HASLab

High-Assurance Software Laboratory

Overview


News

  • New Paper: J.N. Oliveira. Weighted automata as coalgebras in categories of matrices. IJFCS Vol. 24, No. 6 (2013) 709–728, WSP Company. DOI: 10.1142/S0129054113400145
  • New Paper: H.D. Macedo and J.N. Oliveira. Typing Linear Algebra: a Biproduct-oriented Approach. SCP 78:11, pp.2160-2191 (DOI 10.1016/j.scico.2012.07.012)
  • New Paper: J.C. Campos and J. Machado, A Specification Patterns System for Discrete Event Systems Analysis, Int. J. Adv. Robotic Systems, vol. 10, 2013, doi:110.5772/56412
  • Job Opportunities: We are opening five post-doctoral positions. tinynew.gif Details here
  • New Paper: Josť N. Oliveira, Miguel A. Ferreira, "Alloy Meets the Algebra of Programming: A Case Study," IEEE Transactions on Software Engineering, vol. 39, no. 3, pp. 305-326, March 2013, doi:10.1109/TSE.2012.15

                        (more...)

DI » FMHAS » WebHome

Welcome to HASLab haslab.png

Our Motto

"Improving Practice Through Theory"

Overview

Software technology is pre-scientific in its lack of an effective basis for predicting computers' behaviour. HASLab research aims at improving scientific standards in software design through rigorous methods and mathematical techniques.

HASLab researchers have a long tradition of linking their research to national and international industry partners, and a deep involvement in the department's teaching activities, at both the undergraduate and the postgraduate level.

Regular group's activities include a research seminar that provides a stimulating meeting opportunity for the whole team, including post-grad (Ph.D and M.Sc) students.

The HASLab "Tripod"

  • Formal methods
  • Dependable Distributed Systems
  • Cryptography & Information security

Research Topics

  • High-assurance Model-driven Software Engineering
  • Foundations for architectural design (service certification, dynamic reconfiguration and self-adaptability)
  • Formal verification of real-time Systems
  • Secure embedded systems (static ckecking of embedded systems against safety policies)
  • Theoretical Cryptography / Provable Security
  • Implementation, Verification, and Analysis of Cryptographic Software
  • Dependability of interactive systems (model checking-based analysis of interactive systems)

r76 - 25 Oct 2013 - 12:27:50 - JoseNunoOliveira
This site is powered by the TWiki collaboration platformCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback
Syndicate this site RSSATOM