1 / 23

CSE CHAMPS Initiative C onstructing H igh- A ssurance M obile and P ervasive S ystems

CSE CHAMPS Initiative C onstructing H igh- A ssurance M obile and P ervasive S ystems. Department of Computer Science and Engineering Michigan State University. Goal. Identify and nurture an “umbrella” research theme for CSE Department that:

Download Presentation

CSE CHAMPS Initiative C onstructing H igh- A ssurance M obile and P ervasive S ystems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSE CHAMPS InitiativeConstructing High-Assurance Mobile and Pervasive Systems Department of Computer Science and Engineering Michigan State University Computer Science and Engineering, July 21, 2004

  2. Goal • Identify and nurture an “umbrella” research theme for CSE Department that: • Leverages and creates synergy among current and emerging CSE research strengths • Sets CSE apart from other computer science programs (e.g., Georgia Tech model) • Is important to advances in many disciplines across campus • Helps MSU play a unique role in information technology and its applications in science, engineering, business, … Computer Science and Engineering, July 21, 2004

  3. CSE Research • Established strength areas • Networking and pervasive computing • Software engineering and formal methods • Intelligent systems • Emerging strength areas • Digital Evolution • Computational Linguistics • Cybersecurity • Bioinformatics Computer Science and Engineering, July 21, 2004

  4. Networking and Pervasive Computing Computer Science and Engineering, July 21, 2004

  5. Networking Research Discovering party Service provider Japan E. Lansing Trust • Internet challenges: Real-time interaction, wireless edge, security and privacy • Internet Tele-operation (Mutka) • Real-time robot control/feedback • Anonymous Communication (Shapiro) • Internet privacy, Internet commerce • Overlay Networks (Xiao, McKinley) • Virus early warning systems, P2P apps • Secure Mobile Computing (Mutka, McKinley) • Battlefield computing, emergency services • Funding: NIH, NSF, ONR • Collaborators: Dept. of Surgery, Telecomm, ECE, ME, Chemistry/BioChemistry, Mathematics, Ohio State, William and Mary, U. Helsinki, Siemens Computer Science and Engineering, July 21, 2004

  6. Pervasive Computing • Removing traditional boundaries for how, where and when humans and computers interact • Augmented reality (Owen) • Autonomic computing (McKinley, Kulkarni, Cheng, Dillon, Stirewalt) • Example: Critical Infrastructure Protection • Adaptive auditing to prevent cascading failures • Detect and respond to security threats • Funding: ONR, NSF, Microsoft • Collaborations: Siemens, Cisco, Lucent, MIND Lab, Dept. Advertising • Emerging collaborations: Business School, Entomology, Cyclotron Computer Science and Engineering, July 21, 2004

  7. Sensor Networks • A special case of pervasive computing • Inexpensive MEMS devices deployed in large quantity to remote, hazardous, or denied areas • Self-organizing control and data gathering • Topics: • Self-configuring networks (Kulkarni, Mutka) • Energy management (McKinley) • Software adaptation (Kulkarni) • Example: DARPA NEST project • Applications: • Battlefield, homeland security • Ecosystem monitoring • Smart structures • Collaborators: Entomology, Ohio State, U. Iowa Computer Science and Engineering, July 21, 2004

  8. Software Engineering and Formal Methods Computer Science and Engineering, July 21, 2004

  9. SE for High Assurance: • Systematic development of software that • requires critical properties • Safety; Security; Real-time; Fault Tolerance • Related Areas: • Code Generation (Stirewalt, Cheng, Chung) • Automated Verification (Dillon, Stirewalt, Cheng) • Component-Based Development (Stirewalt, Dillon, Cheng) • Embedded Systems (Cheng, Kulkarni) • Fault Tolerance (Kulkarni, Cheng) • Security (Wojcik, Dyksen, Cheng, Chung, Enbody, Jain, McKinley, Mutka, Shapiro, Stirewalt, Xiao) • Funding sources: • NSF, DARPA, ONR, Automotive Industries, Siemens, APP&R • Collaborators: • Telecomm, Business School, Medical School, Criminal Justice, • Motorola, Detroit Diesel, NASA/JPL, Texas Instruments, Boeing Computer Science and Engineering, July 21, 2004

  10. Software Engineering for High Assurance SW Electronically- Controlled Steering Transportation Systems (Signaling/Automation) Patient Monitoring System Automotive Software Adaptive Cruise Control Manufacturing Software Computer Science and Engineering, July 21, 2004

  11. Temptations and Challenges for Software Development Ideas for Software ``Design at the keyboard’’ Code ``Testing’’ ``Hacking’’ ``Debugging’’ • High Assurance systems: • Errors are “expensive” • Demand rigorous SE • Must be formally verifiable • Automation • Ad hoc techniques • Difficult to gain assurance • Acceptable for some application domains Computer Science and Engineering, July 21, 2004

  12. Reality Check… Boeing 777 Fly-by-wire Question: Would you ride the airplane that uses your software? Computer Science and Engineering, July 21, 2004

  13. Bridge the Gap Between Informal and Formal Methods Object-Oriented “Blueprints” Formal Representations • Objective: • formal (mathematical-based) • specifications • executable code • that can be verified • for correctness • and completeness Apply Formalization Framework • Benefits: • Automated Analysis • Consistency, completeness • Rapid Prototyping • Behavior Simulation • Design Transformations • Test Case generation • Informal specifications, • graphical models, • easy for humans to • formulate, • may be inconsistent and • incomplete.

