Computing and Information Science at Cornell

2000-2001 Annual Report Education and Research

○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Table of Contents ○○○○○○○ Message from the Dean for Computing and Information Science 4 Message from the Chair of Computer Science 7

COMPUTING AND INFORMATION SCIENCE 10 Highlights Computer Systems Laboratory with Electrical and Computer Engineering 10 Information Assurance Institute 10 Intelligent Information Systems Institute 11 Johnson Graduate School of Management Joint Program 12 Cornell Theory Center 12 New Faculty 13 Faculty and Senior Researcher Biographies 20

COMPUTER SCIENCE DEPARTMENT Highlights 75 Bits On Our Mind (BOOM) 2001 75 Corporate Interactions 76 Corporate Partnerships and Affiliations 76 Industrial Partners 77 Corporate Gifts and Grants 77 Alumni Relations 78 Educational Statistics 79 Undergraduate Courses and Enrollment 79 Graduate Courses and Enrollment 80 Degrees Granted 81 Awards 85 Research 86 Funded Research 86 Submitted Research Proposals 88 Collaborative Funded Research at Cornell 90 Research Interests of Faculty and Senior Researchers 91 CS People at a Glance 92 Editorial Activities of the Faculty 92 Faculty Personnel Changes 93 Faculty, Researchers, and Academic Visitors 94 Administrative and Technical Staff 95 Departmental Computing Facilities 96 Colloquium and Seminar Speakers 98 Publications 99 Technical Reports 99 Student Lectures 100 Student Publications 101

FACULTY OF COMPUTING AND INFORMATION Programs 103 Computational Biology 103 Computational Science and Engineering 103 Digital Arts and Graphics 104 Information Science 104 Message from the Dean his has been a busy and productive year in the short life of the Cornell Tinitiative in Computing and Information Science (CIS). We hired three more faculty with appointments in the Faculty of Computing and Information (FCI), Paul Ginsparg, joint with Physics; Phoebe Sengers, joint with Science & Tech- nology Studies; and Hod Lipson, joint with the Sibley School of Mechanical & Aerospace Engineering. These are outstanding appointments which I talk more about in this message and who appear in this report in the section on new faculty (see page 11). In addition we have assembled more components of the FCI, and we have continued those activities of the CIS initiative that started before the FCI came into being, namely our teaching with the Johnson Gradu- ate School of Management in e-Business and our collaboration with the School of Electrical and Computer Engineering in the Computer Systems Laboratory. The current structure of Computing and Information Science (CIS) and its relation to the FCI is provided in the image below.

Robert L. Constable

As background to the new academic programs in the Faculty of Computing and Information, I want to quote from an article I wrote called “Universities in the Information Age,” which tries to set the FCI in context:

The Information Revolution is changing every human activ- ity, especially the way we learn, teach, discover and communi- cate knowledge. Underlying the change is a powerful new way of thinking called the "algorithmic method.“ Those who know the algorithmic method bring new categories of thought to intellectual tasks; they know what part of the task can be del- egated to a computer or how much of it could be accomplished in partnership with a computer. The algorithmic method and computing technology have already dramatically transformed science, and will soon transform the arts and humanities as well. Teaching this far-reaching new mode of thought will be- come part of a modern liberal education. Before we see wide- spread effects, however, the basic ideas must become infused more deeply in university curricula and academic structures. The Computing and Information Science (CIS) initiative at Cornell is our attempt to infuse these ideas broadly.

4 Message from the Dean

The CIS initiative is developing along the lines laid out when the load on the system is light. in the report Cornell in the Information Age (available at New funds have allowed Cornell to hire three excellent www.cis.cornell.edu/information.htm). In particular, faculty into FCI programs this year, all of whom are high- Cornell has formed a new academic unit called the Faculty lighted in the section on new faculty. We have attracted of Computing and Information (FCI) as called for in the Paul Ginsparg as a full professor to FCI with a joint ap- report. Its mission is to develop new academic programs to pointment in Physics. Paul is well known for his revolu- complement the computer science major and to stimulate tionary work in scientific publishing embodied in his e-print research in computing and information broadly. The Office archive for physics, astronomy, mathematics and computer of the Dean for CIS has been given substantial new funding science. Paul's system is called arXiv. to develop the FCI and the Department of Computer Sci- Jointly with the School of Mechanical & Aerospace ence (CS). Some of these funds have already been used to Engineering, the FCI hired assistant professor Hod Lipson create new faculty positions for Computer Science while who works in computer aided design of mechanical sys- others have been used to build academic programs in com- tems, graphics, and evolutionary design of systems. puting and information. Jointly with the Department of Science and Technol- Building the FCI shares some characteristics of build- ogy Studies, the FCI hired assistant professor Phoebe Sengers. ing a large software system. The design document, Cornell in Her computing expertise is in AI, especially the study of the Information Age, is informed by experience and some agents and human computer interfaces. Phoebe's Ph.D. is "theory" of organizations, but to know whether it works, also in the field of Cultural Studies, and she looks at how many details have to be filled in, just as in completing sys- computer systems embody cultural values. She will be part tem modules or filling in steps of a large proof. In the end, of the Information Science program. we have to "run the structure" for several years to see how it The FCI also inagurated a Distinguished Lecture Se- works. But it is much more clear now that all the parts fit ries this year. The first two speakers to present were Wil- together and function. Material in this report illustrates im- liam A. Wulf, President of the National Academy of En- portant details of the structure. gineering, who spoke on “Some Challenges for Computer This year we assembled more parts of the FCI, and we Science and Engineering in the 21st Century,” and Neil hired more FCI faculty. This is being done with a committee Gershenfeld, Director of the Physics and Media Group, called the FCI Founders, consisting of computer science pro- MIT Media Lab and Co-director of the Things that Think fessors and distinguished professors in other units with in- research consortium, who spoke on “Things that Think.” terest and experience in computing and information science. The CIS initiative has been helping the Johnson Gradu- The Founders have identified the first four areas in which ate School of Management build a program in e-Business. we will build academic programs and hire new faculty. They This year Fred B. Schneider worked with Richard Conway, are Information Science, Computational Biology, Compu- from the Johnson School, to design and implement the CS tational Science and Engineering, and Digital Arts and contribution to an immersion course in e-Business. Ken Graphics. Birman and Johannes Gehrke lectured in this course along The Information Science program and the Computa- with Fred. The CS contribution was well appreciated by the tional Biology program are each well under way. Basic facts Johnson School students. about these programs are available on the CIS home page, Another piece of the CIS initiative is the collaboration www.cis.cornell.edu. They are also summarized in this re- between the Department of Computer Science and the port just below. Computational Science and Engineering has School of Electrical and Computer Engineering (ECE) in developed a set of short courses, and the FCI has hired Dr. the Computer Systems Laboratory. CIS provides some lab Andrew Pershing of the Earth & Atmospheric Sciences de- space that supports investigation in common topics of in- partment to teach them. Information about these courses terest in computer systems. We hope to eventually build will also be on the CIS web site and the Department of new laboratory facilities closer to the Duffield Systems Lab Computer Science web site. on the third floor of Upson Hall. Students in the lab come The impact of these programs is being felt almost as from both CS and ECE. The CSL web page soon as they are in place. They have guided CS and other (www.csl.cornell.edu) lists fifteen courses offered in this area departments in planning course offerings, and they have at- by over eight faculty from the two units. tracted the interest of many students who will help us imple- The Department of Computer Science continues to ment this emerging system. In terms of an analogy between play a broad role in the university, now in partnership with social systems and computer systems, it is designed so that the FCI. The Department of Computer Science started its "new code" can be added while it is running -- but some of life being managed as a central university resource report- the documentation, like this report, is done in the summer ing to the Office of the Provost. Once it created undergradu-

5 ate programs, they were offered in both Arts & Sciences and lems and ideas, from systems engineering to digital arts. in Engineering. Both of these majors are thriving, and the The FCI and the CS have discovered that teaching people Department of Computer Science plays an active role in to use the computer as a medium of expression is just as the educational programs of both colleges. Its Engineering challenging as using it as a problem solving tool. BS program and its Master of Engineering program are the The Computing and Information Science initiative is largest in the college. CS co-teaches courses with Electrical being energized by a great deal of university support. The and Computer Engineering and with Civil and Environmen- CIS Task Force and the Department of Computer Science tal Engineering. Its major in Arts & Sciences is very high helped sketch a broad faculty vision. University president quality -- it produced two of the current group of Cornell Hunter R. Rawlings has not only encouraged and inspired CS professors. CS is also one of the most active departments the effort, he has also helped shape it, helped recruit fac- in the Cognitive Studies Program, with Joe Halpern as one ulty with us and continues to raise new endowment. Pro- of the co-directors and two other CS faculty on the execu- vost Biddy Martin has helped us find new opportunities at tive committee. CS co-teaches courses with Mathematics, Cornell, and she has spent time connecting us with spe- Physics, Linguistics and Psychology, and will add a course cific programs, especially in support of Digital Arts and with Economics and one with Science and Technology Stud- Graphics. The University librarian, Sarah Thomas, has been ies soon. a strong partner as have several college deans, notably Su- The Department of Computer Science is starting to san Henry, Dean of the College of Agriculture and Life work more closely with the College of Agriculture and Life Sciences; Phil Lewis, Dean of the College of Arts and Sci- Sciences through the FCI programs in computational biol- ences; Bob Swieringa, Dean of the Johnson Graduate ogy and information science. There are joint research projects School of Management, and Porus Olpadwala, Dean of and joint seminars. CS faculty will play an important role the College of Architecture, Art, and Planning. I look for- as this college starts a new department in biological statis- ward to another exciting year as we continue to develop tics and computational biology. Cornell's initiative in Computing and Information Science. In addition to its responsibilities in the large under- graduate colleges, CS plays a leading role along with the Robert L. Constable FCI founders in the CIS initiative. Most of its faculty are active in FCI working groups or other CIS initiatives. Nine CS faculty helped eight university units in recruiting. Being a university department is both demanding and exciting. You can access the CIS Dean’s web page at The CIS faculty are exposed to a variety of stimulating prob- http://www.cs.cornell.edu/cis-dean/.

6 Message from the Chair

t is a watershed time for the Department of Computer Science. We have Message from the Chair Iemerged from a difficult period in our history characterized by open faculty lines and exploding enrollments. We are stronger than ever before because the CIS structure enables us to address boldly every teaching and research chal- lenge that comes our way. We are now set to move in several directions, each of which represents a different academic adventure, a different path to the sea. I am reminded of the five great river watersheds that grace our part of the North- east. The Hudson, the Susquehanna, and the Delaware each get their start in beautiful upstate New York. The raindrops that fall here in Ithaca are rewarded with a trip down the St. Lawrence after stopovers in Cayuga Lake and Lake Ontario, while those that fall just to our west find their way into the Gulf of Mexico via the Allegheny, the Ohio, and the Mississippi. Upstate New York is a watershed paradise, and I like to think that Ezra Cornell appreciated the meta- phor when he chose the location for this great university. Our job in the depart- ment is not to cogitate at the river’s edge, but to be part of its source with inno- vative research and teaching. Quite simply our mission is to affect positively the quality of life downstream in the information age. Charles Van Loan To that end there is no better way to ensure the continued flow of remark- able scholarship than to hire creative young people. Gun Sirer (University of Washington) and Golan Yona (Hebrew University) joined the faculty in Janu- ary, adding new dimensions to our efforts in systems and computational biol- ogy respectively. Rich Caruana (Carnegie Mellon University), Daisy Fan (Cornell), Thorsten Joachims (Dortmund), and Jayavel Shanmugasundaram (Wisconsin) will be new faculty colleagues this fall. Rich works in machine learning and data min- ing and has interests in medical decision making and bioinformatics. Daisy is a civil engineer who will continue her research in computational science while she helps run our large CS 100 operation. Thorsten works in machine learning and intelligent agents with a focus on Support Vector Machines and learning with text. Jai’s research interests include internet data management, database systems, and transaction processing in emerging system architectures. In January, two additional faculty members come on board. Jeanna Neefe Matthews (UC Berkeley) has research interests in file systems and storage sys- tems. Radu Rugina (UC Santa Barbara) does research on pointer analysis, parallelizing compilers, and parallel computing. With these additions the department will become the home to twelve as- sistant professors—an all-time high. Working to ensure that these young schol- ars realize their potential in our environment is easily one of the best parts about being the chair. But my job would be virtually impossible without the leadership of my senior colleagues who provide support in so many important ways. Our wildly successful faculty recruiting effort this year is a tribute to the environment that they have created. Research entities like the Information As- surance Institute and the Intelligent Information Systems Institute are increas- ingly important when it comes to attracting the top CS scholars to Cornell. Before I leave the topic of new faculty, I would like to mention the return to the department of John Hopcroft. John has been gone for nearly ten years serv- ing the university as an associate dean and dean in the College of Engineering. It will be great to have a Turing Award winner back in Upson Hall. There are many new developments on the teaching front. During the year we started eight new courses. For freshman our one-credit minicourse Great Ideas from Computer Science (CS 150) gives snapshots of the field through a sequence of eight expository lectures. As a follow-up to CS 130,

7 our introductory web course, Graeme Bailey taught a pro- Expansion of faculty and curriculum creates space prob- totype of Intermediate Web Design (CS 230). CS 130 and lems. However, thanks to the department’s space commit- 230 focus on the client side and the server side respectively. tee and Pat Musa, we will be able to manage for another Professor David Mermin from Physics taught Quantum In- twelve months. Nevertheless, a major challenge during the formation Processing (CS 483). The theory of quantum com- coming year will be to find new offices and laboratories to putation offers striking new perspectives on computation accommodate our growth. and information, as well as on the quantum theory itself. The department’s relationship with other academic Bill Arms taught the first edition of Information Discovery units will be much enhanced because of new faculty ap- (CS 430). This course looks at the methods used to search pointments that were made possible by the FCI. In particu- for and discover information in digital libraries and web lar, the hiring of Paul Ginsparg in Physics, Phoebe Sengers information systems. Al Demers introduced a much-needed in Science and Technology Studies, and Hod Lipson in Me- upper level undergraduate course on Programming Languages chanical and Aerospace Engineering are extremely exciting and Logics (CS 411). At the graduate level we were able to developments for us. Following the example of Mats Rooth, expand our offerings in the theory area with Jon Kleinberg’s who joined Linguistics this past year, and Geri Gay in the Advanced Design and Analysis of Algorithms (CS 683). The Department of Communications, these FCI-supported fac- course emphasizes algorithmic problems in a range of ar- ulty will be the basis for new research alliances and new eas including networks, large datasets, lattices, and the de- cross-listed courses. The close proximity of these faculty to sign of heuristics. Mats Rooth from the Department of Lin- the department’s research engine is a hallmark of Cornell’s guistics started Computational Linguistics (CS 324) and In- CIS initiative. troduction to Natural Language Processing (CS 474). In connection with on-campus relationships, we note This coming year Lillian Lee will teach a new course that several of our faculty served on search committees in entitled Computation, Information, and Intelligence (CS 172). other units. Joe Halpern and Johannes Gehrke worked with This will be a non-programming, freshman-level introduc- Operations Research and Industrial Engineering; Dexter tion to computer science using methods and examples from Kozen with Mathematics; Bob Constable with Science and . We think that the novel approach of Technology Studies; Greg Morrisett and myself with Electri- this course will help attract more women to the CS major. cal and Computer Engineering; Ron Elber for the Tri- Eva Tardos will teach a new graduate-level course on Ap- Institional initiative; Fred Schneider, Joe Halpern, and proximation and Network Algorithms (CS 684). Another course Johannes Gehrke with the business school. making its debut this coming year will be our new Java Other activitity that is serving to cement our relation- Practicum (CS 212), which will serve as a “large project” ship with other units includes Ramin Zabih’s joint appoint- companion to the second course in our Java sequence (CS ment with the Department of Radiology at Weill Medical 211). Dave Schwartz will be starting Advanced Unix Program- College in New York City and the intersession teaching of ming and Tools (CS 214) in the spring semester. Rich Caruana Ken Birman, Johannes Gehrke, and Fred Schneider in the will introduce a new course on Empirical Methods in Ma- Johnson Graduate School of Management. chine Learning and Data Mining (CS 578) in the fall. Our faculty continue to render the very highest levels A number of broad curriculum reviews/initiatives will of service to the university. Bill Arms chaired the Provost’s take place during the coming year. The breadth and depth Advisory Committee on Distance Learning and is a Direc- of the machine learning group will make it possible for us tor of eCornell. Tom Coleman is Director of the Cornell to put together a remarkable curriculum in this important Theory Center (CTC) and the Financial Industry Solution area. Work on this will begin in the fall. Likewise, the sys- Center down in Manhattan. Bob Constable is Dean for Com- tems group plans to revamp its set of courses working closely puting and Information Science. Ron Elber is the Head of with colleagues in the School of Electrical and Computer the National Institutes of Health Resource in the CTC. Joe Engineering. We expect to see curriculum gaps filled and Halpern co-chairs the cognitive studies program. Ken increased coordination between the two units via the cross- Birman is a member of the advisory council for the listing of critical courses. We look to expand our commit- Cornell Research Foundation, and Head of the Respon- ment to the Academic Excellence Workshop (AEW) idea by sible Conduct of Research Committee for the university. offering several of the CS 100 AEWs on North Campus and In alumni and corporate relations we are moving rap- by starting to offer AEWs in CS 211. Finally, long-time col- idly to organize our efforts. The CS major is only 20 years league David Gries will be visiting us during the fall semes- old, and so we are just now beginning to see the majority of ter and will be exploring how we might develop a self-paced our graduates move into the prime of their careers. Success- introduction to Java tailored to incoming freshman (and ful Cornell CS gatherings in both Boston and Palo Alto were others) who are trained in C++. held during the year. Our Alumni Weekend breakfast here

8 on campus had more attendees than ever before. Dan The CS faculty continue to be campus leaders in the Jenkins will be orchestrating additional alumni events of classroom. Dexter Kozen won the Stephen and Margery this sort in the future. Relatedly, Marcy Rosenkrantz will now Russell Teaching Award in the College of Arts and Sciences. be managing corporate relations, and this will enable us to Johannes Gehrke, , and Greg Morrisett won track more effectively the many connections that we have College of Engineering teaching awards. in the industrial sector. There are many more exciting things that I could write Several faculty were honored at the national and inter- about. But it is far better for you to read the firsthand ac- national level making us all extremely proud to have such counts that follow. My colleagues are the ones who made wonderful colleagues in our midst. Eva Tardos was elected everything happen! to the American Academy of Arts and Sciences for her pio- Charles Van Loan neering work in the algorithms area. Joe Halpern received both a Fulbright Scholarship and a Guggenheim Fellow- ship. Juris Hartmanis won the Lielo Medalo from the Latvian Academy of Sciences. Jon Kleinberg received the National You can access the Chair’s web page at Academy of Sciences Award for Initiatives in Research. Greg http://www.cs.cornell.edu/chair/ . Morrisett was honored by Carnegie Mellon University with the Allen Newell Medal for Research Excellence. Greg also received a Presidential Early Career Award for Scientists and Engineers and was honored at a White House ceremony last fall. Johannes Gehrke received an IBM Faculty Devel- opment Award for the second year in a row.

9

CIS Highlights ○○○○○○○○○○○○○○○○○○○ Computer Systems lab with ECE ○○○○○○○○○○

he Cornell Computer Systems Labo- and system specification and verification. T ratory (CSL) brings together faculty Graduate students are admitted to either ECE or with common interests from the School of Electrical and Computer Science. Usually students with primary in- Computer Engineering and the Department of Computer terest in computer architecture, multiprocessor design, Science at Cornell. VLSI, CAD, and circuit design enroll in ECE, while stu- The Computer Systems area encompasses both ex- dents with interest in compilers, operating systems, and perimental and theoretical work, growing out of topics programming environments enroll in CS. There are no in computer architecture, parallel computer architecture, rigid student classifications; ECE students can have a operating systems and compilers, computer protocols thesis advisor in Computer Science and vice-versa. In- and networks, programming languages and environ- deed, the interdisciplinary composition of the research ments, distributed systems, VLSI design and fabrication, teams is a strength of the Computer Systems Lab. You can visit the CSL website at:

http://www.csl.cornell.edu. ○○○○○○○○○○○○○○○○○○○○○ Information Assurance Institute ○○○○○○○○○○○○

he Cornell Information Assur- The Institute thus makes both Cornell and AFRL more at- T ance Institute (IAI) is intended to tractive places to work, facilitating recruitment of higher support a broad spectrum of research and caliber personnel at each site. education efforts aimed at developing a A series of technology-transition activities dominated science and technology base to enhance information assur- Cornell-AFRL interactions this year. Also under the aus- ance and networked information systems trustworthiness— pices of the IAI, Cornell researchers were involved in the system and network security, reliability, and assurance. IAI development of the Air Force Joint Battlespace Infosphere. is also intended to foster closer collaborations involving Various other technical collaborations are being explored— Cornell and Air Force Research Lab (AFRL) researchers. in the use of “gossip protocols,” in language-based security Fred B. Schneider is the director of the institute, and policy enforcement technology, and in data mining from Marcy Rosenkrantz is the associate director. networks of sensors. AFRL researchers are able to participate in Cornell re- We are also exploring the expansion of IAI to include a search projects, facilitating technology transfer as well as few key industrial partners. These partnerships will not only exposing Cornell researchers to problems facing the Air support and leverage IAI activities but will add another im- Force. Cornell researchers are able to become involved in portant perspective to the problems IAI researchers attack AFRL projects and have access to unique AFRL facilities. and the solutions they investigate. For more information, see: http://www.cis.cornell.edu/iai/.

Charles Holland, Director of Information Systems, Office of the Undersecretary of Defense (Science and Technology), speaking at the IAI inaugural Information Assurance Institute Director, Fred B. Schneider

10 CIS Highlights

CIS Highlights ○○○○○○○○○○○○○○○○ The Intelligent Information Systems Institute ○○○○○○○○

he Intelligent Information Systems (knowledge representation, complexity, and multi-agent T Institute (IISI) began operation in De- systems), Chris Shoemaker (large scale optimization and cember 2000. The mission of the IISI is modeling), Evan Speight (distributed computing, computer threefold: To perform and stimulate re- architectures), and Stephen Wicker (intelligent wireless in- search in compute- and data-intensive methods for intelli- formation networks). gent decision making systems; to foster collaborations be- Through the IISI, a number of research projects involv- tween Cornell researchers, our sponsors, and the scientific ing direct collaborations between Cornell and AFRL/IF re- community; and to play a leadership role in the research searchers were initiated during the last six months. These and dissemination of the core areas of the institute. The projects cover a variety of topics, such as probabilistic deci- institute is funded by AFRL/AFOSR. Carla Gomes is the di- sion making, architectures for active memory systems, multi- rector of the institute and Marcy Rosenkrantz is the associ- agent sensor networks, and visualization of reasoning and ate director. The Scientific Advisory Board of the institute search methods. The IISI also hosted a hands-on workshop consists of Robert Constable (Cornell), Nort Fowler and on foundations and complexity of multi-agent systems. As Charles Messenger (AFRL/IF), and Neal Glassman (AFRL/ one of the outcomes of the workshop, a team of researchers AFOSR). from , Stanford University, and the Uni- versity of Washington is developing a tuneable benchmark suite for the design and evaluation of new algorithms for combinatorial auctions. The IISI is also sponsoring the AAAI Symposium on Uncertainty within Computation, the 2001 Conference on Empirical Methods in Natural Language Pro- cessing (EMNLP 2001), Language Technologies 2001, and Association for Computational Linguistics (NAACL 2001). To further its research mission, the IISI hosts a large number of visiting scientists. During the first year, this group has included researchers from AFRL/IF, AT&T Labs, Hebrew University, Microsoft Research, Stanford University, Technion, University of Leida, University of Lisbon, Uni- versity of Minnesota, University of Washington , Washing- Intelligent Information Systems Director, Carla P. Gomes ton University, and York University. For additional information, see: The IISI supports basic research within the Department www.cis.cornell.edu/iisi. of Computer Science and promotes a cross fertilization of approaches from different disciplines, including Operations Research, Mathematics, Statistics and Physics. Areas of in- vestigation within the IISI are: Search and Complexity, Plan- ning and Scheduling, Knowledge Representation, Data Min- ing and Information Retrieval, Reasoning under Uncertainty, Natural Language Processing, Machine Learning, and Agent Technology. Current Cornell members of the institute are Raffaello D’Andrea (dynamics and control), Claire Cardie (natural language understanding and machine learning), Johannes Gehrke (database systems and data mining), Carla Gomes (artificial intelligence and operations research tech- niques for combinatorial problems and multi-agent tech- nology), Joseph Halpern (knowledge representation and uncertainty), Mark Heinrich (active memory, simulation methodology), Lillian Lee (statistical methods for natu- ral language processing), David Shmoys (algorithms for large-scale discrete optimization), Marcy Rosenkrantz, Associate Director of the IAI and IISI

11 ○○○○○○○○○○○○○○○○○○○○○○○ CIS Electronic-commerce immersion with the JGSM ○○○○○

he Johnson Graduate School of Management (JGSM), a “been there, done that” kind of confidence and the “big Tin collaboration with Cornell’s Computer Science De- picture” perspective required for success in the business partment, initiated an immersion course in electronic com- world today. merce (E-business Immersion NBA 613). With Intel’s support, we have created an E-commerce A $1 million grant from Corning, Inc. to JGSM enabled laboratory for the E-business immersion as well as to sup- the school to expand the program. port a broad collection of e-commerce courses in JGSM. Professor Richard Conway led the course. Professor Fred The lab comprises a group of powerful workstations for in- B. Schneider coordinated the Computing and Information dividual students and several powerful servers to support a (CIS) involvement. The goal was to give students an in-depth data management infrastructure for a fictional e-commerce understanding of all aspects of doing business in the net- company (including a web server, an industry-strength da- worked economy. A JGSM/CIS collaboration means that tabase system, web-database connectivity, and database ap- students receive a solid education in the enabling technolo- plication software). gies that form the backbone of e-commerce. We also taught a second-year elective course, NBA 601 JGSM immersion courses represent a new model of “The Software Infrastructure of Electronic Commerce;” The management education (introduced by Conway years ago);it course introduced students to computer security, distrib- replaces static case-based training with integrated, experi- uted systems, fault-tolerance, software construction, reason- ential, just-in-time learning. In an immersion course, stu- ing under uncertainty, and database and data-mining tech- dents work on real-world problems under real-world time nology. pressures. The result is savvy students who combine a sound For further information, see:

theoretical background with a hands—on sophistication— http://www.cs.cornell.edu/courses/NBA602/2001sp/ ○○○○○○○○○

Cornell Theory Center ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

he Cornell Theory Center (CTC) is Cornell’s high-per- which provides students in CEE 479 & MAE 491 with access Tformance computing and interdisciplinary computa- to EduCluster and the CAVE. EduCluster is a 16-processor tional research center, serving over 150 faculty research cluster dedicated to student applications; the CAVE is an groups across campus and at Weill Medical College. CTC immersive 3-D virtual reality environment. CTC’s three-wall has pioneered the use of industry-standard computational CAVE allows scientists to “immerse” themselves in their ap- clusters running Windows as a productive large-scale com- plication. The project, titled Advanced Interactive Design puting environment, keeping Cornell at the forefront of com- Environment,” will have seniors using these resources to putational science and engineering. The center currently op- design a piece of NASA’s future Reusable Launch Vehicle. erates a complex that includes more than 600 processors. The Theory Center has helped a number of organi- One part of the cluster complex, Velocity+, is dedicated to zations on campus acquire and operate smaller clusters strategic applications that require large-scale parallel com- dedicated to their research fields. For example, CTC is home puting to achieve results. Among these applications are com- to the cluster used by the Cornell Institute for Social and putational materials, genomics, and structural biology. Sev- Economic Research (CISER) for extensive census data min- eral Computer Science faculty are involved in these activi- ing and analysis. Running parallel SAS, a statistical software ties, including Keshav Pingali in computational materials package, the CISER cluster is also used in social and economic and Ron Elber in both structural biology and genomics. classes across campus. Another CTC research focus is computational finance, CTC has done pioneering work in science communica- an activity headed by CTC director and computer science tion outreach and informal education through its Virtual professor Thomas Coleman. Professor Robert Jarrow of the Worlds SciCentr, which consists of a series of multi-user vir- Johnson Graduate School of Management also plays a lead- tual environments. This project has engaged several inter- ership role in this effort. Projects include investigating new disciplinary teams of undergraduate programmers, design- optimization algorithms for large-scale portfolio analysis ers, and content developers in the creation of interactive and value-at-risk calculations. Much of CTC’s computational exhibits. A number of team members come from Computer finance work takes place at CTC-Manhattan, which is lo- Science. SciCentr brings CTC into interaction with a num- cated across from the New York Stock Exchange. ber of faculty affiliated with FCI, in the fields of Communi- CTC brings high-performance computing into the un- cation, Fine Arts, Theatre Arts, Music, and Architecture. dergraduate curriculum through a NASA-funded project,

12 New Faculty PUBLICATIONS Rich Caruana “Predicting Cesarean Delivery: Decision Tree Models.” To Assistant Professor appear in the American Journal of Obstetrics and Gyne- cology (2001). With Cynthia J. Sims, Leslie Meyn, Rich Department of Computer Science Rao, R. Bharat, Tom Mitchell, and Marijane Krohn. “An Evaluation of Machine Learning Methods for Predict- http://www.cs.cmu.edu/~caruana/ ing Pneumonia Mortality.” Artificial Intelligence in Medi- Ph.D. Carnegie Mellon University, 1997 cine 9:107-138 (1997). With G. F. Cooper, C. F. Aliferis, R. Ambrosino, J. Aronis, B. G. Buchanan, M. J. Fine, C. Glymour, G. Gordon, B. H. Hanusa, J. E. Janosky, C. Meek, T. Mitchell, T. Richardson, and P. Spirtes. “Multitask Learning.” Machine Learning 28:41-75, Kluwer work in machine learning and data mining, medical de- Academic Publishers (1997). Icision making and bioinformatics, feature selection, miss- “Experience with a Learning Personal Assistant.” Commu- ing values, inductive transfer, artificial neural networks, nications of the A CM (1994). With Tom Mitchell, Dayne memory-based learning. I will be joining the Department Freitag, John McDermott, and David Zabowski. of Computer Science at the start of the fall 2001 semester. “Fifteen Useful Tricks with Extra Outputs.” In Neural Net- works: Tricks of the Trade, G. B. Orr, and K–R. Muller, HONORS/AWARDS editors, Springer-Verlag (1988). Invited speaker, AAAI Workshop on Learning from Imbalanced Data (July, 2000). “Methods for Learning PATENTS from Imbalanced Data.” “Using Active Monitor Illumination for 3-D Active Im- Invited speaker, Research Jamboree, University of Edinburgh, aging.” Patent disclosure filed April, 2000. With Scotland (May, 2000). Three talks: “Unabridged and Rahul Sukthankar, Keiko Hasegawa, and Matt Mullin. Multitask Learning,” “Machine Learning, Medical De- “Iterated K-nearest neighbor Method and Article of Manu- cision Making, and Explanation,” and “Semi-supervised facture for Filling in Missing Values.” United States Clustering.” Patent 6,047,287, Assignee: Justsystem Pittsburgh re- search Center, Pittsburgh, PA. Filed May 5, 1998, granted April 4, 2000.

HONORS/AWARDS K-Y. Daisy Fan Graduate Teaching Assistant Award, Department of Com- Assistant Professor puter Science, Cornell University (2000). New York State Section American Water Works Association Computer Science Department Russell L. Sutphen Scholarship. John E. Perry Teaching Assistant Prize, School of Environ- [email protected] mental Engineering, Cornell University (1999). Ph.D. Cornell University, 2001 PUBLICATIONS “Regression Dynamic Programming for High-dimensional Continuous-state Problems.” In preparation for sub- mittal to Operations Research. y research interests include the application of systems “Regression Dynamic Programming for Multiple Reservoir Manalysis techniques for water resources and environ- Control.” Proceedings of the 2000 ASCE Joint Confer- mental problems. I will be joining the Department of Com- ence on Water Resources Engineering and Water Re- puter Science at the start of the fall 2001 semester . With sources Planning and Management, Minneapolis, MN Dave Schwartz, I will be running CS 100 and developing (2001). the academic excellence workshops that are associated with that very important course.

13 Paul Ginsparg Publishing in Higher Education” at UC Berkeley; Chautauqua meeting of the National Computational Professor Science Alliance at the University of KY, Lexington; joint FCI, joint with Physics meeting of the Medical Library Association and the Ca- nadian Health Library Association, Vancouver, BC; “The http://xxx.lanl.gov/blurb/ Impact of Barrier-free Access and New Technologies on Biomedical Publishing” at the New York Academy of p96unesco.html Medicine; and “Open Archives European Open day,” at Ph.D. Cornell, 1981 Max Planck Library in Berlin.

AWARDS/HONORS

received my A.B. degree summa cum laude in Physics P.A.M. (Physics Astronomy Math) award from the Spe- Ifrom Harvard University in 1977 and my Ph.D. in Phys- cial Libraries Association. “Honors work which de- ics from Cornell University in 1981 (Quantum Field monstrably improves the exchange of information Theory, thesis advisor: Kenneth G. Wilson), where I was in physics, math or astronomy” (1998). supported as an NSF graduate fellow and A.D.White fel- Fellow of the American Physical Society. Cited “For his low. I was in the Harvard Society of Fellows from 1981- work relating to chiral symmetry on the lattice, for 84, and an assistant professor in the Harvard University fundamental contributions to string theory, and for Physics department from 1984-90, where I was supported establishment and development of the revolution- as an A.P. Sloan Fellow and as a DOE Outstanding Junior ary ‘Los Alamos E-Print Archive’” (November, 2000). Investigator. I was a Technical Staff Member in the Los Alamos National Laboratory Theoretical Division from PUBLICATIONS 1990-2001. I have also held visiting positions at C.E.N. “A Remnant of Chiral Symmetry on the Lattice.” Phys. Saclay, France, Princeton University, Stanford Linear Ac- Rev. D25, 2649 (1982). And K. G. Wilson. celerator Center, the Institute for Advanced Studies, “Curiosities at ‘c=1’.”Nucl. Phys. B295 [FS21], 153 (1988). Princeton, the Institute for Theoretical Physics at UC Santa “2D Gravity + 1D Matter.” Phys. Lett. B240, 333 (1990). Barbara, the Mathematical Science Research Institute at And J. Zinn-Justin. UC Berkeley, and Hebrew University, Jerusalem. In 1991 “First Steps towards Electronic Research Communica- I inititated the “e-print arXiv” as a new form of commu- tion.” Computers and Physics 8 (4):390 (July/August, nications research infrastructure for physics. I have served 1994). on many committees and advisory boards, including most “Winners and Losers in the Global Research Village.” In recently an NRC/CODATA committee on “Transborder proceedings of ‘Electronic Publishing in Science,’ Sir flow of Scientific Data,” an NAS/NRC committee on “Fu- R. Elliot and D. Shaw, editors. Held at UNESCO HQ, ture of Universities,” an AAAS study committee on “Tran- Paris, ICSU Press (1996). sition from Paper,” and an NSF committee on “Knowl- edge Networks and Distributed Intelligence Initiative,” and I currently serve on the APS global “Task Force on Electronic Information Systems,” on the NIH’s “PubMed Central National Advisory Committee,” on the Open Ar- chives Initiative Steering Committee (and founder), on the French “Centre pour la Communication Scientifique Directe” technical steering committee (and founder), and on the APS “Publications Oversight Committee.” I have also given numerous invited keynote talks and colloquia, including recently at meetings “Future of Mathematical Communication” at the University of Minnesota; “Elec- tronic Publishing in Science” at UNESCO HQ in Paris; “50th Anniversary of the Development of the ENIAC com- puter” at the University of Pennsylvania; “The impact of electronic publishing on the academic community” in Stockholm, Sweden; “Alternative Models for Scholarly

14 New Faculty

no formal language that lets us describe common catego- Thorsten Joachims ries without reference to human-like background knowl- Assistant Professor edge. Machine learning approaches have shown their abil- Department of Computer Science ity to overcome the lack of background knowledge by ex- ploiting statistical regularities of word usage patterns that are related to humanly defined concepts. The success of such http://www-ai.cs.uni-dortmund.de/ learning methods is already reflected in their high commer- PERSONAL/joachims.eng.html cial demand, and I am convinced that machine learning Ph.D. Dortmund, 1997 approaches can further push the limit in understanding text- based information. Therefore, from a methodological per- spective, my goal is to develop and understand machine learning approaches that fit the properties of text-mining y core scientific interests lie in machine learning problems. Mand statistical learning theory, with its main applica- tions in the fields of text mining and intelligent informa- PUBLICATIONS tion agents. This application domain will be of increasing “Knowledge Discovery and Knowledge Validation in Inten- importance, since human attention and the speed with sive Care.” Artificial Intelligence in Medicine 19(3):225- which we can process information are natural bottlenecks 249 (2000). With K. Morik, M. Imhoff, P. Brockhausen that limit our ability to make informed decisions. While and U. Gather. data-base and data-mining techniques can already assist “Aktuelles Schlagwort: Support Vector Machines.” Künstliche users when analyzing structured data, the problem of text Intelligenz 33(4):54-55 (1999). mining, the automatic analysis of text-based information, “Browsing-assistenten, Tour Guides und Adaptive WWW- is still largely unsolved. Therefore, from an application per- server.” Künstliche Intelligenz 28(3):23-29 (1998). With spective, my goal is to develop systems and agents that fo- D. Mladenic. cus, enhance, and accelerate our ability to access large quan- “Making Large-scale SVM Learning Practical.” In Advances tities of natural language information. Central to such sys- in Kernal Methods – Support V ector Learning , Schölkopf tems are, for example, tasks like text and speech classifica- et al., editors, chapter 11, 169-184, MIT Press (1999). tion, information extraction, and abstract generation. “Text Categorization with Support Vector Machines: Learn- To investigate the fundamental challenges in these tasks, ing with Many Relevant Features.” In Proceedings of I am particularly interested in machine learning approaches. the European Conference on machine Learning This is because most tasks dealing with natural-language (ECML), Chemnitz, Germany (1998). Ranked 12 in based information are inherently difficult to formalize and NEC Research Index most accessed publications (Au- solve manually. In text classification, for example, there is gust, 2000).

have elaborate computational models for analysis, we still Hod Lipson have no computational model of synthesis. I believe under- Assistant Professor standing this process holds the key to future competitive- FCI, joint with Mechanical and ness, and presents a largely unadressed challenge across both engineering and computer science. Aerospace Engineering My research interests are in the area of computational design, information systems and fabrication—at the inter- http://www.mit.edu/~hlipson section of engineering and computer science. I am interested Ph.D. Technion, 1998 in understanding the synthesis process of design and emu- lating it computationally, and I focus on the ideas of self- organization and self-replication as new paradigms of de- sign, fabrication and learning. I search for ways to harness all ngineers design by combining knowledge and re- these areas to make the future CAD/CAM systems. I look Esources to make products that achieve some functional- both at the human design process and at natural design and ity. Despite the fact that design is the basis of engineering, fabrication as two sources of inspiration, and I build work- this process of problem solving by synthesis is not understood ing systems to test my theories. well, and is still taught, to a large extent, as an art. While we

15 HONORS/AWARDS “Clustering Irregular Shapes using High Order Neurons.” Technology R eviews one of ten most promising technologies Neural Computation 12(10):2331-2353 (2000). With H. of the future, 2001. T. Siegelmann. TIME Magazine ’s Annual 2001. “Conceptual Design and Analysis by Sketching.” Journal of Shaping the Future Award, EXPO ‘2000. AI Design and Manuf acturing 14:391-401 (2000). With Fischbach Postdoctoral Scholarship, 1998. M. Shpitalni. CIRP International F. W. Taylor Medal, 1997. “3D Conceptual Design of Sheet Metal Products by Sketch- Charles Clore Scholarship Award for Academic Excellence, ing.” Journal of Materials Pr ocessing Technology 1996. 103(1):128-134 (2000). With M. Shpitalni. Miriam and Aaron Gutwirth Memorial Fellowship, 1996. “Identification of Faces in a 2D Line Drawing Projection of a Wireframe Project.” IEEE Transactions on P attern Analysis PUBLICATIONS and Machine Intelligence (PAMI) 18(10):1000-1012 “Automatic Design and Manufacture of Robotic Lifeforms.” (1996). With M. Shpitalni. Nature 406:974-978 (2000). With J. B. Pollack.

“Serverless Network File Systems.” Award paper. In Proceed- Jeanna Neefe Matthews ings of the Fifteenth ACM Symposium on Operating Assistant Professor Systems Principles, 109-126 (December, 1995). With Department of Computer Science T. Anderson, M. Dahlin, D. Patterson, D. Roselli, and R. Wang. “A Case for Network of Workstations: NOW.” IEEE Micr o http://www.clarkson.edu/~jnm/ (February, 1995). With T. Anderson, D. Culler, D. Ph.D. Berkeley, 2000 Patterson, and the NOW Team. “An Exploration of Network RAM.” UC Berkeley Technical Report, UCB/CSD-98-1000 (December, 1994). With E. Anderson.

research interests include file systems, stor- M age systems and more generally operating systems and distributed systems.

AWARDS/HONORS Intel Foundation Graduate Fellowship Award, 1999-2000. Cal VIEW Fellow Award, for excellence in teaching, 1998- 1999. National Science Foundation Graduate Research Fellowship, 1994-1998. Award Paper, 1995 ACM Symposium on Operating System Principles.

