Kellogg Concourse (2nd floor) in the Georgia Center
Friday, April 4, 2014 - 4:15pm

Time: 4:00 – 7:30 pm, April 4th 2014 (Friday)

Place: Kellogg Concourse (2nd floor) in the Georgia Center

The program is as follows:

• Introduction – MC: C. Neasbitt (4:00 – 4:05)

• Welcome Speech – T. Taha (4:05 – 4:10)

• 1st keynote – M. Singh (4:10 – 5:00)

• Break (5:00 – 5:10)

• 2nd keynote – C. Pu (5:10 – 6:00)

• Poster session & competition & dinner (6:00 - 7:30)

The Computer Science Research Committee: I. Budak Arpinar (Chair), Liming Cai, Maria Hybinette, Khaled Rasheed & Roberto Perdisci.

Thanks to Jean, Suzi, Camille, Lakshmish & Prashant for their contributions. Also thanks to Grad School for printing the posters.

The Science of Security: Ensuring Secure Collaboration

Munindar P. Singh

North Carolina State University

Abstract: Despite sustained research effort in security, current security practice conveys a decidedly ad hoc flavor---find a bug; patch it; find the next bug; and so on. This methodology is sometimes termed "engineering", using the term in the narrow sense of developing solutions to specific problems. The past few years have seen a growing push to develop a science of security (SoS), viewed as a systematic body of knowledge with strong theoretical and empirical underpinnings that inform the engineering of secure information systems. I introduce SoS, briefly describing its key elements. I then motivate some of the foundational challenges of SoS from the standpoint of systems of autonomous participants, sometimes termed "systems of systems". I describe how security is an element of the governance of such systems and advocate an approach based on a new formulation of norms and accountability.

Bio: Munindar P. Singh is a professor in the Department of Computer Science at North Carolina State University. Munindar's research interests include multiagent systems, security, and social computing. He addresses the challenges of trust, norms, requirements modeling, service ecosystems, and business processes and protocols in large-scale open environments

Munindar was the editor-in-chief of IEEE Internet Computing from 1999 to 2002, and is the editor-in-chief of ACM Transactions on Internet Technology. His other current editorial service includes being a member of the editorial boards of IEEE Internet Computing, Journal of Autonomous Agents and Multiagent Systems, IEEE Transactions on Services Computing, ACM Transactions on Intelligent Systems and Technology, the Journal of Artificial Intelligence Research, and the Journal of Trust Management. Munindar served on the founding board of directors of IFAAMAS, the International Foundation for Autonomous Agents and MultiAgent Systems.

Munindar is a Fellow of the IEEE. Munindar's research has been recognized with awards and sponsorship by (alphabetically) Army Research Lab, Army Research Office, Cisco Systems, Consortium for Ocean Leadership, DARPA, Ericsson, IBM, Intel, the National Science Foundation, and Xerox. Nineteen students have received PhD degrees and 27 students have received MS degrees under Munindar's direction.

Big Data, IoT, and Clouds: Research Opportunities in Disaster Management

Calton Pu

Georgia Institute of Technology

Abstract: The ongoing convergence of evolution of devices (Internet of Things), deployment of large shared infrastructures (computing clouds), and accumulation of Big Data (sensors and social networks) has created exciting new research challenges. We will describe some of these challenges in the three phases of disaster management: preparedness beforehand, emergency response, and recovery afterwards. With concrete scenarios, e.g., using Twitter for effective information exchange during emergencies, we will discuss the research challenges in quality of service (e.g., real-time response time, high availability and robustness despite widespread failures), and quality of information (e.g., security, privacy, and robustness despite misinformation). These research challenges require integration and synthesis of results from several related areas, e.g., sensor networks and social networks as Big Data producers, and sophisticated models running on clouds as Big Data consumers. Such integration of heterogeneous and open data sources will require automated methods for reconciling syntactic and semantic differences among semi-structured sources as well as filtering out noises and misinformation in order to achieve the quality of service and quality of information requirements of a mission-critical application such as disaster management. We will use a concrete multi-hazard scenario (landslides) to illustrate these research challenges and some promising solutions.

Bio: Calton Pu was born in Taiwan and grew up in Brazil. He received his PhD from University of Washington in 1986 and served on the faculty of Columbia University and Oregon Graduate Institute. Currently, he is holding the position of Professor and John P. Imlay, Jr. Chair in Software in the College of Computing, Georgia Institute of Technology. He has worked on several projects in systems and database research. His contributions to systems research include program specialization and software feedback. His contributions to database research include extended transaction models and their implementation. His recent research has focused on automated system management in clouds (Elba project), information quality (e.g., spam processing), and big data in Internet of Things. He has collaborated extensively with scientists and industry researchers. He has published more than 70 journal papers and book chapters, 200 conference and refereed workshop papers. He served on more than 120 program committees, including the co-PC chairs of SRDS'95, ICDEí99, COOPISí02, SRDSí03, DOAí07, DEBSí09, ICWSí10, CollaborateCom'11, ICACí13, and co-general chair of ICDE'97, CIKM'01, ICDEí06, DEPSAí07, CEASí07, SCCí08, CollaborateComí08, World Service Congressí11, and CollaborateComí12.

List of Posters:

1. Delaram Yazdansepas, Faranak Jalalzadehfard, Neda Abolhassani: Accelerometer Mapping Method for Mobile-based Fall Detection Systems

2. Seth Meyerson: Finding Longest Known Snakes and Coils in Hypercubes

3. Chris Neasbitt: ClickMiner: Towards Reconstructing User-Browser Interactions from Network Traces

4. Babak Rahbarinia: Efficient Behavior-Based Tracking of New Malware-Control Domains in Large ISP Networks

5. Gordon Chalmers: Scheduling Processors Using Integer Programming

6. Victor Lawson: Data Quality/Energy Efficiency tradeoffs in Wireless Sensor Networks

7. Muthukumaran Chandrasekaran: Augmented Interactive Dynamic Influence Diagrams with Applications to Ad Hoc Teamwork

8. Thomas Werth, Kang Li: Vulnerabilities in popular microcontrollers

9. Kedar Marathe: Nested Adaptive MCL - A localization and tracking approach that adapts itself for changing situations

10. Yuchen Ying: unROP: Create Backtrace from Stack-pivoted Core Dump

11. William Richardson, Yu Qiu: Finding Nash Equilibria in Repeated Games with Imperfect Private Monitoring

12. Fadel Ewusi Kofi Adoe: Scalable Solutions of Interactive Dynamic Influence Diagrams using GPU-enabled Architectures

13. Prathamesh R. Divekar : “Topic Templates” A graph based clustering to categorize subject based searches

14. Jennifer D. Rouan: GPU Acceleration of High-Dimensional k-Nearest Neighbor Search for Face Recognition using EigenFaces

15. Shima Dastgheib: Graphical SPARQL Builder for Querying Domain Ontologies

16. Guodong Zhu: Principle and Approach of Delivering Cloud Display