A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
2021 IEEE 39th VLSI Test Symposium (VTS)
His research interests include computer architecture, VTS 2021 Keynote 1 ...doi:10.1109/vts50974.2021.9440999 fatcat:f62zevfrm5cnjkllpvcmhc35su
2020 International Conference on Software Security and Assurance (ICSSA)
and 2012, respectively. After completing his PhD, he worked as a post-doctoral fellow in the Department of Electrical and Computer Engineering at the University of British Columbia. He previously worked for Samsung Electronics as a senior engineer from 2004 to 2008. His current research interest is focused on usable security and blockchain. Abstract: We will discuss basic principles to help audiences develop more secure and usable solutions through many real-world examples and introduce recentdoi:10.1109/icssa51305.2020.00007 fatcat:phgvgaw64zhkpoiszjjvlbol2u
more »... esearch results about graphical passwords for smartphones. I will explain that while usability and security are often seen as competing design goals, in practice security mechanisms have to be usable to be effective. Wrong assumptions about users can lead to systems that are useless and vulnerable, with many security solutions failing because of poor usability. Therefore, it is challenging to develop practical and secure user authentication schemes without relying on those wrong assumptions. In this talk, I will explain the security and usability limitations of existing Android graphical passwords and propose a new direction of graphical password schemes. x 2020 International Conference on Software Security and Assurance (ICSSA) | 978-1-6654-3246-7/20/$31.00 Abstract: With the increase of interconnectivity and ubiquitous data access, new services have emerged. Distributed Ledger Technologies and their underlying principles can be used to reach agreement or consensus upon a distributed state in a highly distributed environment. They have many different aspects and can therefore be viewed from various angles, including the financial and economic, legal, political, and sociological perspective, as well as considering technical and socio-technical points of view.
2011 Simpasio em Sistemas Computacionais
He is a Fellow of the AAAS, ACM, IEEE, and SIAM and a member of the National Academy of Engineering. ix ix Keynote 2 ... Keynote 3 Towards Exaflop Supercomputers Mateo Valero Barcelona Supercomputing Center, Spain Abstract: Having recently surpassed the Petascale barrier, supercomputers designers and users are now facing ...doi:10.1109/wscad-ssc.2011.6 fatcat:y5ropegurjczbjvkvuvv4yn6yy
2020 6th International Symposium on System and Software Reliability (ISSSR)
Studying trends in system vulnerabilities shows some degree of progress, but it is slow. At the same time, we see bugs ranging from user annoyances to major security flaws in much consumer software. How are ordinary bugs and security vulnerabilities related Vulnerability studies show that about two thirds of vulnerabilities are the result of ordinary coding errors, not security-specific flaws. But other studies have found little or no correlation between bugs and later vulnerabilities. How candoi:10.1109/isssr51244.2020.00008 fatcat:777u2ikmqffsbnq2wnvxjynume
more »... oth lines of research be correct? If most vulnerabilities are caused by regular coding errors, why isn't there a stronger correlation between the two? In this talk, we'll show that there really is no conflict, and the explanation points to ways of reducing ordinary errors as well as security flaws. About the Speaker Rick Kuhn is a computer scientist in the Computer Security Division of the National Institute of Standards and Technology and is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE). He has authored three books and more than 150 papers on information security, empirical studies of software failure, and combinatorial methods in software testing, and co-developed the role based access control model (RBAC) used worldwide. Abstract Pair programming is one of the promising techniques advocated in agile development paradigm, but it tends to be more costly than one person-based programming and to lack a rigorous principle for governing the cooperation of the two programmers. In our recent work on Agile Formal Engineering Methods, we put forward a novel technique called Software Construction Monitoring and Predicting (SCMP) to study an intelligent and automatic approach to human-machine pair programming (HMPP). Its aim is to automatically, dynamically monitor the process of software construction for fault detection and to predict the possible future contents of the software towards its error-free completion based on existing programming experiences and knowledge. This research field is still in its beginning and there are many challenging issues to be addressed.
