secretaire-inma@uclouvain.be +32 10 47 80 36

2026's Seminars

Home > Seminars > Archive > 2026
Previous Page 3 of 8

[LINGI2399] 2026-04-02 (10:45) : DevSecOps: designing and building maintainable & defensive IT systems

At BARB94

Speaker : Dennis Verslegers (Orange Cyberdefense)
Abstract : Secure coding is a myth (at present), but luckily, we can limit our code's exposure to the hostile inputs coming from the big bad internet. Security (as with other desirable properties such as privacy-by-design, human-centric / failsafe design, etc) is not an accidental condition one arrives at by luck. The technological and human cultural landscape shifts throughout the lifetime of deployed code, further highlighting the ephemeral nature of "security" appertaining thereunto. Well-engineered and well-run complex IT systems *are* possible, but you do not get there by accident. The question is, how to make them adaptable and defensible?
More Detail

[INMA] 2026-03-31 (14:00) : Envy-free divisions of cakes: recent results and open questions

At Euler building (room A.002)

Speaker : Frédéric MEUNIER (Paris-tech )
Abstract : The envy-free cake-cutting problem asks for a way to divide a cake (identified with the interval [0,1]) among players with different tastes so that each receives a connected piece and no one envies another’s share. The Stromquist–Woodall theorem from 1980 guarantees the existence of such an envy-free division under mild assumptions. Recently, there has been a surge of interest in this problem from various perspectives — computer science, social choice theory, economics, and topological combinatorics. In this talk, we present several extensions, from these perspectives: the cake may be “poisoned,” there may be multiple cakes with joint preferences, or the cake may be discrete (as in the necklace-splitting problem). We will also discuss several challenging open questions. This talk is based on joint work with Ayumi Igarashi, Francis Su, and Shira Zerbib.
More Detail

[LINGI2399] 2026-03-26 (10:45) : IT architecture : Why and How ?

At BARB94

Speaker : Joost De Roore (Inno.com)
Abstract : IT Architecture is one of the key disciplines that support a coherent and consistent approach to delivery of IT capabilities. IT architects builds and maintain a high-level map of the information assets in an organization. It guides the delivery of major IT developments or transformations. The speaker will illustrate the role or IT architecture and its expected benefits through a concrete case study where IT architecture has been at the front line of a major program for IT applications portfolio renewal.
More Detail

[INMA] 2026-03-24 (14:00) : Alternating low-rank optimization for solving PDEs depending on geometric parameters

At Euler building (room A.002)

Speaker : Javier Bevia Ripoll (KU Leuven)
Abstract : We seek an efficient computation of the solutions to a PDE posed on a domain dependent on geometric parameters, as encountered in, for example, multiscale topology optimization. The domain geometry adds an extra complexity to the problem, as the parametrization is implicitly present in the domain shape, but not explicitly in the PDE coefficients. We address this by introducing a smooth change of variables that maps each parameterized domain to a fixed reference domain, yielding a PDE with analytically parameterized coefficients. The analytic dependence guarantees that the matrix containing the discretization of the solutions across parameter values has exponentially decaying singular values, so the family of solutions admits a low‑rank representation. We compute this representation with an alternating least squares (ALS) scheme and present numerical experiments for a PDE depending on one and two geometric parameters to illustrate the effectiveness of the approach.
More Detail

[INGI] 2026-03-24 (11:00) : 2 INGI seminars in one

At Shannon (Maxwell - a.105)

Speaker : Martin Henze (RWTH Aachen University) , and Anna Maria Mandalari (University College London)
Abstract : "Strengthening the IoT Ecosystem: Privacy Preserving IoT Security Management" by Anna Maria Mandalari (University College London) Abstract: As the Internet of Things (IoT) continues to proliferate in our daily lives, concerns about the potential intrusion into our privacy and data security have become more prevalent. This talk aims at fostering an IoT ecosystem that prioritizes user privacy, security, efficiency, and reliability. In an age where smart city initiatives and connected homes are becoming the norm, it is crucial to address the growing challenges associated with IoT devices. This talk will explore strategies and solutions for establishing an IoT environment that places user interests at the forefront. The discussion will encompass cutting-edge approaches to safeguarding data, preserving privacy, and enhancing security in IoT networks, offering a vision of a future where our connected world is safer, more efficient, and truly user-centered. ------------------------ "Generalizable and Comprehensible Intrusion Detection for Industrial Control Systems" by Martin Henze (RWTH Aachen University) Abstract: Securing industrial control systems against cyberattacks is crucial to counter imminent threats to critical infrastructure. Intrusion detection provides an easily retrofittable approach to timely uncover attacks before they can cause substantial damage. However, research on intrusion detection for industrial control systems suffers from the use of complex approaches hindering the interpretability of alarms as well as non-expressive evaluations, often bound to one system with unknown generalizable to other deployments. This talk presents our research platform for deployment-independent intrusion detection as well as approaches towards comprehensible alarms, thus making research advancements in intrusion detection more accessible to industrial control system deployments.
More Detail
Previous Page 3 of 8