PUBLICATIONS “Improving the Performance of Log-structured File Systems with Adaptive Methods.” Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles, 238-251 (October, 1997). And D. Roselli, A. Costello, R. Wang, and T. Anderson. “Serverless Network File Systems.” ACM Transactions on Com- puter Systems (February, 1996). With T. Anderson, M. Dahlin, D. Patterson, D. Roselli, and R. Wang.

16 New Faculty

New Faculty be general, not restricted only to a certain class of programs, Radu Rugina like scientific applications. These program analyses also have Assistant Professor to be based on general, formally correct frameworks, not Department of Computer Science on ad-hoc techniques.

AWARDS/HONORS http://www.cag.lcs.mit.edu/~rugina/ Tuition Fellowship from UC Santa Barbara between 1996 Ph.D. University of California, Santa and 2001. Barbara, 2001 Merit Fellowship from Polytechnica University of Bucharest between 1991 and 1996. Scholarships from the European Union TEMPUS Program for several projects at the Technical University of rogram analysis automatically extracts information Eindhoven in Holland: April-June 1992, March-May Pthat is critical for understanding, maintaining and de- 1993, and May-July 1996. bugging the program; for checking properties about the pro- gram; or for applying various transformations to the pro- PUBLICATIONS gram. Although it has traditionally been considered part of “Recursion Unrolling for Divide and Conquer Problems.” the programming languages and compilers community, pro- In Proceedings of the13th International Workshop on gram analysis has applications in virtually all areas of com- Languages and Compilers for Parallel Computing, IBM puter science, and these applications can deliver substan- T.J. Watson Research Center, Yorktown Heights, NY (Au- tial benefits to scientists in these fields. Research in pro- gust, 2000). With Martin Rinard. gram analysis is interesting, relevant and important. “Symbolic Bounds Analysis of Pointers, Array Indices, and In the last few years I developed new techniques for Accessed Memory Regions.” In Proceedings of the ACM pointer analysis and symbolic analysis of accessed memory SIGPLAN 1999 Conference on Programming Languages regions. These techniques can analyze general programs, Design and Implementation, Atlanta, GA (May, 1999). including programs that use recursion, multithreading, and With Martin Rinard. manipulate pointers. I also interacted with researchers in “Automatic Parallelization of Divide and Conquer Algo- other fields to apply these techniques to problems in com- rithms.” In Proceedings of the ACM SIGPLAN 1999 puter architecture, parallel computing, and software engi- Conference on Programming Languages Design and neering. Concrete results include the automatic Implementation, Atlanta, GA (May, 1999). With Mar- parallelization of sophisticated divide and conquer prob- tin Rinard. lems, the static detection of array bounds violations and “Predicting the Running Times of Parallel Programs by data races in multithreaded C programs that heavily use Simulation.” In Proceedings of the 12th International pointers and pointer arithmetic, and the use, by computer Parallel Processing Symposium and 9th Symposium architects, of pointer analysis results to map programs onto on Parallel and Distributed Processing, Orlando, FL the MIT RAW machine and hardware circuits. (April, 1998). With Klaus E. Schauser. In the future, I intend to extend this research to include software reliability and computer security. In these fields, there is a need to automate the process of checking impor- tant properties required to guarantee the functionality or safety of the program. For large, complex pieces of software, checking these properties manually, by humans, is a diffi- cult and error-prone task. However, using formal verifica- tion techniques based on program annotations requires programmers to substantially change the way they write software. In this context, program analysis is an appealing alternative. It can be used to develop automatic tools to solve these kinds of problems, but without requiring changes of programming style. I intend to develop deep program analy- sis techniques and focus on application of these techniques for software reliability and security. I believe that to success- fully solve these problems, the analysis techniques have to

17 Phoebe Sengers “Fabrikation der Subjekte: Verdinglichung, Schizophrenie, Assistant Professor und Kuenstliche Intelligenz.” In Netzkritik: Materialien zur Internet-Debatte . Geert Lovink and Pit Schultz, edi- FCI, joint with Science tors. Berlin: Edition ID-Archiv (1997). and Technology Studies “Technological Prostheses: An Anecdote.” ZKP-4 Net Criti- cism Reader. Geert Lovink and Pit Schultz, editors (1997). http://www.cs.cmu.edu/afs/cs.cmu/ “Fabricated Subjects: Reification, Schizophrenia, Artificial user//phoebe/mosaic/ Intelligence.” ZKP-2 Net Criticism R eader. Geert Lovink my-home-page.html and Pit Schultz, editors (1996). “Practices for Machine Culture: A Case Study of Integrating Ph.D. Carnegie Mellon University, 1998 Artificial Intelligence and Cultural Theory.” Surfaces VIII (1999). am a computer scientist and a cultural theorist. I build “Madness and Automation: On Institutionalization.” Iintelligent, interactive, expressive information systems, like Postmodern Cultur e (May, 1995). an artificial agent that makes emotionally expressive child- “Wallowing in the Quagmire of Language: Artificial Intelli- like drawings. The goal of my work is to analyze carefully gence, Psychiatry, and the Search for the Subject.” what our systems currently unconsciously express and to Cultronix (Summer, 1994). develop technology that allows us to express new aspects of human experience. I use the tools of cultural theory as a way to understand our systems better and to generate tech- nical ideas for new forms of technology. I am part of a grow- ing community of critical technical practitioners. I have done research on agents, avatars, virtual envi- ronments, and computer graphics at the GMD in Bonn, Ger- many. I am active in the Narrative Intelligence research com- munity. Last year, I was a Fulbright Guest Researcher at the Center for Art and Media Technology (ZKM) in Karlsruhe. In August 1998, I graduated from Carnegie Mellon Univer- sity, with a self-defined interdisciplinary Ph.D. in Artificial Intelligence and Cultural Theory (administered jointly by the Department of Computer Science and the Program in Literary and Cultural Theory).

HONORS/AWARDS Lingua Franca, Tech Top 20 (July, 1999), named one of the “top 20 researchers changing the way we think about technology.” Fulbright Fellowship (September 1998-July, 1999). AAAI Doctoral Consortium (August,1996). Office of Naval Research Allen Newell Graduate Fellowship (October 1994-September 1997). Member, National Research Council Study for Computers and Creativity.

PUBLICATIONS Narrative Intelligence . Michael Mateas and Phoebe Sengers, editors. Advances in Consciousness Series. Amsterdam: John Benjamins Publishing Company, forthcoming. “Narrative Intelligence.” In Human Cognition and Social A gent Technology . Kerstin Dautenhahn, editor. Advances in Consciousness Series. John Benjamins Publishing Company, 2000.

18 New Faculty Jayavel Shanmugasundaram “Efficient Concurrency Control for Broadcast Environ- New Faculty ments.” In Proceeding s of the ACM SIGMOD Cnference Assistant Professor on the Management of Data, Pittsburgh, PA (May, Computer Science Department 1999). With Arvind Nithrakashyap, Rajendran Sivasankaran and Krithi Ramamritham. http://www.cs.wisc.edu/~jai/index.html “Use of Recurrent Neural Networks for Strategic Data Min- ing of Sales Information.” International Management Ph.D. Technion, 1998 Resources Association (IMRA) Conference, Hershey, PA Ph.D. University of Wisconsin, 2001 (May, 1999). With Maram V. Nagendra Prasad, Sanjeev Vadhavkar, and Amar Gupta.

PATENTS y broad research agenda is to build software sys- “Multi-dimensional Database and Data Cube Compression Mtems that can serve as the infrastructure for creating for Aggregate Query Support on Numeric Dimensions.” and deploying Internet-based business applications (also United States patent application filed April 22, 1999. referred to as e-business applications). The need for build- “Using an XML Query Language to Publish Relational Data ing such infrastructure systems arises because currently, in as XML.” United States patent application filed March order to build e-business applications, application devel- 21, 2000. opers have to program against relatively low-level interfaces and write a lot of special purpose code. This plight of appli- cation developers is analogous to that of programmers in the early days of computing, who had to write assembly language programs without the aid of software systems such as compilers and operating systems. My research goal of building software infrastructure systems for e-business ap- plications is thus motivated by the need to provide devel- opers with higher levels of abstraction.

PUBLICATIONS “Accessing Extra-database Information: Concurrency Con- trol and Correctness.” Information Systems , An Interna- tional Journal 23(7):439-462 (1998). With Narain Gehani, Krithi Ramamritham, and Oded Shmueli. “Efficiently Publishing Relational Data as XML Documents.” In Proceedings of the Conference on Very Large Data- bases (VLDB), Cairo, Egypt (September, 2000). With Eugene Shekita, Rimon Barr, Michael Carey, Bruce Lind- say, Hamid Pirahesh, and Berthold Reinwald. “Relational Databases for Querying XML documents: Limi- tations and Opportunities.” In Proceedings of the Con- ference on Very Large Databases, Edinburgh, Scotland (September, 1999). With Kristin Tufte, Gang He, Chun Zhang, David DeWitt, and Jeffrey Naughton. “Compressed Data Cubes for OLAP Aggregate Query Ap- proximation on Continuous Dimensions.” In Proceed- ings of the ACM SIGKIDD Conference on Knowledge Discovery and Data Mining, San Diego, CA (August, 1999). With Usama Fayyad, and Paul Bradley.

19 LECTURES The Impact of the Internet on Research Universities. William Y. Arms National Science Foundation (April 13, 2001). Professor The National Science Digital Library Program. Coalition for Networked Information (April 9, 2001). [email protected] Quality Control in Scholarly Publishing. What are the Al- D.Phil. University of Sussex ternatives to Peer Review? Keynote, workshop on the U.K., 1973 Open Archives initiative and peer review journals in Europe, Geneva (March 22 – 24, 2001). Minerva: The Web Preservation Project. Library of Congress (February 2, 2001). Strategies for Collecting and Preserving Open Access Mate- y research interests concentrate on web informa- rials on the Web. Federal Library and Information Cen- Mtion systems, digital libraries and electronic publish- ter Committee, Washington D.C. (December 7, 2000). ing. These fields integrate methods from many disciplines, The Web as an Open Access Digital Library. Closing ad- so that the work ranges from technical topics, such as dis- dress, 2000 Kyoto International Conference on Digi- tributed computing and information representation, to the tal Libraries: Research and Practice, Kyoto, Japan (No- economic and social aspects of change. My book Digital vember 15, 2000). Libraries was published by the MIT Press in winter 2000. Open Access to Digital Libraries. Must Research Libraries This year we received a major grant to integrate many be Expensive? Keynote address, European Conference separate projects into the NSF’s new digital library for sci- on Digital Libraries, ECDL2000, Lisbon, Portugal ence, mathematics, engineering and technology education. (September 18, 2000). This is likely to be the largest and most heterogeneous digi- tal library yet attempted. Cornell’s multidisciplinary team PUBLICATIONS combines computer science, librarian and user interfaces “Uniform Resource Names: Handles, PURLs, and Digital design expertise. Object Identifiers.” Communication of the ACM, One of my principal interests is the change in scien- 44(5):68 (May, 2001). tific publication as online materials replace printed jour- “Collecting and Preserving the Web: The Minerva nals as the primary means of creating, storing, and distrib- Prototype.” RLG DigiNews 5(2) (April 2001). With uting research information. I have recently completed a Roger Adkins, Cassy Ammen, and Allene Hayes. period as chair of the ACM Publications Board, am a mem- (http://www.rlg.org/preserv/diginews/diginews5- ber of the MIT Press Management Board, and am a mem- 2.html#feature1) ber of a strategic planning committee of the American “An Architecture for Reference Linking.” Technical Report Physical Society. TR 2000-1820, Computer Science Department, Cornell As part of the NSF-funded Prism project, I am work- University (October, 2000). With Donna Bergmark, ing with the Library of Congress to develop methods for and Carl Lagoze. long-term preservation of materials on the Web. “Automated Digital Libraries. How Effectively can Com- puters be used for the Skilled Tasks of Professional UNIVERSITY ACTIVITIES Librarianship?” D-Lib Magazine 6(7/8) (July/August, Chair, Provost’s Advisory Committee on Distance Education. 2000). (http://www.dlib.org/dlib/july00/arms/ Director, eCornell. 07arms.html) Member of the Faculty Senate, the Faculty Advisory Board “Economic Models for Open-access Publishing.” IMP on Information Technology, and the University Library (March, 2000). (http://www.cisp.org/imp/march_2000/ Board. 03_00arms.htm). Digital Libraries. MIT Press, ISBN 0- 262-01180-8, 2000. PROFESSIONAL ACTIVITIES Publications Board, Association for Computing Machinery. National Research Council study Issues for Science and En- gineering Researchers in the Digital Age. MIT Press, member of the Management Board and editor of the series on Digital Libraries and Electronic Publishing.

20 F

F

aculty and Senior Researcher Biographies

aculty and Senior Researcher Biographies under constrained perturbations and deformations. The Graeme Bailey other project is in understanding deformations of trans- Professor membrane proteins used in cell-signaling processes. This is a carefully constrained version of the protein-folding [email protected] problems that have been exciting the mathematical biol- ogy community in recent years; the application of a topo- Ph.D. University of Birmingham logical viewpoint in collaborating with molecular U.K., 1977 phmacologists and structural biologists has already yielded some intriguing insights.

HONORS/AWARDS Kenneth A. Goldman ’71 Excellence in Teaching Award, riginally working in low-dimensional topology and 2000. Ocombinatorial group theory, through an odd mix- ture of circumstances I have become actively involved in UNIVERSITY ACTIVITIES research in mathematics and medicine. One of two ongo- Adjunct Professor; Mathematics. ing research projects in this area is the modeling of lung Member, Fellowship Selection Committees: Rhodes, inflation, together with a research group at the Class One Marshall, Churchill, and Fulbright. Trauma Center at Upstate Medical Univ., Syracuse, NY. This Member, WCHI-Development and Transition Committee. is in the early stages of a program to extend to various pa- Member, Donlon Fellows Development. thologies affecting elasticity and aimed towards effective Member, Master of Engineering Committee. clinical treatments. The group, now having made some sig- Member, Cornell EMS. nificant advances in answering questions that had remained Faculty Advisor, Judo Club. unsolved for over 30 years, is now in the process of trying to obtain reliable mathematical models. This involves building computer simulations of dynamic packing results

computers should also be usable with ten thousand of Kenneth P. Birman them. Professor Spinglass involves two subprojects. One, called Astro- labe, is concerned with a new way to represent data in a [email protected] network. Astrolabe is like a network-wide database in which http://www.cs.cornell.edu/ken/ each computer or component contributes a live tuple. As Ph.D. University of California, data change, Astrolabe propagates the updates. The system Berkeley, 1981 uses a form of dynamically materialized view to continu- ously compute summaries of the picture of the network as a whole. This results in a powerful new tool for distributed monitoring, management, control, and live collaboration. Robbert van Renesse is the leader on this work, and we’re y research is concerned with reliability and security in collaborating with Al Demers and Johannes Gehrke on as- Mmodern networked environments. This work has pects related to databases and data mining. three broad themes. The second big part of Spinglass is concerned with re- Our main focus is on a new system called “Spinglass” liable multicast. We’ve developed a scalable multicast pro- (http://www.cs.cornell.edu/Info/Projects/Spinglass). The tocol that gives probabilistic consistency guarantees, and idea is to explore a class of reliable multicast protocols that we are finding ways to apply this in practical settings. Gradu- are extremely scalable and provide unusually stable ate students looking at these questions include Indranil throughput under stress. We believe that stable through- Gupta, who is developing algorithms that make direct use put is a common requirement in demanding critical set- of probabilistic guarantees; Rimon Barr, who is looking at tings, but few reliable protocols have this property. By adapting these tools for mobile networks; and Ranveer scalability, we mean that a system which works with ten Chandra and Venugopalen Ramasubramanian, who are

21 investigating ad-hoc mobile networking. Kate Jenkins and “A Dynamic Light-weight Group Service.” Journal of Paral- Ken Hopkinson are looking at applications that arise when lel and Distributed Computing 60:1449-1479 (2000). using these protocols in real-world settings arising from With Luis Rodrigues, Katherine Guo, and Paulo the restructuring of the electric power grid. Verissimo. Our third big activity is joint work with Bob Constable’s “A Gossip Protocol for Subgroup Multicast.” International Nuprl project, and involves the use of formal methods to Workshop on Applied Reliable Group Communica- prove properties of reliable communication protocols, such tion (WARGC 2001), Phoenix, AZ (April, 2001). With as those used in Isis, Horus, and Ensemble. Kate Jenkins. Our project is funded primarily by DARPA, with some “Providing Efficient, Robust Error Recovery through Ran- additional funding from the Electric Power Research Insti- domization.” International Workshop on Applied Re- tute and Microsoft Research. The project is directed by liable Group Communication (WARGC 2001), Phoe- myself, R. van Renesse, and W. Vogels. R. Bhoedjang is vis- nix, AZ (April, 2001). With Zhen Xiao. iting as a post-doc for a few years, and developing Intru- “Anonymous Gossip: Improving Multicast Reliability in sion Detection software to make use of Astrolabe. Ad-hoc Networks.” International Conference on Dis- tributed Computing systems (ICDCS 2001), Phoenix, HONORS AZ (April, 2001). With Ranveer Chandra and Stephen ’57 and Marilyn Miles Excellence in Teaching Vanogupalen Ramasubramanian. Award, 2000. “A Randomized Error Recovery Algorithm for Reliable Multicast.” IEEE Infocom 2001 AK (April, 2001). With UNIVERSITY ACTIVITIES Zhen Xiao. Committees: Founding Committee for Faculty of Comput- “Using Epidemic Techniques for Building Ultra-scalable ing and Information Science; University Conflicts of Reliable Communications Systems.” Workshop on Interest; Chairman of the Responsible Conduct of Re- New Visions for Large-scale Networks: Research and search Committee, Engineering College Policy Com- Applications, Vienna, VA (March, 2001). With Werner mittee; IP Advisory Council for the Cornell Research Vogels, and Robbert van Renesse. Foundation. “Optimizing Buffer Management for Reliable Multicast.” LECTURES Submitted to the 2nd Annual Workshop on Networked Next Generation Internet: Unsafe at any Speed? Group Communication (NGC 2000), Palo Alto, CA —. Keynote Speaker: ISDCS ’01 (April, 2001). (November 8-10, 2000). With Zhen Xiao, and Robbert —. University of Rochester (November, 2000). van Renesse. —. IBM T.J. Watson Research Center (March, 2000). “Throughput Stability of Reliable Multicast Protocols.” —. Keynote: Middleware 2000. ADVIS’ 2000, Dokuz Eylul University, Izmir, Turkey (October 25-27, 2000). With Oznur Ozkasap. PUBLICATIONS “A Probabilistically Correct Election Protocol for Large “Technology Requirements for Virtual Overlay Networks.” Groups.” DISC 2000, Toledo, Spain (October 4-6, IEEE Systems, Man and Cybernetics: Special issue on In- 2000). With Indranil Gupta, and Robbert van Renesse. formation Assurance (March, 2001). “Next Generation Internet: Unsafe at Any Speed?” IEEE Com- PUBLICATIONS - LANDMARK puter, Special issue on Infrastructure Protection (Fall, “Bimodal Multicast.” ACM Transactions on Computer Systems 2000). 17(2):41-88 (May, 1999). With M. Hayden, O. Ozkasap, “Technology Challenges for Virtual Overlay Networks.” Z. Xiao, M. Budiu, and Y. Minsky. IEEE Systems, Man, and Cybernetics Information Assur- “A Probabilistically Correct Leadership Election Protocol for ance and Security Workshop, West Point, New York Large Groups.” DISC-2000, Nov 2000, Toledo Spain. (June 6-7, 2000). With I. Gupta and R. van Renesse. “Optimized Group Rekey for Group Communications Sys- tems.” Networked and Distributed Systems Security 2000, San Diego, California. (V). Extended version available as Cornell University, Computer Science TR99-1764. With Ohad Rodeh, and Danny Dolev.

22 F

aculty and Senior Researcher Biographies PUBLICATIONS Martin Burtscher “Hybridizing and Coalescing Load-value Predictors.” In- Assistant Professor ternational Conference on Computer Design, Austin, Member of the School of Electrical TX (September, 2000) :81-92. With B. Zorn. and Computer Engineering and the “Exploring Last n Value Prediction.” International Confer- Graduate Field of Computer Science ence on Parallel Architectures and Compilation Tech- [email protected] niques, Paris, France (October, 1999):66-76. With B. http://www.csl.cornell.edu/~burtscher/ Zorn. “Prediction Outcome History-Based Confidence Estima- Ph.D. University of Colorado tion for Load-value Prediction.” Journal of Instruction- at Boulder, 2000 level Parallelism1 (May 1999). http://www.jilp.org/vol1/ With B. Zorn. y research interests are high-performance micro- Mprocessor architecture, instruction-level parallelism, and compiler optimizations. In particular, I am exploring hardware- and software-based value prediction, data com- pression, and latency reduction techniques. The constantly widening speed gap between CPUs and memory is becoming more and more of a performance- limiting factor. In fact, current high-end microprocessors already spend a substantial amount of time waiting for memory accesses. To speed up program execution, the CPU needs to process useful instructions while waiting for the memory. One way of providing a processor with useful work is to predict what it will have to do next. Many com- modity microprocessors already contain branch predictors to boost their performance, and it is likely that more pre- dictors will be needed to meet the continuing demand for ever-faster CPUs. Designing, evaluating, and improving such predictors is an important focus of my research. Ongoing projects include locating novel domains that can benefit from prediction, adding compiler support to aid and simplify the prediction hardware, devising means to reduce predictor sizes and power consumption without compromising performance, discovering as-of-yet unob- served patterns to build new predictors, and using value- prediction techniques to enhance branch-prediction accu- racy and data-compression rates.

LECTURES Designing a High-performance Load-value Predictor. Hewlett-Packard Company (December, 2000). The Evolution of a High-performance Load-value Predic- tor. Lockheed Martin Corporation (November, 2000). The Design of a High-performance Load Value Predictor. Compaq Computer Corporation (October, 2000). Hybridizing and Coalescing Load-value Predictors. Interna- tional Conference on Computer Design (September, 2000). Predictability and Exploitability of Load Values. Microsoft Research (June, 2000). CS faculty on retreat

23 data. However, degradation in the quality of the Claire Cardie bootstrapped data arises as an obstacle to further improve- Associate ment. To address this, we propose a moderately supervised Professor variant of co-training in which a human corrects the mis- takes made during automatic labeling. Our analysis sug- [email protected] gests that corrected co-training and similar moderately su- http://www.cs.cornell.edu/home/cardie/ pervised methods may help co-training scale to other natu- Ph.D. University of Massachusetts ral language learning tasks that typically require large amounts of training data. Amherst, 1994 In a joint project with CoGenTex Inc. and the Univer- sity of Montreal, we have begun to extend existing corpus- based learning algorithms for information extraction to y primary research areas are Natural Language Pro- acquire a broader set of extraction patterns. We have imple- Mcessing (NLP) and Machine Learning (ML) where mented a new learning algorithm, Autoslog-XML, that can we focus on developing corpus-based techniques for un- extract linguistic entities beyond just noun phrases. derstanding and extracting information from natural lan- Autoslog-XML is a semi-supervised algorithm for locating guage texts. In particular, my group investigates the use of useful extraction patterns from unrestricted text. The machine learning techniques as tools for guiding natural learned extraction patterns have been employed to sup- language system development and for exploring the mecha- port domain-specific multi-document summarization in nisms that underlie language understanding. Our work en- the natural disasters domain. We have also begun to inves- compasses three related areas: (1) machine learning of natu- tigate the application of the extraction pattern learning al- ral language, (2) the use of corpus-based NLP techniques gorithm for Korean texts. Graduate students Vincent Ng to aid information retrieval (IR) and summarization sys- and Kiri Wagstaff are part of this joint research effort. tems, and (3) the design of user-trainable NLP systems that The techniques described above can, in turn, be used can efficiently and reliably extract the important informa- to support a number of practical, end-to-end text-process- tion from a document. ing tasks in addition to multi-document summarization. In the past year or so we have made progress on both For example, we are using the corpus-based partial-parsing the natural language processing and machine learning as- techniques as the primary linguistic component in a new pects of our research. First, we have extended our approach system for general-knowledge question answering. The sys- to partial parsing of natural language texts to operate effec- tem combines techniques for standard information re- tively in a weakly supervised learning framework. The origi- trieval, query-dependent text summarization, and shallow nal approach, developed with graduate students Scott syntactic and semantic sentence analysis. In a series of ex- Mardis and David Pierce, combines corpus-based gram- periments, we examined the role of each statistical and lin- mar induction with a very simple pattern-matching algo- guistic knowledge source in the question-answering sys- rithm and an optional constituent verification step. In tem and find that even very weak linguistic knowledge can evaluations on a number of large-scale partial parsing tasks offer substantial improvements over purely IR-based tech- involving on-line text, the approach produces partial parsers niques for question answering, especially when smoothly that are both fast and accurate. integrated with statistical preferences computed by the IR Unfortunately, however, large amounts of expensive, subsystems. human-annotated data are required for training. In new Finally, in machine learning research with Kiri Wagstaff, work with David Pierce, we investigate the use of weakly we are investigating the use of prior knowledge in the form supervised learning algorithms for partial parsing that re- of user-supplied constraints to improve the performance quire only a small set of labeled training instances. In par- of clustering algorithms. ticular, we examine the learning behavior of co-training, a weakly supervised learning paradigm in which the redun- UNIVERSITY ACTIVITIES dancy of the learning task is captured by training two clas- College Scholar Advisor. sifiers using separate views of the same data. This enables College Scholar Committee Chair. bootstrapping from a small set of labeled training data via Independent Major Advisor. a large set of unlabeled data. For noun phrase bracketing, Cognitive Studies Concentration Advisor. we find that co-training reduces by 36 percent the differ- ence in error between co-trained classifiers and fully super- vised classifiers trained on a labeled version of all available

24 F

aculty and Senior Researcher Biographies Member: Faculty of Computing and Information Founders; NSF Review Panel: Knowledge and Cognitive Systems Faculty of Computing and Information Working (2000); Human-Computer Interaction (2001). Group for Information Science; Faculty of Computing and Information Working Group for Crosscutting Edu- LECTURES cation Programs; Independent Major Advisory Board; Noun Phrase Co-reference for Information Extraction. Logic Provost’s Advisory Group of Women in Science and and AI Seminar, University of Maryland (April, 2001). Engineering; Cognitive Studies Steering Committee; Machine Learning for Information Extraction from Unre- Computer Science Department Ph.D. admissions com- stricted Text. Alan Perlis Symposium, Yale University mittee; Department of Computer Science space com- (April, 2001). mittee; Cognitive Studies Selection Committees for Rapidly Portable Translingual Information Extraction and Summer Fellowships, for Continuing Fellowships, and Interactive Multi-document Summarization. DARPA for Incoming Fellowships. TIDES Meeting (February, 2001). Overview of Cornell University Projects in Natural Language PROFESSIONAL ACTIVITIES Understanding. America On-line (December, 2000). Secretary: North American Association for Computational Linguistics (2000-2001). PUBLICATIONS Secretary: SIGNLL, Association for Computational Linguis- “Limitations of Co-training for Natural Language Learn- tics special interest group on Natural Language Learn- ing from Large Datasets.” Proceedings of the 2001 Con- ing (1999-2001). ference on Empirical Methods in Natural Language Editorial Board: Machine Learning (1999-2001), Semantic Processing (EMNLP-2001), 1-9. Association for Com- Web Journal. putational Linguistics (2001). With David Pierce. Action Editor: Journal of Machine Learning Research (2000- “Multi-document Summarization via Information Extrac- 2002). tion.” Proceedings of the First International Confer- Program co-chair: Fourth Computational Natural Language ence on Human Language Technology Research Learning Workshop (CoNLL 2000). (2001). With Michael White, Tanya Korelsky, Vincent Member: DARPA/NSF Question and Answering Roadmap Ng, David Pierce, and Kiri Wagstaff. Committee; DARPA/NSF Summarization Roadmap “Issues, Tasks and Program Structures to Roadmap Research Committee; DARPA Translingual Information Detec- in Question & Answering” (Q&A). DARPA/NSF tion, Extraction, and Summarization (TIDES) Evalua- (2000). With J. Burger, V. Chaudhri, R. Gaizauskas, S. tion Committee. Harabagiu, D. Israel, C. Jacquemin, C. Lin, S. Maiorano, G. Miller, D. Moldovan, B. Ogden, J. Prager, E. Riloff, PROGRAM COMMITTEES: A. Singhal, R. Shrihari, T. Strzalkowski, E. Voorhees, Eighteenth International Conference on Machine Learn- and R. Weischedel. ing (ICML) (2001). “Using Clustering and SuperConcepts within SMART: TREC Seventeenth International Joint Conference on Artificial In- 6.” Information Processing and Management 36(1):109- telligence (IJCAI) (2001). 131 (2000). With C. Buckley, M. Mitra, and J. Walz. First International Conference on Knowledge Capture (K- “A Cognitive Bias Approach to Feature Selection and CAP) (2001). Weighting for Case-based Learners.” Machine Learn- 39th Annual Meeting of the Association for Computational ing 41:85-116 (2000). Linguistics (2001). “Examining the Role of Statistical and Linguistic Knowledge Second Meeting of the North American Chapter of the As- Sources in a General-knowledge Question-answering sociation for Computational Linguistics (2001). System.” Proceedings of the Sixth Applied Natural Lan- Fifth Computational Natural Language Learning Workshop guage Processing Conference (ANLP-2000), 180-187. (CoNLL) (2001). Association for Computational Linguistics / Morgan Area Chair: The 24th Annual International ACM SIGIR Kaufmann (2000). With V. Ng, D. Pierce, and C. Buckley. Conference on Research and Development in Infor- “Clustering with Instance-level Constraints.” Proceedings of mation Retrieval (2001). the Seventeenth International Conference on Machine Reviewer: Special issue of Computational Linguistics on Learning, 1103-1110. Morgan Kaufmann (2000). With anaphora resolution. Kiri Wagstaff. Executive Board: SIGDAT, Special Interest Group of ACL for Linguistic Data and Corpus-based approaches to NLP.

25 “Integrating Case-based Learning and Cognitive Biases for Error-driven Pruning of Treebank Grammars for Base Noun Machine Learning of Natural Language.” Journal of Ex- Phrase Identification.” Proceedings of the Annual Con- perimental and Theoretical Artificial Intelligence 11:297- ference of the Association for Computational Linguis- 337 (1999). tics and COLING-98, 218-224. Association for Com- “The Role of Lexicalization and Pruning for Base Noun putational Linguistics (1998). With David Pierce. Phrase Grammars.” Proceedings of the Sixteenth Na- “Empirical Methods in Information Extraction.” AI Maga- tional Conference on Artificial Intelligence, 423-430. zine 18(4):65-79 (1997). AAAI Press / MIT Press (1999). With David Pierce. “Noun Phrase Co-reference as Clustering.” Proceedings of [On sabbatic leave 2001-2002] the Joint Conference on Empirical Methods in Natu- ral Language Processing and Very Large Corpora, 82- 89. Association for Computational Linguistics (1999). With Kiri Wagstaff.

shape. In particular, distances and angles that are con- L. Paul Chew sistent across family members are preserved. Thus, the Senior Research Associate consensus shape provides a compact summary of the significant strucutural information for a family. We are [email protected] exploring the use of the consensus shape (1) as a tool http://www.cs.cornell.edu/Info/ for improved protein threading for use in protein struc- People/chew/chew.html ture prediction and (2) as a tool for automating the di- vision of proteins into families and subfamilies. My work on mesh generation has been motivated by the finite element method for finding approximate solutions to partial differential equations. The first step of this method is to create a mesh, i.e. to divide the given y primary interest is in geometric algorithms with problem region into simple shapes called elements (usu- Man emphasis on practical applications. These prac- ally triangles or quadrilaterals in 2D, tetrahedra or tical applications have included placement, motion plan- hexahedra in 3D). A number of algorithms have been ning, shape comparison, vision, sensing, mesh genera- developed to automate this process, but most of them tion, molecular matching, and protein shape-compari- don’t guarantee the quality of the resulting mesh (e.g., a son. triangle may cross a region boundary or there may be In recent work on protein shape, Klara Kedem and I some flat triangles, leading to poor error bounds). I de- have developed a new kind of “consensus shape” for veloped efficient techniques for producing meshes of protein families. This is an analog of the consensus string guaranteed quality for problems in the plane and for that is sometimes used for multiple alignment of pro- curved surfaces. The triangles produced are close to equi- teins. The idea is based, in part, on our previous work lateral in shape; all region boundaries are respected; and on the Unit-vector Root Mean Square (URMS) distance the user can control the element density, producing small for protein shapes. The consensus shape is a pseudo-pro- elements in “interesting” regions and large elements else- tein with useful properties. It is a pseudo-protein because where. it fails to have certain characteristics of real proteins. In I extended this work to produce tetrahedral meshes particular, for the consensus shape, the spacing between for three-dimensional problems. The major difficulty successive alpha carbons is variable, with small distances here is to avoid producing “slivers”: tetrahedra with in regions where the members of the protein family ex- nicely shaped faces but with near-zero volume. I showed hibit significant variation and large distances (up to the that slivers can be avoided by choosing each new mesh standard spacing of four angstroms) in regions where the point randomly within a small specified volume. The family members agree. Despite this nonprotein-like char- randomness helps; a good mesh point—one that does not acteristic, the consensus shape does preserve structural in- form any slivers—can be found in constant expected time. formation. If all members of a protein family exhibit a This work is being used in a large, multi-disciplinary geometric relationship between corresponding alpha car- project: developing adaptive software for field-driven simu- bons then that relationship is preserved in the consensus lations. In particular, we focus on computational fracture

26 F

aculty and Senior Researcher Biographies mechanics and reactive, multiphase fluid flows. Our goal Referee: Journal of the Association for Computing Machinery, is to develop principles for building software systems that SIAM Journal on Scientific Computing. can adapt to changing conditions. These conditions include changes in the desired physics (e.g. we may need to change PUBLICATIONS our physics model when we discover that vibration is sig- “Parallel FEM Simulation of Crack Propagation-chal- nificant), changes in the desired algorithms (e.g. we may lenges, Status, and Perspectives.” Proceedings of Irregu- change our solution technique depending on how quickly lar 2000 (2000). With B. Carter, C.S. Chen, G. Heber, we are converging toward a solution), and changes in the A.R. Ingraffea, R. Krause, C. Myers, P.A. Wawrzynek, computing environment (e.g. additional processors may K. Pingali, P. Stodghill, S. Vavasis, N. Chrisochoides, become available or we may lose processors due to proces- D. Nave, and G.R. Gao. sor failure). Other Cornell researchers working on this “Fast Detection of Common Geometric Substructure in project are Keshav Pingali, Steve Vavasis, Paul Stodghill, Proteins.” Journal of Computational Biology 6(3):313- and Tony Ingraffea (Civil Engineering), along with partici- 325 (1999). With D. Huttenlocher, K. Kedem, and J. pants at Mississippi State University, Ohio State Univer- Kleinberg. sity, Clark-Atlanta University, and the College of William “Unit-vector RMS (URMS) as a Tool to Analyze Molecular & Mary. Dynamics Trajectories.” Proteins: Structure, Function and Genetics 37, 554-564 (1999). With K. Kedem and R. PROFESSIONAL ACTIVITIES Elber. Associate Editor: Pattern Recognition: the Journal of the Pat- tern Recognition Society.

Thomas F. Coleman Director: Financial Industry Solutions Center (55 Broad Professor Street, NYC). Director: Cornell Theory Center Member: Engineering Dean Search Committee; Cornell Task Force on Genomics; Program Committee for the Director: Financial Industry Solutions Center for Applied Mathematics. Center (FISC) PROFESSIONAL ACTIVITIES [email protected] Chair: SIAM Activity Group on Optimization. http://www.tc.cornell.edu/~coleman/ Co-organizer: The 11th Annual Derivatives Securities Con- Ph.D. University of Waterloo, 1979 ference, New York (April 27-28). Organizer: FISC Spring 2000 Workshop Series. Program Committee: Automatic Differentiation 2000, ur research is concerned with the design and un- INRIA, France. Oderstanding of practical and efficient numerical al- Member: Advisory Board, Brookhaven Center for Data In- gorithms for continuous optimization problems. Our pri- tensive Computing; Scientific Program Committee. mary emphasis is the development of algorithms for large- Member: Organizing committee for the thematic year at scale optimization, especially as applied to the area of com- the Fields Institute: Numerical and Computational putational finance. Challenges in Science and Engineering (2001-2002). With colleagues Yuying Li, Peter Mansfield, Arun Organizer: Proposal for an IMA Special Year on Optimiza- Verma, and Shirish Chinchalkar, we are developing a vari- tion, Minneapolis, MN (2002-2003); Seventh SIAM ety of tools and methods for computational finance in the Conference on Optimization, Toronto, Ontario areas of portfolio management and options pricing (and (2002). hedging). Several Ph.D. students in the Center for Applied Editorial Board: Applied Mathematics Letters; SIAM Journal Mathematics are also involved in this work: Cristina Pa- of Scientific Computing; Computational Optimization and tron, Yohan Kim, and Changhong He. Yohan Kim com- Applications, Comm. on Applied Non-linear Analysis, pleted his Ph.D. dissertation in May, 2001: Estimation of Mathematical Modeling and Scientific Computing. Smooth Volatility Functions in Option Pricing Models. Referee/Reviewer: Mathematical Programming; Computational Optimization and Applications; SIAM Journal of Optimi- UNIVERSITY ACTIVITIES zation; SIAM Journal of Scientific Computing; Department Director: Cornell Theory Center. of Energy, NSF.

27 LECTURES PUBLICATIONS Dynamic Hedging and a Deterministic Local Implied Vola- “ADMIT-1: Automatic Differentiation and MATLAB In- tility Function. Eleventh Annual Derivatives Confer- terface Toolbox.” ACM Transactions on Mathematical ence, New York (April 28, 2001). Software 22:150-175 (2000). With Arun Verma. RISK 2001 Europe, Paris France (April 10-11, 2001). “Efficiency Improvements for Pricing American Options Introduction to Computational Finance in Matlab: A 1- with a Stochastic Mesh: Parallel Implementation.” Fi- day workshop at FISC-Japan, Tokyo (March 22, nancial Engineering News, 1-2 (December, 2000). With 2001). Thanos Avranidis, Yuriy Zinchenko, and Arun Verma. A Newton Method for Option Valuation. U. Singapore, Singapore (December 12, 2000). [On sabbatic leave 2001-2002] —. City University of Hong Kong, Hong Kong (December 22, 2000).

Robert L. Constable in June involving the whole design and implementation team (Stuart Allen, Rich Eaton, Christoph Kreitz, Lori Professor Lorigo, and me). Nuprl 5 supports multiple proof engines Dean for Computing and Information and multiple editors. It also integrates an automatic theo- Science rem prover, called the JProver, built by C. Kreitz, Jens Otten, and Stephan Schmitt. [email protected] The Library includes over ten thousand theorems. http://www.cs.cornell.edu/home/rc/ Many of these are used in system verification, but a large Ph.D. University of Wisconsin-Madison, number are from general mathematics. These general theo- 1968 rems are a valuable resource. We are funded by ONR to further develop and explore the concept of a formal digital library of formal constructive mathematics built around direct the PRL research group. For the past three years these theorems. We will generalize our mechanisms to Iwe have been building a system that we call a logical pro- allow many users to contribute to the Library using other gramming environment (LPE). It provides substantial auto- theorem provers such as ACL2, HOL and PVS. mation in the design, coding, verification, and evolution We are also working on a more experimental LPE called of large software systems. Generally an LPE will integrate MetaPRL, which started with Jason Hickey’s thesis and now programming languages and logics. In our case we inte- involves many people but especially Aleksey Nogin and grate the ML programming language and a programming Alexsey Kopylov. This system is built entirely in OCaml logic based on type theory. Reasoning about ML programs and supports OCaml as its programming language. It is is founded on type theoretic semantics for ML. The LPE coded for efficiency as well as modularity, and at some also integrates a compiler and a theorem prover. We use tasks it is over two orders of magnitude faster than Nuprl the latest version of Nuprl as the prover. 5. It also supports multiple programming logics. Nuprl 5 Over the past year we have deployed our prototype and MetaPRL share mathematics libraries. LPE to support the Ensemble group communication sys- The two theorem provers are used in a variety of other tem that Ken Birman, Robbert van Renesse, and their stu- projects as well, including the creation of formal dents have built. The LPE provides automatic code trans- courseware by S. Allen, the translation of formal proofs formations that improve performance in a way that is guar- into natural language by Amanda Holland-Minkley, the anteed not to introduce errors. The LPE also supports the automatic analysis of the computational complexity of design and coding of new adaptive protocols that are part of higher-order programs by Ralph Benzinger, and efficient the Spinglass project. reflection being designed and implemented by Eli Barzilay. The Nuprl 5 system is a major re-implementation of We follow the work of Greg Morrisett and his students on Nuprl 4; its design is based on communicating processes new ML compilers and on typed assembly language. We that synchronize around a logical database that we call “the plan to use the LPE to broadly support research on lan- Library.” The Library stores definitions, theorems, conjec- guage-based security in the department and at the new tures, proofs, algorithms, proof tactics, and commentary Information Assurance Institute, including the work of that is linked to the formal mathematics. We released the Dexter Kozen, Andrew Myers, and Fred Schneider. first version of Nuprl 5 last summer, with a debut at CADE

28 F

aculty and Senior Researcher Biographies UNIVERSITY ACTIVITIES “Nuprl’s Class Theory and its Applications.” In Foundations Dean: Computing and Information Science. of Secure Computation, F.L. Bauer and R. Steinbruggen, Committees: Applied Math Policy; Cognitive Studies editors. IOS Press, 91-115 (2000). Executive Committee; Theory Center Executive “Types in Logic, Mathematics and Programming.” In Hand- Committee. book of Proof Theory, S. R. Buss, editor. Elsevier Science B. V., 684-785 (1998). PROFESSIONAL ACTIVITIES “The Structure of Nuprl’s Type Theory.” In Logic of Compu- Advisory Council: Princeton University Department of tation, Springer-Verlag, (1997). Computer Science. Implementing Mathematics with the Nuprl Development System. Editor: Journal of Logic and Computation; Formal Methods in Prentice-Hall (1986). With S. Allen, et. al. System Design; Journal of Symbolic Computation. Director: NATO Summer School, Marktoberdorf, Germany. General Committee Member: LICS.

