Kickoff meeting 15 September 2015 Eindhoven. Agenda kick-off meeting Big Software on the Run, September 15 14.00 h, welcome, all participants introduce.

Slides:



Advertisements
Verwante presentaties
Soft Systems Methodology Een doelbewuste aanpak voor action research
Advertisements

Beyond Big Grid – Amsterdam 26 september 2012 Enquette 77 ingevulde enquettes, waarvan 60 met gebruikservaring = Mainly Computer Science.
User Centred Development
July 28, BSR: Big Software on the Run Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology The Netherlands TU.
Rogier van der Linde & Davy De Winne, 2014
Deltion College Engels B1 Gesprekken voeren [Edu/006] thema: Look, it says ‘No smoking’… can-do : kan minder routinematige zaken regelen © Anne Beeker.
Deltion College Engels B2 Schrijven [Edu/006] thema: Euromail can-do : kan in persoonlijke s nieuws en standpunten van een ander becommentariëren.
Deltion College Engels C1 Spreken/Presentaties [Edu/004] thema ‘Today I will talk to you about… ‘ can-do : kan duidelijke, gedetailleerde beschrijving.
Deltion College Engels C1 Spreken [Edu/002] thema: A book that deserves to be read can-do : kan duidelijke, gedetailleerde samenvatting geven van een gelezen.
Deltion College Engels B1 En Spreken/Presentaties [Edu/006] Thema: “The radio station“ can-do : kan een publiek toespreken, kan verzonnen gebeurtenissen.
Deltion College Engels C1 Schrijven [Edu/007] thema: Mind twister or how to write an essay… can-do : kan heldere, goed gestructureerde uiteenzetting schrijven.
Nothing Is As It Seems Lesson 7 What’s the Story?.
Deltion College Engels B2 Lezen [Edu/003] thema: Topical News Lessons: The Onestop Magazine can-do: kan artikelen en rapporten begrijpen die gaan over.
Deltion College Engels B2 Spreken [Edu/001] thema: What’s in the news? can-do : kan verslag doen van een gebeurtenis en daarbij meningen met argumenten.
Deltion College Engels B2 En Spreken/Presentaties [Edu/005] Thema: What you see here, is… Can-do : kan duidelijke, samenhangende verhalen vertellen © Anne.
Deltion College Engels B1 Spreken [Edu/001] thema: song texts can-do : kan een onderwerp dat mij interesseert op een redelijk vlotte manier beschrijven.
Deltion College Engels C1 Gesprekken voeren [Edu/001]/ subvaardigheid lezen thema: What a blooper…. can-do : kan taal flexibel en effectief gebruiken voor.
Informatiesystemen in de Bouw 7M711 Joran Jessurun en Jos van Leeuwen Week 1.
Deltion College Engels B2 Schrijven [Edu/005] thema: Writing a hand-out can-do: kan een begrijpelijke samenvatting schrijven © Anne Beeker Alle rechten.
Deltion College Engels B1 Lezen [Edu/002] thema: But I ‘ve read it in… can-do : kan hoofdthema en belangrijkste argumenten begrijpen van eenvoudige teksten.
Nederlandse Organisatie voor Wetenschappelijk Onderzoek i-science IsFast Prof. dr. Henk Sips Program committee chairman.
Didactisch materiaal bij de cursus Academiejaar Tel: 09/ Fax: 09/
Nederlandse Organisatie voor Wetenschappelijk Onderzoek Semantic Web and Library Applications Workshop Presented by Luit Gazendam.
Beeldverwerking Prof. dr. ir. W. Philips Didactisch materiaal bij de cursus Academiejaar
Deltion College Engels B2 (telefoon)gesprekken voeren[Edu/002] /subvaardigheid lezen/schrijven thema: I am so sorry for you… can-do : kan medeleven betuigen.
Telecommunicatie en Informatieverwerking UNIVERSITEIT GENT Didactisch materiaal bij de cursus Academiejaar
Kom, ga met ons mee Come, go with us. ‘Wij vertrekken nu naar het land dat de Heer ons beloofd heeft. Ga met ons mee! Je zult het goed hebben bij ons.
Creating local Europeana related networks Europeana taskforce Hans van der Linden 17/4/15.
Minor Project- en Programmamanagement
2 december 2015, Privacy en de Digital Enterprise Vertrouwen in data.
EPALE Vlaanderen INFOSESSIE Europese subsidieprogramma’s 14 januari 2016 Brugge Boeverbos With the support of the Erasmus+ Programme of the European Union.
EPALE Vlaanderen INFOSESSIE Europese subsidieprogramma’s 27 oktober 2015 Gent With the support of the Erasmus+ Programme of the European Union.
OpleidingsCentrum voor Bowlers Clinic Appingedam KISS.
PAST CONTINUOUS TWAN FRIELING MARIJE VAN DEN HONDEL ANISHA DE VRIES.
Digital Data Conservation Joeri Both BMI dag 31 mei 2016 NKI.
1 functie Presentation TEEB-stad tool The value of green infrastructure in cities Lian Merkx Platform31.
The Research Process: the first steps to start your reseach project. Graduation Preparation
Association between Advanced Glycation End products
DOELEN VAN W&T ONDERWIJS
Mylène Böhmer, Promovendus Marlies Valstar, AVG, PhD
Key Process Indicator Sonja de Bruin
Standaarden en spelregels voor de Slimme Stad
PILOT TOETSING PERIODE 2 LES 1: BEOORDELEN VAN GROEPSWERK
Presteren onder druk.
Evolutieleer Natuurwetenschappen.
Van Record & Playback naar CI/CD
Innovatie met IBM Cloud Orchestrator.
The Netherlands in Open Connection
Inhoudsopgave Fasering Product Clearing & Settlement
Sector, Firm Size and ICT investments
Processing Structured Hypermedia
Dictionary Skills!?.
Werkwijze Hoe zullen we als groep docenten te werk gaan?
Tool WB-1: Natuurwetenschappen in de beroepspraktijk
De taaltaak
Innovate-IT Enkele toepassingen
Just Science Done Right!
Wat betekent “OPEN” voor jou?
Introduction of second Rijkswaterstaat Pilot Asses further improvements of the HIJ barrier in relation to system of HIJ Welcome, my name is Pim Neefjes.
What is ProRail’s Life Cycle (cost) Management?
Utrecht Attractive and Accessible: Focus on the User
how to create an Optimal Classroom Experience
English 23 April 2018.
Rob Heyman and Ilse Mariën
Zuyd Lectoraat Employability Impact van technologie en digitalisering nieuwe competenties voor werknemers Dr. Jol Stoffers Erik Canisius MSc Rik Loffeld.
Who knows something about scenarioplanning?
A National Strategy for Public Libraries in the Netherlands
Leerlingen zeiden: “Je MOET hem loslaten
Moving Minds DNA.
Transcript van de presentatie:

Kickoff meeting 15 September 2015 Eindhoven

Agenda kick-off meeting Big Software on the Run, September h, welcome, all participants introduce themselves briefly; h, overview project (Wil) h, 10 minute presentation per PhD project (by the supervisors) h, data h, coffee/tea break h, collaboration a.industry contacts b.other researcher h, budget a.infrastructure b.workshops/symposia c.summer/winter schools h, planning a.next meeting BSoR, total group b.follow up meeting tracks c.vacancies

Aalst, W.M.P. van der Wijk, J.J. van Dongen, B.F. van Wetering, H.M.M. van de Liu, C. R. Arie van Deursen Sicco Verwer Zekeriya Erkin - EWI utwente.nl Leemans, M. Caroline de Wit Tamara Brusik

©Wil van der Aalst & TU/e (use only with permission & acknowledgements)

not-standalone interconnected distributed cloud Hadoop sensor multiple platforms many versions many configurations late composition updates apps hardware changes OS, network, etc. unanticipated use we rely on software in a hostile open world

BSR: Big Software on the Run

Software in its natural habitat!

€ 34,722,000 € 1,999,989 Jaco van de Pol & Marieke Huisman Arie van Deursen & Inald Lagendijk Wil van der Aalst & Jack van Wijk

6 PhDs + 3 postdocs

Cong LiuBart Postma Gamze Tillem Vincent Bloemen Arnd Hartmanns (UT)

Process MiningVisual AnalyticsSoftware EngineeringPrivacy and Security Verification and Validation Concurrent Software Automatically Discovering Behavioral Software Models from Software Event Data (part of Track T1) Van der Aalst & Van Deursen 1C2 C Model-based Visualization of Software Event Data (part of Track T1) Van Wijk & Huisman C1C C2 Exceptional Patterns (part of Tracks T1 and T4) Van Deursen & Van Wijk C21C Monitoring Concurrent Software (part of Tracks T1 and T2) Huisman & Lagendijk C 2C1 Privacy Preserving On- line Conformance Checking (part of Track T2) Lagendijk & Van de Pol C C12C Parallel Checking and Prediction (part of Tracks T2 and T3) Van de Pol & Van der Aalst 2CC 1

Automatically Discovering Behavioral Software Models from Software Event Data (part of Track T1) Van der Aalst & Van Deursen Process models and user interface workflows underlie the functional specification of almost every substantial software system. However, these are often left implicit or are not kept consistent with the actual software development. When the system is utilized, user interaction with the system can be recorded in event logs. After applying process mining methods to logs, we can derive process and user interface workflow models. These models provide insights regarding the real usage of the software and can enable usability improvements and software redesign. In this project, we aim to develop process discovery techniques specific for software. How can domain knowledge and software structure be exploited while mining? How to discover software patterns and anti-patterns? Model-based Visualization of Software Event Data (part of Track T1) Van Wijk & Huisman Visualization can be a powerful means for understanding large and complex data sets, such as the huge event streams produced by running software systems. During explorative analysis (T1) experts have to be enabled to see what patterns occur, during monitoring (T2) anomalous events and patterns have to be detected, where in both cases we can exploit the unique capabilities of the human visual system. However, simply showing events as a sequence of items will fall short because of lack of scalability. The challenge is to enable users to specify what they are interested in, and to show only a limited subset of the data, using filtering, aggregation, and abstraction. We propose to enable users to define models for this, ranging from simple range filters to process models. We will study which (combinations of) models are most appropriate here, such that occurrences of events, temporal and logical patterns, and the relations between occurrences and attributes of events can be detected, and to facilitate analysts to define and check hypotheses on patterns.

