Title: BEYOND-THE-HORIZON Anticipating Future and Emerging Information Society Technologies
1BEYOND-THE-HORIZON Anticipating Future and
Emerging Information Society Technologies
- BEYOND-THE-HORIZON is a Coordination Action
funded by the EC IST Programme in FP6Future and
Emerging Technologies Activity under contract
no. 006662 - Keith G Jeffery ERCIM President
2Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
3ERCIM Members
ERCIM is a consortium of leading research
institutions from 18 Europeancountriescommitted
to information technology and applied
mathematics.
4in a Nutshell
- gt 12000 researchers in major ICT labs in 18
countries virtual organisation - 2 more in process of joining
- National nodes for industrial and academic
communities leverage - European W3C Host, centrally and regionally
- Working Groups wide spectrum of subject areas
across ICT - Research projects technology transfer to
European industry - gt 100 spin-out companies from ERCIM institutes
- Consultancy advice and assistance
- (especially) to EC
- national governments
- Fellowships European human capital mobility
- Dissemination ERCIM News, Reports
5For further information
ERCIM Website http//www.ercim.org/
ERCIM News Quarterly magazine (free subscription)
ERCIM Office, BP 93, F-06904 Sophia Antipolis Tel
33 4 92 38 50 10 Fax 33 4 92 38 50 11
E-mail office_at_ercim.org
6Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
7Looking Back Technology
- ICT used for industrial services
- Accounting
- Stock control
- Production scheduling
- Then for office functions
- Email, calendar, documents
- Then for decision support
- Control room
- Management
8Current State Technology
- Characteristics
- Price/performance
- Moores Law for processor power
- more impressive for storage systems
- Distributed, connected
- Data-information-knowledge
- Used For
- Modelling and simulation
- Business processes
- Knowledge-assisted decisions
9Future Working Smarter
- Need not only to excel at RD but also
- Need to turn excellence in ICT RD into
- Wealth creation (employment, investment)
- Improved quality of life
- Innovation value chain
- But it starts with excellent RD
- And excellent RD starts with FET
- (Future Emerging Technologies)
10Future Technology
- ERCIM Strategy Group
- ERCIM Working Groups
- ERCIM active participation
- ISTAG
- Next Generation GRIDs expert group
- Future Emerging Technologies Beyond The Horizon
coordination action - Which all echo / amplify / build on the ERCIM
strategic work
11Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
12Where are we now?
- Almost at end of FP6
- Last calls December 2005
- Detailed Planning of FP7
- Likely first calls end-2006
- Likely first funding mid-2007
- What is happening
- Consultation on FP7
- EC-managed groups
- ISTAG http//www.cordis.lu/ist/istag.htm
- National representatives
- http//www.ost.gov.uk/ostinternational/fp7/index.h
tml - Pan-European organisations
- E.g. ERCIM www.ercim.org
13ISTAG
- Grand Challenges Document
- ftp//ftp.cordis.lu/pub/ist/docs/2004_grand_challe
nges_web_en.pdf - Consolidated Report
- ftp//ftp.cordis.lu/pub/ist/docs/2004_strategic_or
ientations_web_en.pdf - Note GRIDs document
- ftp//ftp.cordis.lu/pub/ist/docs/2004_grids_web_en
.pdf - Reflects closely NGG thinking
14ISTAG Grand Challenges 1-4
- The 100 Safe Car Roadway accidents entail
enormous human suffering and burden European
society with tremendous economic costs. Hence, we
envision projects with ICT systems leading the
realisation of the 100 safe automobile for
eliminating traffic fatalities almost
completely. - 2. The Multilingual Companion With the
enlargement to 25 Member States, the EU faces a
new multi-lingual challenge. We envision grand
projects to defeat the communication barrier
between member states by developing a powerful
multi-lingual companion that will make
multilingual and cross-lingual information access
and communication virtually automatic. - 3. The Service Robot Companion As the European
population ages, spiralling health-related costs
will place an immense burden on European
economies. We envision the development of
flexible home-care service robots, which will
help people to care for themselves, improve their
comfort of living and likely entertain them. - 4. The Self-Monitoring and Self-Repairing
Computer System failures are extremely costly
and all too frequent in todays complex ICT
systems. We envision a grand challenge to develop
self-monitoring and self-repairing computing
systems that will demonstrate the principle of
software systems with greatly improved
reliability.
