@phdthesis{lf-these-82, author = {Fribourg, Laurent}, title = {D{\'e}monstration automatique: r{\'e}futation par superposition de clauses {\'e}quationnelles}, year = {1982}, month = sep, type = {Th{\`e}se de doctorat}, school = {Universit{\'e} Paris~7, Paris, France} }
@inproceedings{lf-ijcai-83, address = {Karlsruhe, West Germany}, month = aug, year = 1983, publisher = {William Kaufmann}, editor = {Bundy, Alan}, acronym = {{IJCAI}'83}, booktitle = {{P}roceedings of the 8th {I}nternational {J}oint {C}onference on {A}rtificial {I}ntelligence ({IJCAI}'83)}, author = {Fribourg, Laurent}, title = {A Superposition Oriented Theorem Prover}, pages = {923-925} }
@inproceedings{lf-cade-84, address = {Napa, California, USA}, month = may, year = 1984, volume = 170, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Shostak, Robert E.}, acronym = {{CADE}'84}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {A}utomated {D}eduction ({CADE}'84)}, author = {Fribourg, Laurent}, title = {A Narrowing Procedure for Theories with Constructors}, pages = {259-281} }
@inproceedings{lf-icalp-84, address = {Antwerp, Belgium}, month = jul, year = 1984, volume = 172, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Paredaens, Jan}, acronym = {{ICALP}'84}, booktitle = {{P}roceedings of the 11th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'84)}, author = {Fribourg, Laurent}, title = {Oriented Equational Clauses as a Programming Language}, pages = {162-173} }
@article{lf-jlp-84, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic Programming}, author = {Fribourg, Laurent}, title = {Oriented Equational Clauses as a Programming Language}, volume = 1, number = 2, pages = {165-177}, year = {1984}, month = aug }
@techreport{jorrand85, author = {Jorrand, {\relax Ph}ilippe and Hufflen, Jean-Michel and Marty, Annick and Marty, Jean-{\relax Ch}arles and Schnoebelen, {\relax Ph}ilippe}, title = {{FP2}: {T}he Language and its Formal Definition}, type = {Research Report}, number = {537}, year = {1985}, month = may, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France}, lsvhowpublished = {Esprit Project 415, Deliverable D1} }
@inproceedings{lf-ilps-85, address = {Boston, Massachusetts, USA}, month = jul, year = 1985, publisher = {{IEEE} Computer Society Press}, acronym = {{SLP}'85}, booktitle = {{P}roceedings of the 2nd {IEEE} {S}ymposium on {L}ogic {P}rogramming ({SLP}'85)}, author = {Fribourg, Laurent}, title = {{SLOG}: {A} Logic Programming Language Interpreter Based on Clausal Superposition and Rewriting}, pages = {172-184} }
@inproceedings{lf-tapsoft-85, address = {Berlin, Germany}, month = mar, year = 1985, volume = 186, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Ehrig, Hartmut and Floyd, Christiane and Nivat, Maurice and Thatcher, James W.}, acronym = {{TAPSOFT}'89}, booktitle = {{P}roceedings of the 1st {I}nternational {J}oint {C}onference on {T}heory and {P}ractice of {S}oftware {D}evelopment ({TAPSOFT}'89), {V}olume~2: {C}olloquium on {S}oftware {E}ngineering ({CSE})}, author = {Boug{\'e}, Luc and Choquet, N. and Fribourg, Laurent and Gaudel, Marie-Claude}, missingauthor = {}, title = {Application of {P}rolog to Test Sets Generation from Algebraic Specifications}, pages = {261-275} }
@article{lf-tcs-85, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Fribourg, Laurent}, title = {A Superposition Oriented Theorem Prover}, volume = {35}, number = {2-3}, pages = {129-164}, year = {1985}, month = feb }
@techreport{schnoebelen85, author = {Schnoebelen, {\relax Ph}ilippe}, title = {The Semantics of Concurrency in {FP2}}, type = {Research Report}, number = {558}, year = {1985}, month = oct, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France} }
@mastersthesis{schnoebelen85b, author = {Schnoebelen, {\relax Ph}ilippe}, title = {S{\'e}mantique du parall{\'e}lisme en {FP2}}, year = {1985}, month = jun, type = {Rapport de {DEA}}, school = {Universit{\'e} de Grenoble, France} }
@inproceedings{lf-icalp-86, address = {Rennes, France}, month = jul, year = 1986, volume = 226, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Kott, Laurent}, acronym = {{ICALP}'86}, booktitle = {{P}roceedings of the 13th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'86)}, author = {Fribourg, Laurent}, title = {A Strong Restriction of the Inductive Completion Procedure}, pages = {105-115} }
@article{lf-jss-86, publisher = {Elsevier Science Publishers}, journal = {Journal of Systems and Software}, author = {Boug{\'e}, Luc and Choquet, N. and Fribourg, Laurent and Gaudel, Marie-Claude}, missingauthor = {}, title = {Test Sets Generation From Algebraic Specifications Using Logic Programming}, volume = {6}, number = {4}, pages = {343-360}, year = {1986}, month = nov }
@inproceedings{lf-protocol-85, address = {Toulouse-Moissac, France}, month = jun, year = 1985, publisher = {North-Holland}, editor = {Diaz, Michel}, acronym = {{PSTV}'85}, booktitle = {{P}roceedings of the {IFIP} {WG}6.1 5th {I}nternational {C}onference on {P}rotocol {S}pecification, {T}esting and {V}erification ({PSTV}'85)}, author = {Choquet, N. and Fribourg, Laurent and Mauboussin, A.}, missingauthor = {Mauboussin, Anne ?}, title = {Runnable Protocol Specifications Using the Logic Interpreter {SLOG}}, pages = {149-168} }
@techreport{microfp2, author = {Schnoebelen, {\relax Ph}ilippe}, title = {{\(\mu\)-FP2}: {A} Prototype Interpreter for {FP2}}, type = {Research Report}, number = {573}, year = {1986}, month = jan, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France} }
@techreport{schnoebelen86, author = {Schnoebelen, {\relax Ph}ilippe}, title = {About the Implementation of {FP2}}, type = {Research Report}, number = {574}, year = {1986}, month = jan, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France} }
@inproceedings{lf-alp-88, address = {Gaussig, German Democratic Republic}, month = nov, year = 1988, volume = 343, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Grabowski, Jan and Lescanne, Pierre and Wechler, Wolfgang}, acronym = {{ALP}'88}, booktitle = {{P}roceedings of the 1st {I}nternational {W}orkshop on {A}lgebraic and {L}ogic {P}rogramming ({ALP}'88)}, author = {Fribourg, Laurent}, title = {Functional Extensions to {P}rolog: {A}re They Needed?}, pages = {21-29}, note = {Invited paper} }
@inproceedings{lf-ilps-88, address = {Seattle, Washington, USA}, month = aug, year = 1988, publisher = {MIT Press}, editor = {Kowalski, Robert A. and Bowen, Kenneth A.}, acronym = {{ICLP}/{SLP}'88}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference and {S}ymposium on {L}ogic {P}rogramming ({ICLP}/{SLP}'88)}, author = {Fribourg, Laurent}, title = {Equivalence-Preserving Transformations of Inductive Properties of {P}rolog Programs}, pages = {893-908} }
@techreport{tica-report, author = {Schnoebelen, {\relax Ph}ilippe and Lugiez, Denis and Comon, Hubert}, title = {A Semantics for Polymorphic Subtypes in Computer Algebra}, type = {Research Report}, number = {711}, year = {1988}, month = mar, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France} }
@misc{jorrand89, author = {Jorrand, {\relax Ph}ilippe and Hufflen, Jean-Michel and Ib{\'a}{\~n}ez, Mar{\'\i}a Blanca and Karasek, T. and Rog\'e, S. and Schnoebelen, {\relax Ph}ilippe and V{\'e}ron, A.}, missingauthor = {}, title = {Parallel Specification of the Connection Method on an {FP2} Machine}, year = {1989}, month = oct, howpublished = {Esprit Project 415, Deliverable D17} }
@incollection{lf-academic-89, author = {Laurent Fribourg}, title = {Proofs by Combinatory Induction on Recursively Reducible Expressions}, editor = {Ait-Kaci, Hassan and Nivat, Maurice}, booktitle = {Resolution of Equations in Algebraic Structures}, chapter = {5}, pages = {117-141}, year = {1989}, publisher = {Academic Press}, month = mar }
@article{lf-jsc-89, publisher = {Elsevier Science Publishers}, journal = {Journal of Symbolic Computation}, author = {Fribourg, Laurent}, title = {A Strong Restriction of the Inductive Completion Procedure}, volume = {8}, number = {3}, pages = {253-276}, year = {1989}, month = sep }
@techreport{belmesk90, author = {Belmesk, Zoubir and Schnoebelen, {\relax Ph}ilippe}, title = {Une g{\'e}n{\'e}ralisation des pr{\'e}sentations {FP2} bas{\'e}e sur la th{\'e}orie des r{\'e}seaux}, type = {Research Report}, number = {832-I}, year = {1990}, month = nov, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France} }
@phdthesis{lf-hab-90, author = {Fribourg, Laurent}, title = {Contribution {\`a} la v{\'e}rification des programmes logiques}, year = {1990}, month = oct, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris~7, Paris, France} }
@inproceedings{lf-iclp-90, address = {Jerusalem, Israel}, month = jun, year = 1990, publisher = {MIT Press}, editor = {Warren, David H. D. and Szeredi, P{\'e}ter}, acronym = {{ICLP}'90}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {L}ogic {P}rogramming ({ICLP}'90)}, author = {Fribourg, Laurent}, title = {Extracting Logic Programs from Proofs that use Extended {P}rolog Execution and Induction}, pages = {685-699} }
@inproceedings{lf-plilp-90, address = {Link{\"o}ping, Sweden}, month = aug, year = 1990, volume = 456, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Deransart, Pierre and Maluszynski, Jan}, acronym = {{PLILP}'90}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {P}rogramming {L}anguage {I}mplementation and {L}ogic {P}rogramming ({PLILP}'90)}, author = {Fribourg, Laurent}, title = {A New {P}resburger Arithmetic Decision Procedure Based on Extended {P}rolog Execution}, pages = {174-188} }
@techreport{schnoebelen89c, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Congruence Properties of the Process Equivalence Induced by Temporal Logic}, type = {Research Report}, number = {831-I}, year = {1990}, month = oct, institution = {Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle, Grenoble, France} }
@inproceedings{lf-ilps-91, address = {San Diego, California, USA}, month = oct, year = 1991, publisher = {MIT Press}, editor = {Saraswat, Vijay A. and Ueda, Kazunori}, acronym = {{ICLP}'91}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {L}ogic {P}rogramming ({ICLP}'91)}, author = {Fribourg, Laurent}, title = {Automatic Generation of Simplification Lemmas for Inductive Proofs}, pages = {103-116} }
@inproceedings{lf-plilp-91, address = {Passau, Germany}, month = aug, year = 1991, volume = 528, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Maluszynski, Jan and Wirsing, Martin}, acronym = {{PLILP}'91}, booktitle = {{P}roceedings of the 3rd {I}nternational {S}ymposium on {P}rogramming {L}anguage {I}mplementation and {L}ogic {P}rogramming ({PLILP}'91)}, author = {Cheong, Pui Hung and Fribourg, Laurent}, title = {Efficient Integration of Simplification into {P}rolog}, pages = {359-370} }
@inproceedings{schnoebelen95, address = {Yaroslavl, Russia}, month = nov, year = 1995, publisher = {Yaroslavl University Press}, booktitle = {{P}roceedings of the {C}onference {P}robl{\`e}mes {A}ctuels des {S}ciences {N}aturelles et {H}umaines}, author = {Schnoebelen, {\relax Ph}ilippe and Laroussinie, Fran{\c{c}}ois}, title = {Temporal Logic with Past for the Specification and Verification of Reactive Systems}, pages = {143-146}, note = {Invited talk} }
@inproceedings{laroussinie96fac, address = {Toulouse, France}, month = feb, year = 1996, acronym = {{FAC}'96}, booktitle = {{A}ctes des 5{\`e}mes {J}ourn{\'e}es sur la {F}ormalisation des {A}ctivit{\'e}s {C}oncurrentes ({FAC}'96)}, author = {Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe}, title = {Translations for Model-Checking Temporal Logic with Past}, pages = {17-19}, note = {Invited talk} }
@inproceedings{AF-BW-PW-INF-97, address = {Bologna, Italy}, month = jul, year = 1997, volume = 9, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Moller, Faron}, acronym = {{INFINITY}'97}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'97)}, author = {Finkel, Alain and Willems, Bernard and Wolper, Pierre}, title = {A Direct Symbolic Approach to Model Checking Pushdown Systems (Extended Abstract)}, pages = {27-39}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FWW-infinity97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FWW-infinity97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FWW-infinity97.pdf} }
@misc{AF-CC-RG-GDR-PRC-ISIS-CHM-97, author = {Collet, {\relax Ch}ristophe and Finkel, Alain and Rachid Gherbi}, title = {Prise en compte dynamique des attitudes perceptive de l'usager}, year = {1997}, missingmonth = {}, missingnmonth = {}, howpublished = {Rapport de synth{\`e}se (version~IV de l'Action Inter-{PRC} 10.2 {GDR}-{PRC} {ISIS} \& {CHM} : <<~Interaction Syst{\`e}me-Environnement pour l'Interpr{\'e}tation des Signaux et des Images~>>}, lsv-lang = {FR} }
@inproceedings{AF-CC-RG-IEEE-97, address = {Budapest, Hungary}, month = sep, year = 1997, publisher = {{IEEE} Press}, acronym = {{INES}'97}, booktitle = {{P}roceedings of the {IEEE} {I}nternational {C}onference on {I}ntelligent {E}ngineering {S}ystems ({INES}'97)}, author = {Collet, {\relax Ch}ristophe and Finkel, Alain and Rachid Gherbi}, title = {Gaze Capture System in Man-Machine Interaction}, pages = {557-581}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFG-ines97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CFG-ines97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CFG-ines97.pdf} }
@inproceedings{AF-CC-RG-Inter-97, address = {Montpellier, France}, month = may, year = 1997, booktitle = {{A}ctes des 6{\`e}mes {J}ourn{\'e}es {I}nternationales {I}nterfaces}, author = {Collet, {\relax Ch}ristophe and Finkel, Alain and Rachid Gherbi}, title = {{C}ap{R}e : un syst{\`e}me de capture du regard dans un contexte d'interaction homme-machine}, pages = {36-39}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFG-jiim97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CFG-jiim97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CFG-jiim97.pdf}, lsv-lang = {FR} }
@inproceedings{AF-CD-FSTTCS-97, address = {Kharagpur, India}, month = dec, year = 1997, volume = 1346, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ramesh, S. and Sivakumar, G.}, acronym = {{FSTTCS}'97}, booktitle = {{P}roceedings of the 17th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'97)}, author = {Dufourd, Catherine and Finkel, Alain}, title = {Polynomial-Time Many-One Reductions for {P}etri Nets}, pages = {312-326}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DufFin-fsttcs97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DufFin-fsttcs97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DufFin-fsttcs97.pdf} }
@inproceedings{AF-CT-CAV-97, address = {Haifa, Israel}, month = jun, year = 1997, volume = 1254, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Grumberg, Orna}, acronym = {{CAV}'97}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'97)}, author = {C{\'e}c{\'e}, G{\'e}rard and Finkel, Alain}, title = {Programs with Quasi-Stable Channels are Effectively Recognizable}, pages = {304-315}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CecFin-cav97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CecFin-cav97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CecFin-cav97.pdf} }
@inproceedings{AF-GRE-97, address = {Grenoble, France}, month = mar, year = 1997, booktitle = {{P}roceedings of the {G}renoble-{A}lpes d'{H}uez {E}uropean {S}chool of {C}omputer {S}cience, {M}ethods and {T}ools for the {V}erification of {I}nfinite {S}tate {S}ystems}, author = {Finkel, Alain}, title = {Algorithms and Semi-Algorithms for Infinite State Systems}, pages = {189-190}, note = {Invited tutorial} }
@article{AF-PMc-TCS-97, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Finkel, Alain and McKenzie, Pierre}, title = {Verifying Identical Communicating Processes is Undecidable}, volume = {174}, number = {1-2}, pages = {217-230}, year = {1997}, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FMK-TCS97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FMK-TCS97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FMK-TCS97.pdf} }
@inproceedings{AF-ZB-INF-97, address = {Bologna, Italy}, month = jul, year = 1997, volume = 9, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Moller, Faron}, acronym = {{INFINITY}'97}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'97)}, author = {Bouziane, Zakaria and Finkel, Alain}, title = {Cyclic {P}etri Net Reachability Sets are Semi-Linear Effectively Constructible}, pages = {15-24}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BF-infinity97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BF-infinity97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BF-infinity97.pdf} }
@inproceedings{BB-CP-MFCS97, address = {Bratislava, Slovakia}, month = aug, year = 1997, volume = 1295, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pr{\'i}vara, Igor and Ruzicka, Peter}, acronym = {{MFCS}'97}, booktitle = {{P}roceedings of the 22nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'97)}, author = {B{\'e}rard, B{\'e}atrice and Picaronny, Claudine}, title = {Accepting {Z}eno Words without Making Time Stand Still}, pages = {149-158}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BerPic-long.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerPic-long.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerPic-long.pdf} }
@article{BCB-RC-AP-97, address = {Les Ulis, France}, publisher = {EDP Sciences}, journal = {RAIRO Informatique Th{\'e}orique et Applications}, author = {Charron{-}Bost, Bernadette and Cori, Robert and Petit, Antoine}, title = {Introduction {\`a} l'algorithmique en m{\'e}moire partag{\'e}e}, volume = {31}, number = {2}, pages = {97-148}, year = {1997}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCP-RAIRO97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CCP-RAIRO97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCP-RAIRO97.pdf}, lsv-lang = {FR} }
@inproceedings{CD-Renpar-97, address = {Lausanne, Switzerland}, month = may, year = 1997, acronym = {{RENPAR}'97}, booktitle = {{A}ctes des 9{\`e}mes {R}encontres {F}rancophones du {P}arall{\'e}lisme ({RENPAR}'97)}, author = {Dufourd, Catherine}, title = {Une extension d'un r{\'e}sultat d'ind{\'e}cidabilit{\'e} pour les automates temporis{\'e}s}, pages = {219-222}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Duf-renpar97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Duf-renpar97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Duf-renpar97.pdf}, lsv-lang = {FR} }
@inproceedings{FB-LP-MOSIM-97, address = {Rouen, France}, month = jun, year = 1997, publisher = {Herm{\`e}s}, acronym = {{MOSIM}'97}, booktitle = {{A}ctes de la 1{\`e}re {C}onf{\'e}rence {F}rancophone de {M}od{\'e}lisation et de {S}imulation ({MOSIM}'97)}, author = {Belala, F. and Petrucci, Laure}, missingauthor = {}, title = {{S}\'emantique des {ECATN}ets en termes de {CPN}ets : application {\`a} un exemple de production}, missingpages = {}, lsv-lang = {FR} }
@inproceedings{GC-Renpar-97, address = {Lausanne, Switzerland}, month = may, year = 1997, acronym = {{RENPAR}'97}, booktitle = {{A}ctes des 9{\`e}mes {R}encontres {F}rancophones du {P}arall{\'e}lisme ({RENPAR}'97)}, author = {C{\'e}c{\'e}, G{\'e}rard}, title = {Les programmes utilisant des canaux quasi-stables sont effectivement reconnaissables}, pages = {215-218}, lsv-lang = {FR} }
@book{JCB-HC-CK-DK-MM-JMM-AP-YR-livre96, author = {Bajard, Jean-Claude and Comon, Hubert and Kenyon, Claire and Krob, Daniel and Morvan, Michel and Muller, Jean-Michel and Petit, Antoine and Robert, Yves}, title = {Exercices d'algorithmique (oraux d'{ENS})}, year = {1997}, publisher = {Vuibert}, month = jan, pages = {272}, isbn = {2-84180-105-5}, lsv-lang = {FR} }
@techreport{LSV:97:10, author = {Williams{-}Preston, Nicky}, title = {An Experiment in Reverse Engineering Using Algebraic Specifications}, type = {Research Report}, number = {LSV-97-10}, year = {1997}, month = nov, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-1997-10.rr.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-1997-10.rr.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1997-10.rr.ps} }
@inproceedings{MM-MB-GB-LP-MOSIM-97, address = {Rouen, France}, month = jun, year = 1997, publisher = {Herm{\`e}s}, acronym = {{MOSIM}'97}, booktitle = {{A}ctes de la 1{\`e}re {C}onf{\'e}rence {F}rancophone de {M}od{\'e}lisation et de {S}imulation ({MOSIM}'97)}, author = {Maouche, Mourad and Bettaz, Mohamed and Berthelot, G{\'e}rard and Petrucci, Laure}, title = {Du vrai parall{\'e}lisme dans les r{\'e}seaux alg{\'e}briques et de son application dans les syst{\`e}mes de production}, pages = {417-424}, lsv-lang = {FR} }
@inproceedings{RM-AP-mfcs97, address = {Bratislava, Slovakia}, month = aug, year = 1997, volume = 1295, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pr{\'i}vara, Igor and Ruzicka, Peter}, acronym = {{MFCS}'97}, booktitle = {{P}roceedings of the 22nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'97)}, author = {Meyer, Rapha{\"e}l and Petit, Antoine}, title = {Decomposition of {TrPTL} Formulas}, pages = {418-427}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MeyPet-mfcs97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MeyPet-mfcs97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MeyPet-mfcs97.pdf} }
@inproceedings{VD-PG-AP-stacs97, address = {L{\"u}beck, Germany}, month = feb, year = 1997, volume = 1200, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Reischuk, R{\"u}diger and Morvan, Michel}, acronym = {{STACS}'97}, booktitle = {{P}roceedings of the 14th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'97)}, author = {Diekert, Volker and Gastin, Paul and Petit, Antoine}, title = {Removing {{\(\epsilon\)}}-Transitions in Timed Automata}, pages = {583-594}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGP-stacs97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DGP-stacs97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DGP-stacs97.pdf}, abstract = {Timed automata are among the most widely studied models for real-time systems. Silent transitions, \emph{i.e.}, \(\epsilon\)-transitions, have already been proposed in the original paper on timed automata by Alur and Dill. B{\'e}rard, Gastin and Petit have shown that \(\epsilon\)-transitions can be removed, if they do not reset clocks; moreover \(\epsilon\)-transitions strictly increase the power of timed automata, if there is a self-loop containing \(\epsilon\)-transitions which reset some clocks. This paper left open the problem about the power of the \(\epsilon\)-transitions which reset clocks, if they do not lie on any cycle.\par The present paper settles this open question. Precisely, we prove that a timed automaton such that no \(\epsilon\)-transition with nonempty reset set lies on any directed cycle can be effectively transformed into a timed automaton without \(\epsilon\)-transitions. Interestingly, this main result holds under the assumption of non-Zenoness and it is false otherwise.\par Besides, we develop a promising new technique based on a notion of precise time which allows to show that some timed languages are not recognizable by any \(\epsilon\)-free timed automaton.} }
@inproceedings{comon97lics, address = {Warsaw, Poland}, month = jul, year = 1997, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'97}, booktitle = {{P}roceedings of the 12th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'97)}, author = {Comon, Hubert and Jacquemard, Florent}, title = {Ground Reducibility is {EXPTIME}-Complete}, pages = {26-34}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ComJac-lics97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJac-lics97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ComJac-lics97.pdf} }
@misc{comon97licsb, author = {Comon, Hubert}, title = {Applications of Tree Automata in Rewriting and Lambda-Calculus}, year = 1997, month = jul, howpublished = {Invited lecture, 12th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'97), Warsaw, Poland} }
@proceedings{comon97rta, title = {{P}roceedings of the 8th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'97)}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'97)}, editor = {Comon, Hubert}, publisher = {Springer}, volume = {1232}, series = {Lecture Notes in Computer Science}, pages = {348}, year = {1997}, month = jun, isbn = {3-540-62950-5}, url = {http://www.springer.com/978-3-540-62950-5}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-62950-5} }
@article{comon97tcs, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Comon, Hubert and Treinen, Ralf}, title = {The First-Order Theory of Lexicographic Path Orderings is Undecidable}, volume = {176}, number = {1-2}, pages = {67-87}, year = {1997}, month = apr, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ComTre-TCS97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComTre-TCS97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ComTre-TCS97.pdf} }
@misc{edf-comon-97, author = {Comon, Hubert}, title = {Une approche logique des contr{\^o}les logiques}, year = {1997}, month = jun, howpublished = {Rapport de contrat EDF/DER/MOS--LSV}, lsv-lang = {FR} }
@techreport{forma-sric-BerBid-97, author = {B{\'e}rard, B{\'e}atrice and Bidoit, Michel}, title = {Contribution du {LSV} {\`a} l'op{\'e}ration~2 <<~{\'E}tude de cas {SRIC}~>>}, year = {1997}, month = oct, type = {Contract Report}, institution = {Action FORMA}, note = {29 pages} }
@article{hen-wir-bid-tcs-wadt, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Hennicker, Rolf and Wirsing, Martin and Bidoit, Michel}, title = {Proof Systems for Structured Specifications with Observability Operators}, volume = {173}, number = {2}, pages = {393-443}, year = {1997}, month = feb }
@inproceedings{kouchnarenko97, address = {Yaroslavl, Russia}, month = sep, year = 1997, volume = 1277, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Malyshkin, Victor E.}, acronym = {{PaCT}'97}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {P}arallel {C}omputing {T}echnologies ({PaCT}'97)}, author = {Kouchnarenko, Olga and Schnoebelen, {\relax Ph}ilippe}, title = {A Formal Framework for the Analysis of Recursive-Parallel Programs}, pages = {45-59}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KusSch-pact97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KusSch-pact97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KusSch-pact97.pdf}, doi = {10.1007/3-540-63371-5_6} }
@inproceedings{kouchnarenko97b, address = {Pisa, Italy}, year = 1997, volume = 5, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Steffen, B. and Caucal, Didier}, acronym = {{INFINITY}'96}, booktitle = {{P}roceedings of the 1st {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'96)}, author = {Kouchnarenko, Olga and Schnoebelen, {\relax Ph}ilippe}, title = {A Model for Recursive-Parallel Programs}, pages = {30}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KouSch-infin96.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KouSch-infin96.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KouSch-infin96.pdf}, doi = {10.1016/S1571-0661(05)82512-5} }
@inproceedings{kristoffersen97, address = {Lille, France}, month = apr, year = 1997, volume = 1214, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bidoit, Michel and Dauchet, Max}, acronym = {{TAPSOFT}'97}, booktitle = {{P}roceedings of the 7th {I}nternational {J}oint {C}onference {CAAP}/{FASE} on {T}heory and {P}ractice of {S}oftware {D}evelopment ({TAPSOFT}'97)}, author = {Kristoffersen, K{\aa}re J. and Laroussinie, Fran{\c{c}}ois and Larsen, Kim G. and Pettersson, Paul and Yi, Wang}, title = {A Compositional Proof of a Real-Time Mutual Exclusion Protocol}, pages = {565-579}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KLLPY-tapsoft97.pdf}, ps = {KLLPY-tapsoft97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KLLPY-tapsoft97.pdf}, doi = {10.1007/BFb0030626} }
@inproceedings{laroussinie97, address = {Santa Margherita Ligure, Italy}, month = sep, year = 1997, volume = 7, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Palamidessi, Catuscia and Parrow, Joachim}, acronym = {{EXPRESS}'97}, booktitle = {{P}roceedings of the 4th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'97)}, author = {Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe}, title = {Specification in {CTL}+{P}ast, Verification in {CTL}}, pages = {161-184}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LarSch-express97.pdf}, ps = {LarSch-express97.ps}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LarSch-express97.pdf}, doi = {10.1016/S1571-0661(05)80472-4} }
@inproceedings{lf-ho-concur-97, address = {Warsaw, Poland}, month = jul, year = 1997, volume = 1243, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mazurkiewicz, Antoni W. and Winkowski, J{\'o}zef}, acronym = {{CONCUR}'97}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'97)}, author = {Fribourg, Laurent and Ols{\'e}n, Hans}, title = {Proving Safety Properties of Infinite State Systems by Compilation into {P}resburger Arithmetic}, pages = {213-227}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LF-concur97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LF-concur97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LF-concur97.pdf} }
@article{lf-ho-constraint-97, publisher = {Kluwer Academic Publishers}, journal = {Constraints}, author = {Fribourg, Laurent and Ols{\'e}n, Hans}, title = {A Decompositional Approach for Computing Least Fixed-Points of {D}atalog Programs with {Z}-Counters}, volume = {2}, number = {3-4}, pages = {305-335}, year = {1997}, missingmonth = {>oct}, missingnmonth = {>10}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LF-constraints97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LF-constraints97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LF-constraints97.pdf} }
@inproceedings{lf-ho-infinity-97, address = {Bologna, Italy}, month = jul, year = 1997, volume = 9, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Moller, Faron}, acronym = {{INFINITY}'97}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'97)}, author = {Fribourg, Laurent and Ols{\'e}n, Hans}, title = {Reachability Sets of Parametrized Rings As Regular Languages}, pages = {40}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LF-infinity97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LF-infinity97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LF-infinity97.pdf} }
@proceedings{mb-max-tapsoft97, title = {{P}roceedings of the 7th {I}nternational {J}oint {C}onference {CAAP}/{FASE} on {T}heory and {P}ractice of {S}oftware {D}evelopment ({TAPSOFT}'97)}, booktitle = {{P}roceedings of the 7th {I}nternational {J}oint {C}onference {CAAP}/{FASE} on {T}heory and {P}ractice of {S}oftware {D}evelopment ({TAPSOFT}'97)}, editor = {Bidoit, Michel and Max Dauchet}, publisher = {Springer}, volume = {1214}, series = {Lecture Notes in Computer Science}, pages = {889}, year = {1997}, month = apr, organization = {Lille, France}, isbn = {3-540-62781-2}, url = {http://www.springer.com/978-3-540-62781-2}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-62781-2} }
@incollection{plandedefense, author = {Bidoit, Michel and Pellen, {\relax Ch}ristine and Ryckbosch, J{\'e}r{\^o}me}, title = {Plan de D{\'e}fense~--- {F}ormalisation du cahier des charges du {P}oint {C}entral {\`a} l'aide de sp{\'e}cifications alg{\'e}briques}, booktitle = {Application des techniques formelles au logiciel}, chapter = {7}, type = {chapter}, pages = {123-132}, series = {ARAGO 20}, publisher = {Observatoire Fran\c{c}ais des Techniques Avanc\'ees}, year = {1997}, month = jun, lsv-lang = {FR} }
@mastersthesis{sutre97, author = {Sutre, Gr{\'e}goire}, title = {V{\'e}rification de propri{\'e}t{\'e}s sur les automates {\`a} file r{\'e}actifs produits par compilation de programmes {E}lectre}, year = {1997}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Sut-dea97.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sut-dea97.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sut-dea97.pdf}, lsv-lang = {FR} }
@misc{AF-MOVEP-98, author = {Finkel, Alain}, title = {Analyse des syst{\`e}mes infinis bien structur{\'e}s ou <<~reconnaissables~>>}, howpublished = {Invited tutorial, 3{\`e}me {\'E}cole d'{\'e}t{\'e} {M}od{\'e}lisation et {V}{\'e}rification des {P}rocessus {P}arall{\`e}les ({MOVEP}'98), Nantes, France}, year = 1998, month = jul, lsv-lang = {FR} }
@inproceedings{AF-ZB-98-RevPN, address = {Kunming, China}, year = 1998, publisher = {Springer}, editor = {Shum, Kar Ping and Guo, Yuqi and Ito, Massami and Fong, Yuen}, booktitle = {{P}roceedings of the {I}nternational {C}onference in {S}emigroups and its {R}elated {T}opics}, author = {Bouziane, Zakaria and Finkel, Alain}, title = {The Equivalence Problem for Commutative Semigroups and Reversible {P}etri Nets is Complete in Exponential Space under Log-Lin Reducibility}, pages = {63-76} }
@techreport{AP-mc98, author = {Petit, Antoine}, title = {Le model-checking, une technique de v{\'e}rification en plein essor. {I}ntroduction}, year = {1998}, month = oct, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@techreport{BB-MB-AP-src98, author = {B{\'e}rard, B{\'e}atrice and Bidoit, Michel and Petit, Antoine}, title = {Recommandations sur le cahier des charges {SRC}}, year = {1998}, missingmonth = {}, missingnmonth = {}, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@article{BB-VD-PG-AP-98, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {B{\'e}rard, B{\'e}atrice and Diekert, Volker and Gastin, Paul and Petit, Antoine}, title = {Characterization of the Expressive Power of Silent Transitions in Timed Automata}, volume = {36}, number = {2}, pages = {145-182}, year = {1998}, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDGP-FUNDI98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDGP-FUNDI98.ps}, abstract = {Timed automata are among the most widely studied models for real-time systems. Silent transitions (or \(\epsilon\)-transitions) have already been proposed in the original paper on timed automata by Alur and~Dill. We show that the class of timed languages recognized by automata with \(\epsilon\)-transitions, is more robust and more expressive than the corresponding class without \(\epsilon\)-transitions. \par We then focus on \(\epsilon\)-transitions which do not reset clocks. We propose an algorithm to construct, given a timed automaton, an equivalent one without such transitions. This algorithm is in two steps, it first suppresses the cycles of \(\epsilon\)-transitions without reset and then the remaining ones.\par Then, we prove that a timed automaton such that no \(\epsilon\)-transition which resets clocks lies on any directed cycle, can be effectively transformed into a timed automaton without \(\epsilon\)-transitions. Interestingly, this main result holds under the assumption of non-Zenoness and it is false otherwise.\par To complete the picture, we exhibit a simple timed automaton with an \(\epsilon\)-transition, which resets some clock, on a cycle and which is not equivalent to any \(\epsilon\)-free timed automaton. To show this, we develop a promising new technique based on the notion of precise action.} }
