Submit a Paper

Propose a Workshop

Propose a Mini Symposium

The Twelfth International Conference on Software Engineering Advances

ICSEA 2017
October 8 - 12, 2017 - Athens, Greece


Tutorials

T1. Advanced Architectures and Control Technologies in Internet of Vehicles
Prof. Dr. Eugen Borcoci, University "Politehnica"of Bucharest (UPB), Romania

T2. Experiences Teaching Simulation in a Business Analytics Academic Program
Prof. Edward Williams, University of Michigan - Dearborn, USA

T3. Building Decentralized Trust with Blockchains
Nikolaos Alexopoulos, Technische Universität Darmstadt, Germany

 

Detailed descrription

 

T1. Advanced Architectures and Control Technologies in Internet of Vehicles
Prof. Dr. Eugen Borcoci, University "Politehnica"of Bucharest (UPB), Romania

Prerequisites: general knowledge on IP networking architectures, protocols, introductory knowledge on VANET, 4G/5G, SDN, NFV and Cloud/Fog Computing.

Vehicular networks and services have been strongly developed in the last two decades, initially to meet the needs of traffic safety and efficiency applications. Specific communication technologies like Dedicated Short-Range Communications (DSRC), architectural stacks like Wireless Access in Vehicular Environments (WAVE), etc., have been developed in the framework of Intelligent Transport System (ITS).  Wireless technologies (WiFi, 3G/4G/5G) are usually deployed, combined with Vehicular Ad hoc Networks (VANET) infrastructures, in order to assure the necessary networking support.

Recently, many other novel advanced features, in a large range of infotainment applications are proposed, additionally being able to cooperate with other applications, in the general framework of Internet of Things (IoT).  The answer to these novel requirements seems to be the Internet of Vehicles (IoV), seen as a global network and considered as special case of IoT. The objectives of the IoV include vehicles driving (classic goal - in VANET), but also others -  like vehicle traffic management in urban or country areas, automobile production, repair and vehicle insurance, road infrastructure construction and repair, logistics and transportation, etc. The IoV will include many of the previous concepts and technologies of the ITS/VANETs.

The IoV is still in its early stage; therefore, many aspects are still open research issues, starting from concepts and architectures, control and management aspects, communication problems, security, etc., and  ending up with implementation and deployment issues.

In parallel, several advanced powerful technologies like Cloud/Fog computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been conceptually defined, then developed, standardized and implemented; they can be also considered as able to strongly support the IoV, by bringing  computation, storage, programmability and virtualization capabilities. However their functional harmonization in IoV raises several challenges, from conceptual, architectural and design point of view. Some recent solutions proposed to solve these problems are surveyed in this tutorial, with focus on control and management aspects.

 

T2. Experiences Teaching Simulation in a Business Analytics Academic Program
Prof. Edward Williams, University of Michigan - Dearborn, USA

This presentation will describe experiences and recommendations resulting from Mr. Williams’s experience in teaching simulation, at the master’s level, in a Business Analytics program within the College of Business, University of Michigan – Dearborn.  The following will be covered:

    • Overview of the Business Analytics program.
    • Description of the students typically enrolled in the program, and their academic backgrounds.
    • Outline of the course taught.
    • Similarities and differences of this teaching experience, compared with analogous courses in a program of Industrial Engineering.
    • Software tools used in the course, and the reasoning beyond choice of these tools.
    • Conclusion, questions, and discussion.

     

    T3. Building Decentralized Trust with Blockchains
    Nikolaos Alexopoulos, Technische Universität Darmstadt, Germany

    Building trust in the context of the digital world in one of the most important; yet, there are elusive goals. Manifestations of trust management systems are ubiquitous in digital interactions, ranging from the authentication of people and websites (e.g., X.509 certificate system), assessing the reputation of sellers in online marketplaces, or assessing the trustworthiness of devices. On the other hand, Blockchain technology, as introduced with Bitcoin in 2008, has opened a lot of interesting possibilities in the path towards decentralized and secure trust management systems. Blockchains offer secure distributed ledgers, where participants can agree on the data to be included on the ledger. This process of agreement is known in literature as consensus. A  variety of different consensus implementations have been proposed in recent years, including Proof of Work (PoW), Proof of Space, Proof of Stake (PoS), Proof of Elapsed Time and variations thereof. Systems managing trust can make use of such a secure shared ledger to build trust in a decentralized manner without the need for trusted third parties, therefore offering increased security guarantees.

    In this tutorial, we will acquaint ourselves with how Blockchains work and explore the different ways they are implemented. Then, we will make a case for the benefits of using distributed ledgers in trust management systems to achieve transparency, security and decentralization. As a next step, we will focus on specific use cases of collaborative systems that use Blockchains to build trust among participants, explaining their objectives, their design, and the difficulties facing them. We will mainly focus on two diverse use cases, namely the authentication of people in digital environments and the collaboration between intrusion detection nodes in collaborative threat sharing infrastructures. Finally, we will conclude the tutorial by exploring some open questions in the field and how they can be approached.

 
 

Copyright (c) 2006-2016, IARIA