Course on

Formal Methods for Interactive Systems


General Information


Course Abstract | Course Schedule | Examination Procedure | Seminar Schedule

Course Slides (restricted access)

One single file containing parts 1-3 and 5-12: presentation version | printable version

Separate files (presentation versions):
  1. Motivations
  2. Foundations
  3. Task Analysis
  4. Task Modelling (also printable)
  5. Interface Generation from Task Models (also printable)
  6. Cognitive Models
  7. Task Failure and Behavioural Patterns
  8. Cognitive Architectures
  9. Security and Usability
  10. Reverse Engineering with Matrix Algebra

Seminars

will be held in Room 351 DC (Sala Seminari Est)

S-1 Full OCM model for the ATC: Paper 1 | Paper 2 | Paper 3
Friday 13 April, 10:00-12:00 - Andrea Lorenzani (Slides) and Thaizel Fuentes Martinez (Slides)

S-2 Formal analysis of mode confusion: Paper 1 | Paper 2 | Paper 3
still available

S-3 Theorem proving and informal reasoning for usability studies: Paper 1 | Paper 2 | Paper 3
Friday 13 April, 15:00-16:00 - Luis Pérez Sánchez

S-4 The SOAR cognitive architecture: SOAR Home | SOAR Documentation (SOAR Tutorial etc.)
(suitable for more than one person)
still available

S-5 Secure e-voting interfaces: Electronic Voting web page | Paper 1 | Paper 2
still available

S-6 Toward a truly usable calculator: Paper 1 | Paper 2 | Paper 3 | Websites on calculators and computer algebra
Friday 13 April, 12:00-13:00 - Marco Di Benedetto

Reports


R-1 Formal model for the full OCM model for the ATC: Paper 1 | Paper 2 | Paper 3 provided by the lecturer
(using CSP or other formalism, possibly running simulation using a tool)
still available

R-2 Formal analysis of cooperative task models: Paper 1 | Paper 2 | Paper 3
(discussion of the papers' differences and limitations and proposals for possible extensions)
still available

R-3 CSP model of the PUMA cognitive architecture: Paper 1 | Paper 2 | Paper 3
(build a case study and formally analyse it with a tool, e.g., CWB-NC)
assigned to Thomas Anung Basuki

R-4 Different approaches to security in human-computer interaction: Paper 1 | Paper 2 | Paper 3
(compare and discuss the 3 approaches to security)
assigned to Aliaksandr Lazouski

R-5 Intrusion and Multiuser Approach for Security: CWB-NC Wesite (includes user's manual) | Paper | Code: CSP, GCTL*
(modify the code and discuss the different approaches)
still available

R-6 Application to your own security example: CWB-NC Wesite (includes user's manual) | Paper | Code: CSP, GCTL*
(produce a case study)
assigned to Robert Hovahannisyan

Created: Fri Feb 23 12:46:52 CET 2007 Feedback
Updated: Thu May 24 03:01:27 CET 2007