47
Track Proposal For 2006 ACM SYMPOSIUM ON APPLIED COMPUTING (SAC’06) April 23 – 27, 2006, Dijon, France 1. Track Name and Chairs: Name: Database Theory, Technology, and Applications (DTTA) Track Co-Chairs: Dr. Ramzi A. Haraty, Dr. Apostolos Papadopoulos, Dr. Junping Sun 2. Mission Statement (Scope, Aims, and Topics) In the last twenty years, ACM Symposium on Applied Computing (SAC) has been a primary and international forum for applied computer scientists, computer engineering, and other computer related professionals to gather, interact, present, and disseminate their research and development work. ACM SAC is sponsored by the Special Interest Group on Applied Computing (SIGAPP). SIGAPP mission is to further the interests of the computing professionals engaged in the development of new computing techniques and applications areas and the transfer of computing technology to new problem domains. For many years, the Database Theory, Technology, and Applications track has been one of the important parts of the ACM SAC conference. To support ACM SAC, we have successfully organized the Database Theory, Technology, and Applications tracks under the leadership and guidance of ACM SAC Organization Committees in the past. We strongly believe that the DTTA track will still be a very important forum for various database scientists, researchers, engineers, and practitioners from all over the world to exchange their great ideas, to share their research experiences, and to disseminate their research results. So we would like to continue our mission to propose a special track on Database Theory, 1

Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

  • Upload
    vodang

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Track Proposal For2006 ACM SYMPOSIUM ON APPLIED

COMPUTING (SAC’06)April 23 – 27, 2006, Dijon, France

1. Track Name and Chairs:

Name: Database Theory, Technology, and Applications (DTTA)

Track Co-Chairs: Dr. Ramzi A. Haraty, Dr. Apostolos Papadopoulos, Dr. Junping Sun

2. Mission Statement (Scope, Aims, and Topics)

In the last twenty years, ACM Symposium on Applied Computing (SAC) has been a primary and international forum for applied computer scientists, computer engineering, and other computer related professionals to gather, interact, present, and disseminate their research and development work. ACM SAC is sponsored by the Special Interest Group on Applied Computing (SIGAPP). SIGAPP mission is to further the interests of the computing professionals engaged in the development of new computing techniques and applications areas and the transfer of computing technology to new problem domains. For many years, the Database Theory, Technology, and Applications track has been one of the important parts of the ACM SAC conference. To support ACM SAC, we have successfully organized the Database Theory, Technology, and Applications tracks under the leadership and guidance of ACM SAC Organization Committees in the past. We strongly believe that the DTTA track will still be a very important forum for various database scientists, researchers, engineers, and practitioners from all over the world to exchange their great ideas, to share their research experiences, and to disseminate their research results. So we would like to continue our mission to propose a special track on Database Theory, Technology, and Applications for SAC’05 for such kind of needs. The topics of interest proposed for DTTA track include, but are not limited to:

Active, Deductive, and Logic DatabasesAudio/Video Database SystemsCache and Buffer ManagementCooperative Database Systems and Workflow ManagementDatabase Indexing and TuningData Privacy, Security, and Disaster Recovery

1

Page 2: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Data Warehousing, Data Cubes, and Aggregate ProcessingDigital LibraryDisk Arrays and Tertiary Storage Systems for Very Large DatabasesDistributed, Parallel and Heterogeneous Databases and Their Query Processing Histogram and Sampling Techniques for Database Query ProcessingHypertext/Hypermedia/Multimedia Database and Information SystemsImage, Pictorial and Visual DatabasesInternet and Web-Based Database SystemsKnowledge Discovery and Data Mining in DatabasesMobile Data Management and Mobile Database SystemsMulti-Database Systems/Federated Database Systems/Trusted Database SystemsMultidimensional Data Models/Indices/Database SystemsObject-Oriented and Object-Relational Database SystemsProbabilistic/Fuzzy Databases and Similarity/Approximate Query ProcessingReal-Time and High Performance Database SystemsScientific, Biological and Bioinformatics Data Management and Data MiningSemantic Modeling and Management of Web-Based DatabasesSemantic Web and OntologySemi-Structural Data Management, Meta Data, and XMLSpatial and Temporal DatabasesStatistical and Historical DatabasesTransaction Management and Secure Transaction Processing

3. Description of the Track -Co-Chairs’ Activities

a. Dissemination Plan for Track Call for Papers (CFP)

The Call-for-Paper will be distributed through DBWORLD, personal mailing, and e-mail list of the Track-Co-Chairs, handed out at various conferences co-chairs will attend, and posted in Track-Co-Chairs’ Web pages. The CFP will also be posted on the various locations of campus. The CFP will be available after this proposal gets approved.

b. Management of Review Process

The DTTA Track organizing committee will make the whole effort centralized by designating one of the co-chairs as the main recipient of submitted papers. The selected co-chair would then distribute the papers among the reviewers. The reviewers would send their feedbacks to the selected co-chair. The other co-chairs can help in this process by reviewing a few papers themselves. All the track co-chairs can then review the Review Reports to decide on the cutoff level/score for accepted papers (in coordination, of course, with the program chair). The selected co-chairs would then send out the acceptance/rejection letters and would handle the camera-ready papers and subsequently coordinate with the publication/registration chair(s).

2

Page 3: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

The reviewing process will be supported by a web-based environment, powered by a database, which has been developed by Brigham Young University. Authors will be invited to upload the files of their contributions using the web interface. Moreover, reviewers will upload their comments according to the assigned papers. Papers will be selected for publication in the proceedings according to their score (rank). The system is capable of detecting discrepancies which may occur if there is a big difference between the scores of two reviewers for the same paper. More information on the reviewing system can be found in the following URL: http://dagwood.cs.byu.edu/PaperReview.http://dagwood.cs.byu.edu/PaperReview/4. Track Co-Chairs

Dr. Ramzi A. Haraty has served as a DTTA Track Chair in SAC for the past eight years and has many valuable experiences in organizing the DTTA track in SAC. So Dr. Haraty will serve as one of the DTTA Track Co-Chairs for SAC’06.

Dr. Apostolos Papadopoulos has served for various prestigious database conferences and journals in various capacities such as conference committees, reviewer, and referee. The conferences he served include ACM Workshop in GIS in 1999, International Symposium in Spatial Databases in 1999, ACM SIGMOD Conference in 1999, International Workshop in Similarity Search in 1999, International Workshop in Spatiotemporal Data Management in 1999, International Conference on Extended Database Technology in 2004, ACM PODS Conference in 2004; the journals he served are The Computer Journal, VLDB Journal, etc. He has also served for ACM SAC’04 and ACM SAC’05 DTTA Track ( Track Co-Chair for SAC’05), and he made great contribution to the success of the track in both SAC’04 and SAC’05. Dr. Papadopoulos will serve as one of the DTTA Track Co-Chairs for SAC’06 and will be responsible for managing the software tools for the DTTA track activities (paper submission/review process).

Dr. Junping Sun has served for ACM SAC’04 and ACM SAC’05 as one of DTTA Track Co-Chairs and chaired one of DTTA tracks at ACM SAC’04 conference, and has also served for various other international conferences and journals as a program committee, reviewer, referee, etc. Dr. Junping Sun will serve as one of the DTTA Track Co-Chairs for SAC’06 and will draft CFP for the DB Track in SAC’06 if the proposal is approved.

5. Contact Information and Affiliation Address:

Track Co-Chairs:

Dr. Ramzi A. HaratyDivision of Computer Science and MathematicsLebanese American UniversityP.O. Box 13-5053 ChouranBeirut, Lebanon 1102 2801

3

Page 4: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Phone: 961 1 867620 Ext. 1285Fax: 961 1 867620 Ext. 1226Email: [email protected] WWW URL: ramzi-haraty.lau.edu.lb

Dr. Apostolos PapadopoulosData Engineering Lab.Department of InformaticsAristotle UniversityThessaloniki, 54124 Greece

Phnoe: +30-2310-991918Fax: +30-2310-991913Email:[email protected] WWW URL:

http://delab.csd.auth.gr/~apostol/index.html

Dr. Junping SunGraduate School of Computer and Information SciencesNova Southeastern University3301 College AvenueFort Lauderdale, Florida 33314USA

Phone: 1-(954) 262-2082Fax: 1-(954) 262-3915Email : [email protected] WWW URL : http://www.nova.edu/~jps

6. Short CVs:

Dr. Haraty’s CV:Ramzi A. Haraty

Lebanese American UniversityP.O. Box 13-5053 Chouran Beirut, Lebanon 1102 2801

Phone: 03/782010; Fax: 01/867098 Email: [email protected]

Web site: ramzi-haraty.lau.edu.lb

I. Objective

To organize a Database Theory, Technology, and Applications track at the 21 th Annual SAC (SAC 2006) in Dijon, France.

