Electrical Engineering and Computer Science

CSE News

Winter 2018: Multidisciplinary Capstone Design Project - Supplemental Information

Course No.: EECS 498-006 and EECS 498-007
Credit Hours: 3 or 4 credits
Instructor: Jay Guo and Hun Seok Kim
Prerequisites:

Course Description:
See attached PDF [More Info]

Winter 2018: Multidisciplinary Capstone (MDE) Design Pilot

Course No.: EECS 498-005
Credit Hours: 3 or 4 credits
Instructor: Brian Gilchrist
Prerequisites:

Course Description:
EECS students, together with ME and MSE students, work on common, interesting, significant major design experience (MDE) projects. This pilot course is about providing students real-world, multidisciplinary design project opportunities to satisfy their MDE requirement and for ECE masters students interested in meaningful project experiences.

For WN18, we expect to have several projects with application focus in biomedical, energy, spaceflight, and other areas needing EECS students (e.g. sensor/electronics, embedded systems, controls, and wireless). Please contact Prof. Gilchrist with questions. [More Info]

Student-Built App Guides Smithsonian Gallery Visitors Through Ancient Asian Art Exhibit

Visitors to the Smithsonian's Freer|Sackler Galleries in Washington DC will be guided through an exhibit on ancient Asian art by an app developed by a team of UM students through the Multidisciplinary Design Program. The exhibit and app trace the historic pilgrimage of 8th century Korean monk Hyecho to provide context for the exhibit. [Full Story]

Related Topics:  Jamin, Sugih  Undergraduate Students  

HV Jagadish Elected as Fellow of the American Association for the Advancement of Science

HV Jagadish, the Bernard A. Galler Collegiate Professor of Electrical Engineering and Computer Science and a distinguished scientist at the Michigan Institute for Data Science, has been elected as a fellow of the AAAS for distinguished contributions to database systems and many aspects of Big Data and data science, specifically for new ways to share data. [Full Story]

Related Topics:  Big Data  Data and Computing  Jagadish, HV  Lab-Software Systems  

Ada Lovelace Opera and Lightning Talks Highlight Women's Contributions to Computing

A creative event designed to showcase women's contributions as computer scientists took place November 16. The Ada Lovelace Opera began with eight TED-style lightning talks by female faculty and students at UM who are engaged in cutting-edge computing research. The talks were followed by an opera on Ada Lovelace's establishment as the research partner of inventor Charles Babbage in the 1840s, which was performed by students in the School of Music, Theatre & Dance. [Full Story]

Related Topics:  Graduate Students  Mihalcea, Rada  Women in Computing  

2017 CSE Graduate Student Honors Competition Highlights Outstanding Research

CSE held its fourteenth annual CSE Graduate Student Honors Competition on November 8. The top presentation competition was "Analyzing and Enhancing the Security of Modern Memory Systems," given by Salessawi Ferede Yitbarek, who represented CSE's Hardware research area. [Full Story]

Related Topics:  Graduate Students  

Prof. Chris Peikert Receives TCC Test of Time Award for Work in Lattice Cryptography

Chris Peikert, the Patrick C. Fischer Development Professor in Theoretical Computer Science, and his co-author Alon Rosen have received the TCC Test of Time Award for their paper on efficient collision-resistant hashing on cyclic lattices. The award is a recognition of a long line of works by Prof. Peikert and others who laid the foundations for practically efficient lattice-based cryptography. [Full Story]

Related Topics:  Lab-Theory of Computation  Peikert, Chris  Security (Computing)  

Winter 2018: Mining Large-scale Graph Data

Course No.: EECS 598-008
Credit Hours: 4 credits
Instructor: Danai Koutra
Prerequisites: Basic knowledge of linear algebra, programming, and machine learning

Course Description:
Graphs naturally represent information ranging from linksbetween webpages to friendships in social networks, tocollaborations between coauthors and connections betweenneurons in our brains. These graphs often span billions of nodesand interactions between them. Within this deluge of interconnected data, how can we extract useful knowledge,understand the underlying processes, make interesting discoveries, and contribute to decision-making?

