Keynote Speakers info.
Shahram Latifi, PhD, P.E., IEEE Fellow
Professor of Electrical and Computer Eng.
Co-Director of Center for Information Technology and Algorithms
University of Nevada, Las Vegas
Shahram Latifi received his M.S. and Ph.D. degrees in Electrical and Computer Engineering from Louisiana State University in 1986 and 1989, respectively. He is currently a Professor of Electrical and Computer Engineering and the Co-Director of Center for Information Technology and Algorithms at the University of Nevada, Las Vegas. Dr. Latifi has taught courses and performed research in various areas including Image Processing and Document Analysis, Data Compression, Remote Sensing, Biometrics, Security, Computer Networks and Machine Learning. He has authored/co-authored over 250 technical articles in various journals and conferences. He is the recipient of several research awards including the most recent one- Silver State Scholar research award in 2014. His research has been funded by NSF, NASA, DOE, DoD/DTRA, Boeing, Lockheed and Cray Inc. Dr. Latifi was an IEEE Distinguished Speaker ( 1997-2000), an Associate Editor of the IEEE Transactions on Computers (1999-2006) , Co-founder and General Chair of the IEEE Int’l Conf. on Information Technology (ITCC 2000-2004) and founder and General Chair of Int’l Conf. on Information Technology-New Generations (ITNG 2005-2018). He has also served on the editorial board of several international journals. He is an IEEE Fellow (2002) and a Registered Professional Engineer in the State of Nevada.
Keynote Speech Title: “Rise of Machine Learning”
After being overlooked for a few decades, Machine Learning (ML) has become the center of attention once again, finding its applications in areas such as Healthcare, Education, Security, Transportation, Social media and e-Commerce, to name a few. ML methods, through adaptation and automation, bring about substantial savings in time and money. Factors contributing to the popularity of ML include major advancements in computing power and data storage capacity as well as the exponential growth of data in various fields. An overview of ML, its past, present and future is presented followed by some of the main techniques employed in this area. Examples of how ML techniques benefit different applications are given and, as a specific case, a new ML approach to achieve network security is described. Hot topics of research and future trends of ML are discussed. Finally, socio-economic factors that will accelerate/impede the adoption of ML techniques are presented.
Professor in the Department of Electrical and Computer Engineering at The University of Arizona, U.S.A
Salim Hariri is a Professor in the Department of Electrical and Computer Engineering at The University of Arizona. He received his Ph.D. in computer engineering from University of Southern California in 1986, and an MSc from The Ohio State University in 1982.
He is the UA director of NSF Center for Cloud and Autonomic Computing and he is the Editor-In-Chief for the CLUSTER COMPUTING JOURNAL (Springer, http://clus.edmgr.com) that presents research techniques and results in the area of high speed networks, parallel and distributed computing, software tools, and network-centric applications. He is the Founder of the IEEE/ACM International Symposium on High Performance Distributed Computing (HPDC) and the co-founder of the IEEE/ACM International Conference on Cloud and Autonomic Computing (ICCAC). He is co-author/editor of four books on Autonomic computing, parallel and distributed computing: Autonomic Computing: Concepts, Infrastructure, and Applications (CRC Press, 2007), Tools and Environments for Parallel and Distributed Computing (Wiley, 2004), Virtual Computing: Concept, Design and Evaluation (Kluwer, 2001), and Active Middleware Services (Kluwer, 2000). Dr. Hariri developed innovative cybersecurity behavior analysis tools, resilient cloud services, and autonomic software tools. He is a founder of a startup Cybersecurity company AVIRTEK that is developing and deploying innovative cybersecurity products and services.
Keynote Speech Title: “Autonomic Cyber Security: The Next Generation of Self-Protection Services”
The increased dependence on cyber systems in business, finance, government and education make them prime targets for cyberattacks due to the profound and catastrophic damage these attacks might inflict on our economy and all aspects of our life. It is widely recognized that cyber resources and services can be penetrated and exploited. Furthermore, it is widely accepted that the cyber resilient techniques are the most promising solutions to mitigate cyber attacks and change the game to advantage the defender over the attacker. In this presentation, I will present an approach based on biological systems to develop autonomic cybersecurity technologies that will significantly change how we manage, secure and protect cyber resources and services. Our approach is based on autonomic computing (self-manage systems with little or no involvement from users or system administrators), data mining, and anomaly behavior analysis techniques. The main building component to implement Autonomic Cyber Security (ACS) are: 1) Innovative data structures (cyber-DNAs) to accurately detect current operational state of any cyber system and predict its behavior in the near future; 2) Anomaly Behavior Analysis (ABA) methodology that can detect with high accuracy and almost no false alarms any anomalous behavior triggered by cyberattacks, faults (hardware or software) and accidents (malicious or natural); and 3) Self-Management Engine to deliver automated and semi-automated actions so we can proactively stop or mitigate the impacts of cyberattacks. I will show through several examples how to apply ACS to secure and protect a wide range of cyber systems and applications.
Department of Computer Science,
Czech Technical University in Prague,
Bozena Mannova is teaching after 1989 at the Department of Computer Science, Czech Technical University in Prague courses Programming, Data Structures and Software Engineering. She received her degree ing. from Czech Technical University in Prague, M.Math. from University of Waterloo, Canada and Ph.D. from Comenius University Bratislava. Before 1989 she worked as programmer at Faculty of Mathematics, University of Waterloo (Canada) and after as a programmer at the Computer Centre, Czech Technical University in Prague.
Mrs. Mannova is chairman of the Anglo-Czech co-operation of teachers as International Director of MirandaNet. She was awarded in 1998 European Woman of Achievement Award for the development of the Anglo-Czech learning community for teachers on-line.
Mrs. Mannova is member of ACM and UPE Honor Society. She is member of ACM Europe Board – Council of European Chapter Leaders (CECL). She was cofounder of Czech ACM Chapter and she served few times as President of this Chapter. She is working for many years for ACM International Collegiate Programming Contest (ICPC) in different roles, now she is Director of European Contests. In 2012 she received The Mark Measures Distinguished Service Award from ACM for outstanding service to the ACM ICPC from 1994.
She is author of few textbooks and many papers. She was author and moderator of information technology educational programs for Czech TV. She participated at many international projects.
Keynote Speech Title: “Why are software projects different?”
Software engineering is the subject of software project development. Many techniques of general project management are applicable to software projects. Software projects are more often than other project unsuccessful. We consider the project as a successful if it is realized in time, in the required quality and in budget. On average, 50% of large SW projects last longer than estimated, three quarters of major projects have operating errors and one quarter of large projects is canceled. What are the software projects specific? Substantial influence on the management of software projects has 3P: 1. Peoples must be organizing into efficient teams. 2. Problem must be well-specified in the customer’s communication with the developer. 3. Processes must be tailored to People and the Problem, and a suitable model for project implementation must be chosen. Software development is specific to complexity and frequent changes. Specifics of software projects include: 1. Product invisibility – The product is intangible and progress in development is not immediately visible. It is easy to say that the software project is 90% complete even though there are no visible results. 2. Complexity of the problem – IT systems can be very simple, but they are often very complex. An IT project often turns out to be more complex than we expected. 3. Flexibility – The ease of changing software is usually considered to be one of its strengths, but the reality is different. 4. Uniqueness – We pool teams and technologies in a way that have not been done before. 5. Risks – Risk management is crucial for IT projects. 6. System Requirements Specifications – Very difficult and often impossible communication between the customer and the developer. 7. Technology is changing very quickly. In the lecture we will discuss these and other differences of software projects and possible improvement in IT projects development.