Towards Next Generation Secure DDDAS/Infosymbiotics Systems

Size: px
Start display at page:

Download "Towards Next Generation Secure DDDAS/Infosymbiotics Systems"

Transcription

1 ICCS 2015, Reykjavik, Iceland June 2015 Towards Next Generation Secure DDDAS/Infosymbiotics Systems Li Xiong and Vaidy Sunderam Students: Layla Pournajaf, Daniel Garcia-Ulloa, Xiaofeng Xu Dept. of Math and Computer Science Emory University AFOSR DDDAS FA

2 DDDAS as a Unifying Paradigm Ability to dynamically integrate generated data into an application; feedback loop to steer measurement Acquisition measurements, streams, databases Assimilation preprocessing, aggregation, fusion Analytics simulations, decisions, knowledge discovery Action incorporate new results, feedback to above Platforms & Domains Internet of Things (IoT), Smart(er) Systems Physical, chemical, biological, engineering, weather Medical, health, transport, infrastructure, military, disaster Trends: InfoSymbiotics Big data and Big computing Evolution: ubiquitous sensing/informatics/multimodal

3 From the Sensor-Scale to the Exa-Scale Hierarchical DDDAS Devices Embedded devices Sensors UAV/UGV Participants Regional/Central HPC Clusters Exascale machines Data/knowledge bases Networking

4 Multilevel DDDAS Systems End-to-end data/compute/control flow & interaction *Original figure due to Dr. Frederica Darema

5 Next Generation DDDAS/InfoSymbiotics Systems Participant/data privacy Identity, location and data are all sensitive Uncertainty Measurements/observations subject to error At exascale, intermittent failures are inevitable Cloaking/obfuscation for privacy Handle privacy & uncertainty within unified rubric Aggregation, fusion and summarization Transformations in the presence of uncertainty Secure high-performance multiparty computation At each DDDAS level, perform local computations and analytics, cooperatively with mutually untrusted peers

6 Foundational Work Privacy Preserving Data Collection with Feedback Control Privacy Preserving Data Aggregation with Feedback Control Secure Data Collection and Aggregation Privacy Preserving Feedback Control Cloaking Aggregation Prediction Collection Perturbation Correction Privacy Preserving Data Collection Sensitive Data Streams Privacy Preserving Data Aggregation Aggregated Data streams Data Modeling Data Contributors Trusted Aggregator Application

7 Next Generation DDDAS Privacy-preserving, secure acquisition } High-performance Fusion/aggregation of uncertain data secure distr. comp. Prediction/correction/application steering + feedback loop

8 Privacy Preserving Participant Management Feedback-controlled assignment of cloaked mobile participants to targets Task management feedback Measurement feedback Input/steering data Challenges: maximize coverage, minimize cost; handle mobile participants/targets

9 DDDAS Feedback-driven Tasking a) Exact Trajectories b) Uncertain Trajectories Predictive/Corrective scheme augmented with mobility model Model: Meas: Pred: Update: Xt p(xt Xt 1) Zt p(zt Xt) Z1:t = Z1,..., Zt p(xt Z1:t 1) = Σ p(xt Xt 1) p(xt 1 Z1:t 1) p(xt Z1:t) = p(yt Xt) p(xt Z1:t 1) Σ p(yt Xt) p(xt Z1:t 1)

10 Data Assimilation under Uncertainty Objective: Aggregation/fusion of unreliable observations for analytics/decision-making Spatio-temporal crowdsensing example: M participants (unreliably) report about N events at one or more of R consecutive times Observations S = {s 1, s 2, s v } or (missing) Determine state label at location l j at time t k

11 Truth Inference Approach Hidden Markov Model using iterative approach to determine transition probabilities Algorithm summary Initial guess history + heuristics Seek max posterior probability Semi- and un-supervised learning Challenges: methods for other aggregation/ fusion/assimilation functions with uncertain data

12 High-performance Distributed SMC Secure Multi-Party Computation Guarantees that computation does not reveal private input Possible approaches Shamir s secret sharing scheme Perturbation based Homomorphic encryption schemes Efficiency (secure sum) 12

13 DDDAS Software Toolkit Scalable and stateless distributed computing Small footprint for sensors and field devices Low latency, low power communications Adopt models/features from FreshBreeze/ROS/HELib Deployable at field regional levels, interfaces to traditional supercomputer simulations Algorithm libraries for SMC, distributed computation Building block modules (multiplication, division, matrix inversion) Higher level functions (distributed Kalman filter, statistical summarization, global optimization functions) Challenge: robust uncertainty-resilient implementations adaptively balancing utility (accuracy) and efficiency 13

