IMDEA initiative
Abstract: State-of-the-art solvers for constrained Horn clauses (CHC) are successfully used to generate reachability facts for sof...
Abstract: The FIDE Laws of Chess establish that if a player runs out of time during a game, they lose unless there exists no seque...
Abstract: Petri nets (PN) are a popular formalism to represent concurrent systems. However, they lack support for modelling and an...
Abstract: Indirect surveys have been used for decades by epidemiologists and social scientists to estimate the size of sub-populat...
Abstract: This talk starts with a result in classical Finite Automata Theory: Two regular languages with the same number of words ...
Abstract: Not many results in Computer Science are recognised to be as basic and fundamental as Kleene Theorem. It states the equa...
Abstract: Virtually all computer programs are written in high-level languages. A suitable source language can impose certain desir...
Abstract: SMT (Satisfiability Modulo Theories) solving is a technology for the fully automated solution of logical formulas. SMT s...
Abstract: Unsafe languages, like C and C++, have long been the preferred choice for systems programming thanks to their unique fea...
Abstract: Dynamically typed array languages such as Python, APL, and Matlab lift scalar operations to arrays and replicate scalars...
Abstract: Traitor-tracing systems allow identifying the users who contributed to building a rogue decoder in a broadcast environme...
Abstract: The recent years have seen remarkable progress in establishing the complexity of the reachability problem for vector add...
Abstract: The problem of Byzantine consensus has been key to designing secure distributed systems. Although it is well known that ...
Abstract: Approximate fully homomorphic encryption (FHE) schemes such as the CKKS scheme (Asiacrypt ’17) are popular in practice d...
Abstract: In this talk I will present the work I have done concerning the specification and analysis of normative documents using ...
Abstract: This talk will show some of the recent advances we are doing at Microsoft Research towards agents capable of modeling co...
Abstract: Recent years have been pivotal in the field of Industrial Control Systems (ICS) security, with a large number of high-pr...
Abstract: Adversaries exploit vulnerabilities to compromise systems. For instance, a vulnerability in a Web browser sandbox may al...
Abstract: Cyber-physical systems (CPS) are now ubiquitous among automated technologies, in which physical dynamical systems are op...
Abstract: Many security mitigation techniques rely on program analysis. Languages such as C/C++ support the use of pointers for in...
Abstract: We live in an era of unprecedented compute availability. The advent of the cloud allows anyone to deploy critical high-p...
Abstract: Indistinguishability obfuscation turns a program unintelligible without altering its functionality. Because it captures ...
Abstract: This talk will go over the basics of the PageRank problem, studied initially by the founders of Google, which allowed th...
Abstract: A strong argument in favour of dynamically-typed programming languages is their flexibility, enabling quick code writing...