Lecture-Model-based methods in fault detection and diagnosis. By Janos Gertler

A significant class of fault detection and diagnosis methods relies on an explicit mathematical model of the monitored system. The fundamental idea is “analytical redundancy”: system outputs are compared to model responses, with discrepancies ideally indicating the presence of faults. The task of detecting such faults and determining their location (isolation) is made harder by noise and disturbances acting on the process, and by inaccuracies of the model.

Lecture-Why Is Offshoring Bad for the U.S. Economy? by Janos Gertler

Offshore labor outsourcing (“offshoring”) is a process in which US companies set up overseas production facilities, employing local workers, simultaneously curtailing their production on US soil and laying off part of their US workforce. This is followed by (is intertwined with) rehiring a part of the laid-off workers, usually by other companies, to boost production for domestic consumption and/or export.

Seminar-Sound model driven systems engineering with OMEGA SysML by Iulian Ober

An analysis of the results from Technical Reviews of 18 European Space
Agency (ESA) projects, conducted late 2000, has shown that one of the top
technical problem areas was on-board software, whose complexity, size and
verification are often severely under estimated, leading to budget and time
over-runs. In the scope of the ESA Software Initiative, an in-depth analysis
has shown that "there is no software crisis but a system crisis", meaning
that the origin of the software crisis was in fact a lack in system

Privacy Preserving Service Discovery in Mobile P2P Networks by Sanjay Madria. Monday, March 21, 2011

In mobile peer-to-peer networks, existing service discovery protocols disregard the exposure of the participating peers' privacy details (privileged information). In these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it correctly identifies the service providing peer. Thus, these peers face a problem; who should reveal their identity first, the service requesting or the service providing peer.

Presentation-Scheduling and Synchronization for Multi-Core Real-Time Systems by Karthik Lakshmanan

Monday, February 28th, 3:00 pm at Jacobs Believed in Me Auditorium

Presentation-Reverse Engineering of Data Structures from Binary by Zhiqiang Lin

The syntactic and semantic definitions of a program's data structures are valuable to many security and forensics applications, such as memory image mining, software vulnerability discovery, protocol reverse engineering, and virtual machine introspection. 

Presentation-Compositionality and Modularity in Embeddded System Design: Interface Synthesis and Interface theories by Stavros Tripakis

 Compositionality and modularity in embedded system design: Interface synthesis and interface theories by Stavros Tripakis. Monday, February 14th, 4:00 pm, Jacobs Believed in Me Auditorium.

Presentation-Visualizing Biological Data by Miriah Meyer

Visualization tools are essential for deriving meaning from the avalanche of data we are generating today. To facilitate an understanding of the complex relationships embedded in this data, visualization research leverages the power of the human perceptual and cognitive systems, encoding meaning through images and enabling exploration through human-computer interactions. In my research I design visualization systems that support exploratory, complex data analysis tasks by biologists who are analyzing large amounts of heterogeneous data.

Electrical Engineering & Computer Science Faculty Search Presentation by Jur van den Berg - February 10, 2011

Recent Advances in Collision Avoidance and Motion Planning for Autonomous Robots by Jur van den Berg, Thursday, February 10th - 3:00 pm, Jacobs Believed in Me Auditorium.

Research Seminar - January 19, 2011- Rigorous Component-based System Design Using the BIP Framework

Professor Joseph Sifakis will host a Research Seminar on January 19, 2011 at 3:30 pm at the ISDE/ISIS School of Engineering location at 1025 16th Avenue South in Suite 213.

Rigorous system design requires the use of a single powerful component framework allowing the representation of the designed system at different levels of abstraction, from application software to its implementation. Such a framework allows to maintain overall coherency and correctness of the design flow by comparing different architectural solutions and their properties.