Dr. Eric Eide (University of Utah)

Artifact evaluation is now a widespread feature of conferences in many areas of computer science. Many conference communities now have substantial experience with artifact evaluation, and it is time to step back and reflect. What has been accomplished, what is working, what is not, and what are possible next steps to be taken? In this talk I will discuss the practice of artifact evaluation and look forward to ways in which current practices might evolve to be more effective and/or valuable.

Speaker's biography

Dr. Eric Eide is a Research Associate Professor and a Co-director of the Flux Research Group in the School of Computing at the University of Utah in Salt Lake City, Utah, USA. His research focuses on the engineering of trustworthy systems software: this includes activities toward improving the correctness, testing, resilience, and security of systems software, as well as activities toward improving the rigor of experimental computer science. He co-chaired the Artifact Evaluation Committees for the PLDI 2014, PLDI 2015, and OSDI 2020 conferences, and he is the current and inaugural chair of the Artifact Evaluation Board for the Journal of Systems Research. As a Principal Investigator of the SEARCCH project, he is working to establish a novel web portal to improve the discoverability and reuse of experiment artifacts related to cybersecurity.

View More Papers

Demo #2: Policy-based Discovery and Patching of Logic Bugs...

Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Antonio Bianchi (Purdue University), Z. Berkay Celik (Purdue University) and Dongyan Xu (Purdue University)

Read More

MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity

Shengwei An (Purdue University), Guanhong Tao (Purdue University), Qiuling Xu (Purdue University), Yingqi Liu (Purdue University), Guangyu Shen (Purdue University); Yuan Yao (Nanjing University), Jingwei Xu (Nanjing University), Xiangyu Zhang (Purdue University)

Read More

Generation of CAN-based Wheel Lockup Attacks on the Dynamics...

Alireza Mohammadi (University of Michigan-Dearborn), Hafiz Malik (University of Michigan-Dearborn) and Masoud Abbaszadeh (GE Global Research)

Read More

Analyzing and Creating Malicious URLs: A Comparative Study on...

Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)

Read More