Software Summit 2014 - SWSTE


Conference Day Thursday, June 12, 2014Download Program

08:00-08:30 Gathering & Registration
plenum - Speakers
Rabbi Professor Daniel Hershkovitz, President, Bar Ilan University
Mickey Steiner, General Chair, Former Managing Director, SAP Labs Israel
Inon Beracha, EX CEO at PrimeSense - Morning KeyNote
10:00-10:30 Coffee Break
Track Name,

Track #1

Track #2

Track #3

Track #4

Track #5


Sarit Kraus - Bar Ilan University

Dan Berry -Waterloo University
Natural User Interface

Yishai Fraenkel - Intel
Big Data

Aya Soffer - IBM
Integrated Systems

Ran Bar-SellaIncubit Technology Ventures
Morning Sessions
Reliability, Resiliance & Security

Chaired by:
Luisa Mich -University of Trento
Software Engineering Methods

Chaired by:
Paulo Alencar -University of Waterloo
Perceptual Computing

State of the art in perceptual computing, brain computer interaction

Chaired by:
Yishai FraenkelIntel
Understanding Customers

Buiding rich 360 degree customer profiles

Chaired by:
Shuki Idan - SAP
David Sling Weapon System

Mission and goals, C41, and system software integration

Chaired by:
Nir Sela - Rafael
12:00-12:15 Coffee Break
Noon Sessions
Data on the Internet & the Web

Chaired by:
Gertrude Levine -Dickinson University
Doctoral Symposium

Chaired by:
Shlomi Dolev -Ben Gurion University
Sensory Interfaces

Visual and Texttual User Interaction

Chaired by:
Hadas BitranMicrosort
Data Technologies

Predictive busines, Data Driven business and intelligent actions

Chaired by:
Dan Pelleg - Yahoo
Internet of Things

System connectivity, event processing, and hetrogeneous database

Chaired by:
Haim Richman - Elta
(Sponsored by INCOSE-IL)
13:45-14:45 Lunch
Afternoon Sessions
Human Health Care Assisted b Machine Learning

Chaired by:
Cyril Mauger - Public Research Center Henri Tudor
Doctoral Symposium

Chaired by:
Shlomi Dolev -Ben Gurion University
New Driving Experience

Closer Driver - car Interaction

Chaired by:
Omer TsimhoniGM
Big Data Futures

Multimedia analytics, market research, and sociological insights

Chaired by:
David Konopnicki - IBM
Embedded Systems
Advanced SW Architectures (in memory of Dr. Jonah Lavi)
Software/Hardwares systems co-design, and system on chip

Chaired by:
Michael Winokur - IAI
16:15-16:30 Coffee Break
16:30-17:45 Closing Panel chaired by Mickey Steiner: "Are Computres and Humans getting closer together?"
Panel participants: Aya Soffer - IBM, Ishai Frankel - Intel, Yossi Tsuriya - Cisco & Roey Tzezana - Tel Aviv University
17:45 Adjourn

Tutorials Day Wednesday, June 11, 2014

08:30-09:00 Registration
  Track # 1 Track # 2
Track name Security Design Thinking
Morning Tutorials
Tutorial 1.A
The new threats of cyber security
and how big data & advanced
analytics address them

Dr. Yael Villa - Israel EMC Center of Excellence
Dr. Alon Kaufman - Research and Innovation, RSA
Tutorial 2.A
Why Design Thinking - How it adds value

Christina Hall - SAP
12:45-13:45 Lunch
Afternoon Tutorials
Tutorial 1.B
Intelligent Systems for Homeland Security

Prof. Sarit Kraus - Bar Ilan University
Tutorial 2.B
How Design Thinking Can be Used,
Adapted and Scailed in an Organization

Christina Hall - SAP
17:30 Adjourn
Track 1: Research papers Chaired by: Sarit Kraus,
Professor, Bar Ilan University

Auditorium Hall

Morning Session:

Session 1.1: Reliability, Resilience & Security

  • Gertrude Levine: Formalizing Service Degradations in a Security Plan
  • Leah Goldin, Reuven Gallant, and Yaakov Exman; Software Proactive Reengineering for System Resilience to Misuse
  • Guy Leshem, Esther David, Michal Chalamish, and Dana Shapira: Reputation Prediction of Anomaly Detection Algorithms for Reliable System

This session is about three properties, reliability, resilience, and security, which are important for all software-intensive computer-based systems, be they programs or networks.

