CISE_Information_第1页
CISE_Information_第2页
CISE_Information_第3页
CISE_Information_第4页
CISE_Information_第5页
已阅读5页,还剩41页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Computer & Information Science and Engineering at NSFMichael PazzaniDivision Director, CISE/Information and Intelligent SystemNSF7/26/20221OverviewNSFCISE IDMStatistics on NSF/CISE/IDMCISE activities in NSF wide competitionsPlans for 2005 and BeyondProgram DeadlinesTransitioning Information Technolo

2、gy ResearchInformation IntegrationPrivacyHomeland SecurityCybertrustHow you can help NSFSubmit quality proposals. Innovative but achievable.Let us know about your progress on grantsBe a reviewerJoin NSF7/26/20222NSF MissionNational Science Foundation Act of 1950 (Public Law 810507): To promote the p

3、rogress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes.7/26/20223Research in the NSF Organization Directorate for Biological Sciences Directorate for Computer and InformationSciences and Engineering Directorate for Educatio

4、n andHuman Resources Directorate for Engineering Directorate for Geosciences Directorate for Mathematical andPhysical Sciences Directorate for Social, BehavioralAnd Economic SciencesOffice of the Director7/26/20224CISE Organization: 2004Peter Freeman, AD7/26/20225Whats new in the reorganizationNew d

5、ivisions and programs Clusters: Larger solicitations with teams of program directors working together Emphasis Areas: cross-divisional activities and priority areasCybertrustBroadening participationScience of designInformation integration7/26/20226Information and Intelligent SystemsMichael Pazzani,

6、DDincreasing the capabilities of human beings and machines to create, discover and reason with knowledge advance the ability to represent, collect, store, organize, locate, visualize and communicate informationresearch on how empirical data leads to discovery in the sciences and engineering7/26/2022

7、7IIS: Systems in ContextSupports research and education on the interaction between information, computation and communication systems and users, organizations, government agencies and the environmentHuman-Computer Interaction:Universal AccessDigital Society and TechnologiesRoboticsDigital Government

8、7/26/20228IIS: Data, Inference & Understandingbasic research with the goal of creating general-purpose systems for representing, storing, accessing and drawing inferences from data, information and knowledge. Artificial Intelligence and Cognitive ScienceComputer VisionHuman Language and Communicatio

9、nInformation and Data ManagementDigital Libraries7/26/20229IIS: Science and Engineering InformaticsCollaborative Research in Computational NeuroscienceScience & Engineering Information Integration and InformaticsSEI: Focuses on developing information technology to solve a particular science or engin

10、eering problem and generalizing the solution to other related problems. A significant domain challengeA significant computer science problem that is a barrier to achieving the domain challengeInformation Integration: Provide a uniform view to a multitude of heterogeneous, independently developed dat

11、a sources. Reconciling heterogeneous formats Web semantics Decentralized data-sharingData-sharing on advanced cyberinfrastructureOn-the-fly integrationInformation Integration Resources:7/26/202210The SARS virus has been sequenced!7/26/202211Historical Data7/26/202212Faculty Growth7/26/202213IIS Tren

12、ds7/26/202214IDM BudgetYear to Year comparisons are not exact, e.g., pre 2004 budget includes IGERT, Sensors, Panel Travel, IPA Salary and Travel. 7/26/202215CISE BUDGET Overview7/26/202216IIS Budget OverviewCombined transferred from other agencies and regular program funds have been relatively flat

13、, (modulo reorg)Growth in funds managed by IIS has been primarily in ITR7/26/202217Funding TrendsFunds available to support research have nearly doubled in the past five yearsHowever, proposals have almost tripledFrom less than one per year per CS faculty member to more than one per year.Shift from

14、90% awards support a single PI to 40% supporting teams, and 5% “large” teamsBudget outlook for the next years- slow growth a likely scenario. Transition of ITR funds into regular programs7/26/202218IIS Competitions 2004 vs 2005 FY 2004Responsible for about 2590 proposalsSuccess rates 17% CAREER, 5%

15、regular, 7% ITRFY 2005Raise acceptance rate of regular 2004 proposals to 10-12%CAREER in July as normalScience & Engineering Informatics/Information Integration and Universal Access: December 2004Data, Inference, and Understanding and Systems in Context: April 2005 with most funding from FY 20067/26

