Chomp

In 2008, I attended a conference in Athens, the 4th Conference on Computability in Europe (CiE), where my student Craig Wilson and I presented a paper that was fun to write, as it examined the algorithmic complexity of a strategy game called Chomp.

Chomp is a two-player strategy game played on a rectangular grid made up of smaller square cells, which can be thought of as the blocks of a chocolate bar. The players take it in turns to choose one block and “eat it” (remove from the board), together with those that are below it and to its right. The top left block is “poisoned” and the player who eats this loses.

This fun paper, turned out to be one of my most cited works, and how the Wikipedia page dedicated to chomp cites it in its references: Chomp – Wikipedia

The paper itself was first published in the conference proceedings, and then in the journal Theory of Computing Systems, 48(3):680-692, 2011:

Keynote speaker at KES2022

I am excited to join a list of distinguished keynote speakers at KES2022!

My abstract: In this talk we are going to examine Data Analytics in the Cloud. In particular, we will demonstrate the data flow for Analytics and Machine Learning, starting with sourcing data (structured, semi-structured and unstructured), pipelining it in both batch mode and streaming, storing it in a Data Lake, and finally making it available to Machine Learning and Business Intelligence. We will illustrate this complex engineering process with examples from Amazon Web Services (AWS).

More information.

Cloudifying the Curriculum with AWS

My paper, Cloudifying the Curriculum with AWS, was presented at Frontiers in Engineering (FiE) 2021, in Lincoln, Nebraska, October 14, 2021.

Abstract: This is an Innovate Practice Full Paper. The Cloud has become a principal paradigm of computing in the last ten years, and Computer Science curricula must be updated to reflect that reality. This paper examines simple ways to accomplish curriculum cloudification using Amazon Web Services (AWS), for Computer Science and other disciplines such as Business, Communication and Mathematics.

This paper is an expanded version of a technical report (see here). In particular, it contains material related to teaching Machine Learning (see here).

At the same conference, FiE 2021, I was also part of a panel with Joshua C. Nwokeji, Myra Roldan, and Terry Holmes, on A Hands-on Approach to Cloudifying Curriculum in Computing and Engineering Education.

Abstract: The term cloud computing is used to describe a pool of configurable virtualized computing resources (databases, software, storage, network, servers, etc.) delivered as a service via the Internet. The demand for cloud computing professionals continues to increase, yet academic institutions make little effort to integrate cloud computing into the computing curriculum. Lack of cloud computing resources has been identified as a major hindrance to teaching and learning cloud computing in higher education. This workshop aims to explore resources that could help computing educators teach cloud computing to students. Through hands-on activities, participants will learn about the various resources, tools, and technologies that are freely available for teaching and learning cloud computing.

CI master students’ research accepted at the KES2020 international conference in Verona

KES 2020 in Verona but virtual

CSUCI Master of Computer Science students were successful in submitting two papers to KES 2020, the 24rd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, which this year is taking place in Verona, Italy, in September 2020. However, due to the COVID pandemic, the conference will be held virtually. The papers are the following:

  • Malware Persistence Mechanisms, co-authored by Zane Gittins and Michael Soltys. Zane Gittins is a masters student in Computer Science at CSUCI, and this paper is the result of his masters thesis. Zane Gittins has worked as a Cybersecurity experts at HAAS, and currently is working at Meissner Filtration. (This paper will be presented in the General Track session G3b: Cybersecurity.)
  • Voyager: Tracking with a Click, co-authored by Samuel Decanio, Kimo Hildreth and Michael Soltys. Sam Decanio is a masters student in Computer Science at CSUCI, and this paper is the result of his masters thesis and a fruitful collaboration between Computer Science at CI and the SoCal High Technology Task Force. Sam Decanio is currently working at the Navy. (This paper will be presented in the General Track session G3b: Cybersecurity.)

