or cancel
  1. Engineers Without Borders

    38:36

    from Galois Video Added 365 2 0

    abstract: Engineers Without Borders USA is a fast-growing national non-profit impacting developing communities around the world. EWB provides an opportunity for engineering students and professionals…

    + More details
    • Faster persistent data structures through hashing

      51:19

      from Galois Video Added 1,449 6 0

      abstract: The most commonly used map (dictionary) data type in Haskell is implemented using a size balanced tree. While size balanced trees provide good asymptotic performance, their real world performance…

      + More details
      • The Strategy Challenge in Computer Algebra

        52:19

        from Galois Video Added 458 7 0

        abstract: In automated deduction, strategy is a vital ingredient in effective proof search. Strategy comes in many forms, but the key is this: user-specifiable adaptations of general reasoning mechanisms…

        + More details
        • Verifying seL4-Based Systems

          55:53

          from Galois Video Added 356 1 0

          abstract: In 2009 the NICTA L4.verified project completed the machine-checked correctness proof of the seL4 microkernel. The natural next step is then to use this verified kernel to construct verified…

          + More details
          • Program Inconsistency Detection using Weakest Preconditions

            01:09:21

            from Galois Video Added 429 2 0

            abstract: Many tools exist to automate the search for defects in software source code. However, many of these tools have not been widely applied, partly because they tend to work least well in the…

            + More details
            • Control Flow Graph-guided Exploration in DDT

              01:06:16

              from Galois Video Added 515 4 0

              abstract: The existing implementation of DDT uses a depth-first search algorithm to drive the exploration of new paths for testing. This algorithm provides full coverage of the program under test,…

              + More details
              • The Rubinius Virtual Machine

                01:09:36

                from Galois Video Added 1,902 5 0

                abstract: Ruby is a highly dynamic, strongly-typed programming language created by Yukihiro Matsumoto in 1993 and first released in 1995. It borrows from Smalltalk, Lisp, and Perl. Ruby has single…

                + More details
                • Formal Methods Applied to Control Software

                  01:04:11

                  from Galois Video Added 501 2 0

                  abstract: Critical cyber-physical systems, such as avionics, typically have one or more components that control the behavior of dynamical physical systems. The design of such control systems is well…

                  + More details
                  • Copilot: A Hard Real-Time Runtime Monitor

                    53:48

                    from Galois Video Added 1,264 2 0

                    abstract: We address the problem of runtime monitoring for hard real-time programs—a domain in which correctness is critical yet has largely been overlooked in the runtime monitoring community.…

                    + More details
                    • Databases are Categories 2: Refinements and Extensions

                      01:02:55

                      from Galois Video Added 646 1 0

                      abstract: About five months ago I gave a talk here at Galois called “Databases are categories.” The basic idea was that a database schema can be represented as a category C and its states…

                      + More details
                      • Fides: Remote Anomaly-Based Cheat Detection Using Client Emulation

                        53:31

                        from Galois Video Added 139 1 0

                        abstract: As a result of physically owning the client machine, cheaters in online games currently have the upper-hand when it comes to avoiding detection. To address this problem and turn the table…

                        + More details
                        • Verification of Galois Field Multipliers

                          01:16:26

                          from Galois Video Added 501 4 0

                          abstract: Applications in Cryptography require multiplication and exponentiation operations to be performed over Galois fields GF(2^k). Therefore, there has been quite an interest in the hardware…

                          + More details

                          Browse Videos

                          Videos Galois Video

                          Here are all of the videos that Galois Video has uploaded to Vimeo. Appearances are videos that Galois Video has been credited in by others.

                          Also Check Out