From research to innovation. Anders Moen Hagalisletto Tuesday 1. March 2015 Kl. 17:00 19:00

Size: px
Start display at page:

Download "From research to innovation. Anders Moen Hagalisletto Tuesday 1. March 2015 Kl. 17:00 19:00"

From this document you will learn the answers to the following questions:

  • What did the API allow for?

  • How many grants did the commercialization of the AIMS?

  • What transportation system did the project model?

Transcription

1 From research to innovation Anders Moen Hagalisletto Tuesday 1. March 2015 Kl. 17:00 19:00

2 Personal Background My Father s family: Poor mountain farmers for centuries. My grandfather had 8 children invented and built a washing machine made of wood in order to make the daily life of his wife a bit easier. After the Second World War, Norway needed engineers: many young men from the country-side were encouraged to take higher education. My father became a diploma engineer Manager at Christiania Spigerverk But he was also Inventor he got several prices for his ideas at the end of his life also some commercial success.

3 My Background First generation of young boys that had a computer as teenagers we were programming a lot from the age of 14/15 in BASIC. I did not want to be like my father I wanted to study something purely theoreticai -> I studied mathematics and philosophy. Then I got more interested in logic and computer science Two master s: Philosophy and computer science. Started working at Norwegian Computing Center Interest: Using logic in understanding complex problems in computer science abstract Pi calculus to understand mobility.

4 Dot com crisis (2001/2002) Started on a PhD at Dept. of Informatics under Olaf Owe. Supervised three master students: practical and quite ambitious project modeling the entire railway net of Oslo Subway using Petri nets - 2 years Supervisor Olaf Owe said: «You should write a PhD in Security!» Okay..

5 What should I do? Interesting topics in security? There was little competence in security at UiO at that time Security protocols: automated search for attacks (1995, Gavin Lowe at Oxford)

6 I was running out of money (PhD) My former boss (Steinar Kristoffersen) wanted to prototype an algorithm for automated integration of distributed systems Steinar wanted to learn Pi calculus I wanted to prototype an algorithm. We filed for a patent application (US provisional) The project was called AIMS (2005)

7

8 AIMS history 2006: Steinar Kristoffersen & Hagalisletto IFI : algorithm for adhoc integration of moble services 2007: Commercialization grant (550 ): Steinar and Anders Moen Hagalisetto developed Blackjack implementation proof of concept 2008: FORNY grant: 1,9 mill. NOK. 2009: Changed project goal: Marius Storsten: Proactive Integration platform monitoring. 2010: Company establishment Automated monitoring and analysis of applications Integrates with Microsoft Biztalk 2011: New CEO Ivar Sagemo and commercial AIMS version released 2013: Received the «Frost and Sullivan APM Leadership Award» 2015: Development of API allowing monitoring of «any» integration service 2016: Aim to take global leadership in integration monitoring 2016: AIMS worth ca 40 million NOK

9 PROSA History Formalization of security requirements (Casenet-EU) PhD PROSA Core (Univ. Oslo) encap model New module: Confidentiality goals (RSE-NFR) Starting piloting sales for consultancy (Åsmund) mbricks New module: Automated code generation (HATS-EU) eresept BankID SIP protocol (EUX-NFR) New module: Implemented basic attack patterns (PCAS-EU) New module: State machine simulation PROSA project (FORNY) Hafslund Visma Customer encap Sparebank

10 The PROSA tool and method PROtocol Security Analysis Provides analysis of security protocols Provides a language for spesification of security protocols Building PROSA requires research-competence Analysis of security protocols is complex and difficult Using PROSA makes it easier Lots of unsolved challenges!

11 What PROSA is Software: Tool for supporting security architecture design and analysis Method: Builds on formal methods (logic + algebra+ programming language theory) Working process: Five steps: Automated support for design process Improving security awareness and assurance Service Consulting model-building Security analysis

12 Team Ivar Bergland (CEO/Inven2) Åsmund Skomedal (PhD comp. security - NTNU) Thor Kristoffersen (PhD comp. security - UNIK) Ivar Rummelhoff (PhD in math. logic - UiO) Sigurd Eskeland (PhD comp. security Aalborg University)

