Presentation on theme: "Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008."— Presentation transcript:
Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008
Pervasive computing Source: Mobile Computing “Introduction to Pervasive Computing” lectureExcerpted and modified from ‘Ubiquitous City Plan’, NCA, Korea, Pervasive Computing Applications Users Computers
House of Horror: Corridor of Doom Shard resources No reliable monitoring and arbitration Services unaware of others’ operations on share resources Proper coordination needed Energy Saving Svc Lighting Service
House of Horror: Steak Incinerator Predefined range and conditions of operations for each device The cues, hints and visual feedbacks fall to deaf ears when operated by systems Invalid operations need to be monitored and prevented 3500°F !!
House of Horror: Duel of Stove and Fridge Side effects exist Impossible to account for all possible interferences from environmental effects Non-determinant behaviors Hey, Who Turns Off The Light?
Goals Total safety guarantee is impossible ◦ Accidents happen ◦ People make mistakes ◦ Murphy’s Law Attainable goals: Do no harm Handle safety risks Proactively detect, prevent and manage the inherent safety risks
Challenge and Impact Pervasive computing is still in its infancy ◦ Enhancement and assurance of safety a major block in real- world adoption and deployment Safety practice for existing software system does not work ◦ General purpose versus specialized system ◦ Financial feasibility ◦ Explore viable safety practice for low-cost general-purpose mission-critical systems Current (limited) safety research on pervasive computing only address very specific issues ◦ Generic software practice and architecture required ◦ Results can be extend to improve the reliability and security of other dynamic and distributed systems such as web services
Pervasive Computing Research Other Research Aspects System Support Research Agenda Safety Security Privacy Software Engineering Practice Authorship Support Evaluation Framework Reliability/ Availability
Safety Analysis, Protection and Evaluation To enhance safety: Reduce probability of bad things happening ◦ System Modeling and Analysis ◦ Safety Protection ◦ Risk Avoidance Reduce damage caused by potential failure ◦ Risk detection and recognition ◦ Emergency termination and handling ◦ Emergency Recovery
Risk Reduction Ambient calculus based modeling ◦ Function, Interaction and Mobility Description logic based modeling ◦ Context, Interpretation and Decisioning Component-based parameter analysis ◦ Operation and Invocation Protection of single component ◦ Casting, validation and event-driven programming paradigm Protection of component Interaction ◦ Choreography verification, concurrency System-wise Protection ◦ Ontology and active context reasoning Risk warning system ◦ Context-driven preventive behavior specification Service recomposition ◦ FPQSPN based service monitoring and composition Data compensation ◦ Virtual sensor technique, in-network data aggregation Risk Avoidance System Modeling Safety Protection
Damage Containment and Reduction Risk detection and recognition Optimized context definition and reasoning Behavioral pattern recognition Emergency termination and handling Middleware support for emergency stop (preemption, prioritization and garbage collection) Emergency handler vector and mandatory emergency shutdown routine Exception propagation mechanism Emergency Recovery Highest priority emergency recovery services Idempotent service implementation
Sustainable Research Program Resources FundingFacilityTalent InnovationLeadership Research Outcome Publication Implementation Theory Software Practice Software Practice Real-world Applications Real-world Applications Organization Support Collaboration Service
Sustainable Research Program: Funding National Science Foundation (NSF) grants ◦ Networking Technology and Systems (NeTS), ◦ Cyber-Enabled Discovery and Innovation (CDI) programs, ◦ Information Technology Research for National Priorities (ITR) grants, ◦ CAREER award Administration on Aging (AoA) grants, National Institute on Disability and Rehabilitation Research (NIDRR) grants National Institute of Health (NIH) grants Industry sponsorship with matching state funds. ◦ Microsoft Research, Ubiquitous Computing Group ◦ IBM Research, Emerging Software Standards ◦ GE Global Research, Computing and Decisioning System ◦ Intel Research, Sensor Network Technologies and Applications
