• Computer Science and Engineering Names New Chairman
• On-line Piracy and Parasitic Computing Studied
Computer Science and Engineering Names New Chairman

Kevin W. Bowyer joined the Department of Computer Science and Engineering in August 2001 as the Schubmehl-Prein Professor and Chair. Specializing in computer vision, image analysis, pattern recognition, data mining, and applications to medical imaging, Bowyer is also involved in the study of ethics and computing. The second edition of his textbook, “Ethics and Computing -- Living Responsibly in a Computerized World,” was published in 2001. In addition he has organized a series of National Science Foundation workshops for undergraduate faculty from across the United States on the topic of teaching ethics and computing.

Prior to joining the Notre Dame faculty, Bowyer served as a professor of computer science and engineering at the University of South Florida. He is the author and co-author of nine books and numerous journal articles.

Bowyer received a bachelor’s degree in economics from George Mason University in 1976 and a doctorate in computer science from Duke University in 1980.
On-line Piracy and Parasitic Computing Studied

Researchers at the University of Notre Dame have uncovered a new Internet vulnerability, parasitic computing. According to Vincent W. Freeh, assistant professor of computer science and engineering; Jay B. Brockman, associate professor of computer science and engineering; Albert-Lázló Barabási, Emil T. Hofman Professor of Physics; and Hawoong Jeong, assistant professor of physics, parasitic computing is enabled by the way in which communication occurs across the Internet. Since a standard set of protocols is used by all computers, one can “force” others to solve a piece of a complex computational problem by merely engaging them in standard communications.

In order to prove their theory, the researchers used web servers around the world to solve math problems without their owner’s permission. The parasitic computing technique they utilized to harness the power of the other computers resembles distributed computing, which takes advantage of the fact that complex tasks can be split into small parallel processes and run simultaneously on a large number of individual computers.

Their “usage,” although an academic exercise in this case, raises some interesting questions: “Is it legal to use a computer without the owner’s consent, even if calculations are being done in the background?” “How much access does parasitic computing allow?” According to the Notre Dame team, parasitic computing cannot violate the security of unwitting servers. At this point in time, it uses only those areas earmarked for public access. However, with faster, cheaper, and more sophisticated communications technology, variations could be engineered to make on-line piracy of computer time more efficient.

Parasitic computing also highlights some interesting ethical issues regarding the ownership of the resources available on the Internet as well as the “theft” of time -- keeping each host computer from its intended purpose.

For more information on parasitic computing at Notre Dame, visit http://www.nd.edu/~parasite.

[back to top]
 
To Homepage To College Homepage To University Homepage