Curriculum Vitae. Nicolas Stouls
|
|
- Easter Bridges
- 8 years ago
- Views:
Transcription
1 Curriculum Vitae Nicolas Stouls 2 avenue Aristide Briand Phone: (+33) La Cote Saint André Nicolas.Stouls@gmail.fr France Date of birth: march 23 th, 1980 in France Nationality: French 1 Education and training : PhD in Computer Science (Institut National Polytechnique de Grenoble). Title: Formal tools for the specication and the development of systems. Granted during 3 years by CNRS and ST Microelectronics, two months by INP Grenoble and six months by University Paris XI. Supervision by Marie-Laure Potet and Sylvain Boulmé at LSR laboratory (team VASCO, Grenoble, France). End envisaged in June : Master degree in Computer Science (Grenoble 1 University) : Bachelor degree in Computer Science (Grenoble 1 University) 1997: Baccalauréat option mathematics (Lycée Gauguin, French Polynesia) [High School Diploma in Maths] 2 Additional education and training: Magistère The aim of this formation is to prepare students for a PhD. To validate a Magistère degree, student must take a research training course during two or three years in one or more research centres. This diploma must be undertaken in parallel with standard studies (third year of bachelor to second year of Master). 3 rd year ( ): Study and development of software for the use of B in industrial size projects (Supervised by Daniel Dollé at Siemens Transportation Systems, Montrouge, France). 2 nd year ( ): Update of the BoB tool (a LSR B tool box) and integration of the weakest precondition calculus (Supervised by Didier Bert at LSR laboratory, team VASCO, Grenoble, France). 1 st year ( ): Modeling in B of a Java objects interpreter (Supervised by Marie-Laure Potet and Didier Bert at LSR laboratory, team VASCO, Grenoble, France). 1
2 3 Areas of research My PhD thesis is about the help to understand, document and validate B models [Abr96]. Formal specications are used to develop software in case of great security requirements. To check the conformity between the model and some of these requirements, it is often useful to have several dierent points of view of the same model. Indeed, B models are described in terms of data and treatment. A second view which denes all their behaviours can give a precious help to understand the system. Our approach is based on the generation of symbolic labelled transitions systems which represent behaviours of a B model. Moreover we take into account renement process, which is a way to build model, in progressively introducing requirements. The generation of a symbolic labelled transitions system from a B specication is based on [BC00]. The main originality of this work is the generation of the automaton by resolution of proof obligations. In [5] we precisely describe the transitions labels and we get proof obligations to generate a representation of the B model behaviour. The states space choice changes behaviours representation. Our approach is thus to let the user chooses the states space to focus on any particular property he will. However some works have been done in the team to automatically dene pertinent states space, with dierent technics. Moreover, to obtain a representation as precise as possible, we split the transitions guards in two parts: an enabledness condition and a reachability condition. The rst one denes the condition under which an event can be launched from the start state and the second one denes the condition under which an event can reach the arrived state. Indeed, the enabledness condition is independent of the arrived state. Thus, this representation with two conditions permits to split the proof obligations by factorising the enabledness condition. The produced proof obligations are then easier to automatically be proven and the automaton is then clearer. The renement forms a major part of the development process with the B method. We thus take into account this mechanism to graphically introduce the complexity by steps with the use of hierarchical automata. To retrieve the same main structure as for the abstract representation, we have dened the projection of abstract states through the renement. Projected states are then hierarchically represented as substates of the abstract ones. Next, all transitions have to be re-calculate. But renement properties can be exploited to simplify proof obligations. By example, the enabledness condition of a transition can only be enforced by renement. Then a transition can start from a substate of an