Waikato University crest

Department of
Computer Science
Tari Rorohiko

Computing and Mathematical Sciences

Recent Seminars

Events Index

Verification of user interface software: a case study in the medical domain

Dr Paolo Masci
Queen Mary University of London, UK
Tuesday 9 December 2014
An increasing number of medical devices have been recalled over the last decade because of software-related issues. In the USA, for example, a study conducted by software engineers at the US Food and Drug Administration (FDA) highlighted that software-related recalls had approximately doubled in just over five years: 14% in 2005 to nearly 25% in 2011. While it is usual to attribute software failures to coding errors, the largest class of problems is in fact due to incomplete or erroneous system requirements and specification. In this seminar, I will present the results of a study that involved the analysis of user interface software of over 20 commercial medical device models. The analysis was carried out using advanced formal (mathematical) verification techniques that allowed us to verify all software states against usability and safety requirements. Previously unnoticed critical defects were identified in all analysed device models. The identified defects could lead to use error such as missing decimal point errors during number entry that could lead to mis-configuration of device parameters and, ultimately, patient harm.

The presented work is supported by the US Food and Drug Administration (FDA) that regulates medical devices in the USA, and by the CHI+MED project (http://www.chi-med.ac.uk) with the aim of improving the safety of medical devices.

While this seminar focusses on medical devices, the presented analysis technique and results are in fact applicable to many other types of devices and software systems, including everyday gadgets such as mobile phones and calculators.

 

IITP-CROW Public Guest Lecture: Lessons learned from enterprise adoption of Cloud

Aloysius Cheang
Managing Director Asia Pacific, Cloud Security Alliance
Wednesday 19 November 2014
Cloud Computing has come a long way. Yesterday, it was just a vision, and for some it was just some marketing talk. Today, it can be found in every enterprises' IT portfolio and has become inseparable from many companies' business strategy. Tomorrow, it outlines the future that one can only think about in science fiction stories and movies. This presentation shares the experience of going to the cloud from the Cloud Security Alliance's enterprise members, who today are the largest fortune 500 firms that have firmly put cloud into their business strategy.

 

The Kukui Cup and Open Power Quality: creating smart consumers for the smart grid

Philip Johnson
University of Hawaii at Manoa, Honolulu
Tuesday 11 November 2014
The environmental, political, and economic problems with fossil fuels as an energy source have encouraged work on a next generation “smart” grid: an electrical infrastructure which can incorporate distributed, renewable energy generation sources such as solar and wind power. However, the smart grid cannot achieve its full potential without “smart” consumers: people who are literate about energy issues and who modify their behavior to support more efficient and effective energy generation, storage, and use. In this talk I describe two research initiatives to create “smart” consumers: the Kukui Cup and Open Power Quality.

The Kukui Cup Project (http://kukuicup.org) combines techniques from community-based social marketing, serious games, and educational pedagogy to investigate sustained change in energy-related behaviors. Kukui Cup challenges blend real world and online activities, all tied together through game mechanics. In the real world, players participate in workshops, excursions, and creative events. They compete to win prizes, and in the process, learn about their behavior and its impact on energy consumption. The online game environment allows players to earn points, achieve badges, increase their energy “literacy” through readings and videos, and use social networking mechanisms. I will discuss lessons learned from seven Kukui Cup challenges, and the open source software technologies created from this project.

Open Power Quality (http://openpowerquality.org) develops open source hardware, software, and data for low cost, crowd-sourced power quality monitoring, storage, and analysis. OPQ fills an important “data gap” in many current grids: the quality of power as experienced by end users. OPQ accomplishes this through custom-designed, low cost “OPQBoxes” that plug in to household electrical outlets, monitor power quality, and upload power quality “events” via WiFi to our OPQHub service. By crowd-sourcing the collection and analysis of power quality data, we hope to better understand the impact of distributed renewables on grid stability, distinguish grid-level problems from building-level problems, and increase consumer awareness of smart grid issues. I will discuss the current status of Open Power Quality and results from our recent pilot study with our first generation hardware and software.

Bio:
Philip Johnson is a Professor and Associate Chair in the Department of Information and Computer Sciences at the University of Hawaii. He received B.S. degrees in both Biology and Computer Science from the University of Michigan in 1980, and a Ph.D. in Computer Science from the University of Massachusetts in 1990. He is Director of the Collaborative Software Development Laboratory, which pursues research in software engineering, the smart grid, gamification, educational technologies, human-computer interaction, and computer supported cooperative work. Johnson is active in the Hawaii technology community, has co-founded two software startups, and has served on the Board of Directors of several technology companies. More details are available at: http://philipmjohnson.org.

 

IP Overview by WaikatoLink

Nigel Slaughter, Nidhie Kumar and Roz Hodgson
WaikatoLink
Wednesday 29 October 2014
Nigel, Nidhie and Roz from WaikatoLink will be providing a quick presentation introducing:

1. The difference between Public Domain, Copyright, Design Rights, Patents, Trademarks and Trade Secrets

2. Details of patents including:

  1. the protection it provides
  2. what's needed to get one
  3. who you can destroy your chances of getting a patent
  4. what's the process to get a patent in the university

3. The reward sharing scheme for IP focusing in particular on patents with some examples of the kind of money involved.

The presentation is open to anyone but places are limited in G1.15 so best to come early. Also, just to set expectations, you should note that the IP Policy details will not be discussed as WaikatoLink are not in charge of the IP Policy. Any questions on the IP Policy or its interpretation should be directed to the Deputy Vice Chancellor.

