Curriculum Vitae. Nicolas Stouls

Size: px
Start display at page:

Download "Curriculum Vitae. Nicolas Stouls"

Transcription

1 Curriculum Vitae Nicolas Stouls 2 avenue Aristide Briand Phone: (+33) La Cote Saint André France Date of birth: march 23 th, 1980 in France Nationality: French 1 Education and training : PhD in Computer Science (Institut National Polytechnique de Grenoble). Title: Formal tools for the specication and the development of systems. Granted during 3 years by CNRS and ST Microelectronics, two months by INP Grenoble and six months by University Paris XI. Supervision by Marie-Laure Potet and Sylvain Boulmé at LSR laboratory (team VASCO, Grenoble, France). End envisaged in June : Master degree in Computer Science (Grenoble 1 University) : Bachelor degree in Computer Science (Grenoble 1 University) 1997: Baccalauréat option mathematics (Lycée Gauguin, French Polynesia) [High School Diploma in Maths] 2 Additional education and training: Magistère The aim of this formation is to prepare students for a PhD. To validate a Magistère degree, student must take a research training course during two or three years in one or more research centres. This diploma must be undertaken in parallel with standard studies (third year of bachelor to second year of Master). 3 rd year ( ): Study and development of software for the use of B in industrial size projects (Supervised by Daniel Dollé at Siemens Transportation Systems, Montrouge, France). 2 nd year ( ): Update of the BoB tool (a LSR B tool box) and integration of the weakest precondition calculus (Supervised by Didier Bert at LSR laboratory, team VASCO, Grenoble, France). 1 st year ( ): Modeling in B of a Java objects interpreter (Supervised by Marie-Laure Potet and Didier Bert at LSR laboratory, team VASCO, Grenoble, France). 1

2 3 Areas of research My PhD thesis is about the help to understand, document and validate B models [Abr96]. Formal specications are used to develop software in case of great security requirements. To check the conformity between the model and some of these requirements, it is often useful to have several dierent points of view of the same model. Indeed, B models are described in terms of data and treatment. A second view which denes all their behaviours can give a precious help to understand the system. Our approach is based on the generation of symbolic labelled transitions systems which represent behaviours of a B model. Moreover we take into account renement process, which is a way to build model, in progressively introducing requirements. The generation of a symbolic labelled transitions system from a B specication is based on [BC00]. The main originality of this work is the generation of the automaton by resolution of proof obligations. In [5] we precisely describe the transitions labels and we get proof obligations to generate a representation of the B model behaviour. The states space choice changes behaviours representation. Our approach is thus to let the user chooses the states space to focus on any particular property he will. However some works have been done in the team to automatically dene pertinent states space, with dierent technics. Moreover, to obtain a representation as precise as possible, we split the transitions guards in two parts: an enabledness condition and a reachability condition. The rst one denes the condition under which an event can be launched from the start state and the second one denes the condition under which an event can reach the arrived state. Indeed, the enabledness condition is independent of the arrived state. Thus, this representation with two conditions permits to split the proof obligations by factorising the enabledness condition. The produced proof obligations are then easier to automatically be proven and the automaton is then clearer. The renement forms a major part of the development process with the B method. We thus take into account this mechanism to graphically introduce the complexity by steps with the use of hierarchical automata. To retrieve the same main structure as for the abstract representation, we have dened the projection of abstract states through the renement. Projected states are then hierarchically represented as substates of the abstract ones. Next, all transitions have to be re-calculate. But renement properties can be exploited to simplify proof obligations. By example, the enabledness condition of a transition can only be enforced by renement. Then a transition can start from a substate of an abstract state only if the transition can start from the abstract one [5]. Labelled transitions systems permit to express the model behaviours. This information can be useful to validate the correctness of a B specication with respect to security properties. Based on the temporal logic extension for JML proposed in [TH02], we have introduced in [2] a simple modal logic language which permits to express properties as event sequences. This language is based on four primitives: Enabled, Crossable, AlwaysEnabled and AlwaysCrossable. In particular cases, these primitives can be syntactically evaluated on the labelled transitions system extracted from the B model. This method was implemented in a software (GénéSyst) which was used in several projects (see section 4). In particular three case studies were realized and for each of them the use of GénéSyst was helpful: 2

