IMDEA initiative
Abstract: Can we build molecular-scale devices that are justly called robots? A macroscopic robot has a large source of determinis...
Abstract: The talk concerns the design of code protecting transformations for white-box cryptography in a MATE (Man-At-The-End) at...
Abstract: Doodle (www.doodle.com) is the worldwide leader when it comes to online consensus-based scheduling. The service reaches ...
Abstract: Software-defined radio (SDR) brings the flexibility of software to the domain of wireless protocol design, promising bot...
Abstract: Growth-rate analysis is the problem of finding, for a program in a suitable programming language, how fast the computed ...
Abstract: Recent years have seen the development of successful commercial programming tools based on static analysis technologies,...
Abstract: A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the c...
Abstract: This talk explores the culture and motivations of the cryptographic research community. I examine the tension between th...
Abstract: Writing a complex but secure program is a near-impossible task for a conventional operating system. If an attacker compr...
Abstract: Model-based development (MBD) is a popular technique for performing embedded control system design for cyber-physical sy...
Abstract: Octagonal constraints expressing weakly relational numerical properties of the form (l ≤ ± x ± y ≤ h) have been found us...
Abstract: In this talk Colin will give a brief introduction to Clojure, a JVM-based programming language from the Lisp family, as ...
Abstract: Our vision to verify the security of large and complex systems is to: (i) design the system as a componentised, kernel-b...
Abstract: In this talk, I will give an overview of the various current activities within NICTA’s Trustworthy Systems team. B...
Abstract: Software is often redundant, in the sense that some operations are designed to behave like others but their executions d...
Abstract: Research on model-driven engineering has mainly focused on the use of models during software development. This work has ...
Abstract: We investigate the model counting problem for safety speci- fications expressed in linear-time temporal logic (LTL). Mode...
Abstract: Open-world software systems are built by composing heterogeneous, third-party components, whose behavior and interaction...
Abstract: Software surrounds us and drives our lives: most modern systems heavily rely on software. Managing the complexity of the...
Abstract: Despite its vast capacity and associative powers, the human brain does not deal well with interruptions. Particularly in...
Abstract: Formal verification of concurrent and reactive systems is necessary for many modern critical applications. The Timed Con...
Abstract: Session types are used to describe and structure interactions between independent processes in distributed systems. High...
Abstract: In this talk we explore the suitability of Bayesian Inference techniques, specifically Markov Chain Monte Carlo methods,...