Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics

Size: px
Start display at page:

Download "Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics"

Transcription

1 Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics Robert L. Constable Cornell University February 2003 Project Web Page Libraries.html Accomplishments since the May 2002 Project Review 1. Further Design of the Prototype Formal Digital Library (FDL) Stuart Allen has written a key technical article on the notion of abstract object identifiers and certificates and a substantial companion design document. The technical article has been submitted for publication, and the design documents are a blueprint for our on-going work. These articles are highly original and conceptual, and the ideas developed in them are essential to a sound FDL. Stuart s treatment of every topic breaks new ground, and we have had to spend time to educate the project and publish ideas to elicit feedback. We have been exploring the use of reflection based on the term structure of the FDL. We can now demonstrate a result that will hold in all of the theories that we connect. It is a result critical to Tarski s theorem. It represents a significant improvement in a logical treatment of reflection made possible by computer support. 2. Software Expanding the Formal Digital Library (FDL) Prototype 1

2 We have added Library navigation functions and documented them. This entails a great deal of programming and technical writing. The extension to the FDL represents nearly 1,000 person hours of work. Linking Nuprl 5, Nuprl 4, MetaPRL, and PVS to the FDL We have spent many programmer hours linking these provers to the Library. 3. Adding content to the FDL We have added new content in two areas, both essential. First, we are developing new material that is directly relevant to software infrastructure protection, namely protocol verification, system security, and basic formal data structures. Second, we are incorporating PVS material into the Library. Critical infrastructure protection of software Our approach to this area is unique and important; together we can point this out to OSD. The basic argument is that verification tools will be vastly more useful if they have access to large knowledge bases. Moreover, the latest DARPA thrust in intelligent networks will require the knowledge base that we will assemble. We know the importance of digital knowledge bases from research in AI, namely, intelligent systems need access to large amounts of knowledge. We also know it from our work with protocol verification. Once we established a large knowledge base in distributed systems, we could verify protocol designs as fast as the systems people could produce them. The investigations we are conducting now are modeled after the research program we pursued with ONR funding in 1990 s for the investigation of correct-by-construction functional programming with Nuprl. The area created with NSF and ONR funding is still very active and is having a significant impact spawning related research programs and systems and eventually leading to a decade long period of practical work supported by DARPA. The Nuprl book from 1986 remains among the top twenty five most cited documents on the Web according to Citeseer, and the current Nuprl Web page brings that book up to date. There are many lines of theoretical work that can be traced back to this earlier project, including the solution of two open problems in theoretical computer science and mathematic (Howe and Murthy) and the creation of closely related proof development systems, such as Alf, Coq, Lego and MetaPRL, and many significant practical re- 2

3 sults in both industry and government. Dozens of PhD theses have been written on this topic along with hundreds of articles and reports. We believe that the research agenda we are proposing now has the same or greater potential to produce strong practical applications and unexpected discoveries over another twenty year period. In addition, we have picked a topic on which there is common interest with the Naval Research Laboratory protocol verification using IO automata and protocol synthesis. Also Jason s popular expository writing about O Caml spreads our formally grounded writing ideas to a wide audience. We have developed a new capability to extract distributed systems from constructive proofs that specified behaviors are achievable. In some sense this solves a problem that has been under investigation by many researchers since It will have a significant impact on our ability to create reliable and secure software, and it depends vitally on a large formal digital library of the kind we are building. Accumulating content from multiple provers Jason s work on a formal O Caml compiler developed inside MetaPRL is highly original and complements our formal O Caml semantics. We have imported PVS proofs into the FDL. We did this instead of posting the O Caml semantics to the Web because as you noted, we are burning researcher cycles as fast as we can and still have a large stack of subgoals awaiting attention. Our ability to replay and import PVS proofs extends our PVS capability considerably. We have written a CADE paper on this. The import required a substantial amount of programming and experimentation, again hundreds of hours. We are working on posting this material to the Web. 4. Presenting FDL content on the Web The ability to display formal content on the Web has proven to be important to advertising the project. Thus it has taken on a higher priority with me and you than the technology now supports when applied to massive content from multiple systems. Progress has been slow against hard technical problems. We are writing internal notes about the mechanisms and problems and discussing them in our research meetings and seminars. There are serious problems of scale as we try to deal with tens of thousands of objects. 3