3 1. The DEMONEY [MM02] JavaCard [BDJ + 01] applet is an electronic purse developed by Trusted Logic. The B model of this applet had been developed from the public requirements and had been used as a case study in EDEN and GECCOO projects. The GénéSyst tool aided in developing the B model and permitted to check the model conformity with respect to the requirements 1. This model also permitted to show some limitations of the tool in front of modular specications, which have to be manually inlined. 2. The B4free web site specication proposed by ClearSy is a model dening rights to download their tool with respect to the product licence (free for industrials which bought the atelierb or for the students and the universities). Because of the form of the model, no states space can permit to see pertinent behaviour to validate the requirements. Then we have focus on the right of a particular user U. With this method the produced automaton allows to follow the behaviours of each person. 3. The network monitor case study [4] is a software which see all communications on a network and have to signal all messages which do not respect the security policy. This development has been done with renement following main TCP/IP network layers. GénéSyst is useful on this example from the second renement level and permits to see the correct save of each security policy violation. However, this model has the property to be more precise in the abstraction than in the rst level of renement. This particular case has shown us some restrictions in our method to project abstract states on the renement. However, this restriction can be pass through by simply conserving all abstract variables in the renement. The GénéSyst 2 [7] tool is based on some external tools: The parser is the JBTools [VTH02] developed in Besançon ; The BoB tool, developed at Grenoble, permits the formulas manipulation to generate the proof obligations ; The automatic prover can be the one from the atelierb or from the B4free tool ; The GraphViz tool [GN99], from the At&T labs, manages the transitions system generation..mch file (+ states) BoB (LSR).HTML file JBTools (LIFC) GénéSyst Intermediate format.gxl file.ref file (+ states) Atelier B (ClearSy).DOT file (GraphViz At&T) 1 Note than the use of GénéSyst during this verication permitted to found two errors in the model. 2 3

4 4 Projects Since my rst year of Magistère, I have participated to several projects: RNTL projects (National projects in association with industrials): (1) BOM: B Optimizing Memory, for smartcards' code generation (Partners: Gemplus, LIFC, LSR and ClearSy ) tatibouet/webbom/ (2) EDEN: Formal validation for Common Criteria highest levels evaluation (Partners: CEA/LIST, VERIMAG, CEA/LETI, SchlumbergerSema and Trusted Logic ) [TSCL + 02] (3) POSE: Conformity testing of embedded systems' security policies (Partners: AXALTO, LEIRIOS Technologies, SILICOMP-AQL, INRIA/LORIA, LIFC and LSR ) Security ACI projects (National projects based on theoretical research): (4) GECCOO: Certied code generation for object oriented applications. Specication, renement, proof and error detection. (Partners: LIFC, LORIA, INRIA Sophia, LRI, INRIA Futurs and LSR ) (5) POTESTAT: Security policies: Test and test analyse of open networked systems (Partners: LSR, VERIMAG and IRISA ) IMAG projects (Between Grenoble's research teams): (6) MODESTE: Modelisation for security: test and renement for certication process (Partners: VERIMAG and LSR ) lakhnech/modeste/ With these projects I have acquired the following skills: 4.1 B Method (Modelisation, implantation, interactive proof) During my rst years, my job consisted in developing and proving case studies. Then I participated in the development of software based on the B method (BoB 2 and GénéSyst 2 ) before working on security models. I have then acquired some knowledge in writing models easiest to be automatically proved and in using tools like the atelierb (and his interactive prover), the B4free or the click & proof. 4.2 Embedded systems (Smartcards, JavaCard) I have mainly participated in projects oriented in embedded systems. More particularly, they were based on the smartcards and the JavaCard OS. During the BOM project [1, 6] I have developed a part of the JavaCard OS 2 by using the B method. Moreover, the main case study I have developed [2, 5] is a JavaCard applet (DEMONEY 2 ) with his environment (JavaCard OS, terminal and user). Consequently, I have acquired some capabilities about smartcards and APDU protocol. 4

