8 12, 2016

Ramkannan Avadainayagam (Accenture Digital Solution) – Machine Learning and Artificial Intelligence

From picking our favourite movies to predicting global weather conditions, Artificial Intelligence (AI) and Machine Learning (ML) are already steadily and increasingly augmented into our everyday lives. [...]

9 11, 2016

Arseny Chernov (Dell EMC) – Compressed Introduction to Hadoop, NoSQL and SQL-on-Hadoop Technologies

In 2016, Big Data Analytics with Hadoop and NoSQL databases are assumed to finally reach their “plateau of productivity”. [...]

20 10, 2016

Dr. Jianying Zhou (Institute for Infocomm Research) – Mobile Platform and Application Security

Smartphones become more and more popular. Android and iOS are two dominant mobile operating systems on the market. An interesting question is which one is more secure. [...]

5 10, 2016

Singtel – Connecting the World of Things: How IoT Will Change Your Everyday Life

It is estimated that by 2020, there will be more than 20 billion connected “things” in use that promises to have a transformative impact on the way people work, play and live. [...]

1 09, 2016

Takashi Kitamura (AIST) – Greedy Combinatorial Test Case Generation Using Unsatisfiable Cores

Combinatorial testing aims at covering the interactions of parameters in a system under test, while some combinations may be forbidden by given constraints (forbidden tuples). [...]

1 09, 2016

Hideaki Nishihara (AIST) – On Fostering Verification Skills for Embedded Software Engineers

Software control is fundamental in modern embedded systems, and thus quality of those software is an important issue. [...]

1 09, 2016

Yoriyuki Yamagata (AIST) – Runtime Verification for Concurrent Systems

In this talk, we present CSP_E, a specification language for monitoring concurrent systems. [...]

17 08, 2016

Matthias Wachs (Technical University of Munich) – Secure and Resilient Communication and Name Systems for Decentralized Network Environments

Today's Internet, computer networks, and services often rely on centralized, hierarchical architectures and were often designed without any focus on security, resilience, and privacy. [...]

17 08, 2016

Sudipta Chattopadhyay (Saarland University) – Analyzing and Testing Next-Generation Embedded Systems

Analysis and testing of embedded software requires deep knowledge of execution platforms. Besides, often such software operates in non-deterministic physical environment (e.g. temperature and vibration), which is [...]

26 07, 2016

Roland Kie (Inzen Studios) – From Free to Premium to Freemium: A Game’s Journey into the Market

The Game Dark Dot has had a long journey. It was out in the market a few years back as free, but short, game. [...]