LECTURES How Computers Think. Dean’s Forum, Faculty of Natural Sciences, Ben-Gurion University (June, 2001). Formal Complexity Classes: An Approach to Automating Computational Complexity Analysis. Cornell Univer- sity (May, 2001). With Ralph Benzinger. How Nuprl Reasons. University of Delaware (May, 2001). Taking a MEGABYTE: Cornell in the Information Age. Uni- versity of Delaware (May, 2001). How Nuprl Reasons. Yale University (February, 2001). Taking a MEGABYTE: Cornell in the Information Age. Cornell University (February, 2001). Representing the Faculty of Computing and Information. Cornell University (September, 2000). How Computers Think. Cornell University (September, 2000). Computer Science: Achievements and Challenges Circa 2000. Cornell University (March, 2000).

PUBLICATIONS “An Experiment in Formal Design Using Meta-properties. In Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX 2001), IEEE Computer Society Press (June, 2001). With C. Kreitz, M. Bickford, and R. van Renesse. “Protocol Switching: Exploiting Meta-properties.” In Pro- ceedings of the International Workshop on Applied Reliable Group Communication (WARGC 2001) (April, 2001). IEEE Computer Society Press. With C. Kreitz, X. Liu, R. van Renesse, and M. Bickford. “Computational Complexity and Induction for Partial Computable Functions in Type Theory.” In Reflections: A Collection of Essays in Honor of Solomon Feferman, As- sociation for Symbolic Logic (2001). With K. Crary. “Constructively Formalizing Automata.” In Proof, Language and Interaction: Essays in Honour of Robin Milner, MIT Press, 213-238 (2000). With P.B. Jackson, P. Naumov, CIS Dean Robert L. Constable with Department of Computer Science and J. Uribe. Chairman, Charles Van Loan

29 We are considering classes of “resource location” or Alan J. Demers “anomaly detection” problems, in which query results are Professor site-specific and depend on distance and subsumption. Such problems can have efficient and highly scalable solu- tions using gossip partner choice distributions based on [email protected] the distance between sites. Ph.D. Princeton University, 1975 Finally, we are studying graph constructions for which flooding or deterministic gossip partner choices can be used, leading to reduced overhead while still retaining most of the desirable properties of randomized gossip. The above is related to my previous work on the Clear- inghouse and Bayou projects at Xerox PARC. I am also do- y current research concerns aspects of weakly-con- ing work supported by Oracle on asynchronous update- Msistent data replication in databases and distributed anywhere replication in a more traditional database set- systems. ting. This involves algorithms for scheduling/reordering With Ken Birman, Robert van Renesse, Johannes update propagation between sites to improve throughput Gehrke, and others, I am studying randomized “gossip pro- while preserving eventual consistency and bounded incon- tocols.” Such protocols are highly fault-tolerant and, when sistency during propagation. properly designed, extremely scalable as well. We are study- ing convergence properties of several flat and hierarchal RECENT PAPERS versions of the basic protocols tailored to specific applica- “Logarithmic Harary Graphs.” ICDCS International Work- tion requirements. shop on Applied Reliable Group Communication, My particular focus is approximate evaluation of ag- Phoenix, Arizona (April, 2001). With K. Jenkins. gregate queries in such a system. We are studying age dis- “Spatial Gossip and Resource Location Protocols.” Pro- tributions of gossiped data in order to prove probabilistic ceedings of the 33d ACM Symposium on Theory of bounds on the quality of aggregate query results. Alterna- Computing, Crete (July, 2001). With D. Kempe, and J. tively, we can use this approach to bound the latency re- Kleinberg. quired to probabilistically guarantee a client-specified de- gree of consistency.

My current research directions include: mean field Ron Elber approaches for global optimization and structure pre- Professor diction (Locally Enhanced Sampling). Structures are of- ten determined by an optimization of an energy func- [email protected] tion. I introduced mean field approaches that modify http://www.cs.cornell.edu/ron/ the target function and make it more accessible to glo- old_webpage-ron/index_ron.html bal optimization. We have applied these techniques to Ph.D. Hebrew University determine conformations of short peptides and to re- fine low-resolution structures of proteins. These ap- proaches are implemented into MOIL. We are also working on development of folding poten- tials using linear programming. An ideal folding potential y research is in the field of Computational Mo- assigns the lowest energy to the correct three-dimensional Mlecular Biology. We develop computer algorithms to structure of a protein. All other structures must have higher study sequences, structures, dynamics, and function of pro- energies. The design of folding potentials relies on consid- teins and apply these methods to a variety of biological erable human intuition and many trials and errors. I devel- problems. Our techniques are implemented in the systems oped an automated protocol that “learns” and improves MOIL and LOOPP, available on the web http:// the quality of the current potential energy. We used this www.tc.cornell.edu/CBIO. protocol to prove that the widely used pairwise interaction

30 F

aculty and Senior Researcher Biographies model cannot recognize exactly correct protein folds. Based 2000). on these studies, a novel threading algorithm was designed Protein Recognition by Threading. University of Maryland and implemented in the program LOOPP. In a threading (October, 2000). algorithm a sequence is matched with a structure. In a Long Time Dynamics of Biomolecules. NYU (October, recent article in Science, we published an intriguing appli- 2000), M3. cation of this program. We suggested an evolutionary link between a gene that controls the size of the tomato fruit PUBLICATIONS and a protein that participates in controlling cell growth “Protein Recognition by Sequence-to-structure Fitness: and division. Malfunction of this protein causes cancer in Bridging Efficiency and Capacity of Threading Mod- humans (joint work with Steve Tanksley’s group). els.” Submitted to Advances in Chemical Physics, by in- Another project concerns extending the time scale of vitation. With Jaroslaw Meller. simulations. One of the striking observations in dynamics “The Enzymatic Circularization of a Malto-octaose Linear of biological molecules is the extremely large time scale Chain Studied by Stochastic Reaction Path Calcula- they covered. Initiation by light absorption of biochemi- tions on Cyclodextrin Glycosyltransferase.” Proteins, cal processes is very rapid (femtoseconds), while protein Structure, Function and Genetics 43:327-335 (2001). folding is slow (milliseconds to minutes). Current simula- With Joost C.M. Uitdehaag, Bart A. van der Veen, tion approaches (Molecular Dynamics (MD)) are restricted Lubbert Dijkhuizen, and Bauke W. Dijkstra. to nanoseconds (10-9 seconds). I developed a stochastic “Cloning, Transgenic Expression and Function of fw2.2: a path integral formulation that provides a numerically stable Quantitative Trait Locus Key to the Evolution of To- trajectory for almost any arbitrary time step. We apply the mato Fruit.” Science 289:85-88 (2000). With A. Frary, new algorithm to study activation of proteins (the R->T C. Nesbitt, A. Frary, S. Grandillo, E. van der Knaap, B. transitions in hemoglobin, microseconds) and to protein Cong, J. Liu, J. Meller, K.B. Alpert, and S.D. Tanksley. folding (folding of C peptide, tens of nanoseconds). The “Distance Dependent Pair Potential for Protein Folding: method provides systematic approximations to the dynam- Results from Linear Optimization.” Proteins, Structure, ics and is more efficient than MD by orders of magnitude. Function and Genetics 41:40-46 (2000). With D. Tobi. It is available in MOIL. “Probing the Role of the Local Propensity in Peptide Turn Formation.” International Journal of Quantum Chemis- PROFESSIONAL ACTIVITIES try 80:1125-1128 (2000). With D. Mohanty, and D. Acting head: NIH resource for parallel computing at the Thirumalai. Cornell Theory Center. Committees: Statistical and Computational Genomics Committee; Computational Biology Committee for the collaborative efforts at Cornell, Rockefeller, and Sloan Kettering Institutes; Cornell Life Science Advi- sory Board; Planning Committee for Life Science and Technology Building; Theory Center committee. National Committees: NIH study sections; NSF study sec- tion; Reviewer for the State of Texas; Chair: workshop on protein dynamics, Telluride (August, 2001).

LECTURES Protein Recognition by Threading. DIMACS, Rutgers (March, 2001). Parallel Computations of Trajectories. SIAM (March, 2001). Long Time Dynamics of Proteins. University of Pennsylva- nia (February, 2001). Long Time Dynamics and Protein Recognition by Thread- ing. IBM Watson (February, 2001). Long Time Dynamics of Biomolecules. Florida State, Com- putational Biophysics (January, 2001). Protein Recognition by Threading. CUNY (December, Professor Ken Birman, Associate Professor Bart Selman, and Professor Keshav Pingali

31 HONORS/AWARDS Geri Gay NYS Chancellor’s Award for Excellence 2001. Professor Innovative Teaching Award 2000. FCI, joint with Communication CURRENT PROJECTS [email protected] NASA and AT&T Advanced Technology for Learning http://www.comm.cornell.edu/faculty/ projects. gay.html Intel Museum Context Aware Computing Project Intel and NSF studies on the use of wireless computing, Ph.D. Cornell University, 1985 covered in Chronicle of Higher Education, USA Today, Newsweek, The New York Times, Globe and Mail, and NPR. am the director of the Human Computer Interaction IGroup (HCI Group) and a professor of communica- LECTURES tion at Cornell University. The HCI Group is a research American Educational Research Association, International and development group whose members design and re- Communication Association; ACM Multimedia; search the use of computer-mediated learning environ- Japanese Private University Association. ments. My research interests focus on cognitive and so- cial issues for the design and use of interactive commu- PUBLICATIONS nication technologies. Past research has explored navi- Articles in Journal of Computer-Mediated Communication; gation issues, knowledge management, mental models Journal of Research on Computing in Education; Journal and metaphors, knowledge representations, collabora- of Educational Technology; Journal of Educational Com- tive work and learning, and system design. puting Research; Journal of Educational Psychology; Inter- I have received funding for my research and design national Journal of HCI; ACM Digital Libraries; Journal projects from the National Science Foundation (NSF), of Information Technologies. the National Endowment for the Humanities (NEH), the Mellon Foundation, Intel, Microsoft, IBM, Getty, and several private donors. I teach courses in interactive mul- timedia design and research, computer-mediated com- munication, human-computer interaction, and the so- cial design of communication systems.

make the resulting data mining models more understand- Johannes Gehrke able to the user. As an example, consider classification trees, Assistant Professor a data mining model that is supported in nearly all com- mercial data mining suites. In recent research we have shown that a large class of classification tree construction algo- [email protected] rithms is biased (including most algorithms used in com- http://www.cs.cornell.edu/johannes/ mercial tools), thus, users could draw incorrect conclusions Ph.D. University of Wisconsin-Madison, from the resulting “incorrect” classification tree. Our meth- 1999 ods can provably eliminate this bias from any existing split selection method. Other recent results include the fastest published algorithm for mining long market baskets, and new methods for mining long sequential patterns. y primary research interest is in the development The widespread deployment of sensors and mobile de- Mof new data mining and database technology. My vices is transforming our physical environment into a com- group is currently involved in three projects: The Himalaya puting platform. There is now computing power on every Data Mining Project, the Cougar Sensor Database System, device, and emerging networking techniques ensure that and the Amazon Stream Processing Project. devices are interconnected and accessible from local or In the Himalaya Data Mining Project we develop new wide-area networks. This is a distributed database system data mining functionality, and we work on techniques to of unprecedented scale. In the Cougar Sensor Database

32 F

aculty and Senior Researcher Biographies System, we develop database technology for tasking, min- ACM SIGMOD Workshop on Research Issues in Data Min- ing, and monitoring such a large number of distributed ing and Knowledge Discovery (DMKD 2001) held in data sources. We have implemented the first generation of cooperation with SIGMOD 2001. Santa Barbara, CA the Cougar Device Database System, where we leverage the (May, 2001). Workshop Co-chair. processing power on the devices to push query processing Eighteenth International Conference on Machine Learn- directly to the data sources. Different query processing strat- ing (ICML 2001), Williams College, MA (June, 2001). egies allow us to balance resource usage, accuracy, and speed Sixth ACM SIGKDD Conference (KDD 2001), San Jose, of query answers. Our current research focuses on distrib- CA (August, 2001). uted and fault tolerant query processing and meta-data Twelfth International Conference on Software Engineer- management. ing and Knowledge Engineering, Chicago, IL (Ju;ly, In many applications, for example in intrusion detec- 2000). tion, sensor networks, and network management, data ar- Sixth ACM SIGKDD International Conference on Knowl- rive in streams, and the large volume of such high-speed edge Discovery and Data Mining (KDD 2000). Bos- data streams makes storage and offline processing of the ton, MA (August, 2000). data infeasible. In the Amazon Stream Processing Project, Editorial Boards: we are developing query processing techniques for long Knowledge and Information Systems. running queries over infinite data streams. The main diffi- Journal of Database Management. culty here is the new model of computation: Instead of being able to re-read data many times and to perform ex- LECTURES pensive offline computation on a static dataset, we need to An Introduction to Data Mining. Air Force Research Labo- compute query answers and maintain summary statistics ratory, Rome, NY (September 12, 2000). in an online fashion. Our recent results include computa- An Overview of Modern Data Mining Technology. Work- tion of correlated aggregates and quantiles over data shop at the Financial Industry Solutions Center (FISC) streams. New York (November 8, 2000). The Infrastructure of Electronic Commerce. Lectures on HONORS/AWARDS Database Technology and Data Mining. Johnson IBM Faculty Development Award (2000, 2001). Graduate School of Management, Cornell University James and Mary Tien Excellence in Teaching Award (2001). (January, 2001). Honest Classification Trees. IBM Watson Research Center, UNIVERSITY ACTIVITIES Yorktown, NY (March, 2001). Member: Space Committee, Department of Computer Sci- Panel Manager for “Storage—A Crowded Place?” Panel at ence; Faculty Search Committee, School of Operations the 2001 Leadership in the Technology Marketplace Research and Industrial Engineering; faculty Search Symposium, Cornell Johnson Graduate School of Committee, The Computational and Statistical Management, Ithaca (April, 2001). Genomics Trust. Querying the Physical World. DARPA Sensor Information Technology PI Meeting. St. Petersburg, FL (April, 2001). PROFESSIONAL ACTIVITIES Mining Very Large Databases. Invited talk at the 33rd Sym- Program Committees: posium on the Interface of Computing Science and Twenty-sixth International Conference on Very Large Da- Statistics, Costa Mesa, CA (June, 2001). tabases (VLDB), Cairo, Egypt (September, 2000). Dem- onstrations Committee. PUBLICATIONS Seventeenth IEEE International Conference on Data Engi- “RAINFOREST - A Framework for Fast Decision Tree Con- neering (ICDE 2001), Heidelberg, Germany (April struction of Large Datasets. In Data Mining and Knowl- 2001). edge Discovery 4(2/3):27-162 (July, 2000). With Raghu Fourth International Workshop on Parallel and Distributed Ramakrishnan, and Venkatesh Ganti. Data Mining. Workshop held in conjunction with the “Querying the Physical World.” In IEEE Personal Communi- 15th International Parallel and Distributed Process- cations, special issue on Smart Spaces and Environments ing Symposium, San Francisco, CA (April, 2001). (October, 2000). With Philippe Bonnet, and Praveen Twentieth ACM SIGMOD Conference (SIGMOD 2001), Seshadri. Santa Barbara, CA (May, 2001).

33 “Towards Sensor Database Systems.” In Proceedings of the “On Computing Correlated Aggregates Over Continual Second International Conference on Mobile Data Data Streams.” In Proceedings of the 2001 ACM Management, Hong Kong, China (January, 2001). With SIGMOD International Conference on Management Philippe Bonnet, and Praveen Seshadri. of Data, Santa Barbara, CA (May, 2001). With Flip “DEMON: Mining and Monitoring Evolving Data.” In IEEE Korn, and Divesh Srivastava. Transactions on Knowledge and Data Engineering “Query Optimization In Compressed Database Systems.” 13(1):50-63 (January/February 2001). With Venkatesh In Proceedings of the 2001 ACM SIGMOD Interna- Ganti, and Raghu Ramakrishnan. tional Conference on Management of Data, Santa Bar- “MAFIA: A Maximal Frequent Itemset Algorithm for Trans- bara, CA (May, 2001). With Zhiyuan Chen, and Flip actional Databases.” In Proceedings of the 17th Inter- Korn. national Conference on Data Engineering, Heidelberg, “Bias Correction in Classification Tree Construction.” In Germany (April, 2001). With Doug Burdick, and Proceedings of the Seventeenth International Confer- Manuel Calimlim. ence on Machine Learning (ICML 2001), Williams Col- lege, MA (June, 2001). With Alin Dobra.

Carla Gomes and data intensive methods for intelligent decision mak- ing systems. See www.cis.cornell.edu/iisi. Research Associate Director, Intelligent Information PROFESSIONAL ACTIVITIES Systems Institute (IISI) Director, Intelligent Information Systems Institute (IISI). Guest Editor, Journal of Knowledge Engineering Review, Cam- [email protected] bridge Press. http://www.cs.cornell.edu/gomes Guest Editor, Artificial Intelligence Journal. Ph.D. University of Edinburgh, 1993 Editorial Board, Journal of Knowledge Engineering Review. Editorial Board, International Journal AI Tools (IJAIT). Co-chair, AAAI Symposium on Uncertainty in Computa- tion, Boston, MA (2001). y research interests are centered around the inte- Co-chair, AAAI Workshop on Leveraging Probability and Mgration of methods from artificial intelligence and Uncertainty in Computation, AAAI (2000). operations research for solving hard combinatorial prob- Member, Advisory Committee International Scientists, lems. I consider applications in areas ranging from combi- Ministry of Science and Technology, Portuguese Gov- natorial design, planning and scheduling, reasoning, multi- ernment, Presidency of European Union (2000). agent systems, and machine learning. Recently, I have fo- Member, Program Committee, SAT, Boston, MA (2001). cused on randomized search techniques. In this work, I External Examiner, Ph.D. Thesis of Ramon Bejar, Univ. of study so-called heavy-tailed distributions that characterize Leida, Barcelona, Spain. complete randomized search methods. A promising way Reviewer for 7th Int. Joint Conference on Artificial Intelli- of exploiting heavy-tailed behavior is by combining a suite gence (IJCAI); Journal of Automated Reasoning; Journal of search methods into a portfolio, running on a distrib- of Artificial Intelligence Research; Constraints: An Inter- uted compute cluster. It can be shown that such portfolios national Journal; Discrete Applied Mathematics. dramatically reduce the expected overall computational cost, thereby allowing us to solve large, previously unsolved LECTURES combinatorial problems. Another recent research direction Structure, Duality, and Randomization: Common Themes (joint work with groups at the University of Washington in AI and OR. and Microsoft Research) involves the use of machine learn- —. Broad Area Colloquium, Stanford University, Stanford, ing techniques and Bayesian models to develop effective CA (November, 2000). adaptive algorithmic strategies given bounded computa- —. AI Seminar, SRI, Palo Alto, CA (November, 2000). tional resources. —. Research Seminar, NASA/Ames, Mountain View, CA I also established and direct the newly formed Intelli- (November, 2000). gent Information Systems Institute (IISI) at Cornell. The —. Colloquium, Univ. of Lisbon, Lisbon, Portugal (March, mission of the institute is to foster research in computation 2001).

34 F

aculty and Senior Researcher Biographies Survey of Information Retrieval and Knowledge Represen- “Extending the Reach of SAT with Many-Valued Logics.” tation, 3 lectures at AFRL/IF, Rome, NY (November, Electronic Notes in Discrete Mathematics 9, Elsevier Sci- 2000). ence Publ. (2001). With R. Bejar, A. Cabiscol, C. Vision and Directions for the Intelligent Information Sys- Fernandez, and F. Manya. tem Institute, AFRL/IF, Rome, NY (February, 2001). “An Application of Randomization and Restarts in Proof Impact of Structure on Complexity. MURI /AFOSR meet- Planning.” Proc. of the 6th European Conference on ing on Coop. Control of Distributed Autonomous Planning (ECP-01), Toledo, Spain (2001). With A. Vehicles in Adversarial Environments, UCLA, Los An- Meier , and E.Melis. geles, CA (May, 2001). “Extending the Reach of Proof Planning by Randomiza- Structure and Complexity in the Virtual Transportation tion and Restart Techniques.” Future Directions in Auto- Company. Meeting on Taskable Agent Software Kit, mated Reasoning, IJCAR Workshop, Siena, Italy (2001). Darpa, Sante Fe, NM (April, 2001). With A. Meier and E. Melis. Controlling Computational Cost. Meeting on Autonomous “Generating Hard Feasible Schedules. Proc. of the 6th Eu- Negotiation Teams, DARPA, Lake Tahoe, CA (May, ropean Conference on Planning (ECP-01), Toledo, 2001). Spain (2001). With J. Argelich, R. Bejar, A. Cabiscol, C. Fernandez, and F. Manya. PUBLICATIONS “Heavy-tailed Behavior and Randomization in Proof Plan- “On the Intersection of AI and OR.” Journal of Knowledge ning. Model-based Validation of Intelligence, AAAI Engineering Review 16(1) (2001). 2001 Spring Symposium Series, Stanford, CA (2001). “Algorithm Portfolios.” Artificial Intelligence Journal With A. Meier and E. Melis. 126(2001). With B. Selman. “Distribute Constraint Satisfaction in a Wireless Sensor “A Bayesian Approach to Tackling Hard Computational Tracking System. Proc. Workshop on Distributed Con- Problems.” Proc. 17th Conf. on Uncertainty and Arti- straint Reasoning (CONS-2), IJCAI-2001, Seattle ficial Intelligence (UAI-2001), Seattle, WA (2001). With (2001). With R. Bejar, B. Krishnamachari, and B. E. Horvitz, Y. Ruan, H. Kautz, B. Selman, and M. Selman. Chickering. “Heavy-tailed Phenomena in Satisfiability and Constraint “Balance and Filtering in Structured Satisfiable Problems. Satisfaction Problems. Journal of Automated Reasoning Proc. 17th Intl. Conf. on Artificial Intelligence (IJCAI- 24(1/2):67-100 (2000). With B. Selman, N. Crato, and 2001), Seattle, WA (2001). With H. Kautz, Y. Ruan, D. ). Results featured in Science News (2000). Achlioptas, B. Selman, and M. Stickel. “Artificial Intelligence and Operations Research: Challenges and Opportunities in Planning and Scheduling and Operations Research. Journal of Knowledge Engineering Review 15(1) (2000).

Donald P. Greenberg specialties include color science, parallel processing, and Professor and Member of the FCI, realistic image generation. My application work now fo- the Johnson School of cuses on medical imaging, architectural design, perception, Management, the Department of digital photography, and real-time photorealistic image gen- Architecture, and the Graduate eration. Field of Computer Science Consistent with the interdisciplinary nature of the field [email protected] of computer graphics, I am a member of Cornell’s faculty http://www.graphics.cornell.edu/people/ in Johnson Graduate School of Management, the Depart- director.html ment of Computer Science, and the Department of Archi- Ph.D. Cornell University, 1968 tecture. In recent years I have taught courses in computer graphics, computer-aided architectural design, digital pho- tography, and disruptive technologies. am one of the pioneers in the emerging field of com- I was the founding director of the NSF Science and Iputer graphics, having served as a leading researcher and Technology Center for Computer Graphics and Scientific teacher in the field since 1965. My research is primarily Visualization, now in its eleventh year. I am the director of concerned with physically based image synthesis and with the Program of Computer Graphics and former director of applying graphic techniques to a variety of disciplines. My the Computer-aided Design Instructional Facility at Cornell.

35 I have published more than 200 articles on computer graph- PUBLICATIONS ics, and many of my students have been highly recognized “Spatiotemporal Sensitivity and Visual Attention For Effi- in the field, including several who have received the cient Rendering of Dynamic Environments.” ACM SIGGRAPH Achievement Award and others who have re- Transactions on Graphics (2001). With Hector (Yang-Li) ceived Hollywood Oscars. Yee, and Sumanta N. Pattanaik. In 1987, I received the ACM Steven Coons Award, the “Field Trip to Ithaca, N.Y.: Autodesk Development Team highest honor in the field, for my outstanding creative con- Refining Sketching Advantages of Architectural Stu- tributions in computer graphics. I also received the Na- dio.” Design Architecture.com (June 4, 2001). With tional Computer Graphics Association Academic Award in Wendy Talarico. 1989. In 1997 I received the ASCA Creative Research Award “Lighting the Way: A Conversation with Don Greenberg of in Architecture. An honorary doctoral degree from New Cornell’s Program in Computer Graphics.” Cadence Jersey Institute of Technology was presented to me in 1999. Web (http://www.cadenceweb.com/features/inter- views/greenberg.html), 1-2 (2001). PROFESSIONAL ACTIVITIES “Tomorrow’s Internet and Design Software.” Symposium: Member: National Academy of Engineering. Emerging Information Technologies for Facilities, NAS, Fellow: ACM and International Association of Medical and FCC, Washington D.C. (October 20, 2000). Biological Engineering. “Once and Future Graphics Pioneer.” Architecture Week (18):1-7 (September, 2000). With B. J. Novitski. LECTURES “Time-dependent Visual Adaptation for Realistic Image Disruptive Histories of Our Future. Cornell JGSM Reunion Display.” Computer Graphics Proceedings, Annual 2001, Cornell University (June 9, 2001). Conference Series, ACM SIGGRAPH, 47-53(July, 2000). Art & Design for Living. Cornell University, Parents Visit With Sumanta N. Pattanaik, Jack Tumblin, and Hec- (April 20, 2001). tor Yee. Virtual Environments of the 21st Century. Cornell Associa- “Toward a Psychophysically Based Light Reflection Model tion of Professors Emeriti, Cornell University (April for Image Synthesis.” Computer Graphics Proceedings, 19, 2001). Annual Conference Series ACM SIGGRAPH, 55-64 Rendering History & Progress. STC Lecture, Program of (July, 2000). With Fabio Pellacini, and James A. Computer Graphics, Cornell University (April 17, Ferwerda. 2001). “A Lab Ahead of its Time: Cornell Graphics Lab Sets High The Real Challenge for Architecture in a Virtual World. Ar- Standards.” Architectural Record, 198-204 (June, 2000). chitecture Department, University of Virginia, With B. J. Novitski, and Moreno A. Piccolotto. Charlottesville, VA (April 5, 2001). “Approximate Visibility for Illumination Computations Rendering. EAG 2001, Boston, MA (April 3, 2001). using Point Clouds.” Program of Computer Graphics Tech- Working Today on Tomorrow’s Design Software. SOM Lec- nical Report, Cornell University (June 1, 2000). With ture Series, NY (February 15, 2001). Philip M. Dutre, and Parag Tole. B-schools: A Case History of Our Future. MBA Leadership “A System for 3D Conceptual Modeling for Architectural 2001 Conference, New Orleans, Louisiana (January 25, Design.” Program of Computer Graphics Technical Report, 2001). Cornell University (January 3, 2000). With Moreno Distance Learning. Cornell Club of Eastern Florida, Delray Piccolotto, Sebastian Fernandez, Kavita Bala, and Beach, FL (December 6, 2000). Michael Malone. Great Ideas for Computer Science. Lecture, ComS 150, “Interactive Direct Lighting in Dynamic Scenes.” Program Computer Science, Cornell University (October 18, of Computer Graphics Technical Report, Cornell University 2000). (January 2, 2000). With Sebastian Fernandez, Kavita Technology & Design Practices. Real-time Workshop on Bala, and Moreno Piccolotto. Technology and Design Practice, Program of Computer Graphics, Cornell University (October 8, 2000). Tomorrow’s Internet and Design Software. Proceedings: Emerging Information Technologies for Facilities, NAS, FCC, Washington D.C. (October 20, 2000). How Do We Prepare Our Students for the Future? Archi- tecture Summer School: Architecture Department, Cornell University (July 12, 2000).

36 F

aculty and Senior Researcher Biographies Chairof the IEEE Technical Committee on Personal Com- Zygmunt J. Haas munications (TCPC). Associate Professor Vice-chair of the IEEE Technical Committee on Personal Member of the School of Electrical Communications (TCPC). and Computer Engineering and the Editorial Board of the journal Wireless Communications and Graduate Field of Computer Science Mobile Computing, John Wiley & Sons. [email protected] Guest Editor: Wireless Personal Communication Journal, spe- http://www.ee.cornell.edu/$\sim$haas/ cial issue on Multimedia Network Protocols and En- wnl.html abling Radio Technologies. Editorial Board: ACM/Baltzer Wireless Networks. Ph.D. Stanford University, 1988 Editorial Board: Journal of High Speed Networks. Program Committee: IEEE Symposium on Ad-hoc Wire- research is in the area of mobile and wireless sys- less Networks (SAWN), in conjunction with IEEE Mtems and networks. Selected examples of the projects GLOBECOM 2001, San Antonio, TX (November 25- that are conducted in my Wireless Network Laboratory 29, 2001). (WNL) are: ad-hoc networks (routing, medium access con- Program Committee member and session chair, Milcom’01, trol, security, etc.), quality of service, cross-layer protocol McLean, VA (October 28-31, 2001). design, mobile web access, multicasting, and mobility Committee member: Wireless Communications and Net- management. working Conference 2002 (WCNC’02), Orlando, FL (March 18-21, 2002). MEMBERSHIPS Program Committee: European Wireless 2002, Next Gen- Professional Societies: IEEE Communications Society; IEEE eration Wireless Networks: Technologies, Protocols, Vehicular Technology; Association for Computing Ma- Services and Applications, Florence, Italy (February chinery (ACM); Special Interest Group on Mobile 26-28, 2002). Communications (SIGMOBILE). Program Committee: 11th IEEE Workshop on Local and Metropolitan Area Networks, Boulder, CO (May 18, AWARDS/HONORS 2001). Michael Tien ’72 Award, Cornell College of Engineering, Program Committee: IEEE Wireless Networks and Mobile Excellence in Teaching Award (September, 2000). Computing Workshop, Phoenix, AZ (April 16-19, 2001). UNIVERSITY ACTIVITIES Program Committee: ACM/IEEE MobiCom’2000, Boston, Member, Ad-hoc Tenure Promotion Review Committee, MA (August 6-11, 2000). Computer Science Department, Cornell University; Program Committee: First IEEE Workshop on Mobile Ad Computing Policy Committee (CPC), College of En- HOC Networking and Computing Workshop gineering, Cornell University. (MobiHOC), Boston, MA (August 11-12, 2000). EE Policy Committee, School of Electrical and Computer NSF reviewer and panelist. Engineering, Cornell University (2000). Member of the Committee on “Bits On Our Minds 2001 LECTURES (BOOM ’01). Research in the Wireless Networks Laboratory at Cornell. Department of Electrical Engineering, Columbia Uni- PROFESSIONAL ACTIVITIES versity (April 23, 2001). Editorial Board: IEEE Transactions on Networking. Research in the Wireless Networks Laboratory at Cornell. Editorial Board: IEEE Communications Magazine. Communication Systems Department, Swiss Federal Organizer and chair of the session on “Outrageous Opin- Institute of Technology Lausanne (EPFL) (December ions” at MobiHoc ’01, The ACM Symposium on Mo- 11, 2000). bile Ad-hoc Networking & Computing, Long Beach, CA (October 4-5, 2001). PUBLICATIONS Member: IASTED (The International Association of Science “The Zone Routing Protocol: A Hybrid Framework for Rout- and Technology for Development) Technical Commit- ing in Ad-hoc Networks.” Ad-hoc Networks, Charlie tee on Telecommunication. Perkins, editor. Addison Wesley (2001). With M. R. Member:ACM Mobicom Steering Committee. Pearlman.

37 “A Communication Infrastructure for Smart Environments “The Dynamic Packet Reservation Multiple Access Scheme — A Position Article.” IEEE Personal Communications for Multimedia Traffic.” ACM/Baltzer Mobile Networks Magazine, special issue on “Networking the Physical Applications 4:87-99 (1999). With D. A. Dyson. World,” 6-10 (October , 2000). “Ad-hoc Location Management using Quorum Systems.” “Predictive Distance-based Mobility Management for PCS IEEE Transactions on Networking, ACM/IEEE Transac- Networks.” 2000 Cornell Summer Workshop on In- tions on Networking (April, 1999). And B. Liang. formation Theory (Bergerfest), Ithaca, NY (August 18- “The Multiply-detected Macrodiversity Scheme for Wire- 19, 2000). And B. Liang. less Cellular Systems.” IEEE Transactions on Vehicu- “On the Impact of Alternate Path Routing for Load Balanc- lar Technology 47(2) (May, 1998). And C-P. Li. ing in Mobile Ad-hoc Networks.” First Annual IEEE/ ACM Workshop on Mobile Ad-hoc Networking & NEW PATENT APPLICATIONS Computing, MobiHOC’2000, Boston, MA (August 11, “ITAMAR — Independent Tree Ad-hoc Multicast Routing.” 200). With M. R. Pearlman, P. Scholander, and S. S. Cornell Research Foundation, Application number: D- Tabrizi. 2823 — Haas. And M. S. Sajama. “A Decision-theoretic Approach to Resource Allocation in “COCA: A Secure Distributed On-line Certification Author- Wireless Multimedia Networks.” Fourth International ity.” Cornell Research Foundation, Application num- Workshop on Discrete Algorithms and Methods for ber: D-2732A — Haas. With F. Schneider, L. Zhou, Mobile Computing, DIALM 2000, Boston, MA (Au- and R. van Renesse. gust 11, 2000). And J. Y. Halpern, L. Li, and S. B. Wicker. “Adaptive Power Control in Wireless Ad-hoc Networks.” “Securing Ad-hoc Networks.” IEEE Network Magazine 13(6) Cornell Research Foundation, Application number: D- (November/December 1999) With L. Zhou. 2507 — Haas. And Miguel Sanchez. “Determining the Optimal Configuration for the Zone “Routing and Mobility Management Protocols for Ad-hoc Routing Protocol.” IEEE Journal on Selected Areas in Com- Networks.” Cornell Research Foundation, Application munications (JSAC), issue on Ad-hoc Networks number: D-2191 — Haas. 17(8):1395-1414 (August, 1999). And M. R. Pearlman.

tative notions of decision theory, (3) reasoning about se- Joseph Y. Halpern curity. Professor, and Co-director: Cognitive Studies Program HONORS Guggenheim Fellowship (for 2001-02). [email protected] Fulbright Fellowship (for 2001-02). http://www.cs.cornell.edu/home/ halpern/ UNIVERSITY ACTIVITIES Co-director: Cognitive Studies Program. Ph.D. Harvard University, 1981 Chair, Admissions Committee, Department of Computer Science.

y research is concerned with representing and rea- PROFESSIONAL ACTIVITIES Msoning about knowledge and uncertainty in multi- Fellow, American Association of Artificial Intelligence. agent systems. The work uses tools from logic (particularly Editor-in-chief: Journal of the ACM (as of May, 1997). modal logic and the idea of possible-worlds semantics), Consulting Editor: Chicago Journal of Computer Science. probability theory, distributed systems, , and Editorial board: Artificial Intelligence Journal; Information and AI, and I like to think that it contributes to our understand- Computation; Journal of Logic and Computation. ing of each of these areas as well. Member: ACM Publications Board. Some themes of my current research include: (1) ap- Chairman: ACM Preprint Repository. plying ideas of decision theory to constructing algorithms Coordinator: CoRR (Computing Research Repository). in asynchronous distributed systems, database systems, and Member: LICS (IEEE Conference on Logic in Computer Sci- wireless systems, (2) providing foundations for useful quali- ence) Advisory Board.

38 F

aculty and Senior Researcher Biographies President of Board of Directors: Corporation for Theoreti- “The Unusual Effectiveness of Logic in Computer Science.” cal Aspects of Reasoning About Knowledge. Bulletin of Symbolic Logic 7(2):213-236 (2001). With R. Program Chair, 16th Annual IEEE Symposium on Logic in Harper, N. Immerman, P. G. Kolaitis, M. Y. Vardi, and Computer Science (2001). V. Vianu. Program Committee Member and Conference Chair, 8th “Editorial: An Author’s Bill of Rights and Responsibilities.” Conference on Theoretical Aspects of Rationality Journal of the ACM 47(5):828-825 (2000). and Knowledge (2001). “CoRR: A Computing Research Repository (with commen- tary).” ACM Journal of Computer Documentation 24(2):41- LECTURES 48 (2000). A Computer Scientist Looks at Game Theory. —. Invited talk, Games 2000, Bilbao, Spain (July, 2000). LANDMARK PUBLICATIONS —.Invited talk, 4th Conference on Logic and Foundations Reasoning About Knowledge. MIT Press (1995). With R. Fagin, of Game and Decision Theory, Torino, Italy (July, 2000). Y. Moses, and M. Y. Vardi. Plausibility Measures and Default Reasoning. Amsterdam “Knowledge and Common Knowledge in a Distributed En- University (May, 2001). vironment.” Journal of the ACM 37(3):549-587 (1990). Plausibility Measures: a General Approach for Represent- With Y. Moses. Awarded Godel Prize in 1997. ing Uncertainty Northwestern University (May, 2001). “Belief, Awareness, and Limited Reasoning.” Artificial Intelli- Complexity, Logic, and Computation: A Symposium in gence 34:39-76 (1988). With R. Fagin. Conference version Honor of Albert Meyer , Boston, MA (June, 2001). winner of MIT Press Publisher’s Prize as best paper of the 9th International Joint Conference on Artificial In- PUBLICATIONS telligence (1985). “Axiomatizing Causal Reasoning.” Journal of AI Research “An Analysis of First-order Logics of Probability.” Artificial 12:317-337 (2000). Intelligence 46:311-350 (1990). Conference version win- “A Note on Knowledge-based Programs and Specifica- ner of Publisher’s Prize as best paper of the 11th Inter- tions.” Distributed Computing 13(3):145-153 (2000). national Joint Conference on Artificial Intelligence “First-order Conditional Logic Revisited.” ACM Transac- (1989). tions on Computational Logic 1(2):175-207 (2000). With “Plausibility Measures and Default Reasoning.” Proceed- N. Friedman and D. Koller. ings of the Thirteenth National Conference on Artifi- “Multi-agent Only Knowing.” Journal of Logic and Compu- cial Intelligence, 1297-1304 (1996). To appear in the tation 11(1):41-70 (2001). With G. Lakemeyer. Journal of the ACM . With N. Friedman. Commended “A Logic for SDSI’s Linked Local Named Spaces.” Journal of for its excellence by the Committee on the “IGPL/FoLLI Computer Security 9(1,2):47-74 (2001). With R. van der Prize for the Best Idea of the Year 1996.” Meyden. “A Decision-theoretic Approach to Reliable Message De- livery. Distributed Computing 14:1-16 (2001). With F. Chu. “A Decision-theoretic Approach to Resource Allocation in Wireless Multimedia Networks.” Proceedings of Dial M for Mobility, 86-95 (2000). With Z. Haas, L. Li, and S. B. Wicker. “Conditional Plausibility Measures and Bayesian Net- works.” Proceedings of the Sixteenth Conference on Uncertainty in AI, 247-255 (2000). “Minimum-energy Mobile Wireless Networks Revisited.” Proceedings of the IEEE Conference on Communica- tions (2001). With L. Li. “A Logical Reconstruction of SPKI.” Proceedings of the 14th IEEE Computer Security Foundations Workshop (2001). With R. van der Meyden. Professor Juris Hartmanis (on right), with former Ph.D. student: now U. of Toronto Computer Science Professor A.B. Borodin “Review of ‘Probability and Conditionals: Belief Revision and Rational Decisions.’” Journal of Philosophical Logic 100(2):277-281 (2000).

39 LECTURES Juris Hartmanis Goedel, Undecidability and Automata Theory, Half Cen- Walter R. Read Professor tury of Automata Theory. University of Western Ontario of Engineering (July 26, 2000). Turing Award Winner Four lectures at Jyvaskyle University, Finland, (August 10- 11, 2000). —. Undecidability and Incompleteness Results in Theory [email protected] of Computing Ph.D. California Institute of Technology, —. Succinctness and Minimality of Automata Description 1955 —. Search for Limits of Feasible Computations —. On the Complexity and Shape of Mathematical Proofs Computational Complexity and Mathematical Proofs, Univer- he strategic goal of my research is to contribute to sity of Saarbruecken, Germany (August 30, 2000). Tthe development of a comprehensive theory of com- What can Computational Complexity Theory Say about putational complexity. Computational complexity, the Mathematics? study of the quantitative laws that govern computation, is —. Iowa State University (October 23, 2000). an essential part of the science base needed to guide, har- —. Cray Lecture Series, University of Minnesota (October ness, and exploit the explosively growing computer tech- 30, 2000). nology. My current research interests focus on understand- ing the computational complexity of chaotic systems and PUBLICATIONS the classification of undecidable problems in complexity “Computational Complexity and Mathematical Proofs.” theory. Informatics— 10 Years Back, 10 Years Ahead.” Reinhard Wilhelm, editor. Springer-Verlag LNCS 2000, 251-256 AWARDS (2001). Recipient of the Grand Medal of the Latvian Academy of Sciences (Lielo Medalu) (2001).