5 4.3 Security policies (Specication, Checking) The GECCOO project was about embedded systems. Security requirements were then mainly expressed as pre/post conditions (using JML for example) and events sequences [TH02]. In particular, we focused on smartcards requirements mainly based on events sequences [2]. I also studied some security policies for networks with a main focus, toward my case study [4], on restrictive 3 and abstract 4 policies. In our case, the access policy was a set of authorized couples User/Action. 5 Publications International journals [1] F. Badeau, D. Bert, S. Boulmé, C. Métayer, M-L. Potet, N. Stouls et L. Voisin. Adaptabilité et validation de la traduction de B vers C - Points de vue du projet BOM, série TSI 7/2004, Hermès-Lavoisier. International conferences [3] N. Stouls and M-L. Potet. In J. Julliand and O. Kouchnarenko, editors Security Policy Enforcement Through Renement Process, B'2007, the 7th Int. B Conference, LNCS 4355 p , Springer. [2] D. Bert, M-L. Potet and N. Stouls. GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specications. Application to Security Properties, LNCS 3455 p , Springer-Verlag, ZB French conferences [4] N. Stouls et V. Darmaillacq. Développement formel d'un moniteur détectant les violations de politiques de sécurité de réseaux, AFADL'06 [5] N. Stouls et M-L. Potet. Explicitation du contrôle de développement B événementiel, AFADL 2004 [6] F. Badeau, D. Bert, S. Boulmé, C. Métayer, M-L. Potet, N. Stouls et L. Voisin. Traduction de B vers des langages de programmation, AFADL'03 Posters and short papers [7] X. Morselli, M.-L. Potet et N. Stouls. GénéSyst: Génération d'un système de transitions étiquetées à partir d'une spécication B événementiel, AFADL 2004, tools session. [8] N. Stouls et V. Darmaillacq. Développement formel d'un moniteur, Majecstic [9] N. Stouls Aide à la spécication et au développement formel de systèmes, 16ième rencontres régionales de la recherche en rhône-alpes 2006 (Poster) Technical reports [10]N. Stouls. Introduction aux cartes à puce, [11]N. Stouls. Introduction aux critères communs, All that is not explicitly authorized is forbidden. 4 In terms of high level elements, like users and resources in place of hosts and ports. 5

6 6 Tools development I participated in the development of two tools: The BoB 2 (Boîte à Outils B - B tool Box) and GénéSyst 2 [2, 5, 7] (Génération de systèmes de transitions étiquetées - Generation of labelled transitions systems). The rst one is a tool developed in Java which permits to manipulate B components and to generate some calculus on them (like the weakest precondition for example). The second one is a tool which takes a B specication and possibly a B renement and which generates a symbolic labelled transitions system which represents the exact behaviour of a given component. 7 Student supervision Hammal Haddad ( , Master 2-R)Modelisation and verication of security policies. Xavier Morselli ( , Master 1)Verication and optimisation of the GénéSyst tool. Evelyne Altariba ( , Master 1)Compression of a B project. Ounaida Mohamed ( , Licence 3)Development of a graphical interface for the GénéSyst tool. 8 Teaching Lecturer in B method ( ) Grenoble 1 university and INP Grenoble (ENSIMAG), Master 1, with Marie-Laure Potet. Introduction to the B method. Software engineering ( ) Orsay University, IFIPS 2 Introduction to the software engineering in the framework of a training in relation with the industry. Teacher assistant in Software engineering ( ) Orsay University, Licence 3 Introduction to the software engineering in the framework of a training in relation with the industry. Software engineering project ( ) Orsay University, Licence 3. A three months project done in parallel with courses, in which each teacher manages several teams of 3 persons. Students had to develop a software by using software engineering methods. Software engineering and compilation project ( ) INP Grenoble (ENSIMAG), Master 1. A one month project in which each teacher manages 5 teams of 4 persons. Students had to develop a compiler for a language close to ADA. Software engineering and compilation ( ) Grenoble 1 university, Master 1. A one week project in which students have to develop a compiler for an assembler language. Hardware and Software Architecture ( ) Grenoble 1 university, Licence 3. An introduction to the hardware architecture and the binary manipulations. 6

7 Functional programming ( ) Grenoble 1 university, Licence 2. An introduction to the functional programming with the Caml language. Computer science ( ) Grenoble 1 university, Licence 1. computer science with the C language. An introduction to the Tutor in mathematics and basic computing ( ) for a high level sportsman Grenoble 1 university, Licence 1 9 Employments Training course (2003) Research and development of software for the use of B in industrial size projects (Siemens Transportation Systems, Montrouge, France) Computing manager ( ) (Company ORINA - Papeete, French Polynesia) Network installation, software update, sta training to the Internet and installation of computerized dental radio 10 Responsibilities In charge of the computers park inventory during 3 years. Participation in team web site Participation in PhD. students scientic animation (Seminars, web site) 11 Professional tools Languages: French (mother language) and English (written, spoken and read) Operating systems: LINUX, DOS, Windows, MacOS programming and specication languages: B method, Scheme, Caml, Prolog, Java, ADA, Pascal, C, assemblers, Awards 2005: Price of the best team spirit in doctoriales of Rhone-Alpes. 1999: In the nal session of PROLOGIN (Individual National Contest of Computing) 1996: Certicate of distinction in Australian Mathematics Competition (Top 15%) 1994: Certicate of credit in Australian Mathematics Competition (Top 50%) 7

