HomeProgramSponsorsOrganizersParticipant ListLocation & Hotel

 

  Talk Abstracts

   (Alphabetical order of the last names)

 

  Symposium Program  |  Poster Abstracts  |  Full Program (.pdf)   |  Short Program (.pdf)

 

  

  October 25, 2008 (Saturday) - October 26, 2008 (Sunday)

 

 

1. Speaker: Prof. Ashok K. Agrawala (Univ. of Maryland)

 

The future of information and it's changing role in society

 

Abstract

 

One of the major advances in the last couple of decades has been the ready availability of vast amounts of information to the citizens of the world for the asking. I believe that information is a key element for every aspect of our lives. However, we have a limited view of what information is and what its role is. In this talk we present some thoughts about the fundamental nature of information and its role to day and in the future in impacting the quality of life.

 


 

2. Speaker: Prof. Yoonsuck Choe (Texas A&M)

 

Dynamic Membership Protocol for Epidemic Protocols Dissecting, Imaging, and Modeling of the Mouse Brain Network

 

Abstract

 

Recent advances in serial-sectioning microscopy have enabled high-throughput imaging of massive volumes of biological microstructure at a very high resolution. One example is the Knife-Edge Scanning Microscope (KESM) we developed at Texas A&M, which is one of the few that combines serial sectioning and imaging in an integrated process. The KESM is capable of imaging biological tissue (about 1 cm^3) at 300 nm x 300 nm x 500 nm resolution within 100 hours, generating data at a rate of 180 MB/s. The resulting data per organ (e.g., a mouse brain) can easily exceed tens of terabytes. Due to the massive amounts of data at multiple scales, morphological reconstruction algorithms that are fast, resource efficient, and accurate become necessary. We will present our latest results in large-scale microscopic neuronal circuit data acquisition in the mouse brain using KESM, and discuss the fast algorithms we developed for tracing and analyzing neuronal morphology. Finally, we will discuss computational and thoretical modeling of brain function in the context of the newly available brain network data.  

 


 

3. Speaker: Prof. Hyeong-Ah Choi (George Washington Univ.)

 

Resource Management in Next Generation Wireless and Mobile Networks

 

Abstract

 

Next generation wireless and mobile networks will focus on the open wireless architecture platform. In such a network,
heterogeneous wireless systems will be integrated to provide reliable, high-bandwidth, on-demand services with performance guarantees to a variety of users with diverse traffic characteristics, security requirement, and hardware
capabilities. In this presentation, we will give an outlook over some of the key problems in resource management and
sketch some potential solutions.

 


 

4. Speaker: Prof. Young Bae Choi (James Madison Univ.)

 

Homeland Security: The Past, Present, and Future Trends

 

Abstract

 

This presentation reviews the past, present, and future trends of Homeland Security. The research activities of relevant research organizations including the IIIA (Institute for Infrastructure and Information Assurance) of James Madison
University and the Critical Infrastructure Protection Program of George Mason University are introduced. The annual
Homeland Security Symposium and current technical trends based on the analysis of presented research papers will be
identified. Outstanding and emerging research issues of Homeland Security will be proposed and discussed.

 


 

5. Speaker: Prof. Soon Chung (Write State Univ.)

 

Role-Based Access Control for Grid Database Services Using the Community Authorization Service

 

Abstract

 

In this presentation, we propose a role-based access control (RBAC) method for Grid database services in the Open Grid
Services Architecture - Data Access and Integration (OGSA-DAI). OGSA-DAI is an efficient Grid-enabled middleware
implementation of interfaces and services to access and control data sources and sinks. However, in OGSA-DAI, access
control causes substantial administration overhead for resource providers in virtual organizations (VOs) because each of them has to manage a role-map file containing authorization information for individual Grid users. To solve this problem, we used the Community Authorization Service (CAS) provided by the Globus Toolkit to support the RBAC within the OGSA-DAI framework. The CAS grants the membership on VO roles to users. The resource providers then need to
maintain only the mapping information from VO roles to local database roles in the role-map files, so that the number of
entries in the role-map file is reduced dramatically. Furthermore, the resource providers control the granting of access
privileges to the local roles. Thus, our access control method provides increased manageability for a large number of users and reduces day-to-day administration tasks of the resource providers, while they maintain the ultimate authority over their resources. Performance analysis shows that our method adds very little overhead to the existing security infrastructure of OGSA-DAI.