II. Education

Doctorate of Philosophy, Computer Science, North Dakota State University, December 1992Title of Dissertation: Transaction Management in Multilevel Secure Database Management

4

Page 5: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Systems Master of Science, Computer Science, Minnesota State University, July 1989Title of Thesis: Optical Fiber Communication Systems, Theory and Practice

Bachelor of Science, Computer Science, Minnesota State University, June 1988Minor: Electronic Engineering Technology

III. Professional Experience October 2003 - present

Chairperson, Lebanese American UniversityDuties include chairing the Division of Computer Science and Mathematics.

June 1998 - presentAssociate Professor, Lebanese American University

Duties include teaching a variety of computer science courses, conducting research in the area of asynchronous transfer mode networks and computer security, serving on university committees, and advising undergraduate and graduate students.

March 1993 - May 1998Senior Member of Technical Staff, The Aerospace Corporation

Duties included analyzing and evaluating various trusted commercial systems (operating systems and database management systems), performing security testing and evaluation, supporting various space programs in the area of secure system design, development and system integration, and conducting research in the area of multilevel secure systems engineering.

March 1992 - February 1993Assistant Professor, Moorhead State University

Duties included teaching a variety of computer science and computer information systems courses, conducting research in the area of concurrency control and query processing, serving on university committees, and advising graduate students.

September 1989 -February 1992Research Assistant, North Dakota State University

Duties included conducting research in the area of transaction management in multilevel secure database management systems, administrating an IBM AS/400 system, and serving as a graduate assistant for several graduate courses.

August 1988 -August 1989Software Engineer, Minnesota State University

Duties included developing test plans and executing test procedures on the various licensed products of the IBM AS /400 systems.

5

Page 6: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

IV. Publications

Books

1. Transaction Management in Multilevel Secure Kernelized Database Systems. Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2005.

2. Regression Test Selection for Database Applications. Advanced Topics in Database Research. Volume 3. Idea Group Publishing. 2004.

3. Informatics – Basic Education - Grade Twelve (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2002.

4. Informatics – Basic Education – Teacher’s Guide - Grade Twelve (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2002.

5. Evaluation Guide – Informatics. Grades 7, 8, 9, 10, and 11. Ministry of Education, Youth, and Sports. 2000.

6. Informatics – Basic Education - Grade Nine (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2000.

7. Informatics – Basic Education – Teacher’s Guide - Grade Nine. National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2000.

8. Accelerating Queries in Multilevel Secure Database Systems. Lecture Notes in Computer Science. Springer-Verlag. 2000.

Journals

1. Abjad Hawwaz: An Off-line Arabic Handwriting Recognition System. International Journal of Computers and Applications. ACTA Press/IASTED. 2005.

2. Indexing Arabic Text. Special Issue of the Journal of Computational Methods in Sciences and Engineering (JCMSE): Intelligent Systems. 2005.

3. Arabic Character Recognition. International Arab Journal ofInformation Technology. July 2004.

4. Segmenting Handwritten Arabic Text. ACIS International Journal of Computer and Information Science (IJCIS), Volume 3, Number 4. December, 2002.

5. Regression Testing of Database Applications. Journal of Database Management. Vol. 13, No. 2. 2002.

6

Page 7: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

6. Query Acceleration in Distributed Database Systems. Colombian Journal of Computation. Volume 2, Number 1. June 2001.

7. Software Metrics for Database Applications. International Journal of Computers and Their Application – A Publication of the International Society for Computers and Their Applications. Volume 8, Number 1. March 2001.

8. A Concurrency Control Model for Multilevel Secure Object-Oriented Databases. International Journal for Mini and Microcomputer Applications. Volume 14, No. 3 Alberta, Canada. 1995.

9. KB - HYDRO: A Heterogeneous Distributed System Integrating Data and Knowledge Bases. International Journal for Mini and Microcomputer Application. Volume 13, No. 1. 1994.

International Refereed Conferences

1. A Comparative Study of ElGamal Based Cryptographic Algorithms. Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004). Porto, Portugal. April 2004.

2. BVA+ - A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004). Porto, Portugal. April 2004.

3. ADD: Arabic Duplicate Detector – A Duplicate Detection Data Cleansing Tool. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July 2003.

4. Neuro-Classification for Handwritten Arabic Text. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July 2003.

5. An Auto-Indexing System for Arabic Information Retrieval. Proceedings of the IASTED International Conference on Applied Informatics (AI 2003). Innsbruck, Austria. February 2003.

6. ABJAD: An Off-Line Arabic Handwritten Recognition System. Proceedings of the 2002 International Arab Conference on Information Technology (ACIT'2002). Doha, Qatar. December 2002.

7. Segmenting Handwritten Arabic Text. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.

8. A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.

7

Page 8: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

9. Iterative Querying in Web-Based Database Applications. Proceedings of the 17th ACM Symposium on Applied Computing (SAC 2002). Madrid, Spain. March 2002.

10. A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2001). Beirut, Lebanon. June 2001.

11. Regression Testing of Database Applications. Proceedings of the 16th ACM Symposium on Applied Computing (SAC 2001). Las Vegas, USA. March 2001.

12. Transaction Acceleration in Secure Database Systems. Proceedings of the 13th National Conference on Computer Applications in Industry and Engineering (CAINE-2000). Honolulu, Hawaii, USA. November 2000.

13. Accelerating Queries in Multilevel Secure Database Systems. Proceedings of the 10th International Conference on Computing and Information ICCI ‘2000, Kuwait, November 18-21, 2000. (Proceedings not published yet!)

14. A PERF Solution for Distributed Query Optimization. Proceedings of the ISCA 15th International Conference on Computers and Their Applications. Louisiana, USA. March 2000.

15. Database Software Metrics for Small Database Applications. Proceedings of the 15th

ACM Symposium on Applied Computing. Como, Italy. March 2000.

16. Distributed Query Optimization Using PERF Joins. Proceedings of the 15th ACM Symposium on Applied Computing. Como, Italy. March 2000.

17. A Security Policy Manager for Multilevel Secure Object Oriented Database Management Systems. Proceedings of the International Conference on Applied Modelling and Simulation. Cairns - Queensland, Australia. September 1999.

18. C2 Secure Database Management Systems – A Comparative Study. Proceedings of the ACM Symposium on Applied Computing. San Antonio, Texas. March 1999.

19. A Concurrency Control Model for Multilevel Secure Object-Oriented Databases. Proceedings of the Mid-Content Conference on Information and Database Systems. Fargo, ND. May 1994.

20. Secure Transaction Management and Query Processing in Multilevel Secure Database Systems. Proceedings of the Symposium on Applied Computing. Phoenix, AZ. April 1994.

21. Transaction Processing in Multilevel Secure Replicated Databases. Proceedings of the Mid-Continent Information Systems Conference. Fargo, ND. May 1993.

22. OOHYDRO: A Heterogeneous Distributed Database System for Object-Base and Database Interoperability. Proceedings of the Mid-Continent Information Systems Conference. Fargo, ND. May 1993.

8

Page 9: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

23. Multilevel Security in Multidatabase Systems. Proceedings of the Small College Computing Symposium. Cedar Rapids, IA. April 1993.

24. Integrating Knowledge Based Systems in Heterogeneous Distributed Databases. Proceeding of the International Conference on Computer Applications in Design, Simulation and Analysis. Washington, DC. March 1993.

25. Transaction Management in Multilevel Secure Database Management Systems. International Conference on Mathematical Modelling and Scientific Computing in Science and Technology. College Park, MD. April 1993.

26. Concurrency Control and Recovery in Multilevel Secure Replicated Databases (short paper). AAAI-IEEE-ACM-ISMM-International Conference of Information and Knowledge Management. Baltimore, MD. November 1992.

Local Conferences

1. GISMO: A Geographical Information System for a Municipality Office. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2002.

2. MLS/ERD: A Tool for Building Multilevel Secure Entity Relationship Diagrams. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2002.

3. Factory Simulation. Proceedings of the 14th Science Meeting (Book of Abstracts) – 2000 – organized by the National Council for Scientific Research and the Lebanese Association for the Advancement of Science. Beirut, Lebanon. November 2000.