4 Presenting PVS proofs on the Web at the same quality level of Nuprl and MetaPRL proofs is an additional technical challenge and requires us to extend Stuart s tools still further. 5. Engaging with a Community Our discussions with people at the review and with you suggested the importance of identifying a community on which we can have a significant impact. We are committed to at least one such community, Mathematical Knowledge Management (MKM). In June 2002 I gave an invited talk at the first meeting of the North American branch, NA-MKM. This talk is posted at the project home page. Jim Caldwell is engaged with the European MKM which has ties to the North American branch, and I will meet some of the leaders in July We will also look to identify a second community that complements the first. At the North American MKM meeting that we attended en mass, this was one of the liveliest topics. We have remained in contact with the North American and European leaders of this group. I expect that we will host a meeting of the North American group next year if they are willing, and we might ask to use some of our ONR funds to help organize. A related effort in which we also participate is QPQ (QED Pro Quo), a repository of open source deductive software. I am on the Advisory Board. As part of community building, I have given technical lectures on the FDL at these places: North American Mathematical Knowledge Management meeting in Hamilton Ontario. Automath meeting at Harriot-Watt University in Edinburgh University of Reading, England Ben-Gurion University, Israel I will be lecturing on the topic at the Marktoberdorf Summer School in July 2003 and at an ICALP workshop. 4

5 6. Personnel Cornell CalTech Wyoming Stuart Allen Jason Hickey James Caldwell Robert Constable Aleksey Nogin Vitali Khaikine Christoph Kreitz Xin Yu John Cowles Richard Eaton Lori Lorigo Eli Barzilay 7. Publications We list fourteen publications on the project Web page (including the FDL manual). There will also be two PhD theses, one from August 2002 and one from August This is a very high publication rate given the amount of software and formal mathematical content we produce as well. Among the most significant papers are these. (a) Abstract Identifiers and Textual Reference (2002) (b) Notes on the Design and Purpose of the FDL (2002) (c) Logic of Events (2003) (d) Nuprl-PVS Connection: Integrating Libraries of Formal Mathematics (2002) (e) eflecting Higher-Order Abstract Syntax in Nuprl (2002) (f) Sequent Schema for Derived Rules (2002) (g) Theory and Implementation of an Efficient Tactic-Based Logical Framework (2002) Paper (a) lays the foundations for a multi-logic library of formalized computational mathematics and computer science. It discusses an issue that many people have not discovered as critical to such a system, namely the need for abstract treatment of the name space. Paper (b) translates the ideas of (a) into FDL design decisions. Paper (c) shows the value of this work to one the problem of building secure-by-construction distributed system software. This is a core problem in CIP/SW. Cornell has another MURI in the area, on language based security. Our work is important to that MURI as well. We make a direct connection between the FDL and the creation of secure code. 5

6 Paper (d) discusses some of the early issues discovered as we imported PVS into the FDL. The PVS prover creates a great deal of formal mathematics, and some of it is useful in algorithm construction; but the PVS prover is based on an entirely different logic than what is used in Alf, Nuprl, and Coq, the provers for computational mathematics. We are showing how to incorporate two very different logics into the FDL. This will increase its value considerably. It is a very hard logical and software engineering problem. Paper (e) deals with the problem of reflecting formal logics. This capability is widely recognized as important in practice, but it is extremely complex and has not been fully deployed in any prover. We proposed using insights from computational mathematics to simplify the task. A thesis is being written on this topic. Its results will apply to all logics of the FDL. Papers (f) and (g) describe the mechanisms of MetaPRL on derived rules which will benefit all implemented formal logics. 6

Progress Report: Building Interactive Digital Libraries of Formal Algorithmic Knowledge Project Overview

Progress Report: Building Interactive Digital Libraries of Formal Algorithmic Knowledge Project Overview Progress Report: Building Interactive Digital Libraries of Formal Algorithmic Knowledge Project Overview Robert L. Constable Cornell James Caldwell Wyoming Jason Hickey Cal Tech 1 Outline The DoD URI BAA

More information

System Description: The MathWeb Software Bus for Distributed Mathematical Reasoning

System Description: The MathWeb Software Bus for Distributed Mathematical Reasoning System Description: The MathWeb Software Bus for Distributed Mathematical Reasoning Jürgen Zimmer 1 and Michael Kohlhase 2 1 FB Informatik, Universität des Saarlandes jzimmer@mathweb.org 2 School of Computer

