Uva-DARE (Digital Academic Repository)

Total Page:16

File Type:pdf, Size:1020Kb

Uva-DARE (Digital Academic Repository) UvA-DARE (Digital Academic Repository) Gathering evidence: Model-driven software engineering in automated digital forensics van den Bos, J. Publication date 2014 Link to publication Citation for published version (APA): van den Bos, J. (2014). Gathering evidence: Model-driven software engineering in automated digital forensics. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 Bibliography [AB11] Leon Aronson and Jeroen van den Bos. Towards an Engineering Ap- proach to File Carver Construction. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pages 368–373. IEEE, 2011. (page 18, 19) [AC72] Frances Allen and John Cocke. A Catalogue of Optimizing Transforma- tions. In Design and Optimization of Compilers, pages 1–30. Prentice-Hall, 1972. (page 72) [ALSU06] Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey Ullman. Com- pilers: Principles, Techniques, and Tools. Prentice Hall, 2 edition, 2006. (page 67) [Alv11] Lizette Alvarez. Software Designer Reports Error in Anthony Trial. The New York Times, July 2011. http://www.nytimes.com/2011/07/19/us/ 19casey.html. (page 3) [AT05] Ahmad Almulhem and Issa Traore. Experience with Engineering a Network Forensics System. In Cheeha Kim, editor, Proceedings of the International Conference on Information Networking, Convergence in Broad- band and Mobile Networking (ICOIN’05), volume 3391 of Lecture Notes in Computer Science, pages 62–71. Springer, 2005. (page 14) [Axe10] Stefan Axelsson. The Normalised Compression Distance as a File Frag- ment Classifier. Digital Investigation, 7(S1):24–31, 2010. Proceedings of the Tenth Annual DFRWS Conference. (page 24) [Bac02] Godmar Back. DataScript—A Specification and Scripting Language for Binary Data. In Proceedings of the 1st ACM SIGPLAN/SIGSOFT Con- ference on Generative Programming and Component Engineering (GPCE’02), volume 2487 of Lecture Notes in Computer Science, pages 66–77. Springer, 2002. (page 54) 117 Bibliography [BBB+12] Raoul A. F. Bhoedjang, Alex R. van Ballegooij, Harm M. A. van Beek, John C. van Schie, Feike W. Dillema, Ruud B. van Baar, Floris A. Ouwendijk, and Micha Streppel. Engineering an Online Computer Forensic Service. Digital Investigation, 9(2):96–108, 2012. (page 14, 15) [BBI+04] Grady Booch, Alan W. Brown, Sridhar Iyengar, James Rumbaugh, and Bran Selic. An MDA Manifesto. Business Process Trends/MDA Journal, May 2004. (page 10) [BCK12] Len Bass, Paul Clements, and Rick Kazman. Software Architecture in Practice. Addison-Wesley, third edition, 2012. (page 4) [Bee09] Nicole Beebe. Digital Forensic Research: The Good, the Bad and the Unaddressed. In Gilbert L. Peterson and Sujeet Shenoi, editors, Revised Selected Papers from Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, pages 17–36. Springer, 2009. (page 13) [Béz06] Jean Bézivin. Model Driven Engineering: An Emerging Technical Space. In Generative and Transformational Techniques in Software Engi- neering, volume 4143 of Lecture Notes in Computer Science, pages 36–64. Springer, 2006. (page 10, 72) [BHK+11] Jeroen van den Bos, Mark Hills, Paul Klint, Tijs van der Storm, and Jurgen J. Vinju. Rascal: From Algebraic Specification to Meta- Programming. In Francisco Durán and Vlad Rusu, editors, Proceedings Second International Workshop on Algebraic Methods in Model-based Soft- ware Engineering (AMMSE’11), volume 56 of Electronic Proceedings in Theoretical Computer Science, pages 15–32, 2011. (page 114) [BJMH02] Don Batory, Clay Johnson, Bob MacDonald, and Dale von Heeder. Achieving Extensibility through Product-Lines and Domain-Specific Languages: A Case Study. ACM Transactions on Software Engineering and Methodology, 11(2), April 2002. (page 11) [BJS10] Marius Bozga, Mohamad Jaber, and Joseph Sifakis. Source-to-Source Architecture Transformation for Performance Optimization in BIP. IEEE Transactions on Industrial