Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics
|
|
- Pauline Preston
- 8 years ago
- Views:
Transcription
1 Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics Robert L. Constable Cornell University February 2003 Project Web Page Libraries.html Accomplishments since the May 2002 Project Review 1. Further Design of the Prototype Formal Digital Library (FDL) Stuart Allen has written a key technical article on the notion of abstract object identifiers and certificates and a substantial companion design document. The technical article has been submitted for publication, and the design documents are a blueprint for our on-going work. These articles are highly original and conceptual, and the ideas developed in them are essential to a sound FDL. Stuart s treatment of every topic breaks new ground, and we have had to spend time to educate the project and publish ideas to elicit feedback. We have been exploring the use of reflection based on the term structure of the FDL. We can now demonstrate a result that will hold in all of the theories that we connect. It is a result critical to Tarski s theorem. It represents a significant improvement in a logical treatment of reflection made possible by computer support. 2. Software Expanding the Formal Digital Library (FDL) Prototype 1
2 We have added Library navigation functions and documented them. This entails a great deal of programming and technical writing. The extension to the FDL represents nearly 1,000 person hours of work. Linking Nuprl 5, Nuprl 4, MetaPRL, and PVS to the FDL We have spent many programmer hours linking these provers to the Library. 3. Adding content to the FDL We have added new content in two areas, both essential. First, we are developing new material that is directly relevant to software infrastructure protection, namely protocol verification, system security, and basic formal data structures. Second, we are incorporating PVS material into the Library. Critical infrastructure protection of software Our approach to this area is unique and important; together we can point this out to OSD. The basic argument is that verification tools will be vastly more useful if they have access to large knowledge bases. Moreover, the latest DARPA thrust in intelligent networks will require the knowledge base that we will assemble. We know the importance of digital knowledge bases from research in AI, namely, intelligent systems need access to large amounts of knowledge. We also know it from our work with protocol verification. Once we established a large knowledge base in distributed systems, we could verify protocol designs as fast as the systems people could produce them. The investigations we are conducting now are modeled after the research program we pursued with ONR funding in 1990 s for the investigation of correct-by-construction functional programming with Nuprl. The area created with NSF and ONR funding is still very active and is having a significant impact spawning related research programs and systems and eventually leading to a decade long period of practical work supported by DARPA. The Nuprl book from 1986 remains among the top twenty five most cited documents on the Web according to Citeseer, and the current Nuprl Web page brings that book up to date. There are many lines of theoretical work that can be traced back to this earlier project, including the solution of two open problems in theoretical computer science and mathematic (Howe and Murthy) and the creation of closely related proof development systems, such as Alf, Coq, Lego and MetaPRL, and many significant practical re- 2
3 sults in both industry and government. Dozens of PhD theses have been written on this topic along with hundreds of articles and reports. We believe that the research agenda we are proposing now has the same or greater potential to produce strong practical applications and unexpected discoveries over another twenty year period. In addition, we have picked a topic on which there is common interest with the Naval Research Laboratory protocol verification using IO automata and protocol synthesis. Also Jason s popular expository writing about O Caml spreads our formally grounded writing ideas to a wide audience. We have developed a new capability to extract distributed systems from constructive proofs that specified behaviors are achievable. In some sense this solves a problem that has been under investigation by many researchers since It will have a significant impact on our ability to create reliable and secure software, and it depends vitally on a large formal digital library of the kind we are building. Accumulating content from multiple provers Jason s work on a formal O Caml compiler developed inside MetaPRL is highly original and complements our formal O Caml semantics. We have imported PVS proofs into the FDL. We did this instead of posting the O Caml semantics to the Web because as you noted, we are burning researcher cycles as fast as we can and still have a large stack of subgoals awaiting attention. Our ability to replay and import PVS proofs extends our PVS capability considerably. We have written a CADE paper on this. The import required a substantial amount of programming and experimentation, again hundreds of hours. We are working on posting this material to the Web. 4. Presenting FDL content on the Web The ability to display formal content on the Web has proven to be important to advertising the project. Thus it has taken on a higher priority with me and you than the technology now supports when applied to massive content from multiple systems. Progress has been slow against hard technical problems. We are writing internal notes about the mechanisms and problems and discussing them in our research meetings and seminars. There are serious problems of scale as we try to deal with tens of thousands of objects. 3