More information

ShadowDB: A Replicated Database on a Synthesized Consensus Core

ShadowDB: A Replicated Database on a Synthesized Consensus Core ShadowDB: A Replicated Database on a Synthesized Consensus Core Nicolas Schiper, Vincent Rahli, Robbert Van Renesse, Mark Bickford, and Robert L. Constable Cornell University Abstract This paper describes

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Using the Computer to Prove the Correctness of Programs p.1/12

Using the Computer to Prove the Correctness of Programs p.1/12 Using the Computer to Prove the Correctness of Programs Bengt Nordström bengt@cs.chalmers.se ChungAng University on leave from Chalmers University, Göteborg, Sweden Using the Computer to Prove the Correctness

More information

The CompCert verified C compiler

The CompCert verified C compiler The CompCert verified C compiler Compiler built and proved by Xavier Leroy et al. Talk given by David Pichardie - Harvard University / INRIA Rennes Slides largely inspired by Xavier Leroy own material

More information

Introducing Formal Methods. Software Engineering and Formal Methods

Introducing Formal Methods. Software Engineering and Formal Methods Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES FACULTY OF CONTEMPORARY SCIENCES AND TECHNOLOGIES STUDY PROGRAMME FOR POSTGRADUATE STUDIES (Master of Science) NAME OF THE PROGRAMME: BUSINESS INFORMATICS STUDIES 262 PROGRAMME DESCRIPTION Business Informatics

More information

Automated Theorem Proving - summary of lecture 1

Automated Theorem Proving - summary of lecture 1 Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of

More information

Telecommunication (120 ЕCTS)

Telecommunication (120 ЕCTS) Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study

More information

Verifying security protocols using theorem provers

Verifying security protocols using theorem provers 1562 2007 79-86 79 Verifying security protocols using theorem provers Miki Tanaka National Institute of Information and Communications Technology Koganei, Tokyo 184-8795, Japan Email: miki.tanaka@nict.go.jp

More information

Brigitte Pientka. Programming Languages, Verification, Automated Theorem Proving, Logical Frameworks, Logic, Type Theory, Logic Programming

Brigitte Pientka. Programming Languages, Verification, Automated Theorem Proving, Logical Frameworks, Logic, Type Theory, Logic Programming Brigitte Pientka Department of Computer Science 5552 Beacon St #22 Pittsburgh, PA 15213-3891 Pittsburgh, PA 15217 (412) 268 3076 (412) 422 0621 e-mail: bp@cs.cmu.edu http://www.cs.cmu.edu/ bp Research

More information

Curriculum for the basic subject at master s level in. IT and Cognition, the 2013 curriculum. Adjusted 2014

Curriculum for the basic subject at master s level in. IT and Cognition, the 2013 curriculum. Adjusted 2014 D E T H U M A N I S T I S K E F A K U L T E T K Ø B E N H A V N S U N I V E R S I T E T Curriculum for the basic subject at master s level in IT and Cognition, the 2013 curriculum Adjusted 2014 Department

More information

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013 PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the

More information

Annual Goals for Math & Computer Science

Annual Goals for Math & Computer Science Annual Goals for Math & Computer Science 2010-2011 Gather student learning outcomes assessment data for the computer science major and begin to consider the implications of these data Goal - Gather student

More information

Research Overview in. Formal Method in Software Engineering Laboratory

Research Overview in. Formal Method in Software Engineering Laboratory Research Overview in Formal Method in Software Engineering Laboratory Head of Lab: Prof. Belawati H Widjaja, Ph.D Presented By: Dr. Ade Azurat Wednesday 21 January 2015 FMSE Workshop 2015 @ Fasilkom UI

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Course MS10975A Introduction to Programming. Length: 5 Days

Course MS10975A Introduction to Programming. Length: 5 Days 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS10975A Introduction to Programming Length: 5 Days

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

COMPUTER SCIENCE PROGRAM

COMPUTER SCIENCE PROGRAM COMPUTER SCIENCE PROGRAM Master of Science in Computer Science (M.S.C.S.) Degree DEGREE INFORMATION CONTACT INFORMATION Program Admission Deadlines: Fall: June 1February 15 Spring: October 15 Summer: No

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity

More information

Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation

Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation What is Segmentation and How Does it Apply to Website Traffic? Market segmentation, the practice of breaking down

