Kangjing Huang
MSEE 112
Webinar
November, 29 2022 12:00 P.M.

Constraint-based program synthesis techniques have been widely used in numerous settings. However, synthesizing programs that use libraries remains a major challenge. To handle complex or black-box libraries, the state of the art is to provide carefully crafted mocks or models to the synthesizer, requiring extra manual work. We address this challenge by proposing Toshokan, a new synthesis framework as an alternative approach in which library-using programs can be generated without any user-provided artifacts at the cost of moderate performance overhead.

Continue reading
Tarek Abdelzaher, UIUC
BHEE 317
Webinar
November, 15 2022 12:00 P.M.

Advances in neural network revolutionized modern machine intelligence, but important challenges remain when applying these solutions in IoT contexts; specifically, in cost-sensitive applications on lower-end embedded devices. The talk discusses challenges in offering real-time machine intelligence services at the edge to support applications in resource constrained environments.

Continue reading
Azam Ikram
BHEE 317
Webinar
November, 08 2022 12:00 P.M.

Most cloud applications use a large number of smaller sub-components (called microservices) that interact with each other in the form of a complex graph to provide the overall functionality to the user. While the modularity of the microservice architecture is beneficial for rapid software development, maintaining and debugging such a system quickly in cases of failure is challenging.

Continue reading
Dr. Joanna C. S. Santos , University Of Notre Dame
BHEE 317
Webinar
November 1,2022 1:00 P.M.

Software security is a growing concern leading to the increasing adoption of a secure by design approach to software development. In such approach, software systems are designed from the ground up to be resilient against attacks. Despite the growing efforts into addressing security concerns early on during software development, mistakes can be made that lead to vulnerabilities (“software weaknesses*).

Continue reading