13 PROSA Security Architect

14 Tradisjonell metode versus PROSA Modeling Typical approach PROSA approach Effect PROSA (estimate) pages. Informal descriptions 3-10 A4 sider med presice system description 30 x quicker understanding of system Security requirements General requirements, imprecise, and concrete assets are not mentioned Precise characterization of assets and security goals 4 x more requirements Threats Sporadic, manual and expert based approach Presice analysis of threats 10 x more threats on design Risk analysis Causal method, expert-based approach Builds a systematic catalogue of threats 4 x quicker process of risk analysis

15 # Agents/components Complexity of cases 13 BankID encap 1 eresept Customer 1 Case 1 Case 2 Case 4 Case 3 4 Scyther ProVerif SATMC NRL Academia state-of-the-art # messages

16 Feedback from partners If the partner case is a success Sparebank1 group will model other systems Hafslund case: Aidon has asked to a beta-tester for PROSA Hafslund case: Embriq has asked to a beta-tester for PROSA Sparebank1 Gruppen case: Kantega has asked to a beta-tester for PROSA Encap want to use PROSA in order to demonstrate our solid approach to security to business partner and investor

17 The Prosa software modules MVP Protection graph System overview Asset detection presentation Confidentiality presentation Simple decision support Checklist manual workflow support Precise PROSA model providing: Specification editor Graphical interaction Outline view Integrity presentation User interaction Simple report generator Attack landscaping integrated with System view Listing of threats overview User interaction assigning likelihood and impact Feasibility Modeling Security requirements Security analysis Risk analysis Protection graph Asset detection eavesdropper simulation Confidentiality goals Impersonation patterns Integrity goals

18 What you might experience Reality (industry) might impose even harder research problems than you had as a PhD student or a post-doc. You have much shorter time to prove that you can solve them. You have to communicate your methods to customers - not scientists The problems you might solve are real problems using your methods to improve methods, products, and services «out there»

19 Thank you! 3/2/2016 Testpresentasjon: designforslag

Curriculum of Electronics Engineering Program

Curriculum of Electronics Engineering Program Curriculum of Electronics Engineering Program FIRST ACADEMIC SEMESTER EB 0101 Workshop on Methods of University Studies 2 -- -- -- 4 EB 0102 Workshop on Oral and Written Communications 2 -- -- -- 4 EB

More information

An Introduction to. Metrics. used during. Software Development

An Introduction to. Metrics. used during. Software Development An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

IoTSec - Security in IoT for Smart Grids

IoTSec - Security in IoT for Smart Grids www.nr.no IoTSec - Security in IoT for Smart Grids AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners Habtamu Abie, Norwegian Computing Center - NR IFI/Oslo 09/10/2015 IoTSec - Challenges

More information

M E M O R A N D U M. Faculty Senate Approved April 2, 2015

M E M O R A N D U M. Faculty Senate Approved April 2, 2015 M E M O R A N D U M Faculty Senate Approved April 2, 2015 TO: FROM: Deans and Chairs Becky Bitter, Sr. Assistant Registrar DATE: March 26, 2015 SUBJECT: Minor Change Bulletin No. 11 The courses listed

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Computer Science Information Sheet for entry in 2016. What is Computer Science?

Computer Science Information Sheet for entry in 2016. What is Computer Science? Computer Science Information Sheet for entry in 2016 What is Computer Science? Computer Science is about understanding computer systems and networks at a deep level. Computers and the programs they run

More information

PhD in Computer Science at North Carolina A&T State University

PhD in Computer Science at North Carolina A&T State University PhD in Computer Science at North Carolina A&T State University December 5, 2013 Contents Admission...1 Program Requirements...2 Course Work...2 Advisory Committee...2 Residency and Other Requirements...2

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Total Exploration & Production: Field Monitoring Case Study

Total Exploration & Production: Field Monitoring Case Study Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.

More information

Other Required Courses (14-18 hours)

Other Required Courses (14-18 hours) 1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900

More information

Authentication methods for mobile services INF 5261

Authentication methods for mobile services INF 5261 UNIVERSITY OF OSLO Department of Informatics Authentication methods for mobile services INF 5261 Report: Main factors affecting user acceptance of authentication methods for mobile services in Norway Spring

More information

Number of hours in the semester L Ex. Lab. Projects SEMESTER I 1. Economy 45 18 27. 2. Philosophy 18 18. 4. Mathematical Analysis 45 18 27 Exam

Number of hours in the semester L Ex. Lab. Projects SEMESTER I 1. Economy 45 18 27. 2. Philosophy 18 18. 4. Mathematical Analysis 45 18 27 Exam Year 1 Lp. Course name Number of hours in the semester L Ex. Lab. Projects SEMESTER I 1. Economy 45 18 7. Philosophy 18 18 3. Linear Algebra 45 18 7 Exam 4. Mathematical Analysis 45 18 7 Exam 5. Economical