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering

C. Wohlin and B. Regnell, Achieving Industrial Relevance in Software Engineering Education, Proceedings Conference on Software Engineering C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering Education & Training, pp. 16-25, New Orleans, Lousiana, USA,

More information

ELPUB Digital Library v2.0. Application of semantic web technologies

ELPUB Digital Library v2.0. Application of semantic web technologies ELPUB Digital Library v2.0 Application of semantic web technologies Anand BHATT a, and Bob MARTENS b a ABA-NET/Architexturez Imprints, New Delhi, India b Vienna University of Technology, Vienna, Austria

More information

PROGRAM LOGICS FOR CERTIFIED COMPILERS

PROGRAM LOGICS FOR CERTIFIED COMPILERS PROGRAM LOGICS FOR CERTIFIED COMPILERS Separation logic is the twenty-first-century variant of Hoare logic that permits verification of pointer-manipulating programs. This book covers practical and theoretical

More information

University of Cambridge: Programme Specifications MASTER OF PHILOSOPHY IN MODERN EUROPEAN HISTORY

University of Cambridge: Programme Specifications MASTER OF PHILOSOPHY IN MODERN EUROPEAN HISTORY University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information in this programme specification. Programme specifications are produced and then reviewed

More information

Elevate your Client Relationships by Solving the Channel Marketing Challenge

Elevate your Client Relationships by Solving the Channel Marketing Challenge CONTENT SYNDICATION E-COMMERCE BUSINESS INTEGRATION business integration BUSINESS INTELLIGENCE Elevate your Client Relationships by Solving the Channel Marketing Challenge For Consultants and Agencies

More information

Guidelines for Doctoral Programs in Business and Management

Guidelines for Doctoral Programs in Business and Management Guidelines for Doctoral Programs in Business and Management Version EIASM EDAMBA, September 15 th, 2015 Background to this document The EIASM and EDAMBA have long standing traditions and experiences with

More information

A Study on the Game Programming Education Based on Educational Game Engine at School

A Study on the Game Programming Education Based on Educational Game Engine at School Journal of Education and Learning; Vol. 1, No. 2; 2012 ISSN 1927-5250 E-ISSN 1927-5269 Published by Canadian Center of Science and Education A Study on the Game Programming Education Based on Educational

More information

Engineering of a Clinical Decision Support Framework for the Point of Care Use

Engineering of a Clinical Decision Support Framework for the Point of Care Use Engineering of a Clinical Decision Support Framework for the Point of Care Use Szymon Wilk, PhD 1, Wojtek Michalowski, PhD 1, Dympna O Sullivan, PhD 1, Ken Farion, MD 2, Stan Matwin, PhD 1 1 University

More information

What is Data Mining, and How is it Useful for Power Plant Optimization? (and How is it Different from DOE, CFD, Statistical Modeling)

What is Data Mining, and How is it Useful for Power Plant Optimization? (and How is it Different from DOE, CFD, Statistical Modeling) data analysis data mining quality control web-based analytics What is Data Mining, and How is it Useful for Power Plant Optimization? (and How is it Different from DOE, CFD, Statistical Modeling) StatSoft

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

LONG BEACH CITY COLLEGE MEMORANDUM

LONG BEACH CITY COLLEGE MEMORANDUM LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor

More information

An Automated Workflow System Geared Towards Consumer Goods and Services Companies

An Automated Workflow System Geared Towards Consumer Goods and Services Companies Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services

More information

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel

More information

Mining Social-Driven Data

Mining Social-Driven Data Mining Social-Driven Data Mikołaj Morzy, PhD Institute of Computing Science Faculty of Computing Science and Management Poznan University of Technology habilitation thesis submitted to Poznan University

More information

Social Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets

Social Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets Social Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets D7.5 Dissemination Plan Project ref. no H2020 141111 Project acronym Start date of project (dur.) Document due Date

More information

Information management software solutions White paper. Powerful data warehousing performance with IBM Red Brick Warehouse

Information management software solutions White paper. Powerful data warehousing performance with IBM Red Brick Warehouse Information management software solutions White paper Powerful data warehousing performance with IBM Red Brick Warehouse April 2004 Page 1 Contents 1 Data warehousing for the masses 2 Single step load

More information

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first

More information

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China

More information

Java Programming (10155)

Java Programming (10155) Java Programming (10155) Rationale Statement: The world is full of problems that need to be solved or that need a program to solve them faster. In computer, programming students will learn how to solve