abstract state only if the transition can start from the abstract one [5]. Labelled transitions systems permit to express the model behaviours. This information can be useful to validate the correctness of a B specication with respect to security properties. Based on the temporal logic extension for JML proposed in [TH02], we have introduced in [2] a simple modal logic language which permits to express properties as event sequences. This language is based on four primitives: Enabled, Crossable, AlwaysEnabled and AlwaysCrossable. In particular cases, these primitives can be syntactically evaluated on the labelled transitions system extracted from the B model. This method was implemented in a software (GénéSyst) which was used in several projects (see section 4). In particular three case studies were realized and for each of them the use of GénéSyst was helpful: 2
3 1. The DEMONEY [MM02] JavaCard [BDJ + 01] applet is an electronic purse developed by Trusted Logic. The B model of this applet had been developed from the public requirements and had been used as a case study in EDEN and GECCOO projects. The GénéSyst tool aided in developing the B model and permitted to check the model conformity with respect to the requirements 1. This model also permitted to show some limitations of the tool in front of modular specications, which have to be manually inlined. 2. The B4free web site specication proposed by ClearSy is a model dening rights to download their tool with respect to the product licence (free for industrials which bought the atelierb or for the students and the universities). Because of the form of the model, no states space can permit to see pertinent behaviour to validate the requirements. Then we have focus on the right of a particular user U. With this method the produced automaton allows to follow the behaviours of each person. 3. The network monitor case study [4] is a software which see all communications on a network and have to signal all messages which do not respect the security policy. This development has been done with renement following main TCP/IP network layers. GénéSyst is useful on this example from the second renement level and permits to see the correct save of each security policy violation. However, this model has the property to be more precise in the abstraction than in the rst level of renement. This particular case has shown us some restrictions in our method to project abstract states on the renement. However, this restriction can be pass through by simply conserving all abstract variables in the renement. The GénéSyst 2 [7] tool is based on some external tools: The parser is the JBTools [VTH02] developed in Besançon ; The BoB tool, developed at Grenoble, permits the formulas manipulation to generate the proof obligations ; The automatic prover can be the one from the atelierb or from the B4free tool ; The GraphViz tool [GN99], from the At&T labs, manages the transitions system generation..mch file (+ states) BoB (LSR).HTML file JBTools (LIFC) GénéSyst Intermediate format.gxl file.ref file (+ states) Atelier B (ClearSy).DOT file (GraphViz At&T) 1 Note than the use of GénéSyst during this verication permitted to found two errors in the model
4 4 Projects Since my rst year of Magistère, I have participated to several projects: RNTL projects (National projects in association with industrials): (1) BOM: B Optimizing Memory, for smartcards' code generation (Partners: Gemplus, LIFC, LSR and ClearSy ) tatibouet/webbom/ (2) EDEN: Formal validation for Common Criteria highest levels evaluation (Partners: CEA/LIST, VERIMAG, CEA/LETI, SchlumbergerSema and Trusted Logic ) [TSCL + 02] (3) POSE: Conformity testing of embedded systems' security policies (Partners: AXALTO, LEIRIOS Technologies, SILICOMP-AQL, INRIA/LORIA, LIFC and LSR ) Security ACI projects (National projects based on theoretical research): (4) GECCOO: Certied code generation for object oriented applications. Specication, renement, proof and error detection. (Partners: LIFC, LORIA, INRIA Sophia, LRI, INRIA Futurs and LSR ) (5) POTESTAT: Security policies: Test and test analyse of open networked systems (Partners: LSR, VERIMAG and IRISA ) IMAG projects (Between Grenoble's research teams): (6) MODESTE: Modelisation for security: test and renement for certication process (Partners: VERIMAG and LSR ) lakhnech/modeste/ With these projects I have acquired the following skills: 4.1 B Method (Modelisation, implantation, interactive proof) During my rst years, my job consisted in developing and proving case studies. Then I participated in the development of software based on the B method (BoB 2 and GénéSyst 2 ) before working on security models. I have then acquired some knowledge in writing models easiest to be automatically proved and in using tools like the atelierb (and his interactive prover), the B4free or the click & proof. 