Abstract: Multi-threaded programming is increasingly relevant due to the growing prevalence of multi-core processors. Unfortunatel...


Pedro R. D'Argenio

Tuesday, September 30, 2008

Pedro R. D'Argenio, Lecturer, Universidad Nacional de Cordoba (UNC), Argentina

Quantitative Model Checking Revisited: neither Decidable nor Approximable

Abstract: Quantitative model checking computes the probability values of a given property quantifying over all possible schedulers...


Abstract: For performance reasons, multiprocessors may reorder memory accesses in various subtle ways: your shared-memory concurre...


Gogul Balakrishnan

Monday, July 14, 2008

Gogul Balakrishnan, Researcher, NCE Labs, Princeton, NJ

WYSINWYX: What You See Is Not What You eXecute

Abstract: What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs ...


Chris Gill

Friday, June 27, 2008

Chris Gill, Associate Professor, Washington University in St. Louis

Time and Event Based System Software Design and Verification

Abstract: Distributed real-time system software consists of layered stacks of mechanisms, including: operating system level thread...


Gerardo Schneider

Monday, May 26, 2008

Gerardo Schneider, Researcher, University of Oslo

Specification and analysis of electronic contracts

Abstract: In this talk I will describe CL, a formal language for writing (electronic) contracts, in the context of Service-Oriente...


Abstract: Can you trust your compiler? Can we make sure that the generated machine code behaves as prescribed by the semantics of ...


Jose Meseguer

Wednesday, April 2, 2008

Jose Meseguer, Professor, University of Illinois at Urbana-Champaign

The Temporal Logic of Rewriting

Abstract: This talk presents the temporal logic of rewriting TLR*. Syntactically, TLR* is a very simple extension of CTL* which ju...


Anindya Banerjee

Monday, March 31, 2008

Anindya Banerjee, Professor, Kansas State University

Semantics and Enforcement of Information Flow Policies

Abstract: Information flow policies like confidentiality and integrity are essential to the security of many software systems such...