4. Routing Journal Operations on Disk using Striping with Parity. Proceedings of the International Conference on Research Trends in Science and Technology (RTST). Lebanese American University. Beirut, Lebanon. March 2000.

5. Query Optimization in Distributed Databases. Proceedings of the 13th Science Meeting (Book of Abstracts) – 1999 – organized by the National Council for Scientific Research and the Lebanese Association for the Advancement of Science. Beirut, Lebanon. November 1999.

6. Using WebSQL to Query the World Wide Web. Proceedings of the International Conference on Scientific Computations – Beirut, Lebanon. March 1999.

Technical Reports

1. Final Evaluation Report – Novell Incorporated Netware 4 Trusted Network System Design. National Computer Security Centre. CSC-EPL-98/XX. 1998.

2. Final Evaluation Report - Sybase SQL Server and Secure SQL Server . National Computer Security Centre. CSC-EPL-97/01. 1997.

9

Page 10: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

3. Security Testing and Evaluation Report of the Operational Flight Program Build System for the F-22 Weapon System. July 1997.

4. Security Testing and Evaluation Report of the Integrated Maintenance Information System for the F-22 Weapon. May 1997.

5. Final Evaluation Report - Informix Online/Secure. National Computer Security Centre CSC-EPL-96/xx. 1996.

6. Technical Assessment of the IBM OS/2 Warp Operating System. August 1996.

7. Final Evaluation Report - IBM AS/400 System. National Computer Security Centre CSC-EPL-95/13. 1995.

8. Transaction Management in Multilevel Secure Database Management Systems. (NDSU-CS-TR-92-07). 1992.

9. Concurrency Control and Recovery in Multilevel Secure Replicated Databases. (NDSU-CS-TR-92-15). 1992.

10. MLS-ROLL: Concurrency Control Object for Multilevel Secure Replicated Databases. (NDSU-CS-TR-92-16). 1992.

11. Optimal Transaction Processing in Replicated Multilevel Secure Databases. (NDSU-CS-TR-91-17). 1991.

Others

1. Issues in Integrating Trusted Products in Real-Word Applications. Data Security Letter June 1995.

2. Multilevel Secure System Engineering. Data Security Letter. September 1994.

3. An Optimal Transaction Processing Protocol for Multilevel Secure Replicated Databases. Poster Session at the 1992 IEEE Symposium in Security and Privacy. Oakland, CA. May 1992.

4. Transaction Management in Multilevel Secure Database Management Systems. Ph.D. Dissertation. North Dakota State University. November 1992.

5. Optical Fibre Communication Systems: Theory and Practice. M.S. Thesis. Minnesota State University. July 1989.

IV. Courses Taught

Course Title: Computer SimulationLevel: GraduateTextbook: Introduction to Simulation Using GPSS, T. Schriber (McGraw-Hill 1991)

Course Title: Advanced Database Systems

10

Page 11: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Level: GraduateTextbook: Concurrency Control and Recovery in Database Systems, P.A. Bernstein, V. Hadzilacos and N. Goodman (Addison-Wesley 1987)

Course Title: Knowledge-Based Expert SystemsLevel: GraduateTextbook: Artificial Intelligence, P. H. Winston (Addison-Wesley 1993)

Course Title: Foundations of ProgrammingLevel: GraduateTextbook: The Science of Programming, D. Gries (Springer-Verlag 1981)

Course Title: Ethical Issues in Computing Level: SeniorTextbook: A Gift of Fire, S. Baase (Prentice Hall 2003)

Course Title: Artificial IntelligenceLevel: SeniorTextbook: Artificial Intelligence – A Modern Approach, S. Russel and P. Norvig (Prentice Hall 1995)

Course Title: Computer NetworksLevel: SeniorTextbook: Computer Networks and Internets, D. Comer (Prentice Hall 2002)

Course Title: Database Management SystemsLevel: SeniorTextbook: Fundamentals of Database Systems, R. Elmasri and S. Navathe (Benjamin

2002)

Course Title: Software Engineering Level: Senior Textbook: Software Engineering, R. S. Pressman (McGraw- Hill 1992)

Course Title: Programming LanguagesLevel: SeniorTextbook: Programming Languages Design and Implementation, T. W. Pratt and M.

Zelkowitz (Prentice Hall 2001)

Course Title: Systems Analysis and DesignLevel: JuniorTextbook: Systems Analysis and Design, S. Wu and M. Wu (West Publishing 1994)

Course Title: Introduction to C/UNIX Level: Sophomore Textbook: A Book on C, A. Kelley & I. Phol (Benjamin 1990) Textbook: A Practical Guide to the UNIX System, M.G. Sobell (Benjamin 1989)

Course Title: Computer Programming ILevel: SophomoreTextbook: C How to Program, H. Deitel and P. Deitel (Prentice Hall 2003)

11

Page 12: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Course Title: Microcomputer Applications to PharmacyLevel: SophomoreTextbook: Handouts.

Course Title: Computer LiteracyLevel: SophomoreTextbook: Computing Essentials, T. O’Leary and L. O’Leary (McGraw-Hill 2000)

Course Title: Business Data ProcessingLevel: FreshmanTextbook: Microcomputing, T. O’Leary and B. Williams (McGraw-Hill 1993)

Course Title: Introduction to Microcomputer Level: Freshman Textbook: Microcomputer Applications, W. T. Price (Dryden 1989)

VI. Standards Reviewed

1. IEEE Standard for Application and Management of the Systems Engineering Process. IEEE Standards 1220-1998. 1998.

VII. Thesis and Projects Supervised

1. Discretionary Access Control in Object Oriented Database Management Systems. Lebanese American University. In progress. (Primary Advisor).

2. Mutation Testing of Web Services. Lebanese American University. February 2004. With Reda Siblini.

3. Routing and Security Algorithms on Reconfigurable Computing Systems. American University of Beirut. February 2004. With Mohammad Al-Khalidy.

4. Security Testing and Evaluation of Cryptographic Algorithms. Lebanese American University. June 2003. With Hadi Otrok (Primary Advisor).

5. XSP: A New Technology for J2EE Development. Lebanese American University. June 2003. With Elias Mouchantaf.

6. Modelling and Testing of Web Systems using SDL. Lebanese American University. June 2003. With Joe Abboud Syriani.

7. Performance Analysis of Parallel Computing Using Reconfigurable Computing. American University of Beirut. January 2003. With Soheib Mazoub.

8. Comparative Empirical Evaluation of Distributed Object Computing Technologies. Lebanese American University. January 2003. With Fadi Nammur.

12

Page 13: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

9. ADD: A Duplicate Detection Tool for Arabic Data Warehouses. Lebanese American University. July 2002. With Ralph Varjabedian (Primary Advisor).

10. Online Banking Models and Implementations. Lebanese American University. July 2002. With Najib Nasreddine.

11. Corporate Portal Design and Framework. Lebanese American University. June 2002. With Mohammad Wazan.

12. Neuro-Classification for Handwritten Arabic Text. Lebanese American University. June 2002. With Catherine Ghaddar (Primary Advisor).

13. ABJAD – An Off-Line Arabic Handwritten Recognition System. Lebanese American University. May 2002. With Hisham Zabadani (Primary Advisor).

14. Constructing School Timetabling Using Simulated Annealing. Lebanese American University. April 2002. With Nazih Faraj.

15. A Study of RSA Cryptography Algorithms. Lebanese American University. March 2002. With Nabil Semaan.

16. An Application Framework for the Distance Learning Domain. Lebanese American University. January 2002. With Ahmed Natafgi.

17. An Auto-Indexing Module for Arabic Information Retrieval. Lebanese American University. January 2002. With Walid Daher (Primary Advisor).

18. GISMO – A Geographic Information System for a Municipality Office. Lebanese American University. September 2001. With Yousef Kaddoura (Primary Advisor).

19. Final Exam Scheduling for Universities. Lebanese American University. July 2001. With Mazen Timani.

20. Incremental and Classical Genetic Algorithms. Lebanese American University. July 2001. With Mohammad Awad.

21. Web Application Testing. Lebanese American University. July 2001. With Wael Ukaily.

22. Synthesis with VHDL. Lebanese American University. July 2001. With Hatem Halawi.

23. Implementation of a Regression Test Selection Technique for C++ Software. Lebanese American University. July 2001. With Rania Hajjar.

