{"id":436,"date":"2025-04-25T19:12:34","date_gmt":"2025-04-25T19:12:34","guid":{"rendered":"https:\/\/services.conferences.computer.org\/2026\/?page_id=436"},"modified":"2026-03-30T10:34:22","modified_gmt":"2026-03-30T10:34:22","slug":"keynotes","status":"publish","type":"page","link":"https:\/\/services.conferences.computer.org\/2026\/keynotes\/","title":{"rendered":"Keynotes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"436\" class=\"elementor elementor-436\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cad29be e-flex e-con-boxed e-con e-parent\" data-id=\"cad29be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81f3a85 elementor-widget elementor-widget-text-editor\" data-id=\"81f3a85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><b>Plenary Keynotes<\/b><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ebf3b23 e-con-full e-flex e-con e-child\" data-id=\"ebf3b23\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-94545ac e-con-full e-flex e-con e-child\" data-id=\"94545ac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfc1138 elementor-widget elementor-widget-text-editor\" data-id=\"bfc1138\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><span style=\"font-weight: bolder\">PLENARY KEYNOTE 1<br \/>Time: TBD<\/span><\/h5><h3 style=\"text-align: center\"><strong>From LLMs to Living Systems: Applying Systems Science to Agentic AI in the Enterprise<\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1a8ef9 e-con-full e-flex e-con e-child\" data-id=\"e1a8ef9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f2363f5 e-con-full e-flex e-con e-child\" data-id=\"f2363f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21070e6 elementor-widget elementor-widget-image\" data-id=\"21070e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"922\" src=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/02\/Rama_Akkiraju.jpg\" class=\"attachment-large size-large wp-image-899\" alt=\"\" srcset=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/02\/Rama_Akkiraju.jpg 730w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/02\/Rama_Akkiraju-238x300.jpg 238w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-996464d elementor-widget elementor-widget-text-editor\" data-id=\"996464d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>Rama Akkiraju<\/strong><br \/><span data-olk-copy-source=\"MessageBody\">VP, Enterprise AI, NVIDIA, Ex-IBM Fellow<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42a0a92 e-con-full e-flex e-con e-child\" data-id=\"42a0a92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7762842 elementor-widget elementor-widget-text-editor\" data-id=\"7762842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Abstract<\/strong><\/h4><p><span data-olk-copy-source=\"MessageBody\">Enterprise AI is transitioning from simple single-LLM flows to complex agentic ecosystems\u2014adaptive systems composed of multiple agents, tools, governed data, human workflows, and organizational policies. This keynote introduces a systems-science framework for designing and managing such ecosystems using principles of modularity, control, feedback, robustness, and socio-technical alignment.<\/span><\/p><p>We illustrate these concepts through practical examples drawn from real-world deployments of agentic AI systems within our enterprise\u2014covering problem framing and task decomposition, model and tool selection, governed data access with role-based guardrails, deterministic scaffolding and orchestration, and SLO-driven optimization for quality, latency, and cost.<\/p><p>The framework emphasizes end-to-end observability through logging and tracing, alongside engineered feedback loops\u2014data flywheels\u2014that sustain performance and prevent regression. It also addresses critical failure modes such as brittle retrieval pipelines, unbounded tool execution, model drift, and hidden coupling. We conclude with proven mitigation strategies to help organizations evolve agentic AI from prototype experimentation into dependable, scalable enterprise infrastructure.<\/p><h4><strong>Speaker Biography<\/strong><\/h4><p><span data-olk-copy-source=\"MessageBody\">Rama Akkiraju is the Vice President of Enterprise AI at NVIDIA, where she leads the AI-at-NVIDIA mission to build agentic AI platforms and AI agents that enhance employee productivity and drive business and operational effectiveness across the enterprise.<\/span><\/p><p>Previously, Rama was an IBM Fellow, Master Inventor, and CTO of IBM Watson AIOps. Over her career, she has led the design and development of enterprise AI products spanning generative and agentic AI, machine learning, natural language processing, speech recognition, human-computer interaction, decision support systems, business process management, and semantic web services. Her work has consistently focused on translating advanced AI research into scalable, real-world systems that deliver measurable impact.