15ISTAG Grand Challenges 5-8
- 5. The Internet Police Agent To reap the full
benefits of the Internet, we must maintain its
further development and counter criminal and
anti-social activities (SPAM, viruses, worms,
fraud, etc.). We envision projects to develop an
automated police agent that will be a socially
beneficial force within the Internet environment. - 6. The Disease and Treatment Simulator We
envision the development of a computational
platform for simulating the function of a
concrete disease. This simulator will enable
medicines to be tested without putting people at
risk, and will accelerate research into damaging
diseases such as heart disease and cancer. - 7. The Augmented Personal Memory The ICT
revolution will make it possible to store
virtually every image, film or television program
you have ever seen, every conversation you have
ever had or book you have read. We envision a
project that will make it possible for people to
create, preserve, sort and retrieve their own
personal vast storehouse of the past, in the form
of a personalised digital life diary and
augmented memory assistant. - 8. The Pervasive Communication Jacket Most
objects in the house, at work or in public spaces
will soon carry wireless communications
technology. We envision a communications jacket
that will enable the individual of tomorrow to
exploit these information resources in a natural
and beneficial way.
16ISTAG Grand Challenges 9-11
- 9. The Personal Everywhere Visualiser
visualisation is key for people to exploit the
information revolution. A grand challenge is to
develop a convenient personal and mobile
visualisation system that will work anywhere and
with minimal fuss, thereby enhancing our ability
to harness tomorrows ICT capabilities. - 10. The Ultra-light Aerial Transport Agent We
envision an unmanned aerial transport agent for
small scale logistics for the transport of
small packages and products from point to point,
monitoring of crime, and helping in search and
rescue operations. - 11. The Intelligent Retail Store We envision
projects to realise the intelligent retail
store a store in which emerging ICT
technologies are integrated in a way that brings
more information and efficiency to both
retailers and their customers alike.
17ISTAG Consolidated Report
- Technology alone is not enough
- Public trust in its use
- Interoperation
- Organisational change
- Pervasive
- out of the box and into everything
- Mastering Complexity
- Technologies and systems
- Users and needs
- Innovation lifecycle
- Experience and Application Research
- Users at all stages of lifecycle
- Stimulating long-term lifecycle
- European-scale RD
18NGG
- Next Generation GRIDs
- NGG1 200301-200306
- Brought together visionary experts
- Defined properties required and research agenda
to achieve them - NGG2 200401-200407
- Updated NGG1 vision in the light of funded
projects and evolving requirements and technology - NGG3 200509-200601
- http//www.cordis.lu/ist/grids/pub-report.htm
19GRIDs Vision and Requirements (1)
- a user interacts with the GRIDs environment
intelligently - such that the GRIDs environment proposes a 'deal'
to the end-user to satisfy her request - which the user can then decide to execute
- involving multiple resources of computation,
information, detectors (for new data collection),
interactions with other users through various
communication devices etc.
middleware
20GRIDs Vision and Requirements (2)
- interoperation as a seemingly homogeneous
'surface' over a range of devices from smart dust
through detectors to embedded systems (including
controllers), handhelds, laptops, desktops,
departmental servers, corporate servers and
supercomputers. - the 'surface' depends on self- (self-managing,
self-repairing, self-tuning...) capability across
arbitrary and dynamic collections of (large
numbers of) nodes to give scalability,
performance, reliability, access, security,
privacy and other features.