 


 

6. Speaker: Dr. Zohara Cohen (National Institutes of Health)

 

Opportunities for Biomedical Computing and Informatics Research Funding at NIH

 

Abstract

 

This talk will provide an overview of the opportunities for research funding in biomedical computing and informatics at NIH. The talk will begin with a broad introduction to the structure of the NIH structure and how it administers research grants. Information will be provided as to which Institutes and Centers of the NIH support biomedical computing and informatics. A major focus of the presentation will be the activities of several trans-NIH programs dedicated to supporting biomedical computing and informatics. These include the Biomedical Information Science and Technology Initiative (BISTI), the Inter-agency Modeling and Analysis Group (IMAG), the National Centers for Biomedical Computing (NCBC's), the Biotechnology Resource Centers program, and the Neuroimaging Informatics Tools and Resources Clearinghouse (NITRC). Particular attention will be paid to IMAG, including the relationship that has been forged between IMAG and the Korean modeling research community. Finally, some details will be provided on particular funding opportunity announcements for biomedical computing and informatics at the NIH.

 


 

7. Speaker: Dr. Marie desJardins  (University of Maryland)

 

Networks Presenting Your Research: Papers, Presentations, and People

 

Abstract

 

In order to be a successful computer science researcher, having good ideas isn't enough. You also need to be able to present those ideas effectively through scientific publications, public presentations, and interactions with individual colleagues. In this talk, I will give some advice for young researchers on how to present your research effectively, and what skills you need to develop in order to be successful at this aspect of doing research. In the spirit of presenting my own research, I will also briefly describe some of the research efforts I am leading in the MAPLE Laboratory at UMBC, in the areas of machine learning, AI planning, and multi-agent systems.
 


 

8. Speaker: Dr. Douglas H. Fisher (Program Director, National Science Foundation)

 

An Overview of Selected Programs at the National Science Foundation

 

Abstract

 

I will present an overview of selected programs, initiatives, and opportunities from CISE, the NSF Office of International Science and Engineering (OISE), and cross-cutting programs at NSF.
 


 

9. Speaker: Dr. In Tark Han (ETRI, Korea)

 

A proposal for R&D cooperation between KOCSEA and ETRI - a process for collaborative project

 

Abstract

 

(1) the process to generate a R&D project - governmental viewpoint,
(2) the process for internation collaborative project in ETRI,
(3) the representative R&D projects in the IT Convergence Research Laboratory, one of four laboratories of ETRI.

 


 

10. Speaker: Prof. Taisook Han (KAIST, Korea)

 

Detecting Theft of Java Applications via Static Birthmarks

 

Abstract

 

A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this presentation, we examine a static
Java birthmark based on weighted stack patterns, a static API trace birthmark, a static instruction trace birthmark, and a static birthmark based on control flow edges, which reflect the characteristic of Java applications. We evaluate the proposed birthmarks with respect to two properties required for a birthmark: credibility and resilience. We will show the empirical results and compare the proposed birthmarks with existing birthmarks, such as that of Tamada et al. and the k-gram birthmark. We will suggest “wishful” applications of birthmarks such as reliable evidence of software theft when the software is modified by someone other than author.

 


 

11. Speaker: Prof. Jeff Hollingsworth (Univ. of Maryland, College Park)

Towards Automated Tuning of Parallel Programs

 

Abstract

 

Getting parallel programs to run well is a difficult, tedious, and time consuming task. In this talk I will present a system called Active Harmony that supports automated tuning of parallel programs. I will explain how Active Harmony can be used to automatically tune runtime parameters, and how it can be used to drive compiler optimizations. I will also present some performance results that show Harmony's auto tuning providing better results that manual efforts, and similar performance to exhaustive search of the parameter space.
 


 

12. Speaker: Dr. Jaeyeon Jung (Intel)

 

Privacy Scope---Preventing Sensitive Information Leaks Using Application-level Taint tracking

 

Abstract

 

Users blindly trust commercial off-the-shelf (COTS) applications to act responsibly with respect to their private information. However, many incidents (e.g., Sony DRM players installing a rootkit) suggest that these COTS applications intentionally or inadvertently collect a user’s personal data and even share them with third parties. In this talk, I present a tool and techniques that track how sensitive data are accessed and processed by applications and detect their leaks to the network. Our tool, Privacy Scope, uses the Intel’s Pin binary rewriting tool to pinpoint leaking code and source agnostic to encryption and traffic randomization. I conclude the talk with technical challenges to reduce the performance overhead of taint-tracking, making Privacy Scope practical for everyday use.