PROFESSIONAL ACTIVITIES Member: National Academy of Engineering. Foreign Member: Latvian Academy of Sciences. Fellow: American Academy of Arts and Sciences; New York State Academy of Sciences; AAAS. Editor: Springer-Verlag Lecture Notes in Computer Science; Jour- nal of Computer and Systems Sciences; Fundamenta Informaticae. Advisory Board: EATCS Monographs in Theoretical Computer Science; Springer-Verlag; International Journal of Founda- tions of Computing. Member: DIMACS External Advisory Committee. Member: Santa Fe Institute Science Board. Member: Santa Fe Institute Science Steering Commit- tee. Member: University of Cincinnati Computing Program Review Committee (November 1-3, 2000).

UNIVERSITY ACTIVITIES Chair: Engineering College Nominating Committee. Member: FCI Founders Committee.

Professor Hartmanis with students at a Ph.D. picnic

40 F

aculty and Senior Researcher Biographies AWARDS/HONORS Mark Heinrich Michael Tien ’72 Excellence in Teaching Award (2000- Assistant Professor 2001). Member of the School of Electrical IEEE Teacher of the Year Award (1999-2000). and Computer Engineering and the NSF Faculty Early Career Development Award (2000-2004). Graduate Field of Computer Science UNIVERSITY ACTIVITIES [email protected] Member: Intelligent Information Systems Institute; ECE http://www.csl.cornell.edu/~heinrich/ Curriculum and Standards Committee; ECE Long-Range Ph.D., Stanford University, 1998 Recruiting Committee; ECE Experimental Systems Re- cruiting Committee; ECE Circuits & MEMS Recruiting Committee; CURIE Summer Program for Women in y research is concerned with the design of active Engineering; Fields of Electrical Engineering, Computer Mmemory and I/O systems for next-generation serv- Science. ers and data-intensive computing. This work has focused on extending the cache coherence mechanism in modern PROFESSIONAL ACTIVITIES servers to implement active memory operations—compu- Publicity Chair: International Symposium on High-perfor- tation performed in the memory system on behalf of the mance Computer Architecture (PCA) (January, 2001). microprocessor to speed up overall execution time. Panelist: Mathematics, Information, and Computational Coupled with this work is the exploration of the effect of Sciences Division within the Office of Advanced Sci- new networking technologies (i.e. InfiniBand) on next-gen- entific Computing Research in the Office of Science at eration servers and the integration of active memory and the U.S. Department of Energy (DOE) (April, 2001). I/O techniques with this networking technology. We have Program Committee: Workshop on Caching, Coherence, also shown that active memory machines and hardware and Consistency (WC3), held in conjunction with the cache-coherent distributed shared-memory (DSM) ma- ACM Conference on Supercomputing (June, 2001). chines need much the same support, and, in fact, that by Program Committee: International Conference on Paral- building our single-node active memory system we can also lel Architectures and Compilation Techniques (PACT) support a multiprocessor version of the machine that we (September, 2001). call active memory clusters. Active memory clusters can achieve hardware DSM performance at the low cost of clus- LECTURES ters. Flash Forward: Better, Faster, Cooler. Cornell University In my work on Active I/O systems I am developing a Silicon Valley Event, hosted by Hunter Rawlings, San smart InfiniBand switch (which can also be used in ac- Mateo, CA (April, 2001). tive memory clusters) that can support either normal or Providing Hardware DSM Performance at Software DSM intelligent I/O devices, and offload computation from the Cost. Seminar, University of Rochester (April, 2001). microprocessor to minimize latency and reduce band- Hardware DSM Performance at Software DSM Cost. Air width requirements in the I/O system. This work also in- Force Research Laboratory, Rome, NY (March, 2001). volves innovative operating system restructuring, includ- A Case for Asynchronous Active Memories. ISCA Workshop ing the filesystem and the network stack. The operating on Solving the Memory Wall (June, 2000). system in active I/O systems must be partitioned between the microprocessor and the active I/O devices. Our own PUBLICATIONS operating system, SplitOS, is joint work between our re- “FLASH vs. (Simulated) FLASH: Closing the Simulation search group and groups at Rutgers and Princeton. Loop.” In Proceedings of the 9th International Con- In work on scalable cache coherence protocols, I am ference on Architectural Support for Programming Lan- working on issues of fairness and robustness in scalable guages and Operating Systems (ASPLOS), 49-58 (No- distributed shared-memory (DSM) machines. In addition, vember, 2000). With J. Gibson, R. Kunz, D. Ofelt, M. I am looking at the quantitative impact of many coherence Horowitz, and J. Hennessy. protocol techniques by evaluating each technique on a flex- “Using Meta-level Compilation to Check FLASH Protocol ible DSM prototype. Together with Martin Burtscher, I am Code.” In Proceedings of the 9th International Con- also exploring predictive techniques in cache coherence ference on Architectural Support for Programming Lan- protocols to minimize latency. guages and Operating Systems (ASPLOS), 59-70 (No-

41 ings of the ISCA Workshop on Solving the Memory vember, 2000). With A. Chou, B. Chelf, and D. Engler. Wall (June, 2000). With R. Manohar. “A Case for Asynchronous Active Memories.” In Proceed-

Sheila S. Hemami AWARDS/HONORS Associate Professor HKN C. Holmes MacDonald Outstanding Teaching Award. Member of the School of Electrical Michael Tien ’72 Cornell College of Engineering Teaching and Computer Engineering and the Award. Graduate Field of Computer Science Fulbright Distinguished Lecturer, State of Morocco (2001). [email protected] PUBLICATIONS http://www.ece.cornell.edu/people/ “Perceptual Quantization for Wavelet-based Image Cod- faculty/faculty_list.shtml#shei ing.” Proc. IEEE Int. Conf. on Image Processing, Ph.D. Stanford University, 1994 Vancouver, B.C. (September, 2000). With M. G. Ramos. “Subjective Quality Evaluation of Low Bit Rate Video.” Proc. Human Vision and Electronic Imaging 2001, San Jose, he emerging information superhighway provides an CA (January, 2001). With M. A. Masry, W. Osberger, example of the flexibility required of image and video T and A. M. Rohaly. compression and transmission techniques. Varying network “Generalized Rate-distortion Optimizations for Motion- capacities, differences in viewing devices, and a broad spec- compensated Video Coding.” IEEE Trans. Circuits & trum of user needs suggest the desirability of coding tech- Systems for Video Tech. (September, 2000). With Yan niques that can efficiently span large quality and band- Yang. width ranges. Additionally, coded data must be robust to “Perceptually-based Robust Image Transmission over Wire- errors and loss of varying degrees across multiple network less Channels.” Proc. IEEE Int. Conf. on Image Pro- segments. For practicality, algorithms must be inexpensive cessing, Vancouver, B.C. (September, 2000). With M. to implement, in either hardware or software. My research E. Buckley, M. G. Ramos, and S. B. Wicker. interests broadly concern such communication of visual “Robust Data Hiding using Psychovisual Thresholding.” information. Particular topics of interest include multirate Proc. IEEE Int. Conf. on Image Processing, Vancouver, video coding and transmission, compression specific to BC, Canada (September, 2000). With M. A. Masry, and packet networks and other lossy networks, and psychovisual M. G. Ramos. considerations.

UNIVERSITY ACTIVITIES College of Engineering Committee of Faculty Women. Society of Women Engineers Faculty Advisor. EE Curriculum and Standards Committee. Peoplesoft Lab Oversight Committee. EE General Recruiting Committee. Summer presentation to students in “Inventing an Informa- tion Society” (July, 2000).

PROFESSIONAL ACTIVITIES Reviewer, IEEE Trans. Signal Processing; IEEE Trans. Image Processing, IEEE Trans. Circuits and Systems for Video Tech- nology; IEEE Communications Letters; IEEE ICIP 2001. Associate Editor, IEEE Trans. Signal Processing.

Professors Claire Cardie and Gregory Morrisett

42 F

aculty and Senior Researcher Biographies John E. Hopcroft the Cornell faculty, was named professor in 1972 and served Joseph Silbert Dean of Engineering as chairman of the Department of Computer Science from Turing Award Winner 1987 to 1992. I am an undergraduate alumnus of Seattle Professor University, and was honored with a Doctor of Humanities Degree, Honoris Causa, in 1990.

[email protected] PROFESSIONAL ACTIVITIES www.cs.cornell.edu/annual_report/99- National Academy of Engineering. 00/hopcroft.htm Scientific Advisory Committee for The David and Lucile Ph.D. Stanford University, 1964 Packard Foundation; John Von Neumann Medal Selection Committee for the Institute of Electrical and Electronics Engineers, Inc. ince January 1994, I have been the Joseph Silbert (IEEE); SDean of the College of Engineering. Upon completion School of Engineering Advisory Committee, Hong Kong of my term as dean, which ends on June 30, 2001, I plan to University of Science and Technology; return to research in the Department of Computer Science National Advisory Committee on Informatics Engineering, at Cornell. My research will center on the study of infor- National College of Industrial Relations (Ireland). mation capture and access. I have also been involved in Fellow: American Academy of Arts and Sciences; American the theoretical aspects of computing, especially analysis of Academy for the Advancement of Science; Institute of algorithms, formal languages, automata theory, and graph Electrical and Electronics Engineers (IEEE); (Charter) algorithms. I have coauthored four books on formal lan- ACM. guages and algorithms with Jeffrey D. Ullman and Alfred Associate Editor (and Editor): Journal of Computer and Sys- V. Aho. tem Sciences. I was formerly the associate dean for college affairs Editor (and Member, Executive Committee): Algorithmica. and the Joseph C. Ford Professor of Computer Science. Af- Associate Editor: Information Sciences. ter receiving an M.S. (1962) and Ph.D. (1964) in electrical Editor: International Journal of Computational Geometry and engineering from Stanford University, I spent three years Applications. on the faculty of Princeton University. In 1967, I joined

number of shapes and facility location. I have investigated Klara Kedem the minimum Hausdorff distance as a tool for measuring Professor shape resemblance between images. Many practical problems in the area of shape compari- [email protected] son seek a fully automated solution. The robustness of the http://www.cs.cornell.edu/kedem minimum Hausdorff distance lends itself to such problems. Ph.D. Tel Aviv University, 1989 In the last two years I have looked into shape comparison problems in three dimensions. Such problems arise in many life-science disciplines. In computational molecular biology I have come up with a new metric, the URMS, to measure substructure resemblance between proteins. This measure has been implemented and further applied to the analysis y research area is Computational Geometry with of molecular dynamics. It proves superior to previously used Mapplications to problems in computer vision and bio- measures. With the department of life sciences at Ben Gurion information. The attempt to deal with practical problems University, I have been looking at dendrite shape compari- (like shape comparison) by investigating their geometric son and classification. Here we applied a three dimensional nature, yields a better theoretical understanding of the prob- Hausdorff distance for the problem and are in the midst of lems and provides sound and efficient algorithms. Among devising new measures. the theoretical problems I work on are problems in geomet- ric optimization, such as covering a set of points by a given

43 PROFESSIONAL ACTIVITIES GRANTS: Chair of the Computer Science Department, Ben-Gurion LSRT Consortium, “Optimal Layout Design of Large Scale University of the Negev, Israel. Satellite Telephony Systems in Rural Regions” (2000- Editorial board: Pattern Recognition Society Journal. 2001). Guest editor of Computational Geometry: Theory and Applica- Israeli Defense Ministry, “BGU Bioinformatics Center for the tions. Interpretation of the Human Genome” (2001-2002). Workshop program committee: Workshop on Algorithmic Engineering (WAE 01) BRICS, University of Aarhus, PUBLICATIONS Denmark (August 28-31, 2001). “Optimal Facility Location under Various Distance Func- Reviewer: Israeli-U.S. Bi-national Science Foundation; The tions.” Accepted for publication in International Journal Academia – Ministry of Science, Israel; Pattern Recogni- of Computational Geometry and Applications. With S. tion Journal; International Journal of Computational Geom- Bespametnik, M. Segal and A. Tamir. etry and Applications. “Improved Algorithms for Placing Undesirable Facilities.” Accepted for publication in Computers and Operations Research. With M. J. Katz, and M. Segal.

techniques for approaching problems in this area; in par- Jon Kleinberg ticular, balancing constraints imposed by many individu- Associate Professor als leads to a range of interesting new problems. With Christos Papadimitriou and Prabhakar Raghavan, I have [email protected] been studying an optimization-based framework for clus- http://www.cs.cornell.edu/ tering and data mining in which one has access to data home/kleinber/ from a large population; we consider the extent to which Ph.D. MIT, 1996. designing effective algorithms can be balanced with con- cerns about the privacy of each individual’s data. With Amit Kumar, I have been looking at resource allocation prob- lems with multiple users; since each user wants as much of y research is concerned with algorithms that ex- the resource as possible, there are many competing objec- Mploit the combinatorial structure of networks and tives, and it is natural to seek the ‘fairest’ solution. information. Finally, many of the core problems in computational The information we deal with is taking on an increas- biology require algorithms for analysis of large volumes of ingly networked structure; the World Wide Web serves as data; such data is being generated at an accelerating pace perhaps the most compelling example of this phenom- by experimental studies of genomes and proteins across a enon. One direction I have pursued, motivated by this is- wide range of species. With Debra Goldberg, Susan sue, is the development of algorithms that analyze the link McCouch, and David Liben-Nowell, I have been investi- structure of the Web to identify high-quality information gating mathematical and computational approaches to the resources — hubs and authorities relevant to broad topics. analysis of evolutionary relationships among species at the A second direction is the development of graph models genomic level and the connection between this type of that can provide insight into the structure of large networks. analysis and the problem of comparative mapping. I have I have been studying an algorithmic framework in which also developed algorithms for relating sequence informa- to frame questions about certain ‘small-world’ properties tion to protein structure, and with Ron Elber I am continu- of networks; and with Duncan Callaway, John Hopcroft, ing to look at approaches to this issue based on threading Mark Newman, and Steve Strogatz, I have recently looked methods. at models of random graphs that evolve over time. A third line of research has been concerned with designing algo- AWARDS rithms that facilitate the rapid spread of information in a National Academy of Sciences Award for Initiatives in Re- network; with David Kempe and Al Demers, I have worked search (2001). on the design of randomized ‘gossip’ protocols that pro- David and Lucile Packard Foundation Fellowship (1999- vide efficient, decentralized mechanisms for such tasks. 2004). Discrete optimization provides a collection of powerful ONR Young Investigator Award (1999-2002).

44 F

aculty and Senior Researcher Biographies NSF Faculty Early Career Development Award(1997-2001). ACM Symposium on Theory of Computing (2001).With Alfred P. Sloan Research Fellowship (1997-1999). A. Gupta, A. Kumar, R. Rastogi, and B. Yener. “On the Value of Private Information.” Proc. 8th Conf. on UNIVERSITY ACTIVITIES Theoretical Aspects of Rationality and Knowledge Member: Cornell Faculty of Computing and Information (2001). With C. Papadimitriou, and P. Raghavan. (FCI) Founders. “Adversarial Queuing Theory.” Journal of the ACM 48(1):13- 38 (2001). With A. Borodin, P. Raghavan, M. Sudan, PROFESSIONAL ACTIVITIES and D. Williamson. Member: National Academies Computer Science and Tele- “Universal-stability Results and Performance Bounds for communications Board study on Fundamentals of Greedy Contention-resolution Protocols.” Journal of the Computer Science. ACM 48(1):39-69 (2001). With D. M. Andrews, B. Program Committees: IEEE Symposium on Foundations Awerbuch, A. Fernandez, F. T. Leighton, and Z. Liu. of Computer Science, 2001; International World Wide “Navigation in a Small World.” Nature 406:845 (2000). Web Conference (2001); ACM International Confer- “Detecting a Network Failure.” Proc. 41st IEEE Symposium ence on Knowledge Discovery and Data Mining on Foundations of Computer Science, 231-239 (2000). (2001); Workshop on Algorithms and Data Structures “Fairness Measures for Resource Allocation.” Proc. 41st IEEE (2001); Workshop on Randomization and Approxi- Symposium on Foundations of Computer Science, 75- mation Techniques in Computer Science (2001). 85 (2000). With A. Kumar. Lecturer: Lipari Summer School on On-line Algorithms “Algorithms for Constructing Comparative Maps.” Compara- (2000). tive Genomics: Empirical and Analytical Approaches to Gene NSF Review Panel member. Order Dynamics, Map Alignment and the Evolution of Gene Families (David Sankoff and Joseph H. Nadeau, edi- LECTURES tors), 243-261 (2000). With D. Goldberg and S. Information Networks: Models and Algorithms. McCouch. —. America Online (December, 2000). “The Syntenic Diameter of the Space of N-chromosome —. Packard Fellowship Annual Meeting (September, Genomes.” Comparative Genomics: Empirical and Ana- 2000). lytical Approaches to Gene Order Dynamics, Map Align- —. Santa Fe Institute Workshop on Complex Interac- ment and the Evolution of Gene Families (David Sankoff tive Networks (August, 2000). and Joseph H. Nadeau, editors), 185-198 (2000). With Small-World Phenomena and the Dynamics of Infor- D. Liben-Nowell. mation. “Allocating Bandwidth for Bursty Connections.” SIAM J. —. Workshop in Honor of Allan Borodin’s 60th Birth- Computing 30(1):191-217 (2000). With Y. Rabani, and day (June, 2001). E. Tardos. —. Snowbird Learning Workshop (April, 2001). “Node-disjoint Paths on the Mesh, and a New Trade-off in Structure and Content in World-Wide Web Search. In- VLSI Layout.” SIAM J. Computing 29(4):1321-1333 vited plenary lecture at the Meeting of the North (2000). With A. Aggarwal, and D. Williamson. American Chapter of the Association for Computa- “Approximation Algorithms for Classification Problems tional Linguistics (June, 2001). with Pairwise Relationships: Metric Labeling and Detecting a Network Failure. IEEE Symposium on Foun- Markov Random Fields.” Proc. 40th IEEE Symposium dations of Computer Science (November, 2000). on Foundations of Computer Science, 14-23 (1999). On-Line Algorithms for Routing and Search. Lipari Sum- With E. Tardos. mer School (July, 2000). “Efficient Algorithms for Protein Sequence Design and the Analysis of Certain Evolutionary Fitness Landscapes.” PUBLICATIONS Journal of Computational Biology 6(3-4):387-404 (1999). “Spatial Gossip and Resource Location Protocols.” Proc. “Authoritative Sources in a Hyperlinked Environment.” 33rd ACM Symposium on Theory of Computing Journal of the ACM 46(5): 604-632 (September ,1999). (2001). With D. Kempe and A. Demers. “Provisioning a Virtual Private Network: A Network De- sign Problem for Multicommodity Flow.” Proc. 33rd

45 Supervisory Board: Centre for Basic Research in Computer Dexter Kozen Science (BRICS), Aarhus University; Goedel Prize Com- Joseph Newton Pew, Jr. mittee. Professor of Engineering LECTURES [email protected] Language-based Security. Department of Computer Science, http://www.cs.cornell.edu/kozen/ Dartmouth College, Hanover, NH (March, 2000). Ph.D. Cornell University, 1977 On the Completeness of Propositional Hoare Logic. RelMiCS 5 Conference, Quebec City, Canada (Janu- ary, 2000). A Computer Scientist’s View of Admissible Sets. Tarski Cen- tenary Conference, Warsaw, Poland (May, 2001). y research interests include the theory of compu- Mtational complexity, especially complexity of deci- PUBLICATIONS sion problems in logic and algebra, program logic and se- “Certification of Compiler Optimizations using Kleene Al- mantics, and computational algebra. Recent work includes gebra with Tests.” In Proc. 1st Int. Conf. Computational new polynomial-time algorithms for type inference in type Logic (CL2000), v. 1861 of Lecture Notes in Artificial systems with subtypes and recursive types; algorithms solv- Intelligence, J. Lloyd, V. Dahl, U. Furbach, M. Kerber, ing systems of set constraints as used in program analysis; K.-K. Lau, C. Palamidessi, L. M. Pereira, Y. Sagiv, and P. a unification algorithm for set constraints and a new con- J. Stuckey, editors, London, Springer-Verlag , 568-582 straint logic programming language based on set con- (July 2000). straints; development of the theory of rational spaces and “On the Completeness of Propositional Hoare Logic.” Proc. their relationship to set constraints; an algorithm for de- of the 5th International Seminar Relational Methods in Com- composition of algebraic functions; a new polynomial-time puter Science (RelMiCS 2000), 195–202 (January, 2000). algorithm for resolution of singularities of plane curves; With J. Tiuryn. efficient algorithms for optimal transmission of encoded “On Hoare Logic and Kleene Algebra with Tests.” Trans. video data; optimality results for digital interleavers; and Computational Logic 1(1):60-76 (July, 2000). expressiveness, complexity and completeness results for “A Note on the Complexity of Propositional Hoare Logic.” Kleene algebras with tests. Recently I have begun to investi- Trans. Computational Logic 1(1):171-174 (July, 2000). gate algorithms for efficient code certification and the ap- With E. Cohen. plication of Kleene algebra with tests to the verification of Dynamic Logic. MIT Press, Cambridge, MA (2000). With D. compiler optimizations. Harel and J. Tiuryn. “Myhill-Nerode Relations on Automatic Systems and the HONORS Completeness of Kleene Algebra.” In Proc. 18th Symp. Class of 1960 Scholar, Williams College. Theoretical Aspects of Computer Science, A. Ferreira and Stephen and Margery Russell Distinguished Teaching H. Reichel, editors. Dresden, Germany (February, Award, College of Arts and Sciences, Cornell. 2001). Lecture Notes in Computer Science, v. 2010, Springer-Verlag, 27-38. UNIVERSITY ACTIVITIES “Intuitionistic Linear Logic and Partial Correctness.” Proc. Member: Undergraduate Admissions Committee, College 16th Symp. Logic in Computer Science. IEEE (June, 2001) of Engineering; University Arbitration Panel. With J. Tiuryn. Faculty Advisor: Cornell Men’s Rugby Football Club; Johnson Graduate School of Management Rugby Foot- ball Club; Cornell Women’s Rugby Football Club.

PROFESSIONAL ACTIVITIES Program Committee Member: Foundations of Software Science and Computation Structure; Mathematical Foundations of Computer Science. Editorial Board Member: Journal of Relational Methods in Computer Science; Theory of Computing Systems.

46 F

aculty and Senior Researcher Biographies mad research project (http://www.nomad.cornell.edu), I Dean Krafft have been leading a campus-wide pilot of megabit-speed Senior Research Associate wireless LAN technology. This will be rolled out by Cornell Director of Computing Facilities Information Technologies as a Cornell campus service in the fall 2001. [email protected] On the research side, I am part of the Cornell Digital http://www.cs.cornell.edu/home/dean/ Libraries Research Group (CDLRG - http://www.cs.cornell.edu/ Ph.D. Cornell University, 1981 cdlrg). A major focus of our effort is on interoperability is- sues for digital libraries. As part of that broader thrust, I am a Co-principal Investigator on the NSF-funded National Science Digital Library Project at Cornell (http:// www.SiteForScience.org). My own particular interests focus serve both as a researcher and an adminis- on ensuring the availability in the digital world of pre-digi- Itrator in the Department of Computer Science at tal published and manuscript materials, as well as related Cornell. In my guise as an administrator, I manage the Com- issues on copyright, the public domain, and public access to puting Facilities Support group and worry about a num- older and out-of-print materials. ber of issues including computer security, networking, and building web services. Most recently, as part of the No-

munication systems and uncovered minor design errors that Christoph Kreitz would otherwise have made their way into the implemen- Senior Research Associate tation. I am also interested in the development of automatic [email protected] proof procedures for classical and non-classical logics. To- http://www.cs.cornell.edu/home/ gether with former students from the Technical University kreitz of Darmstadt, I work on proof search methods based on Ph.D FernUniversitaet Hagen, 1984 matrix-characterizations of logical validity, a very compact representation of the search space. We have developed a uniform proof search procedure for classical logic, intuitionistic logic, various modal logics, fragments of lin- ear logic, and for inductive specification proofs. We have y primary research interest is the application of also developed a uniform algorithm for transforming the Mautomated deduction to the design, verification, and machine-found matrix proofs into sequent proofs. In the optimization of software systems. My current research aims past year, we implemented JProver, a first-order at developing a Logical Programming Environment for the intuitionistic theorem prover that creates sequent-style construction of reliable and efficient distributed systems. proof objects, and connected it as external proof engine to In collaboration with the Nuprl and Ensemble research the interactive proof assistants Nuprl and MetaPRL. The groups, I have built semantics-based tools for the auto- combination of these systems gives a user the full expres- matic optimization of protocol stacks in the Ensemble sive power of the proof assistant when dealing with com- group communication system. More recently, Robbert van plex proofs and verifications, while at the same time tak- Renesse, Mark Bickford and I have developed a generic ing advantage of well-understood and efficient proof tech- switching protocol for the construction of adaptive systems niques for subproblems that only depend on first-order and proved it correct with the Nuprl proof development reasoning. system. For this purpose, we introduced the concept of meta- properties and used them to characterize communication PROFESSIONAL ACTIVITIES properties that can be preserved by switching. We also iden- Program Commitee: IJCAR Workshop on Verification tified switching invariants that an implementation of the (2001). switching protocol must satisfy in order to work correctly. Referee: Handbook of Automated Reasoning; Journal of Sym- The verification efforts revealed a variety of implicit as- bolic Computation; Journal of Functional Programming. sumptions that are usually made when designing com-

47 LECTURES PUBLICATIONS The NuPRL Open Logical Environment. Scottish Theorem “J. Prover: Integrating Connection-based Theorem Prov- Proving Meeting, St. Andrews, Scotland (July, 2000). ing into Interactive Proof Assistants.” Proc. Interna- Matrix-based Inductive Theorem Proving, International tional Joint Conference on Automated Reasoning, Conference TABLEAUX-2000, St. Andrews, Scotland LNAI, Springer (June 2001). With S. Schmitt, L. Lorigo, (July, 2000). and A. Nogin. Building Reliable, High-performance Communication Sys- “An Experiment in Formal Design using Meta-properties.” tems from Components. Technical University of Proc. DARPA Information Survivability Conference Darmstadt, Germany (July, 2000). and Exposition II (DISCEX 2001), IEEE Computer A Logical Programming Environment for Communication Society Press (June 2001). With M. Bickford, R. van Systems. University of Potsdam, Germany (December, Renesse, and R. Constable. 2000). “Protocol Switching: Exploiting Meta-properties.” Proc. In- Protocol Optimization in Ensemble/Spinglass. DARPA FTN ternational Workshop on Applied Reliable Group PI Meeting, St. Petersburgh, (January, 2001). Communication (WARGC 2001), IEEE Computer So- Advances in Logical Programming Environments. DARPA ciety Press (April 2001). With X. Liu, R. van Renesse, PCES PI meeting, San Diego (February, 2001). M. Bickford, and R. Constable. An Open Logical Programming Environment,.DARPA “A Uniform Procedure for Converting Matrix Proofs into PCES PI meeting, St. Louis (May, 2001). Sequent-style Systems.” Journal of Information and Com- Formal Design of Reliable Software Systems. DARPA In- putation 162 (1-2):226-254 (2000). With S. Schmitt. formation Survivability Conference and Exposition II, “Matrix-based Inductive Theorem Proving.” Proc. Interna- Anaheim (June, 2001). tional Conference TABLEAUX-2000, LNAI 1847, Formal Design and Verification: Challenges and Prospects. Springer (July 2000). With B. Pientka. Invited talk, workshop on verification, International Joint Conference on Automated Reasoning, Siena, Italy (June, 2001).

Within this context we examine a number of research Carl Lagoze areas: Digital Library Scientist Architectures for storage of and access to the multiple forms of digital content. [email protected] Policies and enforcement mechanisms that facilitate the http://www.cs.cornell.edu/lagoze/ preservation and secure management of distributed lagoze.html content. MSE Wang Institute The role of metadata, in its many forms, in the manage- ment of digital content. Protocols for federating information across distributed repositories and services. Architectures and services for interlinking amongst docu- ur group investigates the policies, organization, ment references and citations. Oand architecture of distributed information spaces. The Web, and the massive amount of content that it makes We work in close collaboration with other researchers in available to us in our daily lives, provides the backdrop for the Cornell, national and international library, computer our work. The goal of our research is to understand and science, and Internet communities. Our research model is prototype the services and organizational structures that highly applied: building standards and systems and sup- we can build on top of this global information base in or- porting the deployment of them to our collaborators in der to increase its functionality, integrity, and ease of use. the global information community. This research model We undertake this research with the recognition that any has produced Dienst, an architecture and protocol for cre- proposed solutions must balance the economy and speed ating distributed document repositories and services, the of automated solutions against the often-irreplaceable ex- Open Archives Initiative Metadata Harvesting Protocol that pertise that comes from human intervention. provides access to metadata in a variety of forms, and the

48 Program Committee: Third Conference on Recent Ad- Conference on Research and Development in Infor- vances in Natural Language Processing (RANLP) mation Retrieval (SIGIR) (2001). With Rie Kubota (2001). Ando. Co-organizer: Text Learning: Beyond Supervision, a work- “On the Effectiveness of the Skew Divergence for Statisti- shop at the Seventeenth International Joint Confer- cal Language Analysis.” Proceedings Artificial Intelli- ence on Artificial Intelligence (IJCAI). gence and Statistics (2001). Invited Participant: Institute for Mathematics and its Ap- “Mostly-unsupervised Statistical Segmentation of Japanese: plications (IMA) Workshop on Mathematical Foun- Applications to Kanji.” Proceedings First Conference dations of Natural Language Modeling (2000). of the North American Chapter of the Association for Member: NSF review panel. Computational Linguistics (NAACL) (2000). With Rie Technical coordinator: joint study agreement between Kubota Ando. Cornell University and IBM Watson on text mining “Measures of Distributional Similarity.” Proceedings 37th and document management, 1999-present. Annual Meeting of the Association for Computational Affiliated faculty: Intelligent Information Systems Institute. Linguistics (ACL) (1999). Referee: ACM Transactions on Information Systems. “Similarity-based Models of Word Co-occurrence Probabili- ties.” Machine Learning 34 (1999). With Ido Dagan, UNIVERSITY ACTIVITIES and Fernando Pereira. Department of Computer Science liaison to the Depart- “Fast Context-free Parsing Requires Fast Boolean Matrix ment of Linguistics. Multiplication.” Proceedings 35th Annual Meeting of Member: Women in Science and Engineering Advisory the Association for Computational Linguistics and 8th Group. Conference of the European Chapter of the Associa- Member: Women in Science and Engineering Term Chair tion for Computational Linguistics (ACL/EACL) Award committee. (1997). Reader: Arts and Sciences Undergraduate Admissions. “Distributional Clustering of English Words.” Proceedings Member: Field of cognitive studies. 31st Annual Meeting of the Association for Computa- Affiliated faculty: Cornell Information Science program. tional Linguistics (ACL)(1993). With Fernando Pereira and Naftali Tishby. LECTURES Distributional Similarity: Models and Methods. Carnegie Mellon University (August, 2000). Weakly-supervised Statistical Segmentation of Japanese. WhizBang! Labs (August, 2000). Natural Language Technology (three-hour tutorial). Rome Air Force Lab, Knowledge Representation and Reason- ing series (October, 2000). Applications of EM Techniques. Institute for Mathematics and its Applications workshop on Mathematical Foun- dations of Natural Language Modeling (November, 2000). On the Effectiveness of the Skew Divergence for Statistical Language Analysis. Eighth Meeting of Artificial Intelli- gence and Statistics (January, 2001). Distributional Similarity and the Skew Divergence. High- land Technologies (April, 2001). The Iterative Residual Rescaling Algorithm: An Analysis and Generalization of Latent Semantic Indexing. —. University of Maryland (April, 2001). —. Columbia University (May, 2001). PUBLICATIONS “Iterative Residual Rescaling: An Analysis and Generaliza- tion of LSI.” Proceedings24th Annual International Professor Graeme Bailey

50 F

aculty and Senior Researcher Biographies is expensive and inexact. These problems arise from Yuying Li many financial application problems. Senior Research Associate LECTURES Lung Nodule Segmentation Using Optimization. The [email protected] Workshop on Mathematics in Image Processing 2000, http://www.cs.cornell.edu/home/ The University of Hong Kong (December 14-16, 2000). yuying/yuying.html Reconstructing the Unknown Local Volatility Function. A Ph.D. Waterloo University, 1988 special session of mathematics/optimization for fi- nance at Optimization 2001, Aveiro, Portugal (July 23- 25, 2001).

y general research interests include numerical op- PUBLICATIONS Mtimization and scientific computation. In addi- “A Trust Region and Affine Scaling Interior Point Method tion, I am interested in the application of optimization for Nonconvex Minimization with Linear Inequality methods to medical, engineering, and financial prob- Constraints.” Mathematical Programming Series A, lems. 88(1):1-32 (2000). My current interests focus on solving nonlinear con- strained problems for which the gradient computation

Rajit Manohar J. Martin, I developed a simple, distributed implementa- tion of an algorithm that implements precise exceptions Assistant Professor in asynchronous processors, along with a proof of its cor- Member of the School of Electrical rectness using program transformations. An instance of this and Computer Engineering and the mechanism was used in the design of an asynchronous Graduate Field of Computer Science MIPS processor. [email protected] http://vlsi.cornell.edu/~rajit/ AWARDS/HONORS Ph.D., California Institute of Technology, Sonny Yau ’72 Excellence in Teaching Award (2001). 1998 IEEE Teacher of the Year Award (2001). NSF Faculty Early Career Development Award (2000-2004). Tau Beta Pi and Cornell Society of Engineers Excellence y research is concerned with the design of efficient in Teaching Award (2000). Masynchronous computation structures in VLSI and the use of formal methods to guarantee the correctness of UNIVERSITY ACTIVITIES such structures. Member: Graduate Admissions Committee. In work on formal methods, I have developed a new Member: Fields of Electrical Engineering; Computer Sci- way to analyze the correctness of a class of program trans- ence; Applied Math. formations commonly used in asynchronous VLSI synthe- sis. The technique “decompiles” the circuit into a higher PROFESSIONAL ACTIVITIES level programming language, and provides high-level in- Program Committee : IEEE/ACM Symposium on Advanced formation about the effect of applying the transformation. Research in Asynchronous Circuits and Systems The amount of power required by a processor is quickly (March, 2001). becoming a design constraint. In work on energy-efficient Workgroup Organizer: NSF Workshop on Neuromorphic computation, I have developed a new adaptive number Engineering (July, 2000). representation that significantly reduces the amount of energy required during instruction execution in a general- LECTURES purpose processor. Width-adaptive Data Word Architectures. 2001 Conference The presence of precise exceptions in a processor can on Advanced Research in VLSI (March, 2001). complicate its design. In work with Mika Nystrom and Alain

51 An Analysis of Reshuffled Handshaking Expansions. IEEE/ “Precise Exceptions in Asynchronous Processors.” Proc. ACM Symposium on Asynchronous Circuits and Sys- 19th Conference on Advanced Research in VLSI,16- tems (March, 2001). 28 (2001). With Mika Nystrom, and Alain J. Martin. Low Energy Adaptive Processors. Computer Science Col- “An Analysis of Reshuffled Handshaking Expansions.” Proc. loquium, Cornell University, Ithaca NY (October, 7th IEEE/ACM Symposium on Asynchronous Circuits 2000). and Systems, 96-105 (2001). A Case for Asynchronous Computer Architecture. ISCA “A Case for Asynchronous Computer Architecture.” Proc. Workshop on Complexity-effective Design (June, ISCA Workshop on Complexity-effective Design 2000). (2000). “A Case for Asynchronous Active Memories.” Proc. ISCA PUBLICATIONS Workshop on Solving the Memory Wall (2000). With “Width-adaptive Data Word Architectures.” Proc. 19th Con- Mark Heinrich. ference on Advanced Research in VLSI,112-129 (2001).

with types and logics to support a wider class of important Greg Morrisett security properties. Associate Professor Another interest is in language, compiler, and runtime support for application-specific memory management. Though standard garbage collection techniques provide a [email protected] safe and convenient programming model, many systems http://www.cs.cornell.edu/home/jgm/ applications cannot tolerate the overheads introduced by Ph.D. Carnegie Mellon University, 1995 a general-purpose collector. My research here focuses on a range of topics from fast conservative garbage collectors to advanced type systems for region-based memory manage- ment, to generalizations of linear type systems. The goal in all of this work is to provide the programmer with more y research interests are in the design, semantics, control over memory management without sacrificing Mand implementation of programming languages. I safety. am particularly interested in exploring how language tech- My other recent interests are in run-time code genera- nology can be used to build reliable, secure, and high-per- tion and modal type systems, efficient data representation, formance systems software. The unifying thread for all my and rich forms of polymorphism. Many of these issues are research is the application of advanced semantic constructs being explored in the context of Cyclone, a next-genera- in real-world applications. tion systems language that is being developed jointly be- Recently, I have concentrated on type systems and log- tween researchers at Cornell and AT&T Laboratories. ics for enforcing security properties in low-level code. One byproduct of this research is the design of a type system AWARDS called TAL (Typed Assembly Language) for the Intel x86 Allen Newell Medal for Research Excellence (2001). architecture and a suite of tools that can efficiently type Ralph Watts Excellence in Teaching Award (2001). check binary code. The TAL type system is sufficiently ex- Presidential Early Career Award for Scientists and Engineers pressive that we can efficiently compile a variety of high- (2000). level safe languages, such as ML, Scheme, Safe-C, and Java, NSF Faculty Early Career Development Award (1999). to type-correct assembly code. This technology provides a Sloan Fellow (1998). means to safely extend systems such as kernels, web brows- ers, or hand-helds without the overheads of a virtual ma- UNIVERSITY ACTIVITIES chine or just-in-time compiler. Recent work on TAL includes Ph.D. admissions committee (1998-2000). extending the type system to provide enforcement of other ECE hiring committee (2000). security policies, such as resource constraints, that are out- side the scope of traditional type systems. I am also study- PROFESSIONAL ACTIVITIES ing how other language technologies, such as binary re- Editor: Journal of Functional Programming. writing and inlined reference monitors, can be combined

52 F

aculty and Senior Researcher Biographies Associate Editor: ACM Transactions on Programming Languages “Typed Memory Management via Static Capabilities.” and Systems. Transactions on Programming Languages and Systems Member: IFIP Working Group 2.8 on Functional Program- 22(4):701-771 (July, 2000). With D. Walker, and K. ming. Crary. Participant: INFOSEC Research Council Study Group on “Alias Types.” European Symposium on Programming, Berlin, Malicious Code; DARPA ISAT Study on Mobile Code. Germany (March, 2000). With F. Smith, and D. Walker. Program Committee: Symposium on Principles of Program- “Type Structure for Low-level Programming Languages.” ming Languages (PoPL 2001); International Confer- 1999 International Colloquium on Automata, Languages, ence on Functional Programming (ICFP 2000); Prin- and Programming . With K. Crary. ciples and Practice of Declarative Programming (PPDP “From System F to Typed Assembly Language.” ACM Trans- 2000); International Symposium on Memory Manage- actions on Programming Languages and Systems ment (ISMM 2000); Principles of Programming Lan- 21(3):528-569 (May 1999). With D. Walker, K. Crary, guages (PoPL 2002); Workshop on Semantics, Appli- and N. Glew. cations, and Implementation of Program Generation “Principals in Programming Languages: A Syntactic Proof (SAIG 2001); Workshop on Multi-language Infrastruc- Technique.” In the 1999 International Conference on ture and Interoperability (BABEL 2001). Functional Programming, Paris, France, 197-207 (Sep- tember, 1999). With S. Zdancewic, and D. Grossman. LECTURES Language-based Security. Danish Technical Institute (ITU), Copenhagen, Denmark (June, 2001). Towards Next Generation Low-level Languages. University of Minnesota, Minneapolis, MN, (April, 2001); Harvard University, Cambridge, MA (February, 2001). Next-generation Low-level Languages. Workshop on Seman- tics, Program Analysis, and Computing Environments for Memory Management, London, England (January, 2001). Mobile Code Security: An Overview. TARA Review, Air Force Research Laboratory (March, 2000). The Role of Type Systems in Mobile Code Security. DARPA ISAT Study Group on Mobile Code (January, 2000). Mobile Code Security. Air Force Scientific Advisory Board (December, 1999). Advanced Type Systems for Low-level Languages. OpenSIG Conference (October, 1999). Why Languages and Compilers Matter. INFOSEC Research Council Study Group on Malicious Code (October, 1999).