4 Presenting PVS proofs on the Web at the same quality level of Nuprl and MetaPRL proofs is an additional technical challenge and requires us to extend Stuart s tools still further. 5. Engaging with a Community Our discussions with people at the review and with you suggested the importance of identifying a community on which we can have a significant impact. We are committed to at least one such community, Mathematical Knowledge Management (MKM). In June 2002 I gave an invited talk at the first meeting of the North American branch, NA-MKM. This talk is posted at the project home page. Jim Caldwell is engaged with the European MKM which has ties to the North American branch, and I will meet some of the leaders in July We will also look to identify a second community that complements the first. At the North American MKM meeting that we attended en mass, this was one of the liveliest topics. We have remained in contact with the North American and European leaders of this group. I expect that we will host a meeting of the North American group next year if they are willing, and we might ask to use some of our ONR funds to help organize. A related effort in which we also participate is QPQ (QED Pro Quo), a repository of open source deductive software. I am on the Advisory Board. As part of community building, I have given technical lectures on the FDL at these places: North American Mathematical Knowledge Management meeting in Hamilton Ontario. Automath meeting at Harriot-Watt University in Edinburgh University of Reading, England Ben-Gurion University, Israel I will be lecturing on the topic at the Marktoberdorf Summer School in July 2003 and at an ICALP workshop. 4
5 6. Personnel Cornell CalTech Wyoming Stuart Allen Jason Hickey James Caldwell Robert Constable Aleksey Nogin Vitali Khaikine Christoph Kreitz Xin Yu John Cowles Richard Eaton Lori Lorigo Eli Barzilay 7. Publications We list fourteen publications on the project Web page (including the FDL manual). There will also be two PhD theses, one from August 2002 and one from August This is a very high publication rate given the amount of software and formal mathematical content we produce as well. Among the most significant papers are these. (a) Abstract Identifiers and Textual Reference (2002) (b) Notes on the Design and Purpose of the FDL (2002) (c) Logic of Events (2003) (d) Nuprl-PVS Connection: Integrating Libraries of Formal Mathematics (2002) (e) eflecting Higher-Order Abstract Syntax in Nuprl (2002) (f) Sequent Schema for Derived Rules (2002) (g) Theory and Implementation of an Efficient Tactic-Based Logical Framework (2002) Paper (a) lays the foundations for a multi-logic library of formalized computational mathematics and computer science. It discusses an issue that many people have not discovered as critical to such a system, namely the need for abstract treatment of the name space. Paper (b) translates the ideas of (a) into FDL design decisions. Paper (c) shows the value of this work to one the problem of building secure-by-construction distributed system software. This is a core problem in CIP/SW. Cornell has another MURI in the area, on language based security. Our work is important to that MURI as well. We make a direct connection between the FDL and the creation of secure code. 5
6 Paper (d) discusses some of the early issues discovered as we imported PVS into the FDL. The PVS prover creates a great deal of formal mathematics, and some of it is useful in algorithm construction; but the PVS prover is based on an entirely different logic than what is used in Alf, Nuprl, and Coq, the provers for computational mathematics. We are showing how to incorporate two very different logics into the FDL. This will increase its value considerably. It is a very hard logical and software engineering problem. Paper (e) deals with the problem of reflecting formal logics. This capability is widely recognized as important in practice, but it is extremely complex and has not been fully deployed in any prover. We proposed using insights from computational mathematics to simplify the task. A thesis is being written on this topic. Its results will apply to all logics of the FDL. Papers (f) and (g) describe the mechanisms of MetaPRL on derived rules which will benefit all implemented formal logics. 6
Progress Report: Building Interactive Digital Libraries of Formal Algorithmic Knowledge Project Overview
Progress Report: Building Interactive Digital Libraries of Formal Algorithmic Knowledge Project Overview Robert L. Constable Cornell James Caldwell Wyoming Jason Hickey Cal Tech 1 Outline The DoD URI BAA
