Northeastern University
College of Computer and Information Science

Contact Us

  • Contact Us

Search

  • Explore CCIS
    • About the College
      • Dean’s Message
    • Undergraduate Programs
      • Advising
      • Degree Programs
      • Minor in Computer Science
      • Minor in Information Science
      • Tutoring
      • Scholarships
      • Student Awards
    • Graduate Programs
      • Degree Programs
      • Current Students
    • Co-op
    • People and Organizations
      • Faculty
      • Administrative Staff
      • Student Organizations
    • Contact Us
    • Research
      • Research Groups
      • Centers and Institutes
    • Technical Help
  • Prospective Students
  • Current Students
  • Alumni
  • Employers
Layout Image
  • About the College
    • Dean’s Message
    • CCIS Videos
  • Undergraduate Programs
    • Advising
    • Degree Programs
    • Minor in Computer Science
    • Minor in Information Science
    • Scholarships
      • Bradley E. Bailey Scholarship
      • Darwin Scholarship
      • Jane K. Wenzinger Scholarship Fund
      • Department of Defense Information Assurance Scholarship Program
      • NSF Federal Cyber Service: Scholarship for Service
    • Student Awards and Research
    • Tutoring
  • Graduate Programs
    • Degree Programs
      • Ph.D. in Computer Science
        • Admission Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Electives Outside the College
        • Specimen Curriculum
        • Academic Review Process
      • Ph.D. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Specimen Curriculum
        • Program Faculty
        • Contact Us
      • Ph.D. in Personal Health Informatics
      • M.S. in Computer Science
        • Admissions Requirements
        • Academic Requirements
        • Academic Probation
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Specimen Academic Schedule
        • Reading and Project Courses
        • Master’s Thesis
        • Request More Information
      • M.S. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Specimen Academic Schedule
        • Financial Aid and Scholarships
        • Faculty
        • Request More Information- MSIA
      • M.S. in Health Informatics
        • Program Overview
        • Master’s Degree
        • Certificates
        • Course Descriptions
        • Testimonials
        • Faculty
        • Careers
        • Student Profiles
        • Apply
        • Request More Information- MSHI
      • ALIGN
    • Apply
    • Scholarships
    • FAQ
    • Current Students
      • Course Descriptions
      • Course Schedules
      • Graduate Guidebook
      • Commencement
      • Forms
      • Travel Support
      • Wiki
      • Jobs
      • New Student Page
        • MyNeu Account
        • Course Registration
        • Health Insurance Requirements
        • ISSI Orientation
        • CCIS Orientation
        • CCIS Email Account
        • Paying Your Bill
        • Husky ID Cards
        • Online Learning
        • Housing
        • Parking
        • Public Transportation
  • Research
    • Research Groups
      • Algorithms and Theory
      • Artificial Intelligence
      • Data
      • Educational Research
      • Formal Methods
      • Game Design
      • Network Science
      • Personal Health Informatics
      • Programming Languages
      • Security
      • Software Engineering
      • Systems
    • Centers and Institutes
  • Co-op
    • Information for Students
      • FAQ
      • Information for New Students
      • Information for Upperclass Students
      • Information for Graduate Students
      • Prospective
      • Forms
    • Information for Employers
    • Co-op Manual
      • Steps to Finding A Job
      • Taking a Course
      • Academic Standards
    • Research & Data
      • Assessment
    • Calendar
    • Surveys & Evaluations
      • Student Evaluation
      • Employer Evaluation
  • People and Organizations
    • Faculty
    • Administrative Staff
    • Student Organizations
  • News & Events
    • News Archive
    • Events
    • Distinguished Speakers Series

Author Archive for bironje – Page 3

Northeastern researcher elected president of the Complex Systems Society

By bironje
Tuesday, December 4th, 2012
Alex Vespignani

Alessandro Vespignani, the Stern­berg Family Dis­tin­guished Uni­ver­sity Pro­fessor of physics, computer science and health sciences, was elected president of the Complex Systems Society. Photo by Mary Knox Merrill.

The sci­ence of com­plex sys­tems was born in the mid-20th cen­tury, but it has only recently begun to mature into a research field with real-world rel­e­vance. The devel­op­ment of new tech­nolo­gies that stamp data points on nearly all of our activ­i­ties is allowing us to quan­tifi­ably study society — the ulti­mate com­plex system.