PUBLICATIONS “Syntactic Type Abstraction.” Transactions on Programming Languages and Systems 22(6)1037-1080 (November, 2000). With D. Grossman, and S. Zdancewic. “Attacking Malicious Code: A Report to the INFOSEC Re- search Council.” IEEE Software 17(5) (September/Oc- tober, 2000) With G. McGraw. “Alias Types for Recursive Data Structures.” In ACM Work- shop on Types in Compilation, Montreal, Canada (Sep- tember, 2000). With D. Walker. “Scalable Certification for Typed Assembly Language.” In ACM Workshop on Types in Compilation, Montreal, Canada (September, 2000). With D. Grossman. CS Chair, Charles Van Loan and IAI Director, Fred B. Schneider

53 We are applying the Jif programming model to distrib- Andrew Myers uted systems, in which not only programs but also hosts Assistant Professor may be untrusted. Computations spanning a network re- quire a protocol for the communicating hosts; we can [email protected] show through static analysis of such a distributed pro- http://www.cs.cornell.edu/andru gram when its protocol releases unintended information Ph.D. Massachusetts Institute of to untrusted hosts participating in the computation. To Technology, 1999 develop a theory for the security of such programs in the presence of downgrading channels, we have introduced the idea of ‘robust declassification,’ which captures the idea that untrusted hosts are unable to exploit these channels.

emantic information about programs and data, ob- PROFESSIONAL ACTIVITIES Stained from the programming language level, provides Program Committee Member: 2001 IEEE Symposium on leverage for addressing difficult problems in computer sys- Security and Privacy; 18th ACM Symposium on Op- tems. Programming language ideas can be applied effec- erating Systems Principles (SOSP). tively to problems in security, systems, and databases. I am particularly interested in using language-level information LECTURES to improve security guarantees, performance, and trans- Protecting Confidentiality Against Untrusted Programs parency for distributed systems and mobile code. and Hosts. Mini-Workshop on Mobile Objects/Code One example of this approach is our current work on and Security, University of Tokyo, Japan (October, the problem of protecting confidential data. Current trends 2000). are making this problem both more important and more Enforcing Confidentiality in Low-level Programs. SDI/LCS difficult. Computer systems are nearly completely connected SeminarFest, Carnegie Mellon University, Pittsburgh, via the Internet, allowing software to disseminate private PA (June, 2001). information to almost any location. In addition, we increas- ingly use untrusted software; for example, downloaded soft- PUBLICATIONS ware such as applets. Standard access-control mechanisms “Robust Declassification.” Proceedings of the 14th IEEE are inadequate because they do not control information Computer Security Foundations Workshop, Cape propagation. Breton, Nova Scotia, Canada (June, 2001). With Steve Static information control is a promising approach Zdancewic. for confidentiality. Our programming language Jif judi- “Secure Information Flow and CPS. Proceedings of the ciously extends Java with privacy annotations that facili- 10th European Symposium on Programming, Genova, tate static analysis of information flows within programs. Italy (April, 2001). With Steve Zdancewic.

Anil Nerode 8176-4027-2). This book makes available in one place Professor material that is used all the time for decidability results Member of the Department of in computer science. The basic theme is the correspon- dence between classes of automata and languages for fi- Mathematics and the Graduate nite automata, Buchi Automata, Rabin automata and the Field of Computer Science corresponding games and strategies for those games. It is suitable for a one semester graduate course or a two-se- [email protected] mester undergraduate course. “Constructive Concurrent www.math.cornell.edu/~anil/ Dynamic Logic,” with Duminda Wijesekera, was finished Ph.D. University of Chicago, 1956 this year and will appear in the Annals of Pure and Applied Logic shortly. This was a project also of 10 years duration, primarily because of the number of cases involved in the decade in the works, the book Automata Theory and intuitionistic treatment, which fortunately decreased from Aits Applications, by Bakhadyr Khoussainov and myself, 120 to about 50, for the completeness theorem. was published in February, 2001 by Birkhauser (ISBN 0-

54 F

aculty and Senior Researcher Biographies My principal project is a research monograph with en- 25,000 agent distributed system for supply chain manage- gineer Wolf Kohn on the use of Finsler manifolds we asso- ment, entirely based on new mathematical-computer sci- ciate with distributed optimal control problems through- ence technology. out engineering to extract close-to-optimal controls in the PUBLICATIONS form of finite automata. We dubbed this area Hybrid Sys- Foreword to: Principles of Modeling and Asynchronous Dis- tems in 1991, and many now work in it. tributed Simulation of Complex Systems by S. Ghosh, IEEE Kohn and I founded a research and development com- Press (2000). pany, Hynomics, some years ago, with venture capital, in Seattle, and it is about to release to a client a prototype

fractal symbolic analysis analyzes a program and its trans- Keshav K. Pingali formed version by repeatedly simplifying these programs Professor until symbolic analysis becomes tractable, ensuring that equality of simplified programs is sufficient to guarantee [email protected] equality of the original programs. We have shown that this http://www.cs.cornell.edu/Info/ approach is adequate for restructuring codes like LU fac- Projects/Bernoulli/ torization with pivoting, which have not yielded to previ- Ph.D. Massachusetts Institute of ous techniques in the literature. The fractal approach to Technology, 1986 analysis is likely to prove useful for proving other program properties. We are continuing our work on next-generation ge- neric programming techniques. In our approach, algorithm y research group works on programming lan- implementors use a different API than data structure Mguages and compiler technology for program un- designers, and the gap between these APIs is bridged derstanding, restructuring, and optimization. Our goal is by a compiler. One view of this approach is that it ex- to develop the algorithms and tools that are required to ploits restructuring compiler technology to perform a raise the level of abstraction at which people program com- novel kind of template instantiation. We are demon- puters, freeing them from having to worry about low-level strating the usefulness of this new technology by de- details of machine architectures, memory hierarchies, etc. ploying it in a system that generates efficient sparse Our current focus is making programs adapt to hard- codes from high-level algorithms and specifications of ware faults. This problem has been studied by the operat- sparse matrix formats. ing systems community, but proposed solutions such as These ongoing projects build on our earlier work message logging have a large run-time overhead. We are on restructuring compilation technology. Our group developing program analysis and transformation tech- implemented one of the first compilers that generated niques to reduce this run-time overhead by exploiting in- code for distributed memory machines, starting from formation about program behavior that can be deduced sequential shared memory programs. We introduced at compile-time. We plan to deploy these techniques in techniques called runtime resolution and owner-com- the Adaptive Software Project, which is a multi-year, multi- putes rule, which have now become standard in the institutional project funded by the NSF as part of its In- area. Our work on linear loop transformations for en- formation Technology Research (ITR) initiative. hancing parallelism and locality has been incorporated We have continued our work on technology for opti- by Hewlett-Packard into its entire compiler product line. mizing the performance of programs running on machines We also developed fast algorithms for program analysis with deep memory hierarchies. A recent break-through was problems such as computing the control dependence the invention of fractal symbolic analysis, which is a pow- relation, the static single assignment form of a program, erful program analysis technique that permits compilers and dataflow analyses. Many of these algorithms have to restructure complicated programs far beyond the reach been incorporated into commercial and research com- of conventional compilers that use dependence analysis. pilers. Traditional symbolic analysis is powerful but it is intrac- table for most programs. To circumvent this problem,

55 UNIVERSITY ACTIVITIES Synchronization on Blue Gene. IBM T.J. Watson Research Member: Cornell Theory Center Advisory Committee; Center, Yorktown Heights, NY (October, 2000).

PROFESSIONAL ACTIVITIES PUBLICATIONS Program Committee: ACM Symposium on Programming “Tiling Imperfectly-nested Loop Nests.” Supercomputing Languages Design and Implementation (PLDI ’01); In- 2000. With Nawaaz Ahmed, and Nikolay Mateev. ternational Conference on Supercomputing (ICS ’01); “Automatic Generation of Block-recursive Codes.” EuroPar ’01, Supercomputing 2001; HiPC 2001. EUROPAR 2000, 125-134. With N. Ahmed. Consultant: Grammatech Inc. “Left-looking to Right-looking and Vice Versa: An Applica- Referee/Reviewer: ACM TOPLAS; IEEE Trans. Computers; Jour- tion of Fractal Symbolic Analysis to Linear Algebra Code nal of Parallel and Distributed Computing; Journal of Restructuring.” EUROPAR 2000, 155-164. With N. Supercomputing; IEEE Computer; Software Practice and Mateev, and V. Menon. Experience; “A Framework for Sparse Matrix Code Synthesis from High- Editorial Board: Int. Journal of Parallel Programming; and level Specifications.” Supercomputing 2000. With Discrete Mathematics and Theoretical Computer Science. Nawaaz Ahmed, Nikolay Mateev, and Paul Stodghill. “Landing CG on EARTH: A Case Study of Fine-grained LECTURES Multithreading on an Evolutionary Path.” Super com- Crash Recovery for Long-running Scientific Applications. puting 2000. With Kevin B. Theobald, Gagan Agrawal, IBM T. J. Watson Research Center, Yorktown Heights, Rishi Kumar, Gerd Heber, Guang R.Gao, and Paul NY (April, 2001). Stodghill. Fractal Symbolic Analysis. Indian Institute of Technology, Kanpur (January, 2001). Automatic Synthesis of Locality Enhancing Transformations for Imperfectly-nested Loop Nests. IBM T.J. Watson Re- search Center, Yorktown Heights, NY (November, 2000).

PROFESSIONAL ACTIVITIES Robbert van Renesse Vice-president, Research: Reliable Network Solutions, Inc. Senior Research Associate Technical Consultant to FAST.

[email protected] PUBLICATIONS http://www.cs.cornell.edu/home/rvr/ “Scalable Fault-tolerant Aggregation in Large Process Ph.D. Vrije University, Amsterdam, Groups.” International Conference on Dependable Systems and Networks, Goteborg, Sweden (July, 2001). 1989 With Indranil Gupta, and Kenneth P. Birman. “Spinglass, Scalable and Secure Communication Tools for Mission-critical Computing.” DARPA Information Survivability Conference and Exposition II (DISCEX am currently interested in locating and aggregating 2001), IEEE Computer Society Press (June, 2001). With Idata in a scalable manner. In the Astrolabe system, we Ken Birman and Werner Vogels. construct a hierarchical distributed database. Only the leaves “Protocol Switching: Exploiting Meta Properties.” Inter- are writable. The internal nodes are generated at run-time national Workshop on Applied Reliable Group Com- using aggregation dictated by SQL queries that are installed munication at the International Conference on Dis- on-the-fly. All internal communication is done using a tributed Computing Systems (ICDCS), Phoenix, AZ peer-to-peer epidemic protocol. Astrolabe incorporates an (April, 2001). With Xioming Liu, Mark Bickford, hierarchical public key infrastructure for security. Cristoph Kreitz, and Robert Constable. My other interests include applying formal methods to systems problems and networking support for peer-to- peer applications.

56 F

aculty and Senior Researcher Biographies

“Using Epidemic Techniques for Building Ultra-scalable “A Probabilistically Correct Leader Election Protocol Reliable Communication Systems.” Large Scale Net- for Large Groups.” Proc. 14th International Sym- working Workshop: Research and Practice. Vienna, posium on Distributed Computing (DISC 2000) - VA (March, 2001). With Werner Vogels, and Kenneth LNCS 1914, 89-103, Toledo, Spain (October, 2000). P. Birman. With Indranil Gupta, and Kenneth P. Birman.

I also work on the semantics of human languages, Mats Rooth using logical and denotational-semantic techniques. Professor Currently, I am investigating connections between the FCI, joint with Linguistics syntax and semantics of elliptical constructions and the semantics and phonology of intonation. [email protected] Ph.D. University of Massachusetts, 1995 UNIVERSITY ACTIVITIES Administration of Computational Linguistics Lab. Graduate Admissions Committee. Phonetics Search Committee. Founders’ Committee, Faculty of Computing and Informa- tion. ver the past several years, in collaboration with sev- Social Sciences Advisory Council. Oeral colleagues, I have been developing an approach to research and applications in linguistics and computational PROFESSIONAL ACTIVITIES linguistics that combines theoretical-linguistic formalisms, 2000 Workshop on Language Engineering, Johns Hopkins knowledge, and problem statements with numerical mod- University. (Five-week workshop in which a reading eling and parameter estimation techniques. We have devel- comprehension prototype was implemented). oped and implemented a grammatical formalism known as Editorial board: Natural Language Semantics. head-lexicalized probabilistic context free grammar and have employed it in large-scale experiments on German and En- LECTURES glish concerned with learning lexical information from text Parse Forest Computation of Expected Governors. Collo- corpora. The methods have the status of a basic language quium presentation, University of Sussex (January, technology, which can be applied in numerous ways in re- 2001). search and applications. My own interests relate mainly to Inducing a Semantically Annotated Lexicon. Symposium scientific research in linguistics, particularly syntax, seman- From Signals to Structured Communication, Cornell tics and lexical semantics. University (May 4 and 5, 2001). The work aims to devolop an experimental paradigm Empty Domain Effects for Presuppositional and Non- for work in linguistics in which lingustic events are observed presuppositional Determiners. Conference on Presup- in large text corpora using a robust parser and used to de- position, Stuttgart (September, 2000). velop and test theories. Linguistic theory is placed in contact with observations on a massive scale using mixed numeri- PUBLICATIONS cal/symbolic comptutational models, and much relevant “Parse Forest Computation of Expected Governors.” Proceed- knowledge is learned from data using numerical optimiza- ings of the 39th Annual Meeting of the Association for tion algorithms. Computational Linguistics (2001). With Helmut The linguistic representations assumed in this work are Schmid. those of linguistic theory, for instance grammars, labeled trees “Inducing a Semantically Annotated Lexicon via EM-based and structured lexical entries. In the numerical modeling Clustering.” Proceedings of the 37th Annual Meeting of the component, grammars and the lexicon are given a probabi- Association for Computational Linguistics (1999). With listic interpretation, as defining a parameterized family of Stefan Riezler, Detlef Prescher, Glenn Carroll, and Franz probability distributions. Many problems can then be solved Beil. using probabilistic optimization algorithms. For instance, inducing a lexicon from a text corpus amounts to maximiz- ing a certain polynomial.

57 “Inside-outside Estimation of a Lexicalized PCFG for Ger- “Valence Induction with a Head-lexicalized PCFG.” Pro- man.” Proceedings of the 37th Annual Meeting of the ceedings of the 3rd Conference on Empirical Methods Association for Computational Linguistics (1999). in Natural Language Processing (1998). With Franz Beil, Glenn Carroll, Detlef Prescher, and “On the Interface Principles for Intonational Focus.” Pro- Stefan Riezler. ceedings of the 6th Conference on Semantics and Lin- guistic Theory (1996). With Glenn Carroll.

Fred B. Schneider Editor: Distributed Computing; Information Processing Letters; Professor High Integrity Systems; Annals of Software Engineering; Director, Information ACM Computing Surveys. Assurance Institute Co–managing Editor: Texts and Monographs in Computer Science, Springer–Verlag. Chairman: International Review of UK Computer Science [email protected] Research. http://www/cs.cornell.edu/People/fbs/ Program committee: NORDSEC 2000 Fifth Nordic Work- Ph.D. SUNY Stonybrook, 1978 shop on Secure IT Systems—Encouraging Co–opera- tion; 3rd Information Survivability Workshop (ISW– 2000); Information/System Survivability Workshop 2001; 2001 Usenix Security Symposium; 2000 PODC esearch this past year continued into techniques to Influential Paper Award. Rsupport the construction of concurrent and distributed Industrial Advisory Committees: JavaSoft Security Advi- systems for high–integrity, mission–critical settings. Secu- sory Committee; deCode Genetics Security Advisory rity and fault–tolerance are of paramount concern here. Board; Eweb University.Com Board of Advisors; JXTA Inlined reference monitors (IRMs) remain a promis- Technical Advisory Council; CIGITAL Technical Advi- ing approach for enforcing security policies, especially the sory Board; Fast Search and Transfer Technical Advi- fine–grained policies needed when the Principle of Least sory Board. Privilege is employed to protect against hostile mobile code. Other Advisory Committees: MITRE Corporation, Research This past year, we concentrated on putting the approach and Technology committee of the Board of Directors; into practice. Cornell’s Digital Library Project is looking UK Dependability Interdisciplinary Research Collabo- to PSLang/PoET for imposing rights management and pres- ration (DIRC), Steering Committee. ervation policies on digital objects in their repository; we IFIP Working Group 2.3 (Programming Methodology). have prototyped a “digital university” to understand the enforcement issues there. And we started investigating the HONORS deployment of IRMs in the Windows operating system. Fellow, American Association for Advancement of Science Our investigations into interactions between security (1992). and fault–tolerance (joint work with Lidong Zhou and Fellow, Association for Computing Machinary (1994). Robbert van Renesse) also continued. We have deployed Professor–at–large, University of Tromsoe, Tromsoe, Nor- COCA, our replicated certification authority, to four sites way (1996-2004). on the Internet and made detailed performance measure- Daniel M. Lazar Excellence in Teaching Award (2000). ments. The system supports on–line revalidation of name– key bindings and is designed to resist a broad collection of LECTURES denial of service attacks. The Case for Language Based Security. Invited Lecture. Informatics—10 Years Back, 10 Years Ahead. Saarland UNIVERSITY ACTIVITIES University, Saarbrucken, Germany (August, 2000). Sabbatical leave (2000-2001). In–lined Reference Monitors. Microsoft Research. Redmond, Founders Committee, Faculty of Computing and Information. Washington (October, 2000). Engineering College Teaching Awards Committee. Radio interview, “All Things Considered” ( October 27, 2000). PROFESSIONAL ACTIVITIES The Case for Language Based Security. IFIP wg2.3. Santa Director: AFRL/Cornell Information Assurance Institute.

58 F

aculty and Senior Researcher Biographies Cruz, CA (January, 2001). Escaping the Ivy Tower: Transitioning Technology from a The Design and Deployment of COCA. Distinguished lec- University. AFCEA Conference. Hamilton, NY (June, ture series. SUNY Stony Brook. Stony Brook, NY (Feb- 2001). ruary, 2001). Fast P2P Possibilities. Tysil, Norway (February, 2001). PUBLICATIONS The Design and Deployment of COCA. Department of “Enforceable Security Policies.” ACM Transactions on Infor- Computer Science. University of Tromso. Tromso, Nor- mation and System Security 3(1):30-50 (February, 2000). way (February, 2001). “Formalizations of Substitutions of Equals for Equals.” The Case for Language Based Security. Keynote Address, Millennial Perspectives in Computer Science, Proceedings ACM Southeast Conference 2001, Athens, GA (March, of the 1999 Oxford–Microsoft Symposium in honour 2001). of Professor Sir Antony Hoare, (Davies, Roscoe, and The Design and Deployment of COCA. Department of Woodcock, editors) Palgrave Publishers, Hampshire, Computer Science. University of Texas, Austin, TX England, 119-132 (November, 2000). With David (March, 2001). Gries. The Case for Language Based Security. IBM Corporation “Editorial: Time for Change.” Distributed Computing Hawthorne, NY (April, 2001). 13(4):187 (November, 2000). The Design and Deployment of COCA. AFOSR Principal “A Language–based Approach to Security. “ Informatics— Investigators Meeting. Ithaca, NY (May, 2001). 10 Years Back, 10 Years Ahead. Lecture Notes in Com- —. Information Assurance Institute Seminar Series. AFRL/ puter Science 2000 (Reinhard Wilhelm, editor), IF Rome Research Site, Rome, New York (June, 2001). Springer Verlag, Heidelberg, 86-101, (2000). And Greg The Case for Language Based Security. AFCEA Conference. Morrisett, Robert Harper. Hamilton, NY (June, 2001).

courses to update the technology and problem-solving David Schwartz tools being taught. For the first time, students were intro- Assistant Professor duced to Maple in CS99, a preliminary course in program- ming that provides experience to students before they take [email protected] other courses. MATLAB has also received greater focus in http://www.cs.cornell.edu/dis/ a new introductory programming course, CS100M. It has Ph.D. State University of New generated quite a bit of excitement from students and other York at Buffalo, 1999 universities because of the equal focus on both MATLAB and Java to help teach programming using problems of computational science. I have also been coordinating the Computer Science Department’s “short courses,” which are 1-credit courses taught by Ph.D. students. These courses y main area of research is in computational me- focus on teaching computer languages and help the stu- Mchanics. My recent work focuses on applying math- dent instructors gain teaching experience. The instructors ematical techniques of deterministic uncertainty to enhance turn to me for advice on curriculum development, teach- methods of structural engineering analysis. I am applying ing methods, and navigating university policies. I have cre- one such technique, called Interval Analysis, which adapts ated a new short course, CS214: Advanced UNIX Tools, traditional numerical operations by replacing numbers with which will be taught for the first time in the next academic intervals that model uncertain values. This set-based form year. of structural analysis uses discrete mathematics to perform Continuing my work from spring 2000, colleagues in types of parametric studies, that traditional techniques can- the College of Engineering and I converted the pilot CS100 not. However, the interval approach introduces numerical Academic Excellence Workshop (AEW) into a full-fledged inaccuracies in solutions that map to infeasible structural program that runs in conjunction with CS100M. We con- behaviors. A major goal of this research involves improv- tinued to pilot AEWs for CS100J, which is the more tradi- ing the quality of the interval-based solutions to reduce tional programming course. The AEW fosters cooperative these inaccuracies to produce a technique suitable for de- learning, where students work in teams to solve challeng- sign engineers. ing problems in a non-competitive environment. Students This year I restructured the introductory programming have responded enthusiastically, so we began designing a

59 new lab in spring 2001 to expand our capacity, especially Coordinator: departmental short-course advice and instruc- to help the CS100J pilot grow. Since AEWs tend to entice tion. students, especially women and minorities, we will be track- Member: Student Experience Committee. ing engineering and computer science enrollments in the Member: Computing Policy Committee. next academic year to measure the effectiveness of our AEW program in increasing diversity in the sciences. I look for- PROFESSIONAL ACTIVITIES ward to working on the CS AEW with Daisy Fan, whom Textbook Reviewer: McGraw-Hill. I recruited into the department. LECTURES UNIVERSITY ACTIVITIES The Inexperienced Educator’s Guide To Managing A Large Faculty Advisor: Association of Computer Science Under- Hierarchical Staff. Emerging Technologies for Indus- graduates. try and Education, Annual Meeting of the St. Lawrence Coordinator: Academic Excellence Workshop (AEW) for Section, American Society Engineering Education CS100 program. (March, 2001).

techniques for dynamic adaptive control of computational Bart Selman resources. Associate Professor AWARDS [email protected] Fellow: American Association for Artificial Intelligence. http://www.cs.cornell.edu/home/ Alfred P. Sloan Research Fellowship (1999-2001). selman NSF Faculty Early Career Development Award (1998-2002). Ph.D. , 1991 UNIVERSITY ACTIVITIES Chair: Bits On Our Minds Science Fair. Coordinator of the AI Seminar Series. Cognitive Studies Undergraduate Committee. he focus of my research is on computation inten- Member: Fields of Cognitive Studies and Applied Math- Tsive methods in artificial intelligence, in particular fast ematics. general reasoning, search, and planning techniques. I also investigate the various sources of complexity in hard com- PROFESSIONAL ACTIVITIES putational problems. In this work, I explore connections Executive Council: American Association for Artificial In- between computer science, artificial intelligence, and sta- telligence. tistical physics. In addition, I study issues in problem rep- Editorial Board: Constraints: An International Journal; An- resentation, including the robustness of encodings, ab- nals of Mathematics; and Artificial Intelligence. straction, compilation, and approximation methods. Advisory Board: Journal of Artificial Intelligence Research These issues are critical to the successful application of (JAIR). reasoning and search methods in realistic domains. In Guest Editor: Theoretical Computer Science; Discrete Applied terms of applications, I consider challenge problems from Mathematics; Electronic Notes in Discrete Mathematics; planning, knowledge representation, multi-agent systems, and Annals of Mathematics and Artificial Intelligence. and machine learning. Our planning system, Black Box, Organizer and program co-chair: SAT-2001: Workshop on developed jointly with Henry Kautz of the University of Theory and Applications of Satisfiability Testing. Washington, is one of the fastest general purpose plan- Program committee: AAI-2000 Workshop on Leveraging ning systems. Finally, in recent projects, I am exploring Probability and Uncertainty in Computation; 17th connections between machine learning methods and rea- Intl. Conf. on Artificial Intelligence (IJCAI-2001); soning and planning techniques. In joint work with AAAI-2001 Symposium on Uncertainty in Computa- groups at the University of Washington and Microsoft tion. Research, I study the use of Bayesian machine learning

60 F

aculty and Senior Researcher Biographies Referee/Reviewer: Artificial Intelligence Journal (AIJ); JACM PUBLICATIONS Constraints: An International Journal; Journal of Artificial “A Bayesian Approach to Tackling Hard Computational Intelligence Research (JAIR); NSF Journal of Automated Problems.” Proc. 17th Conf. on Uncertainty and Arti- Reasoning; Theoretical Computer Science; Science. ficial Intelligence (UAI-2001), Seattle, WA (2001). With E. Horvitz, Y. Ruan, C. Gomes, H. Kautz, and M. LECTURES Chickering. Insights from Statistical Physics into Computational Com- “Balance and Filtering in Structured Satisfiable Problems.” plexity. Colloquium, California Institute of Technol- Proc. 17th Intl. Conf. on Artificial Intelligence (IJCAI- ogy (Caltech), Pasadena, CA (October, 2000). 2001), Seattle, WA (2001). With H. Kautz, Y. Ruan, D. Survey of Artificial Intelligence and Knowledge Represen- Achlioptas, C. Gomes, and M. Stickel. tation. Six lectures at AFRL/IF, Rome, NY (October/ “Algorithm Portfolios.” Artificial Intelligence Journal 126 November, 2000). (2001). With C. Gomes. Understanding Complexity: Recent Developments and “Distribute Constraint Satisfaction in a Wireless Sensor Directions. Colloquium, University of Minnesota, Tracking System.” Proc. Workshop on Distributed Con- Computer Science, Minneapolis, MN (October, 2000). straint Reasoning (CONS-2), IJCAI-2001, Seattle Principled Analysis and Synthesis of Agent Systems. Meet- (2001). With R. Bejar, C. Gomes, and B. Krishnamachari. ing on Taskable Agent Software Kit, DARPA, Charlotte, “Analysis of Random Noise and Random Walk Algorithms.” NC (October, 2000). Principles and Practice of Constraint Programming (CP Challenge Problems for Propositional Reasoning and 2000). Lecture Notes in Computer Science 894:278-290 Search. Distinguished Lecture Series, 7th Annual (2000). With B. Krishnamachari, Xi Xie, and S. Wicker. Knowledge Representation and Reasoning Lecture, “Compute Intensive Methods in Artificial Intelligence.” An- York University, York, UK (November, 2000). nals of Mathematics and Artificial Intelligence 28(1) Understanding Complexity: Recent Developments and (2000). Directions. Colloquium, Leeds University, Leeds, UK “Heavy-tailed Phenomena in Satisfiability and Constraint (November, 2000). Satisfaction Problems.” Journal of Automated Reasoning Controlling Complexity: Structured Problems and Back- 24(1/2):67-100 (2000). With C. Gomes, N. Crato, and bone Variables. Meeting on Autonomous Negotiation Henry Kautz. Teams, DARPA, Charlotte, NC (November, 2000). Satisfiability Testing: Recent Developments and Challenge Problems Plenary Lecture, AAAI Spring Symposium on Answer Set Programming, Palo Alto, CA (March, 2001).

Associate Professor Bart Selman, Associate Professor Steve Professors Hartmanis and Birman Vavasis, Chair Charles Van Loan, and CIS Dean Robert L. Constable

61 David B. Shmoys investigating the application of some of these rounding methods to problems arising in computational genomics, Professor and Member of the School in joint work with Dan Brown and the group in plant sci- of Operations Research and the ences at Cornell, working under Steve Tanksley. The result- Graduate Field of Computer Science ing software for computing genetic linkage maps has al- [email protected] ready seen widespread application within the genomics http://www.cs.cornell.edu/home/ community. shmoys/shmoys.html Ph.D. University of California, Berkeley, UNIVERSITY ACTIVITIES 1984 Member: Search Committee for Dean of the Graduate School. Member: Genomics Task Force. he primary focus of my research is on the design and Member: FCI Working Group on Computational Biology. Tanalysis of efficient algorithms for discrete optimi- Member: FCI Working Group on Computational Science. zation problems, and in particular, on approximation algorithms for NP-hard problems. PROFESSIONAL ACTIVITIES Computational complexity theory provides a math- Editor-in-chief: SIAM Journal on Discrete Mathematics. ematical foundation for the intractability of many com- Editor: SIAM Journal on Computing. putational problems by proving that all NP-complete Co-editor: SIAM/MPS Series on Optimization. problems are equally hard. However, in practice, real- Associate Editor: Mathematics of Operations Research; Math- world inputs for some NP-hard optimization problems ematical Programming; Journal of Scheduling. are straightforward to solve, whereas for others, even quite Guest Editor: J. of Algorithms (Special issue devoted to se- modestly sized inputs are beyond the limits of the most lected papers of the 11th Annual Symposium on Dis- sophisticated methods. Analogously, from a theoretical per- crete Algorithms). spective, for some NP-hard optimization problems it is pos- sible to efficiently compute solutions that are guaranteed LECTURES to be arbitrarily close to optimal, whereas for others, com- Approximation Algorithms for Facility Location Problems. puting even a crude approximation to the optimum is also —. Invited plenary lecture. CO 2000, Greenwich (July, NP-hard. In fact, the extent to which such approximation 2000). algorithms exist for a problem provides a surprisingly ac- —. Invited plenary lecture. CONF 2000, Saarbrucken, Ger- curate theoretical yardstick for its actual computational dif- many, September 2000. ficulty. A Constant-factor Approximation Algorithm for the K- Our work has been motivated by the fact that certain median Problem. International Symposium on Math- linear programming relaxations have been shown to pro- ematical Programming, Atlanta, GA (August, 2000). vide extremely good lower bounds on typical data. We pro- Selective Mapping: A Strategy for Optimizing the Construc- vided a theoretical understanding of the strength of these tion of High-density Linkage Maps. bounds by designing algorithms that “round” the fractional —. Tri-Institutional Workshop on Computational Biology, solutions to these linear programs to nearby integer solu- Cornell ( September, 2000). tions without degrading the quality of the solution too —. NIH Symposium - From Genes to Proteins and to Bio- much. We have been investigating a variety of clustering logical Function: Computational Approaches, Cornell problems, and in joint work with Moses Charikar, Sudipto (October, 2000). Guha, and Eva Tardos, we have obtained the first constant factor approximation algorithm for the k-median problem. PUBLICATIONS We have also obtained improved approximation algorithms “Selective Mapping: A Strategy for Optimizing the Con- for the uncapacitated facility location problem (in joint struction of High-density Linkage Maps.” Genetics work with Fabian Chudak) and for a variety of more gen- 155:407-420 (2000). With T. J. Vision, D. G. Brown, eral multi-level facility location problems (in joint work R. T. Durrett, and S. D. Tanksley. with Karen Aardal and F. Chudak, and with Nathan “Approximation Algorithms for Facility Location Prob- Edwards). For the former problem, not only is the theo- lems.” In: Approximation Algorithms for Combinatorial retical performance of our algorithm surprisingly good, but Optimization, K. Jansen and S. Khuller, editors, APPROX it is more effective in practice than all previously known 2000, Lecture Notes in Computer Science 1913:27-33, heuristic procedures for this problem. We have also been Springer, Berlin (2000).

62 F

aculty and Senior Researcher Biographies LANDMARK PUBLICATIONS “Scheduling to Minimize the Average Completion Time: “Using Dual Approximation Algorithms for Scheduling On-line and Off-line Approximation Algorithms.” Problems: Theoretical and Practical Results.” J. Assoc. Math. Oper. Res. 22:513-544 (1997). With L. A. Hall, Comput. Mach. 34:144-162 (1987). With D.S. A. S. Schulz, and J. Wein. Hochbaum. “A Constant-factor Approximation Algorithm for the K- “An Approximation Algorithm for the Generalized Assign- median Problem.” Proceedings of the 31st Annual ment Problem.” Math. Programming 62:461-474 ACM Symposium on Theory of Computing, 1-10 (1993). With E. Tardos. (1999). With M. Charikar, S. Guha, and E. Tardos. “Approximation Algorithms for Fractional Packing and Covering Problems.” Math. Oper. Res. 20, 257-301 (1995). With S.A. Plotkin and E. Tardos.

efficient placement of application components within the Emin Gün Sirer network that adapt to changes in resource availability and Assistant Professor connectivity. In conjunction with Magnetos, we are examining the [email protected] design of secure, energy efficient operating systems for http://www.cs.cornell.edu/People/ small, embedded computers. Newly emerging smart cards, egs/ which are capable of downloading and executing arbitrary Ph.D. University of Washington, 2001 code, are becoming part of our critical infrastructure as they are being deployed in financial and telecommunications networks. We are looking at different strategies for testing their security, as well as evaluating code verification tech- niques for such severely resource-constrained systems. am broadly interested in the design and implemen- A third research direction looks at distributed systems Itation of distributed operating systems for modern net- at the opposite end of the spectrum; namely, the high- works. performance clusters that make up web sites. We are devel- My main focus is on operating system support for ad- oping techniques for formally specifying and reasoning hoc mobile networks. Ad-hoc networking is a newly emerg- about the interfaces they expose to the rest of the network, ing computing paradigm where disparate, mobile hosts as well as techniques for enforcing a security policy uni- form temporary alliances to accomplish certain tasks. They formly across a web site. naturally arise in many real-world settings including disas- ter relief operations, smart vehicles, and distributed sensor LECTURES networks. Such ad-hoc settings, characterized by constant Distributed Virtual Machines: A New System Architecture change and limited resources, require a high degree of for Networked Computers (March-May, 2000). adaptability and resource awareness from applications. A New System Architecture for Ubiquitous Computing. EGSA Current state of the art, however, requires all such func- Graduate Engineering Social Seminar Series (March, tionality to be manually encoded by the application pro- 2001). grammer. We are currently building an operating system, called PUBLICATIONS Magnetos, that provides automatic and transparent distri- “Comprehensive Synchronization Elimination for Java.” bution of ad-hoc networking applications. Magnetos makes Science of Computer Programming, special issue on Static an entire ad-hoc network appear as a single Java virtual Analysis (April, 2001). With Jonathan Aldrich, Craig machine to applications. By transparently migrating ap- Chambers, and Susan Eggers. plication components from node to node, Magnetos can “Design and Implementation of a Distributed Virtual Ma- increase system longevity, reduce application delays, and chine for Networked Computers. Proceedings of the decrease bandwidth consumption, even in the presence of Seventeenth Symposium on Operating Systems Prin- conflicting applications. Consequently, Magnetos simpli- ciples, 202-216, Kiawah Island, SC (December, 1999). fies application design, increases application portability by obviating error-prone manual coding, and achieves an

63 With Robert Grimm, Arthur J. Gregory, and Brian N. Operating Systems Principles, 267-284, Copper Moun- Bershad. tain, CO (December, 1995). With Brian N. Bershad, Stefan “Extensibility, Safety and Performance in the SPIN Operating Savage, Przemyslaw Pardyak, Marc Fiuczynski, David System. Proceedings of the Fifteenth Symposium on Becker, Craig Chambers, and Susan Eggers.

Evan Speight the applications used to manipulate that information. Bifrost uses affinity between data, and between users and Assistant Professor data, to make decisions about when and where to move Member of the School of Electrical data. We refer to this approach as affinity directed mobility. and Computer Engineering and the The core research issues of the project are mobility Graduate Field of Computer Science management (how we move data and threads to sup- [email protected] port user and device mobility), data management (how http://www-ds.csl.cornell.edu/ we represent, access, update, and protect information), and ~espeight/ application management (how we provide system-wide Ph.D., Rice University, 1998 access to application data). In contrast to previous ap- proaches to mobile data management that employ hoard- ing in anticipation of disconnection, Bifrost anticipates y research centers around different aspects “connection elsewhere” instead of disconnection. Our ra- M of distributed computing. In particular, my three tionale for this “almost always connected” approach is as areas of focus are software runtime systems for distributed follows: We project that in 3-5 years, the situation will exist computing platforms, improving the performance of com- in which users will be able to be in an “always connected” modity cluster-based shared memory systems, and provid- state, connected almost anytime and anywhere that they ing location-independent data access through the concept choose. Wireless access points (e.g., 802.11, infrared, and of affinity directed mobility. Bluetooth) will be common, even ubiquitous, in nearly My work in software distributed system runtime de- every home and public place, as they are today in many velopment has resulted in the dissemination of the Brazos situations including coffee shops, airports, and office build- system to over 100 registered users worldwide. Brazos is a ings. Additionally, services such as Infared and Bluetooth high performance parallel programming environment dis- will allow connection to the Internet in nearly any setting tinguished by its use of multithreading, selective multicast, from almost anywhere. In this situation, the problem of a software-only implementation of scope consistency, and how a user can have unilateral access to any piece of re- several adaptive runtime performance tuning mechanisms. mote personal data, regardless of device or location, be- Brazos supports both shared memory and message pass- comes increasingly important. Thus Bifrost seeks to pro- ing programming styles, and provides very efficient mecha- vide a common data access model, and exploring the de- nisms for thread migration and checkpoint/recovery. Cur- sign space while providing a rich set of tools for the ma- rently, my research on parallel programming runtime sys- nipulation and sharing of personal data is a core focus of tems includes the development a version of the Message the proposed research. Passing Interface (MPI) that provides thread migration be- tween nodes in a cluster for load balancing, fault tolerance, UNIVERSITY OR PROFESSIONAL ACTIVITIES and higher performance. Member: ECE Curriculum and Standard Committee. The emergence of ubiquitous communication infrastruc- Member: Faculty Advisory Board on Information Technolo- ture and high performance, low power computing resources gies. challenges us to explore a better alternative to the current Reviewer: Transactions of Parallel and Distributed Com- fragmentation of data, applications, and devices that many puting. users are faced with today. The Bifrost location independent computing project seeks to provide a flexible and compre- LECTURES hensive information access environment. The function of WSDLite: A Lightweight Alternative to Windows Sockets Bifrost is to provide location and device independent access Direct Path. Fourth Windows Symposium, Seattle, WA to data. Data in Bifrost encompasses both information and (August, 2000).

64 F

aculty and Senior Researcher Biographies Efficient Parallel Computing on Multiprocessor Clusters. “Efficient User-level Thread Migration and Checkpointing EE Colloquium, Cornell University (March, 2000). on Windows NT Clusters.” In Proceedings of the 3rd Usenix Windows NT Symposium (July, 1999). With PUBLICATIONS Hazim Abdel-Shafi and John Bennett. “WSDLite: A Lightweight Alternative to Windows Sockets “Realizing the Performance Potential of the Virtual Inter- Direct Path.” Proceedings of the 4th Usenix Windows face Architecture.” Proceedings of the International Symposium (August, 2000). With John Bennett, and Conference on Super computing (ICS) (June, 1999). Hazim Abdel-Shafi. With John Bennett.

programmer to express their matrix computations and Paul Stodghill sparse matrix data structures separately and in their most Research Associate natural representation. Then, we use program transforma- tions to combine the algorithms and data structures into a [email protected] single, efficient executable. http://www.cs.cornell.edu/ Another area in which I am working is that of fault- tolerance for scientific applications. Very few scientific ap- stodghil/ plications would be considered “mission-critical,” but many Ph.D. Cornell University, 1997 do run for very long periods of time (e.g., for weeks or months) or in environments in which failures are likely to occur (e.g., the desktop workstations within a department). We are currently investigating a number of different ap- y research interest is in program transformations proaches for providing fault-tolerance for scientific appli- Mand program synthesis for computational science ap- cations, but one thing is already clear: different applica- plications. tions running on different computers call for different fault- Increasingly, the frontiers of science are being explored tolerance solutions. A programmer would certainly like to using computer simulation and modeling. Creating these have their application run in many different computing scientific applications poses a number of difficulties for environments, but interfacing with a number of fault-tol- computational scientists. First, these applications are often erant systems is not usually realistic. In order to provide a very complex and may contain hundreds of thousands, and single interface from the programmer’s point of view, we even millions of lines of code. Furthermore, these applica- are investigating a number of implementation techniques tions are intended to run on the most advanced, high per- involving software library and program transformation formance supercomputers. I am interested in developing technology. This work is being done as part of a project on software that helps to reduce the development cost of these Adaptive Software with researchers from other departments applications. One way to do this is to raise the level of ab- here at Cornell, Mississippi State University, the College of straction of programming languages and software libraries William and Mary, and other institutions. in order to bring them closer to the programmer’s natural Apart from my core research agenda, I have worked domain of discourse. In order to do this, specialized com- closely with computational scientists in order to develop pilers and other program transformation systems are re- novel, high-performance, scientific applications. Apart quired in order to transform these abstractions into effi- from being interesting in its own right, this work has cient executable programs. given me insight into scientific programming that I have An example of this is the work that I have done on found extremely valuable in my research on program sparse compilers with Keshav Pingali and his students. transformations. The most important project that I have Matrix computations, such as those that perform linear al- been involved with was the Crack Propagation for gebra operations, are very naturally expressed using For- Teraflop Computers (CPTC) project, whose goal was to tran or Matlab style loops and arrays. However, many ma- develop fracture mechanics software that incorporated trices that arise in scientific applications are sparse, which a number of recent advances in numerical analysis and means that they consist almost entirely (>99%) of zero computational geometry and which delivered very high values. Modifying matrix algorithms to use special-purpose performance on teraflop-scale computers. Other re- sparse matrix data structures is a complicated and error- searches who worked on this project include, Keshav prone process. We have developed software that allows the Pingali, Steve Vavasis, Paul Chew, the Cornell Fracture

65 Group headed by Tony Ingraffea (Civil Engineering), Gao “Landing CG on EARTH: A Case Study of Fine-gained Guong-Rong (ECE, University of Delaware) and Nikos Multithreading on an Evolutionary Path.” In Chrisochoides (CS, College of William and Mary). Supercomputing 2000, Dallas, TX (November 4-11, 2000). With K. Theobald, G. Agrawal, R. Kumar, G. LECTURES Heber, G. Gao, and K. Pingali. Next-generation Generic Programming and its Application “Next-generation Generic Programming and its Applica- to Sparse Matrix Computations. ACM International tion to Sparse Matrix Computations.” In International Conference on Supercomputing, Sante Fe, NM (May, Conference on Supercomputing, 2000. With N. 2000). Mateev, K. Pingali, and V. Kotlyar. Parallel FEM Simulation of Crack Propagation on the AC3 “Parallel FEM Simulation of Crack Propagation on the AC3 Velocity Cluster. ACM Second Workshop on Cluster Velocity Cluster.” In The Second Workshop on Cluster Cluster-Based Computing, Sante Fe, NM (May, 2000). Cluster-Based Computing, 2000. With G. Coulouris, Crack Propagation on Teraflop Computers. AC3 Meeting, G. Heber, D. Lifka, K. Pingali , D. Schneider, P. Cornell University (June, 2000). Wawrzynek, and J. Zollweg. “Parallel FEM Simulation of Crack Propagation – Chal- PUBLICATIONS lenges, Status, and Perspectives.” Irregular 2000. With “A Framework for Sparse Matrix Code Synthesis from High- B. Carter, et al. level Specifications.” In Supercomputing 2000, Dallas, TX (November 4-11, 2000). With N. Ahmed, N. Mateev, and K. Pingali.

arising in vision, networking and clustering. Éva Tardos I am also working on the interface of algorithms and Professor game theory. Approximation algorithms provide a tool for understanding issues in game theory, such as evaluating [email protected] and designing multi-agent games. Such games underlie http://www.cs.cornell.edu/ many phenomena in networking. In joint work with Tim home/eva/eva.html Roughgarden, I worked on understanding the quality of Ph.D. Eötvös University, routing obtained if separate agents each make selfish rout- ing decisions in a global network. Our goal is to under- Hungary, 1984 stand the tradeoffs between introducing a global control mechanism, and the loss in quality obtained by letting each agent make selfish decisions. We use a model where each y research interest focuses on the design and link in a network has a delay that is an arbitrary monotone Manalysis of efficient methods for combinatorial op- and continuous function of the amount of flow on the timization problems and their applications to various fields. link. We compare the quality of such a Nash equilibrium I am mostly working on problems that involve graphs or with a globally planned optimal routing whose goal is to networks. minimize the sum of all delays. In the case of linear delay One general area of my research is designing fast algo- functions, we show that the global optimum can be at most rithms that provide provably close-to-optimal results for a factor of four-thirds better than the Nash equilibrium. NP-hard problems. Although research on polynomial time For more general delay functions, the value of the global approximation algorithms started in the1970s soon after optimum can be arbitrarily better than the Nash equilib- the discovery of NP-completeness, it has truly blossomed rium even when the delay functions are rather simple. On only in the past decade. Amazing progress has occurred the other hand, we show that for any monotone and con- both in our ability to design approximation algorithms, tinuous delay function the cost of a Nash equilibrium is at and in proving limits to approximability. Over the last years most as much as the optimal for the case in which each I have been working on different approximation algorithms agent has to send twice as much flow. Roughly speaking, on various basic combinatorial problems. I have worked this shows that one can eliminate the need for introducing on algorithms for various cut problems, and clustering type a global control mechanism at the cost of designing a net- problems. These problems are motivated by applications work that can support twice as much flow.

