Archive for the 'GENERAL' Category
October 5th, 2012, by Tim Finin, posted in Ebiquity, GENERAL
Three Ph.D. students from the ebiquity lab have posters at the ACM Student Research Competition and General Poster Session of the 2012 Grace Hopper Celebration of Women in Computing conference. The GHC conference is the largest technical conference for women in computing and results in collaborative proposals, networking and mentoring for junior women and increased visibility for the contributions of women in computing. Conference presenters are leaders in their respective fields, representing industry, academia and government. Top researchers present their work while special sessions focus on the role of women in today’s technology fields.
The three ebiquity lab students with posters this year are:
Automation of Cloud Services lifecycle by using Semantic technologies,
Karuna Panda Joshi
We have developed a new framework for automating the configuration, negotiation and procurement of services in a cloud computing environment using semantic web technologies.We have developed detailed Ontologies for the framework. We have designed a prototype, called Smart Cloud Services, which is based on this framework and also incorporates NIST’s policies on cloud computing. This prototype is integrated with different cloud platforms like Eucalyptus and VCL.
A Knowledge-Based Approach To Intrusion Detection Modeling,
M. Lisa Mathews
Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat/vulnerability signatures in their databases. These systems are incapable of taking advantage of heterogeneous data sources for analysis of system activities for threat detection. This work presents a situation-aware intrusion detection model that integrates these heterogeneous data sources and builds a semantically rich knowledge-base to detect cyber threats/vulnerabilities.
Unsupervised Coreference Resolution for FOAF Instances,
Jennifer Alexander Sleeman
Coreference Resolution determines when two entity descriptions represent the same real world entity. Friend of a Friend (FOAF) is an ontology about people and their social networks. Currently there is not a way to easily recognize when two FOAF instances represent the same entity. Existing techniques that use supervised learning typically do not support incremental processing. I present an unsupervised approach that supports both heterogeneous data and incremental online processing.
August 24th, 2011, by Tim Finin, posted in GENERAL
The hype cycle concept has been used by IT consulting company Gartner since 1995 to highlight the common pattern of “overenthusiasm, disillusionment and eventual realism that accompanies each new technology and innovation.” While Gartner’s hype cycles represent one company’s opinions, the underlying concept seems right and it is always interesting to see where they place the current crop of computing related technologies.
Here is their 2011 hype cycle for emerging technologies
and some comments from the accompanying press release
“Themes from this year’s Emerging Technologies Hype Cycle include ongoing interest and activity in social media, cloud computing and mobile,” Ms. Fenn said. “On the social media side, social analytics, activity streams and a new entry for group buying are close to the peak, showing that the era of sky-high valuations for Web 2.0 startups is not yet over. Private cloud computing has taken over from more-general cloud computing at the top of the peak, while cloud/Web platforms have fallen toward the Trough of Disillusionment since 2010. Mobile technologies continue to be part of most of our clients’ short- and long-range plans and are present on this Hype Cycle in the form of media tablets, NFC payments, quick response (QR)/color codes, mobile application stores and location-aware applications.
Transformational technologies that will hit the mainstream in less than five years include highly visible areas, such as media tablets and cloud computing, as well as some that are more IT-specific, such as in-memory database management systems, big data, and extreme information processing and management. In the long term, beyond the five-year horizon, 3D printing, context-enriched services, the “Internet of Things” (called the “real-world Web” in earlier Gartner research), Internet TV and natural language question answering will be major technology forces. Looking more than 10 years out, 3D bioprinting, human augmentation, mobile robots and quantum computing will also drive transformational change in the potential of IT.”
You can get a copy of the Hype Cycle for Emerging Technologies Summary Report by giving your contact information, but the full report on this or any of the other 26 topical hype cycle reports will cost you money.
December 7th, 2010, by Tim Finin, posted in CS, GENERAL
Dot Diva is a Web site designed to “create an exciting and positive image of computing for high school girls”. It’s a effort of the ‘New Image of Computing’ project sponsored by NSF, ACM and others. One of the project’s advisors is UMBC’s own Marie desJardins.
