CUSO Winter School in Computer Science

Managing and Engineering Complex Systems


January 22-26, 2011
Les Diablerets, Switzerland

 
Overview
Venue
Program
Speakers
Registration
 
Contact
 
 
 
 
Program

The program is composed of 6 courses:

1. Measurement of web-provided contents: benchmarking and online-campaigning (Christoph Glauser)

IFAAR is measuring web-provided content with computer based content analytical tools. The content which is published on the web is often not relevant or not interesting to users. IFAAR has proposed a solution to measure and compare information provided on websites and digital campaigns and compare them systematically with what users are searching whilst using various search engines like Google, Yahoo, Bing, Baidu, search, metasearch etc. The presentation will describe methods and examples on how measurement in the online-world is done today. It shows state of the art internet research and provides insights in best practices and into some of the actual projects where IFAAR is involved. Existing measures, studies and examples will be presented and future developments, all arround search & find as well as about social media and user generated content, will be discussd together with the students.

2. Design of resilient, dependable and secure systems (Paulo Esteves Verissimo)

This lecture will provide the basis for the design of resilient systems as a whole. It will focus on the architectural, paradigmatic and algorithmic issues that make a computerized system be resilient, analysing the aspects of computer system design that contribute to its correct/safe operation and control in spite of threats, be them accidental or, as increasingly happening, malicious. The main concepts are introduced, then middleware design principles are discussed, continuing with discussions on how to tolerate faults and intrusions and on how to resist and test attacks.

3. Cloud computing: a legal perspective (Vincent Gautrais)

Years ago, it was usual for an organization in charge of personal information (PI), to manage large amount of documents (paper or electronic) in its own office, in paper format or in computers or networks. But new trends associated to cloud computing are changing ways to seeing legal aspects of information management. First, the notion of “control” – as a basic principle in privacy issues – need to be reconsidered to be consistent with the new reality. Second, the liability of different actors involved in the all process (as data controller, ISP, person in charge of custody, etc.) would be necessarily redefined between them depending of what they do, or documents (policies and procedures) and contracts they produce. That said, persons in charge of PI retention and control would be forced to make choices (taking into account the sensitivity, level of risk, categorization of information, etc.). This course will offer some guidance to help actors to take the good choices and improve technical and legal security.

4. Software Architectures: Concepts and Best Practices (Lamia Labed Jilani)

The course aims to introduce an important subfield of software engineering advocating to what extent having a good architectural design is a critical success factor for complex system development.  We will show how an architecture holds the key to achieve system quality, is a reusable asset that can be applied to subsequent systems, and is crucial to a software organization's business strategy.  We introduce architectural representation languages concepts as well as explicit tool supports for architectural design.

5. Gossip-based networking: self-organizing techniques for large-scale distributed applications (Spyros Voulgaris)

Operating large-scale distributed systems is a complex task. First, as the number of nodes is very high, it is impossible to control them from a centralized point. Second, as nodes can join and leave the system at any time, it is required to maintain the service and applications even in face of failures, and constantly re-adapt to the current available resources. Finally, as the complexity of large-scale system may be a hindrance for their adoption by programmers, we need to have simple and well-understood programming models. Gossip-based protocols address all the above requirements, and are at the heart of many actual and future large-scale applications. They are naturally robust to failures, allow to express in a simple manner complex global behaviors of an application based on local peers interactions, and allow self-organization principles to be expressed simply. This tutorial will present the state-of-the-art of gossip protocols for the construction of large-scale applications. It will present the basic gossip building blocks and mechanisms, and exemplify their use in academic and industrial applications.

6. Business Process Modeling, Management and Compliance with the User Requirements Notation (Daniel Amyot)

The User Requirements Notation (URN), standardized by ITU-T in November 2008, aims to support the elicitation, modeling, analysis, specification, and validation of requirements, particularly for reactive and telecommunications systems. URN combines a goal view, expressed with the Goal-oriented Requirement Language, with a scenario view, expressed with the Use Case Maps notation. This unique combination proved to be useful in the description of business processes as well as of legislation and organization policies. In this tutorial, we will explore the modelling, analysis, and evolution of business processes. We will then explore how laws and policies can also be represented with URN, and how compliance assessment and management can be addressed. We will finally introduce recent extensions for key performance indicators and aspect-oriented modelling, together with tool support, and how they can be exploited for the dynamic adaptation of business processes.

Schedule

Saturday 22 From 15h00 Registration
16h30-19h30

Christoph Glauser:
Measurement of web-provided contents: benchmarking and online-campaigning

Sunday 23 08h30-12h30 Paulo Esteves Verissimo:
Design of resilient, dependable and secure systems
16h30-20h00 Vincent Gautrais:
Privacy and security - a legal perspective (part I)
Monday 24 08h30-12h00 Lamia Labed Jilani:
Software Architectures: Concepts and Best Practices
16h30-20h00 Vincent Gautrais:
Privacy and security - a legal perspective (part II)
Tuesday 25 08h30-12h00 Spyros Voulgaris:
Gossip-based networking: self-organizing techniques for large-scale distributed applications
16h30-20h00 Daniel Amyot:
Business Process Modeling, Management and Compliance with the User Requirements Notation (part I)
Wednesday 26 08h30-12h00 Daniel Amyot:
Business Process Modeling, Management and Compliance with the User Requirements Notation (part II)
12h00-12h30 Wrap-up