HCSS 2017

file

Visible to the public HCSS-2017[3].pdf

file

Visible to the public Allowing Bounded Leakage in Secure Computation: A New Application of Differential Privacy

Presented as part of the 2017 HCSS conference.

Abstract:

file

Visible to the public A Trustable Autonomous Systems Lifecycle

The military requires flexible unmanned cyber-physical systems that can exhibit autonomous decision making and both obey rules of engagement and operate within a verifiable behavior safety envelope. We currently lack methods to provide assurance that such systems will operate reliably and with integrity in their operating environment as they continue to learn how to adapt to new situations. We have developed an architecture and an autonomous systems verification and validation approach based, in part, on the new discipline of software intent specifications.

file

Visible to the public Keynote Presentation: Symmetries in Software

Presented as part of the 2017 HCSS conference.

ABSTRACT:

file

Visible to the public Keynote Presentation: Formal Methods and the Defense Industrial Base

Presented as part of the 2017 HCSS conference.

ABSTRACT

file

Visible to the public Design Studio for Rigorous System Design using Architecture Styles and BIP

Presented as part of the 2017 HCSS conference.

ABSTRACT

file

Visible to the public Keynote Presentation - John Launchbury

Presented as part of the 2017 HCSS conference.

file

Visible to the public Verified Data Structures for Trusted Autonomy: A Compilation Approach

Presented as part of the 2017 HCSS conference.

ABSTRACT

Problem statement.

file

Visible to the public Certified Multiplicative Weights Update, or Verified Learning Without Regret

Presented as part of the 2017 HCSS conference.

ABSTRACT