  14. Intelligent Systems Computer Science and Engineering, July 21, 2004

  15. Intelligent Systems • Autonomous agents, human computer interaction, knowledge discovery • Natural Language Understanding (Joyce Chai*, John Hale* +) • Robotics (John Weng) • Machine Learning (Rong Jin*, John Weng) • Computer Vision (George Stockman, Anil Jain, Aude Oliva*# , John Weng) • Pattern Recognition (Anil Jain) • Data Mining (Pang-Ning Tan* and Anil Jain) • Information Retrieval (Joyce Chai* and Rong Jin*) “Design and engineer systems that exhibit intelligence” • * Hired in the last two years # Dept. of Psychology + Dept. of Linguistics Computer Science and Engineering, July 21, 2004

  16. Research Projects • Biometric Recognition (NSF, DHS) • Question answering system for multimedia information(ARDA) • Handwritten document understanding (Microsoft) • Data clustering (ONR) • Smart airbags (Eaton) • Developmental learning and humanoid robots (DARPA, SAIC, Zyvex) • Office presence (status of human presence in office)(Microsoft) • Multimodal conversational system (NSF) • 3D sensing, modeling and movement (Army) • Facial expression analysis and HCI (NSF) Computer Science and Engineering, July 21, 2004

  17. Biometric Recognition • Biometrics: A measurable, physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an enrollee • Biometric recognition: Personal recognition based on “who you are or what you do” as opposed to “what you know” (password) or “what you have” (ID card) • Advantages: Eliminates fraud; enhances security; cannot be easily transferred, forgotten, lost or copied; eliminates repudiation claims; user convenience • Applications: Cybersecurity, border control, driver license, cellular phones, ATM Computer Science and Engineering, July 21, 2004

  18. Developmental Learning • Autonomous Mental development;NSF/DARPA Workshop on Development and Learning, MSU 2000 (Science, Jan. 2001) • Designed and constructed Dav: the onlymobile and untethered humanoid robot in US • Press reports by UPI, BBC, KRN, 30 US newspapers, Technology Review. • Created ICDL conference series: 2nd ICDL (MIT’02), 3rd ICDL (San Diego’04), 4th ICDL (Japan’05) • Created a new journal:Int’l J. of Humanoid Robotics • Created IEEE NNS AMD Technical Committee Computer Science and Engineering, July 21, 2004

  19. Face Capture HMD* HMD wearer will see faces of others on the glass OR projected on the wall, etc. Small mirrors and cameras allow user’s facial expressions to be communicated to remote colleagues. * designed by Biocca (MSU) and Rolland (UCF) Computer Science and Engineering, July 21, 2004

  20. Emerging Interdisciplinary Research Bioinformatics (Pramanik and Torng, in conjunction with Chemistry, Biochemistry, and Microbial Ecology) Computational Linguistics (Chai, Jin, and Hale, in conjunction with Linguistics and Psychology) Cyber-Security (Dyksen, Enbody, Tan, and Wojcik, in conjunction with Criminal Justice, Telecommunications, Business, the Law School, and the Medical School) Digital Evolution (Ofria, Punch, and Torng, in conjunction with Biochemistry, Electrical and Computer Engineering, Fisheries and Wildlife, Microbiology and Molecular Genetics, Microbial Ecology, Zoology, Plant Biology, Philosophy) And others: Network Economics (Shapiro), Augmented Reality (Owen), Human-Computer Interaction (Chai) Computer Science and Engineering, July 21, 2004

  21. Emerging Cyberinfrastructure Secure Information Systems Ecosystem Monitoring Digital Supply Chain Network- Centric Battlefield Homeland Security Disaster Relief • Remote • Safety-critical • Real-time • All the above • Privacy • Adaptable Computer Science and Engineering, July 21, 2004

  22. Cyberinfrastructure Research • First Generation (proof-of-concept) • Driven by applications in science and engineering • Advanced sensor hardware • Efficient systems software, network protocols • Understanding issues, brittle prototypes • Second Generation (sustainable infrastructure) • Driven by applications in science and engineering • Advanced sensor hardware • Efficient systems software, network protocols • High-assurance (generated) adaptable software and protocols • Intelligent systems that can learnhow to respond and adapt • Designing and building robust, self-healing (autonomic) systems for deployment Computer Science and Engineering, July 21, 2004

  23. CHAMPS • Constructing High-Assurance Mobile and Pervasive Systems • Research to enable a sustainable, pervasive cyberinfrastructure • Key ingredients: robust, self-managing and self-healing software • Research theme that draws upon combination of CSE strengths • Adaptive networking, augmented reality, secure mobile computing, sensor networks • Rigorous software engineering, autonomic systems, fault tolerance • Biometrics, embodied intelligence, autonomous robots, data mining • Bioinformatics, human computer interaction, computational linguistics • Wide range of applications and collaborations • Agriculture and ecosystem monitoring, remote scientific experimentation • Tele-medicine, digital supply chain, secure/robust information systems • Battlefield and surveillance, infrastructure protection, homeland security • An area where CSE (and via interdisciplinary collaborations, MSU) is poised for national leadership. Computer Science and Engineering, July 21, 2004

More Related