2021 IEEE 18th International Conference on Software Architecture (ICSA)
In this keynote, I present how quantum software developers can help to advance quantum computing. ... Caution: You might walk away from this keynote with a smile on your face. ...doi:10.1109/icsa51549.2021.00008 fatcat:7duvmqjknndjheov5knofxxqce
2022 IEEE Conference on Software Testing, Verification and Validation (ICST)
[Keynote 3 ] 3 Knowledge management in medicine -Are comprehensive electronic clinical libraries the answer ? ... Ultimately society will benefit from this enhanced model of residency training that focuses on the development of practitioners that are prepared to engage in life-long learning. [ Keynote 2] e-Healthcare ...doi:10.3233/thc-2002-10601 fatcat:q57hhmi5pff5vmy2pod6o4kpqq
Lang BernaBiotech, Berne, Switzerland Keynote not received [ Monday 16 September 2002, 13.45-14.15] The infectious origin of APS. ... James Larrick Planet Biotechnology, San Diego, USA Keynote not received [Tuesday 17 September 2002, 08.30-09.00] Stealth antibodies Herman Waldmann, Mark Frewin and Luis Graca Sir William Dunn ...doi:10.3233/hab-2002-111-201 fatcat:awc77omgj5hwfjwpmdhuwhv4su
2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing
In this keynote lecture the author presents energy adaptation issues in ubiquitous computing. ... In this keynote lecture the author presents the recent issues regarding the mobile cloud and green computing. ... In this keynote lecture the author presents energy adaptation issues in ubiquitous computing. ...doi:10.1109/music.2012.57 fatcat:lswfr2nlmvhf7iojg3e632d6d4
2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)
This talk proposes that data envelopment analysis (DEA) should be viewed as a method (or tool) for data-oriented analytics in performance evaluation and benchmarking. While computational algorithms have been developed to deal with large volume of data (decision making units, inputs, and outputs) under the conventional DEA, valuable information hidden in big data that are represented by network structures should be extracted by DEA. These network structures, e.g., transportation and logisticsdoi:10.1109/codit49905.2020.9263875 fatcat:sxl5w4xthbfvjbfm4d3t2xq3d4
more »... tems, encompass a broader range of inter-linked metrics that cannot be modelled by the conventional DEA. It is proposed that network DEA is related to the value dimension of big data. It is shown that network DEA is different from the standard DEA, although it bears the name of DEA and some similarity with the conventional DEA. Network DEA is big Data Enabled Analytics (big DEA) when multiple (performance) metrics or attributes are linked through network structures. These network structures are too large or complex to be dealt with by the conventional DEA. Unlike the conventional DEA that are solved via linear programming, general network DEA corresponds to nonconvex optimization problems. This represents opportunities for developing techniques for solving non-linear network DEA models. Areas such as transportation and logistics system as well as supply chains have a great potential to use network DEA in big data modeling. Abstract Sliding Mode Control is a nonlinear control methodology based on the use of a discontinuous control input which forces the controlled system to switch from one structure to another, evolving as a variable structure system. This structure variation makes the system state reach in a finite time a pre-specified subspace of the system state space where the desired dynamical properties are assigned to the controlled system. In the past years, an extensive literature has been devoted to the developments of Sliding Mode Control theory. This kind of methodology offers a number of benefits, the major of which is its robustness versus a significant class of uncertainties during the sliding mode. Yet, it presents a crucial drawback, the so-called chattering, which may disrupt or damage the actuators and induce unacceptable vibrations throughout the controlled system. This limits the practical applicability of the methodology, especially in case of mechanical or electromechanical plants. This drawback has been faced by the theoretical developments of the last two decades. They will be reviewed in this talk, illustrating how the "modern" results can be profitably used to solve practical control problems in complex systems as the automotive ones. The talk will develop starting from single vehicle control and coming to discuss formation control of fleets of connected and automated vehicles (CAVs), with the aim of producing a beneficial impact on road traffic. . Her research activities are mainly in the area of automatic control of complex systems, with application to automotive systems, robotics, power networks and vehicular traffic. She is particularly interested in autonomous driving and coordinated control of vehicles. She was coordinator of the Italian research team in the European Projects ITEAM (Interdisciplinary Training Network in Multi-Actuated Ground Vehicles, Marie Skłodowska-Curie Action, 2016-2019). She was scientific leader of several research projects funded or co-funded by companies. She has authored or co-authored more than 380 scientific papers, with 125 international journal papers and 3 books. Moreover, she contributed, with invited chapters, to several edited books. She Abstract In the last years, deep learning methods and particularly Convolutional Neural Networks (CNNs) have exhibited excellent accuracies in many image and pattern classification problems, among others. The strengthening smart data to get quality data is the foundation for good data analytics in general. It is very important for getting a good deep learning model from an applied point of view. Consolidating smart data requires a data preprocessing analysis to adapt the raw data to fulfill the input demands of each learning algorithm. In contrast to the classical classification models, the high abstraction capacity of CNNs allows them to work on the original high dimensional space, which reduces the need for manually preparing the input. However, a suitable data preprocessing is still important to improve the quality of the model. One of the most used preprocessing techniques with CNNs is data augmentation for small image data sets, which increases the volume of the training data set by applying several transformations to the original input. There are other data guided preprocessing procedures for specific problems, like image brightness or contrast, noise adaptation, among others. In this talk we present the connection between deepening smart data and heightening deep learning, focused on some applications enhancing. Among them, we will present some video surveillance applications and the best result in the MNIST problem with only 10 errors. Biography of Prof.
