• Type

Subscribe to our mailing list and get the latest CITRIS news, research updates and event announcements delivered straight to your inbox.

New Media RoundTable: Student Research Panel, Caitlin Marshall and William Brown III

Caitlin Marshall’s larger research focuses on voice prosthesis and synthesis, minority discourse, and the sound of civics. Each year in America ten to twelve thousand individuals undergo cancer treatment necessitating laryngectomy, the surgical removal of the larynx. With their sound sources removed, laryngectomees are rendered mute. To counter what many patients describe as the disability of silence, nearly all opt for prosthesis and speech therapy.

Research Exchange: Formal Methods for Dependable Computing: From Models, through Software, to Circuits

Computing has become ubiquitous and indispensable: it is embedded all around us, in cell phones, automobiles, medical devices, and much more. This ubiquity brings with it a growing challenge to ensure that our computing infrastructure is also dependable and secure. We need to develop and maintain complex software systems on top of increasingly unreliable computing substrates under stringent resource constraints such as energy usage.

i4Energy Seminar: Energy Research and Commercialization at SRI

SRI International has been described as the birthplace of some of Silicon Valley’s most important innovations. With a corporate commitment to solving important problems, this talk will cover why SRI believes ensuring affordable, clean, and dependable energy supplies is one of the world’s important problems, highlight current energy projects, and describe SRI’s process for bringing its innovations to market.

BERC Fall Gala

The BERC Fall Gala is the signature fundraising event for Berkeley’s energy and resources community, bringing together industry and alumni with students and faculty to celebrate BERC’s fifth anniversary and to kick off the 2010-11 academic year.

TRUST Security Seminar: Secure Information Flow in Trust Networks

Who is responsible for the harm and risk of security flaws? The advent of worldwide networks such as the internet made software security (or the lack of software security) became a problem of international proportions. There are no mathematical/statistical risk models available today to assess networked systems with interdependent failures. Without this tool, decision-makers are bound to overinvest in activities that don’t generate the desired return on investment or under invest on mitigations, risking dreadful consequences. Experience suggests that no party is solely responsible for the harm and risk of software security flaws but a model of partial responsibility can only emerge once the duties and motivations of all parties are examine and understood. State of the art practices in software development won’t guarantee products free of flaws.