Seminar • Functional Programming • How to Build a Distributed System with Real-time Constraints using Concurrent Functional Programming Tools
Please note: This seminar will take place online.
Armando Santos
Well-Typed/Haskell Consultants
Armando Santos
Well-Typed/Haskell Consultants
Nils Lukas, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Florian Kerschbaum
Eric Lo
Chinese University of Hong Kong
Reynold C.K. Cheng
University of Hong Kong
Candid Wüest
Global VP of Research, Acronis
In this technical talk, we will navigate through the intricate world of malware analysis and the methodologies employed by cybersecurity professionals, such as reverse engineering and blackboxing. We’ll contrast traditional methods, like signature-based detection, with more adaptive approaches such as behavior detection.
Antony Albert Raj Irudayaraj, PhD candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Daniel Vogel, Omid Abari
Antony Albert Raj Irudayaraj, PhD candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Daniel Vogel, Omid Abari
Glaucia Melo dos Santos, PhD candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Paulo Alencar, Daniel Berry, Donald Cowan
Martina Beck, PhD
CEO, MaibornWolff, Munich, Germany
As a real-world IT service provider, we have really struggled to sell requirements engineering since agilization. Everything is about Scrum teams and coding for our customers. At the same time, holistic design is sorely needed.
Mojtaba Valipour, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Ali Ghodsi