![]() |
COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. | ![]() |
REMS lunch
Add to your list(s)
Send you e-mail reminders
Further detail
REMS lunchtime meeting If you have a question about this list, please contact: Peter Sewell. If you have a question about a specific talk, click on that talk to find its organiser. 0 upcoming talks and 40 talks in the archive. Compiling algebraic effects to Javascript in js_of_ocaml
Not-quite-so-broken TLS 1.3 mechanised conformance checking
Cache Storage Channels: Alias-Driven AttacksNON-STANDARD DAY: NEXT MONDAY
Sync meeting and Stephen Kell talk: Towards a dynamic object model within Unix processesREMS lunch *with lunch*. Back in Room FW11 (not SS03)
Title to be confirmednonstandard room: SS03
Formally Modelling and Verifying the FreeRTOS Real-time Operating System
Algebraic Principles for Program Verification and Refinement Tools
POSTPONED: Abstract machines and certified compilers
Hardware Support for Compartmentalisation
Checking very long ARM traces - An informal introduction
Understanding Memory Model Performance
Kneecap: model-based generation and analysis of network traffic
Verification Research + X = Impactnonstandard room: FW26
Title to be confirmednonstandard room: FW26
The Problem of Programming Language Concurrency Semantics
Processor Memory System Verification using DOGReL
Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementationnonstandard room: FW26
The CH2O project: making sense of the C standard
Linking and ELFnonstandard room: FW26
Finding small counterexamples to memory correctness
TBC: status updates - h/w side
Principles of Shape Analysisnonstandard room: FW26
Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoningnonstandard room: SS03
Title to be confirmednonstandard room: SS03
Title to be confirmednonstandard room: SS03
TSO-CC and Coherence protocol verificationnonstandard room: SS03
Towards architectural emulators for multiprocessors: PPCMEM2 status
Software-driven ISA Design: How software requirements drove the evolution of the CHERI instruction set.
Micro-Policies: A Framework for Tag-Based Security MonitorsNote in FW26
Hypervisor Verification in the PROSPER and HASPOC projects
REMS lunchnonstandard room: SS03
High-assurance network protocols - implementations and tests
Please see above for contact details for this list. |
Other listsFitzwilliam College Foundation Lectures Contagion and Containment Graphene CDT Advanced Technology LecturesOther talksTrain and equip: British overseas security assistance in the Cold War Global South Biological and Clinical Features of High Grade Serous Ovarian Cancer Organoid systems to study the maternal-fetal dialogue of early pregnancy Cambridge-Lausanne Workshop 2018 - Day 2 Scale and anisotropic effects in necking of metallic tensile specimens Retinal mechanisms of non-image-forming vision Black and British Migration Political Thought, Time and History: An International Conference |