Trustworthy Systems

TS News

News

2013-04-19: Seminar Reeves (University of Waikato) on Modelling Safety Properties of Interactive Medical Systems
Formally modelling the software functionality and interactivity of safety-critical devices allows us to prove properties about their behaviours and be certain that they will respond to user interaction correctly. In domains such as medical environments, where many different devices may be used, it is equally important to ensure that all devices used adhere to a set of safety, and other, principles designed for that environment.
2013-04-09: Seminar Abramsky (Oxford University) on Coalgebraic Analysis of Subgame-perfect Equilibria in Infinite Games without Discounting
We present a novel coalgebraic formulation of infinite extensive games. We define both the game trees and the strategy profiles by possibly infinite systems of corecursive equations.
2013-03-20: Seminar Babar (Lancaster University) on Experiences from Human-Centric Software Engineering Research
One of our main research goals is to empirically understand how software engineers work with technologies and interact with each otters when developing software. To this end, we have conducted several dozens of empirical studies in industrial and academic environments.
2013-03-19: Seminar Stolzenburg (Harz University) on Neural Learning with Applications in Object Recognition and Harmony Perception
The fields of neural computation and artificial neural networks have developed much in the last decades. Since technical, physical, and also cognitive processes evolve in time, neural networks should be considered, which allow us to model the synthesis and analysis of continuous and possibly periodic processes in time besides computing discrete classification functions.
2013-03-12: Seminar Freytag (University of Humboldt) on Privacy Challenges in Data intensive Processing Systems
Over the last years, the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals dramatically increased thus leading privacy violations.
Show older articles