10.07.2015 Views

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

Curriculum Vitae - The University of Texas at Dallas

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1990s, we designed and implemented flexible systems th<strong>at</strong> could handle adaptive protocols. This meantthe system can select the protocol such as TCP/IP or UDP or in the case <strong>of</strong> the d<strong>at</strong>a manager, the type <strong>of</strong>transaction algorithm to be used. This was the first effort th<strong>at</strong> considered adaptive approaches. Wedocumented the results in Paper #4 (IEEE ISADS).Secure Real-time Object Management: One significant impact <strong>of</strong> our research is the transfer <strong>of</strong> thetechnology to standards effort. In 1994 with some inputs from colleagues, I developed concepts onintegr<strong>at</strong>ing real-time and security into object request brokers. This work was presented <strong>at</strong> the ACMOOPSLA conference workshop in real-time object systems on real-time object request brokers. This paperis widely cited. I was then invited to give talks <strong>at</strong> several panels on this topic. <strong>The</strong> Object ManagementGroup was interested and invited me to help establish a special interest group in 1996. Together with theMITRE team, we continued to enhance the research and collabor<strong>at</strong>ed with the <strong>University</strong> <strong>of</strong> Rhode Islandand the Navy and subsequently contributed substantially towards the research <strong>of</strong> real-time object requestbrokers. <strong>The</strong> research was published as a team paper in Paper #5 (IEEE Transactions on Parallel andDistributed Systems).Secure Real-time Systems: In Paper #6 (IEEE Transactions on Knowledge and D<strong>at</strong>a Engineering) Iexamined the integr<strong>at</strong>ion <strong>of</strong> security into the infrastructure. I was the first to introduce security with realtimeprocessing back in 1992. <strong>The</strong>refore, I expanded my earlier research and developed a solution for aninfrastructure and d<strong>at</strong>a manager th<strong>at</strong> incorpor<strong>at</strong>ed both security and real-time processing with some inputsfrom my colleague <strong>at</strong> MITRE. I continued with this research when I joined the university in 2004 and one<strong>of</strong> my students was very interested in following up on the ideas I presented in Paper #4. Together with mystudent, we designed and developed a system called Real-time TMO (Time-Triggered Message-TriggeredObject) which incorpor<strong>at</strong>ed security into the TMO system. TMO was designed <strong>at</strong> the <strong>University</strong> <strong>of</strong>California Irvine and is a real-time object system. By incorpor<strong>at</strong>ing security into the system, I believe th<strong>at</strong>we developed the first real-time and secure system based on objects. This research was published in Paper#7 (IEEE ISORC). This research has spawned many new research directions including the Cyber PhysicalSystems th<strong>at</strong> are very popular today.1. Object-oriented Implement<strong>at</strong>ion <strong>of</strong> an Infrastructure and D<strong>at</strong>a Manager for Real-time Commandand Control Systems, Proceedings <strong>of</strong> the IEEE Workshop on Object-Oriented Real-time Systems,Laguna Beach, CA, February 1996 (co-authors: E. Bensley, P. Krupp, R.A. Sigel, M. Squadrito,T. Wheeler). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the team included EdBensley (Principal Investig<strong>at</strong>or), Peter Krupp, Tom Wheeler and myself. I was responsible for thedesign <strong>of</strong> the real-time d<strong>at</strong>a manager and a key member <strong>of</strong> the infrastructure component. I wrotethe entire paper from the technical reports.2. Object Technology for the Integr<strong>at</strong>ion <strong>of</strong> Infrastructure, D<strong>at</strong>a Manager, and Tracker forCommand and Control Applic<strong>at</strong>ions, Proceedings <strong>of</strong> the IEEE Workshop on Object-OrientedReal-time Systems (WORDS), Newport Beach, CA, February 1997 (co-authors: M. G<strong>at</strong>es, P.Krupp, J. Maurer, M. Squadrito, T. Wheeler). Lead AuthorMy Contribution: This is a MITRE Team effort. <strong>The</strong> principal members <strong>of</strong> the team included EdBensley (Principal Investig<strong>at</strong>or), Peter Krupp, Tom Wheeler, Mike G<strong>at</strong>es. Mike Squadrito andmyself. I was responsible for the design <strong>of</strong> the real-time d<strong>at</strong>a manager and supervised theimplement<strong>at</strong>ion by Mr. Squadrito. I wrote the entire paper from the technical reports.3. Scheduling and Priority Mapping for St<strong>at</strong>ic Real-time Middleware, Real-time Systems Journal(Kluwer), Vol. 20, No. 2, p. 155-182, 2001 (co-author: V. Wolfe, L. DiPippo et al). Co-AuthorMy Contribution: I conceived the idea <strong>of</strong> applying the priority ceiling algorithm to our problemfor AWACS and developed the initial algorithm. <strong>The</strong> details were carried out by the students <strong>at</strong>the <strong>University</strong> <strong>of</strong> Rhode Island. Much <strong>of</strong> the writing was carried out by the <strong>University</strong> <strong>of</strong> RI.105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!