Imperial College London

Professor Emil Lupu

Faculty of EngineeringDepartment of Computing

Professor of Computer Systems
 
 
 
//

Contact

 

e.c.lupu Website

 
 
//

Location

 

564Huxley BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

237 results found

Lupu E, Posegga J, 2015, Foreword from the SETOP 2014 program chairs, ISBN: 9783319170152

Book

Payton J, Labrador M, Silverston T, Farkas K, Lupu Eet al., 2014, CROWDSENSING'14: The first international workshop on crowdsensing methods, techniques, and applications, 2014 - Welcome and committees, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014

Journal article

Markitanis A, Corapi D, Russo A, Lupu ECet al., 2014, Learning user behaviours in real mobile domains, Latest Advances in Inductive Logic Programming, Pages: 43-51, ISBN: 9781783265084

© 2015 Imperial College Press. All rights reserved. With the emergence of ubiquitous computing, innovations in mobile phones are increasingly changing the way users lead their lives. To make mobile devices adaptive and able to autonomously respond to changes in user behaviours, machine learning techniques can be deployed to learn behaviour from empirical data. Learning outcomes should be rulebased enforcement policies that can pervasively manage the devices, and at the same time facilitate user validation when and if required. In this chapter we demonstrate the feasibility of non-monotonic Inductive Logic Programming (ILP) in the automated task of extraction of user behaviour rules through data acquisition in the domain of mobile phones. This is a challenging task as real mobile datasets are highly noisy and unevenly distributed. We present two applications, one based on an existing dataset collected as part of the Reality Mining group, and the other generated by a mobile phone application called ULearn that we have developed to facilitate a realistic evaluation of the accuracy of the learning outcome.

Book chapter

Rivera-Rubio J, Alexiou I, Bharath A, Secoli R, Dickens L, Lupu ECet al., 2014, Associating locations from wearable cameras

© 2014. The copyright of this document resides with its authors. In this paper, we address a specific use-case of wearable or hand-held camera technology: indoor navigation. We explore the possibility of crowd-sourcing navigational data in the form of video sequences that are captured from wearable or hand-held cameras. Without using geometric inference techniques (such as SLAM), we test video data for navigational content, and algorithms for extracting that content. We do not include tracking in this evaluation; our purpose is to explore the hypothesis that visual content, on its own, contains cues that can be mined to infer a person's location. We test this hypothesis through estimating positional error distributions inferred during one journey with respect to other journeys along the same approximate path. The contributions of this work are threefold. First, we propose alternative methods for video feature extraction that identify candidate matches between query sequences and a database of sequences from journeys made at different times. Secondly, we suggest an evaluation methodology that estimates the error distributions in inferred position with respect to a ground truth. We assess and compare standard approaches from the field of image retrieval, such as SIFT and HOG3D, to establish associations between frames. The final contribution is a publicly available database comprising over 90,000 frames of video-sequences with positional ground-truth. The data was acquired along more than 3 km worth of indoor journeys with a hand-held device (Nexus 4) and a wearable device (Google Glass).

Conference paper

Dickens L, Lupu EC, 2014, On Efficient Meta-Data Collection for Crowdsensing, First International Workshop on Crowdsensing Methods, Techniques, and Applications, Publisher: IEEE, Pages: 62-67

Participatory sensing applications have an on-going requirement to turn raw data into useful knowledge, and to achieve this, many rely on prompt human generated meta-data to support and/or validate the primary data payload. These human contributions are inherently error prone and subject to bias and inaccuracies, so multiple overlapping labels are needed to cross-validate one another. While probabilistic inference can be used to reduce the required label overlap, there is still a need to minimise the overhead and improve the accuracy of timely label collection. We present three general algorithms for efficient human meta-data collection, which support different constraints on how the central authority collects contributions, and three methods to intelligently pair annotators with tasks based on formal information theoretic principles. We test our methods’ performance on challenging synthetic data-sets, based on real data, and show that our algorithms can significantly lower the cost and improve the accuracy of human meta-data labelling, with little or no impact on time.