Informatics, 6(4):708–718, 2010. (page 72) [BK05] Jeroen van den Bos and Ronald van der Knijff. TULP2G: An Open Source Forensic Software Framework for Acquiring and Decoding Data Stored in Electronic Devices. International Journal of Digital Evidence, 4(2), 2005. (page 14) 118 Bibliography [BLW05] Paul Baker, Shiou Loh, and Frank Weil. Model-Driven Engineering in a Large Industrial Context—Motorola Case Study. In Proceedings of the 8th International Conference on Model Driven Engineering Languages and Systems (MODELS’05), volume 3713 of Lecture Notes in Computer Science, pages 476–491. Springer, 2005. (page 54) [BP08] Jean Bovet and Terence Parr. ANTLRWorks: an ANTLR grammar de- velopment environment. Software: Practice & Experience, 38(12):1305– 1332, 2008. (page 101) [BRLM07] Laurent Burgy, Laurent Reveillere, Julia L. Lawall, and Gilles Muller. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS’07), pages 149–160, 2007. (page 54) [BS11] Jeroen van den Bos and Tijs van der Storm. Bringing Domain-Specific Languages to Digital Forensics. In 33rd International Conference on Soft- ware Engineering (ICSE’11), pages 671–680. ACM, 2011. (page 18, 35) [BS12] Jeroen van den Bos and Tijs van der Storm. Domain-Specific Optimiza- tion in Digital Forensics. In Zhenjiang Hu and Juan de Lara, editors, 5th International Conference on Model Transformation (ICMT’12), volume 7307 of Lecture Notes in Computer Science, pages 121–136. Springer, 2012. (page 18, 57) [BS13a] Jeroen van den Bos and Tijs van der Storm. A Case Study in Evidence- Based DSL Evolution. In Pieter Van Gorp, Tom Ritter, and Louis M. Rose, editors, 9th European Conference on Modelling Foundations and Ap- plications (ECMFA’13), volume 7949 of Lecture Notes in Computer Science, pages 207–219. Springer, 2013. (page 18, 77) [BS13b] Jeroen van den Bos and Tijs van der Storm. TRINITY: An IDE for The Matrix. In 29th IEEE International Conference on Software Maintenance (ICSM’13), pages 520–523. IEEE, 2013. (page 18, 93) [BV04] Martin Bravenboer and Eelco Visser. Concrete Syntax for Objects: Domain-Specific Language Embedding and Assimilation without Re- strictions. In Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA’04), pages 365–383. ACM, 2004. (page 12) [Car] Brian Carrier. Digital Forensics Tool Testing Images. http://dftt. sourceforge.net/. (page 48) 119 Bibliography [Car05] Brian Carrier. File System Forensic Analysis. Addison-Wesley, 2005. (page 5, 7) [Cas09] Eoghan Casey, editor. Handbook of Digital Forensics and Investigation. Academic Press, 2009. (page 5) [CBDM01] Eui-Young Chung, Luca Benini, and Giovanni De Micheli. Source Code Transformation based on Software Cost Analysis. In Proceedings of the 14th International Symposium on Systems Synthesis (ISSS’01), pages 153– 158. ACM, 2001. (page 72) [CBS+10] Gregory Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, and Robert Perez- Alemany. Automated Mapping of Large Binary Objects using Primi- tive Fragment Type Classification. Digital Investigation, 7(S1):3–12, 2010. Proceedings of the Tenth Annual DFRWS Conference. (page 24) [CE00] Krzysztof Czarnecki and Ulrich Eisenecker. Generative Programming: Methods, Tools, and Applications. Addison Wesley, 2000. (page 72) [Cen09] Centraal Bureau voor de Statistiek. De Digitale Economie. 2009. In Dutch. (page 40) [CH06] Krzysztof Czarnecki and Simon Helsen. Feature-Based Survey of Model Transformation Approaches. IBM Systems Journal, 45(3):621–646, 2006. (page 47) [Coh07] Michael I. Cohen. Advanced Carving Techniques. Digital Investigation, 4(3-4):119–128, 2007. (page 23, 45, 63, 73, 96) [DK98] Arie van Deursen and Paul Klint. Little Languages: Little Mainte- nance? Journal of Software Maintenance, 10(2):75–92, 1998. (page 11, 78) [DKT93] Arie van Deursen, Paul Klint, and Frank Tip. Origin tracking. Journal of Symbolic Computation, 15:523–545, 1993. (page 100) [DKV00] Arie van Deursen, Paul Klint, and Joost Visser. Domain-Specific Lan- guages: An Annotated Bibliography. SIGPLAN Notices, 35(6):26–36, 2000. (page 11, 54, 78) [DRIP12] Davide Di Ruscio, Ludovico Iovino, and Alfonso Pierantonio. Coupled Evolution in Model-Driven Engineering. IEEE Software, 29(6):78–84, 2012. (page 91) 120 Bibliography [ERKO11] Sebastian Erdweg, Tillmann Rendel, Christian Kästner, and Klaus Ostermann. SugarJ: Library-based Syntactic Language Extensibil- ity. In Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming,