21NGG1
- NGG1 Properties Required
- Transparent and reliable
- Open to wide user and provider communities
- Pervasive and ubiquitous
- Secure and provide trust across multiple
administrative domains - Easy to use and to program
- Persistent
- Based on standards for software and protocols
- Person-centric
- Scalable
- Easy to configure and manage
22Call2 (NGG1) Projects Funded
23NGG2 Architecture
24Call5 (NGG2) Projects Funded
? Under negotiation
25NGG3
- September 2005 - January 2006
- Still under active discussion
- Draft report to EC DG INFSO F2 in December
- Final Report in January 2006
- Key messages
- GRIDs environment layering too complex
- Use SOKU
- Service Oriented Knowledge Utility
26NGG3 SOKU
27BTH Objectives
- CA ERCIM DG INFSO F1 FET
- 20050101 - 20060630
- http//www.beyond-the-horizon.net/
- The major objectives are
- to identify advanced strategic areas and
challenging long-term goals - to analyse their scientific, societal, and
industrial impact and to deliver roadmaps for
paving advances in these areas within a timeframe
of fifteen years - and to investigate new frontiers for ICT
research, to identify the boundaries with other
disciplines, as well as interrelationships among
them and opportunities for cross-fertilization.
28Topics
- The chosen strategic topics are
- Pervasive Computing and Communications
- Nanoelectronics and nanotechnology
- Security, dependability and trust
- Bio-ICT synergies
- Intelligent and Cognitive Systems
- Software Intensive Systems.
29Topics
- Note that
- For the ISTAG grand challenges
- For the NGG architecture
- These BTH technologies are necessary to realise
the concepts - Developing first in the FET environment
- Subsequently applied progressively more generally
in the IST environment
30Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
31Contents
- Beyond the Horizon The Project
- Rationale
- Impact
- Management
- Methodology
- Milestones
32Beyond the Horizon Purpose
- To provide input about IST-related emerging
trends and strategic research areas that require
support, through a well-organised, extensive and
systematic consultation of the relevant research
community throughout Europe, involving the main
actors and experts in the related fields.
33Beyond the Horizon Goals
- To identify advanced strategic areas and
challenging long-term goals - To analyse their scientific, societal and
industrial impact and to deliver roadmaps for
advancement over the next 15 years - To investigate new frontiers for ICT research, to
identify the boundaries with other disciplines,
as well as interrelationships and
cross-fertilization potential - To assist in cultivating and maintaining European
research excellence
34Beyond the Horizon Contract
- Instrument Coordination Action
- Coordinator ERCIM EEIG
- Start date January 1st, 2005
- Duration 18 months
- Effort 52 PM
- Total budget 612.127
- EC contribution 482.000
35Beyond the Horizon rationale (1/2)
- ICTs a key factor driving progress towards a
global economy of knowledge in the 21st Century - ICTs provide new tools for communication
throughout the world and for acquiring knowledge
and insight from information - ICTs are progressively becoming a foundation for
improving services to citizens in a variety of
application domains, such as health care,
government, transportation, entertainment, and
other aspects of everyday life.
36Beyond the Horizon rationale (2/2)
- The FET Programme aims at stimulating the
emergence and development of new IST-related
disciplines and technologies with significant
scientific, industrial, and societal impact - FET supports long-term, visionary, high-risk
research in advanced strategic areas - FET is requested to always maintain its focus at
the forefront of scientific and technological
research - The scope of investigation is broadening
substantially, making the identification and
fostering of emerging research challenges more
complex.
37Beyond the Horizon potential impact (1/2)
- Research community
- Consensus building and mobilization
- Formation of research networks
- Interdisciplinary research
- Policy developments
- Contribution to enhancing EUs reactivity to
emerging scientific and technological challenges
38Beyond the Horizon potential impact (2/2)
- Industry
- increasing awareness of IST-related basic
research as a contribution towards ensuring the
long-term competitiveness of European industry - increasing industry awareness of new trends,
challenges and visions in IST-related research
39Project Coordination
40Project management (2/3)
- Scientific Steering Committee Members
- Prof. Dimitris Plexousakis
- Institute of Computer Science, Foundation for
Research and Technology-Hellas (FORTH), and Univ.
