Wednesday, December 18, 2013
Alessandro Orso, Professor, Georgia Institute of Technology, USAAutomated Debugging: Are We There Yet?
Abstract: Software debugging, which involves localizing, understanding, and removing the cause of a failure, is a notoriously diff...
Tuesday, November 26, 2013
Roberto Di Cosmo, Professor, Université Paris Diderot, FranceThe Aeolus approach to Cloud automation
Abstract: Many tools, methods and models are available today to manage distributed applications in the Cloud. Aeolus brings a new ...
Tuesday, October 15, 2013
Cesare Tinelli, Professor, The University of Iowa, USASMT-based Model Checking
Abstract: The field of model checking owes much of its great success and impact to the use of symbolic techniques to reason effici...
Friday, September 20, 2013
Gopal Gupta, Professor, The University of Texas at Dallas, USALogic, Coinduction and Infinite Computation
Abstract: Coinduction is a powerful technique for reasoning about unbounded sets, unbounded structures, infinite automata, and int...
Monday, June 17, 2013
Neng-Fa Zhou, Professor, The City University of New YorkThe Picat Language and System
Abstract: This talk will give the design principles of the Picat language, highlight the high-level and intuitive abstractions pro...
Friday, April 19, 2013
Michael Emmi, Post-doctoral Researcher, LIAFA, Université Paris DiderotConcurrent Software Modeling and Analysis: Recursively Parallel Programs
Abstract: The widespread rigorous construction of concurrent software (e.g., reactive event-driven code, high-performance parallel...
Thursday, April 11, 2013
Tudor Dumitras, Senior Research Engineer, Symantec Research Labs (SRL)Improving System Security with Big Data Techniques
Abstract: Because computer systems operate in an ecosystem of users, attackers and inter-dependent software, their security depend...
Tuesday, April 9, 2013
Philipp Leitner, Post-doctoral Researcher, Vienna University of Technology, AustriaBuilding Applications for the Infrastructure-as-a-Service Cloud with CloudScale
Abstract: Cloud Computing is one of the most notorious hypes in today’s Web information systems research and practice. In th...
Friday, March 22, 2013
Jorge A. Navas, Post-doctoral Researcher, The University of Melbourne, AustraliaUnbounded Model-Checking with Interpolation for Regular Language Constraints
Abstract: We present a decision procedure for the problem of, given a set of regular expressions R1,..Rn, determining whether thei...
Friday, March 15, 2013
Johannes Kinder, Post-doctoral Researcher, EPFL, SwitzerlandBasing Trust in Applications on More Than Pure Faith
Abstract: The amount of software keeps growing steadily, and users are faced with an increasingly complex choice of which applicat...
Tuesday, March 12, 2013
Ivan Beschastnikh, PhD Student, University of Washington, USAModeling Systems from Logs of their Behavior
Abstract: Logged messages are invaluable for debugging and diagnosing problems. Unfortunately, many execution logs are inscrutable...
Wednesday, March 6, 2013
Radu Iosif, Researcher, VERIMAG/CNRS, Grenoble, FranceThe Tree Width of Separation Logic with Recursive Definitions
Abstract: Separation Logic is a widely used formalism for describing dynamically allocated linked data structures, such as lists, ...
Monday, March 4, 2013
Anthony W. Lin, Post-doctoral Researcher, U. of OxfordReversal-bounded Acceleration of Counter Systems
Abstract: Automatic analysis of integer-manipulating programs is a main problem in program analysis. Such programs are a basic bui...
Friday, February 22, 2013
Dario Fiore, Post-doctoral Researcher, Max Planck Institute for Software Systems, GermanyProvably-Secure Cryptography: theory and practice meet up to tackle modern challenges
Abstract: In the last thirty years cryptographic research laid the foundations for facing security problems whose solutions impact...
Wednesday, January 9, 2013
Andrea Cerone, PhD Student, Trinity College, Dublin, IrelandTesting Wireless Networks
Abstract: We present a process calculus for modelling wireless networks at the Network Layer of the ISO/OSI reference model, that ...
Friday, January 4, 2013
Aleksandar Dimovski, PhD Student, FON University, MacedoniaProgram Verification by Game Semantics: From Abstraction-Refinement to Symbolic Approach
Abstract: Game semantics is a denotational semantics which constructs models of terms (open programs) by looking at the ways in wh...