14 Summary Next generation DDDAS/Infosymbiotics systems Ever expanding platforms Internet of Things, Smart Systems Unified systems/software model for numerous applications Requirements and expectations Privacy and security of participants, data, computation Uncertainty resilience to errors, faults, obfuscation, (mis)trust Autonomous local and hierarchical analytics, decision makeing The PREDICT project Feedback driven dynamic management of sensor-participant systems with privacy protection Trust-aware data synthesis, aggregation and validation Secure high-performance distributed computing software

15 Thank you Acknowledgements AFOSR DDDAS FA Project team Investigators: Li Xiong, Vaidy Sunderam Students: Liyue Fan, Slawek Goryczka, Layla Pournjaf, Daniel Garcia-Ulloa, Xiaofeng Xu Project URL AFOSR DDDAS FA

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Smarter Planet evolution

Smarter Planet evolution Smarter Planet evolution 13/03/2012 2012 IBM Corporation Ignacio Pérez González Enterprise Architect ignacio.perez@es.ibm.com @ignaciopr Mike May Technologies of the Change Capabilities Tendencies Vision

More information

Bayesian networks - Time-series models - Apache Spark & Scala

Bayesian networks - Time-series models - Apache Spark & Scala Bayesian networks - Time-series models - Apache Spark & Scala Dr John Sandiford, CTO Bayes Server Data Science London Meetup - November 2014 1 Contents Introduction Bayesian networks Latent variables Anomaly

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

Li Xiong, Emory University

Li Xiong, Emory University Healthcare Industry Skills Innovation Award Proposal Hippocratic Database Technology Li Xiong, Emory University I propose to design and develop a course focused on the values and principles of the Hippocratic

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:

More information

Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved.

Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved. Big Data: Overview and Roadmap 2015 eglobaltech. All rights reserved. What is Big Data? Large volumes of complex and variable data that require advanced techniques and technologies to enable capture, storage,

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

E6895 Advanced Big Data Analytics Lecture 8:! Encrypted Domain Data Mining

E6895 Advanced Big Data Analytics Lecture 8:! Encrypted Domain Data Mining E6895 Advanced Big Data Analytics Lecture 8: Encrypted Domain Data Mining Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science Mgr., Dept. of Network Science and

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787

Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 2015/5/13 OUTLINE Introduction User Role Based Methodology Data Provider Data Collector Data Miner Decision

More information

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials

EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials 5th August 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter)

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) MSc(CompSc)-1 (SUBJECT TO UNIVERSITY S APPROVAL) SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) The curriculum

More information

BIG DATA AND ANALYTICS

BIG DATA AND ANALYTICS BIG DATA AND ANALYTICS Björn Bjurling, bgb@sics.se Daniel Gillblad, dgi@sics.se Anders Holst, aho@sics.se Swedish Institute of Computer Science AGENDA What is big data and analytics? and why one must bother

More information

IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA

IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA International Conference on Computer Science, Electronics & Electrical Engineering-0 IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA Pavan M N, Manjula G Dept Of ISE,

More information

PARTICIPATORY sensing and data surveillance are gradually

PARTICIPATORY sensing and data surveillance are gradually 1 A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy Slawomir Goryczka and Li Xiong Abstract This paper considers the problem of secure data aggregation (mainly summation)

More information

Social Media Analytics

Social Media Analytics Social Media Analytics Raghu Krishnapuram and Jitendra Ajmera IBM Research - India 2011 IBM Corporation Convergence of Social and Analytic Technologies Transform the Way the World Operates Socially Synergistic

More information

Smart City Australia

Smart City Australia Smart City Australia Slaven Marusic Department of Electrical and Electronic Engineering The University of Melbourne, Australia ARC Research Network on Intelligent Sensors, Sensor Networks and Information

More information

Solutions to Trust. NEXThink V5 What is New?

Solutions to Trust. NEXThink V5 What is New? Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product

More information

Scalable Developments for Big Data Analytics in Remote Sensing

Scalable Developments for Big Data Analytics in Remote Sensing Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,

More information

April 2016 JPoint Moscow, Russia. How to Apply Big Data Analytics and Machine Learning to Real Time Processing. Kai Wähner. kwaehner@tibco.