24. Performance Analysis of Linear Algebraic Functions Using Re-configurable Computing. American University of Beirut. May 2001. With Issam Damaj.

25. A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text. Lebanese American University. February 2001. With Alaa Hamid (Primary Advisor)

26. Weighted Ternary Trees as Data Structures for Dendritic Molecules. Lebanese American University. December 2000. With Dany Doughan.

13

Page 14: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

27. CareerHunter.com: Hunts Your Career! Lebanese American University. August 2000. With Samer Eid.

28. Reduction Based Methods and Metrics for Selective Regression Testing. Lebanese American University. July 2000. With Rami Bahsoon.

29. Impact Analysis and Regression Testing of Database Applications. Lebanese American University. July 2000. With Bassel Dauo.

30. Test Case Generation for Path Coverage. Lebanese American University. June 2000. With Miran Salame.

31. Software Quality Improvement Model for Small Organizations. Lebanese American University. June 2000. With Rabih Zeineddine.

32. An Improved Apriori for Mining Association Rules – “Apriori+”. Lebanese American University. December 1999.

33. Artificial Neural Network Algorithms. Lebanese American University. November 1999. With Samer Ramadan.

34. PERF Solutions for Distributed Query Optimization. Lebanese American University. September 1999. With Rola Fany (Primary Advisor).

35. A Natural Language Interface to Relational Databases – The Mild System. Lebanese American University. June 1999. With Malda Tabbaa.

36. Exam Scheduling Algorithms. Lebanese American University. June 1999. With Ziad Mikati.

37. Complexity Metrics for Small Business Software Applications in MS-ACCESS Environment. Lebanese American University. June 1999. With Sana Abiad.

38. School Timetabling Support System. Lebanese American University. February 1999. With Ahmed Solh.

39. Lebanese Standards for Software Development Process. Lebanese American University. February 1998. With Ihab Shallah.

40. Tourism in Lebanon: An Intelligent Geographic Information System Interactive Multimedia Hypermap Tool. Lebanese American University. February 1998. With Diana Nahle.

41. Software Quality System for Lebanese Companies. Lebanese American University. August 1997. With Badia Fidaoui.

42. Simulated Annealing and Genetic Algorithms for Exam Scheduling. Lebanese American University. June 1997. With Abbas Tarhini.

14

Page 15: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

43. A Tabu Search Algorithm for Mapping Data to Multicomputers. Lebanese American University. June 1997. With Kamel Diab.

VIII. Conference and Journal Activities

1. 2003 – Present: Technical Committee - The International Arab Journal of Information Technology.

2. 2002 – Present: Member of the Program Committee – International Conference on Software and Engineering Applications.

3. 2002 – Present: Referee – The Information Resources Management Association 2003 International Conference.

4. 2002 – 2002: Local Organizing Committee – the First Middle East/North Africa Summer School on Parallel, Distributed, Mobile, and Internet Computing – Theory, Methods, Applications, and Research Directions.

5. 2001 – Present: Member of the International Program Committee - Software Engineering and Application Conference. The International Association of Science and Technology for Development.

6. 2001 – Present: Member of the International Program Committee – International Conference in Computer Science, Software Engineering, Information Technology, E-business and Applications.

7. 2001 – 2002: Webmaster and Publicity Chair – Research Trends in Science and Technology (RTST).

8. 2000 – Present: Finance and Registration Chair - The ACS/IEEE International Conference on Computer Systems and Applications.

9. 1999 – Present: Paper Referee - The Computer Security Applications Conference.

10. 1998 – Present: Member of the Organizing Committee - ACM Symposium on Applied Computing and Track Chair - Database Theory, Technology, and Applications.

11. 1998 – Present: Member of the Editorial Board of the Association of Computing Machinery Applied Computing Review.

12. 1998 – 1999: General Secretary and Member of the Organizing Committee of the International Conference on Scientific Computations.

13. 1996 – 1997: Member of the Program Committee - The Computer Security Applications Conference.

14. 1993 – 1997: Member of the Advisory Board - Symposium on Applied Computing Special Track on Scientific Computing.

15

Page 16: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

15. 1993 – 1995: Member of the Organizing Committee. The International Conference on Mathematical and Computing Modelling.

16. 1993 – 1995: Member of the Steering Committee. The Mid-Continent Conference on Information Management.

IX. Memberships and Societies

1. Arab Computing Society.

2. Association of Computing Machinery.

3. International Society of Computers and Their Applications.

X. Research Grants

1. 2000 – 2002, Grant for “Data Cleansing in Large Data Warehouse.” National Council for Scientific Research. Lebanon.

2. 1993 - 1995, Grant for “Multilevel Secure Systems Engineering.” The Aerospace Corporation. USA.

3. 1992 - 1993, Grant for “Multilevel Security in Database Systems.” Moorhead State University. USA.

XI. Achievements and Awards

1. “Recognition of Service Award”. Association of Computing Machinery. March 21, 2000, and March 7, 2001.

2. “Spot Award”. The Advanced Tactical Fighter (F-22) Project. The Aerospace Corporation. January 1, 1995.

3. “Certificate of Achievement”. Total Quality Management. The Aerospace Corporation. June 1, 1994.

4. “Certificate of Achievement”. The IBM-Mankato Project. IBM and Minnesota State University. May 18, 1990.

XII. Magazines, Newspaper, and Television Interviews

1. Featured in an article in IT News in issue number 33 – June 2003. The article discussed how computer education is a pillar of arts and sciences education.

2. Featured in an article in the April 12-18, 2002 issue of Assayad Magazine discussing the state of the Lebanese computer sector.

16

Page 17: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

3. Featured in an article in the March 31, 2002 issue of An-Nahar newspaper discussing the RTST 2002 conference.

4. Featured in a radio program on Radio of Lebanon on Thursday, December 14, 2000.

5. Featured in an article in the December 29, 1999 issue of Ad-Diyar newspaper discussing Y2K related issues.

6. Spotlighted in the evening news program on Tele-Liban on Saturday February 13, 1999 discussing The Year 2000 Problem.

7. Featured in an article in the Issue No: 5, December 1997 of Academy - The Universities News Magazine.

XIII. References

1. Mrs. Mona Bou-Azza BawarchiPresidentGezairi Transport P.O. Box 11/1402 Beirut, Lebanon

Phone: (01) 783783 Fax: (01) 581-157 Telex: 20871-42478

2. Dr. Ahmed KabbaniChairperson of the Natural Sciences DivisionLebanese American University, P. O. Box 13-5053 Beirut, LebanonPhone: (01) 867622 ext. 1221 Fax: (01) 867098Email: [email protected]

3. Mr. Anis BalaaCo-founder and ManagerEngineering Design and Management, Mar Elias Street, Helou Building Beirut, LebanonPhone: (01) 818071 Fax: (01) 306556

4. Dr. William Perrizo Dean of Graduate Studies North Dakota State University. Fargo, ND 58105 Phone: (701) 237-7248 Fax: (701) 237-8562 Email: [email protected]

5. Dr. Hussein Hakimzadeh Chairperson of the Department of Mathematics and Computer Science Indiana University. South Bend, IN 46634 Phone: (219) 237-4517 Fax: (219) 237-4538 Email: [email protected]

17

Page 18: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Dr. Papadopoulos’ CV:

Apostolos Papadopoulos, Ph.D.Data Engineering Lab.

Department of InformaticsAristotle University

Thessaloniki, 54124 Greece

PERSONAL DATA

Name: ApostolosSurname: PapadopoulosBirthdate: 21 September 1971Marital Satus: SinglePosition: Lecturer, Department of Informatics, Aristotle UniversityOffice Address: Data Engineering Lab, Department of Informatics, Aristotle University, 54124, Thessaloniki, Greece.

18

Page 19: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Office Tel: ++302310-991918, Fax: ++302310-991913E-mail: [email protected]: http://delab.csd.auth.gr/members/apostol.html

 

STUDIES - DEGREES

1986: First Certificate in English, University of Cambridge

1994: 5-year Diploma Degree in Computer Engineering and Informatics, University of Patras, Greece(Diploma Thesis: Study of Parallel Algorithms for the Line Segment Intersection Problem in Computational Geometry)

2000: Ph.D. Degree in Computer Science, Aristotle University of Thessaloniki, Greece (PhD Thesis: Access Methods and Query Processing in Multidimensional Databases)

2003: Proficiency in English, University of Michigan

 

EXPERIENCE

1993-1994: Programmer in Computer Technology Institute (CTI), Patras, Greece.

