1 / 11

Dr. Janos Sztipanovits E. Bronson Ingram Distinguished Professor of EECS Director of ISIS

Institute for Software-Integrated Systems ISIS – 10 Years. Dr. Janos Sztipanovits E. Bronson Ingram Distinguished Professor of EECS Director of ISIS Vanderbilt University Nashville, TN. ISIS Snapshot - 2008. Established by the School of Engineering at Vanderbilt University in 1998

randy
Download Presentation

Dr. Janos Sztipanovits E. Bronson Ingram Distinguished Professor of EECS Director of ISIS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Institute for Software-Integrated SystemsISIS – 10 Years Dr. Janos Sztipanovits E. Bronson Ingram Distinguished Professor of EECS Director of ISIS Vanderbilt University Nashville, TN

  2. ISIS Snapshot - 2008 • Established by the School of Engineering at Vanderbilt University in 1998 • Academic/professional researchorganization • Composition (housed in 3 buildings): - 30 Research Scientists & Staff Engineers - 9 Faculty - 7 Admin Staff - 6 Visitors - 50 Graduate students • ~$12,000,000 FY08 research awards • ~$ 9,200,000 FY08 expenditure • ~50 projects

  3. Core Research Areas • Model-Integrated Computing (MIC) • Metaprogrammable tool suite for domain-specific modeling, model transformations, model management, tool and model integration and design space exploration. Semantic foundation for agile design automation. • Distributed Object Computing (DOC) • Adaptive & reflective middleware, model-based integration technology above component models, secure middleware • Model-Based Design and Integration • Trustworthy Health Information Systems, High-confidence design, Model-driven architecture exploration, Incremental system integration, Structurally adaptive systems, System-security co-design, Policy-driven architectures • Secure Networked Embedded System • Wireless sensor networks middleware, radio-interferometric localization, shooter location applications, lightweight SOA on MANET • Education Technology MIC Tool Suite Sniper Location

  4. Simulator Activity Modeling Tool - process models - activity models Process data Activity ModelingLanguage Diagnostics IPCS/DuPont FDIR Modeling Tool - physical - functional Diagnosability Analysis Tool Diagnostic System ISIS Milestones: 90’s Key Driving Programs Time line Innovations • Domain Specific Modeling Languages • Basic Model Translators • Composition platform: MGK • OODB 1990 • Developed: 1988-1993 • Deployed in 1993 • Used in Control Room DuPont Chemicals • Multiple aspect modeling • Metaprogrammable model builder: XGEM • Model migration XGEM • Developed: 1992-1994 • Deployed in 1995 • Used program wide 1995 DTool/Boeing International Space Station MIC Alliance • Metamodeling • Model-based distributed system integration • Multiple-target generators SSPF/SATURNMS Platform Data Servers Model-Based System Integration Tool Bottleneck Tool DARPA EDCS • Developed: 1995-1996 • Deployed in 1996 • Production use in 2 plants UML-basedMetamodeling Process Viewer ISIS Established GM-Saturn • Embeddable “Active” Models • Generative Modeling • GME x • Design space modeling GME Design space modeling Adaptive Target Rec. - Data Flow - Hardware Resources - Behavior Simulator 1999 EmbeddedModels SW Generator • Developed: 1997-2000 • HW/SW Co-design • VHDL generation VHDL Generator

  5. C2 Windtunnels Human Centric Design ISIS Milestones: 00’s Key Driving Programs Time line Innovations • MoBIES DARPA Program • Model Transformation Technology • Open Tool Integration Framework • Model-Based Code Generators 2000 GME 200X OTIF DARPA DOC Grpup Model-Driven Middleware • NEST DARPA Program • MIC for Sensor Networks • New applications: Shooter loc. • ARMS DARPA Program • Component-based DRE dev. • Multiple QoS properties • Model-based design OMG MIC PSIG ESCHER GReAT ARMS SPP DARPA DARPA COSMIC Semantic Anchoring NSF 2005 • New MIC Foundations • Semantic Foundations • Metaprogrammable Tool Suite • Model-Based Design Flows • New Domains • System/security co-design • Architecture exploration Architecture Exploration Adaptive Architectures Security Modeling High ConfidenceDesign C2 Windtunnel SOA on MANET 2006 Foundations of Embedded Systems Large NSF ITR UC Berkeley/ISIS-VU NSF Science and Technology Center UC Berkeley/CMU/Cornell/ISIS-VU/Stanford • New MIC Directions: • Network-centric systems • Secure networked embedded systems • Model-based integration of heterogeneous systems • High-confidence systems 2007 2008