More information

A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb

A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb Robert Manger, Goranka Nogo, Mladen Vuković Department of Mathematics, University of Zagreb Bijenička cesta 30, 10000

More information

Language-oriented Software Development and Rewriting Logic

Language-oriented Software Development and Rewriting Logic Language-oriented Software Development and Rewriting Logic Christiano Braga cbraga@ic.uff.br http://www.ic.uff.br/ cbraga Universidade Federal Fluminense (UFF) Language-oriented Software Development and

More information

Proving Hybrid Protocols Correct

Proving Hybrid Protocols Correct Proving Hybrid Protocols Correct Mark Bickford, Christoph Kreitz, Robbert van Renesse, Xiaoming Liu Department of Computer Science, Cornell University, Ithaca, NY, U.S.A. {markb,kreitz,rvr,xliu}@cs.cornell.edu

More information

Verification of Imperative Programs in Theorema

Verification of Imperative Programs in Theorema Verification of Imperative Programs in Theorema Laura Ildikó Kovács, Nikolaj Popov, Tudor Jebelean 1 Research Institute for Symbolic Computation, Johannes Kepler University, A-4040 Linz, Austria Institute

More information

Development (60 ЕCTS)

Development (60 ЕCTS) Study program Faculty Cycle Software and Application Development (60 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 60 Offered in Tetovo Description of the program The objectives of the

More information

Careers in Biostatistics and Clinical SAS Programming An Overview for the Uninitiated Justina M. Flavin, Independent Consultant, San Diego, CA

Careers in Biostatistics and Clinical SAS Programming An Overview for the Uninitiated Justina M. Flavin, Independent Consultant, San Diego, CA PharmaSUG 2014 Paper CP07 Careers in Biostatistics and Clinical SAS Programming An Overview for the Uninitiated Justina M. Flavin, Independent Consultant, San Diego, CA ABSTRACT In the biopharmaceutical

More information

Final Assessment Report of the Review of the Cognitive Science Program (Option) July 2013

Final Assessment Report of the Review of the Cognitive Science Program (Option) July 2013 Final Assessment Report of the Review of the Cognitive Science Program (Option) July 2013 Review Process This is the second program review of the Cognitive Science Option. The Cognitive Science Program

More information

Graduate Handbook Department of Computer Science College of Engineering University of Wyoming

Graduate Handbook Department of Computer Science College of Engineering University of Wyoming Graduate Handbook Department of Computer Science College of Engineering University of Wyoming Draft of September 29, 2005 c Dept. of Computer Science, University of Wyoming, 2005 ALL RIGHTS RESERVED Contents

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Data Quality Improvement and the Open Mapping Tools

Data Quality Improvement and the Open Mapping Tools Improving Data Quality with Open Mapping Tools February 2011 Robert Worden Open Mapping Software Ltd 2011 Open Mapping Software Contents 1. Introduction: The Business Problem 2 2. Initial Assessment: Understanding

More information

Experiences with Online Programming Examinations

Experiences with Online Programming Examinations Experiences with Online Programming Examinations Monica Farrow and Peter King School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh EH14 4AS Abstract An online programming examination

More information

The University of Jordan

The University of Jordan The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S

More information

Customer Case Study. Sharethrough

Customer Case Study. Sharethrough Customer Case Study Customer Case Study Benefits Faster prototyping of new applications Easier debugging of complex pipelines Improved overall engineering team productivity Summary offers a robust advertising

More information

Kentucky Lung Cancer Research Program. 2010 Strategic Plan Update

Kentucky Lung Cancer Research Program. 2010 Strategic Plan Update Kentucky Lung Cancer Research Program 2010 Strategic Plan Update Approved by the KLCR Program Governance Board August 12, 2009 KLCR Program Strategic Plan Table of Contents Introduction... 3 GOAL 1: Investigator-Initiated

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

Data Warehousing: A Moderated Panel Discussion

Data Warehousing: A Moderated Panel Discussion Data Warehousing: A Moderated Panel Discussion Summary of discussion Moderator: Robin Way, NW Natural, Portland OR Introduction Rationale The Data Warehousing panel represents a new session format for

More information

Efficient Collection and Analysis of Program Data - Hackystat

Efficient Collection and Analysis of Program Data - Hackystat You can t even ask them to push a button: Toward ubiquitous, developer-centric, empirical software engineering Philip Johnson Department of Information and Computer Sciences University of Hawaii Honolulu,