“Com­plex sys­tems is really now get­ting into a dif­ferent stage of its life in which it can start to have an impact through prac­tical appli­ca­tions,” said Alessandro Vespig­nani, the Stern­berg Family Dis­tin­guished Uni­ver­sity Pro­fessor of physics, com­puter sci­ence and health sci­ences.

It is for this reason that the Euro­pean Union sought in 2006 to sup­port the first-ever aca­d­emic society devoted to com­plex sys­tems sci­ence, which com­prises 600 mem­bers world­wide. This year, in the first renewal of the society’s lead­er­ship, Vespig­nani was elected as its president.

“This is a young field and it needs young researchers to pro­mote it, advo­cate for it and pro­vide momentum,” said Vespig­nani, whose research uses human mobility pat­terns to track the spread of dis­eases across the globe.

The society came to fruition in 2004 during the first Euro­pean Con­fer­ence for Com­plex Sys­tems, which has since grown into an annual series. Vespig­nani hopes to expand the series’ reach during his three-year term by holding meet­ings in the EU and turning both the conference’s and the society’s activ­i­ties into a global endeavor.

“The idea is to be more and more inclu­sive and more world­wide with events not just in Europe, where the society was born,” Vespig­nani said. He hopes that expanding and col­lab­o­rating with smaller insti­tu­tions devoted to the field would enable the society to more effec­tively coor­di­nate and sup­port the efforts of com­plex sys­tems sci­en­tists around the world.

Vespig­nani also noted that his appoint­ment would allow him to advo­cate for more funding for the field of com­plex sys­tems sci­ence. The advent of so-called “big data,” he said, which touches the lives of almost everyone, has forced the field to con­front a series of  unique eth­ical chal­lenges that must be addressed with careful policy measures.

“Com­plex sys­tems sci­ence is not any­more just a fancy sci­ence to look at very exotic phe­nomena,” said Vespig­nani. “It actu­ally is some­thing that might help to solve impor­tant real-world prob­lems. It has the matu­rity now to get into applied science.”

Categories : Uncategorized

‘Popping in’ on the latest research

By bironje
Tuesday, November 20th, 2012

A young man’s hand move­ments and body tem­per­a­ture are being tracked as he ges­tic­u­lates while dis­cussing his research with another stu­dent. Else­where in the room, someone stares at a com­puter screen while wearing a cap con­nected to dozens of elec­trodes. Next to him, someone else han­dles a cup out­fitted with an internal gyroscope.

This was the scene in Raytheon Amphithe­ater on Monday evening at Northeastern’s third Pop Up Open Lab Expe­ri­ence & Recep­tion, where the uni­ver­sity com­mu­nity had the oppor­tu­nity to put some of the per­sonal and inter­ac­tive health devices being devel­oped in North­eastern labs to the test.

The open labs, spon­sored by the Office of the Provost, bring the North­eastern com­mu­nity together to learn about col­leagues’ research in an informal and inter­ac­tive set­ting. The events can also spark new, inter­dis­ci­pli­nary edu­ca­tion and research ini­tia­tives and collaborations.

Mechan­ical and indus­trial engi­neering asso­ciate pro­fes­sors Andrew Gould­stone and Rifat Sipahi dis­played a device that aims to help patients with Parkinson’s dis­ease handle a cup full of liquid with more ease and con­trol. The pro­to­type cup con­tains a gyro­scope in its base that off­sets the direc­tional force of the tremor in a patient’s hand. The team is also working on other devices to help Parkinson’s patients, including var­ious tech­nolo­gies to improve their ability to write, Sipahi explained.

Maciej Pietrusinski, a post­doc­toral researcher in mechan­ical and indus­trial engi­neering pro­fessor Dinos Mavroidis’ lab, is devel­oping a much larger device to help stroke patients regain their ability to walk with a normal gait. The cur­rent therapy is very labor and resource inten­sive and requires at least two phys­ical ther­a­pists, he said. Yet his treadmill-based robotic gait reha­bil­i­ta­tion system allows patients to get the ben­e­fits of a therapy ses­sion in their own homes, any time of day.