 


 

13. Speaker: Dr. Dong-In Kang (USC, ISI)

 

Intelligent Run-time Resource Management Techniques for Large Multi-Core Architectures

 

Abstract

 

As multi-core architectures become prevalent, increasing numbers of on-chip processing resources are becoming available for use by applications. In order to obtain high efficiency, multiple applications will be mapped to these processors and will share their computational resources. Further, the resource requirements of future, dynamic applications may vary over time depending on the current characteristics of the environment. To obtain high performance of the applications and to support dynamic use of  the resources, efficient run-time resource management will be required. In this talk, we present an intelligent adaptive run-time application mapping technique on a multi-core architecture. Our approach uses run-time profiling techniques to extract knowledge of an application and to refine its mapping for higher performance at run-time. We focused on optimizing the end-to-end latency of an application. Two algorithms, a hot-spot remover algorithm and a genetic algorithm, are used to improve application mapping at run-time. Those algorithms are augmented with run-time knowledge to demonstrate the workings of our approach. The behavior and the performance improvement of those algorithms using run-time knowledge are presented.

 


 

14. Speaker: Dr. Anya Kim (Naval Research Lab)

 

The Comprehensive Maritime Awareness (CMA) system

 

Abstract

 

The Comprehensive Maritime Awareness (CMA) system tries to identify possible threats in the global maritime domain that can impact the safety, security, economy, or well-being of the United States. In this system, military, law enforcement, and allies need to work together and share necessary information. This information is gathered from multiple nations and agencies and may all require different security policies. Therefore, the data has to be well separated and access to it mediated. For this purpose, we developed a security architecture and mechanisms using Oracle label security, and web service security standards such as SAML, XACML. We present the architecture focusing on the federated identity management aspect and how it applies to situational maritime awareness.

 


 

15. Speaker: Dr. Bongjun Ko (IBM)

 

Blind Estimation of Transmit-Power in Wireless Networks

 

Abstract

 

We present recent results on blind estimation of transmission power of a wireless node based on received power measurements. Specifically, the setup consists of a set of monitors that measure the signal power received from the
transmitter, and the goal is to utilize these measurements to estimate the transmission power in the absence of any prior
knowledge of the transmitter's location or any statistical distribution of its power. Towards this end, we exploit spatial diversity in received-power measurements and cooperation among the multiple monitoring nodes; based on theoretical analysis we obtain the Maximum Likelihood (ML) estimate, derive fundamental geometrical insights and show that its asymptotic optimality.

 


 

16. Speaker: Dr. Taek Jin Kwon (Telcordia)

 

Data dissemination in vehicular communication networks (VANET)

 

Abstract

 

Vehicular communications have been considered to be an enabler for numerous vehicle safety and information applications. Many automobile manufacturers are in different stages of integrating communication devices in their vehicles for the purpose of safety, assisted driving, entertainment, and mobile commerce. As increasing number of vehicles start getting equipped with communication capability, large scale ad-hoc networks can be envisioned in the foreseeable future. In this talk, we will go over recent results in VANET data dissemination. This talk summarizes the data dissemination methods in three broad categories: geocast/broadcast, multicast, and unicast approaches; and describe key ideas of representative technologies in each category. In addition, we consider location service and security issues that are crucial for data dissemination in VANET. We conclude by sharing our thoughts on further challenges.

 


 

17. Speaker: Prof. Dongwon Lee (Penn State Univ.)

 

Novel Data Linkage Techniques

 

Abstract

 

Since modern data applications increasingly need to do deal with dirty data due to a variety of reasons (e.g., data entry errors, heterogeneous formats, or ambiguous terms), considerable recent efforts have focused on the Data Linkage problem to determine if two entities in a collection are approximately the same or not. Toward this problem, in this talk, I will describe a few novel solutions being developed at Penn State such as: (1) group-based data linkage, (2) Biology-based data linkage, and (3) Web-based data linkage techniques. The talk will be based on the materials from recent publications at ICDM 06, ICDE 07, CIKM 07, CIVR 08, and WebDB 08, etc.

 


 

18. Speaker: Prof. Insup Lee (Univ. of Pennsylvania)

 

Compositional Analysis Techniques and Cyber Physical Systems

 

Abstract

 

Real-Time Embedded Systems (RTES) consist of a collection of components that interact with each other and with their
environment through sensors and actuators. Embedded systems are built into physical computing systems such as aircraft, automobiles, medical devices, robots, and consumer electronics. As embedded systems become more complex, component-based technologies are becoming an essential alternative to traditional monolithic design approaches. The main advantage of a component-based technology is that complexity can be effectively managed by encapsulating large system modules within a component. Each component exposes an interface that abstracts and hides component details and complexities. Component interface allows a component to be composed with other components. While designing of individual components is well understood, the integration and interoperability of components present challenges in
adopting the framework. One essential challenge is to support compositionality, which means that the properties of a system can be determined from the properties of its components. We have been developing a hierarchical, resource-based framework for RTES using components. One salient aspect is compositional schedulability analysis techniques for RTES, based on the assume-guarantee reasoning of formal methods. I will describe various resource demand models, resource supply models, and compositional analysis methods, and applications.

