- 2019-12-19[12-20]SKLCS seminar on 2 talks-“Proving that Programs are Differentially Private” “Quantitative information flow: when is one leak worse than another?”
- 2019-12-09[12-18]Quantum Computing Engineering: Challenges and Opportunities
- 2019-12-09[12-10]Compositional Techniques for the Verification of a Separation Micro-kernel for Multi-Core Architectures
- 2019-11-11[11-14]SafeHidden: 通过持续随机化来确保信息隐藏的高效性和安全性
- 2019-10-15[10-25]Software Engineering Issues in Cyber-Physical Systems
- 2019-09-17[09-17] On Solving String Constraints
- 2019-08-01[08.20]Scalable Analysis and Control of Boolean Networks
- 2019-07-09[07.20]-Beyond NP Revolution
- 2019-07-04[07.09]-慕课中的故事化学习法:双城记
- 2019-07-04[07.09]-Augmenting Stream Constraint Programming with Eventuality Conditions
- 2019-07-02[07.03]-Formal Proofs of Tarjan’s Strongly Connected Components Algorithm in Why3, Coq and Isabelle
- 2019-07-02[06.25]-Bi-Kronecker Functional Decision Diagrams: A Novel Canonical Representation of Boolean Functions
- 2019-07-02[07.05]-Trustworthy Cyber-Physical Systems: Dream or Reality?
- 2019-06-11Classification Program for Counting Problems