Lectures by Prof. Eades at AU
Distinguished Speaker Series
1:04:05
Lectures by Prof. Eades at AU
Discovering Vulnerabilities in ePassports using Bisimilarity
3:04:21
Lectures by Prof. Eades at AU
Distinguished Speaker Series
1:13:55
Lectures by Prof. Eades at AU
Distinguished Speaker Series
54:25
Lectures by Prof. Eades at AU
Integrating Usability into Programming Language Design
1:07:05
Lectures by Prof. Eades at AU
Tight Polynomial Worst-Case Bounds for Loop Programs
1:13:50
Lectures by Prof. Eades at AU
On Turing machines with syntactic restrictions
1:04:45
Lectures by Prof. Eades at AU
Adjoint Reactive GUI Programming
1:13:31
Lectures by Prof. Eades at AU
Session Logical Relations for Noninterference
1:18:07
Lectures by Prof. Eades at AU
Excel meets Lambda
1:10:46
Lectures by Prof. Eades at AU
Logical Relations As Types
1:03:41
Lectures by Prof. Eades at AU
On Higher-Order Cryptography
1:36:25
Lectures by Prof. Eades at AU
Quantitative Tauberian theorems
1:13:56
Lectures by Prof. Eades at AU
Coinductive Equivalences for Higher-order Coeffectful Languages
1:09:41
Lectures by Prof. Eades at AU
Graded Modal Dependent Type Theory (ESOP 2021)
17:20
Lectures by Prof. Eades at AU
Extending Homotopy Type Theory with Linear Type Formers
1:22:15
Lectures by Prof. Eades at AU
Coupled Relational Symbolic Execution
1:10:41
Lectures by Prof. Eades at AU
Skew X categories and structural proof theory
1:31:06
Lectures by Prof. Eades at AU
Relational Programming in miniKanren: Program Synthesis, Treating Rare Diseases, and More!
1:32:36
Lectures by Prof. Eades at AU
Codensity Games for Bisimilarity
1:02:51
Lectures by Prof. Eades at AU
RustBelt: Logical Foundations for the Future of Safe Systems Programming
1:35:06
Lectures by Prof. Eades at AU
RustBelt: Logical Foundations for the Future of Safe Systems Programming
1:30:55
Lectures by Prof. Eades at AU
Resource Constrained Programming with Full Dependent Types
1:18:20
Lectures by Prof. Eades at AU
Resource Constrained Programming with Full Dependent Types
1:11:00
Lectures by Prof. Eades at AU
Dependent Type Driven Program Synthesis
1:23:50
Lectures by Prof. Eades at AU
Dependent Type Driven Program Synthesis
1:11:40
Lectures by Prof. Eades at AU
On Adversarial Testing of Cellular Network Protocols
1:07:00
Lectures by Prof. Eades at AU
Achieving Programmability and Performance for Data-Intensive Computations Using Reduction Based APIs
1:01:29
Lectures by Prof. Eades at AU
Category Theory in Communication, Cryptography, and Security
1:00:07
Lectures by Prof. Eades at AU
Developing Distinct IT Use Constructs: Literature Analysis, Theory, and an Empirical Test
48:45
Lectures by Prof. Eades at AU
Developing Distinct IT Use Constructs: Literature Analysis, Theory, and an Empirical Test
43:16
Lectures by Prof. Eades at AU
Benchmarking Theorems of Implicational Linear Logic
1:26:01
Lectures by Prof. Eades at AU
Benchmarking Theorems of Implicational Linear Logic
1:07:26
Lectures by Prof. Eades at AU
Making Types More Descriptive via Grading
1:56:46
Lectures by Prof. Eades at AU
Making Types More Descriptive via Grading
1:42:11
Lectures by Prof. Eades at AU
Algorithmic Game Theory for Network Bottlenecks
1:04:40
Lectures by Prof. Eades at AU
From Scripting to Proving: Gradual Verification for Expressive Programming Languages
58:28
Lectures by Prof. Eades at AU
From Scripting to Proving: Gradual Verification for Expressive Programming Languages
1:05:12
Lectures by Prof. Eades at AU
"Language-Integrated Verification" by Dr. Ranjit Jhala
1:22:55
Lectures by Prof. Eades at AU
Identification and Extraction of Content-hiding iOS Applications by Dr. Gokila Dorai
39:29
Lectures by Prof. Eades at AU
Colloquium Presentation - "Blockchain part II" by Dr. Hoda Maleki
55:58
Lectures by Prof. Eades at AU
Colloquium - Blockchain part I by Dr. Hoda Maleki
1:18:08
Lectures by Prof. Eades at AU
"A gentle introduction to template games" by Dr. Paul-André Melliès (CNRS, University of Paris)
2:00:00