Chaired by:
Luisa Mich

Professor, University of Trento
Noon Session:

Session 1.2: Data on the Internet & the Web

  • Don Cowan Paulo Alencar, and Fred McGarry:Perspectives on Open Data: Issues and Opportunities
  • David Schwartz, Yotam Haddad, Mickael Marrache, and Samuel Melloul:Session Peering Provisioning Framework Analysis
  • Luisa Mich: Evaluating Website Quality Evaluation by Addressing Quality Gaps: A Modular Process

This session is about issues that confront anyone who is building possibly data-intensive applications that are residing on or offered by Websites on the Internet.

Chaired by:
Gertrude Levine

professor , Dickinson University
Afternoon Session:

Session 1.3: Human Health Care Assisted by Machine Learning

  • Alex Frid, Hananel Hazan, Dan Hilu, Larry Manevitz, Lorraine Ramig, and Shimon Sapir: Computational Diagnosis of Parkinson's Disease Directly from Natural Speech using Machine Learning Techniques
  • Esther David, Dorit Hutzler, Mireille Avigal, and Rina Azoulay: Learning Methods for Rating the Difficulty of Reading Comprehension Questions
  • Alex Frid, Hananel Hazan, and Larry Manevitz: Towards Classifying Human Phonemes without Encodings via Spatiotemporal Liquid State Machines: Extended Abstract
  • Avi Rosenfeld, Vinay Sehgal, David G. Graham, Matthew R. Banks, Rehan J. Haidry, and Laurence B. Lovat: Using Data Mining to Help Detect Dysplasia: Extended Abstract

This session is about health care and human counseling applications developed using algorithms incorporating machine learning.

Chaired by:
Cyril Mauger

Public Research Center
Henri Tudor
Track 2: Research papers
and Doctoral Symposium
Chaired by: Dan Berry,
Professor, Waterloo University

V.I.P. Hall

Morning Session:

Session 2.1: Software Engineering Methods

  • Cyril Mauger and Daniel M Berry: Lessons Learned from and for Requirements Engineering and Building Construction: A Case Study of Requirements Engineering for a Synagogue Kitchen with Use Cases and Scenarios
  • Yaniv Mordecai, Ori Orhof, and Dov Dori: Software Agent Awareness of Physical-Informatical Essence Duality
  • Shmuela Jacobs, Niva Wengrowicz, and Dov Dori: Defining Object-Process Methodology in Web Ontology Language for Semantic Mediation

This session is about software engineering methods that can be applied at all stages of the development of software-intensive computerbased systems and Websites as well as for house building.

Chaired by:
Paulo Alencar,

Professor, University of Waterloo
Noon Session:


This session includes variety of state of the art research done by PhD students from universities in Israel, exposing the young future researchers in the field to the community and vice versa.

Chaired by:
Professor Shlomi Dolev,
Ben Gurion University
Afternoon Session:


This session includes variety of state of the art research done by PhD students from universities in Israel, exposing the young future researchers in the field to the community and vice versa.

Chaired by:
Professor Shlomi Dolev,
Ben Gurion University
Track 3: Natural User
Chaired by:
Yishai Fraenkel,

Hall 1

Morning Session:

Session 3.1: Perceptual Computing

  • Yishai Fraenkel, Intel: State of the art in perceptual computing
  • Roni Kimmel, Technion: Silicon vs. Neurones, a brief overview on man/machine visual perception
  • Doron Friedman: Is brain computer interface the ultimate NUI?

In this session we will explore the various ways we will be able to interact with computers in the future – no more mouse and keyboard. The computer will “understand us” in a much more natural and effortless way – closer to a human to human interaction.

Chaired by:
Yishai Fraenkel,
Noon Session:

Session 3.2: Sensory Interfaces

  • Yitzi Kempinski, UMoove : look me in the eye
  • Asaf Brazilay, Extreme reality: Motion games - Think out of the (x)Box
  • Hadas Bitran, Microsoft: Personalization in Cortana

This session will explore the various ways the computer will be able to sense our “inputs” – from looking at us, recognizing us and our behavior, through listening and understanding our speech

Chaired by:
Hadas Bitran,
Afternoon Session:

Session 3.3: The New Driving Experience

  • Omer Tsimhoni, GM: The new driving experience
  • Roni Zehavi, I-xplore: The fighter pilot helmet–the ultimate “driving” experience
  • Ofer David, BrightWay Vision: The challenge of NightVision interfacing the driver

Driving the car – the routine operation most of us do so frequently – will undergo significant changes, which will increase our safety and support us as we drive. We will explore progress in this area, and compare it to the ultimate “driving” experience in the fighter plane cockpit

Chaired by:
Omer Tsimhony,
Track 4: Big Data Chaired by:
Aya Soffer,

Hall 2

Morning Session:

Session 4.1: Understanding Customers

  • Hili Stein, Pontis: Big-Data as an enabler for 360? Customer Engagement
  • David Konopnicki, IBM: Customer Analytics – understanding your customers wherever they may be
  • Asaf Shtekler, Tracx: Social intelligence – helping the enterprise in a social world

in this session we will explore how big data can be used to truly understand customers and improve yield. We will explore some customer use cases from the customer’s perspective, we will look at some specific techniques to build rich customer profiles from Big data, and finally learn specifically how social media can transform how companies understand and engage with their customers.

