Tutorials

Tutorial 1
 Title: Vehicular Cloud Computing for Urban Applications

Date: July 1st, 2013

mario_gerla

Prof. M. Gerla

 

Prof. Mario Gerla

UCLA

USA

Abstract: TBA
Short Bio:

Dr. Gerla was born in Milan, Italy. He received a graduate degree in engineering from the Politecnico di Milano, in 1966, and the M.S. and Ph.D. degrees in engineering from UCLA in 1970 and 1973, respectively. From 1973 to 1976, Dr. Gerla was a manager in Network Analysis Corporation, Glen Cove, NY, where he was involved in several computer network design projects for both government and industry, including performance analysis and topological updating of the ARPANET under a contract from DoD. From 1976 to 1977, he was with Tran Telecommunication, Los Angeles, CA, where he participated in the development of an integrated packet and circuit network. Since 1977, he has been on the Faculty of the Computer Science Department of UCLA. His research interests include the design, performance evaluation, and control of distributed computer communication systems and networks. His current research projects cover the following areas: design and performance evaluation of protocols and control schemes for Ad Hoc wireless networks; routing, congestion control and bandwidth allocation in wide area networks, and; traffic measurements and characterization.

 

 

Tutorial 2
Title: New Trends in Network Technologies toward the Future – NGN and Its Issues
Date: July 1st, 2013
Prof. K. Asatani

Prof. K. Asatani

 

 

 Prof. Koichi Asatani

IEEE Fellow, IEICE Fellow
Kogakuin University

Japan

Abstract:Carrier-grade networks for the future are being developed as Next Generation Networks (NGN). The NGN is a converged solution after the legacy telecom networks by enabling QoS management and controls in IP network like in legacy telecom networks and by supporting economical, versatile multi-media applications like those on the Internet. NGN supports voice, Internet services and further services which are being and will be developed in the future with flexible and cost effective manners and with high dependability and high security. It also supports third-party applications through the open interface. NGN also provides more flexible access arrangements such as fixed-mobile convergence (FMC) with generalized mobility, and horizontal and vertical roaming as well as improved security.The concepts and architecture of NGN are described. The current status of NGN implementation in a commercial offer in Japan is touched upon. Issues for the global evolution of NGN are also described, such as IPv6 related issues, impacts of smartphones, cloud computing, global standards and regulations. New trends in developing Future Networks are also touched upon.
Short Bio:Koichi Asatani received his B.E.E.E., M.E.E.E. and Ph. D degrees from Kyoto University in 1969, 1971 and 1974, respectively. From 1974 to 1997, Dr. Asatani was engaged in R&D on optical fiber communication systems, hi-definition video transmission systems, FTTH, ISDN, B-ISDN, ATM networks, IP networks and their strategic planning in NTT.

Currently he is a professor, Department of Computer Science and Communications Engineering, Kogakuin University, and a visiting professor, Graduate School of Global Information and Telecommunication, Waseda University, both in Tokyo, Japan. He is a Fellow of IEEE and a Fellow of IEICE. He was appointed as a distinguished lecturer of IEEE Com Soc for 2007-2009 and 2011-2012.
He is a founder of Communications QoS, Reliability and Performance Modeling series symposium at ICCs and Globecoms. He serveed as many positions in IEEE Communications Society, such as Ex-Chair Emiritus and Advisory Board Chair of IEEE Technical Committee on Communication Quality and Reliability (CQR-TC). He also served as Executive Chair for ICC2011 in Kyoto, Japan.
From 1988 through 2000, he served as Vice-Chairman of ITU-T SG 13 (formerly CCITT SG XVIII), responsible for digital networks including GII, IP networks and NGN.
He has published more than fifty papers, and gave more than seventy talks including keynotes,
invited talks and tutorials at international conferences such as ICCs and Globecoms.

