1 / 23

Research and Teaching Plans

Research and Teaching Plans. Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008. Pervasive computing. Pervasive Computing Applications. Users. Source: Mobile Computing “Introduction to Pervasive Computing” lecture

mikaia
Download Presentation

Research and Teaching Plans

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008

  2. Pervasive computing Pervasive Computing Applications Users Source: Mobile Computing “Introduction to Pervasive Computing” lecture Excerpted and modified from ‘Ubiquitous City Plan’, NCA, Korea, 2005. Computers

  3. House of Horror:Corridor of Doom • Shard resources • No reliable monitoring and arbitration • Services unaware of others’ operations on share resources • Proper coordination needed Energy Saving Svc Lighting Service

  4. House of Horror:Steak Incinerator • Predefined range and conditions of operations for each device • The cues, hints and visual feedbacks fall to deaf ears when operated by systems • Invalid operations need to be monitored and prevented 3500°F !!

  5. House of Horror:Duel of Stove and Fridge • Side effects exist • Impossible to account for all possible interferences from environmental effects • Non-determinant behaviors Hey, Who Turns Off The Light?

  6. Goals Total safety guarantee is impossible • Accidents happen • People make mistakes • Murphy’s Law Attainable goals: • Do no harm • Handle safety risks • Proactively detect, prevent and manage the inherent safety risks

  7. Challenge and Impact • Pervasive computing is still in its infancy • Enhancement and assurance of safety a major block in real-world adoption and deployment • Safety practice for existing software system does not work • General purpose versus specialized system • Financial feasibility • Explore viable safety practice for low-cost general-purpose mission-critical systems • Current (limited) safety research on pervasive computing only address very specific issues • Generic software practice and architecture required • Results can be extend to improve the reliability and security of other dynamic and distributed systems such as web services

  8. Research Agenda Pervasive Computing Research Other Research Aspects System Support Security Privacy Reliability/ Availability Safety Evaluation Framework Authorship Support Software Engineering Practice

  9. Safety Analysis, Protection and Evaluation To enhance safety: • Reduce probability of bad things happening • System Modeling and Analysis • Safety Protection • Risk Avoidance • Reduce damage caused by potential failure • Risk detection and recognition • Emergency termination and handling • Emergency Recovery

  10. Risk Reduction • Ambient calculus based modeling • Function, Interaction and Mobility • Description logic based modeling • Context, Interpretation and Decisioning • Component-based parameter analysis • Operation and Invocation • Protection of single component • Casting, validation and event-driven programming paradigm • Protection of component Interaction • Choreography verification, concurrency • System-wise Protection • Ontology and active context reasoning • Risk warning system • Context-driven preventive behavior specification • Service recomposition • FPQSPN based service monitoring and composition • Data compensation • Virtual sensor technique, in-network data aggregation System Modeling Safety Protection Risk Avoidance

  11. Damage Containment and Reduction • Risk detection and recognition • Optimized context definition and reasoning • Behavioral pattern recognition • Emergency termination and handling • Middleware support for emergency stop (preemption, prioritization and garbage collection) • Emergency handler vector and mandatory emergency shutdown routine • Exception propagation mechanism • Emergency Recovery • Highest priority emergency recovery services • Idempotent service implementation

  12. Sustainable Research Program Research Outcome Publication Implementation Theory Software Practice Real-world Applications Collaboration Organization Support Service Innovation Leadership Resources Funding Facility Talent

  13. Sustainable Research Program: Funding • National Science Foundation (NSF) grants • Networking Technology and Systems (NeTS), • Cyber-Enabled Discovery and Innovation (CDI) programs, • Information Technology Research for National Priorities (ITR) grants, • CAREER award • Administration on Aging (AoA) grants, • National Institute on Disability and Rehabilitation Research (NIDRR) grants • National Institute of Health (NIH) grants • Industry sponsorship with matching state funds. • Microsoft Research, Ubiquitous Computing Group • IBM Research, Emerging Software Standards • GE Global Research, Computing and Decisioning System • Intel Research, Sensor Network Technologies and Applications

