Computing focuses on the IC's ability to operate freely and effectively in an often hostile and increasingly interdependent and resource-constrained environment. Key research focus areas include information assurance, advanced computing technologies and architectures, quantum information science and technology, and threat detection and mitigation.

Current Research | View Past Research

ProgramResearch AreaProgram Manager
C3 Advanced/alternative computing technologies, superconducting microelectronics Marc Manheimer
HECTOR Secure multiparty computation, homomorphic encryption, verifiable computing, compilers, programming languages, automated security analysis  Mark Heiligman
LogiQ Advanced/alternative computing platforms, quantum information sciences, qubit systems Brad Blakestad
MICrONS Theoretical neuroscience, computational neuroscience, machine learning, connectomics, brain activity mapping David Markowitz
RAVEN Microelectronics, nondestructive analysis, nanoscale imaging, hardware assurance  Carl McCants
SuperTools Superconducting electronics, advancements/alternatives to semiconductor-based exo-scale computing, cryogenic computing  Mark Heiligman
TIC Cybersecurity and information assurance, hardware assurance, microelectronics Carl McCants
VirtUE Computer virtualization, operating systems, cyber security, vulnerability analysis, insider threat remediation and detection, active defense, big data analytics, sensor fusion, user interfaces, anomalous event detection Kerry Long

Past Research

ProgramResearch Area
CAT Cybersecurity and information assurance, hardware assurance, microelectronics 
CSQ Advanced/alternative computing platforms, quantum coherence, coherent qubit, quantum information sciences
MQCO Advanced/alternative computing platforms, quantum information sciences, qubit systems 
QCS Quantum information sciences
SPAR Secure multiparty computation, private information retrieval, privacy and civil liberties protections
STONESOUP Cybersecurity and information assurance, software assurance, vulnerability detection and mitigation