Visible to the public 2008 HCSS Conference Program Agenda

2008 HCSS Conference Program Agenda

http://cps-vo.org/node/1354

Conference Archives: 20012002200320042005200620072008200920102011201220132014

Wednesday, March 5

1:30 pm Tutorial: Automated Synthesis of SAT Solvers
Doug Smith, Kestrel Institute
3:00 pm Break
3:30 pm Modeling, Checking, and Simulation with Alloy
Greg Dennis, Massachusetts Institute of Technology
5:00 pm Adjourn for the day

Thursday, March 6

8:30 am Keynote Presentation
Bertrand Meyer, ETH Zurich
9:15 am Past and Current Kestrel Software Development Methods
Cordell Green, Kestrel Institute
9:45 am Scade 6.0: A Model-Based Development Environment
Bernard Dion, Esterel Technologies
10:15 am Break
10:30 am Software Development in Haskell
John Launchbury, Galois
11:00 am Support for Supertype Abstraction in JML
Gary T. Leavens, University of Central Florida
11:30 am A Retrospective on Constructive Verification
Roderick Chapman, Praxis
Noon Lunch
1:30 pm Panel: Software and Systems Development
Bertrand Meyer, Cordell Green, Bernard Dion, John Launchbury, Gary T. Leavens, Roderick Chapman
2:30 pm Break
2:45 pm COTS Strategy: Information Assurance Guidance 2012
Jeff Nieves, IAO 2012 Task Force
3:30 pm Panel: COTS Strategy
Byron Cook (MS Research, Cambridge), Michael Dransfield (NSA), Helen Gill (NSF), John Launchbury (Galois), William Scherlis (CMU), Matt Wilding (Rockwell Collins)
5:15 Adjourn for the day


Friday, March 7

8:30 am Welcome and Introductions
8:45 am From Dirt to Shovels: Inferring PADS descriptions from ASCII Data
Kathleen Fisher, AT&T
9:30 am Rule Based Static Analysis of Network Protocol Implementations
Jeff Foster, University of Maryland
10:15 am Break
10:45 am Run-time Systems for High-Assurance Systems Programming
Mark P. Jones, Portland State University
11:30 am Application Level Concurrency in Haskell: Combining Events and Threads
Steve Zdancewic, University of Pennsylvania
12:15 pm Lunch
1:45 pm Security As A System-Level Constraint
Perry Alexander, University of Kansas
2:30 pm Attack-Prone Components: Predicting Where Software Systems Will Be Attacked
Michael Gegick, North Carolina State University
3:15 pm Break
3:30 pm Analyzing a Cross-Domain Component: Lessons Learned and Future Directions
John Matthews, Galois
4:15 pm Proving Conditional Termination
Byron Cook, Microsoft Research Cambridge
5:00 pm Conference Adjourned