Conference paper

Rodrigues P, Lupu EC, Kramer JK, 2014, LTSA-PCA: Tool Support for Compositional Reliability Analysis, ICSE Companion 2014, Publisher: ACM, Pages: 548-551

Conference paper

Corapi D, Russo A, Lupu E, 2012, Inductive logic programming in answer set programming, Pages: 91-97, ISSN: 0302-9743

In this paper we discuss the design of an Inductive Logic Programming (ILP) system in Answer Set Programming (ASP) and more in general the problem of integrating the two. We show how to formalise the learning problem as an ASP program and provide details on how the optimisation features of modern solvers can be adapted to derive preferred hypotheses. © 2012 Springer-Verlag Berlin Heidelberg.

Conference paper

Gopalan A, Gowadia V, Scalavino E, Lupu Eet al., 2012, Policy driven remote attestation, Pages: 148-159, ISSN: 1867-8211

Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being, that an adversary can modify critical software components. In this paper, we present a policy-driven approach that allows us to prove the integrity of a system and which decouples authorisation logic from remote attestation. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

Conference paper

Asmare E, Gopalan A, Sloman M, Dulay N, Lupu ECet al., 2012, Self-Management Framework for Mobile Autonomous Systems, Journal of Network and Systems Management, Vol: 20, Pages: 244-275

The advent of mobile and ubiquitous systems has enabled the de- velopment of autonomous systems such as wireless-sensors for environmental data collection and teams of collaborating Unmanned Autonomous Vehicles (UAVs) used in missions unsuitable for humans. However, with these range of new application-domains come a new challenge – enabling self-management in mobile autonomous systems. Autonomous systems have to be able to manage themselves individually as well as to form self-managing teams which are able to recover or adapt to failures, protect themselves from attacks and optimise performance.This paper proposes a novel distributed policy-based framework that en- ables autonomous systems of varying scale to perform self-management indi- vidually and as a team. The framework allows missions to be specified in terms of roles in an adaptable and reusable way, enables dynamic and secure team formation with a utility-based approach for optimal role assignment, caters for communication link maintenance amongst team-members and recovery from failure. Adaptive management is achieved by employing a policy-based archi- tecture to enable dynamic modification of the management strategy relating to resources, role behaviour, communications and team management, without interrupting the basic software within the system.Evaluation of the framework shows that it is scalable with respect to the number of roles, and consequently the number of autonomous systems par- ticipating in the mission. It is also shown to be optimal with respect to role assignments, and robust to intermittent communication link disconnections and permanent team-member failures.

Journal article

Rodrigues P, Lupu E, 2011, Model-based self-adaptive components: A preliminary approach, Pages: 73-79

Due to the increasing scale, complexity, dynamicity and heterogeneity of modern software systems, it is not feasible to solely rely upon human management to guarantee a good service level with such availability demand. Self-managing systems are needed as an effective approach to deal with those issues by exploiting adaptive techniques to adjust a system. On top of that, model-based adaptation improves reliability, hence enhancing trust in self-managing systems. However, a centralised approach can be too complex to manage thus compromising system dependability. This paper presents a preliminary decentralised approach on model-based self-adaptive components.

Conference paper

Craven, Lobo J, Lupu E, Russo A, Sloman Met al., 2011, Policy Refinement: Decomposition and Operationalization for Dynamic Domains, 7th IEEE Int. Conference on Network and Service Management (CNSM 2011), Publisher: IEEE

We describe a method for policy refinement. The refinement process involves stages of decomposition, operational- ization, deployment and re-refinement, and operates on policies expressed in a logical language flexible enough to be translated into many different enforceable policy dialects. We illustrate with examples from a coalition scenario, and describe how the stages of decomposition and operationaliztion work internally, and fit together in an interleaved fashion. Domains are represented in a logical formalization of UML diagrams. Both authorization and obligation policies are supported

Conference paper

Maggi FM, Corapi D, Russo A, Lupu E, Visaggio Get al., 2011, Revising Process Models through Inductive Learning, BPM 2010 Conference, Publisher: SPRINGER-VERLAG BERLIN, Pages: 182-+, ISSN: 1865-1348

