Rakesh Verma Research Interests and Projects

Rakesh Verma Research Interests and Projects
Slide Note
Embed
Share

Rakesh Verma, a researcher at the University of Houston, is involved in various projects related to rewriting, basic decision problems, data/text mining, computer security, and more. His work includes areas like algorithms, verification, rapid rewriting, and data mining. Verma's projects cover a wide range of topics such as Programming Without Tears, algorithms for basic decision problems, and computer security tasks like phishing detection. His research also delves into rewriting systems supported by NSF grants and applications in areas like verification and data mining. Verma is known for his contributions in the field of computer science and his quest for patterns in data and text. Explore his work and projects through the provided links and images.

  • Rakesh Verma
  • Research
  • Projects
  • Data Mining
  • Computer Security

Uploaded on Feb 19, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. HomeButton.png 1 , & Rakesh Verma http://www.cs.uh.edu/~rmverma Research Interests and Projects 1. Rewriting LRR, Basic Decision Problems, Applications 2. Data/Text Mining Summarization, Q/A, Data Mining Course 3. Computer Security Phishing, Protocols, WSNs, Education R. Verma-UH 9/6/13

  2. HomeButton.png 2 Equations or Identities X + 0 = X X + -(X) = 0 X + (Y + Z) = (X + Y) + Z What happens if we turn them into rules? X + 0 X X + -(X) 0 X + (Y + Z) (X + Y) + Z R. Verma-UH 9/6/13

  3. HomeButton.png 3 Rewriting (supported by NSF 1990-2011) Rewrite System: rules of the form l r, l and r are first-order terms with universally quantified variables Example: fib(x) fib(x-1) + fib(x-2) if x > 1 fib(0) 1 fib(1) 1 Projects: Programming Without Tears (RTA93, RTA99, WRS04, SAC08, UNIF11) Algorithms for basic decision problems: reachability, confluence, unicity for subclasses (RTA97, STACS03, APAL04, AAECC04, TOCL05, FI 09, AAECC10, FSTTCS10) Applications to verification (IJCAR04 Workshop) R. Verma-UH 9/6/13

  4. Programming Without Tears HomeButton.png 4 .m .t XML Parser LRR RuleMaker R. Verma-UH 9/6/13

  5. HomeButton.png 5 Laboratory for Rapid Rewriting Fastest interpreter in comparisons with Maude and Elan for full history option Based on congruence closure approach Download at: http://www.cs.uh.edu/~rmverma Graphical User Interface available upon request R. Verma-UH 9/6/13

  6. HomeButton.png 6 Data/Text Mining The quest for patterns in data and text. Projects: Association Rule Mining Controlling rules through a semantic network (FLAIRS 2008) Automatic Summarization SynSem & M-SynSem Systems (CBMS06, DUC07, DUC08, TAC10, CICLING12) Question Answering - SemQuest System (TAC11) An undergraduate data mining course with industrial-strength projects (CCSC09, CCSC10, CCNE11) NSF Award R. Verma-UH 9/6/13

  7. HomeButton.png 7 R. Verma-UH 9/6/13

  8. HomeButton.png 8 Computer Security The task of securing computers, networks and data Projects: Automatic phishing email and web site detection (ARES12, ESORICS12, ACSAC12) Protocol Verification (FCS-ARSPA07, ARES08, USENIX08, ICISS08, ICISS09) Key management protocols for wireless sensor networks (SAC10) Enriching computer security through innovative modules NSF Award NLP techniques for automatic phishing and opinion spam detection NSF Award R. Verma-UH 9/6/13

  9. HomeButton.png 9 Phishing R. Verma-UH 9/6/13

  10. HomeButton.png 10 Students LRR, Rewriting: KB Ramesh, SA Senanayake, H Liu, W Yu, J Zinn, S Liao, N Radcliffe, W Guo, L Morales Text Mining, NLP: W Lu, F Filozov, D Kent, A. Barrera (NSF Graduate Fellow), R Vincent, N Hossain, V Vuppuluri Security: Z Liang, B Basile, S Blackshear, N Hossain, T Thakur, E Lee, K Gordon Visitors (2013): Prof. Y. Tong, M. Meseure External Collaborators (last 5 years): S. Dalal (AIG), W. Chan (UTHSC), J. Meininger (UTHSC), P. Chen (UHD), L. Ghemri (TSU), W. Li (TSU), F. Khan (TSU) R. Verma-UH 9/6/13

  11. HomeButton.png 11 Thanks! Questions/Comments R. Verma-UH 9/6/13

More Related Content