More informationSystem Description: The MathWeb Software Bus for Distributed Mathematical Reasoning
System Description: The MathWeb Software Bus for Distributed Mathematical Reasoning Jürgen Zimmer 1 and Michael Kohlhase 2 1 FB Informatik, Universität des Saarlandes jzimmer@mathweb.org 2 School of Computer
More informationShadowDB: A Replicated Database on a Synthesized Consensus Core
ShadowDB: A Replicated Database on a Synthesized Consensus Core Nicolas Schiper, Vincent Rahli, Robbert Van Renesse, Mark Bickford, and Robert L. Constable Cornell University Abstract This paper describes
More informationMasters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
More informationUsing the Computer to Prove the Correctness of Programs p.1/12
Using the Computer to Prove the Correctness of Programs Bengt Nordström bengt@cs.chalmers.se ChungAng University on leave from Chalmers University, Göteborg, Sweden Using the Computer to Prove the Correctness
More informationThe CompCert verified C compiler
The CompCert verified C compiler Compiler built and proved by Xavier Leroy et al. Talk given by David Pichardie - Harvard University / INRIA Rennes Slides largely inspired by Xavier Leroy own material
More informationIntroducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
More informationLOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
More informationFACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES
FACULTY OF CONTEMPORARY SCIENCES AND TECHNOLOGIES STUDY PROGRAMME FOR POSTGRADUATE STUDIES (Master of Science) NAME OF THE PROGRAMME: BUSINESS INFORMATICS STUDIES 262 PROGRAMME DESCRIPTION Business Informatics
More informationAutomated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
More informationTelecommunication (120 ЕCTS)
Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study
More informationVerifying security protocols using theorem provers
1562 2007 79-86 79 Verifying security protocols using theorem provers Miki Tanaka National Institute of Information and Communications Technology Koganei, Tokyo 184-8795, Japan Email: miki.tanaka@nict.go.jp
More informationBrigitte Pientka. Programming Languages, Verification, Automated Theorem Proving, Logical Frameworks, Logic, Type Theory, Logic Programming
Brigitte Pientka Department of Computer Science 5552 Beacon St #22 Pittsburgh, PA 15213-3891 Pittsburgh, PA 15217 (412) 268 3076 (412) 422 0621 e-mail: bp@cs.cmu.edu http://www.cs.cmu.edu/ bp Research
More informationCurriculum for the basic subject at master s level in. IT and Cognition, the 2013 curriculum. Adjusted 2014
D E T H U M A N I S T I S K E F A K U L T E T K Ø B E N H A V N S U N I V E R S I T E T Curriculum for the basic subject at master s level in IT and Cognition, the 2013 curriculum Adjusted 2014 Department
More information3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013
PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the
More informationAnnual Goals for Math & Computer Science
Annual Goals for Math & Computer Science 2010-2011 Gather student learning outcomes assessment data for the computer science major and begin to consider the implications of these data Goal - Gather student
More informationResearch Overview in. Formal Method in Software Engineering Laboratory
Research Overview in Formal Method in Software Engineering Laboratory Head of Lab: Prof. Belawati H Widjaja, Ph.D Presented By: Dr. Ade Azurat Wednesday 21 January 2015 FMSE Workshop 2015 @ Fasilkom UI
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationCourse MS10975A Introduction to Programming. Length: 5 Days
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS10975A Introduction to Programming Length: 5 Days
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationAdversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
More informationSchool of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
More informationCOMPUTER SCIENCE PROGRAM
COMPUTER SCIENCE PROGRAM Master of Science in Computer Science (M.S.C.S.) Degree DEGREE INFORMATION CONTACT INFORMATION Program Admission Deadlines: Fall: June 1February 15 Spring: October 15 Summer: No
More informationSpecification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationTap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation
Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation What is Segmentation and How Does it Apply to Website Traffic? Market segmentation, the practice of breaking down
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationC. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering
C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering Education & Training, pp. 16-25, New Orleans, Lousiana, USA,
More informationELPUB Digital Library v2.0. Application of semantic web technologies
ELPUB Digital Library v2.0 Application of semantic web technologies Anand BHATT a, and Bob MARTENS b a ABA-NET/Architexturez Imprints, New Delhi, India b Vienna University of Technology, Vienna, Austria
More informationPROGRAM LOGICS FOR CERTIFIED COMPILERS