Sustainable Research Program Facilities ◦ Lab space for intelligent environment ◦ 3 Servers and 6 workstations ◦ 3 Pocket PCs ◦ A couple Dozens of sensor platforms ◦ Various sensors and actuators ◦ RFID tags and readers Student Recruitment ◦ Intra-departmental recruiting through undergraduate network/HCI classes and senior projects ◦ Inter-departmental recruiting through interdisciplinary projects and collaboration ◦ External recruiting through Network of collaborators from other universities and Publications in conferences Well-designed web presence Publicity of research outcome ◦ Initial funding from starting package Collaboration ◦ Interdisciplinary Nature of PerCom UF William Mann (Gator tech smart house) Benjamin Lok (HCI) Prabhat Mishra (embedded system) Michael Fang (sensor network) ◦ Academic Carl Chang (software engineering, Iowa State) Srini Seshan (network, CMU) Dave O’Hallaron (performance evaluation, CMU) ◦ International Bessam Abdulrazak (HCI and robotics, Canada) Hani Hagras (intelligent agents, UK) Hyun Kim (robotics, Korea) ◦ Industry Randy Carroll (emerging software standards, IBM) Ming Lu (information systems and service computing, IBM) Services
Vision 2013 Establish the position as the leading institute in research on safe pervasive computing systems Design and implement the cutting-edge software engineering practice and platform viable for safe mass real-world deployments Create a mid-size sustainable research program (8- 10 scholars) supported by a mix of funding from both the government and industry Collaborate with a network of renowned scholars in the U.S. and international on an open platform Lead in inter-departmental and inter-collegian joint exploration of safe pervasive computing deployment in various domains
Teaching Experience Instructor, Spring 2006 CGS 3460: Computer Programming Using C, Guest Lecturer, Fall 2006 CEN 5531 Mobile Computing, specialized in Sensor Network, Guest Lecturer and Mentor, Spring 2007 CIS 6930 Special Topics on Sensor Networks, Teaching Assistant, Spring 2007, 2008 CEN 4500 Computer Network Fundamentals.
Mentoring Experience Graduate Research ◦ “Performance Evaluation of Pervasive Computing Systems”, Chao Chen, PhD student (Jan. '07 - present) ◦ “Universal Remote Control for Smart Houses”, Rohin Sethi, Masters student (Apr. '07 - present) Term Project ◦ “Remote GUI Client for Atlas”, Sushant Gupta, Ankit Hirdesh, Masters students (Jan - July ‘07) Short Term Elective Program (STEP) Program ◦ “Social Navigator for the Visually Impaired”, Chris Toth, Visually-impaired high school student (Summer 07’)
Teaching Philosophy Deliver the fundamentals, but leaves room to grow Teaching is an interactive process and a two-way street Push available resource forward (80-20 rule) Teaching and research are synergetic, not competitive Learning is all that matters
Courses of Interest Undergraduate courses ◦ CGS 2414 Computer Programming Using Java ◦ CGS 3460 Computer Programming Using C ◦ COP 4600 Operating Systems ◦ CEN 4500 Computer Network Fundamentals Graduate courses ◦ CEN 5531 Mobile Computing ◦ COP 5615 Operating System Principle (Distributed systems) ◦ CEN 6505 Advance Computer Networks ◦ CIS 6930 Sensor Networks
Sample Undergraduate Course CGS 3460 Computer Programming Using C Course Activities – 6 Individual Projects, 6 Quizzes, Midterm and Final Teaching ◦ 3 Hours of lectures, 10 Hours of computing lab, and another 3 office hours per week ◦ Interleaved use of slides, board and demo code Online forum and designated rotating response TA Projects with stories Mid-term evaluation
Sample Graduate Course CEN 5531 Mobile Computing Course Activities – 1 Group Term Project, 1 Individual Survey Paper, short paper summaries, 2 Paper Presentations and Discussions, Midterm and Final Teaching ◦ 3 Hours of lectures, including opening introductions, student presentations, and concluding discussion ◦ Meetings with each group at checkpoints throughout the semester Student-designed and managed projects Town hall meetings Interdisciplinary Guest panelists and judges Offer existing research outputs from the lab to students, and draw inspiration from discussions and projects of students
Course Development 2-Course set for Pervasive Computing Upper-level undergraduate course “Introduction to Pervasive Computing” ◦ Introductory lectures on context-awareness, ad-hoc protocols and self-organization, service-oriented architecture, reliability and availability, etc ◦ Panel/brainstorming session with domain experts from occupational therapy, civil engineering, agriculture, and education, etc Graduate course “Advance Pervasive Computing System Design, Implementation and Analysis” ◦ Collaborative offering with other department/college ◦ Targeted for students with specialties in systems, networks, and HCI, as well as other colleges with domain expertise ◦ Create interdisciplinary teams to create interoperable projects ◦ Experts give guest lectures on visions, requirements and limitations on applying these new technologies in their respective domains
Questions? Thank you for your attention. Further information on is Or contact