Networked & Distributed Computing
Kang G. Shin recognized with Distinguished Leadership Award by IEEE Computer Society Technical & Conference Activities BoardHis work in the area of real-time computing has spanned decades and has had impact in a broad range of applications.
Z. Morley Mao elected IEEE fellow for contributions to performance and security of internet routing and mobile systemsProf. Mao and her students have played an important role in understanding the efficiency, security, and performance of a number of mobile systems.
Enabling efficient, globally distributed machine learningA group of researchers at U-M is working on the full big data stack for training machine learning models on millions of devices worldwide.
Alumnus Yi-Jun Chang Wins PODC Dissertation Award
His work is in complexity theory of distributed computing.
“Hiding” network latency for fast memory in data centers
A new system called Leap earned a Best Paper award at USENIX ATC ‘20 for producing remote memory access speed on par with local machines over data center networks.
Enabling fairer data clusters for machine learning
Their findings reduce average job completion time by up to 95% when the system load is high, while treating every job fairly.
Big data, small footprint
How changing the rules of computing could lighten Big Data’s impact on the internet.
Five papers by CSE researchers presented at NSDIThe teams designed systems for faster and more efficient distributed and large-scale computing.
$1M grant to develop U-M high-capacity research network
The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research data on and off campus.
Facebook Fellowship for improving high-demand web services
Akshitha Sriraman works to enable hyperscale computing on high-demand web services.
Award for helping popular websites better direct their internet traffic
Edge Fabric offers providers real-time performance analysis and a way to incorporate this data into routing decisions.
Chowdhury receives VMWare Award to further research on cluster-wide memory efficiency
Chowdhury’s work has produced important results that can make memory in data centers both cheaper and more efficient.
Army Award to speed up distributed methods over networks
Danai Koutra has earned an Army Young Investigator Award to speed up graph methods for distributed applications.
All things can be part of the Internet of Things with new RFID system
Sensing technology could keep seniors safe.
Using drones, a new software tool can bring LTE networks anywhere
SkyCore is a complete software solution to deploying mobile networks on unmanned drones
Designing a flexible future for massive data centers
A new approach recreates the power of a large server by linking up and pooling the resources of smaller computers with fast networking technology.
Michigan researchers awarded 2018 Applied Networking Research Prize for their work on speeding up the mobile web
The researchers, including Prof. Harsha Madhyastha and CSE graduate students Vaspol Ruamviboonsuk and Muhammed Uluyol, received prize for their paper, “Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution.”
Net neutrality repeal: Michigan Engineers weigh in
On Dec. 14, the FCC will vote on the rules that today ensure internet service providers treat all web content equally.
Accelerating the mobile web
New Vroom software could double its speed.
A breakthrough for large scale computing
New software finally makes ‘memory disaggregation’ practical.
Open ports act as security wormholes into mobile devices
Researchers have for the first time characterized a widespread vulnerability in the software that runs on mobile devices.
Shadows in the Dark WebSecrets lurk in the dark web, the 95 percent of the internet that most of us can't see. One U-M professor is bringing some of those secrets to light, making the digital and the real world a little safer.
Several Michigan Papers Presented at 2016 USENIX Security SymposiumA total of five papers authored by CSE researchers were presented.
Tracking and mitigating tail latency in data centers
High tail latency has been identified as one of the key challenges facing modern data center design.
Proxy optimizes webpage loading for better user experience
Klotski seeks to improve users’ perceptions of how quickly a page loads by maximizing the amount of important content on the page that is fetched and displayed within the user’s attention span.
Thorny technical questions remain for net neutrality
Not all online traffic is the same; should we treat it the same anyway?
GridWatch named finalist in Vodafone's eighth annual Wireless Innovation competition
GridWatch can detect power outages by monitoring changes to its own power state, locally verifying these outages using a variety of sensors that reduce the likelihood of false power outage reports, and corroborating actual reports with other phones through data aggregation in the cloud.
Michael J. Cafarella selected for Sloan Research Fellowship
He has built software systems for information extraction, database integration, and feature engineering and applied these to problems in the social sciences.
Mosharaf Chowdhury receives Google Faculty Research Award
The project aims to create a new software stack for analytics over geo-distributed datasets.
Barzan Mozafari receives NSF CAREER Award to improve predictability of database systems
Prof. Mozafari is passionate about building large-scale data-intensive systems that are more scalable, more robust, and more predictable.
Secure your website now: Let's Encrypt enters Public Beta
Let's Encrypt allows anyone to request a free website security certificate without needing an invitation.
Censys enables fast searching of actionable internet data
The software enables users to ask questions about the hosts and networks that compose the Internet and get an immediate reply.
$3.46M to Combine Machine Learning on Big Data with Physical Simulations
The focal point of the project will be a new computing resource, called ConFlux, which is designed to enable supercomputer simulations to interface with large datasets while running.
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.