 

 Tutorial 3

 Title: When “Social Networks” meet the “Internet of Things”:

new communication paradigms for the Future Internet of trillions of objects

Date: July 1st, 2013

morabito

Dr. Giacomo Morabito

iera

Dr. Antonio Iera

atzori

Dr. Luigi Atzori

 Abstract:The focus of the present Tutorial is the convergence of the Internet of Things (IoT) and social network paradigms towards the deployment of a social network in which things are nodes in the same way as humans (as well as services, contents, etc.). This concept is fast gaining ground thanks to the benefits deriving from the potentials of the social networks within the IoT domain.This Tutorial introduces the main issues, technologies, and investigated solutions in the following areas: (i) establishing and then exploiting social relationships between any Internet object (with the possible interactions human-thing, thing-thing). Attention is given also to types of relationships tracked without the need to take into account the owner of the resource as it is done in mostly human-centric paradigms. (ii) using social relationships among things resources to crawl the Internet and discover and interact with other resources; this provides a distributed solution that is expected to be effective, efficient and, most important, relieves the humans from doing it. (iii)  highlighting expected benefits in the discovery of resources and handling the security of the communications, and evaluating the resource trustworthiness.Within the Tutorial, the cited topics will be addressed by finalizing them to the constitution of  the background for the definition of new paradigms for data networking in the future Internet; models that should be based on the way the resources interact each other over the time.During the Tutorial, answers will be given to questions such as:
  • What is the possible structure of a social network built on top of the IoT?
  • What are the most appropriate procedures for building a social network of humans and things?
  • What are the most appropriate architectures to support a social-aware IoT?
  • Will the resulting social network be able to improve network navigability and achieve scalable resource search as well as to establish a network of trust between network resources?
  • Is it possible to derive novel paradigms which allow seamless interaction between things that may be different in nature (e.g., contents and things, people and contents, etc.) and, therefore, may use different networking protocol stacks?

In details, the lecture will be organized as follows:

  • Basic concepts of Internet of Things

-   Technologies

-   Architectures

-   Applications

  • Basic concepts of social networks

-    Structure

-    Potentialities

  • Making things socializing: motivations
  • Definition of notion of “social relationship” between objects
  • Definition of “degrees of social relationship”
  • Components and reference architecture
  • Technological issues
  • Applications and scenarios
  • Experimentations
  • Conclusions & Road Ahead

 Speaker’s Bio

Antonio Iera graduated in Computer Engineering at the University of Calabria, Italy, in 1991 and received a Master Diploma in Information Technology from CEFRIEL/Politecnico di Milano, Italy, in 1992 and a Ph.D. degree from the University of Calabria, Italy, in 1996. From 1994 to 1995 he has been at the Mobile Network Division Research Center, Siemens AG – Munich, Germany to participate to the CEC Project “RACE II 2084 ATDMA (Advanced TDMA Mobile Access)” under a “Commission of European Communities Fellowship Contract in RACE Mobility Action”. Since 1997 he has been with the University Mediterranea, Reggio Calabria, where he currently holds the positions of scientific coordinator of the local Research Units of the National Group of Telecommunications and Information Theory (GTTI) and of the National Inter-University Consortium for Telecommunications (CNIT), Director of the ARTS (www.arts.unirc.it) – Laboratory for Advanced Research into Telecommunication Systems, and Head of the Department DIMET

He served as member of Technical Program Committees of several IEEE International Conferences and has been co-Guest Editor for different special issues in the IEEE Wireless Communications Magazine. Elevated to the IEEE Senior Member status in 2007. His research interests include: Next generation mobile systems, broadband and heterogeneous wireless networks, Advanced Systems for Personal Communications, RFID systems and Internet of Things.

Giacomo Morabito received the laurea degree in Electrical Engineering and the PhD in Electrical, Computer and Telecommunications Engineering from the Istituto di Informatica e Telecomunicazioni, University of Catania, Catania (Italy), in 1996 and 2000, respectively. From November 1999 to April 2001, he was with the Broadband and Wireless Networking Laboratory of the Georgia Institute of Technology as a Research Engineer. Since April 2001 he is with the Dipartimento di Ingegneria Informatica e delle Telecomunicazioni of the University of Catania where he is currently Associate Professor.