@article{CC-AF-RG-aci98, address = {Tokyo, Japan}, publisher = {Fuji Technology Press}, journal = {Journal of Advanced Computational Intelligence}, author = {Collet, {\relax Ch}ristophe and Finkel, Alain and Gherbi, Rachid}, title = {{C}ap{R}e: {A}~Gaze Tracking System in Man-Machine Interaction}, volume = {2}, number = {3}, pages = {77-81}, year = {1998}, missingnmonth = {}, missingmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CFG-JACI98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CFG-JACI98.ps} }
@inproceedings{CC-AP-mteac98, address = {Las Vegas, Nevada, USA}, month = jan, year = 1998, editor = {B{\"o}hm, A. P. Wim and Najjar, Walid A.}, acronym = {{MTEAC}'98}, booktitle = {{P}roceedings of the {W}orkshop on {M}ultithreaded {E}xecution, {A}rchitecture and {C}ompilation ({MTEAC}'98)}, author = {C{\'e}rin, {\relax Ch}ristophe and Petit, Antoine}, title = {Application of Algebraic Techniques to Compute the Efficiency Measure for Multithreaded Architecture}, missingpages = {??}, howpublished = {Proceedings published as Technical Report CS-98-102, Colorado State University}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CP-mteac98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CP-mteac98.ps} }
@techreport{DD1-98, author = {Laroussinie, Fran{\c{c}}ois and Petit, Antoine and Schnoebelen, {\relax Ph}ilippe}, title = {Le model-checking, une technique de v{\'e}rification en plein essor. {I}~--- {P}rincipes et techniques}, year = {1998}, month = oct, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@techreport{DD2-98, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Le model-checking, une technique de v{\'e}rification en plein essor. {III}~--- {S}p{\'e}cifier pour v{\'e}rifier}, year = {1998}, month = oct, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@techreport{DD3-98, author = {B{\'e}rard, B{\'e}atrice and C{\'e}c{\'e}, G{\'e}rard and Dufourd, Catherine and Finkel, Alain and Laroussinie, Fran{\c{c}}ois and Petit, Antoine and Schnoebelen, {\relax Ph}ilippe and Sutre, Gr{\'e}goire}, title = {Le model-checking, une technique de v{\'e}rification en plein essor. {II}~--- {Q}uelques outils}, year = {1998}, month = oct, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@article{GG-RM-AP-PW-98, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Guaiana, Giovana and Meyer, Rapha{\"e}l and Petit, Antoine and Weil, Pascal}, title = {An Extension of the Wreath Product Principle for Finite {M}azurkiewicz Traces}, volume = {67}, number = {6}, pages = {277-282}, year = {1998}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GMPW-IPL98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GMPW-IPL98.ps} }
@inproceedings{KB-LP-WFM-98, address = {Lisbon, Portugal}, month = jun, year = 1998, volume = {98/7}, series = {Computing Science Report}, optaddress = {Eindhoven, The Netherlands}, publisher = {Eindhoven University of Technology, Eindhoven, The Netherlands}, editor = {van der Aalst, Wil M. P. and De Michelis, Giorgio and Ellis, Clarence A.}, acronym = {{WFM}'98}, booktitle = {{P}roceedings of {W}orkflow {M}anagement: {N}et-{B}ased {C}oncepts, {M}odels, {T}echniques and {T}ools ({WFM}'98)}, author = {Barkaoui,Kamel and Petrucci, Laure}, title = {Structural Analysis of Workflow Nets with Shared Resources}, pages = {82-95}, howpublished = {Proceedings published as Computing Science Report 98/7, Eindhoven University of Technology, NL}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BarPet-wfm98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BarPet-wfm98.ps} }
@inproceedings{LA-PB-AB-KL-fsttcs98, address = {Chennai, India}, month = dec, year = 1998, volume = 1530, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, Vikraman and Ramanujam, R.}, acronym = {{FSTTCS}'98}, booktitle = {{P}roceedings of the 18th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'98)}, author = {Aceto, Luca and Bouyer, Patricia and Burgue{\~n}o, Augusto and Larsen, Kim G.}, title = {The Power of Reachability Testing for Timed Automata}, pages = {245-256}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ABBL-fsttcs98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ABBL-fsttcs98.ps}, abstract = {In this paper we provide a complete characterization of the class of properties of (networks of) timed automata for which model checking can be reduced to reachability checking in the context of testing automata.} }
@book{LA-PG-BP-AP-NP-PW-livre98, author = {Albert, Luc and Gastin, Paul and Petazzoni, Bruno and Petit, Antoine and Puech, Nicolas and Weil, Pascal}, title = {Cours et exercices d'informatique, Classes pr{\'e}paratoires, premier et second cycles universitaires}, year = {1998}, month = jun, publisher = {Vuibert}, isbn = {2-7117-8621-8}, lsv-lang = {FR} }
@techreport{LSV:98:2, author = {Fribourg, Laurent}, title = {A Closed-Form Evaluation for Extended Timed Automata}, type = {Research Report}, number = {LSV-98-2}, year = {1998}, month = mar, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1998-2.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1998-2.rr.ps} }
@mastersthesis{Labroue-dea, author = {Labroue, Anne}, title = {Conditions de vivacit{\'e} dans les automates temporis{\'e}s}, year = {1998}, month = jul, type = {Rapport de {DEA}}, school = {{DEA} Informatique, Orsay, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1998-7.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1998-7.rr.ps}, lsv-lang = {FR} }
@mastersthesis{PB-dea98, author = {Bouyer, Patricia}, title = {Automates temporis{\'e}s et modularit{\'e}}, year = {1998}, month = jun, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-dea98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-dea98.ps}, lsv-lang = {FR} }
@inproceedings{PG-RM-AP-mfcs98, address = {Brno, Czech Republic}, month = aug, year = 1998, volume = 1450, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Brim, Lubos and Gruska, Jozef and Zlatuska, Jir{\'i}}, acronym = {{MFCS}'98}, booktitle = {{P}roceedings of the 23rd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'98)}, author = {Gastin, Paul and Meyer, Rapha{\"e}l and Petit, Antoine}, title = {A (non-elementary) modular decision procedure for {LTrL}}, pages = {356-365}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GMP-mfcs98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GMP-mfcs98.ps}, abstract = {Thiagarajan and Walukiewicz have defined a temporal logic~LTrL on Mazurkiewicz traces, patterned on the famous propositional temporal logic of linear time~LTL defined by Pnueli. They have shown that this logic is equal in expressive power to the first order theory of finite and infinite traces.\par The hopes to get an {"}easy{"} decision procedure for~LTrL, as it is the case for~LTL, vanished very recently due to a result of Walukiewicz who showed that the decision procedure for~LTrL is non-elementary. However, tools like Mona or Mosel show that it is possible to handle non-elementary logics on significant examples. Therefore, it appears worthwhile to have a direct decision procedure for LTrL.\par In this paper we propose such a decision procedure, in a modular way. Since the logic~LTrL is not pure future, our algorithm constructs by induction a finite family of B{\"u}chi automata for each LTrL-formula. As expected by the results of Walukiewicz, the main difficulty comes from the {"}Until{"} operator.} }
@inproceedings{RM-AP-stacs98, address = {Paris, France}, month = feb, year = 1998, volume = 1373, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Morvan, Michel and Meinel, {\relax Ch}ristoph and Krob, Daniel}, acronym = {{STACS}'98}, booktitle = {{P}roceedings of the 15th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'98)}, author = {Meyer, Rapha{\"e}l and Petit, Antoine}, title = {Expressive Completeness of {LTrL} on Finite Traces: {A}n Algebraic Proof}, pages = {533-543} }
@inproceedings{SC-LP-SMC-98, address = {San Diego, California, USA}, month = oct, year = 1998, publisher = {Argos Press}, acronym = {{SMC} 2000}, booktitle = {{P}roceedings of the {IEEE} {I}nternational {C}onference on {S}ystems, {M}an and {C}ybernetics ({SMC} 2000)}, author = {Christensen, S{\o}ren and Petrucci, Laure}, title = {How to Determine and Use Place Flows in Coloured {P}etri Nets}, pages = {66-71} }
@phdthesis{THESE-CECE-98, author = {C{\'e}c{\'e}, G{\'e}rard}, title = {V{\'e}rification, analyse et approximations symboliques des automates communicants}, year = {1998}, month = jan, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cece-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cece-these.ps}, lsv-lang = {FR} }
@phdthesis{THESE-DUFOURD-98, author = {Dufourd, Catherine}, title = {R{\'e}seaux de {P}etri avec Reset{\slash}Transfert : d{\'e}cidabilit{\'e} et ind{\'e}cidabilit{\'e}}, year = {1998}, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Dufourd-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Dufourd-these.ps}, lsv-lang = {FR} }
@techreport{alcatel-ComPad-98a, author = {Comon, Hubert and Padovani, Vincent}, title = {Specifications Consistency Verification. {I}ntermediate Report}, year = {1998}, month = sep, type = {Contract Report}, number = {MAR/UAO/C/98/0051} }
@techreport{alcatel-ComPad-98b, author = {Comon, Hubert and Padovani, Vincent}, title = {Specifications Consistency Verification. {F}inal Report}, year = {1998}, month = dec, type = {Contract Report}, number = {MAR/UAO/C/98/0080}, note = {280 pages} }
@article{bid-hen-acta-amast, publisher = {Springer}, journal = {Acta Informatica}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {Modular Correctness Proofs of Behavioural Implementations}, volume = {35}, number = {11}, pages = {951-1005}, year = {1998}, month = nov, doi = {10.1007/s002360050149} }
@inproceedings{comon97csl, address = {{\AA}rhus, Denmark}, year = 1998, volume = 1414, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Thomas, Wolfgang}, acronym = {{CSL}'97}, booktitle = {{S}elected {P}apers from the 11th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'97)}, author = {Comon, Hubert and Jurski, Yan}, title = {Higher-order matching and tree automata}, pages = {157-176}, note = {Invited lecture}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJur-csl97.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJur-csl97.ps} }
@article{comon97jsc1, publisher = {Elsevier Science Publishers}, journal = {Journal of Symbolic Computation}, author = {Comon, Hubert}, title = {Completion of Rewrite Systems with Membership Constraints. {P}art~{I}: {D}eduction Rules}, volume = {25}, number = {4}, pages = {397-420}, year = {1998}, month = apr, optnote = {This is a first part of a paper whose abstract appeared in Proc.\ {ICALP '92}, Vienna.}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-cirs1.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-cirs1.ps} }
@article{comon97jsc2, publisher = {Elsevier Science Publishers}, journal = {Journal of Symbolic Computation}, author = {Comon, Hubert}, title = {Completion of Rewrite Systems with Membership Constraints. {P}art~{II}: {C}onstraint Solving}, volume = {25}, number = {4}, pages = {421-454}, year = {1998}, month = apr, optnote = {This is the second part of a paper whose abstract appeared in Proc.\ {ICALP '92}, Vienna.}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-cirs2.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-cirs2.ps} }
@inproceedings{comon98cav, address = {Vancouver, British Columbia, Canada}, month = jun, year = 1998, volume = 1427, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hu, Alan J. and Vardi, Moshe Y.}, acronym = {{CAV}'98}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'98)}, author = {Comon, Hubert and Jurski, Yan}, title = {Multiple Counters Automata, Safety Analysis and {P}resburger Arithmetic}, pages = {268-279}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJur-cav98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJur-cav98.ps} }
@inproceedings{comon98lics, address = {Indianapolis, Indiana, USA}, month = jun, year = 1998, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'98}, booktitle = {{P}roceedings of the 13th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'98)}, author = {Comon, Hubert and Narendran, Paliath and Nieuwenhuis, Robert and Rusinowitch, Micha{\"e}l}, title = {Decision Problems in Ordered Rewriting}, pages = {276-286}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CNNR-lics98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CNNR-lics98.ps} }
@inproceedings{comon98rta, address = {Tsukuba, Japan}, month = mar, year = 1998, volume = 1379, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nipkow, Tobias}, acronym = {{RTA}'98}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'98)}, author = {Comon, Hubert}, title = {About proofs by consistency}, pages = {136-137}, note = {Invited lecture} }
@inproceedings{demri98, address = {Paris, France}, month = feb, year = 1998, volume = 1373, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Morvan, Michel and Meinel, {\relax Ch}ristoph and Krob, Daniel}, acronym = {{STACS}'98}, booktitle = {{P}roceedings of the 15th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'98)}, author = {Demri, St{\'e}phane and Schnoebelen, {\relax Ph}ilippe}, title = {The Complexity of Propositional Linear Temporal Logics in Simple Cases (Extended Abstract)}, pages = {61-72}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DemSch-stacs98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DemSch-stacs98.ps}, doi = {10.1007/BFb0028549} }
@inproceedings{dufourd98, address = {Aalborg, Denmark}, month = jul, year = 1998, volume = 1443, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Skyum, Sven and Winskel, Glynn}, acronym = {{ICALP}'98}, booktitle = {{P}roceedings of the 25th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'98)}, author = {Dufourd, Catherine and Finkel, Alain and Schnoebelen, {\relax Ph}ilippe}, title = {Reset Nets between Decidability and Undecidability}, pages = {103-115}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFS-icalp98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFS-icalp98.ps}, doi = {10.1007/BFb0055044}, abstract = {We study Petri nets with Reset arcs (also Transfer and Doubling arcs) in combination with other extensions of the basic Petri net model. While Reachability is undecidable in all these extensions (indeed they are Turing-powerful), we exhibit unexpected frontiers for the decidability of Termination, Coverability, Boundedness and place-Boundedness. In particular, we show counter-intuitive separations between seemingly related problems. Our main theorem is the very surprising fact that boundedness is undecidable for Petri nets with Reset arcs.} }
@inproceedings{finkel98, address = {Campinas, Brasil}, month = apr, year = 1998, volume = 1380, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lucchesi, Claudio L. and Moura, Arnaldo V.}, acronym = {{LATIN}'98}, booktitle = {{P}roceedings of the 3rd {L}atin {A}merican {S}ymposium on {T}heoretical {I}nformatics ({LATIN}'98)}, author = {Finkel, Alain and Schnoebelen, {\relax Ph}ilippe}, title = {Fundamental Structures in Well-Structured Infinite Transition Systems}, pages = {102-118}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSch-latin98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSch-latin98.ps}, doi = {10.1007/BFb0054314} }
@techreport{forma98, author = {Sifakis, Joseph}, editor = {Sifakis, Joseph}, title = {Action {FORMA}. {B}ilan de la premi{\`e}re ann{\'e}e}, year = {1998}, month = jan, type = {Contract Report}, institution = {DSP-STTC/CNRS/MENRT}, lsv-lang = {FR} }
@inproceedings{laroussinie98b, address = {Paris, France}, month = nov, year = 1998, volume = 135, series = {{IFIP} Conference Proceedings}, publisher = {Kluwer Academic Publishers}, editor = {Budkowski, Stanislaw and Cavalli, Ana R. and Najm, Elie}, acronym = {{FORTE'XI}/{PSTV'XVIII}}, booktitle = {{P}roceedings of {IFIP} {TC6} {WG6.1} {J}oint {I}nternational {C}onference on {F}ormal {D}escription {T}echniques for {D}istributed {S}ystems and {C}ommunication {P}rotocols ({FORTE'XI}) and {P}rotocol {S}pecification, {T}esting and {V}erification ({PSTV'XVIII})}, author = {Laroussinie, Fran{\c{c}}ois and Larsen, Kim G.}, title = {{CMC}: {A}~Tool for Compositional Model-Checking of Real-Time Systems}, pages = {439-456}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LarLar-forte98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LarLar-forte98.ps} }
@inproceedings{lf-mvp-latin-98, address = {Campinas, Brasil}, month = apr, year = 1998, volume = 1380, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lucchesi, Claudio L. and Moura, Arnaldo V.}, acronym = {{LATIN}'98}, booktitle = {{P}roceedings of the 3rd {L}atin {A}merican {S}ymposium on {T}heoretical {I}nformatics ({LATIN}'98)}, author = {Veloso{ }Peixoto, Marcos and Fribourg, Laurent}, title = {Unfolding Parametric Automata}, pages = {88-101} }
@inproceedings{lugiez98, address = {Nice, France}, month = sep, year = 1998, volume = 1466, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sangiorgi, Davide and de Simone, Robert}, acronym = {{CONCUR}'98}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'98)}, author = {Lugiez, Denis and Schnoebelen, {\relax Ph}ilippe}, title = {The Regular Viewpoint on {PA}-Processes}, pages = {50-66}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LugSch-concur98.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LugSch-concur98.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LugSch-concur98.ps}, doi = {10.1007/BFb0055615} }
@misc{phs-infinity98, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Regular Tree Languages for Process Algebra}, year = 1998, month = jul, howpublished = {Invited lecture, 3rd {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'98), Aalborg, Denmark} }
@techreport{rap-icc-1, author = {Laroussinie, Fran{\c{c}}ois}, title = {Analyse de l'{ICC}: mod{\'e}lisation}, year = {1998}, month = mar, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@techreport{rap-icc-2, author = {Duflot, Marie and Markey, Nicolas}, title = {{\'E}valuation de l'outil {UPPAAL} sur le probl{\`e}me de l'{ICC}}, year = {1998}, month = sep, type = {Contract Report}, institution = {EDF/DER/MOS - LSV}, lsv-lang = {FR} }
@techreport{sscop-98, author = {C{\'e}c{\'e}, G{\'e}rard and Deutsch, Pierre-{\'E}tienne and Finkel, Alain}, title = {{FORMA}{\slash}{SSCOP}~--- {LSV}, bilan de l'ann{\'e}e~1998}, year = {1998}, month = nov, type = {Contract Report}, institution = {FORMA}, lsv-lang = {FR} }
@article{AF-CD-TCS-Note, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Dufourd, Catherine and Finkel, Alain}, title = {A Polynomial {{\(\lambda\)}}-Bisimilar Normalization for Reset {P}etri Nets}, volume = {222}, number = {1-2}, pages = {187-194}, year = {1999}, month = jul, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DufFin-TCS99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DufFin-TCS99.ps} }
@misc{LP-cor-spin-99, author = {Petrucci, Laure}, title = {{\scshape Promela} et {\scshape Spin} : exercices corrig{\'e}s}, year = {1999}, missinghowpublished = {}, wrongurl = {http://www.lsv.ens-cachan.fr/~petrucci/cor_spin.ps.gz}, wrongpsgz = {http://www.lsv.ens-cachan.fr/~petrucci/cor_spin.ps.gz}, wrongps = {http://www.lsv.ens-cachan.fr/~petrucci/cor_spin.ps}, lsv-lang = {FR} }
@misc{LP-cours-spin-99, author = {Petrucci, Laure}, title = {Un exemple de langage parall{\`e}le asynchrone : {\scshape Promela}}, year = {1999}, howpublished = {Polycopi{\'e} de cours, IEE, {\'E}vry, France}, wrongurl = {http://www.lsv.ens-cachan.fr/~petrucci/poly_spin.ps.gz}, wrongpsgz = {http://www.lsv.ens-cachan.fr/~petrucci/poly_spin.ps.gz}, wrongps = {http://www.lsv.ens-cachan.fr/~petrucci/poly_spin.ps}, lsv-lang = {FR} }
@misc{LP-exos-spin-99, author = {Petrucci, Laure}, title = {{\scshape Promela} et {\scshape Spin} : exercices}, year = {1999}, howpublished = {Polycopi{\'e}, IEE, {\'E}vry, France}, wrongurl = {http://www.lsv.ens-cachan.fr/~petrucci/exos_spin.ps.gz}, wrongpsgz = {http://www.lsv.ens-cachan.fr/~petrucci/exos_spin.ps.gz}, wrongps = {http://www.lsv.ens-cachan.fr/~petrucci/exos_spin.ps}, lsv-lang = {FR} }
@techreport{LSV:99:2, author = {Finkel, Alain and McKenzie, Pierre and Picaronny, Claudine}, title = {A~Well-Structured Framework for Analysing {P}etri Net Extensions}, type = {Research Report}, number = {LSV-99-2}, year = {1999}, month = feb, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1999-2.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1999-2.rr.ps} }
@techreport{LSV:99:5, author = {Padovani, Vincent and Comon, Hubert and Leneutre, J. and Tingaud, R.}, missingauthor = {}, title = {A Formal Verification of Telephone Supplementary Service Interactions}, type = {Research Report}, number = {LSV-99-5}, year = {1999}, month = may, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1999-5.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1999-5.rr.ps} }
@inproceedings{NWP-PASTE99, address = {Toulouse, France}, month = sep, year = 1999, publisher = {ACM Press}, acronym = {{PASTE}'99}, booktitle = {{P}roceedings of the {ACM} {SIGPLAN}/{SIGSOFT} {W}orkshop on {P}rogram {A}nalysis for {S}oftware {T}ools and {E}ngineering ({PASTE}'99)}, author = {Williams{-}Preston, Nicky}, title = {New Type Signatures for Legacy {F}ortran Subroutines}, pages = {76-85}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Pre-paste99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Pre-paste99.ps} }
@inproceedings{PB-AP-icalp99, address = {Prague, Czech Republic}, month = jul, year = 1999, volume = 1644, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Wiedermann, Jir{\'i} and van Emde Boas, Peter and Nielsen, Mogens}, acronym = {{ICALP}'99}, booktitle = {{P}roceedings of the 26th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'99)}, author = {Bouyer, Patricia and Petit, Antoine}, title = {Decomposition and Composition of Timed Automata}, pages = {210-219}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-icalp99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-icalp99.ps}, abstract = {We propose in this paper a decomposition theorem for the timed automata introduced by Alur and Dill. To this purpose, we define a new simple and natural concatenation operation, indexed by the set of clocks to be reset, on timed automata generalizing the classical untimed concatenation. \par Then we extend the famous Kleene's and B{\"u}chi's theorems on classical untimed automata by simply changing the basic objects to take time into account, keeping the union operation and replacing the concatenation, finite and infinite iterations by the new timed concatenations and their induced iterations.\par Thus, and up to our knowledge, our result provides the simplest known algebraic characterization of recognizable timed languages.} }
@inproceedings{RM-PST-99, address = {Williamsburg, Virginia, USA}, month = jun, year = 1999, publisher = {Kluwer Academic Publishers}, editor = {Yakovlev, Alex and Lavagno, Luciano}, acronym = {{HWPN}'99}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {H}ardware {D}esign and {P}etri {N}ets ({HWPN}'99)}, author = {Meyer, Rapha{\"e}l and Thiagarajan, P. S.}, title = {{LTrL} Based Model-Checking for a Restricted Class of Signal Transition Graphs}, pages = {3-14} }
@techreport{alcatel-ComPad-99a, author = {Comon, Hubert and Padovani, Vincent}, title = {Report on Specification Validation in Telecommunication Services}, year = {1999}, month = jun, type = {Contract Report}, missinginstitution = {} }
@inproceedings{beauquier99, address = {Bratislava, Slovak republic}, month = sep, year = 1999, volume = 1693, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jayanti, Prasad}, acronym = {{DISC}'99}, booktitle = {{P}roceedings of the 13th {I}nternational {S}ymposium on {D}istributed {C}omputing ({DISC}'99)}, author = {Beauquier, Joffroy and B{\'e}rard, B{\'e}atrice and Fribourg, Laurent}, title = {A New Rewrite Method for Proving Convergence of Self-Stabilizing Systems}, pages = {240-253}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBF-disc99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBF-disc99.ps} }
@inproceedings{berard99, address = {Trento, Italy}, month = jul, year = 1999, volume = 1633, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Halbwachs, Nicolas and Peled, Doron}, acronym = {{CAV}'99}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'99)}, author = {B{\'e}rard, B{\'e}atrice and Fribourg, Laurent}, title = {Automated Verification of a Parametric Real-Time Program: {T}he {ABR} Conformance Protocol}, pages = {96-107}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerFri-cav99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerFri-cav99.ps} }
@inproceedings{berard99b, address = {Eindhoven, The Netherlands}, month = aug, year = 1999, volume = 1664, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baeten, Jos C. M. and Mauw, Sjouke}, acronym = {{CONCUR}'99}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'99)}, author = {B{\'e}rard, B{\'e}atrice and Fribourg, Laurent}, title = {Reachability Analysis of (Timed) {P}etri Nets Using Real Arithmetic}, pages = {178-193}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerFri-concur99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerFri-concur99.ps} }
@mastersthesis{blanc-dea, author = {Blanc, Benjamin}, title = {Mod{\'e}lisation et sp{\'e}cification d'architectures logicielles}, year = {1999}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bla-dea99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bla-dea99.ps}, lsv-lang = {FR} }
@article{comon97cacm, publisher = {Kluwer Academic Publishers}, journal = {Constraints}, author = {Comon, Hubert and Dincbas, Mehmet and Jouannaud, Jean-Pierre and Kirchner, Claude}, title = {A Methodological View of Constraint Solving}, volume = {4}, number = {4}, pages = {337-361}, year = {1999}, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-constraints.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-constraints.ps} }
@inproceedings{comon99, address = {Eindhoven, The Netherlands}, month = aug, year = 1999, volume = 1664, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baeten, Jos C. M. and Mauw, Sjouke}, acronym = {{CONCUR}'99}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'99)}, author = {Comon, Hubert and Jurski, Yan}, title = {Timed Automata and the Theory of Real Numbers}, pages = {242-257}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJur-concur99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComJur-concur99.ps} }
@mastersthesis{cortier-dea, author = {Cortier, V{\'e}ronique}, title = {V{\'e}rification de syst{\`e}mes {\`a} compteurs}, year = {1999}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} de Logique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cor-dea99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cor-dea99.ps}, lsv-lang = {FR} }
@inproceedings{cortier-icalp99, address = {Prague, Czech Republic}, month = jul, year = 1999, volume = 1644, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Wiedermann, Jir{\'i} and van Emde Boas, Peter and Nielsen, Mogens}, acronym = {{ICALP}'99}, booktitle = {{P}roceedings of the 26th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'99)}, author = {Cortier, V{\'e}ronique and Ganzinger, Harald and Jacquemard, Florent and Veanes, Margus}, title = {Decidable Fragments of Simultaneous Rigid Reachability}, pages = {250-260}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CGJV-icalp99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CGJV-icalp99.ps} }
@book{docdor99, author = {Schnoebelen, {\relax Ph}ilippe and B{\'e}rard, B{\'e}atrice and Bidoit, Michel and Laroussinie, Fran{\c{c}}ois and Petit, Antoine}, title = {V{\'e}rification de logiciels : techniques et outils du model-checking}, year = {1999}, month = apr, publisher = {Vuibert}, isbn = {2-7117-8646-3}, url = {http://www.vuibert.com/livre593.html}, lsv-lang = {FR} }
@inproceedings{dufourd99, address = {Prague, Czech Republic}, month = jul, year = 1999, volume = 1644, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Wiedermann, Jir{\'i} and van Emde Boas, Peter and Nielsen, Mogens}, acronym = {{ICALP}'99}, booktitle = {{P}roceedings of the 26th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'99)}, author = {Dufourd, Catherine and Jan{\v c}ar, Petr and Schnoebelen, {\relax Ph}ilippe}, title = {Boundedness of Reset {P/T} Nets}, pages = {301-310}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJS-icalp99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJS-icalp99.ps}, abstract = {P/T nets with reset and transfer arcs can be seen as counter-machines with some restricted set of operations. Surprisingly, several problems related to boundedness are harder for Reset nets than for the more expressive Transfer nets. Our main result is that boundedness is undecidable for nets with three reset arcs, while it is decidable for nets with two resetable places.} }
@inproceedings{esparza99, address = {Trento, Italy}, month = jul, year = 1999, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'99}, booktitle = {{P}roceedings of the 14th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'99)}, author = {Esparza, Javier and Finkel, Alain and Mayr, Richard}, title = {On the verification of broadcast protocols}, pages = {352-359}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/EFM-lics99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/EFM-lics99.ps} }
@techreport{hcrt-disi99, author = {Hu{\ss}mann, Heinrich and Cerioli, Maura and Reggio, Gianna and Tort, Fran{\c{c}}oise}, title = {Abstract Data Types and {UML} Models}, type = {Technical Report}, number = {DISI-TR-99-15}, year = {1999}, missingmonth = {}, missingnmonth = {}, institution = {DISI, Universit{\'a} di Genova, Italy} }
@phdthesis{jurski99, author = {Jurski, Yan}, title = {Expression de la relation binaire d'accessibilit{\'e} pour les automates {\`a} compteurs plats et les automates temporis{\'e}s}, year = {1999}, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Jurski-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Jurski-these.ps}, lsv-lang = {FR} }
@inproceedings{laroussinie99, address = {Szklarska Poreba, Poland}, month = sep, year = 1999, volume = 1672, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kutylowski, Miroslaw and Pacholski, Leszek and Wierzbicki, Tomasz}, acronym = {{MFCS}'99}, booktitle = {{P}roceedings of the 24th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'99)}, author = {Aceto, Luca and Laroussinie, Fran{\c{c}}ois}, title = {Is your Model Checker on Time?}, pages = {125-136}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/AceLar-mfcs99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/AceLar-mfcs99.ps} }
@mastersthesis{leroux-dea, author = {Leroux, J{\'e}r{\^o}me}, title = {V{\'e}rification des syst{\`e}mes param{\'e}tr{\'e}s}, year = {1999}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, lsv-lang = {FR} }
@inproceedings{mb-don-at-amast98, address = {Amazonia, Brasil}, month = jan, year = 1999, volume = 1548, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Haeberer, Armando Martin}, acronym = {{AMAST}'98}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {A}lgebraic {M}ethodology and {S}oftware {T}echnology ({AMAST}'98)}, author = {Bidoit, Michel and Sannella, Donald and Tarlecki, Andrzej}, title = {Architectural Specifications in {CASL}}, pages = {341-357}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ECS-LFCS-99-407.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ECS-LFCS-99-407.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ECS-LFCS-99-407.ps} }
@inproceedings{mb-rh-amast98, address = {Amazonia, Brasil}, month = jan, year = 1999, volume = 1548, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Haeberer, Armando Martin}, acronym = {{AMAST}'98}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {A}lgebraic {M}ethodology and {S}oftware {T}echnology ({AMAST}'98)}, author = {Hennicker, Rolf and Bidoit, Michel}, title = {Observational Logic}, pages = {263-277}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MB-RH-amast99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MB-RH-amast99.ps} }
@inproceedings{mb-rolf-fm99, address = {Toulouse, France}, month = sep, year = 1999, optaddress = {Bucharest, Romania}, publisher = {Theta, Bucharest, Romania}, editor = {Futatsugi, Kokichi and Goguen, Joseph and Meseguer, Jos{\'e}}, acronym = {{FM}'99}, booktitle = {{P}roceedings of the {OBJ}/{C}afe{OBJ}/{M}aude {W}orkshop at {F}ormal {M}ethods ({FM}'99)}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {Observer Complete Definitions are Behaviourally Coherent}, pages = {83-94}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CafeOBJ.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CafeOBJ.ps} }
@phdthesis{meyer-these99, author = {Meyer, Rapha{\"e}l}, title = {Contributions {\`a} l'{\'e}tude des logiques temporelles sur les traces}, year = {1999}, month = nov, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Meyer-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Meyer-these.ps}, lsv-lang = {FR} }
@incollection{proofsystems, author = {Bidoit, Michel and Cengarle, Mar{\'\i}a Victoria and Hennicker, Rolf}, title = {Proof systems for structured specifications and their refinements}, editor = {Astesiano, Egidio and Kreowski, Hans-J{\"o}rg and Krieg-Br{\"u}ckner, Bernd}, booktitle = {Algebraic Foundations of Systems Specification}, type = {chapter}, chapter = {11}, pages = {385-433}, year = {1999}, missingmonth = {}, missingnmonth = {}, publisher = {Springer}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ch11AFSSbook.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ch11AFSSbook.ps} }
@article{schnoebelen99, publisher = {European Association for Theoretical Computer Science}, journal = {EATCS Bulletin}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Decomposable Regular Languages and the Shuffle Operator}, volume = {67}, pages = {283-289}, year = {1999}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-BEATCS99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-BEATCS99.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-BEATCS99.pdf} }
