# Research

- Impact Areas
- Research Areas

1 News Results matching all criteria

Speakers — all women — discuss everything from gravitational waves to robot nurses

18 Group Results

#### Research Group

## Algorithms Group

We devise new mathematical tools to tackle the increasing difficulty and importance of problems we pose to computers.

#### Community of Research

## Applied Machine Learning Community of Research

This CoR brings together researchers at CSAIL working across a broad swath of application domains. Within these lie novel and challenging machine learning problems serving science, social science and computer science.

#### Research Center

## Center for Deployable Machine Learning (CDML)

The MIT Center for Deployable Machine Learning (CDML) works towards creating AI systems that are robust, reliable and safe for real-world deployment.

#### Research Group

## Clinical Decision-Making Group

We focus on furthering the application of technology and artificial intelligence in medicine and health-care.

#### Research Group

## Complexity Theory Group

Our interests span quantum complexity theory, barriers to solving P versus NP, theoretical computer science with a focus on probabilistically checkable proofs (PCP), pseudo-randomness, coding theory, and algorithms.

#### Research Group

## Computation Structures Group

Our mission is fostering the creation and development of high-performance, reliable and secure computing systems that are easy to interact with.

#### Community of Research

## Computing & Society Community of Research

This community is interested in understanding and affecting the interaction between computing systems and society through engineering, computer science and public policy research, education, and public engagement.

#### Research Group

## Cryptography and Information Security Group

We seek to develop techniques for securing tomorrow's global information infrastructure by exploring theoretical foundations, near-term practical applications, and long-range speculative research.

#### Research Group

## Decentralized Information Group

We are investigating decentralized technologies that affect social change.

#### Research Group

## Geometric Data Processing Group

Our group studies geometric problems in computer graphics, computer vision, machine learning, optimization, and other disciplines.

#### Research Group

## Multicore Algorithmics

We develop techniques for designing, implementing, and reasoning about multiprocessor algorithms, in particular concurrent data structures for multicore machines and the mathematical foundations of the computation models that govern their behavior.

#### Research Group

## Programming Languages & Verification

Mission: improve the software and hardware development process by replacing ugly development techniques with beautiful ones

Secret weapon: applied mathematical logic, including computer theorem proving (especially Coq) and type systems

Secret weapon: applied mathematical logic, including computer theorem proving (especially Coq) and type systems

#### Research Group

## Quantum Information Science Group

Our research interests center around the capabilities and limits of quantum computers, and computational complexity theory more generally.

#### Community of Research

## Systems Community of Research

The Systems CoR is focused on building and investigating large-scale software systems that power modern computers, phones, data centers, and networks, including operating systems, the Internet, wireless networks, databases, and other software infrastructure.

#### Community of Research

## Theory of Computation Community of Research

The goal of the Theory of Computation CoR is to study the fundamental strengths and limits of computation as well as how these interact with mathematics, computer science, and other disciplines.

#### Research Group

## Theory of Distributed Systems Group

We work on a wide range of problems in distributed computing theory. We study algorithms and lower bounds for typical problems that arise in distributed systems---like resource allocation, implementing shared memory abstractions, and reliable communication.

#### Community of Research

## Vertical AI Community of Research

This CoR takes a unified approach to cover the full range of research areas required for success in artificial intelligence, including hardware, foundations, software systems, and applications.

10 Project Results

#### Project

## Data Garbling: Computing on Encrypted Data

We are investigating the limits of computing on encrypted data, with a focus on the private outsourcing of computation over sensitive data.

#### Project

## Deterministic Algorithms for Robotic Task and Motion Planning

Our goal is to investigate deterministic algorithms for robotic task and motion planning.

#### Project

## Helping robots learn using demonstrations

Help robots learn faster by providing demonstrations when they need help

#### Project

## High-Assurance Hardware

Tools for building digital hardware with machine-checked proofs of correctness

#### Project

## Kami: A Modular Deductive Hardware Verification Platform

A framework to support implementing, specifying, verifying, and compiling hardware designs, modularly

#### Project

## Privacy-Preserving Decentralized Optimization

To enable privacy preservation in decentralized optimization, differential privacy is the most commonly used approach. However, under such scenario, the trade-off between accuracy (even efficiency) and privacy is inevitable. In this project, distributed numerical optimization scheme incorporated with lightweight cryptographic information sharing are explored. The affect on the convergence rate from network topology is considered.

#### Project

## Random Graph with Applications in MPC

To explore how randomness in connectivity can improve the performance of secure multi-party computation (MPC) and the properties of communication graph to support MPC.

