Autonomous and Cyber-Physical Systems
Subareas: Real-time and Embedded Systems, Sensor Systems, Mobile Computing, Control Theory and Systems, Formal Methods, Automated Verification and CertificationMore Info
As we are rapidly moving towards the design of autonomous systems, such a disciplined approach towards the design and implementation of control algorithms, as promoted by CPS, is increasingly becoming important. The presence of complex sensors, like cameras, radars, and lidars – that are today common in autonomous cars, drones, or robots – introduce large processing delays, and offer different tradeoffs between accuracy, delay and resource requirements. These tradeoffs need to be explicitly accounted for when designing control algorithms that use such sensors. The distributed and multicore processing platforms on which control algorithms are implemented today also defy the traditional view of a centralized controller that has a synchronized access to all sensors, can compute all control inputs instantaneously, and can provide all actuations synchronously. Instead new controller design and implementation strategies that marry control theory with formal methods, and other branches of Computer Science like program analysis and compilers is becoming important.
Bioinformatics and Computational Biology
Subareas: Biostatistics, Computational Genetics, Proteomics, Statistical GeneticsMore Info
Computational Genetics: Advances have been made over the last decade in our understanding of how genes influence phenotypes and contribute to disease susceptibility. It has become increasingly clear that the underlying mechanisms have a complex basis in which observed clinical outcomes result from a diverse range of causes interconnected through networks of genetic, biological and environmental interactions. The advances in high-throughput genotyping and sequencing have generated massive amounts of data that allow genome-wide analysis to be performed at much finer resolution than before, but at the same time posed great computational challenges. We have investigated a wide range of problems including haplotype inference, imputation, genome-wide association study, alternative splicing analysis, copy number variation detection, methylation, genome annotation and visualization. Immunology,
Development and Differentiation, and Metagenomics: We use novel measurement techniques as well as machine learning methods in understanding the interplay between these areas, with the aim of discovering the forces that shape the immune system throughout life. The overarching goal is to apply the insights from such analyses to propose new treatments for cancers.
Molecular Structure Modeling and Analysis: Diverse biological function is encoded in the atomic structure of macro-molecules such as Proteins and RNA. Understanding the sequence to structure to function relationships allows biochemists to predict the activity of genes and rationally design genes with novel biological function. Our interests include computational geometry models for molecular structure, high performance computing for dynamic simulation, mining structure motifs for protein functional prediction, remote homology detection, protein-protein interaction, and protein-ligand interaction.
Subareas: Accelerators, Clockless Logic, Energy-efficient Computing, SecurityMore Info
Energy-Efficient Systems: With the explosive growth in mobile devices, there has been a push towards increasing energy efficiency of computation for longer battery life. Reducing power consumption is also important for desktop computing to alleviate challenges of heat removal and power delivery. A special focus in our department has been on the development of energy-efficient graphics hardware. Another area of future interest is energy-harvesting systems, which are ultra-low-power systems that operate on energy scavenged from the environment.
Asynchronous or Clockless Computing: Asynchronous VLSI design is poised to play a key role in the design of the next generation of microelectronic chips. By dispensing with global clocks and instead using flexible handshaking between components, asynchronous design offers the benefits of lower power consumption, greater ease of integration of multiple cores, and greater robustness to manufacturing and runtime variation. Our researchers work on all aspects of asynchronous design, including circuits, architectures, and CAD tools. A key area of interest is application to network-on-a-chip for integration of multiple heterogeneous cores.
Hardware-Enhanced Security: CPU vendors are increasingly deploying hardware to support security, such as Intel’s Software Guard Extensions. We are studying hardware/software co-design to support secure execution environments that are efficient and easy to program.
Subareas: Animation & Simulation, Graphics Hardware, Modeling, Rendering, Tracking, Virtual Environments, VisualizationMore Info
Computer-Supported Collaborative Work
Subareas: Architecture of Collaborative Systems, Collaborative Software Engineering, Collaborative Virtual Environments, Mobile Collaboration, TelepresenceMore Info
Subareas: Geometric Vision, Language & Vision, RecognitionMore Info
The 3D Computer Vision group in the Department of Computer Science, led by Prof. Jan-Michael Frahm, conducts research in the areas of geometric computer vision and 3D reconstruction, as well as real-time and active computer vision. The Recognition group, led by Prof. Alexander Berg, develops algorithms for object detection, image understanding, and situated recognition in the real world, and studies large-scale machine learning.
The goal of the research being done by the 3D Computer Vision group is to develop fully automated systems for accurate and rapid 3D reconstruction of urban environments from photo collections and videos. The focus includes modeling the dynamic and transient scene objects to bring the models “alive”. Beyond pure reconstruction, the group has research thrusts on large-scale geo-location of terrestrial images. For many applications, 3D models are more descriptive and compact than the frames of the original video. For example, in a 3D model of a city, users can see a very large area at once, realize the spatial arrangement of the buildings at a single glance, and navigate freely to the parts that most interest them, something that would be more difficult and time-consuming using the original video. The 3D Computer Vision group further investigates in collaboration with Prof. Fabian Monrose the impact of modern computer vision methods onto data privacy and computer security.
The goal of the Recognition group is to develop algorithms to enable computers to extract semantic information from still image, depth, and video data. This includes understanding high-level scene categories (e.g., city, beach, forest, classroom), segmenting and identifying individual objects (cars, people, buildings, etc.), as well as identifying materials (glass, metal, wood, etc.) and surface properties (e.g., horizontal vs. vertical surfaces). The Recognition group is also developing efficient methods for large-scale recognition both on the internet and in the real world. The latter focus, on situated recognition algorithms, contributes to developing better systems — such as robots — for interacting in the physical world.
