2008 PROGRAM AGENDA
WEDNESDAY, MARCH 5 |
THURSDAY, MARCH 6 |
FRIDAY, MARCH 7 | ||
0830 - 0845 |
Keynote Presentation |
Welcome and Introductions |
||
0845 - 0915 | From Dirt to Shovels: Inferring PADS descriptions from ASCII Data Kathleen Fisher (AT&T) |
|||
0915 - 0930 |
Past and Current Kestrel Software Development Methods |
|||
0930 - 0945 |
Rule Based Static Analysis of Network Protocol Implementations |
|||
0945 - 1015 |
Scade 6.0: A Model-Based Development Environment |
|||
1015 - 1030 |
BREAK |
BREAK | ||
1030 - 1045 |
Software Development in Haskell |
|||
1045 - 1100 |
Run-time Systems for High-Assurance Systems Programming |
|||
1100 - 1130 |
Support for Supertype Abstraction in JML |
|||
1130 - 1200 | A Retrospective on Constructive Verification Roderick Chapman (Praxis) |
Application Level Concurrency in Haskell: Combining Events and Threads |
||
1200 - 1215 | LUNCH | |||
1215 - 1330 | LUNCH | |||
1330 - 1345 |
Tutorial |
Panel |
||
1345 - 1430 |
Security As A System-Level Constraint |
|||
1430 - 1445 | BREAK |
Attack-Prone Components: Predicting Where Software Systems Will Be Attacked |
||
1445 - 1500 |
COTS Strategy: Information Assurance Guidance 2012 |
|||
1500 - 1515 | BREAK | |||
1515 - 1530 |
BREAK |
|||
1530 - 1615 |
Modeling, Checking, and Simulation with Alloy Greg Dennis (Massachusetts Institute of Technology) |
Panel COTS Strategy Byron Cook (MS Research, Cambridge) Michael Dransfield (NSA) Helen Gill (NSF) John Launchbury (Galois) William Scherlis (CMU) Matt Wilding (Rockwell Collins) |
Analyzing a Cross-Domain Component: Lessons Learned and Future Directions |
|
1615 - 1700 | ||||
Proving Conditional Termination |
||||
1700 |
Adjourn for the Day |
Conference Adjourned |
||
1715 |
Adjourn for the Day
|