Theoretical computer science conferences

Computer Aided Verification

In computer science, the International Conference on Computer-Aided Verification (CAV) is an annual academic conference on the theory and practice of computer-aided formal analysis of software and hardware systems, broadly known as formal methods. It is one of the highest-ranked conferences in computer science. Among the important results originally published in CAV are breakthrough techniques in model checking, such as Counterexample-Guided Abstraction Refinement (CEGAR) and partial order reduction. The first CAV was held in 1989 in Grenoble, France. The CAV proceedings (1989-present) are published by Springer Science+Business Media and are open access. (Wikipedia).

Video thumbnail

Convincing - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Can You Validate These Emails?

Email Validation is a procedure that verifies if an email address is deliverable and valid. Can you validate these emails?

From playlist Fun

Video thumbnail

Prove A Vote - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Quantum Verification - Bourbaphy - 17/11/18

Elham Kashefi (CNRS LIP6) / 17.11.2018 Quantum Verification ---------------------------------- Vous pouvez nous rejoindre sur les réseaux sociaux pour suivre nos actualités. Facebook : https://www.facebook.com/InstitutHenriPoincare/ Twitter : https://twitter.com/InHenriPoincare Instagr

From playlist Bourbaphy - 17/11/18 - L'information

Video thumbnail

Verifying Particular Solutions to Differential Equations Calculus 1 AB

I reintroduce Differential Equations including the definition of a differential equations, the order of differential equations, the difference between particular solutions and general solutions, and the number of arbitrary constants you can expect when solving these equations. I then work

From playlist Calculus

Video thumbnail

Sylvie Boldo : Formal verification of numerical analysis programs

Abstract : From a (partial) differential equation to an actual program is a long road. This talk will present the formal verification of all the steps of this journey. This includes the mathematical error due to the numerical scheme (method error), that is usually bounded by pen-and-paper

From playlist Mathematical Aspects of Computer Science

Video thumbnail

OWASP AppSec 2010: BitFlip: Determine a Data's Signature Coverage from Within the Application 2/2

Clip 2/2 Speaker: Henrich Christopher Poehls, University of Passau - ISL Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is

From playlist OWASP AppSec 2010

Video thumbnail

How To Submit Your FAFSA: College Bound

There’s so much to know about financial aid including deadlines, terminology, types of aid and the awarding process in general. Submitting your FAFSA is the first step in receiving financial aid. In this video, we review the financial aid submission process. You’ll learn what documents

From playlist College Bound

Video thumbnail

At-scale Formal Verification for Industrial Semiconductor Designs - Professor Tom Melham

https://www.turing-gateway.cam.ac.uk/sites/default/files/asset/doc/1707/Big%20Proof%20Day%20Melham%2019-07-2017.pdf #TuringSeminars

From playlist Turing Seminars

Video thumbnail

Totient - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

LambdaConf 2015 - Type Theory and its Meaning Explanations Jon Sterling

At the heart of intuitionistic type theory lies an intuitive semantics called the “meaning explanations." Crucially, when meaning explanations are taken as definitive for type theory, the core notion is no longer “proof” but “verification”. We’ll explore how type theories of this sort aris

From playlist LambdaConf 2015

Video thumbnail

AWS Pricing Tutorial | AWS Certification Training | AWS Tutorial | Edureka

** Cloud Master Program : https://www.edureka.co/masters-program/cloud-architect-training ** This Edureka "AWS Pricing” video will introduce you to nitty gritties of AWS Pricing and discuss what makes AWS highly flexible in terms of Pricing. Check out our AWS Playlist: https://goo.gl/8qrf

From playlist AWS Certification Training Videos

Video thumbnail

Convincing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Machine-Assisted Proofs – ICM2018

IMU Discussion Panels Panel 2 - Machine-Assisted Proofs Moderator: James Davenport Panelists: Luís Cruz-Filipe, Harald Helfgott, James Maynard, Bjorn Poonen, Pham Huu Tiep © ICM 2018 – International Congress of Mathematicians www.icm2018.org     Os direitos sobre todo o material des

From playlist IMU Discussion Panels

Video thumbnail

Distributed Data Collection

Professor Matt Salganik of Princeton University discusses Distributed Data Collection. Link to slides: https://github.com/compsocialscience/summer-institute/blob/master/2020/materials/day5-mass-collaboration/04-distributed_data_collection.pdf Links to other materials discussed in this vide

From playlist SICSS 2020

Video thumbnail

Algebraic and Combinatorial Proofs: C(n,k)=C(n,n-k)

This video provides an algebraic proof and three combinatorial proofs for a binomial identity.

From playlist Counting (Discrete Math)

Video thumbnail

Stanford Seminar - Electronic Design Automation and the Resurgence of Chip Design

Raúl Camposano Sage-DA / Silicon Catalyst February 6th, 2019 Electronic Design Automation (EDA) enables the design of semiconductors comprised of tens of billions of devices. EDA consists of design software incorporating cutting-edge optimization and analysis algorithms, as well as pre-de

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

Stanford Seminar - Mass Collaboration for Social Research in the Digital Age

Matthew Salganik Princeton University This seminar series features dynamic professionals sharing their industry experience and cutting edge research within the human-computer interaction (HCI) field. Each week, a unique collection of technologists, artists, designers, and activists will d

From playlist Stanford Seminars

Video thumbnail

EKE Authentication - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

Symposium on Logic in Computer Science | Formal methods | Partial order reduction | Model checking