The goal of the Language and Vision group is to develop a better understanding of the relationship between people, their visual data, and the language they use to describe that data. In particular, this includes developing methods to: describe images or video using natural language, predict how a person will refer to specific objects in complex real-world scenes, and answer natural language questions about images. The group also works on problems related to understanding what our pictures reveal about ourselves. Tasks include clothing and style recognition and are applied to clothing recognition and other e-commerce-related problems.
Subareas: Geometric Modeling & Computation, Solid Modeling
Faculty: SnoeyinkMore Info
Subareas: Parallel Algorithms, Cyberinfrastructure, GPUs & Other Computational Accelerators, Performance Analysis, Programming & Memory Models for Parallel Computing, Scientific ComputingMore Info
Application of HPC principles and techniques for real-time physically based simulations and for large-scale scientific computing problems. Examples include simulation of physical, visual, and acoustic properties of spaces and materials, and computational fluid dynamics problems to understand mechanisms of flying and swimming in organisms from tiny insects to giant whales.
Subareas: Assistive Technology, Haptics, Human Factors Analysis, Sound & Audio Display, User-Interface Toolkits, Virtual EnvironmentsMore Info
Wearable devices, such as smart watches and smart glasses, and other common sensors are increasingly facilitating new modes of interaction with modern computers—making the goal of ubiquitous computing realizable. A major research direction in HCI at UNC is exploring design techniques and system support to more easily extend desktop and phone applications onto devices with widely varying form factors and interaction modes.
Another significant research direction at UNC is exploring assistive technologies for users with impairments, such as learning disabilities, blindness, and low vision. These populations face significant barriers to education and employment that we aim to reduce, as well as study different modes of interaction with computers.
Machine Learning and Data Mining
Subareas: Data Integration, Internet of Things, Knowledge Discovery, Machine Learning, Scientific Data Management, Visual AnalyticsMore Info
Machine Learning: The problems we study combine vast amounts and disparate types of measurements with equally complex prior knowledge, posing unique challenges for machine learning. Our interests include both modeling paradigms, such as Bayesian nonparametric methods, and inference methodologies, such as MCMC, variational methods and convex optimization. We also work on structured, interpretable, and generalizable deep learning models. Other topics of focus include multi-task learning, reinforcement learning, and transfer learning.
Internet of Things: The Internet of Things (IoT) is a fabric that is aimed at connecting every object in the world to the Internet. There are two schools of thoughts regarding IoT, emphasizing — IoT devices and networks, and IoT data analytics. Understanding both is essential to designing an end-to-end IoT system that senses the physical world, learns and makes inferences, talks to other IoT systems, and caters plethora of data-driven services that help us making better decisions, save our time, make our lives efficient, and keep us healthier.
Medical Image Analysis
Subareas: Biomechanical Modeling, Diffusion Imaging, Image-guided Interventions, Segmentation, Shape Analysis, RegistrationMore Info
Natural Language Processing
Subareas: Language Generation, Multimodal and Grounded NLP (with Vision and Robotics), Question Answering and DialogueMore Info
Subareas: Distributed Systems, Internet Measurements, Multimedia Systems, Multimedia Transport, Network ProtocolsMore Info
Subareas: File Systems, Virtualization, Concurrency, Software Support for Secure HardwareMore Info
This area has substantial overlap with a number of other research areas, including cyber-physical systems, real-time systems, mobile systems, networking, architecture, human-computer interaction, and security.
Collectively, this group has a track record of building substantial software systems that have impacted both research and industry, such as MC^2, Graphene, and BetrFS.
Real-Time SystemsMore Info
Subareas: Assistive Robotics, Manipulation, Medical Robotics, Motion Planning & Control, Robot Learning, Robot Perception (see: Computer Vision)More Info
At UNC, we are creating new algorithms to address fundamental computational challenges in robotics, including increasing the autonomy of robots, motion planning in complex environments, and providing new interfaces for natural human-robot interaction. We bring a broad range of expertise to these problems, including geometric methods, probabilistic methods, physically-based simulation, many-core CPU and GPU parallelization, cloud computing, machine learning, natural language processing, and computer vision. We apply the new algorithms and methods we develop to a variety of applications involving both physical robots as well as virtual agents. Current applications include robot-assisted medical procedures, surgery training, robot design optimization, autonomous vehicles, and personal assistant robots.
Subareas: Cloud Computing Security, Hardware Security, Mobile Device Security, Network SecurityMore Info
Network security: Today’s Internet infrastructure is a common target of attack and the vehicle for numerous unwanted activities in network applications (e.g., spam, phishing). We are conducting research to evaluate the extent of these vulnerabilities and to develop defenses against them. This includes research on both protecting the Internet infrastructure from attack and designing defenses within the context of network applications.
Cloud computing security: An undeniable trend in computing is increased use of “clouds”, i.e., facilities to which customers outsource data and processing. Because these facilities are shared, however, a customer’s data and processing may reside with those of competitors or attackers, and so privacy and integrity of the customer’s activities are paramount. We are developing technologies to better protect data and processing in such threatening environments.
Mobile device security: Mobile devices like smartphones pose interesting challenges and opportunities in the area of computer security. Challenges arise because as mobile devices evolve toward fully functional computers with platforms like Android, they become targets for exploits that are now common for personal computers and potentially new exploits arising from the usage modes they enable. That said, as the first truly ubiquitous mobile computer, they offer new opportunities for security functionality, as well, e.g., for user authentication. We are conducting research to address the threats facing mobile devices and to harness the new opportunities they offer.