PhD Seminar • Systems and Networking — Melmint: Truly Decentralized Stablecoins
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Crispin Cowan, Leviathan Security Group
Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts.
Joan Bartlett, School of Information Studies
McGill University
Chendi Ni, PhD candidate
David R. Cheriton School of Computer Science
Dr. Mohamed Omar
Harvey Mudd College
Toward the end of an undergraduate degree, especially at an institution with many students in technical majors, students tend to form a perception of their mathematical/technical prowess and abilities. However, this perception is usually based on markers that do not come close to adequately reflecting the mathematical process as it is practiced by mathematicians.
Bundit Laekhanukit, Institute for Theoretical Computer Science
Shanghai University of Finance and Economics
Mike Schaekermann, PhD candidate
David R. Cheriton School of Computer Science
Yakov Nekrich, Department of Computer Science
Michigan Technological University
Chris Eliasmith, Director of the Centre for Theoretical Neuroscience
Department of Systems Design Engineering
Marianna Rapoport, PhD candidate
David R. Cheriton School of Computer Science
The goal of my thesis is to enable formal reasoning about the Scala programming language. To that end I present a core calculus that formalizes Scala's