Recommended publications
  • Parallel Program Graphs and Their Classi Cation
    Parallel Program Graphs and their Classication Vivek Sarkar Barbara Simons IBM Santa Teresa Lab oratory Bailey Avenue San Jose CA fvivek sarkarsimonsgvnetib mcom Abstract We categorize and compare dierent representations of pro gram dep endence graphs including the Control Flow Graph CFG which is a sequential representation lacking data dep endences the Program Dep endence Graph PDG which is a parallel representation of a se quential program and is comprised of control and data dep endences and more generally the Parallel Program Graph PPG which is a parallel representation of sequential and inherently parallel programs and is comprised of parallel control ow edges and synchronization edges PPGs are classied according to their graphical structure and prop erties related to deadlo ck detection and serializabil i ty Intro duction The imp ortance of optimizing compilers has increased dramatically with the development of multipro cessor computers Writing correct and ecient parallel co de is quite dicult at b est writing such software and making it p ortable cur rently is almost imp ossible Intermediate forms are required b oth for optimiza tion and p ortability A natural intermediate form is the graph that represents the instructions of the program and the dep endences that exist b etween them This is the role played by the Parallel Program Graph PPG The Control Flow Graph CFG in turn is required once p ortions of the PPG have b een mapp ed onto individual pro cessors PPGs are a generalization of Program Dep endence Graphs PDGs which have
    [Show full text]
  • Incremental Computation of Static Single Assignment Form
    Incremental Computation of Static Single Assignment Form Jong-Deok Choi 1 and Vivek Sarkar 2 and Edith Schonberg 3 IBM T.J. Watson Research Center, P. O. Box 704, Yorktown Heights, NY 10598 ([email protected]) 2 IBM Software Solutions Division, 555 Bailey Avenue, San Jose, CA 95141 ([email protected]) IBM T.J. Watson Research Center, P. O. Box 704, Yorktown Heights, NY 10598 ([email protected]) Abstract. Static single assignment (SSA) form is an intermediate rep- resentation that is well suited for solving many data flow optimization problems. However, since the standard algorithm for building SSA form is exhaustive, maintaining correct SSA form throughout a multi-pass com- pilation process can be expensive. In this paper, we present incremental algorithms for restoring correct SSA form after program transformations. First, we specify incremental SSA algorithms for insertion and deletion of a use/definition of a variable, and for a large class of updates on intervals. We characterize several cases for which the cost of these algorithms will be proportional to the size of the transformed region and hence poten- tially much smaller than the cost of the exhaustive algorithm. Secondly, we specify customized SSA-update algorithms for a set of common loop transformations. These algorithms are highly efficient: the cost depends at worst on the size of the transformed code, and in many cases the cost is independent of the loop body size and depends only on the number of loops. 1 Introduction Static single assignment (SSA) [8, 6] form is a compact intermediate program representation that is well suited to a large number of compiler optimization algorithms, including constant propagation [19], global value numbering [3], and program equivalence detection [21].