More information

The Basic Conflict of Higher Electronic Engineering Education and Its Solution

The Basic Conflict of Higher Electronic Engineering Education and Its Solution The Basic Conflict of Higher Electronic Engineering Education and Its Solution Xiqin Wang EE, Tsinghua Univ. 2013.5.23. (IEEE CASEO TC Workshop, Beijing) EE, Tsinghua University 1 Tsinghua School (1911)

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

Introduction Building project management

Introduction Building project management Introduction Building project management Construction management 2. (BMEEPEKT601-BMEEPEKK601) 10-02-2011 Introduction Lecturers: Adrienn Lepel PhD István Vidovszky PhD Guest lecturers Requirements Two

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

An Automated Workflow System Geared Towards Consumer Goods and Services Companies

An Automated Workflow System Geared Towards Consumer Goods and Services Companies Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services

More information

Centre for Entrepreneurship. Master of Science in. Innovation and. graduate

Centre for Entrepreneurship. Master of Science in. Innovation and. graduate Centre for Entrepreneurship Master of Science in Innovation and Entrepreneurship graduate Prospectus WELCOME WELCOME Contents The University of Oslo Students currently studying at the Centre for Entrepreneurship

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

New trend in Russian informatics curricula: integration of math and informatics

New trend in Russian informatics curricula: integration of math and informatics New trend in Russian informatics curricula: integration of math and informatics Svetlana Gaisina Academy of post-degree pedagogical education, Saint Petersburg, g.selania@gmail.com Sergei Pozdniakov Saint

More information

Computational Modeling and Simulation for Learning an Automation Concept in Programming Course

Computational Modeling and Simulation for Learning an Automation Concept in Programming Course Computational Modeling and Simulation for Learning an Automation Concept in Programming Course Yong Cheon Kim, Dai Young Kwon, and Won Gyu Lee Abstract Computational thinking is a fundamental skill for

More information

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg 1 The MSc program in computer science Worldwide, computer scientists are in high demand. To cater for this demand,

More information

Cyber Security. Vision. Mission

Cyber Security. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Model Checking based Software Verification

Model Checking based Software Verification Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24

More information

Math Courses Available After College Algebra. nsm.uh.edu

Math Courses Available After College Algebra. nsm.uh.edu Math Courses Available After College Algebra This video is designed for: Students transferring into the University of Houston from a community college UH students with college algebra credit I have College

More information

Measuring the Attack Surfaces of SAP Business Applications

Measuring the Attack Surfaces of SAP Business Applications Measuring the Attack Surfaces of SAP Business Applications Pratyusa K. Manadhata 1 Yuecel Karabulut 2 Jeannette M. Wing 1 May 2008 CMU-CS-08-134 School of Computer Science Carnegie Mellon University Pittsburgh,

More information

Challenges of Analytics

Challenges of Analytics Challenges of Analytics Setting-up a Data Science Team BA4ALL Eindhoven November 2015 Laurent FAYET CEO @lbfayet www.artycs.eu 1 Agenda 1 About ARTYCS 2 Definitions 3 Data Value Creation 4 An Approach

More information

2014 New Jersey Core Curriculum Content Standards - Technology

2014 New Jersey Core Curriculum Content Standards - Technology 2014 New Jersey Core Curriculum Content Standards - Technology Content Area Standard Strand Grade Level bands Technology 8.2 Technology Education, Engineering, Design, and Computational Thinking - Programming:

More information

Advanced Software Engineering ( -Formal specification, verification, transformation, and application-

Advanced Software Engineering ( -Formal specification, verification, transformation, and application- Advanced Software Engineering ( -Formal specification, verification, transformation, and application- Shaoying Liu Faculty of Computer and Information Sciences Hosei Univeresity, Tokyo, Japan Email: sliu@k.hosei.ac.jp

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester

More information

Hans Munthe-Kaas. escience meeting, Geilo, Jan. 2007

Hans Munthe-Kaas. escience meeting, Geilo, Jan. 2007 Structure preserving algorithms for differential equations; Applications computing and education Hans Munthe-Kaas Department of Mathematics, University of Bergen escience meeting, Geilo, Jan. 2007 Hans

