Northeastern University
College of Computer and Information Science
  • Contact Us

Search

  • Explore CCIS
    • About the College
      • Dean’s Message
    • Undergraduate Programs
      • Advising
      • Degree Programs
      • Minor in Computer Science
      • Minor in Information Science
      • Tutoring
      • Scholarships
      • Student Awards
    • Graduate Programs
      • Degree Programs
      • Current Students
    • Co-op
    • People and Organizations
      • Faculty
      • Administrative Staff
      • Student Organizations
    • Contact Us
    • Research
      • Research Groups
      • Centers and Institutes
    • Technical Help
  • Prospective Students
  • Current Students
  • Alumni
  • Employers
Layout Image
  • About the College
    • Dean’s Message
    • CCIS Videos
  • Undergraduate Programs
    • Advising
    • Degree Programs
    • Minor in Computer Science
    • Minor in Information Science
    • Scholarships
      • Bradley E. Bailey Scholarship
      • Darwin Scholarship
      • Jane K. Wenzinger Scholarship Fund
      • Department of Defense Information Assurance Scholarship Program
      • NSF Federal Cyber Service: Scholarship for Service
    • Student Awards and Research
    • Tutoring
  • Graduate Programs
    • Degree Programs
      • Ph.D. in Computer Science
        • Admission Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Electives Outside the College
        • Specimen Curriculum
        • Academic Review Process
      • Ph.D. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Specimen Curriculum
        • Program Faculty
        • Contact Us
      • Ph.D. in Personal Health Informatics
      • M.S. in Computer Science
        • Admissions Requirements
        • Academic Requirements
        • Academic Probation
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Specimen Academic Schedule
        • Reading and Project Courses
        • Master’s Thesis
        • Request More Information
      • M.S. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Specimen Academic Schedule
        • Financial Aid and Scholarships
        • Faculty
        • Request More Information- MSIA
      • M.S. in Health Informatics
        • Program Overview
        • Master’s Degree
        • Certificates
        • Course Descriptions
        • Testimonials
        • Faculty
        • Careers
        • Student Profiles
        • Apply
        • Request More Information- MSHI
      • ALIGN
    • Apply
    • Scholarships
    • FAQ
    • Current Students
      • Course Descriptions
      • Course Schedules
      • Graduate Guidebook
      • Commencement
      • Forms
      • Travel Support
      • Wiki
      • Jobs
      • New Student Page
        • MyNeu Account
        • Course Registration
        • Health Insurance Requirements
        • ISSI Orientation
        • CCIS Orientation
        • CCIS Email Account
        • Paying Your Bill
        • Husky ID Cards
        • Online Learning
        • Housing
        • Parking
        • Public Transportation
  • Research
    • Research Groups
      • Algorithms and Theory
      • Artificial Intelligence
      • Data
      • Educational Research
      • Formal Methods
      • Game Design
      • Network Science
      • Personal Health Informatics
      • Programming Languages
      • Security
      • Software Engineering
      • Systems
    • Centers and Institutes
  • Co-op
    • Information for Students
      • FAQ
      • Information for New Students
      • Information for Upperclass Students
      • Information for Graduate Students
      • Prospective
      • Forms
    • Information for Employers
    • Co-op Manual
      • Steps to Finding A Job
      • Taking a Course
      • Academic Standards
    • Research & Data
      • Assessment
    • Calendar
    • Surveys & Evaluations
      • Student Evaluation
      • Employer Evaluation
  • People and Organizations
    • Faculty
    • Administrative Staff
    • Student Organizations
  • News & Events
    • News Archive
    • Events
    • Distinguished Speakers Series
Research Groups

Algorithms and Theory

  • Headshot of

    Erik-Oliver Blass

  • Headshot of

    Agnes H. Chan

  • Headshot of

    Rajmohan Rajaraman

  • Headshot of

    Ravi Sundaram

  • Headshot of

    Emanuele Viola

  • Headshot of

    Daniel Wichs

The Algorithms and Theory group focuses on classifying and solving complex computational problems that arise in diverse areas of computer science. Their areas of research include approximation algorithms, algorithmic game theory, circuit and communication complexity, cryptography, combinational optimization, pseudo-randomness, and learning theory.

Members of the group often work closely with the Security group and Social Networks groups, and with several faculty members who contribute to both areas, to examine issues such as distributed computing and network algorithms.

The researchers apply mathematical and computational skills to numerous practical problems. For example, work on complexity theory involves determining the computational resources required to solve highly complex algorithms; and combinatorial optimization can be used to model the pricing of stocks in financial markets, movement of goods in transportation networks and vaccine distribution policies.

Team Achievements

  • Awarded National Science Foundation grant to design algorithms to more efficiently and reliably identify bugs in software and hardware systems such as cell phones, medical devices, and aviation systems
  • Constructed more robust and efficient pseudo-random generators, which are the fundamental building blocks of cryptography and the key to understanding computational complexity
  • Generated universal approximation algorithms that enable network optimization in a cost- and time-efficient manner
  • Developed widely used ranking and search algorithms for online documents
  • Created protocols that enable individual network nodes to cooperate and optimize for global objectives in adversarial environments, under current known conditions as well as future uncertain scenarios
  • Developed adaptive divesrification strategies toa chieve highly robust communication including efficient procedures to compute optimal strategies and associated probabilities that adversaries will use specific strategies
  • Developed an algorithm for a model explaining the emergence of scale-free networks in natural, technological, and social systems; including cell phones, the World Wide Web, and online communities
  • Constructed cryptography schemes to maintain system security even when attackers obtain partial information.

 

Northeastern University
  • My NEU
  • Find Faculty & Staff
  • Find A – Z
  • Emergency Information
  • Search

360 Huntington Ave. Boston, Massachusetts 02115 • 1 (617) 373-2000

© 2013 Northeastern University

  • twitter
  • facebook
  • youtube