News

Lecture-Object-Relational Mapping in C++ by Boris Kolpackov

ODB is an open-source, cross-platform and cross-database object-relational
mapping (ORM) system for C++. Unlike other libraries offering a similar
functionality, ODB automatically generates the code that performs the
conversion between persistent classes and their database representation from
C++ class declarations.

Vanderbilt launches global portal for cyber-physical systems research

The new National Science Foundation-funded Cyber-Physical Systems Virtual Organization (CPS-VO) aims to bring together researchers, educators and students working in academics, industry and government agencies in a kind of virtual brain trust to foster progress, develop priorities and quickly distribute information in the rapidly emerging field of cyber-physical systems.

2nd International Workshop on Software Health Management

The Call for Papers for the 2nd International Workshop on Software Health Management is now open. This workshop will be held on August 2, 2011 in Palo Alto, CA as a satellite event of 4th International Conference on Space Mission Challenges for Information Technology (www.smc-it.org ).

Seminar-Multi-Functional Systems: Towards a Theory for Requirements Specification and Architecture Design by Manfred Broy

This lecture introduces a theory for the identification, modeling, and formalization of two complementary views onto software and software intensive systems called the problem view and the solution view. The problem view addresses requirements engineering for describing the overall system functionality from the users’ point of view aiming at the specification of the functional requirements of multi-functional systems in terms of their functions as well as their mutual dependencies. This view leads to a function or service hierarchy.

Lecture-Model-based methods in fault detection and diagnosis. By Janos Gertler

A significant class of fault detection and diagnosis methods relies on an explicit mathematical model of the monitored system. The fundamental idea is “analytical redundancy”: system outputs are compared to model responses, with discrepancies ideally indicating the presence of faults. The task of detecting such faults and determining their location (isolation) is made harder by noise and disturbances acting on the process, and by inaccuracies of the model.

Lecture-Why Is Offshoring Bad for the U.S. Economy? by Janos Gertler

Offshore labor outsourcing (“offshoring”) is a process in which US companies set up overseas production facilities, employing local workers, simultaneously curtailing their production on US soil and laying off part of their US workforce. This is followed by (is intertwined with) rehiring a part of the laid-off workers, usually by other companies, to boost production for domestic consumption and/or export.

Seminar-Sound model driven systems engineering with OMEGA SysML by Iulian Ober

An analysis of the results from Technical Reviews of 18 European Space
Agency (ESA) projects, conducted late 2000, has shown that one of the top
technical problem areas was on-board software, whose complexity, size and
verification are often severely under estimated, leading to budget and time
over-runs. In the scope of the ESA Software Initiative, an in-depth analysis
has shown that "there is no software crisis but a system crisis", meaning
that the origin of the software crisis was in fact a lack in system

Privacy Preserving Service Discovery in Mobile P2P Networks by Sanjay Madria. Monday, March 21, 2011

In mobile peer-to-peer networks, existing service discovery protocols disregard the exposure of the participating peers' privacy details (privileged information). In these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it correctly identifies the service providing peer. Thus, these peers face a problem; who should reveal their identity first, the service requesting or the service providing peer.

Presentation-Scheduling and Synchronization for Multi-Core Real-Time Systems by Karthik Lakshmanan

Monday, February 28th, 3:00 pm at Jacobs Believed in Me Auditorium

Presentation-Reverse Engineering of Data Structures from Binary by Zhiqiang Lin

The syntactic and semantic definitions of a program's data structures are valuable to many security and forensics applications, such as memory image mining, software vulnerability discovery, protocol reverse engineering, and virtual machine introspection.