125

Information about 125

Published on January 7, 2008

Author: Willi

Source: authorstream.com

Content

Pervasive software interoperability for the Operating Room of the Future:  Pervasive software interoperability for the Operating Room of the Future May 10, 2005 UMBC:  UMBC The University of Maryland Baltimore County One of the three research campuses in the University of Maryland System Ranked in top tier of nation's research universities--Doctoral/Research Universities-Extensive -- by the Carnegie Foundation Has 500 full time and 335 part time faculty, 10K undergraduate and 2K graduate students Located in suburban Baltimore County, between Baltimore and Washington DC. Special focus on science, engineering, information technology and public policy with ~$80M in external research funding in 2003 IT @ UMBC:  IT @ UMBC Information Technology has UMBC’s largest concentration of faculty & students Over 100 faculty and more than 2500 students College of Engineering and Information Technology Degree programs (graduate and undergraduate) Computer Science, Computer Engineering, Information Systems, Electrical Engineering, Digital Imaging, and Systems Engineering Certificate and training programs (degree and non-degree) Bioinformatics, Electronic Government, Information Security, Web Development, Systems Administration, Oracle, CISCO, … Many institutes and centers Center for Women and Information Technology, Center for Information Security and Assurance, Bioinformatics Research Center, Center for Photonics, … UMBC Ebiquity Research Group:  UMBC Ebiquity Research Group Intelligent Information Systems Networking & Systems Security AI DB semantic web mobility pervasive computing trust privacy assurance web services/SOC user modeling wireless data mining machine learning knowledge management KR intrusion detection context awareness policies IR wearable computing DRM HPCC Slide5:  Building intelligent systems in open, heterogeneous, dynamic, distributed environments Human Evolution?:  Human Evolution? Pervasive Computing:  Pervasive Computing “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it ” – Mark Weiser Think: writing, central heating, electric lighting, plumbing, telephones … Not: taking your laptop to the beach, sending SMS messages on your cell phone or immersing yourself into a virtual reality Today life is still simple:  Today life is still simple But it’s getting complicated!:  But it’s getting complicated! Coordination can be automatic:  Coordination can be automatic If systems become smarter:  If systems become smarter As complexity & expectations increase, software & hardware systems must evolve to be Self describing and self organizing Able to negotiate for the services and resources Context aware and capable of adjusting their behavior as appropriate Capable of adapting and learning Able to communicate naturally with people In the OR of the future, too:  In the OR of the future, too Trauma Pod ‘06 will have arms and eyes but no brain Trauma Pod ‘20 will need to be smarter and much more aware 2005: da Vinci Surgical Robot 2020: Automated Trauma Pod treats wounded soldiers on the battlefield. Three Key Enablers:  Three Key Enablers Semantic interoperability Greater context awareness and intelligence Agents driven by policies and workflow 1 2 3 How can we control such a system?:  How can we control such a system? As we evolve to a system of semi-autonomous components, control is an issue Self managing, self healing Norms of behavior can provide mechanisms for control (e.g. capture workflows, constraints, …) We need better ways of describing and using Policies which serve as norms of behavior Policies Govern Autonomous Systems:  Policies Govern Autonomous Systems 1 A robot may not injure a human being, or, through inaction, allow a human being to come to harm. 2 A robot must obey the orders given it by human beings except where such orders would conflict with the First Law. 3 A robot must protect its own existence as long as such protection does not conflict with the First or Second Law. - Handbook of Robotics, 56th Edition, 2058 A.D. It’s policies all the way down:  It’s policies all the way down In Asimov’s world, the robots couldn’t always follow their policies Unlike traditional “hard coded” rules like DB access control & OS file permissions We need policies about what happens when policies are not followed, … So, it’s natural to worry about … How entities governed by multiple policies can resolve conflicts among them How to deal with failure to follow policies – sanctions, reputation, trust, etc. Whether policy engineering will be any easier than software engineering 1 A robot may not injure a human being, or, through inaction, allow a human being to come to harm. 2 A robot must obey the orders given it by hu-man beings except where such orders would conflict with the First Law. 3 A robot must protect its own existence as long as such protection does not conflict with the First or Second Law. - Handbook of Robotics, 56th Edition, 2058 A.D. An EasyMeeting Scenario:  An EasyMeeting Scenario An EasyMeeting Scenario:  An EasyMeeting Scenario Enforcing Domain Policies:  Enforcing Domain Policies Slide25:  http://ebiquity.umbc.edu/ Slide26:  http://ebiquity.umbc.edu/