16、/202219IIS FY047/26/202220What data is available on NSF Awards?/7/26/202221IIS Competitions: 2005 vs 2006 FY 2005July (2004): CAREERDec (2004): SEIII, UA, CRCNSApril(2005): Everything ElseFY 2006July (2005): CAREERDec (2005): Information Integration, CRCNSApril (2006): Everything Else including SEIR

17、estrictionsAny individual can be PI or coPI of no more than 2 proposalsA PI cannot submit a proposal that covers the same research to more than one competition.7/26/202222National Security & Homeland Security Research at the National Science FoundationNSF Mission: To promote the progress of science;

18、 to advance the national health, prosperity, and welfare; and to secure the national defense.Why NSF?Peer-review system identifies highly meritorious projects.Established relationship with top researchers on a broad range of topics identifies match between agency needs and researchers capabilities.T

19、ypes of SupportFoundational research in areas such cryptography, network security, machine translation, speech analysis, robotics, information fusion, image analysis, data mining, collaborative systems, social network analysis, bioinformatics, critical infrastructure protection, economics and politi

20、cal science with application to a broad range of problems including National Security & Homeland Security.Supplements funded by other agencies to existing NSF investigators to perform unclassified research with short-term application of interest to the agency.7/26/202223Interagency transfers related

21、 to homeland security: $27.6M7/26/202224NSF Directorates7/26/202225Human and Social Dynamics:(Deadline Winter)Understanding the human and social dynamics of change in our contemporary world to develop a comprehensive, multi-disciplinary approach to understanding human and social dynamics; to exploit

22、 the convergence in biology, engineering, information technology, and cognition to advance the understanding of behavior and performance at both the individual and social levels; 7/26/202226Science of Learning Centers3 to 5 Center awards and 20+ Catalyst awards (workshops, etc.) a year. New competit

23、ive expected in FY 2005The neural basis of learning in humans and other species;Machine learning, learning algorithms, knowledge representation, robotics, adaptive systems, and computational simulation of cognitive systems;Visualization and representation of complex phenomena and multidimensional da

24、ta;Analogical reasoning, mathematical reasoning, causal analysis, general and domain-specific aspects of mathematical and scientific problem-solving, creativity, and intelligence;Learning of disciplinary content including assessment, structure of disciplinary knowledge, pedagogical content knowledge

25、, learning in formal and informal educational settings, and equitable access to learning;Learning technologies, including intelligent tutoring systems, visualization tools, computer-supported collaborative environments, digital libraries, and real-time assessment tools;7/26/202227CISE Computing Rese

26、arch Infrastructure Infrastructure Acquisition. These awards have budgets up to $2,000,000. Cost sharing is not required on small grants; costsharing of 20% is required on medium grants but only from Ph.D.-granting institutions; cost sharing of 30% is required on large grants but only from Ph.D.-gra

27、nting institutions. Community Resource Development. These awards have budgets from $300,000 to $2,000,000: medium from $300,000to $800,000 and large over$800,000. Cost sharing is not required on these awards. Development projects create a resource for an entire CISE research community, such as a tes

28、tbed for evaluating research results or a large data resource that contains problems a community is trying to solve (e.g., annotated speech data). Planning. These awards facilitate the preparation of a proposal for a medium or large infrastructure acquisition grant. They have budgetsup to $50,000 fo

29、r one institution or up to $100,000 if more than one institution is involved.Cost sharing is not required. 7/26/202228Privacy & Data: 2005 “Focus in IISWhat is Data Mining?KDD: The process of identifying valid, novel, useful, and understandable patterns in dataWashington/Press: Any process that allo

30、ws one to draw conclusions from data, e.g., identify novel patterns in data, searching for known patterns in data, integrating data from multiple sourcessearching for records about an individual in one or more databases7/26/202229Benefits of “Data Mining”Accelerate collection and analysis of scienti

31、fic dataGreater medical understanding of the human and the environmentEarly symptoms of diseasesDietary and Environmental factorsCost savings and reductions in errors in medicinePersonalized Services (e.g., TiVo)Counterterrorism7/26/202230Connecting the Dots7/26/202231but not my dots7/26/202232Perso

32、nalized Services7/26/202233s.1484 July 2003SEC. 4. GENERAL PROHIBITIONS.(a) IN GENERAL- Notwithstanding any other provision of law, no department, agency, or other element of the Federal Government, or officer or employee of the Federal Government, may conduct a search or other analysis for national

