23
Research and Teaching Plans Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008

Research and Teaching Plans

  • Upload
    naoko

  • View
    29

  • Download
    2

Embed Size (px)

DESCRIPTION

Research and Teaching Plans. Hen-I Yang, PhD Candidate Computer and Information Science and Engineering Department University of Florida May 1, 2008. R esearch Teaching. Pervasive computing. Pervasive Computing Applications. Users. - PowerPoint PPT Presentation

Citation preview

Page 1: Research and Teaching Plans

Research and Teaching Plans

Hen-I Yang, PhD Candidate

Computer and Information Science and Engineering Department

University of Florida

May 1, 2008

Page 2: Research and Teaching Plans

Pervasive computing

Source: Mobile Com

puting “Introduction to Pervasive Computing”

lectureExcerpted and m

odified from ‘U

biquitous City Plan’, NCA, Korea, 2005.

Pervasive ComputingApplications

Users

Computers

ResearchTeaching

Page 3: Research and Teaching Plans

House of Horror:Corridor of Doom

Shard resourcesNo reliable monitoring

and arbitrationServices unaware of

others’ operations on share resources

Proper coordination needed Energy Saving Svc

Lighting Service

ResearchTeaching

Page 4: Research and Teaching Plans

House of Horror:Steak Incinerator

Predefined range and conditions of operations for each device

The cues, hints and visual feedbacks fall to deaf ears when operated by systems

Invalid operations need to be monitored and prevented

3500°F !!

ResearchTeaching

Page 5: Research and Teaching Plans

House of Horror:Duel of Stove and Fridge

Side effects exist Impossible to account for all possible

interferences from environmental effects Non-determinant behaviors

Hey, Who Turns Off The Light?

ResearchTeaching

Page 6: Research and Teaching Plans

GoalsTotal safety guarantee is impossible◦Accidents happen ◦People make mistakes◦Murphy’s Law

Attainable goals:Do no harmHandle safety risks Proactively detect, prevent and manage

the inherent safety risks

ResearchTeaching

Page 7: Research and Teaching Plans

Challenge and ImpactPervasive computing is still in its infancy◦ Enhancement and assurance of safety a major block in real-

world adoption and deploymentSafety practice for existing software system does not work◦ General purpose versus specialized system◦ Financial feasibility◦ Explore viable safety practice for low-cost general-purpose

mission-critical systemsCurrent (limited) safety research on pervasive computing

only address very specific issues◦ Generic software practice and architecture required◦ Results can be extend to improve the reliability and security of

other dynamic and distributed systems such as web services

ResearchTeaching

Page 8: Research and Teaching Plans

Pervasive Computing Research

Other Research Aspects

System Support

Research Agenda

Safety

SecurityPrivacy

Software Engineering

Practice

Authorship Support

Evaluation Framework

Reliability/ Availability

ResearchTeaching

Page 9: Research and Teaching Plans

Safety Analysis, Protection and EvaluationTo enhance safety:Reduce probability of

bad things happening◦ System Modeling and

Analysis◦ Safety Protection◦ Risk Avoidance

Reduce damage caused by potential failure◦ Risk detection and

recognition◦ Emergency

termination and handling

◦ Emergency Recovery

ResearchTeaching

Page 10: Research and Teaching Plans

Risk Reduction Ambient calculus based modeling

◦ Function, Interaction and Mobility Description logic based modeling

◦ Context, Interpretation and Decisioning Component-based parameter analysis

◦ Operation and Invocation Protection of single component

◦ Casting, validation and event-driven programming paradigm Protection of component Interaction

◦ Choreography verification, concurrency System-wise Protection

◦ Ontology and active context reasoning Risk warning system

◦ Context-driven preventive behavior specification Service recomposition

◦ FPQSPN based service monitoring and composition Data compensation

◦ Virtual sensor technique, in-network data aggregation

Risk Avoidance

System Modeling

Safety Protection

ResearchTeaching

Page 11: Research and Teaching Plans

Damage Containment and Reduction

Risk detection and recognition Optimized context definition and reasoning Behavioral pattern recognition

Emergency termination and handling Middleware support for emergency stop (preemption,

prioritization and garbage collection) Emergency handler vector and mandatory emergency shutdown

routine Exception propagation mechanism

Emergency Recovery Highest priority emergency recovery services Idempotent service implementation

ResearchTeaching

Page 12: Research and Teaching Plans

Sustainable Research Program

Resources

Funding Facility Talent

Innovation Leadership

Research Outcome

Publication Implementation Theory SoftwarePractice

Real-worldApplications

Organization SupportCollaborationService

ResearchTeaching

Page 13: Research and Teaching Plans

Sustainable Research Program: Funding National Science Foundation (NSF) grants

◦ Networking Technology and Systems (NeTS),◦ Cyber-Enabled Discovery and Innovation (CDI) programs, ◦ Information Technology Research for National Priorities (ITR)

grants,◦ CAREER award

Administration on Aging (AoA) grants, National Institute on Disability and Rehabilitation Research

(NIDRR) grants National Institute of Health (NIH) grants Industry sponsorship with matching state funds.

