The changing student computing experience

I’m jealous of my students in many ways, for the things they’ll get to build and experience. But they should be jealous of me, too. It was graduation week last week, which is always a great bash. The students enjoy it, obviously — but it’s mainly an event for the parents, many of whom are seeing their first child, or even the first child in their extended family, succeed at university. It’s also the time of year when we conduct post mortem analyses of what and how we’ve taught throughout the year, and how we can change it for the better in the next session. One of the modules I teach is for second-year undergraduates on data structures, algorithms, applied complexity and other really basic topics. It’s a subject that’s in serious danger of being as dry as ditchwater: it’s also extremely important, not only because of it’s applications across computer science but also because it’s one of the first experiences the students have of the subject, so it’s important that it conveys the opportunities and excitement of computer science so they don’t accidentally nuke their lives by going off to do physics or maths instead. One of the aspects of making a subject engaging is appealing to the students’ backgrounds and future interests — which of course are rather different to the ones I had when I was in their position 25 years ago. (I initially wrote “quarter of a century ago,” which sounds way longer somehow.) So what are the experiences and aspirations of our current students? Many get their first experience of programming computers with us, but they’re all experienced computer users who’ve been exposed to computers and the internet their entire lives. They’re the first generation for whom this is true, and I don’t think we’ve really assimilated what it means. They’re completely at home, for example, in looking up background material on Wikipedia, or surfing for alternative sources of lectures and tutoring on YouTube and other, more specialised sites. They can do this while simultaneously writing email, using Facebook and replying to instant messages in a way that most older people can’t. They’re used to sharing large parts of themselves with their friends and with the world, and it’s a world in which popularity can sometimes equate with expertise in unexpected ways. It’s hard to argue that this diversity of experience is a bad thing, and I completely disagree with those whom have done so: more information on more topics collected from more people can only be positive in terms of exposure to ideas. For an academic, though, this means that we have to change how and what we teach: the facts are readily available, but the interpretation and criticism of those facts, and the balancing of issues in complex systems, are something that still seem to benefit from a lecture or tutorial setting. Many of the students have also built web sites, of course — some very complex ones. Put another way, they’ve built distributed information systems by 17, and in doing so have unknowingly made use of techniques that were at cutting edge of research less than 17 years ago. They expect sites to be slick, to have decent graphics and navigation, to be linked into social media, and so forth. They’ve seen the speed at which new ideas can be assimilated and deployed, and the value that information gains when it’s linked, tagged and commented upon by a crowd of people. Moreover they expect this to continue: none of them expects the web to fragment into isolated “gated communities” (which is a fear amongst some commentators), or to become anything other than more and more usable and connected with time. I’m jealous of my students, for the web that they’ll have and the web that many of them will help to build. But before I get too envious, it’s as well to point out that they should be jealous of me too: of the experience my peers and I had of computers. It’s not been without impact. One of the things that surprises me among some students is that they find it hard to imagine ever building some of the underpinning software that they use. They can’t really imagine building an operating system, for example, even though they know intellectually that Linux was built, and is maintained, by a web-based collaboration. They can’t imagine building the compilers, web servers and other base technology — even though they’re happy to use and build upon them in ways that really surprise me. I suspect the reasons for this are actually embedded into their experience. All the computers, web sites and other services they’ve used have always had a certain degree of completeness about them. That’s not to say they were any good necessarily, but they were at least functional and usable to some degree, and targeted in general at a consumer population who expected these degrees of functionality and usability (and more). This is radically different to the experience we had of unpacking a ZX-80, Acorn Atom or some other 1980’s vintage home computer, which didn’t really do anything — unless we made it do it ourselves. These machines were largely blank slates as far as their functions were concerned, and you had to become a programmer to make them worth buying. Current games consoles criminalise these same activities: you need permission to program them. It’s not just a commercial change. A modern system is immensely complex and involves a whole stack of software just to make it function. It’s hard to imagine that you can actually take control all the way down. In fact it’s worse than that: it’s hard to see why you’d want to, given that you’d have to re-invent so much to get back to the level of functionality you expect to have in your devices. As with programming languages, the level of completeness in modern systems is a severe deterrent to envisioning them, and re-building them, in ways other than they are. Innovation, for our students, is something that happens on top of a large stack of previous innovation that’s just accepted and left untouched. And this barrier — as much mental as technological — is the key difference between their experience of computing and mine. I grew up with computers that could be — and indeed had to be — understood from the bare metal up. One could rebuild all the software in a way that’d be immensely more challenging now, given the level of function we’ve come to expect. This is far more of a difference than simply an additional couple of decades of experience with technology and research: it sits at the heart of where the next generation will see the value of their efforts, and of where they can change the world: in services that sit at the top of the value chain, rather than in the plumbing down at its base. Once we understand that, it becomes clearer what and how we should teach the skills they’ll need in order best to apply themselves to the challenges they’ll select as worth their time. And I’ll look forward to seeing what these result in. Congratulations to the graduating class of 2011. Have great lives, and build great things.

