595E
Recent readings in computer architcture and embedded systems. Students
will read and present papers from the past 2 years of work in the field
including ISCA, Micro, ASPLOS, and conferences associated with Embedded
Systems Week.
Recent readings in computer architcture and embedded systems. Students
will read and present papers from the past 2 years of work in the field
including ISCA, Micro, ASPLOS, and conferences associated with Embedded
Systems Week.
Welcome to graduate school! You’ve made it! Now that you’re here, this seminar is an opportunity for you to take a step back and figure out what this grad school thing is all about and how you can be successful.
A weekly seminar on Network Science, with broad topics rotating amongst these different areas: socials sciences, algorithms, biological networks, dynamics and control, and Cyberinfranstructure. The focus of the seminars in Winter will be on Innovation and taking research beyond academia. We occasionally have prominent researchers and entrepreneurs as guest speakers.
As bug detection techniques become more effective in eliminating flaws in software systems, attacks that rely on inherent space-time complexity of algorithms used for building software systems are gaining prominence. If an adversary can generate arbitrary inputs that induce behaviors with expensive space-time resource utilization at the defender's end, in addition to mounting denial-of-service attacks, the adversary can also use the same inputs to facilitate side-channel attacks in order to infer some secret from the observed system behavior.
This seminar will explore advanced techniques in vulnerability analysis and exploitation. Participants should have very good programming skills (especially in Python) and good knowledge of binary analysis and operating systems.
This seminar will study recent papers on large-scale cloud/cluster-computing platforms and storage systems, and system support for mining and search.
This seminar will study recent papers on security issues and algorithms for information retrieval and search.
In this course, we will study specific machine learning as practical data mining and classification tools to be applied in the general areas of distributed systems, networking, and security. We will start by introducing broadly machine learning classifiers, and then study (by reading technical papers) how a variety of ML tools have been applied in these areas. The course is meant to be an interactive, discussion based class, where students will read and present papers.
Mixed and Augmented Reality, an active research field since the 1990s, has recently gained significant popularity because of the possibility of being implemented on smart phones. Many people see it as one of the most important computer interfaces in the future of computing. Augmented Reality is the concept of overlaying computer-generated information on top of the physical world. Mixed Reality is a bit broader and subsumes the fields of Augmented Reality, Augmented Virtuality, and Virtual Reality. This class provides a hands-on introduction to these novel interface technologies.
This course explores advanced topics in highly scalable Internet services and their underlying systems architecture. Software today is increasingly being delivered as a service: accessible globally via web browsers and mobile applications and backed by millions of servers. Modern frameworks and platforms are making it easier to build and deploy these systems, such as Ruby on Rails and Amazon's EC2.