Conference paper

Ma J, Russo A, Broda K, Lupu Eet al., 2011, Multi-agent abductive reasoning with confidentiality, Pages: 1071-1072

In the context of multi-agent hypothetical reasoning, agents typically have partial knowledge about their environments, and the union of such knowledge is still incomplete to represent the whole world. Thus, given a global query they need to collaborate with each other to make correct inferences and hypothesis, whilst maintaining global constraints. There are many real world applications in which the confidentiality of agent knowledge is of primary concern, and hence the agents may not share or communicate all their information during the collaboration. This extra constraint gives a new challenge to multi-agent reasoning. This paper shows how this dichotomy between "open communication" in collaborative reasoning and protection of confidentiality can be accommodated, by extending a general-purpose distributed abductive logic programming system for multi-agent hypothetical reasoning with confidentiality. Specifically, the system computes consistent conditional answers for a query over a set of distributed normal logic programs with possibly unbound domains and arithmetic constraints, preserving the private information within the logic programs. Copyright © 2011, International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved.

Conference paper

Lobo J, Ma J, Russo A, Lupu E, Calo SB, Sloman Met al., 2011, Refinement of History-Based Policies., Editors: Balduccini, Son, Publisher: Springer, Pages: 280-299, ISBN: 978-3-642-20831-7

We propose an efficient method to evaluate a large class of history-based policies written as logic programs. To achieve this, we dy- namically compute, from a given policy set, a finite subset of the history required and sufficient to evaluate the policies. We maintain this history by monitoring rules and transform the policies into a non history-based form. We further formally prove that evaluating history-based policies can be reduced to an equivalent, but more efficient, evaluation of the non history-based policies together with the monitoring rules.

Book chapter

Ma J, Russo A, Lupu E, Broda Ket al., 2011, Multi-agent Confidential Abductive Reasoning, 27th International COnference on Logic Programming

Conference paper

Ma J, Russo A, Broda K, Lupu Eet al., 2011, Multi-agent Hypothetical Reasoning with Confidentiality, 10th Conference on Autonomous Agents and Multi-Agent Systems

Conference paper

Russello G, Scalavino E, Dulay N, Lupu ECet al., 2010, Coordinating data usage control in loosely-connected networks, Pages: 30-39

In a disaster-recovery mission, rescuers need to coordinate their operations and exchange information to make the right judgments and perform their statutory duties. The information exchanged may be privileged or sensitive and not generally in the public domain. For instance, the assessment of the risk level in the disaster area where a chemical plant is located requires data about the nature of the potential chemical hazards and the probability of an hazardous event to occur. Such data may contain information that could be of value to a rival company and may generate chaos if released to the public. Retaining control of data that is shared between organisations can be achieved by deploying Enterprise Rights Management (ERM) systems. However, ERM systems rely on centralised authorities that must be contacted by client applications to obtain access rights. Such centralised solutions are not practical in a disaster scenario where communication infrastructure may have been damaged by the event making very difficult to establish reliable wide-are communications. In this paper, we propose a solution for the enforcement of usage control policies that leverage on the data dissemination model of Opportunistic Networks (oppnets). Our solution, named xDUCON, relies on the data abstraction of the Shared Data Space (SDS). Data and usage control policies are represented as tuples that are disseminated across the available SDSs connected through the oppnets. © 2010 IEEE.

Conference paper

Scalavino E, Gowadia V, Ball R, Lupu EC, Russello Get al., 2010, Mobile PAES: Demonstrating authority devolution for policy evaluation in crisis management scenarios, Proceedings - 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010, Pages: 53-56

Traditional data protection schemes deployed in Enterprise Rights Management systems rely on centralised infrastructures where recipients must request authorisation for data access from remote evaluation authorities, trusted by the data originator to keep the data decryption keys and evaluate authorisation policies. During emergency situations when network connection is intermittent these solutions are no longer viable. This demonstration presents a implementation of the hierarchical Policy-based Authority Evaluation Protocol (PAES) that allows the devolution of authority over policy evaluations in a disconnected crisis area. The demonstration simulates the movements of rescuers in the area and the creation of opportunistic connections when they meet. These connections are then used for cross-evaluation of authority and distribution of cryptographic keys in addition to transmitting the data. PAES guarantees a correct policy evaluation at each encounter, so only authorised rescuers finally obtain the authority to access the disseminated data. © 2010 IEEE.

