Abstract TBD
Event details
- When: 14:00 - 15:00
- Where: Cole 1.33a
- Series: School Seminar Series
- Format: Seminar
Abstract TBD
Abstract:
The HUT Group have a variety of engineering, UX and data science teams solving real-world customer and logistics problems. This presentation looks at a variety of solutions applied across the business, from continuous release processes to warehouse layout approaches.
Speaker Bio:
Elliott graduated from CS at St Andrews in 2016, and now works within the research and development team at THG.
Abstract:
I will describe how the PRISM model checker was used to generate strategies for an Unmanned Aerial Vehicle (UAV), specifically to determine search strategies for a UAV trying to find objects within a grid, for a range of scenarios. Parameters and probabilities for our models were informed by simulation models developed in the School of Engineering’s Micro Air Systems Technologies (MAST) Laboratory. Our generated controllers can now be used within the simulation models (and ultimately in UAV controller software).
This is joint work with colleagues from the Schools of Computing Science (Gethin Norman, Ruth Hoffmann and Ruben Giaquinta) and the School of Engineering (Murray Ireland).
Speaker Bio:
Alice Miller is a Senior Lecturer in Computing Science at the University of Glasgow. She works in Formal Methods and Graph Theory, with a particular interest in Symmetry. Before working at Glasgow she worked at the Universities of Western Australia, East Anglia and Stirling.
Abstract:
The “Internet of Bodies” is turning into a popular catchphrase to
describe the next generation of the Internet of Things – the move from
a collection of everyday objects connected to the Internet and each
other to a scenario, where those devices are attached to, or
incorporated into, the human body with a view to collect and provide a
constant stream of information about an individuals’ health or bodily
functions. Those devices could be part of a medical treatment process
(like pace makers, cochlear implants, digital pills, etc.), medical
research or physical enhancement. The choices, as they say, are
endless, as are the potential reasons why individuals may decide to
use or subject their bodies to those devices.
This means that the Internet of Bodies raises much (and many of) of
the same privacy issues and concerns that we have already observed in
connection to the Internet of Things, multiplied by the power of n
because the majority of the data collected and processed will firmly
fall into the category of “sensitive personal data” that has long
received particular protection under EU data protection law. What
measures do we need to put in place to ensure that the established
principles of data minimization, purpose limitation and limited
retention are met? On what legal basis can we justify the collection
of this data in the first place? Where the data collection is based on
the individual’s consent, how can this consent be voluntary in
situations where the choice might be between a life-saving
intervention and a refusal to use IoB devices? What other pressures
– well known from the use of other IoT enabled devices (convenience,
cost-saving, etc.) might motivate an individual to consent to their
use? What further use might the medical establishment, including the
research and the insurance sector envisage for this type of data?
How do we ensure not just device (IT) security but the security of
the information collected?
This talk will look at the prima facie privacy and data protection
issues of “everyday cyborgs” while trying to stay clear – for now –
from some of the more apocalyptic scenarios currently bandied about in
the media. But even on that basis, the question must be asked: The
Internet of Bodies – What could possibly go wrong?
Speaker Bio:
Judith Rauhofer is a Lecturer in IT Law at the University of Edinburgh
and an Associate Director of the Centre for Studies of Intellectual
Property and Technology Law (SCRIPT).
Her research interests include the commercial and fundamental rights
aspects of online privacy and electronic surveillance, data
protection, information security and all areas of e-commerce and
internet law and policy. Judith is particularly interested in
exploring the tensions between privacy as an individual right and as a
common good.
Judith is qualified as a Rechtsanwalt in Germany and as a solicitor in
England and Wales. She has worked in legal practice for several years,
advising clients from the media and new media industries on aspects of
e-commerce, data protection and IT law.
Judith is the founding editor of the European Data Protection Law
Review and a member of the Executive Committee of the British and
Irish Law, Education and Technology Association (BILETA). She also
works closely with digital rights organisations as a member of the
Advisory Councils to the Open Rights Group (ORG) and the foundation
for information policy research (fipr).
Abstract:
Many students are looking to appropriate social networking sites, amongst them, Facebook, to enhance their learning experience. A growing body of literature reports on the motivation of students and staff to engage with Facebook as a learning platform as well as mapping such activities to pedagogy and curricula. This talk will look through some of the pitfalls of Facebook in HE. I will then present student opinions of the use of a Facebook strategy within higher education through the use of focus groups.
Speaker Bio:
Karen completed her BSc hons degree at St Andrews University in 2000. In the past 17 years she has had a varied carrier that has seen her at: The University of Leeds, The University of Huddersfield, NASA Ames in California, University College Cork, St Andrews University and Oxford University. She is now the Associate Dean for Learning and Teaching at the University of Dundee. In this role she focuses on the student experience for the students who are studying: Anatomy, Biomedical Engineering, Civil Engineering, Computing, Electronic Engineering, Forensic Anthropology, Mathematics and Physics.