of Crete, GR - Prof. Stefan Jähnichen
- Technical University of Berlin, DE
- Prof. Keith Jeffery (Chair)
- Council for the Central Laboratory of the
Research Councils (CCLRC), UK ERCIM President - Prof. Jean-Eric Pin
- Centre National de la Recherche Scientifique
(CNRS), FR - Prof. Arne Sølvberg
- The Norwegian Institute of Technology, NO
41Methodology
- Open method of consultation and coordination
- Continuous working group methodology, combined
with major brainstorming workshops, in the form
of a foresight exercise - Collaborative workspace to support online
communities
42Milestones
- M0 Deployment of the Online Community
Infrastructure April 2005 - M1 Completion of all TG workshops 12 Oct 2005
- M2 Coordinators Meeting 13 Oct 2005
- M3 Plenary Workshop 11-12 Dec 2005
- M4 TG Final Reports February 2006
- M5 Final Project Report March 2006
- M6 Dissemination Workshop for Policy Makers
April 2006 - M7 Session at High-Level Conference March-June
2006
43Milestones
- M0 Deployment of the Online Community
Infrastructure April 2005 - M1 Completion of all TG workshops 12 Oct 2005
- M2 Coordinators Meeting 13 Oct 2005
- M3 Plenary Workshop 11-12 Dec 2005
- M4 TG Final Reports February 2006
- M5 Final Project Report March 2006
- M6 Dissemination Workshop for Policy Makers
April 2006 - M7 Session at High-Level Conference March-June
2006
We are here
44Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
45Thematic Areas
- Pervasive Computing and Communications
- Nanoelectronics and Nanotechnology
- Security, Dependability and Trust
- Bio-ICT Synergies
- Intelligent and Cognitive Systems
- Software Intensive Systems
46Pervasive Computing and Communications (1/2)
- User-centric provision of services aiming at
enhancing the quality of life by seamlessly
offering ubiquitous access to relevant
information and services to the individual,
anywhere and at any time, through the synergistic
combination of intelligent, context-aware
interfaces, and ubiquitous computing and
networking
47Pervasive Computing and Communications (2/2)
- Research issues
- Design of pervasive computing systems
- Analysis, modelling and reasoning about systems
behaviour - Control of systems and environments
- Adaptation to changing context
- In-depth understanding of potential and limits
48Nanoelectronics and Nanotechnology (1/2)
- Combining top-down semiconductor platforms with
bottom-up developments in materials, physics,
chemistry and biology
49Nanoelectronics and Nanotechnology (2/2)
- Research issues
- new system architectures
- combination and interfacing of diverse materials,
functions, devices and information carriers - cost-effective fabrication techniques
- methods and tools to model, manipulate, fabricate
and characterise nano-objects - paradigms to exchange information with single
atoms or molecules - methods and tools to master giga-complexity of
future ICT architectures - further investigation of newly discovered
physical phenomena or properties of matter at the
meso-scale
50Security, Dependability and Trust (1/2)
- Increased risks stemming from
- growing autonomy and mobility of technologies and
systems - increasing size and complexity
- increased heterogeneity
- inherent interdependencies
- system failure may lead to loss of financial
resources, and even loss of human lives - even if a technological infrastructure is secure
and dependable, users will not necessarily trust
51Security, Dependability and Trust (2/2)
- Research issues
- real-time detection and response to threats, and
proactive measures - social and ethical issues, for example concerning
the acceptable trade-off between level of risk
and privacy - dependability of industrial-scale software with
less development risk than today - dependable evolution of dependable systems
- novel methods for trust creation and management.
52Bio-ICT Synergies (1/2)
- Convergence of ICT with bio and life sciences,
but also with cognitive science and
nanotechnology - Large-scale functional genomics and proteomics
- Modelling the development of behaviour in plants
and animals - Modelling of the function of organs and their
simulation. - Theoretical modelling of the brain and mind
53Bio-ICT Synergies (2/2)
- Research issues
- Develop methods for maintenance and
interoperability of biological data, and for the
semantic organisation of biological knowledge - Develop methods for visualising biological data
- Increase the reliability of bioinformatics
predictions - Develop advanced bio-inspired computational
paradigms.
54Intelligent and Cognitive Systems (1/2)
- Intelligent systems that perceive, reason,
understand and learn - extracting meaning from huge data flows
- autonomous operation
- natural interaction with the world and with human
users - (self-) adaptation to changing situations and
contexts, including users preferences and needs.