@inproceedings{sutre99, address = {Amazonia, Brasil}, month = jan, year = 1999, volume = 1548, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Haeberer, Armando Martin}, acronym = {{AMAST}'98}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {A}lgebraic {M}ethodology and {S}oftware {T}echnology ({AMAST}'98)}, author = {Sutre, Gr{\'e}goire and Finkel, Alain and Roux, Olivier F. and Cassez, Franck}, title = {Effective Recognizability and Model Checking of Reactive Fiffo Automata}, pages = {106-123}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1998-10.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1998-10.rr.ps} }
@inproceedings{sutre99b, address = {Cachan, France}, month = mar, year = 1999, publisher = {Herm{\`e}s}, editor = {Lesage, Jean-Jacques}, acronym = {{MSR}'99}, booktitle = {{A}ctes du 2{\`e}me {C}ongr{\`e}s sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'99)}, author = {Sutre, Gr{\'e}goire}, title = {V{\'e}rification des automates {\`a} file r{\'e}actifs : un mod{\`e}le pour les syst{\'e}mes r{\'e}actifs {\'e}crits en {E}lectre}, pages = {71-78}, lsv-lang = {FR} }
@inproceedings{tbhw-uml99, address = {Fort Collins, Colorado, USA}, month = oct, year = 1999, volume = 1723, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {France, Robert B. and Rumpe, Bernhard}, acronym = {{UML}'99}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}onference on the {U}nified {M}odeling {L}anguage ({UML}'99)}, author = {Bidoit, Michel and Hennicker, Rolf and Tort, Fran{\c{c}}oise and Wirsing, Martin}, title = {Correct Realization of Interface Constraints with {OCL}}, pages = {399-415}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/TBHW-uml99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/TBHW-uml99.ps} }
@mastersthesis{turuani-dea, author = {Turuani, Mathieu}, title = {Logique temporelle temporis{\'e}e pour la v{\'e}rification de programmes : expressivit{\'e} et complexit{\'e}}, year = {1999}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1999-8.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1999-8.rr.ps}, lsv-lang = {FR} }
@inproceedings{AF-GS-STACS-2000, address = {Lille, France}, month = feb, year = 2000, volume = 1770, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Reichel, Horst and Tison, Sophie}, acronym = {{STACS} 2000}, booktitle = {{P}roceedings of the 17th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS} 2000)}, author = {Finkel, Alain and Sutre, Gr{\'e}goire}, title = {Decidability of Reachability Problems for Classes of Two-Counter Automata}, pages = {346-357}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSut-stacs2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSut-stacs2000.ps}, doi = {10.1007/3-540-46541-3_29} }
@inproceedings{BDFP-mfcs-2000, address = {Bratislava, Slovakia}, month = aug, year = 2000, volume = 1893, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Rovan, Branislav}, acronym = {{MFCS} 2000}, booktitle = {{P}roceedings of the 25th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS} 2000)}, author = {Bouyer, Patricia and Dufourd, Catherine and Fleury, Emmanuel and Petit, Antoine}, title = {Expressiveness of Updatable Timed Automata}, pages = {232-242}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDFP-mfcs2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDFP-mfcs2000.ps}, abstract = {Since their introduction by Alur and Dill, timed automata have been one of the most widely studied models for real-time systems. The syntactic extension of so-called updatable timed automata allows more powerful updates of clocks than the reset operation proposed in the original model.\par We prove that any language accepted by an updatable timed automaton (from classes where emptiness is decidable) is also accepted by a {"}classical{"} timed automaton. We propose even more precise results on bisimilarity between updatable and classical timed automata.} }
@article{BEFMRWW-ipl2000, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Bouajjani, Ahmed and Esparza, Javier and Finkel, Alain and Maler, Oded and Rossmanith, Peter and Willems, Bernard and Wolper, Pierre}, title = {An Efficient Automata Approach to some Problems on Context-Free Grammars}, volume = {74}, number = {5-6}, pages = {221-227}, year = {2000}, month = jun, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BEFMRWW-IPL2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BEFMRWW-IPL2000.ps} }
@article{BerDuf-IPL2000, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {B{\'e}rard, B{\'e}atrice and Dufourd, Catherine}, title = {Timed Automata and Additive Clock Constraints}, volume = {75}, number = {1-2}, pages = {1-7}, year = {2000}, month = jul, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerDuf-IPL2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerDuf-IPL2000.ps} }
@article{BerPic-ACTA2000, publisher = {Springer}, journal = {Acta Informatica}, author = {B{\'e}rard, B{\'e}atrice and Picaronny, Claudine}, title = {Accepting {Z}eno Words: {A} Way Toward Timed Refinements}, volume = {37}, number = {1}, pages = {45-81}, year = {2000}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerPic-ACTA2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerPic-ACTA2000.ps} }
@misc{Calife-1.1, author = {B{\'e}rard, B{\'e}atrice and Cast{\'e}ran, Pierre and Fleury, Emmanuel and Fribourg, Laurent and Monin, Jean-Fran{\c{c}}ois and Paulin, {\relax Ch}ristine and Petit, Antoine and Rouillard, Davy}, title = {Document de sp{\'e}cification du mod{\`e}le commun}, year = {2000}, month = apr, howpublished = {Fourniture~1.1 du projet RNRT Calife}, lsv-lang = {FR} }
@misc{Calife-4.1, author = {Fribourg, Laurent}, title = {Document de synth{\`e}se sur les techniques d'abstraction}, year = {2000}, month = jan, howpublished = {Fourniture~4.1 du projet RNRT Calife}, lsv-lang = {FR} }
@misc{Calife-4.2, author = {Bouyer, Patricia and Fleury, Emmanuel and Petit, Antoine}, title = {Document de synth{\`e}se sur les proc{\'e}dures de v{\'e}rification des syst{\`e}mes temps r{\'e}el : Les automates temporis{\'e}s}, year = {2000}, month = jan, howpublished = {Fourniture~4.2 du projet RNRT Calife}, lsv-lang = {FR} }
@inproceedings{CasLar-cav2000, address = {Chicago, Illinois, USA}, month = jul, year = 2000, volume = 1855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Emerson, E. Allen and Sistla, A. Prasad}, acronym = {{CAV} 2000}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV} 2000)}, author = {Cassez, Franck and Laroussinie, Fran{\c{c}}ois}, title = {Model-Checking for Hybrid Systems by Quotienting and Constraints Solving}, pages = {373-388}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CasLar-cav2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CasLar-cav2000.ps} }
@article{FB-MB-LP-IGPL-00, publisher = {Oxford University Press}, journal = {Logic Journal of the IGPL}, author = {Belala, F. and Bettaz, Mohamed and Petrucci{-}Dauchy, Laure}, title = {Concurrent systems analysis using {ECATNets}}, volume = {8}, number = {2}, pages = {149-164}, year = {2000}, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/belala00concurrent.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/belala00concurrent.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/belala00concurrent.ps}, doi = {10.1093/jigpal/8.2.149} }
@inproceedings{FPS-concur-2000, address = {Pennsylvania State University, Pennsylvania, USA}, month = aug, year = 2000, volume = 1877, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Palamidessi, Catuscia}, acronym = {{CONCUR} 2000}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR} 2000)}, author = {Finkel, Alain and Purushothaman{ }Iyer, S. and Sutre, Gr{\'e}goire}, title = {Well-Abstracted Transition Systems}, pages = {566-580}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2000-6.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2000-6.rr.ps} }
@inproceedings{FS-mfcs-2000, address = {Bratislava, Slovakia}, month = aug, year = 2000, volume = 1893, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Rovan, Branislav}, acronym = {{MFCS} 2000}, booktitle = {{P}roceedings of the 25th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS} 2000)}, author = {Finkel, Alain and Sutre, Gr{\'e}goire}, title = {An Algorithm Constructing the Semilinear {P}ost* for 2-Dim {R}eset{{\slash}}{T}ransfer {VASS}}, pages = {353-362}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSut-mfcs2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSut-mfcs2000.ps} }
@inproceedings{GB-LP-HLPN-00, address = {\AA rhus, Denmark}, month = jun, year = 2000, howpublished = {Research Report DAIMI PB-547}, optaddress = {\AA rhus, Denmark}, optpublisher = {DAIMI}, editor = {Jensen, Kurt}, booktitle = {{P}roceedings of the {W}orkshop on {P}ractical {U}se of {H}igh-{L}evel {P}etri {N}ets}, author = {Berthelot, G{\'e}rard and Petrucci, Laure}, title = {Specification and Validation of a Concurrent System: {A}n Educational Project}, pages = {55-72}, url = {http://www.daimi.au.dk/designCPN/exam/Other/Trains/index.html}, secondurl = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/BerPet-hlpn2000.ps} }
@misc{GL:ASPROM, author = {Goubault{-}Larrecq, Jean}, title = {Analyse de protocoles cryptographiques}, year = {2000}, month = oct, howpublished = {Invited lecture, Journ{\'e}es {ASPROM}, Paris, France}, lsv-lang = {FR} }
@inproceedings{JGL:crypto:orPTA, address = {Cancun, Mexico}, month = may, year = 2000, volume = 1800, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rolim, Jos{\'e} D. P.}, booktitle = {{P}roceedings of the Workshops of the 15th {I}nternational {P}arallel and {D}istributed {P}rocessing {S}ymposium}, author = {Goubault{-}Larrecq, Jean}, title = {A Method for Automatic Cryptographic Protocol Verification (Extended Abstract)}, pages = {977-984}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-fmppta2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-fmppta2000.ps} }
@inproceedings{LF-LOPSTR-99, address = {Venezia, Italy}, year = 2000, volume = 1817, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bossi, Annalisa}, acronym = {{LOPSTR}'99}, booktitle = {{P}roceedings of the 9th {I}nternational {W}orkshop on {L}ogic {P}rogram {S}ynthesis and {T}ransformation ({LOPSTR}'99)}, author = {Laurent Fribourg}, title = {Constraint Logic Programming Applied to Model Checking}, pages = {31-42}, note = {Invited tutorial}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Fri-lopstr99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Fri-lopstr99.ps} }
@inproceedings{LF-WFPL-99, address = {Benicassim, Spain}, month = sep, year = 2000, optaddress = {Valencia, Spain}, publisher = {Universidad Polit{\'e}cnica de Valencia, Spain}, editor = {Alpuente, Mar{\'i}a}, acronym = {{WFLP} 2000}, booktitle = {{P}roceedings of the 9th {I}nternational {W}orkshop on {F}unctional and {L}ogic {P}rogramming ({WFLP} 2000)}, author = {Laurent Fribourg}, title = {{P}etri Nets, Flat Languages and Linear Arithmetic}, pages = {344-365}, note = {Invited lecture}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Fri-wflp00.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Fri-wflp00.ps} }
@inproceedings{LP-SCI-00, address = {Orlando, Florida, USA}, month = jul, year = 2000, acronym = {{SCI} 2000}, booktitle = {{P}roceedings of the 4th {W}orld {M}ulticonference on {S}ystemics, {C}ybernetics and {I}nformatics ({SCI} 2000)}, author = {Petrucci, Laure}, title = {Design and Validation of a Controller}, pages = {684-688}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Pet-sci2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Pet-sci2000.ps} }
@techreport{LSV:00:2, author = {B{\'e}rard, B{\'e}atrice and Sierra, Luis}, title = {Comparing Verification with {H}y{T}ech, {K}ronos and {U}ppaal on the Railroad Crossing Example}, type = {Research Report}, number = {LSV-00-2}, year = {2000}, month = jan, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2000-2.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2000-2.rr.ps} }
@inproceedings{PB-CD-EF-AP-cav2000, address = {Chicago, Illinois, USA}, month = jul, year = 2000, volume = 1855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Emerson, E. Allen and Sistla, A. Prasad}, acronym = {{CAV} 2000}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV} 2000)}, author = {Bouyer, Patricia and Dufourd, Catherine and Fleury, Emmanuel and Petit, Antoine}, title = {Are Timed Automata Updatable?}, pages = {464-479}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDEP-cav2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDEP-cav2000.ps}, abstract = {In classical timed automata, as defined by Alur and Dill and since widely studied, the only operation allowed to modify the clocks is the reset operation. For instance, a clock can neither be set to a non-null constant value, nor be set to the value of another clock nor, in a non-deterministic way, to some value lower or higher than a given constant. In this paper we study in details such updates.\par We characterize in a thin way the frontier between decidability and undecidability. Our main contributions are the following:\par 1)~We exhibit many classes of updates for which emptiness is undecidable. These classes depend on the clock constraints that are used ---~diagonal-free or not~--- whereas it is well-known that these two kinds of constraints are equivalent for classical timed automata.\par 2)~We propose a generalization of the region automaton proposed by Alur and Dill, allowing to handle larger classes of updates. The complexity of the decision procedure remains PSPACE-complete.} }
@article{SC-LP-CJ-00, publisher = {Oxford University Press}, journal = {The Computer Journal}, author = {Christensen, S{\o}ren and Petrucci, Laure}, title = {Modular Analysis of {P}etri Nets}, volume = {43}, number = {3}, pages = {224-242}, year = {2000}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CP-COMPJ00.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CP-COMPJ00.ps} }
@inproceedings{SchSid-atpn2000, address = {\AA rhus, Denmark}, month = jun, year = 2000, volume = 1825, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Simpson, Dan}, acronym = {{ICATPN} 2000}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({ICATPN} 2000)}, author = {Schnoebelen, {\relax Ph}ilippe and Sidorova, Natalia}, title = {Bisimulation and the Reduction of {P}etri Nets}, pages = {409-423}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/SchSid-atpn2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/SchSid-atpn2000.ps} }
@phdthesis{THESE-SUTRE-2000, author = {Sutre, Gr{\'e}goire}, title = {Abstraction et acc{\'e}l{\'e}ration de syst{\`e}mes infinis}, year = {2000}, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sutre-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sutre-these.ps}, lsv-lang = {FR} }
@inproceedings{VGLPAK:BDDinCoq, address = {Penang, Malaysia}, month = nov, year = 2000, volume = 1961, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {He, Jifeng and Sato, Masahito}, acronym = {{ASIAN} 2000}, booktitle = {{P}roceedings of the 6th {A}sian {C}omputing {S}cience {C}onference ({ASIAN} 2000)}, author = {Verma, Kumar N. and Goubault{-}Larrecq, Jean and Prasad, Sanjiva and Arun{-}Kumar, S.}, title = {Reflecting {BDD}s in {C}oq}, pages = {162-181}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VGPA-asian2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VGPA-asian2000.ps} }
@article{VP-fourth-99, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Padovani, Vincent}, title = {Decidability of Fourth-Order Matching}, volume = {10}, number = {3}, pages = {361-372}, year = {2000}, month = jun }
@inproceedings{VULC-icp2000, address = {Utrecht, The Netherlands}, month = oct, year = {2000}, optaddress = {Zaltbommel, The Netherlands}, publisher = {PLCopen}, acronym = {{ICP} 2000}, booktitle = {{P}roceedings of the 4th {I}nternational {PLC}open {C}onference on {I}ndustrial {C}ontrol {P}rogramming ({ICP} 2000)}, author = {De{~}Smet, Olivier and Couffin, Sandrine and Rossi, Olivier and Canet, G{\'e}raud and Lesage, Jean-Jacques and Schnoebelen, {\relax Ph}ilippe and Papini, H{\'e}l{\`e}ne}, title = {Safe Programming of {PLC} Using Formal Verification Methods}, pages = {73-78}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VULC-icp2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VULC-icp2000.ps} }
@inproceedings{bls-fossacs2000, address = {Berlin, Germany}, month = mar, year = 2000, volume = 1784, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Tiuryn, Jerzy}, acronym = {{FoSSaCS} 2000}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS} 2000)}, author = {B{\'e}rard, B{\'e}atrice and Labroue, Anne and Schnoebelen, {\relax Ph}ilippe}, title = {Verifying Performance Equivalence for {T}imed {B}asic {P}arallel {P}rocesses}, pages = {35-47}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLS-fossacs2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLS-fossacs2000.ps} }
@mastersthesis{boisseau-dea, author = {Boisseau, Alexandre}, title = {V{\'e}rification de protocoles cryptographiques}, year = {2000}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, lsv-lang = {FR} }
@inproceedings{cclps-smc2000, address = {Nashville, Tennessee, USA}, month = oct, year = 2000, publisher = {Argos Press}, acronym = {{SMC} 2000}, booktitle = {{P}roceedings of the {IEEE} {I}nternational {C}onference on {S}ystems, {M}an and {C}ybernetics ({SMC} 2000)}, author = {Canet, G{\'e}raud and Couffin, Sandrine and Lesage, Jean-Jacques and Petit, Antoine and Schnoebelen, {\relax Ph}ilippe}, title = {Towards the Automatic Verification of {PLC} Programs Written in {I}nstruction {L}ist}, pages = {2449-2454}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CCLPS-smc2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CCLPS-smc2000.ps}, doi = {10.1109/ICSMC.2000.884359}, abstract = {We propose a framework for the automatic verification of PLC (programmable logic controller) programs written in Instruction List, one of the five languages defined in the IEC 61131-3 standard. We~propose a formal semantics for a significant fragment of the IL language, and a direct coding of this semantics into a model checking tool. We then automatically verify rich behavioral properties written in linear temporal logic. Our~approach is illustrated on the example of the tool-holder of a turning center} }
@inproceedings{cdprs-cifa2000, address = {Lille, France}, month = jul, year = 2000, optaddress = {Villeneuve d'Ascq, France}, publisher = {Union des Chercheurs Ing{\'e}nieurs et {S}cientifiques, Villeneuve d'Ascq, France}, editor = {Borne, Pierre and Richard, Jean-Pierre and Vanheeghe, {\relax Ph}ilippe}, acronym = {{CIFA} 2000}, booktitle = {{A}ctes de la 1{\`e}re {C}onf{\'e}rence {I}nternationale {F}rancophone d'{A}utomatique ({CIFA} 2000)}, author = {Canet, G{\'e}raud and Denis, Bruno and Petit, Antoine and Rossi, Olivier and Schnoebelen, {\relax Ph}ilippe}, title = {Un cadre pour la v{\'e}rification automatique de programmes~{IL}}, pages = {693-698}, noisbn = {2-9512309-1-5}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CDPRS-cifa2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CDPRS-cifa2000.ps}, lsv-lang = {FR} }
@article{comon00ic2, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Comon, Hubert and Nieuwenhuis, Robert}, title = {Inductive Proofs = {I}-Axiomatization + First-Order Consistency}, volume = {159}, number = {1-2}, pages = {151-186}, year = {2000}, month = may # {-} # jun, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-1998-9.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-1998-9.rr.ps} }
@inproceedings{comon2000csl, address = {Fischbachau, Germany}, month = aug, year = 2000, volume = 1862, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Clote, Peter and Schwichtenberg, Helmut}, acronym = {{CSL} 2000}, booktitle = {{P}roceedings of the 14th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL} 2000)}, author = {Comon, Hubert and Cortier, V{\'e}ronique}, title = {Flatness is not a Weakness}, pages = {262-276}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComCor-csl2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComCor-csl2000.ps} }
@article{comon97ic, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Comon, Hubert}, title = {Sequentiality, Monadic Second Order Logic and Tree Automata}, volume = {157}, number = {1-2}, pages = {25-51}, year = {2000}, month = feb # {-} # mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Com-sequentiality-ic.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ Com-sequentiality-ic.ps} }
@mastersthesis{duflot-dea, author = {Duflot, Marie}, title = {Configurations r{\'e}currentes pour les anneaux de processus --- {A}pplication {\`a} l'auto-stabilisation}, year = {2000}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Duflot-dea.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Duflot-dea.ps}, lsv-lang = {FR} }
@inproceedings{finkel-leroux-vcl2000, address = {London, UK}, month = jul, year = 2000, publisher = {University of Southampton, Southampton, UK}, editor = {Leuschel, Michael and Podelski, Andreas and Ramakrishnan, C. R. and Ultes{-}Nitsche, Ulrich}, acronym = {{VCL} 2000}, booktitle = {{P}roceedings of the {I}nternational {W}orkshop on {V}erification and {C}omputational {L}ogic ({VCL} 2000)}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {A Finite Covering Tree for Analysing Entropic Broadcast Protocols}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinLer-vcl2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinLer-vcl2000.ps} }
@article{laroussinie98, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe}, title = {Specification in {CTL}+Past for verification in {CTL}}, volume = {156}, number = {1-2}, pages = {236-263}, year = {2000}, month = jan, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LarSch-IC98.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LarSch-IC98.ps}, doi = {10.1006/inco.1999.2817} }
@inproceedings{larsch-fossacs2000, address = {Berlin, Germany}, month = mar, year = 2000, volume = 1784, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Tiuryn, Jerzy}, acronym = {{FoSSaCS} 2000}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS} 2000)}, author = {Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe}, title = {The State-Explosion Problem from Trace to Bisimulation Equivalence}, pages = {192-207}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LarSch-fossacs2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LarSch-fossacs2000.ps} }
@inproceedings{lomazova99, address = {Novosibirsk, Russia}, year = 2000, volume = 1755, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bj{\o}rner, Dines and Broy, Manfred and Zamulin, Alexandre V.}, acronym = {{PSI}'99}, booktitle = {{P}roceedings of the 3rd {I}nternational {A}ndrei {E}rshov {M}emorial {C}onference on {P}erspectives of {S}ystem {I}nformatics ({PSI}'99)}, author = {Lomazova, Irina A. and Schnoebelen, {\relax Ph}ilippe}, title = {Some Decidability Results for Nested {P}etri Nets}, pages = {208-220}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LomSch-psi99.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LomSch-psi99.ps} }
@inproceedings{lst-quant, address = {Punta del Este, Uruguay}, month = apr, year = 2000, volume = 1776, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gonnet, Gaston H. and Panario, Daniel and Viola, Alfredo}, acronym = {{LATIN} 2000}, booktitle = {{P}roceedings of the 4th {L}atin {A}merican {S}ymposium on {T}heoretical {I}nformatics ({LATIN} 2000)}, author = {Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe and Turuani, Mathieu}, title = {On the Expressivity and Complexity of Quantitative Branching-Time Temporal Logics}, pages = {437-446}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LST-latin2000.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LST-latin2000.ps}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LST-latin2000.pdf}, doi = {10.1007/10719839_43} }
@inproceedings{lugsch-icalp2000, address = {Geneva, Switzerland}, month = jul, year = 2000, volume = 1853, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Montanari, Ugo and Rolim, Jos{\'e} D. P. and Welzl, Emo}, acronym = {{ICALP} 2000}, booktitle = {{P}roceedings of the 27th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP} 2000)}, author = {Lugiez, Denis and Schnoebelen, {\relax Ph}ilippe}, title = {Decidable First-Order Transition Logics for {PA}-Processes}, pages = {342-353}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LugSch-icalp2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LugSch-icalp2000.ps} }
@mastersthesis{markey-dea, author = {Markey, Nicolas}, title = {Complexit{\'e} de la logique temporelle avec pass{\'e}}, year = {2000}, month = jun, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, nops = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2000-11.rr.ps}, nopsgz = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PSGZ/ rr-lsv-2000-11.rr.ps.gz}, lsv-lang = {FR} }
@misc{note-EVA-nov-2000, author = {Boisseau, Alexandre and Jacquemard, Florent and Le{ }M{\'e}tayer, Daniel}, title = {Exemple de mod{\'e}lisation de protocoles cryptographiques}, year = {2000}, month = nov, howpublished = {Projet EVA, note interne}, lsv-lang = {FR} }
@phdthesis{preston-these-2000, author = {Nicky Williams}, missingauthor = {on met pas son nom complet ?}, title = {Application des sp{\'e}cifications alg{\'e}briques {\`a} la r{\'e}tro-ing{\'e}nierie de codes {F}ortran}, year = {2000}, month = feb, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Williams-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Williams-these.ps}, lsv-lang = {FR} }
@inproceedings{rossch-adpm2000, address = {Dortmund, Germany}, month = sep, year = 2000, optaddress = {Aachen, Germany}, publisher = {Shaker Verlag}, editor = {Engell, Sebastian and Kowalewski, Stefan and Zaytoon, Janan}, acronym = {{ADPM} 2000}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {A}utomation of {M}ixed {P}rocesses: {H}ybrid {D}ynamic {S}ystems ({ADPM} 2000)}, author = {Rossi, Olivier and Schnoebelen, {\relax Ph}ilippe}, title = {Formal modeling of timed function blocks for the automatic verification of {L}adder {D}iagram programs}, pages = {177-182}, noisbn = {3-8265-7836-8}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RosSch-adpm2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RosSch-adpm2000.ps} }
@misc{fl:hcmc, author = {Laroussinie, Fran{\c{c}}ois}, title = {{HCMC}: {A}n Extension of {CMC} for Hybrid Systems}, year = {2000}, howpublished = {Available at \url{http://www.lsv.ens-cachan.fr/~fl/cmcweb.html}}, url = {http://www.lsv.ens-cachan.fr/~fl/cmcweb.html}, note = {See~\cite{CasLar-cav2000} for description. Written in C++ (about 26000 lines)} }
@misc{stabilo, author = {Nilsson, Ulf and Duflot, Marie and Fribourg, Laurent}, title = {{STABILO}, a tool computing inevitable configurations in distributed protocols}, year = {2000}, month = nov, note = {See description in~\cite{DFN-concur-2001}. Written in PROLOG (about 500 lines on top of Gertjan van Noord's finite automata package)} }
@misc{phs-jm2000, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Le probl{\`e}me de l'explosion du nombre d'{\'e}tats}, year = {2000}, month = mar, howpublished = {Invited talk, 8{\`e}me Journ\'ees Montoises d'Informatique Th\'eorique (JM 2000), Marne-la-Vall\'ee, France}, lsv-lang = {FR} }
@inproceedings{Alechina::Demri::deRijke01, address = {Rome, Italy}, month = sep, year = 2001, volume = 45, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Lenzerini, Maurizio and Nardi, Daniele and Nutt, Werner and Suciu, Dan}, acronym = {{KRDB}'01}, booktitle = {{P}roceedings of the 8th {I}nternational {W}orkshop on {K}nowledge {R}epresentation meets {D}atabases ({KRDB}'01)}, author = {Alechina, Natasha and Demri, St{\'e}phane and de Rijke, Maarten}, title = {Path Constraints from a Modal Logic Point of View (Extended Abstract)}, missingpages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ADdR-krdb01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ADdR-krdb01.ps} }
@inproceedings{BB-wadt2001, address = {Genova, Italy}, month = apr, year = 2001, volume = 2267, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cerioli, Maura and Reggio, Gianna}, acronym = {{WADT}'01}, booktitle = {{R}ecent {T}rends in {A}lgebraic {D}evelopment {T}echniques~--- {S}elected {P}apers of the 15th {I}nternational {W}orkshop on {A}lgebraic {D}evelopment {T}echniques ({WADT}'01)}, author = {Bidoit, Michel and Boisseau, Alexandre}, title = {Algebraic Abstractions}, pages = {21-47}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BB-wadt2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BB-wadt2001.ps} }
@article{BBFM-DISTCOMP, publisher = {Springer}, journal = {Distributed Computing}, author = {Beauquier, Joffroy and B{\'e}rard, B{\'e}atrice and Fribourg, Laurent and Magniette, Fr{\'e}d{\'e}ric}, title = {Proving Convergence of Self-Stabilizing Systems Using First-Order Rewriting and Regular Languages}, volume = {14}, number = {2}, pages = {83-95}, year = {2001}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBFM-DISCOMP2000.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBFM-DISCOMP2000.ps}, doi = {10.1007/PL00008931} }
@proceedings{BCF-lncs2102, title = {{P}roceedings of the 13th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'01)}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'01)}, editor = {Berry, G{\'e}rard and Comon, Hubert and Finkel, Alain}, publisher = {Springer}, volume = {2102}, series = {Lecture Notes in Computer Science}, year = {2001}, month = jul, address = {Paris, France}, isbn = {3-540-42345-1}, url = {http://www.springer.com/978-3-540-42345-1}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42345-1} }
@inproceedings{BPT-concur-2001, address = {Aalborg, Denmark}, month = aug, year = 2001, volume = 2154, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Nielsen, Modens}, acronym = {{CONCUR}'01}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'01)}, author = {Bouyer, Patricia and Petit, Antoine and Th{\'e}rien, Denis}, title = {An Algebraic Characterization of Data and Timed Languages}, pages = {248-261}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BPT-concur2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BPT-concur2001.ps}, abstract = {Algebra offers an elegant and powerful approach to understand regular languages and finite automata. Such framework has been notoriously lacking for timed languages and timed automata. We introduce the notion of monoid recognizability for data languages, which include timed languages as special case, in a way that respects the spirit of the classical situation. We study closure properties and hierarchies in this model, and prove that emptiness is decidable under natural hypotheses. Our class of recognizable languages properly includes many families of deterministic timed languages that have been proposed until now, and the same holds for non-deterministic versions.} }
@inproceedings{BT-afadl2001, address = {Nancy, France}, month = jun, year = 2001, editor = {Souqui{\`e}res, Jeanine}, acronym = {{AFADL}'01}, booktitle = {{A}ctes du 4{\`e}me {A}telier sur les {A}pproches {F}ormelles dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels ({AFADL}'01)}, author = {Blanc, Benjamin and Tort, Fran{\c{c}}oise}, title = {Co-d\'eveloppement de sp\'ecifications alg\'ebriques}, pages = {141-156}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BT-afadl01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BT-afadl01.ps} }
@misc{CASL-tut-2001, author = {Bidoit, Michel and Mosses, Peter D.}, title = {A Gentle Introduction to {CASL}~v1.0.1}, year = {2001}, month = apr, howpublished = {Invited tutorial, CoFI Workshop at the 4th European Joint Conferences on Theory and Practice of Software (ETAPS 2001), Genova, Italy}, url = {http://www.lsv.ens-cachan.fr/~bidoit/CASL/} }
@techreport{CCR-vulcain-final, author = {Canet, G{\'e}raud and Couffin, S. and Rossi, O.}, title = {Validation dans le cadre de l'utilisation des {SFC}, {LD} et~{ST}}, year = {2001}, month = may, type = {Final Report}, institution = {t{\^a}ches~4, 5 et~6, projet VULCAIN}, missinghowpublished = {Rapport final des t{\^a}ches~4, 5 et~6 du projet {VULCAIN}}, note = {393 pages} }
@proceedings{CMR-lncs2002, title = {{R}evised {L}ectures of the {I}nternational {S}ummer {S}chool on {C}onstraints in {C}omputational {L}ogics ({CCL}'99)}, booktitle = {{R}evised {L}ectures of the {I}nternational {S}ummer {S}chool on {C}onstraints in {C}omputational {L}ogics ({CCL}'99)}, editor = {Comon, Hubert and March{\'e}, Claude and Treinen, Ralf}, publisher = {Springer}, volume = {2002}, series = {Lecture Notes in Computer Science}, year = {2001}, address = {Gif-sur-Yvette, France}, isbn = {3-540-41950-0}, url = {http://www.springer.com/978-3-540-41950-0}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-41950-0} }
@techreport{Calife-4.4, author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Petit, Antoine}, title = {Mod{\'e}lisation du protocole~{PGM} et de certaines de ses propri{\'e}t{\'e}s en {UPPAAL}}, year = {2001}, month = nov, type = {Contract Report}, number = {4.4}, institution = {projet RNRT Calife}, note = {18 pages} }
@inproceedings{DFN-concur-2001, address = {Aalborg, Denmark}, month = aug, year = 2001, volume = 2154, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Nielsen, Modens}, acronym = {{CONCUR}'01}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'01)}, author = {Duflot, Marie and Fribourg, Laurent and Nilsson, Ulf}, title = {Unavoidable Configurations of Parameterized Rings of Processes}, pages = {472-486}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFN-concur2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFN-concur2001.ps} }
@inproceedings{DFP-disc2001, address = {Lisbon, Portugal}, month = oct, year = 2001, volume = 2180, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Welch, Jennifer L.}, acronym = {{DISC}'01}, booktitle = {{P}roceedings of the 15th {I}nternational {S}ymposium on {D}istributed {C}omputing ({DISC}'01)}, author = {Duflot, Marie and Fribourg, Laurent and Picaronny, Claudine}, title = {Randomized Finite-State Distributed Algorithms as {M}arkov Chains}, pages = {240-254}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-disc2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-disc2001.ps} }
@techreport{EVA-TR1, author = {Jacquemard, Florent and Le{ }M{\'e}tayer, Daniel}, title = {Langage de sp{\'e}cification de protocoles cryptographiques de {EVA}: syntaxe concr{\`e}te}, year = {2001}, month = nov, type = {Technical Report}, number = 1, institution = {projet RNTL~EVA}, note = {25 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR1.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR1.pdf} }
