Databases and data mining
Objective:
Building the data management infrastructure for the twenty-first century, with particular emphasis on issues surrounding Big Data.
What we do:
Stream processing, approximate query answering, text mining, novel applications, software infrastructure for large-scale analytics, privacy preservation while mining data, and new methods and interfaces that extend human capabilities to find patterns in graph and other data
Our faculty in this area
Languages, compilers, and runtime systems
Objective:
Developing new compiler methods to optimize applications from mobile to cloud server
What we do:
Software approximate computing, lightweight dynamic compilation, reliable parallel software, specialized solutions to boost the performance of algorithms, and solving problems at the interface of architecture, operating systems and program analysis
Our faculty in this area
Networking, operating systems, and distributed systems
Objective:
Developing new compiler methods to optimize applications from mobile to cloud server
What we do:
Software approximate computing, lightweight dynamic compilation, reliable parallel software, specialized solutions to boost the performance of algorithms, and solving problems at the interface of architecture, operating systems and program analysis
Our faculty in this area
- Peter Chen
- Mosharaf Chowdhury
- Roya Ensafi
- Jason Flinn
- Sugih Jamin
- Manos Kapritsos
- Baris Kasikci
- Harsha Madhyastha
- Z. Morley Mao
- Barzan Mozafari
- Kang Shin
Secure, trustworthy, and reliable systems
Objective:
Provide highly effective and low-cost solutions to ensure security, correctness and reliability in future designs, thereby extending the lifetime of silicon fabrication technologies.
What we do:
Design introspective hardware systems capable of recognizing and correcting their errant ways, develop “patching” techniques that can repair escaped hardware bugs, investigate low-cost techniques to validate computation at runtime, produce hardware security assurance solutions, identify security and privacy vulnerabilities in existing software systems and develop solutions, and develop systems that are provably secure and private by design