This course will cover recent methods and algorithms foranalyzing large-scale graphs, as well as applications in variousdomains (e.g., neuroscience, web science, social science,computer networks). The focus will be on scalable and practicalmethods, and students will have the chance to analyzelarge-scale datasets. The topics that we will cover includeclustering and community detection, recommendation systems,similarity analysis, deep learning, summarization, and anomalydetection in the graph setting. [More Info]

Winter 2018: Social Computing Systems

Course No.: EECS 498-001
Credit Hours: 4 credits
Instructor: Walter Lasecki
Prerequisites: EECS 485 or EECS 493 or permission of instructor

Course Description:
Computation rarely exists in isolation. From social media, to collaboration and coordination tools, to crowdsourcing and collective intelligence, technology has risen from use as an individual tool for focused domains to play a role in or even mediate a majority of social interactions today. Social Computing is the study of this interplay between social processes and the computation that supports and augments them. This course will cover topics including collaborative systems, social media, systems for supporting collective action, data mining and analysis, crowdsourcing, human computation, and peer production. [More Info]

Prof. Reetuparna Das Inducted into the MICRO Hall of Fame

Assistant Professor Reetuparna Das has been inducted into the IEEE/ACM MICRO Hall of Fame, an honor given to outstanding researchers with eight or more papers at the International Symposium on Microarchitecture. MICRO is the flagship conference for microprocessor architecture and one of the top-tier computer architecture conferences. [Full Story]

Related Topics:  Das, Reetuparna  Lab-Computer Engineering (CE Lab)  

Michigan Researchers Win Best Paper Award at DFT 2017

John P. Hayes, Claude E. Shannon Professor of Engineering Science, and CSE graduate student Paishun Ting have received the Best Paper Award at the 30th IEEE Symposium on Defect and Fault Tolerance for their work in eliminating a hidden source of error in stochastic circuits. [Full Story]

Related Topics:  Computer Architecture  Computer-Aided Design & VLSI  Graduate Students  Hayes, John  Lab-Computer Engineering (CE Lab)  

Winter 2018: Randomness in Computation

Course No.: EECS 598-010
Credit Hours: 3 credits
Instructor: Christopher Peikert
Prerequisites: EECS 376 or EECS 477

Course Description:
Randomness and the tools or probability theory have proven central in many areas of modern science, and especially in computing and the design and analysis of algorithms. This course will expose students to a wide variety of randomized algorithms and the main techniques (linearity of expectation, the second moment method, Chernoff bounds, martingales, and the probabilistic method) used to analyze them. The course also will explore applications of these tools to analyze random combinatorial objects and deterministic algorithms applied to random inputs drawn from some distribution.

Advanced topics may include: the Lovasz Local Lemma, Talagrands inequality, streaming algorithms, quantum computation, approximation algorithms, semidefinite programs, probabilistic proof systems, cryptographic protocols, and others. (The choice of advanced topics will depend on the interests of the students and instructor.) [More Info]

Securing the vote: How 'paper' can protect US elections from foreign invaders

This story on security problems with voting quotes Prof. J. Alex Halderman, who says that "Although there is no evidence that any past election in the United States has been changed by hacking, it is in my opinion only a matter of time until one is." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Winter 2018: Optics and Quantum Spectroscopy of Semiconductors

Course No.: EECS 598-004
Credit Hours: 3 credits
Instructor: Mack Kira
Prerequisites: PHYSICS 240 and (EECS 320 or 334 or 434 or 520 or 540)

Course Description:
Rough Syllabus: This lecture will provide a pragmatic and brief introduction to solid-state theory, many-body formalism, and semiconductor quantum optics to explore pragmatic possibilities for nanotechology. As a central theme, the coupling of the quantized light field to electrons is investigated in detail, while the many-body Coulomb interaction of charge carriers is fully included. In this context, we will analyze which quantum effects and quasiparticles optical experiments can detect and control in terms of excitonic effects, plasmonics, quasiparticle accelerators, and ultrafast spectroscopy. To extend the quantum ideas further, we will follow how including quantum fluctuations of light to laser spectroscopy will transform it to quantum spectroscopy, a new realm where dropleton, entanglement, quantum memory etc. effects can be explored. [More Info]

Prof. Jason Mars is Bringing Smart Banking to Market

Ann Arbor-based spinout Clinc, which was founded by CSE Profs. Jason Mars and Lingjia Tang, along with their former students Michael Laurenzano and Johann Hauswald, in 2015, is leading the pack of intelligent banking assistant solutions. Their flagship product, called Finie, is being adopted by a number of banks. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Lab-Computer Engineering (CE Lab)  Mars, Jason  Tang, Lingjia  

Winter 2018: Motion Planning

Course No.: EECS 598-003
Credit Hours: 3 credits
Instructor: Dmitry Berenson
Prerequisites: Linear algebra (e.g. MATH 214) and significant programming experience (e.g. EECS 281)

Course Description:
Motion planning is the study of algorithms that reason about the movement of physical or virtual entities. These algorithms can be used to generate sequences of motions for many kinds of robots, robot teams, animated characters, and even molecules. This course will cover the major topics of motion planning including (but not limited to) planning for manipulation with robot arms and hands, mobile robot path planning for non-holonomic constraints, multi-robot path planning, high-dimensional sampling-based planning, and planning on constraint manifolds. Students will implement motion planning algorithms in open-source frameworks, read recent literature in the field, and complete a project that draws on the course material. [More Info]

