There will be four sets of lectures by the following distinguished lecturers:
- Ricardo Baeza-Yates, Yahoo! Research and Dept. of Computer Science, Universidad de Chile
- Filippo Menczer, Indiana University School of Informatics
- Arend Rensink, University of Twente, Netherlands
- Algirdas Avižienis, Vytautas Magnus University, Kaunas, Lithuania and University of California, Los Angeles, USA
- Nordic Network on DEpendable Systems (NODES) -- Tutorial on Dependability
• Ricardo Baeza-Yates is a renowned scientist in the area of web search and data mining. He has a solid background in the fields of information retrieval and algorithms and data structures. As he is an active scientist being the director of the Yahoo! Research and a researcher at the University of Chile, his energy and knowledge is expected to inspire the participants in addition to providing them with knowledge about the field of web search.
Web Mining or The Wisdom of the Crowds
The Web continues to grow and evolve very fast, changing our daily lifes. This activity represents the collaborative work of the millions of institutions and people that contribute content to the Web as well as the one billion people that use it. In this ocean of hyperlinked data there is explicit and implicit information and knowledge. Web Mining is the task of analyzing this data and extracting information and knowledge for many different purposes. The data comes in three main flavors: content (text, images, etc.), structure (hyperlinks) and usage (navigation, queries, etc.), implying different techniques such as text, graph or log mining. Each case reflects the wisdom of some group of people that can be used to make the Web better. For example, user generated tags in Web 2.0 sites. In this talk we walk through this process and give specific examples.
• Professor Filippo Menczer from Inidiana University School of Informatics is a leading scientist in the field of web, text and data mining and machine learning. His work includes use of the analytical and modeling tools of complex systems to attack the problems in search, information management, internet security and other fields.
The Web as a Social Environment
The Web is increasingly becoming a social place -- where we carry out many of our social interactions, and where we leverage social relationship to build more useful tools. We will discuss the social Web from three different perspectives: (1) the role of search engines, and their socially-induced ranking algorithms, in controlling our access to information and in shaping the evolution of the Web; (2) the dynamics of online popularity, as shaped by links and traffic; and (3) the construction of intelligent, adaptive, social agents to help us manage the Web through collaborative search, annotation, recommendation, and navigation.
• Professor Arend Rensink from the University of Twente is an exceptional scientist in the field of formal methods and tools. He in involved in various research projects, like embedded systems testing, aspect-oriented software development, but this time he will give a series of lectures on the topic of using graphs in various ways, like for object-oriented verification and software language definitions.
Graph Transformation for Specification and Verification
Graph transformation is a formal method that provides a powerful, yet intuitive way to specify the operational dynamics of systems - in particular software systems. In this course we explain the basic principles of graph transformation, and we show how this type of specification can subsequently be used to analyse and (partially) verify systems. The course is accompanied by some of exercises that can be done with a graph transformation tool, called GROOVE, designed particularly for this purpose.
Many systems naturally lend themselves to being specified in a graphical manner. A state (or snapshot) of such a system is then represented by a graph, composed of nodes that stand for the concepts or components of the system, and edges that stand for the relation between those components. This is in particular true of software systems, where the graph representation is very close to the abstractions typically used to design and understand the system, such as components, objects and methods.
Given such a representation, it is only a small step to also specify the /evolution/ of a system in terms of modifications to the snapshots. Such modifications can be captured in so-called /graph transformation rules/. A collection of rules, which together embody all evolutionary possibilities, is called a graph production system; together with the graph that represents the initial system state, it constitutes a formal model of the system's behaviour.
On the basis of a graph production system we can analyse the behaviour by applying techniques from explicit state model checking. Essentially, by exploring the possible rule applications we obtain the full state space of the system, which we can check for the violation of safety or liveness properties.
In the three lectures of this course, we will explain some of the formal background to graph transformation, and thereafter focus on the use of this for the specification and verification of systems. The planned time table is:
Lecture 1: Introduction - Basic principles of graph transformation - From graph production systems to transition systems
Exercise 1: Modelling some simple games and puzzles
Lecture 2: Operational semantics - Programs as graphs - Behaviour as graph transformations
Exercise 2: Modelling a small language
Lecture 3: Verification - Basic principles of model checking - Application to graph production systems
• Professor Algirdas Antanas Avižienis is a renowned scientist from Lithuania who has returned to Lithuania after being an active researcher in the US in the field of self testing and repairing computer STAR. His lectures will be based on his experience in building dependable systems.
Lectures: Fundamental Concepts of Dependability and Secure Computing and Architectures of Fault-Tolerant Systems
• Tutorial on Dependability
NODES (Network On DEpendable Systems) is a research and education network based in the Nordic countries, whose aim is to promote the discipline of dependability in the region. The tutorial on Dependability will underline the main concerns and tactics in this field, namely: safety-critical systems (Simin Nadjm-Tehrani), risk assessment in security-critical systems (Heidi Dahl), precise specification methods (Kaisa Sere), Model-based testing (Jüri Vain), model-driven development of fault-tolerant systems (Elena Troubitsyna), Critical infrastructures (Simin Nadjm-Tehrani), System Security (Christian Jensen) and Security in Open Distributed Computing (Christian Jensen).