Software and Systems Engineering
Seminar Series 2005-6

Winter 2005

Thursday 17th November 2005
Tom Dowling
NUIM Computer Security and Cryptography Group
Title: Exposing Textbook Cryptography

As with most things in life a little knowledge can be a bad thing. This talk aims to demonstrate the vulnerability of textbook cryptographic systems. A formal framework is described to identify the weaknesses of these systems and to suggest new stronger so called fit for application systems. This formal framework encompasses the notion of an active attacker and partial recovery of plaintext and/or keys rather than just considering complete revelation of plaintext or keys. This approach models the hostile environment in which these systems must exist in a more realistic manner. The talk aims to show the practical benefits of applying formal arguments to cryptography and serves as a warning to software engineers to be careful when implementing systems from textbooks.

Thursday 24th November 2005
James Power
NUIM Principles of Programming Group
Title: Visualising Dynamic Inter-object Relationships on the Java Heap

This talk presents a strategy for the visualisation of dynamic object relationships in Java programs. The metaphor of a chemical molecule is used to aid comprehension, and to help in reducing the size of the object graph. Our strategy has been implemented by dynamically instrumenting Java bytecode to collect trace data, which is then analyzed and visualised in 3D using VRML. Quantitative and graphical results are presented, based on an analysis of programs in the SPEC JVM98 and JOlden benchmark suites.

Thursday 1st December 2005
Rosemary Monahan
NUIM Principles of Programming Group
Title: Software Refinement with Perfect Developer

Perfect Developer is a software tool that supports the formal development of object-oriented programs by refinement, including formal verification of code. It is built around a single language that supports both specification and implementation. We critically examine how Perfect Developer supports programming by refinement, focusing on three refinement techniques: algorithm refinement, data refinement and delta refinement. In particular we examine the extent to which Perfect Developer provides formal verification for these techniques. We assess it as a tool for software construction and compare it with related tools.

Thursday 8th December 2005
Hendrick Koesling
NUIM Eye-Tracking Group
Title: What's on a Footballer's Mind: Eye Movements and Cognitive Mindsets in Soccer

Efficient visual search strategies are important for anticipation and decision-making in complex, dynamic environments. I will demonstrate how the analysis of oculomotor data may help to understand these processes in sports field games such as soccer. The talk will start with a brief introduction of the fundamental ideas of eye-movement research and the eye-mind hypothesis.

Thursday 15th December 2005
Joseph Timoney
NUIM Signals and Systems Group
Title: The Analysis of Musical Timbre

The timbre model was recently proposed as a more comprehensive description of musical timbre. However, some important sound features are missing. Furthermore, some of the algorithmic analysis techniques proposed by its authors can be shown to be non-robust. Solutions to both of these aspects that would help to improve the model will be discussed.

May 2006

Tuesday 16 May 2006
Bryan Hennelly
Title: Optical signal processing

Tuesday 23 May 2006
Thomas Naughton
Title: Characterising the strength of optical image encryption

Tuesday 30 May 2006
John Ghent
Title: Non-linear dimensionality reduction techniques