Seminar Schedule for Fall 2005
Dual-Homing Survivability for the Next-Generation Internet UMassD
Image and Shape Analysis in Biomedical Applications UMassD DION 101
A Methodology for Role-Based Modeling of Multi-Agent Software Systems
Bridge the Formal and Informal---Software Verification
Coverage of Wireless Sensor Networks
Eugene Eberbach $-Calculus of Bounded Rational Agents: Flexible Optimization as Search under Bounded Resources in Interactive Systems UMassD
Oceanic Feature detection and tracking in AVHRR and SeaWIF Satellite imagery.
Graduate student research presentation
Title: Coverage of Wireless Sensor Networks
Speaker: Benyuan Liu
Wireless sensor networks are expected to have a wide variety of applications that are not available using traditional technologies. From environment monitoring to biological sensing in a human body, and from war fighting to disaster recovery, wireless sensor networks will significantly affect the way we work and live. The coverage of a sensor network represents the quality of surveillance that the network can provide, for example, how well a region of interest is monitored by sensors, and how effectively a sensor network can detect intruders. It is important to understand how the coverage of a sensor network depends on various network parameters in order to better design and use sensor networks for different application scenarios. We approach the coverage problem from a theoretical perspective and explore the fundamental limits and properties of the coverage of a large-scale sensor network. We characterize the asymptotic behavior of the coverage measures for a variety of network scenarios in both stationary and mobile sensor networks. We find that the coverage of a sensor network exhibits different behaviors for different network configuration and parameters. Based on the analytical characterizations of the network coverage, we further discuss the implications to network planning and protocol performance of sensor networks.
Title: Bridge the Formal and Informal---Software Verification
Speaker: Gaoyan Xie
Abstract: Formal verification and software testing are the two extremes for the quality assurance of computer software. Traditionally, a formal verification works on a formal specification of a given system and employees a mathematically sound technique to check whether the system specification satisfies certain desired properties. Once finished, a formal verification technique always gives definite and unambiguous answers, which are preferred in developing high-assurance systems. Software testing, on the contrary, is basically a trial and error method that exercises an implementation of a system, trying to expose as many system defects as possible. The results of testing are never definite since it is impractical to achieve complete test. Additionally, testing is labor-intensive and is usually the major cost factor of software development. With the increased demanding for developing reliable software and for reducing development cost through test automation, in recent years there has been a trend of bringing these two extremes together to take advantages of the both ends. This talk introduces one typical work in this trend, called software verification, which applies a formal verification technique called model-checking to software at the source code level and uses testing techniques to facilitate the verification. This talk also addresses some intriguing issues that arise from the interplay between model checking and software testing.
Title: Towards a Role-Based Agent Development Environment for Open Multi-Agent Software Systems
Speaker: Haiping Xu
Abstract: Multi-agent systems (MAS) are rapidly emerging as a powerful paradigm for modeling and developing distributed information systems. In an open multi-agent system, agents can not only join or leave an agent society at will, but also take or release roles dynamically. Most of existing work on MAS uses role modeling for system analysis; but role models are only used at conceptual level with no realizations in the implemented system. In this talk, we first propose a formal framework for role-based modeling of open multi-agent systems. We specify role organization and role space as containers of conceptual roles and role instances, respectively. Then we propose a three layered design model for development of open MAS. Our approach provides a potential solution for automated MAS development. Finally, we use a prototype of Role-based Agent Development Environment (RADE) with a case study to show how it may support rapid application development of open MAS.
Title: Image and Shape Analysis in Biomedical Applications
Speaker: Li Shen
Abstract: In this talk, I will discuss two recent studies on image and shape analysis and their applications in two biomedical domains. The first work is a new computational framework for morphometric analysis of 3D surfaces that aims to localize regionally specific shape changes between groups of 3D objects. The effectiveness of this framework is demonstrated in a computational neuroscience application for identifying hippocampal shape changes in Mild Cognitive Impairment (MCI). The second work is the development of STAT, a Spatio-Temporal Analysis Tool, which incorporates useful image analysis functions such as object identification, segmentation and registration. I will demonstrate these functions for spatio-temporal modeling of pulmonary nodules in perfusion magnetic resonance image sequences. The resulting time intensity profiles of nodules region capture important angiogenic patterns in the lung that has a potential in distinguishing between cancer and benign nodules and helping early detection. If time permits, I will also talk about some other ongoing projects in my lab.
Title: Dual-Homing Survivability for the Next-Generation Internet
Speaker: Dr. Vinod Vokkarane
Abstract: Dual homing is a fault-tolerant technique generally used to increase the survivability of IP-based access networks. While protection techniques are generally used to provide survivability in all-optical core networks. In this talk, we evaluate how the dual-homing architecture introduces attractive design choices for implementing survivable optical networks. We investigate several approaches for providing survivability against two independent failures, one in the IP access network and the other in the optical core network. In the past, dual-homing and protection techniques have been studied separately. In this talk, we discuss several coordinated dual-homing protection techniques to provide survivability in an all-optical core network. In this talk, we will discuss several new algorithmic solutions and compare the performance of these solutions. We also discuss the applicability of the concept of dual-homing to other types of networks, such as wireless sensor networks.
Seminar Schedule for Spring 2005
Scalable Location Management in Mobile Ad Hoc Networks
Verification by Model Checking
Washington State University, Pullman
North Dakota State University, Fargo
Boleslaw Mikolajczak Verification and Validation of Concurrent Object-Oriented Systems using Colored Petri Nets UMassD DION 101
Special topic on Computer Vision
City College of New York
1. Jason Femino, Spiking Neuron Network with Static Synapses for Modeling of Olfactory Processing
2. L. Atallah, The $-Calculus Process Algebra Applied to Selected Algorithms in Bioinformatics.
3. Ch.-Y. Hung, Testing Capabilities of Common Control Language and ER1 Robot.
4. Hui-Lan Chi, Quality Evaluation of Voice-over-IP Connections
5. Cheng-Kang Yang, Detect the Abnormal Transaction and Auto-reply.
6. Swapnil Chaudhari, Segmentation of Eddies Using Heat Content
Graduate Students 1. Chandana Kancherla, A Service-Oriented Peer-to-Peer System for University Library Resource Sharing
2. Animesh Basnet, Formulation of Decision Support Systems Architectures for Highway Toll Plazas.
3. Jen-Ta Huang, Optimal Topology Design for Optical Burst Switched Networks