theory.eecs.qmul.ac.uk
People
http://theory.eecs.qmul.ac.uk/people
Research group in Theoretical Computer Science at Queen Mary University of London. Prof Angus MacIntyre FRS (cross-appointed with Maths). Dr Josh Berdine (Facebook). Dr Cristiano Calcagno (Facebook). Dr Anh Nhat Dang (WorldQuant LLC). Prof Peter O’Hearn. We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
sv-comp.sosy-lab.org
SV-COMP 2015 - 4th International Competition on Software Verification
http://sv-comp.sosy-lab.org/2015/committee.php
Competition on Software Verification (SV-COMP). April 16, 2015. Program Committee / Jury. Jury until October 31, 2014. University of Toronto, Canada. University of Passau, Germany. Federal University of Amazonas, Brazil. Karlsruhe Institute of Technology, Germany,. Stellenbosch University, South Africa. University of Freiburg, Germany. University of Passau, Germany. Karlsruhe Institute of Technology, Germany,. Brno University of Technology, Czech Republic. ISP RAS, Russia. University of Freiburg, Germany.
forsyte.at
People | FORSYTE - Formal Methods in Systems Engineering
http://forsyte.at/people
UnivProf. Dr. Laura Kovács. X74;a.etysrof null. X40;scavokl. 43 (1) 58801 – 184 30. UnivProf. Dr. Helmut Veith. X74;a.etysrof null. X40;htiev. 43 (1) 58801 – 184 41. Georg Weissenbacher, DPhil. X74;a.etysrof null. X40;bnessiew. 43 (1) 58801 – 184 35. X74;a.etysrof null. X40;regeluz. 43 (1) 58801 – 184 49. X74;a.etysrof null. X40;kes. 43 (1) 58801 – 184 03. X74;a.etysrof null. X40;lhubb. 43 (1) 58801 – 184 04. X74;a.etysrof null. X40;kajsip. 43 (1) 58801 – 184 42. X40;regnis. 43 (1) 58801 – 184 806. X74;&...
spin2015.org
SPIN 2015
http://www.spin2015.org/invited
Invited talks and tutorials. The Augmented Reality of Model Counting. String Analysis for Vulnerability Detection and Repair. STRing AutomatoN GEneratoR) and SemRep. SEMantic differential REPair), which are available at: http:/ www.cs.ucsb.edu/ vlab/tools.html. Our evaluation demonstrates that these techniques are very promising: when applied to a set of real-world web applications, our techniques are able to automatically identify a large number of security vulnerabilities and repair them.