<\/p><p>A TED AI speaker and W3C standards contributor, Rama has co-authored more than 100 technical papers and holds over 50 issued patents, with additional patents pending. She has received numerous academic and industry honors, including four best paper awards from leading conferences such as INFORMS and AAAI. Her recognitions include Forbes\u2019 Top 20 Women in AI Research, Fortune\u2019s \u201cA-Team in AI,\u201d UC Berkeley\u2019s Athena Award for Technical and Executive Leadership, and AI Industry Leader of the Year from Women Leaders in Data &amp; AI.<\/p><p>Rama holds a master\u2019s degree in computer science and graduated as valedictorian of her MBA program at New York University.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ab3e8f e-con-full e-flex e-con e-child\" data-id=\"0ab3e8f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b82a599 e-con-full e-flex e-con e-child\" data-id=\"b82a599\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6654346 elementor-widget elementor-widget-text-editor\" data-id=\"6654346\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><span style=\"font-weight: bolder\">PLENARY KEYNOTE 2<br \/>Time: TBD<\/span><\/h5><h3 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><strong>AI Agents for Enterprise Services: Middleware, Automation, and Quality Control<\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b6aaaa e-con-full e-flex e-con e-child\" data-id=\"2b6aaaa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-568718d e-con-full e-flex e-con e-child\" data-id=\"568718d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5317a9a elementor-widget elementor-widget-image\" data-id=\"5317a9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/boualem-683x1024.jpg\" class=\"attachment-large size-large wp-image-932\" alt=\"\" srcset=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/boualem-683x1024.jpg 683w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/boualem-200x300.jpg 200w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/boualem-768x1152.jpg 768w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/boualem.jpg 867w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9545d2 elementor-widget elementor-widget-text-editor\" data-id=\"e9545d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>Boualem Benatallah<\/strong> <br \/>Dublin City Univeristy<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd2a621 e-con-full e-flex e-con e-child\" data-id=\"cd2a621\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5146ca1 elementor-widget elementor-widget-text-editor\" data-id=\"5146ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Abstract<\/strong><\/h4><p><span lang=\"EN-IE\">AI agents are redefining enterprise and service operations through reasoning, autonomy, and adaptive decision-making. Powered by large language and action models, these agentic systems extend automation beyond static workflows toward goal-driven services that interact with data, tools, and APIs. By leveraging memory and feedback from past interactions, agents can retain knowledge and improve their performance over time.<\/span><\/p><p><span lang=\"EN-IE\">As these capabilities expand, robust quality control becomes essential. Greater flexibility and automation must be accompanied by safeguards that ensure reliability, trustworthiness, and compliance. In particular, quality control must address multiple stages of agent operation, including the quality of input prompts, the soundness of reasoning processes, and the safety and validity of outputs and actions. Mechanisms such as grounded validation, automated safeguards, structured memory management, and feedback-driven correction help ensure that agentic systems operate predictably at scale.<\/span><\/p><p><span lang=\"EN-IE\">This talk revisits the abstractions and middleware needed for AI-powered services, highlighting the convergence of service integration, agent memory and knowledge management, multi-agent orchestration, and built-in quality control as foundations for the next generation of adaptive and trustworthy enterprise services.<\/span><\/p><h4><strong>Speaker Biography<\/strong><\/h4><p><span lang=\"EN-IE\">Prof. Boualem Benatallah is a full professor of computing at Dublin City University (DCU, Ireland) since January 2022. He has had over 21 years as a research leader and academic at UNSW Sydney (Australia), where he served as senior lecturer, associate professor, professor, and Scientia Professor, before joining DCU. He is a Fellow of the IEEE.<\/span><\/p><p><span lang=\"EN-IE\"><br \/>His main research interests are in AI-enabled services, process AI, LLM-powered agents, quality control in crowdsourcing and AI services, service-oriented computing, and business process management. He has published more than 350 refereed papers, including more than 100 journal articles. Most of his papers appeared in very selective and reputable conferences and journals. His research attracted a large amount of competitive research funding through national and international grants from both government and industry. He supervised over 40 research students to completion. He was awarded the prestigious IEEE TCSVC Research Innovation Award for contributions to Model-driven Web Services Composition. He has also won multiple best paper awards at prestigious conferences and received the IBM Faculty Award. With his co-authors, he was recognized by IEEE TSE for one of the most influential papers of the journal\u2019s 3rd decade and contributed a retrospective to its 50th anniversary issue in 2025.