4.2 Embedded systems (Smartcards, JavaCard) I have mainly participated in projects oriented in embedded systems. More particularly, they were based on the smartcards and the JavaCard OS. During the BOM project [1, 6] I have developed a part of the JavaCard OS 2 by using the B method. Moreover, the main case study I have developed [2, 5] is a JavaCard applet (DEMONEY 2 ) with his environment (JavaCard OS, terminal and user). Consequently, I have acquired some capabilities about smartcards and APDU protocol. 4
5 4.3 Security policies (Specication, Checking) The GECCOO project was about embedded systems. Security requirements were then mainly expressed as pre/post conditions (using JML for example) and events sequences [TH02]. In particular, we focused on smartcards requirements mainly based on events sequences [2]. I also studied some security policies for networks with a main focus, toward my case study [4], on restrictive 3 and abstract 4 policies. In our case, the access policy was a set of authorized couples User/Action. 5 Publications International journals [1] F. Badeau, D. Bert, S. Boulmé, C. Métayer, M-L. Potet, N. Stouls et L. Voisin. Adaptabilité et validation de la traduction de B vers C - Points de vue du projet BOM, série TSI 7/2004, Hermès-Lavoisier. International conferences [3] N. Stouls and M-L. Potet. In J. Julliand and O. Kouchnarenko, editors Security Policy Enforcement Through Renement Process, B'2007, the 7th Int. B Conference, LNCS 4355 p , Springer. [2] D. Bert, M-L. Potet and N. Stouls. GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specications. Application to Security Properties, LNCS 3455 p , Springer-Verlag, ZB French conferences [4] N. Stouls et V. Darmaillacq. Développement formel d'un moniteur détectant les violations de politiques de sécurité de réseaux, AFADL'06 [5] N. Stouls et M-L. Potet. Explicitation du contrôle de développement B événementiel, AFADL 2004 [6] F. Badeau, D. Bert, S. Boulmé, C. Métayer, M-L. Potet, N. Stouls et L. Voisin. Traduction de B vers des langages de programmation, AFADL'03 Posters and short papers [7] X. Morselli, M.-L. Potet et N. Stouls. GénéSyst: Génération d'un système de transitions étiquetées à partir d'une spécication B événementiel, AFADL 2004, tools session. [8] N. Stouls et V. Darmaillacq. Développement formel d'un moniteur, Majecstic [9] N. Stouls Aide à la spécication et au développement formel de systèmes, 16ième rencontres régionales de la recherche en rhône-alpes 2006 (Poster) Technical reports [10]N. Stouls. Introduction aux cartes à puce, [11]N. Stouls. Introduction aux critères communs, All that is not explicitly authorized is forbidden. 4 In terms of high level elements, like users and resources in place of hosts and ports. 5
6 6 Tools development I participated in the development of two tools: The BoB 2 (Boîte à Outils B - B tool Box) and GénéSyst 2 [2, 5, 7] (Génération de systèmes de transitions étiquetées - Generation of labelled transitions systems). The rst one is a tool developed in Java which permits to manipulate B components and to generate some calculus on them (like the weakest precondition for example). The second one is a tool which takes a B specication and possibly a B renement and which generates a symbolic labelled transitions system which represents the exact behaviour of a given component. 7 Student supervision Hammal Haddad ( , Master 2-R)Modelisation and verication of security policies. Xavier Morselli ( , Master 1)Verication and optimisation of the GénéSyst tool. Evelyne Altariba ( , Master 1)Compression of a B project. Ounaida Mohamed ( , Licence 3)Development of a graphical interface for the GénéSyst tool. 8 Teaching Lecturer in B method ( ) Grenoble 1 university and INP Grenoble (ENSIMAG), Master 1, with Marie-Laure Potet. Introduction to the B method. Software engineering ( ) Orsay University, IFIPS 2 Introduction to the software engineering in the framework of a training in relation with the industry. Teacher assistant in Software engineering ( ) Orsay University, Licence 3 Introduction to the software engineering in the framework of a training in