1 / 23

Research and Teaching Plans

Research and Teaching Plans. Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008. R esearch Teaching. Pervasive computing. Pervasive Computing Applications. Users.

naoko
Download Presentation

Research and Teaching Plans

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008

  2. Research Teaching Pervasive computing Pervasive Computing Applications Users Source: Mobile Computing “Introduction to Pervasive Computing” lecture Excerpted and modified from ‘Ubiquitous City Plan’, NCA, Korea, 2005. Computers

  3. Research Teaching House of Horror:Corridor of Doom • Shard resources • No reliable monitoring and arbitration • Services unaware of others’ operations on share resources • Proper coordination needed Energy Saving Svc Lighting Service

  4. Research Teaching House of Horror:Steak Incinerator • Predefined range and conditions of operations for each device • The cues, hints and visual feedbacks fall to deaf ears when operated by systems • Invalid operations need to be monitored and prevented 3500°F !!

  5. Research Teaching House of Horror:Duel of Stove and Fridge • Side effects exist • Impossible to account for all possible interferences from environmental effects • Non-determinant behaviors Hey, Who Turns Off The Light?

  6. Research Teaching Goals Total safety guarantee is impossible • Accidents happen • People make mistakes • Murphy’s Law Attainable goals: • Do no harm • Handle safety risks • Proactively detect, prevent and manage the inherent safety risks

  7. Research Teaching Challenge and Impact • Pervasive computing is still in its infancy • Enhancement and assurance of safety a major block in real-world adoption and deployment • Safety practice for existing software system does not work • General purpose versus specialized system • Financial feasibility • Explore viable safety practice for low-cost general-purpose mission-critical systems • Current (limited) safety research on pervasive computing only address very specific issues • Generic software practice and architecture required • Results can be extend to improve the reliability and security of other dynamic and distributed systems such as web services

  8. Research Teaching Research Agenda Pervasive Computing Research Other Research Aspects System Support Security Privacy Reliability/ Availability Safety Evaluation Framework Authorship Support Software Engineering Practice

  9. Research Teaching Safety Analysis, Protection and Evaluation To enhance safety: • Reduce probability of bad things happening • System Modeling and Analysis • Safety Protection • Risk Avoidance • Reduce damage caused by potential failure • Risk detection and recognition • Emergency termination and handling • Emergency Recovery

  10. Research Teaching Risk Reduction • Ambient calculus based modeling • Function, Interaction and Mobility • Description logic based modeling • Context, Interpretation and Decisioning • Component-based parameter analysis • Operation and Invocation • Protection of single component • Casting, validation and event-driven programming paradigm • Protection of component Interaction • Choreography verification, concurrency • System-wise Protection • Ontology and active context reasoning • Risk warning system • Context-driven preventive behavior specification • Service recomposition • FPQSPN based service monitoring and composition • Data compensation • Virtual sensor technique, in-network data aggregation System Modeling Safety Protection Risk Avoidance

  11. Research Teaching Damage Containment and Reduction • Risk detection and recognition • Optimized context definition and reasoning • Behavioral pattern recognition • Emergency termination and handling • Middleware support for emergency stop (preemption, prioritization and garbage collection) • Emergency handler vector and mandatory emergency shutdown routine • Exception propagation mechanism • Emergency Recovery • Highest priority emergency recovery services • Idempotent service implementation

  12. Research Teaching Sustainable Research Program Research Outcome Publication Implementation Theory Software Practice Real-world Applications Collaboration Organization Support Service Innovation Leadership Resources Funding Facility Talent

  13. Research Teaching Sustainable Research Program: Funding • National Science Foundation (NSF) grants • Networking Technology and Systems (NeTS), • Cyber-Enabled Discovery and Innovation (CDI) programs, • Information Technology Research for National Priorities (ITR) grants, • CAREER award • Administration on Aging (AoA) grants, • National Institute on Disability and Rehabilitation Research (NIDRR) grants • National Institute of Health (NIH) grants • Industry sponsorship with matching state funds. • Microsoft Research, Ubiquitous Computing Group • IBM Research, Emerging Software Standards • GE Global Research, Computing and Decisioning System • Intel Research, Sensor Network Technologies and Applications