33、 security, intelligence, or law enforcement purposes of a database based solely on a hypothetical scenario or hypothetical supposition of who may commit a crime or pose a threat to national security. To require a report on Federal Government use of commercial and other databases for national securit

34、y, intelligence, and law enforcement purposes, and for other purposes. IN THE SENATE OF THE UNITED STATES July 29 (legislative day, JULY 21), 2003 7/26/202234Privacy: Why is it importantPrevention of crimes such as identity theft.Prevention of discrimination based on factors such as medical conditio

35、nsEnhance Law enforcement/ homeland securityASA HUTCINSON: Prior to 9/11, there were fewer than 100 names on the no fly list. Today TSA provides carriers with no fly lists which have been dramatically expanded. KWAME HOLMAN: However, commission chairman Tom Kean said the lists of potential terrorist

36、s given to air carriers still are incomplete. THOMAS KEAN: As we understand it, the intelligence community doesnt want air carriers to possess many of these names because they feel maybe they could tip off terrorists or compromise sensitive sources and methods of intelligence collection.7/26/202235S

37、ome ChallengesAllow two organizations to find the intersection between two sets without either finding out any information on the others elements not in the intersectionAllow for “equal with probability above a threshold” vs. equal, i.e., I travel under “Michael Pazzani”, “Micheal Pazzani” “Michael

38、J. Pazzani” “MichaelJ Pazzani”Allow an organization to discover a general pattern without finding out any information about the individuals.Building Sociotechnical systems that understand the implications of false positives and false negatives and the assumptions behind specific algorithms.Digital R

39、ights Management: Allow owners of information to set policies on how it may be used and to trace how it has been used. Anonymizing Data while retaining important properties, particularly “entity-relationship” or relational.7/26/202236What CISE/NSF/IIS is doingIn FY05,there will be a special emphasis

40、 on drawing conclusions from data while maintaining the privacy of individuals in the Division of Information and Intelligent Systems (CISE/IIS)Basic research on privacy and data analysis Inform the adoption of new policiesSuggestions on additional questions to ask are welcomePrivacy researchers are

41、 advised to understand the social and legal environment in addition to the technical.Funding NAS/CSTB study on privacy (with Census and other agencies)7/26/202237How you can help NSFSubmit High Quality Proposals Innovative, but achievableWell-writtenAddress broader impactsParticipate in Reviewing/Pa

42、nelsGive Constructive Detailed ReviewsMake an effort to understand and support research outside your paradigmKeep Program Manager informed of findingsNuggetsCISE NewsletterPowerPoint of Conference PresentationsRotate in as a Program Manager (IPA) or Division Director7/26/202238My proposal wasnt acce

43、pted. Should I resubmit? YES, butThe reviewers didnt get it:Was the proposal clear? Especially summary & introductionDid you explain how it is a significant advantage over state of art broadly defined,not just in your specialized areaHint: Make Proposal Summary look like an ideal reviewDid you addre

44、ss all the review criteria? Read announcement carefullyBroader Impacts Mention Dept & School Outreach. Make it easy for others to build upon your work, education and reserachResearch Plan- What will you do in year 3? Evaluation Plan?Was it sent to the right program? Most specific program is probably

45、 best (Information Integration vs. Information and Data Management)Too preliminary: Do some initial work and resubmit or explain alternative and methodologyConstructive Criticism in reviews. Fix, update, make sure its clearMulti-investigator: Integrate research topics rather than append them. Be cri

46、tical of each other.All the reviewers that it was pretty good, but none thought it was excellent Are you sure the topic is important and innovative?Compare to funded proposalsPeers/MentorsAbstracts on Web site and Full Proposals via Freedom of Information ActNo review was detailed Appeal7/26/202239H

47、ow to be a good reviewerBe specific.No: “Others have done something like this”Yes: “See Smith (2004), AI Journal pp 11-19”Be detailedJournal length vs workshop length review.Take and defend a strong position: Avoid calling anything “Okay” or “Good”. Why is this “Outstanding” or describe why this “Needs Considerable Improvement”Be ConstructiveAllow PI to learn from your expertiseDistinguish Fatal Flaws from Suggestions for Improvement, particularly for NSF wide competitionsMention strengths, innovations and impacts in detail, particularly

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论