
RETURN TO
Tracks
Software Technology Track
Co-Chair: Gul Agha
Computer Science Dept
University of Illinois Urbana-Champaign
201 N. Goodwin Avenue
Urbana IL 61801-2302
Tel: (217) 244-3087
Fax: (217) 333-3501
Email: agha@cs.uiuc.edu
http://www.cs.uiuc.edu/people/faculty/agha.html
Co-Chair: Rick Kazman
Shidler College of Business
University of Hawai’i at Manoa
2404 Maile Way
Honolulu HI 96822
Tel: (808) 956-6948
Fax: (808) 956-9889
Email: kazman@hawaii.edu
Minitracks
Agile Software Development:
Lean, Distributed, and Scalable
(Jeff
Sutherland and Hubert Smits)
Algorithmic Challenges in Emerging Applications of Computing
(Linda
Morales and Wolfgang Bein)
CERT Software Application
Security
(Robert
Seacord, Jason Rafail, and Daniel Plakosh)
Digital Forensics - Pedagogy
and Foundational Research Activity
(Rayford
Vaughn and David Dampier)
Enterprise Modeling for
Information Systems Development
(Sergio
de Cesare, Mark Lycett, and Alan Serrano)
Wireless Sensor Networks
and Applications
(Edoardo
Biagioni and Stephan Olariu)
Agile Software Development: Lean, Distributed, and Scalable
Agile software development processes have been influenced by best practices in Japanese industry, particularly by lean product development principles implemented at companies like Honda and Toyota, and knowledge management strategies developed by Takeuchi and Nonaka, now at the Hitotsubashi Business School in Japan, and Peter Senge at MIT. This Minitrack will focus on advancing the state of the art or presenting innovative ideas related to agile methods, individual practices and tools. Accepted papers will potentially enrich the body of knowledge and influence the framework of thought in the field by investigating Agile methods in a rigorous fashion.
We are open to research papers on multiple aspects of agile methods, particularly those that bring best practices in knowledge management and lean development to scalable, distributed, and outsourced Scrum, eXtreme Programming (XP), and other agile practices. Topics include:
Ø Research on existing or new methodologies and approaches: informal modeling techniques and practices, adapting/trimming existing methods, and new product/project planning techniques
Ø Research on existing or new techniques or practices: pairing, war-rooms, test-first design, paper-based prototyping, early acceptance test driven development, exploratory testing, refactoring, or others.
Ø Research on special topics or tools: configuration and resource management, testing, project steering, user involvement, design for agility, virtual teams or others.
Ø Research on integrating ideas from other fields, e.g. interaction design, requirements engineering, cognitive science, organizational psychology, usability testing, software security, into agile processes.
Ø Research studies of development teams using ethnographic or social research techniques.
Ø Research on agile software engineering economics.
Ø Quantitative and qualitative studies of agile methods, practices, and tools.
Ø Research on agile compliance and cost benefits within CMMI, ISO 9000, and FDA certified development projects.
Papers are particularly relevant when agile process implementations are shown to produce quantitative and qualitative benefits on distributed, outsourced, large, or standards compliant software development projects which have been previously been viewed (erroneously) as unsuited for agile development.
Jeff Sutherland (primary contact)
Chief Technology Officer
PatientKeeper Inc.
275 Washington St., 2nd Floor
Newton MA 02458
Tel: (617) 987-0394
Email: jeff.sutherland@computer.org
Hubert Smits
Services Dept
Rally Software Development
1050 Walnut St., Ste 202
Boulder CO 80302
Email: Hubert@rallydev.com
Algorithmic Challenges in Emerging Applications of Computing
Algorithmic challenges arise in many emerging areas of computing. Security, bioinformatics, quantum computing, power management and algorithmic game theory are examples of such areas. For instance, in the area of algorithmic game theory, economic agents are in varying degrees of collaboration and competition, and questions about equilibria arise. The study of combinatorial auctions gives insight into complex interactions of such agents on the Internet. In the area of power management for mobile devices like PDAs, sensors, cell phones and laptops, improvements in battery technology lag behind the dramatic improvement in hardware. Online algorithms allow power management schemes to schedule resources without full knowledge of future demands. In information security, investigations into efficient algorithms for secure dissemination of information, cyberforensics, and prevention of cybercrime are in great demand.