<\/span><\/p><p><span lang=\"EN-IE\"><br \/>Boualem has been the general and PC chair of a number of international conferences and has served as guest editor of several special issues in leading journals. He was a member of the Steering Committee (SC) of the BPM conference. He is the co-chair of the steering committees of the ICSOC and CoopIS conferences and serves on the editorial boards of several prestigious journals including ACM Transactions on the Web, IEEE Transactions on Services Computing, and ACM Computing Surveys. He was a member of the team (comprising multiple university, government, and industry partners) that founded and constructed the successful bid for the Smart Services CRC (Cooperative Research Centre, Australia). He was also research leader of the Data Curation Foundry research stream at the Data to Decisions CRC (Australia). He is the funded investigator at the Insight Research Centre (Ireland). <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-710c55c e-con-full e-flex e-con e-child\" data-id=\"710c55c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3eacc68 e-con-full e-flex e-con e-child\" data-id=\"3eacc68\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df53c3e elementor-widget elementor-widget-text-editor\" data-id=\"df53c3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><span style=\"font-weight: bolder\">PLENARY KEYNOTE 3<br \/>Time: TBD<\/span><\/h5><h3 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><strong>Design and Analysis of Human-Cyber-Physical Systems: Challenges and Research Directions<\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2adbe6e e-con-full e-flex e-con e-child\" data-id=\"2adbe6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6ae5dc4 e-con-full e-flex e-con e-child\" data-id=\"6ae5dc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7dbcd67 elementor-widget elementor-widget-image\" data-id=\"7dbcd67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"684\" height=\"1024\" src=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Zhi-684x1024.jpg\" class=\"attachment-large size-large wp-image-938\" alt=\"\" srcset=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Zhi-684x1024.jpg 684w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Zhi-200x300.jpg 200w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Zhi-768x1150.jpg 768w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Zhi-1026x1536.jpg 1026w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Zhi.jpg 1325w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6496236 elementor-widget elementor-widget-text-editor\" data-id=\"6496236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>Zhi Jin<\/strong><br \/><span data-olk-copy-source=\"MessageBody\">Hongyi\u00a0<\/span>visiting\u00a0professor\u00a0and the Dean of the\u00a0Software College\u00a0at Wuhan University<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c74fa0b e-con-full e-flex e-con e-child\" data-id=\"c74fa0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c273fb3 elementor-widget elementor-widget-text-editor\" data-id=\"c273fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Abstract<\/strong><\/h4><p><span data-olk-copy-source=\"MessageBody\">Human Cyber\u2013physical systems (HCPSs) are characterized by the organic integration of human, a computation and communication cyber layer, and physical components, which are becoming an integral part of daily life, with applications ranging from autonomous driving, operating room of the future, cockpit-tower interaction and emergency response. Such kind of\u00a0<\/span>socio-technical systems\u00a0represents a new wave of software paradigm shift. The design and analysis of such a system will face serious challenges, which arise specifically from the critical role humans play in these complex systems and the complicated interactions between the highly\u00a0heterogeneous components. The complexity of interaction comes more from the two roles humans play in the system\uff0c\u00a0i.e.\u00a0&#8216;human-in-the-loop&#8217; and &#8216;human-on-the-loop&#8217;.\u00a0Traditional\u00a0system design and analysis methods which mainly focus on the\u00a0machine-oriented\u00a0controlling\u00a0need to shift towards approaches that focus on explicit modeling and controlling\u00a0of\u00a0the human layer\u00a0in HCPSs.\u00a0The subjectivity and uncertainty of human behavior further pose challenges to system design.