Difference between revisions of "Home"
From ACES
Tags: Visual edit: Switched Manual revert |
|||
(51 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
{{DISPLAYTITLE:}} | {{DISPLAYTITLE: Welcome to Adaptive Computing and Embedded Systems(ACES) Lab}}__NOTOC__ | ||
The Adaptive Computing and Embedded Systems (ACES) Lab, lead by Prof. Farinaz Koushanfar, focuses on making intelligent data-intensive embedded computing applications and systems. The added intelligence is to satisfy security and robustness, energy-efficiency, timeliness, IP protection rights, design automation, and many more requirements of emerging technologies. | |||
<!-- Images can be replace using visual editor. But the source editor must be used to add / remove / change the order of images. | <!-- Images can be replace using visual editor. But the source editor must be used to add / remove / change the order of images. | ||
--><ul data-orbit> | --><ul data-orbit> | ||
Line 5: | Line 7: | ||
[[File:Obama2.jpg|Obama2|link=]] | [[File:Obama2.jpg|Obama2|link=]] | ||
<div class="orbit-caption"> | <div class="orbit-caption"> | ||
Obama2 | Obama2 | ||
</div> | </div> | ||
</li> | </li> | ||
Line 11: | Line 13: | ||
[[File:TR35.jpg|TR35|link=]] | [[File:TR35.jpg|TR35|link=]] | ||
<div class="orbit-caption"> | <div class="orbit-caption"> | ||
TR35 | TR35 | ||
</div> | </div> | ||
</li> | </li> | ||
Line 17: | Line 19: | ||
[[File:Group UCSD.jpg|Group UCSD|link=]] | [[File:Group UCSD.jpg|Group UCSD|link=]] | ||
<div class="orbit-caption"> | <div class="orbit-caption"> | ||
Group UCSD | Group UCSD | ||
</div> | </div> | ||
</li> | </li> | ||
Line 23: | Line 25: | ||
[[File:Main_page_1.png|400px|right]] | [[File:Main_page_1.png|400px|right]] | ||
Our modern society is increasingly dependent on embedded computing devices that process a vast amount of data. Common examples include visual computing on mobile phones, automotive embedded system, wireless sensor networks, implantable medical devices, and mobile virtual reality games. The content, communication, and processing algorithms can be overwhelming on small platforms. What exacerbates the problem are the real-time constraints set by certain applications, which prohibits outsourcing to the cloud due to the incurred delay and uncertainty. | Our modern society is increasingly dependent on embedded computing devices that process a vast amount of data. Common examples include visual computing on mobile phones, automotive embedded system, wireless sensor networks, implantable medical devices, and mobile virtual reality games. The content, communication, and processing algorithms can be overwhelming on small platforms. What exacerbates the problem are the real-time constraints set by certain applications, which prohibits outsourcing to the cloud due to the incurred delay and uncertainty. | ||
Line 30: | Line 30: | ||
A distinguishing characteristic of our research is bridging the divide between the theory and implementation. One the one hand, we use theoretical methods from various disciplines such as statistics, optimization, and cryptography to address complex hardware engineering problems. On the other hand, we utilize practical computer engineering and design automation techniques to address sophisticated problems in security, data mining, and emerging technologies. Simultaneous with development of models and theory, we realize and deploy the results in practice whenever possible. In such a way, we obtain a proof-of-concept from our realization, which often proposes novel methodologies and newer research directions. We also have a number of collaborative projects with experts in relevant fields (e.g., security, data mining, computer architecture). | A distinguishing characteristic of our research is bridging the divide between the theory and implementation. One the one hand, we use theoretical methods from various disciplines such as statistics, optimization, and cryptography to address complex hardware engineering problems. On the other hand, we utilize practical computer engineering and design automation techniques to address sophisticated problems in security, data mining, and emerging technologies. Simultaneous with development of models and theory, we realize and deploy the results in practice whenever possible. In such a way, we obtain a proof-of-concept from our realization, which often proposes novel methodologies and newer research directions. We also have a number of collaborative projects with experts in relevant fields (e.g., security, data mining, computer architecture). | ||
== Recent publications == | |||
<div class="bibliography" data-style="list" data-more="1"><!-- | |||
-->[[File:Ajax-loader.gif]]<!-- | |||
--><div class="bibliography-data" style="display:none"><!-- | |||
-->{{#tag:nowiki|{{#invoke:Publications|main|limit=10}}}}<!-- | |||
--></div><!-- | |||
--></div> | |||
== People == | |||
<div class="people"> | |||
<div id="group-supervisor"> | |||
=== Supervisor === | |||
<div class="people-list"> | |||
{{Member | |||
