Presentation is loading. Please wait.

Presentation is loading. Please wait.

Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008.

Similar presentations


Presentation on theme: "Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008."— Presentation transcript:

1 Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008

2 Pervasive computing Source: Mobile Computing “Introduction to Pervasive Computing” lectureExcerpted and modified from ‘Ubiquitous City Plan’, NCA, Korea, Pervasive Computing Applications Users Computers Research Teaching

3 House of Horror: Corridor of Doom Shard resources No reliable monitoring and arbitration Services unaware of others’ operations on share resources Proper coordination needed Energy Saving Svc Lighting Service Research Teaching

4 House of Horror: Steak Incinerator Predefined range and conditions of operations for each device The cues, hints and visual feedbacks fall to deaf ears when operated by systems Invalid operations need to be monitored and prevented 3500°F !! Research Teaching

5 House of Horror: Duel of Stove and Fridge  Side effects exist  Impossible to account for all possible interferences from environmental effects  Non-determinant behaviors Hey, Who Turns Off The Light? Research Teaching

6 Goals Total safety guarantee is impossible ◦ Accidents happen ◦ People make mistakes ◦ Murphy’s Law Attainable goals: Do no harm Handle safety risks Proactively detect, prevent and manage the inherent safety risks Research Teaching

7 Challenge and Impact Pervasive computing is still in its infancy ◦ Enhancement and assurance of safety a major block in real- world adoption and deployment Safety practice for existing software system does not work ◦ General purpose versus specialized system ◦ Financial feasibility ◦ Explore viable safety practice for low-cost general-purpose mission-critical systems Current (limited) safety research on pervasive computing only address very specific issues ◦ Generic software practice and architecture required ◦ Results can be extend to improve the reliability and security of other dynamic and distributed systems such as web services Research Teaching

8 Pervasive Computing Research Other Research Aspects System Support Research Agenda Safety Security Privacy Software Engineering Practice Authorship Support Evaluation Framework Reliability/ Availability Research Teaching

9 Safety Analysis, Protection and Evaluation To enhance safety: Reduce probability of bad things happening ◦ System Modeling and Analysis ◦ Safety Protection ◦ Risk Avoidance Reduce damage caused by potential failure ◦ Risk detection and recognition ◦ Emergency termination and handling ◦ Emergency Recovery Research Teaching

10 Risk Reduction Ambient calculus based modeling ◦ Function, Interaction and Mobility Description logic based modeling ◦ Context, Interpretation and Decisioning Component-based parameter analysis ◦ Operation and Invocation Protection of single component ◦ Casting, validation and event-driven programming paradigm Protection of component Interaction ◦ Choreography verification, concurrency System-wise Protection ◦ Ontology and active context reasoning Risk warning system ◦ Context-driven preventive behavior specification Service recomposition ◦ FPQSPN based service monitoring and composition Data compensation ◦ Virtual sensor technique, in-network data aggregation Risk Avoidance System Modeling Safety Protection Research Teaching

11 Damage Containment and Reduction  Risk detection and recognition  Optimized context definition and reasoning  Behavioral pattern recognition  Emergency termination and handling  Middleware support for emergency stop (preemption, prioritization and garbage collection)  Emergency handler vector and mandatory emergency shutdown routine  Exception propagation mechanism  Emergency Recovery  Highest priority emergency recovery services  Idempotent service implementation Research Teaching

12 Sustainable Research Program Resources FundingFacilityTalent InnovationLeadership Research Outcome Publication Implementation Theory Software Practice Software Practice Real-world Applications Real-world Applications Organization Support Collaboration Service Research Teaching

13 Sustainable Research Program: Funding National Science Foundation (NSF) grants ◦ Networking Technology and Systems (NeTS), ◦ Cyber-Enabled Discovery and Innovation (CDI) programs, ◦ Information Technology Research for National Priorities (ITR) grants, ◦ CAREER award Administration on Aging (AoA) grants, National Institute on Disability and Rehabilitation Research (NIDRR) grants National Institute of Health (NIH) grants Industry sponsorship with matching state funds. ◦ Microsoft Research, Ubiquitous Computing Group ◦ IBM Research, Emerging Software Standards ◦ GE Global Research, Computing and Decisioning System ◦ Intel Research, Sensor Network Technologies and Applications Research Teaching

14 Sustainable Research Program Facilities ◦ Lab space for intelligent environment ◦ 3 Servers and 6 workstations ◦ 3 Pocket PCs ◦ A couple Dozens of sensor platforms ◦ Various sensors and actuators ◦ RFID tags and readers Student Recruitment ◦ Intra-departmental recruiting through undergraduate network/HCI classes and senior projects ◦ Inter-departmental recruiting through interdisciplinary projects and collaboration ◦ External recruiting through  Network of collaborators from other universities and  Publications in conferences  Well-designed web presence  Publicity of research outcome ◦ Initial funding from starting package Collaboration ◦ Interdisciplinary Nature of PerCom UF  William Mann (Gator tech smart house)  Benjamin Lok (HCI)  Prabhat Mishra (embedded system)  Michael Fang (sensor network) ◦ Academic  Carl Chang (software engineering, Iowa State)  Srini Seshan (network, CMU)  Dave O’Hallaron (performance evaluation, CMU) ◦ International  Bessam Abdulrazak (HCI and robotics, Canada)  Hani Hagras (intelligent agents, UK)  Hyun Kim (robotics, Korea) ◦ Industry  Randy Carroll (emerging software standards, IBM)  Ming Lu (information systems and service computing, IBM) Services Research Teaching

