Networked CPS: Some Fundamental Challenges
|
|
- Howard Dixon
- 5 years ago
- Views:
Transcription
1 Networked CPS: Some Fundamental Challenges John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Fischell Department of Bioengineering Department of Mechanical Engineering Applied Mathematics, Statistics and Scientific Computation Program University of Maryland College Park Panel on Networking challenges for CPS 2014 INFOCOM Toronto, Canada, May 1, 2014
2 Wireless and Networked Embedded Systems: Ubiquitous Presence 2
3 A Network Immersed World: Swarms and the Cloud Courtesy: J. Rabaey 3
4 Networked CPS: Wireless Sensor Networks Everywhere 4
5 Networked CPS: Smart Grids Courtesy: Rockwell 5
6 Networked CPS: FAA NextGen 6
7 Networked CPS: Autonomous Swarms Component-based Architectures Communication vs Performance Tradeoffs Distributed asynchronous Fundamental limits At work: Two ASIMOs working together in coordination to deliver refreshments Credit: Honda 7
8 A Network Immersed World A complex collection of sensors, controllers, computing nodes, and actuators that work together to improve our daily lives From very small: Ubiquitous, Pervasive, Disappearing, perceptive, Ambient To very large: Always Connectable, Reliable, Scalable, Adaptive, Flexible Emerging Service Models Building energy management Automotive safety and control Management of metropolitan traffic flows Distributed health monitoring Smart Grid 8
9 Networked CPS Architecture: Multiple Interacting Multigraphs Multiple Interacting Graphs Nodes: agents, individuals, groups, organizations Directed graphs Links: ties, relationships Weights on links : value (strength, significance) of tie Weights on nodes : importance of node (agent) Value directed graphs with weighted nodes Real life problems: Dynamic, time varying graphs, relations, weights, policies Information network I w kl Communication network S j : w j S w ij : I k: w l: w l I k C m: w m C w mn i w i n: w n Networked System architecture & operation C S 9
10 Networks: The Fundamental Trade off The nodes gain from collaborating But collaboration has costs (e.g. communications) Trade off: gain from collaboration vs cost of collaboration Vector metrics involved typically Constrained Coalitional Games Example 1: Network Formation Effects on Topology Example 2: Collaborative robotics, communications Example 3: Web based social networks and services Example 4: Groups of cancer tumor or virus cells 10
11 Efficient Communication Graphs: Small World Graphs Simple Lattice C(n,k) Small world: Slight variation adding nk Adding a small portion of well chosen links significant increase in convergence rate 11
12 Efficient Communication Graphs: Expander Graphs Fast synchronization of a network of oscillators Network where any node is nearby any other Fast diffusion of information in a network Fast convergence of consensus Decide connectivity with smallest memory Random walks converge rapidly Easy to construct, even in a distributed way (ZigZag graph product) Graph G, Cheeger constant h(g) All partitions of G to S and S c, h(g)=min (#edges connecting S and S c ) / (#nodes in smallest of S and S c ) (k, N, e) expander : h(g) > e ; sparse but locally well connected (1 SLEM(G) increases as h(g) 2 ) 12
13 Expander Graphs Ramanujan Graphs 13
14 Construction of Efficient Communication Graphs by Computational Optimization Examples of resulting topologies 14
15 Distributed self organization Goal: design a scheme that gives each node a vector of compact global information 15
16 Component Based Networking and Security Component Based Networking : Leads to a compositional approach to the synthesis and operation of networks. Fits very well MANET, WNAN (and WAND), beyond. Does away with classical layers and with classical cross layer Compositionality, and Compositional Synthesis Cross linked executable, formal and performance models is addressing this challenging problem directly. Interacting Control, Information and Communication Graphs 16
17 Executable Models Component base Networks and Composable Security Formal Models Universally Composable Security of Network Protocols: Network with many agents running autonomously. Agents execute in mostly asynchronous manner, concurrenty several protocols many times. Protocols may or may have not been jointly designed, may or not be all secure or secure to same degree. Performance Models Key question addressed : Under what conditions can the composition of these protocols be provably secure? Investigate time and resource requirements Studying compositionality is necessary! Compositional Security is critical for all CPS! for achieving this 17