Chaired by:
Shuki Idan,
Noon Session:

Session 4.2: Data Technologies

  • Kira Radinsky, Sales Predict: The Predictive Business
  • Shuki (Yitzhak) Idan, SAP: Using Big Data for Minor Intelligent Actions
  • Eldad Farkash, Sisense: From Big Data to Big Insight: Making Your Business Truly Data- Driven with In-Chip Technology

In this session we will explore some specific big data technology. Specifically, we will see how predictive analytics can be used to predict future businesses, describe technology to enable need real time analysis and real time decisions of large volumes of data, and look into unique technology for In- Chip analytics to boost Big data performance

Chaired by:
Dan Pelleg,
Afternoon Session:

Session 4.3: Big Data Futures

  • Frank Smadja, Toluna: Big Data for Market Research
  • Dan Pelleg, Yahoo: Touch screens for touchy issues–mining user-generated content for sociological insights
  • Aya Soffer, IBM: Big Multimedia Analytics, the next big wave in

In this session we will look into future Big Data applications. First, methods for leveraging Big Data to perform market research and making surveys a thing of the past. Second, how can big data be used to mine sociological insights. And finally, a look into further expanding the reach of Big Data into the realm of image and video data boost.

Chaired by:
David Konopnicki,
Track 5: Integrated Systems Chaired by:
Ran Bar-Sella,

Incubit Technology

Hall 3

Morning Session:

Session 5.1: David Sling Weapon System ( (שרביט קסמים

  • Ofer Hala, IDF: DSWS Mission & Goals
  • Michal Gal, Rafael: DSWS End To End (E2E) system SW integration
  • Moshe Patel, Elisra: Golden Almond–The DSWS C4I

This session is about a complex defense system of systems that demonstrates the challenges of software intensive system development. The session includes both customer view and software system development and integration view

Chaired by:
Nir Sela,
Noon Session:

Session 5.2: Internet Of things. Sponsored by INCOSE_IL

  • Shali Mor, Cisco: Security Aspects in IoT
  • Gosha Belenki, Tangram Soft: Modern B2B Secured Integration
  • Raz Rosman, Matrix: Top Three Reasons to Develop Your Next Distributed Application with DDS and achieve interoperability

This session is about distributed software systems, including application interoperability, integration, and security of Internet of Things (IoT)

Chaired by:
Haim Richman,
Afternoon Session:

Session 5.3: Embedded Systems Advanced SW Architectures

  • Prof. David Harel, Weizmann Institute Of Science: Towards Programming Naturally: A Brief Sojourn
  • Rami Sartani, IAI: Architecture and IT challenges in the organization
  • Yosef Hacoen, Elta : Transitioning to integrated Modular Avionics (IMA) with the Mission Computer

This session will explore the state of practice of advance software architectures in embedded software intensive systems. This session is dedicate to the memory of Jona Z. Lavi RIP.

Chaired by:
Dr. Michael Winokur,

Dr. Jonah Z. Lavi (RIP)

We dedicate this conference to the memory of Dr. Jonah Z. Lavi (ne Loeb), RIP, the founder of IEEE CS in Israel and the initiator of a conference series on software engineering that later morphed into SwSTE and this conference

Dr. Jonah Z. Lavi established the IEEE Computer Society (CS) chapter in Israel, and was a pioneer in organizing the IEEE CS International Conferences in Software Systems Engineering, starting in 1985. This conference series is the ancestor of the series of the SwSTE conference that you are attending right now.

For fifteen years, from 1978 through 1993, Dr. Lavi was the corporate manager of R&D of the Embedded Computer Systems Directorate at Israel Aerospace Industries (IAI). He also founded and chaired the ECBS (Engineering of Computer-Based Systems) Technical Committee of the IEEE CS. In 1995, he was honored with the Outstanding Contribution Award of the IEEE CS in recognition of his activities for the promotion of ECBS.

