Criticality Aware Smart Spaces T. Mukherjee Impact Lab (http://impact.asu.edu) Department of Computer Science & Engineering Ira A. Fulton School of Engineering.

Slides:



Advertisements
Similar presentations
SYNERGIES BETWEEN DISASTER RISK REDUCTION AND ADAPTATION TO CLIMATE CHANGE Lisa Schipper 7 January 2010.
Advertisements

PROJECT RISK MANAGEMENT
Lessons from Katrina for Metropolitan Regions Louise K. Comfort Graduate School of Public & International Affairs University of Pittsburgh
Public Health Seattle & King County Incident Command System Overview May 2004.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
Computational Artistic Creativity and its Evaluation DAVID C BROWN Computer Science Department WPI, Worcester, MA 01609, USA.
Decentralized Coordination in Emergency Management Situations Silvia Nittel Spatial Information Science & Engineering University of Maine, USA.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Computer Engineering 203 R Smith Risk Management 7/ Risk Management The future can never be predicted with 100% accuracy. Failure to plan for risks.
Lesson 17: Natural Hazards Flooding near Olympia, WA, Dec 2007 Big Question: Why Are More Of Them Becoming Disasters and Catastrophes?
Abandoned Object Detection for Indoor Public Surveillance Video Dept. of Computer Science National Tsing Hua University.
POLITECNICO DI TORINO TRIBUTE and DIMMER. DIMMER - The context One of the major challenges in today’s economy concerns the reduction in energy usage and.
Computer Simulation A Laboratory to Evaluate “What-if” Questions.
Disaster Recovery as a Cloud Service Chao Liu SUNY Buffalo Computer Science.
Definition and Simulation of Occupant Behavior in Buildings Da Yan Tsinghua University, China Tianzhen Hong Lawrence Berkeley Lab, USA Nov 14, 2013 Dublin,
Incident Response Mechanism for Chemical Facilities By Stephen Fortier and Greg Shaw George Washington University, Institute for Crisis, Disaster and Risk.
MITIGATION PREPAREDNESS RESPONSE RECOVERY FOUR PHASES OF EMERGENCY MANAGEMENT Pre-event Post event Pre-event.
Criticality Aware Access Control Model for Pervasive Applications Sandeep K. S. Gupta, T. Mukherjee, K. Venkatasubramanian Impact Lab (
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
2008 IEEE International Conference on Technologies for Homeland Security A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises.
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
Software Project Management
TCU Dept. of Computer Science CRESCENT Database Issues in Smart Homes Pervasive Intelligent Environments Spring 2004.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Combined Central and Subspace Clustering for Computer Vision Applications Le Lu 1 René Vidal 2 1 Computer Science Department, Johns Hopkins University,
Automated Assistant for Crisis Management Reflective Agent with Distributed Adaptive Reasoning RADAR.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
A Framework for Enforcing Information Flow Policies Bhuvan Mital Secure Systems Laboratory, Stony Brook University A Thesis Presentation in Partial Fulfillment.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Hazards Identification and Risk Assessment
Secure Systems Research Group - FAU 1 Active Replication Pattern Ingrid Buckley Dept. of Computer Science and Engineering Florida Atlantic University Boca.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Group 2 Summary. Objective 1: Need for strengthening comprehensive national influenza surveillance systems 1) How have surveillance strategies changed?
April 28, 2003 Early Fault Detection and Failure Prediction in Large Software Systems Felix Salfner and Miroslaw Malek Department of Computer Science Humboldt.
Proximity Based Access Control for Smart- Emergency Departments * Sandeep Gupta*, T. Mukherjee*, K. Venkatasubramanian* and T. Taylor + *Department of.
Egocentric Context-Aware Programming in Ad Hoc Mobile Environments Christine Julien Gruia-Catalin Roman Mobile Computing Laboratory Department of Computer.
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
Linking preparedness, response and recovery Identify links between short-term humanitarian response and each stage of the disaster management cycle Identify.
ST GABRIEL’S PREPAREDNESS INITIATIVE Planning Process Meeting 16 Jan 2013.
Phoenix Convention Center Phoenix, Arizona Transactive Energy in Building Clusters [Innovation][Regional Innovation in Arizona] Teresa Wu Arizona State.
Tornado Risk and Impact Analysis Using Dasymetric Modeling John D. Crabtree, Ph.D. Department of Computer Science and Information Systems University of.
Emergency Transportation Operations Initiative ITS JPO Lead: Linda Dodge Technical Lead: Vince Pearce, Office of Transportation Operations.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
Disaster and Emergency Management: Past Approaches and Future Possibilities Gary R. Webb Department of Public Administration Emergency Administration and.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Preparation of Drought Vulnerability Assessment Study to Develop Iraq National Framework for Integrated Drought Risk Management (DRM) PAVING THE WAY FOR.
 The contribution of this work has been the application of formal methods for secure operations of cyber- physical systems  External observer in above.
Maximising Risk Reduction and Resilience throughout the Disaster Management Cycle Bill Thomson, Associate Director, QLD October, 2012.
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Chapter 6: Database Project Management
1st Draft for Defining IoT (1)
Ayushman: Pervasive Health Monitoring System and Testbed
Research Project Overview
Midwestern Regional Conference October 7 - 8, 2008 St. Louis, MO
Sentio: Distributed Sensor Virtualization for Mobile Apps
Model-Driven Analysis Frameworks for Embedded Systems
An Adaptive Middleware for Supporting Time-Critical Event Response
Smart Learning concepts to enhance SMART Universities in Africa
THE INTERNET MOTION SENSOR: A Distributed Blackhole Monitoring System
Introduction to: National Response Plan (NRP)
Unit I Module 3 - RCM Terminology and Concepts
Presented To: Sir Ali Raza Presented By: Kainat(06)Riffat(024)Asqsa(034) Group#06.
Realizing Closed-loop, Online Tuning and Control for Configurable-Cache Embedded Systems: Progress and Challenges Islam S. Badreldin*, Ann Gordon-Ross*,
Software Risk Management
Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme
Presentation transcript:

Criticality Aware Smart Spaces T. Mukherjee Impact Lab ( Department of Computer Science & Engineering Ira A. Fulton School of Engineering Arizona State University Tempe, Arizona, USA Supported in part by Mediserve Inc and US National Science Foundation

Overview Motivation Critical Events, Criticality Challenges Conclusions and Future Work

Motivation Smart spaces – e.g. homes, hospitals – allow inhabitants to physically interact with information-rich virtual entities. Critical events in smart spaces e.g.  attacks (similar to 9/11) to buildings  break-in in the house  tornado warning Smart space should facilitate proper handling of complexities/chaos caused by a critical events. Challenges include:  Detection  Planning/Scheduling  Manageability  Adaptability  ….

Criticality management in smart spaces Interaction between Virtual, Physical and Human Distributed Uncertainty Rapidly Changing

Characteristics of Critical Events Requires exceptional set of actions for controlling the emergency – avoiding catastrophic failure. Request based reactive context evaluation is inadequate. Proactive context monitoring is required. We define the term ‘Criticality’ as  the consequences on the system due to critical events Normal actions Critical event Exceptional actions

Temporal Requirement for Criticality Every critical event has a Window of opportunity (W o ) to respond. Value of W o is criticality dependent. WoWo Critical Event Mitigation Time Normal actions Mitigative actions

Examples of Criticality and W o Heart attack - 1st one hour critical (golden hour). Tornado – evacuation within 5 minutes of first warning. * Data-center - 90 seconds after cooling failure. Disaster Recovery – 30 days time. ** *

Some Fundamental Research Issues How to effectively model the manageability of the emergencies?  How to estimate timing constraints for the criticalities?  How to include resource constraint in criticality management?  How to incorporate the stochastic nature of the system due to human involvement into the manageability?  How to adapt the system parameters based on the outcome of the criticality management process? How to plan, prepare for and facilitate mitigation of emergencies?  Understand interactions between physical and virtual entities.  Uses real time AI planning and scheduling for mitigation.  How to effectively detect critical events in a timely manner? How to evaluate (simulate/emulate) system performance?  How to determine the testbed?  How to implement the management process?  How to identify specific scenarios to validate the model?

Criticality Aware Smart Space (CASS) – system view

Conclusions & Future Work Criticality awareness is necessary for effectiveness of smart spaces. Future Works  Theoretical modeling of system behavior when critical events occur.  Design and develop effective management algorithm.  Validation