More information

Final Year Projects at itm. Topics 2010/2011

Final Year Projects at itm. Topics 2010/2011 Final Year Projects at itm Topics 2010/2011 Chair of Information Technology in Mechanical Engineering Prof. Dr.-Ing. B. Vogel-Heuser Prof. Dr.-Ing. Frank Schiller Prof. Dr.-Ing. Klaus Bender Technische

More information

Draft dpt for MEng Electronics and Computer Science

Draft dpt for MEng Electronics and Computer Science Draft dpt for MEng Electronics and Computer Science Year 1 INFR08012 Informatics 1 - Computation and Logic INFR08013 Informatics 1 - Functional Programming INFR08014 Informatics 1 - Object- Oriented Programming

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

Software Quality Assurance and Maintenance for Outsourced Software Development Nelly Maneva Institute of Mathematics and Informatics, BAS, 1113 Sofia, Bulgaria Email: neman@math.bas.bg and American University

More information

Computation Beyond Turing Machines

Computation Beyond Turing Machines Computation Beyond Turing Machines Peter Wegner, Brown University Dina Goldin, U. of Connecticut 1. Turing s legacy Alan Turing was a brilliant mathematician who showed that computers could not completely

More information

Composite Transactions for SOA

Composite Transactions for SOA A Technical Whitepaper by: Guy Pardon - Chief Technology Officer for Atomikos July 2015 Copyright 2008-2015 Atomikos BVBA Permission is granted to reproduce and redistribute this document without modifications

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet

More information

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR MASTER OF SCIENCE IN ELECTRICAL ENGINEERING (MS EE) FIRST YEAR Elective 3 Elective 3 Elective 3 Seminar Course (EE 296) 1 TOTAL 12 TOTAL 10 SECOND YEAR Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300)

More information

Master Degree Program in Computer Science (CS)

Master Degree Program in Computer Science (CS) Master Degree Program in Computer Science (CS) Students holding Bachelor s degree in Computer Science are accepted as graduate students, after meeting the general requirements stated below. Applicants

More information

Information Technology Engineers Examination

Information Technology Engineers Examination Information Technology Engineers Examination Outline of ITEE Ver 2.1 November 30, 2015 The company and products names in this report are trademarks or registered trademarks of the respective companies.

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance.

Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance. Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance. Prevari makes organizations safer by providing instrumentation for managing risks to information. Prevari solutions

More information

The Master of Engineering Program In Computer Science. Charlie Van Loan Director

The Master of Engineering Program In Computer Science. Charlie Van Loan Director The Master of Engineering Program In Computer Science Charlie Van Loan Director Administration Administration Charles Van Loan Stephanie A. Meik Director Assistant Director 423 Gates 110D Gates cv@cs.cornell.edu

More information

Cryptography and Network Security Chapter 1

Cryptography and Network Security Chapter 1 Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood

More information

LAW ENFORCEMENT: OFFENDER MONITORING SERVICE (OMS) For Probation, Parole, Pretrial, and Community Supervision

LAW ENFORCEMENT: OFFENDER MONITORING SERVICE (OMS) For Probation, Parole, Pretrial, and Community Supervision LAW ENFORCEMENT: OFFENDER MONITORING SERVICE (OMS) For Probation, Parole, Pretrial, and Community Supervision 1 WHAT IS VERIE? Verie is an identity and location verification technology solution. By combining

More information

INTERNAL REGULATIONS FOR THE BACHELOR OF SCIENCE DEGREE IN MECHATRONICS AND ROBOTICS ENGINEERING

INTERNAL REGULATIONS FOR THE BACHELOR OF SCIENCE DEGREE IN MECHATRONICS AND ROBOTICS ENGINEERING Czech Technical University in Prague Faculty of Engineering Assiut University INTERNAL REGULATIONS FOR THE BACHELOR OF SCIENCE DEGREE IN MECHATRONICS AND ROBOTICS ENGINEERING Assiut University awards at

More information

School of Social Justice: PhD Structure. Year 1

School of Social Justice: PhD Structure. Year 1 School of Social Justice: PhD Structure The information set out below will give you an idea of how your PhD studies will progress over the course of your degree. It is based on the aim of completing the

More information

How did software code come to be such a force, not only in business but also in culture? Powered by

How did software code come to be such a force, not only in business but also in culture? Powered by How did software code come to be such a force, not only in business but also in culture? Computer geeks everywhere can look to Bill Gates as a role model. The phenomenal success of Microsoft, the company

More information

Intellectual Property

Intellectual Property Intellectual Property Protection Helpsheet When running a business you need to consider protecting your intellectual property which could be anything from your logo to inventions, products and designs.

