25th IEEE

International Performance Computing and Communications Conference



IPCCC 2006 - April 10 - 12, 2006 - Phoenix, Arizona

Hilton Phoenix East, Mesa, Arizona, USA

Home General Information Contact and Committee Information Author's Information Program at a Glance Registration
   

Keynote Speakers

Monday

Roy Want, "The Cell Phone and the Future of Mobile Computing"

Abstract: In the last 10 years we have seen cell phones evolve from the most basic of communication devices to smart phones, providing processing capabilities that blur with traditional PDAs. While these devices only have the performance of an office PC in the early 1990's, they are running at much lower power and with modern operating systems, such as WinCE or Embedded Linux. As a result cell-phones can support sophisticated applications that are being created by a large, mature developer community.

The trend is clear; smart phones already have most of the processing capability to support the needs of basic office applications. In another 5 years they may rival more sophisticated capabilities currently only available on notebook computers. Furthermore, these devices are small enough to drop into a pocket, providing mobile users with 'anytime access', and represent a truly ubiquitous computing technology (cell-phone global sales in 2005 were 800M+ units). The only real limitation for this platform is the small size of the cell-phone display and keyboard, which prevent users from effectively creating and viewing office documents, such as MSWord and PowerPoint files. However, even this limitation can be mitigated by using short-range wireless technologies to connect to displays and computers in the locality e.g. walk up to a desktop computer, connect to your cell phone wirelessly, and start using the desktop as if it were your own computer. Intel's Personal Server project is a practical example of this scenario.

This presentation will show how the notebook platform is steadily being undermined by the capability of the smart phone, and how this is an opportunity for new products that use low-power Intel Architecture processors and Ultra-Wide-Band (UWB) radios.

Speaker Bio: Roy Want is a Principal Engineer at Intel Research in Santa Clara, California, and leader of the Ubiquity Strategic Research Project (SRP). His interests include proactive computing, ubiquitous computing, wireless protocols, hardware design, embedded systems, distributed systems, automatic identification and micro-electromechanical systems (MEMS). Want received his BA in computer science from Churchill College, Cambridge University, UK in 1983 and continued research at Cambridge into reliable distributed multimedia-systems. He earned a PhD in 1988. While at Olivetti Research (1988-91) he developed the Active Badge, a system for automatically locating people in a building. He joined Xerox PARC's Ubiquitous Computing program in 1991 and lead a project called PARCTab, one of the first context-aware computer systems. At PARC Want managed the Embedded Systems area and earned the title of Principal Scientist. He joined Intel Research in 2000. Want is also the author, or co-author, of more than 50 publications in the area of mobile and distributed systems; and has over 50 patents issued in these areas. Want is very involved in the research community through program committees and invited talks. He is a fellow of both the IEEE and ACM.

Readers may contact Want at Intel Corporation, 2200 Mission College Blvd, Santa Clara, CA 95052, USA, e-mail roy.want@intel.com

Web: http://www.speakeasy.org/~roywant/cs/

Tuesday

Ahmed E. Kamal, "The Future of Traffic Grooming in Optical Communication Networks"

Abstract: Optical networks employing Wavelength Division Multiplexing (WDM) provide transmission rates on the order of tens of Gigabits/s rates per channel, for an aggregate of several Terabits/s per fiber. However, most application data rates fall much shorter than the transmission rates available per channel. It is therefore economical and natural to use a lightpath to concurrently support multiple communication sessions. The process of allocating subwavelength traffic demands on lightpaths such that the resources are shared is known as traffic grooming.

In this talk we formally define the traffic grooming problem, and inspect progress in this area. Recent advances in SONET technology, which resulted in second and more recently third generation SONET, and the introduction of the Automatically Switched Optical Network (ASON) and their impact on traffic grooming will then be discussed. The characteristics of traffic generated by emerging applications will also be described, and the implication of all of this will have on traffic grooming in future networks will also be highlighted. The talk will will present a number of emerging research directions in this field, and will present a list of several open research issues.

Speaker Bio: Ahmed E. Kamal received a B.Sc. (distinction with honors) and an M.Sc. both from Cairo University, Egypt, and an M.A.Sc. and a Ph.D. both from the University of Toronto, Canada, all in Electrical Engineering in 1978, 1980, 1982 and 1986, respectively. He is currently a professor of Electrical and Computer Engineering at Iowa State University. Earlier he held faculty positions in the Department of Computing Science at the University of Alberta, Canada, and the Department of Computer Engineering at Kuwait University, Kuwait. He was also an adjunct professor at the Telecommunications Research Labs, Edmonton, Alberta.

Kamal's research interests include high-performance networks, optical networks, wireless and sensor networks and performance evaluation. He is a senior member of the IEEE, a member of the Association of Computing Machinery, and a registered professional engineer. He was the co-recipient of the 1993 IEE Hartree Premium for papers published in Computers and Control in IEE Proceedings for his paper entilted Study of the Behaviour of Hubnet. He served on the technical program committees of numerous conferences and workshops, was the organizer and co-chair of the first and second Workshops on Traffic Grooming in 2004 and 2005, respectively, is the co-chair of the Technical Program Committees of the Optical Symposium of Broadnets 2006, and the Communications Networks and Services (CNSR) 2006 conferences. He is an area editor of the Computer Networks journal

WIA

Dr. Carl E. Landwehr

Abstract: Our systems are under daily attack, and many of these attacks succeed. This talk will describe some of the reasons why things are the way they are and how they might be different. New research thrusts on Accountable Information Flow and Large Scale System Defense will be presented.

Speaker Bio: Carl Landwehr is Program Manager for Information Assurance Research at the Advanced Research and Development Activity (soon to be Disruptive Technology Office, under the Director of National Intelligence). He is on assignment from his position as Senior Research Scientist at the University of Maryland's Institute for Systems Research. He recently completed an assignment of almost four years with the National Science Foundation as coordinator of the Cyber Trust theme in the Computer and Information Science and Engineering Directorate, which funded more than 100 research projects in the general area of cyber security with a total value of over $75M. Prior to this, he was the initial Program Director for the Trusted Computing program at NSF, while serving as Senior Fellow at Mitretek Systems. At Mitretek he led support for several DARPA programs in Information Assurance and Survivability. For many years, he headed the Computer Security Section of the Center for High Assurance Computer Systems at the Naval Research Laboratory, where he led a variety of research projects to advance technologies of computer security and high-assurance systems.

He was the founding chair of IFIP WG 11.3 (Database and Application Security) and is also a member of IFIP WG 10.4 (Dependability and Fault Tolerance). Dr. Landwehr has received Best Paper awards from the IEEE Symposium on Security and Privacy and the Computer Security Applications Conference. IFIP has awarded him its Silver Core, and the IEEE Computer Society has awarded him its Golden Core. He has also served on the computer science faculty at Purdue University, and he has taught courses on topics in computer science and information security at Georgetown, the University of Maryland, and Virginia Tech.

His research interests span many aspects of trustworthy computing, including high assurance software development, understanding software flaws and vulnerabilities, token-based authentication, system evaluation and certification methods, multilevel security, and architectures for intrusion tolerant systems. For more information: http://www.isr.umd.edu/ISR/faculty/FacultyBios/Landwehr_bio.html

Webpages from previous conferences:
IPCCC 1998 IPCCC 1999 IPCCC 2000 IPCCC 2001 IPCCC 2002 IPCCC 2003 IPCCC 2004 IPCCC 2005

For questions, suggestions, or problems with the IPCCC website, please email the webmaster.