This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
lecture [2018/04/24 10:10]
ieee_hiroshima [Past lectures]
lecture [2018/11/19 17:51] (current)
Line 1: Line 1:
-====== ​Lecture ​======+====== ​Lectures ​======
-====== Monitorology and Big Data in the Age of Data Analytics ======+===== IEEE Hiroshima Section 20th Anniversary Symposium ​=====
-Date: 22 July 2016\\ +Date: Nov. 16, 2018\\ 
-Time: 15:00 – 16:30+Time: 10:00 – 19:30\\ 
 +Location: Tottori University\\ 
 +Sponsored: IEEE Hiroshima Section\\ 
 +Co-sponsored:​ IEEE Japan Council\\ 
 +Supported: ITE Chugoku Branch, SICE Chugoku Branch, IPSJ Chugoku Branch, IEEJ Chugoku Branch, IEIEJ Chugoku Branch, ​ IEICE Chugoku Branch, Tottory University, IEEE YSB, IEEE HSSB
-Location: Hiroshima City University\\ +===== Technical Lecture =====
-__[[http://​www.hiroshima-cu.ac.jp/​page/​content0005.html| +
-</​font>​ ]]__\\ +Date: Aug. 8, 2018\\ 
-Sponsored: Hiroshima ​City University\\ +Time: 13:00 – 14:30\\ 
-Co-sponsored:​IEEE Hiroshima ​Section+Location: Tottori University\\ 
 +Sponsored: ​IEEE Hiroshima ​Section\\ 
 +Co-sponsored: ​IPSJ Chugoku Branch / IEICE Chugoku ​Section\\ 
 +Supported: Tottory University Cross-informatics Research Center
-Title: ​Monitorology ​and Big Data in the Age of Data Analytics\\ +Title: ​Face Authentication Techniques Supporting Safe, Secure ​and Wealthy Society\\ 
-Speaker: ​ProfMiroslaw Malek (Universita della Svizzera italiana)+Speaker: ​DrHitoshi Imaoka ​(NEC Biometrics Research Laboratories)
-Abstract:\\ +{{:lecture20180808.jpg?​nolink&​320|lecture20180808.jpg}}
-We focus on the art of observing the world by humans and electronic devices such as sensors and meters that, in general, we call monitorsWe then move to monitoring devices, define main monitoring objectives and pose five challenges for effective and efficient monitoring that still need a lot of research. In the age of computricity,​ where compute power like electricity is easily available and easy to use across the globe, and big data that is generated in enormous amounts and ever-increasing rates, the question, what to monitor and how, will become ever more relevant to save the world from flood of meaningless,​ dumb data, leading frequently to false conclusions and wrong decisions whose impact may range from a minor inconvenience to loss of lives and major disasters.\\ +
-We argue, that in the age of Big Data, current complexity levels and necessity of dealing with time, in addition to classical synthesis and analysis methods, we need to turn to empirical data-driven approaches using data analytics to, for example, proactive fault management which require monitoring, online measurement,​ online analysis, diagnosis, failure prediction and decision making to support recovery and nonstop computing and communication. To illustrate such approaches two case studies are presented: In the first case study, we address the problem of proactive fault management by demonstrating how runtime monitoring, variable selection and model re-evaluation lead to effective failure prediction.\\ +
-We also present the quality analysis of such prediction to determine whether it results in dependability gain. The second case study illustrates how by observation and measurement of CPU and memory features a malicious software (malware) can be detected on line. Finally, we conclude that models derived from monitoring and measurement will continue gaining on significance and impact and list the major challenges for data-driven research on dependability and security.+
-===== Gains in IEEE Hiroshima Section Symposium ​=====+===== Technical Lectures for Students ​=====
-Date: 22 May 2016\\ +Date: May 26, 2018\\ 
-Time: 13:00-13:30\\ +Time: 13:30 14:00\\ 
-Location: ​Yamaguchi ​University ​(Tokiwa Campus)+Location: ​Tottori ​University\\ 
 +Sponsored: IEEE Hiroshima Section
-Sponsored: IEEE Hiroshima ​Section\\ +TitleWhat do you wish get from the steering of IEEE Hiroshima ​section Student Symposium?\\ 
-Speaker: Prof. Hotta (Yamaguchi University)+Speaker: Prof. Masashi ​Hotta (Yamaguchi University)
-===== Tide of recent date in payment services =====+{{:​lecture20180526.jpg?​nolink&​|lecture20180526.jpg}}
-Date: 14 Apr. 2016\\ +===== Technical Lecture =====
-Time: 15:​00-16:​45\\ +
-Location: Matsue Terrsa (Matsue City)+
-Sponsored: IEEE Hiroshima Section\\ +Date: Apr. 17, 2018\\ 
-Speaker: ​MrKeiji MINAMI ​(Sony Payment Services)+Time: 15:00 – 15:45\\ 
 +Location: Okayama University\\ 
 +Sponsored: IEEE Hiroshima Section 
 +Title: enPiT2-Security:​ On Efforts of Basic SecCap, a Practical Human Resource Development Course on Information Security Area\\ 
 +Speaker: ​ProfYasuyuki Nogami ​(Okayama University) 
 +===== Special Lecture =====
-===== The Time-Triggered Architecture =====+Date: Jan. 31, 2018\\ 
 +Time: 15:30 – 16:30\\ 
 +Location: Hiroshima Garden Palace\\ 
 +Sponsored: IEEE Hiroshima Section
-Date8 Apr. 2016\\ +TitleWhat Computers Provided\\ 
-Time14:​00-15:​30\\ +SpeakerProf. Masahito Hirakawa (Shimane ​University)
-Location: Hiroshima City University ​__[[http://​www.hiroshima-cu.ac.jp/​page/​content0005.html|http://​www.hiroshima-cu.ac.jp/​page/​content0005.html]]__+
-SponsoredHiroshima City University\\ +{{:lecture20180131.jpg?​nolink&​|lecture20180131.jpg}}
-Supported: IEEE Hiroshima Section\\ +
-Speaker: Em.ProfDrHermann Kopetz (Vienna University of Technology)+
-Abstract: The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems that is widely deployed in industry, e.g., in the Boeing 787 aircraft or the NASA Orion Spacecraft. A large real-time application is decomposed into nearly autonomous clusters and\\ +----
-nodes, and a fault-tolerant global time base of known precision is generated at every node. In the TTA, this global time is used to precisely specify the interfaces among the nodes, to simplify the communication and agreement protocols, to perform prompt error detection, and to guarantee the timeliness of real-time applications. The TTA supports a two-phased design methodology,​ architecture design, and component design. During the architecture design phase, the interactions among the distributed components and the interfaces of the components are fully specified in the value domain and in the temporal domain. In the succeeding component implementation phase, the components are built, taking these interface specifications as constraints. This two-phased design methodology is a prerequisite for the composability of applications implemented in the TTA and for the reuse of prevalidated components within the TTA. This talk presents the architecture model of the TTA, explains the design rationale, discusses the time-triggered communication protocols TTP/C and TT-Ethernet,​ and illustrates how transparent fault tolerance can be implemented in the TTA.+
 ===== Past lectures ===== ===== Past lectures =====
-[[:​lecture:​2017|]] / [[:​lecture:​2016|]] / [[:​lecture:​2015|]] / [[:​lecture:​2014|]] / [[:​lecture:​2013|]]+[[:​lecture:​2017|]] / [[:​lecture:​2016|]] / [[:​lecture:​2015|]] / [[:​lecture:​2014|]]
  • lecture.1524532204.txt.gz
  • Last modified: 2018/04/24 10:10
  • by ieee_hiroshima