|
2015-08-17 Best Scientific Cybersecurity Paper Award Winner
|
|
Congratulations to TS's Prof Carroll Morgan and
co-authors, who have won the Annual NSA
Best Scientific Cybersecurity Paper Award for their
paper
Additive and Multiplicative Notions of Leakage and Their
Capacities published at last year's IEEE Computer
Security Foundations Symposium.
|
|
Seminar 2015-08-17: Jan Auer; Enhancing Static Analysis
with Runtime Verification
|
|
Static program analysis and runtime verification are two
complementary, yet supplemental approaches to ensuring
correct program execution. Theformer is well established
and integrated in many development environments, as well as
several enterprise-grade standalone tools. Runtime
verification, on the other hand, facilitates targeted
monitoring of production systems without the risk of false
positives or false negatives. In this presentation we
preset "Static Runtime Verification", a formalbridge
between static analysis and runtime verification that
leverages synergy effects between both approaches. Analysis
comprises three stages: Identification of error candidates
using static analysis, event instrumentation at these
locations, and final runtime monitoring. Moreover, we
introduce our prototype platform StaticRV and a number of
use cases
|
|
Seminar 2015-07-06: Prof. Cesare Pautasso;
Let's have a RESTful Conversation
|
|
The REST architectural style has made a strong impact on
the way Web services are designed, built and also composed.
In this talk we take a close look at the way clients
interact with them and introduce the notion of RESTful
conversation. We show that there many examples of recurring
conversation types that can be found on the Web (from small
indirect lookups based on hypermedia relationships, to the
navigation within the elements of collection resources or
the confirmation/cancellation of reserved resources within
RESTful atomic distributed transactions). Capturing them
helps to raise the abstraction level when modeling RESTful
APIs and also provides a novel perspective to study the
relationship between business processes and Web resources,
or what we call RESTful Business Process Management.
|
|
Seminar 2015-06-30; Prof. Ryszard
Kowalczyk on Enabling Smart Infrastructure with
Intelligent Agent Technologies
|
|
Smart infrastructure encompasses networked infrastructure
that uses ubiquitous sensor, information and
communication technologies to better utilise or sustain
resources. Examples of smart infrastructure include
electricity grids that improve grid reliability and
better utilise energy; transport systems that optimise
traffic flows; water networks that improve productivity
in agriculture; and cloud computing that improves
productivity and utilisation of ICT resources. Emerging
uses of smart infrastructure have the potential to reduce
costs, enhance safety and reduce our environmental
footprint. In order to realize the full potential of
smart infrastructure, new technology solutions are
required to support smart data use, distributed
coordination and decentralised optimisation across the
infrastructure. In particular the talk will focus on
enabling smart energy grids and smart cloud systems with
intelligent agent technologies. It will include examples
of on-going research on market-based demand-response
control and agent-based management of self-sufficient
micro-grids. Cloud computing examples will focus on smart
cloud broker involving smart cloud bench, purchaser and
marketplace
|
|
Seminar 2015-06-10; Stratos Idreos;
Curious and self-designing systems: towards easy to use
data systems tailored for exploration
|
|
How far away are we from a future where a data management
system sits in the critical path of everything we do?
Already today we need to go through a data system in order
to do several basic tasks, e.g., to pay at the grocery
store, to book a flight, to find out where our friends are
and even to get coffee. Businesses and sciences are
increasingly recognizing the value of storing and analyzing
vast amounts of data. Other than the expected path towards
an exploding number of data-driven businesses and
scientific scenarios in the next few years, in this talk we
also envision a future where data becomes readily available
and its power can be harnessed by everyone. What both
scenarios have in common is a need for new kinds of data
systems which are tailored for data exploration, which are
easy to use, and which can quickly absorb and adjust to new
data and access patterns on-the-fly. We will discuss this
vision and some of our recent efforts towards
self-designing systems as well as "curious" systems
tailored for automated exploration.
|