|Name=Farinaz Koushanfar | |||
|Role=Supervisor | |||
|Email=farinaz@ucsd.edu | |||
|Photo=Farinaz.jpg | |||
|Title=Principal Coordinator | |||
}} | |||
</div> | |||
</div> | |||
<div id="group-postdoctoral"> | |||
===Postdoctoral & Visiting Scholar=== | |||
<div class="people-list"> | |||
{{Member | |||
| Name = Zahra Ghodsi | |||
| Role = Postdoctoral | |||
| Email = zghodsi@ucsd.edu | |||
| Website = https://ghodsi.me | |||
| Photo = Zahra Ghodsi.jpg | |||
}} | |||
{{Member | |||
| Name = Seira Hidano | |||
| Role = Visiting Scholar | |||
| Email = | |||
| Photo = Seira Hidano.jpg | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Nasimeh Heydaribeni | |||
| Role = Visiting Scholar | |||
| Email = | |||
| Photo = Nasimeh Heydaribeni.jpg | |||
| Title = | |||
}} | |||
</div> | |||
</div> | |||
<div id="group-phd"> | |||
===PhD Student=== | |||
<div class="people-list"> | |||
{{Member | |||
| Name = Huili Chen | |||
| Role = PhD | |||
| Email = huc044@eng.ucsd.edu | |||
| Photo = Huili Chen.jpg | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Mojan Javaheripi | |||
| Role = PhD | |||
| Email = mojavahe@eng.ucsd.edu | |||
| Website = http://acsweb.ucsd.edu/~mojavahe | |||
| Photo = mojan.jpg | |||
| Title = Deep Learning, AutoML | |||
}} | |||
{{Member | |||
| Name = Shehzeen Hussain | |||
| Role = PhD | |||
| Email = ssh028@eng.ucsd.edu | |||
| Website = https://shehzeen.github.io/ | |||
| Photo = Shehzeen Hussain.jpg | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Xinqiao Zhang | |||
| Role = PhD | |||
| Email = x5zhang@eng.ucsd.edu | |||
| Photo = Xinqiao Zhang.png | |||
| Title = | |||
| Website = https://xinqiaozhang.github.io/ | |||
}} | |||
{{Member | |||
| Name = Cody Emerson | |||
| Role = PhD | |||
| Email = cemerson@ucsd.edu | |||
| Photo = | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Nojan Sheybani | |||
| Role = PhD | |||
| Email = nsheyban@ucsd.edu | |||
| Photo = Nojan.jpg | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Shashank Balla | |||
| Role = PhD | |||
| Email = sballa@ucsd.edu | |||
| Photo = SballaSquare.JPG | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Jung-Woo Chang | |||
| Role = PhD | |||
| Email = juc023@ucsd.edu | |||
| Photo = Jung-Woo Chang.jpg | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Ruisi Zhang | |||
| Email = ruz032@ucsd.edu | |||
| Photo = ruisi.jpg | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Yaman Jandali | |||
| Role = Master | |||
| Email = yeljanda@ucsd.edu | |||
| Photo = Yaman Jandali.jpg | |||
| Title = | |||
}} | |||
</div> | |||
</div> | |||
<div id="group-master"> | |||
===Master & Undergraduate=== | |||
<div class="people-list"> | |||
{{Member | |||
| Name = Benjamin Yang | |||
| Role = Master | |||
| Email = beyang@ucsd.edu | |||
| Photo = | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Zhifei Xie | |||
| Role = Master | |||
| Email = zhxie@ucsd.edu | |||
| Photo = | |||
| Title = | |||
}} | |||
{{Member | |||
| Name = Jefferson Chien | |||
| Role = Master | |||
| Email = jkchien@ucsd.edu | |||
| Photo = | |||
| Title = | |||
}} | |||
</div> | |||
</div> | |||
<div id="group-undergraduate"> | |||
<div class="people-list"></div> | |||
</div></div> | |||
== Alumni == | |||
'''Ph.D. Alumni''' | |||
*Siam Hussain (PhD 2021), Research Scientist at Chainlink Labs | |||
* Mohammad Samragh (PhD 2021), Research Scientist at Apple Mind | |||
* Bita Rouhani (PhD 2018), Principal Research Scientist at Microsoft Azure | |||
* Ebrahim M. Songhori (PhD 2017), Research Scientist at Google Brain | |||
* Azalia Mirhoseini (PhD 2016), Research Scientist and Manager at Google Brain | |||
* Masoud Rostami (PhD 2014), Senior Software Engineer at Microsoft Bing | |||
* Mehrdad Majzoobi (PhD 2012), Founder and CEO at BitLock | |||
* --------------------------------------------------- | |||
* Golsa Ghiaasi Hafezi (Post-doc), Senior Scientist in Silicon Austria Labs GmbH | |||
* Joonho Kong (Post-doc), Associate Professor at Kyungpook National University | |||
* Arslan Munir (Post-doc), now Assistant Professor at the University of Nevada, Reno | |||
'''M.S. Alumni''' | |||
* Mohammad Ghasemzadeh (MS), Apple | |||
* Ye Zhang (MS), pursuing PhD at Rice University | |||
* Chenhui Huang (MEE), now at Oracle | |||
* Salar Yazdjerdi (MEE), now at Uber Software Development | |||
* Kangqiao Hu (MEE), now at AMD | |||
* Ming Tong (MEE), now at C&J Energy Services | |||
* Kai Li (MEE), now at Qualcomm | |||
* Cathy Huang (BS), pursuing MBA at Duke | |||
* Kevin Ting (BS), Customer Success Manager at HealthCrowd | |||
* Akshat Kharaya (Undergrad Intern), now senior analyst at McKinsey & Company |
Latest revision as of 18:06, 9 October 2023
The Adaptive Computing and Embedded Systems (ACES) Lab, lead by Prof. Farinaz Koushanfar, focuses on making intelligent data-intensive embedded computing applications and systems. The added intelligence is to satisfy security and robustness, energy-efficiency, timeliness, IP protection rights, design automation, and many more requirements of emerging technologies.