IEEE Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS) 2021 conference

May 17 – 19, 2021, McMaster University, Hamilton, ON, CANADA

IEEE RDAAPS is the first annual international conference on research in the broadly defined area of data analytics. It brings together researchers from academia, industry, and the public sector to present and discuss various aspects of data analytics, including privacy, security, and automation. This venue is meant to bring together stakeholders whose interests lie at the interface of these concerns, providing a platform for integrating the needs of industry with state-of-the-art scientific advancements, and inspiring original research on solving enterprise data challenges. IEEE RDAAPS seeks papers presenting original research in the areas including, but not limited to:

Big Data Analytics for Decision Making

  • New models and algorithms for data analytics
  • Scalable data analytics
  • Optimization methods in data analytics
  • Theoretical analysis of data systems
  • Analytical reasoning systems
  • Decision making under uncertainty
  • Learning systems for data analytics
  • Large-scale text, speech, image, or graph processing systems

Accountable Data Analytics

  • Privacy-aware data analytics
  • Fairness in data analytics
  • Interpretable and transparent data analytics
  • Data analytics incorporating legal and ethical factors

Strings in Data Analytics

  • Patterns in Big Data
  • Data compression
  • Bioinformatics
  • Algorithms and data structures for string processing
  • Useful data structures for Big Data
  • Data structures residing on secondary storage

Security in Data Analysis

  • Traceability of decision making
  • Models for forecasting cyber-attacks and measuring impact
  • Data usage in mounting security threats
  • Data analytics for better situational awareness

Domain knowledge modelling and generation

  • Novel ontology representations
  • Scalability of domain-based reasoning on big data
  • Modelling and analyzing unstructured data sets

Automation for data analytics, security, and privacy in manufacturing

  • Application of data analysis in manufacturing
  • Big data in Industry 4.0
  • Privacy and security in manufacturing

Challenges of automation of data analytic processes

  • Case studies of the automation of data analytics processes
  • Architecture for data analytics and security
  • Built-in privacy and security in data analytics automation

Submission instructions:

Successful papers will address real research challenges through analysis, design, measurement, and deployment of data systems. The program committee will evaluate each paper using metrics that are appropriate for the topic area. All submissions must describe original ideas, not published or currently under review for another conference or journal.

Submissions must follow the formatting guidelines of IEEE proceedings, and be submitted electronically as a PDF file through EasyChair.  Submissions not adhering to the specified format and length may be rejected immediately.

The submitted papers can include up to 8 pages in IEEE format, including references, appendices, and figures.

Publication:

All accepted papers will be published in the IEEE conference proceeding.

Important dates:

  • Deadline for full paper submission: December 21st, 2020
  • Notification to authors: February 22nd, 2021
  • Deadline for camera ready version: March 15th, 2021

KES 2020 – 24th International Conference on Knowledge Based and Intelligent information and Engineering Systems

KES-202024th  International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES2020) |  16th  –  18th  September 2020  |   Verona, Italyhttp://kes2020.kesinternational.org/index.php

We are pleased to invite contributions for KES2020 taking place in Verona, Italy organised by KES International, in conjunction with the University of Verona.

Continue reading “KES 2020 – 24th International Conference on Knowledge Based and Intelligent information and Engineering Systems”

RDAAPS first annual international conference on research in the broadly defined area of data analytics