relation with the industry. Software engineering project ( ) Orsay University, Licence 3. A three months project done in parallel with courses, in which each teacher manages several teams of 3 persons. Students had to develop a software by using software engineering methods. Software engineering and compilation project ( ) INP Grenoble (ENSIMAG), Master 1. A one month project in which each teacher manages 5 teams of 4 persons. Students had to develop a compiler for a language close to ADA. Software engineering and compilation ( ) Grenoble 1 university, Master 1. A one week project in which students have to develop a compiler for an assembler language. Hardware and Software Architecture ( ) Grenoble 1 university, Licence 3. An introduction to the hardware architecture and the binary manipulations. 6
7 Functional programming ( ) Grenoble 1 university, Licence 2. An introduction to the functional programming with the Caml language. Computer science ( ) Grenoble 1 university, Licence 1. computer science with the C language. An introduction to the Tutor in mathematics and basic computing ( ) for a high level sportsman Grenoble 1 university, Licence 1 9 Employments Training course (2003) Research and development of software for the use of B in industrial size projects (Siemens Transportation Systems, Montrouge, France) Computing manager ( ) (Company ORINA - Papeete, French Polynesia) Network installation, software update, sta training to the Internet and installation of computerized dental radio 10 Responsibilities In charge of the computers park inventory during 3 years. Participation in team web site Participation in PhD. students scientic animation (Seminars, web site) 11 Professional tools Languages: French (mother language) and English (written, spoken and read) Operating systems: LINUX, DOS, Windows, MacOS programming and specication languages: B method, Scheme, Caml, Prolog, Java, ADA, Pascal, C, assemblers, Awards 2005: Price of the best team spirit in doctoriales of Rhone-Alpes. 1999: In the nal session of PROLOGIN (Individual National Contest of Computing) 1996: Certicate of distinction in Australian Mathematics Competition (Top 15%) 1994: Certicate of credit in Australian Mathematics Competition (Top 50%) 7
8 13 Professional references Pr Potet Marie-Laure LSR laboratory, BP72, St Martin d'hères CEDEX, France Pr Ledru Yves LSR laboratory, BP72, St Martin d'hères CEDEX, France Dr Bert Didier LSR laboratory, BP72, St Martin d'hères CEDEX, France Dr Dollé Daniel Siemens Transportation Systems, 50 rue Barbès, Montrouge CEDEX, France Pr Amblard Paul TIMA-CMP, 46 Avenue Félix Viallet, Grenoble CEDEX, FRANCE References [Abr96] J.R. Abrial. The B-Book. Cambridge University Press, [BC00] [BDJ + 01] [GN99] [MM02] [TH02] D. Bert and F. Cave. Construction of Finite Labelled Transition Systems from B Abstract Systems. In Integrated Formal Methods, volume 1945 of LNCS. Springer-Verlag, G. Barthe, G. Dufay, L. Jakubiec, B. Serpette, and S. Melo de Sousa. A Formal Executable Semantics of the JavaCard Platform. Lecture Notes in Computer Science, 2028:302, E. R. Gannsner and S. C. North. An open graph visualization system and its applications to software engineering. Technical report, Laboratoires AT&T, Etats unis, 26 mai Renaud Marlet and Cédric Mesnil. Demoney: A demonstrative electronic purse - card specication, K. Trentelman and M. Huisman. Extending JML Specications with Temporal Logic. In AMAST'02, volume 2422 of LNCS, pages Springer-Verlag, [TSCL + 02] TrustedLogic, SchlumbergerSema, CEA-LIST, CEA-LETI, and LSR-IMAG. Description du projet EDEN, février [VTH02] J.C. Voisinet, B. Tatibouet, and A. Hammad. jbtools: An experimental platform for the formal B method. In PPPJ'02, pages Trinity College, Dublin, Ireland, Juin
The ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
More informationValidation of Regulation Documents by Automated Analysis of Formal Models
800 Regulations Modelling and their Validation and Verification Validation of Regulation Documents by Automated Analysis of Formal Models Didier Bert 1, Fabrice Bouquet 2, Yves Ledru 1, and Sylvie Vignes
More informationBachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.
Bachelor of Technology (Computer Engineering.) Scheme of s/examination Sl. (3 rd SEMESTER) Teaching Schedule Examination Schedule 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.5 2 COT-201 Programming
More informationLaboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, 93430 Villetaneuse, France.