55Intelligent and Cognitive Systems (2/2)
- Research issues
- Complex adaptive systems consisting of
collections of simple, often heterogeneous,
entities exhibiting collective behaviour and
functionality through high connectivity - Introspective reasoning
- Emotional and affective computing
- Mixed realities
56Software-Intensive Systems (1/2)
- Societys dependence on software-intensive
systems is increasing to the point where a
growing range of products and services from all
sectors of economic activity, but also our daily
lives, depend on software-intensive systems
57Software-Intensive Systems (2/2)
- Research issues
- Develop practically useful and theoretically
well-founded methods and tools for engineering
complex software-intensive systems, supporting
the entire software life cycle - modelling data and processes
- building adequate system architectures
- ensuring reliability, dependability and
compliance - supporting interoperability
- managing change and enhancing usability
- Service-Oriented Computing services as
fundamental elements for developing distributed
applications
58Thematic Group Workshop goals
- Share ideas!!
- Form appropriate sub-groups
- Begin addressing key questions
- Continue discussions online
59Key questions Identifying strategic areas
- Which disciplines are the most promising for
cross-fertilisation with ICT? - Are there pure ICT research challenges?
- What are the ICT-related scientific areas Europe
should concentrate on?
60Key questions Within thematic groups
- What is the socio-economic context?
- What are the scientific and technological
challenges? - What are the driving factors in development and
technology application?
61Timeline Individual workshops
- June 11-13 Intelligent and Cognitive Systems,
Zurich - June 21-22 Security, Dependability and Trust,
Paris follow-up in October - June 28-29 Bio-ICT Synergies, Sophia Antipolis
- July 27-28 Pervasive Computing and
Communications, Vienna - September 9-10 Software Intensive Systems,
Koblenz - October 11-12 Nanoelectronics and
Nanotechnology, Brussels
62Timeline Coordinators Meeting
- Date October 13
- Venue EC in Brussels
- Paticipants BTH Scientific Steering Committee
- FET coordinators and
- BTH TG Leaders (and/or a deputy
representative) - Objective FET presents expected project
outcomes - ERCIM presents view of the action and overall
plan and TG Leaders present progress to date - To arrive at mutual agreement on the way forward
concrete roadmap for the remaining 8 months of
the project.
63Plenary Workshop
- Date December 12-13
- Venue Brussels
- Participants ALL TG Leaders and the maximum
number of TG participants - Program Introductory session (ERCIM President,
FET, etc.) - Plenary session on Modalities for FET projects
in FP7 (type of projects, evaluation criteria,
etc.) - Plenary session on results from the 6 TGs
(Leaders) - 2-3 Parallel sessions on new
inter-disciplinary areas
64Plenary Workshop
65On-line communities infrastructurehttp//www.beyo
nd-the-horizon.net/
66Portals functionality
- Each Thematic Group Area includes
- Documents area
- documents for collaboration or sharing between
the members can be uploaded, downloaded or viewed - Resources
- resources relevant for each Thematic Group are
available through keyword search, browsing by
resource category (e.g., publication, event, etc)
or by topic - Message Board
- a tool for asynchronous communication between the
members of a Thematic Group - Chat
- a synchronous communication tool among TG members
67(No Transcript)
68Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
69TG1 Pervasive Computing and Communications
70TG1 Pervasive Computing and Communications
- 1. Societal Artifacts will have to form up
to goal tribes, i.e. ensembles of possibly
complementing competencies, to act in a
sensitive, proactive, and responsive way
according to the perceived and anticipated needs,
habits, and emotions of the users. - 2. Evolvable Systems systems to grow from
their origin driven by their goals, In order
to cope with the continuously changing contexts,
conditions, and purpose of their use, system must
become self-configuring, self-healing,
self-optimizing and selfprotecting, both from a
hardware as well as an software point of view.
71TG1 Pervasive Computing and Communications
- 3. Future Aware Behaviour research must go
beyond the current state of the art in
context-awareness and become future-aware in the
sense that the system has a certain anticipation
of future contexts of its use. The system must be
able to foresee its near and far future, and the
future of its environment respectively. - 4. Human-Computer Confluence post-tangible
user interfaces, several users with different
information, how to orchestrate private and
public displays, Recent advances also brought
input and output technology closer to the human,
even connecting it directly with the human
sensory and neural system in terms of in-body
interaction and intelligent prosthetics.