Phys­ical impair­ments, though, aren’t the only areas where health tech­nolo­gies are valu­able. Per­sonal health infor­matics PhD can­di­date Miriam Zisook is working with Matthew Goodwin, pro­fessor of health sci­ences and com­puter and infor­ma­tion sci­ences, to under­stand the non­verbal cues gen­er­ated by autistic chil­dren. Zisook explained that these patients’ frus­trated attempts at com­mu­ni­ca­tion are often mis­taken as vio­lent mis­be­havior. So if the behav­iors an autistic child uses to get someone’s atten­tion could be iden­ti­fied ear­lier, per­haps they’d be less likely to esca­late into “acting out.”

Goodwin’s lab uses sen­sors to mon­itor repet­i­tive motion, body tem­per­a­ture and other non­verbal indi­ca­tors of stress, which can be used for both research pur­poses and in the devel­op­ment of com­mu­ni­ca­tion tools like those Zisook envisions.

Deniz Erdogmus’ lab develops brain com­puter inter­faces to help locked-in patients com­mu­ni­cate with the power of their minds. Photo by Brooks Canaday.

Elec­trical and com­puter engi­neering pro­fessor Deniz Erdogmus’ lab is also inter­ested in com­mu­ni­ca­tion devices. His group develops brain com­puter inter­faces to help locked-in patients spell out sen­tences and interact with the world, a task that would oth­er­wise be impossible.

This new era of health­care tech­nology also has the unique capacity to pro­mote well­ness among the healthy. Com­puter and infor­ma­tion sci­ences pro­fessor Tim­othy Bick­more develops vir­tual health advo­cates to pro­mote pos­i­tive behavior across demo­graphics, with a par­tic­ular eye toward those with lim­ited health and com­puter lit­eracy. Stephen Intille, pro­fessor of health sci­ences and com­puter and infor­ma­tion sci­ences, uses real-time sen­sors and hand­held mobile devices to build appli­ca­tions that pro­mote exer­cise and healthy eating.

From helping a Parkinson’s dis­ease patient who is strug­gling with tremors to making it easier for those hoping to lose weight after the hol­i­days, the event made it clear there is much to gain from the next gen­er­a­tion of health­care technology.

Categories : Uncategorized

Technology to improve health care

By bironje
Monday, November 19th, 2012
Personal Health Informatics

This semester, professors Matthew Goodwin, Rupal Patel, Stephen Intille, and Timothy Bickmore launched the nation’s first program devoted to Personal Health Informatics.

Per­sonal health tech­nolo­gies amount to more than just your smart­phone apps. A group of North­eastern researchers, who are leading a new doc­toral pro­gram at the uni­ver­sity, hope these tech­nolo­gies will save the health-care system.

The inno­v­a­tive Per­sonal Health Infor­matics program—the first of its kind in the nation—will pre­pare stu­dents from both the health and com­puter sci­ences fields to lead research and devel­op­ment of new tech­nolo­gies to trans­form health-care delivery around the globe.

“Sci­en­tific inno­va­tion in health care is a national imper­a­tive and one of Northeastern’s research pri­or­i­ties,” said Stephen W. Director, provost and senior vice pres­i­dent for aca­d­emic affairs. “A crit­ical piece of our efforts is devel­oping Ph.D. pro­grams that are anchored in mul­tiple dis­ci­plines and aligned with the needs of both industry and society.”

With a growing elderly pop­u­la­tion, surging obe­sity rates and younger diag­noses of con­di­tions like cancer, autism and HIV, people at all stages of life are flooding an already over­whelmed U.S. health-care system, according to Matthew Goodwin, pro­fessor of health sci­ences and com­puter and infor­ma­tion sci­ences. Unfor­tu­nately, he explained, that system is based on a sick-patient model with no way to reim­burse for wellness.

Along with Goodwin, the doc­toral pro­gram is being led by: Stephen Intille and Rupal Patel, both asso­ciate pro­fes­sors in the Bouvé Col­lege of Health Sci­ences and Col­lege of Com­puter and Infor­ma­tion Sci­ences; and Tim­othy Bick­more, asso­ciate pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sciences.

The team says health-care tech­nolo­gies, which have tra­di­tion­ally tar­geted clin­i­cians, have a great poten­tial to pre­vent ill­ness and pro­mote well­ness when placed in the hands of patients. And they believe these so-called “per­sonal health infor­matics,” could be the key to solving the health-care crisis.