April 2016 JPoint Moscow, Russia. How to Apply Big Data Analytics and Machine Learning to Real Time Processing. Kai Wähner. kwaehner@tibco. April 2016 JPoint Moscow, Russia How to Apply Big Data Analytics and Machine Learning to Real Time Processing Kai Wähner kwaehner@tibco.com @KaiWaehner www.kai-waehner.de LinkedIn / Xing Please connect!

More information

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015 Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology

More information

IoT Business Solutions

IoT Business Solutions IoT Business Solutions Re-thinking Re-shaping Business Good Reasons for Businesses and Organizations to look into M2M / IoT now Become more efficient Actions based on real data from the field Avoid cost

More information

Big-Data Computing with Smart Clouds and IoT Sensing

Big-Data Computing with Smart Clouds and IoT Sensing A New Book from Wiley Publisher to appear in late 2016 or early 2017 Big-Data Computing with Smart Clouds and IoT Sensing Kai Hwang, University of Southern California, USA Min Chen, Huazhong University

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Big Data Driven Knowledge Discovery for Autonomic Future Internet Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,

More information

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group Practical Data Mining Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor Ei Francis Group, an Informs

More information

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

Emerging Paradigms in Sensor Network Security

Emerging Paradigms in Sensor Network Security Emerging Paradigms in Sensor Network Security Department of Electrical Engineering Texas A&M University Prof. Deepa Kundur, Ph.D. Sensor Media Algorthms & Networking for Trusted Intelligent Computing (SeMANTIC))

More information

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

Building Platform as a Service for Scientific Applications

Building Platform as a Service for Scientific Applications Building Platform as a Service for Scientific Applications Moustafa AbdelBaky moustafa@cac.rutgers.edu Rutgers Discovery Informa=cs Ins=tute (RDI 2 ) The NSF Cloud and Autonomic Compu=ng Center Department

More information

1R01HG0007078: Privacy-Preserving Sharing and Analysis of Human Genomic Data. XiaoFeng Wang and Haixu Tang, IUB

1R01HG0007078: Privacy-Preserving Sharing and Analysis of Human Genomic Data. XiaoFeng Wang and Haixu Tang, IUB 1R01HG0007078: Privacy-Preserving Sharing and Analysis of Human Genomic Data XiaoFeng Wang and Haixu Tang, IUB Project Objectives Study of Scalable, Privacy-Preserving Data Analysis, particular those for

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

EL Program: Smart Manufacturing Systems Design and Analysis

EL Program: Smart Manufacturing Systems Design and Analysis EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical

More information

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

Is a Data Scientist the New Quant? Stuart Kozola MathWorks Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by

More information

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%).

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%). MSc(CompSc)-1 SYLLABUS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE The curriculum extends over two to three academic years for the part-time mode of study or one to two academic years for the

More information

10/14/11. Big data in science Application to large scale physical systems

10/14/11. Big data in science Application to large scale physical systems Big data in science Application to large scale physical systems Large scale physical systems Large scale systems with spatio-temporal dynamics Propagation of pollutants in air, Water distribution networks,

More information

The Future of Business Analytics is Now! 2013 IBM Corporation

The Future of Business Analytics is Now! 2013 IBM Corporation The Future of Business Analytics is Now! 1 The pressures on organizations are at a point where analytics has evolved from a business initiative to a BUSINESS IMPERATIVE More organization are using analytics

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

The Decision Management Manifesto

The Decision Management Manifesto An Introduction Decision Management is a powerful approach, increasingly used to adopt business rules and advanced analytic technology. The Manifesto lays out key principles of the approach. James Taylor

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 315 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,

More information

Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS

Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS Big Data and Complex Networks Analytics Timos Sellis, CSIT Kathy Horadam, MGS Big Data What is it? Most commonly accepted definition, by Gartner (the 3 Vs) Big data is high-volume, high-velocity and high-variety

More information

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations)

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) MSc(CompSc)-1 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

The Sustainability of High Performance Computing at Louisiana State University

The Sustainability of High Performance Computing at Louisiana State University The Sustainability of High Performance Computing at Louisiana State University Honggao Liu Director of High Performance Computing, Louisiana State University, Baton Rouge, LA 70803 Introduction: Computation

More information

New Broadband and Dynamic Infrastructures for the Internet of the Future

New Broadband and Dynamic Infrastructures for the Internet of the Future New Broadband and Dynamic Infrastructures for the Internet of the Future Margarete Donovang-Kuhlisch, Government Industry Technical Leader, Europe mdk@de.ibm.com Agenda Challenges for the Future Intelligent