PROGRAM LOGICS FOR CERTIFIED COMPILERS Separation logic is the twenty-first-century variant of Hoare logic that permits verification of pointer-manipulating programs. This book covers practical and theoretical
More informationUniversity of Cambridge: Programme Specifications MASTER OF PHILOSOPHY IN MODERN EUROPEAN HISTORY
University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information in this programme specification. Programme specifications are produced and then reviewed
More informationElevate your Client Relationships by Solving the Channel Marketing Challenge
CONTENT SYNDICATION E-COMMERCE BUSINESS INTEGRATION business integration BUSINESS INTELLIGENCE Elevate your Client Relationships by Solving the Channel Marketing Challenge For Consultants and Agencies
More informationGuidelines for Doctoral Programs in Business and Management
Guidelines for Doctoral Programs in Business and Management Version EIASM EDAMBA, September 15 th, 2015 Background to this document The EIASM and EDAMBA have long standing traditions and experiences with
More informationA Study on the Game Programming Education Based on Educational Game Engine at School
Journal of Education and Learning; Vol. 1, No. 2; 2012 ISSN 1927-5250 E-ISSN 1927-5269 Published by Canadian Center of Science and Education A Study on the Game Programming Education Based on Educational
More informationEngineering of a Clinical Decision Support Framework for the Point of Care Use
Engineering of a Clinical Decision Support Framework for the Point of Care Use Szymon Wilk, PhD 1, Wojtek Michalowski, PhD 1, Dympna O Sullivan, PhD 1, Ken Farion, MD 2, Stan Matwin, PhD 1 1 University
More informationWhat is Data Mining, and How is it Useful for Power Plant Optimization? (and How is it Different from DOE, CFD, Statistical Modeling)
data analysis data mining quality control web-based analytics What is Data Mining, and How is it Useful for Power Plant Optimization? (and How is it Different from DOE, CFD, Statistical Modeling) StatSoft
More informationSchool of Computer Science
School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human
More informationLONG BEACH CITY COLLEGE MEMORANDUM
LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor
More informationAn Automated Workflow System Geared Towards Consumer Goods and Services Companies
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services
More informationICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001
ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel
More informationMining Social-Driven Data
Mining Social-Driven Data Mikołaj Morzy, PhD Institute of Computing Science Faculty of Computing Science and Management Poznan University of Technology habilitation thesis submitted to Poznan University
More informationSocial Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets
Social Semantic Emotion Analysis for Innovative Multilingual Big Data Analytics Markets D7.5 Dissemination Plan Project ref. no H2020 141111 Project acronym Start date of project (dur.) Document due Date
More informationInformation management software solutions White paper. Powerful data warehousing performance with IBM Red Brick Warehouse
Information management software solutions White paper Powerful data warehousing performance with IBM Red Brick Warehouse April 2004 Page 1 Contents 1 Data warehousing for the masses 2 Single step load
More informationHow In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
More informationThe Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course
The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China
More informationJava Programming (10155)
Java Programming (10155) Rationale Statement: The world is full of problems that need to be solved or that need a program to solve them faster. In computer, programming students will learn how to solve
More informationA New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb
A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb Robert Manger, Goranka Nogo, Mladen Vuković Department of Mathematics, University of Zagreb Bijenička cesta 30, 10000
More informationLanguage-oriented Software Development and Rewriting Logic
Language-oriented Software Development and Rewriting Logic Christiano Braga cbraga@ic.uff.br http://www.ic.uff.br/ cbraga Universidade Federal Fluminense (UFF) Language-oriented Software Development and
More informationProving Hybrid Protocols Correct
Proving Hybrid Protocols Correct Mark Bickford, Christoph Kreitz, Robbert van Renesse, Xiaoming Liu Department of Computer Science, Cornell University, Ithaca, NY, U.S.A. {markb,kreitz,rvr,xliu}@cs.cornell.edu
More informationVerification of Imperative Programs in Theorema
Verification of Imperative Programs in Theorema Laura Ildikó Kovács, Nikolaj Popov, Tudor Jebelean 1 Research Institute for Symbolic Computation, Johannes Kepler University, A-4040 Linz, Austria Institute
More informationDevelopment (60 ЕCTS)
Study program Faculty Cycle Software and Application Development (60 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 60 Offered in Tetovo Description of the program The objectives of the
More informationCareers in Biostatistics and Clinical SAS Programming An Overview for the Uninitiated Justina M. Flavin, Independent Consultant, San Diego, CA