Call for papersReconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS) 2020 conference
http://rdaaps.com/conferences/rdaaps20/
July 15 – 17, 2020, McMaster University, Hamilton, ON, CANADA
RDAAPS is the first annual international conference on research in the broadly defined area of data analytics. It brings together researchers from academia, industry, and the public sector to present and discuss various aspects of data analytics, including privacy, security, and automation. This venue is meant to bring together stakeholders whose interests lie at the interface of these concerns, providing a platform for integrating the needs of industry with state-of-the-art scientific advancements, and inspiring original research on solving enterprise data challenges. RDAAPS seeks papers presenting original research in the areas including, but not limited to:
Big Data Analytics for Decision Making– New models and algorithms for data analytics- Scalable data analytics- Optimization methods in data analytics- Theoretical analysis of data systems- Analytical reasoning systems- Decision making under uncertainty- Learning systems for data analytics- Large-scale text, speech, image, or graph processing systems
Accountable Data Analytics– Privacy-aware data analytics- Fairness in data analytics- Interpretable and transparent data analytics- Data analytics incorporating legal and ethical factors
Strings in Data Analytics– Patterns in Big Data- Data compression- Bioinformatics- Algorithms and data structures for string processing- Useful data structures for Big Data- Data structures residing on secondary storage
Security in Data Analysis– Traceability of decision making- Models for forecasting cyber-attacks and measuring impact- Data usage in mounting security threats- Data analytics for better situational awareness
Domain knowledge modelling and generation– Novel ontology representations- Scalability of domain-based reasoning on big data- Modelling and analyzing unstructured data sets
Automation for data analytics, security, and privacy in manufacturing– Application of data analysis in manufacturing- Big data in Industry 4.0- Privacy and security in manufacturing
Challenges of automation of data analytic processes– Case studies of the automation of data analytics processes- Architecture for data analytics and security- Built-in privacy and security in data analytics automation
Submission instructions:Successful papers will address real research challenges through analysis, design, measurement, and deployment of data systems. The program committee will evaluate each paper using metrics that are appropriate for the topic area. All submissions must describe original ideas, not published or currently under review for another conference or journal. 
Submissions must follow the formatting guidelines of IEEE proceedings, and be submitted electronically as a PDF file through the EasyChair author interface for the RDAAPS conference (link to follow soon). Submissions not adhering to the specified format and length may be rejected immediately.
The submitted papers can include up to 8 pages in IEEE format, including references, appendices, and figures. Publication:All accepted papers will be published in the IEEE conference proceeding.

Important dates:– Deadline for abstract submission: March 23rd, 2020- Deadline for full paper submission: March 29th, 2020- Notification to authors: May 15th, 2020- Deadline for camera ready version: June 7th, 2020
We look forward to receiving your submissions!
Best regards,
General ChairsM. Jamal Deen, McMaster UniversityRidha Khedri, McMaster University
Steering CommitteeRidha Khedri, McMaster UniversityWendy MacCaull, St. Francis Xavier UniversityMike Grainge, Adlib Software, Vice President Product EngineeringNeerja Mhaskar, McMaster University
Organizing CommitteeRidha Khedri, McMaster University, Local OrganizerNeerja Mhaskar, McMaster University, Local OrganizerAndrew LeClair, McMaster University, PublicistAlicia Marinache, McMaster University, TreasurerHassan Ashtiani, McMaster University, Publication Co-ChairWenbo He, McMaster University, Publication Co-ChairMike Grainge, Adlib Software, Industrial Liaison
Program Committee ChairsArash Habibi Lashkari, University of New BrunswickRidha Khedri, McMaster UniversityNeerja Mhaskar, McMaster University
Program Committee Members (Current confirmed list)Ken Barker, University of CalgarySolon Pissis, Centrum Wiskunde & Informatica (CWI)Wing-Kin Sung, National University of SingaporeAndrew Malton, Blackberry Ltd.Dan Feng, Beijing University of Posts and TelecommunicationsWendy MacCaull, St. Francis Xavier UniversityKamel Adi, Université du Québec en OutaouaisJian Li, Futurewei TechnologiesMaxime Crochemore, King’s College London and Université Paris-EstJason Jaskolka, Carleton UniversityClaude Baron, LAAS-CNRS, INSAFazle Rabbi, University of BergenYan Liu, Concordia UniversityWilliam F. Smyth, McMaster UniversityCostas Illiopoulos, King’s College LondonNoman Mohammed, University of ManitobaLaurence T. Yang, St. Francis Xavier UniversityHideo Bannai, Kyushu UniversityDon Adjeroh, West Virginia UniversityShunsuke Inenaga, Kyushu UniversityNadia Pisanti, Universita di PisaFei Chiang, McMaster UniversityWenbo He, McMaster UniversityHassan Ashtiani, McMaster UniversityJamal Deen, McMaster UniveristyMourad Debbabi, Concordia UniversityGiovanni Livraga, University of MilanMichael Soltys, California State University Channel Islands

AWS Educate workshop at CI

Today, Friday January 24, 2020, we are hosting an AWS Educate workshop on the CSU Channel Islands campus, on Cloudifyig the Curriculum. The workshop will be held in Broome Library (easily recognizable as the only modern building on campus – here is its location on the campus map: http://maps.csuci.edu/?id=502#!m/189826).

