Search
Distributed Open and Timed Systems – DOTS
The scientific context of the DOTS project is that of formal specification, verification and design of information systems. Complex systems, such as embedded systems that are widely used nowadays, ar
Stochastic Model Checking for performability and surety of the computerized systems – CHECK-BOUND
The widely use of computerised systems in all aspects of our lives gives an incontestable importance on the need for them to function correctly. The presence of such systems in safety-critical applic
Automated Verification of Sotware Systems – AVERISS
Software verification is a highly important and challenging problem. The goal of this project is to provide advanced techniques for automatic software verification, taking into account complex featur
Study of nuclear hormone receptors by an integrative structural biology approach. – NRcoactiv
1-Scientific background and objectives: Eukaryotic transcription is a fundamental mechanism of gene activity regulation and has profound implications in human health. The ligand-dependent transcriptio
High confidence VALidation of Analog and Mixed Signal circuits – VAL-AMS
The goal of the project is to build an experimental platform for validating the correctness of analog and mixed-signal circuits, a component of increasing importance for the functioning of modern emb
Safety and Security UndeR Focal – SSURF
The proposed project consists both : - in characterizing and studying the required features that an Integrated Development Environment (IDE) must provide in order not only to obtain sofware systems
Incremental refinement of event-based systems – RIMEL
The project RIMEL focuses on the refinement of event-based models and aims to develop new features related to the refinement, such as the re-usability of refinement-based development, the composition
Rewriting and Approximation for Java Applets verification – RAVAJ
In the field of computer security, formal methods are more and more successful and spread in the industry. Industrial use of formal methods for security yields some new needs on specification and ver
Design and analysis of efficient stream ciphers for constrained environments – RAPIDE
digital form raise many questions concerning the security that can be guaranteed in this context for the information that has to be protected. This security lies at its root on the existence of ciphe
POLicy Unified eXpression – POLUX
Information systems security has undergone profound mutations in recent years, with the apparition of direct financial gain associated with the capability to defeat the security defenses of said info