|
2013-04-19: Seminar Reeves (University of Waikato) on
Modelling Safety Properties of Interactive Medical Systems
|
|
Formally modelling the software functionality and
interactivity of safety-critical devices allows us to
prove properties about their behaviours and be certain
that they will respond to user interaction correctly. In
domains such as medical environments, where many
different devices may be used, it is equally important to
ensure that all devices used adhere to a set of safety,
and other, principles designed for that environment.
|
|
2013-04-09: Seminar Abramsky (Oxford University) on
Coalgebraic Analysis of Subgame-perfect Equilibria in
Infinite Games without Discounting
|
|
We present a novel coalgebraic formulation of infinite
extensive games. We define both the game trees and the
strategy profiles by possibly infinite systems of
corecursive equations.
|
|
2013-03-20: Seminar Babar (Lancaster University) on
Experiences from Human-Centric Software Engineering
Research
|
|
One of our main research goals is to empirically
understand how software engineers work with technologies
and interact with each otters when developing software.
To this end, we have conducted several dozens of
empirical studies in industrial and academic
environments.
|
|
2013-03-19: Seminar Stolzenburg (Harz University) on Neural
Learning with Applications in Object Recognition and
Harmony Perception
|
|
The fields of neural computation and artificial neural
networks have developed much in the last decades. Since
technical, physical, and also cognitive processes evolve
in time, neural networks should be considered, which
allow us to model the synthesis and analysis of
continuous and possibly periodic processes in time
besides computing discrete classification functions.
|
|
2013-03-12: Seminar Freytag (University of Humboldt) on
Privacy Challenges in Data intensive Processing Systems
|
|
Over the last years, the means to collect personal data
implicitly or explicitly over the Web and by various
kinds of sensors and to combine data for profiling
individuals dramatically increased thus leading privacy
violations.
|