Once you are in Broome library, please go to the second floor, to room number 2330. We will be starting at 9:30am, and finishing at 3:30. We will be catering both a continental breakfast and a lunch at around 12:30pm.

The registered guests can pick up their parking passes from Placer Hall (see map below). With the passes the guests can park in any lot “A”.

AWS re:Invent, Las Vegas, 2019

I am attending my first AWS re:Invent conference, Las Vegas December 2-6, 2019.

The conference is enormous, with over 60,000 attendees who command most of the big resorts on the strip.

Yesterday I participated in a Security Certification Bootcamp (proper name AWS Certification Exam Readiness: Security – Specialty) and this morning I wrote the certification exam proper; three hours long, 65 questions, and I had 3 minutes to spare at the end. Let’s face it, the exam is hard, and requires studying. I was successful, but it required steady studying over the last 3 months. The AWS certification exams are challenging, but one does learn a lot. As an academic the hardness of the exams is a good thing as it says that this material has a legitimate role to play in academia, especially as we make it accessible to our students, and deploy it toward our research.

How did I prepare? In addition to reading the requisite white papers (such as Introduction to AWS Security Processes and AWS Best Practices for DDoS Resiliency), I was fortunate enough to have access to the Cloud Guru training in security. Their 10 to 15 minute lessons in all the topics are easy to absorb, and the summaries and quizzes are a good preparation for the exam.

I have been teaching Cybersecurity for over a decade, but the AWS security exam is not about foundations of Cybersecurity — it is about how to use AWS tools in order to achieve security objectives; this kind of knowledge arises not from learning principles or cryptography (although that does help too!), but rather from in-depth familiarity with AWS tools, such as CloudTrail, Inspector, Macie, Athena, CloudWatch, KMS, and many many others. My plan now is to incorporate this knowledge into our CI class in Cybersecurity, COMP 524, so that students will have knowledge of fundamentals as well as an understanding of security in the (relatively new) paradigm of cloud computing. COMP 524 students will have the additional benefit of covering the content of the certification

I should also say that even though foundational knowledge such as cryptography is not tested directly, it is nevertheless helpful. For example, a good portion of the exam relates to keys, specifically AWS KMS. It is much easier to remember when symmetric keys are used (e.g., S3 encryption with AES256) rather than asymmetric keys (i.e., public keys, e.g., key pairs to SSH into EC2) when one actually understand the difference between the two. Or, for example, why hashing of encrypted logs in S3 can help with data integrity measures for backups.

The Bootcamp that I took the day before was perhaps the least helpful toward success in the exam. I would suggest to take the bootcamp at the beginning of your studies toward passing the certification exam, as a quick bird-eye overview of what needs to be mastered. I sat through the bootcamp listening to what I knew already, without the possibility of going more in depth (we had 4 hours total), and without the audience being able to ask questions, as the instructor was rushing to cover the material.

Quick Tip: AWS is uncanny in its rolling out of new tools and features, most really captivating and useful. However, keep in mind that a tool or feature that is younger than 6 months will likely not make it to the exam. As I understand, the exam process is too exacting to be done quickly, and hence it take some time before new material is incorporated.

KES 2020

Excited about KES 2020, which is going to take place in Verona, Italy, September 16-18, 2020.

From the conference’s web site: The conference will be held across the Beautiful University Pole Santa Marta Campus only 1km from the historical centre of Verona. Verona is a city in northern Italy’s Veneto region, with a medieval old town built between the meandering Adige River. It’s famous for being the setting of Shakespeare’s “Romeo and Juliet”. A 14th-century residence with a tiny balcony overlooking a courtyard is said to “Juliet’s House”.

For more information visit: http://kes2020.kesinternational.org/