1 / 30

Graduate Studies in Computer Science

Graduate Studies in Computer Science. Bruce McMillin Department of Computer Science ff@mst.edu. 2008 Stats. TOTAL Enrollment 6,300 Undergraduate Students 4,900 Graduate Students 1,400 New Freshman Class 1,050 New Transfer Class 300. RI. 1 - 9 students.

kipling
Télécharger la présentation

Graduate Studies in Computer Science

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Graduate Studies in Computer Science Bruce McMillin Department of Computer Science ff@mst.edu

  2. 2008 Stats • TOTAL Enrollment 6,300 • Undergraduate Students 4,900 • Graduate Students 1,400 • New Freshman Class 1,050 • New Transfer Class 300

  3. RI 1 - 9 students No students 62 Fall 2007 1 4 Legend 5 2 3 18 40 or more students 3 5 12 13 15 10 - 39 students 2 5 16 5 26 12 43 5 18 10 4 395 15 20 4 2 DC 59 4,321 137 12 16 5 17 12 59 61 3 5 8 12 11 Total Enrollment • 47 states & 51 nations • 70% Missouri residents • 10% minority students • 9% international students 110 13 3 12 1

  4. 20+ Fraternities & Sororities • Instrumental & Vocal Ensembles, Theatre, Cultural & Improv Troupes • Academic & Honor Societies • Student Government & Campus Newspaper • Service & Religious Organizations • Army & Air Force ROTC http://studentlife.mst.edu Engineers Without Borders Miners in Space

  5. 14 Award Winning Student Design Teams http://experiencethis.mst.edu Human Powered Vehicle Formula SAE Solar House Robotics Solar Car Aero Vehicle Mini Baja

  6. What is Graduate Study? • M.S. – study beyond the B.S. • In depth, advanced • Ph.D. – research beyond M.S. • Creation of new knowledge

  7. Research vs. Coursework Option • Thesis • Significant research work in area of interest • Research Group vs. Individual • Couple Research with Employment • Career Opportunities

  8. Department Research Critical Infrastructure Protection CIP is a multi-disciplinary study dedicated to improving the security, reliability, and survivability of critical hardware/software integrated systems. Distributed, embedded and wireless systems. National Security Agency Center of Academic Excellence Software Engineering Specializes in Software Quality, Software Testing, Hardware/Software co-design, and Formal Methods of Software Specification and Verification, and Algorithm Theory

  9. Funded Research • $1M/year in external funding • Security • Dept of Defense, National Security Agency, National Science Foundation • Electric Smart Grid, Smart Transportation • National Science Foundation • Networks and Sensing • Air Force Research Lab

  10. Faculty • 18 Faculty • 15 Graduate Faculty • 3 listed with Computer/Electrical Engineering • Research in Distributed Systems, Networks, Security, Cyber-Physical Systems, Machine Intelligence, Software Engineering, Parallel Computing

  11. Communications Transmission Line Generation Energy Management Communications Satellite Distributed control and fault/attack detection Distributed Decisions FACTS Power Electronics Wind Power 33 FACTS device Sensing and monitoring Inputs Power Electronics Energy Storage Solar Power v v Power Electronics Energy Storage Smart Cyber-Physical Systems, Bruce McMillin Manage Distributed Energy and Transmission Large, complex, interconnected, real-time, critical networks Complex Interactions Computer Scientists Develop Integrated, decentralized, robust, Secure and survivable operation for Microgrids, Distributed Energy Resources, Smart Transportation

  12. Satellite Connection Modem Connection Land-based Network Legacy Data Sources Cellular / Wireless / Paging Connection Wireless WAN Fixed Unit (data source) Mobile Unit (data source) Intelligent Information Processing in aMobile Data Access Environment, Ali Hurson How to locate information intelligently, efficiently, and transparently? How to extract, process, and integrate relevant information efficiently? Applications Information fusion for emergency responders Knowledge Discovery Decision aid for battle commanders Information extraction and analysis for intelligence analysts Business information gathering and trend analysis Data dissemination in emergency evacuation situations

  13. Sensor Networks and Wireless Computing – Sanjay Madria Secure Sensor Networks Secure Data Aggregation in Wireless Sensor Networks Secure Key Distribution and Fault-Tolerance Handling Attacks in Sensor Networks Peer-to-Peer Systems P2P Collaborative Information Management Security and Trust Management in P2P Networks

  14. Sensor Network Dimensioning Coverage, Connectivity, Fault tolerance Bandwidth provisioning Capacity analysis Roadbed sensors Roadside sensors Sensor Networks for Transportation Systems, Maggie Cheng Applications Transportation safety: Surveillance, emergency rescue and roadside assistance Transportation system operation: Road construction and maintenance; real time traffic control

  15. Automated CAD Model Based Simulation of Manufacturing Operations, Frank Liu Automated CAD Model Based Simulation of Manufacturing Operations Develop object-oriented techniques for representing and managing both CAD data and sensory data, an architecture for the proposed system to automate simulation of manufacturing operations based on CAD models, techniques for efficient and robust tool motion tracking in a work environment. proposed system, with physical objects represented by CAD models in UGS NX;

  16. Verification of Requirements Specifications, Thomas Weigert Determine whether requirements are consistent and complete (in all situations, system behavior is defined) • Generate residual tests to verify part of the requirements that could not be proven • Generate minimal test suite with 100% coverage of requirements • Generate tests driving system to error situations for debugging