@techreport{EVA-TR4, author = {Bolignano, Dominique and Fiorenza, Francesca and Jacquemard, Florent and Le{ }M{\'e}tayer, Daniel}, title = {{EVA} test base}, year = {2001}, month = nov, type = {Technical Report}, number = 4, institution = {projet RNTL~EVA}, note = {55 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR4.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR4.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/EVA-TR4.ps} }
@proceedings{Fri-lncs2142, title = {{P}roceedings of the 15th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'01)}, booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'01)}, editor = {Fribourg, Laurent}, publisher = {Springer}, volume = {2142}, series = {Lecture Notes in Computer Science}, year = {2001}, month = sep, address = {Paris, France}, isbn = {3-540-42554-3}, url = {http://www.springer.com/978-3-540-42554-3}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42554-3} }
@article{GB-LP-JSTTT00, publisher = {Springer}, journal = {International Journal on Software Tools for Technology Transfer}, author = {Berthelot, G{\'e}rard and Petrucci, Laure}, title = {Specification and Validation of a Concurrent System: {A}n Educational Project}, volume = {3}, number = {4}, pages = {372-381}, year = {2001}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GB-LP-STTT01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GB-LP-STTT01.ps}, doi = {10.1007/s100090100064} }
@inproceedings{GL:WFRR, address = {Paris, France}, month = sep, year = 2001, volume = 2142, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Fribourg, Laurent}, acronym = {{CSL}'01}, booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'01)}, author = {Goubault{-}Larrecq, Jean}, title = {Well-Founded Recursive Relations}, pages = {484-497}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-csl2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gou-csl2001.ps} }
@proceedings{JGL:LACPV, title = {{P}roceedings of the 1st {W}orkshop on {L}ogical {A}spects of {C}ryptographic {P}rotocol {V}erification ({LACPV} 2001)}, booktitle = {{P}roceedings of the 1st {W}orkshop on {L}ogical {A}spects of {C}ryptographic {P}rotocol {V}erification ({LACPV} 2001)}, editor = {Goubault{-}Larrecq, Jean}, publisher = {Elsevier Science Publishers}, volume = {55}, number = 1, series = {Electronic Notes in Theoretical Computer Science}, year = 2003, month = jan, address = {Paris, France}, oldurl = {http://www.sciencedirect.com/science?_ob=IssueURL& _tockey=%23TOC%2313109%232003%23999449998%23521171%23FLP%23 Volume_55,_Issue_1,_Pages_1-26_(January_2003)& _auth=y&view=c&_acct=C000051058&_version=1&_urlVersion=0& _userid=1052425&md5=01843f1018b98d2dd1c00502871bfff4}, doi = {10.1016/S1571-0661(05)80576-6} }
@techreport{JGL:eva:propal, author = {Goubault{-}Larrecq, Jean}, title = {Une proposition de langage de description de protocoles cryptographiques}, year = {2001}, month = jul, type = {Contract Report}, number = 2, institution = {projet RNTL~EVA}, note = {12 pages}, missingcomprehension = {Je ne comprends pas pourquoi cette entree est en RC et pas en wwwpublic, alors que d'autres contrats EVA sont en TR et wwwpublic public} }
@techreport{JGL:eva:sem, author = {Goubault{-}Larrecq, Jean}, title = {Les syntaxes et la s{\'e}mantique du langage de sp{\'e}cification~{EVA}}, year = {2001}, month = nov, type = {Contract Report}, number = 3, institution = {projet RNTL~EVA}, note = {32 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR3.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR3.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/EVA-TR4.ps} }
@techreport{LSV:01:13, author = {Comon, Hubert and Cortier, V{\'e}ronique}, title = {Tree Automata with One Memory, Set Constraints and Cryptographic Protocols}, type = {Research Report}, number = {LSV-01-13}, year = {2001}, month = dec, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {98 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2001-13.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2001-13.rr.ps} }
@techreport{LSV:01:9, author = {Goubault{-}Larrecq, Jean}, title = {Higher-Order Automata, Pushdown Systems, and Set Constraints}, type = {Research Report}, number = {LSV-01-9}, year = {2001}, month = nov, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {15 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2001-9.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2001-9.rr.ps} }
@techreport{PKDAB-DSTO-01, author = {Petrucci, Laure and Kristensen, Lars M. and Dauchy, Pierre and Aziz, M. and Billington, Jonathan}, missingauthor = {}, title = {Modelling and analysis of airborne mission systems}, year = {2001}, month = dec, type = {Progress Report}, number = 1, institution = {{DSTO/UniSA} contract}, note = {54 pages} }
@inproceedings{RGL:TAinCoq, address = {Edinburgh, Scotland, UK}, month = sep, year = 2001, volume = 2152, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Boulton, Richard J. and Jackson, Paul B.}, acronym = {{TPHOLs}'01}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {T}heorem {P}roving in {H}igher {O}rder {L}ogics ({TPHOLs}'01)}, author = {Rival, Xavier and Goubault{-}Larrecq, Jean}, title = {Experiments with Finite Tree Automata in {C}oq}, pages = {362-377}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RivGou-tphol01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RivGou-tphol01.ps} }
@inproceedings{RGL:log-art, address = {Cape Breton, Nova Scotia, Canada}, month = jun, year = 2001, publisher = {{IEEE} Computer Society Press}, acronym = {{CSFW}'01}, booktitle = {{P}roceedings of the 14th {IEEE} {C}omputer {S}ecurity {F}oundations {W}orkshop ({CSFW}'01)}, author = {Roger, Muriel and Goubault{-}Larrecq, Jean}, title = {Log Auditing through Model Checking}, pages = {220-236}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RogGou-csfw01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RogGou-csfw01.ps} }
@inproceedings{Sch-tacs2001, address = {Sendai, Japan}, month = oct, year = 2001, volume = 2215, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kobayashi, Naoki and Pierce, Benjamin C.}, acronym = {{TACS}'01}, booktitle = {{P}roceedings of the 4th {I}nternational {W}orkshop on {T}heoretical {A}spects of {C}omputer {S}oftware ({TACS}'01)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Bisimulation and Other Undecidable Equivalences for Lossy Channel Systems}, pages = {385-399}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-tacs2001.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-tacs2001.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-tacs2001.ps}, abstract = {Lossy channel systems are systems of finite state automata that communicate via unreliable unbounded fifo channels. Today the main open question in the theory of lossy channel systems is whether bisimulation is decidable. \par We show that bisimulation, simulation, and in fact all relations between bisimulation and trace inclusion are undecidable for lossy channel systems (and for lossy vector addition systems).} }
@phdthesis{THESE-CANET-2001, author = {Canet, G{\'e}raud}, title = {V{\'e}rification des programmes {\'e}crits dans les langages de programmation~{IL} et~{ST} d{\'e}finis par la norme {IEC}~61131-3}, year = {2001}, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Canet-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Canet-these.ps} }
@phdthesis{THESE-NARBONI-2001, author = {Narboni, Guy A.}, title = {Un cas remarquable de syst{\`e}mes lin{\'e}aires: les syst{\`e}mes monotones. {R}{\'e}solution et application {\`a} la v{\'e}rification formelle de programmes}, year = {2001}, month = dec, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Narboni-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Narboni-these.ps} }
@misc{ap-express01, author = {Petit, Antoine}, title = {About Extensions of Timed Automata}, howpublished = {Invited talk, 8th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'01), {A}alborg, {D}enmark}, year = 2001, month = aug }
@inproceedings{bhk-fossacs2001, address = {Genova, Italy}, month = apr, year = 2001, volume = 2030, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Honsell, Furio and Miculan, Marino}, acronym = {{FoSSaCS}'01}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'01)}, author = {Bidoit, Michel and Hennicker, Rolf and Kurz, Alexander}, title = {On the Duality between Observability and Reachability}, pages = {72-87}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHK-fossacs2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHK-fossacs2001.ps} }
@inproceedings{ccm-icalp2001, address = {Heraklion, Crete, Grece}, month = jul, year = 2001, volume = 2076, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Orejas, Fernando and Spirakis, Paul G. and van Leeuwen, Jan}, acronym = {{ICALP}'01}, booktitle = {{P}roceedings of the 28th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'01)}, author = {Comon, Hubert and Cortier, V{\'e}ronique and Mitchell, John}, title = {Tree Automata with One Memory, Set Constraints and Ping-Pong Protocols}, pages = {682-693}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CCM-icalp2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CCM-icalp2001.ps} }
@inproceedings{cgn-focs2001, address = {Las Vegas, Nevada, USA}, month = oct, year = 2001, publisher = {{IEEE} Computer Society Press}, acronym = {{FOCS}'01}, booktitle = {{P}roceedings of the 42nd {S}ymposium on {F}oundations of {C}omputer {S}cience ({FOCS}'01)}, author = {Comon, Hubert and Godoy, Guillem and Nieuwenhuis, Robert}, title = {The Confluence of Ground Term Rewrite Systems is Decidable in Polynomial Time}, pages = {298-307}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CGN-focs2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CGN-focs2001.ps} }
@inproceedings{cmr-csfw2001, address = {Cape Breton, Nova Scotia, Canada}, month = jun, year = 2001, publisher = {{IEEE} Computer Society Press}, acronym = {{CSFW}'01}, booktitle = {{P}roceedings of the 14th {IEEE} {C}omputer {S}ecurity {F}oundations {W}orkshop ({CSFW}'01)}, author = {Cortier, V{\'e}ronique and Millen, Jonathan K. and Rue{\ss}, Harald}, title = {Proving Secrecy is Easy Enough}, pages = {97-110}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CMR-csfw2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CMR-csfw2001.ps} }
@inproceedings{comon01ccl, address = {Gif-sur-Yvette, France}, year = 2001, volume = 2002, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Comon, Hubert and March{\'e}, {\relax Cl}aude and Treinen, Ralf}, acronym = {{CCL}'99}, booktitle = {{R}evised {L}ectures of the {I}nternational {S}ummer {S}chool on {C}onstraints in {C}omputational {L}ogics ({CCL}'99)}, author = {Comon, Hubert and Kirchner, Claude}, title = {Constraint Solving on Terms}, pages = {47-103} }
@incollection{comon99hb, author = {Comon, Hubert}, title = {Inductionless Induction}, editor = {Robinson, Alan and Voronkov, Andrei}, booktitle = {Handbook of Automated Reasoning}, volume = {1}, chapter = {14}, pages = {913-962}, year = {2001}, missingmonth = {}, missingnmonth = {}, publisher = {Elsevier Science Publishers}, isbn = {0-444-82949-0}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HC-hb.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HC-hb.ps} }
@mastersthesis{corbineau-dea, author = {Corbineau, Pierre}, title = {Autour de la cl{\^o}ture de congruence avec {C}oq}, year = {2001}, month = sep, school = {{DEA} Programmation, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Corbineau-dea2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Corbineau-dea2001.ps} }
@article{finkel98b, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Finkel, Alain and Schnoebelen, {\relax Ph}ilippe}, title = {Well-Structured Transition Systems Everywhere!}, volume = {256}, number = {1-2}, pages = {63-92}, year = {2001}, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FinSch-TCS99.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FinSch-TCS99.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FinSch-TCS99.ps}, doi = {10.1016/S0304-3975(00)00102-X}, abstract = {Well-structured transition systems (WSTS's) are a general class of infinite state systems for which decidability results rely on the existence of a well-quasi-ordering between states that is compatible with the transitions.\par In this article, we provide an extensive treatment of the WSTS idea and show several new results. Our improved definitions allow many examples of classical systems to be seen as instances of WSTS's.} }
@mastersthesis{hornus-dea, author = {Hornus, Samuel}, title = {Requ{\^e}tes en logique temporelle}, year = {2001}, month = sep, school = {{DEA} Algorithmique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Hornus-dea2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Hornus-dea2001.ps} }
@inproceedings{lms-fossacs2001, address = {Genova, Italy}, month = apr, year = 2001, volume = 2030, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Honsell, Furio and Miculan, Marino}, acronym = {{FoSSaCS}'01}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'01)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Model checking {CTL}{\(^+\)} and {FCTL} is~hard}, pages = {318-331}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-fossacs2001.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMS-fossacs2001.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-fossacs2001.pdf}, abstract = {Among the branching-time temporal logics used for the specification and verification of systems, CTL\(^+\), FCTL and ECTL\(^+\) are the most notable logics for which the precise computational complexity of model checking is not known. We answer this longstanding open problem and show that model checking these (and some related) logics is \(\Delta_2^p\)-complete.} }
@book{lsvmcbook01, author = {B{\'e}rard, B{\'e}atrice and Bidoit, Michel and Finkel, Alain and Laroussinie, Fran{\c{c}}ois and Petit, Antoine and Petrucci, Laure and Schnoebelen, {\relax Ph}ilippe}, title = {Systems and Software Verification. {M}odel-Checking Techniques and Tools}, year = {2001}, missingmonth = {}, missingnmonth = {}, publisher = {Springer}, isbn = {3-540-41523-8}, url = {http://www.springer.com/978-3-540-41523-8}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-41523-8} }
@phdthesis{phs-hab-01, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Sp{\'e}cification et v{\'e}rification des syst{\`e}mes concurrents}, year = {2001}, month = oct, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris~7, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/phs-habile.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/phs-habile.ps} }
@mastersthesis{pichon-dea, author = {Pichon, {\'E}ric}, title = {Preuves observationnelles}, year = {2001}, month = sep, school = {{DEA} Programmation, Paris, France} }
@book{scopos13-2001, author = {Badouel, {\'E}ric and Boucheron, St{\'e}phane and Dicky, Anne and Petit, Antoine and Santha, Miklos and Weil, Pascal and Zeitoun, Marc}, title = {Probl\`{e}mes d'informatique fondamentale}, publisher = {Springer}, volume = {13}, series = {Scopos}, year = {2001}, missingmonth = {}, missingnmonth = {}, isbn = {3-540-42341-9}, url = {http://www.springer.com/978-3-540-42341-9}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42341-9} }
@article{BP-JALC2002, journal = {Journal of Automata, Languages and Combinatorics}, author = {Bouyer, Patricia and Petit, Antoine}, title = {A {K}leene{\slash}B{\"u}chi-like Theorem for Clock Languages}, volume = {7}, number = {2}, pages = {167-186}, year = {2002}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-JALC2001.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-JALC2001.ps}, abstract = {We propose in this paper a generalization of the famous Kleene\slash B{\"u}chi's theorem on formal languages, one of the cornerstones of theoretical computer science, to the timed model of clock languages. These languages extend the now classical timed languages introduced by Alur and Dill as a suitable model of real-time systems. As a corollary of our main result, we get a simple algebraic characterization of timed languages recognized by (updatable) timed automata.} }
@article{BST-FAC2002, publisher = {Springer}, journal = {Formal Aspects of Computing}, author = {Bidoit, Michel and Sannella, Donald and Tarlecki, Andrzej}, title = {Architectural Specifications in {CASL}}, volume = {13}, number = {3-5}, pages = {252-273}, year = {2002}, month = jul, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BST-FAC2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BST-FAC2002.ps}, doi = {10.1007/s001650200012} }
@inproceedings{BST-mfcs2002, address = {Warsaw, Poland}, month = aug, year = 2002, volume = 2420, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Diks, Krzysztof and Rytter, Wojciech}, acronym = {{MFCS}'02}, booktitle = {{P}roceedings of the 27th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'02)}, author = {Bidoit, Michel and Sannella, Donald and Tarlecki, Andrzej}, title = {Global Development via Local Observational Construction Steps}, pages = {1-24}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BST-MFCS02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BST-MFCS02.ps} }
@mastersthesis{Baclet-dea, author = {Baclet, Manuel}, title = {Langages de donn{\'e}es}, type = {Rapport de {DEA}}, year = {2002}, month = sep, school = {{DEA} Algorithmique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Baclet-dea02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Baclet-dea02.ps} }
@mastersthesis{Bernat-dea, author = {Bernat, Vincent}, title = {Transformation de l'authentification en secret}, type = {Rapport de {DEA}}, year = {2002}, month = sep, school = {{DEA} Algorithmique, Paris, France} }
@article{Bou-IPL2002, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Bouyer, Patricia}, title = {A Logical Characterization of Data Languages}, volume = {84}, number = {2}, pages = {75-85}, year = {2002}, month = oct, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-IPL2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-IPL2002.ps} }
@inproceedings{DD-fsttcs2002, address = {Kanpur, India}, month = dec, year = 2002, volume = 2556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Agrawal, Manindra and Seth, Anil}, acronym = {{FSTTCS}'02}, booktitle = {{P}roceedings of the 22nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'02)}, author = {Demri, St{\'e}phane and D'Souza, Deepak}, title = {An Automata-Theoretic Approach to Constraint {LTL}}, pages = {121-132}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DemDsou-fsttcs02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DemDsou-fsttcs02.ps} }
@inproceedings{DFP-tcs2002, address = {Montr{\'e}al, Qu{\'e}bec, Canada}, month = aug, year = 2002, volume = 223, series = {IFIP Conference Proceedings}, publisher = {Kluwer Academic Publishers}, editor = {Baeza-Yates, Ricardo A. and Montanari, Ugo and Santoro, Nicolas}, acronym = {{IFIP~TCS}'02}, booktitle = {{P}roceedings of the 2nd {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({IFIP~TCS}'02)}, author = {Duflot, Marie and Fribourg, Laurent and Picaronny, Claudine}, title = {Randomized Dining Philosophers without Fairness Assumption}, pages = {169-180}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-tcs02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-tcs02.ps} }
@inproceedings{DLS-stacs2002, address = {Antibes Juan-les-Pins, France}, month = mar, year = 2002, volume = 2285, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alt, Helmut and Ferreira, Afonso}, acronym = {{STACS}'02}, booktitle = {{P}roceedings of the 19th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'02)}, author = {Demri, St{\'e}phane and Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe}, title = {A Parametric Analysis of the State Explosion Problem in Model Checking (Extended Abstract)}, pages = {620-631}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLS-stacs2002.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DLS-stacs2002.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLS-stacs2002.pdf}, abstract = {In model checking, the state explosion problem occurs when one checks a \emph{non-flat system}, \emph{i.e.}~a system implicitly described as a synchronized product of elementary subsystems. In this paper, we investigate the complexity of a wide variety of model checking problems for non-flat systems under the light of \emph{parameterized complexity}, taking the number of synchronized components as a parameter. We provide precise complexity measures (in the parameterized sense) for most of the problems we investigate, and evidence that the results are robust.} }
@article{DS-ICOMP2001, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Demri, St{\'e}phane and Schnoebelen, {\relax Ph}ilippe}, title = {The Complexity of Propositional Linear Temporal Logics in Simple Cases}, volume = {174}, number = {1}, pages = {84-103}, year = {2002}, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DS-ICOMP2001.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DS-ICOMP2001.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DS-ICOMP2001.pdf}, doi = {10.1006/inco.2001.3094}, abstract = {It is well-known that model checking and satisfiability for PLTL are PSPACE-complete. By contrast, very little is known about whether there exist some interesting fragments of PLTL with a lower worst-case complexity. Such results would help understand why PLTL model checkers are successfully used in practice.\par In this paper we investigate this issue and consider model checking and satisfiability for all fragments of PLTL obtainable by restricting (1) the temporal connectives allowed, (2) the number of atomic propositions, and (3) the temporal height.} }
@book{Demri::Orlowska02, author = {Demri, St{\'e}phane and Or{\l}owska, Ewa}, title = {Incomplete Information: Structure, Inference, Complexity}, series = {EATCS Monographs}, year = {2002}, missingnumber = {}, missingmonth = {}, missingnmonth = {}, publisher = {Springer}, isbn = {3-540-41904-7}, url = {http://www.springer.com/978-3-540-41904-7}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-41904-7} }
@article{Demri::Sattler02, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Demri, St{\'e}phane and Sattler, Ulrike}, title = {Automata-Theoretic Decision Procedures for Information Logics}, volume = {53}, number = {1}, pages = {1-22}, year = {2002}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ds-fund-02.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ds-fund-02.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ds-fund-02.pdf} }
@inproceedings{FRSV-infinity2002, address = {Brno, Czech Republic}, month = aug, year = 2002, number = 6, volume = 68, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Ku{\v c}era, Anton{\'\i}n and Mayr, Richard}, acronym = {{INFINITY}'02}, booktitle = {{P}roceedings of the 4th {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'02)}, author = {Finkel, Alain and Raskin, Jean-Fran{\c{c}}ois and Samuelides, Mathias and Van{~}Begin, Laurent}, title = {Monotonic Extensions of {P}etri Nets: Forward and Backward Search Revisited}, pages = {121-144}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FRSVB-infinity2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FRSVB-infinity2002.ps} }
@inproceedings{FinLer-fsttcs2002, address = {Kanpur, India}, month = dec, year = 2002, volume = 2556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Agrawal, Manindra and Seth, Anil}, acronym = {{FSTTCS}'02}, booktitle = {{P}roceedings of the 22nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'02)}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {How To Compose {P}resburger-Accelerations: Applications to Broadcast Protocols}, pages = {145-156}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-14.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-14.rr.ps} }
@inproceedings{GLLN-csl2002, address = {Edinburgh, Scotland, UK}, month = sep, year = 2002, volume = 2471, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bradfield, Julian C.}, acronym = {{CSL}'02}, booktitle = {{P}roceedings of the 16th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'02)}, author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir and Nowak, David}, title = {Logical Relations for Monadic Types}, pages = {553-568}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLN-csl2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLN-csl2002.ps} }
@inproceedings{HCFRS-latin2002, address = {Cancun, Mexico}, month = apr, year = 2002, volume = 2286, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rajsbaum, Sergio}, acronym = {{LATIN}'02}, booktitle = {{P}roceedings of the 5th {L}atin {A}merican {S}ymposium on {T}heoretical {I}nformatics ({LATIN}'02)}, author = {Herbreteau, Fr{\'e}d{\'e}ric and Cassez, Franck and Finkel, Alain and Roux, Olivier F. and Sutre, Gr{\'e}goire}, title = {Verification of Embedded Reactive Fiffo Systems}, pages = {400-414}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HCFRS-latin2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HCFRS-latin2002.ps} }
@incollection{HHB-OCL, missingnmonth = {}, missingmonth = {}, year = 2002, volume = 2263, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Clark, Tony and Warmer, Jos}, booktitle = {{O}bject {M}odeling with the {OCL}~--- {T}he {R}ationale behind the {O}bject {C}onstraint {L}anguage}, author = {Hennicker, Rolf and Hu{\ss}mann, Heinrich and Bidoit, Michel}, title = {On the Precise Meaning of {OCL} Constraints}, pages = {69-84}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HBB-oclBook.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HBB-oclBook.ps} }
@inproceedings{HS-amast2002, address = {Saint Gilles les Bains, Reunion Island, France}, month = sep, year = 2002, volume = 2422, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kirchner, H{\'e}l{\`e}ne and Ringeissen, {\relax Ch}ristophe}, acronym = {{AMAST}'02}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {A}lgebraic {M}ethodology and {S}oftware {T}echnology ({AMAST}'02)}, author = {Hornus, Samuel and Schnoebelen, {\relax Ph}ilippe}, title = {On Solving Temporal Logic Queries}, pages = {163-177}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HS-amast2002.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HS-amast2002.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HS-amast2002.ps}, abstract = {Temporal query checking is an extension of temporal model checking where one asks what propositional formulae can be inserted in a temporal query (a temporal formula with a placeholder) so that the resulting formula is satisfied in the model at hand.\par We study the problem of computing all minimal solutions to a temporal query without restricting to so-called {"}valid{"} queries (queries guaranteed to have a unique minimal solution). While this problem is intractable in general, we show that deciding uniqueness of the minimal solution (and computing it) can be done in polynomial-time. } }
@inproceedings{JGL-csl2002, address = {Edinburgh, Scotland, UK}, month = sep, year = 2002, volume = 2471, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bradfield, Julian C.}, acronym = {{CSL}'02}, booktitle = {{P}roceedings of the 16th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'02)}, author = {Goubault{-}Larrecq, Jean}, title = {Higher-Order Positive Set Constraints}, pages = {473-489}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-6.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-6.rr.ps} }
@techreport{JGL:EVA:CPV/2, author = {Goubault{-}Larrecq, Jean}, title = {Outils {CPV} et {CPV2}}, year = {2002}, month = may, type = {Contract Report}, number = 8, institution = {Projet RNTL~EVA}, oldhowpublished = {Rapport num{\'e}ro 8 du projet RNTL EVA}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR8.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR8.pdf}, note = {7 pages} }
@article{JGL:JTIT, address = {Warsaw, Poland}, publisher = {Instytut {\L}{\k a}csno{\'s}ci}, journal = {Journal of Telecommunications and Information Technology}, author = {Goubault{-}Larrecq, Jean}, editor = {Goubault{-}Larrecq, Jean}, title = {Special Issue on Models and Methods for Cryptographic Protocol Verification}, volume = {4/2002}, year = {2002}, missingmonth = {}, missingnmonth = {}, url = {http://www.nit.eu/archive?view=kwartalrok&rok=2002&kwartal=4} }
@proceedings{JGL:SECI, title = {{A}ctes du 1er {W}orkshop {I}nternational sur la {S}{\'e}curit{\'e} des {C}ommunications sur {I}nternet ({SECI}'02)}, booktitle = {{A}ctes du 1er {W}orkshop {I}nternational sur la {S}{\'e}curit{\'e} des {C}ommunications sur {I}nternet ({SECI}'02)}, editor = {Goubault{-}Larrecq, Jean}, publisher = {INRIA}, year = 2002, month = sep, address = {Tunis, Tunisia}, url = {http://www.lsv.ens-cachan.fr/~goubault/SECI-02/Final/actes-seci02/index.html} }
@inproceedings{JGL:SECI:pirates, address = {Tunis, Tunisia}, month = sep, year = 2002, publisher = {INRIA}, editor = {Goubault{-}Larrecq, Jean}, acronym = {{SECI}'02}, booktitle = {{A}ctes du 1er {W}orkshop {I}nternational sur la {S}{\'e}curit{\'e} des {C}ommunications sur {I}nternet ({SECI}'02)}, author = {Goubault{-}Larrecq, Jean}, title = {{V}{\'e}rification de protocoles cryptographiques: la logique {\`a} la rescousse!}, pages = {119-152}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-seci.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-seci.ps} }
@article{JGL:crypto:modeles, address = {Bordeaux, France}, publisher = {Groupe Pr{\'e}ventique}, journal = {Ph{\oe}bus, la revue de la s{\^u}ret{\'e} de fonctionnement}, author = {Goubault{-}Larrecq, Jean}, title = {{S}{\'e}curit{\'e}, mod{\'e}lisation et analyse de protocoles cryptographiques}, missingpages = {??}, volume = {20}, year = {2002}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/DOC/GL-Phoebus2002.doc} }
@techreport{JGL:dico:3.1, author = {Goubault{-}Larrecq, Jean and Pouzol, Jean-{\relax Ph}ilippe and Demri, St{\'e}phane and M{\'e}, Ludovic and Carle, P.}, missingauthor = {}, title = {Langages de d{\'e}tection d'attaques par signatures}, year = {2002}, month = jun, type = {Contract Report}, number = {(Sous-projet~3, livrable~1)}, institution = {Projet RNTL DICO}, oldhowpublished = {Sous-projet 3, livrable 1 du projet RNTL DICO. Version 1}, note = {30 pages} }
@inproceedings{LK-JB-LP-ZQ-RK-DASC-02, address = {Irvine, California, USA}, month = oct, year = 2002, volume = 1, publisher = {{IEEE} Aerospace and Electronic Systems Society}, acronym = {{DASC}'02}, booktitle = {{P}roceedings of the 21st {IEEE} {D}igital {A}vionics {S}ystems {C}onference ({DASC}'02)}, author = {Kristensen, Lars M. and Billington, Jonathan and Petrucci, Laure and Qureshi, Zahid H. and Kiefer, R.}, missingauthor = {}, title = {Formal specification and analysis of airborne mission systems}, pages = {4.D.4.1-4.D.4.13}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KBPQK-DASC-02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KBPQK-DASC-02.ps} }
@inproceedings{LMS-fossacs2002, address = {Grenoble, France}, month = apr, year = 2002, volume = 2303, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Engberg, Uffe}, acronym = {{FoSSaCS}'02}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'02)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {On Model Checking Durational {K}ripke Structures (Extended Abstract)}, pages = {264-279}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-fossacs2002.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMS-fossacs2002.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-fossacs2002.pdf}, abstract = {We consider quantitative model checking in \emph{durational Kripke structures} (Kripke structures where transitions have integer durations) with timed temporal logics where subscripts put quantitative constraints on the time it takes before a property is satisfied. We investigate the conditions that allow polynomial-time model checking algorithms for timed versions of CTL and exhibit an important gap between logics where subscripts of the form {"}\(= c\){"} (exact duration) are allowed, and simpler logics that only allow subscripts of the form {"}\(\leq c\){"} or {"}\(\geq c\){"} (bounded duration).\par A surprising outcome of this study is that it provides the second example of a \(\Delta_2^P\)-complete model checking problem.} }
@inproceedings{LMS-lics2002, address = {Copenhagen, Denmark}, month = jul, year = 2002, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'02}, booktitle = {{P}roceedings of the 17th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'02)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Temporal Logic with Forgettable Past}, pages = {383-392}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-lics2002.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMS-lics2002.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-lics2002.pdf}, doi = {10.1109/LICS.2002.1029846}, abstract = {We investigate NLTL, a linear-time temporal logic with forgettable past. NLTL can be exponentially more succinct than LTL + Past (which in turn can be more succinct than LTL). We study satisfiability and model checking for NLTL and provide optimal automata-theoretic algorithms for these EXPSPACE-complete problems.} }
@inproceedings{LP-LK-JB-ZQ-CRPIT-02, address = {Adelaide, Australia}, month = jun, year = 2002, volume = 12, series = {Conferences in Research and Practice in Information Technology}, publisher = {Australian Computer Society}, editor = {Lakos, Charles and Esser, Robert and Kristensen, Lars M. and Billington, Jonathan}, booktitle = {{P}roceedings of the {W}orkshops on {S}oftware {I}ngineering and {F}ormal {M}ethods and {F}ormal {M}ethods {A}pplied to {D}efence {S}ystems}, author = {Petrucci, Laure and Kristensen, Lars M. and Billington, Jonathan and Qureshi, Zahid H.}, title = {Towards Formal Specification and Analysis of Avionics Mission Systems}, pages = {95-104}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PKBQ-CRPIT02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PKBQ-CRPIT02.ps} }
@techreport{LSV:02:11, author = {Goubault{-}Larrecq, Jean and Verma, Kumar N.}, title = {Alternating Two-Way {AC}-Tree Automata}, type = {Research Report}, number = {LSV-02-11}, year = {2002}, month = sep, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {21 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-11.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-11.rr.ps} }
@techreport{LSV:02:12, author = {Fribourg, Laurent and Messika, St{\'e}phane and Picaronny, Claudine}, title = {Traces of Randomized Distributed Algorithms as {G}ibbs Fields}, type = {Research Report}, number = {LSV-02-12}, year = {2002}, month = sep, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {16 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-12.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-12.rr.ps} }