72TG2 Nanoelectronics and Nanotechnologies
- More of Moore, More than Moore, Beyond Moore
73TG2 Nanoelectronics and Nanotechnologies
- Cooperative research on System-ability of
emerging ICT technologies and devices
investment in multi-disciplinary teams of
nano-technology researchers and system architects
to drive device research into realistic avenues
that can lead to economically-justifiable
nano-electronic systems for the future. - 2. Exploring the interfacing of nano-scale
biology with nano-electronics research leading
to new technologies for the integration of
biological and non-biological components should
represent an important component of the FP7
program. By its very nature, this is an area
where top-down lithographic and bottom-up
self-organizing principles come together. Such
hybrid bio-electronic systems
74TG2 Nanoelectronics and Nanotechnologies
- 3. Future interconnects for heterogenous system
integration Open questions include the
viability of self-assembly, usability of a
canonical set of functions and regular layouts
for general regular, modular, scaleable and
reusable interconnect schemes, and whether or not
the brain (high connectivity etc) is a good model
for future IT systems. - To overcome constraints of a single clock, there
is a move to asynchronous, on-chip internet-like
networks. Challenges here occur, because key
parameters such as latency, energy consumption,
abundancy of wires and pins and deterministic
wiring are different from the standard internet. - 4. Post-CMOS memory, storage and logic
Emphasis should be placed on bottom-up
technologies that have the potential to integrate
with silicon, or offer clear advantages in the
post-CMOS era. The issue of nano to macro
interfacing/communication is absolutely crucial
and may have to be solved before these devices
can be incorporated into higher-level
architectures.
75TG2 Nanoelectronics and Nanotechnologies
- 5. Nanoelectromechnical systems (NEMS)
initiative aimed at developing probe array
technology and NEMS, with emphasis on
multidisciplinary teams of chemists, physicists,
engineers and life scientists - 6. Quantum Information Processing bridging the
IST and NMP thematic activities, aimed at
Engineered Quantum Coherent Systems, using
solid-state micro/nanotechnology and materials
science to build coherent systems on a chip. This
includes building novel or complex nano-based
input-output devices connecting the outside world
with individual solid state, atomic or hybrid
quantum processors.
76TG3 Security, Dependability and Trust
- 1. Ambient trustworthiness. The mass diffusion
of digital systems must be endorsed with built-in
mechanisms for enhancing trust and confidence on
their usage. Common security mechanisms mainly
based on boundaries and firewall protection
mechanisms do not scale w.r.t. new complex
systems. We should imagine different mechanisms
as the one proposed by using analogies with
bio-living world, e.g., immune and selfhealing
systems. Security must be considered as an
autonomic aspect of any ICT based system. This
will definitely require new cognitive techniques
and semantics models to understand self from
non-self and managing the complexity of ambients
where human/devices may jointly run and interact.
Concepts and technology from Artificial
Intelligence will be useful. - 2. Trust models. Lack of trust either on the
cyber-infrastructure (due to frequent attacks) or
the difficulties to model trust relationships
among different entities (both human and digital
ones) is one of the main barriers for the
establishment of a real Information Society. As
soon as the future ICT systems will involve
billions of devices, the capability of managing
trust relationships that foster cooperation is
crucial. The understanding on how trust emerges
and evolves as well as of related notions as
reputation formation, monitoring and evolution
are mandatory. Trustworthiness of the information
origin is crucial to model trust on reputation.
Security-based trust as well as trust-based
security are two emerging areas of interest. A
deeper understanding of trust needs the
involvement of several expertise and research
expertise from several fields as economy and
sociology.
