Iniciativa IMDEA
Resumen: I will present a measure, called oscillation, for behaviors of pushdown automata which are finite state automata with au...
Resumen: In this talk, we will present an ongoing effort towards employing a concurrent Separation-style logic (FCSL) for reasoni...
Resumen: Model-driven methodologies can help developers create more reliable software. In previous work, we have advocated a mode...
Resumen: Anonymous communication systems ensure that correspondence between senders and receivers cannot be inferred with certain...
Resumen: Cache memories are an important tool for the good performance of computers since they solve the problem of retrieving da...
Resumen: Security in the Generic Group Model is a standard requirement for new hardness assumptions in (bilinear) groups. Recentl...
Resumen: Cybercriminals use different types of geographically distributed servers to run their operations such as C&C servers...
Resumen: We introduce the notion of asymmetric programmable hash functions (APHFs, for short), which adapts Programmable Hash Fun...
Resumen: We consider the problem of computing a bounded error approximation of the solution over a bounded time [0, T ], of a par...
Resumen: Interaction between variables, in a program, is a common phenomenon. Sometimes, programmers make a mistake and use varia...
Resumen: Designing scalable concurrent objects, which can be efficiently used on multicore processors, often requires one to aban...
Resumen: Code signing is a solution to verify the integrity of software and its publisher’s identity,but it can be abused b...
Resumen: Analyzing cryptographic constructions in the computational model, or simply verifying the correctness of security proofs...
Resumen: Provably fixing security problems can make a system unusable, while patching the system to protect from the latest secur...
Resumen: Linearizability is a commonly accepted notion of correctness for libraries of concurrent algorithms, and recent years ha...
Resumen: In this talk we will review the general resource analysis framework present in the CiaoPP system. We will start by descr...
Resumen: Dynamic invariant detection allows mining of specifications from existing systems, but the quality of the resulting inva...
Resumen: To achieve scalability and availability, modern distributed systems often provide only weak guarantees about the consist...
Resumen: Logic programming systems featuring Constraint Logic Programming and tabled execution have been shown to increase the de...
Resumen: Using annotations, referred to as assertions or contracts, to describe program properties for which run-time tests are t...
Resumen: We consider the problem of computing a bounded error ap-proximation of the solution over a bounded time [0, T], of a par...
Resumen: In this talk I’ll try to practically demonstrate how some of the key features of Prolog-style logic programming ca...
Resumen: Anonymity networks such as Tor are a critical privacy-enabling technology. Tor’s hidden services protect the locat...
Resumen: We study systems consisting of a leader process and arbitrarily many anonymous and identical contributors. Processes com...
Resumen: We study the task of verifiable delegation of computation on encrypted data. We improve previous definitions in order to...
Resumen: We introduce a model for mixed syntactic/semantic approximation of programs based on symbolic finite automata (SFA). The...
Resumen: In the past decade, significant progress has been made towards design and development of efficient fine-grained (i.e., l...
Resumen: Efficient implementations of concurrent objects such as semaphores, locks, and atomic collections are essential to moder...
Resumen: FIWARE is an open platform which integrates advanced OpenStack-based Cloud capabilities and a library of Generic Enabler...
Resumen: I propose a process calculus to model high-level distributed systems, whose topology is described by a digraph. The calc...
Resumen: Masking schemes transform circuits such that even adversaries that may learn the value of some intermediate wires do not...
Resumen: How do we know a program does what it claims to do? In this talk I will present CHABADA, our technique to detect suspici...