Skip to Content


Stereo Vision for Underwater Archaeology

As co-director of Engineers for Exploration, Prof. Ryan Kastner led expeditions to test an underwater stereo camera system for producing 3D reconstructions of underwater objects. Here Kastner is shown with the camera system in a UCSD pool. Read more…  

Kastner Underwater

Pacific Interlude

Four of the 10 UCSD undergraduates in the 2014 Pacific Rim Experiences for Undergraduates (PRIME) program are CSE majors. (L-r) Allen Nguyen and Lok Yi (Nicole) Wong did research in Japan, while Matthew Schwegler and Katerina Zorko spent the summer in Australia. Read more…


Girls Day Out

The UCSD chapter of Women in Computing (WiC) held its second annual Girls Day Out in May, bringing roughly 100 girls from San Diego high schools to tour the campus and do hands-on experiments in electronics. Here, girls visit the Qualcomm Institute’s StarCAVE virtual reality room. Read more…  

Girls Day Out

Coding for a Cause

Then-sophomore Sneha Jayaprakash's mobile app, Bystanders to Upstanders (B2U), matches students with opportunities to volunteer for social causes. Together with fellow CSE undergrads, she won a series of grants and awards, and is now doing a startup. Read more...

Sneha Jayaprakash

Photo Finish

CSE alumna Brina Lee (M.S. ’13) was the first full-time female engineer hired at Instagram. Then Instagram was purchased by Facebook, and now Lee is spending much of her time talking to female students about opportunities in computer science. Read more… 

Brina Lee

Internet of Things

Computer scientists at UCSD developed a tool that allows hardware designers and system builders to test security. The tool tags then tracks critical pieces in a hardware’s security system. Pictured (l-r): Ph.D. student Jason Oberg, Prof. Ryan Kastner, postdoc Jonathan Valamehr. Read more…

Internet of Things

Research Expo 2014

At the Jacobs School of Engineering’s Research Expo 2014, CSE Chair Rajesh Gupta (pictured) briefed industry and visitors, and Ph.D. student Matthew Jacobsen won best CSE poster for “Hardware-Accelerated Online Boosting for Tracking.” Read more…

Research Expo 2014


Ph.D. student Laura Pina won best paper with Microsoft colleagues at PervasiveHealth 2014 for developing ParentGuardian, a mobile app/sensor detecting stress in parents of children with ADHD. The system helps parents cope with stress in real time. Read more…  


New Faculty

Former UC Berkeley professor Ravi Ramamoorthi joined CSE’s visual computing faculty, and he is one of six new CSE faculty hires in 2014. Others include assistant teaching professors Mia Minnes and Leo Porter, and assistant professors George Porter, Daniel M. Kane and Julian McAuley. Read more…

Ravi Ramamoorthi

Fun and Functional

CSE 145 teaches students about embedded systems design, and they do capstone projects. For one team, that meant building Ruku, a robot and mobile app that solves a Rubik’s Cube in 30 seconds. (L-r): William Mutterspaugh, Daryl Stimm and Jonas Kabigting. Read more…

Ruku to solve Rubik's Cube

Overclocked Enthusiasts

CSE alumni, students, staff and faculty turned out in force to run, walk or just cheer on the Overclocked CSE Enthusiasts, the department's main team entered in the Chancellor’s 5K run in June. Prof. Christine Alvarado ranked #1 in her division. Read more…  

5K Race

The Gift That Keeps on Giving

CSE capped the 2012-'13 academic year with the announcement of an anonymous $18.5 million gift from an alumnus – making it the largest-ever alumni gift to UC San Diego. Read more...

  • Discussion Groups for the Online Classroom (and Off)

    CSE and Cogntive Science professor Scott Klemmer (right) is one of the brains behind a new tool called Talkabout, developed originally at Stanford but now also deployed as part of Klemmer's massive open online course (MOOC) on human-computer interaction from UC San Diego. Talkabout is a virtual discussion section built around Google Hangouts (which limits to nine the maximum number of participants in a Talkabout, or as few as two). First developed before Klemmer left Stanford for UCSD, Talkabout was built with his then-colleagues, Stanford computer science professor Michael Bernstein, and Ph.D. student Chinmay Kulkarni. As originally implemented in Klemmer's first MOOC, the tool offered students the opportunity to log on any time, but students couldn't be sure that anyone else would be there at the same time.