Dr. Lavi Received his Ph.D. in the engineering of computer-based systems at the Systems Research Center at Case Institute of Technology (now Case Western Reserve University) in Cleveland, Ohio in 1965. Since then, he has been practicing and teaching just that subject.

He chaired the Working Group on Education and Training of the IEEE CS ECBS Technical Committee, preparing Master and Bachelor degree curricula and industrial training programs in ECBS. He created and taught industrial and university courses on modeling and requirements specification of CBSs. Dr. Lavi was the lead developer of ECSAM, implemented at the Lavi (That he and the project had the same name is a total coincidence.) aircraft development project at IAI, and together with Joseph Kudish, wrote the book titled Systems Modeling & Requirements Specification Using ECSAM: An Analysis Method for Embedded and Computer-Based Systems, published in 2005 by Dorset House.

Security Tutorials Track

Hall 1

Morning Workshop 1.1:
09:00 – 12:45

The new threats of cyber security and
how big data & advanced analytics address them

Major trends are transforming IT and the way we conduct business: cloud, mobile, big data, social media. This together with latest major security breaches and fraud incidents making international headlines, accelerate organizations to take steps to address the growing problems of advanced persistent threats, fraud, and insider attacks.

Traditional security technologies lack the sophisticated capabilities and visibility required to detect and protect against such attacks. At best, they solve a single facet of the problem. Smart cyber criminals can skirt those defenses and blend into the background noise of an organization’s operations. They’re skilled and patient enough to perform stealthy reconnaissance of an organization’s network over months or years, eventually seizing the right opportunity to steal sensitive information assets – intellectual property, credit card numbers, customer databases – commit fraud, or otherwise damage the enterprise. Big data analytics components are the most crucial building blocks in the intelligent-driven security concept. The research, modeling and developing of this component are now under the responsibility of Security Data Science.

In this tutorial, we will learn about the current state and emerging cyber threat landscape, who are their latest targets, how are they perpetrating their attacks and what can be done to proactively mitigate against them leveraging the intelligent-driven security approach required to secure the business and manage risk in the age of IT’s “third platform”. In this tutorial we will also cover the role Data Scientists play in the Security Arena, the data science methodologies and technologies.

Afternoon Workshop 1.2:

Homland Security Workshop

Security of infrastructure of economic, political, or symbolic importance is a key concern around the world. In most cases there are not enough resources to fully protect the important possible targets. In such situations, intelligent randomization is needed which will take the adversary model into consideration.

Game theory is suited to adversarial reasoning for security resource allocation and scheduling problems, and allows the generation of security strategies that are unpredictable, but also based on the information about the relative risks of different kinds of attacks.

One of the game theory assumptions is that the players are fully rational. However, people quite often are bounded rational and do not maximize expected utility. For such situations, the integration of people’s decision-making models into the game theory formalization is needed. In similar cases, when the security mission requires the patrol and search of automated vehicles and robots, the characterization of the robots and their operator’s models should be taken into consideration. Adversary models can also be used in training people for homeland security tasks and other challenges such as the identification of insider threats.

This tutorial will cover: (i) background on game theory, machine learning and basic adversarial reasoning techniques; (ii) overview of some fielded applications and a discussion of the key challenges; (iii) an in-depth discussion of the basic algorithmic approaches to facing these challenges and an overview of more advanced techniques and recent results; (iv) discussion of adversary modeling methodologies for homeland security applications and (v) presentation of methods used in evaluation of this research.

Design Thinking Workshop

Hall 2

Morning Workshop 1.1:
09:00 – 12:45

Why Design Thinking, How it adds value

Ultimately, it’s about greater experiences for our customers and our own company. It can lead to better customer adoption of what we create, for internal and external customers.
Design Thinking is an innovation method that enables each of us to strengthen our capabilities. It is an essential lever to reach our strategic goals and transform our company.
Everyone can enrich their work by applying certain Design Thinking principles: building empathy for the end-user helps us focus on the customer; using multidisciplinary teams unlocks our potential, and adjusting our solutions based on feedback allows us to learn faster.

Afternoon Workshop 1.2:

How Design Thinking can be used,
Adapted and Scaled in an Organization

You will learn about the values of Design Thinking with examples from various industries, as well as examples of how it is applied in social and environmental in novation. You will get a “Behind the Scenes” look at how it can be used, adapted, and scaled in an organization.
The deep-dive into the approach will include hands-on sessions to give you a taste of what Design Thinking is.

Bring your own challenges and get a chance to field your questi ons about how it could apply to your challenge.

Back to Program