Friday, December 12, 2014
Darko Stefanovic, Associate Professor, University of New Mexico, USAPlaying robotics with DNA
Abstract: Can we build molecular-scale devices that are justly called robots? A macroscopic robot has a large source of determinis...
Tuesday, December 9, 2014
Roberto Giacobazzi, Faculty (visiting), IMDEA Software InstituteObscuring code - Unveiling and Veiling Information in Programs
Abstract: The talk concerns the design of code protecting transformations for white-box cryptography in a MATE (Man-At-The-End) at...
Abstract: Doodle (www.doodle.com) is the worldwide leader when it comes to online consensus-based scheduling. The service reaches ...
Friday, October 17, 2014
Dimitrios Vytiniotis, Researcher, Microsoft Research, Cambridge, United KingdomZiria: wireless programming for hardware dummies
Abstract: Software-defined radio (SDR) brings the flexibility of software to the domain of wireless protocol design, promising bot...
Thursday, October 2, 2014
Amir Ben-Amram, Professor, Tel Aviv-Yaffo Academic CollegeWhat is decidable in growth-rate analysis of programs?
Abstract: Growth-rate analysis is the problem of finding, for a program in a suitable programming language, how fast the computed ...
Tuesday, September 16, 2014
Hongseok Yang, Professor, University of Oxford, United KingdomHow to find a good program abstraction automatically?
Abstract: Recent years have seen the development of successful commercial programming tools based on static analysis technologies,...
Thursday, September 11, 2014
Jan Midtgaard, Post-doctoral Researcher, Aarhus University, DenmarkQuickChecking Static Analysis Properties
Abstract: A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the c...
Abstract: This talk explores the culture and motivations of the cryptographic research community. I examine the tension between th...
Monday, July 21, 2014
Somesh Jha, Professor, University of Wisconsin, USARetrofitting Legacy Code for Security
Abstract: Writing a complex but secure program is a near-impossible task for a conventional operating system. If an attacker compr...
Tuesday, July 15, 2014
Jim Kapinski, Senior Research Engineer, Toyota Technical Center, Los Angeles, USASimulation-Guided Analysis for Industrial Embedded Control Designs
Abstract: Model-based development (MBD) is a popular technique for performing embedded control system design for cyber-physical sy...
Monday, July 14, 2014
Deepak Kapur, Research Professor, University of New Mexico, USAA Quantifier-Elimination Heuristic for Octagonal Constraints
Abstract: Octagonal constraints expressing weakly relational numerical properties of the form (l ≤ ± x ± y ≤ h) have been found us...
Abstract: In this talk Colin will give a brief introduction to Clojure, a JVM-based programming language from the Lisp family, as ...
Monday, June 23, 2014
June Andronick, Senior Research Engineer, NICTA, AustraliaFormal proof of security for million-lines-of-code systems
Abstract: Our vision to verify the security of large and complex systems is to: (i) design the system as a componentised, kernel-b...
Wednesday, June 18, 2014
June Andronick, Senior Research Engineer, NICTA, AustraliaTrustworthy Systems at NICTA
Abstract: In this talk, I will give an overview of the various current activities within NICTA’s Trustworthy Systems team. B...
Monday, April 28, 2014
Alessandra Gorla, Post-doctoral Researcher, Saarland University, GermanyImproving the reliability of software systems using their intrinsic redundancy
Abstract: Software is often redundant, in the sense that some operations are designed to behave like others but their executions d...
Friday, March 21, 2014
Giordano Tamburrelli, PhD Student, Università della Svizzera Italiana, Lugano, SwitzerlandModels at run-time: open challenges and existing solutions
Abstract: Research on model-driven engineering has mainly focused on the use of models during software development. This work has ...
Wednesday, March 12, 2014
Hazem Torfah, PhD Student, Saarland University, GermanyCounting Models of Linear-time Temporal Logic
Abstract: We investigate the model counting problem for safety speci- fications expressed in linear-time temporal logic (LTL). Mode...
Tuesday, March 11, 2014
Domenico Bianculli, Researcher, Università della Svizzera Italiana, Lugano, SwitzerlandA Journey through Specification and Verification Techniques for Open-World Software
Abstract: Open-world software systems are built by composing heterogeneous, third-party components, whose behavior and interaction...
Thursday, March 6, 2014
Julia Rubin, Researcher, Haifa Research LabTo Merge or Not to Merge: Managing Software Families
Abstract: Software surrounds us and drives our lives: most modern systems heavily rely on software. Managing the complexity of the...
Monday, February 24, 2014
Chris Parnin, PhD Student, Georgia Institute of Technology, USAProgrammer, Interrupted
Abstract: Despite its vast capacity and associative powers, the human brain does not deal well with interruptions. Particularly in...
Thursday, January 16, 2014
Laura Titolo, PhD Student, University of Udine, ItalyAn Abstract Interpretation Framework for Diagnosis and Verification of Timed Concurrent Constraint Languages
Abstract: Formal verification of concurrent and reactive systems is necessary for many modern critical applications. The Timed Con...
Tuesday, January 14, 2014
Giovanni Bernardi, Research Fellow, Trinity College, Dublin, IrelandUsing higher-order contracts to model session types
Abstract: Session types are used to describe and structure interactions between independent processes in distributed systems. High...
Friday, January 10, 2014
Carmela Troncoso, Post-doctoral Researcher, GradiantBayesian inference to evaluate information leakage in complex scenarios
Abstract: In this talk we explore the suitability of Bayesian Inference techniques, specifically Markov Chain Monte Carlo methods,...