1994-1995: Teacher in Institute for Advanced Computer Studies, Thessaloniki, Greece(Courses: Design and Analysis of Algorithms, Fundamentals of Computer Networks)

1995-1997: Teacher in Pythagoras Institute, Thessaloniki, Greece.(Courses: SQL Programming, Operating Systems)

1998: Researcher at INRIA Research Center, Paris, France.

1998-2000: Systems Engineer in Hellelic Telecommunications Organization.

19

Page 20: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

2000-2001: Military Obligations.

2001-2002: Systems Engineer in Hellascom International, Athens, Greece

2001-2002: Researcher and Part-Time Lecturer in Data Engineering Lab, Dept. of Informatics, Aristotle University, Thessaloniki, Greece.

2002-2003: Software Developer in Compucon S.A., Thessaloniki, Greece.

2002-2003: Researcher and Part-Time Lecturer in Data Engineering Lab, Dept. of Informatics, Aristotle University, Thessaloniki, Greece.

2003-now: Lecturer in Department of Informatics, Aristotle University, Thessaloniki, Greece.

RESEARCH PROJECTS

PENED 1995-1997: Design, Implementation and Evaluation of Algorithms for Spatial Query Processing using Spatial Access Methods.

PABE 1996-1997: Design, Implementation and Evaluation of a Small-Scale GIS with Raster and Vector Support.

ESPRIT TMR 1996-2000: European Network for Spatio-Temporal Database Systems.

BILATERAL FRANCE-GREECE 1997-1999: Benchmarking Issues for Spatial Query Processing.

BILATERAL SERBIA-GREECE 2003-2005: Mobile Object Data Management and Query Processing Techniques in Location-Based Services.

20

Page 21: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

PUBLICATIONS

Authored/Co-authored Books

A. N. Papadopoulos and Y. Manolopoulos: "Nearest-Neighbor Search: a database perspective", Springer, 2004 (to appear).

Y. Manolopoulos and A. N. Papadopoulos: "Database Systems: theory and practice" (in Greek), 2004.

Edited Books

Y. Manolopoulos, A. N. Papadopoulos and M. Vassilakopoulos (eds): "Spatial Databases: technologies, techniques and trends", Idea Group Publishing, 2004 (to appear).

Papers in Journals

K. Raptopoulou, Y. Manolopoulos, A. N. Papadopoulos: "Fast Nearest-Neighbor Search in Moving Object Databases", International Journal on Advances of Computer Science for Geographical Information Systems (Geoinformatica), Vol.7, No.2, pp.113-137, 2003.

A. N. Papadopoulos, Y. Manolopoulos: "Parallel Bulk-Loading of Spatial Data", Parallel Computing, Vol.29, No.10, pp.1419-1444, 2003.

A. N. Papadopoulos and Y. Manolopoulos: "Distributed Processing of Similarity Queries", International Journal on Distributed and Parallel Databases , Kluwer Academic Publishers, Vol.9, No.1, pp.67-92, 2001.

Y. Manolopoulos, E. Nardelli, A. N. Papadopoulos, and G. Proietti: "MOF-tree: A Spatial Data Structure to Manipulate Multiple Overlapping Features", Information Systems Journal, Vol.22, No.8, pp.465-481, 1997.

A. N. Papadopoulos and Y. Manolopoulos Y.: "Nearest Neighbor Queries in Shared-Nothing Environmnets", International Journal on Advances of Computer Science for Geographical Information Systems (Geoinformatica) , Kluwer Academic Publishers, Vol.1, No.4, 1997.

Papers in Conference Proceedings

M. Kontaki and A. N. Papadopoulos: "Efficient Similarity Search in Streaming Time Sequences", Proceedings of International Conference on Scientific and Statistical Database Management (SSDBM), Santorini, Greece, June 2004.

21

Page 22: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

M. Kontaki, A. N. Papadopoulos and Y. Manolopoulos: "Similarity Range Queries in Streaming Time Series", Proceedings of the 4th International Workshop on Pattern Recognition in Information Systems (PRIS 2004), Porto, Portugal, April 2004.

A. N. Papadopoulos, Y. Manolopoulos: "Structure-Based Similarity Search with Graph Histograms", Proceedings of International Workshop on Similarity Search (DEXA IWOSS), pp.174-178, 1999.

A. N. Papadopoulos, P. Rigaux, M. Scholl: "A Performance Evaluation of Spatial Join Processing Strategies", Proceedings SSD'99 , pp.286-307, 1999.

C. Gurret, Y. Manolopoulos, A. N. Papadopoulos, P. Rigaux: "The BASIS System: A Benchmarking Approach for Spatial Index Structures", Proceedings STDBM'99 , pp.152-170, 1999.

A. N. Papadopoulos and Y. Manolopoulos: "Multiple Range Query Optimization in Spatial Databases", Proceedings of the 2nd East-European Symposium on Advances in Databases and Information Systems (ADBIS), 1998.

Y. Theodoridis, T. Sellis, A. N. Papadopoulos and Y. Manolopoulos: "Specifications for Efficient Indexing in Spatiotemporal Databases", Proceedings of the International Conference on Scientific and Statistical Database Management (SSDBM), 1998.

A. N. Papadopoulos and Y. Manolopoulos: "Similarity Query Processing using Disk Arrays", Proceedings of the ACM SIGMOD Conference on Management of Data, pp.225-236, Seattle, USA, 1998.

A. Nanopoulos, Y. Psiliagos, A. N. Papadopoulos, and Y. Manolopoulos: "Parallel Linear Quadtrees", Proceedings of the 6th National Computer Conference (EPY 1997), Vol.1, Athens, Greece, December 1997.

A. Nanopoulos, A. N. Papadopoulos and Y. Manolopoulos: "The Impact of Area Balancing on Declustering Linear Quadtrees", Proceedings of the International Conference on Urban, Regional, Environmental Planning and Informatics to Planning in an Era of Transition, Athens, Greece, October 1997.

A. N. Papadopoulos, and Y. Manolopoulos: "Performance of Nearest Neighbor Queries in R-trees", Proceedings of the 6th International Conference on Database Theory (ICDT'97), pp.394-408, Delphi, Greece, January 1997.

A. N. Papadopoulos and Y. Manolopoulos: "Parallel Processing of Nearest Neighbor Queries in Declustered Spatial Data", Proceedings of the 4th ACM Workshop on Advances in Geographic Information Systems (ACM-GIS 1996), pp.35-43, Rockville, Maryland, USA, November 1996.

22

Page 23: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

A. N. Papadopoulos, and Y. Manolopoulos: "Global Page Replacement in Spatial Databases", Proceedings of the 7th International Conference on Database and Expert System Applications (DEXA 1996), pp.855-864, Zurich, September 1996.

Y. Manolopoulos, E. Nardelli, A. N. Papadopoulos, and G. Proietti: "QR-tree: a Hybrid Spatial Data Structure", Proceedings of the 1st International Conference on Geographic Information Systems in Urban, Regional and Environmental Planning, pp.247-262, Samos Island, Greece, April 1996.

M. Vasilakopoulos, A. N. Papadopoulos and Y. Manolopoulos: "Indices for Image Databases", Proceedings of the 5th National Computer Conference (EPY 1995), Vol.1, pp.351-360, Athens, Greece, December 1995.

OTHER ACTIVITIES

Contribution to the following conferences and journals as a reviewer: ACM Workshop in GIS 1999 (ACM-GIS ’99), International Symposium in Spatial Databases 1999 (SSD ’99), ACM SIGMOD Conference 1999 (SIGMOD ’99), International Workshop in Similarity Search 1999 (IWOSS ’99), International Workshop in Spatiotemporal Data Management 1999 (STDBM ’99), VLDB Journal, The Computer Journal, EDBT 2004, ACM PODS 2004.

Participation in the organization of the Balcan Olympiad of Informatics, Nicosia, Cyprus, 1996 and the Balcan Olympiad of Informatics, Drama, Greece, 1997, as a member of the technical committee.

Participation in the technical committee of the project “Kyrillos and Methodios” for Internet-based contests.

Member of the Technical Chamber of Greece since 1995.

 

23

Page 24: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

 Dr. Sun’s CV

CURRICULUM VITAE

JUNPING SUN, Ph.D.