Why is my wheelie bin measured in decibels?

An unexpected curiosity arising from a common household appliance.

I’ve just been clearing up the remains of a tree that came down in my garden after the recent storms. Morningside isn’t generally noted for hurricane-force winds, but we got them a fortnight or so ago while we were away. In doing so I noticed that the inside of the wheelie bin that we’re supplied with by Edinburgh council for garden waste has a peculiar marking:

Wheeliebin decibels

This seems to indicate that there’s something about the bin measured in decibels: a logarithmic unit of relative power. There’s also what looks like a speaker next to it.

Which rather begs the question: why is my wheelie bin measured in decibels?

My first thought was sound: wheelie bins are notoriously noisy when wheeled around, so perhaps this is the sound output one expects from this particular model. However, 99dB is approximately the sound level of a jackhammer at 1m distance, and considerably more than the sound level at which one is recommended to wear ear defenders.  Much as I dislike wheelie bins being wheeled around early in the morning, I doubt they’re a threat to my hearing.

Perhaps this is a level of sound that the wheelie bin can muffle? Quality product though it is, it hardly seems likely that it would muffle the sound of a jackhammer being used inside it. Even if one wanted to. And such an application seems, shall we say, a little exotic for the manufacturer to have printed this specification on every wheelie bin they sell. If this is the case, it should perhaps be better advertised.

It could be the sound made by a wheelie bin full of bottles being tipped out, but that’s surely a function of the bottles and the manner in which they’re emptied rather than being a property that should be stamped on the bin.

Another use of decibels is in electronics, specifically to measure the power of an amplifier or radio antenna. It’d certainly be possible to use a wheelie bin as an amplifier for a speaker, although that too sounds somewhat esoteric. As a radio antenna it suffers the disadvantage of not being conductive and so not suitable as a waveguide. I suppose you could coat the inside with tinfoil, but we’re again into not-exactly-mainstream-customer-uses territory.

So I’m somewhat at a loss: any suggestions, however inane, gratefully received.

Lectureship in Computer Science at St Andrews

The School has an opening for a lecturer (assistant professor) in any discipline that matches our research interests.

Lectureship at St Andrews

Lecturer in Computer Science – SK8461 School of Computer Science £36,862 – £45,336 per annum. Starting September 2011 or as soon as possible thereafter. Standard appointment. The Scottish Informatics and Computer Science Alliance (SICSA) is creating a world-leading Computer Science research community across the universities in Scotland. As part of this initiative, we seek lectureship applications from researchers with expertise in the SICSA themes of Next Generation Internet; Complex Systems Engineering; Multi-modal Interaction and Modelling & Abstraction. We are particularly interested in candidates with expertise in sensor systems, multicore systems, embedded systems, data intensive systems or wireless communications and especially those who bridge two or more of these areas. You should have a PhD and have an outstanding research record as demonstrated by publications and research funding. You must be willing to cooperate with other researchers across Scotland and contribute to the work of SICSA and to teach in any area of computer science. A period of postdoctoral experience and publications that reflect your experience is essential. Teaching is important to us and we expect candidates to be committed teachers, with appropriate experience. We have a growing portfolio of Masters level courses and welcome those who have an interest in contributing to their development. Candidates interested in this post are welcome to informally contact the Head of School (Alan Dearle) to discuss the opportunity. Ref No: SK8461 Closing Date: 27 July 2011 Further Particulars: SK8461 FPs.doc

PhD position available in intrusion detection

A colleague of mine has a fully-funded PhD studentship available in web security and intrusion detection.

PhD Studentship in Immuno-inspired Web Intrusion Detection

We invite applicants for a 3 year funded PhD position at the Department of Computer and Information Sciences, University of Strathclyde. The increase in the number of reported cyber-attacks and the sophistication of their techniques is driving developments in Intrusion Detection Systems (IDS) that are able to detect them in order to take action against them. Despite significant success in the detection of previously known attacks (misuse detection) our ability to reliably detect novel attacks remains limited. In this context, it has long been observed that the role of IDS in computer systems is analogous to the role of the Human Immune System (HIS), and models of HIS operation have inspired IDS techniques. Taking inspiration from the HIS Danger Theory model (DT), we have proposed distress detection as a symptom-based approach to IDS. A key challenge for investigations in this area is the lack of appropriate experimental testbeds and datasets. Existing datasets do not include the symptoms of cyber-attacks, while testbeds are limited in their ability to capture those symptoms. In order to address this challenge the aim of this project is to develop an experimental testbed for the exploration of symptom-based Web IDS. The studentship will start in October 2011 and covers University Home fees plus a student stipend for 3 years (c. £13,590 for 2011/12). The work will be co-supervised by Dr Sotirios Terzis and Dr Marc Roper. All applicants must possess or be about to obtain a 1st class or 2.1 Honours degree or equivalent in a relevant discipline. The type of candidate sought will have strong technical computer science/technical skills, ideally some experience web system administration and low-level systems programming, an enthusiasm for research coupled with a dogged persistence, a broad outlook and the ability to explore new ideas in depth, an ability to rapidly absorb new technical innovations. For further details see  here.

