Submit a Paper

The First International Conferences on Access Networks, Services and Technologies

ACCESS 2010

September 20-25, 2010 - Valencia, Spain


Tutorials

T1. Collaborative Radio for 5G Mobile and Wireless Communications
Josef Noll, University of Oslo / Center for Wireless Innovation,  Norway       
Mohammad Mushfiqur Rahman Chowdhury, Center for Wireless Innovation,  Norway

T2. Writing Higher Quality Software Requirements
John Terzakis, Intel, USA

T3. The Path Towards Ubiquity: From Wireless to Ubiquitous Computing
Arijit Ukil,  Innovation Labs, Tata Consultancy Services - Kolkata, India

T4. Understanding, preparing for and developing compliance plans for regulatory issues governing cloud computing
David Snead, Attorney, Washington D.C., USA

 

DETAILS:

T1. Collaborative Radio for 5G Mobile and Wireless Communications
Josef Noll, University of Oslo / Center for Wireless Innovation,  Norway       
Mohammad Mushfiqur Rahman Chowdhury, Center for Wireless Innovation,  Norway

Topics to be addressed

Introduction

  • Generation aspects of mobile and wireless communications
  • Applications for 5G
  • Radio, Capacity and Coverage
  • Network aspects

Device aspects

  • Form factor
  • Diversity
  • Power
  • Network authentication

Special focus areas

Radio Coverage

  • Interference in Beyond 3G systems (HSPA, LTE, 5G)
  • Radio dilemma: range, capacity, frequency
    • Network capacity and cell capacity
    • Interference limited coverage
  • Serving indoor users
    • Femtocells
    • User-owned equipment (prosumers)
  • Collaborative Radio

Seamless Network access

  • Mobility
  • Authentication mechanisms
  • Future SIM as authenticator

Business aspects and Conclusions

  • Collaborative approach, taken Near Field Communication (NFC) as an example

 

T2. Writing Higher Quality Software Requirements
John Terzakis, Intel, USA

Abstract

While Agile and traditional “waterfall” software development methodologies differ in many key practices, they do share the mutual goal of accurately representing customer needs through requirements, whatever their form. If requirements are poorly understood, lack key details, or are interpreted differently by stakeholders, then defects will be introduced into the software. Defects lead to rework which ultimately delays product delivery and decreases customer satisfaction. This half day tutorial outlines various practices, templates, and techniques for writing higher quality requirements that more accurately capture customer needs. It discusses issues with “natural language”, shares ten attributes of well-written requirements, and explains the use of ambiguity checklists. Examples of poorly written requirements are provided, analyzed, and then rewritten using the techniques introduced. Leave this tutorial with techniques and tools to write higher quality software requirements and detect those that aren’t.

Outline of Topics:

  • Requirements:  definitions, purpose and types
  • The Requirements Problem
  • Requirements Defects and their Cost
  • Natural Language
  •  Issues with Natural Language (including examples)
    • Weak words
    • Unbounded lists
    • Ambiguity
  • Techniques for Writing Higher Quality Requirements
    • Requirements Syntax
    • Ambiguity Checklist
    • 10 Attributes of Well Written Requirements
    • Planguage
    • Quantifying Non-Functional Requirements
  • Rewriting requirements using techniques covered
  • Effective review techniques

This tutorial is applicable to the vast majority of all software development projects today.  It will first present definitions, templates and syntaxes for requirements. Key elements for each type of requirement will be discussed along with their importance in producing high quality requirements. The tutorial will then present issues with natural language, ten attributes of well-written requirements, and ambiguity checklists. These writing guidelines will assist authors in generating higher quality requirements and reviewers in assessing them for quality. Examples of poorly written requirements will be presented, analyzed, and then rewritten using the techniques introduced in the tutorial. Authors will exit this tutorial with the tools that will enable them to write high quality requirements and reviewers will gain knowledge on how to evaluate requirements for quality. 