More information

HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION

HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION HOW TO GET A PH.D. IN MATHEMATICS IN A TIMELY FASHION SARA C. BILLEY Mathematics research is fun, engaging, difficult, frustrating, and different than most 9-5 jobs. This article is meant to provide some

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing

More information

Request for Proposals: Academic Year 2014-2015

Request for Proposals: Academic Year 2014-2015 Request for Proposals: Academic Year 2014-2015 Background and Purpose The primary mission of the Peder Sather Center for Advanced Study (henceforth the Center) is to strengthen ongoing research collaborations

More information

ALWAYS ON THE RIGHT PATH. Optimized planning and dispatch with SyncroTESS

ALWAYS ON THE RIGHT PATH. Optimized planning and dispatch with SyncroTESS ALWAYS ON THE RIGHT PATH Optimized planning and dispatch with SyncroTESS FAST REACTION PROACTIVE SUPPORT Always on top of the business: Every 30 to 120 seconds SyncroTESS produces an up-to-date schedule

More information

My background (short)

My background (short) Interaction design in the wild - some reflections on the context of design. SIDeR 2006 Keynote Dag Svanaes Dept. of Computer and Information Science, NTNU Trondheim Norway My background (short) 1982: M.Sc.

More information

PH.D. PROGRAM IN COMPUTATIONAL SCIENCE CONCENTRATION IN COMPUTATIONAL BIOLOGY & BIOINFORMATICS (Quantitative Biology)

PH.D. PROGRAM IN COMPUTATIONAL SCIENCE CONCENTRATION IN COMPUTATIONAL BIOLOGY & BIOINFORMATICS (Quantitative Biology) PH.D. PROGRAM IN COMPUTATIONAL SCIENCE CONCENTRATION IN COMPUTATIONAL BIOLOGY & BIOINFORMATICS (Quantitative Biology) Conducted Jointly by San Diego State University Claremont Graduate University Degree

More information

Computer Science, Maths, Raspberry Pi

Computer Science, Maths, Raspberry Pi Computer Science, Maths, Raspberry Pi Alan Mycroft Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/users/am/ and Raspberry Pi Foundation http://www.raspberrypi.org Sheffield Cutlers

More information

Choosing a Major in the Harrison College of Business

Choosing a Major in the Harrison College of Business Choosing a Major in the Harrison College of Business Considerable information for this document was provided by the Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook,

More information

Functions. MATH 160, Precalculus. J. Robert Buchanan. Fall 2011. Department of Mathematics. J. Robert Buchanan Functions

Functions. MATH 160, Precalculus. J. Robert Buchanan. Fall 2011. Department of Mathematics. J. Robert Buchanan Functions Functions MATH 160, Precalculus J. Robert Buchanan Department of Mathematics Fall 2011 Objectives In this lesson we will learn to: determine whether relations between variables are functions, use function

More information

How to Write a Quality Technical Paper and Where to Publish within IEEE Part 1. George Plosker IEEE Client Services Manager September 2015

How to Write a Quality Technical Paper and Where to Publish within IEEE Part 1. George Plosker IEEE Client Services Manager September 2015 How to Write a Quality Technical Paper and Where to Publish within IEEE Part 1 George Plosker IEEE Client Services Manager September 2015 About the IEEE World s largest technical membership association

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

All-in-One Asset Management Tool

All-in-One Asset Management Tool APEX-RU0781 All-in-One Asset Management Tool Final Report October 2012 Submitted by Mansooreh Mollaghasemi, Ph.D. Chairman and CEO Productivity Apex, Inc 3505 Lake Lynda Drive, Suite 206 Orlando, FL 32817

More information

Advanced Higher Mathematics Course Specification (C747 77)

Advanced Higher Mathematics Course Specification (C747 77) Advanced Higher Mathematics Course Specification (C747 77) Valid from August 2015 This edition: April 2015, version 1.1 This specification may be reproduced in whole or in part for educational purposes

More information

IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY

IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY JOTHI PRAKASH A/L MURUGAN DISSERTATION SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF COMPUTER SCIENCE FACULTY

More information

These degree requirements are in effect starting from 2012-2013 Admission.

