The 5th International Conference on Electronics, Communications and Networks
Dec.12th-15th, 2015
Shanghai, China
Invited Speakers
Prof. Yang Xiao
Department of Computer Science
The University of Alabama
Tuscaloosa, AL 35487-0290 USA 

Keynote Speech Title: Flow-Net Accountable Logging and Applications 

Abstract: Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of larger chains of accountability. One of the goals of accountability is that once an event has transpired, the events that took place are traceable so that the causes can be determined afterward. The poor accountability provided by today’s computers and networks wastes a great deal of money and effort. This is due to the simple fact that today’s computing and network infrastructure was not built with accountability in mind. In this talk we introduce our previous work: accountable logging methodology called flow-net. We apply this methodology to many applications ranging from operating system design to computer networks.


Prof. Han-Chieh Chao
President
National Ilan University, Taiwan, China
Department of Computer Science and Information Engineering and the Department of Electronic Engineering, National Ilan University, I-Lan, Taiwan, China
Department of Electrical Engineering, National Dong Hwa University, Halien, Taiwan, China
School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China

Keynote Speech Title: IoT and Big Data Applications 

Abstract: Since technologies regarding Internet of Things (IoT) and cloud computing have been rapidly developed, big data analytics and applications grow incrementally. IoT technology is widely used in environmental management, industrial monitoring, smart cities, health care and other applications, thus it brings a vastly numerous amount of data. However, the generated data without analysis is incomprehensible to human being. Therefore, big data analytics is vital to IoT applications and further brings various high value added big data applications. First of all, this keynote speech addresses the current status about IoT and big data. Then, the six As and Cs of IoT and the four Vs of big data are introduced respectively. Moreover, some applications of IoT and big data are given in this keynote speech. Finally, a proposed framework for big data from cloud-IoT IMS is also given.


Prof. Andrzej Tarlecki
Faculty of Mathematics
Informatics and Mechanics
University of Warsaw, Poland

Keynote Speech Title:Software Specification, Correctness, Verification and Testing 

Abstract:The long-term goal of work in the area of formal specification and development of software is to provide a precise basis to support systematic development of software from specifications by means of verified refinements, resulting in well-structured, well-specified and correct software systems. Contrary to common misperception, the general ideas in this area go far beyond academic case studies and apply to all programming paradigms and practical software development of any kind. Solid mathematical foundations and appropriate level of generality and abstraction are essential here. I will present them in the talk, pointing also at those general concepts and results that have to be further instantiated in the context of a specific programming task. The first step is to provide appropriate mathematical structures that model systems and their components to be considered. Then we need logical formulae that capture the properties of software we want to express. This yields a logical system, in this context often formalised as a so-called institution. One point to be stressed is that much of the further foundational work can be based on an arbitrary institution, independently of the details of models and properties under consideration. This applies to the mechanisms for building complex, structured specifications, as well as modular software systems and their well-specified components. Proof calculi for verifying correctness of such components can be given, to complement systematic stepwise development methods that ensure correctness of the final result. If time permits, I will also talk about software testing in this context, presenting in particular a general testing framework for communication protocols developed by my group.
The Photos of CECNet 2014 and CECNET 2015 more >>
Last Updated: Friday, July 3rd, 2015
Copyright © CECNet2015. All Rights Reserved.    
Contact Person: Judy Chen    Email: cecnet@academicconf.com    Tel: +86-15527027291