#### Project

## Reliable and Robust Machine Learning

We work towards a principled understanding of the current machine learning toolkit and making this toolkit be robust and reliable.

#### Project

## Uhura: Personal Assistant that Manages Risk

Uhura is an autonomous system that collaborates with humans in planning and executing complex tasks, especially under over-subscribed and risky situations.

#### Project

## Using Bitcoin to prevent identify theft

System piggybacks on the digital currency’s security protocols to thwart hijacked servers.

16 People Results

## Peter Deutsch

Graduate Student

## Yu Wang

Graduate Student

## Hanshen Xiao

Graduate Student

## Mengjia Yan

Assistant Professor

25 News Results

## How fast do algorithms improve?

MIT scientists show how fast algorithms are improving across a broad range of examples, demonstrating their critical importance in advancing computing.

## A tool for navigating complex computer instructions

A tool for navigating complex computer instructions

## Giving soft robots senses

In a pair of papers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL), two teams enable better sense and perception for soft robotic grippers.

## Protecting sensitive metadata so it can’t be used for surveillance

System ensures hackers eavesdropping on large networks can’t find out who’s communicating and when they’re doing so.

## Automated system generates robotic parts for novel tasks

When designing actuators involves too many variables for humans to test by hand, this system can step in.

## CSAIL hosts first-ever TEDxMIT

Speakers — all women — discuss everything from gravitational waves to robot nurses

## MIT CSAIL holds trustworthy AI event with Microsoft

Workshop explores technical directions for making AI safe, fair, and understandable

## MIT hosts workshop on theoretical foundations of deep learning

Last week MIT’s Institute for Foundations of Data Science (MIFODS) held an interdisciplinary workshop aimed at tackling the underlying theory behind deep learning. Led by MIT professor Aleksander Madry, the event focused on a number of research discussions at the intersection of math, statistics, and theoretical computer science.

## Teaching machines to see in 3-D

CSAIL’s approach uses algorithms and “2.5-D” sketches to let computers visualize images from any perspective

## Opening up open-source to design better chips

MIT CSAIL system lets users change one part of a processor’s design without impacting the others

## Cryptographic protocol enables greater collaboration in drug discovery

Neural network that securely finds potential drugs could encourage large-scale pooling of sensitive data.

## Robots can now pick up any object after inspecting it

Breakthrough CSAIL system suggests robots could one day be able to see well enough to be useful in people’s homes and offices.

## Design tool reveals a product’s many possible performance tradeoffs

Users can quickly visualize designs that optimize multiple parameters at once.

## Holding law-enforcement accountable for electronic surveillance

CSAIL system encourages government transparency using cryptography on a public log of wiretap requests.

## Demaine gives Congressional briefing on intersection of origami and computer science

MIT professor discusses using paper-folding for applications in manufacturing, medicine, and robotics

## Protecting confidentiality in genomic studies

Genome-wide association studies, which look for links between particular genetic variants and incidence of disease, are the basis of much modern biomedical research.

## From Utopia to Dystopia in 29 Short Years

May 2, 2018 - Sir Tim Berners-Lee of MIT gave a Dertouzos Distinguished Lecture titled "From Utopia to Dystopia in 29 Short Years."

## Programming drones to fly in the face of uncertainty

CSAIL's NanoMap system enables drones to avoid obstacles while flying at 20 miles per hour, by more deeply integrating sensing and control.

## MIT security experts discuss “Spectre” and “Meltdown” processor flaws

Last week CSAIL hosted the second “Hot Topics in Computing” speaker series, a monthly forum where computing experts hold discussions with community members on various topics in the computer science field.

## Goldwasser, Micali, and Rivest win BBVA Foundation Frontiers of Knowledge Awards

This week it was announced that MIT professors and CSAIL principal investigators Shafi Goldwasser, Silvio Micali, Ronald Rivest, and former MIT professor Adi Shamir won this year’s BBVA Foundation Frontiers of Knowledge Awards in the Information and Communication Technologies category for their work in cryptography.

## Four from MIT named 2017 Association for Computer Machinery Fellows

Today four MIT faculty were named among the Association for Computer Machinery's 2017 Fellows for making “landmark contributions to computing.”

## Goldwasser gives briefing on cryptography to Congress

Last week CSAIL principal investigator Shafi Goldwasser spoke about cryptography and privacy as part of the annual congressional briefing of the American Mathematical Society (AMS) and the Mathematical Sciences Research Institute (MSRI).

## Selective memory

In a traditional computer, a microprocessor is mounted on a “package,” a small circuit board with a grid of electrical leads on its bottom. The package snaps into the computer’s motherboard, and data travels between the processor and the computer’s main memory bank through the leads.