Lori Pollock Professor Program Analysis, Software Development/Maintenance Tools, Optimizing Compilers My Journey to today: 1981 Started Grad School Late.

Slides:



Advertisements
Similar presentations
Academic vs. Industrial Research Jobs
Advertisements

Widening the Research Pipeline Update to NSF/CISE BPC Evaluation Workshop December 7, 2006.
Kensington Oracle Edition: Open Discovery Workflow Meets Oracle 10g Professor Yike Guo.
CAREER PATHS CONTRASTED Large research university Small teaching college Government research lab Industrial research lab.
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
 Copyright 2006 Digital Enterprise Research Institute. All rights reserved. The Digital Enterprise Research Institute Stefan Decker Digital.
Exploring the Neighborhood with Dora to Expedite Software Maintenance Emily Hill, Lori Pollock, K. Vijay-Shanker University of Delaware.
Hiperspace Lab University of Delaware Antony, Sara, Mike, Ben, Dave, Sreedevi, Emily, and Lori.
Design of a Framework for Testing Security Mechanisms for Program-Based Attacks Ben “Security” Breech and Lori Pollock University of Delaware.
Using Natural Language Program Analysis to Locate and understand Action-Oriented Concerns David Shepherd, Zachary P. Fry, Emily Hill, Lori Pollock, and.
EPrints.FRI The institutional publications database of the Faculty of Computer and Information Science, University of Ljubljana, Slovenia Faculty of Computer.
CS 290C: Formal Models for Web Software Lecture 10: Language Based Modeling and Analysis of Navigation Errors Instructor: Tevfik Bultan.
Computer and Information Sciences EDUCATION RESEARCH.
SwE 434. Rational Quality Manager Rational Quality Manager is a collaborative, Web-based tool that offers comprehensive test planning, test construction,
Handheld Educators Leadership Program: Handhelds in the Hands of Learners Lynn A. Elder Marsha Gladhart WSU College of Education.
Quality is about testing early and testing often Joe Apuzzo, Ngozi Nwana, Sweety Varghese Student/Faculty Research Day CSIS Pace University May 6th, 2005.
NGNS Program Managers Richard Carlson Thomas Ndousse ASCAC meeting 11/21/2014 Next Generation Networking for Science Program Update.
Microsoft ® Official Course Monitoring and Troubleshooting Custom SharePoint Solutions SharePoint Practice Microsoft SharePoint 2013.
DNN LOVES JENKINS FOR CONTINUOUS INTEGRATION
Testing RAVEN Helmut Neukirchen Faculty of Industrial Engineering, Mechanical Engineering and Computer Science University of Iceland, Reykjavík, Iceland.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 Building Applications.
Load Test Planning Especially with HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Corporate Efficiency Meeting Improving Your Business Processes Using SharePoint and Beyond.
Computing in Atmospheric Sciences Workshop: 2003 Challenges of Cyberinfrastructure Alan Blatecky Executive Director San Diego Supercomputer Center.
Development Testing – Is It Worth It? Arthur Hicken September 2012.
MGS Testing A High Level Overview of Testing in Microsoft Games Studio Joe Djorgee – Test Lead.
CRA-W Promotion & Tenure Dilma Da Silva, Chair Texas A&M Kathryn S McKinley, Microsoft Research.
Lori Pollock Professor, CIS Program Analysis, Software Development & Maintenance Tools, Optimizing Compilers ‘81 B.S. CS and Econ, Allegheny ’81-’86PhD.
Effective User Services for High Performance Computing A White Paper by the TeraGrid Science Advisory Board May 2009.
Scaling to New Heights Retrospective IEEE/ACM SC2002 Conference Baltimore, MD.
