Tags » Keynote

Create Custom Letter Shapes in Keynote

I made this Everyone Can Create image when I got home from the World Wide Apple Distinguished Educator Institute in July. I left truly inspired and I wanted to create an image where I could showcase pictures of my friends and colleagues to highlight creative experiences from the week. 607 more words

Professor Eliot Borenstein Confirmed as Keynote

We are honored to announce that Eliot Borenstein, Professor of Russian and Slavic Studies, Collegiate Professor at New York University, Senior Academic Convenor for the Global Network, and Acting Chair of East Asian Studies, and author of Overkill:  Sex Violence, and Russian Popular Culture after 1991 (Cornell University press, 2008), will be presenting a keynote presentation at the LLC 2018 “Violence and Alterity” conference! 23 more words

Keynote

ASW - TBA

Dr. Tony Lindsay
Director, STELaRLab, Lockheed Martin Australia

Abstract

TBA

Speaker’s Bio

Dr. Tony Lindsay is an Australian expert in C4ISREW technologies and joined Lockheed Martin Australia after a distinguished career within the Defence Science and Technology Group. 254 more words

Keynote

Oracle Parfait: The Flavour of Real-World Vulnerability Detection

Cristina Cifuentes
Oracle Labs, Australia

Abstract

The Parfait static code analysis tool focuses on detecting vulnerabilities that affect C, C++, Java and PL/SQL languages. Its focus has been on four key items expected of a commercial tool that lives in a commercial organisation: 328 more words

Keynote

Human-centric Software Engineering

Professor John Grundy
Monash University, Australia

Abstract

Humans are a key part of software development, including customers, designers, coders, testers and end users. In this talk I discuss several examples from our recent work on handling human-centric issues when engineering software systems. 227 more words

Keynote

Automated Program Repair

Professor Abhik Roychoudhury
National University of Singapore

Abstract

Software systems, are prone to vulnerabilities which can be exploited. One of the key difficulties in building trustworthy software systems – is the lack of specifications, or intended behavior, or a description of how the software system is supposed to behave. 282 more words

Keynote