Call for papers: MidSens‘11

Papers are invited on topics in middleware, tools and services for sensor and other embedded systems.

Sixth International Workshop on Middleware Tools, Services and Run-time Support for Networked Embedded Systems (MidSens’11)

Co-located with Middleware 2011 (December 12th - December 16th, 2011), Lisbon, Portugal

The aim of MidSens’11 is to stimulate research in the specific domain of middleware for networked embedded systems. This year’s focus is on sensor networks and robotics control – a broader focus than the previous editions – since we believe that the extended scope will result in complementary and synergetic submissions from researchers working in both niches. Along with the ‘core’ topic of middleware architectures, services and tool support, MidSens’11 will also seek quality papers describing novel programming languages, run-time support and relevant experience reports. As with previous editions of this workshop, MidSens’11 will investigate how middleware support can relieve developers from low-level, platform specific concerns, while enabling optimal exploitation of available resources. We hope that you will be able to join us in Lisbon on December 12th 2011. Middleware for networked embedded systems such as sensor networks and robotics is a critical research domain which addresses key challenges that application developers are facing today. The five previous editions of this workshop (MidSens‘06, MidSens‘07, MidSens‘08, MidSens‘09 and MidSens‘10) attracted researchers from Europe, Asia, and the United States. The MidSens workshop series has served to trigger and guide research efforts to create an integrated middleware vision, which is required to handle the challenges inherent in developing, deploying and managing complex networked embedded applications in an efficient way. The workshop seeks papers in, but not limited to:
  • Middleware Tools and Architectures:
    • Architectures for networked embedded systems.
    • Novel programming abstractions.
    • Lightweight agent middleware for embedded systems.
    • Testing and simulation tools.
    • Fault identification, diagnosis and repair.
  • Middleware services:
    • Location tracking, localization, and synchronization.
    • Support for real-time and safety-critical systems.
    • Data management, aggregation and filtering.
    • Energy-aware middleware mechanisms.
    • Fault tolerance, reliability and quality of service.
    • Privacy and security services.
    • Virtualization, sharing and trading of resources.
  • Run-time Support:
    • Overlay and topology creation, maintenance and management.
    • Resource/Service discovery and management.
    • Support for reconfiguration and adaptation.
    • Effective naming and addressing schemes.
    • Support for modeling and enacting safe software reconfiguration.
  • Management and Experiences:
    • Managing heterogeneity and network dynamism.
    • Integration of embedded systems with web services.
    • Experience and evaluation of middleware platforms.
    • Support for the unification of various networked embedded platforms.
    • Shared infrastructure embedded systems.

Submission

Submitted papers must be original work in English without substantial overlap with papers that have been published or that are simultaneously submitted to a journal or conference with proceedings. Submissions must not exceed 6 pages, must strictly follow the ACM conference proceedings format, and must be submitted in PDF format. All workshop papers will be uploaded to the ACM Digital Library. Full instructions can be found here.

Important dates

  • Paper submission: 15 August 2011
  • Review notification: 29 September 2011
  • Camera-ready: 10 October 2011
  • Registration: 7 October 2011

Programme committee

  • Gordon Blair, Lancaster University, UK
  • Vinny Cahill, Trinity College, Ireland
  • Paolo Costa, Imperial College London, UK
  • Simon Dobson, University of St. Andrews, UK
  • Michael Fisher, University of Liverpool, UK
  • Wen Hu, CSIRO, Australia
  • Joerg Kaiser, University of Magdeburg, Germany
  • Torsten Kroeger, Stanford University, USA
  • Ajay Kshemkalyani, University of Illinois at Chicago
  • Kristof Van Laerhoven, Technical University of Darmstadt
  • Sam Michiels, K.U.Leuven, Belgium
  • Nader Mohamed, United Arab Emirates University, UAE
  • Luca Mottola, SICS, Sweden
  • Mirco Musolesi, University of Birmingham, UK
  • Dennis Pfisterer, University of Lübeck, Germany
  • Kay Römer, University of Lübeck, Germany
  • Coen De Roover, Vrije Universiteit Brussel, Belgium
  • Romain Rouvoy, INRIA Lille, France
  • Jo Ueyama, Universidade de Sao Paulo, Brazil