|
||||
T1. Collaborative Radio for 5G Mobile and Wireless Communications T2. Writing Higher Quality Software Requirements T3. The Path Towards Ubiquity: From Wireless to Ubiquitous Computing T4. Understanding, preparing for and developing compliance plans for regulatory issues governing cloud computing
DETAILS: T1. Collaborative Radio for 5G Mobile and Wireless Communications Topics to be addressed Introduction
Device aspects
Special focus areas Radio Coverage
Seamless Network access
Business aspects and Conclusions
T2. Writing Higher Quality Software Requirements Abstract While Agile and traditional “waterfall” software development methodologies differ in many key practices, they do share the mutual goal of accurately representing customer needs through requirements, whatever their form. If requirements are poorly understood, lack key details, or are interpreted differently by stakeholders, then defects will be introduced into the software. Defects lead to rework which ultimately delays product delivery and decreases customer satisfaction. This half day tutorial outlines various practices, templates, and techniques for writing higher quality requirements that more accurately capture customer needs. It discusses issues with “natural language”, shares ten attributes of well-written requirements, and explains the use of ambiguity checklists. Examples of poorly written requirements are provided, analyzed, and then rewritten using the techniques introduced. Leave this tutorial with techniques and tools to write higher quality software requirements and detect those that aren’t. Outline of Topics:
This tutorial is applicable to the vast majority of all software development projects today. It will first present definitions, templates and syntaxes for requirements. Key elements for each type of requirement will be discussed along with their importance in producing high quality requirements. The tutorial will then present issues with natural language, ten attributes of well-written requirements, and ambiguity checklists. These writing guidelines will assist authors in generating higher quality requirements and reviewers in assessing them for quality. Examples of poorly written requirements will be presented, analyzed, and then rewritten using the techniques introduced in the tutorial. Authors will exit this tutorial with the tools that will enable them to write high quality requirements and reviewers will gain knowledge on how to evaluate requirements for quality. T3. The Path Towards Ubiquity: From Wireless to Ubiquitous Computing Tutorial overview and content: Einstein often quoted “imagination is more important than knowledge. Logic will get you from A to B. imagination will take you everywhere”. Power of imagination has taken mankind from Stone Age to Internet World. Modern man’s creative imagination has allowed mankind to view the world in an entirely different light. This has transformed the way mankind lives, communicates and interacts. Following the same path of human imagination, communication technology evolved. So called wireless mobile communication is evolving in form of new technologies at every tick of minute. We have seen mobile communication evolution from AMPS to fourth generation (4G) in the form of WiMAX and LTE. The journey from AMPS to 4G is a long one, involving highest level of imagination and inventions. And it changed human life like never before. Along this path, researchers are seriously considering the possibility of “anywhere and anytime” computing or so called ubiquities computing, dream of Mark Weisser, a researcher in Xerox Palo Alto Research Center. Mark Weiser in his paper “The Computer for the Twenty-First Century” defines ubiquitous computing as a technology that “weave itself into the fabric of everyday life until it is indistinguishable from the it” [1]. He also envisioned it as “Specialized elements of hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their presence.” The purpose of a computer is to help us do something else. The best computer is a quiet, invisible servant. The computer should extend our unconscious. Technology should create calm. Ubiquitous computing is finding immediate applications in healthcare facilities, aware-homes, and assisted-living for the elderly. Sensors are used to monitor the conditions of patients in hospitals, onset of age-related disorders of elderly persons and status of various electrical appliances in our homes. Ubiquitous computing evolved with the path of computing and communication technology development. Though even till date, these two technologies prefer independence; this will not be the case in ubiquitous computing domain. We should prefer to call it ubiquitous computing and communication. We foresee that these two technologies will merge in the realization process of ubiquity. In computing era primary resource is computing and the paradox is that computing resources increased over years, but so did problem complexity. The solution is efficient computing algorithms with respect to the metrics like runtime, space complexity. Whereas, in communication era, the primary resource is bandwidth and the paradox is that as bandwidth capabilities increase, so will new dataintense wireless services and number of users. The solution is adaptive applications with respect to the metrics like quality of data, quality of service (QoS). On this line, I present this 3 h tutorial in two parts. In first part, I will concentrate on the fundamental aspects, issues of research issues of 4G wireless communications and its evolution. In the second part, emphasis is on the ubiquitous computing as well as TCS’s contribution in ubiquitous computing. The agenda is: 1. 4G wireless communication, issues, challenges and trends The total length of the tutorial will be of 3 hour consisting of two parts: T4. Targeted Legal Advice for Internet Business This tutorial will provide a review of U.S. and EU laws and mandates governing cloud computing. Using a case study developed during his work with ENISA, the presenter will discuss current U.S. and European approaches to regulating technology transactions, and any laws or regulations specifically governing cloud computing. The tutorial will include a discussion of how these laws may develop and change over the next several years. The tutorial will close with a discussion on developing and implementing effective compliance plans. Attendees will receive guidance on current U.S. and European laws relating to cloud computing, learn when governmental disclosure is required, and create compliance plans to mitigate legal liability. |
||||
Copyright (c) 2006-2010, IARIA