  17. Privacy-Preserving Collaborative Computing – Wei Jiang Common Goal • Approaches • Secure Multiparty Computation • Probabilistic and homomorphic public key encryption • Information theoretic measure • Randomization techniques • Applications • Detect plagiarized documents between two conferences • Produce anonymous data across different hospitals or healthcare institutions • Research Areas • Incentive driven privacy-preserving models • Secure data integration • Secure similar document detection • Text sanitization techniques

  18. Critical Infrastructure Protection through Computational Arms-Races, Daniel Tauritz Technical Approach Create Computational Arms-Races between defenders and attackers employing Competitive Co-Optimization which simultaneously optimizes defenses and attacks • Research Challenges & Remedies Under Investigation • Creating appropriate infrastructure models – Validating research findings on high-fidelity simulations • Identifying and preventing cycling, disengagement, and mediocre stability in co-optimization – Generalizing known coevolutionary remedies • Efficiently identifying high-quality algorithm parameters – Designing autonomous evolutionary algorithms who’s parameter values are determined through emergent behavior • How to compute objective fitness values in co-optimization – Developing the related coevolutionary theory

  19. Providing Security Services in Large Scale Networked Systems – Sriram Chellappan • Internet Systems • Network Traceback – Trace back hosts launching DoS attacks • A Predicate based Authentication scheme • Model and Defend Worm Propagation over P2P systems • Wireless Networks • Sensor Localization in Adversarial Environments • Secure Communications over Hybrid Military Networks A Network System with Nodes and Attackers • Future Research Directions • Botnet Detection and Defense • Insider Attacks Detection and Defense • Model Security in Cooperative Networks

  20. Multiple parties want to integrate and share resources → Need to compare, integrate, distribute their access control policies PolicyFilter Access Control PoliciesManagement & Analysis, Dan Lin … User Interface Request Dispatcher • Our Approaches • Policy Filter: quick comparison among a huge collection of policies • Policy Similarity Analyzer: fine-grained policy analysis • Policy Integrator: integrate complex policies under various constraints • Policy Decomposer: decompose policies in a security and privacy preserving fashion Policy Annotation • Access control in grid computing • Access control in multi-party coalition: coalition among government organizations, financial corporations, medical hospitals. Policy Similarity Analyzer Policy Decomposer Policy Integrator PolicyRepository

  21. Data mining and scientificvisualization, Jennifer Leopold Challenges How to generate 3D reconstructions from micro-CT scans and poor-quality histology slides? How to mine electronic media for instances of concepts and properties to be added to ontologies? How to identify relationships between attributes in phylogenetic and protein data sets? Applications Identify hidden, useful relationships in phylogenetic and protein data Examine minute and internal anatomical structures and developmental patterns Develop controlled vocabularies using information extraction technologies

  22. Remote BLAST BLAST Output PAL gene Perl tool Fasta File n Fasta File 1 Fasta File 2 Bioinformatics Applications in Gene Family Identification and Parallel EST Clustering, Fikret Ercal Challenges Given a DNA sequence (EST), find approximate matches quickly? Organize EST database such that searches can be performed quickly? Develop techniques to identify the members of a gene family correctly The study of the molecular processes by which functional innovation occurs interests not only evolutionary biologists, but protein engineers and medical and agricultural biologists.

  23. Curriculum Issues – M.S. • M.S. Program – 30 Hours • With Thesis • 6-9 hours thesis credit CS 490 • 12 hours 4xx level courses • 3 hour out-of-department course • CS 325 - Algorithms • Without Thesis • 18 hours 4xx level courses • 3 hour out-of-department course • CS 325 - Algorithms

  24. Curriculum Issues – Ph.D. • Ph.D. Program – 72 hours • At least 24 Hours of Coursework • Re-use all M.S. courses • 15 hours at S&T • 18 hours 4xx level courses • At least 24 hours dissertation credit • Usual schedule is 40+ hours dissertation credit plus coursework – 2 full years beyond courses • Work closely with advisor in research and to prepare dissertation.

  25. Required Background • A minimum GRE verbal score of 370. • A minimum combined GRE quantitative and analytic score of 1200 or GRE Quantitative >=700 and WR score >=4.0 (averages are 740 and 4.5). • TOEFL 570/230/89 • Content of the following courses: • Mathematics CS Theory • Computer Organization Data Structures • Database Software Engineering • Discrete Mathematics Operating Systems • Automata Theory

  26. Distance Education • M.S. Degree and Certificate Programs • Streaming internet video for course delivery. • Active Participation – Live with on-campus students • Lectures are archived • The program requirements are the same as for the on-campus program.

  27. Student Funding • GTA (Teaching Assistant) • Teach 10 to 20 hours/week • Apply through cs.mst.edu • GRA (Research Assistant) • Work with a faculty member on a research project for thesis or dissertation • Apply after getting to know faculty member • Fellowships • GAANN, DoD IASP, Chancellor’s Fellowships

  28. Companies that Hire Missouri S&T/CS Graduates

  29. Visit S&T Personal Campus Visits • Call 573-341-4491 to Schedule • Meet faculty and graduate students • Visit research group meetings • Visit classes • Facebook: Missouri S&T Computer Science

  30. Missouri University of Science and Technology F o u n d e d 1 8 7 0  R o l l a , M i s s o u r i

More Related