Iniciativa IMDEA
Resumen: Can we build molecular-scale devices that are justly called robots? A macroscopic robot has a large source of determinis...
Resumen: The talk concerns the design of code protecting transformations for white-box cryptography in a MATE (Man-At-The-End) at...
Resumen: Doodle (www.doodle.com) is the worldwide leader when it comes to online consensus-based scheduling. The service reaches ...
Resumen: Software-defined radio (SDR) brings the flexibility of software to the domain of wireless protocol design, promising bot...
Resumen: Growth-rate analysis is the problem of finding, for a program in a suitable programming language, how fast the computed ...
Resumen: Recent years have seen the development of successful commercial programming tools based on static analysis technologies,...
Resumen: A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the c...
Resumen: This talk explores the culture and motivations of the cryptographic research community. I examine the tension between th...
Resumen: Writing a complex but secure program is a near-impossible task for a conventional operating system. If an attacker compr...
Resumen: Model-based development (MBD) is a popular technique for performing embedded control system design for cyber-physical sy...
Resumen: Octagonal constraints expressing weakly relational numerical properties of the form (l ≤ ± x ± y ≤ h) have been found us...
Resumen: In this talk Colin will give a brief introduction to Clojure, a JVM-based programming language from the Lisp family, as ...
Resumen: Our vision to verify the security of large and complex systems is to: (i) design the system as a componentised, kernel-b...
Resumen: In this talk, I will give an overview of the various current activities within NICTA’s Trustworthy Systems team. B...
Resumen: Software is often redundant, in the sense that some operations are designed to behave like others but their executions d...
Resumen: Research on model-driven engineering has mainly focused on the use of models during software development. This work has ...
Resumen: We investigate the model counting problem for safety speci- fications expressed in linear-time temporal logic (LTL). Mode...
Resumen: Open-world software systems are built by composing heterogeneous, third-party components, whose behavior and interaction...
Resumen: Software surrounds us and drives our lives: most modern systems heavily rely on software. Managing the complexity of the...
Resumen: Despite its vast capacity and associative powers, the human brain does not deal well with interruptions. Particularly in...
Resumen: Formal verification of concurrent and reactive systems is necessary for many modern critical applications. The Timed Con...
Resumen: Session types are used to describe and structure interactions between independent processes in distributed systems. High...
Resumen: In this talk we explore the suitability of Bayesian Inference techniques, specifically Markov Chain Monte Carlo methods,...