8 13 Professional references Pr Potet Marie-Laure LSR laboratory, BP72, St Martin d'hères CEDEX, France Pr Ledru Yves LSR laboratory, BP72, St Martin d'hères CEDEX, France Dr Bert Didier LSR laboratory, BP72, St Martin d'hères CEDEX, France Dr Dollé Daniel Siemens Transportation Systems, 50 rue Barbès, Montrouge CEDEX, France Pr Amblard Paul TIMA-CMP, 46 Avenue Félix Viallet, Grenoble CEDEX, FRANCE References [Abr96] J.R. Abrial. The B-Book. Cambridge University Press, [BC00] [BDJ + 01] [GN99] [MM02] [TH02] D. Bert and F. Cave. Construction of Finite Labelled Transition Systems from B Abstract Systems. In Integrated Formal Methods, volume 1945 of LNCS. Springer-Verlag, G. Barthe, G. Dufay, L. Jakubiec, B. Serpette, and S. Melo de Sousa. A Formal Executable Semantics of the JavaCard Platform. Lecture Notes in Computer Science, 2028:302, E. R. Gannsner and S. C. North. An open graph visualization system and its applications to software engineering. Technical report, Laboratoires AT&T, Etats unis, 26 mai Renaud Marlet and Cédric Mesnil. Demoney: A demonstrative electronic purse - card specication, K. Trentelman and M. Huisman. Extending JML Specications with Temporal Logic. In AMAST'02, volume 2422 of LNCS, pages Springer-Verlag, [TSCL + 02] TrustedLogic, SchlumbergerSema, CEA-LIST, CEA-LETI, and LSR-IMAG. Description du projet EDEN, février [VTH02] J.C. Voisinet, B. Tatibouet, and A. Hammad. jbtools: An experimental platform for the formal B method. In PPPJ'02, pages Trinity College, Dublin, Ireland, Juin

The ProB Animator and Model Checker for B

The ProB Animator and Model Checker for B The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,

More information

Validation of Regulation Documents by Automated Analysis of Formal Models

Validation of Regulation Documents by Automated Analysis of Formal Models 800 Regulations Modelling and their Validation and Verification Validation of Regulation Documents by Automated Analysis of Formal Models Didier Bert 1, Fabrice Bouquet 2, Yves Ledru 1, and Sylvie Vignes

More information

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2. Bachelor of Technology (Computer Engineering.) Scheme of s/examination Sl. (3 rd SEMESTER) Teaching Schedule Examination Schedule 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.5 2 COT-201 Programming

More information

Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, 93430 Villetaneuse, France.

Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, 93430 Villetaneuse, France. Domenico Ruoppolo CV Personal Information First Name Domenico. Last Name Ruoppolo. Date of Birth December 16th, 1985. Place of Birth Naples, Italy. Nationality Italian. Location Address Office B311. Contacts

More information

Core Curriculum to the Course:

Core Curriculum to the Course: Core Curriculum to the Course: Environmental Science Law Economy for Engineering Accounting for Engineering Production System Planning and Analysis Electric Circuits Logic Circuits Methods for Electric

More information

Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters

Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters Geoffroy Vallée, Renaud

More information

Curriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France

Curriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France Curriculum Vitae Address n o 6 La Bastide Samat 13119 Saint Savournin, France Phone: +33.4.42.32.36.92 Mobile Phone: +33.6.86.83.19.55 Email: claude.barral@gmail.com Homepage: http://www.linkedin.com/in/cbarral

More information

An Automatic Reversible Transformation from Composite to Visitor in Java

An Automatic Reversible Transformation from Composite to Visitor in Java An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Vincent Cheval. Curriculum Vitae. Research

Vincent Cheval. Curriculum Vitae. Research Vincent Cheval School of Computing University of Kent Canterbury, CT2 7NF, UK +44 (0)7479 555701 +44 (0)1227 823816 vincent.cheval@icloud.com homepage: www.cs.kent.ac.uk/ vc218/web Nationality : French

More information

Project Informations Master s degree in Computer Science (by research) M2R Info. in short

Project Informations Master s degree in Computer Science (by research) M2R Info. in short Project Informations Master s degree in Computer Science (by research) M2R Info. in short Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr

More information

Program: Master in Nuclear Civil Engineering

Program: Master in Nuclear Civil Engineering Program: Master in Nuclear Civil Engineering Address: 28 avenue du Président Wilson, 94234 Cachan (inner suburbs of Paris) Year of school foundation: 1891 Recognition: French national Master s degree (accredited

More information

Draft dpt for MEng Electronics and Computer Science

Draft dpt for MEng Electronics and Computer Science Draft dpt for MEng Electronics and Computer Science Year 1 INFR08012 Informatics 1 - Computation and Logic INFR08013 Informatics 1 - Functional Programming INFR08014 Informatics 1 - Object- Oriented Programming

More information

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog. Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected

