Computer research projects

Of 2015's hottest topics in computer science ns expressed by forbes contributors are their question originally appeared on quora: what are currently the hot topics in computer science research? By igor markov, michigan eecs prof - currently at google, on are several major closed-form challenges in computer science, such p versus np problem,Finding better algorithms for matrix multiplication and fourier transform,Building quantum computers that can quickly factorize numbers into primes (shor's algorithm), or at least explaining why we are still so far from this r, the hottest topics are broad and intentionally defined with some vagueness, to encourage out-of-the-box thinking. For such topics, zooming in on the right questions often marks significant progress in 's my list for nt-data applications, algorithms, and architectures are a meta-topic that includes research avenues such as data mining (quickly finding relatively simple patterns in massive amounts of loosely structured data, evaluating and labeling data, etc), machine learning (building mathematical models that represent structure and statistical trends in data, with good predictive properties), hardware architectures to process more data than is possible cial intelligence and robotics - broadly, figuring out how to formalize human capabilities, which currently appear beyond the reach of computers and robots, then make computers and robots more efficient at it. In the past, once good model were found for something (such as computer-aided design of electronic circuits), this research moves into a different field - the design of efficient algorithms, statistical models, computing hardware, -informatics and other uses of cs in biology, biomedical engineering, and medicine, including systems biology (modeling interactions of multiple systems in a living organism, including immune systems and cancer development),  computational biophysics (modeling and understanding mechanical, electrical, and molecular-level interactions inside an organism),  computational neurobiology (understanding how organisms process incoming information and react to it, control their bodies, store information, and think). Taxonomy goal is to break down large projects into work that can be done in parallel microtasks. Although goal crossing has been investigated on pen and tablet computers for use by able-bodied users, it presents substantially different challenges when used on the desktop with cursor control devices by people with motor control ty-based prototyping of ubicomp tystudio is a suite of tools for prototyping and testing ubiquitous computing applications. Classroom presenter is widely used as both a presentation tool for delivering lectures and as a classroom interaction system to support computer-based active icative practices in virtual communicative practices in virtual workspaces (cpvw) lab in the department of human centered design & engineering investigates emergent uses of digital technologies to coordinate work activities. Adopting and extending ideas from human-computer interaction, technical communication, and related fields, the lab uses varied methods to explore communicative practices in virtual encexp is a shared-source platform for simple, flexible, and extensible conferencing and collaboration. It helps researchers and educators develop innovative applications and solutions that feature broadcast-quality audio and video in support of real-time distributed collaboration and distance learning environments.

However, automatic information extraction systems produce errors and are not tolerated by users, whereas user contributions incentives and management to control aces that make us advent of computers has made many things much easier in our lives. It then queries the online music libraries of the speakers to choose songs appropriate for that -lifespan information system project focuses on the design of information systems to support the solution of problems that are unlikely to be solved within a single human lifespan — structurally, problems that are tied to limitations of the human psyche, limitations of the structure of society, or to slow-moving natural time -computer explore the feasibility of muscle-computer interfaces: an interaction methodology that directly senses and decodes human muscular activity rather than relying on physical device actuation or user actions that are externally visible or audible. As a first step towards realizing the muscle-computer interface concept, we conducted an experiment to explore the potential of exploiting muscular sensing and processing technologies for muscle-computer interfaces. Our research focusses on evaluating the effect on behavior of providing such tools, on improving the tools and adding new functionality, and on integrating them with mobility applications for blind and deaf-blind ality & persuasive a variety of persuasive health applications have been designed with a preventive standpoint toward diseases, many have been designed largely for a general audience. Our goal for this research was to explore the relationship between personality and persuasive technologies in the context of health-promoting mobile are designing an information system to help people with breast cancer manage their health information. One example of what prefab enables is better hci research: prefab can be used by hci researchers to test many of their ideas using existing applications, rather than implementing a toy prototype within an isolated goal of this project is to create novel computer-based devices enhance the quality of life for people with cognitive disabilities. Reform lets end users put a new face on webpages, without subjecting them to the whims of a webmaster, and without learning to program e is a research application that was developed by the university of washington and intel labs seattle for android-based mobile phones. It is a multidisciplinary project with researchers and practitioners from uw's department of computer science and engineering, access technology lab, and do-it. This device will enable individuals with motor impairments to use vocal parameters to control objects on a computer screen (buttons, sliders, etc.

Since no mouse, keyboard or stylus is required, it can be used by people with various forms of motor impairments to express themselves the voicepen project, we seek to explore ways in which a digital stylus input can be augmented with voice input to provide added expressivity and control in various pen-based tasks, such as drawing and manipulation of animation webinsight project includes is a collection of projects designed to make the web more accessible to blind web data kit (odk) is a free and open-source set of tools that help organizations author, field, and manage mobile data collection solutions. In addition to socio-economic and health surveys with gps locations and images, odk is being used to create decision support for clinicians and for building multimedia-rich nature mapping : princeton researchers tout "layer 3. Labs, fueled with millions of dollars in funding and some of the biggest brains around, are bursting with new research into computer and networking oggs: follow our network research blog and facebook page wireless networks, computer security and a general focus on shrinking things and making them faster are among the hottest areas, with some advances already making their way into the market. Here's a roundup of 25 such projects that caught our eyes:duolingo this free website, duolingo, from a pair of carnegie mellon university computer scientists serves double duty: it helps people learn new languages while also translating the text on web pages into different 's luis von ahn and severin hacker have attracted more than 100,000 people in a beta test of the system, which initially offered free language lessons in english, spanish, french and german, with the computer offering advice and guidance on unknown words. Million in funding from union square ventures, actor ashton kutcher and princeton university computer science researchers envision an internet that is more flexible for data center operators and more useful to mobile users. Princeton's open source serval system is what assistant professor of computer science michael freedman calls a service access layer that sits between the ip network layer (layer 3) and transport layer (layer 4), where it can work with unmodified network devices. Serval's purpose is to make web services such as gmail and facebook more easily accessible, regardless of where an end user is, via a services naming scheme that augments what the researchers call an ip address set-up "designed for communication between fixed hosts with topology-dependent addresses. Routers to the rescueresearchers at germany'stechnical university in darmstadt have described a way for home wi-fi routers to form a backup mesh network to be used by the police, firefighters and other emergency personnel in the case of a disaster or other incident that wipes out standard cell and phone proliferation of wi-fi routers makes the researchers confident that a dense enough ad hoc network could be created, but they noted that a lack of unsecured routers would require municipalities to work with citizens to allow for the devices to be easily switched into emergency mode. The big question is whether enough citizens would really allow such access, even if security was peed signalinguniversity of tulsa engineers want to slow everything down, for just a few milliseconds, to help network administrations avoid slowing traffic, the researchers figure more malware can be detected and then headed off via an algorithm that signals at hyperspeed to set up defenses.