    So instead, according to a report this week in Stanford Daily, "the new system works by randomly assigning a few people to each group. There is no moderator and students encounter new peers in each discussion section." Talkabout also allows students to choose between verbal discussion or contributing by text (which is often preferred by students for whom English is a second language).

    Klemmer will also use Talkabout for discussion groups in his Human-Computer Interaction Design sequence of six courses that will begin June 16 on the Coursera network. Meanwhile, CSE faculty-affiliate Terry Sejnowski recently used the tool for his Learning How to Learn MOOC on Coursera produced by the Temporal Dynamics of Learning Center. (The center is directed by CSE Prof. Gary Cottrell).

    And another upcoming online courses set to use Talkabout for discussion groups is Learn to Mod, which teaches students how to code modifications of the wildly popular computer game, Minecraft. The instructor will be Sarah (Esper) Guthals (at right), a CSE alumna (PhD '14) and co-founder/CTO of the startup ThoughtSTEM, which develops courses, trainings, software and textbooks for children 8 to 18 to learn how to program. Guthals and ThoughtSTEM co-founder and CSE Ph.D. candidate Stephen Foster also created a video game, CodeSpells, to help teach kids programming skills. The research implementation was so successful -- attracting $164,000 from nearly 5,500 backers on Kickstarter -- that it is now under development as a full-scale commercial game by professional video game developers. Their success with CodeSpells led Guthals and Foster to develop LearnToMod software, which provides a game environment with puzzles and tutorials on how to craft "mods" in a browser, teaching how to code at the same time. That same software forms the basis of the "Learn to Mod" online course.

  • A Graduate Student's Perspective on Data Scientists

    As CSE seeks campus approval for a new major in Data Science and Engineering, Ph.D. student Zachary Chase Lipton asks the question: "Will the real data scientists please stand up?" That's the title of his May 19 column in KDnuggets, which covers data mining, analytics, big data and data scence. In the article, Lipton parses the various definitions of "data scientist," which he says has grown to include "computer scientists, mathematicians, and physicists as well as business school graduates, economists, and other social scientists. Some positions seem to require mathematical maturity, others superior coding skills, and yet more are clearly looking for SQL jockeys, who can generate visualizations and insert them into powerpoint presentations."

    Lipton (at right) distills the profession into five archetypes of data scientists. The "theorists" are mostly academics who "primarily study algorithms that are provably efficient and provably correct, even if they must rely on unrealistically strong assumptions," writes Lipton, who works with CSE Prof. Charles Elkan in CSE's Artificial Intelligence group. "Theory papers contain proofs correctness, proofs of convergence, and guarantees on performance." The second archetype is the machine learning scientist, who works in universities or big tech companies such as Google, Amazon, Microsoft and Facebook. Lipton says "machine learning scientists sit somewhere between theorists and data miners," and they develop new algorithms but also "care about empirical performance on real-world tasks." Archetype #3 are the data miners. "These engineers are often strong programmers and combine domain-specific intuition with a knowledge of algorithms to generate valuable insights," writes Lipton, and they work at a broader cross-section of Silicon Valley-type companies as well as in health and other spaces that are focused on mining a particular industry's data.

    "Script kiddies" is what Lipton calls the fourth archetypal data scientist, defined as end-users of data science products such as Azure ML, IBM Watson and KNIME. "They may know roughly what a support vector machine does," says Lipton, "but wouldn't code one from scratch." And finally, the loosest definition of data scientist might more appropriately be called "Powerpoint jockeys". They are employed in management consulting firms and elsewhere. They may previously have been called business analysts, but now want a fancier-sounding title such as data scientist. "These individuals may have no coding skills or mathematical background," writes Lipton, "but why should qualifications stand in the way of ambition?" Strong skills in Powerpoint and Excel make it possible to churn out impressive-looking visualizations to justify the "data scientist" moniker.