Domenico Ruoppolo CV Personal Information First Name Domenico. Last Name Ruoppolo. Date of Birth December 16th, 1985. Place of Birth Naples, Italy. Nationality Italian. Location Address Office B311. Contacts
More informationCurriculum Vitae. Claude Barral. 1984 1988 Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France
Curriculum Vitae Address n o 6 La Bastide Samat 13119 Saint Savournin, France Phone: +33.4.42.32.36.92 Mobile Phone: +33.6.86.83.19.55 Email: claude.barral@gmail.com Homepage: http://www.linkedin.com/in/cbarral
More informationGhost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters Geoffroy Vallée, Renaud
More informationCore Curriculum to the Course:
Core Curriculum to the Course: Environmental Science Law Economy for Engineering Accounting for Engineering Production System Planning and Analysis Electric Circuits Logic Circuits Methods for Electric
More informationVincent Cheval. Curriculum Vitae. Research
Vincent Cheval School of Computing University of Kent Canterbury, CT2 7NF, UK +44 (0)7479 555701 +44 (0)1227 823816 vincent.cheval@icloud.com homepage: www.cs.kent.ac.uk/ vc218/web Nationality : French
More informationProject Informations Master s degree in Computer Science (by research) M2R Info. in short
Project Informations Master s degree in Computer Science (by research) M2R Info. in short Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr
More informationProgram: Master in Nuclear Civil Engineering
Program: Master in Nuclear Civil Engineering Address: 28 avenue du Président Wilson, 94234 Cachan (inner suburbs of Paris) Year of school foundation: 1891 Recognition: French national Master s degree (accredited
More informationSmart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
More informationDraft dpt for MEng Electronics and Computer Science
Draft dpt for MEng Electronics and Computer Science Year 1 INFR08012 Informatics 1 - Computation and Logic INFR08013 Informatics 1 - Functional Programming INFR08014 Informatics 1 - Object- Oriented Programming
More informationAn Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
More informationSchool of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
More informationHow To Write A Network Protocol For A Cell Phone Network
CURRICULUM VITAE OF BOUDOUR Ghalem LIG - Grenoble Institute of Technology 681, rue de la passerelle Domaine universitaire - BP 72-38402 Grenoble Phone: +33 6 25 61 69 43 E-mail: boudour_ghalem@yahoo.fr
More informationCurriculum Vitae Emmanuelle Nègre March 2015
Curriculum Vitae Emmanuelle Nègre March 2015 Personal Details: Date of birth: June 25 th 1987 Nationality: French Marital status: Single Home Address: 5 rue Rivals 31 000 Toulouse France Tel.: +33.(0)6.76.79.01.31
More informationPh.D. in Computer Science
Loïc MAISONNASSE D.O.B. 12-09-1981 Laboratoire d Informatique de Grenoble 385, rue de la Bibliothèque B.P. 53 38041 Grenoble Cedex 9 France E-mail: loic.maisonnasse@imag.fr Phone office: (+33) 4 76 51
More informationComputer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.
Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationAn evaluation of the Java Card environment
An evaluation of the Java Card environment Christophe Rippert, Daniel Hagimont Contact: Christophe Rippert, Sirac Laboratory INRIA Rhône-Alpes, 655 avenue de l Europe Montbonnot 38334 St Ismier Cedex,
More informationComputer Science Information Sheet for entry in 2016. What is Computer Science?
Computer Science Information Sheet for entry in 2016 What is Computer Science? Computer Science is about understanding computer systems and networks at a deep level. Computers and the programs they run
More informationDatavetenskapligt Program (kandidat) Computer Science Programme (master)
Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer
More informationA Practical Approach to Multi-Process Systems With Dynamic Architecture
Event-Based Approach to Modelling Dynamic Architecture: Application to Mobile Ad-hoc Network Christian Attiogbé LINA - UMR CNRS 6241 - University of Nantes F-44322 Nantes Cedex, France Christian.Attiogbe@univ-nantes.fr
More informationGraduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
More informationHow To Write A Paper On A Network Of A Cell Phone In French Cnet.Com
Team: VASCO Scientific leader: Y. Ledru Reporting Period : January 1st, 2005 to September 30th, 2009 Web site: http://vasco.imag.fr/ Parent Organizations: Université Grenoble 1, Université Grenoble 2,
More informationSection des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11
Section des Unités de recherche Evaluation report Research unit : Troubles du comportement alimentaire de l adolescent University Paris 11 Mars 2009 Section des Unités de recherche Rapport d'évaluation
More informationLONG BEACH CITY COLLEGE MEMORANDUM
LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor
More informationSylvain Bonandrini, Christophe Cruz Christophe Nicolle
International Conference on Product Lifecycle Management 1 Building Lifecycle Management Sylvain Bonandrini, Christophe Cruz Christophe Nicolle Active3D-Lab 2 rue Renée Char BP 66606 21066 Dijon Cedex
More informationDivision of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
More informationFrench Scheme CSPN to CC Evaluation
French Scheme CSPN to CC Evaluation Antoine COUTANT ITSEF AMOSSYS 4 bis allée du bâtiment 35000 Rennes antoine.coutant@amossys.fr Abstract. Since 2008, French certication body created a new scheme for
More informationComputer Science. Master of Science
Computer Science Master of Science The Master of Science in Computer Science program at UALR reflects current trends in the computer science discipline and provides students with a solid theoretical and
More informationCURRICULUM VITÆ. Education. Latest update : August 2015. Sanjay Ramassamy Graduate student at Brown University.