On Monday, the North­eastern com­mu­nity can get an up-close look at some of the tech­nolo­gies from uni­ver­sity labs at Northeastern’s Open Lab Expe­ri­ence and Recep­tion. The event, spon­sored by the Office of the Provost, will run from 4–6 p.m. in the Raytheon Amphithe­ater in the Egan Research Center, and will fea­ture inter­ac­tive demos of tech­nolo­gies from North­eastern laboratories.

Cur­rent North­eastern stu­dent Stephen Fla­herty spent a half-decade in the imaging depart­ment at Boston’s Beth Israel Med­ical Dea­coness Center and had been searching for a doc­toral pro­gram for a number of years. “Nothing fit my inter­ests the way the PHI pro­gram does,” he said.

“Nearly all existing doc­toral pro­grams in health or med­ical infor­matics focus on the devel­op­ment and use of tech­nolo­gies used by physi­cians and other med­ical staff,” Intille said. “Most of the tech­nolo­gies are only used once people get sick.”

The tech­nolo­gies of PHI — which range from assis­tive tech­nolo­gies for chil­dren with autism to wellness-focused mobile apps — are “focused on helping patients take care of them­selves,” Bick­more said.

The pro­gram includes fac­ulty from six of the university’s nine col­leges and schools, whose exper­tise includes human-computer inter­ac­tions, data pro­cessing and mea­suring emo­tion, to name a few. These strengths, cou­pled with a com­mit­ment to training skilled health-care pro­fes­sionals, will enable the new program’s suc­cess, Patel said.

Northeastern’s com­mit­ment to trans­dis­ci­pli­nary teaching and research,” Intille said, “make it an ideal envi­ron­ment in which to con­duct research on the design and rig­orous field eval­u­a­tion of inno­v­a­tive per­sonal health tech­nolo­gies that may lead to dra­matic, pos­i­tive changes in how people receive and manage their care.”

Categories : Uncategorized

2012 Fall CCIS Newsletter

By bironje
Friday, November 16th, 2012

We are pleased to announce the 2012 Fall CCIS Newsletter. Read the CCIS Network for the latest in Cyber Operations, Programming Languages, Game Design, and Personal Health Informatics. Highlights include faculty hires and awards, alumni news, and co-op expansion.

Read Here

Categories : Uncategorized

BioCom2: NSF Workshop on Biological Computations and Communications

By bironje
Monday, November 12th, 2012

CCIS Professor Guevara Noubir organized a recent NSF workshop in Boston dedicated to bringing together researchers with broad interests in computation and communication in the bio-nano world. A mix of scientists from often polarized fields such as Computer Science, Bioengineering, Mathematics, and Physics attended to foster interdisciplinary discussions and collaborations. Specific topics of interest included:

  • Engineering synthetic biological circuits with communication interfaces
  • Microbial communication networks
  • Wireless energy transfer at the nano-scale
  • Quantum coherence in biological systems

Read more at the conference website.

 

Categories : Uncategorized

3Q’s: Facial Recognition is the New Fingerprint

By bironje
Thursday, September 20th, 2012

Raymond FuEar­lier this month, the FBI began rolling out a $1 bil­lion update to the national fin­ger­printing data­base. Facial-​​recognition sys­tems, DNA analysis, voice iden­ti­fi­ca­tion and iris scan­ning will all con­tribute to the government’s arsenal of Next Gen­er­a­tion Iden­ti­fi­ca­tion (NGI) data. We asked Ray­mond Fu, a new assis­tant pro­fessor with joint appoint­ments in the Col­lege of Engi­neering and the Col­lege of Com­puter and Infor­ma­tion Sci­ence, to explain the sci­ence behind one of these new tech­nolo­gies: facial-​​recognition software.

How does facial recognition work, and where is the state of the art now?

Face- ​​recognition research has been pop­ular for more than two decades. Great advances have been made from researchers from a broad com­mu­nity, such as bio­met­rics, com­puter vision and machine learning. The state-​​of-​​the-​​art tech­niques have been applied to real-​​world sys­tems for appli­ca­tions in sur­veil­lance, secu­rity and foren­sics. Face recog­ni­tion is a tech­nology that requires high accu­racy, espe­cially when secu­rity and foren­sics fac­tors are con­sid­ered. The cur­rent chal­lenges are scal­a­bility of data­bases; large vari­a­tion fac­tors in dif­ferent envi­ron­ments; aging, makeup and pose fac­tors of faces; and faces in social-​​media spaces.