  • Students Put Finishing Touches to 3D, Multiplayer Networked Games

    Mark June 5th on your calendar. That's when five teams of students taking the CSE 125 capstone course on software system design and implementation -- better known as "the videogame course" -- will present their final projects and give audience members an opportunity to play the 3D, networked and multiplayer games in real time.

    Friday, June 5, 2015
    4pm - 5:30pm
    Calit2 Auditorium, Atkinson Hall

    The course has been taught since 2001, making this the 15th class to reach the finish line and produce their games from scratch. The final presentations in the Calit2 Auditorium are usually a standing-room-only celebration, as students from across campus flock to see how the teams  spent their 10 weeks (for many, the hardest 10 weeks of their entire undergraduate careers at UC San Diego, even though they also had fun). While creating a game adds excitement and motivation, CSE Prof. Geoffrey Voelker told students at the outset that "by the end of the course, you'll hopefully realize that what you learned in doing the project will apply to any large software project that is distributed, has performance constraints, has real-time constraints, has actual users other than developers, and so on." In short, CSE 125 gives seniors an opportunity to apply everything they should have learned in their major.

    Each team is usually broken into sub-teams to handle different parts of the challenge. For example, for Team 5, which is developing a "3D, multiplayer, player-vs.-player (PvP), team-based, territorial world conquer game," the entire six-person team is working on game play, while sub-teams are handling graphics (Robert Maloney and Sanjana Agarwal), networking (Kyle Parkinson and Benigno Baclig), as well as controls and art (Mimi Liu and Beth Yue Shi). While most of the games are first-person shooter games (including one where you kill your opponent by shooting bananas), there is also Battle Blocks, a sandbox building game where the player builds and customizes a battle robot to fight other bots, and a PvP fantasy combat game where each team of mechs (vampires/crusaders) is given a certain objective to complete in order to win each round.

    For the final presentations, which are open to the public and recorded for later on-demand viewing on the Internet, each team will demo their game, which must be played by four players drawn from the team and from the audience. A written project report is due at the end of finals week, but the final test is the June 5 demo. "The last thing you want," Voelker warned, "is a blue screen of death" when it's time to start playing the game in front of a real audience. 

  • CSE Computer Security Startup Starts Selling Toolkit

    A startup out of the CSE department is flexing its muscles. This week, Tortuga Logic's co-founder and CEO, CSE alumnus Jason Oberg (PhD '13) announced immediate availability of the company's toolkit to transform the way hardware designers and system architects test the security of hardware designs.

    "The semiconductor industry needs to redirect its attention from only analyzing software vulnerabilities to identifying ways to detect security issues in hardware designs," said Oberg (at right) in a news release. "As more and more devices are designed to be Internet-enabled, the more we need to be concerned about hardware security. Hackers are focusing now on hardware." Tortuga Logic is a pioneer in the so-called design-for-security market. Its new toolkit, called Prospect, is able to uncover hidden bugs and prove the absence of vulnerabilities in hardware designs, thus minimizing security breaches in hardware and systems by automating the process of verifying security properties. Oberg's co-founders in Tortuga Logic include CSE Prof. Ryan Kastner and UC Santa Barbara Prof. Tim Sherwood, as well as Jonathan Valamehr, who is now the company's CFO and chief operating officer. This week's announcement put Tortuga Logic one step closer to graduating from the EvoNexus incubator, where it has been headquartered since late last year. The company should now be able to start adding commercial sales to a business that until now relied primarily on angel investors and NSF Small Business Innovation Research funding. In mid-April, Tortuga Logic was one of 16 startups participating in EvoNexus' Demo Day, where 350 attendees saw the company's demonstration of how their software analyzes the security properties in hardware designs to prevent cyber-security breaches. The company expects growing demand for its products with the advent of the Internet of Things. "Attacks have already been demonstrated on embedded devices such as pace makers, automobiles, baby monitors, and even refrigerators," Oberg told Chip Design magazine in late April. "Most companies are trying to solve this problem purely with software security, but this is a constant cat-and-mouse game we cannot win. As IoT grows, we are seeing more software being pushed down into hardware and our modern chipsets are growing in complexity. This is driving attackers to begin focusing on hardware and, without ensuring our chipsets are built in a secure manner, these attackers will continue to succeed.”

by Dr. Radut