Academic Staff

The list of LFCS Academic Staff

Nameresearch interests
jcb.jpg

Julian Bradfield

Director of Institute

Modal and temporal logics, concurrency, independence logics, descriptive complexity and set theory, formal phonology, computational models of phonology, Khoisan languages.

Stuart Anderson

Design and analysis of dependable systems, formal proof in systems development.
marapini.jpg

Myrto Arapinis

Cyber security with a particular focus on provable security, formal models for verification and design of cryptographic protocols, and the problem of secure composition.

David Aspinall

Computer security (particularly proof-carrying code), type systems for specification and programming languages, and proof development environments.

Peter Buneman

Databases: data models, query languages, semistructured data, data provenance, databases and programming languages. Programming languages: functional programming and type systems. Bioinformatics and scientific databases. Mathematical phylogeny.
ycao.jpg

Yang Cao

Database systems: transaction processing; data-driving query optimization; graph computations

James Cheney

Programming languages, logic, scientific databases, provenance, security, verification.

Michele Ciampi

Alexandru Cojocaru

Mary Cryan

Randomized algorithms, especially algorithms for sampling and counting; learning theory; algorithms for computational biology.
mdoosti.jpg

Mina Doosti

Quantum information and computing, quantum cryptography, quantum learning theory
melahi.jpg

Tariq Elahi

I research computer and network security and privacy enhancing technologies (PETs) with an emphasis on effective, efficient, and robust deployments. My research has, and continues to, span the systematization and the game-theoretic analysis of censorship resistance and circumvention systems, security analysis and designs of anonymous communication systems, and privacy-preserving data collection in privacy-sensitive scenarios. I am interested in novel applications and enhancements to PETs techniques and strategies to exotic environments, such as Smart Cities where standard trust and availability assumptions need not apply.
kousha.jpg

Kousha Etessami

In general, theoretical computer science. More specifically: automated verification, logic, algorithms and computational complexity theory, algorithmic game theory, equilibrium computation, analysis of probabilistic systems, Markov decision processes, stochastic games, automata theory, model checking, analysis of infinite-state systems, finite model theory and descriptive complexity.

Wenfei Fan

Database theory and systems: big data, data quality, data integration, distributed query processing, query languages, recommender systems, social networks and Web services.
afilosr.jpg

Aris Filos-Ratsikas

rgarcia3.jpg

Raul Garcia-Patron Sanchez

Stephen Gilmore

Formal methods of program development, formal specifications, software engineering, concurrent systems.

Paolo Guagliardo

My research work lies at the intersection of database theory and practice, with a strong emphasis on making theoretical results applicable in real-life systems. My current focus is on devising and implementing principled and practical solutions for dealing with incomplete information in relational database systems, and on the analysis of concrete query languages for graph databases.
hguo.jpg

Heng Guo

Theoretical Computer Science, especially algorithms that count.
cheunen.jpg

Chris Heunen

Quantum computing, programming languages, category theory.
jeh.png

Jane Hillston

Quantitative analysis and verification of dynamic system supported by formal methods. Formal methods such as stochastic process algebras and stochastic logics; mathematical models based on Markov processes, continuous approximations; applications such as performance modelling, collective adaptive systems, activities of daily life, systems biology.
pbj.jpg

Paul Jackson

Formal verification of hardware, software and cyber-physical systems. Formalised mathematics. Interactive theorem proving. Automation of formal reasoning. Convex optimisation.

Marc Juarez Miro

privacy, security, networks, machine learning, algorithmic bias

Elham Kashefi

Models of quantum computing and their structural relations, exploring new applications, algorithms and cryptographic protocols for quantum information processing device.

Aggelos Kiayias

mkohlwei.png

Markulf Kohlweiss

My research lie at the intersection of, formal verification, foundations of cryptography and applied cryptography, especially with regard to privacy-enhancing protocols, blockchains, and crypto currencies and the formal verification of protocol implementations.
libkin.jpg

Leonid Libkin

Databases and Applications of logic in computer science.
slindley.jpg

Sam Lindley

John Longley

Higher type computability, semantics of programming languages, program verification.

Richard Mayr

Automated verification, automata theory, temporal logic, model-checking and semantic equivalence checking, formal verification of real-time and probabilistic systems, infinite-state Markov chains, Markov decision processes and stochastic games.
mnikolic.jpg

Milos Nikolic

Databases and large-scale data management systems: in-database learning, stream processing, incremental computation, query compilation

Liam O'Connor

Programming languages for Trustworthy Systems

Andreas Pieris

Gordon Plotkin

Applications of logic, especially: the denotational and operational semantics of programming languages; type-theory; domain-theoretic and categorical analyses of computation; general proof theory; the semantics of natural language; process calculi and computational biology.

Elizabeth Polgreen

Program synthesis and verification
arajan.jpg

Ajitha Rajan

dts.jpg

Don Sannella

Algebraic specification and formal software development; correctness of modular systems; types and functional programming; resource certification for mobile code.

Rik Sarkar

Datascience and Machine learning, network analysis, geometry, topology, Biomedical AI, distributed algorithms.
stark.jpg

Ian Stark

Mathematical models and machine-assisted proof for reasoning about programming languages, processor architectures, and biochemical systems.

Mark Steedman

Computational linguistics, artificial intelligence, formal grammar, spoken intonation, statistical parsing, spoken language processing, animated conversational agents, computational musical analysis.

Perdita Stevens

Mathematics of software engineering, especially model-driven development.

He Sun

Spectral graph theory, matrix analysis, applied probability
wadler.jpg

Philip Wadler

Programming languages, functional programming, type systems, dependent types, web programming, gradual typing, Agda, Haskell, Erlang, Go, Java, XML.
pwallden.png

Petros Wallden

Quantum algorithms, quantum cyber security, quantum verification and benchmarking, quantum foundations
dwoods2.jpg

Daniel Woods

I research the economics of cybersecurity and privacy. Typically, this involves applying economic theory to understand the incentive and information structures behind how firms make cybersecurity and privacy decisions. To do this, I use a variety of quantitative and qualitative methodologies.
rvangla.jpg

Rob van Glabbeek

Concurrency theory. Mathematical models and formal languages for the representation of distributed systems and the verification of statements about them; in particular foundational work investigating the possibilities of such models and languages.