Interfacing Iconicity - Addressing Software Divarication Through Diagrammatic Design Principles
- 1 view
Friday, September 28, 2018 - 08:00 am
2265, Storey Innovation Center
THESIS DEFENSE
Department of Computer Science and Engineering
Author : George Akhvlediani
Advisor : Dr. Buell
Date : September 28th
Time : 10:00 am
Place : 2265, Storey Innovation Center
Abstract
This research examines conflicts accompanying the proliferation of computer technology and, more specifically, constellations of dependency in the always expanding volume of software, platforms, and the firms/individuals using them. We identify a pervasive phenomenon of “divarication” in the growing variety of progressively specialized systems and system roles. As software systems enter new thresholds of sophistication, they effectively aggregate many distinct components and protocols. Consequently, we are confronted with a diverse ecology of stratified and thereby incompatible software systems. Software inherits the limitations and potential flaws of its constituent parts, but unlike physical machinery, it isn’t readily disassembled in instances of failure. The individuals using these systems have no means to dissect and analyze their tools, and thus are necessarily dependent on developer assistance.
We assert that divarication is a consequence of interfacing, and particularly in the way computer interfaces operate as the sole point of contact between a user and a software system. Taking Charles S. Peirce’s three types of sign (the icon, index, and symbol) into special consideration, we observe that computer interfaces seldom employ iconic representation. In other words, these interfaces do not reflect the interior logic that drives them; they bear no resemblance to their referent(s). Merely “using” software doesn’t promise any insight into how that software works. We argue that this circumstance makes divarication inevitable. Opaque elements are assembled together into opaque wholes, and so the magnitude of this problem will likely scale with increasing software sophistication.
As the thesis title indicates, we bring Peirce’s notion of “iconicity” into accompaniment with “interfacing”, forming an abstract paradigm in response to divarication. We intend to infuse a software platform with a recurrent protocol of iconicity, to develop a platform that allows at least partial disassembly and examination of the programs it facilitates. We composed a diagrammatic design scheme; a blueprint for software platforms that might emulate “interfacing iconicity”. We developed a prototype platform, implementing this structural logic. This initial prototype is a rudimentary HTML rendering platform, one that articulates the relationship between plain-text code, its Document Object Model (DOM) representation, and the rendered “page” itself. Currently, this prototype is a useful analog for our argument. Since it offers a distinct perspective on the connections between text markup and its systemic interpretation, it may also have educational utility. However, it is not yet a fully realized implementation of our design paradigm, and at this stage a conclusion on whether the latter genuinely addresses divarication would be premature.
Abstract: Cybersecurity is becoming one of the challenging problems in the connected world because of heterogeneity of networked systems and scale and complexity of cyberspace. Cyber- attacks are not only increasing in terms of numbers but also getting more sophisticated. Cyber- defense for prevention, detection and response to cyber-attacks is an on-going challenge that needs efforts to protect critical infrastructures and private information. Complexity and scale of cyberspace and heterogeneity of networked systems make cybersecurity even more challenging. Almost all organizations are vulnerable to (similar or same) cyber-attacks where information sharing could help prevent future cyber-attacks
This talk presents and evaluates an information sharing framework for cybersecurity with the goal of protecting confidential information and networked infrastructures from future cyber- attacks. The proposed framework leverages the blockchain concept where multiple organizations/agencies participate for information sharing (without violating their privacy) to secure and monitor their cyberspaces. This blockchain based framework is to constantly collect high resolution cyber-attack information across organizational boundaries of which the organizations have no specific knowledge or control over any other organizations' data or damage caused by cyber-attacks.
Bio:
Laurent L. Njilla received his B.S. in Computer Science from the University of Yaoundé 1 in Cameroon, the M.S. in Computer Engineering from the University of Central Florida (UCF) in 2005 and Ph.D. in Electrical Engineering from Florida International University (FIU) in 2015. He joined the Cyber Assurance Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, as a Research Electronics Engineer in 2015. Prior to joining the AFRL, he was a Senior Systems Analyst in the industry sector for more than 10 years. He is responsible for conducting basic research in the areas of hardware design, game theory applied to cyber security and cyber survivability, hardware Security, online social network, cyber threat information sharing, category theory, and blockchain technology. He is the Program Manager for the Cyber Security Center of Excellence (CoE) for the HBCU/MI and the Disruptive Information Technology Program at AFRL/RI. Dr. Njilla’s research has resulted in more than 50 peer-reviewed journal and conference papers and multiple awards including Air Force Notable Achievement Awards, the 2015 FIU World Ahead Graduate award and etc. He is a reviewer of multiple journals and serves on the technical program committees of several international conferences. He is a member of the National Society of Black Engineer (NSBE).
Please see
Prof. Amit P. Sheth
Abstract: While Bill Gates, Stephen Hawking, Elon Musk, Peter Thiel, and others engage in OpenAI discussions of whether or not AI, robots, and machines will replace humans, proponents of human-centric computing continue to extend work in which humans and machines partner in contextualized and personalized processing of multimodal data to derive actionable information.
This talk describes how maturing towards the emerging paradigms of semantic computing (SC), cognitive computing (CC), and perceptual computing (PC) provides a continuum through which to exploit the ever-increasing and growing diversity of data that could enhance people’s daily lives. SC and CC sift through raw data to personalize it according to context and individual users, creating abstractions that move the data closer to what humans can readily understand and apply in decision-making. PC, which interacts with the surrounding environment to collect data that is relevant and useful in understanding the outside world, is characterized by interpretative and exploratory activities that are supported by the use of prior/background knowledge. Using the examples of personalized digital health and a smart city, we will demonstrate how the trio of these computing paradigms form complementary capabilities that will enable the development of the next generation of intelligent systems. For background:
The Center for Advanced Analytics and Applied Innovation is hosting speakers Mark Parzyngat, Program Director at IBM Blockchain, and Ben Davis, Chief Technology Officer at Moondog Animation Studio. Tech talks will follow the induction ceremony of Upsilon Pi Epsilon, the Computing honor society.
Jim Stritzinger, Director of the Center for Advanced Analytics and Applied Innovation, is organizing this event.