Monthly Archives: May 2012
Juha Sorva: Visual Program Simulation in Introductory Programming Education Opponent: Prof. Mordechai Ben-Ari, Weizmann Institute of Science, Israel Supervisor: Prof. Lauri Malmi, Aalto University, Department of Computer Science and Engineering. The dissertation “Visual Program Simulation in Introductory Programming Education” formulates a pedagogical technique — visual program simulation — for supporting beginners as they learn foundational concepts and skills of computer programming. In visual program simulation, learners interactively explore the behavior of computer programs. The dissertation work introduces software support for visual program simulation and evaluates it practice. Results from the work can be applied to introductory programming education and to … Read more
DCS student team “Aaltovation” represented Aalto University in the Worldwide finals of Imagine Cup 2012 Windows Phone Challenge organized by Microsoft. The team was among the top three winners in the challenge by application “MotherCare” and was invited to the final event in Sydney to collect prize. Here is the link to the results. The members of the team were: Gitanjali Sachdeva, MS in NordSecMob, Aalto University. Apurva Jaiswal , MS in Mobile Computing Systems and Security, Aalto University. Irena Prochkova, MS in NordSecMob, Aalto University. Maimuna Syed, BSc Computer Scence, Metropolia University of Applied Science.
Kari Kostiainen: On-board Credentials: An Open Credential Platform for Mobile Devices Opponent: Prof. Chris Mitchell, Royal Holloway, University of London, UK. Supervisor: Prof. Tuomas Aura, Aalto University, Department of Computer Science and Engineering. Traditional credential solutions have well-known drawbacks. Purely software-based credentials are vulnerable to many attacks, while hardware-based security tokens and smart cards are expensive to deploy and, due to their typical single-purpose nature, force users to carry multiple hardware credentials with them. Recently, general-purpose security elements and architectures have started to become widely available on many commodity devices. On mobile devices, ARM TrustZone is a widely adopted security … Read more
Visualization of SAT-Solvers The SAT problem — determining if a formula in proposition logic is satisfiable — is decidable because you can construct a truth table. If there are n atomic propositions, there are 2^n assignments, so this is not an efficient algorithm. An efficient algorithm for SAT would solve the P=NP? problem in the affirmative, which is unlikely. However, many interesting algorithms for SAT (called SAT Solvers) have proved to be very efficient in practice. The algorithms are generally based on the DPLL (David, Putnam, Logemann, Loveland) algorithm and add sophisticated search methods and heuristics. The Master’s thesis project … Read more
The recent development in computer network has enabled a rich set of Internet services and applications such email, online social networks (OSNs), and microblogging systems that are now a very important part of our daily lives. Many computer networks have dual properties. They are physical networks and at the same time human networks. It is tremendously important to exploit this social networking feature to design more efficient and more reliable communication systems. In this talk, I will illustrate, with several examples, how social networks can be integrated into system design. I will start by introducing several human mobility and social … Read more
Open M.Sc. thesis position: “Design and implementation of high-level Internet models on top of a distributed discrete event simulator”
(Autumn 2012) Background: A clean-slate information-centric network (ICN) architecture for Internet is being developed in the PURSUIT EU project. The system under work includes a global rendezvous service based on hierarchical DHT consisting of thousands of nodes dispersed cover different autonomous systems. The evaluation of system of this size is difficult, as router-level simulations do not scale to the whole Internet and global prototype deployment is not feasible. Therefore, we are developing our own distributed discrete event simulator tool, that can be run in a computer cluster for large-scale models. In addition, we have been collecting and combining existing data … Read more