77TG3 Security, Dependability and Trust
- Security with scarce resources. Security systems
must be scaled down in order to be inserted in
small devices (even at nano-scale) that enable
ubiquitous and pervasive computing and
communication. Tiny devices will definitely have
specific requirements as energy consumption,
computation power, and so forth. Efficient,
flexible and scalable low-cost cryptographic
protocols and mechanisms must be developed and
combined in order to ease trust and confidence on
the Ambient intelligence space as well as ensure
privacy protection. - 4. Quantum technology for security. Nature can
provide us a lot of resources to secure our
information and communication systems. The
possibility provided by quantum Physics to offer
secret bits of information among authenticated
distant partners is a Beyond-the-Horizon
proposed research programmes 3 key tool for
securing communications. Although this is not the
whole story in security, it is a building block
of many applications and protection mechanisms.
Similarly, the current Quantum technology offers
truly random numbers that may be already used in
system. Security would definitely benefit their
exploitation. There is an increasing need of
exchanging of experience and knowledge among
different fields, e.g. security, physics and
engineering in order to fully understand and
exploit the potentialities of Quantum Physics for
security.
78TG3 Security, Dependability and Trust
- 5. Cryptology beyond Quantum Computing. Quantum
Physics and quantum computer may also represent a
major threat for current cryptographic algorithms
and mechanisms. A deeper understanding of future
impact of these technologies on the current
crypto-techniques is mandatory. We should study
the assumptions on which Quantum Computers (QC)
may act and their consequences on current
methods, as well as the development of new QC
resisting techniques. - 6. Assessability. Assessing and proving the
trustworthiness of a complex system is a main
issue. During the last years many techniques have
been developed, especially in the dependability
community. Yet, the scale of new ICT systems and
the kind of threats and assumptions on their
operational environment (not last the human
factor) pose new challenges and the need for an
assessability discipline is even more impelling.
Different metrics, modelling tools and
observability mechanisms are needed. The
capability of measuring the tolerance to attacks
is crucial in new systems that due to their
logical and physical diffusion are likely
constantly under possible attack. - 7. Verifiable security. The objective of the
Grand Challenge is to develop a discipline of
software security based on the development of
methods, tools, and repositories for high-level
verifiably secure programming. We advocate an
approach based on verifiable security
mathematical proofs showing compliance to
policies (expressing safety, security, or
functionality constraints) and sufficiently
verifiable. Verifiable security is complementary
to trust models, which focuses on interactions
between agents and presupposes that software is
correct and secure, and to cryptography, which
focuses on establishing security goals.
79TG4 Bio-ICT Synergies
80TG4 Bio-ICT Synergies
- New Modelling Paradigms is concerned with
developing new computational modelling paradigms
that can be used for modelling biological
systems, specifically bridging among models of
different aspects, different levels of
granularity or different levels of abstraction of
biological systems. These modelling paradigms
would need to be such that they can capture the
salient aspects of the systems they model, e.g.,
by being able to bridge discrete and continuous
modelling, by combining different timescales of
model dynamics, or by combining different
abstraction levels. These models could be applied
to capture complex systems like
atom-molecule-cell-tissue-organism, or
atom-molecule-neuron-neurocolumn-cortex-brain
models. They should be formulated such that they
can be used as paradigms for other domains than
the biological one. The Programme includes issues
of coupling between the model and the system
being modelled - 2. Bio-Inspired Strategies of Growth, Adaptation
and Evolution focuses on processes of change in
biological models and derives new algorithmic or
physical approaches to Beyond-the-Horizon
proposed research programmes 4 realise change in
artificial systems. Change can be approached as
growth, as adaptation, as learning, as evolution,
and so on. Each of these work at different time
scales and can have implications at the 'logical'
as well as at the 'physical' level. Understanding
and exploiting for instance growing materials or
evolvable hardware, as well as aspects of
self-organisation would fit under this theme.
81TG4 Bio-ICT Synergies
- 3. Bio-ICT Artifacts concentrates on building
artificial components that can be used to
augment, complement or replace natural
capabilities of biological systems. Classical
examples would include artificial retinas or
physiologically coupled artificial limbs. The
range of capacities is extended however beyond
perception and action, and could include for
instance memory, resistance to bacteria and
viruses. The Bio-ICT interface is thus not
necessarily acting at the sensing/actuator level,
but can also interface directly in metabolic
processes ('cyber-drugs').