<\/p><p>In this presentation,\u00a0we discuss a comprehensive consideration of humans and their interactions with all other components, rather than just focusing on the twins of cyber-physical systems or human-computer interaction. We propose that the model-driven engineering approach can help in defining mutually intelligible and interoperable models so that they can be shared and implemented across different domains and different hierarchical levels in socio-technical systems. To establish such \u201chigh-level\u201d interaction, we would also discuss the fundamental challenge of incomplete and\/or partial information, particularly in the context of human-machine teams, both among cooperating team members and between the team and its environment. The environment of an system consists of all artefacts of the real world that are relevant for allowing the system to achieve its objectives and\/or are influenced by the system. We model such artefacts themselves as systems. Systems in the environment can be dynamic, or static. Systems in the environment can thus be humans, physical systems, cyber-physical systems, or human cyber-physical systems. We need to address the modeling and design of the system of systems.\u00a0<\/p><p>This talk will discuss the potential approach to designing such HCPSs and explain new phenomena, such as the emerging behaviors exhibited by human-intelligent machine collaborations.<\/p><h4><strong>Speaker Biography<\/strong><\/h4><p>Zhi Jin, is Hongyi visiting professor and the Dean of the Software College at Wuhan University. She is also professor of computer science at Peking University and the deputy director of Key Laboratory of High-Confidence of Software Technologies, Ministry of Education, China. Before joining Peking University, she served as post doctor, associate professor, and professor in Chinese Academy of Sciences.\u00a0<\/p><p>Her main research interest is AI for SE, with a long-term focus on knowledge enringeering and domain knowledge-led requirements engineering. She has published over 300 scientific articles in refereed international journals and high rank conferences. She has also co-authored five books and has held more than 30 approved invention patents. Her research attracted a large amount of competitive research funding through national and international grants from both government and industry. She is six times recipient of ACM SIGSOFT Distinguished Paper Awards. She is an Outstanding Youth Fund Winner of National Science Foundation China, which is one of the most highly regarded national titles for top researchers in their respective disciplines. She is also Scientific Chinese \u201cthe people in year 2017\u201d, the winner of the Distinguished Women IT Researcher of China, and the Distinguished Young Scholars of Chinese Academy of Sciences. She has also won the Zhong Chuang Software Talent Award. She was elected as an IEEE Fellow for significant contributions to knowledge-driven software development.<\/p><p>She services and contributes to the software engineering community. She served as the Chairman of CCF TCSE and CCF TCSS. She is the Vice Chairman of IREB China Community, and the Vice Chair of ACM China. She is also a frequent contributor to world-renowned conferences in her research area, including General co-Chair of the ACM International Conference on the Foundations of Software Engineering 2027, IEEE World Service Conference 2024, IEEE Requirements Engineering 2016; Program co-Chair in Chief of IEEE World Service Conference 2020; Program Committee Co-Chair of IEEE COMPSAC-2011, etc.. She serves on the editorial boards of several prestigious journals.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-298998f e-con-full e-flex e-con e-child\" data-id=\"298998f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-848c65b e-con-full e-flex e-con e-child\" data-id=\"848c65b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-586c2c0 elementor-widget elementor-widget-text-editor\" data-id=\"586c2c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><span style=\"font-weight: bolder\">PLENARY KEYNOTE 4<br \/>Time: TBD<\/span><\/h5><h3 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><strong>Weaving Intelligence into the Substrate: The AI Interconnect and the Future of 6G<\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d0c706 e-con-full e-flex e-con e-child\" data-id=\"0d0c706\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bbf00bf e-con-full e-flex e-con e-child\" data-id=\"bbf00bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c410f1f elementor-widget elementor-widget-image\" data-id=\"c410f1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"1024\" src=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-682x1024.jpg\" class=\"attachment-large size-large wp-image-976\" alt=\"\" srcset=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-682x1024.jpg 682w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-200x300.jpg 200w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-768x1154.jpg 768w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-1022x1536.jpg 1022w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-1363x2048.jpg 1363w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/03\/Sasu-scaled.jpg 