18 Trust and Collaborative Control/Operation Two linked dynamics Trust / Reputation propagation and collaborative control evolution Integrating network utility maximization (NUM) with constraint based reasoning and coalitional games Beyond linear algebra and weights, semirings of constraints, constraint programming, soft constraints semirings, policies, agents Learning on graphs and network dynamic games: behavior, adversaries Adversarial models, attacks, constrained shortest paths, Interacting Control, Information and Communication Graphs 18
19 Biological Network Types Examples of biological networks: [A] Yeast transcription factor binding network; [B] Yeast protein protein interaction network; [C] Yeast phosphorylation network ; [D] E. Coli metabolic network ; [E] Yeast genetic network ; Nodes colored according to their YPD cellular roles [Zhu et al, 2007] 19
20 How Biology Does IT? 20
21 Modularity vs Performance Optimize only on performance poor adaptivity Add cost of communications improved adaptivity Communication motifs Evolvable modularity for some networked CPS?? 21
22 Neural Network Evolution: from programmed structure to function feedback on structure 22
23 Social Networks as Networked CPS We are much more social than ever before Online social networks (SNS) permeate our lives Such new Life style gives birth to new markets Monetize the value of social network Advertising - major source of income for SNS Joining fee, donation etc. Need to know the common features of social networks 23
24 Challenges in Social Networks Can we integrate? Context based distribution Include user and product similarity Combine with user user similarity Exploit both user preferences and network structure Maximize relevance and potential profit Ensure message delivery to all interested nodes Increase recommendation accuracy and diversity Can hyperbolic embedding help? Is it real? 24
25 Key Idea: Virtual Geometry Of the network graph Of an auxiliary space underlying the graph 25
26 Possible Underlying Hyperbolic Geometry? 26
27 Navigation Efficiency and Robustness Percentage of successful greedy paths 99.99% Percentage of shortest greedy paths 100% Percentage of successful greedy paths after removal of x% of links or nodes x =10% 99% x =30% 95% 27
28 Taxonomy for Large Scale Networks based on Curvature 1987 Gromov: d hyperbolicity Courtesy: Iraj Saniee, Bell Labs 28
29 Thank you! Questions?
Networked Cyber-Physical Systems (Net-CPS) and the Internet of Things (IoT)
Networked Cyber-Physical Systems (Net-CPS) and the Internet of Things (IoT) John S. Baras Institute for Systems Research, University of Maryland, USA ACCESS Linnaeus Center, Royal Institute of Technology,
More informationIoT and 5G as Enablers for Networked Human-Cyber-Physical Systems
IoT and 5G as Enablers for Networked Human-Cyber-Physical Systems John S. Baras and Chrysa Papagianni Institute for Systems Research University of Maryland College Park 5G Network Summit IEEE COMSOC, DC
More informationComplex Networks and Systems. Program Manager AFOSR/RSL Air Force Research Laboratory
Complex s and Systems Dr Robert J. Bonneau Program Manager AFOSR/RSL Air Force Research Laboratory 1 Complex s Roadmap Complex networks uses the results of the mathematical quantification of critical information
More informationNetworked Cyber-Physical Systems (Net-CPS) 网络信息 - 物理融合系统
Networked Cyber-Physical Systems (Net-CPS) 网络信息 - 物理融合系统 John S. Baras Institute for Systems Research, University of Maryland, USA ACCESS Linnaeus Center, Royal Institute of Technology, Sweden Institute
More informationProperties of Biological Networks
Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási
More informationComponents, Compositionality and Architectures for Networked CPS
Components, Compositionality and Architectures for Networked CPS John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Fischell Department of Bioengineering Applied
More informationBuilding Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey
Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom
More informationMobile Wireless Sensor Network enables convergence of ubiquitous sensor services
1 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services Dr. Jian Ma, Principal Scientist Nokia Research Center, Beijing 2 2005
More informationUSE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES
5g Use Cases BROADBAND AND MEDIA EVERYWHERE 5g USE CASES SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES HUMAN MACHINE INTERACTION SENSOR NETWORKS
More informationSecurity and Trust in a Networked Immersed World: from Components to Systems and Beyond
Security and Trust in a Networked Immersed World: from Components to Systems and Beyond John S. Baras Lockheed Martin Chair in Systems Engineering The Institute for Systems Research and Electrical and
More informationLink Analysis in the Cloud
Cloud Computing Link Analysis in the Cloud Dell Zhang Birkbeck, University of London 2017/18 Graph Problems & Representations What is a Graph? G = (V,E), where V represents the set of vertices (nodes)
More informationARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE?
ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? Motivation, Approach, and Research Agenda Rolf Stadler and Gunnar Karlsson KTH, Royal Institute of Technology 164 40 Stockholm-Kista, Sweden {stadler,gk}@imit.kth.se
More informationDistributed Agent-Based Intrusion Detection for the Smart Grid
Distributed Agent-Based Intrusion Detection for the Smart Grid Presenter: Esther M. Amullen January 19, 2018 Introduction The smart-grid can be viewed as a Large-Scale Networked Control System (LSNCS).
More informationWireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation
Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in
More informationGraph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.
Graph Theory COURSE: Introduction to Biological Networks LECTURE 1: INTRODUCTION TO NETWORKS Arun Krishnan Koenigsberg, Russia Is it possible to walk with a route that crosses each bridge exactly once,
More informationNetworking Cyber-physical Applications in a Data-centric World
Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday
More informationSelf-Organization in Sensor and Actor Networks
Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationPARALLEL AND DISTRIBUTED PLATFORM FOR PLUG-AND-PLAY AGENT-BASED SIMULATIONS. Wentong CAI
PARALLEL AND DISTRIBUTED PLATFORM FOR PLUG-AND-PLAY AGENT-BASED SIMULATIONS Wentong CAI Parallel & Distributed Computing Centre School of Computer Engineering Nanyang Technological University Singapore
More informationAn Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization
An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science
More informationNetworked Cyber-Physical Systems
Networked Cyber-Physical Systems Dr.ir. Tamás Keviczky Delft Center for Systems and Control Delft University of Technology The Netherlands t.keviczky@tudelft.nl http://www.dcsc.tudelft.nl/~tkeviczky/ September
More informationAutonomic Applications for Pervasive Environments
Autonomic Applications for Pervasive Environments Manish Parashar WINLAB/TASSL ECE, Rutgers University http://www.caip.rutgers.edu/tassl Ack: NSF (CAREER, KDI, ITR, NGS), DoE (ASCI) Pervasive Computing:
More informationSelf-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] PD Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Science University of Erlangen http://www7.informatik.uni-erlangen.de/~dressler/
More informationAn Introduction to Complex Systems Science
DEIS, Campus of Cesena Alma Mater Studiorum Università di Bologna andrea.roli@unibo.it Disclaimer The field of Complex systems science is wide and it involves numerous themes and disciplines. This talk
More information5G for people and things
5G for people and things Key to the programmable world Péter Szilágyi, Nokia Bell Labs ETSI User Conference on Advanced Automated Testing Budapest, 26 th October, 2016 1 Nokia 2016 5G will change the world
More informationAnalysis and Modeling
Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution
More informationFuture X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia
Future X Network Sanjay Kamat Managing Partner, Bell Labs Consulting 1 2017 Nokia Nokia Bell Labs innovations have been changing the way we live for more than 90 years 2 2017 Nokia Nokia Internal Nokia
More informationAutonomic Computing. Pablo Chacin
Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research
More informationThe 5G Business Potential. Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director
The 5G Business Potential Terminsstart Telekom 2017 Monika Byléhn, 5G marketing director DiversE opportunities with 5G 2G 3G 4G 5G VOICE BROWSING VIDEO MULTIPLE INDUSTRIES Ericsson AB 2017 September 2017
More informationCurriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)
Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First
More informationL2 - Internet of Things
UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationStructure of biological networks. Presentation by Atanas Kamburov
Structure of biological networks Presentation by Atanas Kamburov Seminar Gute Ideen in der theoretischen Biologie / Systembiologie 08.05.2007 Overview Motivation Definitions Large-scale properties of cellular
More informationBoon Thau Loo University of Pennsylvania
Summary of Networked Systems Breakout Boon Thau Loo University of Pennsylvania Networked Systems Breakout Series of 15-20 minute talks: Challenges in safe routing (Alex Gurney) Compositional network services
More informationSome Routing Challenges in Dynamic Networks
Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications
More informationConcepts, Technology, and Applications of Mobile Commerce
Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco
More informationUniversity of Maryland. Tuesday, March 2, 2010
Data-Intensive Information Processing Applications Session #5 Graph Algorithms Jimmy Lin University of Maryland Tuesday, March 2, 2010 This work is licensed under a Creative Commons Attribution-Noncommercial-Share
More informationEvolutionary Algorithms. CS Evolutionary Algorithms 1
Evolutionary Algorithms CS 478 - Evolutionary Algorithms 1 Evolutionary Computation/Algorithms Genetic Algorithms l Simulate natural evolution of structures via selection and reproduction, based on performance
More informationPervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38
Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationGraph Algorithms. Many problems in networks can be modeled as graph problems.
Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm
More informationFuture-Generation Wireless Networks: Beyond 3G and 4G.
Future-Generation Wireless Networks: Beyond 3G and 4G. Kumar Adumulla 29 March 2006 Networks 1 Outline Introduction Wireless Networking Generations Issues in 3G What is 4G Beyond 3G & 4G Conclusion References
More informationComputing Technologies
Computing Technologies Computing CPU, Memory, Communication Ubiquitous everywhere indefinite number of times Not really possible or desirable more than in traditional computing so widespread that unnoticed
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationMobile and Ubiquitous Computing
Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor
More informationSwarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013
Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking
More informationOn the Design Framework of Context Aware Embedded System
On the Design Framework of Context Aware Embedded System Xian-He Sun With Abhay Daftari, Nehal Mehta, Shubhanan Bakre Illinois Institute of Technology Request Position, View Point Software Engineering
More informationReconfigurable Robot
Reconfigurable Robot What is a Reconfigurable Robot? Self-reconfiguring modular robots are autonomous kinematic machines with variable morphology They are able to deliberately change their own shape by
More informationDistributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 9: Ubiquitous Clouds and The Internet of Things (suggested for use in 5 lectures in 250 minutes) Prepared by Kai Hwang University
More informationA Graduate Embedded System Education Program
A Graduate Embedded System Education Program Alberto Sangiovanni-Vincentelli Department of EECS, University of California at Berkeley EE249:Fall03 The Killer Applications for the Future? 2 Energy Conservation
More informationImmersive user experiences in Smart Spaces challenges for future communication networks beyond 5G
Immersive user experiences in Smart Spaces challenges for future communication networks beyond 5G Gino Carrozzo Deputy Head of R&D Nextworks www.nextworks.it Visions for Future Communications Summit Oct
More informationApplication Enablement: The Sustainable
