# Archive Seminar

- Keynote: Verification of Stateful Security Protocols in Isabelle/HOL May 02, 2023
- Minimal Generating Sets for Semiflows April 26, 2023
- Co-verification for robotics: from simulation to verification April 18, 2023
- On the edit distance between transducers April 17, 2023
- String constraints with subword ordering: complexity of satisfiability April 01, 2023
- The Future of Model-based Testing March 01, 2023
- Strategy Complexity of Zero-Sum Games on Graphs February 01, 2023
- A Gentle Introduction to Matching Logic and its Applications February 01, 2023
- The Frobenius Anatomy of Distributed Quantum Protocols January 04, 2023

## 2022

- An Abstraction of the Unit Interval with Denominators December 23, 2022
- Keynote: The Skolem Landscape December 13, 2022
- Consistent Circuits for Indefinite Causal Order November 28, 2022
- Programming with (Discrete and Continuous) Ordinary Differential Equations November 10, 2022
- Formal Security Proofs in a Post-Quantum World November 09, 2022
- Machine Learning and Autoformalisation November 01, 2022
- Verification and Synthesis of Complete Test Generation Algorithms for Finite State Machines October 04, 2022
- Algorithm for Consistent Query Answering under Primary Key Constraints May 10, 2022
- Reaching Consensus in Hostile Environments April 14, 2022
- Correct Blockchain-based Business Processes April 04, 2022
- Connected multi-agent path finding March 29, 2022
- Weakly unambiguous Parikh automata and their link to holonomic series March 28, 2022
- Rational Defeasible Belief Change March 22, 2022
- Semantics for Variational Quantum Programming March 15, 2022
- Proving cryptographic protocols: the complex relationship between symbolic and computation models March 08, 2022
- On the strategy synthesis problem in MDPs: probabilistic CTL and rolling windows. February 15, 2022
- WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms January 25, 2022
- Active learning for sound negotiations January 18, 2022
- Formal methods at Thales Research & Technology January 11, 2022
- E-voting protocols - how to analyse the security of these (real-world) systems? January 04, 2022

## 2021

- Hazel: a Separation Logic for effect handlers December 27, 2021
- Formal Verification of Finite Systems: Contributions and Adoption to security properties December 27, 2021
- The relational semantics, and beyond December 27, 2021
- Avoiding deadlocks in lock-sharing systems December 27, 2021
- Formalizing Spreads and Packings of the Smallest Projective Space PG(3,2) using the Coq Proof Assistant December 27, 2021
- Electronic voting: design, attacks and proofs December 03, 2021
- Structures from Quantum Relations November 28, 2021
- Sleeping is Superefficient: MIS in Exponentially Better Awake Complexity November 28, 2021
- Characterising one-player positionality for infinite duration games on graphs November 22, 2021
- Routed quantum circuits November 16, 2021
- Formalizing mathematics in Lean October 09, 2021
- Verified Software Components October 08, 2021
- Reasoning over leaks of information for Access Control of Databases October 08, 2021
- Quantum simulation and causality October 02, 2021
- Towards Security-Oriented Program analysis June 16, 2021
- Distributed Causal Memory: Modular Specification and Verification in Higher-Order Distributed Separation Logic April 20, 2021
- Controlling a random population April 04, 2021
- Towards synthetic psychology: from phenomenology to cybernetics April 04, 2021
- Semantics for Variational Quantum Programming March 15, 2021