The project is trying to raise interest in computing majors and careers among high school students and undergraduates. One of the project themes is that studying computing doesn’t mean you have to abandon your other deep interests. You can use a strong computing background to further music, psychology, biology, medicine, linguistics, journalism or almost any pursuit.
It’s a good message that can help attract people to the computing fields.
December 2nd, 2010, by Tim Finin, posted in Agents, AI, Games, Google, Social
The Google-supported Planet Wars Google AI Challenge had over 4000 entries that used AI and game theory to compete against one another. C at the R-Chart blog analyzed the programming languages used by the contestants with some interesting results.
The usual suspects were the most popular languages used: Java, C++, Python, C# and PHP. The winner, Hungarian Gábor Melis, was just one of 33 contestants who used Lisp. Even less common were entries in C, but the 18 “C hippies” did remarkably well.
Blogger C wonders if Lisp was the special sauce:
Paul Graham has stated that Java was designed for “average” programmers while other languages (like Lisp) are for good programmers. The fact that the winner of the competition wrote in Lisp seems to support this assertion. Or should we see Mr. Melis as an anomaly who happened to use Lisp for this task?
November 19th, 2010, by Tim Finin, posted in GENERAL, Privacy, Semantic Web, Web
Sir Tim Berners-Lee discusses the principles underlying the Web and the need to protect them in an article from the December issue of Scientific American, Long Live the Web.
“The Web evolved into a powerful, ubiquitous tool because it was built on egalitarian principles and because thousands of individuals, universities and companies have worked, both independently and together as part of the World Wide Web Consortium, to expand its capabilities based on those principles.
The Web as we know it, however, is being threatened in different ways. Some of its most successful inhabitants have begun to chip away at its principles. Large social-networking sites are walling off information posted by their users from the rest of the Web. Wireless Internet providers are being tempted to slow traffic to sites with which they have not made deals. Governments—totalitarian and democratic alike—are monitoring people’s online habits, endangering important human rights.
If we, the Web’s users, allow these and other trends to proceed unchecked, the Web could be broken into fragmented islands. We could lose the freedom to connect with whichever Web sites we want. The ill effects could extend to smartphones and pads, which are also portals to the extensive information that the Web provides.
Why should you care? Because the Web is yours. It is a public resource on which you, your business, your community and your government depend. The Web is also vital to democracy, a communications channel that makes possible a continuous worldwide conversation. The Web is now more critical to free speech than any other medium. It brings principles established in the U.S. Constitution, the British Magna Carta and other important documents into the network age: freedom from being snooped on, filtered, censored and disconnected.”
Near the end of the long feature article, he mentions the Semantic Web’s linked data as one of the major new technologies the Web will give birth to, provided the principles are upheld.
“A great example of future promise, which leverages the strengths of all the principles, is linked data. Today’s Web is quite effective at helping people publish and discover documents, but our computer programs cannot read or manipulate the actual data within those documents. As this problem is solved, the Web will become much more useful, because data about nearly every aspect of our lives are being created at an astonishing rate. Locked within all these data is knowledge about how to cure diseases, foster business value and govern our world more effectively.”
One of the benefits of linked data is that it makes data integration and fusion much easier. The benefit comes with a potential risk, which Berners-Lee acknowledges.
“Linked data raise certain issues that we will have to confront. For example, new data-integration capabilities could pose privacy challenges that are hardly addressed by today’s privacy laws. We should examine legal, cultural and technical options that will preserve privacy without stifling beneficial data-sharing capabilities.”
The risk is not unique to linked data, and new research is underway, in our lab and elsewhere, on how to also use Semantic Web technology to protect privacy.
November 3rd, 2010, by Tim Finin, posted in Conferences, GENERAL, Technology
The First Baltimore Hackathon will take place on Friday and Saturday, November 19-20, 2010 at Beehive Baltimore, 2400 Boston St, on the 3rd floor of the Emerging Technology Center.
Come to build a hardware or software project — from idea to prototype — in a weekend either individually or as part of a team! While you are hacking, you’ll enjoy free food and coffee and be eligible to win prizes and awards! If you are interested, sign up and use the Baltimore Hackathon wiki to share ideas and build a team or to list yourself as available to join an existing team.
