Sign In

Courses 2002

Sort by AttachmentsUse SHIFT+ENTER to open the menu (new window).
Title Constraint Reasoning and Programming
Teacher Dr. Thom Fruehwirth, Ludwig-Maximilians-University, Munich
Period Feb 18 - March 1, 2002
We first introduce the basic ideas behind the family of (concurrent)constraint logic programming languages in a calculus-based framework.
Constraint handling rules will be used to describe the constraint systems and their solver in a single high-level executable notation.
We will present some of the most common constraint domains, their solvers and applications such as Boolean constraints for circuit design, linear polynomial equations for financial and engineering applications and finite domains for scheduling.
Prologue - 2 hours
     Basic predicate logic and calculus
Part I - 8 hours
The family of (concurrent) constraint logic programming languages
     Constraint logic programming (incl. Prolog)
     Concurrent constraint logic programming
     Constraint handling rules
Part II - 8 hours
Constraint systems and their solvers
     Rational Trees
     Feature Terms
     Boolean Constraints
     Finite Domains
     Linear polynomial equations
     Non-Linear polynomial equations
Finale - 2 hours
     Commercial applications, market and companies
     Case study Munich rent advisor on the internet
     Case study Planning wireless telecommunication
Th. Fruehwirth and S. Abdennadher, Constraint-Programmierung, Textbook, ISBN 3-540-60670-X, Springer Verlag, Germany, 1997.
K. Marriott and P.J. Stuckey, Programming with Constraints,
ISBN 0-262-13341-5, MIT Press, USA, 1998.
Title Responsive systems
Teacher Prof. Miroslaw Malek, Humboldt-Universität, Berlin
Period Feb 18 - March 8
Overview of the course
Fast growth and proliferation of web applications and embedded systems forces the increased demand for properties such as dependability, timeliness and security. We call the systems responsive if they can deliver correct solutions and actions even in the presence of faults. In this course we focus on dependability  and timeliness but references to security and performance are also included. After introducing the various dependability, timeliness and responsiveness perspectives on system design as well as the methodology we introduce basic concepts, measures and models used in responsive computing and communication. We then describe testing methods, fault diagnosis, fault recovery and fault tolerance techniques that are essential in the dependable systems design and scheduling methods which are the core of real-time systems. We conclude the course with case studies, which demonstrate what techniques have been, used for the dependability and responsiveness enhancement in the real life systems.
Dependability  and Responsiveness Concepts and Measures
Dependability  and Responsiveness Models
Testing Techniques
Fault Diagnosis Techniques
Fault Tolerance Techniques
Dependable Memories and Networks
Fault-Tolerant Software
Scheduling Algorithms for Real Time

Title Models and logics for mobility
Teacher Models and logics for mobility
Period October - December
Cardelli and Caires have proposed a logic to describe spatial as well as temporal properties of mobile systems. On the other hand, recent work on permutation-based models of abstract syntax with name binding operations by Honda, Pitts and others can be adapted to build models of mobile systems like the pi-calculus. The course will present the Cardelli and Caires logic together with models based on permutations and general substitutions.
Period: September 2002
Docente: Dr. Silvia Giordano, LCA-EPFL, Lausanne
Titolo: Mobile ad hoc networking
Abstract: A mobile ad-hoc network (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies, allowing people and devices to seamlessly internetwork in areas without any pre-existing communication infrastructure. These networks are energy and bandwidth constrained, and designed to operate in a wide variety of environments, from military networks (with hundreds of nodes) to low-power sensor networks (with potentially, thousands of nodes). Many challenges remain to be resolved before MANETs can be widely deployed, however. Major advances are called for in the areas of wireless technologies, location and configuration management, addressing and routing, security and Quality of Service (QOS). 
This course covers comprehensively the area of ad hoc networking, ranging from physical issues up to applications aspects. In particular, it will cover physical, data link, network and transport layers, as well as application, security, simulation and energy management issues in mobile ad hoc networks. Aim of the course is to study ad hoc protocols and models, with an emphasis on the most recent contributions.
Part I : Mobile ad hoc networking  - 12 hh
            - MANET and the Internet;
            - Multiple access schemes;
            - Routing in ad hoc networks;
            - Addressing and location;
            - Simulation and prototyping mobile networking protocols;
Part II : Economic and social aspects of mobile ad hoc networking  - 8 hh
           - Security in ad hoc networks;
           - Application layer; 
           - Self-organization and co-operation.
Literature: Although ad hoc networking is a "hot topic", at the moment, there are only (few) specialized books, mostly examining routing aspects. More precisely, two books that were recently published by C. Perkins and C.K. Toh contain outdated and selected information, from the perspective of respective authors with narrow specialization. In contrast, this course intends to provide comprehensive coverage. For the reason, the students will be provided with specific journals and conference papers during the course.