  14. Research Teaching Sustainable Research Program • Facilities • Lab space for intelligent environment • 3 Servers and 6 workstations • 3 Pocket PCs • A couple Dozens of sensor platforms • Various sensors and actuators • RFID tags and readers • Student Recruitment • Intra-departmental recruiting through undergraduate network/HCI classes and senior projects • Inter-departmental recruiting through interdisciplinary projects and collaboration • External recruiting through • Network of collaborators from other universities and • Publications in conferences • Well-designed web presence • Publicity of research outcome • Initial funding from starting package • Collaboration • Interdisciplinary Nature of PerCom • @ UF • William Mann (Gator tech smart house) • Benjamin Lok (HCI) • Prabhat Mishra (embedded system) • Michael Fang (sensor network) • Academic • Carl Chang (software engineering, Iowa State) • SriniSeshan (network, CMU) • Dave O’Hallaron (performance evaluation, CMU) • International • Bessam Abdulrazak (HCI and robotics, Canada) • Hani Hagras (intelligent agents, UK) • Hyun Kim (robotics, Korea) • Industry • Randy Carroll (emerging software standards, IBM) • Ming Lu (information systems and service computing, IBM) • Services

  15. Research Teaching Vision 2013 • Establish the position as the leading institute in research on safe pervasive computing systems • Design and implement the cutting-edge software engineering practice and platform viable for safe mass real-world deployments • Create a mid-size sustainable research program (8-10 scholars) supported by a mix of funding from both the government and industry • Collaborate with a network of renowned scholars in the U.S. and international on an open platform • Lead in inter-departmental and inter-collegian joint exploration of safe pervasive computing deployment in various application domains

  16. Research Teaching Teaching Experience CGS 3460 Computer Programming Using C Instructor Spring 2006 CEN 5531 Mobile Computing Guest Lecturer Fall 2006 CIS 6930 Special Topics on Sensor Networks Guest Lecturer & Mentor Spring 2007 CEN 4500C Computer Network Fundamentals Teaching Assistant Spring 2007 Spring 2008

  17. Research Teaching Mentoring Experience Graduate Research Chao Chen, PhD student (Jan. ‘07 – present) “Performance Evaluation of Pervasive Computing Systems” RohinSethi, Masters student (Apr. ‘07 – present) “Universal Remote Control for Smart Houses” STEP Program Chris Toth, HS junior (summer ‘07) “Social Navigator for the Visually Impaired” Term Project Sushant Gupta, AnkitHirdesh, Masters student (Jan. - July ‘07) “Remote GUI Client for Atlas”

  18. Research Teaching Teaching Philosophy • Deliver the fundamentals, but encourage students to explore • Teaching is an interactive process and a two-way street • Push available resources forward (80-20 rule) • Teaching and research are synergetic, not competing activities • Learning is all that matters

  19. Research Teaching Courses of Interest • Undergraduate courses • CGS 2414 Computer Programming Using Java • CGS 3460 Computer Programming Using C • COP 4600 Operating Systems • CEN 4500 Computer Network Fundamentals • Graduate courses • CEN 5531 Mobile Computing • COP 5615 Operating System Principle (Distributed systems) • CEN 6505 Advance Computer Networks • CIS 6930 Sensor Networks

  20. Research Teaching Sample Undergraduate CourseCGS 3460 Computer Programming Using C • Course Activities – 6 Individual Projects, 6 Quizzes, Midterm and Final • Teaching • 3 Hours of lectures, 10 Hours of computing lab, and another 3 office hours per week • Interleaved use of slides, board and demo code • Online forum and designated rotating email response TA • Fun projects with backstory • Mid-term evaluation

  21. Research Teaching Sample Graduate CourseCEN 5531 Mobile Computing • Course Activities – 1 Group Term Project, 1 Individual Survey Paper, short paper summaries, 2 Paper Presentations and Discussions, Midterm and Final • Teaching • 3 Hours of lectures, including opening introductions, student presentations, and concluding discussion • Meetings with each group at checkpoints throughout the semester • Student-designed and managed projects • Town hall meetings • Interdisciplinary Guest panelists and judges • Offer existing research outputs from the lab to students, and draw inspiration from discussions and projects of students

  22. Research Teaching Course Development • 2-Course set for Pervasive Computing • Upper-level undergraduate course “Introduction to Pervasive Computing” • Introductory lectures on context-awareness, ad-hoc protocols and self-organization, service-oriented architecture, reliability and availability, etc • Panel/brainstorming session with domain experts from occupational therapy, civil engineering, agriculture, and education, etc • Graduate course “Advance Pervasive Computing System Design, Implementation and Analysis” • Collaborative offering with other department/college • Targeted for students with specialties in systems, networks, and HCI, as well as other colleges with domain expertise • Create interdisciplinary teams to create interoperable projects • Experts give guest lectures on visions, requirements and limitations on applying these new technologies in their respective domains • Employ lab research output as the backbone of course offering

  23. Questions? • Thank you for your attention. • Further information on is available @ http://www.cise.ufl.edu/~hyang Or contact me @ hyang@cise.ufl.edu

More Related