More information

ECMWF HPC Workshop: Accelerating Data Management

ECMWF HPC Workshop: Accelerating Data Management October 2012 ECMWF HPC Workshop: Accelerating Data Management Massively-Scalable Platforms and Solutions Engineered for the Big Data and Cloud Era Glenn Wright Systems Architect, DDN Data-Driven Paradigm

More information

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health Lecture 1: Data Mining Overview and Process What is data mining? Example applications Definitions Multi disciplinary Techniques Major challenges The data mining process History of data mining Data mining

More information

IoT is a King, Big data is a Queen and Cloud is a Palace

IoT is a King, Big data is a Queen and Cloud is a Palace IoT is a King, Big data is a Queen and Cloud is a Palace Abdur Rahim Innotec21 GmbH, Germany Create-Net, Italy Acknowledgements- ikaas Partners (KDDI and other partnes) Intelligent Knowledge-as-a-Service

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to

More information

It Takes a Village to Raise a Machine Learning Model. Lucian Lita @datariver

It Takes a Village to Raise a Machine Learning Model. Lucian Lita @datariver It Takes a Village to Raise a Machine Learning Model Lucian Lita It Takes a Village to Raise a Machine Learning Model Lucian Lita Algorithms Data Big Data Sheep @bigdatasheep n 5yr more data is better

More information

Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013

Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013 Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software SC13, November, 2013 Agenda Abstract Opportunity: HPC Adoption of Big Data Analytics on Apache

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Science: what is possible. Engineering: turn science into an everyday commodity (cheap, safe, reliable, resilient, )

Science: what is possible. Engineering: turn science into an everyday commodity (cheap, safe, reliable, resilient, ) : Big Data Analytics for Renewable Energy Mark J. Embrechts Dept. Industrial and Systems Engineering Rensselaer Polytechnic Institute, Troy, NY, USA What is Data Mining? Data Mining Big Data Analytics

More information

High Productivity Data Processing Analytics Methods with Applications

High Productivity Data Processing Analytics Methods with Applications High Productivity Data Processing Analytics Methods with Applications Dr. Ing. Morris Riedel et al. Adjunct Associate Professor School of Engineering and Natural Sciences, University of Iceland Research

More information

The IoT/CPS Big Data Challenge

The IoT/CPS Big Data Challenge The IoT/CPS Big Data Challenge Stamatis Karnouskos SAP Road4FAME EU-Consultation Meeting, 22 May 2015, Brussels, Belgium Data acquisition becoming easy, finegrained, real-time, low-cost 0 sync (msec) Implicit

More information

Designing Delay-Tolerant Data Services for the. Network of Things

Designing Delay-Tolerant Data Services for the. Network of Things Designing Delay-Tolerant Data Services for the Daniel Austin Interstellar Travel, Inc. daniel@thestarsmydestination.com Network of Things 1st Annual Big Data Innovation Summit Big Ideas for Today s Talk

More information

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications

More information

From Raw Data to. Actionable Insights with. MATLAB Analytics. Learn more. Develop predictive models. 1Access and explore data

From Raw Data to. Actionable Insights with. MATLAB Analytics. Learn more. Develop predictive models. 1Access and explore data 100 001 010 111 From Raw Data to 10011100 Actionable Insights with 00100111 MATLAB Analytics 01011100 11100001 1 Access and Explore Data For scientists the problem is not a lack of available but a deluge.

More information

Easier - Faster - Better

Easier - Faster - Better Highest reliability, availability and serviceability ClusterStor gets you productive fast with robust professional service offerings available as part of solution delivery, including quality controlled

More information

1.1 Difficulty in Fault Localization in Large-Scale Computing Systems

1.1 Difficulty in Fault Localization in Large-Scale Computing Systems Chapter 1 Introduction System failures have been one of the biggest obstacles in operating today s largescale computing systems. Fault localization, i.e., identifying direct or indirect causes of failures,

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov Search and Data Mining: Techniques Introduction Anna Yarygina Boris Novikov Data Analytics: Conference Sections Fundamentals for data analytics Mechanisms and features Big Data Huge data Target analytics

More information

Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center

Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center 1 Outline Part I - Applications Motivation and Introduction Patient similarity application Part II

More information

Create Operational Flexibility with Cost-Effective Cloud Computing

Create Operational Flexibility with Cost-Effective Cloud Computing IBM Sales and Distribution White paper Create Operational Flexibility with Cost-Effective Cloud Computing Chemicals and petroleum 2 Create Operational Flexibility with Cost-Effective Cloud Computing Executive