PharmaSUG 2014 Paper CP07 Careers in Biostatistics and Clinical SAS Programming An Overview for the Uninitiated Justina M. Flavin, Independent Consultant, San Diego, CA ABSTRACT In the biopharmaceutical
More informationFinal Assessment Report of the Review of the Cognitive Science Program (Option) July 2013
Final Assessment Report of the Review of the Cognitive Science Program (Option) July 2013 Review Process This is the second program review of the Cognitive Science Option. The Cognitive Science Program
More informationGraduate Handbook Department of Computer Science College of Engineering University of Wyoming
Graduate Handbook Department of Computer Science College of Engineering University of Wyoming Draft of September 29, 2005 c Dept. of Computer Science, University of Wyoming, 2005 ALL RIGHTS RESERVED Contents
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationData Quality Improvement and the Open Mapping Tools
Improving Data Quality with Open Mapping Tools February 2011 Robert Worden Open Mapping Software Ltd 2011 Open Mapping Software Contents 1. Introduction: The Business Problem 2 2. Initial Assessment: Understanding
More informationExperiences with Online Programming Examinations
Experiences with Online Programming Examinations Monica Farrow and Peter King School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh EH14 4AS Abstract An online programming examination
More informationThe University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
More informationCustomer Case Study. Sharethrough
Customer Case Study Customer Case Study Benefits Faster prototyping of new applications Easier debugging of complex pipelines Improved overall engineering team productivity Summary offers a robust advertising
More informationKentucky Lung Cancer Research Program. 2010 Strategic Plan Update
Kentucky Lung Cancer Research Program 2010 Strategic Plan Update Approved by the KLCR Program Governance Board August 12, 2009 KLCR Program Strategic Plan Table of Contents Introduction... 3 GOAL 1: Investigator-Initiated
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
More informationData Warehousing: A Moderated Panel Discussion
Data Warehousing: A Moderated Panel Discussion Summary of discussion Moderator: Robin Way, NW Natural, Portland OR Introduction Rationale The Data Warehousing panel represents a new session format for
More informationEfficient Collection and Analysis of Program Data - Hackystat
You can t even ask them to push a button: Toward ubiquitous, developer-centric, empirical software engineering Philip Johnson Department of Information and Computer Sciences University of Hawaii Honolulu,
More informationFirst Choice Graduate Program Report. Department of Political Science Master of Science in Political Science College of Sciences
First Choice Graduate Program Report Department of Political Science Master of Science in Political Science College of Sciences May 7, 2009 Part 1 Program Team & Review Board First Choice Graduate Program
More informationAnalysis of Data Mining Concepts in Higher Education with Needs to Najran University
590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran
More informationconnect.munichre Munich Re s exclusive client portal your success is our business
connect.munichre Munich Re s exclusive client portal your success is our business Welcome to a new way of working: connect.munichre a safe space to develop yourself and your business, optimise your processes,
More informationFunctional Programming. Functional Programming Languages. Chapter 14. Introduction
Functional Programming Languages Chapter 14 Introduction Functional programming paradigm History Features and concepts Examples: Lisp ML 1 2 Functional Programming Functional Programming Languages The
More informationCurriculum Vitae (CV)
Curriculum Vitae (CV) 937.229.2045 careers_support@notes.udayton.edu careers.udayton.edu Alumni House Graduate students earning master's degrees go about the job search in a very similar manner to a student
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationISSUES IN RULE BASED KNOWLEDGE DISCOVERING PROCESS
Advances and Applications in Statistical Sciences Proceedings of The IV Meeting on Dynamics of Social and Economic Systems Volume 2, Issue 2, 2010, Pages 303-314 2010 Mili Publications ISSUES IN RULE BASED
More informationMAP-I Programa Doutoral em Informática. Rigorous Software Development
MAP-I Programa Doutoral em Informática Rigorous Software Development Unidade Curricular em Teoria e Fundamentos Theory and Foundations (UCTF) DI-UM, DCC-FCUP May, 2012 Abstract This text presents a UCTF
More informationThe CS Principles Project 1
The CS Principles Project 1 Owen Astrachan, Duke University Amy Briggs, Middlebury College Abstract The Computer Science Principles project is part of a national effort to reach a wide and diverse audience
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationMiddleWare for Sensor Systems keeping things Open
MiddleWare for Sensor Systems keeping things Open Ken Moody Computer Laboratory, University of Cambridge 1 Overview of the talk the Opera group and what we do - past and present activities why we're at