15 Vision 2013 Establish the position as the leading institute in research on safe pervasive computing systems Design and implement the cutting-edge software engineering practice and platform viable for safe mass real-world deployments Create a mid-size sustainable research program (8-10 scholars) supported by a mix of funding from both the government and industry Collaborate with a network of renowned scholars in the U.S. and international on an open platform Lead in inter-departmental and inter-collegian joint exploration of safe pervasive computing deployment in various application domains Research Teaching

16 Teaching Experience CEN 4500C Computer Network Fundamentals Teaching Assistant Spring 2007 Spring 2008 CEN 4500C Computer Network Fundamentals Teaching Assistant Spring 2007 Spring 2008 CIS 6930 Special Topics on Sensor Networks Guest Lecturer & Mentor Spring 2007 CIS 6930 Special Topics on Sensor Networks Guest Lecturer & Mentor Spring 2007 CEN 5531 Mobile Computing Guest Lecturer Fall 2006 CEN 5531 Mobile Computing Guest Lecturer Fall 2006 CGS 3460 Computer Programming Using C Instructor Spring 2006 CGS 3460 Computer Programming Using C Instructor Spring 2006 Research Teaching

17 STEP Program Chris Toth, HS junior (summer ‘07) “Social Navigator for the Visually Impaired” STEP Program Chris Toth, HS junior (summer ‘07) “Social Navigator for the Visually Impaired” Graduate Research Chao Chen, PhD student (Jan. ‘07 – present) “Performance Evaluation of Pervasive Computing Systems” Rohin Sethi, Masters student (Apr. ‘07 – present) “Universal Remote Control for Smart Houses” Graduate Research Chao Chen, PhD student (Jan. ‘07 – present) “Performance Evaluation of Pervasive Computing Systems” Rohin Sethi, Masters student (Apr. ‘07 – present) “Universal Remote Control for Smart Houses” Mentoring Experience Term Project Sushant Gupta, Ankit Hirdesh, Masters student (Jan. - July ‘07) “Remote GUI Client for Atlas” Term Project Sushant Gupta, Ankit Hirdesh, Masters student (Jan. - July ‘07) “Remote GUI Client for Atlas” Research Teaching

18 Teaching Philosophy Deliver the fundamentals, but encourage students to explore Teaching is an interactive process and a two-way street Push available resources forward (80-20 rule) Teaching and research are synergetic, not competing activities Learning is all that matters Research Teaching

19 Courses of Interest Undergraduate courses ◦ CGS 2414 Computer Programming Using Java ◦ CGS 3460 Computer Programming Using C ◦ COP 4600 Operating Systems ◦ CEN 4500 Computer Network Fundamentals Graduate courses ◦ CEN 5531 Mobile Computing ◦ COP 5615 Operating System Principle (Distributed systems) ◦ CEN 6505 Advance Computer Networks ◦ CIS 6930 Sensor Networks Research Teaching

20 Sample Undergraduate Course CGS 3460 Computer Programming Using C Course Activities – 6 Individual Projects, 6 Quizzes, Midterm and Final Teaching ◦ 3 Hours of lectures, 10 Hours of computing lab, and another 3 office hours per week ◦ Interleaved use of slides, board and demo code Online forum and designated rotating response TA Fun projects with backstory Mid-term evaluation Research Teaching

21 Sample Graduate Course CEN 5531 Mobile Computing Course Activities – 1 Group Term Project, 1 Individual Survey Paper, short paper summaries, 2 Paper Presentations and Discussions, Midterm and Final Teaching ◦ 3 Hours of lectures, including opening introductions, student presentations, and concluding discussion ◦ Meetings with each group at checkpoints throughout the semester Student-designed and managed projects Town hall meetings Interdisciplinary Guest panelists and judges Offer existing research outputs from the lab to students, and draw inspiration from discussions and projects of students Research Teaching

22 Course Development 2-Course set for Pervasive Computing Upper-level undergraduate course “Introduction to Pervasive Computing” ◦ Introductory lectures on context-awareness, ad-hoc protocols and self-organization, service-oriented architecture, reliability and availability, etc ◦ Panel/brainstorming session with domain experts from occupational therapy, civil engineering, agriculture, and education, etc Graduate course “Advance Pervasive Computing System Design, Implementation and Analysis” ◦ Collaborative offering with other department/college ◦ Targeted for students with specialties in systems, networks, and HCI, as well as other colleges with domain expertise ◦ Create interdisciplinary teams to create interoperable projects ◦ Experts give guest lectures on visions, requirements and limitations on applying these new technologies in their respective domains ◦ Employ lab research output as the backbone of course offering Research Teaching

23 Questions? Thank you for your attention. Further information on is Or contact


Download ppt "Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008."

Similar presentations


Ads by Google