More information

Smart Things Require Smart Connections Using Middleware to Make the IoT Work

Smart Things Require Smart Connections Using Middleware to Make the IoT Work Smart Things Require Smart Connections Using Middleware to Make the IoT Work James Kirkland Chief Architect, Internet of Things, Red Hat We all know that devices are getting smarter. In fact, the computing

More information

ICT Perspectives on Big Data: Well Sorted Materials

ICT Perspectives on Big Data: Well Sorted Materials ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

An Introduction to Applied Mathematics: An Iterative Process

An Introduction to Applied Mathematics: An Iterative Process An Introduction to Applied Mathematics: An Iterative Process Applied mathematics seeks to make predictions about some topic such as weather prediction, future value of an investment, the speed of a falling

More information

Data Outsourcing based on Secure Association Rule Mining Processes

Data Outsourcing based on Secure Association Rule Mining Processes , pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim

More information

Dell* In-Memory Appliance for Cloudera* Enterprise

Dell* In-Memory Appliance for Cloudera* Enterprise Built with Intel Dell* In-Memory Appliance for Cloudera* Enterprise Find out what faster big data analytics can do for your business The need for speed in all things related to big data is an enormous

More information

Comparison of K-means and Backpropagation Data Mining Algorithms

Comparison of K-means and Backpropagation Data Mining Algorithms Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and

More information

Car Insurance. Jan Tomášek Štěpán Havránek Michal Pokorný

Car Insurance. Jan Tomášek Štěpán Havránek Michal Pokorný Car Insurance Jan Tomášek Štěpán Havránek Michal Pokorný Competition details Jan Tomášek Official text As a customer shops an insurance policy, he/she will receive a number of quotes with different coverage

More information

The Ultimate in Scale-Out Storage for HPC and Big Data

The Ultimate in Scale-Out Storage for HPC and Big Data Node Inventory Health and Active Filesystem Throughput Monitoring Asset Utilization and Capacity Statistics Manager brings to life powerful, intuitive, context-aware real-time monitoring and proactive

More information

Opportunities to Overcome Key Challenges

Opportunities to Overcome Key Challenges The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia

More information

Machine Learning with MATLAB David Willingham Application Engineer

Machine Learning with MATLAB David Willingham Application Engineer Machine Learning with MATLAB David Willingham Application Engineer 2014 The MathWorks, Inc. 1 Goals Overview of machine learning Machine learning models & techniques available in MATLAB Streamlining the

More information

Antitrust Policy and Industry 4.0 - Keeping the Market Competitive in a Digital Economy -

Antitrust Policy and Industry 4.0 - Keeping the Market Competitive in a Digital Economy - Antitrust Policy and Industry 4.0 - Keeping the Market Competitive in a Digital Economy - Ulrich Schwalbe University of Hohenheim, Stuttgart June 15, 2016 GRUR meets Brussels Workshop U. Schwalbe (University

More information

Huseyin Polat s Curriculum Vitae

Huseyin Polat s Curriculum Vitae Huseyin Polat s Curriculum Vitae Department of Computer Engineering, Anadolu University, Eskisehir 26555, TURKEY +90 222 321 3550-6554 polath@anadolu.edu.tr http://home.anadolu.edu.tr/~polath/ Research

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Data Mining Analytics for Business Intelligence and Decision Support

Data Mining Analytics for Business Intelligence and Decision Support Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing

More information

The Challenge of Handling Large Data Sets within your Measurement System

The Challenge of Handling Large Data Sets within your Measurement System The Challenge of Handling Large Data Sets within your Measurement System The Often Overlooked Big Data Aaron Edgcumbe Marketing Engineer Northern Europe, Automated Test National Instruments Introduction

More information

Information and Knowledge for Decision Making

Information and Knowledge for Decision Making Information and Knowledge for Decision Making An NSF I/UCRC Planning Grant Workshop Research Concept Presentations Section 2 L.I.F.E. Form Access Level of Interest and Feedback Evaluation (LIFE) Forms

More information

Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities

Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities Payam Barnaghi Institute for Communication Systems (ICS) University of Surrey/CityPulse Consortium Guildford, United Kingdom

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR

More information

Crowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach

Crowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach Outline Crowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach Jinfeng Yi, Rong Jin, Anil K. Jain, Shaili Jain 2012 Presented By : KHALID ALKOBAYER Crowdsourcing and Crowdclustering

More information

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data

More information