 

Helping overseas students improve their writing: the 590 experience

Shaoqun Wu
Department of Computer Science, The University of Waikato
Tuesday 28 October 2014
I have just completed a one-semester study that aimed to identify language problems experienced by international PGDip/MSc students in our Department, and help them improve their writing. Eleven Chinese students in COMP590 attended lectures on various aspects of English language. Language activities and text revision tasks were designed to illustrate these topics, and implemented within the FLAX language learning system (flax.nzdl.org ), that has been developed in this Department, for students to undertake. Surveys and interviews were used to test student language knowledge and collect feedback. This informal talk will walk through the process, discuss the challenges, and report the findings.

 

Towards Linked Data Enrichment using Open Information Extraction

Dr Amal Zouaq
Royal Military College of Canada, Ontario, Canada
Tuesday 21 October 2014
The Semantic Web and Linked Data movements aim at converting the Web unstructured and semi-structured content into a "web of data". The purpose is to help users (both human and software agents) to find, share, and combine information more easily and ultimately to enable large scale machine reasoning, using knowledge bases accessible on the Web. The last decade has witnessed the development of several knowledge bases such as DBPedia, Yago and Freebase. These knowledge bases are generally extracted from Web semi-structured content such as Wikipedia Infoboxes. By contrast, our work is mostly focused on the extraction of knowledge from unstructured textual content.

This talk will explore how open information extraction (a domain-independent and unsupervised knowledge extraction paradigm) can contribute to a) the extraction of structured content (entities, topics, relations) from free-text domain corpora and b) the enrichment of current Linked Data knowledge bases. In particular, we will focus on open relation extraction, which aims at linking (Web) entities with meaningful relations. Experiments and challenges around the quality of the extracted entities and relations and the measurement of such quality will be briefly discussed.

 

Behind the scenes: Mobile Apps

Rodney Macfarlane
MEA Mobile, Hamilton, NZ
Wednesday 16 July 2014
IMEA Mobile has offices in Hamilton, Auckland and Wellington, New Zealand as well as a US based office in New Haven, Connecticut. They provide a full service digital agency with the capability in-house to complete any digital or marketing communications project. Last year, MEA Mobile acquired the Hamilton creative agency, Verdict. More recently, they have acquired Wellington design firm, Vertigo.

Rodney Macfarlane has extensive commercial and technology management experience. His experience includes leading negotiations on international technology transactions valued at USD60M, the successful commercialization of a novel technology currently running on millions of devices, and the management of significant international intellectual property portfolios for multi-national clients.

 

Towards agile research

Mike Twidale
Graduate School of Library and Information Science, University of Illinois, USA
Tuesday 1 July 2014
Agile software development is a powerful and effective alternative to more carefully pre-planned software processes – especially in coping with novel contexts and those where the requirements keep on changing. That sounds a lot like certain research projects. The talk will explore questions such as: What might Agile Research look like? Where might it be particularly needed and effective? How might we go about designing agile research methods? Can we use a version of the Agile Manifesto to inform us? How might we design better ways to study things where more conventional approaches are too expensive, slow, or mess up what we want to study? Can teaching agile research help new research students to get started? What might an Agile University look like?

 

Simulated life and death increases learning opportunities?

Corey Schou
College of Business, Idaho State University, USA
Wednesday 18 June 2014
This presentation discusses the Cyber Defence Simulation developed and used as a teaching tool for future cyber security professional. The tool was developed to educated cyber security professionals to be a well-trained practitioners. It also help them understand how challenging it is to secure a system and defend against a persistent adversary.

Professor Corey D. Schou, Ph.D. is a frequent public speaker and an active researcher with over 300 books, papers, articles, and, other presentations. His interests include information assurance, software engineering, secure applications development, security and privacy, collaborative decision-making, and the impact of technology on organization structure.

He has been described in the press as the father of the knowledge base used world-wide to establish computer security and information assurance. He was responsible for compiling and editing computer security training standards for the United States Government.

In 2003 he was selected as the first University Professor at Idaho State University. He directs the Informatics Research Institute and the National Information Assurance Training and Education Center. His program was recognized by the United States Government as a Center of Academic Excellence in Information Assurance and is a leading institution in the CyberCorps/Scholarship for Service program.

In addition to his academic accomplishments, he holds a broad spectrum of certifications including CCFP - Certified Cyber Forensics Professional, CSSLP - Certified Secure Software Lifecycle Professional, HCISPP - HealthCare Information Security and Privacy Practitioner, CISSP®-ISSAP®: Information Systems Security Architecture Professional, and CISSP-ISSMP: Information Systems Security Management Professional.

Corey is currently in NZ and visiting the UoW Cyber Security Lab as a Fulbright Specialist.

 

Detection of Data Leakage

Ting Gao
Department of Computer Science, The University of Waikato, Hamilton
Tuesday 20 May 2014
The antivirus way of protecting our computers is not very effective, and recent research has shown that only approximately 40% of the malware can be detected by traditional antivirus software. On top of this, cyber criminals have become more professionally organised. New ways of defending our computer security needs to be proposed. Our research attempts to defend by detecting and prevent data leakages (both intentional and unintentional). This presentation will explain how this project works on defending end user’s data and some challenges encountered during its development.

Ting is an honours student in the department nearing the end of his COMP591 project, which he started in the B-semester of 2013. Due to the numbers involved, this talk is in lieu of participating in the honours day conference involving students in the A-B semester cycle of the course.

 

Events Index