These degree requirements are in effect starting from 2012-2013 Admission. MASTER S DEGREE PROGRAM IN Computer Science College of Engineering University of Colorado Denver These degree requirements are in effect starting from 2012-2013 Admission. The Department of Computer Science

More information

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional

More information

Supporting the Workflow Management System Development Process with YAWL

Supporting the Workflow Management System Development Process with YAWL Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,

More information

The Applied and Computational Mathematics (ACM) Program at The Johns Hopkins University (JHU) is

The Applied and Computational Mathematics (ACM) Program at The Johns Hopkins University (JHU) is The Applied and Computational Mathematics Program at The Johns Hopkins University James C. Spall The Applied and Computational Mathematics Program emphasizes mathematical and computational techniques of

More information

A WEB-BASED VE SUPPORTING SYSTEM FOR VE FACILITATOR AND MEMBERS IN VE WORKSHOP

A WEB-BASED VE SUPPORTING SYSTEM FOR VE FACILITATOR AND MEMBERS IN VE WORKSHOP Page 1 A WEB-BASED VE SUPPORTING SYSTEM FOR VE FACILITATOR AND MEMBERS IN VE WORKSHOP Heungmin PARK, CVS, IAM corporation (whcool@hanmail.net) Coauthor: Jong-Kwon LIM, CVS, Ph D., IAM corporation Coauthor:

More information

Hunt, Graham. Dear All,

Hunt, Graham. Dear All, Hunt, Graham From: Sent: To: Subject: Private Equity and Venture Capital Committee on behalf of Mattia Colonnelli Tuesday, November 27, 2012

More information

Execution of A Requirement Model in Software Development

Execution of A Requirement Model in Software Development Execution of A Requirement Model in Software Development Wuwei Shen, Mohsen Guizani and Zijiang Yang Dept of Computer Science, Western Michigan University {wwshen,mguizani,zijiang}@cs.wmich.edu Kevin Compton

More information

DASCOSA: Database Support for Computational Science Applications. Kjetil Nørvåg Norwegian University of Science and Technology Trondheim, Norway

DASCOSA: Database Support for Computational Science Applications. Kjetil Nørvåg Norwegian University of Science and Technology Trondheim, Norway DASCOSA: Database Support for Computational Science Applications Kjetil Nørvåg Norwegian University of Science and Technology Trondheim, Norway Outline Background/context: Databases & Grids Requirements

More information

Diploma Of Computing

Diploma Of Computing Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Strategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013

Strategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013 Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) SHARPS Project and ILHIE Prototype June 26, 2013 Strategic Health IT Advanced Research Projects (SHARP) SHARP Area 1 Security and

More information

Curriculum for the Master Programme in Manufacturing Technology

Curriculum for the Master Programme in Manufacturing Technology Curriculum for the Master Programme in Manufacturing Technology Studieordning for kandidatuddannelsen i virksomhedsteknologi The Faculties of Engineering, Science and Medicine Aalborg University 2010 0

More information

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

SECURITY AND REGULATORY COMPLIANCE OVERVIEW Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for

More information

Why Get an M.Eng. in CS or Anything Else? Prof. Charlie Van Loan CS M.Eng. Program Director

Why Get an M.Eng. in CS or Anything Else? Prof. Charlie Van Loan CS M.Eng. Program Director Why Get an M.Eng. in CS or Anything Else? Prof. Charlie Van Loan CS M.Eng. Program Director Some Questions to Answer Do I need a fifth year? Is Entrepreneurship part of the deal? Is the MEng a stepping

More information

Engineering Your Retirement. Retirement Planning for Technology Professionals

Engineering Your Retirement. Retirement Planning for Technology Professionals Brochure More information from http://www.researchandmarkets.com/reports/2176545/ Engineering Your Retirement. Retirement Planning for Technology Professionals Description: A practical retirement planning

More information

ICT-2010 Evaluation, October 2003

ICT-2010 Evaluation, October 2003 ICT-2010 Evaluation, October 2003 Evaluation committee: Thomas Ericson, Linköping, Sweden Kaisa Sere, Åbo Academy University, Finland Seif Haridi, KTH and SICS, Sweden 1. Introduction The purpose of the

More information

JOB DESCRIPTION APPLICATION LEAD

JOB DESCRIPTION APPLICATION LEAD JOB DESCRIPTION APPLICATION LEAD The Application Lead will provide functional support and to expand capabilities in the area of systems configuration. This function provides the initial step in the process