66 F

aculty and Senior Researcher Biographies AWARDS ming, Atlanta GA (August, 2000). Fellow: American Academy of Arts and Sciences (2001). A Constant-factor Approximation Algorithm for the K- Fellow: ACM (1998). median Problem. International Symposium on Math- Faculty of the Year: Association of Computer Science Un- ematical Programming, Atlanta GA (August, 2000). dergraduates. Classification with Pair-wise Relationships (invited talk). Horizons in Combinatorics, A Conference on Graph UNIVERSITY ACTIVITIES Theory, Vanderbilt, TN (May, 2001). Director of Graduate Studies: Computer Science Depart- Sequence of four lectures on Approximation Algorithms. ment, Cornell University DONET summer school on Integer and Combinato- Member: Fields of Operations Research and Applied Math- rial Optimization, Utrecht, Netherlands (June, 2001). ematics Member: FACTA, Faculty Advisory Committee on Tenure PUBLICATIONS and Appointment. “How Bad is Selfish Routing?” Proceedings of the 41st Member: WISE, Advisory group on Women in Science and Annual IEEE Symposium on the Foundations of Com- Engineering. puter Science (October, 2000). With Tim Roughgarden. “Allocating Bandwidth for Bursty Connection.” SIAM Jour- PROFESSIONAL ACTIVITIES nal on Computing 30(1):191-217 (February, 2001). With DIMACS External Advisory Board member, since 1996. Jon Kleinberg, and Yuval Rabani. Co-organizer: DIMACS special year on Computational In- tractability in1999-2001. LANDMARK PUBLICATIONS Area editor for Discrete Optimization: Mathematics of Op- “Approximation Algorithms for Classification Problems erations Research. with Pair-wise Relationships: Metric Partitioning and Editor: SIAM Journal of Computer Science; Chicago Journal of Markov Random Fields.” In the Proceedings of the 40th Theoretical Computer Science; Combinatorica; Journal of Annual IEEE Symposium on the Foundations of Com- Interconnection Networks. puter Science, 14-23 (November, 1999). With Jon Program committee: International Workshop on Random- Kleinberg. ization and Approximation Techniques in Computer “A Constant-factor Approximation Algorithm for the K- Science (APPROX), 2000; ACM-SIAM Symposium on median Problem. In the Proceedings of the 31st An- Discrete Algorithms (SODA) 2001; ACM Symposium nual ACM Symposium on the Theory of Computing, on the Theory of Computing (STOC) 2001. 1-10 (May, 1999). With Moses Charikar, Sudipto Guha, and David Shmoys. LECTURES “The Quickest Transshipment Problem.” Mathematics of A Classification Problem Related to Multi-way Cuts. Interna- Operations Research 36-62 (February, 2000). With Bruce tional Symposium on Mathematical Programming, Hoppe. Atlanta GA (August, 2000). Fast Approximation Algorithms for Multicommodity Flow How Bad is Selfish Routing? Problems. Journal of Computer and System Sciences —. International Symposium on Mathematical Program- 50:228-243 (1995). With Tom Leighton, Fillia ming, Atlanta GA (August, 2000). Makedon, Serge Plotkin, Cliff Stein, and Spyros —. Cornell University, Department of Mathematics, VIGRE Tragoudas. Interdisciplinary Colloquium (September, 2001). “A Strongly Polynomial Algorithm for the Minimum Cost —. Cornell University, Computer Science Department, Dis- Circulation Problem.” Combinatorica 5:247-255 tinguished Lecture Series (October, 2000). (1985). —. 41st Annual IEEE Symposium on the Foundations of Computer Science, Redondo Beach, CA (November, 2000). —. University of Southern California, Computer Science Department, Distinguished Lecture Series (Novem- ber, 2000). Flow-based Algorithms for Some Metric Labeling Problems. International Symposium on Mathematical Program-

67 LECTURES Tim Teitelbaum Static-semantic analysis based on dependence graphs. Associate Professor SPAWAR, San Diego, CA (August, 1999). —. Hewlett-Packard, Rancho Bernardo, CA (October, [email protected] 1999). http://www.cs.cornell.edu/Info/ People/tt/Tim_Teitelbaum.html PUBLICATIONS Ph.D. Carnegie Mellon University, 1975 “Issues in Slicing Promela and its Applications to Model Checking, Protocol Understanding, and Simula- tion.” International Journal on Software Tools for Tech- nology Transfer 2(4):343-349 (2000). With L. Millett. “Program Slicing of Hardware Description Languages.” y research is concerned with the use of fine-grain In 10th IFIP WG10.5 Advanced Research Working Mdependence graphs for specification, development, Conference on Correct Hardware Design and Verifi- and analysis of software and hardware systems. The objec- cation Methods (CHARM ’99), Bad Herrenalb, Ger- tive is a new generation of tools that provide precise and many (September, 1999). With E.M. Clarke, M. complete information about the structure of complex sys- Fujita, P.S. Rajan, T. Reps, and S. Shankar. tems. I am working to improve the performance and func- “A Case for Channel Analysis: Slicing Promela.” Pro- tionality of generic dependence-graph technology, and I ceedings of the International Symposium on Soft- am also exploring the use of the technology in various ap- ware Engineering for Parallel and Distributed Sys- plication domains. tems, Los Angeles, CA, 52-61 (May, 1999). With L. Dependence-graph technology can be used in a pro- Millett. gram understanding system, where the graphs may include forward and backward links between each assignment state- ment and possible uses of the values stored by that assign- ment. Pointer analysis can be used so that indirect loads and stores through pointers are taken into account, as well as indirect function calls. Dataflow analysis can be used so that links between unrelated assignments and uses are ex- cluded. Operations that highlight forward and backward slices show the impact of a given statement on the rest of the program (forward slicing) and the impact of the rest of a program on a given statement (backward slicing). Op- erations that highlight paths between nodes in the depen- dence graph (chops) show ways in which the program points are interdependent (or independent). Uses of slicing and chopping include software devel- opment, maintenance and re-engineering of legacy code, test-data generation, security-assurance and safety-assurance inspection, and semantic interference checking in configu- ration management systems. I am working with Ph.D. student Lyn Millett, who is studying program dependence-graphs and slicing of con- current programs.

[On leave spring 2001.]

PROFESSIONAL ACTIVITIES Co-founder and Chairman: GrammaTech, Inc. Member: Science and Technology Study Group, Infosec Re- search Council (October 1999-May 2000). Associate Professor Claire Cardie with Theory Center Director Tom Coleman

68 F

aculty and Senior Researcher Biographies Allowing for the transfer of that reference—as well as Herbert Van de Sompel of the contextual elements—to a linking server. Assistant Professor In December 2001, I filed for standardization of the OpenURL with NISO. Soon thereafter, the standardiza- [email protected] tion request was granted, and a formal standardization http://www.cs.cornell.edu/people/herbertv/ committee was formed. Meanwhile, the draft OpenURL Ph.D. Ghent University, 2000 specification has already gained broad acceptance in the scholarly information industry, with leading companies such as ISI, EBSCO, Swets, SilverPlatter, etc. supporting it in their production systems. Also, an important OpenURL- based prototype was set up with DOI/CrossRef to demon- strate the feasibility of open reference linking based on uring the academic year 2000/2001, I focused DOIs. Don furthering my work in two areas of digital library research that I initiated in 1999: the Open Archives Initia- PROFESSIONAL ACTIVITIES tive and open reference linking (OpenURL). Member: Steering Committee, Open Archives Initiative. With the Open Archives Initiative, important progress Executive: Open Archives Initiative. was made through a generalization of the metadata har- Technical Committee: Open Archives Initiative. vesting specifications that were released as the Santa Fe Research Advisory Board: OCLC. Convention in early 2000. Those specifications were only NISO Committee AX (OpenURL standardization) applicable to preprint-related metadata, but nevertheless Co-organizer: Open Archives Initiative Meeting, Washing- attracted the interest fromHerbert communities Van de Sompel outside of the pre- ton DC (January, 2001). print realm. It was decided to revise the specification in Workshop on the Open Archives Initiative and peer-review depth, in order to extend its applicability to metadata in journals in Europe, Geneva (March, 2001). general. The revision process took 5 months. In that timeframe, a meeting was organized to discuss issues in- LECTURES volved in the generalization; several versions of a new pro- Interconnecting Distributed Scholarly Information Re- tocol document were compiled; an alpha-testing group sources in a Context Sensitive Manner. Invited half- consisting of 14 international parties was assembled with day workshop, Access 2000 conference, St. John’s, New- the aim of testing and refining those versions. In January foundland, Canada (September, 2000). 2001, the Metadata Harvesting Protocol of the Open Ar- The SFX Framework, the OpenURL and the Open Archives chives Initiative was publicly released at a meeting in Wash- Initiative. Invited presentation, SLA Global 2000 con- ington DC. Carl Lagoze (Cornell University CS) and I were ference, Brighton UK (October, 2000). appointed Executives of the Open Archives Initiative, over- Invited presentation in the session “Digital Libraries and seeing and coordinating the technical activities of the Ini- their Role in Knowledge Dissemination and Creation.” tiative. The Digital Library Federation and the Coalition for ASIS 2000 Conference, Chicago IL (November, 2000). Networked Information provide support for those activi- Invited presentation in the session “Electronic Pre-print Ini- ties. The Metadata Harvesting protocol attracts broad in- tiatives: A Discussion on Comparative, Historical and ternational attention, and several funding agencies explic- Emerging Trends”. At the ASIS 2000 Conference, Chi- itly or implicitly call for proposals that build on the proto- cago IL (November, 2000). col. The Roof is on Fire. Closing keynote at the fall 2000 meet- Important progress was also made in the realm of the ing of the Coalition for Networked Information. San open reference-linking track of my work. With Patrick Antonio, TX (December, 2000). Hochstenbach (Ghent University) and Oren Beit-Arie (Ex The Open Archives Initiative. Keynote at the Workshop on Libris USA), I had publicly released a draft OpenURL speci- the Open Archives Initiative and peer-review journals fication in January 2000. The OpenURL specification en- in Europe, Geneva (March, 2001). ables open reference linking by: The Open Archives Initiative and Scholarly Communica- Allowing one to reference a scholarly object—as well tion. Invited presentation, IATUL Conference, Delft as elements that describe the context in which the refer- (May, 2001). ence is provided—in a consistent way as name=value pairs on an HTTP GET or POST URL.

69 PUBLICATIONS “Open Linking in the Scholarly Information Environment us- The Open Archives Protocol for Metadata Harvesting, Herbert ing the OpenURL Framework.” D-Lib Magazine Van de Sompel and Carl Lagoze, editors (January, 7(3)(March, 2001). With Oren Beit-Arie. http:// 2001). http://www.openarchives.org/OAI/ www.dlib.org/dlib/march01/vandesompel/ openarchivesprotocol.htm. 03vandesompel.htm. “The Open Archives Initiative: Building a Low-barrier “Generalizing the OpenURL Framework beyond Refer- Interoperability Framework.” JCDL2001 (2001). With ences to Scholarly Works.” D-Lib Magazine 7(7/ C. Lagoze. http://www.cs.cornell.edu/lagoze/papers/oai- 8)(July/August, 2001). With Oren Beit-Arie. jcdl.pdf.

PUBLICATIONS Charles Van Loan “The Ubiquitous Kronecker Product.” Journal of Computa- Professor and Chair, tional and Applied Mathematics 123:85-100 (2000). Department of Computer Science “GEMM-based Level 3 BLAS: Algorithms for the Model Implementations.” ACM Transactions on Mathematical [email protected] Software 24:268-302 (1999). With P. Ling and B. http://www.cs.cornell.edu/cv/ Kagstrom. Ph.D. University of Michigan, Ann Arbor, Computational Frameworks for the Fast Fourier Transform, 273pp., SIAM Publications, Philadelphia, PA. (1992). 1973 Matrix Computations, 3d ed., 694pp, Johns Hopkins Uni- versity Press, Baltimore, MD (1996). With G.H. Golub. Introduction to Scientific Computation: A Matrix-vector Ap- continue to work in the computational multilinear proach Using Matlab, 2d Ed., 365pp, Prentice-Hall, Ialgebra area. This includes factorization approaches to Upper Saddle River, NJ (1999). various fast transforms, Kronecker product preconditioners, and Kronecker-constrained least squares problems. This past year Adam Florence and I perfected our imple- mentation of the fast Gauss transform (FGT) of Greengard and Strain. We also developed effective methods for total least squares and weighted least squares when the data matrix is a Kronecker product. Applied Mathematics student Carla Martin and I com- pleted work on a solver for linear systems of the form (A- qI)x = b where A is the product of upper triangular matri- ces. Our method is an order of magnitude faster than the best of previous techniques.

UNIVERSITY OR PROFESSIONAL ACTIVITIES Chair: Department of Computer Science. Director of Undergraduate Studies: Department of Com- puter Science. Member: FCI Founders. Member: Core Curriculum Governing Board (Engineering).

LECTURES The Ubiquitous Kronecker Product. Invited Lecture, SIAM Linear Algebra Meeting, Raleigh NC (October, 2000). Graduate Studies Director Eva Tardos with Professor Johannes Gehrke, and Chairman Charles Van Loan at 2001 graduation ceremony

70 F

aculty and Senior Researcher Biographies PROFESSIONAL ACTIVITIES Stephen A. Vavasis Editorial Boards: Journal of Global Optimization; SIAM Journal Associate Professor Matrix Analysis and Applications; SIAM Review; Math. Program. [email protected] Vice-chair: SIAM Activity Group on Linear Algebra. http://www.cs.cornell.edu/ Referee: SIAM J. Optimization, SIAM J. Matrix An. App., Lin- home/vavasis/ ear Alg. App., Computational Geometry Theory and App.; Ph.D. Stanford University, 1989 Math. Progr.; International Meshing Roundtable; J. Complexity.; NSF Panelist, Numeric, Symbolic and Geo- metric Computing Program.

LECTURES s computer hardware becomes more powerful, Sparse Matrices and Automatic Differentiation in Athere is a corresponding growth in the demand for Semidefinite Programming, International Conference more efficient algorithms to solve large-scale scientific prob- on Advances in Convex Analysis and Global Optimi- lems. My research is on the design and analysis of such zation, Samos, Greece (June 6, 2000). algorithms. Two Ph.D. students, V. Howle and G. Jonsson —. 17th International Symposium on Mathematical Pro- (both of the Center for Applied Mathematics), completed gramming, Atlanta, GA (August 7, 2000). their Ph.D.s working with me during the past year. Howle’s thesis was on algorithms for modeling and simulation of PUBLICATIONS AC electric power networks. Utility companies are inter- “Quality Mesh Generation in Higher Dimensions.” SIAM ested in modeling the behavior of the network in the pres- J. Comput. 29:1334-1370 (2000). With S. A. Mitchell. ence of a fault (closed circuit breaker). The governing equa- “Accurate Solution of Weighted Least Squares by Iterative tions, called the “swing equations,” are nonlinear differ- Methods.” SIAM J. Matrix An. App, 22:1153-1174 ential algebraic equations for the rotor angles of the gen- (2001). With E. Y. Bobrovnikova. erators in the system. We developed new, more accurate algorithms for the swing equations by solving a linear algebraic subproblem (complex-weighted least squares) more accurately. Work on geometry in scientific comput- ing continues. Jonsson’s thesis considers the problem of robust intersection of parametric patches with rays and planes. This problem arises in geometric modeling and mesh generation. Our results show that the problem can be solved accurately by transforming it to a generalized eigenvalue computation using the theory of resultants and other algebraic techniques. Four new students have begun to work with me on other problems in scientific computing. We are looking at the following topics: the effect of domain shape on solu- tion to boundary value problems, nonlinear diffusion equa- tions, mesh generation for moving objects such as a heart, and the protein model-fitting problem of x-ray crystallog- raphy.

UNIVERSITY ACTIVITIES Member: Graduate admissions committee, Applied Math- ematics. Graduate admissions committee, Computer Science. Faculty Senate. University Hearing Board. BOOM 2001 Vice-chair. Computer Science faculty on retreat

71 PROFESSIONAL ACTIVITIES Werner Vogels Steering Committee: Usenix Windows Systems Sympo- Research Associate sium. Program Committee: Usenix 4th Windows Systems Sym- [email protected] posium, IEEE International Conference on Cluster http://www.cs.cornell.edu/vogels Computing—Cluster 2000; 2001 IEEE Symposium on Ingenieur Hogere Informatica, Applications and the Internet; International SRDS Haagse Hogeschool, 1989 Workshop on Dependable System Middleware and Group Communication; Usenix 6th Conference on Object Oriented Tools and Systems (Program Com- mittee); IEEE 2nd Workshop on Internet Applica- tions—WIAPP’01; IFIP/ACM International Conference y research explores the impact of scale on reliable on Distributed Systems Platforms - Middleware 2001. Mdistributed systems. The main focus is on the devel- Program Chair: Distributed Systems Track of 2001IEEE opment of new network protocols and middleware, as well Symposium on Applications and the Internet. as on novel strategies to structure applications and sup- General Chair: IEEE 2nd Workshop on Internet Applica- port systems. tions—WIAPP’01. In the context of the Spinglass project, I am collabo- rating with Ken Birman and Robbert van Renesse on the LECTURES development of a new generation of high-scalable reliable Cluster Computing Made Easy: New Tools for Scalable Serv- network protocols based on the principles of epidemic in- ers and Services.” Invited Lecture, Annual meeting of formation dissemination. Although the research has already Advanced Cluster Computing Consortium (June 2, resulted in protocols for reliable multicast and group mem- 2000). bership and failure detection, there are still many open questions such as the application of epidemic techniques PUBLICATIONS to congestion control for many-to-many multicast proto- “Spinglass, Scalable and Secure Communication Tools for cols. Mission-critical Computing.” Proceeedings of the 2001 In the Galaxy project, the focus is on the distributed DARPA Information Survivability Conference and Ex- systems needs of enterprise cluster computing systems. In hibition – II (June, 2001). With K. Birman, and R. van particular, I investigate the scalability problems that arise Renesse. in these systems and try to provide solutions in a form that “Using Epidemic Techniques for Building Ultra-scalable is directly applicable to current practical problems. Cur- Reliable Communication Systems.” Proceedings of the rently I am looking at the scalable cluster problems from Large Scale Networking Workshop: Research and Prac- three angles: foremost I try to address cluster management tice, Vienna, VA (March, 2001). With K. Birman and R. scaling problems by developing a framework for manag- van Renesse. ing complete cluster farms with many different styles of “An Overview of the Galaxy Management Framework for cluster computing present in the farm. Secondly, I am in- Scalable Enterprise Cluster Computing.” Proceedings vestigating some of the issues that arise when providing of the IEEE International Conference on Cluster Com- support for the development of complex cluster aware ap- puting: Cluster-2000, Chemnitz, Germany (December, plications. Most recently, I have started to address some of 2000). With D. Dumitriu. the more complex cluster system structuring issues such as “Tree-saturation in the AC3 Velocity Cluster Interconnect.” meta-clusters and geographical distributed clusters. Proceedings of the 8th conference on Hot Intercon- I also remain active in the field of high-performance nects, Stanford, CA (August, 2000). With D. Follett, J. cluster communication. In the past, I collaborated with Hsieh, D. Lifka, and D. Stern. Thorsten von Eicken on building high-performance user- level network interfaces, which eventually resulted in the VIA industry standard for user-level network interfaces. More recently, I have started investigating the usage pat- terns of VIA based devices in large-scale clusters, especially with respect to hot-spot control and high-performance flow control.

72 F

aculty and Senior Researcher Biographies Golan Yona atom three-dimensional models for over 160,000 proteins. Assistant Professor AWARDS Burroughs-Welcome Fellowship from the Program in Math- [email protected] ematics and Molecular Biology (PMMB) (1998-2000). http://www.cs.cornell.edu/golan Noted for Excellency in teaching, Faculty of Mathematics Ph.D. Hebrew University, and Natural Sciences, Hebrew University, Jerusalem, Israel (1998 ). Jerusalem, 1999 Faculty of Mathematics and Natural Sciences Research award, Hebrew University, Jerusalem, Israel (1998). Jewish National KKL Foundation Research award (1996). Intel-Dean Prize (1996). y research focuses on computational molecular Mbiology, with an emphasis on developing tools and LECTURES methodologies for large-scale analysis of protein sequences Towards a Complete Map of the Protein Space based on a and structures. Unified Sequence and Structure Analysis of all Known The goal of my research is to explore high-order orga- Proteins. NIH Symposium: From Genes to Proteins to nization within the space of all proteins and obtain a glo- Biological Function, Ithaca, NY (October, 2000). bal view (a “road map”) of the protein space. We hope Towards a Complete Map of the Protein Space based on a that the global view will yield valuable insights about the Unified Sequence and Structure Analysis of all Known nature and function of new genes and will lead to the dis- Proteins. The Eighth International Conference on In- covery of high-level properties and principles in the pro- telligent Systems for Molecular Biology (ISMB), San tein space. Diego, CA (August, 2000). This interdisciplinary research is rooted in two differ- A Unified Sequence-structure Classification of Protein Se- ent disciplines: computer science and molecular biology. quences: Combining Sequence and Structure in a Map Being on the borderline between the two disciplines, this of the Protein Space. Fourth Annual International Con- study is related to fields of intensive research in both. It ference on Computational Molecular Biology incorporates study and development of methods for met- (RECOMB), Tokyo, Japan (April, 2000). ric embedding, unsupervised learning techniques, efficient A Unified Sequence-structure Classification of Protein Se- graph algorithms and parallel applications, and efficient quences: Combining Sequence and Structure in a Map database management. On the computational biology side, of the Protein Space. Quantitative Challenges in the it is involved with development of new algorithms and Post-genomic Sequence Era, San Diego, CA (January, approaches for protein comparison, statistical models of 2000). protein families and study of the mapping from sequences Methodologies for Target Selection in Structural Genomics. to structures. A great emphasis is on developing novel Innovative Computational Applications, San Francisco, machine-learning based techniques, both in the context of CA (October, 1999). the study of the protein space and as general-purpose tools. Modeling Protein Families using Probabilistic Suffix Trees. My study so far has resulted in two large databases Third Annual International Conference on Computa- that are being used by biologists to study new genes: tional Molecular Biology (RECOMB), Lyon, France ProtoMap: this database and its interactive web sites (http:/ (April, 1999). /protomap.cornell.edu and http://protomap.stanford.edu) A Map of the Protein Space—An Automatic Hierarchical are based on a graph-theoretic approach for the large-scale Classification of all Known Proteins. The Sixth Inter- organization of protein sequences. The site offers an auto- national Conference on Intelligent Systems for Mo- matic hierarchical classification of all known protein se- lecular Biology (ISMB), Montreal, Canada (June,1998). quences. It is a useful resource for the analysis of known as well as new protein sequences and for the study of rela- PUBLICATIONS tionships between protein families. “Within the Twilight Zone: A Sensitive Profile-profile Com- BioSpace: This database and its web sites (http:// parison Tool based on Information Theory.” Journal biospace.cornell.edu and http://biospace.stanford.edu) are of Molecular Biology (2001). With M. Levitt. based on a new unified framework for sequence and struc- “Variations on Probabilistic Suffix Trees: Statistical Model- ture analysis. The result of this analysis is a preliminary ing and Prediction of Protein Families. Bioinformatics global map of the protein space. The sites also provide all- 17:23-43 (2001). With G. Bejerano.

73 “Towards a Complete Map of the Protein Space based on a 317, ACM press. With M. Levitt. Unified Sequence and Structure Analysis of All Known “Comparison of Protein Sequences and Practical Database Proteins. In the Proceedings of ISMB 2000, 395-406, Searching. In BioInformatics: Sequence, Structure, and AAAI Press. With M. Levitt. Databanks, edited by D. Higgins and W. Taylor. Oxford “A New Nonparametric Pairwise Clustering Algorithm University Press (2000). With S. Brenner. based on Iterative Estimation of Distance Profiles. Ma- chine Learning (2001). With S. Dubnov, R. El-Yaniv, Y. Gdalyahu, E. Schneidman, and N. Tishby. LANDMARK PUBLICATIONS “Methodologies for Target Selection in Structural Genomics. “ProtoMap: Automatic Classification of Protein Sequences, Progress in Biophysical and Molecular Biology 73:297-320 a Hierarchy of Protein Families, and Local Maps of the (2000). With M. Linial. Protein Space. Proteins: Structure, Function and Genetics “A Unified Sequence-structure Classification of Protein Se- 37:360-378 (1999). With N. Linial, and M. Linial. quences: Combining Sequence and Structure in a Map “Global Self-organization of All Known Protein Sequences of the Protein Space. Proceedings of RECOMB 2000, 308- Reveals Inherent Biological Signatures. Journal of Mo- lecular Biology 268:539-556 (1997). With M. Linial, N, Linial, and N. Tishby.

PUBLICATIONS Ramin Zabih “Visual Correspondence with Occlusions via Graph Cuts.” Associate Professor Proc. International Conference on Computer Vision (ICCV) (July, 2001). With Vladimir Kolmogorov. [email protected] “An Efficient Real-time Navigator Algorithm: Motion Or- http://www.cs.cornell.edu/rdz/ ganized Simultaneous Acquisition with Interactive Ph.D. Stanford University, 1994 Control (MOSAIC).” Proc. IEEE Conference on Medi- cal Imaging and Augmented Reality, Hong Kong (June, 2001). With Vladimir Kolmogorov, Yi Wang, Richard Watts, and Martin Prince. “Exact Voxel Occupancy with Graph Cuts.” Proc. IEEE Conference on Computer Vision and Pattern Recog- y research interests lie in computer vision and in nition (CVPR) (2000). With Dan Snow, and Paul Mmedical imaging. I have worked on a variety of prob- Viola. lems in early vision, including motion and stereo; many of these problems can be solved very accurately using algo- LANDMARK PUBLICATIONS rithms based on graph cuts. In the last year I have been “Color-spatial Indexing and Applications.” International doing research on medical imaging in the Radiology De- Journal of Computer Vision 35(3) (1999). With Jing partment at Cornell Medical School, where I have focused Huang, S. Ravi Kumar, Mandar Mitra, and Wei-Jing on improving the quality of MRIs. I have also investigated Zhu. a number of applications of computer vision, including “Fast Approximate Energy Minimization via Graph Cuts.” new methods for content-based access to databases of im- Proc. International Conference on Computer Vision ages, and have also developed some simple computer vi- (ICCV) (1999). With Yuri Boykov, and Olga Veksler. sion techniques to automate program debugging at “Markov Random Fields with Efficient Approximations.” Microsoft. Proc. IEEE Conference on Computer Vision and Pat- tern Recognition (CVPR) (1998). With Yuri Boykov, LECTURES and Olga Veksler. Fast Approximate Energy Minimization via Graph Cuts. “A Variable Window Approach to Early Vision.” IEEE Trans- University of Washington CS Colloquium (January, actions on Pattern Analysis and Machine Intelligence 2001). 20(12) (1998). With Yuri Boykov, and Olga Veksler.

74

CS Highlights ○○○○○○○○○○○○○○○ Bits On Our Mind (BOOM) 2001 ○○○○○○○○○○○○○○○○○○○○○○○○○○○

The following article was written by Melissa Globerman for tage of a campus pilot project in wireless networking for the Cornell Chronicle. BOOM 2001 was co-sponsored by ECE. which eight buildings have been equipped with wireless transceivers, the students created an interactive messaging n February 28, BOOM (Bits On Our Mind) 2001 came and mapping program. Using a personal digital assistant Oto the Engineering Quad for the fourth year, and the (PDA) with a global positioning system receiver attached, rumble could be felt strongly on three stories of Upson Hall. visitors can take a self-guided tour of the campus. Forty-seven computer science–related exhibits highlighted The PDA, which visitors will be able to rent at Day Hall, student talent from across the university to show current uses GPS to determine the user’s location and then makes a research and new applications in digital technology. Projects beeping sound to alert them when information related to ran the gamut from an instrument to transmit images of that location is available. “But what’s cool about this pro- Mars in color for NASA’s Athena mission, scheduled to gram is that it creates social maps, so the user can then type launch in 2003, to an artificial intelligence prototype robot in what they think about each of the various spots, rate them, named Max, whose motor control is directed from the par- and other users can then see those results,” said Jenna Burrell, allel port of an on-board laptop computer. a senior in computer science and one of the exhibit’s cre- BOOM is a showcase of creativity from undergraduates ators. and graduate students’ work from engineering, fine arts, Other better known projects on campus also debuted psychology, space sciences, and—of course—computer sci- their latest research. Members of Cornell’s RoboCup team ence. “Every year, we’ve become more interdisciplinary, but gave demonstrations of how their new omni-directional bots that’s also because the interest in the event has grown tre- were able to capture their second robot soccer world cham- mendously all over campus,” said Charles Van Loan, chair pionship title in Melbourne, Australia last summer. of the Department of Computer Science. The Cornell Hybrid Electric Vehicle team displayed photos Two benefactors, alumnus Philip Young ’62, B.M.E. ’63, of their most recent gem: the 2000 Chevrolet Suburban that and the Microsoft Corporation, donated approximately they’ve converted to use a large battery pack as its energy $9,000 to the event to add swanky catering to the ambience storage buffer. The team, in its eighth year of competition, and free t-shirts for the participants. Though Van Loan said is almost ready for their second Future Truck competition. it would be impossible to guess how many of the projects Also, undergraduates from the Sibley School of Me- were already being developed for commercial production, chanical and Aerospace Engineering displayed the scouts from corporations were invited to mingle with the moonbuggy that they are readying for a NASA competition students and browse their projects. in Huntsville, Alabama this spring. A team of eight students One project that garnered interest at the event will un- constructed the vehicle—a four-wheel drive bicycle—for doubtedly get more attention on East Hill later this spring. NASA’s simulated lunar crater racing course. Junior Brett Lee Three computer science undergraduates, working with the explained that while the moonbuggy itself doesn’t appear Human Computer Interaction research group in the De- to be a digital technology project, the steering and suspen- partment of Communications, have created a Cornell cam- sion geometry necessary to create its most essential parts pus tour guide that fits in the palm of a hand. Taking advan- are assuredly “the products of high tech computer design and programs.” Whether the project is about designing an on-line coursework submission system, creating a program to in- struct a computer to teach itself to play backgammon or checkers, or designing software to recognize human facial expressions, “this kind of forum gives the students a great opportunity to explain what it is they did and also get feed- back on their work,” said BOOM faculty advisor and asso- ciate professor of computer science Stephen Vavasis. Learning opportunities notwithstanding, for partici- pants and observers alike, BOOM was a blast of entertain- ment and a resounding success.

President Hunter R. Rawlings and students at BOOM 01

75

Corporate Interactions ○○○○○○○○○○○○ Corporate Partnerships and Affiliations ○○○○○○○○○○○○○○○○○○○○○○○○○

he department’s Corporate Partnerships and Affiliates gies, IBM, McGraw Hill, and Sun Microsystems. GTE con- Tprograms support research collaborations and interac- tinued its support of the department’s initiative in informa- tions with internationally respected scientists on a number tion technology with a five-year grant to support new fac- of levels. Our programs are also designed to support edu- ulty hires in this strategic area. Lockheed Martin provided cation of our undergraduate and graduate students. The support to the undergraduate and Ph.D. programs. Sun department offers opportunities for interaction and the sup- Microsystems made generous donations of equipment to port of education in such vital areas as: the department. Lucent Technologies donated funds for a fellowship for Professor Jon Kleinberg’s graduate student artificial intelligence Amit Kumar. bio-informatics Professor Johanne Gehrke continues to receive support computational methods for mechanical design and from several companies for his research in new data-min- simulation ing techniques. He received support from McGraw Hill to computational molecular biology develop teaching materials and from Mastercard Corp. in digital libraries support of his work in e-commerce. IBM gave professor distributed computing and fault tolerance Gehrke a Faculty Partnership award. Microsoft also awarded formal specification and verification methodologies him $50,000 in support of his efforts in Online Data-min- graphics ing Operators and to facilitate and foster collaboration be- information technology tween his research group and its Bay Area Research Center. natural language, document classification, and re- Professor E. Gun Sirer received funding from several trieval sources to support his teaching and research efforts. networking databases Microsoft contributed equipment valued at $20,000 to parallel computing be used for class projects by students in the spring 2001 programming languages CS414/415 course. In addition, Microsoft has commit- programming logics ted to three years of support for his research in Assuring remote collaboration technologies the Security of Components in the .NET Framework. scientific and numerical computing Intel provided major funding to the department for re- security search and instruction. Gifts included $55,800 to fund a supercomputing (through affiliation with CTC) Graduate Fellowship for the academic year awarded to theoretical computer science Stephanie Weirich, $2551 awarded to Professor Fred vision and image interpretation Schneider for equipment in support of his research in se- cure Information Assurance native code and $152,000 in Our Corporate Partnership program fosters strategic rela- equipment from Intel’s Technology for Education 2000 tionships with major sponsors of the department’s activi- grant. ties. Corporate Partners are invited to participate directly in Microsoft continued its generous support for research, the technology development process, through on-campus instruction, and general support. Gifts included $75,000 to representation, short term and extended visits, and consult- Werner Vogels’s research in scalable enterprise cluster com- ing arrangements. Additional opportunities include access puting and to facilitate and foster collaboration between to technical reports, colloquia, seminars, the department’s his group and its Bay Area Research Center. Microsoft also annual report, and resumes submitted by BA, BS, MEng, supported our migration to Win2000 and our student tech- and Ph.D. candidates expecting to graduate. Our Corpo- nology demonstration day, BOOM, with gifts totaling rate Affiliates program offers small companies many flex- $42,000. In addition, it made gifts of Microsoft Office XP ible arrangements to interact with our faculty and students. Professional software valued at more than $359,000. Such arrangements are designed on an individual basis to suit the goals of the companies and the department. Department of Computer Science faculty and research- ers continue to collaborate with corporate partners: Microsoft, Intel, GTE, Lockheed Martin, Lucent Technolo-

76

Corporate Interactions ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Industrial Partners ○○○○○○○○○○○○○○○○○○○

AT&T Inquiries about corporate partnerships and affiliations may Hewlett Packard be addressed to: IBM Corporation Intel Corporation Marcy E. Rosenkrantz, Coordinator of Corporate Relations Lockheed Martin Department of Computer Science Microsoft 4114 Upson Hall Sun Microsystems Cornell University Verizon Ithaca, NY 14853-7501 Telephone: (607) 255-9197 / Fax: (607) 255-4428 These industrial partnerships are recognized as a vital part email: [email protected] of life in this department. We remain grateful for their on-

going support of our research and instructional activities. ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Corporate Gifts and Grants ○○○○○

he department is grateful for the support, including Tequipment and software, provided by our industrial partners.

Air Products & Chemicals $2,500 Battery Management Corporation 1,000 Green Hills Software 1,800 IBM 40,000 Intel Corporation 58,351 Lockheed Martin 15,000 Lucent Technologies 45,000 McGraw Hill 11,000 Microsoft 551,400 Teradyne, Inc. 1,000 Verizon/GTE 50,000

The department is grateful for gifts from the following individuals:

Mary Salton, a gift of $5000 for the Gerald Salton Reading Room in Upson Hall

Phillip Young, a gift of $1000 to support BOOM, our student technology showcase. University President Hunter Rawlings and CS students view the moonbuggy project at Boom 01. The Office of Computing and Information Science wishes to acknowledge support from the following corporate partners:

Intel $200,000 MasterCard International 77,114

77 Alumni and External Relations

his year marked a significant turning point in the his- is called BOOM, was held in February, and featured 47 Ttory of alumni relations for computer science and com- project presentations by students from Cornell. (See page puting related fields at Cornell. Alumni are networking in 74 for more on BOOM 2001.) record numbers, and many have become actively involved Nikola Valerjev ‘96 was again instrumental in obtain- with Cornell’s efforts to support the development of Com- ing sponsorship from his company, Green Hills Software, puter and Information Science across a wide range of disci- for two Cornell programming teams to represent Cornell in plines. the ACM Programming contests during the fall and spring Successful events were held in Boston and Palo Alto, semesters. which primarily included large gatherings of alumni and The Degenfelder Family Scholarship was awarded friends of the Department of Computer Science. The Bos- to Marla Leahy ‘02. It awards $5,000 to a student working ton event was a sponsored dinner hosted by the Dean of at the boundary between computer science and biology. Jo- CIS, Robert L. Constable. Nearly three dozen alumni and seph R. Degenfelder ’60 and his wife Dr. Pauline friends attended. Corporate gifts were facilitated by Neeraj Degenfelder ’61 worked with Professor Ron Elber to estab- Agrawal ‘95 of Battery Management Corporation and Dan lish an endowment for this special award. Proskauer ‘90 of Teradyne. Mary Salton, the wife of the late Professor Gerard In Palo Alto over 50 alumni and friends attended an Salton, made a generous gift to establish the Professor Gerard evening mixer that included Professor Dan Huttenlocher Salton Seminar and Reading Room. Gerry’s ground- break- and Charles Weiss ‘66 of Oracle (pictured below). Not only ing research in information retrieval helped to found the are these folks on the West Coast doing well, in spite of current broad field of Information Science. The Department of Computer Science is pleased to honor his contribution. The Salton Reading Room, located on the 5th floor of Upson Hall, was dedicated in a ceremony on April 18th, 2001. In attendance to honor the event were Mrs. Mary Salton, wife of the late Professor Salton, and members of his family, as well as a number of friends and colleagues. Professor Edgar Rosenberg gave a moving tribute to the late professor, as did Professor Juris Hartmanis and Dean Robert Constable. The ceremonies ended with the cutting of the ribbon, by Chair- man Charles Van Loan. For more information about alumni or external rela- tions in CIS or the Department of Computer Science, please contact Dan Jenkins at [email protected].

Charles Weiss ‘66 of Oracle and Professor Dan Huttenlocher. fluctuations in the market, they have an infectious optimism and justifiable excitement about things that are yet to come. At this year’s alumni reunion breakfast in June, alumni and guests joined Computer Science Department Chair- man Charlie Van Loan, and CIS Dean, Robert Constable. Among those attending was George Joblove ’76, MS ‘79, special effects wizard and now senior vice president of tech- nology at Sony Pictures Imageworks. Cornell alum Philip Young ‘62 made a substantial gift to support this year’s student technology fair. The fair, which The late Gerard Salton.