More information

CURRICULUM VITAE OF BOUDOUR Ghalem

CURRICULUM VITAE OF BOUDOUR Ghalem CURRICULUM VITAE OF BOUDOUR Ghalem LIG - Grenoble Institute of Technology 681, rue de la passerelle Domaine universitaire - BP 72-38402 Grenoble Phone: +33 6 25 61 69 43 E-mail: boudour_ghalem@yahoo.fr

More information

Curriculum Vitae Emmanuelle Nègre March 2015

Curriculum Vitae Emmanuelle Nègre March 2015 Curriculum Vitae Emmanuelle Nègre March 2015 Personal Details: Date of birth: June 25 th 1987 Nationality: French Marital status: Single Home Address: 5 rue Rivals 31 000 Toulouse France Tel.: +33.(0)6.76.79.01.31

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Datavetenskapligt Program (kandidat) Computer Science Programme (master)

Datavetenskapligt Program (kandidat) Computer Science Programme (master) Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer

More information

An evaluation of the Java Card environment

An evaluation of the Java Card environment An evaluation of the Java Card environment Christophe Rippert, Daniel Hagimont Contact: Christophe Rippert, Sirac Laboratory INRIA Rhône-Alpes, 655 avenue de l Europe Montbonnot 38334 St Ismier Cedex,

More information

Smart Cards a(s) Safety Critical Systems

Smart Cards a(s) Safety Critical Systems Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business

More information

LONG BEACH CITY COLLEGE MEMORANDUM

LONG BEACH CITY COLLEGE MEMORANDUM LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor

More information

Ph.D. in Computer Science

Ph.D. in Computer Science Loïc MAISONNASSE D.O.B. 12-09-1981 Laboratoire d Informatique de Grenoble 385, rue de la Bibliothèque B.P. 53 38041 Grenoble Cedex 9 France E-mail: loic.maisonnasse@imag.fr Phone office: (+33) 4 76 51

More information

Sylvain Bonandrini, Christophe Cruz Christophe Nicolle

Sylvain Bonandrini, Christophe Cruz Christophe Nicolle International Conference on Product Lifecycle Management 1 Building Lifecycle Management Sylvain Bonandrini, Christophe Cruz Christophe Nicolle Active3D-Lab 2 rue Renée Char BP 66606 21066 Dijon Cedex

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

Computer Science Information Sheet for entry in 2016. What is Computer Science?

Computer Science Information Sheet for entry in 2016. What is Computer Science? Computer Science Information Sheet for entry in 2016 What is Computer Science? Computer Science is about understanding computer systems and networks at a deep level. Computers and the programs they run

More information

Automatic Timeline Construction For Computer Forensics Purposes

Automatic Timeline Construction For Computer Forensics Purposes Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,

More information

Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16

Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16 Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz Michel.Schinz@epfl.ch Assistant: Iulian Dragos INR 321, 368 64

More information

Instructor Özgür ZEYDAN BEU Dept. of Enve. Eng. http://cevre.beun.edu.tr/zeydan/ CIV 112 Computer Programming Lecture Notes (1)

Instructor Özgür ZEYDAN BEU Dept. of Enve. Eng. http://cevre.beun.edu.tr/zeydan/ CIV 112 Computer Programming Lecture Notes (1) Instructor Özgür ZEYDAN BEU Dept. of Enve. Eng. http://cevre.beun.edu.tr/zeydan/ CIV 112 Computer Programming Lecture Notes (1) Computer Programming A computer is a programmable machine. This means it

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

French Scheme CSPN to CC Evaluation

French Scheme CSPN to CC Evaluation French Scheme CSPN to CC Evaluation Antoine COUTANT ITSEF AMOSSYS 4 bis allée du bâtiment 35000 Rennes antoine.coutant@amossys.fr Abstract. Since 2008, French certication body created a new scheme for

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Managing large sound databases using Mpeg7

Managing large sound databases using Mpeg7 Max Jacob 1 1 Institut de Recherche et Coordination Acoustique/Musique (IRCAM), place Igor Stravinsky 1, 75003, Paris, France Correspondence should be addressed to Max Jacob (max.jacob@ircam.fr) ABSTRACT

More information

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11 Section des Unités de recherche Evaluation report Research unit : Troubles du comportement alimentaire de l adolescent University Paris 11 Mars 2009 Section des Unités de recherche Rapport d'évaluation

More information

PCCC PCCC Course Description

PCCC PCCC Course Description Course Description CIS 101 Computer Concepts and Applications 3 credits (formerly Introduction to Computers and Information Processing) Introduces a variety of topics in computers and computing including

More information

1 General presentation 1. 2 Team Composition 2. 3 Research Themes 4 3.1 Models for test oracles... 4 3.2 Test generation... 6 3.3 Test assessment...