Winter 2018: Patent Fundamentals

Course No.: EECS/ENGR 410
Credit Hours: 4 credits
Instructor: Mohammed Islam
Prerequisites: Open to all students

Course Description:
Have you ever had a great idea, then discovered that someone else was using it? Do you wish you could protect your inventions? Learn how to get a patent and protect your rights. In this course, you will write your own patent application and learn how to shepherd it through the Patent Office. The basics of Patent Law are covered, including patentable subject matter, novelty, obviousness, specification and claims of a patent, and claim drafting. Both patent prosecution and litigation topics are covered. This course is open to all undergrad and grad students -- technical background not required. [More Info]

Winter 2018: Internet Foundations

Course No.: EECS 498-002
Credit Hours: 2 credits
Instructor: Mohammed Islam
Prerequisites: MUST BE TAKEN PASS/FAIL

Course Description:
This course introduces students to the fundamentals of the internet. You use the internet every day, and in this course we permit you to look under the hood to see the basics of how the internet works. The course is specifically intended for students who do not specialize in computers or computer science. We start by reviewing the differences between various applications, such as world wide web, skype, and Bit-Torrent. The 4-layer internet model will be explained, which includes the application, transport, network and link layers. Application layer examples include WWW, HTTP, email, DNS and P2P Applications. The two most commonly used Transport Layer protocols are TCP and UDP. The Internet uses IP as the Network Layer, and routers perform the IP layer functions. The Link Layers used most commonly include Ethernet (wired) and IEEE 802.11 or WiFi (wireless). Other topics covered briefly include Wireless and Mobile Networks, Software Defined Networks, Data Center Networks and Network Security. By taking this course you will have a better appreciation of how computer networks work and how your computer communicates over the internet. [More Info]

Winter 2018: Power System Markets and Optimization

Course No.: EECS 598-007
Credit Hours: 3 credits
Instructor: Johanna Mathieu
Prerequisites: EECS 463 or permission of instructor

Course Description:
This course covers the fundamentals of electric power system markets and the optimization methods required to solve planning and operational problems including economic dispatch, optimal power flow, and unit commitment. The course will highlight recent advances including convex relaxations of the optimal power flow problem, and formulations/solutions to stochastic dispatch problems. Problems will be placed in the context of actual electricity markets, and new issues, such as incorporation of renewable resources and demand response into markets, will be covered. All students will conduct an individual research project. [More Info]

Winter 2018: Network Information Theory

Course No.: EECS 598-005
Credit Hours: 3 credits
Instructor: Sandeep Pradhan
Prerequisites: EECS 501 or equivalent

Course Description:
With the emergence of numerous applications, such as 5G and IoT, involving different types of communication networks, such as packet-switched networks, wireless sensor networks and mobile cellular wireless networks, there has been a significant interest in obtaining a deeper understanding of transmission, storage and processing of information in these networks.

Network information theory deals with information in communication networks, i.e., obtaining optimal performance limits as well as ecient information processing strategies to achieve these limits in such networks. A communication network is modeled as a system involving many transmitters and receivers working with many information sources and channels. There have been several exciting new developments in the recent past in this area. [More Info]

UM Student Programming Team Advances to ACM-ICPC World Finals in Beijing

A UM programming team has qualified to advance to the prestigious 2018 ACM International Collegiate Programming Contest World Finals in Beijing after regional competition. Five UM teams, coached by Prof. Kevin Compton, competed at regionals. [Full Story]

Related Topics:  Compton, Kevin  Data and Computing  Undergraduate Students  

FDA Spells Out When Medical Device Modifications Need Review

Bill Aerts, Deputy Director at the Archimedes Center in CSE, is quoted in the article about new FDA guidance for manufacturers of medical devices regarding software patches for security purposes. Also quoted is Ben Ransford, co-founder and CEO of cybersecurity firm Virta Laboratories, a CSE spinout. [Full Story]

The newest AlphaGo mastered the game with no human input

In this article, Prof. Satinder Singh Baveja is quoted from his commentary on the Nature article regarding DeepMind's use of unassisted reinforcement learning in the AlphaGo Zero system. He points out that AI programs like AlphaGo Zero, which can gain mastery of tasks without human input, may be able to solve problems where human expertise falls short. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMind has a bigger plan for its newest Go-playing AI

