Daniel Smullen is a Software Engineering Ph.D. candidate at the Institute for Software Research, in the School of Computer Science at Carnegie Mellon University in Pittsburgh, Pennsylvania.Daniel's main areas of interest include privacy, security, autonomous systems, software architecture, and the Internet of Things.
Daniel speaks, reads, and writes in English, German, and French.
|Hima and Jive Fellowship in Computer Science for International Students||Carnegie Mellon University||2017|
|Ready-Set-Transfer Award||23rd IEEE International Requirements Engineering Conference||2015|
|UOIT Capstone ECSE Engineering Design Challenge Winner||University of Ontario Institute of Technology||2014|
|President’s Honours List||University of Ontario Institute of Technology||2014|
|NSERC Undergraduate Student Research Award||University of Ontario Institute of Technology||2013|
|President’s Honours List||University of Ontario Institute of Technology||2013|
|President’s Honours List||University of Ontario Institute of Technology||2012|
|Dean’s Honours List||University of Ontario Institute of Technology||2011|
|Engineers Without Borders Design Challenge Winner||McMaster University||2008|
|DaVinci Engineering Design Challenge Winner||University of Toronto||2007|
Studying the hoisting of non-functional requirements (such as privacy and security) into software architecture by leveraging formalized specification of legal policies. Actively working on the development of the Eddy requirements specification language toolset.
Developed a resolution-preserving image processing pipeline for interferometric synthetic aperture radar imagery. Engineered a cross-platform Python/C11 application that reduced processing time from weeks to minutes. Incorporated multithreading using OpenMP and multiprocessing using MPI. Tested on a variety of workstations and high performance clusters. Currently used in production with the UAVSAR project in the radar science and instrument engineering section.
Investigated user privacy in metadata released unknowingly through Internet traffic, and perceptions thereof in an ethics board approved user study. Also conducted a novel investigation of the Software Testing Coupling Effect using a variety of mutation testing tools and automation.
Studied tinyOS based wireless sensor networks, applying policy-based programming to create a new development environment (Policy IDE). Server-based and console-based variants using IPv6 running on embedded systems were also created. Published and presented at EUSPN-2013 (Elsevier). Poster presented at UOIT Student Research Showcase 2013. Research funded by NSERC Undergraduate Student Research Award
Conducted research on mission-critical datacenter systems, analyzing network traffic and file system logs toward better disaster recovery, and infrastructure improvement planning. Developed a novel workstation staging system, reducing the time for new workstation deployments (from 160 minutes down to 20 minutes).
Provided technical support for high value clients in engineering departments and senior management, performing computer forensics, data recovery, and system troubleshooting. Conducted seminars on security and system repair using open source software.
Implemented information systems developed for JEGEL, managing sample logging and lab process queuing. Gained comprehensive field experience in geotechnical and QA testing for concrete and asphalt. Oversaw integration of computer systems during the JEGEL/LVM merge.
Worked as assistant project manager, laboratory and office systems administrator. Worked with City of Toronto on special projects (Trans- Canada Highway Rehabilitation, Toronto 2009 Capital Works Program). Performed collaborative development on an ISO certified laboratory sample management software. Designed and built a datacenter servicing the Toronto engineering team.
The IoT Resource Registry helps IoT service providers to connect with their users, offering a unified way for information and choice on IoT services and resources. This project is a part of the larger Personalized Privacy Assistant project.
Supervisor: Dr. Norman Sadeh, Carnegie Mellon University
Eddy is a privacy requirements specification language that privacy analysts can use to express requirements over acts to collect, use, transfer and retain personal and technical information. The language uses a simple SQL-like syntax to express whether an action is permitted or prohibited, and to restrict those statements to particular data subjects and purposes. The Eddy specifications are compiled into Description Logic to automatically detect conflicting requirements and to trace data flows within and across specifications. Each specification can describe an organization's data practices, or the data practices of specific components in a software architecure.
Supervisor: Dr. Travis Breaux, Carnegie Mellon University
Synthetic aperture radar (SAR) or interferometric SAR (InSAR) images suffer from granular speckle noise, which must be removed a posteriori to make images suitable for analysis. We implemented several enhancements to Deledalle’s InSAR denoising filter (NL-InSAR) to gain leverage over the algorithm's inherent speed tradeoffs. Our results show quantitative and qualitative advances over the canon, as well as promising new research directions for further improvements. Our workstation- and supercluster-portable implementation allows high quality speckle noise reduction over full-sized UAVSAR images in a matter of minutes, versus weeks using the naïve algorithm.
Supervisor: Dr. Razi Ahmed, Jet Propulsion Laboratory
Non-local filters are particularly well-suited for reducing noise in interferometric Synthetic Aperture Radar (InSAR) images due to their ability to preserve fine structures in the images without compromising resolution. Great strides have been made in improving non-local filtering techniques for InSAR images, but many of these techniques introduce an artifact known as the canvas effect. In this work, we implemented a novel method for eliminating the canvas effect that is based on Gaussian-Laplacian image pyramids. In particular, we modify the NL-InSAR algorithm to include an image pyramiding step in order to improve the estimation of reflectivity, interferometric phase, and coherence.