A bs t rac t A bs t rac t Most of the functions of our society are based on networks designed during the late 1800s, and are modeled after centralized water systems. The spread of mobile cellular networks, and particularly the sensors contained in mobile telephones and cars, allow these networks to be reinvented as much more active and reactive control networks. Because the demands placed on these networks are due to human behavior, the key technical challenge in building control systems fordoi:10.1109/percom.2011.5767572 dblp:conf/percom/Pentland11 fatcat:q3xj62lojfcgflms473acrearu
more »... m is the ability to sense, model, and shape the relevant human behaviors. The ability to create such inte-grated human-computer network systems will transform the economics of health, finance, logistics, and transportation. A bs t rac t A bs t rac t Computing is becoming pervasive. The development of commonly available platforms has opened ubiquitous com-puting to a massive and creative developer base. We see a common application template of smart phone and cloud computing service, bringing personalized experiences to the user while companies seek (often desperately!) to monetize the information derived from the use of the applications. This sharing of information and co-creation of value is at the heart of the digital economy, but implementation for ethical companies often hits a privacy brick wall, while others are blissfully unaware of the privacy minefield they are walking through. The talk will discuss some of the issues in personal information sharing, the deep social context in which this sharing takes place in the real world, present some challenges for the future in embedding this sharing in technology and some of our work in this field.
2013 12th International Conference on Document Analysis and Recognition
Handwriting is a very complex neuromotor skill requiring the interaction of many cognitive processes. It normally aims at producing a message to be memorized as an ink trace left on a writing medium. At the core of this ability stands the control of neuromuscular networks by the Central Nervous System, each of these being made up of a large number of neural and muscular coupled sub-systems. According to Kinematic Theory of rapid human movements, the trajectory of a pen tip can be seen as a timedoi:10.1109/icdar.2013.297 fatcat:22zilmg2zvalxm3pm5jubdu6ra
more »... superimposition of strokes, each one being described by a lognormal function and considered as the basic unit of handwriting. This paradigm, which relies on the Central Limit Theorem, has not only been experimentally confirmed in numerous predictive and physiologically significant tests but it has also been shown to be the ideal mathematical description for the impulse response of a neuromucular system. This demonstration suggests that lognormal velocity patterns, which are the results of an asymptotic convergence, can be interpreted as reflecting the behavior of subjects who are in perfect control of their movements, here after referred to as lognormal writers. To illustrate this definition, we present various software tools and psychophysical tests used to investigate these ideal behaviors. We emphasize how the lognormal parameters extracted during various tasks can be used to analyze some underlying psychophysical processes associated with their realization, pointing out successful strategies for accomplishing a given task. To investigate the convergence toward lognormality, we report a few original projects conducted by our team and our collaborators. On the one hand, we focus on handwriting learning, to illustrate for example how kindergarten children moves toward lognormality as they become more fluent writers. On the other hand, we exemplify how aging phenomena affect handwriting by pointing out the increasing departure from the ideal lognormal behavior as the control of the fine motricity begins to decline. We particularly focus on investigations dealing with brain strokes, Parkinson and Alzheimer diseases to point out how the lognormal parameter sets obtained from the model could also be used as a metric to characterize some disabilities and their evolution with time. Then we show how lognormality can be exploited as a reference for the automatic generation of huge human like database of synthetic gestures, signatures and script independent handwritten patterns. We also present some CAPTCHA applications and discuss the potential impact of the theory on signature verification, writer identification and text recognition. Among other things, this lecture aims at elaborating a theoretical background for many handwriting applications as well as providing some basic knowledge that could be integrated or taking care of in the development of new automatic pattern recognition systems to be exploited in on-line and off-line document analysis and recognition as well as in biomedical engineering and cognitive neurosciences. xxx