    [Show full text]
  • Arxiv:2106.11534V1 [Cs.DL] 22 Jun 2021 2 Nanjing University of Science and Technology, Nanjing, China 3 University of Southampton, Southampton, U.K
    Noname manuscript No. (will be inserted by the editor) Turing Award elites revisited: patterns of productivity, collaboration, authorship and impact Yinyu Jin1 · Sha Yuan1∗ · Zhou Shao2, 4 · Wendy Hall3 · Jie Tang4 Received: date / Accepted: date Abstract The Turing Award is recognized as the most influential and presti- gious award in the field of computer science(CS). With the rise of the science of science (SciSci), a large amount of bibliographic data has been analyzed in an attempt to understand the hidden mechanism of scientific evolution. These include the analysis of the Nobel Prize, including physics, chemistry, medicine, etc. In this article, we extract and analyze the data of 72 Turing Award lau- reates from the complete bibliographic data, fill the gap in the lack of Turing Award analysis, and discover the development characteristics of computer sci- ence as an independent discipline. First, we show most Turing Award laureates have long-term and high-quality educational backgrounds, and more than 61% of them have a degree in mathematics, which indicates that mathematics has played a significant role in the development of computer science. Secondly, the data shows that not all scholars have high productivity and high h-index; that is, the number of publications and h-index is not the leading indicator for evaluating the Turing Award. Third, the average age of awardees has increased from 40 to around 70 in recent years. This may be because new breakthroughs take longer, and some new technologies need time to prove their influence. Besides, we have also found that in the past ten years, international collabo- ration has experienced explosive growth, showing a new paradigm in the form of collaboration.
    [Show full text]
  • Alan Mathison Turing and the Turing Award Winners
    Alan Turing and the Turing Award Winners A Short Journey Through the History of Computer TítuloScience do capítulo Luis Lamb, 22 June 2012 Slides by Luis C. Lamb Alan Mathison Turing A.M. Turing, 1951 Turing by Stephen Kettle, 2007 by Slides by Luis C. Lamb Assumptions • I assume knowlege of Computing as a Science. • I shall not talk about computing before Turing: Leibniz, Babbage, Boole, Gödel... • I shall not detail theorems or algorithms. • I shall apologize for omissions at the end of this presentation. • Comprehensive information about Turing can be found at http://www.mathcomp.leeds.ac.uk/turing2012/ • The full version of this talk is available upon request. Slides by Luis C. Lamb Alan Mathison Turing § Born 23 June 1912: 2 Warrington Crescent, Maida Vale, London W9 Google maps Slides by Luis C. Lamb Alan Mathison Turing: short biography • 1922: Attends Hazlehurst Preparatory School • ’26: Sherborne School Dorset • ’31: King’s College Cambridge, Maths (graduates in ‘34). • ’35: Elected to Fellowship of King’s College Cambridge • ’36: Publishes “On Computable Numbers, with an Application to the Entscheindungsproblem”, Journal of the London Math. Soc. • ’38: PhD Princeton (viva on 21 June) : “Systems of Logic Based on Ordinals”, supervised by Alonzo Church. • Letter to Philipp Hall: “I hope Hitler will not have invaded England before I come back.” • ’39 Joins Bletchley Park: designs the “Bombe”. • ’40: First Bombes are fully operational • ’41: Breaks the German Naval Enigma. • ’42-44: Several contibutions to war effort on codebreaking; secure speech devices; computing. • ’45: Automatic Computing Engine (ACE) Computer. Slides by Luis C.
    [Show full text]
  • First Woman to Receive ACM Turing Award Contact: Virginia Gold 212-626-0505 [email protected]
    First Woman to Receive ACM Turing Award Contact: Virginia Gold 212-626-0505 [email protected] Cameron Wilson 202-659-9712 [email protected] IBM Fellow Emerita Frances Allen Responsible for Innovations to High Speed Computing; Work Inspired Generations of Computer Scientists New York, NY, February 21, 2007 – ACM, the Association for Computing Machinery, has named Frances E. Allen the recipient of the 2006 A.M. Turing Award for contributions that fundamentally improved the performance of computer programs in solving problems, and accelerated the use of high performance computing. This award marks the first time that a woman has received this honor. The Turing Award, first presented in 1966, and named for British mathematician Alan M. Turing, is widely considered the "Nobel Prize in Computing." It carries a $100,000 prize, with financial support provided by Intel Corporation. Allen, an IBM Fellow Emerita at the T.J. Watson Research Center, made fundamental contributions to the theory and practice of program optimization, which translates the users' problem-solving language statements into more efficient sequences of computer instructions. Her contributions also greatly extended earlier work in automatic program parallelization, which enables programs to use multiple processors simultaneously in order to obtain faster results. These techniques have made it possible to achieve high performance from computers while programming them in languages suitable to applications. They have contributed to advances in the use of high performance computers for solving problems such as weather forecasting, DNA matching, and national security functions. "Fran Allen's work has led to remarkable advances in compiler design and machine architecture that are at the foundation of modern high-performance computing," said Ruzena Bajcsy, Chair of ACM's Turing Award Committee, and professor of Electrical and Engineering and Computer Science at the University of California, Berkeley.