◦ Microsoft Research, Ubiquitous Computing Group◦ IBM Research, Emerging Software Standards◦ GE Global Research, Computing and Decisioning System◦ Intel Research, Sensor Network Technologies and Applications

ResearchTeaching

Page 14: Research and Teaching Plans

Sustainable Research Program Facilities

◦ Lab space for intelligent environment◦ 3 Servers and 6 workstations◦ 3 Pocket PCs◦ A couple Dozens of sensor platforms◦ Various sensors and actuators◦ RFID tags and readers

Student Recruitment◦ Intra-departmental recruiting through

undergraduate network/HCI classes and senior projects

◦ Inter-departmental recruiting through interdisciplinary projects and collaboration

◦ External recruiting through Network of collaborators from other

universities and Publications in conferences Well-designed web presence Publicity of research outcome

◦ Initial funding from starting package

Collaboration◦ Interdisciplinary Nature of PerCom◦ @ UF

William Mann (Gator tech smart house) Benjamin Lok (HCI) Prabhat Mishra (embedded system) Michael Fang (sensor network)

◦ Academic Carl Chang (software engineering, Iowa State) Srini Seshan (network, CMU) Dave O’Hallaron (performance evaluation,

CMU)

◦ International Bessam Abdulrazak (HCI and robotics, Canada) Hani Hagras (intelligent agents, UK) Hyun Kim (robotics, Korea)

◦ Industry Randy Carroll (emerging software standards,

IBM) Ming Lu (information systems and service

computing, IBM)

Services

ResearchTeaching

Page 15: Research and Teaching Plans

Vision 2013Establish the position as the leading institute in research on

safe pervasive computing systemsDesign and implement the cutting-edge software

engineering practice and platform viable for safe mass real-world deployments

Create a mid-size sustainable research program (8-10 scholars) supported by a mix of funding from both the government and industry

Collaborate with a network of renowned scholars in the U.S. and international on an open platform

Lead in inter-departmental and inter-collegian joint exploration of safe pervasive computing deployment in various application domains

ResearchTeaching

Page 16: Research and Teaching Plans

Teaching Experience

CEN 4500C

Computer Network Fundamentals

Teaching Assistant

Spring 2007Spring 2008

CIS 6930

Special Topics on Sensor Networks

Guest Lecturer &MentorSpring 2007

CEN 5531

Mobile Computing

Guest Lecturer

Fall 2006

CGS 3460

Computer Programming Using C

Instructor

Spring 2006

ResearchTeaching

Page 17: Research and Teaching Plans

STEP Program

Chris Toth, HS junior(summer ‘07)

“Social Navigator for the Visually Impaired”

Graduate Research

Chao Chen, PhD student(Jan. ‘07 – present)

“Performance Evaluation of Pervasive Computing Systems”

Rohin Sethi, Masters student(Apr. ‘07 – present)

“Universal Remote Control for Smart Houses”

Mentoring ExperienceTerm Project

Sushant Gupta, Ankit Hirdesh, Masters student

(Jan. - July ‘07)“Remote GUI Client for Atlas”

ResearchTeaching

Page 18: Research and Teaching Plans

Teaching PhilosophyDeliver the fundamentals, but encourage

students to exploreTeaching is an interactive process and a

two-way streetPush available resources forward (80-20

rule)Teaching and research are synergetic, not

competing activitiesLearning is all that matters

ResearchTeaching

Page 19: Research and Teaching Plans

Courses of InterestUndergraduate courses◦CGS 2414 Computer Programming Using Java◦CGS 3460 Computer Programming Using C◦COP 4600 Operating Systems◦CEN 4500 Computer Network Fundamentals

Graduate courses◦CEN 5531 Mobile Computing◦COP 5615 Operating System Principle (Distributed systems)◦CEN 6505 Advance Computer Networks◦CIS 6930 Sensor Networks

ResearchTeaching

Page 20: Research and Teaching Plans

Sample Undergraduate CourseCGS 3460 Computer Programming Using C

Course Activities – 6 Individual Projects, 6 Quizzes, Midterm and Final

Teaching◦3 Hours of lectures, 10 Hours of computing lab, and

another 3 office hours per week◦ Interleaved use of slides, board and demo code

• Online forum and designated rotating email response TA

• Fun projects with backstory• Mid-term evaluation

ResearchTeaching

Page 21: Research and Teaching Plans

Sample Graduate CourseCEN 5531 Mobile Computing

Course Activities – 1 Group Term Project, 1 Individual Survey Paper, short paper summaries, 2 Paper Presentations and Discussions, Midterm and Final

Teaching◦ 3 Hours of lectures, including opening introductions, student

presentations, and concluding discussion◦ Meetings with each group at checkpoints throughout the semester

• Student-designed and managed projects• Town hall meetings• Interdisciplinary Guest panelists and judges• Offer existing research outputs from the lab to students, and

draw inspiration from discussions and projects of students

ResearchTeaching

Page 22: Research and Teaching Plans

Course Development 2-Course set for Pervasive Computing Upper-level undergraduate course “Introduction to Pervasive

Computing”◦ Introductory lectures on context-awareness, ad-hoc protocols and self-

organization, service-oriented architecture, reliability and availability, etc◦ Panel/brainstorming session with domain experts from occupational therapy,

civil engineering, agriculture, and education, etc Graduate course “Advance Pervasive Computing System Design,

Implementation and Analysis”◦ Collaborative offering with other department/college◦ Targeted for students with specialties in systems, networks, and HCI, as well

as other colleges with domain expertise◦ Create interdisciplinary teams to create interoperable projects◦ Experts give guest lectures on visions, requirements and limitations on

applying these new technologies in their respective domains◦ Employ lab research output as the backbone of course offering

ResearchTeaching

Page 23: Research and Teaching Plans

Questions?Thank you for your attention.

Further information on is available @http://www.cise.ufl.edu/~hyangOr contact me @[email protected]