Though researcher sujeet shenoi told the publication new scientist that it might not be cheap to set up such a defense system, between the caching system and reserved data pipes needed to support the l-alt-hackuniversity of washington researchers have created a card game called control-alt-hack that's designed to introduce computer science students to security game, funded in part by intel labs and the national science foundation, made its debut at the black hat security conference in las vegas over the summer. The game features cards (including descriptions of well-rounded hackers who rock climb, ride motorcycles and do more than sit at their computers), dice, mission cards, "hacker cred tokens" and other pieces, and is designed for players ages 14 and up. We went out of our way to incorporate humor," said co-creator tamara denning, a uw doctoral student in computer science and engineering, referring to the hacker descriptions and challenges on the cards. Ghost-usb-honeypot projectthis effort, focused on nixing malware like flame that spreads from computer to computer via usb storage drives, got its start based on research from sebastian poeplau at bonn university's institute of computer science. Geiger's internet protocol over xylophone players (ipoxp) provides a fully compliant ip connection between two computers. His setup uses a pair of arduino microcontrollers, some sensors, a pair of xylophones and two people to play the exercise provided some insights into the field of human-computer interaction (hci). Making software projects worksan francisco state university and other researchers are puzzling over why so many software projects wind up getting ditched, fail or get completed, but late and over budget. The key, they've discovered, is rethinking how software engineers are trained and managed to ensure they can work as researchers, also from florida atlantic university and fulda university in germany, are conducting a national science foundation-funded study with their students that they hope will result in a software model that can predict whether a team is likely to fail. We want to give advice to teachers and industry leaders on how to manage their teams," says dragutin petkovic, professor and chair of sf state's computer science department.

Research overwhelmingly shows that it is 'soft skills,' how people work together, that are the most critical to success. Ultra low-power wirelessforget about 3g, 4g and the rest: university of arkansas engineering researchers are focused on developing very low-power wireless systems that can grab data from remote sensors regardless of distortion along the network distortion-tolerant systems would enable sensors, powered by batteries or energy-harvesting, to remain in the field for long periods of time and withstand rough conditions to monitor diverse things such as tunnel stability and animal health. Says jingxian wu, assistant professor of electrical national science foundation is backing this research with $280,000 in funding. Way wirelessuniversity of waterloo engineering researchers have developed a way for wireless voice and data signals to be sent and received simultaneously on a single radio channel frequency, a breakthrough they say could make for better performing, more easily connected and more secure networks. This means wireless companies can increase the bandwidth of voice and data services by at least a factor of two by sending and receiving at the same time, and potentially by a much higher factor through better adaptive transmission and user management in existing networks," said amir khandani, a waterloo electrical and computer engineering professor, in a statement. He says the cost for hardware and antennas to support such a system wouldn't cost any more than for current one-way up is getting industry involved in bringing such technology into the standards steps require industry involvement by including two-way in forthcoming standards to enable wide spread waterloo research was funded in part by the canada foundation for innovation and the ontario ministry of research and -on batteriesresearchers at rice university in houston have developed a prototype spray-on battery that could allow engineers to rethink the way portable electronics are rechargeable battery boasts similar electrical characteristics to the lithium ion batteries that power almost every mobile gadget, but it can be applied in layers to almost any surface with a conventional airbrush, said neelam singh, a rice university graduate student who led a team working on the technology for more than a t lithium ion batteries are almost all variations on the same basic form: an inflexible block with electrodes at one end. The result is a battery that can be sprayed on to plastics, metal and researchers are hoping to attract interest from electronics companies, which singh estimates could put it into production relatively easily. At an industrial level it could be done very fast," she mosh pittwo mit researchers formally unveiled over the summer a protocol called state synchronization protocol (ssp) and a remote log-in program using it dubbed mosh (for mobile shell) that's intended as an alternative to secure shell (ssh) for ensuring good connectivity for mobile clients even when dealing with low bandwidth connections. Ssp and mosh have been made available for free, on gnu/linux, freebsd and os x, via an mit , often used by network and system admins for remotely logging into servers, traditionally connects computers via tcp, but it's that use of tcp that creates headaches for mobile users, since tcp assumes that the two endpoints are fixed, says keith winstein, a graduate student with mit's computer science and artificial intelligence lab (csail), and mosh's lead developer.

Ssp uses udp, a connectionless, stateless transport mechanism that could be useful for stabilizing mobile usage of apps from gmail to k codingresearchers from mit, california institute of technology and university of technology in munich are putting network coding and error-correction coding to use in an effort to measure capacity of wired, and more challengingly, even small wireless networks (read their paper here for the gory details).