Check out the TechinBaltimore Google group for more information and discussion about the hackathon and related technology events in and around Baltimore.
October 10th, 2010, by Krishnamurthy Viswanathan, posted in GENERAL
Today is the 10th day of the 10th month of year ’10. Canonical, today released Ubuntu 10.10 (Maverick Meerkat), sidestepping its usual Thursday release. Go to ubuntu.com to give it a spin. As usual, you can download it for free and burn it on a CD. It has all the great features that we are used to, plus a couple of cool new ones. Remember that you can always use the ISO to try out all the features in the new release without installing it.
The new Ubiquity installer has been redesigned to be easier to use and it also installs drivers and download updates even as it is installing the OS. Their new service, Ubuntu One offers 2 GB of free “personal cloud” space to users, and also provides sharing and syncing options . A beta for the Microsoft Windows client is set to begin soon.
The server edition of Ubuntu 10.10 is touted as “the default open-source choice for cloud computing.” You can also try Ubuntu 10.10 server on Amazon EC2 for an hour, free.
October 7th, 2010, by Tim Finin, posted in Facebook, Privacy, Security, Social, Social media
Facebook has rolled out a new version of groups announced on the Facebook blog.
“Until now, Facebook has made it easy to share with all of your friends or with everyone, but there hasn’t been a simple way to create and maintain a space for sharing with the small communities of people in your life, like your roommates, classmates, co-workers and family.
Today we’re announcing a completely overhauled, brand new version of Groups. It’s a simple way to stay up to date with small groups of your friends and to share things with only them in a private space. The default setting is Closed, which means only members see what’s going on in a group.”
There are three kinds of groups: open, closed and secret. Open groups have public membership listings and public content. Private ones have public membership but public but private content. For secret groups, both the membership and content are private.
A key part of the idea is that the group members collectively define who is in the group, spreading the work of setting up and maintaining the group over many people.
But a serious issue with the new Facebook group framework is that a member can unilaterally add any of their friends to a group. No confirmation is required by the person being added. This was raised as an issue by Jason Calacanis.
The constraint that one can only add Facebook friend to a group he belongs to does offer some protection against ending up in unwanted groups (e.g., by spammers). But it could still lead to problems. I could, for example, create a closed group named Crazy people who smell bad and add all of my friends without their consent. Since the group is not secret like this one, anyone can see who is in the group. Worse yet, I could then leave the group. (By the way, let me know if you want to join any of these groups).
While this might just be an annoying prank, it could spin out of control — what might happen if one of your so called friends adds you to the new, closed “Al-Queda lovers” group?
The good news is that this should be easy to fix. After all, Facebook does require confirmation for the friend relation and has a mechanism for recommending that friends like pages or try apps. Either mechanism would work for inviting others to join groups.
We have started working with a new group-centric secure information sharing model being developed by Ravi Sandhu and others as a foundation for better access and privacy contols in social media systems. It seems like a great match.
October 6th, 2010, by Tim Finin, posted in cybersecurity, Security, Social
University of Michigan professor J. Alex Halderman explains how his research group compromised the Washington DC online voting pilot in his blog post, Hacking the D.C. Internet Voting Pilot.
“The District of Columbia is conducting a pilot project to allow overseas and military voters to download and return absentee ballots over the Internet. Before opening the system to real voters, D.C. has been holding a test period in which they’ve invited the public to evaluate the system’s security and usability. … Within 36 hours of the system going live, our team had found and exploited a vulnerability that gave us almost total control of the server software, including the ability to change votes and reveal voters’ secret ballots. In this post, I’ll describe what we did, how we did it, and what it means for Internet voting.”
The problem was a shell-injection vulnerability that involved the procedure used to upload absentee ballots. Halderman concludes
“The specific vulnerability that we exploited is simple to fix, but it will be vastly more difficult to make the system secure. We’ve found a number of other problems in the system, and everything we’ve seen suggests that the design is brittle: one small mistake can completely compromise its security. I described above how a small error in file-extension handling left the system open to exploitation. If this particular problem had not existed, I’m confident that we would have found another way to attack the system.”
