Iniciativa IMDEA
Resumen: Many important system properties, particularly in security and privacy, cannot be verified statically. Therefore, runtim...
Resumen: This talk is concerned with the combination of monitoring techniques and reactive synthesis based on temporal logic (LTL...
Resumen: A significant proportion of classes in modern software introduce or use object protocols, prescriptions on the temporal ...
Resumen: The Kleene theorem establishes a fundamental link between automata and expressions over the free monoid. Numerous genera...
Resumen: Petri nets are a popular and well-studied formal model for the representation and verification of parallel processes. Th...
Resumen: The past ten years have seen an increasing presence of deep learning algorithms to perform a diverse set of tasks thanks...
Resumen: Software developers make pervasive use of third-party software supply chains to reduce costs and accelerate release cycl...
Resumen: The hardware security crisis brought on by recent speculative execution attacks has shown that it is crucial to adopt a ...
Resumen: Cramer, Damgård, and Schoenmakers (CDS) built a proof system to demonstrate the possession of subsets of witnesses for a...
Resumen: Computing platforms increasingly incorporate heterogeneous hardware technologies, as a way to scale application performa...
Resumen: Analyzing large and heterogeneous data is a recurrent problem for analysts and researchers. For example, a dataset of ne...
Resumen: Nowadays, attackers have large amount of resources (e.g., computational and space capabilities) that are used for malici...
Resumen: The blockchain offered a distributed way to provide security guarantees for financial transactions that avoid the single...
Resumen: The pervasiveness of cell phones, mobile applications and social media generates vast amounts of digital traces that can...
Resumen: When collecting information, local differential privacy (LDP) relieves users’ privacy concerns, as it adds noise t...
Resumen: The slowdown in transistor scaling and the end of Moore’s law indicate a need to invest in new computing paradigms...
Resumen: The multi-scale programmability of modern computer systems, including network fabrics and systems-on-chip, presents unpr...
Resumen: Data is eating the world. Systems for storing and processing data, such as Database Management Systems (DBMSs), are thus...
Resumen: Online services play a major role in our everyday life for communication, entertainment, socializing, e-commerce, etc. T...
Resumen: I will talk about two fairly different but representative lines of my work. The first line of work is about reachability...
Resumen: Efficient and effective fuzzing requires the availability of the input specification for the program under test. However...