CURRICULUM VITÆ Latest update : August 2015 Sanjay Ramassamy Graduate student at Brown University. Address : Sanjay Ramassamy Box 1917 151 Thayer Street Providence, RI 02912 USA Webpage : http://www.normalesup.org/~ramassamy/
More informationFACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES. (Master in Information Technology)
FACULTY OF COMPUTER SCIENCE AND ENGINEERING CURRICULUM FOR POSTGRADUATE PROGRAMMES (Master in Information Technology) MASTER IN INFORMATION TECHNOLOGY (MIT) CURRICULUM 1.1 Introduction This programme is
More informationLecture 1: Introduction
Programming Languages Lecture 1: Introduction Benjamin J. Keller Department of Computer Science, Virginia Tech Programming Languages Lecture 1 Introduction 2 Lecture Outline Preview History of Programming
More informationAutomatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
More informationAdvanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16
Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz Michel.Schinz@epfl.ch Assistant: Iulian Dragos INR 321, 368 64
More informationCSCI 3136 Principles of Programming Languages
CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University Winter 2013 CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University
More informationCurriculum Vitae et Studiorum Dossier n. 48773. Cinzia Di Giusto
Curriculum Vitae et Studiorum Dossier n. 48773 Cinzia Di Giusto December 31, 2010 Personal Information: Date of birth: Nationality: Di Giusto, Cinzia Oct 17, 1979 in Udine, Italy Italian Home address:
More informationVerification of Imperative Programs in Theorema
Verification of Imperative Programs in Theorema Laura Ildikó Kovács, Nikolaj Popov, Tudor Jebelean 1 Research Institute for Symbolic Computation, Johannes Kepler University, A-4040 Linz, Austria Institute
More informationInstructor Özgür ZEYDAN BEU Dept. of Enve. Eng. http://cevre.beun.edu.tr/zeydan/ CIV 112 Computer Programming Lecture Notes (1)
Instructor Özgür ZEYDAN BEU Dept. of Enve. Eng. http://cevre.beun.edu.tr/zeydan/ CIV 112 Computer Programming Lecture Notes (1) Computer Programming A computer is a programmable machine. This means it
More informationManaging large sound databases using Mpeg7
Max Jacob 1 1 Institut de Recherche et Coordination Acoustique/Musique (IRCAM), place Igor Stravinsky 1, 75003, Paris, France Correspondence should be addressed to Max Jacob (max.jacob@ircam.fr) ABSTRACT
More informationCode generation under Control
Code generation under Control Rencontres sur la compilation / Saint Hippolyte Henri-Pierre Charles CEA Laboratoire LaSTRE / Grenoble 12 décembre 2011 Introduction Présentation Henri-Pierre Charles, two
More informationEloise Caporal-Ebersold. 25 rue Pfeffinger 67100 Strasbourg Portable: 0620955900 Fixe: 0967089913 eloisecaporal2003@yahoo.com eloise@ebersold.
Eloise Caporal-Ebersold 25 rue Pfeffinger 67100 Strasbourg Portable: 0620955900 Fixe: 0967089913 eloisecaporal2003@yahoo.com eloise@ebersold.fr FORMATION 2012 présent Doctorat, Sciences du Langage 1999
More informationProfessional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
More informationPCCC PCCC Course Description
Course Description CIS 101 Computer Concepts and Applications 3 credits (formerly Introduction to Computers and Information Processing) Introduces a variety of topics in computers and computing including
More informationSmart Secure Devices & Embedded Operating Systems
Smart Secure Devices & Embedded Operating Systems Contact: pierre.dusart@unilim.fr Team: XLIM/DMI/SSD Limoges/FRANCE Technology involved ibutton USB token Contactless Prices of these objects: less than
More informationManaging Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie
More informationA B Formal Framework for Security Developments in the Domain of Smart Card Applications
A B Formal Framework for Security Developments in the Domain of Smart Card Applications Frédéric Dadeau, Marie-Laure Potet, Régis Tissot Abstract We propose in this paper a formal framework based on the
More informationVerication Techniques for LOTOS [ISO:8807] was a collaborative project, from 1989 to 1993, funded by the UK SERC/IED research program.
