Research Areas. Computer Security and Cryptography. Focuses on applied cryptography, authentication, software and system security, threat modeling, anomaly detection, wireless security, cloud security, human-centered security, differential privacy and empirical cyber security.
Natural Language Processing. Focuses on developing fundamental techniques, prototype systems and applications in natural language processing and information retrieval. Computer Vision. Algorithms for computer vision have a close relationship to methods of pattern recognition and machine learning. Computing Education. Focuses on expanding approaches to teaching computing at all levels K and University and the outreach to promote computing majors and careers.
Edge Computing and Embedded Systems and Robotics. Databases and Data Science. Focuses on developing fundamental techniques, prototype systems and applications in databases and information retrieval. Society and Computing. Computing is ubiquitous in society today. Computing touches all aspects of our lives and sometimes in ways that are not beneficial even though the intent of the developer is not to cause harm. What has become clear is that we cannot develop systems for society without meaningful and deep collaborations with disciplines that have thought about society for much longer than computing.
The challenge is to incorporate knowledge from humanistic studies from day one in the design of computing systems. Programming Languages and Software Engineering. Programming Language research focuses on type systems, program logics, language-based and differential privacy and security; language, compiler, and run-time design for reliable systems; static and dynamic analyses for real-time Android; run-time visualization and verification; adaptive memory management; language concepts for database programming; logic- and constraint-based systems.
Mobile Computing. Mobile systems research focuses on the design and implementation of next-generation systems for mobile devices. Research topics include mobile data management, wireless networks, sensing systems, static analysis and instrumentation for mobile apps, mobile image and video analytics, and secure and low-power hardware for mobile devices.
Computational Biology and Bioinformatics. Focuses on developing highly efficient algorithms and techniques for a wide range of problems such as automatic analysis of biomedical images, computer-assisted diagnosis, treatment planning, protein-protein interaction network analysis, protein structure prediction, computational analysis and interpretation of Genomes, evolutionary studies of Genomic ORFans, and spatial positioning patterns of the cell nucleus arising in smart hospital, smart healthcare, precision medicine, genomics, proteomics, and microarray analysis.
Distributed Systems and Networks. Research in networking and distributed systems focuses on enabling communication of and orchestrating coordination of a large number of computing nodes. Computer Architecture and Hardware. Hardware and software issues from the circuit to the system have three main foci: Very Large Scale Integration VLSI circuits and systems, computer architecture, and computer security.
High-Performance Computing. Focuses on efficient experimental and theoretical solutions to problems on state-of-the-art computational systems consisting of large numbers of computational elements, including clouds, clusters, grids, networks-of-workstations, massively parallel supercomputers, and GPU-based systems.
Operating Systems. ArcGIS Desktop allows you to create maps, perform spatial analysis, and manage data. You can import multiple data formats and use powerful analytical tools and workflows to identify spatial patterns, trends, and non-obvious relationships.
Citrix allows client devices computers to connect to various desktop virtualization services offered by Citrix. Reference management software application used to manage bibliographies and references when writing essays and articles. Maple helps you analyze, explore, visualize and solve mathematical problems. UB also has some university-wide licenses that are available for departments at no charge or for a nominal fee.
Purchases of hosted solutions over the internet or software, whether installed or accessed from on-premise or in the cloud, can put sensitive university data at risk, may not meet the needs of the campus population with disabilities, may violate the university's Web Accessibility Policy , or may require integration with enterprise level applications or university systems.
Hosted solutions and software applications installed on UB servers must be reviewed by experts in security, financial mangement, accessibility, and the Chief Information Office prior to the purchase occurring to ensure the applications are compatible with university policies, state and federal guidelines. The end result of the review process is to provide a recommendation or approval regarding the purchase of the software, service or application. Ensuring that UB data is secure is a vital part of our business operations.
UB has different security requirements depending on the nature of the data or IT resources the supplier will handle. The greatest risk is associated with purchases requiring the use of Category 1 or Category 2 data per the Data Risk Classification Policy. Find the IT support staff for your unit, department, or academic area. Complete this process prior to selecting a vendor or product, meeting with vendors, or creating a purchase request.
Email the completed form to the software buyer, Cheri Weber. The buyer will review the information, provide guidance on the next steps, and schedule a meeting with the necessary UB staff if required. Departments may not sign agreements or contracts for these purchases. Microsoft products not covered under the Microsoft Campus Agreement can be purchased by faculty and staff for UB-owned computers. All Adobe titles are available through Logisoft, a recommended software supplier, and will be priced under this agreement.
Logisoft also sells academic-priced software from over 50 companies such as Parallels, Adobe, Avid, Absolute, Corel, TechSmith and more.
Review the software available for download to UB-owned computers for faculty and staff. You must be the administrator of your computer to install most software. Contact your departmental IT support staff to install this software. Review the software available to order from UB for UB-owned computers and find out how to order it.
Most manufacturers fulfill your license order electronically through the licensing portals or download sites. Respect the intellectual property of others. Individual programming assignments are expected to be done by individual students; do not take another's work or ideas to call your own.
Exhibit responsible, sensible use of computer hardware, software, and data. About the Author. Assistant Chair Emerita. Need To Talk to Someone? For personal assistance, email the appropriate support team below.
Departmental Inquiries: cse-dept buffalo.
0コメント