Mihir Daptardar Software Engineering 577b Center for Systems and Software Engineering (CSSE) Viterbi School of Engineering 1.
Presented by Abirami Poonkundran.  Introduction  Current Work  Current Tools  Solution  Tesseract  Tesseract Usage Scenarios  Information Flow.
Computer Measurement Group, India Optimal Design Principles for better Performance of Next generation Systems Balachandar Gurusamy,
1 LabVIEW DSP Test Integration Toolkit. 2 Agenda LabVIEW Fundamentals Integrating LabVIEW and Code Composer Studio TM (CCS) Example Use Case Additional.
material assembled from the web pages at
Per Møldrup-Dalum State and University Library SCAPE Information Day State and University Library, Denmark, SCAPE Scalable Preservation Environments.
1.8History of Java Java –Based on C and C++ –Originally developed in early 1991 for intelligent consumer electronic devices Market did not develop, project.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
4.2.1 Programming Models Technology drivers – Node count, scale of parallelism within the node – Heterogeneity – Complex memory hierarchies – Failure rates.
CSE 219 Computer Science III Program Design Principles.
1 Introduction to Software Engineering Lecture 1.
Lucian Voinea Visualizing the Evolution of Code The Visual Code Navigator (VCN) Nunspeet,
Computer Science Automated Software Engineering Research ( Mining Exception-Handling Rules as Conditional Association.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University IWPSE 2003 Program.
Software Maintenance Speaker: Jerry Gao Ph.D. San Jose State University URL: Sept., 2001.
LOGOPolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware Royal, P.; Halpin, M.; Dagon, D.; Edmonds, R.; Wenke Lee; Computer Security.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
CS 1120: Computer Science II Software Life Cycle Slides courtesy of: Prof. Ajay Gupta and Prof. James Yang (format and other minor modifications by by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Heather Gwaltney August 22, 2012, 9:00 a.m. - 10:30 a.m MOWAA Annual Conference Gaylord National Harbor Hotel Advanced E-Strategy.
IFIP TC5 Working Group 5.4 Computer Aided Innovation Objectives: The Working Group will: – Identify the different existing approaches – Share opinions,
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
GHC 2014 Leadership Lori Pollock, University of Delaware Kathryn S McKinley, Microsoft Research.
Research Overview Gagan Agrawal Associate Professor.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
WWW4MAIL Past, present and future Onime, Clement E Scientific Computing Section The Abdus Salam ICTP Trieste, Italy.
Enabling Control over Adaptive Program Transformation for Dynamically Evolving Mobile Software Validation Mike Jochen, Anteneh Anteneh, Lori Pollock University.
Hunter Trainers & Assessors Network (HTAN) Facilitator HTAN Recognition Network – Sue Flindell.
Resource Optimization for Publisher/Subscriber-based Avionics Systems Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee.
The Graduate School Experience A.J. Brush, Microsoft Lori Pollock, University of Delaware 2012.
CSC 591/791 Reliable Software Systems
David Shepherd, Zachary P. Fry, Emily Hill, Lori Pollock, and K
Continuous Automated Chatbot Testing
Athabasca University School of Computing and Information Science
Human Complexity of Software
Lori Pollock Professor, CIS Program Analysis, Software Development & Maintenance Tools, Optimizing Compilers ‘81 B.S. CS and Econ, Allegheny ’81-’86 PhD.
Presentation transcript:

Lori Pollock Professor Program Analysis, Software Development/Maintenance Tools, Optimizing Compilers My Journey to today: 1981 Started Grad School Late 1985 Married Mark Early 1986PhD in CS at University of Pittsburgh 1988 Lauren was born Assistant Professor, Rice University, Houston 1990 Lindsay was born 1991-present Assistant, Associate, Full Professor UD CIS 1995 Matt was born

What I do here at UD Research –Software Engineering and Compilation Lab (Hiperspace) 213 Smith Hall –Collaborations Vijay Shanker (UD CIS), Lisa Marvel (Army Research Lab), Martin Swany (UD CIS), John Cavazos (UD CIS), Guang Gao (UD ECE) –Funding Several NSF grants; previously Army funding Graduate Teaching –CISC 672 Compilers –CISC 872 Program Analysis and Transformations –CISC 879 Software Testing and Maintenance –CISC 879 Software Tools and Environments

What I do outside UD Cochair, Computing Research Association (CRA)’s Committee on the Status of Women in Computer Research (CRA-W) Mentoring – speaker at mentoring workshops for undergrads, grads, assistant and associate profs, and industry lab researchers Program committees, conference organization, NSF panels, paper reviews,… (typical of university researchers)

Hiperspace Lab Grad Students University of Delaware Emily Gibson PhD Antony Danalis PhD Ben Breech PhD Giri Sridhara PhD Kishen Maloor Masters Thesis

Just Completed PhD in 2007 Mike Jochen Assistant Prof East Stroudsburg U Sara Sprenkle Assistant Prof Washington & Lee U David Shepherd Postdoc University of British Columbia, Canada

Research in Hiperspace Program Analysis Compiler Technology Natural Language Analysis of Programs Testing Web Applications Mobile Code Security Optimization of Cluster Parallel Programs Runtime Test Generation via Dynamic Compilers Software Engineering…………..Security… Compilers….……Parallel Computing Dave, Emily, Giri, Kishen Antony Ben Mike Sreedevi, Sara, Emily

ASPhALT: Automatic System for Parallel AppLication Transformation Research Problem How can scientific codes be scaled to large numbers of CPUs? –Communication impedes scalability Approach Hide communication latency Collect cluster “knowledge” Compiler analyze dependencies Asynch I/O harness overlap Integrated system to optimize communication Contribution - First to “cluster-optimize” existing MPI codes

RUGRAT: RUntime GeneRAtion of Tests with Dynamic Compilers Dynamic Compiler Executing Program Analysis Input Results Research Question: How can dynamic compilation technology be exploited for use beyond program optimization? Approach: Extend to analyze for: Software engineering tasks – impact analysis Program security mechanism and error handling testing Dynamic compilers: perform analysis and code modification at runtime

SECRYT – StEgo-CRYpto Tamper detection Research Problem –Mobile code, particularly dynamically evolving mobile code can greatly enhance current computing models –How can we validate or control dynamically evolving mobile programs in an efficient way? Server Clients Network Server Clients Network Proposed Approach –Embed static Tamper Detection Marks (SECRYT) –Control how the program dynamically evolves (DOCTORS) Contribution –Enable efficient mobile code tamper detection via steganography –Enable distributed dynamic program transformation technologies in a safe, efficient manner

Maintenance Testing for Web Applications Beta Web Application (v.0.9) Deployment Web Application (v.1.0) Users access Record field data field data Test v.1.0 with field data Research Problem: How can we exploit user session logging for testing of web applications after initial deployment, with minimal tester effort? Collect, cluster, reduce user session data on-the-fly and automate testing process Contribution: Scalable, cost-effective, practical, automated structural testing framework for web applications Approach:

Natural Language-based Analysis of Software Research Problem % software costs are in reading and navigating large software systems to fix bugs and add new features. - Programmers leave clues of their intent as they choose names. Proposed Approach –Develop, extend, and apply natural language-based analysis of programmer-given names and comments and use in client tools Contribution - Aid understanding, debugging, maintenance, development Focus on actions Correspond to verbs Verbs need Direct Object

Clients of NLPA Thus Far FindConcept: Search Tool Timna: Aspect Miner Dora the Explorer: Program Explorer given a seed NL technology used Synonyms, collocations, morphology, word frequencies, part-of- speech tagging, AOIG Evaluation indicates Natural language information shows real promise for taking software development tools to the next level of effectiveness Key to success Accurate extraction of NL clues

Current Research in Hiperspace Program Analysis Compiler Technology Natural Language Analysis of Code Optimization of Cluster Parallel Programs Runtime Test Generation via Dynamic Compilers Software Engineering…………..Security… Compilers….……Parallel Computing Natural Language Analysis of comments

Hiperspace Goals for Students -Learn how to identify, formulate, and address important open problems -Publish in high quality conferences -Gain teaching experience -Actively participate in post- graduation activities -Develop self confidence and independence -Build a professional/peer community - And, have fun!