Journal article

Gowadia V, Scalavino E, Lupu EC, Starostin D, Orlov Aet al., 2010, Secure Cross-Domain Data Sharing Architecture for Crisis Management, ACM-DRM Workshop, Publisher: ACM

Conference paper

Craven R, Lobo J, Lupu EC, Russo A, Sloman Met al., 2010, Decomposition techniques for policy refinement., 6th Int. Conference on Network and Service Management, Publisher: IEEE, Pages: 72-79

The automation of policy refinement, whilst promis- ing great benefits for policy-based management, has hitherto received relatively little treatment in the literature, with few concrete approaches emerging. In this paper we present initial steps towards a framework for automated distributed policy refinement for both obligation and authorization policies. We present examples drawn from military scenarios, describe details of our formalism and methods for action decomposition, and discuss directions for future research.

Conference paper

Schaeffer A, Lupu EC, Sloman M, 2010, Policies to Enable Secure Dynamic Community Establishment, Network Science for Military Coalition Operations: Information Exchange and Interaction, Editors: Verma, Publisher: Information Science Reference, Pages: 121-145, ISBN: 9781615208555

Many coalition operations require the establishment of secure communities across the different networks that make up a coalition network. These communities are formed dynamically in order to achieve the goals of a specific mission, and frequently consist of mobile entities interconnected into a mobile ad-hoc network. Technologies are needed to create these communities, and manage their operations. In this chapter, the authors show how a framework for self-managed cells can be extended to provide this capability for coalition operations.

Book chapter

Calo S, Karat J, Lobo J, Craven R, Lupu EC, Ma J, Russo A, Sloman M, Bandara Aet al., 2010, Policy Technologies for Security Management in Coalition Networks, Network Science for Military Coalition Operations: Information Exchange and Interaction, Publisher: Information Science Reference, Pages: 146-173, ISBN: 978-1-61520-855-5

Book chapter

Corapi D, Russo A, Lupu E, 2010, INDUCTIVE LOGIC PROGRAMMING AS ABDUCTIVE SEARCH, 26th International Conference on Logic Programming (ICLP), Publisher: SCHLOSS DAGSTUHL, LEIBNIZ CENTER INFORMATICS, Pages: 54-63, ISSN: 1868-8969

Conference paper

Scalavino E, Gowadia V, Ball R, Lupu EC, Russello Get al., 2010, Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Publisher: IEEE

Conference paper

Ma J, Broda K, Russo A, Lupu Eet al., 2010, Distributed Abductive Reasoning with Constraints, Declarative Agent Languages and Technologies DALT-2010 Post proceedings

Conference paper

Ma J, Russo A, Broda K, Lupu Eet al., 2010, Distributed Abductive Reasoning with Constraints, 9th Conference on Autonomous Agents and Multi-Agent Systems (AAMAS10)

Conference paper

Bourdenas T, Sloman M, Lupu EC, 2010, Self-healing for Pervasive Computing Systems, Publisher: Springer Berlin Heidelberg, Pages: 1-25, ISSN: 0302-9743

Conference paper

Ma J, Russo A, Broda K, Lupu Eet al., 2010, Distributed abductive reasoning with constraints., Publisher: IFAAMAS, Pages: 1381-1382

Conference paper

Scalavino E, Gowadia V, Lupu E, 2010, A Labelling System for Derived Data Control, Data and Applications Security and Privacy (DBSEC 2010)

Conference paper

Scalavino E, Russello G, Ball R, Gowadia V, Lupu Eet al., 2010, An Opportunistic Authority Evaluation Scheme for Data Security in Crisis Management Scenarios, 5th ACM Symposium on Information, Computer and Communications Security, Publisher: ACM, Pages: 157-168

Conference paper

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: limit=30&id=00155030&person=true&page=3&amp%3bid=00155030&amp%3brespub-action=search.html&amp%3bperson=true&respub-action=search.html&amp%3bpage=8