Related presentations


Other presentations created by Willi

363 3Explaining the Cold War
18. 12. 2007
0 views

363 3Explaining the Cold War

ebusiness primer
28. 09. 2007
0 views

ebusiness primer

Ethical Issues powerpoint
02. 10. 2007
0 views

Ethical Issues powerpoint

2 Teacher Sample PowerPoint
06. 11. 2007
0 views

2 Teacher Sample PowerPoint

cs10
01. 12. 2007
0 views

cs10

intro mediaComp 1
03. 12. 2007
0 views

intro mediaComp 1

headlines
02. 11. 2007
0 views

headlines

Lesson 4 1Kara
05. 11. 2007
0 views

Lesson 4 1Kara

The Sky
13. 11. 2007
0 views

The Sky

IAP EpsteinWideField
14. 11. 2007
0 views

IAP EpsteinWideField

Presentazione naturalismo
01. 10. 2007
0 views

Presentazione naturalismo

coding2001
20. 11. 2007
0 views

coding2001

Intercultural stereotypes
23. 11. 2007
0 views

Intercultural stereotypes

Everest2
13. 12. 2007
0 views

Everest2

Weber AIA Jan 2006
31. 12. 2007
0 views

Weber AIA Jan 2006

robots in space
07. 01. 2008
0 views

robots in space

The Cold War TSothers
21. 12. 2007
0 views

The Cold War TSothers

Sanitary Sewage Systems
07. 11. 2007
0 views

Sanitary Sewage Systems

LEBANON
29. 12. 2007
0 views

LEBANON

ra xdsl
27. 11. 2007
0 views

ra xdsl

kotlerkeller11 basic
24. 02. 2008
0 views

kotlerkeller11 basic

mcmjul04
27. 02. 2008
0 views

mcmjul04

E Learning for Education
29. 02. 2008
0 views

E Learning for Education

18931
16. 11. 2007
0 views

18931

26 IHR 2006
14. 03. 2008
0 views

26 IHR 2006

RMI PP MT GOV 05
18. 03. 2008
0 views

RMI PP MT GOV 05

Presentation Peet TÃll 2
27. 03. 2008
0 views

Presentation Peet TÃll 2

TMA
05. 11. 2007
0 views

TMA

chapter15
05. 11. 2007
0 views

chapter15

8 Ernst Outreach Oct05
30. 03. 2008
0 views

8 Ernst Outreach Oct05

DP photons1
15. 11. 2007
0 views

DP photons1

ChristianPresentation
13. 04. 2008
0 views

ChristianPresentation

MTCLGTrainingPart2
09. 10. 2007
0 views

MTCLGTrainingPart2

Freedom and Development 2
28. 12. 2007
0 views

Freedom and Development 2

MIDESS LSE
19. 12. 2007
0 views

MIDESS LSE

gate workshop mar2004
16. 11. 2007
0 views

gate workshop mar2004

candidate
23. 11. 2007
0 views

candidate

Schwarm Workshop 2008 Schroll
09. 06. 2008
0 views

Schwarm Workshop 2008 Schroll

phosphors
04. 01. 2008
0 views

phosphors

cabinprojectupdate
28. 12. 2007
0 views

cabinprojectupdate

930528
04. 01. 2008
0 views

930528

Davies ELAG 2006 Presentation
12. 12. 2007
0 views

Davies ELAG 2006 Presentation

IRF Presentation
02. 11. 2007
0 views

IRF Presentation

ponencia armemonos
05. 01. 2008
0 views

ponencia armemonos

232 cathcart
01. 01. 2008
0 views

232 cathcart

nilgunarisanssunum
21. 11. 2007
0 views

nilgunarisanssunum