  6. ISIS Industry Partners Boeing MSR BBN IBM GM LMCOl BAE Siemens Xerox Boeing VU/ ISIS Boeing Boeing Raytheon SwRI

  7. ISIS Academic Partners MIT UM CMU Cornell UI ND Penn UCB EU UV WU Stanford VU/ ISIS USC-ISI GT UA

  8. Large-Impact Projects • DoD FCS program ISIS MIC tool suite transitioned to modeling and analysisof FCS architecture, and from FY07 to systems integration. • NEST Shooter Location + Self LocalizationISIS sensor net protocols, self localization technology and theShooter Location system transitioned to Raytheon • Fault-Adaptive Control Technology Boeing has licensed the diagnostic software for use on their vehicle programs • Distributed Planning/Scheduling technology ISIS research project results have been transitioned to USMC tactical aviation squadrons • ACE-TAO Middleware and COSMIC tools ACE-TAO used worldwide. Tools used in a large number of commercial and defense programs in the US. • MIC Tool SuiteGME/GREAT/UDM is used worldwide. Up and Coming: • TRUST Model-Integrated Clinical InformationSystems (MICIS) tools • Command and Control Wind Tunnel (C2WT) MIC Tool Suite

  9. Modeling Layer Future of ISIS: Technology The Great Convergence: z Software Control Systems package org.apache.tomcat.session; import org.apache.tomcat.core.*; import org.apache.tomcat.util.StringManager; import java.io.*; import java.net.*; import java.util.*; import javax.servlet.*; import javax.servlet.http.*; /** * Core implementation of a server session * * @author James Duncan Davidson [duncan@eng.sun.com] * @author James Todd [gonzo@eng.sun.com] */ public class ServerSession { private StringManager sm = StringManager.getManager("org.apache.tomcat.session"); private Hashtable values = new Hashtable(); private Hashtable appSessions = new Hashtable(); private String id; private long creationTime = System.currentTimeMillis();; private long thisAccessTime = creationTime; private long lastAccessed = creationTime; private int inactiveInterval = -1; ServerSession(String id) { this.id = id; } public String getId() { return id; } public long getCreationTime() { return creationTime; } public long getLastAccessedTime() { return lastAccessed; } public ApplicationSession getApplicationSession(Context context, boolean create) { ApplicationSession appSession = (ApplicationSession)appSessions.get(context); if (appSession == null && create) { // XXX // sync to ensure valid? appSession = new ApplicationSession(id, this, context); appSessions.put(context, appSession); } // XXX // make sure that we haven't gone over the end of our // inactive interval -- if so, invalidate and create // a new appSession return appSession; } void removeApplicationSession(Context context) { appSessions.remove(context); } /** * Called by context when request comes in so that accesses and * inactivities can be dealt with accordingly. */ void accessed() { // set last accessed to thisAccessTime as it will be left over // from the previous access lastAccessed = thisAccessTime; thisAccessTime = System.currentTimeMillis(); } void validate() • Ultra Large Scale Systems: The number and complexity of components rapidly grow • Cyber Physical Systems: Engineered systems use physical and computational components • Model-Based Design: Tool-based design automation using formal and manipulable models • Assist Human Cognition: Learning technology matters… How can we stay relevant?

  10. Future of ISIS: The New Research Paradigm • Past: Competence of individuals • Recent past: Competence of organizations • Present and Future: Only dynamic, multi-institutional teams can be competitive • Examples: TRUST S&TC (NSF) (Partners: UC Berkeley/CMU/Cornell/Stanford/Vanderbilt-ISIS) High Confidence Design MURI (AFOSR) (Partners: Vanderbilt-ISIS/UC Berkeley/CMU/Stanford)ATR MURI (ARO) (Partners: UC Berkeley/MIT/Vanderbilt-ISIS)C2WT PRET (AFOSR) (Partners: Vanderbilt-ISIS/UC Berkeley/GMU) How can we remain a coveted partner of the best?

  11. Challenge for the Next Decade • Reputation that is based on excellent work -that distinguishes us even among the best • Intellectual environment and atmosphere that attract talent and make worthwhile not only coming but staying… • Exceptional learning, networking and placement opportunities for our students to attract the best minds • Recognized leaders, movers and shakers in research areas that are directly relevant to major societal-scale problems

More Related