Theory & Algorithms
Most CISE research projects include elements of theoretical analysis and algorithm development. These projects study the capabilities and fundamental limitations of algorithms to better understand the computational tools utilized in various research fields. Researchers apply this knowledge to machine learning, data structures, optimization, computational biology, cryptography,geometric modeling, and other fields. Theory and algorithms anticipates the growing quantity and power of data and works to use algorithms to their full capacity. Research areas include: designing efficient data structure and algorithms, understanding the complexity of computational problems, and designing secure cryptographic systems.
AF: Small: Manifold optimization algorithms for protein-protein docking
Proteins are the major building blocks of the cell. Many proteins perform their function by interacting with other proteins. In a typical cell hundreds of thousands of different protein interactions take place. Characterizing these interactions helps elucidate how living organisms function at the molecular level, contributes towards the development of treatments against diseases such as […]
CIF: Small: Low-Light 3D Imaging: From Fundamental Limits to Practical Systems
Forming images with focused, spatially resolved light is an area of rapid innovation due to the growing use of computational methods and the variety of meanings of ?image.? Aside from being photograph-like, an image acquired through optical means could show distances, thicknesses, chemical concentrations, molecular energy transfers and many other properties, depending on the methods […]
TWC: TTP Option: Frontier: Collaborative: MACS: A Modular Approach to Cloud Security
The goal of the Modular Approach to Cloud Security (MACS) project is to develop methods for building information systems with meaningful multi-layered security guarantees. The modular approach of MACS focuses on systems that are built from smaller and separable functional components, where the security of each component is asserted individually, and where the security of […]
CIF: Small: Quantization for Acquisition and Computation Networks
Networks of sensors are increasingly important in a variety of applications including national security, environmental monitoring, and health care. These systems should serve their purposes with minimal communication between sensors and minimal computation overhead from coding. In particular, these efficiencies can dramatically improve battery life, and in systems such as those implanted in a body, […]
Sensor Research Wins $1M NSF Award
Enhancing the functionality of cyber-physical systems—those that integrate physical processes with networked computing—could significantly improve our quality of life, from reducing car collisions to upgrading robotic surgeries to mounting more effective search and rescue missions. Recognizing Boston University as a key contributor to this effort, the National Science Foundation has awarded Professors Venkatesh Saligrama (ECE, SE) […]
CIF: Small: Collaborative Research: Exploring Synergies of Multi-State Networks
The objective of this project is to undertake a comprehensive study of synergistic gains for multi-state communication networks and develop strategies that can exploit them. The project is organized into three complementary thrusts, focusing on 1) dynamic channels, 2) dynamic channel knowledge, and 3) mixed channel knowledge. The first thrust seeks ways to exploit channel […]
CIF: Small: Collaborative Research: A Unifying Approach for Identification of Sparse Interactions in Large Datasets
More than 2.5 quintillion bytes of data are created daily in the form of sensor measurements, web posts and clicks, surveillance videos, purchase transactions, and health-care records. However, not all data collected is informative and not all features are relevant to the outcomes of interest. While several researchers have focused attention on compressive sampling for […]
CIF: Medium: Collaborative Research: Interference-Aware Cooperation via Structured Codes: Creating an Empirical Cycle
The classical approach to wireless communication is to isolate communication links by maximizing signal strength and minimizing interference between users. This simple philosophy is supported by a rich theoretical foundation which has inspired powerful coding techniques and protocols that lie at the heart of modern wireless systems. However, these systems have recently become victims of […]
Opening Movements: Your next security ID may be a defining gesture
To the casual passerby, Janusz Konrad seems a bit fanatical about tai chi: standing in his office, waving one arm to and fro, then spreading both arms and bringing them together. Duck inside, however, and you’ll notice he’s not stretching for his health; he’s stretching for a camera, and images on a computer monitor are […]
CAREER: Harnessing Interference Structure in Networks
Wireless networks are the fabric of the mobile Internet. High-speed, ubiquitous wireless access is increasingly an enabling technology for important applications ranging from communication to commerce, medicine, and education. It is thus critical to create a pathway for sustainable wireless network growth in terms of the number of users and their data rates. A major […]