23.10.2013 Views

2008–2009 - Florida Institute of Technology

2008–2009 - Florida Institute of Technology

2008–2009 - Florida Institute of Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

After passing the comprehensive examination, the student<br />

prepares a dissertation proposal representing the research plan<br />

to be followed. The dissertation research is carried out under<br />

close supervision <strong>of</strong> the student’s doctoral adviser and committee.<br />

After completion <strong>of</strong> the research project and with the approval <strong>of</strong><br />

the adviser, the dissertation is submitted to the doctoral committee<br />

for critical evaluation, followed by an oral defense <strong>of</strong> the<br />

dissertation.<br />

reSeArch<br />

Computer sciences faculty members and students are conducting<br />

research in the following areas:<br />

Computational Intelligence: computer vision, constraint reasoning,<br />

data mining, machine learning, speech recognition, swarm<br />

intelligence, spatio-temporal multidimensional reasoning.<br />

Computational Science: bioinformatics, statistical computing.<br />

Computer Security Engineering: cryptology, cryptography and<br />

cryptanalysis; secure s<strong>of</strong>tware development and testing; malicious<br />

code, network security and intrusion detection.<br />

Distributed Computing: agents and coordination, Internet<br />

computing, negotiations, peer-to-peer networks.<br />

Languages: functional language, internationalization, type<br />

systems.<br />

S<strong>of</strong>tware engineering faculty and students are currently conducting<br />

research in s<strong>of</strong>tware documentation, evolution, reliability and<br />

testing.<br />

Research facilities provide open access to a wide range <strong>of</strong><br />

computing hardware, operating systems, s<strong>of</strong>tware development<br />

applications and general purpose computing applications. Several<br />

research centers and laboratories support specialized research<br />

interests <strong>of</strong> faculty and students.<br />

Center for Computation and Intelligence (CCI): The center<br />

studies how to make computers more intelligent as well as how<br />

intelligence can change the way we compute. Specifically, CCI<br />

investigates algorithms that can help computers learn (machine<br />

learning), listen (speech recognition), reason (constraint reasoning,<br />

spatio-temporal reasoning) and see (computer vision).<br />

Moreover, the center examines how distributed intelligent agents<br />

can interact (coordination, distributed constraint reasoning,<br />

cryptography). CCI also studies how simple animal behavior<br />

can provide a novel way to solve problems (swarm intelligence).<br />

Applications <strong>of</strong> techniques include computational biology, computer<br />

security, device monitoring, digital government, surveillance<br />

and Web personalization.<br />

Center for S<strong>of</strong>tware Testing, Education and Research: One <strong>of</strong><br />

the key barriers to effective testing in industry is weak education<br />

in the practical methods <strong>of</strong> s<strong>of</strong>tware testing. The mission <strong>of</strong> the<br />

center is to create effective, grounded, timely materials to support<br />

the teaching and self-study <strong>of</strong> s<strong>of</strong>tware testing, s<strong>of</strong>tware reliability<br />

and quality-related s<strong>of</strong>tware metrics. Examples <strong>of</strong> recent work can<br />

be found on the center’s Web site at www.testingeducation.org<br />

(see the Academic Overview section in this catalog).<br />

S<strong>of</strong>tware Evolution Laboratory (SEL): The primary mission<br />

<strong>of</strong> this laboratory is to advance the state-<strong>of</strong>-the-art in evolving<br />

complex s<strong>of</strong>tware systems in a disciplined manner. This includes<br />

70 <strong>Florida</strong> Tech<br />

research related to legacy system re-engineering, reverse engineering,<br />

program understanding and s<strong>of</strong>tware maintenance. The<br />

systems in question can be traditional s<strong>of</strong>tware applications or<br />

Web-based applications. The secondary mission <strong>of</strong> the SEL is to<br />

advance the state-<strong>of</strong>-the-practice in s<strong>of</strong>tware evolution by transitioning<br />

results from the laboratory into widespread use through<br />

evidence-based arguments (such as empirical studies) that objectively<br />

support the efficacy <strong>of</strong> the techniques in question. Issues<br />

related to technology adoption are necessarily a part <strong>of</strong> this effort.<br />

An example <strong>of</strong> recent work is the investigation <strong>of</strong> the impact <strong>of</strong><br />

test-driven development (TDD) techniques, such as Extreme<br />

Programming (XP), on long-term s<strong>of</strong>tware maintenance costs.<br />

University Center for Information Assurance (UCIA): The<br />

center is funded by both industry and government sponsors and<br />

concentrates on all aspects <strong>of</strong> computer hardware and s<strong>of</strong>tware<br />

security. Faculty participants are internationally recognized for<br />

their technical contributions, especially in the areas <strong>of</strong> hardware<br />

and s<strong>of</strong>tware security testing. License agreements in place with<br />

a number <strong>of</strong> industry leaders enable the implementation <strong>of</strong><br />

research results in commercial quality hardware and s<strong>of</strong>tware<br />

products, focusing on assuring the integrity <strong>of</strong> computer hardware<br />

and s<strong>of</strong>tware applications from malicious intrusion. The<br />

center performs funded hardware and s<strong>of</strong>tware testing, vulnerability<br />

testing, security assessments and basic research in computer<br />

security and s<strong>of</strong>tware development testing.<br />

DePartment <strong>of</strong> eleCtriCal anD ComPuter<br />

engineering<br />

Robert L. Sullivan, Ph.D., Head<br />

Degree Programs<br />

Computer Engineering, B.S., M.S., Ph.D.<br />

Electrical Engineering, B.S.<br />

Electrical Engineering, M.S.<br />

Areas <strong>of</strong> Specialization:<br />

Electromagnetics<br />

Photonics<br />

Systems and Information Processing<br />

Wireless Systems and <strong>Technology</strong><br />

Electrical Engineering, Ph.D.<br />

Pr<strong>of</strong>essors<br />

Barry G. Grossman, Ph.D., fiber-optic sensor systems and smart structures,<br />

fiber-optic communications.<br />

John Hadjilogiou, Ph.D., P.E., switching theory, computer organization.<br />

Fredric M. Ham, Ph.D., Harris Pr<strong>of</strong>essor, digital signal processing, neural<br />

networks.<br />

Samuel P. Kozaitis, Ph.D., automated feature extraction, image fusion.<br />

Robert L. Sullivan, Ph.D., University Pr<strong>of</strong>essor, power systems, power<br />

electronics.<br />

Lynn E. Weaver, Ph.D., nuclear energy, control systems.<br />

Associate Pr<strong>of</strong>essors<br />

Veton Z. Këpuska, Ph.D., human-machine interaction and<br />

communication, speech recognition.<br />

Syed H. Murshid, Ph.D., photonics, fiber-optic sensors, acoustic and fiberoptic<br />

communications, power electronics, instrumentation.<br />

Assistant Pr<strong>of</strong>essors<br />

Georgios C. Anagnostopoulos, Ph.D., machine learning, pattern<br />

recognition.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!