|
Meeting Host
|
Basil Smith, IBM, US |
Program-at-a-Glance and Contents
Workshop on Dependability Issues for a Smarter Planet
Workshop
Coordinators |
Nick Bowen, IBM, US Basil Smith, IBM, US |
Session 0, Introduction |
Session 1, Dependable Cities |
Session 2, Smart Grid |
Session 3, Trustworthy Healthcare |
Session 4, Smart Communication/Internet Infrastructure |
Session 5, Workshop Wrap-Up |
Nick Bowen, IBM, US Workshop Overview |
Colin Harrison, IBM, US How Do We Build Community Trust in Technology? |
345 KB |
Priya Narasimhan, CMU, US Crowdsourced and Mobile Platforms: Civic Applications and Disaster Response |
2.7 MB |
Raju Rangaswami, Florida International U., US Addressing Software Challenges for Smart Infrastructures using Software Persistent Memory |
2.2 MB |
Brian Gaucher, IBM, US Smarter Energy for a Smarter Planet: Computational Challenges and Dependencies of the Evolving Smart Grid |
|
Bill Sanders, Univ of Illinois at Urbana-Champaign, US Smarter Power Grids: Challenges and Research Directions |
5.1 MB |
Carl Landwehr, NSF/Univ of Maryland, US NSF Trustworthy Computing Program: Selected Healthcare-related Projects |
|
Chalapathy Neti, IBM, US Healthcare Transformation |
885 KB |
Doug Blough, Georgia Tech, US Securing Sensitive Healthcare Information in the U.S. Health Care System: Past, Present and Future |
385 KB |
Keith Marzullo, NSF/UCSD, US NSF Cyber-Physical Systems (CPS) Program: Past, Present, and Future |
1.2 MB |
Kevin Staggs, Honeywell, US Designing Robust, Secure Industrial Automation and Control Systems |
925 KB |
Ehab Al-Shaer, UNC-Charlotte, US Non-Invasive Smart Grid Threat Analyzer using Formal Methods |
1.9 MB |
Charles Howell, MITRE, US Application of Accident Investigation Notations and Tools |
1.0 MB |
Discussion, Nick Bowen (moderator), IBM, US |
Rick Schlichting, AT&T Labs, US Overall Presentation and News |
4.0 MB |
Hari Ramasamy, IBM, US Enterprise IT Infrastructure Transformation: Towards Automated Identification of Security Zone Classifications |
555 KB |
Cristina Nita-Rotaru, Princeton Univ., US Defending Against Pollution Attacks in Network Coding for Wireless Mesh Network |
1.3 MB |
Michael Bailey, Univ. of Michigan, US The Need for Community Standards for Ethical Behavior in Computer Security Research |
260 KB |
Karthik Pattabiraman, Univ. of British Columbia, Canada Flikker: Saving DRAM Refresh Power through Critical Data Partitioning |
920 KB |
Basil Smith, IBM, US The Upcoming IT Paradigm Shift |
285 KB |
Rick Harper, IBM, US Recent Activities |
650 KB |
Gernot Heiser, NICTA/Univ of New South Wales, Australia Persistence with Asynchronous I/O |
520 KB |
Gilles Muller, INRIA/LIP6, France Faults in Linux: 10 Years Later |
725 KB |
Keith Marzullo, NSF/UCSD, US Miswiring Models for Autonomic Naming in a Data Center Fabric |
750 KB |
Hermann Kopetz, TU-Vienna, Austria A Methodology for the Design of Systems of Systems (SoSs) |
870 KB |
Vic Thomas, BBN Technologies, US GENI: Exploring Networks of the Future |
730 KB |
Doug Blough, Georgia Tech, US Redactable Signatures for Verification and Minimal Disclosure in Health Information Exchange |
190 KB |
Names and Contact Information |