More informationSoftware Engineering Transfer Degree
www.capspace.org (01/17/2015) Software Engineering Transfer Degree This program of study is designed for associate-degree students intending to transfer into baccalaureate programs awarding software engineering
More informationINSTRUCTIONAL STRATEGY IN THE TEACHING OF COMPUTER PROGRAMMING: A NEED ASSESSMENT ANALYSES
INSTRUCTIONAL STRATEGY IN THE TEACHING OF COMPUTER PROGRAMMING: A NEED ASSESSMENT ANALYSES Mohd Nasir ISMAIL, 1 Nor Azilah NGAH, 2 Irfan Naufal UMAR Faculty of Information Management Universiti Teknologi
More informationA common interface for multi-rule-engine distributed systems
A common interface for multi-rule-engine distributed systems Pierre de Leusse, Bartosz Kwolek and Krzysztof Zieliński Distributed System Research Group, AGH University of Science and Technology Krakow,
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationArts, Humanities and Social Science Faculty
LLB Law For students entering Part 1 in 2011/2 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification: Programme Director:
More informationModels of Dissertation Research in Design
Models of Dissertation Research in Design S. Poggenpohl Illinois Institute of Technology, USA K. Sato Illinois Institute of Technology, USA Abstract This paper is a meta-level reflection of actual experience
More informationINTERBUSSINES ACADEMY LTD. Business Administration. Bachelor's Program
INTERBUSSINES ACADEMY LTD Business Administration Bachelor's Program Tbilisi 2014 Program name business administration Direction: 02 business administration Educational program Type/Model academic/major
More informationPANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA
PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,
More informationAnne Karle-Zenith, Special Projects Librarian, University of Michigan University Library
Google Book Search and The University of Michigan Anne Karle-Zenith, Special Projects Librarian, University of Michigan University Library 818 Harlan Hatcher Graduate Library Ann Arbor, MI 48103-1205 Email:
More informationOxford University - A Centre of Excellence in Research and Teaching
University of Oxford Department of Computer Science Job description and selection criteria Job title Division Department Location Grade and salary Hours Contract type Reporting to Researcher in Quality-Centric
More informationContent Analyst's Cerebrant Combines SaaS Discovery, Machine Learning, and Content to Perform Next-Generation Research
INSIGHT Content Analyst's Cerebrant Combines SaaS Discovery, Machine Learning, and Content to Perform Next-Generation Research David Schubmehl IDC OPINION Organizations are looking for better ways to perform
More informationWhat is Modeling and Simulation and Software Engineering?
What is Modeling and Simulation and Software Engineering? V. Sundararajan Scientific and Engineering Computing Group Centre for Development of Advanced Computing Pune 411 007 vsundar@cdac.in Definitions
More information11 Tips to make the requirements definition process more effective and results more usable
1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to
More information2.1 The RAD life cycle composes of four stages:
2.1 The RAD life cycle composes of four stages: A typical RAD life cycle is composed of the following Stages 2.1.1. Requirements Planning; 2.1.2 User Design; 2.1.3 Rapid Construction; 2.1.4 Transition.
More informationMaturity, motivation and effective learning in projects - benefits from using industrial clients
Maturity, motivation and effective learning in projects - benefits from using industrial clients C Johansson Ericsson Software Technology AB/University of Karlskrona/Ronneby P Molin University of Karlskrona/Ronneby,
More informationWhat is Artificial Intelligence?
CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is
More informationMASTER of PHILOSOPHY in MODERN EUROPEAN HISTORY
University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information contained in this programme specification. At the time of publication, the programme
More informationCURRICULUM VITAE. Oct 2005 Dec 2008. MSc in Computer Science. Faculty of Mathematics,
CURRICULUM VITAE Mladen Nikolić University of Belgrade Faculty of Mathematics Studentski Trg 16 11000 Belgrade Serbia e-mail: nikolic@matf.bg.ac.rs URL: http://www.matf.bg.ac.rs/ nikolic 1 Education Oct
More informationThe data forest. Application. Application Application DATA. Office of Research
The data forest DATA Unfortunately Data to the rescue The Rensselaer IDEA HPC: Computational Science and Engineering + Data Science and Predictive Analytics + Cognitive Computing + Perceptualization DATA
More informationRequirements Engineering: Elicitation Techniques
2008:PR003 Requirements Engineering: Elicitation Techniques Sai Ganesh. Gunda Source:http://www.marcocioffi.com/archives/2005/04/requirements-engineering/ MASTER S THESIS Software Engineering, 2008 Department
More informationWriting in the Computer Science Major
Writing in the Computer Science Major Table of Contents Introduction... 2 Statement of Purpose... 2 Revision History... 2 Writing Tasks in Computer Science... 3 Documentation... 3 Planning to Program:
More information