Office Address:

The Graduate School of Computer & Information SciencesNova Southeastern University 3301 College Avenue Fort Lauderdale, Florida 33314USA

Telephone and Facsimile: Electronic Mail: [email protected]

(954) 262-2082 (Office) WWW URL: http://www.nova.edu/~jps(954) 262-3915 (Fax)

Citizenship: USA

24

Page 25: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

PROFESSIONAL EXPERIENCES

2002.7 – Present Professor in Computer Science/Computer Information SystemsThe Graduate School of Computer and Information SciencesNova Southeastern University

Teaching courses mainly at master’s and doctoral levelsSupervising and directing doctoral students as advisor and

committeeResearch in database systems, data warehousing, parallel data

processing,knowledge discovery and data mining

1997.4 - 2002.6 Associate Professor in Computer Science/Computer Information Systems

The Graduate School of Computer and Information SciencesNova Southeastern University

Teaching courses mainly at master’s and doctoral levelsSupervising and directing doctoral students as advisor and

committeeResearch in database systems, data warehousing, parallel data

processing,knowledge discovery and data mining

1992.6 - 1997.3 Assistant Professor in Computer Science/Computer Information Systems

The Graduate School of Computer and Information SciencesNova Southeastern University

Teaching courses from undergraduate to doctoral levelsSupervising and directing doctoral students as advisor and

committeeResearching in database systems and knowledge discovery in

databases

1986.9 - 1992.5 Research AssistantInstitute of Manufacturing Research, Wayne State UniversityResearching in database management systems, artificial neural

networks

Teaching Assistant in Computer ScienceDepartment of Computer Science, Wayne State UniversityTeaching undergraduate courses in computer science

1982.2 - 1985.9 Assistant Lecturer in Computer and Information SciencesShanghai Finance & Economic University, Shanghai, P.R.C.Teaching undergraduate courses in computer and information

systems

25

Page 26: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

EDUCATION

Ph.D. in Computer Science Wayne State University, Detroit, Michigan

April 1992 (Minor in Computer Engineering),Dissertation: SEDDS: A Multidimensional Histogram for

Dynamic Selectivity Estimation and Semantic Query Processing

Advisor: Professor and Dr. William I. Grosky

M.S. in Computer Science Wayne State University, Detroit, Michigan

December 1987 (Minor in Computer Engineering)

B.S. in Computer Sci. & Eng. Southeast University, Nanjing, P.R.C.

January 1982 (Previously Nanjing Institute of Technology)

MAJOR RESEARCH INTERESTS

Database Management Systems, Data Warehousing and OLAP, Knowledge Discovery Database Systems, Parallel Database Processing, Probabilistic and Fuzzy Databases, Semantic Query Optimization, Object-Oriented Database Systems, Bioinformatics

PROFESSIONAL MEMBERSHIPS

• Member of Association for Computing Machinery (ACM)• Member of ACM Special Interest Group on Computation and Algorithms• Member of ACM Special Interest Group on Knowledge Discovery and Data Mining• Member of ACM Special Interest Group on Management of Data

• Senior Member of IEEE• Member of IEEE Computer Society• Member of IEEE SMC Society• Member of IEEE Computer Society Technical Committee on Data Engineering• Member of IEEE Computer Society Technical Committee on Multimedia Computing• Member of IEEE Computer Society Technical Committee on Parallel Computing• Member of Upsilon Pi Epsilon

PROFESSIONAL ACTIVITIES

26

Page 27: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Conference Committee Memberships:

• Program Committee Member for IEEE 2005 Mobility Conference, Guangzhou, China, November, 2005.

• Database Track Co-Chair for the Twentieth ACM Symposium on Applied Computing, Santa Fe, New Mexico, USA, March, 2005.

• Program Committee Member for International Conference on Bioinformatics and Its Applications, Fort Lauderdale, USA, December 16-19, 2004.

• Program Committee Member of ISCA the Nineteenth International Conference on Computers and Their Applications, Seattle, Washington, USA, March 2004.

• Database Track Co-Chair for the Nineteenth ACM Symposium on Applied Computing, Nicosia, Cyprus, March, 2004.

• Program Committee Member of 2003 International Conference on Natural Language Processing and Knowledge Engineering, Beijing China, October, 2003.

• Program Committee Member of ISCA the Eighteenth International Conference on Computers and Their Applications, Honolulu, Hawaii, USA, March 2003.

• Program Committee Member of the Second International Conference on Information, Beijing, China, July 2002.

• Program Committee Members of the Second International Workshop on Intelligent Techniques for Industrial Engineering, July 2002.

• Program Committee Member of ISCA the Seventeenth International Conference on Computers and Their Applications, San Francisco, California, USA, March 2002.

• Program Committee Member of the First ACIS Annual International Conference on Computer and Information Science, Orlando, USA, October, 2001.

• Program Committee Member of ISCA the Sixteen International Conference on Computers and Their Applications, Seattle, Washington, USA, March 2001.

• Program Committee Member of ISCA the Fifteenth International Conference on Computers and Their Applications, New Orleans, Louisiana, USA, March 2000.

• Program Committee Member of the Eighth ACM International Conference on Information and Knowledge Management (CIKM), Kansas City, Missouri, USA, November 1999.

• Program Committee Member for Computer Science Division at the Sixteenth Annual International Conference of Association of Management and the International Association of Management, Chicago, Illinois, USA, August 1998.

Editorial Board Memberships:

• Associate Editor for International Journal of Computer and Its Applications (Since 2005.2)

27

Page 28: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• Member of Editorial Board of Journal Computer Science and Information Management (Since 1999)

• Member of Editorial Board of Journal of Management Systems (Since 1998)

• Guest Editor of Special Issue on Next Generation Database Systems and Technologies for Journal of Computer Science and Information Management (1999)

Conference Session Chairs:

• Session Chairs at the Twentieth ACM Symposium on Applied Computing, Santa Fe, New Mexico, USA, March 2005.

• Session Chair at the Nineteenth ACM Symposium on Applied Computing, Cyprus, March 2004.

• Session Chair at ISCA the Seventeenth International Conference on Computers and Their Applications, San Francisco, California, USA, April 2002.

• Session Co-Chair at 2001 IEEE International Conference on Systems, Man, and Cybernetics, Tucson, Arizona, USA, October, 2001.

• Session Chair at ISCA the Sixteenth International Conference on Computers and Their Applications, Seattle, Washington, USA, March 2001.

• Session Chair at ISCA the Fifteenth International Conference on Computers and Their Applications, New Orleans, Louisiana, USA, March 2000.

• Session Chair at the Fifth International Conference for Young Computer Scientist, Nanjing, P.R.C., August, 1999.

• Session Chair at the Third National Youth Conference on Operation Research and Management, Beijing, P.R.C., August 1999.

• Session Chair at the Fourth International Conference on Computer Science and Informatics, Research Triangle Park, North Carolina, USA, October 1998.

• Session Chair at the Third International Conference on Systems Science and Systems Engineering, Beijing, P.R.C., August 1998.

• Session Chair at the Sixteenth Annual International Conference of Association of Management and the International Association of Management, Chicago, Illinois, USA, August 1998.

Referees for Conferences:

• ACM Forty-Third Annual Southeast Conference, 2005.   • International Conference on Bioinformatics and Its Applications,

2004.• ISCA the Nineteenth International Conference on Computers and

Their Applications, March, 2004.• ISCA the Eighteenth International Conference on Computers and

Their Applications, March, 2003.• ISCA the Seventeenth International Conference on Computers and

Their Applications, April, 2002.

28

Page 29: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• The Seventeenth ACM Symposium on Applied Computing, March, 2002.

• The Third International Conference on Information, Communications & Signal Processing (ICICS 2001), October 2001. (Sponsored by IEEE Signal Processing Society)

• Second International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, August 2001.

• ISCA the Sixteenth International Conference on Computers and Their Applications, March 2001.

• ISCA the Fifteenth International Conference on Computers and Their Applications, March 2000.

• ACM International Conference on Information and Knowledge Management, November 1999.

• IEEE International Conference on Data Engineering, February 1992.• IEEE International Phoenix Conference on Computers and Communications,

February 1992.