1704w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a16cc6 elementor-widget elementor-widget-text-editor\" data-id=\"5a16cc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong><span data-olk-copy-source=\"MessageBody\">Sasu Tarkoma<\/span><\/strong><br \/><span data-olk-copy-source=\"MessageBody\">Dean of the Faculty of Science at the University of Helsinki<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8395ac e-con-full e-flex e-con e-child\" data-id=\"b8395ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48128fc elementor-widget elementor-widget-text-editor\" data-id=\"48128fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Abstract<\/strong><\/h4><div data-olk-copy-source=\"MessageBody\">The transition toward 6G is not just an evolution in communication-it is a redefinition of what networks are. Rather than passive infrastructures that transport data, future networks will operate as intelligent substrates capable of sensing, reasoning, and acting in near real time.<\/div><div>\u00a0<\/div><div>This keynote explores the emerging concept of sentient networks, where artificial intelligence is not an external layer but an intrinsic part of both the control and user planes. The central challenge is translating high-level human intent into network behavior under strict constraints in communication, energy, memory, and compute.<\/div><div>\u00a0<\/div><div>To address this, the talk introduces the AI Interconnect \u2014 a unifying architectural paradigm that embeds intelligence across the edge-cloud continuum. The AI Interconnect enables networks to dynamically interpret intent, orchestrate distributed intelligence, and adapt to changing conditions in real time.<\/div><div>\u00a0<\/div><div>At its core is a decentralized orchestration framework for coordinating AI models, data flows, and network resources as composable services. This includes intelligent model placement, task coordination, and governance mechanisms, while leveraging large language models to bridge the gap between user intent and system-level execution.<\/div><div>\u00a0<\/div><div>The keynote further examines new interaction models, such as neural publish\/subscribe, and lightweight AI strategies for edge environments. Through practical case studies \u2014 from smart environments to energy-efficient digital twins \u2014 the talk outlines a roadmap toward autonomous, agent-driven networks, where intelligence is woven into the very fabric of connectivity.<\/div><div>\u00a0<\/div><h4><strong>Speaker Biography<\/strong><\/h4><p><span data-olk-copy-source=\"MessageBody\">Sasu Tarkoma is Dean of the Faculty of Science at the University of Helsinki and Professor of Computer Science. He is also a Visiting Professor at the University of Oulu. He has published over 350 scientific articles and authored or co-authored four books with Wiley, CRC Press, and Cambridge University Press. He holds 13 granted US patents and more than 20 international patent applications. His work has received over 10 Best Paper awards and recognitions, including honors at ACM SenSys (Test of Time Award), IEEE PerCom, ACM CCR, and ACM OSR.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a45b08a e-con-full e-flex e-con e-child\" data-id=\"a45b08a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3f7d012 e-con-full e-flex e-con e-child\" data-id=\"3f7d012\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4962bda elementor-widget elementor-widget-text-editor\" data-id=\"4962bda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><span style=\"font-weight: bolder\">PLENARY KEYNOTE 5<br \/>Time: TBD<\/span><\/h5><h3 style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';color: #333333;text-align: center\"><span style=\"font-weight: bolder\">Artificial Intelligence for Cloud and IoT-based Transportation Systems Security and Resiliency<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-777c1ee e-con-full e-flex e-con e-child\" data-id=\"777c1ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e728027 e-con-full e-flex e-con e-child\" data-id=\"e728027\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6783ec elementor-widget elementor-widget-image\" data-id=\"d6783ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"614\" height=\"504\" src=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/01\/Bhavani.jpg\" class=\"attachment-large size-large wp-image-868\" alt=\"\" srcset=\"https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/01\/Bhavani.jpg 614w, https:\/\/services.conferences.computer.org\/2026\/wp-content\/uploads\/sites\/4\/2026\/01\/Bhavani-300x246.jpg 300w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b760e elementor-widget elementor-widget-text-editor\" data-id=\"82b760e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>Bhavani Thuraisingham<\/strong><br \/>The University of Texas at Dallas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c11f97d e-con-full e-flex e-con e-child\" data-id=\"c11f97d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0db7a85 elementor-widget