Abstract:
Many real-world systems are most naturally modelled by “multi-layer” networks, which allow for different types of connections between entities; it is therefore important to develop efficient algorithms to extract information from such networks. However, most existing results concerning the structural properties of graphs/networks which allow us to solve NP-hard problems efficiently consider only the case of a “single-layer” graph (in which each pair of vertices is either adjacent or not). A natural question to ask is whether, if each individual layer has well-understood structure which allows the design of efficient algorithms, we can still exploit this structure to solve problems on the combined, multi-layer network. We address this question for the specific problem of counting small substructures in the network: in most cases the problem becomes intractable on the combined network, but we identify one case in which structural restrictions on the individual layers can be exploited effectively.
This is joint work with Jessica Enright (University of Stirling).
Speaker Bio:
Kitty Meeks obtained her PhD from the University of Oxford in 2013, and from 2012 to 2014 worked as a Postdoctoral Research Assistant at Queen Mary University of London. She joined the University of Glasgow in 2014, initially to the School of Mathematics and Statistics, before moving across the road to the School of Computing Science in 2016. She currently holds a Royal Society of Edinburgh Personal Research Fellowship for the project “Exploiting Realistic Graph Structure”.
Abstract:
Usable security is about exploring the relationship between the tools
which are supposed to keep people safe and the ways that people interact
with them. In this talk, I will be discussing two of my recent projects:
URL readability and reasons for avoiding software updates. URLs are a
nearly ubiquitous method of telling another person where to find
content. They are used extensively in emails, social networking and
other communications. The security community complains about people
clicking on fraudulent URLs, yet surprisingly little is known about how
people parse and interpret them. Similarly, software updates are
becoming a common feature of using a computing device, many of which
demand to be updated daily, if not hourly. Security experts agree that
installing updates is one of the best ways to stay safe, yet many people
avoid updating. I will discuss studies my lab has run on both of these
topics.
Speaker Bio:
Dr Kami Vaniea is a Lecturer at the University of Edinburgh studying
human factors of security and privacy. She heads the Technology
Usability Lab In Privacy and Security (TULIPS) which looks at many
different aspects of usability, prvaicy and security including
educational game design, internet of things, and software updating.
Previously Dr Vaniea was an Assistant Professor at Indiana University, a
post doc researcher at Michigan State University and completed her PhD
at Carnegie Mellon University.
Abstract:
This talk concentrates on our efforts over the years to make the harvesting of relevant data from mobile devices accurate and efficient, to allow on device data interpretation and to produce models able to interpret the data so that it can be exploited for a wide range of applications. In this sense I will describe specifics of our work which range from fitting mobile sensing inference on devices and how we are able to exploit local device heterogeneous computation resources efficiently to data analytics for mobile health and urban computing. I will discuss challenges and opportunities of the field throughout the talk.
Speaker Bio:
Cecilia Mascolo is a mother of a teenage daughter. She is also Full Professor of Mobile Systems in the Computer Laboratory, University of Cambridge, UK, a Fellow of Jesus College Cambridge and a Faculty Fellow at the Alan Turing Institute for Data Science in London. Prior joining Cambridge in 2008, she has been a faculty member in the Department of Computer Science at University College London. She holds a PhD from the University of Bologna. Her research interests are in human mobility modelling, mobile and sensor systems and networking and spatio-temporal data analysis. She has published in a number of top tier conferences and journals in the area and her investigator experience spans projects funded by Research Councils and industry. She has received numerous best paper awards and in 2016 was listed in “10 Women in Networking /Communications You Should Know”. She has served as steering, organizing and programme committee member of mobile, sensor systems, networking, data science conferences and workshops. She has delivered a number of keynote talks at conferences and workshops in the area of mobility, data science, pervasive computing and systems. She is Associate Editor in Chief for IEEE Pervasive Computing and sits on the editorial boards of IEEE Transactions on Mobile Computing, ACM Transactions on Sensor Networks and ACM Transactions on Interactive, Mobile, Wearable and Ubiquitous Technologies. More details at www.cl.cam.ac.uk/users/cm542.
Abstract
This talk is in two parts, in the first of which Adriana will focus on her experiences in assessment and feedback in large classes, and in the second part on her work in encouraging gender diversity in computer science.
The focus of the first part will be on her involvement in redesigning an undergraduate module on HCI, where the methods of assessment used were no suitable for increasingly larger classes (up to 160 students). Redesign decisions needed to preserve the validity and reliability of the assessment whilst respecting the need for timely feedback. Adriana will specifically talk about the exam and coursework, and how learning activities in the module were aligned to the assessment, through the use of PeerWise for student-authored MCQs, and the use of video for assessment to foster creativity and application of knowledge. During the talk, there will be an opportunity for discussion on the challenges then encountered.
A (shorter) second part of the talk will present her experiences in supporting women in computing, starting with a very small-scale intervention with staff and students at her previous institution, and concluding with her engagement at the Early Career Women’s Network in St Andrews.
Abstract
The core problem in many sensing applications is that we’re trying to
infer high-resolution information from low-resolution observations —
and keep our trust in this information as the sensors degrade. How can
we do this in a principled way? There’s an emerging body of work on
using topology to manage both sensing and analytics, and in this talk I
try to get a handle on how this might work for some of the problems
we’re interested in. I will present an experiment we did to explore
these ideas, which highlights some fascinating problems.