More information

Mechanical Engineering Technologies

Mechanical Engineering Technologies Technologies 1 Technologies Graduates of the Technology program are prepared to design mechanical systems, operate CAD systems, manage design projects, and perform product testing. Examples of graduate

More information

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt Adaptive Quality of Service of Voice over IP Communications Nelson Costa Instituto Superior Técnico (IST) Lisbon, Portugal eng.ncosta@gmail.com Authors Mário Serafim Nunes Lisbon, Portugal mario.nunes@inesc-id.pt

More information

Work with a large team in a fast-paced, agile environment within a Multinational Corporation (MNC)

Work with a large team in a fast-paced, agile environment within a Multinational Corporation (MNC) Autodesk China R&D (Shanghai) Internship Projects July to December 2016 (6-Month, Full Time) Position 1: Intern Software Development (AutoCAD) Conduct research work on prototype of Next Generation API

More information

Senior Technical Specialist Engineer Job Description

Senior Technical Specialist Engineer Job Description Senior Technical Specialist Engineer Job Description (Job Code and Level: EDESTEC003.1) Definition: Design is defined as: Designing systems, processes, methodologies as well as component and vehicle designs

More information

KEY ELEMENTS IN DEVELOPING AN ONLINE GRADUATE COURSE IN SYSTEMS ENGINEERING MANAGEMENT

KEY ELEMENTS IN DEVELOPING AN ONLINE GRADUATE COURSE IN SYSTEMS ENGINEERING MANAGEMENT Session 2142 KEY ELEMENTS IN DEVELOPING AN ONLINE GRADUATE COURSE IN SYSTEMS ENGINEERING MANAGEMENT P. B. Ravikumar Professor, Mechanical & Industrial Engineering Department University of Wisconsin, Platteville,

More information

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,

More information

Echtzeittesten mit MathWorks leicht gemacht Simulink Real-Time Tobias Kuschmider Applikationsingenieur

Echtzeittesten mit MathWorks leicht gemacht Simulink Real-Time Tobias Kuschmider Applikationsingenieur Echtzeittesten mit MathWorks leicht gemacht Simulink Real-Time Tobias Kuschmider Applikationsingenieur 2015 The MathWorks, Inc. 1 Model-Based Design Continuous Verification and Validation Requirements

More information

Mathematical finance and linear programming (optimization)

Mathematical finance and linear programming (optimization) Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may

More information

Knowledge Systems Institute Graduate School Computer and Information Sciences Major Checklist

Knowledge Systems Institute Graduate School Computer and Information Sciences Major Checklist CIS503 Theory of Computation 3 CIS510 Software Project Management 3 Required Area Courses (3) BA501 Management Information Systems 3 CIS520 Advanced Computer Networks & Security 3 CIS522 Computer Security

More information

Master Specialization in Digital Design: Design and Programming of Embedded Systems

Master Specialization in Digital Design: Design and Programming of Embedded Systems Master Specialization in Digital Design: Design and Programming of Embedded Systems Jan Schmidt, Ph.D. Department of Digital Design Faculty of Information Technology Czech Technical University in Prague

More information

Blackhawk Technical College. Information Technology Services. Process Improvement Visioning Document

Blackhawk Technical College. Information Technology Services. Process Improvement Visioning Document Blackhawk Technical College Information Technology Services Process Improvement Visioning Document December 12, 2008 Steven Davidson Chief Information Officer Blackhawk Technical College sdavidson@blackhawk.edu

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

INTRODUCTORY COURSES IN CALCULUS, STATISTICS, AND COMPUTER SCIENCE

INTRODUCTORY COURSES IN CALCULUS, STATISTICS, AND COMPUTER SCIENCE Chapter 4 INTRODUCTORY COURSES IN CALCULUS, STATISTICS, AND COMPUTER SCIENCE The five tables in this chapter give detailed enrollment and section size in calculus-level courses, instructional formats for

More information

Accounting for User Behavior in Predictive Cyber Security Models Masooda Bashir, Ken Keefe, Andrew Marturano, Mohammad Noureddine, Bill Sanders

Accounting for User Behavior in Predictive Cyber Security Models Masooda Bashir, Ken Keefe, Andrew Marturano, Mohammad Noureddine, Bill Sanders Accounting for User Behavior in Predictive Cyber Security Models Masooda Bashir, Ken Keefe, Andrew Marturano, Mohammad Noureddine, Bill Sanders 2 The Problem: Humans Make Mistakes Humans are involved in

More information