Verication Techniques for LOTOS U. Martin, University of St. Andrews, Scotland, U.K. M. Thomas, University of Glasgow, Scotland, U.K. Abstract. We report on the results of a project which applied LOTOS
More informationComputational Engineering Programs at the University of Erlangen-Nuremberg
Computational Engineering Programs at the University of Erlangen-Nuremberg Ulrich Ruede Lehrstuhl für Simulation, Institut für Informatik Universität Erlangen http://www10.informatik.uni-erlangen.de/ ruede
More informationDIABLO VALLEY COLLEGE CATALOG 2014-2015
COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy
More informationA hint of existing information systems analysis
systems analysis 2nd year PhD Student at Co-Founder of Master SCCI 10th Birthday, 12th September 2011 1A + 2A Engineering studies 3A Master SCCI Doctorate in virology Startup company in IS reengineering
More informationWelcome to: M2R Informatique & MoSIG Master of ScienceSep. in Informatics 18, 2009 Joseph 1 / 1Fou
Welcome to: M2R Informatique & MoSIG Master of Science in Informatics Joseph Fourier University of Grenoble & Grenoble INP UFR IMAG http://www-ufrima.imag.fr & ENSIMAG http://ensimag.grenoble-inp.fr Sep.
More informationBachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
More informationExtending Semantic Resolution via Automated Model Building: applications
Extending Semantic Resolution via Automated Model Building: applications Ricardo Caferra Nicolas Peltier LIFIA-IMAG L1F1A-IMAG 46, Avenue Felix Viallet 46, Avenue Felix Viallei 38031 Grenoble Cedex FRANCE
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationCosyVerif: An Open Source Extensible Verication Environment
CosyVerif: An Open Source Extensible Verication Environment Étienne André, Lom Hillah, Francis Hulin-Hubard, Fabrice Kordon, Yousra Lembachar, Alban Linard, Laure Petrucci ENS Cachan, Univ. Paris 6, Univ.
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationInformation Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.
Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationArtificial Intelligence. Class: 3 rd
Artificial Intelligence Class: 3 rd Teaching scheme: 4 hours lecture credits: Course description: This subject covers the fundamentals of Artificial Intelligence including programming in logic, knowledge
More informationSpécication et analyse formelle des politiques de sécurité dans le cloud computing
Spécication et analyse formelle des politiques de sécurité dans le cloud computing Asma GUESMI, Patrice CLEMENTE, Frédéric LOULERGUE, Pascal BERTHOMÉ Laboratoire d'informatique Fondamentale d'orléans (LIFO)
More informationCOMPUTER SCIENCE. FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa
FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa COMPUTER SCIENCE Computer Science is the study of computer programs, abstract models of computers, and applications of computing.
More informationDecomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
More informationAADL et la conception des logiciels
AADL et la conception des logiciels Pierre Dissaux, journée Féria/SVF, 2 décembre 2003 System Lifecycle System Engineering System Integration Hardware Engineering Software Engineering from System Engineering
More informationB.Sc. in Computer Information Systems Study Plan
195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210
More informationThe Minimal Dependency Relation for Causal Event Ordering in Distributed Computing
Appl. Math. Inf. Sci. 9, No. 1, 57-61 (2015) 57 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/090108 The Minimal Dependency Relation for Causal Event
More informationAccelerated Bachelor of Science/Master of Science in Computer Science. Dual Degree Program
Accelerated Bachelor of Science/Master of Science in Computer Science 1 Dual Degree Program Definitions The discussion below uses the following definitions: o BS/MS program: The complete accelerated Bachelor
More informationMaster of Science in Computer Science Information Systems
Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationCurriculum Vitae. Positions
Curriculum Vitae Luca Castelli Aleardi Professional address : ULB, O8.114, CP 212, Bvd. du Triomphe, 1050 Bruxelles, Belgium Personal address : 52, rue du Couédic, 75014 Paris Tél. : +33 (0)6 63 66 01
More informationSCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
More informationClarke College. Major Requirements
136 Clarke College Computer Science Mission In an increasingly technical world, the computer science department strives to bring technological understanding and contemporary professional skills to the
More informationCURRICULUM VITAE. 2006-2013 President of the Board of Directors of the Annales des Sciences Mathématiques du Québec.
