SAC 2011 is offering six half-day tutorials on Monday March 21, 2011 to all registered attendees. Tutorials are free of charge. However, there is a minimum (optional) registration fee of US$15 to cover a Social Luncheon that the Tutorials Committee is planing that day for participating attendees. Attendees are welcome to attend morning and afternoon tutorials of their choice. Handouts will be available online before the conference. Registered attendees need to bring their own copies of the handouts (printed or electronic) to the tutorial sessions. No handouts are provided during the tutorials. Attendees planning to to attend the Social Luncheon can add the "Tutorials Luncheon Package" to their conference registration.

For questions or inquiries about SAC 2011 Tutorials, please contact the Tutorials Chair:

Dr. Chihhsiong Shih
Tunghai University
e-mail: shihc@go.thu.edu.tw

Offered Tutorials:

 
Room A
Room B
Room C
9:00am
to
12:30pm

T2: Mitigation of Program Security Vulnerabilities: Approaches and Challenges

AM Coffee Break
10:30 - 11:00am

T3: Scenario-based requirements engineering facilitating interaction design

AM Coffee Break
10:30 - 11:00am

 

12:30pm
to
2:30pm
Social Luncheon for attendees who selected the "Luncheon Package" with their registrations.
Will be held at a designated restaurant near the campus (walking distance)
2:30pm
to
6:00pm

T4: Constraint Programming: From Algorithms to Applications

PM Coffee Break
4:00 - 4:30pm

T5: Cloud Computing Security: From Fundamentals to Advanced Access Control

PM Coffee Break
4:00 - 4:30pm

T6: Transition from Requirements to High-level Software Design

PM Coffee Break
4:00 - 4:30pm


Tutorials Details:

Monday March 21, 2011 - 9:00AM - 12:30PM
(Coffee Break: 10:30 - 11:00am)


T1:
Dynamic Resource Management in Mobile P2P Networks

(This tutorial has been canceled by the authors)


T2: Mitigation of Program Security Vulnerabilities: Approaches and Challenges

Handout: T2-Handout
(copyrighted materials. The copyright belongs to the tutorial presenter unless otherwise stated)

Dr. Mohammad Zulkernine
Associate Professor
School of Computing, Queen’s University
Kingston, Ontario, Canada
Email: mzulker@cs.queensu.ca

Hossain Shahriar
School of Computing
Queen’s University
Kingston, Ontario, Canada
Email: shahriar@cs.queensu.ca


T3: Scenario-based requirements engineering facilitating interaction design

Handout: T3-Handout
(copyrighted materials. The copyright belongs to the tutorial presenters unless otherwise stated)

Dr. Hermann Kaindl, Professor
Vienna University of Technology, ICT
Gusshausstr. 27-29
A-1040 Vienna, Austria
Phone: +43 1 58801-38416
Fax: +43 1 5 99666-384169
Email: kaindl @ ict.tuwien.ac.at
Web: http://www.ict.tuwien.ac.at/kaindl

 

 

 

 

 

 








 

 

 

 

 

 

 

 

 

Monday March 22, 2010 - 2:30PM - 6:00PM
(Coffee Break: 4:00 - 4:30pm)


T4: Constraint Programming: From Algorithms to Applications

Handout: T4-Handout-Color OR T4-Handout-B&W
(copyrighted materials. The copyright belongs to the tutorial presenters unless otherwise stated)

Roman Bartak
Charles University
Faculty of Mathematics and Physics
Malostranskenam, Czech Republic
Email: bartak@ktiml.mff.cuni.cz
Web: http://ktiml.mff.cuni.cz/~bartak


T5:
Cloud Computing Security: From Fundamentals to Advanced Access Control

Handout: T5-Handout
(copyrighted materials. The copyright belongs to the tutorial presenters unless otherwise stated)

Dongwan Shin, Ph.D.
Associate Professor
Department of Computer Science and Engineering
New Mexico Tech
Socorro, NM, USA

Email: doshin@nmt.edu

William Claycomb, Ph.D.
Member of Technical Staff Sandia National Laboratories MS 0823
Albuquerque, NM, USA
Email: wrclayc@sandia.go


T6:
Transition from Requirements to High-level Software Design

Handout: T6-Handout
(copyrighted materials. The copyright belongs to the tutorial presenters unless otherwise stated)

Dr. Hermann Kaindl, Professor
Vienna University of Technology, ICT
Vienna, Austria
Email: kaindl @ ict.tuwien.ac.at
Web: http://www.ict.tuwien.ac.at/kaindl



ACM


S
A
C

2
0
1
1