This Minitrack explores algorithmic challenges in these and other realms involving online and randomized algorithms, scheduling theory, approximation algorithms, optimization, and algorithmic complexity. Papers will be reviewed by a panel of experienced researchers across the breadth of computing and from around the globe: D. Bein, W. Bein, S. Bettayeb, L. Morales, J. Noga, K. Pruhs, H. Sudborough, and S. Tate from the USA; F. Chin and G. Zhang, China; H. Choo, Korea; J. Correa, Chile; V. Deineko and L. Gasieniec, UK; C. Demetrescu, Italy; Q. Gu, Canada; K. Iwama, E. Miyano, and S. Peng, Japan; B. Litow, Australia; M. Mahajan, India; S. Pickl and R. Reischuk, Germany; and J.P. Vergara, Philippines.
Linda Morales (primary contact)
Department of Computer Science and Information Systems
Texas A & M University-Commerce
P.O. Box 3011
Commerce TX 75249-3011
Tel: (903) 886-5409 or (903) 886-5617 (direct)
Fax: (903) 886-5404
Email: Linda_Morales@tamu-commerce.edu
Wolfgang W. Bein
Director, Center for the Advanced Study of Algorithms (CASA)
Howard R. Hughes College of Engineering
School of Computer Science
University of Nevada
Las Vegas NV 89154-4019
Tel: (702) 895-3681 Dept or (702) 895-1477 Direct
Fax: (702) 895 5222 Dept
Email: bein@cs.unlv.edu
CERT Software Application Security
This Minitrack focuses on the research and automation techniques required to develop secure software systems that do not compromise other system properties such as performance or reliability. Current security engineering methods are demonstrably inadequate as software vulnerabilities are currently being discovered at the rate of over 4,000 per year. These vulnerabilities are caused by software designs and implementations that do not adequately protect systems and by development practices that do not focus sufficiently on eliminating implementation defects that result in security flaws. An opportunity exists for systematic improvement that can lead to secure software applications and implementations.
The following topics are appropriate topics for research papers:
Ø Static analysis tools and techniques for detecting security flaws and software vulnerabilities in source or binary code.
Ø Dynamic analysis tools for detecting security flaws and software vulnerabilities in source or binary code.
Ø Model checking tools for detecting security flaws and software vulnerabilities in software systems.
Ø Software architectures and designs for securing against denial-of-service attacks and other software exploits.
Ø Coding practices for improved security and secure library implementations.
Ø Computational security engineering.
Ø Other tools and techniques for reducing or eliminating vulnerabilities during the development and maintenance.
Robert C. Seacord (primary contact)
CERT/CC
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213
Tel: (412) 268-7608
Fax: (412) 268-6989
Email: rcs@cert.org
Jason Rafail
CERT/CC
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213
Tel: (412) 268-6305
Fax: (412) 268-6989
Email: jrafail@cert.org
Daniel Plakosh
CERT/CC
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213
Tel (412) 268-7197
Fax: (412) 268-6989
Email:
dplakosh@sei.cmu.edu
Digital Forensics - Pedagogy and Foundational Research Activity
This Minitrack attempts to bring together papers from academia and practitioners which
address current directions in digital forensics. Digital forensics involves the use of software, computer science, software engineering, and criminal justice procedures to explore and or investigate digital media with the objective of finding evidence to support a criminal or administrative case. It involves the preservation, identification, extraction, and documentation of computer or network evidence.
We solicit papers in the following areas:
Ø Pedagogical papers that describe digital forensics degree programs or the teaching of digital forensics within other programs internationally.
Ø Papers that address a research agenda that considers practitioner requirements, multiple investigative environments and emphasizes real world usability.
Ø Papers that present an experience report involving the discovery, explanation and presentation of conclusive, persuasive evidence from digital forensics investigation.
Ø Papers that combine research and practice.