Supervisor: Dr. Razi Ahmed, Jet Propulsion Laboratory
IRIS is a fully integrated intelligence management system with a frontend that displays road conditions and captured incident videos, combined with a computer vision backend that performs autonomous, scalable highway surveillance and statistical aggregation. IRIS won first place in the UOIT Capstone ECSE Engineering Design Challenge 2014.
Supervisor: Dr. Shahryar Rahnamayan, Associate Professor, UOIT
Special thanks to Dr. Baher Abdulhai and Asmus Georgi at University of Toronto, and Steve Spadafora at MTO for their funding and collaboration.
AMS was built using Rails for UOIT as a means to quickly create, disseminate, and automatically mark introductory programming courses, providing automatic cheating detection and code quality metrics to students. The software automatically compiles, executes, and evaluates students' submissions in a protected environment. AMS provides instant feedback to students and administrators on the quality of submissions after undergoing dynamic and static analysis, and is integrated with an automatic testing framework for both evaluation and validation.
Supervisor: Dr. Kamran Sartipi, Associate Professor, UOIT
These three projects were the culmination of work completed funded by an NSERC Undergraduate Research Award. All three are related to implementing and facilitating policy programming in wireless sensor networks based on TinyOS. They were published and presented at EUSPN-2013, as well as posted on the Stanford TinyOS community Wiki. These projects are also available in branches on GitHub.
Supervisor: Dr. Ramiro Liscano, Associate Dean, UOIT
Military logistics management and large-scale visualization system for UOIT ENGR3700 (Data Management Systems) course. Delivers supply and personnel information via an agile web interface using ASP.NET. Provides secure access to global logistics data at a glance through a Logistics Management View (LMV). Provides real-time battle space updates using Order of Battle (ORBAT) Imagery System.
Supervisor: Dr. Eyhab Al-Masri, Senior Lecturer, UOIT
sneakyFS is a UNIX file system which operates on a simulated hard disk. It uses a hybrid indexed and linked allocation method to efficiently use disk space, support large disks, lengthy directory trees, and large file sizes. It incorporates transparent encryption, journalling, and universal unique identifiers. It incorporates techniques which extend the functionality of the C language beyond its original scope of usage, including object oriented design principles by re-purposing C data structures and pointers. The project won distinction as "Best Project" in the UOIT ENGR 3950 (Operating Systems) course.
Supervisor: Dr. Kamran Sartipi, Associate Professor, UOIT
Mission-critical datacenter utilization, availability, and performance assessment for SNC-Lavalin GIT risk management and infrastructure remediation. This study sought to determine the amount of work performed in dollars per hour on each critical server asset in the datacenter located at the West Mall campus, and specify a plan for infrastructure improvements based on the findings.
Supervisor: M. Ross, Senior Vice-President, SNC-Lavalin Global Information Technologies
Collaborative development on an ISO 9000 certified laboratory sample management software. Manages sample logging, categorization, and process queuing. Used in active laboratory production.
Supervisor: Dr. John Emery, P.Eng., President, JEGEL
In order to facilitate a large scale asphalt rehabilitation on the Trans-Canada Highway, spanning the section surrounding Banff for over 300km, large scale geoinformatics were required. These drawings detailed probe-hole locations, highway layout, and pavement remediation plans.
Supervisor: Alain Duclos, P.Eng., Senior Engineer, JEGEL
|Privacy Risk in Cybersecurity Data Sharing||ACM 3rd International Workshop on Information Sharing and Collaborative Security (WISCS)|
|Detecting Repurposing and Over-Collection in Multi-party Privacy Requirements Specifications||23rd IEEE International Requirements Engineering Conference|
|Toward Rapid Recertification Using Formal Analysis||US Navy Postgraduate School 12th Annual Acquisition Research Symposium|
|Genetic Algorithm with Self-Adaptive Mutation Controlled by Chromosome Similarity||IEEE Congress on Evolutionary Computation (CEC 2014)|
|Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks||Procedia Computer Science (Elsevier)|
|Title||Item||Conference||Links and Resources|
|Detecting Repurposing and Over-Collection in Multi-party Privacy Requirements Specifications||Conference Talk||23rd IEEE International Requirements Engineering Conference|
|Towards Rapid Re-Certification Using Formal Analysis||Conference Talk||US Navy Postgraduate School 12th Annual Acquisition Research Symposium|
|Genetic Algorithm with Self-Adaptive Mutation Controlled by Chromosome Similarity||Conference Talk||IEEE World Congress on Computational Intelligence (WCCI 2014), Evolutionary Computation Conference (CEC 2014)|
|How Much Do We Reveal Through Metadata? An Assessment of Online Privacy||Preliminary Study Poster||IBM Consortium for Software Engineering Research (CSER 2013)|
|Policy IDE... and lessons learned since.||Conference Talk||The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)|
|Facilitating the Internet of Things with Policy Programming||Research Showcase Poster||UOIT Undergraduate Research Showcase 2013|
© 2017 Daniel Smullen