Computerised Minds. ...

A video sponsored by the society discusses Searle's Chinese Room Argument (CRA) and the heated debates surrounding it. In this video, which is accessible to the general public and those with interest in AI, Olly's Philosophy Tube ...


Erden in AI roundtab...

On Friday 4th September, philosopher and AISB member Dr Yasemin J Erden, participated in an AI roundtable at Second Home, hosted by Index Ventures and SwiftKey.   Joining her on the panel were colleagues from academia and indu...


AISB Convention 2016

The AISB Convention is an annual conference covering the range of AI and Cognitive Science, organised by the Society for the Study of Artificial Intelligence and Simulation of Behaviour. The 2016 Convention will be held at the Uni...


Bishop and AI news

Stephen Hawking thinks computers may surpass human intelligence and take over the world. This view is based on the ideology that all aspects of human mentality will eventually be realised by a program running on a suitable compu...


Connection Science

All individual members of The Society for the Study of Artificial Intelligence and Simulation of Behaviour have a personal subscription to the Taylor Francis journal Connection Science as part of their membership. How to Acce...


Al-Rifaie on BBC

AISB Committee member and Research Fellow at Goldsmiths, University of London, Dr Mohammad Majid al-Rifaie was interviewed by the BBC (in Farsi) along with his colleague Mohammad Ali Javaheri Javid on the 6 November 2014. He was a...


AISB YouTube Channel

The AISB has launched a YouTube channel: ( The channel currently holds a number of videos from the AISB 2010 Convention. Videos include the AISB round t...



AISB event Bulletin Item

CFP: DEADLINE EXTENDED: VERIFY'08 - 5th International Verification Workshop

                May 29, 2008 (abstract) / June 5, 2008 (paper)


	     5th International Verification Workshop - VERIFY'08

    What are the verification problems? What are the deduction techniques?

			  in connection with IJCAR 2008

		      August 10-11, 2008, Sydney, Australia


The formal verification of critical information systems has a long tradition
as one of the main areas of application for automated theorem proving.
Nevertheless, the area is of still growing importance as the number of
computers affecting everyday life and the complexity of these systems are both
increasing. The purpose of the VERIFY workshop series is to discuss problems
arising during the formal modeling and verification of information systems and
to investigate suitable solutions. Possible perspectives include those of
automated theorem proving, tool support, system engineering, and applications.

The VERIFY workshop series aims at bringing together people who are interested
in the development of safety and security critical systems, in formal methods,
in the development of automated theorem proving techniques, and in the
development of tool support. Practical experiences gained in realistic
verifications are of interest to the automated theorem proving community and
new theorem proving techniques should be transferred into practice. The
overall objective of the VERIFY workshops is to identify open problems and to
discuss possible solutions under the theme

What are the verification problems? What are the deduction techniques?

The scope of VERIFY includes topics such as

+ ATP techniques in verification 	      + Information flow control
+ Case studies (specif. & verific.) 	      + Refinement & Decomposition
+ Combination of verification tools 	      + Reliability of mobile computing
+ Integration of ATPs and CASE-tools 	      + Reuse of specifications & proofs
+ Compositional & modular reasoning 	      + Management of change
+ Experience reports on using verification    + Safety-critical systems
+ Gaps between problems and techniques 	      + Security models
+ Formal methods for fault tolerance 	      + Tool support for formal methods

Submissions are encouraged in one of the following two categories:

 A.  Regular papers: Submissions in this category should describe previously
     unpublished work (completed or in progress), including descriptions of
     research, tools, and applications.  Papers must be formatted following the
     Springer LNCS guidelines and be 6-15 pages long.

 B.  Discussion papers: Submissions in this category are intended to initiate
     discussions and should address controversial issues, and may include
     provocative statements.  Papers must be formatted following the Springer
     LNCS guidelines and be 3-15 pages long.

Submission of papers is via EasyChair at:

The workshop proceedings will be distributed at the workshop as a collection
of the accepted papers; they will also be made available as CEUR Workshop

Program & Workshop Chairs
  B. Beckert (U of Koblenz)
  G. Klein (National ICT Australia)

Program Committee
  S. Autexier (DFKI & U Saarbrcken)
  G. Barthe (INRIA Sophia-Antipolis)
  P. Baumgartner (National ICT Australia)
  B. Dutertre (SRI International)
  R. Hhnle (Chalmers U, Gothenburg)
  A. Ireland (Heriot-Watt U, Edinburgh)
  J. Kiniry (U College Dublin)
  H. Mantel (TU Darmstadt)
  S. Merz (INRIA Lorraine)
  C. Morgan (U of New South Wales)
  P. Mller (Microsoft Research)
  M. Norrish (National ICT Australia)
  W. Paul (U Saarbrcken)
  L. Paulson (U of Cambridge)
  W. Reif (U of Augsburg)
  L. Vigan (U of Verona)
  T. Walsh (National ICT Australia)
  C. Walther (TU Darmstadt)

Steering Committee
  S. Autexier (DFKI & U Saarbrcken)
  H. Mantel (TU Darmstadt)

Important dates:
  Extended Abstract Submission Deadline: May 29, 2008
  Extended Paper Submission Deadline:    June 5, 2008
  Notification of acceptance:	         June 30, 2008
  Final version due:		         July 15, 2008
  Workshop:		                 August 10-11, 2008