Application Enablement: The Sustainable Internet Gustavo Tonini Aug 24, 2011 gustavo.tonini@alcatel-lucent.com Is the current model of Internet sustainable? The evolution of devices and behaviors Vs. A
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationDistributed Routing. EECS 228 Abhay Parekh
Distributed Routing EECS 228 Abhay Parekh parekh@eecs.berkeley.edu he Network is a Distributed System Nodes are local processors Messages are exchanged over various kinds of links Nodes contain sensors
More informationCurriculum 2013 Knowledge Units Pertaining to PDC
Curriculum 2013 Knowledge Units Pertaining to C KA KU Tier Level NumC Learning Outcome Assembly level machine Describe how an instruction is executed in a classical von Neumann machine, with organization
More informationJordan Boyd-Graber University of Maryland. Thursday, March 3, 2011
Data-Intensive Information Processing Applications! Session #5 Graph Algorithms Jordan Boyd-Graber University of Maryland Thursday, March 3, 2011 This work is licensed under a Creative Commons Attribution-Noncommercial-Share
More information5G Enables Enterprise
Enables Enterprise Shirley Hsieh Marketing & Corporate Affairs 1 2017 Nokia Megatrends are changing the world, and the ways we connect with it Network, compute & storage Internet of Things Augmented intelligence
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationMachine Learning Techniques for the Smart Grid Modeling of Solar Energy using AI
Machine Learning Techniques for the Smart Grid Modeling of Solar Energy using AI Professor Dr. Wilfried Elmenreich Dr. Tamer Khatib Networked and Embedded Systems Overview Scope of this tutorial Meta-heuristic
More informationPrivacy in Sensor Nets
Privacy in Sensor Nets Wade Trappe Yanyong Zhang Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Brief Update on the Security Group and then PARIS Motivation Set the
More informationGraph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California
Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)
More informationFigure Potential 5G applications
6. 5G Key Concept 6.1 Key Concepts of 5G End-to-end (E2E) quality required by applications and/or users will be far more diversified in the 5G era than what we have seen in the preceding generations. For
More informationBiological Networks Analysis
Biological Networks Analysis Introduction and Dijkstra s algorithm Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein The clustering problem: partition genes into distinct
More informationCOS Lecture 13 Autonomous Robot Navigation
COS 495 - Lecture 13 Autonomous Robot Navigation Instructor: Chris Clark Semester: Fall 2011 1 Figures courtesy of Siegwart & Nourbakhsh Control Structure Prior Knowledge Operator Commands Localization
More informationTopology Enhancement in Wireless Multihop Networks: A Top-down Approach
Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of
More informationFramework For Cloud Computing Networks Pdf
A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network
More information5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015
5g Use Cases Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 BROADBAND EXPERIENCE EVERYWHERE, ANYTIME 5g USE CASES SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF
More informationGPU-based Distributed Behavior Models with CUDA
GPU-based Distributed Behavior Models with CUDA Courtesy: YouTube, ISIS Lab, Universita degli Studi di Salerno Bradly Alicea Introduction Flocking: Reynolds boids algorithm. * models simple local behaviors
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationInternet of Things 2018/2019
Internet of Things 2018/2019 Resource Management for Dependable IoT Tanir Ozcelebi John Carpenter, 1982 1 What does resource management entail? Guiding questions What are the components of dependability?