More information

First Choice Graduate Program Report. Department of Political Science Master of Science in Political Science College of Sciences

First Choice Graduate Program Report. Department of Political Science Master of Science in Political Science College of Sciences First Choice Graduate Program Report Department of Political Science Master of Science in Political Science College of Sciences May 7, 2009 Part 1 Program Team & Review Board First Choice Graduate Program

More information

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University 590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran

More information

connect.munichre Munich Re s exclusive client portal your success is our business

connect.munichre Munich Re s exclusive client portal your success is our business connect.munichre Munich Re s exclusive client portal your success is our business Welcome to a new way of working: connect.munichre a safe space to develop yourself and your business, optimise your processes,

More information

Functional Programming. Functional Programming Languages. Chapter 14. Introduction

Functional Programming. Functional Programming Languages. Chapter 14. Introduction Functional Programming Languages Chapter 14 Introduction Functional programming paradigm History Features and concepts Examples: Lisp ML 1 2 Functional Programming Functional Programming Languages The

More information

Curriculum Vitae (CV)

Curriculum Vitae (CV) Curriculum Vitae (CV) 937.229.2045 careers_support@notes.udayton.edu careers.udayton.edu Alumni House Graduate students earning master's degrees go about the job search in a very similar manner to a student

More information

US Federal Cyber Security Research Program. NITRD Program

US Federal Cyber Security Research Program. NITRD Program US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

More information

ISSUES IN RULE BASED KNOWLEDGE DISCOVERING PROCESS

ISSUES IN RULE BASED KNOWLEDGE DISCOVERING PROCESS Advances and Applications in Statistical Sciences Proceedings of The IV Meeting on Dynamics of Social and Economic Systems Volume 2, Issue 2, 2010, Pages 303-314 2010 Mili Publications ISSUES IN RULE BASED

More information

MAP-I Programa Doutoral em Informática. Rigorous Software Development

MAP-I Programa Doutoral em Informática. Rigorous Software Development MAP-I Programa Doutoral em Informática Rigorous Software Development Unidade Curricular em Teoria e Fundamentos Theory and Foundations (UCTF) DI-UM, DCC-FCUP May, 2012 Abstract This text presents a UCTF

More information

The CS Principles Project 1

The CS Principles Project 1 The CS Principles Project 1 Owen Astrachan, Duke University Amy Briggs, Middlebury College Abstract The Computer Science Principles project is part of a national effort to reach a wide and diverse audience

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

MiddleWare for Sensor Systems keeping things Open

MiddleWare for Sensor Systems keeping things Open MiddleWare for Sensor Systems keeping things Open Ken Moody Computer Laboratory, University of Cambridge 1 Overview of the talk the Opera group and what we do - past and present activities why we're at

More information

Software Engineering Transfer Degree

Software Engineering Transfer Degree www.capspace.org (01/17/2015) Software Engineering Transfer Degree This program of study is designed for associate-degree students intending to transfer into baccalaureate programs awarding software engineering

More information

INSTRUCTIONAL STRATEGY IN THE TEACHING OF COMPUTER PROGRAMMING: A NEED ASSESSMENT ANALYSES

INSTRUCTIONAL STRATEGY IN THE TEACHING OF COMPUTER PROGRAMMING: A NEED ASSESSMENT ANALYSES INSTRUCTIONAL STRATEGY IN THE TEACHING OF COMPUTER PROGRAMMING: A NEED ASSESSMENT ANALYSES Mohd Nasir ISMAIL, 1 Nor Azilah NGAH, 2 Irfan Naufal UMAR Faculty of Information Management Universiti Teknologi

More information

A common interface for multi-rule-engine distributed systems

A common interface for multi-rule-engine distributed systems A common interface for multi-rule-engine distributed systems Pierre de Leusse, Bartosz Kwolek and Krzysztof Zieliński Distributed System Research Group, AGH University of Science and Technology Krakow,

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Arts, Humanities and Social Science Faculty

Arts, Humanities and Social Science Faculty LLB Law For students entering Part 1 in 2011/2 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification: Programme Director:

More information

Models of Dissertation Research in Design

Models of Dissertation Research in Design Models of Dissertation Research in Design S. Poggenpohl Illinois Institute of Technology, USA K. Sato Illinois Institute of Technology, USA Abstract This paper is a meta-level reflection of actual experience