78 Educational Statistics

Educational Statistics ○○○○○○○○○○○○○○○○○○○○○○○○○ Undergraduate Courses ○○○○○○○○○○○○○○○○○○○○○○

COURSE NUMBER, TITLE, FALL 2000 SPRING 2001 TOTAL AND CREDIT HOURS INSTRUCTOR STUD. HOURS INSTRUCTOR STUD. HOURS STUD. HOURS

099 Fund Prog Concepts - 2 Schwartz 33 66 33 66 100m Intro to Computer Prog. - 4 Schwartz 191 764 Yan 195 780 386 1544 100j Intro to Computer Prog. - 4 Teitelbaum 298 1192 Schwartz 196 784 494 1976 101 Intro to Cog. Science - 4 Spivey 10 40 10 40 113 Introduction to C -1 Vetsikas 32 32 Chen 31 31 63 63 114 Unix Tools - 1 Nogin 83 83 Holland-Minkley 57 57 140 140 130 Creating Web Doc. -3 Bailey 244 732 244 732 150 Gt. Ideas fr Comp Sci -1 Bailey/VanLoan 82 82 82 82 201 Cog Sci in Context - 4 B. Halpern 2 8 2 8 202 Transition to Java -1 Ezick 20 20 Marques 21 21 41 41 211 Comp & Prog - 3 Chew 285 855 Bailey 270 810 555 1665 213 C++ Programming - 2 Dinapoli 44 88 Dinapoli 36 72 80 160 221 Num. Mthds in CMB - 3 Elber 9 27 9 27 222 Intro Sci Computation - 3 Vavasis 198 594 198 594 230 Intermed Web Design - 3 Bailey 37 111 37 111 280 Discrete Structure - 4 Kleinberg 211 844 Artemov 167 668 378 1512 312 S & I of Comp Prog 4 Morrisett 107 428 Morrisett 116 464 223 892 314 Intro to DS& CO - 4 Yan 91 364 Manohar 149 596 240 960 381 Intro to Thry of Comp - 4 Artemov 153 612 153 612 409 Data Struct & Alg - 4 Halpern 15 60 15 60 411 Prog. Lang. & Logics - 4 Demers 28 112 28 112 412 Intr to Compilers & Trans - 3 Myers 32 96 32 96 413 Pract in Compilers & Trans-2 Myers 31 62 31 62 414 Sys Prog & Oper Sys - 3 Mosse 242 726 Sirer 64 192 306 918 415 Pract in Oper Sys - 2 Mosse 60 120 Sirer 65 130 125 250 417 Computer Graphics - 3 Greenberg 109 327 109 327 418 Pract Comp Graphics-2 Bala 82 164 82 164 421 Numerical Analysis -4 Vavasis 25 100 25 100 424 Comp Linguistics- 4 Rooth 5 20 5 20 430 Info Discovery -3 Arms 73 219 73 219 432 Intro Database Sys-3 Gehrke 141 423 141 423 433 Pract Database Sys -2 Gehrke 93 186 93 186 472 Foundations of AI -3 Cardie 130 390 130 390 473 Practicum in AI -2 Cardie 56 112 56 112 474 Intro Nat Lang Proc -4 Rooth 16 64 16 64 478 Machine Learning - 3 Yona 56 168 56 168 481 Intro. Thry Comp – Hnrs-4 Lee 37 148 37 148 482 Intro Analy of Alg -4 Tardos 220 880 220 880 483 Quantum Info Proc -2 Mermin 16 32 16 32 486 Applied Logic-4 Constable 16 64 16 64 490 Indp Study 1-4 Staff 30 99 Staff 38 126 68 225

Totals for Undergraduate Courses: 2,725 8,573 2,324 7,674 5,048 16,245

79 ○○○○○○○○○○○○○○○○○○○○○○ Graduate Courses ○○○○○○○○○○○○○○○○○○○○○○○○○○○○

COURSE NUMBER, TITLE, FALL 2000 SPRING 2001 TOTAL AND CREDIT HOURS INSTRUCTOR STUD. HOURS INSTRUCTOR STUD. HOURS STUD. HOURS

501 Softw Engr: Technol. & Technq -4 Arms 77 308 77 308 502 Comp.Methds for Dig Lib - 3 van de Smpl 30 90 30 90 504 App Sys Engineering I -3 Staff 5 15 5 15 514 Inter Comp Sys-4 Birman 54 216 54 216 515 Pract in Systems- 3 Bailey 29 87 29 87 517Adv Computer Graphics - 3 Greenberg 21 63 21 63 522 Comp Tools & Methds for Fin -4 Li 33 132 33 132 574 Heuristic Methds for Opti -4 Shmkr/Slmn 42 168 42 168 611Adv Programming Languages - 4 Myers 43 172 43 172 612 Comp Des for High-Perf Arch -4 Stodghill 12 48 12 48 614 Advanced Systems - 4 Birman 28 112 28 112 621 Matrix Computations -4 VanLoan 31 124 31 124 622 Num Optim. & Nonlinear Eq -4 Coleman 26 104 26 104 626 Comp Mol Bio -4 Elber 18 72 18 72 632 Adv Database Systems -4 Gehrke 21 84 21 84 671 Intro to Automated Reasoning -4 Constable 5 20 5 20 672 Adv Artificial Intelligence 4 Selman 43 172 43 172 676 Reasoning About Knowledge -4 Halpern 25 100 25 100 681 Analy of Algorithms-4 Kleinberg 43 172 43 172 682 Theory of Computing -3 Hartmanis 25 100 25 100 683 Adv. Des & Analy of Algor - 4 Kleinberg 36 144 36 144 686 Logics of Programs - 4 Kozen 15 60 15 60 709 Computer Sci Colloq-1 Staff 91 91 Staff 87 87 178 178 713Topics in Cryptography -2 Bailey 23 46 23 46 715 Seminar on PRL -4 Constable 9 36 Constable 9 36 18 72 721 Topics in Numerical Analysis- 2 Vavasis 3 6 3 6 726 Prob & Persp in Comp Mol Biol-1 Elber 10 10 Elber 9 9 19 19 732 Seminar in Data Mining -4 Gehrke 8 32 Gehrke 11 44 19 76 734 Seminar in Replicated Data -4 Demers 8 32 8 32 754 Systems Research Seminar -1 Vogels 13 13 Vogels 12 12 25 25 772 Seminar in AI -4 Selman 12 48 Selman 8 32 20 80 773 Proseminar in Cog Studies I -4 Cardie 2 8 2 8 774 Proseminar in Cog Studies II - 4 Cardie 1414 775 Seminar in Nat. Lang Underst-2 Lee 1 2 Lee 6 12 7 14 789 Sem in Thry of Algor & Com -4 Tardos 23 92 Tardos 20 80 43 172 790 Independent Rsch-var 15 Staff 98 590 Staff 78 453 176 1043 990 Doctoral Research -var 15 Staff 32 440 Staff 31 448 63 888

Totals for Graduate Courses: 614 2,596 653 2,636 1,268 4,954 Grand Total: 3,339 11,169 2,976 10,308 6,316 21,199

80 Educational Statistics

Degrees Granted Scott Anthony Mardis MAY 2001 Chair: Claire Cardie Wei Tsang Ooi Doctor of Philosophy Members: Molly Diesing, Richard Chair: Brian Smith Zippel Members: Robbert van Renesse, AUGUST 2000 Title: Partial Parsing for Linguistic Rela- Zygmunt Haas Eric G. Aaron tionship Identification Title: Design and Implementation of Dis- Chair: David Gries tributed Programmable Media Gateway Members: Robert Constable, Michael Vijay S. Menon Services Spivey-Knowlton, Anil Nerode Chair: Keshav Pingali Title: Tactic-based Modeling of Cognitive Members: Gregory Morrisett, Thomas Adam Florence Interference on Logically Structured Nota- Coleman Chair: Charles Van Loan tion Title: Symbolic Compilation Techniques Members: Steve Vavasis, Tim Healey for Array Computations Title: Computational Multilinear Algebra Marcos Kawazoe Aguilera Chair: Sam Toueg JANUARY 2001 Ozan Hafizogularri Members: Joseph Halpern, Michael Jason Jonathan Hickey Chair: Robert Constable Stillman Chair: Robert Constable Members: Greg Morrisett, Rebecca Title: Broadening the Applicability of Fail- Members: Dexter Kozen, Roberto Harris-Warrick ure Detectors Bertoia Title: A Typed Framework for Program Title: The MetaPRL Logical Programming Analysis Nawaaz Ahmed Environment Chair: Keshav Pingali Nicholas Howe Members: Ramin Zabih, Adam Xiaoming Liu Chair: Daniel Huttelocher Bojanczyk, Joyce Morgenroth Chair: Robbert van Renesse Members: Claire Cardie, Michael Title: Locality Enhancement of Imperfectly- Members: Kenneth Birman, Zygmunt Spivey Knowlton nested Loop Nests Haas Title: Analysis and Representations for Title: Building High-performance Adap- Automatic Comparison, Classification, and Daniel G. Brown tive Communication Systems from Com- Retrieval of Digital Images Chair: David Shmoys ponents Members: Michael Todd, L. Paul Chew, Jia Wang Ron Elber Lili Qiu Chair: Robbert van Renesse Title: Algorithmic Methods in Genetic Chair: Robbert van Renesse Members: Zygmunt Haas, Srinivasan Mapping Members: Kenneth Birman, Zygmunt Keshav, Balachander Krishnomurthy Haas Title: Network Aware Client Clustering Christopher Kirk Hawblitzel Title: An Integrated Approach to Improv- and Applications Chair: Thorston von Eicken ing Web Performance Members: Gregory Morrisett, James Yin Zhang Sethna David Patrick Walker Chair: Robbert van Renesse Title: Adding Operating System Structure Chair: Greg Morrisett Members: Sam Toueg, Zygmunt Haas, to Language-based Protection Members: Dexter Kozen, Barbara Vern Paxon Correll Title: Measurements and Analysis of End- Scott Burten Hunter Title: Typed Memory Management to-End Internet Performance Chair: Devika Subramanian Members: David Gries, Carol Zhen Xiao Lidong Zhou Krumhansl Chair: Ken Birman Chair: Fred Schneider Title: Safety Markov Decision Processes: Members: Zygmunt Haas, Joseph Members: Zygmunt Haas, Robbert van Their Solution and Application to Agent Halpern Renesse Design Title: Efficient Error Recovery for Reliable Title: Towards Fault-tolerant and Secure Multicast On-line Services Vera Maria Kettnaker Chair: Ramin Zabih Members: Daniel Huttelocher, Henry Shue Title: Stochastic Models for the Analysis of Traffic Video

81 MS Special Degrees Conferred Sean Byrnes Bachelor of Arts Kuan-Yuan Chang AUGUST 2000 Steve Chow AUGUST 2000 Rie Ando Brian Cody Mark Stephen Gately Chair: Lillian Lee Aditya Dada Wei Jing Guo Pantaleo de Candia Eric Pohan Lee Stephan Arthur Zdancewic Valeriy Elbert Alexander Rakhlin Chair: Andrew Myers Michael Frei Vadim Grinshpun JANUARY 2001 JANUARY 2001 Daniel Hecht Anit Agarwal Benjamin Atkin Ernie Ho Jian-Ning Janet Cheng Chair: Ken Birman Ranjita Jain Naveen Joshi Ju Joh Mikhail Kobyakov Eliyahu Barzilay Hyunjong Kang Nadine Latief Chair: Robert Constable Danquing Kong Eric Michael Strong Hsiang-Hao Kung Matthew D. Fleming Allen Lamb MAY 2001 Chair: Ken Birman Lingling Li Gregory Brian Artzt Andrew Lin Krista Bendig Amit Kumar Chien-Chih Liu Yuriy Berkovich Chair: Jon Kleinberg Nidhi Loyalka Jenna R. Burrell Shyam Maniyedath Christopher Capobianco Brian A. Meloon Omar Mehmood Ruggiero Cavallo II Chair: J. Guckenheimer Derek Messie Shaun E. Chandran Eric Milkie William M. Chang MEng Degrees Ashish Motivala Christopher Hans Chattaway Travis Ortogero Gregory Laurence Clinton AUGUST 2000 Li-wen Peng Fabiano Baroni Desouza Roman Lobkovsky Paradee Phempoonpanich Vladimir Alexandrovitch Dizhoor Rui Wang Joshua Pollak Alexander Druyan Michael Priscott Christina Nichole Dulitz JANUARY 2001 Damien Raymond Steven John Engelbrecht Gaurav Agarwal Jason Rohrer Robert D. Flint Douglas Burdick David Rollenhagen Roger Houng Chiu Fong Zhengyu Chen Thibet Rungrotkitiyot Russell Douglas Greene Lizbeth Henson Daniel Ryazansky Rama C. Hoetzlein Alex Holub Shrinivas Samant Jason James Hofmann Chin-yu Hsu Eric Strong Serena Kohli Joe Huang Sung-hsun Su Alexander Kordun Jangwoo Kim Yu-Ju Tu Simon Garrett Lang Yi Lin David Wang Jennifer Anne Lazo Lori Lorigo Anthony Watkins Mon Jed Liu Brian Morgan Xiang Xie Ayan Kanti Mandal Benjamin Newton Yukiko Yamashita Edward Munandar Priya Rajan Donghui Yan Lyn Mien Ngooi Charles Shagong Hsien-Lung Yang Jeffrey Michael Pine Michael Shapiro Puze Yang Nikita O. Proskourine Anup Tamakuwala Jinghao Zhang Mahmood Reza Jasjeet Thind Jingming Zhang Bernard Lee Rissmiller Ngoclan Vu Qinghong Zhang Ivan David Rosero Ying Zheng Vedran Rozic MAY 2001 Wenjie Zhong Maria Kasiani Sammut Andre Allavena Xiaozheng Zhong Alexandre Saverin Andy Ang Maxim Zolotov Samuel R. Scarano Ali Anvari David G. Seah David Allen Shepperton

82 Degrees Granted

STUDENT DATA Wazila Z. Shikari Dmitriy Berman Miroslaw Robert Mlot Joel James Skaliotis Carson Grey Bloomberg Michael David Morse Jared Tolman Brandon Roy Bray Stewart Muñoz Jeffrey M. Umetsu Christopher Robert Bray Bernard Francis Murphy III Gilberto Rivera Vasquez John H. Bull William Curtis Neff Amanda Marie Waack Donald Chai Jill K. Newman Raymond James Wenderlich Waiki Chan Gennady Nurik Richard Ryan Williams George Weikang Chang Katherine Leigh Oliver Ben Wong Jesse Che-Chai Chang Dmitriy Patek John D. Woschinko John B. Chen Joseph Robert Polastre Mikhail Alexeivich Zatsman King Lun Choi Daniel Scott Rabinovitz Jennifer Irene Chou Nathan Mathias Ramsey Bachelor of Science Andy Yu-An Chu Benjamin Andrew Ransford Andrew Chung Andrew Kamron Rostami AUGUST 2000 Regina Ruby Lee Clewlow Patrick Brigham Ryan William David Alonso Brian Patrick Comerford Ahmad Saeed Herman Chen Robert Michael Cronin James David Sampey John David Martinez Garza James A.F. Curcio Robert C. Scanlon Pratik Joshi Andrew Charles Cushman David Gerard Seah James Cremer Landis Aparna Das Kevin Yin-Sin Seng Victor Y. Liu Brian G. Dekorte Nikesh Keshav Shah Kun Shing Luk David Michael Feldman Piyanuch Silapachote Ankush Sahai Michael Edwin Fettner Nigel Adrian Singh Mohan Sarovar Daniel J. Flaccavento John Tam Daniel J. Gagne Jeremy Russell Tavan JANUARY 2001 Aaron M. Gerlich John D. Tennant Tareq Nisar Aryne Rachel Eleanor Green Charitha Tillekeratne Michael John Cirello Cynthia Alexandra Greene Fu Wah Ting Jeffrey Michael Derstadt Wei Gu Hung Viet Tran Valeriy Elbert Matthew Thomas Harren Schaun Lamont Valdovinos Ilia Gimelfarb David W. Hays Robert William Van Wicklen Sunny R. Gleason Abraham Samuel Heifets Evangelos Vergetis Daniel Michael Hecht Jeremy Chung-Kee Ho Grant Jenhorn Wang Igor Kats Jeffrey Robert Hoy Brian M. Weisberg Chun Ho Leo Ku Sandra Lynn Jablonka Devon Michael Welles Nidhi Loyalka Prasant Yedithi Jagannath Mike Chia-Cheng Wey Jason A. Satran David Nai-Heng Kang Jonathan J. Wicks Paras Hemant Shelawala Kay Tiong Khoo Ian Thomas Withrow Traian Iavorov Stanev Theodore Won-Hyung Kim William Robert Wolfrom Matthew Scott Taylor Aleksey Kliger Sergio Wong Clyde Shi Ming Tsai Joseph Kong David W. Wu Allen Weipong Wang Patrick Ian Kongsilp Victoria Yampolsky David S. Weil Adam David Krauszer Judy Chao-Rong Yiu Brian Wesley Williams Jeremy Martin Kubica Dennis C. Yueh Stephen Kai-Tung Yam Joshua Ben Kulkin Tal M. Ziv Tomi Yiu Jay S. Kumar Chee Yong Lee MAY 2001 Minsu Lee Michael Sitrin Adams Sze Ern Dawn Lee Jason William Adaska James C. Lu Anish Aggarwal Christopher Michael Mancuso Saif Reza Ahmed Robert Anthony Maskaron Joseph Robert Aliperti Eric Robert Mauskopf Chirag Rajnikant Amin Kyle George McKenna Thomas Jack Babinski Andrew Lawrence Mehler Megha Batra Raj B. Merchant

83

Awards ○○○○○○○○○○○○○○○○○○○○○○○○ Faculty Awards ○○○○○○○○○○○○○○○○○○○○○○○○○○○○

GRAEME BAILEY JON KLEINBERG Kenneth A. Goldman ’71 Excellence in Teaching Award National Academy of Sciences Award for Initiatives in Re- (2000). search (2001). This prize recognizes innovative young ACSU Faculty of the Year (1999-2000). scientists to encourage research likely to lead toward new capabilities for human benefit. KEN BIRMAN David and Lucile Packard Foundation Fellowship(1999- Stephen ’57 and Marilyn Miles Excellence in Teaching Award 2004). (2000). ONR Young Investigator Award (1999-2002). NSF Faculty Early Career Development Award(1997-2001). JOHANNES GEHRKE Engineering Teaching Award, Cornell (2001). DEXTER KOZEN IBM Faculty Development Award, College of Engineering Stephen and Margery Russell Distinguished Teaching (2000, 2001). Award, College of Arts and Sciences, Cornell (2001). James and Mary Tien Excellence in Teaching Award (2000). RAJIT MANOHAR Sonny Yau ’72 Excellence in Teaching Award (2000-2001). IEEE Teacher of the Year Award (2000-2001). NSF Faculty Early Career Development Award (2000-2004).

GREG MORRISETT Engineering Teaching Award, Cornell (2001). Allen Newell Medal for Research Excellence (2001). Ralph Watts Excellence in Teaching Award (2001). Presidential Early Career Award for Scientists and Engineers (2000).

FRED B. SCHNEIDER Daniel M. Lazar Excellence in Teaching Award (2000). Award recipients Johannes Gehrke, Bart Selman, Juris Professor-at-Large, University of Tromsoe, Tromsoe, Nor- Hartmanis, Dexter Kozen, Eva Tardos, Joe Halpern, and Greg way (1996-2004). Morrisett.

ZYGMUNT J. HAAS Michael Tien’72 Award, Cornell College of Engineering. Excellence in Teaching Award (September, 2000).

JOSEPH HALPERN Guggenheim Fellowship (2001-02) to be spent in Israel. Fulbright Scholar (2001-02).

JURIS HARTMANIS Lielo Medalu, Latvian Academy of Sciences. This is the high- est Medal of Honor the Academy conveys. Engineering Teaching Award, Cornell (2001). Computing Research Association Distinguished Service Award (2000). Award recipients Bart Selman, Jon Kleinberg, Greg Morrisett, Carla Gomes, Claire Cardie, and Ramin Zabih

84 Aw GOLAN YONA BART SELMAN ards Fellow: American Association for Artificial Intelligence. 1998-2000 Burroughs-Welcome Fellowship from the Pro- NSF Faculty Early Career Development Award (1998-2002). gram in Mathematics and Molecular Biology (PMMB).

EVA TARDOS Elected to the American Academy of Arts and Sciences (2001) for her contributions to the design of effi- cient algorithms. Faculty of the Year , 2000-2001.

Student Awards ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

Jonathan Marx Senior Prizes were awarded to Joseph R. ernment service of U.S. Sen. Barry Goldwater and to foster Aliperti and Joseph Robert Polastre. These prizes rec- and encourage excellence in mathematics, science and en- ognize outgoing and energetic students who are commu- gineering. Vinocur is applying to medical school and, in nity minded. The Alan Marx Teaching Award was given addition, hopes to earn his master’s or doctorate and then to Brandon Roy Bray for excellence in the support of pursue a career in research and clinical medicine, making undergraduate teaching. The Marx senior awards are pro- use of his computer science education. At Cornell, he worked vided in memory of Jonathan Marx ’85 and his father under Gregory Morrisett, professor of Computer Science, Alan Marx, JD ’61. on type-safe programming languages, with the goal of pro- The Computer Science Prize for Academic Excellence viding a framework for designing crash-proof computers. was given to Richard Ryan Williams. This award, given an- He also has worked in the Neonatal-Physiology Research nually at graduation, recognizes a student who has achieved Laboratory at the MCP Hahnemann University School of excellence in academics, promise in the area of research Medicine in Philadelphia, investigating the biochemical (typically, published work), and a commitment to the mechanisms of injury to the developing brain. He will be field of computer science in terms of teaching and/or presenting an abstract on his research at the Pediatric Aca- other leadership activities. demic Societies’ 2001 annual meeting in Baltimore later this The following undergraduates were recognized for their month. outstanding contributions as course consultants and under- Computer Science undergraduate Marla Leahy ’02 was graduate teaching assistants: Brandon Bray, Young Cho, awarded the Degenfelder Family Scholarship for academic Bobby Chow, Rob Cronin, Ben Mathew, Doug year 2000-2001. This award, part of the Scholarship Chal- Mitarotonda, Joe Polastre, Praveen Rajasethupathy. lenge Campaign (Challenge 4 Campaign), will be awarded The Lockheed Martin Awards for Outstanding to a student in the Computational Biology concentration Achievement and Academic Service were awarded to: in academic year 2001-2002. Christian Hescock, Benedict Viglietta, Salman Arif, Cornell’s Big Red team won its second consecutive William Liu, and Steven Baker. Among the selection championship in the fourth annual RoboCup tournament. criteria were academic achievement, research accomplish- Held in Melbourne Australia earlier this year, the Small Ro- ments, and/or service to the teaching mission of the De- bots competition featured 23 international teams. Accord- partment of Computer Science. ing to the team’s advisor, Professor Raffaello D’Andrea, new Jeremy Kubica, Engineering Class of 2001, was named innovations in robot design and AI contributed to improved a Merrill Presidential Scholar. Recognizing the top 1 per- maneuverability and control. Student team members were cent of each graduating class at Cornell, nominees were Bryan Audiffred ’00. Michael Babish ’99, Tobias Welge- asked to name their most influential professor at Cornell. Luessen ’00, Josh Pollak ’00, Saeed Saeed ’00, Nicole Jeremy selected Bart Selman, with whom he worked on an Schlegel ’01, Mark Schwager ’00, and Will Stokes ’03. undergraduate research project. Jeffrey M. Vinocur was awarded a Goldwater Scholar- ship in April 2001. The Barry M. Goldwater Scholarship and Excellence in Education Foundation was established by act of Congress in 1986 in recognition of the long gov-

85 Funded Research - Computing & Information Science / Computer Science

INVESTIGATOR SPONSOR TITLE AWARD PERIOD OF AWARD

Arms NSF The NSDL Central System 799,085 9/15/00 8/31/01

Arms Library of Collecting and Preserving 72,214 1/1/00 6/30/00 Congress Open-access Materials on the Web

Birman NASA / JPL Ensemble and Spinglass: 240,000 5/1/00 9/30/01 Technologies for High Performance Cluster Management and Communication

Birman/ DARPA / AFRL Spinglass Adaptive Probabilistic 3,839,383 7/1/99 6/29/02 Constable Tools for Advanced Networks

Cardie NSF / POWRE Integrating Natural Language 68,695 7/15/00 12/31/01 Tools for Advanced Networks

Cardie DARPA / ONR Rapidly Portable Translingual 1,294,464 5/18/00 5/17/03 Information Extraction and Interactive Multidocument Summarization

Coleman DOE Efficient Algorithms for Large- 1,362,288 5/1/86 9/14/00 scale Constrained Optimization with Application to Inverse Problems

Constable NSF Creating and Evaluating 283,975 1/1/99 12/31/01 Interactive Formal Course- ware for Mathematics and Computing

Constable NSF Enhancing Proof Assistant 20,800 1/1/01 12/31/02 Systems

Constable DARPA / AF An Open Logical Programming 2,271,068 6/2/98 9/30/02 Environment: A Practical Framework for Sharing Formal Models

Constable DARPA / ONR Building Interactive Digital 1,938,148 5/1/01 4/30/04 Libraries of Formal Algorithmic Knowledge

Department NSF A Next Generation Computing 1,331,298 8/15/97 7/31/02 and Communications Substrate

Elber NSF Kinetics of Ion Channels by 465,743 4/1/00 3/31/03 Atomically Detailed Computer Simulations

Elber NIH Long Time Dynamics of 1,214,013 4/1/00 3/31/05 Biomolecules

Elber DARPA / ONR Evolution of Protein Structures 240,000 5/18/00 5/17/03 as a Tool to Predict Protein Shape and Protein Function

Gehrke NSF JAGUAR: JAVA in Next Generation 370,000 9/1/98 8/31/01 Database Systems

86 Research INVESTIGATOR SPONSOR TITLE AWARD PERIOD OF AWARD Gehrke /Bonnet AFRL Flexible Decision Support in 660,000 9/23/99 9/22/02 Device-saturated Environments- SenseIT

Gomes AFRL Compute-intensive Methods for 351,094 3/1/99 7/31/01 Combinatorial Problems

Gomes AFRL Hybrid Approaches for 304,835 3/1/99 2/28/02 Combinatorial Problems

Gomes AFRL Intelligent Information 3,100,000 12/1/00 11/30/03 Systems Institute

Halpern NSF A Qualitative Framework 348,000 9/1/96 8/31/01 or Reasoning Under Uncertainty

Halpern NSF SG ER: Decision-making in 90,000 9/1/00 2/28/02 Complex Systems

Halpern ONR Semantic Consistency in 366,642 4/30/97 6/30/02 Information Exchange

Halpern ONR Resource Bounded Knowledge 200,000 3/1/00 2/28/02 and Security

Halpern ONR Reasoning About Noninterference 87,086 2/15/01 2/14/02

Halpern ONR Software Quality and Infrastructure 526,058 5/1/01 4/30/06 Protection for Diffuse Computing

Kleinberg NSF (CAREER) Algorithmic Methods 200,000 4/1/97 3/31/02 for Networks

Kleinberg ONR Algorithms for Networks and 305,000 5/1/99 4/30/02 Link-structured Data

Kleinberg Packard Algorithmic Methods for Networks 625,000 10/13/99 10/12/04

Kleinberg NSF ITR The Construction and Analysis 450,000 9/1/00 8/31/03 /Lee/ Cardie of Information Networks /Selman

Kozen DARPA / NSF Formal Methods for Software 291,000 8/15/97 12/31/00 Certification

Lagoze NSF Security and Reliability in 2,425,899 5/19/99 4/30/03 Component-based Digital Libraries

Lagoze Digital Library Open Archives Initiative 84,800 1/1/01 12/31/01 Federation

Lagoze NSF Metadata for Resource Discovery 240,000 10/1/99 9/30/02 of Multimedia Digital Objects Harmony

Lagoze NSF Integrating and Navigating 291,650 10/1/99 9/30/02 E-print Archives through Citation-linking

Lagoze / Arms CNRI Digital Library Testbed 915,000 9/1/98 8/31/01 Program

Morrisett Sloan Sloan Research Fellowship 35,000 9/16/98 9/15/02

87 INVESTIGATOR SPONSOR TITLE AWARD PERIOD OF AWARD

Morrisett NSF Design, Applications, and 205,000 3/1/99 2/28/03 Foundations of Safe Low Level Program Languages

Morrisett AFOSR Next Generation Systems 1,000,000 4/15/01 4/14/06 / PECASE Languages

Pingali NSF MATLAB Extensions and Compiler 190,993 1/1/99 12/31/01 Techniques for High Performance Computing

Pingali NSF Synthesis of Block-recursive 548,314 1/1/01 12/31/03 Codes for Deep Memory Hierarchies

Schneider DARPA/AF AFRL/Cornell Information 2,050,000 3/15/00 2/28/02 Assurance Institute

Schneider AFOSR CIPIAF for Information 592,657 6/1/01 5/31/03 Assurance Institute

Schneider / Myers DARPA/AF Containment and Integrity 2,197,784 6/16/99 6/15/02 for Mobile Code

Schneider/ Morrisett AFOSR Language-based Security 844,408 3/1/00 11/30/02 for Extensible Systems

Schneider / ONR Language-based Security 4,247,977 7/1/01 6/30/06 Morrisett/ Kozen for Malicious Mobile Code /Myers

Selman Sloan Sloan Research Fellowship 5,000 9/16/99 9/15/01

Selman NSF (CAREER) Compute Intensive 300,000 8/1/98 7/31/02 Methods for AI

Selman /Gomes AFRL Principled Analysis & 750,000 7/1/00 11/9/02 Synthesis of Agent Systems Using Tools from Statistical Physics

Selman /Gomes DARPA/AF Controlling Computational Cost: 1,621,041 4/27/00 8/26/03 Structure, Phase Transitions and Randomization

Selman /Lee DOD/ Expertise Location using 30,000 10/15/00 10/14/01 Expertology, Inc. Automatically Generated Network Models

Tardos NSF Algorithmic Issues in 249,559 7/1/97 6/30/01 Communication Networks

Tardos DARPA/ONR Efficient Algorithms for 256,212 9/8/00 9/30/02 Transportation in Dynamic Networks

Tardos DARPA/ONR Efficient Resource Management 801,548 4/1/98 9/30/01 in High-speed Networks

Van Loan NSF New Applications and Algorithms 247,874 9/1/99 8/31/02 that Involved the Kronecker Product

88 Research INVESTIGATOR SPONSOR TITLE AWARD PERIOD OF AWARD

Yona Bio & Life Global Self-organization of 48,658 7/1/01 6/30/02 Sciences the Protein Space: Towards a Map of the Protein Space

Zabih NSF Dynamic Contextual Recognition 150,000 9/15/99 8/31/02

of Moving Objects ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Submitted Grant Proposals ○ INVESTIGATOR SPONSOR TITLE AWARD PERIOD OF AWARD

Arms NSF Interoperability Services Building 493,635 9/1/01 8/31/04 on the Open Archives Initiative

Arms NSF Collaborative Project: Core 1,562,500 9/1/01 11/30/02 /Krafft/ Integration of the National Lagoze SMETE Digital Library

Constable NSF ITR/SY: New Capabilities 2,956,089 10/1/01 9/30/06 for Creating High- confidence Embedded Software

Gehrke NSF Interactive and Online 235,000 9/1/01 8/30/04 Data Mining

Gehrke NSF Scalable Decision Tree 463,663 9/1/01 8/31/04 Construction

Gehrke NSF ITR/SI: Intelligent Mining 4,239,254 10/1/01 9/30/04 /Demers/Birman and Monitoring: Responding to the Data Tsunami

Halpern AFOSR Formulating and Reasoning 322,788 1/1/02 12/31/04 about Security Policies

Kozen NSF Kleene Algebra 351,233 5/1/01 4/30/04

Lagoze Univ of The Open Source FEDORA 300,000 10/1/02 9/30/05 Virginia Repository Development Project /Mellon

Pingali NSF Framework for Developing 646,054 4/1/01 3/31/04 Complex Applications on High-end Petaflop-Class Machines

Pingali NSF ITR/SY: A New Framework for 791,443 9/1/01 8/3004 Program Optimization

Selman DOD/ Learning Social Network Models 30,000 10/15/01 10/14/02 Expertology, Inc. for Information Linkage

Sirer Schlumberger Assuring the Security of Java 36,795 5/1/01 12/31/01 Research Corp.

Tardos ONR Algorithmic Issues in Network 481,714 10/1/01 9/30/03 Design and in Information Access

Tardos/ Zabih NSF ITR/SY: Combinatorial Optimization 465,786 9/1/01 8/31/04 Algorithms for Information Access

89 ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Collaborative Research at Cornell ○○○○○○

INVESTIGATOR SPONSOR TITLE AWARD PERIOD OF AWARD

Birman / EPRI Minimizing Failures While 625,000 1/1/99 12/31/03 Schneider/ECE Maintaining Efficiency of Complex Interactive Networked Systems

Coleman/ NIH Parallel Processing Resource 9,583,781 4/15/92 11/30/01 Elber / CTC for Biomedical Scientists

Coleman /C TC SGI SGI/Cornell Computational 1,433,810 3/23999 1/31/01 Finance Institute

Coleman / CTC TG Information Financial Engineering 840,000 9/1/00 8/31/03 Network and Tools

Coleman / CTC NYS Supercomputer Center 1,200,000 5/1/00 4/30/01 Operational Support

Cardie / NSF Computational Aspects 562,500 9/1/95 8/31/00 Zabih/ of Cognitive Science Cog Studies (Training Grant)

Elber/ NSF Multiscale Hierarchical 899,000 9/1/00 8/31/03 Kleinberg/Chew Analysis of Protein Kedem Structure and Dynamics MGB

Halpern/ ECE NSF Predictive Sensor Assisted 862,465 9/15/97 8/31/00 Wireless Multimedia Systems

Pingali / CTC NSF CISE Research Infrastructure: 1,500,000 10/1/99 9/30/04 A Two-tier Computation and Visualization Facility for Multiscale Problems

Pingali / NSF ITR Adaptive Software for 5,000,000 9/1/00 6/30/04 Vavasis/Chew/CTC Field-Driven Simulations

Pingali / NSF Challenges in CISE: Crack 1,852,592 1/15/98 12/31/01 Vavasis/CEE Propagation on Tera Flop Computers

Pingali /C TC NSF Multiscale Modeling of 1,500,000 10/1/98 9/30/01 Defects in Solids

Selman/ DARPA Self-configuring Wireless 165,281 4/18/00 4/17/03 Gomes/ECE Transmission and Decentralized Data Processing for Generic Sensor Networks

Selman/ AFOSR MURI Cooperative Control in 266,600 5/1/01 4/30/04 Gomes/MAE Uncertain Adversarial Environments

TOTAL EXPENDITURES, FISCAL YEAR 2000 - 2001: 10,255,536

90 Research Interests of the Faculty and Researchers Research

William Arms: Digital libraries and electronic publishing. Christoph Kreitz: Automated reasoning, program trans- Graeme Bailey:Mathematical modeling, applications to formation, verification and synthesis. medicine and biology, geometry, and parametrization Carl Lagoze: Digital libraries. spaces and connectivity. Lillian Lee: Natural language processing. Kenneth P. Birman:Reliability and security in modern net- Yuying Li: Scientific computation, and numerical optimi- worked environments. zation. Martin Burtscher: High performance microprocessor ar- Rajit Manohar: Design of efficient asynchronous compu- chitecture, instruction-level parallelism, and compiler tation structures in VSLI, and the use of formal meth- optimizations. ods to guarantee the correctness of such structures. Claire Cardie: Natural language processing, machine learn- J. Gregory Morrisett: Programming languages, security, ing, artificial intelligence. type systems, compilers. Paul Chew: Computational geometry, computational bi- Andrew Myers: Programming languages, compilers, dis- ology. tributed systems, runtime systems. Thomas F. Coleman: Numerical analysis, computational Anil Nerode: Automata theory, constructive concurrent dy- finance, scientific computing. namic logic. Robert L. Constable:Type theory, automated reasoning. Keshav Pingali: Programming languages, and parallel com- Alan Demers: Database systems, database replication, al- puting. gorithms. Robbert van Renesse: Distributed computing, fault-toler- Ron Elber: Computational molecular biology, genomics. ance, real-time systems. Geri Gay: Cognitive and social issues for the design and Mats Rooth: Scientific research in linguistics, particularly use of interactive communicaion technologies. syntax, semantics and lexical semantics. Johannes Gehrke: Database systems, data mining, and Fred B. Schneider: Concurrent and distributed systems, mining and monitoring evolving data. and computer and network security. Carla Gomes: Artificial intelligence, operations research, David Schwartz: Computational mechanics, applied math- and planning and scheduling. ematics, educational technology. Donald P. Greenberg: Realistic image synthesis, model- Bart Selman: Artificial intelligence, experimental computer ing, scientific visualization, computer-aided design, and science. image processing. David B. Shmoys: Design and analysis of efficient algo- Zygmunt Haas: Wireless and mobile systems, including rithms, scheduling. macrodiversity, interference-bounded dynamic channel E. Gun Sirer: Design and implementation of distributed allocation, mobile TCP/IP networks, location-indepen- operating systems for modern networks with a main dent access, personal communications services (PCS), focus on ad hoc mobile networks. and software for mobile systems. Evan Speight: Software runtime systems for distributed Joseph Y. Halpern: Reasoning about knowledge and un- computing platforms, commodity cluster-based shared certainty in multi-agent systems, decision theory, logic, memory systems, and affinity directed mobility. artificial intelligence, and security. Paul Stodghill: Program transformations, and program Juris Hartmanis: Computational complexity, complexity synthesis for computational science applications. of chaotic systems. Eva Tardos: Design and analysis of algorithms, optimiza- Mark Heinrich: Design of active memory and I/O systems tion, communication networks and combinatorics for next-generation servers and data-intensive comput- Tim Teitelbaum: Programming languages, and systems ing. and environments. Sheila S. Hemami: Communication of visual information, Charles Van Loan: Numerical linear and multilinear alge- including multirate video coding and transmission, bra. compression specific to packet networks and other lossy Stephen A. Vavasis: Numerical analysis, and optimiza- networks, and psychovisual considerations. tion. John E. Hopcroft: Robust geometric algorithms, modeling Werner Vogels: Reliable distributed systems, with a focus and simulation, and information capture and access. on development of new network protocols and Klara Kedem: Computational geometry. middleware, and novel strategies to structure applica- Jon Kleinberg: Theory of computing, algorithms, compu- tions and support systems. tational biology. Golan Yona: Computational molecular biology, with an Dexter Kozen: Theory of computational, proof-carrying emphasis on developing tools and methodologies for code, computational complexity, analysis of algorithms, large-scale analysis of protein sequences and structures. and program logics and semantics. Ramin Zabih: Computer vision, multimedia, information Dean Krafft: Digital libraries, information access. technology

91 Editorial Activities of the Faculty

ACM Computing Surveys (Schneider, Editor) ACM Transactions on Programming Languages and Systems (Morrisett, Associate Editor) Algorithmica (Hopcroft, Editor and Member, Executive Committee) Annals of Software Engineering (Schneider, Editor) Annals of Mathemathics (Selman, Editorial Board) Applied Mathematics Letters (Coleman, Editorial Board) Artificial Intelligence Journal (Halpern; Selman, Editorial Board) Chicago Journal of Theoretical Computer Science (Tardos, Editor; Halpern, Consulting Editor) Combinatorica (Tardos, Editor) Communication on Applied Non-linear Analysis (Coleman, Editorial Board) Computational Geometry: Theory and Applications (Kedem, Guest Editor) Computational Linguistics (Lee, Editorial Board) Computational Optimization and Applications (Coleman, Editorial Board) Constraints: An International Journal (Selman, Editorial Board) D-Lib Magazine (Arms, Editor-in-chief) Discrete Mathematics and Theoretical Computer Science (Pingali, Editorial Board) Distributed Computing (Schneider, Editor) Formal Methods in System Design (Constable, Editor) Fundamenta Informaticae (Hartmanis, Editor) High Integrity Systems (Schneider, Editor) IEEE Transactions on Signal Processing (Hemami, Associate Editor) Information and Computation (Halpern, Editorial Board) Information Processing Letters (Schneider, Editor) Information Sciences (Hopcroft, Associate Editor) International Journal of Computational Geometry and Applications (Hopcroft, Editor) International Journal Parallel Programming (Pingali, Editorial Board) Journal of Logic and Computation (Constable, Editor) Journal of Computer and Systems Sciences (Hartmanis, Hopcroft, Editors; Hopcroft, Associate Editor ) Journal of Functional Programming (Morrisett, Editor) Journal of Global Optimization (Vavasis, Editorial Board) Journal of Interconnection Networks (Tardos, Editor) Journal of Logic and Computation (Constable, Halpern, Editorial Board) Journal of Scheduling (Shmoys, Associate Editor) Journal of Symbolic Computation (Constable, Editor) Journal of the ACM (Halpern, Editor-in-chief) Journal of Theoretical Computer Science (Tardos, Editor) Machine Learning (Cardie, Editorial Board; Lee, Editorial Board) Mathematical Modeling and Scientific Computing (Coleman, Editorial Board) Mathematical Programming (Vavasis, Editorial Board, Shmoys, Tardos, Associate Editors) Mathematics of Operations Research (Tardos, Area Editor, Shmoys, Associate Editor) MIT Press Series on Digital Libraries and Electronic Publishing (Arms, Series Editor) Natural Language Semantics (Rooth, Editorial Board) Pattern Recognition Society Journal (Chew, Kedem, Editorial Board) SIAM Journal on Computing (Shmoys, Tardos, Editors) SIAM Journal on Discrete Mathematics (Shmoys, Editor-in-chief) SIAM Journal of Matrix Analysis Applications (Vavasis, Editorial Board) SIAM/MPS Series on Optimization (Shmoys, Co-editor) SIAM Review (Vavasis, Editorial Board) Springer-Verlag Lecture Notes in Computer Science (Hartmanis, Editor) Springer-Verlag Texts and Monographs in Computer Science (Schneider, Co-managing Editor)

92 CS People at a Glance Faculty Personnel Changes

NEW FACULTY IN SPRING 2001 Gun Sirer, who is receiving his Ph.D. from the University of Thorsten von Eicken has resigned and will remain at Washington, joined the faculty in January as an Assistant Expertcity.com, where he has been on leave for the last Professor. His research interests include extensible, distrib- two years. uted, and networked systems. CHANGES Golan Yona (Hebrew University, 1999) joined the faculty Juris Hartmanis becomes emeritus, effective July 1, 2001. as an Assistant Professor in January. His research area is com- putational molecular biology. Claire Cardie, Jon Kleinberg and Greg Morrisett were pro- moted to associate professor. NEW FACULTY IN 2001 Rich Caruana (CMU, 1997) works in machine learning and SABBATICALS AND LEAVES data mining, medical decision making and bioinformatics, Keshav Pingali, Fred Schneider, and Ramin Zabih are re- feature selection, missing values, inductive transfer, artifi- turning from academic year sabbatical leaves. Ramin will cial neural networks, memory-based learning. He joins the continue his affiliation with the Department of Radiology department in July. at the Cornell Medical School in New York City. He will be teaching on the Ithaca Campus during the fall 01 semester. Daisy Fan’s (Cornell, Civil & Environmental Engineering, 2001) research interests include the application of systems Claire Cardie, Tom Coleman, and Joe Halpern will be on analysis techniques for water resources and environmental sabbatical leave during the next academic year. Dan problems. Huttenlocher will continue to be on leave from the depart- ment during the coming academic year. Thorsten Joachims (Dortmund, 1997) works in machine learning and intelligent agents, with a focus on Support Vector Machines and machine learning with text. He will be joining the department in October.

