Modern trends in discrete mathematics and computer science — различия между версиями

Материал из Кафедра математической кибернетики
Перейти к: навигация, поиск
(Lectures 3,4. Constraint satisfaction problem: an algebraic approach.)
Строка 22: Строка 22:
  
 
== Lecture 2. '''Formal correctness proofs for sequential programs.''' ==
 
== Lecture 2. '''Formal correctness proofs for sequential programs.''' ==
 +
 +
[[Media: LectEng2.pdf|Presentation.]]
  
 
This lecture is devoted to formal verification of sequential imperative programs.
 
This lecture is devoted to formal verification of sequential imperative programs.
Строка 27: Строка 29:
 
Several valuable properties of such formal systems and proofs for simple-but-useful programs are to be discussed.
 
Several valuable properties of such formal systems and proofs for simple-but-useful programs are to be discussed.
  
Lecturer: '''Vladislav Podymov'''.
+
Lecturer: [[Подымов Владислав Васильевич | Vladislav Podymov]]
  
 
== Lectures 3,4. '''Constraint satisfaction problem: an algebraic approach.''' ==
 
== Lectures 3,4. '''Constraint satisfaction problem: an algebraic approach.''' ==
Строка 47: Строка 49:
 
# Варновский Н.П., Захаров В.А., Кузюрин Н.П., Шокуров А.В. Современное состояние исследований в области обфускации программ: определения стойкости обфускации // Труды института системного программирования, 2014б т. 26, вып. 3, с. 167-191.
 
# Варновский Н.П., Захаров В.А., Кузюрин Н.П., Шокуров А.В. Современное состояние исследований в области обфускации программ: определения стойкости обфускации // Труды института системного программирования, 2014б т. 26, вып. 3, с. 167-191.
 
# Cappaert J. Code Obfuscation Techniques for Software Protection. PhD Thesis, 2012, Leuven University.
 
# Cappaert J. Code Obfuscation Techniques for Software Protection. PhD Thesis, 2012, Leuven University.
 +
# Apt K.R., Boer F.S., Olderog E.-R. Verification of sequential and concurrent programs. Third, extended edition. Springer, 2010.
 +
# Kleene S.C. Mathematical logic. 1967.

Версия 14:28, 16 февраля 2018


Compulsory course for master students, 2-nd year, groups 618/1 and 618/2.

Lectures — 16 h.

Responsible lecturer Vladimir Zakharov.

This course is intended to introduce the audience to some topics in discrete mathematics and its applications in software engineering, VLSI designing and biochemistry which are in line with the modern development of computer science and applied mathematics.

Preliminary program and materials

Lecture 1. Theory and practice of software obfuscation.

Presentation.

This lecture is devoted to the software obfuscation problem, its applications in software protection, information hiding and cryptography, to the practical techniques of program obfuscation with the help of structures and techniques from discrete mathematics, automata theory, coding theory. Much attention is payed to formal definitions of obfuscation security. It wil be shown that a secure obfuscation of some programs is impossible in the framework of a "black box" model, but , nevertheless, certain classes of simple programs admit secure obfuscation.

Lecturer: Vladimir Zakharov.

Lecture 2. Formal correctness proofs for sequential programs.

Presentation.

This lecture is devoted to formal verification of sequential imperative programs. The main topic of the lecture is the notion of formal system (logical calculus) applied to correctness proof for imperative programs. Several valuable properties of such formal systems and proofs for simple-but-useful programs are to be discussed.

Lecturer: Vladislav Podymov

Lectures 3,4. Constraint satisfaction problem: an algebraic approach.

The topic of the lecture is the constraint satisfaction problem (CSP). CSP is a universal formalization for a wide variety of problems in Discrete Mathematics and Computer Science. Recently, a characterization of the CSP complexity has been obtained by an algebraic approach. The aim of the lecture is to describe the algebraic approach to CSP and the results established by its applying.

Lecturer Svetlana N. Selezneva

Lecture 5. Closed classes in k-valued and partial k-valued logics.

Lecture 6. Read-once functions.

Lecture 7. Some new bounds of Shannon functions for cardinality of test sets for logical circuits.

Lecture 8. 13С metabolic flux analysis.

Literature

  1. Варновский Н.П., Захаров В.А., Кузюрин Н.П., Шокуров А.В. Современное состояние исследований в области обфускации программ: определения стойкости обфускации // Труды института системного программирования, 2014б т. 26, вып. 3, с. 167-191.
  2. Cappaert J. Code Obfuscation Techniques for Software Protection. PhD Thesis, 2012, Leuven University.
  3. Apt K.R., Boer F.S., Olderog E.-R. Verification of sequential and concurrent programs. Third, extended edition. Springer, 2010.
  4. Kleene S.C. Mathematical logic. 1967.