Hide menu

SaS Seminars

Software and Systems Research Seminar Series


The SaS Seminars are a permanent series of open seminars of the Division of Software and Systems (SaS) at the Department of Computer and Information Science (IDA), Linköping University. The objective of the seminars is to present outstanding research and ideas/problems relevant for SaS present and future activities. In particular, seminars cover the SaS research areas software engineering, programming environments, system software, embedded SW/HW systems, computer systems engineering, realtime systems, parallel and distributed computing, and theoretical computer science. - Two kinds of seminars are planned:

  • talks by invited speakers not affiliated with SaS,

  • internal seminars presenting lab research to whole SaS.

The speakers are expected to give a broad perspective of the presented research, adressing the audience with a general computer science background but possibly with no specific knowledge in the domain of the presented research. The normal length of a presentation is 60 minutes, including discussion.

The SaS seminars are coordinated by Ahmed Rezine.



Recent / Upcoming SaS Seminars (2016)



An Efficient Cloud Market Mechanism for Computing Jobs with Soft Deadlines

Zongpeng Li, Professor, University of Calgary, Canada

Friday, April 8, 2016, 13:15-14:15, room John von Neumann

Abstract:
We study the cloud market for computing jobs with completion deadlines, and designs efficient online auctions for cloud resource provisioning. A cloud user bids for future cloud resources to execute its job. Each bid includes (a) a utility, reflecting the amount that the user is willing to pay for executing its job, and (b) a soft deadline, specifying the preferred finish time of the job, as well as a penalty function that characterizes the cost of violating the deadline. We target cloud job auctions that executes in an online fashion, runs in polynomial time, provides truthfulness guarantee, and achieves optimal social welfare for the cloud ecosystem. Towards these goals, we leverage the following classic and new auction design techniques. First, we adapt the posted pricing auction framework for eliciting truthful online bids. Second, we address the challenge posed by soft deadline constraints through a new technique of compact exponential-size LPs coupled with dual separat! ion oracles. Third, we develop efficient social welfare approximation algorithms using the classic primal-dual framework based on both LP duals and Fenchel duals. Empirical studies driven by real-world traces verify the efficacy of our online auction design.

Bio of speaker:
Zongpeng Li received his B.E. degree in Computer Science and Technology from Tsinghua University (Beijing) in 1999, his M.S. degree in Computer Science from University of Toronto in 2001, and his Ph.D. degree in Electrical and Computer Engineering from University of Toronto in 2005. He has been with the University of Calgary since 2005, where he is now Professor of Computer Science. In 2011-2012, Zongpeng was a visitor at the Institute of Network Coding, Chinese University of Hong Kong. His research interests are in computer networks, network coding, cloud computing, and energy networks. Zongpeng was named an Edward S. Rogers Sr. Scholar in 2004, won the Alberta Ingenuity New Faculty Award in 2007, was nominated for the Alfred P. Sloan Research Fellow in 2007, and received Best Paper Awards at PAM 2008 and at HotPOST 2012. In 2014, Zongpeng received the Department Excellence Award from the Department of Computer Science, University of Calgary. Zongpeng is also a recipient of! the "Outstanding Young Computer Science Researcher" prize from the Canadian Association of Computer Science (2015).



A review of cyber security risk assessment methods for SCADA systems

Dr Yulia Cherdantseva, research associate, Cardiff University, UK

April 7th, kl 13.15-14.15 room John von Neumann

Abstract:
Recently, in the framework of SCADA Cyber Security Lifecycle (SCADA-CSL) programme funded by the Airbus Group Endeavr Wales we have conducted a review of cyber security risk assessment methods for Supervisory Control and Data Acquisition (SCADA) systems . The review is presented here. This paper is currently the most downloaded article at Computers & Security.

In this talk I will cover the results of our review as well as the review methodology and research challenges identified. For the review, we selected and in-detail examined twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We analysed the methods in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluation and tool support. Based on the analysis, we suggested an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems. Most importantly, we outlined five research challenges facing risk assessment in SCADA systems and pointed out the approaches that might be taken.



Device Analyzer: 3500 years of handset usage data

Senior lecturer Andrew Rice, Cambridge university, UK

April 1st, kl 10.15-11.15 room John von Neumann

Abstract:
Our Device Analyzer project has collected Android usage data from more than 20,000 people around the world. We have a huge range of contributions ranging from days to years. I'll describe some of the studies that have been done with the data covering tracking security vulnerabilities, movement patterns, WiFi channel allocation, SMS message lengths, and session durations. We are actively sharing the data with other researchers and I'll explain how this process works and what we've learned from it.

The speaker:
Andrew Rice is a university Senior Lecturer in the University of Cambridge Computer Laboratory working in the Digital Technology Group. He is also the Hassabis Fellow in Computer Science and Director of Studies in Computer Science at Queens' College.






Previous SaS Seminars



Page responsible: Christoph Kessler
Last updated: 2016-04-04