  14. Sustainable Research Program • Facilities • Lab space for intelligent environment • 3 Servers and 6 workstations • 3 Pocket PCs • A couple Dozens of sensor platforms • Various sensors and actuators • RFID tags and readers • Student Recruitment • Intra-departmental recruiting through undergraduate network/HCI classes and senior projects • Inter-departmental recruiting through interdisciplinary projects and collaboration • External recruiting through • Network of collaborators from other universities and • Publications in conferences • Well-designed web presence • Publicity of research outcome • Initial funding from starting package • Collaboration • Interdisciplinary Nature of PerCom • @ UF • William Mann (Gator tech smart house) • Benjamin Lok (HCI) • Prabhat Mishra (embedded system) • Michael Fang (sensor network) • Academic • Carl Chang (software engineering, Iowa State) • SriniSeshan (network, CMU) • Dave O’Hallaron (performance evaluation, CMU) • International • Bessam Abdulrazak (HCI and robotics, Canada) • Hani Hagras (intelligent agents, UK) • Hyun Kim (robotics, Korea) • Industry • Randy Carroll (emerging software standards, IBM) • Ming Lu (information systems and service computing, IBM) • Services

  15. Vision 2013 • Establish the position as the leading institute in research on safe pervasive computing systems • Design and implement the cutting-edge software engineering practice and platform viable for safe mass real-world deployments • Create a mid-size sustainable research program (8-10 scholars) supported by a mix of funding from both the government and industry • Collaborate with a network of renowned scholars in the U.S. and international on an open platform • Lead in inter-departmental and inter-collegian joint exploration of safe pervasive computing deployment in various domains

  16. Teaching Experience • Instructor, Spring 2006 CGS 3460: Computer Programming Using C, • Guest Lecturer, Fall 2006 CEN 5531 Mobile Computing, specialized in Sensor Network, • Guest Lecturer and Mentor, Spring 2007 CIS 6930 Special Topics on Sensor Networks, • Teaching Assistant, Spring 2007, 2008 CEN 4500 Computer Network Fundamentals.

  17. Mentoring Experience • Graduate Research • “Performance Evaluation of Pervasive Computing Systems”, Chao Chen, PhD student (Jan. '07 - present) • “Universal Remote Control for Smart Houses”, RohinSethi, Masters student (Apr. '07 - present) • Term Project • “Remote GUI Client for Atlas”, Sushant Gupta, AnkitHirdesh, Masters students (Jan - July ‘07) • Short Term Elective Program (STEP) Program • “Social Navigator for the Visually Impaired”, Chris Toth, Visually-impaired high school student (Summer 07’)

  18. Teaching Philosophy • Deliver the fundamentals, but leaves room to grow • Teaching is an interactive process and a two-way street • Push available resource forward (80-20 rule) • Teaching and research are synergetic, not competitive • Learning is all that matters

  19. Courses of Interest • Undergraduate courses • CGS 2414 Computer Programming Using Java • CGS 3460 Computer Programming Using C • COP 4600 Operating Systems • CEN 4500 Computer Network Fundamentals • Graduate courses • CEN 5531 Mobile Computing • COP 5615 Operating System Principle (Distributed systems) • CEN 6505 Advance Computer Networks • CIS 6930 Sensor Networks

  20. Sample Undergraduate CourseCGS 3460 Computer Programming Using C • Course Activities – 6 Individual Projects, 6 Quizzes, Midterm and Final • Teaching • 3 Hours of lectures, 10 Hours of computing lab, and another 3 office hours per week • Interleaved use of slides, board and demo code • Online forum and designated rotating email response TA • Projects with stories • Mid-term evaluation

  21. Sample Graduate CourseCEN 5531 Mobile Computing • Course Activities – 1 Group Term Project, 1 Individual Survey Paper, short paper summaries, 2 Paper Presentations and Discussions, Midterm and Final • Teaching • 3 Hours of lectures, including opening introductions, student presentations, and concluding discussion • Meetings with each group at checkpoints throughout the semester • Student-designed and managed projects • Town hall meetings • Interdisciplinary Guest panelists and judges • Offer existing research outputs from the lab to students, and draw inspiration from discussions and projects of students

  22. Course Development • 2-Course set for Pervasive Computing • Upper-level undergraduate course “Introduction to Pervasive Computing” • Introductory lectures on context-awareness, ad-hoc protocols and self-organization, service-oriented architecture, reliability and availability, etc • Panel/brainstorming session with domain experts from occupational therapy, civil engineering, agriculture, and education, etc • Graduate course “Advance Pervasive Computing System Design, Implementation and Analysis” • Collaborative offering with other department/college • Targeted for students with specialties in systems, networks, and HCI, as well as other colleges with domain expertise • Create interdisciplinary teams to create interoperable projects • Experts give guest lectures on visions, requirements and limitations on applying these new technologies in their respective domains

  23. Questions? • Thank you for your attention. • Further information on is available @ http://www.cise.ufl.edu/~hyang Or contact me @ hyang@cise.ufl.edu

More Related