Abstract: Privacy and security concerns are growing rapidly thanks to ubiquitous data collections by IoT devices. One way to alleviate such concerns is to design privacy assistants that provide users with transparency...
Abstract: Privacy and security concerns are growing rapidly thanks to ubiquitous data collections by IoT devices. One way to alleviate such concerns is to design privacy assistants that provide users with transparency...
Abstract: Interactive theorem provers make it possible to prove that a program satisfies a specification. This provides a high degree of certainty that the program is trustworthy. The last two decades have marked a new...
Abstract: Software bugs, leading to correctness or security issues, are pervasive in modern software. Fuzzing or fuzz testing is a method to find such bugs automatically by sending many random-looking inputs to the...
Abstract:
Detecting concurrency bugs can be challenging due to the intricacies associated with their manifestation. These intricacies correspond to identifying the methods that need to be invoked concurrently, the...
Holiday - New Year's Day
Campus ClosedWinter Session: Holiday Break
Fall 2020 Final grades due by midnight
Classes resume - Winter Session
Winter Session: Last day to drop with "W" or "DR" and select "P/F"
Abstract:
A long-standing assumption common in algorithm design is that any part of the input is accessible at any time for unit cost. However, as we work with increasingly large data sets, or as we build smaller...