@techreport{LSV:02:13, author = {Lasota, S{\l}awomir}, title = {A Polynomial-Time Algorithm for Deciding True Concurrency Equivalences of {B}asic {P}arallel {P}rocesses}, type = {Research Report}, number = {LSV-02-13}, year = {2002}, month = sep, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {16 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-13.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-13.rr.ps} }
@techreport{LSV:02:18, author = {Goubault{-}Larrecq, Jean}, title = {Un algorithme pour l'analyse de logs}, type = {Research Report}, number = {LSV-02-18}, year = {2002}, month = nov, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {33 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-18.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-18.rr.ps} }
@techreport{LSV:02:3, author = {Cortier, V{\'e}ronique}, title = {Observational Equivalence and Trace Equivalence in an Extension of {S}pi-calculus. {A}pplication to Cryptographic Protocols Analysis. {E}xtended Version}, type = {Research Report}, number = {LSV-02-3}, year = {2002}, month = mar, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {33 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-3.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-3.rr.ps} }
@techreport{LSV:02:4, author = {Boisseau, Alexandre}, title = {Signatures {\'e}lectroniques de contrats}, type = {Research Report}, number = {LSV-02-4}, year = {2002}, month = apr, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {22 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-4.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-4.rr.ps} }
@techreport{LSV:02:7, author = {Goubault{-}Larrecq, Jean}, title = {{SKInT} Labels}, type = {Research Report}, number = {LSV-02-7}, year = {2002}, month = jul, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {15 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-7.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-7.rr.ps} }
@techreport{LSV:02:8, author = {Goubault{-}Larrecq, Jean}, title = {A Note on the Completeness of Certain Refinements of Resolution}, type = {Research Report}, number = {LSV-02-8}, year = {2002}, month = jul, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {16 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-8.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-8.rr.ps} }
@article{LabSch-NJC2002, journal = {Nordic Journal of Computing}, author = {Labroue, Anne and Schnoebelen, {\relax Ph}ilippe}, title = {An Automata-Theoretic Approach to the Reachability Analysis of {RPPS} Systems}, volume = {9}, number = {2}, pages = {118-144}, year = {2002}, month = jul, missingmonth = {dans DBLP, c'est summer}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LS-NJC.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LS-NJC.ps}, abstract = {We show how the reachability analysis of RPPS systems can be tackled with the tree-automata techniques proposed by Lugiez and Schnoebelen for PA. This approach requires that we express the states of RPPS systems in RPA, a tailor-made process rewrite system where reachability is a relation recognizable by finite tree-automata. Two outcomes of this study are (1)~an NP algorithm for reachability in RPPS systems, and (2)~a simple decision procedure for a large class of reachability problems in RPA systems.} }
@inproceedings{LabSch-express2001, address = {Aalborg, Denmark}, month = feb, year = 2002, number = 1, volume = 52, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Aceto, Luca and Panangaden, Prakash}, acronym = {{EXPRESS}'01}, booktitle = {{P}roceedings of the 8th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'01)}, author = {Labroue, Anne and Schnoebelen, {\relax Ph}ilippe}, title = {An Automata-Theoretic Approach to the Reachability Analysis of {RPPS} Systems}, pages = {1-20}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LabSch-express2001.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LabSch-express2001.ps}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LabSch-express2001.pdf}, doi = {10.1016/S1571-0661(04)00213-0} }
@article{LugSch-tcs, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Lugiez, Denis and Schnoebelen, {\relax Ph}ilippe}, title = {The Regular Viewpoint on {PA}-Processes}, volume = {274}, number = {1-2}, pages = {89-115}, year = {2002}, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LugSch-TCS99.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LugSch-TCS99.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LugSch-TCS99.pdf}, doi = {10.1016/S0304-3975(00)00306-6}, abstract = {PA is the process algebra allowing non-determinism, sequential and parallel compositions, and recursion. We suggest viewing PA-processes as trees, and using tree-automata techniques for verification problems on PA.\par Our main result is that the set of iterated predecessors of a regular set of PA-processes is a regular tree language, and similarly for iterated successors. Furthermore, the corresponding tree-automata can be built effectively in polynomial-time. This has many immediate applications to verification problems for PA-processes, among which a simple and general model-checking algorithm.} }
@inproceedings{MS-mfcs2002, address = {Warsaw, Poland}, month = aug, year = 2002, volume = 2420, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Diks, Krzysztof and Rytter, Wojciech}, acronym = {{MFCS}'02}, booktitle = {{P}roceedings of the 27th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'02)}, author = {Masson, Beno{\^\i}t and Schnoebelen, {\relax Ph}ilippe}, title = {On Verifying Fair Lossy Channel Systems}, pages = {543-555}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-mfcs2002-long.pdf}, abstract = {Lossy channel systems are systems of finite state automata that communicate via unreliable unbounded fifo channels. They are an important computational model because of the role they play in the algorithmic verification of communication protocols.\par In this paper, we show that fair termination is decidable for a large class of these systems.} }
@inproceedings{NM-express2002, address = {Brno, Czech Republic}, month = aug, year = 2002, number = 2, volume = 68, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Nestmann, Uwe and Panagaden, Prakash}, acronym = {{EXPRESS}'02}, booktitle = {{P}roceedings of the 9th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'02)}, author = {Markey, Nicolas}, title = {Past is for Free: {O}n the Complexity of Verifying Linear Temporal Properties with Past}, pages = {87-104}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NM-express2002.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/NM-express2002.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NM-express2002.pdf}, doi = {10.1016/S1571-0661(05)80366-4}, abstract = {We study the complexity of satisfiability and model-checking of the linear-time temporal logic with past~(PLTL). More precisely, we consider several fragments of PLTL, depending on the allowed set of temporal modalities, the use of negations or the nesting of future formulae into past formulae. Our~results show that {"}past is for free{"}, that is it does not bring additional theoretical complexity, even for small fragments, and even when nesting future formulae into past formulae. We~also remark that existential and universal model-checking can have different complexity for certain fragments.} }
@techreport{NowakDJJ:semddi2, author = {Lazi{\'c}, Ranko and Nowak, David}, title = {On a Semantic Definition of Data Independence}, type = {Research Report}, number = {CS-RR-392}, year = {2002}, month = dec, institution = {Department of Computer Science, University of Warwick, UK}, note = {19 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-LazNow.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-LazNow.ps} }
@techreport{PKB-DSTO-02, author = {Petrucci, Laure and Kristensen, Lars M. and Billington, Jonathan}, title = {Modelling and Analysis of Airborne Mission Systems}, oldtitle = {[.]{F}inal report for phase 4 - {DSTO/UniSA} contract}, year = {2002}, month = oct, type = {Final Report}, institution = {phase~4, {DSTO/UniSA} contract}, nmnote = {Voir ce que ca donne en sortie...}, note = {68 pages} }
@techreport{PKGEDBA-DSTO-02, author = {Petrucci, Laure and Kristensen, Lars M. and Gallasch, Guy E. and Elliot, M. and Dauchy, Pierre and Billington, Jonathan and Aziz, M.}, missingauthor = {}, title = {Modelling and Analysis of Airborne Mission Systems}, oldtitle = {{F}inal report for phase 3 - {DSTO/UniSA} contract}, year = {2002}, month = aug, type = {Contract Report}, number = {Final report for phase~3}, institution = {{DSTO/UniSA} contract}, note = {79 pages} }
@phdthesis{THESE-BLANC-2002, author = {Blanc, Benjamin}, title = {Prise en compte de principes architecturaux lors de la formalisation des besoins}, year = {2002}, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Blanc-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Blanc-these.ps} }
@phdthesis{THESE-BOUYER-2002, author = {Bouyer, Patricia}, title = {Mod{\`e}les et algorithmes pour la v{\'e}rification des syst{\`e}mes temporis{\'e}s}, year = {2002}, month = apr, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bouyer-these.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bouyer-these.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bouyer-these.ps} }
@phdthesis{THESE-FLEURY-2002, author = {Fleury, Emmanuel}, title = {Automates temporis{\'e}s avec mises {\`a} jour}, year = {2002}, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Fleury-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Fleury-these.ps} }
@phdthesis{THESE-LABROUE-2002, author = {Labroue, Anne}, title = {{M}{\'e}thodes alg{\'e}briques pour la v{\'e}rification des syst{\`e}mes infinis}, year = {2002}, month = jan, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Labroue-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Labroue-these.ps} }
@phdthesis{THESE-MAGNIETTE-2001, author = {Magniette, Fr{\'e}d{\'e}ric}, title = {Preuves d'algorithmes auto-stabilisants}, year = {2002}, month = jun, type = {Th{\`e}se de doctorat}, school = {Universit{\'e} Paris-Sud~11, Orsay, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/These-magniette.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/These-magniette.ps} }
@techreport{VPQ:AS22:final, author = {Halbwachs, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {{V}{\'e}rification de propri{\'e}t{\'e}s quantitatives}, year = {2002}, month = dec, type = {Final Report}, institution = {Action Sp\'ecifique~22 du D\'epartement STIC du CNRS}, oldhowpublished = {Rapport final de l'Action Sp\'ecifique 22 du D\'ept.\ STIC du CNRS} }
@article{acefl-JLAP, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Programming}, author = {Aceto, Luca and Laroussinie, Fran{\c{c}}ois}, title = {Is Your Model Checker on Time? {O}n the Complexity of Model Checking for Timed Modal Logics}, volume = {52-53}, pages = {7-51}, year = {2002}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/AceLar-JLAP.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/AceLar-JLAP.ps}, doi = {10.1016/S1567-8326(02)00022-X} }
@mastersthesis{baudet02DEA, author = {Baudet, Mathieu}, title = {Contr\^{o}le de ressource et {\'e}vitement des interblocages sur la m{\'e}moire}, year = {2002}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Baudet-dea02.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Baudet-dea02.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Baudet-dea02.pdf} }
@inproceedings{bbp-rttools02, address = {Copenhagen, Denmark}, month = aug, year = 2002, howpublished = {Technical Report 2002-025, Department of Information Technology, Uppsala University, Sweden}, publisher = {Uppsala University}, editor = {Petterson, Paul and Yi, Wang}, acronym = {{RT-TOOLS}'02}, booktitle = {{P}roceedings of the 2nd {W}orkshop on {R}eal-{T}ime {T}ools ({RT-TOOLS}'02)}, author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Petit, Antoine}, title = {Analysing the {PGM} Protocol with {UPPAAL}}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/pgmfin.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/pgmfin.ps}, abstract = {Pragmatic General Multicast (PGM) is a reliable multicast protocol, designed to minimize both the probability of negative acknowledgements (NAK) implosion and the loading of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference specification. \par In this paper, we focus on the main reliability property which PGM intends to guarantee: a receiver either receives all data packets from transmissions and repairs or is able to detect unrecoverable data packet loss.\par To this purpose, we propose a modelization of (a simplified version of) PGM via a network of timed automata. Using Uppaal model-checker, we then study the validity of the reliability property above, which turns out to not be always verified but to depend of the values of several parameters that we underscore.} }
@phdthesis{berard-hab-02, author = {B{\'e}rard, B{\'e}atrice}, title = {{V}{\'e}rification de mod{\`e}les temporis{\'e}s}, year = {2002}, month = apr, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris~7, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BB-habile.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BB-habile.ps} }
@mastersthesis{bertrand2002, author = {Bertrand, Nathalie}, title = {{V}{\'e}rification de canaux {\`a} pertes stochastiques}, year = {2002}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/NB-dea02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/NB-dea02.ps} }
@inproceedings{bh-fossacs2002, address = {Grenoble, France}, month = apr, year = 2002, volume = 2303, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Engberg, Uffe}, acronym = {{FoSSaCS}'02}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'02)}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {On the Integration of Observability and Reachability Concepts}, pages = {21-36}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BidHenFossacs02SHORT.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ BidHenFossacs02SHORT.ps} }
@article{bid-etalias-casl-tcs, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Astesiano, Egidio and Bidoit, Michel and Kirchner, H{\'e}l{\`e}ne and Krieg-Br{\"u}ckner, Bernd and Mosses, Peter D. and Sannella, Donald and Tarlecki, Andrzej}, title = {{CASL}: {T}he {C}ommon {A}lgebraic {S}pecification {L}anguage}, volume = {286}, number = {2}, pages = {153-196}, year = {2002}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CASL-TCS01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CASL-TCS01.ps} }
@article{comon02jtit, address = {Warsaw, Poland}, publisher = {Instytut {\L}{\k a}csno{\'s}ci}, journal = {Journal of Telecommunications and Information Technology}, author = {Comon, Hubert and Shmatikov, Vitaly}, title = {Is it Possible to Decide whether a Cryptographic Protocol is Secure or not?}, volume = {4/2002}, year = {2002}, pages = {5-15}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JTIT-CS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JTIT-CS.pdf} }
@article{cor-ITA, journal = {Informatique Th\'eorique et Applications}, author = {Cortier, V{\'e}ronique}, title = {About the Decision of Reachability for Register Machines}, volume = {36}, number = {4}, pages = {341-358}, year = {2002}, month = oct # {-} # dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cor-ITA.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cor-ITA.ps} }
@techreport{cortier-securify-eva7, author = {Cortier, V{\'e}ronique}, title = {Outil de v{\'e}rification {SECURIFY}}, year = {2002}, month = may, type = {Contract Report}, number = 7, institution = {projet RNTL~EVA}, note = {6 pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR7.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR7.pdf} }
@inproceedings{lasota-concur2002, address = {Brno, Czech Republic}, month = aug, year = 2002, volume = 2421, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Brim, Lubos and Jan{\v c}ar, Petr and K{\v{r}}et{\'i}nsk{\'y}, Mojm{\'i}r and Ku{\v c}era, Anton{\'\i}n}, acronym = {{CONCUR}'02}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'02)}, author = {Lasota, S{\l}awomir}, title = {Decidability of Strong Bisimilarity for Timed {BPP}}, pages = {562-578}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Las-concur2002.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Las-concur2002.ps} }
@mastersthesis{messika-dea, author = {Messika, St{\'e}phane}, title = {{V}{\'e}rification param{\'e}tr{\'e}e de r{\'e}seaux {\`a} processus probabiliste. {A}pplication du th{\'e}or{\`e}me de {H}ammersley et {C}lifford aux algorithmes distribu{\'e}s}, year = {2002}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Logique et Fondements de l'Informatique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Messika-dea02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Messika-dea02.ps} }
@phdthesis{petrucci-hab-02, author = {Petrucci, Laure}, title = {Mod{\'e}lisation, v{\'e}rification et applications}, year = {2002}, month = dec, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} d'{\'E}vry, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LP-habile.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LP-habile.ps} }
@article{phs-IPL2002, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Verifying Lossy Channel Systems has Nonprimitive Recursive Complexity}, volume = {83}, number = {5}, pages = {251-261}, year = {2002}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-IPL2002.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-IPL2002.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-IPL2002.pdf}, doi = {10.1016/S0020-0190(01)00337-4}, abstract = {Lossy channel systems are systems of finite state automata that communicate via unreliable unbounded fifo channels. It is known that reachability, termination and a few other verification problems are decidable for these systems. In this article we show that these problems cannot be solved in primitive recursive time.} }
@misc{phs-movep2002, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Temporal Logic and Verification}, year = 2002, month = jun, howpublished = {Invited tutorial, 5th {S}ummer {S}chool on {M}odelling and {V}erifying {P}arallel {P}rocesses ({MOVEP}'02), Nantes, France} }
@misc{securify1, author = {Cortier, V{\'e}ronique}, title = {{Securify} version 1}, year = {2002}, howpublished = {Available at \url{http://www.lsv.ens-cachan.fr/~cortier/EVA/securify.tar.gz}}, note = {Started 2001. See~\cite{cortier-securify-eva7} for description. Written in Caml (about 3200 lines)} }
@mastersthesis{zhang2002, author = {Zhang, Yu}, title = {Logical Relations For Names}, year = {2002}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ZY-dea02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ZY-dea02.ps} }
@article{ABBL02, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Aceto, Luca and Bouyer, Patricia and Burgue{\~n}o, Augusto and Larsen, Kim G.}, title = {The Power of Reachability Testing for Timed Automata}, volume = {300}, number = {1-3}, pages = {411-475}, year = {2003}, month = may, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-ABBL02.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-ABBL02.ps}, doi = {10.1016/S0304-3975(02)00334-1}, abstract = {The computational engine of the verification tool Uppaal consists of a collection of efficient reachability properties of systems. Model-checking of properties other than plain reachability ones may currently be carried out in such a tool as follows. Given a property \(\phi\) to model-check, the user must provide a test automaton~\(T_{\phi}\) for it. This test automaton must be such that the original system \(S\) has the property expressed by \(\phi\) precisely when none of the distinguished reject states of~\(T_{\phi}\) can be reached in the synchronized parallel composition of \(S\) with \(T_{\phi}\). This raises the question of which properties may be analyzed by {\scshape Uppaal} in such a way. This paper gives an answer to this question by providing a complete characterization of the class of properties for which model-checking can be reduced to reachability testing in the sense outlined above. This result is obtained as a corollary of a stronger statement pertaining to the compositionality of the property language considered in this study. In particular, it is shown that our language is the least expressive compositional language that can express a simple safety property stating that no reject state can ever be reached.\par Finally, the property language characterizing the power of reachability testing is used to provide a definition of characteristic properties with respect to a timed version of the ready simulation preorder, for nodes of \(\tau\)-free, deterministic timed automata.} }
@article{Alechina::Demri::DeRijke02, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Alechina, Natasha and Demri, St{\'e}phane and de Rijke, Maarten}, title = {A Modal Perspective on Path Constraints}, volume = {13}, number = {6}, pages = {939-956}, year = {2003}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/final-jlc-adr.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/final-jlc-adr.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/final-jlc-adr.pdf} }
@techreport{Averroes-4.1.1, author = {B{\'e}rard, B{\'e}atrice and Laroussinie, Fran{\c{c}}ois}, title = {V{\'e}rification compositionnelle des p-automates}, year = {2003}, month = nov, type = {Contract Report}, number = {(Lot~4.1 fourniture~1)}, institution = {Projet RNTL Averroes}, oldhowpublished = {Lot 4.1 fourniture 1, du projet RNTL Averroes}, note = {16~pages} }
@inproceedings{BBFL-tacas-2003, address = {Warsaw, Poland}, month = apr, year = 2003, volume = 2619, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Garavel, Hubert and Hatcliff, John}, acronym = {{TACAS}'03}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'03)}, author = {Behrmann, Gerd and Bouyer, Patricia and Fleury, Emmanuel and Larsen, Kim G.}, title = {Static Guard Analysis in Timed Automata Verification}, pages = {254-277}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBFL-tacas-2003.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBFL-tacas-2003.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBFL-tacas-2003.ps}, abstract = {By definition Timed Automata have an infinite state-space, thus for verification purposes, an exact finite abstraction is required. We propose a location-based finite zone abstraction, which computes an abstraction based on the relevant guards for a particular state of the model (as opposed to all guards). We show that the location-based zone abstraction is sound and complete with respect to location reachability; that it generalises active-clock reduction, in the sense that an inactive clock has no relevant guards at all; that it enlarges the class of timed automata, that can be verified. We generalise the new abstraction to the case of networks of timed automata, and experimentally demonstrate a potentially exponential speedup compared to the usual abstraction.} }
@inproceedings{BBP-msr2003, address = {Metz, France}, month = oct, year = 2003, publisher = {Herm{\`e}s}, editor = {M{\'e}ry, Dominique and Rezg, Nidhal and Xie, Xiaolan}, acronym = {{MSR}'03}, booktitle = {{A}ctes du 4{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'03)}, author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Petit, Antoine}, title = {Une analyse du protocole {PGM} avec {UPPAAL}}, pages = {415-430}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBP-msr2003.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBP-msr2003.ps}, abstract = {Pragmatic General Multicast (PGM) is a reliable multicast protocol, designed to minimize both the probability of negative acknowledgements (NAK) implosion and the loading of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference specification. In this paper, we focus on the main reliability property which PGM intends to guarantee: a receiver either receives all data packets from transmissions and repairs or is able to detect unrecoverable data packet loss. To this purpose, we propose a modelization of (a simplified version of) PGM via a network of timed automata. Using Uppaal model-checker, we then study the validity of the reliability property above, which turns out to not be always verified but to depend of the values of several parameters that we underscore.} }
@inproceedings{BDMP-cav-2003, address = {Boulder, Colorado, USA}, month = jul, year = 2003, volume = 2725, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hunt, Jr, Warren A. and Somenzi, Fabio}, acronym = {{CAV}'03}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'03)}, author = {Bouyer, Patricia and D'Souza, Deepak and Madhusudan, P. and Petit, Antoine}, title = {Timed Control with Partial Observability}, pages = {180-192}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDMP-CAV03.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDMP-CAV03.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDMP-CAV03.ps}, abstract = {We consider the problem of synthesizing controllers for timed systems modeled using timed automata. The point of departure from earlier work is that we consider controllers that have only a partial observation of the system that it controls. In discrete event systems (where continuous time is not modeled), it is well known how to handle partial observability, and decidability issues do not differ from the complete information setting. We show however that timed control under partial observability is undecidable even for internal specifications (while the analogous problem under complete observability is decidable) and we identify a decidable subclass.} }
@article{BFKM-FMSD, publisher = {Kluwer Academic Publishers}, journal = {Formal Methods in System Design}, author = {B{\'e}rard, B{\'e}atrice and Fribourg, Laurent and Klay, Francis and Monin, Jean-Fran{\c{c}}ois}, title = {A Compared Study of Two Correctness Proofs for the Standardized Algorithm of {ABR} Conformance}, volume = {22}, number = {1}, pages = {59-86}, year = {2003}, month = jan, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFKM-FMSD.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFKM-FMSD.ps}, doi = {10.1023/A:1021704214464} }
@techreport{BFN-edf10, author = {Bardin, S{\'e}bastien and Finkel, Alain and Nowak, David}, title = {Note de synth{\`e}se {\`a}~10~mois}, year = {2003}, month = aug, type = {Contract Report}, number = {P11L03/F01304/0 + 50.0241}, institution = {collaboration entre EDF et le LSV}, oldhowpublished = {Contrat P11L03/F01304/0 et 50.0241 de collaboration entre EDF et le LSV}, note = {21~pages} }
@techreport{BFN-edf12, author = {Bardin, S{\'e}bastien and Finkel, Alain and Nowak, David}, title = {Rapport final}, year = {2003}, month = nov, type = {Contract Report}, number = {P11L03/F01304/0 + 50.0241}, institution = {collaboration entre EDF et le LSV}, oldhowpublished = {Contrat P11L03/F01304/0 et 50.0241 de collaboration entre EDF et le~LSV}, note = {50~pages} }
@techreport{BFNS-edf6, author = {Bardin, S{\'e}bastien and Finkel, Alain and Nowak, David and Schnoebelen, {\relax Ph}ilippe}, title = {Note de synth{\`e}se {\`a} 6 mois}, year = {2003}, month = jul, type = {Contract Report}, number = {P11L03/F01304/0 + 50.0241}, institution = {collaboration entre EDF et le LSV}, oldhowpublished = {Contrat P11L03/F01304/0 et 50.0241 de collaboration entre EDF et le LSV}, note = {43~pages} }
@inproceedings{BP-msr03, address = {Metz, France}, month = oct, year = 2003, publisher = {Herm{\`e}s}, editor = {M{\'e}ry, Dominique and Rezg, Nidhal and Xie, Xiaolan}, acronym = {{MSR}'03}, booktitle = {{A}ctes du 4{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'03)}, author = {Baclet, Manuel and Pacalet, Renaud}, title = {V{\'e}rifications du protocole~{VCI}}, pages = {431-445}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/vci-msr03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/vci-msr03.ps} }
@article{BPT03, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bouyer, Patricia and Petit, Antoine and Th{\'e}rien, Denis}, title = {An Algebraic Approach to Data Languages and Timed Languages}, volume = {182}, number = {2}, pages = {137-162}, year = {2003}, month = may, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BPT-IetC.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BPT-IetC.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BPT-IetC.ps}, abstract = {Algebra offers an elegant and powerful approach to understand regular languages and finite automata. Such framework has been notoriously lacking for timed languages and timed automata. We introduce the notion of monoid recognizability for data languages, which includes timed languages as special case, in away that respects the spirit of the classical situation. We study closure properties and hierarchies in this model, and prove that emptiness is decidable under natural hypotheses. Our class of recognizable languages properly includes many families of deterministic timed languages that have been proposed until now, and the same holds for non-deterministic versions.} }
@inproceedings{BerSch-fossacs2003, address = {Warsaw, Poland}, month = apr, year = 2003, volume = 2620, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gordon, Andrew D.}, acronym = {{FoSSaCS}'03}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'03)}, author = {Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {Model Checking Lossy Channels Systems Is Probably Decidable}, pages = {120-135}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerSch-fossacs2003.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BerSch-fossacs2003.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerSch-fossacs2003.pdf}, abstract = {Lossy channel systems (LCS's) are systems of finite state automata that communicate via unreliable unbounded fifo channels. We propose a new probabilistic model for these systems, where losses of messages are seen as faults occurring with some given probability, and where the internal behavior of the system remains nondeterministic, giving rise to a reactive Markov chains semantics. We then investigate the verification of linear-time properties on this new model.} }
@inproceedings{Bernat-spv2003, address = {Marseilles, France}, month = sep, year = 2003, editor = {Rusinowitch, Micha{\"e}l}, acronym = {{SPV}'03}, booktitle = {{P}roceedings of the {W}orkshop on {S}ecurity {P}rotocols {V}erification ({SPV}'03)}, author = {Bernat, Vincent}, title = {Towards a Logic for Verification of Security Protocols}, pages = {31-35}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bernat-spv2003.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bernat-spv2003.ps} }
@inproceedings{Bou-stacs-2003, address = {Berlin, Germany}, month = feb, year = 2003, volume = 2607, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alt, Helmut and Habib, Michel}, acronym = {{STACS}'03}, booktitle = {{P}roceedings of the 20th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'03)}, author = {Bouyer, Patricia}, title = {Untameable Timed Automata!}, pages = {620-631}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bou-stacs2003.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bou-stacs2003.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-stacs2003.ps}, abstract = {Timed automata are a widely studied model for real-time systems. Since 8~years, several tools implement this model and are successfully used to verify real-life examples. In spite of this well-established framework, we prove that the forward analysis algorithm implemented in these tools is not correct! However, we also prove that it is correct for a restricted class of timed automata, which has been sufficient for modeling numerous real-life systems.} }
@article{CNNR-tocl03, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Comon, Hubert and Narendran, Paliath and Nieuwenhuis, Robert and Rusinowitch, Micha{\"e}l}, title = {Deciding the Confluence of Ordered Term Rewrite Systems}, volume = {4}, number = {1}, pages = {33-55}, year = {2003}, month = jan }
@inproceedings{ComCor-esop2003, address = {Warsaw, Poland}, month = apr, year = 2003, volume = 2618, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo}, acronym = {{ESOP}'03}, booktitle = {{P}roceedings of the 12th {E}uropean {S}ymposium on {P}rogramming ({ESOP}'03)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique}, title = {Security properties: two agents are sufficient}, pages = {99-113}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierESOP03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierESOP03.ps} }
@inproceedings{ComCor-rta2003, address = {Valencia, Spain}, month = jun, year = 2003, volume = 2706, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nieuwenhuis, Robert}, acronym = {{RTA}'03}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'03)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique}, title = {New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols}, pages = {148-164}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-2.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-2.rr.ps} }
@article{ComJac-IC2003, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Comon, Hubert and Jacquemard, Florent}, title = {Ground Reducibility is {EXPTIME}-complete}, volume = {187}, number = {1}, pages = {123-153}, year = {2003}, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CJ-icomp.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CJ-icomp.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CJ-icomp.ps} }
@inproceedings{ComTre-mann03, month = feb, year = 2003, volume = 2772, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dershowitz, Nachum}, acronym = {{V}erification: {T}heory and {P}ractice}, booktitle = {{V}erification: {T}heory and {P}ractice, {E}ssays {D}edicated to {Z}ohar {M}anna on the {O}ccasion of {H}is 64th {B}irthday}, author = {Comon{-}Lundh, Hubert and Treinen, Ralf}, title = {Easy Intruder Deductions}, pages = {225-242}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CT-manna.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CT-manna.ps} }
