or cancel
  1. Verified Cryptographic Implementations

    01:08:48

    from Galois Video Added 53 2 0

    Abstract EasyCrypt is a computer-assisted framework for proving the security of cryptographic constructions. However, there is a significant gap between security proofs done in the usual provable…

    + More details
    • Tech Talk: Read-copy update (RCU) validation and verification for Linux

      01:07:11

      from Galois Video Added 79 1 0

      abstract: Read-copy update (RCU) is a synchronization mechanism that is sometimes used as an alternative to reader-writer locking (among other things) that was added to the Linux kernel in 2002.…

      + More details
      • Control Flow Graph-guided Exploration in DDT

        01:06:16

        from Galois Video Added 470 3 0

        abstract: The existing implementation of DDT uses a depth-first search algorithm to drive the exploration of new paths for testing. This algorithm provides full coverage of the program under test,…

        + More details
        • Candid Experiences from a Hardware Startup

          01:05:56

          from Galois Video Added 221 1 0

          abstract: Hardware is hard. At least that's what people always say. Building a hardware startup requires a broad base of technical knowledge, from electronics and manufacturing experience to…

          + More details
          • Programming with Narrowing

            01:04:48

            from Galois Video Added 319 3 0

            abstract: In this talk, I will introduce narrowing, the characterizing feature of functional logic programming, from the programmer's viepoint. Narrowing promotes non-determinism and it enables…

            + More details
            • Property Directed Reachability

              01:04:28

              from Galois Video Added 487 2 0

              abstract: Last spring, in March 2010, Aaron Bradley published the first truly new bit-level symbolic model checking algorithm since Ken McMillan’s interpolation based model checking procedure…

              + More details
              • Formal Methods Applied to Control Software

                01:04:11

                from Galois Video Added 453 2 0

                abstract: Critical cyber-physical systems, such as avionics, typically have one or more components that control the behavior of dynamical physical systems. The design of such control systems is well…

                + More details
                • A short examination on the intersection of security and usability (or How usable security could save us all)

                  01:04:10

                  from Galois Video Added 112 2 0

                  abstract: Cryptographic tools have become more powerful in the last three decades. With that power has come complexity. To use or even understand most security tools you need a thorough understanding…

                  + More details
                  • Requirements and Performance of Data Intensive, Irregular Applications

                    01:04:07

                    from Galois Video Added 529 2 0

                    Abstract: Many fundamental science, national security, and business applications need to process large volumes of irregular, unstructured data. Data collection and analysis is rapidly changing the…

                    + More details
                    • Haskell Bytes

                      01:04:03

                      from Galois Video Added 239 4 0

                      abstract: We will take you on a guided tour through the memory of a running Haskell program and get to peek at the raw bytes of Haskell values. We’ll see how uniformity allows for polymorphic…

                      + More details
                      • Sunroof and a Blank Canvas: A tail of two DSLs

                        01:03:17

                        from Galois Video Added 65 0 0

                        Abstract Sunroof is an embedded Haskell Domain Specific Language (DSL) that compiles to JavaScript. Blank Canvas is an embedded Haskell DSL that provides direct access to the HTML5 JavaScript Canvas.…

                        + More details
                        • Databases are Categories 2: Refinements and Extensions

                          01:02:55

                          from Galois Video Added 550 1 0

                          abstract: About five months ago I gave a talk here at Galois called “Databases are categories.” The basic idea was that a database schema can be represented as a category C and its states…

                          + More details

                          Browse Videos

                          Videos Galois Video

                          Here are all of the videos that Galois Video has uploaded to Vimeo. Appearances are videos that Galois Video has been credited in by others.

                          Also Check Out