Advances in computer vision, deep learning, and AI are making it possible to accurately recognize, describe, and search questions from visual data, the darkest of “dark data,” impacting problems in areas like Healthcare, IoT, Cloud.
To end his talk “Can we store all of world’s data on a pickup truck,” Erlich makes bold prediction that DNA storage could be cheaper than magnetic storage within a decade.
“Travel in Large-Scale Head-Worn VR” teleports users through virtual environments by allowing them to determine orientation in advance. Another project from Feiner’s lab, “Remote Collaboration in AR and VR Using Virtual Replicas” won a third place … Continue reading Team from Steven Feiner’s lab wins Grand Prize at NYC Media Lab Summit
“Anomalous Payload-based Network Intrusion Detection,” co-written with Ke Wang and published in 2004, describes one of the first anomaly detection methods for identifying deviations indicative of a security breach or attempted attack.
The claim aroused concerns about genomic privacy. But in a paper posted to BioRxiv, Erlich matched people to their genomes using easily accessible demographic data, showing Venter’s warning about serious privacy risks to be overstated.
A faculty affiliate of the CS Department, Venkatasubramanian synthesizes concepts from economics, political philosophy, game theory, statistical mechanics, and systems engineering into a quantitative theory for maximizing fairness in free-market capitalism.
For decades, devicemakers, engineers, and others have been able to count on a new generation of chips coming to market, … Continue reading Luca Carloni on the coming engineering renaissance in chip design
Last week in Stockholm, Columbia researchers presented three papers at Interspeech, the largest and most comprehensive conference on the science … Continue reading Columbia speech researchers present four papers in August
The paper, by three Columbia researchers, describes CLKSCREW, a new class of fault attacks that exploit the security-obliviousness of energy management mechanisms. The attack does not require physical access to devices or fault injection equipment.
In a paper published in PNAS, they call for a holistic approach to data science, one that weaves statistics and computer science into a larger framework while considering context and responsibilities when using data. Subscription.
The Winner’s Curse—where newly discovered genetic effects are consistently overestimated and fail consistently to replicate in subsequent studies—afflicts every genome-wide … Continue reading Genome-wide association studies, minus the Winner’s Curse, are shown to be reliable and replicable