    [Show full text]
  • In Memory of Jacob Schwartz
    In Memory of Jacob Schwartz Sal Anastasio, Coordinating Editor —The outstanding contributions Jack had made to many fields and his ability to enter a field new to him, master it, make significant contributions, and move on. —Jack’s exceptional kindness and generosity. Eugenio Omodeo spoke of his “deep empathy with others”; Edmond Schonberg said that “his generosity had changed the lives of many;” and his sister, Judith, said that, to Jack, “acts of exceptional kindness were perfectly routine” and that his “stunning generosity…did not look for thanks” and “he was puzzled and even annoyed when they came.” —Finally, and in a lighter vein, Jack’s addiction to particular Chinese restaurants whose quality ranged from, at best, “mediocre,” to, at worst, “loathsome.” Jacob Theodore Schwartz was born on January 9, 1930, in the Bronx, New York City, of immigrant parents: his father, Ignatz, from Hungary, and his Photo courtesy of NYU Publicity for Courant. mother, Hedwig, from Germany. At every level of Jack Schwartz. his life, Jack was precocious. As a child he was an omnivorous reader. He attended Stuyvesant, a high school for gifted students. At age nineteen A few months after Jack Schwartz’s death on he graduated from the City College of New York (a producer of many Nobel Prize winners and March 2, 2009, a memorial gathering was held frequently called, at that time, “the poor man’s for him at the Courant Institute of New York Harvard”). While there, he studied with E. L. Post. University, his home base for almost fifty years. His friend and colleague Martin Davis recalls The well-planned program included a few piano that Jack interpreted one of Post’s remarks as pieces and almost a dozen speakers, each of whom expressing a need for a proof that all recursive had collaborated with Jack in one or more of his functions are Turing computable, and Jack sent many activities.
    [Show full text]
  • A Selective Chronology of IBM Women in Technology
    A Selective Chronology Of IBM Women In Technology 1890s 1899 The Computing Scale Company, one of three companies that will form the Computing - Tabulating - Recording Company (C-T-R) in 1911, hires Richard MacGregor, a Black employee, as well as Lilly J. Philp, Nettie A. Moore and Emma K. Manske. This occurs 10 years before the National Association for the Advancement of Colored People (NAACP) was founded, 36 years after President Lincoln signed the Emancipation Proclamation and 20 years before women won the right to vote. In 1924, these four employees help inaugurate IBM’s first Quarter Century Club. 1910s 1918 Clara Doring, Virginia Kempton, Rugh L. Schiele and Miriam R. Shott -- employees of an IBM predecessor company -- attend the Tabulating Machine School to learn about the mechanics and applications of punched card technology. 1920s 1924 Women join IBM’s first Quarter Century Club, created to honor employees with 25 years of service. 1929 Virginia L. Linkenhoker organizes IBM’s first customer training school. 1930s 1935 IBM hires its first professional women, 25 college seniors recruited for Systems Service They are graduates of IBM’s first women’s systems service class at Endicott, N.Y., in 1935. 1935 Thomas J. Watson, Sr. champions the introduction of women into IBM’s professional ranks, as the company holds its first systems service class for women. These pioneering women are the first wave of IBM female employees to take on customer contact positions traditionally filled by men. 1935 Virginia L. Linkenhoker becomes IBM’s first full-time system service woman. She is soon followed by the graduates of IBM’s first systems service class for women.