1 General presentation 1. 2 Team Composition 2. 3 Research Themes 4 3.1 Models for test oracles... 4 3.2 Test generation... 6 3.3 Test assessment... Team: VASCO Scientific leader: Y. Ledru Reporting Period : January 1st, 2005 to September 30th, 2009 Web site: http://vasco.imag.fr/ Parent Organizations: Université Grenoble 1, Université Grenoble 2,

More information

FACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES. (Master in Information Technology)

FACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES. (Master in Information Technology) FACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES (Master in Information Technology) MASTER IN INFORMATION TECHNOLOGY (MIT) CURRICULUM 1.1 Introduction This programme is

More information

CURRICULUM VITÆ. Education. Latest update : August 2015. Sanjay Ramassamy Graduate student at Brown University.

CURRICULUM VITÆ. Education. Latest update : August 2015. Sanjay Ramassamy Graduate student at Brown University. CURRICULUM VITÆ Latest update : August 2015 Sanjay Ramassamy Graduate student at Brown University. Address : Sanjay Ramassamy Box 1917 151 Thayer Street Providence, RI 02912 USA Webpage : http://www.normalesup.org/~ramassamy/

More information

Computer Science. Master of Science

Computer Science. Master of Science Computer Science Master of Science The Master of Science in Computer Science program at UALR reflects current trends in the computer science discipline and provides students with a solid theoretical and

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

Lecture 1: Introduction

Lecture 1: Introduction Programming Languages Lecture 1: Introduction Benjamin J. Keller Department of Computer Science, Virginia Tech Programming Languages Lecture 1 Introduction 2 Lecture Outline Preview History of Programming

More information

DIABLO VALLEY COLLEGE CATALOG 2014-2015

DIABLO VALLEY COLLEGE CATALOG 2014-2015 COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy

More information

Event-Based Approach to Modelling Dynamic Architecture: Application to Mobile Ad-hoc Network

Event-Based Approach to Modelling Dynamic Architecture: Application to Mobile Ad-hoc Network Event-Based Approach to Modelling Dynamic Architecture: Application to Mobile Ad-hoc Network Christian Attiogbé LINA - UMR CNRS 6241 - University of Nantes F-44322 Nantes Cedex, France Christian.Attiogbe@univ-nantes.fr

More information

Spécication et analyse formelle des politiques de sécurité dans le cloud computing

Spécication et analyse formelle des politiques de sécurité dans le cloud computing Spécication et analyse formelle des politiques de sécurité dans le cloud computing Asma GUESMI, Patrice CLEMENTE, Frédéric LOULERGUE, Pascal BERTHOMÉ Laboratoire d'informatique Fondamentale d'orléans (LIFO)

More information

Curriculum Vitae et Studiorum Dossier n. 48773. Cinzia Di Giusto

Curriculum Vitae et Studiorum Dossier n. 48773. Cinzia Di Giusto Curriculum Vitae et Studiorum Dossier n. 48773 Cinzia Di Giusto December 31, 2010 Personal Information: Date of birth: Nationality: Di Giusto, Cinzia Oct 17, 1979 in Udine, Italy Italian Home address:

More information

Verification of Imperative Programs in Theorema

Verification of Imperative Programs in Theorema Verification of Imperative Programs in Theorema Laura Ildikó Kovács, Nikolaj Popov, Tudor Jebelean 1 Research Institute for Symbolic Computation, Johannes Kepler University, A-4040 Linz, Austria Institute

More information

Code generation under Control

Code generation under Control Code generation under Control Rencontres sur la compilation / Saint Hippolyte Henri-Pierre Charles CEA Laboratoire LaSTRE / Grenoble 12 décembre 2011 Introduction Présentation Henri-Pierre Charles, two

More information

CosyVerif: An Open Source Extensible Verication Environment

CosyVerif: An Open Source Extensible Verication Environment CosyVerif: An Open Source Extensible Verication Environment Étienne André, Lom Hillah, Francis Hulin-Hubard, Fabrice Kordon, Yousra Lembachar, Alban Linard, Laure Petrucci ENS Cachan, Univ. Paris 6, Univ.

More information

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.

Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Artificial Intelligence. Class: 3 rd

Artificial Intelligence. Class: 3 rd Artificial Intelligence Class: 3 rd Teaching scheme: 4 hours lecture credits: Course description: This subject covers the fundamentals of Artificial Intelligence including programming in logic, knowledge

More information

Smart Secure Devices & Embedded Operating Systems

Smart Secure Devices & Embedded Operating Systems Smart Secure Devices & Embedded Operating Systems Contact: pierre.dusart@unilim.fr Team: XLIM/DMI/SSD Limoges/FRANCE Technology involved ibutton USB token Contactless Prices of these objects: less than

More information

Eloise Caporal-Ebersold. 25 rue Pfeffinger 67100 Strasbourg Portable: 0620955900 Fixe: 0967089913 eloisecaporal2003@yahoo.com eloise@ebersold.