He serves in the Editorial Boards of IEEE Wireless Communications Magazine and Computer Networks. Furthermore, he has been co-guest editor of special issues of IEEE Transactions on Multimedia, IEEE Wireless Communication Magazine, Computer Networks and MONET.

His research interests focus on analysis and solutions for broadband and wireless networks.

Luigi Atzori is assistant professor at the University of Cagliari (Italy) since 2000. His main research topics of interest are in service management in next generation networks, with particular attention to QoS, service-oriented networking, bandwidth management and multimedia networking. He has published more than 100 journal articles and refereed conference papers. Dr. Atzori has received the Telecom Italia award for an outstanding MSc thesis in Telecommunication and has been awarded a Fulbright Scholarship (11/2003-05/2004) to work on video streaming at the Department of Electrical and Computer Engineering, University of Arizona. He is senior member of IEEE, member of the IEEE Multimedia Communications Committee (MMTC) and co-chair of the MMTC IG on Quality of Experience. He has been the editor for the ACM/Springer Wireless Networks Journal and guest editor for the IEEE Communications Magazine, Monet and Signal Processing: Image Communications journals.

 

Tutorial 4

 TitleCloud Computing Security

Date: July 1st, 2013

wassim-1

Dr. Wassim El Hajj

 

 

Dr. Wassim ElHajj

American University of Beirut

Lebanon

Abstract: It is expected that by 2016, 500 out of the Global 1000 companies will have stored customer-sensitive data in the public cloud via cloud computing. Cloud computing provides users with a web-based environment that enables them to request and use on-demand information technology services. Services provided by cloud computing include web-applications, clustering, virtualization, hosted instances, hosted solutions, and many more. Given the large number of services cloud computing provides in addition to its cost efficiency, cloud computing industry is continuously growing and generating tremendous revenues. Gartner research firm stated in recent statistics that “By 2013 the size of the cloud computing market worldwide will be $150 billion”. Ibis World, in a recent research paper analyzing the UK cloud computing market, states that “In 2012-13, the UK industry is expected to generate £5.79 billion in revenue.”Even though cloud adoption is increasing amongst different sized organizations, the top two concerns remain to be Security and Privacy. Specifically, cloud computing security risks include data availability, denial of service attacks, wrapping attacks, and malware injection attacks. Many solutions have been suggested in literature to address the above risks such as developing a framework with tough security architecture, employing trusted third party services to assure data availability, and using cloud-based antivirus systems. However, a fully secure cloud is a very hard objective, if not impossible. In this tutorial, we give an overview of cloud computing and discuss the most serious cloud computing security risks and the corresponding countermeasures. We also discuss the open problems in cloud computing security and the potential research directions.
Short Bio:

Dr. Wassim El-Hajj is currently an Assistant Professor in the Computer Science department at the American University of Beirut (AUB). Dr. Wassim El-Hajj received his B.S. degree from the American University of Beirut in 2000, and the M.S. and Ph.D. degrees in 2002 and 2006, respectively, from Western Michigan University (WMU), all in Computer Science. Right after his graduation, he joined the Information Security department at UAE University as an assistant professor. He then joined the Electrical and Computer Engineering department at AUB as a visiting professor and then joined the Computer Science department as a full-time faculty.

He received many research grants for his research in Information Security, Data Mining, and Network Planning. His research activities culminated with more than 30 publications, some of which were published in prestigious Journals and Conferences such as IEEE Transactions, BMC Bioinformatics, IEEE Globecom, and IEEE ICC. He was a frequent speaker and a technical reviewer at more than 20 leading international conferences. In addition to his academic experience, he has a valuable industrial experience with Boeing and Ten Strategic Consulting.

He is the recipient of numerous recognitions, most notably, the WMU Excellence in Research Award for three years in a row, Honorable mention for Graduate Research and Creative Scholar, the Outstanding Graduate Student Award for 2 consecutive years, and the Teaching Effectiveness Award which is considered the highest teaching award at Western Michigan University.