Exceptional Patterns (part of Tracks T1 and T4) Van Deursen & Van Wijk A particularly challenging phenomenon in software development are 'exceptions'. Most programming is focused on 'good weather behavior', in which the system works under normal circumstances. Actual deployment however, often takes place in a changing or unexpected environment. This may lead to exceptions being raised by the application, which should be handled by the application. Unfortunately, predicting such exceptional circumstances is often impossible. Consequently, developers have difficulty adequately handling such exceptions. Some exceptions are simply swallowed by the applications, others are properly logged, and yet other may lead to unpredictable behavior. To resolve this, we propose to analyze log files for 'exceptional patterns' -- patterns that hint at the presence of exceptions. To find such patterns, we propose to use visualization techniques applied to log data and stack traces. Furthermore, we will investigate ways to predict future occurrences of exceptions, and recommendations on how to improve exception handling in the code base. Monitoring Concurrent Software (part of Tracks T1 and T2) Huisman & Lagendijk The goal is to develop a monitoring system for concurrent software. Making monitoring transparent is the big challenge: monitoring should not affect program behavior. A general purpose approach will be designed, based on local annotations and global properties. Runtime monitoring is essential to check conformance of concurrent software during deployment (T2). At the same time, runtime monitoring provides insight in low-level software events, generating a continuous data stream of events that feeds discovery (T1). With process mining and visualization technology in Eindhoven, we will explore the scope of concurrent software monitoring.

Privacy Preserving On-line Conformance Checking (part of Track T2) Lagendijk & Van de Pol Privacy enhancing techniques have been applied dominantly to data analysis problems (such as pattern recognition) and multimedia algorithms (such as recommendation engines). The goal of privacy preserving on-line conformance checking is to research the problem of privacy and security protection in software engineering for the first time. The central problem is that conformance checking algorithms may need to operate on event data that is sensitive in some way, for instance, contains user- related information. Such data can be anonymized or encrypted for protection, yet this might affect the accuracy of the conformance checking procedure. It will therefore be necessary to find an acceptable trade-off between the level of protection, the utility of the results obtained from the privacy-enhanced version of the conformance checking algorithm, and the additional computational overhead introduced by the anonymization or encryption process. Parallel Checking and Prediction (part of Tracks T2 and T3) Van de Pol & Van der Aalst Based on the models discovered by online observations (Track 1), the goal of this research project is to develop scalable technology for predicting future system behavior (Track 3). Assuming that the system’s components will behave similar to the process models learnt so far, (quantitative) model checking techniques will be applied to explore possible runs and interactions of the integrated system. In order to support online recommendations (Track 4), the model checking results should be available nearly instantaneously. This calls for parallel, scalable algorithms that will be run on BSR.cloud infrastructure in Twente. Large scale distributed experiments will be run on DAS5.

Beste Eveline, Zoals vandaag telefonisch besproken. 1.In de word file stuur ik wat tekst (ook met dank aan Ine) voor het rapport (zie bijlage). 2.We gaan er vanuit dat (a) de onderstaande begroting leidend is, (b) dat wel geschoven mag worden met de aanstellingen (maar voor eind 2019 moeten aanstellingen afgelopen zijn), (c) de andere kosten moeten voor eind 2017 gemaakt zijn (de verdeling over de jaren is richtinggevend maar zeker niet hard, PhDs gaan dit jaar bijvoorbeeld waarschijnlijk niet naar conferenties en er zijn geen workshops, summerschools, etc.). 3.Je probeert dit formeel af te stemmen met IJsbrand Haagsma. Het is essentieel dat voor de kick-off meeting, “the rules of the game” helder zijn 4.De verdeling is zoals deze in onderstaande begroting staat. Universiteiten die een reserveringsbeleid volgen kunnen proberen reiskosten etc. voor 2018 en 2019 eerder te maken. Actiepunt voor elke universiteit afzonderlijk dit te implementeren indien mogelijk. Voor TU/e gaat Jacqueline den Braven dit onderzoeken. Ook afstemmen met Suwita van den Biggelaar 5.NIRICT gelden voor SRA Data Science zijn toegekend voor tweede helft van het jaar. Hier volgt nog een over. Groeten, Wil.