart environments Information Fusion in pervasive/sensor environments
Uniform Information Access in Distributed, mobile and pervasive systems Caching, prefetching, and broadcasting Data management
Peer-to-Peer (P2P) Systems Information and service sharing Efficient communication and collaboration Security and privacy
Active and Overlay Networking Novel protocols Role in mobile, pervasive and P2P computing
Mohan KumarPervasive and Mobile ComputingSensor Systems
Recommended courses before
starting thesis work:
CSE5311, CSE5346,CSE5306 and CSE5347/5355
Directed Study
Fall 2007 21
Mohan KumarPICO Research Lab and CReWMaN Department of Computer Science and Engineering http://ranger.uta.edu/~kumarhttp://pico.uta.edu/Room: 333NH; Office Hours: Tuesday 1:30-3:00 PM and Wednesday 2:30 Pm – 4:00 PM or by appointmentEmail: kumar at cse.uta.edu
Student Skills/Requirements
• Must be motivated• Have strong CS and E background – algorithms, networking and systems• Have excellent Math and Programming Skills• Must be creative and willing to take on a challenge
CSE 5311 Design and Analysis of Algorithms Spring/Fall Semesters
CSE 6345 Mobile/Pervasive Computing Spring or Fall Semester
Teaching
What should new students do?
Contact Kumar and/or students Brent Lagasse, Sagar Tamhane or Bridget Beamon in the PICOLab
Fall 2007 22
Gergely Zaruba
Research Projects
Personal Area Networks
Heterogeneous Wireless NetworksArchitecture, Admission Control and Handoff
Optical NetworksOptical Burst Switching, Routing, QoS Provisioning
Traffic Modelling
Contact: kamangar@cse.uta.edu (GACB 112)
Fall 2007 23
Hao Che Embedded hardware/software design for NG
network processors Traffic engineering
Implementation issues and software development
MPLS path protection and fast rerouting Routing redundancy Traffic modeling for wireless networks
Contact: http://crystal.uta.edu/~hche/
Fall 2007 24
Yonghe Liu Sensor network and security
Prototyping and experimental study Theoretic design and analysis
Cross layer optimization Channel dependent performance
Software security Design and analysis
In need of Strong mathematic skill (probability/signal processing/number
theory/etc), or Strong programming skill (hardware/software)
Contact: http://ranger.uta.edu/~yonghe/
Fall 2007 25
Software Engineering
David KungYu LeiArthur ReyesDavid Levine
Fall 2007 26
David Kung
Agent-Oriented Software Engineering Testing Object-Oriented Software Expert System for Design Patterns Formal Methods for Quality Assurance Fault Tolerance and Automatic Recovery
Using Dynamic Class Diversity
Contact: http://ranger.uta.edu/~kung/kung.html
Fall 2007 27
Yu Lei Concurrent and real-time software
systems Race analysis, Deterministic Execution
Environment, Reachability Testing, State Exploration-Based Verification
Automated software testing Object-Oriented Testing, Component-Based
Testing, Combinatorial Testing
Contact: http://ranger.uta.edu/~ylei
Fall 2007 28
Software Engineering
Software has become pervasive in modern society Directly contributes to quality of life Malfunctions cost billions of dollars every year,
and have severe consequences in a safe-critical environment
All about building better software in better ways, especially for large-scale development Requirements, design, coding, testing,
maintenance, configuration, documentation, deployment, and etc.
Fall 2007 29
SERC
Faculty: Drs. David Kung and Jeff Lei Major Research Projects
Agent-oriented software engineering Object-oriented software testing and
maintenance (OOTWorks) Automated analysis, testing, and
verification of concurrent software systems (RichTest)
Combinatorial testing of software systems (FireEye)
Structural testing of security systems
Fall 2007 30
Arthur Alexander Reyes, Ph.D. Autonomous Vehicles Laboratory
Faculty Advisor, along with MAE, IE faculty AUVSI Student UAV Competition
2004 team didn’t place2005 team won 1st Place Overall2006 team won 3rd Place Overall
Teaches CSE 4310/5323 Software Eng. Processes CSE 4321 Software Testing CSE 4392 Game Development (new)
http://ranger.uta.edu/~reyes/
Fall 2007 31
David Levine, CSE@UTAProjects: (Computers applied to:) High Energy Physics, Bioinformatics, Medical Informatics, People with Disabilities, Streaming Processing, Other…
High Throughput Computational Science: Clusters and Grids:: David Levine
Fall 2007 32
Embedded Systems :: Roger Walker
Embedded Systems for Transportation Applications: Real-time Multi-core Systems for Embedded
Applications Stochastic Modeling From Sensor
Measurements Development of Special Measurement
Systems for Transportation Related Applications
Contact: http://ranger.uta.edu/~walker/
Fall 2007 33
Donggang LiuMatt WrightNan Zhang
Information Security
Fall 2007 34
Wireless and System Security :: Donggang Liu Security in wireless sensor networks
key management, security of services such as localization, routing, clustering etc.