In this article, Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero. Prof. Baveja reinforces the notion that with reinforcement learning, AI systems do not necessarily need human expertise. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMinds Go-playing AI doesnt need human help to beat us anymore

In this article, Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero. "Over the past five, six years, reinforcement learning has emerged from academia to have much more broader impact in the wider world, and DeepMind can take some of the credit for that," says Prof. Baveja. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

DeepMind's latest AI breakthrough is its most significant yet

In this article, reinforcement learning expert Prof. Satinder Singh Baveja comments on DeepMind's findings published in Nature regarding AlphaGo Zero's breakthrough performance and indicates that it could be one of the biggest AI advances so far. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

Tony Fadell Leaves Silicon Valley Behind

Tony Fadell (BSE CE 1991) searches for investments for his venture firm Future Shape while he continues to build roots in Paris and recommends against Silicon Valley. [Full Story]

Related Topics:  Alumni  

Why the Krack Wi-Fi Mess Will Take Decades to Clean Up

This article quotes Prof. Kevin Fu, who says "For the general sphere of IoT devices, like security cameras, we're not just underwater. We're under quicksand under water." [Full Story]

Related Topics:  Fu, Kevin  Lab-Software Systems  Security (Computing)  

Duo Security raises $70 million at a valuation north of $1 billion

Duo Security, based in Ann Arbor, was founded by alums Jon Oberheide (CSE PhD 2011) and Dug Song (CS BS 1997) in 2009. Congrats to them! [Full Story]

Related Topics:  Alumni  Security (Computing)  

VAuth tech feels your voice in your skin

This article describes VAuth, the new thechnology that supplements voice authorization developed in the lab of Prof. Kang G. Shin. [Full Story]

Related Topics:  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security (Computing)  Shin, Kang G.  

Wearables to boost security of voice-based log-in

Voice authentication is easy to spoof. New technology could help close this open channel. [Full Story]

Related Topics:  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security (Computing)  Shin, Kang G.  

University of Michigan Solar Car Team finishes 2nd in world challenge

In its best finish ever in the World Solar Challenge, America's top solar car team took second place in the 1,800 mile race across the Australian Outback, powered only by the sun. Michigan was one of only two top teams that raced a skinny, monohull car - a radical departure from the proven catamaran design that dominated the field. "This is indescribable," said team member and CE student, Patrick Irving. The University of Michigan interdisciplinary student-run team, winner of six American Solar Car Challenges, unveiled the car, Novum, meaning "new thing" in Latin, just this past summer. [Full Story]

Related Topics:  Student Teams and Organizations  

Third annual MIDAS research symposium emphasizes an interdisciplinary approach to data analysis

Big data, data science and analytics were among the main topics discussed at the third annual Michigan Institute for Data Science daylong research symposium Wednesday, Oct 11, at Rackham Auditorium and the Michigan League. Alfred Hero, co-director of MIDAS and professor of electrical engineering and computer science, spoke about how this diverse set of speakers aligns with the theme of the symposium, "A Data-Driven World: Potentials and Pitfalls." [Full Story]

Related Topics:  Big Data  Hero, Alfred  Signal & Image Processing and Machine Learning  

Hacking North Korea is Easy. Its Nukes? Not So Much

This article reports on how difficult it is for hackers to invade North Korea's nuclear program. CSE research fellow Will Scott talks about the country's limited connections, and says that any successful attack would require a human agent working to manually sabotage target systems. [Full Story]

Related Topics:  Security (Computing)  

Kevin Fu recognized with Regents' Award for Distinguished Public Service

Prof. Kevin Fu has been selected to receive the 2017 Regents' Award for Distinguished Public Service, in recognition of the enormous time and effort he has contributed to informing policy makers and Congress about issues in computer security, medical devices, and for being a strong advocate in Washington, DC on behalf of the computing community at large. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  

Solar Car Team Spotlight: Andrew Dickinson

Computer science student Andrew Dickinson is the race strategist on the solar car team. He talks about his first project on the team, an app you can use on satellite internet that shows other cars, routes, and hazards. [Full Story]

Related Topics:  Undergraduate Students  

Precision Health at Michigan

Learn more about Michigan's new initiative to lead in precision health: using advanced tools and technology to provide personalized solutions to improve an individual's health and wellness. Lead by co-director Eric Michielssen. [Full Story]

Related Topics:  Applied Electromagnetics and RF Circuits  Big Data  Health  Michielssen, Eric  Signal & Image Processing and Machine Learning  

Computing+Data Wide Across the Curriculum

CSE Alumnus Rob Rutenbar gave a CSE Distinguished Lecture on September 20, 2017, where he described the CS+X Program that rolled out under his watch at the University of Illinois at Urbana-Champaign. Watch the video and learn more. [Full Story]