    [Show full text]
  • What Are the Important Problems for Programming Languages?
    What are the important problems for programming languages? Philip Wadler, University of Edinburgh [email protected] Part I Hamming Richard W. Hamming, 1915–1998 • Los Alamos, 1945. • Bell Labs, 1946–1976. • Naval Postgraduate School, 1976–1998. • Turing Award, 1968. (Third time given.) • IEEE Hamming Medal, 1987. (First time given.) What are the important problems? Hamming started to eat at the Chemistry table. “I started asking, ‘What are the important problems of your field?’ And after a week or so, ‘What important problems are you working on?’ And after some more time I came in one day and said, ‘If what you are doing is not important, why are you working on it?’ I wasn’t welcomed after that. “In the fall, Dave McCall stopped me in the hall and said, ‘Hamming, that remark of yours got underneath my skin. I thought about it all summer. I haven’t changed my research, but I think it was well worthwhile.’ I noticed a couple of months later he was made the head of the department. I noticed the other day he was a Member of the National Academy of Engineering. I have never again heard the names of any of the other fellows.” — Hamming You need an attack “If you do not work on an important problem, it’s unlikely you’ll do important work. It’s perfectly obvious. “Let me warn you, ‘important problem’ must be phrased carefully. The three outstanding problems in physics, in a certain sense, were never worked on while I was at Bell Labs. By important I mean guaranteed a Nobel Prize and any sum of money you want to mention.
    [Show full text]
  • Publications Core Magazine, 2012 This
    2012 COMMEMORATIVE ISSUE C O RE A Publication of 25 Years of the Fellow Awards the Computer The Origins of Timesharing History Museum An Evening with Walter Isaacson Close up of the Amdahl 470V/6 Computer, 1975. The 470V/6 was the Amdahl Corporation’s fi rst product and ran the same software as IBM System/370 computers but cost less and was smaller and faster. Opposite page: Close-up of IBM 305 RAMAC System Diagram B CORE 2012 / HALL OF FELLOWS DEPARTMENTS MUSEUM UPDATES EXPLORE THE COLLECTION 2 4 6 56 60 58 Contributors An Analog Life An Evening with Oral Histories: Donor Profile Recent Artifact Walter Isaacson The Origins of Donations 3 5 61 Timesharing CEO’s Letter Talking to the Future 7 Museum Donors The President @ CHM C O RE 2012 9 SPECIAL SECTION: TWENTY-FIVE YEARS OF FELLOWS 10 12 14 18 The Fellow Awards Fellows at a Glance Visionary Pioneer 25 Years of Fellows It was 25 years ago that the See an overview of our Fellows— Grace Murray Hopper was a The Computer History Museum Museum began its Fellows where they studied and worked unique individual: a woman in a Fellows often have very inter- program. Since that time, the and what they are known for—in man’s world of computers and esting life trajectories, full of Award has been given to over this two-page chart that shows mathematics and an admiral in dramatic turns and unexpected 60 outstanding individuals in 25 years of Fellows history in an the U.S. Naval Reserve.
    [Show full text]
  • Women in Computing in Celebration of March: Women’S History Month, CS Bits & Bytes Is Featuring Stories of Contributions by Women to Computing
    CS Bits & Bytes is a bi-weekly newsletter highlighting innovative computer science research. It is our hope that you will use CS Bits & Bytes to engage in the multi-faceted world of computer science to become not just a user, but a creator of technology. Please visit our website at: http://www.nsf.gov/cise/csbytes. March 12, 2012 Volume 1, Issue 7 Women in Computing In celebration of March: Women’s History Month, CS Bits & Bytes is featuring stories of contributions by women to computing. Women have significantly impacted computing throughout history! The very first computer programmer was a woman born in the 1800s! In 1842, Ada Lovelace, an English mathematician, wrote notes on a newly invented machine by Charles Babbage called the Difference Engine and later the Analytical Engine. The engine is now rec- ognized as an early model for a computer, so early that it was entirely mechanical and used no electricity. The notes included a method for calculating a sequence of Bernoulli numbers. Her method is recognized as the world’s first computer program. To see a video of the Dif- ference Engine in action, go to: http://www.wired.com/gadgetlab/2008/05/exclusive-video/. During World War II, six women were hired to “program” the ENIAC (Electronic Numerical Integrator and Computer), the first general purpose electronic digital computer developed to compute tactical trajectories. Previously, these trajectories were computed by Ada Lovelace. Photo courtesy of Wiki Commons. hand and required doing thousands of mathematical calculations. These “Women of ENIAC” were the first professional programmers. Programming then was very different than it is now as the machine was controlled by electrical cables that were plugged into boards in different configurations.
