1. Process Gather Input – Today Form Coherent Consensus – Next two months.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 17 Auction-based.
Advertisements

Distributed Data Processing
Introducing Campus Networks
Milena Mihail Theory Applications driving technology :  Th e Internet Phenomenon : - New Computational Paradigm  Biology, Genomics Theory is/has historically.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
High Availability Group 08: Võ Đức Vĩnh Nguyễn Quang Vũ
Statistical Methods in Computer Science Why? Ido Dagan.
B1 -Biogeochemical ANL - Townhall V. Rao Kotamarthi.
Zebra Technologies: Link-OS Flexible. Smart. Scalable.
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Chapter 12: Simulation and Modeling Invitation to Computer Science, Java Version, Third Edition.
Ravi Sankar Technology Evangelist | Microsoft Corporation
Tcipg.org 1 An Alert Buffer Overflow Attack in DNP3 Controlled SCADA Systems Objectives/Problem Investigate a simple but effective attack to block legitimated.
Team Members Lora zalmover Roni Brodsky Academic Advisor Professional Advisors Dr. Natalya Vanetik Prof. Shlomi Dolev Dr. Guy Tel-Zur.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
By Paul Cottrell, BSc, MBA, ABD. Author Complexity Science, Behavioral Finance, Dynamic Hedging, Financial Statistics, Chaos Theory Proprietary Trader.
Ness Shroff Dept. of ECE and CSE The Ohio State University Grand Challenges in Methodologies for Complex Networks.
An Introduction to Software Architecture
NAB 2012 Cloud Computing Conference New Levels of Media Performance Data Enabled by Cloud Computing -- and Impact on Other Sectors Scott Brown, GM US and.
COLLABORATIVE SPECTRUM MANAGEMENT FOR RELIABILITY AND SCALABILITY Heather Zheng Dept. of Computer Science University of California, Santa Barbara.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Wireless Networks Breakout Session Summary September 21, 2012.
Architectures of distributed systems Fundamental Models
Models in Geoscience Education Cathy Manduca Director, Science Education Resource Center Carleton College, Minnesota.
Workshop on the Future of Scientific Workflows Break Out #2: Workflow System Design Moderators Chris Carothers (RPI), Doug Thain (ND)
Network-related problems in M2ACS Mihai Anitescu.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
Boundary Assertion in Behavior-Based Robotics Stephen Cohorn - Dept. of Math, Physics & Engineering, Tarleton State University Mentor: Dr. Mircea Agapie.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Data Integrity and Quality, and Operational Risk Scribe: H. V. Jagadish Moderator: Anthony Tomasic.
Futures Lab: Biology Greenhouse gasses. Carbon-neutral fuels. Cleaning Waste Sites. All of these problems have possible solutions originating in the biology.
Distributed Information Systems. Motivation ● To understand the problems that Web services try to solve it is helpful to understand how distributed information.
Industrial Data Modeling with DataModeler Mark Kotanchek Evolved Analytics
Chapter 3 System Performance and Models Introduction A system is the part of the real world under study. Composed of a set of entities interacting.
Tussle in Cyberspace: Defining Tomorrow’s Internet Presented by: Khoa To.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Whats hot in networking? S. Keshav. Internet architecture Access Enterprise/campus/local ISP Wide area/backbone ISP.
HPC HPC-5 Systems Integration High Performance Computing 1 Application Resilience: Making Progress in Spite of Failure Nathan A. DeBardeleben and John.
Goals The DNP3 protocol is widely used in electrical power systems as a means of communicating observed sensor state information back to a control center.
Complex Systems Workshop, September 20-21, 2012 Evaluation of Complex Systems J. Bryan Lyles Program Director CISE/CNS.
Adversary Models in Wireless Networks: Research Challenges Radha Poovendran Network Security Lab (NSL) University of Washington.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
How The Market “Gets It”: Why It’s So Hard to Beat the Market Presented by: Michael Mauboussin Chief U.S. Investment Strategist Credit Suisse First Boston.
1 NITRD-LSN Complex Engineered Networks Washington D.C. Sept , 2012.
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
CSE 5810 Biomedical Informatics and Cloud Computing Zhitong Fei Computer Science & Engineering Department The University of Connecticut CSE5810: Introduction.
INFSO-RI Enabling Grids for E-sciencE Grid & Cloud Computing Introduction
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Making the Case for Business Intelligence
Architecture and Algorithms for an IEEE 802
Applying Control Theory to Stream Processing Systems
SIMULATION SIMULAND PURPOSE TECHNIQUE CREDIBILITY PROGRAMMATICS
R SE to the challenges of ntelligent systems
Analytics and OR DP- summary.
A Network Virtual Machine for Real-Time Coordination Services
به نام خدا Big Data and a New Look at Communication Networks Babak Khalaj Sharif University of Technology Department of Electrical Engineering.
Will Decentralization Drive Event-Based Architectures?
Development of the Nanoconfinement Science Gateway
Towards Next Generation Panel at SAINT 2002
Time Gathering Systems Secure Data Collection for IBM System i Server
An Introduction to Software Architecture
GATES: A Grid-Based Middleware for Processing Distributed Data Streams
Cloud Computing: Concepts
Design.
Presentation transcript:

1. Process Gather Input – Today Form Coherent Consensus – Next two months

2. CENs are Personal Why are there so many electricity outages? Why did it take Amazon 4 days to recover from Amazon cloud failure? Why can’t I find out what’s wrong with my WiFi connection?

3. Mid Point Summary ALERT

A for Abstraction / Architecture Functionality allocation: How to understand modularization in networks? How to explain, predict, falsify? What’s a logical unit on the network? Graph clustering and dynamics aggregation Sufficient statistics for graphs Throughput < Delay < Security < Manageability What non-performance metrics to use as objective functions? Configuration complexity Fairness metrics Language and top down design of architecture decision Scalable experiments and experiments at scale State and awareness inside and outside of the network Manage the crowd in unlicensed band Approximate networks

L for Limits Characterize boundary of unknown behavior Queueing, graph, information theory often ask intractable questions. What questions should be asked? Non-convex optimization and local optima Distributed optimization over combinatorial structures with stochastic dynamics across multiple coupled timescales Long tail, non asymptotic results Integration: communication + computation + control

E for Evolvability Evolvability and scalability Theory for self correcting and under-specified networks Het-Net of platforms, applications, user behaviors Functional: Modularity, payoff/price of interface Spatial: Centralized or distributed? Right level of hierarchy? Economic incentive mechanisms Pricing as a way to run feedback

R for Robustness Diagnosability and rebootability Science of network management Simulations we can believe in? Experiment design Error bars Optimal but fragile solutions Sensitivity to configuration parameters How to characterize black swan events? Is there enough diversity for robustness? How to quantify security and privacy metrics? Low gain networks Black swan events Platform for unknown applications Safety Security Privacy first

T for Time Delay/deadline as objective functions How to enable interactive applications? Space doesn’t matter, time is tight. Delay much less understood than throughput. Transient behavior: from convergence to equilibrium to invariant states during transient How to carry out real time large-scale measurement, learning, visualization? Real time application is hard, real time management even harder Evolving graphs How to accelerate network evolution?