CURRICULUM VITAE François Huard Department of Mathematics Bishop s University, Sherbrooke, Québec Canada, J1M1Z7 819-822-9600 (2363) email:fhuard@ubishops.ca Languages: French, English. Citizenship: Canadian
More informationBachelor Degree in Informatics Engineering Master courses
Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko
More informationOutline. hardware components programming environments. installing Python executing Python code. decimal and binary notations running Sage
Outline 1 Computer Architecture hardware components programming environments 2 Getting Started with Python installing Python executing Python code 3 Number Systems decimal and binary notations running
More informationThe Ecole polytechnique : Training science-based leaders
The Ecole polytechnique : Training science-based leaders «L École polytechnique forme des femmes et des hommes responsables, capables de mener des activités complexes et innovantes, pour répondre aux défis
More informationFacts and Figures. Welcome to Ense 3
By studying at Grenoble Institute of Technology, you will benefit from a level of research unique in France and a cursus of training dealing with the greatest challenges facing modern society : energy,
More informationIl est repris ci-dessous sans aucune complétude - quelques éléments de cet article, dont il est fait des citations (texte entre guillemets).
Modélisation déclarative et sémantique, ontologies, assemblage et intégration de modèles, génération de code Declarative and semantic modelling, ontologies, model linking and integration, code generation
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationFACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software
More informationStaRVOOrS: A Tool for Combined Static and Runtime Verification of Java
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationTableaux Modulo Theories using Superdeduction
Tableaux Modulo Theories using Superdeduction An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover Mélanie Jacquel 1, Karim Berkani 1, David Delahaye 2, and Catherine
More informationUniversité Joseph Fourier in Grenoble
Université Joseph Fourier in Grenoble Research and training in a cutting edge environment www.ujf-grenoble.fr UJF in short Université Joseph Fourier-Grenoble 1, is a major university for science, technology
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationIUT OF CERGY-PONTOISE
IUT OF CERGY-PONTOISE The road to success... 4 campuses near Paris: Neuville Pontoise Argenteuil - Sarcelles HNDs and bachelor's degrees Bioengineering Civil engineering Electrical and computer engineering
More informationAstroparticle theory in France. Pierre Binetruy, APC. ASPERA Theory Meting, Oxford, 17 March 2008
Astroparticle theory in France Pierre Binetruy, APC ASPERA Theory Meting, Oxford, 17 March 2008 Two kinds of laboratories: general theory labs with an astroparticle physics group: Laboratoire de Physique
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationDEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING
DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING Fall 2000 The instructions contained in this packet are to be used as a guide in preparing the Departmental Computer Science Degree Plan Form for the Bachelor's
More informationDepartment of Computer Science
82 Advanced Biochemistry Lab II. (2-8) The second of two laboratory courses providing instruction in the modern techniques of biochemistry. Experiments are performed on the isolation, manipulation and
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationPh.D. in Economics University of Paris Ouest Nanterre La Défense Research Centre : EconomiX
Inna Lyubareva TELECOM Bretagne - LUSSI Technopôle Brest-Iroise CS 83818 29238 Brest Cedex 3 (33)2 29 00 15 33 inna.lyubareva@telecom-bretagne.eu Education 10/2004 01/2010 Ph.D. in Economics Research Centre
More informationFanny Dos Reis. Visiting Assistant Professor, Texas A&M University. September 2006 - May 2008
Fanny Dos Reis Positions Held Visiting Assistant Professor, Texas A&M University. September 2006 - May 2008 Visiting Assistant Professor, University of Lille 1, France. September 2004 - August 2006 Visiting
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationThe Educational System of France. Dr. Linda Jahn AACRAO Annual Conference March 2, 2007
The Educational System of France Dr. Linda Jahn AACRAO Annual Conference March 2, 2007 Levels of Education Five levels of education Pre-primary (ecole maternelle) Primary/Elementary (ecole primaire) Lower
More informationINFORMATION SYSTEMS (INFO)
VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies
More informationMutual Exclusion using Monitors
Mutual Exclusion using Monitors Some programming languages, such as Concurrent Pascal, Modula-2 and Java provide mutual exclusion facilities called monitors. They are similar to modules in languages that
More information