@inproceedings{Del-spv2003, address = {Marseilles, France}, month = sep, year = 2003, editor = {Rusinowitch, Micha{\"e}l}, acronym = {{SPV}'03}, booktitle = {{P}roceedings of the {W}orkshop on {S}ecurity {P}rotocols {V}erification ({SPV}'03)}, author = {Delaune, St{\'e}phanie}, title = {Intruder Deduction Problem in Presence of Guessing Attacks}, pages = {26-30}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Del-spv2003.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Del-spv2003.pdf}, abstract = {We present a decidability result in the context of the verification of cryptographic protocols in presence of data which take value in a finite known set. Since the perfect cryptography assumption is unrealistic for cryptographic protocols that employ weak data, we extend the conventional Dolev-Yao model to consider guessing attacks, where an intruder guesses the values of weak data and verify these guesses. We show that the intruder deduction problem, i.e. the existence of guessing attack, can be decided in polynomial time for the extended Dolev-Yao model.} }
@mastersthesis{Delaune-dea2003, author = {Delaune, St{\'e}phanie}, title = {V{\'e}rification de protocoles de s{\'e}curit{\'e} dans un mod{\`e}le de l'intrus {\'e}tendu}, year = {2003}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Delaune-dea2003.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Delaune-dea2003.ps} }
@article{Demri02, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Demri, St{\'e}phane}, title = {A Polynomial-Space Construction of Tree-Like Models for Logics with Local Chains of Modal Connectives}, volume = {300}, number = {1-3}, pages = {235-258}, year = {2003}, month = may, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-tcs02.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/demri-tcs02.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-tcs02.pdf}, doi = {10.1016/S0304-3975(02)00082-8} }
@misc{Demri03, author = {Demri, St{\'e}phane}, title = {({M}odal) Logics for Semistructured Data (Bis)}, year = 2003, month = sep, howpublished = {Invited talk, 3rd {W}orkshop on {M}ethods for {M}odalities ({M4M}'03), Nancy, France} }
@inproceedings{Demri::DeNivelle03b, address = {Nancy, France}, month = sep, year = 2003, acronym = {{M4M-3}}, booktitle = {{P}roceedings of the 3rd {W}orkshop on {M}ethods for {M}odalities ({M4M-3})}, author = {Demri, St{\'e}phane and de Nivelle, Hans}, title = {Relational Translations into {GF2}}, pages = {93-108} }
@techreport{EVA-TR13, author = {Cortier, V{\'e}ronique}, title = {A Guide for {SECURIFY}}, year = {2003}, month = dec, number = 13, institution = {projet RNTL~EVA}, oldhowpublished = {Rapport technique num\'ero 13 du projet RNTL EVA}, note = {9~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR13.pdf} }
@techreport{EVA-TR9, author = {Jacquemard, Florent}, title = {The {EVA} Translator, version~2}, year = {2003}, month = jul, number = 9, institution = {projet RNTL EVA}, oldhowpublished = {Rapport technique num\'ero 9 du projet RNTL EVA}, note = {38~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR9.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EVA-TR9.pdf} }
@misc{EVA2, author = {Jacquemard, Florent}, title = {The {EVA} translator, version~2}, year = {2003}, month = jul, oldhowpublished = {Available??}, note = {See~\cite{EVA-TR9} for description. Written in OCaml (about 11000 lines)}, note-fr = {Voir~\cite{EVA-TR9} pour la description. \'Ecrit en OCaml (environ 11000 lignes)} }
@inproceedings{FAST-cav03, address = {Boulder, Colorado, USA}, month = jul, year = 2003, volume = 2725, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hunt, Jr, Warren A. and Somenzi, Fabio}, acronym = {{CAV}'03}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'03)}, author = {Bardin, S{\'e}bastien and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Petrucci, Laure}, title = {{FAST}: {F}ast {A}cceleration of {S}ymbolic {T}ransition Systems}, pages = {118-121}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FAST-cav03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FAST-cav03.ps}, abstract = {FAST is a tool for the analysis of infinite systems. This paper describes the underlying theory, the architecture choices that have been made in the tool design. The user must provide a model to analyse, the property to check and a computation policy. Several such policies are proposed as a standard in the package, others can be added by the user. FAST capabilities are compared with those of other tools. A range of case studies from the literature has been investigated. } }
@article{FPS-ICOMP, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Finkel, Alain and Purushothaman{ }Iyer, S. and Sutre, Gr{\'e}goire}, title = {Well-Abstracted Transition Systems: {A}pplication to {FIFO} Automata}, volume = {181}, number = {1}, pages = {1-31}, year = {2003}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FPS-ICOMP.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FPS-ICOMP.ps} }
@misc{Fast1-manual, author = {Bardin, S{\'e}bastien and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Petrucci, Laure and Worobel, Laurent}, title = {{FAST} User's Manual}, year = {2003}, month = aug, oldhowpublished = {Available at \url{http://www.lsv.ens-cachan.fr/fast/doc/manual.ps}}, note = {33~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FAST-manual.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FAST-manual.ps} }
@misc{FinLer-FAST2002, author = {Bardin, S{\'e}bastien and Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {{FAST} v1.0: {F}ast {A}cceleration of {S}ymbolic {T}ransition Systems}, year = {2003}, month = jul, oldhowpublished = {Available at \url{www.lsv.ens-cachan.fr/fast/}}, note = {See~\cite{FAST-cav03} for description. Written in C++ (about 4400 lines on top of the MONA v1.4 library)}, note-fr = {Voir~\cite{FAST-cav03} pour la description. \'Ecrit en C++ (environ 4400 lignes ajout\'ees \`a la biblioth\`eque MONA~v1.4)}, url = {http://www.lsv.ens-cachan.fr/fast/} }
@inproceedings{GB03aplas, address = {Beijing, China}, month = nov, year = 2003, volume = 2895, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ohori, Atsushi}, acronym = {{APLAS}'03}, booktitle = {{P}roceedings of the 1st {A}sian {S}ymposium on {P}rogramming {L}anguages and {S}ystems ({APLAS}'03)}, author = {Galland, Antoine and Baudet, Mathieu}, title = {Controlling and Optimizing the Usage of One Resource}, pages = {195-211}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GB03aplas.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GB03aplas.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GB03aplas.pdf}, abstract = {This paper studies the problem of resource availability in the context of mobile code for embedded systems such as smart cards. It presents an architecture dedicated to controlling the usage of a single resource in a multi-process operating system. Its specificity lies in its ability to improve the task scheduling in order to spare resources. Our architecture comprises two parts. The first statically computes the resource needs using a dedicated lattice. The second guarantees at runtime that there will always be enough resources for every application to terminate, thanks to an efficient deadlock-avoidance algorithm. The example studied here is an implementation on a JVM (Java Virtual Machine) for smart cards, dealing with a realistic subset of the Java bytecode.} }
@inproceedings{GB03cfse, address = {La Colle sur Loup, France}, month = oct, year = 2003, publisher = {INRIA}, editor = {Auguin, Michel and Baude, Fran{\c{c}}oise and Lavenier, Dominique and Riveill, Michel}, acronym = {{CFSE}'03}, booktitle = {{A}ctes de la 3{\`e}me {C}onf{\'e}rence {F}ran{\c{c}}aise sur les {S}yst{\`e}mes d'{E}xploitation ({CFSE}'03)}, author = {Galland, Antoine and Baudet, Mathieu}, title = {{\'E}conomiser l'or du banquier}, pages = {638-649}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GB03cfse.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GB03cfse.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GB03cfse.pdf} }
@misc{INTERFAST, author = {Worobel, Laurent}, title = {{INTERFAST}~v1.0: {A}~{GUI} for {FAST}}, year = {2003}, month = aug, oldhowpublished = {Available at \url{www.lsv.ens-cachan.fr/fast/}}, note = {See~\cite{Fast1-manual} for description. Written in Java (6300 lines) and C (1600 lines), using Java Cup}, note-fr = {Voir~\cite{Fast1-manual} pour la description. \'Ecrit en Java (6300 lignes) et C (1600 lignes), utilise Java Cup}, url = {http://www.lsv.ens-cachan.fr/fast/} }
@article{JGL:S4:geometry, lsv-note = {Published in partnership with International Press}, publisher = {HHA Publications}, journal = {Homology, Homotopy and Applications}, author = {Goubault{-}Larrecq, Jean and Goubault, {\'E}ric}, title = {On the Geometry of Intuitionistic {S4} Proofs}, volume = {5}, number = {2}, pages = {137-209}, year = {2003}, missingmonth = {}, missingnmonth = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/S4G.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/S4G.ps} }
@techreport{JGL:dico:3.3, author = {Demri, St{\'e}phane and Ducass{\'e}, Mireille and Goubault{-}Larrecq, Jean and M{\'e}, Ludovic and Olivain, Julien and Picaronny, Claudine and Pouzol, Jean-{\relax Ph}ilippe and Totel, {\'E}ric and Vivinis, Bernard}, title = {Algorithmes de d{\'e}tection et langages de signatures}, year = {2003}, month = oct, type = {Contract Report}, number = {(Sous-projet~3, livrable~3)}, institution = {projet RNTL DICO}, oldhowpublished = {Sous-projet 3, livrable 3 du projet RNTL DICO. Version~1}, note = {72~pages} }
@article{Jac-IPL03, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Jacquemard, Florent}, title = {Reachability and Confluence are Indecidable for Flat Term Rewriting Systems}, volume = {87}, number = {5}, pages = {265-270}, year = {2003}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-6.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-6.rr.ps} }
@inproceedings{KNT-icfem2003, address = {Singapore}, month = nov, year = 2003, volume = 2885, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Song Dong, Jin and Woodcock, Jim}, acronym = {{ICFEM}'03}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {F}ormal {E}ngineering {M}ethods ({ICFEM}'03)}, author = {Kerb{\oe}uf, Micka{\"e}l and Nowak, David and Talpin, Jean-Pierre}, title = {Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures}, pages = {359-374}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KNT-icfem03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KNT-icfem03.ps} }
@book{LLSdFbook-2003, editor = {David, {\relax Ph}ilippe and Waeselynck, H{\'e}l{\`e}ne}, title = {Logiciel libre et s{\^u}ret{\'e} de fonctionnement: cas des syst{\`e}mes critiques}, year = {2003}, publisher = {Herm{\`e}s}, oldpublisher = {Herm\`es Lavoisier}, oldnote = {Ouvrage collectif r\'edig\'e sous la direction de Ph.~David et H.~Waeselynck}, isbn = {2-7462-0727-3}, url = {http://www.lavoisier.fr/fr/livres/index.asp?texte=2746207270&select=isbn} }
@inproceedings{LP-LK-JB-ZQ-02, address = {Guimar{\~a}es, Portugal}, month = jun, year = 2003, publisher = {{IEEE} Computer Society Press}, editor = {Lilius, Johan and Balarin, Felice and Machado, Ricardo J.}, acronym = {{ACSD}'03}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'03)}, author = {Petrucci, Laure and Kristensen, Lars M. and Billington, Jonathan and Qureshi, Zahid H.}, title = {Developing a Formal Specification for the Mission System of a Maritime Surveillance Aircraft}, pages = {92-101}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PKBQ-ACSD.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PKBQ-ACSD.ps} }
@techreport{LSV:03:1, author = {Comon{-}Lundh, Hubert and Shmatikov, Vitaly}, title = {Constraint Solving, Exclusive Or and the Decision of Confidentiality for Security Protocols Assuming a Bounded Number of Sessions}, type = {Research Report}, number = {LSV-03-1}, year = {2003}, month = jan, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {17~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-1.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-1.rr.ps} }
@techreport{LSV:03:10, author = {Fribourg, Laurent and Messika, St{\'e}phane and Picaronny, Claudine}, title = {Traces of Randomized Distributed Algorithms As {M}arkov Fields. {A}pplication to Rapid Mixing}, type = {Research Report}, number = {LSV-03-10}, year = {2003}, month = jul, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {19~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-10.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-10.rr.ps} }
@techreport{LSV:03:12, author = {Baclet, Manuel}, title = {Logical Characterization of Aperiodic Data Languages}, type = {Research Report}, number = {LSV-03-12}, year = {2003}, month = sep, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {16~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-12.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-12.rr.ps} }
@techreport{LSV:03:15, author = {Delaune, St{\'e}phanie}, title = {V{\'e}rification de protocoles de s{\'e}curit{\'e} dans un mod\`ele de l'intrus {\'e}tendu}, type = {Research Report}, number = {LSV-03-15}, year = 2003, month = nov, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, fulladdress = lsvaddr, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-15.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-15.rr.ps}, abstract = {La difficult\'e de la conception des protocoles de s\'ecurit\'e tient au fait que les messages \'echang\'es peuvent \^etre \'ecout\'es, intercept\'es ou modifi\'es par une tierce personne: la fiabilit\'e de ces protocoles d\'epend donc du pouvoir de d\'eduction que l'on donne \`a l'intrus.\par Ce m\'emoire contient d'une part la formalisation et l'\'etude d'un nouveau mod\`ele d'intrus \'etendant le mod\`ele standard de Dolev-Yao pour prendre en compte les attaques par pr\'edictions, et d'autre part une pr\'esentation de r\'esultats utiles pour la v\'erification pratique des protocoles.} }
@techreport{LSV:03:7, author = {Fribourg, Laurent and Messika, St{\'e}phane and Picaronny, Claudine}, title = {On the Absence of Phase Transition in Randomized Distributed Algorithms}, type = {Research Report}, number = {LSV-03-7}, year = {2003}, month = apr, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {17~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2003-7.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2003-7.rr.ps} }
@inproceedings{LazNow-tlca2003, address = {Valencia, Spain}, month = jun, year = 2003, volume = 2701, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hofmann, Martin}, acronym = {{TLCA}'03}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {T}yped {L}ambda {C}alculi and {A}pplications ({TLCA}'03)}, author = {Lazi{\'c}, Ranko and Nowak, David}, title = {On a Semantic Definition of Data Independence}, pages = {226-240}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-LazNow.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RR-LazNow.ps} }
@misc{MR:MOP, author = {Roger, Muriel}, title = {{MOP}: {MO}dular {P}rover}, year = {2003}, note = {See description in~\cite{THESE-ROGER-2003,GLRV:acm}. Written in OCaml (9611 lines)}, note-fr = {Voir la description dans~\cite{THESE-ROGER-2003,GLRV:acm}. \'Ecrit en OCaml (9611 lignes)} }
@inproceedings{MarSch-concur2003, address = {Marseilles, France}, month = aug, year = 2003, volume = 2761, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto M. and Lugiez, Denis}, acronym = {{CONCUR}'03}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'03)}, author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Model Checking a Path (Preliminary Report)}, pages = {251-265}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MarSch-concur03.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MarSch-concur03.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MarSch-concur03.pdf}, doi = {10.1007/b11938}, abstract = {We consider the problem of checking whether a finite (or ultimately periodic) run satisfies a temporal logic formula. This problem is at the heart of {"}runtime verification{"} but it also appears in many other situations. By considering several extended temporal logics, we show that the problem of model checking a path can usually be solved efficiently, and profit from specialized algorithms. We further show it is possible to efficiently check paths given in compressed form.} }
@inproceedings{Sch-icalp2003, address = {Eindhoven, The Netherlands}, month = jun, year = 2003, volume = 2719, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baeten, Jos C. M. and Lenstra, Jan Karel and Parrow, Joachim and Woeginger, Gerhard J.}, acronym = {{ICALP}'03}, booktitle = {{P}roceedings of the 30th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'03)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Oracle circuits for branching-time model checking}, pages = {790-801}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-icalp03-long.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-icalp03-long.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-icalp03-long.pdf}, abstract = {A special class of oracle circuits with tree-vector form is introduced. It is shown that they can be evaluated in deterministic polynomial-time with a polylog number of adaptive queries to an NP oracle. This framework allows us to evaluate the precise computational complexity of model checking for some branching-time logics where it was known that the problem is NP-hard and coNP-hard.} }
@phdthesis{THESE-BOISSEAU-2003, author = {Boisseau, Alexandre}, title = {Abstractions pour la v{\'e}rification de propri{\'e}t{\'e}s de s{\'e}curit{\'e} de protocoles cryptographiques}, year = {2003}, month = sep, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Boisseau-these.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Boisseau-these.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Boisseau-these.pdf} }
@phdthesis{THESE-CORTIER-2003, author = {Cortier, V{\'e}ronique}, title = {V{\'e}rification automatique des protocoles cryptographiques}, year = {2003}, month = mar, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cortier-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Cortier-these.ps} }
@phdthesis{THESE-DUFLOT-2003, author = {Duflot, Marie}, title = {Algorithmes distribu{\'e}s sur des anneaux param{\'e}tr{\'e}s~--- {P}reuves de convergence probabiliste et d{\'e}terministe}, year = {2003}, month = sep, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Duflot-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Duflot-these.ps} }
@phdthesis{THESE-LEROUX-2003, author = {Leroux, J{\'e}r{\^o}me}, title = {Algorithmique de la v{\'e}rification des syst{\`e}mes {\`a} compteurs. {A}pproximation et acc{\'e}l{\'e}ration. {I}mpl{\'e}mentation de l'outil~{FAST}}, year = {2003}, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Leroux-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Leroux-these.ps} }
@phdthesis{THESE-MARKEY-2003, author = {Markey, Nicolas}, title = {Logiques temporelles pour la v{\'e}rification: expressivit{\'e}, complexit{\'e}, algorithmes}, year = {2003}, month = apr, type = {Th{\`e}se de doctorat}, school = {Laboratoire d'Informatique Fondamentale d'Orl{\'e}ans, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Markey-these.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Markey-these.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Markey-these.pdf} }
@phdthesis{THESE-ROGER-2003, author = {Roger, Muriel}, title = {Raffinements de la r{\'e}solution et v{\'e}rification de protocoles cryptographiques}, year = {2003}, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Roger-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Roger-these.ps} }
@phdthesis{THESE-VERMA-2003, author = {Verma, Kumar N.}, title = {Automates d'arbres bidirectionnels modulo th{\'e}ories {\'e}quationnelles}, year = {2003}, month = sep, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Verma-these.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Verma-these.ps} }
@misc{TSMVv1.0, author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {{TSMV}~v1.0}, year = {2003}, month = oct, howpublished = {Available at \url{http://www.lsv.ens-cachan.fr/~markey/TSMV/}}, note = {See description in~\cite{MS-formats2004}. Written in C (about 4000~lines on top of NuSMV v2.1.2)}, note-fr = {Voir la description dans~\cite{MS-formats2004}. \'Ecrit en C (environ 4000~lignes \`ajout\'ees \`a NuSMV~v2.1.2)}, url = {http://www.lsv.ens-cachan.fr/~markey/TSMV/} }
@inproceedings{ZhaNow-csl2003, address = {Vienna, Austria}, month = aug, year = 2003, volume = 2803, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baaz, Matthias and Makowsky, Johann A.}, acronym = {{CSL}'03}, booktitle = {{P}roceedings of the 17th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'03)}, author = {Zhang, Yu and Nowak, David}, title = {Logical Relations for Dynamic Name Creation}, pages = {575-588}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ZN-csl2003.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ZN-csl2003.ps} }
@techreport{artist-W1A2N1Y1, author = {Jonsson, Bengt and others}, title = {Roadmap on Component-based Design and Integration Platforms}, year = {2003}, month = may, type = {Contract Report}, number = {(Deliverable W1.A2.N1.Y1)}, institution = {European Project IST-2001-34820 {"}ARTIST{"} Advanced Real-Time Systems}, oldhowpublished = {Deliverable W1.A2.N1.Y1 of European Project IST-2001-34820 ``ARTIST'' Advanced Real-Time Systems}, note = {78~pages} }
@article{bhk-tcs-fossacs01, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Bidoit, Michel and Hennicker, Rolf and Kurz, Alexander}, title = {Observational Logic, Constructor-Based Logic, and their Duality}, volume = {298}, number = {3}, pages = {471-510}, year = {2003}, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHK-TCS-FOSSACS01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHK-TCS-FOSSACS01.ps} }
@inproceedings{comon03lics, address = {Ottawa, Canada}, month = jun, year = 2003, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'03}, booktitle = {{P}roceedings of the 18th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'03)}, author = {Comon{-}Lundh, Hubert and Shmatikov, Vitaly}, title = {Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive Or}, pages = {271-280} }
@incollection{couvreur-chap03, author = {Couvreur, Jean-Michel and Poitrenaud, Denis}, title = {{D}{\'e}pliage pour la v{\'e}rification de propri{\'e}t{\'e}s temporelles}, chapter = {3}, editor = {Michel Diaz}, booktitle = {V{\'e}rification et mise en {\oe}uvre des r{\'e}seaux de {P}etri~--- Tome~2}, pages = {127-161}, year = {2003}, month = jan, publisher = {Herm{\`e}s} }
@inproceedings{couvreur-lpar03, address = {Almaty, Kazakhstan}, month = sep, year = 2003, volume = 2850, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Vardi, Moshe Y. and Voronkov, Andrei}, acronym = {{LPAR}'03}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'03)}, author = {Couvreur, Jean-Michel and Saheb, Nasser and Sutre, Gr{\'e}goire}, title = {An Optimal Automata Approach to {LTL} Model Checking of Probabilistic Systems}, pages = {361-375}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CSS-lpar03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CSS-lpar03.ps} }
@misc{fl-cours-etr2003, author = {Laroussinie, Fran{\c{c}}ois}, title = {Automates temporis{\'e}s et hybrides, mod{\'e}lisation et v{\'e}rification}, year = {2003}, month = sep, howpublished = {Invited lecture, \'ecole d'\'et\'e ETR 2003 (\'Ecole Temps R\'eel), Toulouse, France} }
@inproceedings{invLP-ICATPN-03, address = {Eindhoven, The Netherlands}, month = jun, year = 2003, volume = 2679, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van der Aalst, Wil M. P. and Best, Eike}, acronym = {{ICATPN}'03}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({ICATPN}'03)}, author = {Billington, Jonathan and Christensen, S{\o}ren and van Hee, Kees M. and Kindler, Ekkart and Kummer, Olaf and Petrucci, Laure and Post, Reinier and Stehno, {\relax Ch}ristian and Weber, Michael}, title = {The {P}etri {N}et {M}arkup {L}anguage: {C}oncepts, Technology and Tools}, pages = {483-505}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PNML-ATPN03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PNML-ATPN03.ps} }
@article{lst-TCS2001, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe and Turuani, Mathieu}, title = {On the Expressivity and Complexity of Quantitative Branching-Time Temporal Logics}, volume = {297}, number = {1-3}, pages = {297-315}, year = {2003}, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LST-TCS01.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LST-TCS01.ps}, doi = {10.1016/S0304-3975(02)00644-8}, abstract = {We investigate extensions of CTL allowing to express quantitative requirements about an abstract notion of time in a simple discrete-time framework, and study the expressive power of several relevant logics.\par When only subscripted modalities are used, polynomial-time model checking is possible even for the largest logic we consider, while the introduction of freeze quantifiers leads to a complexity blow-up.} }
@article{markey-beatcs, publisher = {European Association for Theoretical Computer Science}, journal = {EATCS Bulletin}, author = {Markey, Nicolas}, title = {Temporal Logic with Past is Exponentially More Succinct}, volume = {79}, pages = {122-128}, year = {2003}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NM-succinct.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/NM-succinct.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NM-succinct.pdf}, abstract = {We positively answer the old question whether temporal logic with past is more succinct than pure-future temporal logic. Surprisingly, the proof is quite simple and elementary, although the question has been open for twenty years.} }
@mastersthesis{mongi-dea2003, author = {Ben{ }Gaid, Mongi}, title = {Mod{\'e}lisation et v{\'e}rification des aspects temporis{\'e}s des langages pour automates programmables industriels}, year = {2003}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Informatique Distribu{\'e}e, Orsay, France}, note = {68~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mongi-dea2003.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mongi-dea2003.pdf} }
@inproceedings{phs-aiml02, address = {Toulouse, France}, unsure-month = sep, unsure-nmonth = 9, year = 2003, optaddress = {London, UK}, publisher = {King's College Publication}, editor = {Balbiani, {\relax Ph}ilippe and Suzuki, Nobu-Yuki and Wolter, Frank and Zakharyaschev, Michael}, acronym = {{AiML}'02}, booktitle = {{S}elected {P}apers from the 4th {W}orkshop on {A}dvances in {M}odal {L}ogics ({AiML}'02)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {The Complexity of Temporal Logic Model Checking}, chapter = {19}, pages = {393-436}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-aiml02.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-aiml02.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-aiml02.pdf} }
@misc{phs-svhss2003, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Model Checking Branching-Time Temporal Logics}, year = {2003}, month = may, howpublished = {Invited talk, Franco-Israeli Workshop on Semantics and Verification of Hardware and Software Systems, Tel-Aviv, Israel} }
@misc{securify2, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {{Securify} version~2}, year = {2003}, missingmonth = {}, missingnmonth = {}, oldhowpublished = {Available at \url{http://www.lsv.ens-cachan.fr/~cortier/EVA/securify2.tar.gz}}, note = {See~\cite{EVA-TR13} for description. Written in Caml (about 3300 lines)}, note-fr = {Voir~\cite{EVA-TR13} pour la description. \'Ecrit en Caml (environ 3300 lignes)}, url = {http://www.lsv.ens-cachan.fr/~cortier/EVA/securify2.tar.gz} }
@misc{spore, author = {Jacquemard, Florent}, title = {{SPORE}: {S}ecurity {P}rotocols {O}pen {RE}pository}, year = {2003}, month = jul, oldhowpublished = {A base of protocol descriptions, reachable at \url{www.lsv.ens-cachan.fr/spore}}, note = {Works with Perl scripts (about 1200 lines) and contains about 50 protocol descriptions (as of Aug.~2004)}, note-fr = {Utilise des scripts Perl (environ 1200 lignes), contient environ 50 descriptions de protocoles (en Ao\^ut~2004)}, url = {http://www.lsv.ens-cachan.fr/spore/} }
@misc{symprod-02, author = {Petrucci, Laure}, title = {{\ttfamily symprod}: construction et analyse du produit synchronis{\'e} modulaire d'automates}, year = {2003}, missingmonth = {}, missingnmonth = {}, nonote = {See~\cite{CL-LP-ACSD04} for description. Written in C (about 3700 lines)}, nmnote = {J'ai commente la note ci-dessus car CL-LP-ACSD04 est 'ant' (en fait, posterieur au depart de Laure)}, nmothernote = {URL invalide...} }
@inproceedings{verma:lpar03, address = {Almaty, Kazakhstan}, month = sep, year = 2003, volume = 2850, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Vardi, Moshe Y. and Voronkov, Andrei}, acronym = {{LPAR}'03}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'03)}, author = {Verma, Kumar N.}, title = {On Closure under Complementation of Equational Tree Automata for Theories Extending~{AC}}, pages = {183-195}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Verma-lpar03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Verma-lpar03.ps} }
@inproceedings{verma:rta03, address = {Valencia, Spain}, month = jun, year = 2003, volume = 2706, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nieuwenhuis, Robert}, acronym = {{RTA}'03}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'03)}, author = {Verma, Kumar N.}, title = {Two-Way Equational Tree Automata for {AC}-like Theories: {D}ecidability and Closure Properties}, pages = {180-196}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ver-rta03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ver-rta03.ps} }
@techreport{Averroes-4.2.2, author = {Duflot, Marie and Fribourg, Laurent and H{\'e}rault, {\relax Th}omas and Lassaigne, Richard and Magniette, Fr{\'e}d{\'e}ric and Messika, St{\'e}phane and Peyronnet, Sylvain and Picaronny, Claudine}, title = {Probabilistic Model Checking of the {CSMA/CD} Protocol Using {PRISM} and {APMC}}, year = {2004}, month = jun, type = {Contract Report}, number = {(Lot 4.2 fourniture 2)}, institution = {projet RNTL Averroes}, oldhowpublished = {Lot 4.2 fourniture 2, du projet RNTL Averroes}, note = {22~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Averroes-4.2.2.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Averroes-4.2.2.ps} }
@inproceedings{B04sasyft, address = {Orl{\'e}ans, France}, howpublished = {LIFO Technical Report 2004-11, Laboratoire d'Informatique Fondamentale d'Orl{\'e}ans, France}, month = jun, year = 2004, editor = {Anantharaman, Siva}, acronym = {{SASYFT}'04}, booktitle = {{P}roceedings of the {W}orkshop on {S}ecurity of {S}ystems: {F}ormalism and {T}ools ({SASYFT}'04)}, author = {Baudet, Mathieu}, title = {Random Polynomial-Time Attacks and {D}olev-{Y}ao Models}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/B04sasyft.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/B04sasyft.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/B04sasyft.pdf}, preliminary-version-of = {Baudet05jalc}, abstract = {For several decades two different communities have been working on the formal security of cryptographic protocols. Many efforts have been made recently to take benefit of both approaches, in brief: the comprehensiveness of computational models and the automatizability of formal methods. The purpose of this paper is to investigate an original approach to relate the two views, that is: to extend existing Dolev-Yao models to account for random polynomial-time (Las Vegas) computability. This is done first by noticing that Dolev-Yao models can be seen as transition systems, possibly infinite. We then extend these transition systems with computation times and probabilities. The extended models can account for normal Dolev-Yao transitions as well as nonstandard operations such as inverting a one-way function. Our main contribution consists of showing that under sufficient realistic assumptions the extended models are equivalent to standard Dolev-Yao models as far as security is concerned. Thus our work enlarges the scope of existing decision procedures.} }
@misc{bouyer-movep2004, author = {Bouyer, Patricia}, title = {Timed Automata~--- {F}rom Theory to Implementation}, year = 2004, month = dec, note = {27~pages}, howpublished = {Invited tutorial, 6th {W}inter {S}chool on {M}odelling and {V}erifying {P}arallel {P}rocesses ({MOVEP}'04), Brussels, Belgium} }
@misc{gastin-movep2004, author = {Gastin, Paul}, title = {Basics of model checking}, year = 2004, month = dec, nonote = {-- pages}, howpublished = {Invited tutorial, 6th {W}inter {S}chool on {M}odelling and {V}erifying {P}arallel {P}rocesses ({MOVEP}'04), Brussels, Belgium} }
@misc{bouyer-epit32, author = {Bouyer, Patricia}, title = {Timed Models for Concurrent Systems}, year = 2004, month = apr, howpublished = {Invited lecture, 32nd {S}pring {S}chool on {T}heoretical {C}omputer {S}cience ({C}oncurrency {T}heory), Luminy, France} }
@misc{gastin-epit32, author = {Gastin, Paul}, title = {Specifications for distributed systems}, year = 2004, month = apr, howpublished = {Invited lecture, 32nd {S}pring {S}chool on {T}heoretical {C}omputer {S}cience ({C}oncurrency {T}heory), Luminy, France} }
@misc{bouyer-qest04, author = {Bouyer, Patricia}, title = {Timed Automata~--- {F}rom Theory to Implementation}, year = 2004, month = sep, howpublished = {Invited tutorial, 1st International Conference on the Quantitative Evaluation of System (QEST'04), Twente, The Netherlands} }
@inproceedings{BBL-hscc2004, address = {Philadelphia, Pennsylvania, USA}, month = mar, year = 2004, volume = 2993, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alur, Rajeev and Pappas, George J.}, acronym = {{HSCC}'04}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {H}ybrid {S}ystems: {C}omputation and {C}ontrol ({HSCC}'04)}, author = {Bouyer, Patricia and Brinksma, Ed and Larsen, Kim G.}, title = {Staying Alive As Cheaply As Possible}, pages = {203-218}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-hscc04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-hscc04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBL-hscc04.ps}, abstract = {This paper is concerned with the derivation of infinite schedules for timed automata that are in some sense optimal. To cover a wide class of optimality criteria we start out by introducing an extension of the (priced) timed automata model that includes both costs and rewards as separate modelling features. A precise definition is then given of what constitutes optimal infinite behaviours for this class of models. We subsequently show that the derivation of optimal non-terminating schedules for such double-priced timed automata is computable. This is done by a reduction of the problem to the determination of optimal mean-cycles in finite graphs with weighted edges. This reduction is obtained by introducing the so-called corner-point abstraction, a powerful abstraction technique of which we show that it preserves optimal schedules. } }