T3. The Path Towards Ubiquity: From Wireless to Ubiquitous Computing
Arijit Ukil,  Innovation Labs, Tata Consultancy Services - Kolkata, India

Tutorial overview and content:

Einstein often quoted “imagination is more important than knowledge. Logic will get you from A to B. imagination will take you everywhere”. Power of imagination has taken mankind from Stone Age to Internet World. Modern man’s creative imagination has allowed mankind to view the world in an entirely different light. This has transformed the way mankind lives, communicates and interacts. Following the same path of human imagination, communication technology evolved. So called wireless mobile communication is evolving in form of new technologies at every tick of minute. We have seen mobile communication evolution from AMPS to fourth generation (4G) in the form of WiMAX and LTE. The journey from AMPS to 4G is a long one, involving highest level of imagination and inventions. And it changed human life like never before. Along this path, researchers are seriously considering the possibility of “anywhere and anytime” computing or so called ubiquities computing, dream of Mark Weisser, a researcher in Xerox Palo Alto Research Center. Mark Weiser in his paper “The Computer for the Twenty-First Century” defines ubiquitous computing as a technology that “weave itself into the fabric of everyday life until it is indistinguishable from the it” [1]. He also envisioned it as “Specialized elements of hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their presence.” The purpose of a computer is to help us do something else. The best computer is a quiet, invisible servant. The computer should extend our unconscious. Technology should create calm. Ubiquitous computing is finding immediate applications in healthcare facilities, aware-homes, and assisted-living for the elderly. Sensors are used to monitor the conditions of patients in hospitals, onset of age-related disorders of elderly persons and status of various electrical appliances in our homes. Ubiquitous computing evolved with the path of computing and communication technology development. Though even till date, these two technologies prefer independence; this will not be the case in ubiquitous computing domain. We should prefer to call it ubiquitous computing and communication. We foresee that these two technologies will merge in the realization process of ubiquity. In computing era primary resource is computing and the paradox is that computing resources increased over years, but so did problem complexity. The solution is efficient computing algorithms with respect to the metrics like runtime, space complexity. Whereas, in communication era, the primary resource is bandwidth and the paradox is that as bandwidth capabilities increase, so will new dataintense wireless services and number of users. The solution is adaptive applications with respect to the metrics like quality of data, quality of service (QoS).

On this line, I present this 3 h tutorial in two parts. In first part, I will concentrate on the fundamental aspects, issues of research issues of 4G wireless communications and its evolution. In the second part, emphasis is on the ubiquitous computing as well as TCS’s contribution in ubiquitous computing. The agenda is:

1. 4G wireless communication, issues, challenges and trends
2. Wireless channel dynamics
3. Advanced Multiple Access Scheme: OFDMA
4. Multi-user diversity and spectral efficiency
5. Cross-layer optimization: link adaptation, scheduling and resource allocation
6. QoS
7. Game theory in wireless communication
8. Software Defined Radio (SDR)
9. Network Mobility (NEMO)
10. Ubiquitous computing defined
11. Vision of ubiquitous computing
12. Building blocks of ubiquitous computing
13. Context-aware computing
14. Ubiquitous computing enabler
15. Ubiquitous computing: examples and projects
16. TCS contribution in ubiquity: Home gateway

The total length of the tutorial will be of 3 hour consisting of two parts:
1. 4G wireless communication ( 2 hr)
2. Ubiquitous computing (1 hr).

T4. Targeted Legal Advice for Internet Business
David Snead, Attorney, Washington D.C., USA

This tutorial will provide a review of U.S. and EU laws and mandates governing cloud computing.  Using a case study developed during his work with ENISA, the presenter will discuss current U.S. and European approaches to regulating technology transactions, and any laws or regulations specifically governing cloud computing.  The tutorial will include a discussion of how these laws may develop and change over the next several years.  The tutorial will close with a discussion on developing and implementing effective compliance plans.  Attendees will receive guidance on current U.S. and European laws relating to cloud computing, learn when governmental disclosure is required, and create compliance plans to mitigate legal liability.

 
 

Copyright (c) 2006-2010, IARIA