elementor-widget-text-editor\" data-id=\"0db7a85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Abstract<\/strong><\/h4><p>Artificial Intelligence (AI) techniques ae being applied to numerous applications from Healthcare to Cyber Security to Finance. For example, Machine Learning (ML) algorithms are being applied to solve security problems such as malware analysis and insider threat detection. However, there are many challenges in applying ML algorithms for various applications. For example, (i) the ML algorithms may be subject to cyber-attacks and (ii) they may violate the privacy of individuals. This is because we can gather massive amounts of data and apply ML algorithms on the data to extract highly sensitive information. Also, the attacks to the ML algorithms could result in catastrophic errors including in cyber physical systems such as transportation systems. The ML algorithms have to be resilient and recover from faults, malicious or otherwise. In addition to machine learning, the Generative AI (GenAI) systems may also be subject to attacks. On the other hand, both ML and GenAI algorithms could enhance the security of transportation systems.<\/p><p>In this presentation, we discuss the research we are conducting including for the USDOT National University Technology Center TraCR (Transportation Cybersecurity and Resiliency) led by Clemson University. In particular, we describe (i) the application of federated machine learning techniques for detecting attacks in transportation systems, (ii) publishing synthetic transportation data sets that preserve privacy, (iii) examining how GenAI systems are being integrated with transportation systems to provide security, and (iv) developing resiliency solutions for transportation systems to recover from malicious attacks, Finally, we discuss how our systems can be hosted on Cloud and IoT-based Secure Infrastructures.<\/p><h4><strong>Speaker Biography<\/strong><\/h4><p>Dr. Bhavani Thuraisingham is the Founders Chair Professor of Computer Science and the Founding Executive Director of the Cyber Security Research and Education Institute at the University of Texas at Dallas (UTD). She is an elected Fellow of the ACM, IEEE, the AAAS, and the NAI as well as the British-based BCS and IMA. Her research interests are integrating cyber security and artificial intelligence\/data science including as they relate to the cloud, IoT, and Transportation Systems. She has received several technical, education and leadership awards including the IEEE CS 1997 Edward J. McCluskey Technical Achievement Award, the IEEE CS 2023 Taylor L. Booth Education Award, the IEEE Comsoc Communications and Information Security 2019 Technical Recognition Award, the IEEE CS Services Computing 2017 Research Innovation Award, the ACM SIGSAC 2010 Outstanding Contributions Award, the ACM CODASPY 2017 Lasting Research Award, and the ACM SACMAT 10 Year Test of Time Awards in 2018 and 2019, and a 2013 IBM Faculty Award for Secure Cloud Computing. Her 45 year career includes industry (Honeywell), federal research laboratory (MITRE), US government (NSF) and US Academia. Her work has resulted in 140+ journal articles, 300+ conference papers, 200+ keynote and featured addresses, seven US patents, sixteen books, and over 120+ panel presentations including at Fortune Media, Lloyds of London Insurance, Dell Technologies World, United Nations, and the White House Office of Science and Technology Policy. She has also written opinion columns for popular venues such as the New York Times, Inc. Magazine, Womensday.com and the Legal 500, She received her PhD from the University of Wales, Swansea, UK, and the prestigious earned higher doctorate (D. Eng) from the University of Bristol, UK. She also has a Certificate in Public Policy Analysis from the London School of Economics and Political Science. She has been featured in the book by the ACM in 2024 titled: \u201cRendering History: The Women of ACM-W\u201d as one of the 30+ \u201cWomen that Changed the Face of World Wide Computing Forever.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Plenary Keynotes PLENARY KEYNOTE 1Time: TBD From LLMs to Living Systems: Applying Systems Science to Agentic AI in the Enterprise Rama AkkirajuVP, Enterprise AI, NVIDIA, Ex-IBM Fellow Abstract Enterprise AI is transitioning from simple single-LLM flows to complex agentic ecosystems\u2014adaptive systems composed of multiple agents, tools, governed data, human workflows, and organizational policies. This keynote [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-436","page","type-page","status-publish","hentry"],"featured_image_src":null,"featured_image_src_square":null,"_links":{"self":[{"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/comments?post=436"}],"version-history":[{"count":0,"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/pages\/436\/revisions"}],"wp:attachment":[{"href":"https:\/\/services.conferences.computer.org\/2026\/wp-json\/wp\/v2\/media?parent=436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}