Brown CS Blog

Articles by Jesse Polhemus

Research Associate Tom Sgouros And Brown CS Students Use Sound And AI To Make NASA Imagery Accessible


"Pivoting is a lot of what I do," Brown CS Research Associate Tom Sgouros says of a current project. It began in a familiar research area, virtual reality, and evolved in two different directions, resulting in work that offered unexpected depths along the route to an important and often neglected goal: aiding the visually impaired.

The New York Times Recommends Rhode Island In The Fall


A recent New York Times describes Rhode Island's East Bay as a beautiful, bountiful autumn destination. "Just 30 minutes from Providence," writes Christine Chitnis, "over an hour from Boston and four hours from New York City, the Easty Bay towns of Warren, Bristol, Tiverton and Little Compton offer an idyllic fall weekend getaway."

My Research Summer Meeting People And Robots At Brown University


I am a junior at Rutgers University majoring in Computer Science and Cognitive Science. I’m really interested in research and debating questions about how minds work. Artificial intelligence research piques my interest. So, this summer, I joined the Humans to Robots Laboratory through the Brown Computer Science Artificial Intelligence & Computational Creativity Research Experience for Undergraduates (REU) Site. I felt so welcomed. Everyone at Brown, from the professors to the staff members to the grad students and undergrads, were very supportive. The program gave me a peek into the exciting life of a full-time researcher in computer science. Every day …

What's Your Most Brilliant Moment? My ICPC NAC Trip

In February 2023, Brown CS faculty member Yu Cheng brought four teams of students to the International Collegiate Programming Contest (ICPC)’s Northeast North America (NENA) Regional Contest at the College of the Holy Cross site. Their story is told here. Below, one of the students from the team that advanced to the national level shares his experience of that event.

What Are You Typing? Enhancing Digital Communication Through Rich Typing Indicators


Have you ever found yourself anxiously waiting for a response, unsure of what the other person is typing? The absence of immediate feedback, tone, facial expressions, and other non-verbal cues can sometimes hinder effective text-based communication. Hence, despite the convenient nature of messaging platforms, there has been a rising anxiousness around the ... or Zainab is typing . This anxiousness can be attributed to the low richness associated with messaging.

BinWrap: Safeguarding Node.js Applications From Native Library Risks


In a forthcoming paper that has received the ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2023)’s Distinguished Paper Award, researchers at Brown and collaborators at Aarno Labs, FORTH, and TUC developed a new system that can automatically protect against these native library threats while requiring minimal developer effort. The system, called BinWrap, combines protections of both the native portion of a library and its language-specific wrapper.

KubeKlone, The First Comprehensive Digital Twin For Modeling Cloud-Native Microservices Applications


Microservices have been transforming the computing landscape with web-scale infrastructures like Facebook, Google, Amazon, and telecom infrastructures like AT&T and Ericsson adopting them. The microservices paradigm has proven to promote better scalability, fault tolerance, and deployability. However, it also significantly increases the space of configuration options and performance problems, rendering traditional approaches to management ineffective.

IvySyn: The First Fully-Automated Framework For Discovering Memory Error Vulnerabilities In Deep Learning Frameworks


Deep Learning (DL) is a rapidly growing field that has found a set of wide-ranging applications across various industries, such as transportation, banking and finance, healthcare, and more. As the use of DL becomes more widespread, DL frameworks, such as TensorFlow and PyTorch, have, in turn, become increasingly popular, and are being used to build models that are applied even in security-critical settings. Thus, with their increasing popularity, the importance of keeping these frameworks secure has become crucial.