82TG5 Intelligent and Cognitive Systems
83TG5 Intelligent and Cognitive Systems
- Mind-body co-evolution Traditionally, in
evolutionary robotics, the robot morphology is
given and only the design of the control
architecture is left to evolution, whereas in
natural systems, the two aspect, morphology and
(neural) control co-evolve in permanent
interaction with the environment. In order to
maximally exploit the power of evolution,
controllers and robot morphologies have to evolve
simultaneously. This process, ultimately,
requires materials that can grow. - Materials and growth technologies Through growth
biological organisms can form highly complex
morphological structures starting from a single
cell, and it is the permanent dynamical
interaction of their body with the physical
environment during this growth process, which
enables the different levels of their minds to
develop.
84TG5 Intelligent and Cognitive Systems
- 3. Morphological computation Classical
artificial intelligence and cognitive science are
founded on the notion of abstract symbol
manipulation. Embodied agents, however, are
fundamentally different from symbol-oriented
computers their bodies directly perform
processes essential to the agents successful
operation. Such processes performed by
morphological and material properties of a system
in order to facilitate or to support control
tasks. Examples are facet distributions in insect
eyes, stiffness properties of muscletendon
systems, and deformability of tissue on finger
tips. Generally, the term is used to designate
any process based on the shape of the entities
involved (e.g. molecules, or modules of a robot)
that might be interpreted as a computation. - 4. Design for emergence The challenge here is to
design for emergence How can we design
purposive agents without destroying the emergent
nature of their behaviour? If we program purpose
into the system, we may not learn very much about
purpose itself, we just get out of the system
what we program into it. Moreover, if we do not
allow for emergence, we will not see any
interesting behavior of the system evolving. It
will also be difficult to specify purpose whose
categories should this specification be based on
the human designers/observers, or the
artifacts?
85TG6 Software-Intensive Systems
- 1. Engineering Adaptive Software-Intensive
Systems Instead of taking a top-down approach,
where the whole knowledge is designed integrated,
with a pure a-priori effort, we propose a
bottom-up approach where the different knowledge
parts are kept distinct and designed
independently. The key idea is to consider
diversity as a feature which must be maintained
and exploited and not as a defect that must be
cancelled or absorbed in some general
universal-looking schema. People,
organizations, communities, populations, cultures
build diverse representations of the world for a
reason, and this reason lies in the local
context. It is hard to say what context exactly
is. However it can be safely stated that context
has many dimensions time, space, contingent
goals, short term or long term goals, personal or
community bias, environmental conditions, ...,
and so on. - 2. Managing Diversity in Knowledge by
Adaptation The challenge is to develop design
methods and tools that enable effective design by
harnessing, controlling and using the effects of
emergent knowledge properties. This leads to the
proposal of developing adaptive and, when
necessary, self-adaptive knowledge systems and to
the proposal of developing new methods, theories,
tools and systems for knowledge engineering and
management,
86TG6 Software-Intensive Systems
- 3. Eternal Software-Intensive Systems The
challenge that we have identified is to (re-)
organize todays decentralized and
software-intensive systems such that they can
survive in an constantly changing world.
Literally, they have to run forever and must
become eternal systems whose content and
functionality can be passed from one generation
to the other. We define eternal
software-intensive systems as software systems
which can survive changes in their execution
environment without (or with as little as
possible) human intervention regarding their code
base. Changes include e.g., new usage patterns
(self- optimization), functionality upgrades
(that can be added without reverse engineering
the running software), new versions of libraries
or of the embedding operating system (discovery
and exploitation of improved functionality) and
hardware replacements (portability and network
context).
87Agenda
- 1. Background - ERCIM
- 2. Background the Technological Imperative
- 3. Background - EC - FP6 and FP7
- 4. The BTH proposal and project
- 5. The 6 thematic groups and their work
- 6. Preliminary conclusions / recommendations for
FP7 workprogramme - 7. Conclusions
88CONCLUSION
- ERCIM is coordinating and leveraging through
its institutes the academic and industrial
communities throughout Europe to define the
workprogramme for FET in FP7 - There is still time for you to be involved
- Project Leader Dimitris Plexousakis
89Bits, Atoms and Genes Beyond the Horizon
1010101010