Integrity of wireless embedded devices Code integrity, tamper-resistant techniques
Software and system security Security testing, detection of malicious code
Contact: http://ranger.uta.edu/~dliu
Fall 2007 35
Network Security and Privacy:: Matthew Wright Anonymous Communications
timing analysis, performance, new defenses
Stepping-Stone Detection Interplay between attack and defense
Incentives in Security and Privacy Trust in complex, ad-hoc
environments
Contact: http://ranger.uta.edu/~mwright
Fall 2007 36
Data Security and Privacy :: Nan Zhang Security/Privacy in
Databases and Data Mining Privacy-Preserving
Data Mining and OLAP
Secure Data Sharing
Contact: http://ranger.uta.edu/~nzhang
Fall 2007 37
Data Security and Privacy :: Nan Zhang Internet Security/Privacy
Worm Detection Smart Adversaries
Contact: http://ranger.uta.edu/~nzhang
Fall 2007 38
Computer Science and Engineering DepartmentThe University of Texas at Arlington
Assist Laboratory
F. Kamangar, M. Huber, D. Levine, G. Zaruba
Fall 2007 39
Information Technologies for Persons with Disabilities and Health Care
• Assistance for Persons with Disabilities
• Communication devices and technologies• Intelligent assistive devices• IT for improved care
• Information Technologies for Healthcare and Aging
• Automatic health monitoring• Intelligent environments• IT to improve uniform communication needs
Fall 2007 40
Connect - Intelligent Communication Technologies for Disability & Health Care
ClientsHuman Service Providers
Technical support
Servers, Databases, Web pages
Wireless CommunicationProvider
Internet
ClientsHuman Service ProvidersHuman Service Providers
Technical supportTechnical support
Servers, Databases, Web pagesServers, Databases, Web pages
Wireless CommunicationProvider
Internet
• Intelligent communication services connect individuals with care providers and with important information • Seamlessly connected devices• Adaptive interfaces• Universal underlying
software architecture• Intelligent information
analysis and interpretation• Seamless, omnipresent
access to information
Fall 2007 41
Assistive Technologies
• Computer Technologies Can Enhance Assistive Devices• Ayuda – Intelligent wheelchair
• Autonomous navigation capabilities
• Environment sensing• Integration of computer control
and user instructions • Force feedback technologies to
enhance interaction capabilities for persons with physical disabilities
Fall 2007 42
Health Monitoring and Intelligent Environments for Aging in Place
• Wirelessly Connected Sensors Provide Health Information and can Improve Quality of Life• Health sensors can monitor conditions
and detect problems• Wireless communications permit
continuous monitoring• Prediction and modeling technologies
facilitate automatic analysis of the data• Communication technologies allow
connectivity to physician
• Sensors in the environment allow automation of important functions and assistance
• Monitoring and assistance for Aging in Place
Fall 2007 43
Computer Science and Engineering DepartmentThe University of Texas at Arlington
AI and Robotics Laboratory
M. Huber, F. Kamangar
Fall 2007 44
Adaptation and Learning in Robots and Computer Systems
• Personal Service Robots• Service robots have to interact with people• Programmability by unskilled users• Robustness in real world situations
• Variable Autonomy• Robots have to be easy to program • Robots should understand any kind of user command
• Cognitive Development• Computer systems have to learn how
to act and reason in the world
Fall 2007 45
Robot Imitation – Programming by Demonstration
• Learning to Sense• Imitating robots have to be able to interpret their observations
• Learning to Relate Human Demonstrations to Robot Actions
• Learning to extract the important aspects of human actions • Translating human actions into corresponding robot controls
• Learning to Interpret Task Requirements
• Robots have to be able to learn to ignore dangerous commands
Fall 2007 46
Hierarchical Skill Learning / Cognitive Development
• Learning Behavioral Strategies• Adaptation to unknown
conditions• Automatic extraction of
subtasks
• Hierarchical Learning• Learning with abstract actions• Learning using state
abstractions• Facilitation of incrementally
more complex behavior
Fall 2007 47
Robot Activities and Platforms
• Robot Soccer (RoboCup)• Autonomous robotic soccer with
robot dogs • Student team
• Computer Game Trials• UCT – Urban Combat Testbed
Fall 2007 48
HERACLEIAHERACLEIA
Fall 2007 49
Professor Fillia Makedon
BioinformaticsMobile and Pervasive Computing
Professor Heng Huang
BioinformaticsMultimedia and Video Processing
Participating Faculty
Fall 2007 50
HERACLEIA Security ProjectsOpen Collaboration System:How can we enable any entity to join a collaboration group
in a P2P environment? Entities can log on to system with any names they want. Collaborative groups can be created by any entity and share
files in a P2P fashion. Our OC System supports operations on groups, roles and
shared files.
Certified Authority Project: Short-lived certificates(SLC) are used to prevent unofficial information propagation which
can take place due to various causes We use forward secure signatures in SLCs and cut off the cost for the revocation.
Fall 2007 51
HERACLEIA Sensor Localization ProjectsGeographical Distributed
Localization (GDL) : Localization is a fundamental
Problem in Wireless Sensor Networks.
Our GDL protocols support both static and mobile node localization
We use a novel computational model for localization.
Wormhole Detection Project: How can we protect Wireless
Sensor Networks in hostile environments?
We have developed a distributed wormhole detection algorithm based on static GDL to detect as well as locate wormholes inside the network.
Fall 2007 52
HERACLEIA Location Privacy ProjectsLocation privacy in sensor
networks: How can we protect the
location privacy of the sources of messages in a sensor network?
We create routing traps to confuse the attackers.
Sensor network anonymity project:
Location sensors can be attached to people’s cell phone and medical sensors can be attached to human body to monitor vital signs.
In such sensor networks, anonymity of participants needs to be protected.
We use one-way hash chains to refresh IDs of sensor nodes.
Fall 2007 53
HERACLEIA Negotiation Projects
SCENS Project: SCENS (Secure Content
Exchange Negotiation System) is a meta-data based negotiation system for agreeing data sharing conditions among parties who do not know each other. It can be accessed at:
http://heracleia.uta.edu/scens
Sensor Test Bed: Using programmable motes as
sensors in a wireless network. To run experiments in assisted
living To test algorithms on a sensor
net