October 4th, 2010, by Tim Finin, posted in GENERAL
Slashdot highlights another mystery today — what’s the meaning of the binary sequence along the bottom of the personal coat of arms of David Johnston, Canada’s new Governor-General.
“As de facto head of state and the Queen’s representative in Canada he is required to design a personal coat of arms. One modern detail has attracted particular attention – a 33-digit palindromic binary stream at the base. Efforts to decode the meaning of the number using ASCII, Morse, grouping by 3/11 and other theories has so far come up empty (right now it’s a toss up between random, the phone number 683-077-0643 and Morse code for ‘send help – trapped in a coat of arms factory.’) Is 110010111001001010100100111010011 the combination to his luggage, or just a random stream of digits?”
Here’s a theory that I hope might be true. As an educator and former president of a university known for its strength in computer science, maybe he is trying to interest Canadian children in mathematics and computer science by giving them a an intriguing puzzle to work on.
September 30th, 2010, by Tim Finin, posted in Mobile Computing, Privacy, Security, Social
Ars Technica has an an article on bad Android apps, Some Android apps caught covertly sending GPS data to advertisers.
“The results of a study conducted by researchers from Duke University, Penn State University, and Intel Labs have revealed that a significant number of popular Android applications transmit private user data to advertising networks without explicitly asking or informing the user. The researchers developed a piece of software called TaintDroid that uses dynamic taint analysis to detect and report when applications are sending potentially sensitive information to remote servers.
They used TaintDroid to test 30 popular free Android applications selected at random from the Android market and found that half were sending private information to advertising servers, including the user’s location and phone number. In some cases, they found that applications were relaying GPS coordinates to remote advertising network servers as frequently as every 30 seconds, even when not displaying advertisements. These findings raise concern about the extent to which mobile platforms can insulate users from unwanted invasions of privacy.”
TaintDroid is an experimental system that “analyses how private information is obtained and released by applications ‘downloaded’ to consumer phones”. A paper on the system will be presented at the 2010 USENIX Symposium on Operating Systems Design and Implementation later this month.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, William Enck, Peter Gilbert, Byung-gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth, OSDI, October 2010.
The project, Realtime Privacy Monitoring on Smartphones has a good overview site with a FAQ and demo.
This is just one example of a rich and complex area full of trade-offs. We want our systems and devices to be smarter and to really understand us — our preferences, context, activities, interests, intentions, and pretty much everything short of our hopes and dreams. We then want them to use this knowledge to better serve us — selecting music, turing the ringer on and off, alerting us to relevant news, etc. Developing this technology is neither easy nor cheap and the developers have to profit from creating it. Extracting personal information that can be used or sold is one model — just as Google and others do to provide better ad placement on the Web.
Here’s a quote from the Ars Technical article that resonated with me.
We, and many others, are trying to prepare for the next step — when users can define their own privacy policies and these will be understood and enforced by their devices.
September 27th, 2010, by Krishnamurthy Viswanathan, posted in Books
The Banned Books Week (BBW) is an annual event that celebrates the “freedom to read”. The campaign was started in 1982 and is held during the last week of September. The United States campaign, sponsored amongst others, by the American Library Association “highlights the benefits of free and open access to information while drawing attention to the harms of censorship by spotlighting actual or attempted bannings of books across the United States.” 
During this week, the Amnesty International directs attention to “the plight of individuals who are persecuted because of the writings that they produce, circulate or read”. 
The idea behind the event is to promote intellectual freedom: it encourages individuals to read books that have been challenged due to the unorthodox viewpoints expressed in these works of literature. Every year, the American Library Association’s Office for Intellectual Freedom records attempts by individuals and groups to ban books from libraries and classrooms. If you thought that censorship was a thing of the past, take a look at the Top Ten Most Frequently Challenged Books of 2009. At-least 46 of the Radcliffe Publishing Course Top 100 Novels of the 20th Century have been targeted. The list includes acclaimed classics such as Catcher in the Rye, and To Kill a Mockingbird.
While some books are banned or restricted, a majority of them are not banned due to the efforts of librarians, booksellers, students, teachers, and the reading community at large. It is due to events like these that attention is drawn to the dangers of imposing restrictions on the availability of information in our world.
You are currently browsing the archives for the GENERAL category.