Invited Talks

Alessandro Orso

Wednesday, December 18, 2013

Alessandro Orso, Professor, Georgia Institute of Technology, USA

Automated Debugging: Are We There Yet?

Abstract: Software debugging, which involves localizing, understanding, and removing the cause of a failure, is a notoriously diff...


Roberto Di Cosmo

Tuesday, November 26, 2013

Roberto Di Cosmo, Professor, Université Paris Diderot, France

The Aeolus approach to Cloud automation

Abstract: Many tools, methods and models are available today to manage distributed applications in the Cloud. Aeolus brings a new ...


Cesare Tinelli

Tuesday, October 15, 2013

Cesare Tinelli, Professor, The University of Iowa, USA

SMT-based Model Checking

Abstract: The field of model checking owes much of its great success and impact to the use of symbolic techniques to reason effici...


Gopal Gupta

Friday, September 20, 2013

Gopal Gupta, Professor, The University of Texas at Dallas, USA

Logic, Coinduction and Infinite Computation

Abstract: Coinduction is a powerful technique for reasoning about unbounded sets, unbounded structures, infinite automata, and int...


Neng-Fa Zhou

Monday, June 17, 2013

Neng-Fa Zhou, Professor, The City University of New York

The Picat Language and System

Abstract: This talk will give the design principles of the Picat language, highlight the high-level and intuitive abstractions pro...


Michael Emmi

Friday, April 19, 2013

Michael Emmi, Post-doctoral Researcher, LIAFA, Université Paris Diderot

Concurrent Software Modeling and Analysis: Recursively Parallel Programs

Abstract: The widespread rigorous construction of concurrent software (e.g., reactive event-driven code, high-performance parallel...


Tudor Dumitras

Thursday, April 11, 2013

Tudor Dumitras, Senior Research Engineer, Symantec Research Labs (SRL)

Improving System Security with Big Data Techniques

Abstract: Because computer systems operate in an ecosystem of users, attackers and inter-dependent software, their security depend...


Philipp Leitner

Tuesday, April 9, 2013

Philipp Leitner, Post-doctoral Researcher, Vienna University of Technology, Austria

Building Applications for the Infrastructure-as-a-Service Cloud with CloudScale

Abstract: Cloud Computing is one of the most notorious hypes in today’s Web information systems research and practice. In th...


Jorge A. Navas

Friday, March 22, 2013

Jorge A. Navas, Post-doctoral Researcher, The University of Melbourne, Australia

Unbounded Model-Checking with Interpolation for Regular Language Constraints

Abstract: We present a decision procedure for the problem of, given a set of regular expressions R1,..Rn, determining whether thei...


Johannes Kinder

Friday, March 15, 2013

Johannes Kinder, Post-doctoral Researcher, EPFL, Switzerland

Basing Trust in Applications on More Than Pure Faith

Abstract: The amount of software keeps growing steadily, and users are faced with an increasingly complex choice of which applicat...


Ivan Beschastnikh

Tuesday, March 12, 2013

Ivan Beschastnikh, PhD Student, University of Washington, USA

Modeling Systems from Logs of their Behavior

Abstract: Logged messages are invaluable for debugging and diagnosing problems. Unfortunately, many execution logs are inscrutable...


Radu Iosif

Wednesday, March 6, 2013

Radu Iosif, Researcher, VERIMAG/CNRS, Grenoble, France

The Tree Width of Separation Logic with Recursive Definitions

Abstract: Separation Logic is a widely used formalism for describing dynamically allocated linked data structures, such as lists, ...


Anthony W. Lin

Monday, March 4, 2013

Anthony W. Lin, Post-doctoral Researcher, U. of Oxford

Reversal-bounded Acceleration of Counter Systems

Abstract: Automatic analysis of integer-manipulating programs is a main problem in program analysis. Such programs are a basic bui...


Dario Fiore

Friday, February 22, 2013

Dario Fiore, Post-doctoral Researcher, Max Planck Institute for Software Systems, Germany

Provably-Secure Cryptography: theory and practice meet up to tackle modern challenges

Abstract: In the last thirty years cryptographic research laid the foundations for facing security problems whose solutions impact...


Andrea Cerone

Wednesday, January 9, 2013

Andrea Cerone, PhD Student, Trinity College, Dublin, Ireland

Testing Wireless Networks

Abstract: We present a process calculus for modelling wireless networks at the Network Layer of the ISO/OSI reference model, that ...


Abstract: Game semantics is a denotational semantics which constructs models of terms (open programs) by looking at the ways in wh...