Europe is at the centre of attention: it has recently been expanded to 25 States; its new Constitution has recently been signed, yet its industrial competitiveness is questioned again. What is happening to the ICT sector, or, more precisely, to the telecommunications industry?doi:10.1109/iscc.2005.90 dblp:conf/iscc/X05d fatcat:pccl4flhizd4fovdw3io6yetia
Lecture Notes in Computer Science
This keynote talk goes through the past, present and future of ISO/IEC 27001 from its early beginnings as a British Standard to its rapid rise as the most successful, best selling international information ...doi:10.1007/978-3-642-13241-4_1 fatcat:toiwzybfcvdvnfepxzhyedbvga
In clinical use, cancer immunotherapy with humanized monoclonal antibodies (mAbs) has showed success. It is clear that the choice of the target antigen, the characteristics of the mAb and their biology have to be carefully chosen in order to show in vivo efficacy. The target antigen should be commonly expressed on tumor cells (anti-tumor approach) or on the tumor neovasculature (anti-angiogenic). In the present study we will focus on two examples: (1) drug targeted delivery via mAb to the tumordoi:10.3233/hab-2000-10101 fatcat:txre5xkcmbhdbfy24poku3shfa
more »... cells, and (2) the criteria and issues for the development of the anti-angiogenic mAbs. SB-408075, an antibody-directed small-molecule cytotoxin. SB-408075 is a conjugate of a humanized mAb, huC242, with a potent semi-synthetic maytansinoid, DM1. The mAb recognizes the CanAg antigen that has been reported as being expressed on 70+% of colon cancer. Immunohistochemistry confirmed high level of expression of this antigen in colon cancer biopsies. It was also observed that the antigen was expressed in a significant proportion of non-small cell lung carcinoma. Selectivity for tumor vs. normal tissue for this agent appears to be due to expression of the antigen only on the lumenal surface of normal gastrointestinal tissue and secretory epithelium of the pancreas and salivary glands. We confirmed the results obtained with SB-408075 by ImmunoGen, Inc. in advanced human colon cancer xenografts. In athymic mice bearing established antigen-positive HT-29 and Colo-201 human colon tumors, treatment with SB-408075 at doses well below an MTD resulted in complete and long-term regressions. Colon carcinoma SW-620 appeared to be negative for expression of CanAg by Flow cytometry but showed ca. 5% expression in tumor by immunohistochemistry. Treatment of mice bearing this tumor with SB-408075 resulted in partial regressions and tu-mor growth delay at high doses of SB-408075, indicating that even minimal antigen expression can generate some sensitivity to this immunotoxin. In many tumor specimens, including HT-29 and Colo-201, expression of antigen was heterogeneous, with only 20-50% of cells demonstrating reactivity with the C242 mAb. An important question is why tumors with heterogeneous antigen expression respond to SB-408075 with complete regression as opposed to brief tumor growth delay before outgrowth of antigen-negative cells. This was addressed in vitro comparing the homogeneous high expressing Colo-205 with HT-29. In a colony-forming assay, SB-408075 had a subnanomolar IC 50 in both cell lines. The IC 50 for SB-408075 in Colo-205 cells was identical when evaluad in a monolayer XTT assay, but, in this assay format, the IC 50 was shifted 100-fold higher for HT-29 cells. This suggests that there is likely a bystander effect in which SB-408075 binds to and is internalized by antigen-positive cells with intracellular release and activation of DM1. The activated drug is then passively or actively effluxed and kills neighboring antigen-negative cells (MDR cell lines are resistant to maytansine). SB-408075 is currently in Phase I clinical trial in patients with colorectal, pancreatic and non-small cell lung cancers. SB 392423, an anti-αVβ3 integrin mAb (antiangiogenic target). The formation of new blood vessels (angiogenesis) plays an important role in a variety of pathologic processes (e.g., cancer, rheumatoid arthritis, restenosis). Adhesion molecules contribute to these processes. Among these are several members of the integrin family. The heterodimeric αVβ3 integrin is upregulated on the sprouting endothelial tumor neovasculature and on vascular smooth muscle cells after restenosis. We pursued two hypotheses (a) that inhibition of αVβ3-mediated angiogenesis may provide a therapeutic benefit in the treatment of cancer, and (b) inhibition of αVβ3-mediated smooth muscle cell migration following balloon angioplasty prevents restenosis. Murine and humanized mAbs with anti-αVβ3 activity were generated. The high affinity (1.3 nM) αVβ3-specific mAb, D12 was humanized and evaluated in in vitro and in in vivo systems. Since the mAbs are specific/selective for given inte-
« Previous Showing results 1 — 15 out of 137,661 results