Data Science Environments that Promote Reuse
The past decade has brought a sea change in the availability of data. Instead of a world in which we have small number of carefully curated data sources — instead we have a plethora of Read more…
The past decade has brought a sea change in the availability of data. Instead of a world in which we have small number of carefully curated data sources — instead we have a plethora of Read more…
Problems involving learning from ranking and choice data arise in several domains, ranging from sports rankings to elections and from recommender systems to marketing. Indeed, algorithms for these problems have been developed in many different Read more…
Text carries meaning much richer than its propositional content. What people often remember best about a text are their subjective impressions of how well-written the text was, or how the text was stylistically marked conveying Read more…
The overarching goal of the DELPHI project is to simplify the development of correct and reliable software. Existing methodologies require significant human expertise, such as in the design of appropriate abstract domains and environment models, Read more…
The Internet of Things (IoT) promises to change the way we acquire and handle data — as Internet-connected devices (wearable or implantable medical sensors, environmental sensors, devices) “stream” data back to the cloud for processing, Read more…
Visual simulation methods for natural phenomena involving complex solid and fluid dynamics have been widely applied in digital animation and effects. Computer graphics and computational mechanics have also proved to be a powerful combination for连接国外网络的软件下载
Recent years have witnessed two major trends in the development of complex real-time systems. First, they are moving from physically isolated hosts towards common computing platforms shared by multiple systems. Using common platforms can bring Read more…
The Intensive Care Unit of most major hospitals is a noisy environment. In order to monitor patients, healthcare practitioners set threshold alarms on each of many individual vital sign monitors. While nurses themselves rarely consider Read more…
Critical care involves the use of two common types of medical devices: monitoring devices, such as bedside monitors; and actuation devices, such as infusion pumps. Traditionally, caregivers need to collect information from the monitoring devices Read more…
The project aims to develop control systems for ground vehicles that are resilient to a variety of external attacks. Our approach is to combine control-level techniques and code-level techniques, resulting in the approach comprises of Read more…
Operators of distributed systems often find themselves needing to answer a diagnostic or forensic question. Some part of the system is found to be in an unexpected state; for example, a suspicious routing table entry Read more…
Large, diverse datasets hold tremendous promise, if only we can derive statistical insights from them. But often, these datasets are siloed and withheld, because of privacy concerns. Differential privacy can mitigate these concerns — it Read more…
Important decisions such as police deployment, loan approvals, hiring, and parole from incarceration are beginning to be made by machine learning algorithms. This has lent urgency to the question of whether these algorithms are fair. Read more…
Classical tools for rigorously analyzing data make the assumption that the analysis is static: the models to be fit, and the hypotheses to be tested are fixed independently of the data, and preliminary analysis of Read more…
In recent years, graphics processing units (GPUs) have thoroughly permeated consumer processor designs. It is now essentially impossible to find a smartphone, tablet or laptop without a substantial integrated GPU on the processor die. Utilizing Read more…
The World Well-Being Project (WWBP) is pioneering scientific techniques for measuring psychological well-being and physical health based on the analysis of language in social media. As a collaboration between computer scientists, psychologists, and medical researchers, Read more…
When a data analysis result is published or shared, how do we know whether it is trustworthy? Conceptually, we must show that each step of the analysis (and each set of parameters used in the Read more…
The goal of this project is to create fundamentally new defenses against distributed denial-of-service (DDoS) attacks that can provide far greater resilience to these attacks compared to existing solutions. Today’s responses to DDoS attacks largely Read more…
In our interconnected world, software bugs and security vulnerabilities pose enormous costs and risks. The Deep Specification project addresses this problem by showing how to build software that does what it is supposed to do, Read more…