Jeanna Neefe Matthews‘s (Berkeley, 2000) research inter- ests include file systems, storage systems, and more gener- ally, operating systems and distributed systems. She will join the department in January.

Radu Rugina (UCSB, 2001) is interested in pointer analysis, parallelizing compilers, and parallel computing. He will be joining the department in January.

Jayavel Shanmugasundaram’s (Wisconsin, 2001) research interests include internet data management, database sys- tems, and transaction processing in emerging system archi- tectures. He will be joining the department in August.

DEPARTURES Sam Toueg has resigned and has joined the faculty at the University of Toronto.

Praveen Seshadri has resigned and will remain at Microsoft, where he has been on leave for the last two years. Juris Hartmanis, Charles Van Loan, and Tim Teitelbaum

93 Faculty, Researchers, and Academic Visitors

PROFESSORS Dean Krafft ACADEMIC VISITORS William Arms Christoph Kreitz Mathieu Baudet, Ecole Polytechnique, Graeme Bailey Yuying Li France Kenneth P. Birman Robbert van Renesse Tim Clark, Reliable Network Solutions Thomas F. Coleman William Debany, Rome Air Force Re- Robert L. Constable RESEARCH ASSOCIATES search Lab Alan Demers Stuart Allen Dan Dumitriu, Reliable Network So- Ron Elber Philip Bonnet lutions Donald Greenberg Saleh El Mohamed Mark Dyson, Rome Air Force Research Joseph Halpern Carla Gomes Lab Juris Hartmanis Carl Lagoze Walter Gadz, Rome Air Force Research John E. Hopcroft Koneshan Sivapathasundram Lab Daniel P. Huttenlocher Paul Stodghill Kevin Kwait, Rome Air Force Research Klara Kedem Werner Vogels Lab Dexter Kozen Eva-Marie Luther, Technische Keshav K. Pingali RESEARCH STAFF Fachhochschule Berlin, Germany David B. Schmoys Donna Bergmark Amy Magnus, Rome Air Force Research Fred B. Schneider Naomi Dushay Lab Eva Tardos Rich Eaton Andreas Meier, Universitaet des Sam Toueg Lori Lorigo Saarlandes Charles Van Loan Jaroslaw Meller Louis Pochet, Rome Air Force Research Sandy Payette Lab ASSOCIATE PROFESSORS Carol Terizzi Leonard Popyack, Rome Air Force Re- Claire Cardie search Lab Jon Kleinberg POSTDOCTORAL ASSOCIATES Jurek Tiuryn, University of Warsaw, Greg Morrisett Kavita Bala Poland Bart Selman Ramon Bejar Matthew Thomas, Rome Air Force Re- Tim Teitelbaum Raoul Bhoedjang search Lab Stephen Vavasis Alfredo Cardenas Sharon Walter, Rome Air Force Re- Ramin Zabih Tamara Galor search Lab Avijit Ghosh Richard Zippel, School of Computer ASSISTANT PROFESSORS Anupam Gupta & Media Science Interdisciplinary Johannes Gehrke Pavel Naumov Center, Herzliya, Israel Lillian Lee Koneshan Sivapathasundram Andrew Myers Veaceslav Zaloj David Schwartz Emin Gun Sirer VISITING FACULTY Thorsten von Eicken Sergei Artemov, Russian Academy of Golan Yona Sciences, Moscow, Russia Bruno Codenotti, University of Pisa, LECTURERS Pisa, Italy Gregery Buzzard Daniel Mosse, University of Pittsburgh Ron DiNapoli Khalid Mughal, University of Bergen, Matthew Morgenstern Bergen, Norway Thomas Yan Herbert Van De Sompel, Open Ar- Lidong Zhou chives Initiative Walker White, University of Dallas SENIOR RESEARCH ASSOCIATES L. Paul Chew

94 CS People at a Glance Administrative and Technical Staff

Director of Administration: Pat Musa Consultant/Advisor: Joseph McGuire Human Resources Manager: Susan Schwarz Senior Programmer/Analyst: Ellen Cramer Director of Corporate Relations: Marcy Rosenkrantz Senior Programmer/Analyst: Doug Flanagan Alumni Relations: Dan Jenkins Senior Programmer/Analyst: Larry Parmelee Assistant to the Chair: George Manning/Nora Balfour Programmer/Analyst: Dora Abdullah Front Office Manager: Bonnie Maine Programmer/Analyst: Orlando Johnson Programmer/Analyst: Dean Eckstrom FINANCE OFFICE Info Tech Area Manager: William Holmes Finance Manager: Claudia Wojcinski Multimedia Editor: Una Moneypenny Accounts Representative: Carol Ayer Award Coordinator/HR Assistant: Laura Kratochvil HR Assistant: Karla Consroe Post Award Coordinator: Amy DeVaul Pre-award Coordinator: Bonnie McCarthy

GRADUATE PROGRAMS Assistant Director of Graduate Programs: Becky Stewart Master of Engineering Program Coordinator: Stephanie Meik

UNDERGRADUATE EDUCATION PROGRAM Assistant Director of Undergraduate Programs: Daniel Jenkins Course Administrator: Laurie Buck Reception and Records: Nicole Roy/Anna Salter

FACULTY ADMINISTRATIVE ASSISTANTS Rosemary Adessa Kathy Carpenter Linda Competillo Helene Croft Juanita Heyerman Tammy Howe Cindy Robinson

Department Colloquium: Karla Consroe/Linda Competillo Theory Seminar: Karla Consroe/Tammy Howe Director of Computing Facilities: Dean Krafft Systems Administrative Assistant: Cay Wilson Systems Administrative Assistant: Mona Seamon

TECHNICAL STAFF Network Technician: Bruce Boda Network Technician: John Finley Lead Consultant: Ellen Cramer/Jennifer Holleran Consultant/Advisor: Eric Brinkman Consultant/Advisor: Rob Collins Consultant/Advisor: Robert O’Keeffe Computer Science Department Staff

95 Departmental Computing Facilities

he department makes use of a mix of computing plat- Finley and Bruce Boda; user consulting support by Rob Tforms, with about three-quarters of our research and Collins, Joseph McGuire, and Eric Brinkman; and systems instructional computing taking place on Microsoft’s Win- administration by Cay Wilson and Mona Seamon. The dows NT/2000 operating system and Intel Architecture staff provides full support for all the operating systems processors and the remaining quarter on Unix desktop and standard software on our major computing platforms. and back-end servers. We have benefited greatly over the In addition to the resources directly owned and op- last year from several major equipment donations: Intel erated by the department, computer science students and donated 25 1.5GHz Pentium 4 workstations and a server researchers have access to a number of university facili- to upgrade our undergraduate teaching laboratory; Intel ties. The university provides extensive campus-wide net- also donated 20 1.4GH Pentium 4 systems for research; working, based on the TCP/IP protocols and implemented and we have received 30 PocketPC-based PDAs, 802.11b through a switched Gigabit Ethernet backbone connect- wireless access cards, software, training, and books from ing organizational Ethernets. National and international Microsoft Corporation. access is provided by three OC3 connections to NYSERNet In the area of improved and upgraded infrastructure, and the global Internet. High-speed community access is during the past year, we: available through Time-Warner’s RoadRunner cable mo- dem system and several DSL providers. Begun the transition of our pilot 802.11b wire- The department operates an undergraduate teaching less networking infrastructure (Nomad) to a full laboratory of 15 Intel-donated 300MHz Pentium II sys- service (RedRover) run by Cornell Information tems, 30 Intel-donated 450MHz Pentium III systems, 30 Technologies. The new infrastructure will provide Intel-donated 866MHz Pentium III systems, and 25 Intel- close to 100 access points across campus when it donated 1.5GHz Pentium 4 systems, all running is officially released at the beginning of the fall Microsoft’s Windows 2000. This lab provides support for 2001 semester. a wide range of upper-level undergraduate courses and Completed a major upgrade of departmental individual research projects. There is also a separate graph- servers and desktop systems from Windows NT ics teaching laboratory with 25 HP Visualize fx6+ work- to Windows 2000, including an upgrade of our stations. Exchange mail system from Exchange 5.5 to Ex- Finally, through the Cornell Theory Center and the change 2000. Program of Computer Graphics, computer science re- Added a new Linux Beowulf cluster with 12 searchers have access to a wide range of advanced paral- 1.2GHz AMD Athlon Thunderbird processors, lel processing and supercomputer systems as well as ad- and expanded two existing Linux clusters: one vanced graphics and visualization systems. with an additional 40 processors and the other The following list includes major computing equip- with 350GB of disk. ment in the Department of Computer Science, owned Expanded departmental Linux support with three either by Cornell or by the federal government. new Linux backend servers (CVS support, Apache/MySQL/PHP, and general Linux) and full DESKTOP MACHINES support for RedHat Linux on research and teach- 10 Sun SunRay ing systems. 214 Intel Pentium II Desktop PC 19 SUN UltraSparc 10 The department has over 1000 computers ranging from 247 Intel Pentium III Desktop PC desktops to high-end parallel processing servers, over 4 SUN UltraSparc 5 three terabytes of on-line disk storage, and a backbone 46 Intel Pentium 4 Desktop PC network based on switched Gigabit Ethernet. 4 Apple G3/G4 PowerBook The department has a full-time computing facilities 5 Intel Celeron Desktop PC staff of fifteen. Dean Krafft serves as director, with pro- 3 Apple G3/G4 workstation gramming support provided by Dora Abdullah, Jennifer 39 Intel Pentium II Laptop PC Holleran, Dean Eckstrom, Doug Flanagan, Bill Holmes, 25 HP VisualizeX 600MHz PIII Orlando Johnson, and Larry Parmelee; web development 38 Intel Pentium III Laptop PC provided by Una Moneypenny; hardware support by John 1 SGI O2

96 Departmental Computing F

128 Intel Celeron-based Laptop PC

BACK-END RESOURCES 9 Sun Ultra Enterprise 420/450 quad-processor 1 45-node Linux PIII dual-proc. cluster

SERVERS 5 Dell quad-processor Pentium III servers 2 SUN Ultra Enterprise 250 dual-processor servers 3 Intel quad-processor Pentium II servers

acilities 4 SUN Sparc-20/514 four-processor compute serv- ers 4 Dell 8-way Pentium III servers 1 3.8TB SUN tape library 15 Intel Pentium III servers 1 12-node AMD 1.2GHz Athlon Beowulf cluster 3 Linux Pentium III servers

OTHER HARDWARE

9 Color Laser Printers 2 Cisco Catalyst 5000/5500 Fast Ethernet switches 57 B&W Laser Printers (HP/ Lexmark) 34 Cisco Catalyst 29xx Fast Ethernet switches 2 HP DesignJet 2500 poster printers 1 Cisco Catalyst 6509 Gigabit Ethernet switch 130 WindowsCE handheld/palm devices 7 Cisco Catalyst 1900 10/100 Ethernet switches

Professors Ken Birman and Keshav Pingali

University President Hunter R. Rawlings and Students at BOOM 01

Associate Professors Bart Selman and Steve Vavasis, and CS Chair Charles Van Loan with CIS Dean Robert L. Constable

97

Colloquium and Seminar Speakers ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ CS Distinguished Lecture Series ○○○○○○○

AUGUST 2000 FEBRUARY David Mermin, Dept. of Physics, Cornell University. How Mark Heinrich, School of Electrical and Computer Engi- Quantum Mechanics Alters the Nature of Computation. neering, Cornell University. Simulation vs. Reality: The Importance of Building Hardware. SEPTEMBER Stu Feldman, IBM, T. J. Watson Research Center. Trends in E- Rajit Manohar, Dept. of ECE, Cornell University. Low En- Commerce and Challenges for Research. ergy Adaptive Process. Greg Morrisett, Computer Science, Cornell University. To- Charles Holland, AFRL/Cornell Information Assurance wards Next-Generation Low-Level Languages. Institute (IAI) Inaugural Lecture. Programs, Policy and Poli- Herbert Van de Sompel, Ghent University, Belgium. The tics - Science and Technology in the National Interest. OpenURL Framework for the Context-sensitive Provision of Rich Caruana, Computer Science Department, Carnegie Service Links. Mellon University. Multitask Learning Schedule. Siddhartha Chatterjee, CS Dept., Univ. of N. Carolina. Fast MARCH Tree-Structured Computations and Memory Hierarchies Jayavel Shanmugasundaram, University of Wisconsin. Schedule. XPERANTO: Bridging Relational Technology and XML. Venkatesan Guruswami, MIT. List Decoding Of Error-Cor- OCTOBER recting Codes. Paul Edwards, Dept.of History, Univ. of Michigan, Joint CS Junghoo Cho, Stanford University. Crawling the Web: Dis- and Science and Technology Studies Colloquium. Sys- covery and Maintenance of Large-Scale Web. tems, Networks, and Webs: Towards a History of Digital Alexander Hartemink, MIT. Principled Computational Methods Convergence. for the Validation and Discovery of Genetic Regulatory Net- Divesh Srivastava, AT&T Labs—Research. Querying LDAP works from Expression Data. Directories Schedule. Dieter van Melkebeek, Institute for Advanced Study. Time- Eva Tardos, CS Dept., Cornell University. How Bad is Selfish Space Tradeoffs for Satisfiability. Routing? Ambuj Goyal, IBM. Transactional Internet. APRIL Paul Ginsparg, Los Alamos National Laboratory. Creating a NOVEMBER Global Knowledge Network. Herbert Van de Sompel, Ghent University, Belgium. SFX/ Andris Ambainis, UC, Berkeley. Lower Bounds on Quantum OpenURL and the Open Archives Inititive: Achieving Computing. Interoperability in Digital Libraries via Low-barrier Stan- Radu Rugina, MIT. Program Analysis Techniques for Pointers dards. and Accessed Memory Regions. Tony Hey, University of Southampton, UK. Feynman, Peter Manolios, University of Texas. Combining Theorem Prov- Einstein, and Computers. ing and Model Checking for the Verification of Reactive Sys- Jeanna Neefe Matthews, Clarkson University. Self-man- tems. aging File Systems. Thorsten Joachims, GMD. The Maximum-Margin Approach Daniel Mosse, University of Pittsburgh. Towards a View of to Learning Text Classifiers Methods, Theory, and Algo- Efficient Softer Real-time. rithms. Frans Kaashoek, MIT/LCS. How to Design Flexible Software Jovan Popovic, CMU. Motion Design in Computer Animation. Systems or Applying the End-to-end Argument. Yacov Yacobi, Microsoft Corp. Information Assurance Insti- tute Invited Speaker. A Dual Watermarking and Finger- JANUARY 2001 printing System. Balachander Krishnamurthy, AT&T Labs—Research. What’s Igor Guskov, Caltech. Meshes and Geometry Processing. New in Web Research? MAY Richard Han, IBM Watson. Interacting Devices, Applications, and Users In a Pervasive Computing World.

98 Publications

Publications ○○○○○○ Technical Reports ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

Aaron, Eric. “Tactic-based Modeling of Cognitive Inference Kozen, Dexter. “Automata on Guarded Strings and Applica- on Logically Structured Notation.” TR00-1812. Septem- tions.” TR01-1833. January 25, 2001. ber 6, 2000. Lagoze, Carl. “Accomodating Simplicity and Complexity in Ahmed, Nawaaz. “Locality Enhancement of Imperfectly- Metadata: Lessons from the Dublin Core Experience.” nested Loop Nests.” TR00-1811. August 24, 2000. TR00-1800. June 30, 2000. Ahou, Lidong. “Towards Fault-tolerant and Secure On-line Lagoze, Carl, J. Hunter, and D. Brickley. “An Event-aware Services.” TR01-1840. May 11, 2001. Model for Metedata Interoperability.” TR00-1801. “June Barzilay, Eli. “Quotation and Reflection in Nuprl and 30, 2000. Scheme.” TR01-1832. January 8, 2001. Maatev, Nikolay, K. Pingali, and P. Stodghill. “The Bernoulli Bergmark, Donna, W. Arms, and C. Lagoze. “An Architec- Generic Matrix Library.” TR00-1808. August 1, 2000. ture for Reference Linking.” TR00-1820. October 26, Minky, Yaron, A. Tractenberg, and R. Zippel. “Set Reconcili- 2000. ation with Nearly Optimal Communication Complex- Bergmark, Donna. “Automatic Extraction of Reference Link- ity.” TR00-1813. September 27, 2000. ing Information from Online Documents.” TR00-1821. Qiu, Lili, V. Padmanabhn, N. Venkata, and G.M. Voeljer. November 30, 2000. “On the Placement of Web Server Replicas.” TR00-1806. Bergmark, Donna, and C. Lagoze. “Reference Linking the July, 13, 2000. Web’s Scholarly Papers.” TR01-1835. February 7, 2001. Ramjee, R., L. Li, and T. Porta. “IP Paging Service for Mobile Bickford, Mark, C. Kreitz, and R. van Renesse. “Formally Hosts.” TR00-1816. October 13, 2000. Verifying Hybrid Protocols with the Nuprl Logical Pro- Rodeh, Ohad, K. P. Birman, and D. Dolov. “The Architec- gramming Environment.” TR01-1839. May 11, 2001. ture and Performance of Security Protocols in the En- Boykov, Yuri, and D. Huttenlocher. “A Graph Based Algo- semble Group Communication System.” TR00-1822. rithm for Bayesian Recognition.” TR00-1803. “August October 17, 2000. 28, 2000. Rodeh, Ohad, K. P. Birman, and D. Dolev. “Using AVL Trees Chandra, Ranveer, V. Ramasubramanian, and K.P. Birman. for Fault Tolerant Group Key Management.” TR00-1823. “Anonymous Gossip: Improving Multicast Reliability November 2, 2000. in Mobile Ad-hoc Networks.” TR01-1836. February 7, Schneider, Fred B., G. Morrisett, and R. Harper. “A Language- 2001. based Approach to Security.” TR00-1825. November 21, Cheney, James, C. Lagoze, and P. Botticelli. “Toward a Theory 2000. of Information Preservation.” TR01-1841. May 24, 2001. Smith, Frederick, D. Grossman, G. Morrisett, L. Hornof, and Dushay, Naomi, and C. Lagoze. “Modeling Decisions for J. Trevor. “Compiling for Runtime Code Generation Digital Content.” TR00-1807. July 19, 2000. (Extended Version).” TR00-1824. October 27, 2000. Gupta, Indranil. “Minimal CDMA Reducing Strategies in Stoller, Scott D., and F.B. Schneider. “Automated Analysis of Power-controlled Ad-hoc Wireless Networks.” TR01- Fault-tolerance in Distributed Systems.” TR00-1829. 1834. January 25, 2001. December 21, 2000. Kolmogorov, Vladimir, and R. Zabih. “Computing Visual Xiao, Zhen, and K. P. Birman. “A Randomized Error Recov- Correspondence with Occlusions via Graph Cuts.” ery Algorithm for Reliable Multicast.” TR00-1814. Oc- TR01-1838. March 5, 2001. tober 2, 2000. Kopylov, Alexi. “Dependent Intersection: A New Way of Xiao, Zhen, K. P. Birman, and R. van Renesse. Optimizing Defining Records in Type Theory.” TR00-1809. August Buffer Management for Reliable Multicast. TR00-1815. 14, 2000. October 2, 2000. Kozen, Dexter. “Myhill-Nerode Relations on Automatic Sys- Xiao, Zhen. “Efficient Error Recovery for Reliable Multicast.” tems and the Completeness of Kleene Algebra.” TR00- TR01-1831. January 3, 2001. 1826. November 30, 2000. Zdancewic, Steve, and A. Myers. “Confidentiality and Integ- Kozen, Dexter, and J. Tiuryn. “Intuitionistic Linear Logic rity with Untrusted Hosts: Technical Report.” TR00- and Partial Correctedness.” TR00-1830. December 31, 1810. August 22, 2000. 2000.

99 Zhang, Yin, L. Qiu, and S. Kesav. “Speeding up Short Data Zhou, Lidong, F.B. Schneider, and R. van Renesse. “COCA: transfers: Theory, Architectural Support, and Simula- A Secure Distributed On-line Certification Authority.” tion Results. TR00-1799. July 19, 2000. TR00-1828. December 11, 2000. Zhang, Yin, and Lili Qiu. “Understanding the End-to-End Performance Impact of RED in a Heterogeneous Envi-

ronment.” TR00-1802. July 19, 2000. ○○○○○○○○○○ Student Lectures ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

Benzinger, Ralph. “Automated Higher-order Complexity Qiu, Lili. “On the Placement of Web Server Replicas.” IEEE Analysis and Certification.” Invited talk, Implicit Com- INFOCOM 2001, Anchorage, AK (April, 2001). putational Complexity Workshop 2000, affiliated with Roughgarden, Timothy. “Approximate K-MSTs and K- LICS 2000. Santa Barbara, CA (2000). Steiner Trees via Primal-dual Method and Lagrangean Cheney, James. “Compressing XML using Hierarchical Relaxation.” 8th Conference on Integer Programming Multiplexed PPM Models.” 2001 IEEE Data Compres- and Combinatorial Optimization (IPCO). (June 13- sion Conference, Snowbird, UT ( March 27, 2001). 15, 2001). Florence, Adam. “An Improved Implementation of the Fast Roughgarden, Timothy. “Stackelberg Scheduling Strategies.” Gauss Transform.” SIAM Applied Linear Algebra 2000 Theory Seminar, Department of Computer Science, Conference, Raleigh, NC (October, 2000). Cornell University (April 23, 2001). Gupta, Indranil, Robbert van Renesse, and Kenneth P. Roughgarden, Timothy. “How Bad is Selfish Routing?” Birman. “A Probabilistically Correct Leader Election Operations Research Seminar, GSIA, Carnegie Mellon Protocol for Large Groups.” Proceedings 14th Interna- University, Pittsburgh, PA (December 4, 2000). tional Symposium on Distributed Computing (DISC Roughgarden, Timothy. “How Bad is Selfish Routing?” 41st 2000) – LNCS 1914, 89-13, Toledo, Spain (October, Annual Symposium on Foundations of Computer Sci- 2000). ence (FOCS), Redondo Beach, CA (November 12, Gupta, Indranil. “Minimal CDMA Recoding Strategies in 2000). Power-controlled Ad-hoc Wireless Networks.” Proceed- Roughgarden, Timothy. “How Bad is Selfish Routing?” ings 1st International Workshop on Parallel and Dis- Theory Seminar, Department of Computer Science, tributed Computing Issues in Wireless Networks and Cornell University (October 23, 2000). Mobile Computing, San Francisco, CA (April, 2001). Roughgarden, Timothy. “How Bad is Selfish Routing?” 17th Howe, Nicholas. “Digital Images from the Computer’s Per- International Symposium on Mathematical Program- spective.” Guest lecture in course on digital art, NY ming, Atlanta, GA (August 10, 2000). University (November 3, 2000). Vetsikas, Ioannis. “Online Auctions: Software Agents Will Howe, Nicholas. “Digital Images and Brain Images: Shall Do Your Bidding.” AI Seminar, Cornell University (No- Ever the Twain Meet?” Guest lecture in cognitive stud- vember, 2000). ies proseminar, Cornell University (October 31, 2000). Wagstaff, Kiri. “Clustering with Knowledge-based Con- Kumar, Amit. “Fairness in Resource Allocation.” 41st IEEE straints.” Doctoral Consortium, 17th National Confer- Symposium on Foundations of Computer Science. ence on Artificial Intelligence. Austin, TX (July 31, 2000). Rodendo Beach, CA. Wagstaff, Kiri. “Clustering with Knowledge-based Con- Nogin, Alexey. “Theorem Proving in Higher Order Logic.” straints.” Invited Talk, Stuart Russell’s research group, (TPHOL’s) Conference (August, 2000). Berkeley, CA (September 13, 2000). Pellacini, Fabio. “Rederman: A Virtual Machine for Com- Weirich, Stephanie. “Type-safe Cast: Functional Pearl.” In- puter Graphics.” Cornell University (October, 2000). ternational Conference on Functional Programming Pellacini, Fabio. “Computer Animation.” Cornell Univer- (September, 2000). sity (September, 2000). Weirich, Stephanie. “Resource Bound Certification.” Pellacini, Fabio. “Towards a Psychophysically-based Light Harvard University (February, 2001). Reflection Model”. PIXAR. July, 2000. Weirich, Stephanie. “Encoding Intensional Type Analysis.” Qiu, Lili. “The Content and Access Dynamics of a Busy Web European Symposium on Programming. (April, 2001). Server: Findings and Implications.” ACM SIGCOMM Weirich, Stephanie. “Polytypic Programming and Inten- 2000, Stockholm, Sweden (August, 2000). sional Type (Constructor) Analysis.” Working Group 2.8 (Functional Programming) (April, 2001).

100

Publications ○○○○○○○○○○○○○○○○○○○○ Student Papers ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

Ando, Rie. “Latent Semantic Space: Iterative Scaling Im- Print Clouds.” Technical Report PCG-00-1, Program of proves Inter-document Similarity Measurement.” In Computer Graphics, Cornell University. Available at: Proceedings of SIGIR ‘2000, 216-223. http://www.graphics.cornell.edu/pubs/2000/ Batu, Tugkan, Lance Fortnow, Ronitt Rubinfeld, Warren DTG00.html. Smith, and Patrick White. “Testing that Distributions Ferwerda, J., F. Pellacini and D. Greenberg.“A Psychophysi- are Close.” In Proceedings of 41st Annual Symposium cally-based Model of Surface Gloss Perception.” Proc. on Foundations of Computer Science, 2000. of Human Vision and Electronic Imaging VI. San Jose, Benzinger, Ralph. “Automated Complexity Analysis of Nuprl CA (January, 2001). Extracted Programs.” Journal of Functional Programming. Gale, Amy, and Rod Downey. “On Genericity and Ershov’s Cambridge University Press, 2001. Hierarchy.” MLQ – Math. Log. Quart. 47(2):161-182 Benzinger, Ralph. “Automated Higher-order Complexity (2001).

Publications Analysis.” Theoretical Computer Science, Elsevier, 2001. Grossman, Daniel, and Greg Morrisett. “Scalable Certifica- Bronevetsky, Greg. “Circle Menus.” 2001 Engineering tion for Typed Assembly Language.” In 2000 ACM Graduate Research Symposium (March, 2001). SIGPLAN Workshop on Types in Compilation, Chen, Zhiyuan, Johannes Gehrke, and Flip Korn. “Query Montreal, Canada (September, 2000). Optimization in Compressed Database Systems.” ACM Gupta, Indranil, Robbert van Renesse, and Kenneth P. SIGMOD International Conference on Management of Birman. “A Probabilistically Correct Leader Election Data, Santa Barbara, CA, (May 21-24, 2001). Protocol for Large Groups.” In Proceedings 14th Inter- Chen, Zhiyuan, H.V. Jagadish, Flip Korn, Nick Koudas, S. national Symposium on Distributed Computing (DISC Muthukrishnan, Raymond Ng, and Divesh Srivastava. 2000) – LNCS 1914, 89-13, Toledo, Spain (October, “Counting Twig Matches in a Tree.” In Proceedings of 2000). the 17th International Conference on Data Engineer- Gupta, Indranil. “Minimal CDMA Recoding Strategies in ing, Heidelberg, Germany, 595-604 (April 2-6, 2001). Power-Controlled Ad-hoc Wireless Networks.” In Pro- Cheney, James. “Compressing XML Using Hierarchical ceedings 1st International Workshop on Parallel and Dis- Multiplexed PPM Models.” 2001 IEEE Data Compres- tributed Computing Issues in Wireless Networks and sion Conference, Snowbird, UT (March, 2001). Mobile Computing, San Francisco, CA (April, 2001). Chudak, F.A., T. Roughgarden, and D. P. Williamson. “Ap- Jenkins, K, K. Hopkinson, and K. Birman. “Reliable Group proximate k-MSTs and k-Steiner trees via the primal- Communication with Subgroups.” 2001 IEEE Interna- dual method of Lagrangean relaxation.” 8th Confer- tional Workshop on Applied Reliable Group Com- ence on Integer Programming and Combinatorial Op- munication within the International Conference on timization (IPCO) (June, 2001). Distributed Computing Systems, 16-19, Phoenix, AZ Coury, D.V., J. S. Thorp, K. M. Hopkinson, and K.P. Birman. (April, 2001). “Agent Technology Applied to Adaptive Relay Setting Kempe, David, Jon Kleinberg, and Alan Demers. “Spacial for Multi-Terminal Lines.” 2000 IEEE PES Summer Gossip and Resource Location Protocols.” In Proceed- Meeting, 16-20, Seattle, WA (July, 2000). ings of STOC 2001. Coury, D.V., J. S. Thorp, K. M. Hopkinson, and K.P. Birman. Kumar, Amit, and Jon Kleinberg. “Fairness in Resource Al- “Improving the Protection of EHV Teed Feeders Using location.” 41st IEEE Symposium on Foundations of Local Agents.” IEEE 7th International Conference on Computer Science. Developments in Power System Protection, Amsterdam, Li, L., J. Y. Halpern, P. Bahl, Y. M. Wang, and R. Wattenhofer. The Netherlands (April 9-12, 2001). “Analysis of Cone-based Distributed Topology Control Decoste, Dennis, and Kiri Wagstaff. “Alpha Seeding for Sup- Algorithms for Wireless Multi-hop Networks.” ACM port Vector Machines”. Proceedings of the Sixth ACM Symposium on Principles of Distributed Computing SIGKDD International Conference on Knowledge Dis- (PODC) (August, 2001). covery and Data Mining, 35-349 (August 20-23, 2000). Li, L. and J. Halpern. “Minimum Energy Mobile Wireless Dobra, Alin, and Johannes Gehrke. “Bias Correction in Clas- Networks Revisited.” Proc. IEEE International Confer- sification Tree Construction.” International Conference ence on Communications (ICC) (June, 2001). on Machine Learning (June 28, 2001). Liu, Xiaoming, and Robbert van Renesse. “Fast Protocol Dutre, Philip, Parag Tole, and Donald Greenberg. “Approxi- Transition in a Distributed Environment.” ACM Sym- mate Visibility for Illumination Computations using posium on Principles of Distributed Computing (PODC ’00) (July, 2000).

101 Liu, Xiaoming, Robbert van Renesse, Mark Bickford, IEEE Infocom (April, 2001). Christoph Kreitz, and Robert Constable. “Protocol Xiao, Zhen and Ken Birman. “Providing Efficient, Robust Switching: Exploiting Meta Properties.” International Error Recovery Through Randomization.” In Interna- Workshop on Applied Reliable Group Communica- tional Workshop on Applied Reliable Group Commu- tion, (IWARGC ’01). nication (April, 2001). Ng, Vincent, M. White, T. Korelsky, C. Cardie, D. Pierce, and Wagstaff, Kiri, Claire Cardie, Seth Rogers, and Stefan K. Wagstaff. “Multi-document Summarization via In- Schroedl. “Constrained K-means Clustering with Back- formation Extraction.” Proceedings 1st International ground Knowledge.” Proceedings of the 18th Interna- Conference on Human Language Technology Research tional Conference on Machine Learning. (June 28-July (April, 2001). 1, 2001). Nogin, Alexey. “Theorem Proving in Higher Order Logic.”. Wattenhofer, R., L. Li, P. Bahl, and Y. M.Wang. “Distributed Proceedings (TPHOL’s) Conference (August, 2000). Topology Control for Power Efficient Operation in Ooi, Wei Tsang, and Robbert van Renesse. “An Adaptive Pro- Multihop Wireless Ad-hoc Networks.” In Proc. IEEE tocol for Locating Media Gateways.” Eighth ACM In- INFOCOM (April, 2001). ternational Multimedia Conference. Los Angeles, CA. Weirich, Stephanie. “Encoding Intensional Type Ooi, Wei Tsang, Robbert van Renesse, and Brian Smith. Analysis.”(October, 2000). European Symposium on “Design and Implementation of Programmable Media Programming (ESOP ’01), Genova, Italy (April, 2001). Gateways.” Tenth International Workshop on Network Weirich, Stephanie. “Type Safe Cast: Functional Pearl.” In and Operating System Support for Digital Audio and Proceedings of the 5th ACM SIGPLAN International Video (NOSSDAV 2000). Chapel Hill, NC. Conference on Functional Programming (ICFP ’00), Padmanabhan, Venkata N., and Lili Qiu. “The Content and Montreal, Canada (September, 2000). Access Dynamics of a Busy Web Site: Findings and White, Mike, Tanya Korelsky, Claire Cardie, Vincent Ng, Implications.” Proceedings of ACM SIGCOMM 2000, David Pierce, and Kiri Wagstaff. “Multi-document Sum- Stockholm, Sweden (August, 2000). marization via Information Extraction.” Proceedings Pucella, R. “An Approach to the Implementation of Over- of the 2001 Human Language Technology Conference lapping Rules in Standard ML.” Proceedings of the 1st (March 18-21, 2001). International Workshop on Rule-based Programming (RULE2000), Montreal, Canada, 2000. Pucella, R. “The Design of a COM-oriented Module Sys- tem.” Proceedings of the Joint Modular Languages Con- ference (Zurich, Switzerland). Lecture Notes in Com- puter Science 1897:104-118, Springer-Verlag (2000). Qiu, Lili, Venkata N. Padmanabhan, and Geoffrey M. Voelker. “On the Placement of Web Server Replicas.” In Proceedings of IEEE INFOCOM 2001, Anchorage, AK (April, 2001). Qiu, Lili, George Varghese, and Subhash Suri. “Fast Firewall Implementations of Software and Hardware-based Routers.” Extended Abstract in Proceedings of ACM SIGMETRICS 2001, Cambridge, MA (June, 2001). Roughgarden, T. “Stackelberg Scheduling Strategies.” 33rd Annual ACM Symposium on Theory of Computing (STOC) (July, 2001). Roughgarden, T. and E. Tardos. “How Bad is Selfish Rout- ing?” 41st Annual Symposium on Foundations of Com- puter Science (FOCS), 93-102 (November, 2000). Vetsikas, Ioannis, Ramon Bejar, Carla Gomes, Henry Kautz, and Bart Selman. “Structure and Phase Transition Phe- nomena in the VTC Problem.” DARPA Workshop (Task Project). Xiao, Zhen, and Ken Birman. “A Randomized Error Recov- ery Algorithm for Reliable Multicast.” Proceedings of

102 FCI Programs FCI Programs

Computational Biology ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

enomic databases, protein databanks, MRI images of The FCI-created undergraduate program of study in Gthe human brain, and remote sensing data on land- computational biology encourages students to gain funda- scapes contain unprecedented detailed information about mental skills and understanding that will allow them to biological systems that are transforming the way that we do focus on specific subareas and problems later in their ca- almost all of biology. Problems investigated by computa- reers. Computational biology is a new emerging area that tional biologists span a wide spectrum including topics as has applications as broad as biology itself. The problems of diverse as the genetics of disease susceptibility, comparing interest, as well as the tools available to study them, will whole DNA genomes to uncover the secrets of evolution, undoubtedly change during the four years of an undergradu- predicting protein structures and understanding their mo- ate program. The program is an excellent preparation for tions and interactions, designing new therapeutic drugs, students who wish to specialize in one of these computa- mathematically modeling the complex signaling mecha- tional areas in graduate school. There is great, and increas- nisms within cells, predicting how ecosystems will respond ing, demand for research scientists and technical personnel to climate change, and designing recovery plans for endan- who can bring mathematical and computational skills to gered species. The computational biologist must have skills the study of biological problems. in mathematics, statistics, and the physical sciences as well Computational Molecular Biology (CMB) is an inter- as in biology. A key goal in training is to develop the ability disciplinary field that brings together numerous diverse re- to relate biological processes to mathematical models that search areas. A separate and isolated program in CMB will can be solved computationally. have difficulties in maintaining excellence in all fields, in Cornell faculty work primarily in four subareas of com- teaching the diverse tools, and in providing the breadth of putational biology: biomolecular structure, bioinformatics research topics that form the core of CMB. We therefore and data mining, ecology and evolutionary biology, and propose a different model of a multi-field program in Com- statistical and computational methods for modeling bio- putational Molecular Biology. Computational Molecular logical systems. These include the computational study of Biology is a program that crosses several fields. For example, topics such as DNA databases, protein structure and func- to meet the program conditions, a Ph.D. candidate in com- tion, computational neuroscience, biomechanics, popula- puter science can have supplementing studies in molecu- tion genetics, and management of natural and agricultural lar biology. Alternatively, a Ph.D. student in the biophysics systems. Beyond the basic core skills in mathematics, physi- field can have supplementing studies in computer science cal sciences and biology, the computational biology pro- and meet the CMB requirements. Hence, the students of gram of study requires additional coursework in mathemat- this program may come from diverse fields such as mo- ics, computer programming, a “bridging” course aimed at lecular biology and genetics or computer science, creating connecting biology to computation, and an advanced course the diverse community of researchers that we seek in CMB. where the theoretical/computational component of one

aspect of biology will be studied. ○○○○○○○ Computational Science and Engineering ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○

any of the faculty in engineering and the sciences CS 401 Applied Scientific Computing with MATLAB Mengage in research that is computationally driven. CS 402 Scientific Visualization with MATLAB Computational science and engineering (CS&E) at CS 403 Development of Scientific Computing Programs Cornell continues to be as strong as ever. Critical to the in a Unix Environment overall environment is the Cornell Theory Center, whose CS 404 Survey and Use of Libraries for Scientific Com- Velocity Cluster supports lines of inquiry that require in- puting tensive, large-scale computation. This year the CS&E subgroup of the FCI accomplished These practical, 4-week courses are directed at beginning several things. First, it created four “FCI short courses” graduate students across the campus. With FCI support, to be offered during the coming academic year: the Department of Earth and Atmospheric Sciences hired

103 Dr. Andrew Pershing, who will serve as the instructor. Finally, the CS&E subgroup helped orchestrate the We expect to be able to offer these courses and other hiring of Professor Hod Lipson in the School of Mechani- courses as “CIS” courses in future years. cal and Aerospace Engineering. This appointment will The CS&E subgroup also put together a website that do a great deal to enrich the connection between the FCI publicizes the CS&E activities at Cornell. Faculty and and the College of Engineering. courses are presented in a way that is useful to current

and incoming students. ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Digital Arts and Graphics ○○○○○○○○○○○○○

raphics is approaching a crossroads. University de- Gpartments around campus depend on computer technology; architecture can’t be produced without the computer; art graduates don’t have to use computers, but many are discovering new creative outlets using them. Computational graphics, which has been dominated by the entertainment industry, will change dramatically in the next decade or two. We have the process, technology and knowledge to effect this change correctly—simulate the physical world with images that are faithful— and we believe that studies that integrate computer technol- ogy in the arts and graphics arenas will become an av- enue of importance. The focus is on many areas, includ- ing, but not limited to music, art, and arcitecture. As technology becomes more integrated into their artistic enterprises, Cornell students from many disciplines will gain an understanding of the computer fundamentals that

will help them grow as artists. ○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○ Information Science ○○○○○○○○○○○○○○○○

nformation Science at Cornell is an interdisciplinary electronic communication; knowledge networking; col- Iprogram in the FCI that allows graduate and under- laboration within and across groups, communities, or- graduate students to study new theories, models, con- ganizations, and society; the web and web information cepts and design principles that incorporate an under- systems; natural language processing; computational standing of both social and technical information sys- techniques in the collection, archiving and analysis of tems. The field of information science combines aspects social science data; information privacy; methods of col- of computer science and human-computer interaction lecting, preserving, and distributing information; infor- with an examination of the social, economic, political, mation system design; cognition and learning; and hu- and legal contexts in which information systems func- man interface design and evaluation. tion. Students in the information science program will obtain an understanding of the core topics of study emerg- ing in this new and quickly growing field: the design and analysis of computing applications, information infra- structures, and human-centered systems; the legal, eco- nomic, and ethical issues that surround the construction of information systems; and the ways in which informa- tion technology is transforming society. Specific topics emphasized in the information science program include

104