Referees for Journals:

• Senior Referee for IEEE Computer (Listed in IEEE Computer December 1998 and December 1996 Issues)

• Referee for IEEE Communications Letters• Referee for IEEE Transactions on Systems, Man, and Cybernetics• Referee for International Journal of Modeling and Simulation• Referee for Journal of Bulletin of Mathematical Biology• Referee for Journal of Computer Science and Information Management• Referee for Information Sciences: An International Journal• Referee for Journal of Systems Integration• Referee for Journal of Systems Science and Systems Engineering• Referee for Journal of Management Systems

Referees for Book Publishers:

• Book Reviewers for Addison-Wesley Publishing Company (2003,2001,1999,1998,1997,1994)

Databases and Transaction Processing: An Application-Oriented Approach, 2nd edition (2004)Databases and Transaction Processing: An Application-Oriented Approach (2002)Learning SQL: A Step-by-Step Guide Using Oracle (2002)Principles of Database Systems with Internet and Java Applications (2001)Fundamentals of Database Systems (2000)Object Database Development: Concepts and Principles (1998)Database Systems: A Practical Approach to Design, Implementation, and Management (1994)

29

Page 30: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• Book Proposal Reviewer for Addison-Wesley Publishing Company (2001, 1999, 1995, 1993)

• Book Proposal Reviewer for Oxford Publisher

Others:

• Judge for Silver Knight Competition Held by Miami Herald Newspaper (1997)

PUBLICATIONS

• Razavian, A. and Sun, J., “Cognitive Based Adaptive Path Planning Algorithm for Autonomous Robotic Vehicles,” accepted and to appear in the Proceedings of 2005 IEEE Southeast Conference, Fort Lauderdale, Florida, USA, April 8-10, 2005.

• Kerdprasop, N., Kerdprasop, K., and Sun, J., “Density Biased Reservoir Sampling for Clustering,” in the Proceedings of IASTED International Conference on Artificial Intelligence and Applications,February 14-16, 2005, pp. 95-100.

• Sun, J., “Cost-Based Inference for Semantic Query Transformation,” in Information: An International Journal, Volume 7, Number 1, 2004, pp. 37-46.

• Sun, J., “Data Mining and Bioinformatics,” in the Proceedings of 2003 International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences, Las Vegas, Nevada, USA, June 23-26, 2003, pp. 112-118.

• Sun, J., “Discovering Reduct Rules from N-Indiscernibility Objects in Rough Sets,” accepted and to appear in the Proceedings of the Twelfth IEEE International Conference on Fuzzy Systems, St. Louis, Missouri, USA, May 25-28, 2003.

• Sun, J. and Zhu, Q., “Probability Based Semantic Query Transformation,” in the Proceedings of 2002 IEEE International Conference on Systems, Man, and Cybernetics, October 6-9, 2002, Volume 1, pp. 1-6 (MP1D5).

• Zhu, Q. and Sun, J., “Building a Bayesian-Game-Theoretic Decision Support Agent,” in the Proceedings of 2002 IEEE International Conference on Systems, Man, and Cybernetics, October 6-9, 2002, Volume 5, pp. 1-6 (TP1O5).

30

Page 31: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• Sun, J., “Cost Based Semantic Query Transformation,” in the Proceedings of ISCA the Seventeenth International Conference On Computers And Their Applications, San Francisco, California, USA, April 4-6, 2002, pp. 128-131.

• Sun, J., “Entropy Based Rule Derivation from Data with Uncertainty,” in the Proceedings of the Tenth IEEE International Conference on Fuzzy Systems, December 2-5, 2001, pp. 744-748.

• Sun, J., “-Cut Based Rule Derivation from Uncertain Data,” in Information: An International Journal, Volume 4, Number 4, 2001, pp. 579-587.

• Sun, J. and Bi, W. Y., “Direct Acyclic Concept Graph Based Attribute Oriented Induction,” in the Proceedings of 2001 IEEE International Conference on Systems, Man, and Cybernetics, October 7-10, 2001, pp. 2563-2568. (IEEE Press)

• Sun, J., “Incremental Rule Derivation via Multidimensional Data Partitioning,” in the Proceedings of the Fifteenth International Parallel and Distributed Processing Symposium, April 23-27, 2001, pp. 158 (8 pages). (IEEE-CS Press)

• Sun, J., “Rule Derivation from Uncertain Data,” in the Proceedings of ISCA the Sixteenth International Conference on Computers and Their Applications, March 28-30, 2001, pp. 305-309.

• Sun, J., “Cardinality-Based Quantitative Rule Derivation,” in the Proceedings of 2000 International Conference on Intelligent Information Proceedings of the Sixteenth IFIP World Computer Congress, August 21-25, 2000, pp. 23-30.

• Sun, J., “Goal-Driven Data Partitioning for Quantitative Rule Derivation,” in the Proceedings of ISCA the Fifteenth International Conference on Computers and Their Applications, March 29-31, 2000, pp. 128-133.

• Sun, J., “Next Generation Database Systems and Technologies,” in Journal of Computer Science and Information Management, Volume 2, Number 2, 1999, pp. i-iv.

• Sun, J., Kerdprasop, N. and Kerdprasop, K., “Relevant Rule Discovery by Language Bias for Semantic Query Optimization,” in Journal of Computer Science and Information Management, Volume 2, Number 2, 1999, pp. 53-63.

• Sun, J., Kerdprasop, N. and Kerdprasop, K., “Relevant Rule Derivation for Semantic Query Optimization,” in the Proceedings of the Fifth International Conference for Young Computer Scientists, August 17-20, 1999. (In Advances in Computer Science and

31

Page 32: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

Technology, Volume II, pp. 567-573, International Academic Publishers)

• Sun, J. and Grosky, W. I., “Dynamic Maintenance of Multidimensional Range Data Partitioning for Parallel Data Processing,” in the Proceedings of the First ACM International Workshop on Data Warehousing and OLAP, November 7, 1998, pp. 72-79. (ACM Press)

• Sun, J., “Parallel Data Partitioning for Parallel Data Cube Processing in Large Data Warehouses,” in the Proceedings of the Second IEEE International Workshop on Knowledge and Data Exchange, November, 1998, pp. 135-142. (IEEE-CS Press)

• Sun, J., “Multidimensional Data Partitioning for Parallel Data Processing in Large Data Warehouses,” in the Proceedings of the Fourth International Conference on Computer Science and Informatics, October 23-28, 1998, Vol. III, pp. 317-324.

• Sun, J. and Lin, W. Y., “Multidimensional Range Data Partitioning for Parallel Data Processing," in the Proceedings of the Third International Conference on Systems Science and Systems Engineering, August 25-28, 1998, pp. 69-74.

• Sun, J., “Database Systems Revisited: Concepts, Issues, and Trends,” in the Proceedings of the Sixteenth Annual International Conference of AoM/AIoM, Chicago, August 4-9, 1998, 183-189.

• Sun, J. and Lee, H. C., “Mobility Data Pattern Tracking via Multidimensional Data View Approach,” in the Proceedings of IEEE MILCOM’97 Conference, Monterey, California, November 1997. (IEEE-Press)

• Lee, H. C. and Sun, J., “Mobile Location Tracking by Optimal Paging Zone Partitioning,” in the Proceedings of the Sixth IEEE International Conference on Universal Personal Communications, San Diego, California, October, 1997, pp. 168-172.

• Sun, J. and Lee, H. C., “Optimal Mobile Location Tracking by Multilayered Model Strategy,” in the Proceedings of the Third IEEE International Conference on Engineering of Complex Computer Systems, Villa Olmo, Como, Italy, September 7-12, 1997, pp. 86-95. (IEEE-CS Press)

• Lee, H. C. and Sun, J., “Multilayered Model Strategy for Optimal Mobile Location Tracking,” in the Proceedings of the Eighth IEEE International Symposium on Personal Indoor and Mobile Radio Communications, Helshinki, Finland, September 1-4, 1997, pp. 1009-1013.

32

Page 33: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• Sun, J., “Multidimensional Data Model for OLAP in Data Warehouse Applications,” in the Proceedings of the Fifteenth Annual International Conference of AoM/AIoM, Montreal, Canada, August, 1997, pp. 136-141.

• Miller, R. and Sun, J., “Research on a Process Reverse Engineering Methodology: Slaying the Other Legacy Dragon,” in the Proceedings of the Fifteenth Annual International Conference of AoM/AIoM, Montreal, Canada, August, 1997.

• Lee, H and Sun, J., “Optimization of Paging Cost in Mobile Switching System by Genetic Algorithm,” in the Proceedings of the Tenth International Conference on Industrial Engineering Applications of Artificial Intelligence and Expert Systems, Atlanta, Georgia, June 10-13, 1997, pp. 201-210.