Face-​​recognition sys­tems start with face detec­tion and tracking. Com­pu­ta­tional algo­rithms detect face posi­tions and poses in an image and then extract them for pro­cessing and analysis. During this pipeline, a couple of major chal­lenges create bot­tle­necks for the per­for­mance of real-​​world sys­tems. Facial expres­sions, aging and makeup are key vari­a­tions that cannot be easily removed. Tech­niques of 3-​​D mor­phable mod­eling and local fea­tures have been devel­oped to mit­i­gate such vari­a­tions. Lighting vari­a­tions can sig­nif­i­cantly affect the recog­ni­tion accu­racy espe­cially when a system is used out­side. Bench­mark data­bases have been col­lected from well-​​controlled lighting sources for devel­oping lighting insen­si­tive fea­ture extrac­tion and ana­lyt­ical mod­eling for such purposes.

The increasing acces­si­bility of the social-​​media space presents yet a new chal­lenge to devel­oping a large-​​scale iden­tity data­base. Con­fu­sion of sim­ilar appear­ances, over­load com­pu­ta­tions and mul­tiple data sources bring up uncer­tain­ties in modern face recog­ni­tion. Addi­tion­ally, new trends of soft-​​biometrics, big data and mul­ti­modality face recog­ni­tion have opened up new research thrusts.

What are the challenges and differences between identifying a single presented face and picking faces out of a crowd?

Face recog­ni­tion and iden­ti­fi­ca­tion are two dif­ferent prob­lems. Face recog­ni­tion is to match a person’s face against a set of known faces and iden­tify who he or she is. For example, in a crim­inal inves­ti­ga­tion, a detec­tive may want to ID a sus­pect from a face image cap­tured on a sur­veil­lance camera.

Iden­ti­fi­ca­tion is to val­i­date the match of a given face and the claimed ID. For example, if an employee wants to access a secured area in a clas­si­fied depart­ment, she shows her ID card to the sensor while a camera cap­tures her face to match it with the record retrieved from the ID card input. If the match passes, the door will open automatically.

How would you address concerns raised by privacy advocates?

Face recog­ni­tion can be either pas­sive or active. In the air­port, for example, the sur­veil­lance cam­eras are taking videos in real time. Pas­sen­gers’ faces are cap­tured in a pas­sive way. Online social-​​media spaces, like Face­book, pro­vide public domains for users to share their photos in an active way. Both may involve pri­vacy issues. How to bal­ance the pri­vacy issues and the public needs of secu­rity and human-​​computer inter­ac­tion are new research topics in this era.

In my research group, we have been funded by Air Force Office of Sci­en­tific Research, IC Postdoc Fel­low­ship and Google Research on these issues. Our research is mainly focused on under­standing social status and net­working of social-​​media users and their pri­vacy con­cerns. We are working on new com­pu­ta­tional method­olo­gies that could well ana­lyze the visual con­tent of social media and pro­vide auto­matic solu­tions for human-​​computer inter­ac­tion that could advance future social-​​network ecosystems.

Categories : Uncategorized

By bironje
Thursday, August 23rd, 2012

h

Web­sites like Face­book, LinkedIn and other social-​​media net­works con­tain mas­sive amounts of valu­able public infor­ma­tion. Auto­mated web tools called web crawlers sift through these sites, pulling out infor­ma­tion on mil­lions of people in order to tailor search results and create tar­geted ads or other mar­ketable content.

But what hap­pens when “the bad guys” employ web crawlers? For Engin Kirda, Sy and Laurie Stern­berg Inter­dis­ci­pli­nary Asso­ciate Pro­fessor for Infor­ma­tion Assur­ance in the Col­lege of Com­puter and Infor­ma­tion Sci­ence and the Depart­ment of Elec­trical and Com­puter Engi­neering, they then become tools for spam­ming, phishing or tar­geted Internet attacks.