Rayford Vaughn (primary contact)
Billie
J. Ball
Professor of Computer Science and Engineering
Director, Center for Computer Security Research
PO Box 9637
Mississippi State University
Mississippi State MS 39762
Tel: (662) 325-7450
Fax: (662) 325-8997
Email: vaughn@cse.msstate.edu
http://www.cse.msstate.edu/~vaughn
David Dampier
Associate Professor of Computer Science and Engineering
Director, Forensics Training Center
PO Box 9637
Mississippi State University
Mississippi State MS 39762
Tel: (662) 325-2756
Fax: (662) 325-8997
Email: dampier@cse.msstate.edu
Enterprise Modeling for Information Systems Development
The organizational environment increasingly requires that information systems are capable of meeting changing business needs. This situation is evidenced in the general cost profile of systems development where the bulk of spending and effort lies in the (evolutionary) maintenance, integration and interoperability of existing systems. This situation provides a challenge to the generally accepted approaches to systems development and, in response, one stream of thought seeks to divorce business issues from the underlying technology platforms by placing 'models' at the heart of systems development. In principle, model-driven approaches see the system development process as consisting only of models and their transformations. A concern for these approaches is that of providing a structure within which models can be developed at the right level of abstraction and can then be transformed into more concrete models. In fundamental terms, however, model-driven development requires significant thinking in relation to both models and the modeling process.
Relevant topics of study for this Minitrack include, but are not limited to:
Ø Conceptualizing and modeling Information Systems (IS)
Ø Conceptualizing and modeling enterprises
Ø Limitations of current IS modeling approaches
Ø Human issues of modeling the enterprise and IS
Ø Model-driven development and change
Ø Coping with ambiguity and unforeseen requirements
Ø Modeling, tools, techniques and methods for IS development
Ø Flexible and adaptable business models and architectures
Ø Traceability of IS models
Sergio de Cesare (primary contact)
School of Information Systems and Computing, and Mathematics
Brunel University
Uxbridge, Middlesex
UB8 3PH
UNITED KINGDOM
Tel:
+44 (0)1895 265842
Fax: +44 (0)1895 251686
Email: sergio.decesare@brunel.ac.uk
Mark Lycett
School of Information Systems and Computing, and Mathematics
Brunel University
Uxbridge, Middlesex
UB8 3PH
UNITED KINGDOM
Tel: +44 (0)1895 265843
Fax: +44 (0)1895 251686
Email: mark.lycett@brunel.ac.uk
Alan Serrano
School of Information Systems and Computing, and Mathematics
Brunel University
Uxbridge, Middlesex
UB8 3PH
UNITED KINGDOM
Tel: +44 (0)1895 266048
Fax: +44 (0)1895 251686
Email: alan.edwin.serrano-rico@brunel.ac.uk
Wireless Sensor Networks and Applications
This Minitrack focuses on fundamental challenges and issues arising in wireless sensor networks (WSNs) and their applications. Wireless sensor nodes and networks must provide solutions to practical problems, and must be both cost-effective and an improvement over previous practice. This may require improvements in the theoretical understanding of the issues specific to networking a large number of low-energy, low-cost wireless devices, some of which may be in motion.
Topics of interest will include but are not limited to the following:
Ø Hardware aspects of sensor design
Ø Self-organization and governance
Ø Work models for wireless sensor networks
Ø Location management and placement
Ø Energy-aware protocols
Ø Routing and data transport in wireless sensor networks
Ø Security and dependability issues
Ø Scalability of wireless sensor networks
Ø Infrastructure-based protocols
Ø Embedded, network-oriented operating systems
Ø Middleware and software tools
Ø MAC protocols for wireless sensor networks
Ø Interfacing with other wireless/mobile systems
Ø Efficient data transfer protocols, data combining, and prediction
Ø Visualization of sensor data
Ø Modeling and Performance evaluation
Ø Demos - prototypes - WSN architecture
Ø Implementation experience and measurements
Edoardo Biagioni (primary contact)
Dept of Information and Computer Science
University of Hawaii
Honolulu HI 96822
Email: esb@hawaii.edu
Stephan Olariu
Dept of Computer Science
Old Dominion University
Norfolk VA 23529-0162
Email: olariu@cs.odu.edu

RETURN TO
TRACKS Send questions or comments to
hicss@hawaii.edu