@inproceedings{BBLP-tacas04, address = {Barcelona, Spain}, month = mar, year = 2004, volume = 2988, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jensen, Kurt and Podelski, Andreas}, acronym = {{TACAS}'04}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'04)}, author = {Behrmann, Gerd and Bouyer, Patricia and Larsen, Kim G. and Pel{\'a}nek, Radek}, title = {Lower and Upper Bounds in Zone Based Abstractions of Timed Automata}, pages = {312-326}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBLP-tacas04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBLP-tacas04.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBLP-tacas04.pdf}, abstract = {Timed automata have an infinite semantics. For verification purposes, one usually uses zone based abstractions w.r.t.~the maximal constants to which clocks of the timed automaton are compared. We show that by distinguishing maximal lower and upper bounds, significantly coarser abstractions can be obtained. We show soundness and completeness of the new abstractions w.r.t.~reachability. We demonstrate how information about lower and upper bounds can be used to optimise the algorithm for bringing a difference bound matrix into normal form. Finally, we experimentally demonstrate that the new techniques dramatically increases the scalability of the real-time model checker~{\scshape Uppaal}. } }
@article{BBP-IJPR04, publisher = {Taylor \& Francis}, journal = {International Journal of Production Research}, author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Antoine Petit}, title = {Analysing the {PGM} Protocol with {U}ppaal}, volume = {42}, number = {14}, pages = {2773-2791}, year = {2004}, month = jul, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBP-IJPR04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBP-IJPR04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBP-IJPR04.ps}, abstract = {Pragmatic General Multicast (PGM) is a reliable multicast protocol, designed to minimize both the probability of negative acknowledgements~(NAK) implosion and the load of the network due to retransmissions of lost packets. This protocol was presented to the Internet Engineering Task Force as an open reference specification.\par In this paper, we focus on the main reliability property which PGM intends to guarantee: a receiver either receives all data packets from transmissions and repairs or is able to detect unrecoverable data packet loss. \par We first propose a modelization of (a simplified version of) PGM via a network of timed automata. Using Uppaal model-checker, we then study the validity of the reliability property above, which turns out not to be always verified but to depend on the values of several parameters that we underscore.} }
@inproceedings{BBS-afadl2004, address = {Besan{\c{c}}on, France}, month = jun, year = 2004, editor = {Julliand, Jacques}, acronym = {{AFADL}'04}, booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels ({AFADL}'04)}, author = {Ben{ }Gaid, Mongi and B{\'e}rard, B{\'e}atrice and De{~}Smet, Olivier}, title = {Mod{\'e}lisation et v{\'e}rification d'un {\'e}vaporateur en {Uppaal}}, pages = {223-238}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-afadl04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBS-afadl04.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-afadl04.pdf} }
@inproceedings{BCFL-gdv04, address = {Boston, Massachusetts, USA}, month = feb, year = {2005}, number = 1, volume = 119, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {De Alfaro, Luca}, acronym = {{GDV}'04}, booktitle = {{P}roceedings of the {W}orkshop on {G}ames in {D}esign and {V}erification ({GDV}'04)}, author = {Bouyer, Patricia and Cassez, Franck and Fleury, Emmanuel and Larsen, Kim G.}, title = {Synthesis of Optimal Strategies Using {HyTech}}, pages = {11-31}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFL-gdv04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFL-gdv04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCFL-gdv04.ps}, doi = {10.1016/j.entcs.2004.07.006}, abstract = {Priced timed (game) automata extend timed (game) automata with costs on both locations and transitions. The problem of synthesizing an optimal winning strategy for a priced timed game under some hypotheses has been shown decidable in~[BCFL04]. In this paper, we present an algorithm for computing the optimal cost and for synthesizing an optimal strategy in case there exists one. We also describe the implementation of this algorithm with the tool HyTech and present an example. } }
@inproceedings{BDF-afadl2004, address = {Besan{\c{c}}on, France}, month = jun, year = 2004, editor = {Julliand, Jacques}, acronym = {{AFADL}'04}, booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels ({AFADL}'04)}, author = {Bardin, S{\'e}bastien and Darlot, {\relax Ch}ristophe and Finkel, Alain}, title = {{FAST}: un model-checker pour syst{\`e}mes {\`a} compteurs}, pages = {377-380}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDF-afadl04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BDF-afadl04.ps}, abstract = {FAST est un outil pour la v\'erification de propri\'et\'es de s\^uret\'e pour des syst\`emes \`a compteurs. L'originalit\'e de l'outil tient dans l'utilisation de repr\'esentations symboliques pour repr\'esenter des ensembles infinis et de techniques d'acc\'el\'eration pour augmenter les chances de convergence. FAST a \'et\'e appliqu\'e avec succ\`es \`a un grand nombre de cas non triviaux.} }
@article{BDFP04, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Bouyer, Patricia and Dufourd, Catherine and Fleury, Emmanuel and Petit, Antoine}, title = {Updatable Timed Automata}, volume = {321}, number = {2-3}, pages = {291-345}, year = {2004}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/uta-BDFP04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/uta-BDFP04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/uta-BDFP04.ps}, doi = {10.1016/j.tcs.2004.04.003}, abstract = {We investigate extensions of Alur and Dill's timed automata, based on the possibility to update the clocks in a more elaborate way than simply reset them to zero. We call these automata updatable timed automata. They form an undecidable class of models, in the sense that emptiness checking is not decidable. However, using an extension of the region graph construction, we exhibit interesting decidable subclasses. In a surprising way, decidability depends on the nature of the clock constraints which are used, diagonal-free or not, whereas these constraints play identical roles in timed automata. We thus describe in a quite precise way the thin frontier between decidable and undecidable classes of updatable timed automata. \par We also study the expressive power of updatable timed automata. It turns out that any updatable automaton belonging to some decidable subclass can be effectively transformed into an equivalent timed automaton without updates but with silent transitions. The transformation suffers from an enormous combinatorics blow-up which seems unavoidable. Therefore, updatable timed automata appear to be a concise model for representing and analyzing large classes of timed systems. } }
@inproceedings{BF-atva04, address = {Taipei, Taiwan}, month = oct # {-} # nov, year = {2004}, volume = {3299}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Wang, Farn}, acronym = {{ATVA}'04}, booktitle = {{P}roceedings of the 2nd {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'04)}, author = {Bardin, S{\'e}bastien and Finkel, Alain}, title = {Composition of accelerations to verify infinite heterogeneous systems}, pages = {248-262}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BF-atva04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BF-atva04.ps}, abstract = {Symbolic representations and acceleration algorithms are emerging methods to extend model-checking to infinite state space systems. However until now, there is no general theory of acceleration, and designing acceleration algorithms for new data types is a complex task. On the other hand, protocols rarely manipulate new data types, rather new combinations of well-studied data types. For this reason, in this paper we focus on the automatic construction of symbolic representations and acceleration algorithms from existing ones.} }
@inproceedings{BFL-tacas04, address = {Barcelona, Spain}, month = mar, year = 2004, volume = 2988, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jensen, Kurt and Podelski, Andreas}, acronym = {{TACAS}'04}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'04)}, author = {Bardin, S{\'e}bastien and Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {{FAST}er Acceleration of Counter Automata in Practice}, pages = {576-590}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFL-tacas04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFL-tacas04.ps}, abstract = {We compute reachability sets of counter automata. Even if the reachability set is not necessarily recursive, we use symbolic representation and acceleration to increase convergence. For functions defined by translations over a polyhedral domain, we give a new acceleration algorithm which is polynomial in the size of the function and exponential in its dimension, while the more generic algorithm is exponential in both the size of the function and its dimension. This algorithm has been implemented in the tool FAST. We apply it to a complex industrial protocol, the TTP membership algorithm. This protocol has been widely studied. For the first time, the protocol is automatically proved to be correct for \(1\)~fault and \(N\)~stations, and using abstraction we prove the correctness for \(2\)~faults and \(N\)~stations also.} }
@inproceedings{BFN-avis2004, address = {Barcelona, Spain}, month = apr, year = 2004, editor = {Bharadwaj, Ramesh}, acronym = {{AVIS}'04}, booktitle = {{P}roceedings of the 3rd {I}nternational {W}orkshop on {A}utomated {V}erification of {I}nfinite-{S}tate {S}ystems ({AVIS}'04)}, author = {Bardin, S{\'e}bastien and Finkel, Alain and Nowak, David}, title = {Toward Symbolic Verification of Programs Handling Pointers}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFN-avis2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFN-avis2004.ps}, abstract = {We aim at checking safety properties on systems with pointers which are naturally infinite state systems. In this paper, we introduce Symbolic Memory States, a new symbolic representation well suited to the verification of systems with pointers. We show SMS enjoys all the good properties needed to check safety properties, such as closure under union, canonicity of the representation and decidable inclusion. We also introduce pointer automata, a model for programs using dynamic allocation of memory. We define the properties we want to check in this model and we give undecidability results. The verification part is still work in progress.} }
@inproceedings{BP-coast04, address = {Besan{\c{c}}on, France}, month = jun, year = 2004, editor = {Julliand, Jacques}, acronym = {{AFADL}'04}, booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels ({AFADL}'04)}, author = {Bardin, S{\'e}bastien and Petrucci, Laure}, title = {{COAST}: des r{\'e}seaux de {P}etri {\`a} la planification assist{\'e}e}, pages = {285-298}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-afadl04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-afadl04.ps}, abstract = {COAST est un outil d'assistance \`a la planification militaire. Son architecture distribu\'ee comprend un serveur constitu\'e d'un moteur d'analyse de r\'eseaux de Petri tandis que l'interface graphique fournie par le client permet de masquer l'utilisation des m\'ethodes formelles. Les synchronisations entre t\^aches \`a planifier sont un aspect essentiel de COAST. Dans cet article, apr\`es une pr\'esentation g\'en\'erale de la probl\'ematique et de l'outil, nous d\'ecrivons les synchronisations, montrons comment elles sont mod\'elis\'ees et implant\'ees.} }
@inproceedings{BP-pnml2004, address = {Bologna, Italy}, month = jun, year = {2004}, editor = {Kindler, Ekkart}, booktitle = {{P}roceedings of the {W}orkshop on {I}nterchange {F}ormat for {P}etri {N}ets}, author = {Bardin, S{\'e}bastien and Petrucci, Laure}, title = {From {PNML} to Counter Systems for Accelerating {P}etri Nets with~{FAST}}, pages = {26-40}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-pnml04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BP-pnml04.ps}, abstract = {We use the tool FAST to check parameterized safety properties on Petri nets with a large or infinite state space. Although this tool is not dedicated to Petri nets, it can be used for these as place\slash transition nets (and some of their extensions) are subcases of FAST input model. The originality of the tool lies in the use of acceleration techniques in order to compute the exact reachability set for infinite systems.\par In this paper, we present the automatic transformation of Petri nets written in PNML (Petri Net Markup Language) into counter systems. Then, FAST provides a simple but very powerful language to express complex properties and check these.} }
@inproceedings{BCFL-fsttcs04, address = {Chennai, India}, month = dec, year = 2004, volume = 3328, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'04}, booktitle = {{P}roceedings of the 24th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'04)}, author = {Bouyer, Patricia and Cassez, Franck and Fleury, Emmanuel and Larsen, Kim G.}, title = {Optimal Strategies in Priced Timed Game Automata}, pages = {148-160}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFL-fsttcs04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ BCFL-fsttcs04.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFL-fsttcs04.pdf}, abstract = {Priced timed (game) automata extend timed (game) automata with costs on both locations and transitions. In this paper we focus on reachability priced timed game automata and prove that the optimal cost for winning such a game is computable under conditions concerning the non-zenoness of cost. Under stronger conditions (strictness of constraints) we prove that in case an optimal strategy exists, we can compute a state-based winning optimal strategy.} }
@inproceedings{BerSch-avis2004, address = {Barcelona, Spain}, month = apr, year = 2004, editor = {Bharadwaj, Ramesh}, acronym = {{AVIS}'04}, booktitle = {{P}roceedings of the 3rd {I}nternational {W}orkshop on {A}utomated {V}erification of {I}nfinite-{S}tate {S}ystems ({AVIS}'04)}, author = {Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {Verifying Nondeterministic Channel Systems With Probabilistic Message Losses}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerSch-avis04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BerSch-avis04.pdf}, abstract = {Lossy channel systems (LCS's) are systems of finite state automata that communicate via unreliable unbounded fifo channels. In order to circumvent the undecidability of model checking for nondeterministic LCS's, probabilistic models have been introduced, where it can be decided whether a linear-time property holds almost surely. However, such fully probabilistic systems are not a faithful model of nondeterministic protocols.\par We study a hybrid model for LCS's where losses of messages are seen as faults occurring with some given probability, and where the internal behavior of the system remains nondeterministic. Thus the semantics is in terms of infinite-state reactive Markov chains (equivalently, Markovian decision processes). A similar model was introduced in the second part of (Bertrand \& Schnoebelen, FOSSACS'2003, LNCS 2620, pp.~120-135): we continue this work and give a complete picture of the decidability of qualitative model checking for MSO-definable properties and some relevant subcases.} }
@book{CASL-LNCS, author = {Bidoit, Michel and Mosses, Peter D.}, title = {{CASL} User Manual~--- Introduction to Using the Common Algebraic Specification Language}, volume = {2900}, series = {Lecture Notes in Computer Science}, year = {2004}, publisher = {Springer}, isbn10 = {3-540-20766-X}, isbn = {978-3-540-20766-5}, doi = {10.1007/b11968}, url = {http://www.springer.com/978-3-540-20766-X}, oldurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-20766-X} }
@mastersthesis{Chevalier-dea, author = {Chevalier, Fabrice}, title = {D{\'e}tection d'erreurs dans les syst{\`e}mes temporis{\'e}s}, year = {2004}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, note = {59~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FC-dea2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FC-dea2004.ps} }
@article{ComonCortier-TCS1, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Comon, Hubert and Cortier, V{\'e}ronique}, title = {Tree Automata with One Memory, Set Constraints and Cryptographic Protocols}, year = {2005}, volume = 331, number = 1, pages = {143-214}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierTCS1.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierTCS1.ps}, doi = {10.1016/j.tcs.2004.09.036} }
@article{ComonCortier04scp, publisher = {Elsevier Science Publishers}, journal = {Science of Computer Programming}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique}, title = {Security Properties: {T}wo Agents are Sufficient}, volume = {50}, number = {1-3}, pages = {51-71}, year = {2004}, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortier-step2.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortier-step2.ps} }
@inproceedings{DCMM-hscc2004, address = {Philadelphia, Pennsylvania, USA}, month = mar, year = 2004, volume = 2993, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alur, Rajeev and Pappas, George J.}, acronym = {{HSCC}'04}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {H}ybrid {S}ystems: {C}omputation and {C}ontrol ({HSCC}'04)}, author = {Davoren, Jennifer M. and Coulthard, Vaughan and Markey, Nicolas and Moor, {\relax Th}omas}, title = {Non-deterministic Temporal Logics for General Flow Systems}, pages = {280-295}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HSCC04-DCMM.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HSCC04-DCMM.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HSCC04-DCMM.pdf}, abstract = {In this paper, we use the constructs of branching temporal logic to formalize reasoning about a class of general flow systems, including discrete-time transition systems, continuous-time differential inclusions, and hybrid-time systems such as hybrid automata. We introduce Full General Flow Logic, GFL\(^*\), which has essentially the same syntax as the well-known Full Computation Tree Logic, CTL\(^*\), but generalizes the semantics to general flow systems over arbitrary time-lines. We propose an axiomatic proof system for GFL\(^*\) and establish its soundness w.r.t. the general flow semantics.} }
@inproceedings{DDMR-formats2004, address = {Grenoble, France}, month = sep, year = 2004, volume = {3253}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lakhnech, Yassine and Yovine, Sergio}, acronym = {{FORMATS}'04/{FTRTFT}'04}, booktitle = {{P}roceedings of the {J}oint {C}onferences {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'04) and {F}ormal {T}echniques in {R}eal-{T}ime and {F}ault-{T}olerant {S}ystems ({FTRTFT}'04)}, author = {De{~}Wulf, Martin and Doyen, Laurent and Markey, Nicolas and Raskin, Jean-Fran{\c{c}}ois}, title = {Robustness and Implementability of Timed Automata}, pages = {118-133}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDMR-formats2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DDMR-formats2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDMR-formats2004.pdf}, abstract = {In a former paper, we defined a new semantics for timed automata, the Almost ASAP semantics, which is parameterized by \(\Delta\) to cope with the reaction delay of the controller. We showed that this semantics is implementable provided there exists a strictly positive value for the parameter \(\Delta\) for which the strategy is correct. In this paper, we define the implementability problem to be the question of existence of such a \(\Delta\). We show that this question is closely related to a notion of robustness for timed automata defined in [Pur98] and prove that the implementability problem is decidable.} }
@inproceedings{DFH-avocs2004, address = {London, UK}, month = may, year = {2005}, number = 6, volume = {128}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Huth, Michael R. A.}, acronym = {{AVoCS}'04}, booktitle = {{P}roceedings of the 4th {I}nternational {W}orkshop on {A}utomated {V}erification of {C}ritical {S}ystems ({AVoCS}'04)}, author = {Duflot, Marie and Fribourg, Laurent and H{\'e}rault, {\relax Th}omas and Lassaigne, Richard and Magniette, Fr{\'e}d{\'e}ric and Messika, St{\'e}phane and Peyronnet, Sylvain and Picaronny, Claudine}, title = {Probabilistic Model Checking of the {CSMA/CD} Protocol Using {PRISM} and {APMC}}, pages = {195-214}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFH-avocs2004.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFH-avocs2004.pdf}, doi = {10.1016/j.entcs.2005.04.012} }
@article{DFP-DISTCOMP, publisher = {Springer}, journal = {Distributed Computing}, author = {Duflot, Marie and Fribourg, Laurent and Picaronny, Claudine}, title = {Randomized Dining Philosophers Without Fairness Assumption}, volume = {17}, number = {1}, pages = {65-76}, year = {2004}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-DISCOMP.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DFP-DISCOMP.ps}, doi = {10.1007/s00446-003-0102-z} }
@inproceedings{DFV-avocs04, address = {London, UK}, month = may, year = {2005}, number = 6, volume = {128}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Huth, Michael R. A.}, acronym = {{AVoCS}'04}, booktitle = {{P}roceedings of the 4th {I}nternational {W}orkshop on {A}utomated {V}erification of {C}ritical {S}ystems ({AVoCS}'04)}, author = {Darlot, {\relax Ch}ristophe and Finkel, Alain and Van{~}Begin, Laurent}, title = {About {F}ast and {TReX} Accelerations}, pages = {87-103}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFV-avocs04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFV-avocs04.pdf}, doi = {10.1016/j.entcs.2005.04.006} }
@article{icomp-DG2004, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Diekert, Volker and Gastin, Paul}, title = {Local temporal logic is expressively complete for cograph dependence alphabets}, volume = {195}, number = {1-2}, pages = {30-52}, year = 2004, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG04-icomp.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DG04-icomp.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG04-icomp.pdf}, doi = {10.1016/j.ic.2004.08.001}, abstract = {Recently, local logics for Mazurkiewicz traces are of increasing interest. This is mainly due to the fact that the satisfiability problem has the same complexity as in the word case. If we focus on a purely local interpretation of formulae at vertices (or events) of a trace, then the satisfiability problem of linear temporal logics over traces turns out to be PSPACE-complete. But now the difficult problem is to obtain expressive completeness results with respect to first order logic. \par The main result of the paper shows such an expressive completeness result, if the underlying dependence alphabet is a cograph, \emph{i.e.} if all traces are series parallel posets. Moreover, we show that this is the best we can expect in our setting: If the dependence alphabet is not a cograph, then we cannot express all first order properties.} }
@inproceedings{Dem-fossacs2004, address = {Barcelona, Spain}, month = mar, year = 2004, volume = 2987, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Walukiewicz, Igor}, acronym = {{FoSSaCS}'04}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'04)}, author = {Demri, St{\'e}phane}, title = {{LTL} over Integer Periodicity Constraints}, pages = {121-135}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-fossacs04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Demri-fossacs04.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-fossacs04.pdf} }
@misc{FAST-v1.5, author = {Bardin, S{\'e}bastien and Darlot, {\relax Ch}ristophe and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Van{~}Begin, Laurent}, futureauthor = {Il en manque ? Plus maintenant...}, title = {{FAST}~v1.5: {F}ast {A}cceleration of {S}ymbolic {T}ransition Systems}, year = {2004}, month = jun, howpublished = {Available at \url{http://www.lsv.ens-cachan.fr/fast/}}, url = {http://www.lsv.ens-cachan.fr/fast/} }
@inproceedings{FGRV-express04, address = {London, UK}, month = apr, year = 2005, number = 2, volume = 128, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Baeten, Jos and Corradini, Flavio}, acronym = {{EXPRESS}'04}, booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'04)}, author = {Finkel, Alain and Geeraerts, Gilles and Raskin, Jean-Fran{\c{c}}ois and Van{~}Begin, Laurent}, title = {On the Omega-Language Expressive Power of Extended {P}etri Nets}, pages = {87-101}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGRV-express04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGRV-express04.pdf}, doi = {10.1016/j.entcs.2004.11.030} }
@article{FL-IPL04, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {The Convex Hull of a Regular Set of Integer Vectors is Polyhedral and Effectively Computable}, year = {2005}, month = oct, volume = 96, number = 1, pages = {30-35}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FL-ipl05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FL-ipl05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-ipl05.ps}, doi = {10.1016/j.ipl.2005.04.004}, abstract = {Number Decision Diagrams (NDD) provide a natural finite symbolic representation for regular set of integer vectors encoded as strings of digit vectors (least or most significant digit first). The convex hull of the set of vectors represented by a~NDD is proved to be an effectively computable convex polyhedron.} }
@inproceedings{FL-cav04, address = {Boston, Massachusetts, USA}, month = jul, year = 2004, volume = 3114, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alur, Rajeev and Peled, Doron A.}, acronym = {{CAV}'04}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'04)}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {Image Computation in Infinite State Model Checking}, pages = {361-371}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-cav04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-cav04.ps} }
@inproceedings{FL-spin04, address = {Barcelona, Spain}, month = apr, year = 2004, volume = 2989, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Graf, Susanne and Mounier, Laurent}, acronym = {{SPIN}'04}, booktitle = {{P}roceedings of the 11th {I}nternational {SPIN} {W}orkshop on {M}odel {C}hecking {S}oftware ({SPIN}'04)}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {Polynomial Time Image Computation With Interval-Definable Counters Systems}, pages = {182-197}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-spin04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FL-spin04.ps} }
@inproceedings{FMP-disc04, address = {Amsterdam, The Netherlands}, month = oct, year = 2004, volume = 3274, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Guerraoui, Rachid}, acronym = {{DISC}'04}, booktitle = {{P}roceedings of the 18th {I}nternational {S}ymposium on {D}istributed {C}omputing ({DISC}'04)}, author = {Fribourg, Laurent and Messika, St{\'e}phane and Picaronny, Claudine}, title = {Coupling and Self-Stabilization}, pages = {201-215}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FMP-disc04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FMP-disc04.pdf} }
@article{FMP-wstsPN-icomp, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Finkel, Alain and McKenzie, Pierre and Picaronny, Claudine}, title = {A Well-Structured Framework for Analysing {P}etri Net Extensions}, volume = {195}, number = {1-2}, pages = {1-29}, year = {2004}, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FMP-wstsPN-icomp.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FMP-wstsPN-icomp.ps}, doi = {10.1016/j.ic.2004.01.005} }
@inproceedings{GLNZ-csl2004, address = {Karpacz, Poland}, month = sep, year = 2004, volume = {3210}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Marcinkowski, Jerzy and Tarlecki, Andrzej}, acronym = {{CSL}'04}, booktitle = {{P}roceedings the 18th {I}nternational {W}orkshop on {C}omputer {S}cience {L}ogic ({CSL}'04)}, author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir and Nowak, David and Zhang, Yu}, title = {Complete Lax Logical Relations for Cryptographic Lambda-Calculi}, pages = {400-414}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLNZ-csl04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLLNZ-csl04.ps} }
@article{GLRV:acm, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Programming}, author = {Goubault{-}Larrecq, Jean and Roger, Muriel and Verma, Kumar N.}, title = {Abstraction and Resolution Modulo~{AC}: {H}ow to Verify {D}iffie-{H}ellman-like Protocols Automatically}, volume = 64, number = 2, pages = {219-251}, year = {2005}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLRV-acm.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLRV-acm.ps}, doi = {10.1016/j.jlap.2004.09.004} }
@article{JGL:val:ext, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Extensions of Valuations}, year = {2005}, volume = 15, number = 2, pages = {271-297}, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-17.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2002-17.rr.ps}, doi = {10.1017/S096012950400461X} }
@inproceedings{KremerRyan2004, address = {London, UK}, month = may, year = 2005, number = 5, volume = {128}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Focardi, Riccardo and Zavattaro, Gianluigi}, acronym = {{SecCo}'04}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oordination {M}odels, {L}anguages and {S}ystems ({SecCo}'04)}, author = {Kremer, Steve and Ryan, Mark D.}, title = {Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks}, pages = {84-107}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-secco04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-secco04.pdf}, doi = {10.1016/j.entcs.2004.11.043}, abstract = {In this paper we report on an analysis for finding known-pair and chosen-text attacks in protocols. As these attacks are at the level of blocks, we extend the attacker by special capabilities related to block chaining techniques. The analysis is automated using Blanchet's protocol verifier and illustrated on two well-known protocols, the Needham-Schroeder-Lowe public-key protocol as well as the Needham-Schroeder symmetric-key protocol. On the first protocol, we show how the special intruder capabilities related to chaining may compromise the secrecy of nonces and that chosen-ciphertext attacks are possible. We propose two modified versions of the protocol which strengthen its security. We then illustrate known-pair and chosen-plaintext attacks on the second protocol.} }
@inproceedings{KucSch2004, address = {London, UK}, month = aug, year = 2004, volume = 3170, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko}, acronym = {{CONCUR}'04}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'04)}, author = {Ku{\v c}era, Anton{\'\i}n and Schnoebelen, {\relax Ph}ilippe}, title = {A General Approach to Comparing Infinite-State Systems with Their Finite-State Specifications}, pages = {372-386}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KS-concur2004.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KS-concur2004.pdf}, doi = {10.1007/978-3-540-28644-8_24}, abstract = {We introduce a generic family of behavioral relations for which the problem of comparing an arbitrary transition system to some finite-state specification can be reduced to a model checking problem against simple modal formulae. As an application, we derive decidability of several regular equivalence problems for well-known families of infinite-state systems.} }
@inproceedings{LMS-concur2004, address = {London, UK}, month = aug, year = 2004, volume = 3170, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko}, acronym = {{CONCUR}'04}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'04)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Model Checking Timed Automata with One or Two Clocks}, pages = {387-401}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-concur2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMS-concur2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-concur2004.pdf}, doi = {10.1007/978-3-540-28644-8_25}, abstract = {In this paper, we study model checking of timed automata (TAs), and more precisely we aim at finding efficient model checking for subclasses of TAs. For this, we consider model checking TCTL and TCTL, over TAs with one clock or two clocks.\par First we show that the reachability problem is NLOGSPACE-complete for one clock TAs (i.e. as complex as reachability in classical graphs) and we give a polynomial time algorithm for model checking TCTL, over this class of TAs. Secondly we show that model checking becomes PSPACE-complete for full TCTL over one clock TAs. We also show that model checking CTL (without any timing constraint) over two clock TAs is PSPACE-complete and that reachability is NP-hard.} }
@inproceedings{LS-concur04, address = {London, UK}, month = aug, year = 2004, volume = 3170, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko}, acronym = {{CONCUR}'04}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'04)}, author = {Leroux, J{\'e}r{\^o}me and Sutre, Gr{\'e}goire}, title = {On Flatness for 2-dimensional Vector Addition Systems with States}, pages = {402-416}, nmnote = {Partially while J. Leroux was at LSV}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LS-concur04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LS-concur04.ps}, doi = {10.1007/978-3-540-28644-8_26} }
@techreport{LSV:04:10, author = {Baclet, Manuel and Pacalet, Renaud and Petit, Antoine}, title = {Register Transfer Level Simulation}, type = {Research Report}, number = {LSV-04-10}, year = {2004}, month = may, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {15~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-10.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2004-10.rr.ps} }