“You want to pro­tect the infor­ma­tion,” Kirda said. “You want people to be able to use it, but you don’t want people to be able to auto­mat­i­cally down­load con­tent and abuse it.”

Kirda and his col­leagues at the Uni­ver­sity of California–Santa Bar­bara have devel­oped a new soft­ware call Pub­Crawl to solve this problem. Pub­Crawl both detects and con­tains mali­cious web crawlers without lim­iting normal browsing capac­i­ties. The team joined forces with one of the major social-​​networking sites to test Pub­Crawl, which is now being used in the field to pro­tect users’ information.

Kirda and his col­lab­o­ra­tors pre­sented a paper on their novel approach at the 21st USENIX Secu­rity Sym­po­sium in early August. The article will be pub­lished in the pro­ceed­ings of the con­fer­ence this fall.

In the cyber­se­cu­rity arms race, Kirda explained, mali­cious web crawlers have become increas­ingly sophis­ti­cated in response to stronger pro­tec­tion strate­gies. In par­tic­ular, they have become more coor­di­nated: Instead of uti­lizing a single com­puter or IP address to crawl the web for valu­able infor­ma­tion, efforts are dis­trib­uted across thou­sands of machines.

“That becomes a tougher problem to solve because it looks sim­ilar to benign user traffic,” Kirda said. “It’s not as straightforward.”

Tra­di­tional pro­tec­tion mech­a­nisms, like a CAPTCHA, which oper­ates on an indi­vidual basis, are still useful, but their deploy­ment comes at a cost: Users may be annoyed if too many CAPTCHAs are shown. As an alter­na­tive, non­in­tru­sive approach, Pub­Crawl was specif­i­cally designed with dis­trib­uted crawling in mind. By iden­ti­fying IP addresses with sim­ilar behavior pat­terns, such as con­necting at sim­ilar inter­vals and fre­quen­cies, Pub­Crawl detects what it expects to be dis­trib­uted web-​​crawling activity.

Once a crawler is detected, the ques­tion is whether it is mali­cious or benign. “You don’t want to block it com­pletely until you know for sure it is mali­cious,” Kirda explained. “Instead, Pub­Crawl essen­tially keeps an eye on it.”

Poten­tially mali­cious con­nec­tions can be rate-​​limited and a human oper­ator can take a closer look. If the oper­a­tors decide that the activity is mali­cious, IPs can also be blocked.

In order to eval­uate the approach, Kirda and his col­leagues used it to scan logs from a large-​​scale social net­work, which then pro­vided feed­back on its suc­cess. Then, the social net­work deployed it in real time, for a more robust eval­u­a­tion. Cur­rently, the social net­work is using the tool as a part of its pro­duc­tion system. Going for­ward, the team expects to iden­tify areas where the soft­ware could be evaded and make it even stronger.

Categories : Uncategorized

NSF Workshop on Biologically-Enabled Wireless Networks Design and Modeling

By bironje
Monday, July 23rd, 2012

CCIS Professor Guevara Noubir organized a recent NSF workshop in Arlington, Virginia to address the question of biologically-enabled wireless networks. While wireless networks have achieved great successes in the past decade, challenges such as energy efficiency remain. At the same time, bio-organisms such as the brain carry out complex tasks with only a few tens of watts. The clear superiority of biological systems’ efficiency begs the question:  could we one day build biologically -enabled networks?

This conference brought together experts from research, biophysics and biomedical communities to articulate a vision for biologically-enabled wireless networks, define a clear set of challenges to be solved, and make recommendations for future inter-disciplinary collaborations. Presentation topics included:

  • Enabling mechanisms for bio-networks, such as electromagnetic energy harvesting and transduction into biological signals, and magnetic control of biological systems
  • Molecular computation and communication networks considering both the fundamental information and computation theoretic issues and system design
  • Synthetic biology as a way to engineer biologically enabled wireless devices and how biologically enabled devices can be made less sensitive to their environment

Read more at the conference website.

 

 

 

 

 

Categories : Uncategorized
« Previous Page
Northeastern University
  • My NEU
  • Find Faculty & Staff
  • Find A – Z
  • Emergency Information
  • Search

360 Huntington Ave. Boston, Massachusetts 02115 • 1 (617) 373-2000

© 2013 Northeastern University

  • twitter
  • facebook
  • youtube