Eloise Caporal-Ebersold. 25 rue Pfeffinger 67100 Strasbourg Portable: 0620955900 Fixe: 0967089913 eloisecaporal2003@yahoo.com eloise@ebersold. Eloise Caporal-Ebersold 25 rue Pfeffinger 67100 Strasbourg Portable: 0620955900 Fixe: 0967089913 eloisecaporal2003@yahoo.com eloise@ebersold.fr FORMATION 2012 présent Doctorat, Sciences du Langage 1999

More information

COMPUTER SCIENCE. FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa

COMPUTER SCIENCE. FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa COMPUTER SCIENCE Computer Science is the study of computer programs, abstract models of computers, and applications of computing.

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

AADL et la conception des logiciels

AADL et la conception des logiciels AADL et la conception des logiciels Pierre Dissaux, journée Féria/SVF, 2 décembre 2003 System Lifecycle System Engineering System Integration Hardware Engineering Software Engineering from System Engineering

More information

B.Sc. in Computer Information Systems Study Plan

B.Sc. in Computer Information Systems Study Plan 195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210

More information

Computational Engineering Programs at the University of Erlangen-Nuremberg

Computational Engineering Programs at the University of Erlangen-Nuremberg Computational Engineering Programs at the University of Erlangen-Nuremberg Ulrich Ruede Lehrstuhl für Simulation, Institut für Informatik Universität Erlangen http://www10.informatik.uni-erlangen.de/ ruede

More information

Clarke College. Major Requirements

Clarke College. Major Requirements 136 Clarke College Computer Science Mission In an increasingly technical world, the computer science department strives to bring technological understanding and contemporary professional skills to the

More information

A B Formal Framework for Security Developments in the Domain of Smart Card Applications

A B Formal Framework for Security Developments in the Domain of Smart Card Applications A B Formal Framework for Security Developments in the Domain of Smart Card Applications Frédéric Dadeau, Marie-Laure Potet, Régis Tissot Abstract We propose in this paper a formal framework based on the

More information

Verication Techniques for LOTOS [ISO:8807] was a collaborative project, from 1989 to 1993, funded by the UK SERC/IED research program.

Verication Techniques for LOTOS [ISO:8807] was a collaborative project, from 1989 to 1993, funded by the UK SERC/IED research program. Verication Techniques for LOTOS U. Martin, University of St. Andrews, Scotland, U.K. M. Thomas, University of Glasgow, Scotland, U.K. Abstract. We report on the results of a project which applied LOTOS

More information

Master of Science in Computer Science Information Systems

Master of Science in Computer Science Information Systems Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Bachelor Degree in Informatics Engineering Master courses

Bachelor Degree in Informatics Engineering Master courses Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko

More information

Welcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou

Welcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou Welcome to: M2R Informatique & MoSIG Master of Science in Informatics Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://www-ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr Sep.

More information

A hint of existing information systems analysis

A hint of existing information systems analysis systems analysis 2nd year PhD Student at Co-Founder of Master SCCI 10th Birthday, 12th September 2011 1A + 2A Engineering studies 3A Master SCCI Doctorate in virology Startup company in IS reengineering

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Extending Semantic Resolution via Automated Model Building: applications

Extending Semantic Resolution via Automated Model Building: applications Extending Semantic Resolution via Automated Model Building: applications Ricardo Caferra Nicolas Peltier LIFIA-IMAG L1F1A-IMAG 46, Avenue Felix Viallet 46, Avenue Felix Viallei 38031 Grenoble Cedex FRANCE

More information

CSCI 3136 Principles of Programming Languages

CSCI 3136 Principles of Programming Languages CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University Winter 2013 CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University

More information

Outline. hardware components programming environments. installing Python executing Python code. decimal and binary notations running Sage

Outline. hardware components programming environments. installing Python executing Python code. decimal and binary notations running Sage Outline 1 Computer Architecture hardware components programming environments 2 Getting Started with Python installing Python executing Python code 3 Number Systems decimal and binary notations running

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Exam Scheme & Subject Code

GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Exam Scheme & Subject Code GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Scheme & EVALUATION SCHEME Continuous (Theory) (E) Evaluation Practical (I) (Practical) (E) Process(M) MAX MIN MAX MIN

More information

Il est repris ci-dessous sans aucune complétude - quelques éléments de cet article, dont il est fait des citations (texte entre guillemets).