• Sun, J. and Grosky, W. I., “Multidimensional Histogram for Dynamic Data Exploration and Mining,” in the Proceedings of PAKDD’97: First Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, February 23-24, 1997, pp. 287-300. (In KDD: Techniques and Applications, edited by Hongjun Lu, Hiroshi Motoda, and Liu Huan, World Scientific Publisher)

• Grosky, W. I. and Sun, J., “Dynamic Selectivity Estimation for Multidimensional Queries,” in the Proceedings of Fourth International Conference on Foundations of Data Organization and Algorithms, Chicago, Illinois, October 13-15, 1993, pp. 231-246. (In Lecture Notes in Computer Science, 730, edited by David Lomet, Springer-Verlag.)

• Sun, J., “SEDDS: A Multidimensional Histogram for Dynamic Selectivity Estimation and Semantic Query Processing,” published by UMI, A Bell & Howell Company, 1993.

• Sun, J., Hassoun, M. H., and Grosky, W. I., “A Fast Algorithm for Finding Global Minima of Error Functions in Layered Neural Networks,” in the Proceedings of 1990 IEEE International Joint Conference on Neural Networks, San Diego, CA, June 19-25, 1990, pp. 715-720. (IEEE-Press)

• Sun, J., Grosky, W. I., and Hassoun, M. H., “Heuristic and Hybrid Methods for Finding Global Minimum of Error Function in Artificial Neural Networks,” in Proceedings of the Twenty-First Pittsburgh Conference on Modeling & Simulations, Pittsburgh, PA, May 3-4, 1990, pp. 521-526.

• Sun, J., Grosky, W. I., and Hassoun, M. H., “Heuristic and Hybrid Methods for Finding Global Minimum of Error Function in Artificial Neural Networks,” Technical Report CSC-90-002, Department of Computer Science, Wayne State University, MI 48202.

33

Page 34: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• Sun, J., Grosky, W. I., and Xing, J., “Past, Current and Future of Deductive Query Processing,” in the Proceedings of IASTED Expert Systems Theory & Applications, Los Angeles, California, December 12-14, 1988, pp. 32-35.

• Xing, J., Grosky, W. I., and Sun, J., “A Survey of Engineering Databases,” in the Proceedings of IASTED Expert Systems Theory & Applications, Los Angeles, California, December 12-14, 1988, pp. 73-76.

PLENARY TALK

• “Relevant Rule Derivation for Semantic Query Optimization,” at the Fifth International Conference for Young Computer Scientists, Nanjing, P. R. China, August 17-20, 1999.

PRESENTATIONS AND TALKS

• “Density Biased Reservoir Sampling for Clustering,” at IASTED International Conference on Artificial Intelligence and Applications, Innsbruck, Austria, February 14-16, 2005.

• “Data Mining and Bioinformatics,” at 2003 International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences, Las Vegas, Nevada, USA, June 23-26, 2003.

• “Discovering Reduct Rules from N-Indiscernibility Objects in Rough Sets,” at the Twelfth IEEE International Conference on Fuzzy Systems, St. Louis, Missouri, USA, May 25-28, 2003.

• “Probability Based Semantic Query Transformation,” at 2002 IEEE International Conference on Systems, Man, and Cybernetics, Hammamet, Tunisia, October 6-9, 2002.

• “Building a Bayesian-Game-Theoretic Decision Support Agent,” at 2002 IEEE International Conference on Systems, Man, and Cybernetics, Hammamet, Tunisia, October 6-9, 2002.

• “Cost Based Semantic Query Transformation,” at ISCA the Seventeenth International Conference On Computers And Their Applications, San Francisco, California, USA, April 4-6, 2002,

• “Entropy Based Rule Derivation from Data with Uncertainty,” at the Tenth IEEE International Conference on Fuzzy Systems, Melbourne, Australia, December 2-5, 2001.

• “Directed Acyclic Concept Graph Based Attribute Oriented Induction,” at 2001 IEEE International Conference on Systems, Man, and Cybernetics, Tucson, Arizona, USA, October 7-10, 2001.

34

Page 35: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

• “Incremental Rule Derivation via Multidimensional Data Partitioning,” at the Fifteenth International Parallel and Distributed Processing Symposium, San Francisco, California, USA, April 23-27, 2001. (Sponsored by IEEE)

• “Rule Derivation from Uncertain Data,” at ISCA the Sixteenth International Conference on Computers and Their Applications, Seattle, Washington, USA, March 28-30, 2001.

• “Cardinality-Based Quantitative Rule Derivation,” at 2000 International Conference on Intelligent Information Processing of the Sixteenth IFIP World Computer Congress, Beijing, P.R.C., August 21-25, 2000.

• “Goal-Driven Data Partitioning for Quantitative Rule Derivation,” at ISCA The Fifteenth International Conference on Computers and Their Applications, New Orleans, Louisiana, USA, March 29-31, 2000.

• “Dynamic Maintenance of Multidimensional Range Data Partitioning for Parallel Data Processing,” at ACM First International Workshop on Data Warehousing and OLAP, Washington, D.C., USA, November 7, 1998.

• “Multidimensional Data Partitioning for Parallel Data Processing in Large Data Warehouses,” at the Fourth International Conference on Computer Science and Informatics, October 23-28, Research Triangle Park, North Carolina, USA, 1998.

• “Multidimensional Range Data Partitioning for Parallel Data Processing," at the Third International Conference on Systems Science and Systems Engineering, Beijing, P.R.C., August 25-28, 1998.

• “Database Systems Revisited: Concepts, Issues, and Trends,” at the Sixteenth Annual International Conference of AoM/AIoM, Chicago, Illinois, USA, August 4-9, 1998.

• “Mobility Data Pattern Tracking via Multidimensional Data View Approach,” at IEEE MILCOM’97 Conference, Monterey, California, USA, November 7-10, 1997.

• “Optimal Mobile Location Tracking by Multilayered Model Strategy,” at the Third IEEE International Conference on Engineering of Complex Computer Systems, Villa Olmo, Como, Italy, September 7 -12, 1997.

• “Optimization of Paging Cost in Mobile Switching System by Genetic Algorithm,” with Hee C. Lee, at The Tenth International Conference

35

Page 36: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

on Industrial Engineering Applications of Artificial Intelligence and Expert Systems, Atlanta, Georgia, USA, June 10-13, 1997.

• “Multidimensional Histogram for Dynamic Data Exploration and Mining,” at PAKDD’97: First Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, February 23-24, 1997.

• "Dynamic Selectivity Estimation for Multidimensional Queries," at the Fourth International Conference on Foundations of Data Organization and Algorithms, Chicago, Illinois, USA, October 13 -15, 1993.

• "A Fast Algorithm for Finding Global Minima of Error Functions in Layered Neural Networks," at IEEE 1990 International Joint Conference on Neural Networks, San Diego, California, USA, June 19-25, 1990

• "Heuristic and Hybrid Methods for Finding Global Minimum of Error Function in Artificial Neural Networks," at the Twenty-First International Pittsburgh Conference on Modeling & Simulations, Pittsburgh, Pennsylvania, USA, May 3-4, 1990.

• "Past, Current and Future of Deductive Query Processing," at International Association of Science and Technology Development Conference on Expert Systems Theory & Applications, Los Angeles, California, USA, December 12-14, 1988.

• "A Survey of Engineering Databases," with J. Xing at International Association of Science and Technology Development Conference on Expert Systems Theory & Applications, Los Angeles, California, USA, December 12-14, 1988.

AWARDS AND HONORS

2003.5 2003-2004 NSU President Faculty Research and Development Grant Awarded(Amount $2500.00)

2000.5 ACM/IEEE-CS Award for Travel Support for Presenting at WCC’2000

($1700.00 USD, Sponsored and Founded by National Science Foundation, USA)1996-1998 Listed as a senior referee in the annual list of IEEE Computer

(1998.12,1996.12)1996 Listed in Who’s Who Among America's Teachers (1996.10)

(published by Educational Communications, ISBN: 1562441426)

1986.9 - 1992.5 Graduate Assistantships at Wayne State University1988.11&1990.5 Graduate Professional Travel Founds Awarded at Wayne State

University

36

Page 37: Track Proposal - University of Tulsaeuler.mcs.utulsa.edu/.../DTTA-SAC06-TrackProposalV1.doc · Web viewIssues in Integrating Trusted Products in Real-Word Applications. Data Security

1985.9 - 1986.9 Graduate Fellowship Awarded by National Education Committee, P.R.C.

1986.3 - 1987.3 Associate President, Chinese Friendship Association for Students & Scholars

37