Currently browsing

Inference of Program Properties with Attribute Grammars, Revisited

Arie Middelkoop Promotor: Prof.dr. S.D. Swierstra (UU) Co-promotor: Dr. A. Dijkstra (UU) Universiteit Utrecht Date: 9 January, 2012 Summary A programming language is an essential ingredient for writing concise, maintainable, and error-free computer programs. A compiler takes a text written in such a language and compiles into machine instructions, and is …

Assessing and Improving the Quality of Model Transformations

Marcel van Amstel Promotor: Prof.dr. M.G.J. van den Brand (TU/e) Co-promotor: Dr. A. Serebrenik (TU/e) Technische Universiteit Eindhoven Date: 9 January, 2012 Summary Software is pervading our society more and more and is becoming increasingly complex. At the same time, software quality demands remain at the same, high level. Model-driven engineering (MDE) is …

Optimal Geometric Data Structures

Amirali Khosravi Promotor: Prof.dr. M.T. de Berg (TU/e) Technische Universiteit Eindhoven Date: 10 January, 2012 Summary Spatial data structures form a core ingredient of many geometric algorithms, both in theory and in practice. Many of these data structures, especially the ones used in practice, are based on partitioning the underlying space (examples …

Towards Provably Secure Efficiently Searchable Encryption

Saeed Sedghi Promotores: Prof.dr. W. Jonker (UT) and Prof.dr. P.H. Hartel (UT) Co-promotor: Dr. S. Nikova (UT) Universiteit Twente Date: 17 February, 2012 Summary Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, …

Alignment of Organizational Security Policies: Theory and Practice

Trajce Dimkov Promotor: Prof.dr. P.H. Hartel (UT) Universiteit Twente Date: 23 February, 2012 Summary To provide confidentiality, integrity and availability of its sensitive information, organizations use physical mechanisms, such as locks and video cameras, digital mechanisms, such as encryption and hashing, and social mechanisms such as chains of trust and delegation. …

Spring Days on Model-Driven Software Engineering

Hotel Overbosch, Garderen, April 16-20, 2012 The IPA Spring Days are an annual multi-day event, dedicated to a specific theme of current interest to the research community of IPA. This year’s Spring Days are dedicated to Model-Driven Software Engineering, fitting in the homonymous focus area Model-Driven Software Engineering of the research …

Studies on Verification of Wireless Sensor Networks and Abstraction Learning for System Inference

Faranak Heidarian Dehkordi Promotor: Prof.dr. F.W. Vaandrager (RU) Radboud Universiteit Nijmegen Date: 5 July, 2012 Summary Embedded systems are redefining how we perceive and interact with the physical world. While mission-critical embedded applications raise obvious reliability concerns, unexpected or premature failures in even noncritical applications such as game boxes and portable …

Algorithms for Cartographic Visualization

Kevin Verbeek Promotor: Prof.dr. B. Speckmann (TU/e) Technische Universiteit Eindhoven Date: 27 August, 2012. Summary Maps are effective tools for communicating information to the general public and help people to make decisions in, for example, navigation, spatial planning and politics. The mapmaker chooses the details to put on a map and the …

Course: Principles of Model Checking

University of Twente, Enschede, September 5, 12, 26 and October 3, 2012 Content A prominent verification technique that has emerged in the last thirty years is model checking, that systematically checks whether a model of a given system satisfies a property such as deadlock freedom, invariants, or request-response. This automated …