More informationCaching video contents in IPTV systems with hierarchical architecture
Caching video contents in IPTV systems with hierarchical architecture Lydia Chen 1, Michela Meo 2 and Alessandra Scicchitano 1 1. IBM Zurich Research Lab email: {yic,als}@zurich.ibm.com 2. Politecnico
More information5G Journey: Path Forward
5G Journey: Path Forward Vida Ilderem, PhD Vice President, Intel Labs Director, Wireless Communication Research Acknowledgement: Schooler, Foerster, Srikanteswara, Himayat, Talwar WE ARE HERE: 5G Reactive,
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationEECS 144/244. Fundamental Algorithms for System Modeling, Analysis, and Optimization. Lecture 1: Introduction, Systems
EECS 144/244 Fundamental Algorithms for System Modeling, Analysis, and Optimization Lecture 1: Introduction, Systems Stavros Tripakis UC Berkeley Spring 2013 1 Computers as parts of Systems ~98% of the
More informationSmart Grid Communications and Networking
Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents
More information1 General description of the projects
1 General description of the projects The term projects are aimed at providing a test ground for the skills and knowledge you picked up during the course and optionally give you a chance to join ongoing
More informationComplex Networks. Structure and Dynamics
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck
More informationSoftware Architecture for Immersipresence
Software Architecture for Immersipresence Alexandre R.J. François Computer Science Department alexandre.francois@usc.edu ARJF 2006 Software Architecture Design, analysis and implementation of software
More informationProgrammable Pattern-Formation and Scale-Independence
Programmable Pattern-Formation and Scale-Independence Radhika Nagpal PostDoctoral Lecturer, MIT Artificial Intelligence Lab radhi@ai.mit.edu This paper presents a programming language for pattern-formation
More informationCONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationDistributed Algorithms in Networks EECS 122: Lecture 17
istributed lgorithms in Networks EES : Lecture 7 epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley Network Protocols often have unintended effects TP Eample TP connections
More informationSensor Network Applications and In-Network Processing
EE360: Lecture 16 Outline Sensor Network Applications and In-Network Processing Announcements 2nd summary due today 12am (1 day extension possible) Project poster session March 15 5:30pm (3 rd floor Packard)
More informationWireless Sensor Networks. Application Domains. Crosslayer Protocol Design in Sensor Networks. Technology Thrusts. Wireless Sensor Networks
EE360: Lecture 16 Outline Sensor Network Applications and In-Network Processing Announcements 2nd summary due today 12am (1 day extension possible) Project poster session March 15 5:30pm (3 rd floor Packard)
More informationDeterministic Ethernet & Unified Networking
Deterministic Ethernet & Unified Networking Never bet against Ethernet Mirko Jakovljevic mirko.jakovljevic@tttech.com www.tttech.com Copyright TTTech Computertechnik AG. All rights reserved. About TTTech
More informationComputational Intelligence Applied on Cryptology: a Brief Review
Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence
More informationwww.grensregio.eu www.smarttooling.eu WIRELESS COMMUNICATION, LOCALIZATION (AND MORE) FOR ROBOTICS PROF. JEROEN HOEBEKE, PROF. BRUNO VOLCKAERT, PROF. PIETER SIMOENS (jeroen.hoebeke@ugent.be) GHENT UNIVERSITY
More informationThe Programmable World Opportunities and Challenges
The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage
More informationRobots & Cellular Automata
Integrated Seminar: Intelligent Robotics Robots & Cellular Automata Julius Mayer Table of Contents Cellular Automata Introduction Update Rule 3 4 Neighborhood 5 Examples. 6 Robots Cellular Neural Network
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationNSF-RCN Workshop #2 Panel 2
NSF-RCN Workshop #2 Panel 2 Moonshot mmw Challenges and Opportunities for 2020, 2025, 2030 Tommy Svensson Department of Electrical Engineering, Communication Systems Group Professor, PhD, Leader Wireless
More informationBoolean network robotics
Boolean network robotics An example of ongoing robotics research Andrea Roli andrea.roli@unibo.it DISI - Dept. of Computer Science and Engineering Campus of Cesena Alma Mater Studiorum Università di Bologna
More informationECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks
ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web
More informationDistributed Consensus in Multivehicle Cooperative Control: Theory and Applications
Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Wei Ren and Randal W. Beard Springer ISBN: 978-1-84800-014-8 Tutorial Slides Prepared by Wei Ren Department of Electrical
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)
More informationThe Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis
Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,
More informationBrowsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments
Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects
More informationRoute Optimization in MANET using FIGA
Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve
More informationA quick review. The clustering problem: Hierarchical clustering algorithm: Many possible distance metrics K-mean clustering algorithm:
The clustering problem: partition genes into distinct sets with high homogeneity and high separation Hierarchical clustering algorithm: 1. Assign each object to a separate cluster.. Regroup the pair of
More information