• Type

Subscribe to our mailing list and get the latest CITRIS news, research updates and event announcements delivered straight to your inbox.

Research Exchange: Formal Methods for Dependable Computing: From Models, through Software, to Circuits

Computing has become ubiquitous and indispensable: it is embedded all around us, in cell phones, automobiles, medical devices, and much more. This ubiquity brings with it a growing challenge to ensure that our computing infrastructure is also dependable and secure. We need to develop and maintain complex software systems on top of increasingly unreliable computing substrates under stringent resource constraints such as energy usage.

i4Energy Seminar: Energy Research and Commercialization at SRI

SRI International has been described as the birthplace of some of Silicon Valley’s most important innovations. With a corporate commitment to solving important problems, this talk will cover why SRI believes ensuring affordable, clean, and dependable energy supplies is one of the world’s important problems, highlight current energy projects, and describe SRI’s process for bringing its innovations to market.

BERC Fall Gala

The BERC Fall Gala is the signature fundraising event for Berkeley’s energy and resources community, bringing together industry and alumni with students and faculty to celebrate BERC’s fifth anniversary and to kick off the 2010-11 academic year.

TRUST Security Seminar: Secure Information Flow in Trust Networks

Who is responsible for the harm and risk of security flaws? The advent of worldwide networks such as the internet made software security (or the lack of software security) became a problem of international proportions. There are no mathematical/statistical risk models available today to assess networked systems with interdependent failures. Without this tool, decision-makers are bound to overinvest in activities that don’t generate the desired return on investment or under invest on mitigations, risking dreadful consequences. Experience suggests that no party is solely responsible for the harm and risk of software security flaws but a model of partial responsibility can only emerge once the duties and motivations of all parties are examine and understood. State of the art practices in software development won’t guarantee products free of flaws.

The Evolving Internet: Driving Forces, Uncertainties, and Four Scenarios to 2025

What will the Internet be like in 2025? How much bigger will it have grown from today’s 2 billion users and $3 trillion market? Will it have achieved its full potential to connect the world’s entire population in ways that advance global prosperity, business productivity, education and social interaction?