In the second part, I will talk about Cyber Physical Systems (CPS). CPS are to meet the needs of the new generation of
engineered systems that are highly dependable, efficiently produced and certified, and capable of advanced performance in computation, communication, and control.  The Internet transformed how we interact and communicate with one another and also revolutionized how and where we access information. We believe that CPS will transform how we interact with and control the physical world around us. I will describe the opportunities and challenges of CPS.

 


 

19. Speaker: Dr. Kang-Won Lee  (IBM)

 

Networking Research in the International Technology Alliance: Enabling Accurate Node Control in Randomized Duty Cycling Networks

 

Abstract

 

In this presentation, I introduce the exciting new research program, called ITA (International Technology Alliance for Network and  Information Science) funded jointly by the U.S. and the U.K. government in the area of wireless network, security, and information science. I then present a research result from the program related to energy-aware sensor network management. In particular, we have proposed a duty-cycling algorithm for a large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the sense that individual node’s sleep/wakeup decision is influenced by the state of its neighbors. We analyze the behavior of the proposed algorithm using a stochastic spatial process. We then identify a set of parameters for a reversible spatial process model, and study the steady state of the network with respect to these parameters. We report that this algorithm is scalable to a large network, and can effectively control the active node density while achieving a small variance. We also report that the social behavior of nodes has interesting and non-obvious impacts on the performance of duty cycling. Finally, we present how to set the parameters of the algorithm to obtain a desirable duty cycling behavior.

 


 

20. Speaker: Dr. Kyung Dong Ryu (IBM)

 

Runtime mutation of commodity OS Kernels

 

Abstract

 

Continuously running systems require kernel software updates applied to them without downtime. Facilitating fast
reboots, or delaying an update may not be a suitable solution in many environments, especially in pay-per-use high performance computing clusters and mission critical systems. Such systems will not reap the bene ts of new kernel
features, and will continue to operate with kernel security holes unpatched, at least until the next scheduled maintenance
downtime. To address these problems we developed an on-the-y kernel updating system that enables commodity operating systems to gain adaptive and mutative capabilities without kernel recompilation or reboot. Our system, DynAMOS, employs a novel and e?cient dynamic code instrumentation technique termed adaptive function cloning. Execution ow can be switched adaptively among multiple editions of functions, possibly concurrently running. This approach becomes the foundation for dynamic replacement of non-quiescent kernel subsystems when the timeliness of an update depends on synchronization of multiple kernel paths. We illustrate our experience by dynamically updating core subsystems of the Linux kernel.

 


 

21. Speaker: Prof. Sang H. Son (Univ. of Virginia)

 

Data Integration for Situation Awareness

 

Abstract

 

The computing systems are becoming deeply embedded into ordinary life and interact with physical processes and events. They monitor the physical world with sensors and provide appropriate reaction. This cyber-physical interaction, which occurs through ubiquitous embedded sensor networks, has the potential to transform how humans interact with and control the physical world. In this talk, we will discuss some of the research issues in providing timely and accurate event detection for situation awareness in ubiquitous embedded systems, and present our approaches to addressing those issues.

 


 

22. Speaker: Prof. Eunjee Song (Baylor Univ.)

 

A Rigorous Approach to Incorporating Access Control Features into Applications
 

Abstract

 

Access control features are often spread across and tangled with other functionality in a design. This makes understanding, analyzing, and modifying these features in a design difficult. Aspect-oriented modeling (AOM) techniques can be used to support separation of access control concerns from other application design concerns. However, composition of an aspect and primary models yields a design model in which access control features are integrated with other application features. In this talk, we present an AOM approach that supports verifiable composition of behaviors specified in access control aspect models and primary models. Given an aspect model, a primary model, and a specified property, the composition technique produces proof obligations as the behavioral descriptions in the aspect and primary models are composed. One has to discharge the proof obligations to establish that the composed model has the specified property.

 


 

23. Speaker: Prof. Heonyoung Yeom (Seoul National University, Korea)

 

What is there for us with embedded systems?

 

Abstract

 

There are a lot of embedded systems in use these days, from cell phones to disk based video recording devices and digital TVs. Most of these systems are using some processor like ARM or PowerPC and based on linux like operating system. Aside from the general issues regarding these embedded systems, there are some specific issues when there are some hardwares involved such as flash memory or hard disk drives. I will briefly look at the general embedded system issues and get to the detailed issues with embedded storage devices.


 

 

KOCSEA (Korean Computer Scientists & Engineering Association in America)

http://www.kocsea.net