NavTalks

From Navigators

(Difference between revisions)
Jump to: navigation, search
Line 142: Line 142:
</table>
</table>
</div>
</div>
-
 
-
 
-
<!--
 
-
###########################################################
 
-
############## UPCOMING  PRESENTATIONS#####################
 
-
########################################################### -->
 
-
 
-
<h2><strong>Upcoming  presentations</strong></h2>
 
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<h3><strong>February 2019</strong></h3>
<h3><strong>February 2019</strong></h3>
-
<table border="0" cellspacing="0" >
+
<table border="0" cellspacing="0" style="background:#89B085">
<tr>
<tr>
<td style="width:100px">19/02</td>
<td style="width:100px">19/02</td>
<td style="width:300px">Ana Fidalgo</td>
<td style="width:300px">Ana Fidalgo</td>
-
<td style="width:600px">&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td>
<td style="width:100px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>19/02</td> <td>Jo&atilde;o Sousa</td>
+
<td>19/02</td>
-
<td>&nbsp;</td>
+
<td>Jo&atilde;o Sousa</td>
 +
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
</table>
</table>
</div>
</div>
 +
 +
<!--
 +
###########################################################
 +
############## UPCOMING  PRESENTATIONS#####################
 +
########################################################### -->
 +
 +
<h2><strong>Upcoming  presentations</strong></h2>
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">

Revision as of 11:22, 19 February 2019

The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.

Leave mouse over title's presentation to read the abstract.


Contents

Past presentations

September 2018

20 Alysson Bessani SMaRtChain: A Principled Design for a New Generation of Blockchains  
20 Rui Miguel Named Data Networking with Programmable Switches  

October 2018

4 Bruno Vavala (Research Scientist in Intel Labs) Private Data Objects  
4 Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) Reflective Consensus  
18 Yair Amir (Professor, Johns Hopkins University) Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks  

November 2018

13 Salvatore Signorello The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking  
13 Tiago Oliveira Vawlt - Privacy-Centered Cloud Storage  
27 Nuno Neves Segurança de Software - Como Encontrar uma Agulha num Palheiro?  
27 Ricardo Mendes Vawlt - The Zero-knowledge End-to-end Encryption Protocol  

December 2018

11/12 António Casimiro AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments  
11/12 Carlos Nascimento Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot  

January 2019

15/01 Fernando Alves A comparison between vulnerability publishing in OSINT and Vulnerability Databases  
15/01 Ibéria Medeiros SEAL: SEcurity progrAmming of web appLications  
29/01 Fernando Ramos Networks that drive themselves…of the cliff  
29/01 Miguel Garcia Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)  

February 2019

19/02 Ana Fidalgo Conditional Random Fields and Vulnerability Detection in Web Applications  
19/02 João Sousa Towards BFT-SMaRt v2: Blockchains and Flow Control  


Upcoming presentations

March 2019

12/03 Pedro Gaspar    
12/03 Ricardo Morgado    
26/03 André Oliveira    
26/03 Nuno Dionísio    

April 2019

09/04 Adriano Serckumecka    
09/04 Tulio Ribeiro    
30/04 Miguel Moreira    
30/04 Pedro Ferreira    

May 2019

14/05 Diogo Gonçalves    
14/05 Vinicius Cogo    
28/05 Francisco Araújo    
28/05 Miguel Matos    

June 2019

11/06 Eric Vial    
11/06 Robin Vassantlal    
25/06 João Pinto    
25/06 Tiago Correia    

July 2019

09/07 -    
09/07 -    
23/07 -    
23/07 -    


Personal tools
Navigators toolbox