Our modern society is increasingly dependent on embedded computing devices that process a vast amount of data. Common examples include visual computing on mobile phones, automotive embedded system, wireless sensor networks, implantable medical devices, and mobile virtual reality games. The content, communication, and processing algorithms can be overwhelming on small platforms. What exacerbates the problem are the real-time constraints set by certain applications, which prohibits outsourcing to the cloud due to the incurred delay and uncertainty.
To be viable, there are at least two major sets of technical challenges that need to be addressed for small form-factor platforms that enable present and pending Internet-of-Everything (IoE) systems. One set of hurdles has to do with resource and/or application constraints such as real-time, available energy, or memory. Another set of barriers arises due to security, reliability or safety requirements. Attacks on these systems go far beyond destruction of data, as they have the potential to impact physical assets and people’s lives. In this context, classic solutions for resource-efficiency and/or security are of limited effectiveness.
A distinguishing characteristic of our research is bridging the divide between the theory and implementation. One the one hand, we use theoretical methods from various disciplines such as statistics, optimization, and cryptography to address complex hardware engineering problems. On the other hand, we utilize practical computer engineering and design automation techniques to address sophisticated problems in security, data mining, and emerging technologies. Simultaneous with development of models and theory, we realize and deploy the results in practice whenever possible. In such a way, we obtain a proof-of-concept from our realization, which often proposes novel methodologies and newer research directions. We also have a number of collaborative projects with experts in relevant fields (e.g., security, data mining, computer architecture).
Recent publications[edit | edit source]
People[edit | edit source]
Supervisor[edit | edit source]
Postdoctoral & Visiting Scholar[edit | edit source]
PhD Student[edit | edit source]
Master & Undergraduate[edit | edit source]
Alumni[edit | edit source]
Ph.D. Alumni
- Siam Hussain (PhD 2021), Research Scientist at Chainlink Labs
- Mohammad Samragh (PhD 2021), Research Scientist at Apple Mind
- Bita Rouhani (PhD 2018), Principal Research Scientist at Microsoft Azure
- Ebrahim M. Songhori (PhD 2017), Research Scientist at Google Brain
- Azalia Mirhoseini (PhD 2016), Research Scientist and Manager at Google Brain
- Masoud Rostami (PhD 2014), Senior Software Engineer at Microsoft Bing
- Mehrdad Majzoobi (PhD 2012), Founder and CEO at BitLock
- ---------------------------------------------------
- Golsa Ghiaasi Hafezi (Post-doc), Senior Scientist in Silicon Austria Labs GmbH
- Joonho Kong (Post-doc), Associate Professor at Kyungpook National University
- Arslan Munir (Post-doc), now Assistant Professor at the University of Nevada, Reno
M.S. Alumni
- Mohammad Ghasemzadeh (MS), Apple
- Ye Zhang (MS), pursuing PhD at Rice University
- Chenhui Huang (MEE), now at Oracle
- Salar Yazdjerdi (MEE), now at Uber Software Development
- Kangqiao Hu (MEE), now at AMD
- Ming Tong (MEE), now at C&J Energy Services
- Kai Li (MEE), now at Qualcomm
- Cathy Huang (BS), pursuing MBA at Duke
- Kevin Ting (BS), Customer Success Manager at HealthCrowd
- Akshat Kharaya (Undergrad Intern), now senior analyst at McKinsey & Company