    [Show full text]
  • Seminar: Turing Award Winners and Their Contributions 1
    Seminar: Turing Award Winners and Their Contributions 1. Organization, Dates & Topics Malte Helmert, Augusto Blaas Corr^eaand Florian Pommerening University of Basel September 17, 2020 Protective measures at the University of Basel Students are to wear masks on Masks do not have to be worn Masks must be worn outside the the way to their seats and again during lessons. lecture rooms. when they leave their seats. Eating during lessons is Students must clean their work Rooms with windows will be prohibited. surfaces before the start of the ventilated before lectures. This is lesson. the responsibility of teaching staff. Titel, Datum, Autor Universität Basel 1 Turing Award Winners and Their Contributions Organization Topics and Next Steps Seminar: Turing Award Winners and Their Contributions 1. Organization, Dates & Topics Malte Helmert, Augusto Blaas Corr^eaand Florian Pommerening University of Basel September 17, 2020 Turing Award Winners and Their Contributions Organization Topics and Next Steps Turing Award Winners and Their Contributions Turing Award Winners and Their Contributions Organization Topics and Next Steps Seminar Topic { Turing Award Turing Award is the \Nobel Prize of Computing" Awarded by the ACM since 1966 First winner: Alan Perlis, inventor of ALGOL Latest winners: Edwin Catmull and Pat Hanrahan, contributions to computer graphics Helps to tell part of the history of modern computer science Turing Award Winners and Their Contributions Organization Topics and Next Steps Some Turing Award Trivia Researchers from 13 different nationalities won the award Only US, UK, Israel, Canada, France and Norway have multiple winners Niklaus Wirth is the only Swiss person to ever win the award Joseph Sifakis (Greece) won the award while working at EPFL No money prize until 2007 2007{2013: 250,000 USD Since 2014: 1,000,000 USD Turing Award Winners and Their Contributions Organization Topics and Next Steps Some of the Winners John McCarthy Donald Knuth Stephen Cook Vint Cerf Frances Allen Edmund M.
    [Show full text]
  • Co-Authorship Proximity of A. M. Turing Award and John Von Neumann Medal Winners to the Disciplinary Boundaries of Computer Science
    Fields, p. 1 of 23 Co-authorship proximity of A. M. Turing Award and John von Neumann Medal winners to the disciplinary boundaries of computer science Chris Fields 528 Zinnia Court Sonoma, CA 95476 USA [email protected] Keywords: Biomedical sciences; Computer science; Cross-disciplinary brokers; Erdős numbers; Graph centrality; Interdisciplinarity Abstract It is shown that winners of the A. M. Turing Award or the John von Neumann Medal, both of which recognize achievement in computer science, are separated from some other A. M. Turing Award or John von Neumann Medal winner by at most 1.4 co-authorship steps on average, and from some cross- disciplinary broker, and hence from some discipline other than computer science, by at most 1.6 co- authorship steps on average. A. M. Turing Award and John von Neumann Medal recipients during this period are, therefore, on average closer in co-authorship terms to some other discipline that typical computer scientists are, on average, to each other. Introduction How are the most prominent and widely-recognized members of any scientific discipline distributed within the social network formed by that discipline? More specifically, how are the most prominent members of a discipline distributed within the co-authorship graph of that discipline? Studies of co- authorship paths traversing cross-disciplinary brokers (Fields, 2015) and of co-authorship connections of Nobel laureates in Physiology or Medicine (Fields, 2014; in press) suggest a surprising answer: prominent intellectual and, in many cases, political leaders of several disciplines appear to be located near the co-authorship boundaries of their disciplines, in close proximity to cross-disciplinary brokers.
    [Show full text]