Il est repris ci-dessous sans aucune complétude - quelques éléments de cet article, dont il est fait des citations (texte entre guillemets). Modélisation déclarative et sémantique, ontologies, assemblage et intégration de modèles, génération de code Declarative and semantic modelling, ontologies, model linking and integration, code generation

More information

Semester 1 Course Course Name מע תר הר Credits Preliminary or

Semester 1 Course Course Name מע תר הר Credits Preliminary or Curriculum To complete the degree the student must accumulate at least 160 credits - 4 credits in general studies, 1 credit for the skills course and 2 sports courses which grant 0.5 credits each. The

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING

DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING Fall 2000 The instructions contained in this packet are to be used as a guide in preparing the Departmental Computer Science Degree Plan Form for the Bachelor's

More information

The Minimal Dependency Relation for Causal Event Ordering in Distributed Computing

The Minimal Dependency Relation for Causal Event Ordering in Distributed Computing Appl. Math. Inf. Sci. 9, No. 1, 57-61 (2015) 57 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/090108 The Minimal Dependency Relation for Causal Event

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Ph.D. in Economics University of Paris Ouest Nanterre La Défense Research Centre : EconomiX

Ph.D. in Economics University of Paris Ouest Nanterre La Défense Research Centre : EconomiX Inna Lyubareva TELECOM Bretagne - LUSSI Technopôle Brest-Iroise CS 83818 29238 Brest Cedex 3 (33)2 29 00 15 33 inna.lyubareva@telecom-bretagne.eu Education 10/2004 01/2010 Ph.D. in Economics Research Centre

More information

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program

Accelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program Accelerated Bachelor of Science/Master of Science in Computer Science 1 Dual Degree Program Definitions The discussion below uses the following definitions: o BS/MS program: The complete accelerated Bachelor

More information

INTRODUCTION TO INFORMATION SYSTEMS

INTRODUCTION TO INFORMATION SYSTEMS INTRODUCTION TO INFORMATION SYSTEMS CHAPTER.3 COMPUTER SOFTWARE PART2 System software Software that manages and supports a computer system. It can be divided into the following categories. System management

More information

Curriculum Vitae. Positions

Curriculum Vitae. Positions Curriculum Vitae Luca Castelli Aleardi Professional address : ULB, O8.114, CP 212, Bvd. du Triomphe, 1050 Bruxelles, Belgium Personal address : 52, rue du Couédic, 75014 Paris Tél. : +33 (0)6 63 66 01

More information

SCADE Suite in Space Applications

SCADE Suite in Space Applications SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T

More information

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,

More information

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional

More information

INFORMATION SYSTEMS (INFO)

INFORMATION SYSTEMS (INFO) VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies

More information

CURRICULUM VITAE. 2006-2013 President of the Board of Directors of the Annales des Sciences Mathématiques du Québec.

CURRICULUM VITAE. 2006-2013 President of the Board of Directors of the Annales des Sciences Mathématiques du Québec. CURRICULUM VITAE François Huard Department of Mathematics Bishop s University, Sherbrooke, Québec Canada, J1M1Z7 819-822-9600 (2363) email:fhuard@ubishops.ca Languages: French, English. Citizenship: Canadian

More information

Computer and Information Sciences

Computer and Information Sciences Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,

More information

The Ecole polytechnique : Training science-based leaders

The Ecole polytechnique : Training science-based leaders The Ecole polytechnique : Training science-based leaders «L École polytechnique forme des femmes et des hommes responsables, capables de mener des activités complexes et innovantes, pour répondre aux défis

More information

Facts and Figures. Welcome to Ense 3

Facts and Figures. Welcome to Ense 3 By studying at Grenoble Institute of Technology, you will benefit from a level of research unique in France and a cursus of training dealing with the greatest challenges facing modern society : energy,

More information

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.

More information

Knowledge based tool for modeling dynamic systems in education

Knowledge based tool for modeling dynamic systems in education Knowledge based tool for modeling dynamic systems in education Krassen Stefanov, Galina Dimitrova To cite this version: Krassen Stefanov, Galina Dimitrova. Knowledge based tool for modeling dynamic systems

More information

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software

More information

Tableaux Modulo Theories using Superdeduction

Tableaux Modulo Theories using Superdeduction Tableaux Modulo Theories using Superdeduction An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover Mélanie Jacquel 1, Karim Berkani 1, David Delahaye 2, and Catherine

More information

Université Joseph Fourier in Grenoble

Université Joseph Fourier in Grenoble Université Joseph Fourier in Grenoble Research and training in a cutting edge environment www.ujf-grenoble.fr UJF in short Université Joseph Fourier-Grenoble 1, is a major university for science, technology

More information