Name | Affliation | Title |
|
Abdullah Abdul Khadir | CMI | Knowledge transfer and information leakage in protocols |
S Akshay | IIT Bombay | Boolean functional synthesis: from theory to practice |
Muqsit Azeem | TCS Research | Discovering Relational Specifications |
Animesh Basakchowdhury | TCS Research | Coverage-based Greybox fuzzing as Markov chain |
Aishwarya Cyriac | CMI | Reachability in programs with gap-order constraints |
Radhakrishnan Delhibabu | VIT Vellore | Dynamics of Belief: Abduction, Horn Knowledge Base and Database Updates |
Kissan Desai | Government College, Quepem | Security protocols to prevent malpractices in summative examinations |
Deepak DSouza | IISc Bangalore | Data-race Detection for interrupt-driven kernels |
Narayan Kumar Krishnan | CMI | Verifying asynchronous programs with locks |
Raveendra Kumar M | TCS Research | Coverage-based Greybox fuzzing as Markov chain |
Madhavan Mukund | CMI | Verification of blockchains and smart contracts |
Anantha Padmanabha | IMSc | Satisfiability problem for Term modal logics |
Rekha Pai | IISc Bangalore | Data-race Detection for interrupt-driven kernels |
Ramchandra Phawade | IIT Dharwad | Free choice nets over distributed alphabets |
Sumanth Prabhu | TCS Research | Safety Proofs using Syntax and Behaviors |
R Ramanujam | IMSc | Large games and population protocols |
Abhisekh Sankaran | IMSc | Algorithmic metatheorems: a survey of results and techniques |
Ashwin Srinivasan | BITS Pilani, K K Birla Goa Campus | Logic based system identification |
Vaishnavi Sundararajan | CMI | A theory of assertions for Dolev-Yao models |
S P Suresh | CMI | A bounded witness theorem for assertions |