More information

INTERBUSSINES ACADEMY LTD. Business Administration. Bachelor's Program

INTERBUSSINES ACADEMY LTD. Business Administration. Bachelor's Program INTERBUSSINES ACADEMY LTD Business Administration Bachelor's Program Tbilisi 2014 Program name business administration Direction: 02 business administration Educational program Type/Model academic/major

More information

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,

More information

Anne Karle-Zenith, Special Projects Librarian, University of Michigan University Library

Anne Karle-Zenith, Special Projects Librarian, University of Michigan University Library Google Book Search and The University of Michigan Anne Karle-Zenith, Special Projects Librarian, University of Michigan University Library 818 Harlan Hatcher Graduate Library Ann Arbor, MI 48103-1205 Email:

More information

Oxford University - A Centre of Excellence in Research and Teaching

Oxford University - A Centre of Excellence in Research and Teaching University of Oxford Department of Computer Science Job description and selection criteria Job title Division Department Location Grade and salary Hours Contract type Reporting to Researcher in Quality-Centric

More information

Content Analyst's Cerebrant Combines SaaS Discovery, Machine Learning, and Content to Perform Next-Generation Research

Content Analyst's Cerebrant Combines SaaS Discovery, Machine Learning, and Content to Perform Next-Generation Research INSIGHT Content Analyst's Cerebrant Combines SaaS Discovery, Machine Learning, and Content to Perform Next-Generation Research David Schubmehl IDC OPINION Organizations are looking for better ways to perform

More information

What is Modeling and Simulation and Software Engineering?

What is Modeling and Simulation and Software Engineering? What is Modeling and Simulation and Software Engineering? V. Sundararajan Scientific and Engineering Computing Group Centre for Development of Advanced Computing Pune 411 007 vsundar@cdac.in Definitions

More information

11 Tips to make the requirements definition process more effective and results more usable

11 Tips to make the requirements definition process more effective and results more usable 1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to

More information

2.1 The RAD life cycle composes of four stages:

2.1 The RAD life cycle composes of four stages: 2.1 The RAD life cycle composes of four stages: A typical RAD life cycle is composed of the following Stages 2.1.1. Requirements Planning; 2.1.2 User Design; 2.1.3 Rapid Construction; 2.1.4 Transition.

More information

Maturity, motivation and effective learning in projects - benefits from using industrial clients

Maturity, motivation and effective learning in projects - benefits from using industrial clients Maturity, motivation and effective learning in projects - benefits from using industrial clients C Johansson Ericsson Software Technology AB/University of Karlskrona/Ronneby P Molin University of Karlskrona/Ronneby,

More information

What is Artificial Intelligence?

What is Artificial Intelligence? CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is

More information

MASTER of PHILOSOPHY in MODERN EUROPEAN HISTORY

MASTER of PHILOSOPHY in MODERN EUROPEAN HISTORY University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information contained in this programme specification. At the time of publication, the programme

More information

CURRICULUM VITAE. Oct 2005 Dec 2008. MSc in Computer Science. Faculty of Mathematics,

CURRICULUM VITAE. Oct 2005 Dec 2008. MSc in Computer Science. Faculty of Mathematics, CURRICULUM VITAE Mladen Nikolić University of Belgrade Faculty of Mathematics Studentski Trg 16 11000 Belgrade Serbia e-mail: nikolic@matf.bg.ac.rs URL: http://www.matf.bg.ac.rs/ nikolic 1 Education Oct

More information

The data forest. Application. Application Application DATA. Office of Research

The data forest. Application. Application Application DATA. Office of Research The data forest DATA Unfortunately Data to the rescue The Rensselaer IDEA HPC: Computational Science and Engineering + Data Science and Predictive Analytics + Cognitive Computing + Perceptualization DATA

More information

Requirements Engineering: Elicitation Techniques

Requirements Engineering: Elicitation Techniques 2008:PR003 Requirements Engineering: Elicitation Techniques Sai Ganesh. Gunda Source:http://www.marcocioffi.com/archives/2005/04/requirements-engineering/ MASTER S THESIS Software Engineering, 2008 Department

More information

Writing in the Computer Science Major

Writing in the Computer Science Major Writing in the Computer Science Major Table of Contents Introduction... 2 Statement of Purpose... 2 Revision History... 2 Writing Tasks in Computer Science... 3 Documentation... 3 Planning to Program:

More information