Related Topics:  Alumni  

Manos Kapritsos and Collaborators Win USENIX Security Paper Award

A team of researchers including Prof. Manos Kapritsos has won a Distinguished Paper Award at the 2017 USENIX Security Symposium for Vale, a new programming language and tool that supports flexible, automated verification of high-performance cryptographic assembly code. [Full Story]

Related Topics:  Kapritsos, Manos  Lab-Software Systems  Security (Computing)  

Michigan, Georgia Tech Researchers Funded to Deter Financial Market Manipulation

Researchers at the University of Michigan and the Georgia Institute of Technology will develop innovative approaches to detecting and deterring the computerized manipulation of financial markets under a $1M grant from the National Science Foundations's Big Data program. Michael Wellman, the Lynn A. Conway Collegiate Professor of Computer Science and Engineering, is project director and one of five PIs. [Full Story]

Related Topics:  Artificial Intelligence  Big Data  Lab-Artificial Intelligence  Wellman, Michael  

Improving Natural Language Processing with Demographic-Aware Models

Michigan researchers, including Prof. Rada Mihalcea, research fellow Carmen Banea, and graduate student Aparna Garimella have found that word associations vary across different demographics, and researchers can build better natural language processing models if they can account for demographics. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Mihalcea, Rada  

CS KickStart Wants First-Year Women to Succeed in Computer Science

The second annual CS KickStart took place August 27 September 1, 2017, on North Campus in the Bob and Betty Beyster Building. CS KickStart is a free week long summer program for incoming first-year students that aims to improve the enrollment and persistence of women in U-Ms computer science program. [Full Story]

Related Topics:  Undergraduate Students  Women in Computing  

BugMD: Automatic Mismatch Diagnosis for Bug Triaging

Today's incredibly dense microprocessors take more time to verify for correctness than they do to design, and bugs are extremely difficult to track down and correct. CSE researchers have introduced BugMD, an automatic bug triaging solution that collects multiple architectural-level mismatches and employs a classifier to pinpoint buggy design units. [Full Story]

Related Topics:  Bertacco, Valeria  Computer Architecture  Computer-Aided Design & VLSI  Lab-Computer Engineering (CE Lab)  Mahlke, Scott  

Scribe: Deep Integration of Human and Machine Intelligence to Caption Speech in Real Time

Research by Prof. Walter Lasecki and his collaborators is highlighted in the Sept. issue of Communications of the ACM. The researchers describe Scribe, a system that combines human labor and machine intelligence to caption speech in real time. [Full Story]

Related Topics:  Artificial Intelligence  Assistive Technology  Lab-Artificial Intelligence  Lab-Interactive Systems  Language and Text Processing  Lasecki, Walter  

Four New Faculty Join CSE

CSE is delighted to welcome four outstanding new faculty members to Michigan. From contributions in software quality to internet security, they'll help to lead and teach us as we enter a world increasingly shaped by computer science and engineering. [Full Story]

Phone Browsing Could Become Faster, May Use Less Data With Smart Code

This article reports on Vroom, software developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk. Vroom improves mobile browsing speed by optimizing the end-to-end interaction between smart devices and web servers. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Mobile and Networked Computing  

'Learning Database' Speeds Queries from Hours to Seconds

University of Michigan researchers developed software called Verdict that enables existing databases to learn from each query a user submits, finding accurate answers without trawling through the same data again and again. Verdict allows databases to deliver answers more than 200 times faster while maintaining 99 percent accuracy. In a research environment, that could mean getting answers in seconds instead of hours or days. [Full Story]

Related Topics:  Big Data  Lab-Software Systems  Mozafari, Barzan  

After Y Combinator, May Mobility Ready to Test Self-Driving Fleets

May Mobility, founded by Prof. Edwin Olson, is focused on real-world implementations of autonomous driving technology, with a specific emphasis on whats possible today, not what might be doable five or ten years from now. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Artificial Intelligence  Olson, Edwin  

May Mobility is a self-driving startup with a decade of experience

May Mobility, founded by Prof. Edwin Olson, is focused on real-world implementations of autonomous driving technology, with a specific emphasis on whats possible today, not what might be doable five or ten years from now. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Artificial Intelligence  Olson, Edwin  

Mark Ackerman Receives European CSCW Lifetime Achievement Award

Prof. Mark Ackerman has been chosen to receive a Lifetime Achievement Award at the 15th European Conference on Computer-Supported Cooperative Work, for his groundbreaking and highly-recognized research in CSCW. [Full Story]

Related Topics:  Ackerman, Mark  Lab-Interactive Systems  

All CSE News for 2017