@techreport{LSV:04:11, author = {Baclet, Manuel and Chevallier, R{\'e}my}, title = {Using {UPPAAL} to Verify an On-Chip Memory}, type = {Research Report}, number = {LSV-04-11}, year = {2004}, month = may, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {12~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-11.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2004-11.rr.ps} }
@techreport{LSV:04:12, author = {Fribourg, Laurent and Messika, St{\'e}phane and Picaronny, Claudine}, title = {Mixing Time of the Asymmetric Simple Exclusion Problem on a Ring with Two Particles}, type = {Research Report}, number = {LSV-04-12}, year = {2004}, month = jun, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, note = {15~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-12.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2004-12.rr.ps} }
@inproceedings{Ler-atva04, address = {Taipei, Taiwan}, month = oct # {-} # nov, year = {2004}, volume = {3299}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Wang, Farn}, acronym = {{ATVA}'04}, booktitle = {{P}roceedings of the 2nd {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'04)}, author = {Leroux, J{\'e}r{\^o}me}, title = {Disjunctive Invariants for Numerical Systems}, pages = {93-107}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-atva04.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-atva04.ps} }
@inproceedings{Ler-inf03, address = {Marseilles, France}, month = aug, year = 2004, volume = 98, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Schnoebelen, {\relax Ph}ilippe}, acronym = {{INFINITY}'03}, booktitle = {{P}roceedings of the 5th {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'03)}, author = { Leroux, J{\'e}r{\^o}me}, title = {The Affine Hull of a Binary Automaton is Computable in Polynomial Time}, pages = {89-104}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-inf03.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Ler-inf03.ps} }
@phdthesis{messika-these2004, author = {Messika, St{\'e}phane}, title = {M{\'e}thodes probabilistes pour la v{\'e}rification des syst{\`e}mes distribu{\'e}s}, year = 2004, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/messika-these.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/messika-these.pdf} }
@inproceedings{MR-concur2004, address = {London, UK}, month = aug, year = 2004, volume = 3170, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gardner, {\relax Ph}ilippa and Yoshida, Nobuko}, acronym = {{CONCUR}'04}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'04)}, author = {Markey, Nicolas and Raskin, Jean-Fran{\c{c}}ois}, title = {Model Checking Restricted Sets of Timed Paths}, pages = {432-447}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MR-concur2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MR-concur2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MR-concur2004.pdf}, doi = {10.1007/978-3-540-28644-8_28}, abstract = {In this paper, we study the complexity of model-checking formulas of three important real-time logics (MTL, MITL, and TCTL) over restricted sets of timed paths. The classes of restricted sets of timed paths that we consider are \textit{(i)} a single finite (or ultimately periodic) timed path, \textit{(ii)} a infinite set of finite (or infinite) timed paths defined by a finite (or ultimately periodic) path in a region graph, \textit{(iii)} a infinite set of finite (or infinite) timed paths defined by a finite (or ultimately periodic) path in a zone graph.} }
@inproceedings{MS-formats2004, address = {Grenoble, France}, month = sep, year = 2004, volume = {3253}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lakhnech, Yassine and Yovine, Sergio}, acronym = {{FORMATS}'04/{FTRTFT}'04}, booktitle = {{P}roceedings of the {J}oint {C}onferences {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'04) and {F}ormal {T}echniques in {R}eal-{T}ime and {F}ault-{T}olerant {S}ystems ({FTRTFT}'04)}, author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Symbolic Model Checking for Simply-Timed Systems}, pages = {102-117}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-formats2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MS-formats2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-formats2004.pdf}, abstract = {We describe OBDD-based symbolic model checking algorithms for simply-timed systems, i.e. finite state graphs where transitions carry a duration. These durations can be arbitrary natural numbers. A simple and natural semantics for these systems opens the way for improved efficiency. Our algorithms have been implemented in NuSMV and perform well in practice (on standard case studies).} }
@inproceedings{MS-qest2004, address = {Enschede, The Netherlands}, month = sep, year = 2004, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'04}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'04)}, author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {{TSMV}: {A} Symbolic Model Checker for Quantitative Analysis of Systems}, pages = {330-331}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-qest2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MS-qest2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS-qest2004.pdf}, doi = {10.1109/QEST.2004.10028}, abstract = {TSMV is an extension of NuSMV, the open-source symbolic model checker, aimed at dealing with timed versions of (models of) circuits, PLC controllers, protocols, etc. The underlying model is an extension of Kripke structures, where every transition carries an integer duration (possibly zero). This simple model supports efficient symbolic algorithms for RTCTL formulae.} }
@inproceedings{Mar-afadl2004, address = {Besan{\c{c}}on, France}, month = jun, year = 2004, editor = {Julliand, Jacques}, acronym = {{AFADL}'04}, booktitle = {{A}ctes du 6{\`e}me {A}telier sur les {A}pproches {F}ormelles dans l'{A}ssistance au {D}{\'e}veloppement de {L}ogiciels ({AFADL}'04)}, author = {Markey, Nicolas}, title = {{TSMV}: model-checking symbolique de syst{\`e}mes simplement temporis{\'e}s}, pages = {349-352}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-afadl04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Mar-afadl04.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-afadl04.pdf} }
@proceedings{PHS:INFINITY2003, title = {{P}roceedings of the 5th {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'03)}, booktitle = {{P}roceedings of the 5th {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'03)}, editor = {Schnoebelen, {\relax Ph}ilippe}, volume = {98}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, year = 2004, month = aug, doi = {10.1016/j.entcs.2003.10.001}, address = {Marseilles, France}, oldurl = {http://www.sciencedirect.com/science?_ob=IssueURL& _tockey=%23TOC%2313109%232004%23999019999%23512226%23FLP%23 Volume_98,_(2_August_2004)%2BMProceedings_of_INFINITY_2003, _the_5th_International_Workshop_on_Verification_of_Infinite-State _Systems,_a_satellite_workshop_of_CONCUR_2003%2BMMarseille,_France, _2_September_2003%2BMEdited_by_P._Schnoebelen&_auth=y&view=c& _acct=C000051058&_version=1&_urlVersion=0& _userid=1052425&md5=c6eb616ae1aec31a577ad19b058bc540} }
@techreport{Prouve:rap1, author = {Bozga, Liana and Delaune, St{\'e}phanie and Klay, Francis and Treinen, Ralf}, title = {Sp{\'e}cification du protocole de porte-monnaie {\'e}lectronique}, year = {2004}, month = jun, type = {Technical Report}, number = 1, institution = {projet RNTL PROUV{\'E}}, oldhowpublished = {Rapport Technique 1 du projet RNTL PROUV\'E}, note = {12~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap1.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap1.ps}, abstract = {Cette \'etude de cas a pour but de contribuer \`a une premi\`ere \'evaluation des besoins pour l'aspect description formelle des protocoles cryptographiques. Cet aspect est un pr\'ealable oblig\'e avant d'aborder des points tels que la s\'emantique et la v\'erification. Le r\'esultat de ce travail a guid\'e la d\'efinition de la syntaxe du langage de sp\'ecification d\'evelopp\'e dans la t\^ache~1 du projet~: <<~S\'emantique des protocoles et des propri\'et\'es~>>.\par Parmi la multitude de protocoles existants celui qui a \'et\'e \'etudi\'e est un porte-monnaie \'electronique \`a cl\'e publique d\'evelopp\'e r\'ecemment par France T\'el\'ecom R\&D car il refl\`ete fid\`element les ambitions du projet. Ce protocole, sortant sans surprise du spectre de tous les outils d\'evelopp\'es \`a l'heure actuelle, notre travail a consist\'e \`a mod\'eliser au mieux le porte-monnaie \'electronique dans un sous ensemble repr\'esentatif d'outils existants. Cette \'etude met \'evidence, sur un cas r\'eel, les carences et les faiblesses des outils actuels et permet ainsi d'affiner et de valider les objectifs du projet. D'un autre c\^ot\'e, ce travail montre que des lacunes importantes peuvent parfois \^etre raisonnablement contourn\'ees modulo un codage adapt\'e.} }
@techreport{Prouve:rap2, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie and Lafourcade, Pascal}, title = {A Survey of Algebraic Properties Used in Cryptographic Protocols}, year = {2004}, month = jun, type = {Technical Report}, number = 2, institution = {projet RNTL PROUV{\'E}}, oldhowpublished = {Rapport Technique 2 du projet RNTL PROUV\'E}, note = {19~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap2.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap2.ps}, abstract = {Using the \emph{perfect encryption assumption}, cryptographic primitives are often represented by free function symbols. However some attacks and even honest runs may use algebraic properties of the operators like the exclusive or, the modular exponentiation, the addition, etc.\par We give here a survey of protocols and attacks using such algebraic properties.} }
@techreport{Prouve:rap3, author = {Treinen, Ralf}, title = {The {PROUV\'E} Specification Language}, year = {2004}, month = aug, number = 3, type = {Technical Report}, institution = {Projet RNTL PROUV{\'E}}, oldhowpublished = {Rapport Technique 3 du projet RNTL PROUV\'E}, note = {10~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap3.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap3.ps} }
@techreport{Prouve:rap4, author = {Bernat, Vincent and Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie and Jacquemard, Florent and Lafourcade, Pascal and Lakhnech, Yassine and Mazar{\'e}, Laurent}, title = {Sufficient conditions on properties for an automated verification: theoretical report on the verification of protocols for an extended model of the intruder }, year = {2004}, month = dec, type = {Technical Report}, number = 4, institution = {projet RNTL PROUV{\'E}}, oldhowpublished = {Rapport Technique 4 du projet RNTL PROUV\'E}, note = {33~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap4.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap4.ps}, abstract = {Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We first give an overview of the existing methods in formal approaches for analyzing cryptographic protocols. Then we describe more precisely the results obtained by the partners of the RNTL project PROUV\'E.} }
@mastersthesis{Ratti-dea, author = {Ratti, Benjamin}, title = {Automates d'arbre d'ordre~deux}, year = 2004, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Programmation, Paris, France}, note = {45~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BRatti-dea2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BRatti-dea2004.ps} }
@mastersthesis{Reynier-dea, author = {Reynier, Pierre-Alain}, title = {Analyse en avant des automates temporis{\'e}s}, year = {2004}, month = sep, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, note = {68~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PAR-dea2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PAR-dea2004.ps} }
@incollection{Sch-voss, year = 2004, volume = 2925, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baier, {\relax Ch}ristel and Haverkort, Boudewijn R. and Hermanns, Holger and Katoen, Joost-Pieter and Siegle, Markus and Vaandrager, Frits}, acronym = {{V}alidation of {S}tochastic {S}ystems}, booktitle = {{V}alidation of {S}tochastic {S}ystems: {A} {G}uide to {C}urrent {R}esearch}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {The Verification of Probabilistic Lossy Channel Systems}, pages = {445-465}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-voss.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Sch-voss.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sch-voss.pdf}, abstract = {Lossy channel systems (LCS's) are systems of finite state automata that communicate via unreliable unbounded fifo channels. Several probabilistic versions of these systems have been proposed in recent years, with the two aims of modeling more faithfully the losses of messages, and circumventing undecidabilities by some kind of randomization. We survey these proposals and the verification techniques they support.} }
@inproceedings{bh-amast2004, address = {Stirling, UK}, month = jul, year = 2004, volume = 3116, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rattray, Charles and Maharaj, Savitri and Shankland, Carron}, acronym = {{AMAST}'04}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {A}lgebraic {M}ethodology and {S}oftware {T}echnology ({AMAST}'04)}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {Glass Box and Black Box Views of State-Based System Specifications}, pages = {19}, note = {Invited talk} }
@inproceedings{bhkb-sefm2004, address = {Beijing, China}, month = sep, year = 2004, publisher = {{IEEE} Computer Society Press}, acronym = {{SEFM}'04}, booktitle = {{P}roceedings of the 2nd {IEEE} {I}nternational {C}onference on {S}oftware {E}ngineering and {F}ormal {M}ethods ({SEFM}'04)}, author = {Bidoit, Michel and Hennicker, Rolf and Knapp, Alexander and Baumeister, Hubert}, title = {Glass-Box and Black-Box Views on Object-Oriented Specifications}, pages = {208-217}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bhkb-sefm2004.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bhkb-sefm2004.pdf}, doi = {10.1109/SEFM.2004.10014} }
@inproceedings{bj-strategies2004, address = {Cork, Ireland}, month = jul, year = 2004, editor = {Bonacina, Maria Paola and Boy{ }de{~}la{~}Tour, {\relax Th}ierry}, acronym = {{STRATEGIES}'04}, booktitle = {{P}roceedings of the 5th {W}orkshop on {S}trategies in {A}utomated {D}eduction ({STRATEGIES}'04)}, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Constrained Tree Grammars to Pilot Automated Proof by Induction}, pages = {64-78}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-strategies04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-strategies04.pdf} }
@techreport{blueberries-TR1.3.2, author = {Baclet, Manuel and Chevallier, R{\'e}my}, title = {Using {UPPAAL} to verify an on-chip memory}, year = {2004}, month = may, type = {Contract Report}, number = {(Work Package~3.2 Fourniture~1)}, institution = {projet T126 MEDEA+ Blueberries}, oldhowpublished = {Fourniture 1 du Work Package 3.2 du projet T126 MEDEA+ Blueberries}, note = {12~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2004-11.rr.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2004-11.rr.ps} }
@article{bouyer-fmsd-2004, publisher = {Kluwer Academic Publishers}, journal = {Formal Methods in System Design}, author = {Bouyer, Patricia}, title = {Forward Analysis of Updatable Timed Automata}, volume = {24}, number = {3}, pages = {281-320}, year = {2004}, month = may, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bou-FMSD2004.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bou-FMSD2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bou-FMSD2004.ps}, doi = {10.1023/B:FORM.0000026093.21513.31}, abstract = {Timed automata are a widely studied model. Its decidability has been proved using the so-called region automaton construction. This construction provides a correct abstraction for the behaviours of timed automata, but it suffers from a state explosion and is thus not used in practice. Instead, algorithms based on the notion of zones are implemented using adapted data structures like~DBMs. When we focus on forward analysis algorithms, the exact computation of all the successors of the initial configurations does not always terminate. Thus, some abstractions are often used to ensure termination, among which, a widening operator on zones.\par In this paper, we study in detail this widening operator and the corresponding forward analysis algorithm. This algorithm is most used and implemented in tools like KRONOS and UPPAAL. One of our main results is that it is hopeless to find a forward analysis algorithm for general timed automata, that uses such a widening operator, and which is correct. This goes really against what one could think. We then study in detail this algorithm in the more general framework of updatable timed automata, a model which has been introduced as a natural syntactic extension of classical timed automata. We describe subclasses of this model for which a correct widening operator can be found. } }
@inproceedings{bst-monterey, address = {Venice, Italy}, year = 2004, volume = 2941, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Wirsing, Martin and Knapp, Alexander and Balsamo, Simonetta}, acronym = {{RISSEF}'02}, booktitle = {{R}evised {P}apers of the 9th {I}nternational {W}orkshop on {R}adical {I}nnovations of {S}oftware and {S}ystems {E}ngineering in the {F}uture ({RISSEF}'02)}, author = {Bidoit, Michel and Sannella, Donald and Tarlecki, Andrzej}, title = {Toward Component-Oriented Formal Software Development: {A}n Algebraic Approach}, pages = {75-90}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BST-monterey.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BST-monterey.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BST-monterey.pdf} }
@inproceedings{comon04fossacs, address = {Barcelona, Spain}, month = mar, year = 2004, volume = 2987, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Walukiewicz, Igor}, acronym = {{FoSSaCS}'04}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'04)}, author = {Comon{-}Lundh, Hubert }, title = {Intruder Theories (Ongoing Work)}, pages = {1-4}, note = {Invited talk} }
@incollection{couvreur-chap04, author = {Br{\'e}ant, F. and Couvreur, Jean-Michel and Gilliers, Fr{\'e}d{\'e}ric and Kordon, Fabrice and Mounier, Isabelle and Paviot{-}Adet, Emmanuel and Poitrenaud, Denis and Regep, Dan M. and Sutre, Gr{\'e}goire}, title = {Modeling and Verifying Behavioral Aspects}, chapter = {6}, editor = {Kordon, Fabrice and Lemoine, Michel}, booktitle = {Formal Methods for Embedded Distributed Systems: {H}ow to Master the Complexity}, pages = {171-211}, year = {2004}, month = jun, publisher = {Kluwer Academic Publishers} }
@inproceedings{couvreur-ciaa04, address = {Kingston, Ontario, Canada}, month = jan, year = 2005, volume = 3317, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Domaratzki, Michael and Okhotin, Alexander and Salomaa, Kai and Yu, Sheng}, acronym = {{CIAA}'04}, booktitle = {{R}evised {S}elected {P}apers of the 9th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'04)}, author = {Couvreur, Jean-Michel}, title = {A {BDD}-like Implementation of an Automata Package}, pages = {310-311}, doi = {10.1007/b105090} }
@inproceedings{dj-ccs-2004, address = {Washington, D.C., USA}, month = oct, year = 2004, publisher = {ACM Press}, editor = {Atluri, Vijayalakshmi and Pfitzmann, Birgit and McDaniel, Patrick}, acronym = {{CCS}'04}, booktitle = {{P}roceedings of the 11th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'04)}, author = {Delaune, St{\'e}phanie and Jacquemard, Florent}, title = {A Decision Procedure for the Verification of Security Protocols with Explicit Destructors}, pages = {278-287}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-ccs-2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-ccs-2004.ps}, abstract = {We present a non-deterministic polynomial time procedure to decide the problem of insecurity, in the presence of a bounded number of sessions, for cryptographic protocols containing explicit destructor symbols, like decryption and projection. These operators are axiomatized by an arbitrary convergent rewrite system satisfying some syntactic restrictions. This approach, with parameterized semantics, allows us to weaken the security hypotheses for verification, \emph{i.e.} to address a larger class of attacks than for models based on free algebra. Our procedure is defined by an inference system based on basic narrowing techniques for deciding satisfiability of combinations of first-order equations and intruder deduction constraints.} }
@inproceedings{dj-csfw2004, address = {Asilomar, Pacific Grove, California, USA}, month = jun, year = 2004, publisher = {{IEEE} Computer Society Press}, acronym = {{CSFW}'04}, booktitle = {{P}roceedings of the 17th {IEEE} {C}omputer {S}ecurity {F}oundations {W}orkshop ({CSFW}'04)}, author = {Delaune, St{\'e}phanie and Jacquemard, Florent}, title = {A Theory of Dictionary Attacks and its Complexity}, pages = {2-15}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-csfw2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-csfw2004.ps}, abstract = {We consider the problem of automating proofs of cryptographic protocols when some data, like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a theory of these attacks: we introduce an inference system modeling the guessing capabilities of an intruder. This system extends the classical Dolev-Yao rules. Using proof rewriting techniques, we show a locality lemma for our inference system which yields the PTIME-completeness of the deduction problem.\par This result is lifted to the simultaneous solving of intruder deduction constraints with variables. Constraint solving is the basis of a NP algorithm for the protocol insecurity problem in the presence of dictionary attacks, assuming a bounded number of sessions. This extends the classical NP-completeness result for the Dolev-Yao model.\par We illustrate the procedure with examples of published protocols. The model and decision algorithm have been validated on some examples in a prototype implementation.} }
@inproceedings{dk-jdir-2004, address = {Lannion, France}, month = nov, year = 2004, acronym = {{JDIR}'04}, booktitle = {{A}ctes des 6{\`e}mes {J}ourn{\'e}es {D}octorales {I}nformatique et {R}{\'e}seau ({JDIR}'04)}, author = {Delaune, St{\'e}phanie and Klay, Francis}, title = {V{\'e}rification automatique appliqu{\'e}e {\`a} un protocole de commerce {\'e}lectronique}, pages = {260-269}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DK-jdir-2004.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DK-jdir-2004.pdf}, abstract = {Le domaine de la mod{\'e}lisation et de la v{\'e}rification est une activit{\'e} d{\'e}licate et importante qui a connu une v{\'e}ritable explosion dans les ann{\'e}es 1990. On dispose {\`a} l'entr{\'e}e des ann{\'e}es 2000 de toute une gamme de mod{\`e}les et de m{\'e}thodes plus ou moins avanc{\'e}s en ce qui concerne l'expressivit{\'e} et l'automatisation.\par Afin de d{\'e}finir les besoins et les priorit{\'e}s {\`a} mettre sur les outils consacr{\'e}s {\`a} la v{\'e}rification de protocoles cryptographiques qui seront d{\'e}velopp{\'e}s au sein du projet RNTL PROUV{\'E}, nous proposons de travailler en situation r{\'e}elle, sur des protocoles plut{\^o}t <<~durs~>>, en effectuant le cycle suivant~: mod{\'e}lisation, formalisation puis validation dans des outils existants. Ce travail est effectu{\'e} ici pour un protocole de porte-monnaie {\'e}lectronique, d{\'e}velopp{\'e} r{\'e}cemment par une {\'e}quipe de France T{\'e}l{\'e}com. } }
@misc{dn-fms04, author = {Nowak, David}, title = {Logical Relations for Monadic Types}, year = 2004, month = may, howpublished = {Invited talk, {I}nternational {W}orkshop on {F}ormal {M}ethods and {S}ecurity ({IWFMS}'04), Nanjing, China} }
@misc{evtgen-v1.0, author = {Olivain, Julien}, title = {{EVTGEN} v1.0: {A} Programmable Generic Generator of Event Sequences}, year = {2004}, month = jul, note = {Written in C (about 5000 lines)}, note-fr = {{\'E}crit en~C (environ 5000 lignes)}, url = {http://www.lsv.ens-cachan.fr/~olivain/evtgen/} }
@misc{netentropy-v1.0, author = {Olivain, Julien}, title = {Net-entropy v1.0: {A}n entropy checker for ciphered network connections}, year = {2004}, month = sep, url = {http://www.lsv.ens-cachan.fr/~olivain/net-entropy/} }
@inproceedings{GaLeZe04fsttcs, address = {Chennai, India}, month = dec, year = 2004, volume = 3328, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'04}, booktitle = {{P}roceedings of the 24th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'04)}, author = {Gastin, Paul and Lerman, Benjamin and Zeitoun, Marc}, title = {Distributed games with causal memory are decidable for series-parallel systems}, pages = {275-286}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLZ-fsttcs04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLZ-fsttcs04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLZ-fsttcs04.ps}, abstract = {This paper deals with distributed control problems by means of distributed games played on Mazurkiewicz traces. The main difference with other notions of distributed games recently introduced is that, instead of having a \emph{local} view, strategies and controllers are able to use a more accurate memory, based on their \emph{causal} view. Our main result states that using the causal view makes the control synthesis problem decidable for series-parallel systems for \emph{all} recognizable winning conditions on finite behaviors, while this problem with local view was proved undecidable even for reachability conditions.} }
@phdthesis{jmc-hab-04, author = {Couvreur, Jean-Michel}, title = {Contribution {\`a} l'algorithmique de la v{\'e}rification}, year = {2004}, month = jul, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} de Bordeaux~I, Bordeaux, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jmc-habile.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jmc-habile.pdf} }
@article{mar-ACTA2004, publisher = {Springer}, journal = {Acta Informatica}, author = {Markey, Nicolas}, title = {Past is for Free: {O}n the Complexity of Verifying Linear Temporal Properties with Past}, volume = {40}, number = {6-7}, pages = {431-458}, year = {2004}, month = may, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-ACTA2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Mar-ACTA2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Mar-ACTA2004.pdf}, doi = {10.1007/s00236-003-0136-5}, abstract = {We study the complexity of satisfiability and model checking problems for fragments of linear-time temporal logic with past (PLTL). We consider many fragments of PLTL, obtained by restricting the set of allowed temporal modalities, the use of negations or the nesting of future formulas into past formulas. Our results strengthen the widely accepted fact that {"}past is for free{"}, in the sense that allowing symmetric past-time modalities does not bring additional theoretical complexity. This result holds even for small fragments and even when nesting future formulas into past formulas.} }
@inproceedings{mj-wmc2004, address = {Milano, Italy}, month = jun, year = 2004, editor = {Paun, {\relax Gh}eorghe}, acronym = {{WMC}'04}, booktitle = {{P}roceedings of the 5th {W}orkshop on {M}embrane {C}omputing ({WMC}'04)}, author = {Michel, Olivier and Jacquemard, Florent}, title = {An Analysis of the {N}eedham-{S}chroeder Public-Key Protocol with~{MGS}}, pages = {295-315}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mj-wmc05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mj-wmc05.pdf}, phsnote = {est prevu un lncs avec certains papiers revises}, nmnote = {C'est LNCS3365, mais le papier n'est pas selectionne} }
@article{ms-IPL2004, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {A {PTIME}-Complete Matching Problem for {SLP}-Compressed Words}, volume = {90}, number = {1}, pages = {3-6}, year = {2004}, month = jan, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MarSch-IPL2004.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MarSch-IPL2004.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MarSch-IPL2004.pdf}, doi = {10.1016/j.ipl.2004.01.002}, abstract = {SLP-compressed words are words given by simple deterministic grammars called {"}straight-line programs{"}. We prove that the problem of deciding whether an SLP-compressed word is recognized by a FSA is complete for polynomial-time.} }
@mastersthesis{robin-dea, author = {Robin, Agn{\`e}s}, title = {Aux fronti{\`e}res de la d{\'e}cidabilit{\'e}...}, year = {2004}, month = jul, type = {Rapport de {DEA}}, school = {{DEA} Algorithmique, Paris, France}, note = {33~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Robin-dea2004.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Robin-dea2004.ps} }
@misc{rtaloop, author = {Treinen, Ralf}, title = {{RTALOOP}: {T}he {RTA} List of Open Problems}, year = {2004}, howpublished = {Web site at \url{http://www.lsv.ens-cachan.fr/rtaloop/}, started 1997}, note = {Size as of July 2004: 100 problems, 90 pages, 432 references}, note-fr = {En juillet~2004: 100 probl{\`e}mes, 90~pages, 432 r{\'e}f{\'e}rences}, url = {http://www.lsv.ens-cachan.fr/rtaloop/} }
@misc{ssp, author = {Hugel, {\relax Th}omas}, title = {{SSP}: {S}tochastic Shortest Paths}, year = {2004}, month = jul, note = {Written in Caml (about 500 lines)}, note-fr = {{\'E}crit en Caml (environ 500 lignes)} }
@article{ABRS-lossy, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Abdulla, Parosh Aziz and Bertrand, Nathalie and Rabinovich, Alexander and Schnoebelen, {\relax Ph}ilippe}, title = {Verification of Probabilistic Systems with Faulty Communication}, year = 2005, month = nov, volume = 202, number = 2, pages = {141-165}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/InfComp-ABRS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/InfComp-ABRS.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/InfComp-ABRS.ps}, doi = {10.1016/j.ic.2005.05.008}, abstract = {Many protocols are designed to operate correctly even in the case where the underlying communication medium is faulty. To capture the behavior of such protocols, \emph{Lossy Channel Systems}~(LCS's) have been proposed. In an LCS the communication channels are modeled as unbounded FIFO buffers which are unreliable in the sense that they can nondeterministically lose messages. \par Recently, several attempts have been made to study \emph{Probabilistic Lossy Channel Systems}~(PLCS's) in which the probability of losing messages is taken into account. In this article, we consider a variant of PLCS's which is more realistic than those studied previously. More precisely, we assume that during each step in the execution of the system, each message may be lost with a certain predefined probability. We show that for such systems the following model-checking problem is decidable: to verify whether a linear-time property definable by a finite-state \(\omega\)-automaton holds with probability one. We also consider other types of faulty behavior, such as corruption and duplication of messages, and insertion of new messages, and show that the decidability results extend to these models.} }
@inproceedings{baudet-ccs2005, address = {Alexandria, Virginia, USA}, month = nov, year = 2005, publisher = {ACM Press}, acronym = {{CCS}'05}, booktitle = {{P}roceedings of the 12th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'05)}, author = {Baudet, Mathieu}, title = {Deciding Security of Protocols against Off-line Guessing Attacks}, pages = {16-25}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Baudet_CCS05revised.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Baudet_CCS05revised.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Baudet_CCS05revised.ps}, doi = {10.1145/1102120.1102125}, abstract = {We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions.\par The procedure consists of a constraint solving algorithm for determining satisfiability and equivalence of a class of second-order E-unification problems, where the equational theory~E is presented by a convergent subterm rewriting system.\par To the best of our knowledge, this is the first decidability result to use the generic definition of off-line guessing attacks due to Corin~\emph{et al.} based on static equivalence in the applied pi-calculus.} }
@inproceedings{BCM05-fsttcs, address = {Hyderabad, India}, month = dec, year = 2005, volume = 3821, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ramanujam, R. and Sen, Sandeep}, acronym = {{FSTTCS}'05}, booktitle = {{P}roceedings of the 25th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'05)}, author = {Bouyer, Patricia and Chevalier, Fabrice and Markey, Nicolas}, title = {On the Expressiveness of {TPTL} and~{MTL}}, pages = {432-443}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCM-fsttcs05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCM-fsttcs05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCM-fsttcs05.ps}, doi = {10.1007/11590156_35}, abstract = {TPTL and MTL are two classical timed extensions of LTL. In this paper, we positively answer a 15-year-old conjecture that TPTL is strictly more expressive than MTL. But we show that, surprisingly, the TPTL formula proposed by Alur and Henzinger for witnessing this conjecture can be expressed in MTL. More generally, we show that TPTL formulae using only the F modality can be translated into MTL.} }
@inproceedings{BFLS05-atva, address = {Taipei, Taiwan}, month = oct, year = {2005}, volume = 3707, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Peled, Doron A. and Tsay, Yih-Kuen}, acronym = {{ATVA}'05}, booktitle = {{P}roceedings of the 3rd {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'05)}, author = {Bardin, S{\'e}bastien and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Schnoebelen, {\relax Ph}ilippe}, title = {Flat acceleration in symbolic model checking}, pages = {474-488}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFLS05-atva.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFLS05-atva.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFLS05-atva.ps}, doi = {10.1007/11562948_35}, abstract = {Symbolic model checking provides partially effective verification procedures that can handle systems with an infinite state space. So-called {"}acceleration techniques{"} enhance the convergence of fixpoint computations by computing the transitive closure of some transitions. In this paper we develop a new framework for symbolic model checking with accelerations. We also propose and analyze new symbolic algorithms using accelerations to compute reachability sets.} }
@inproceedings{BBGRS-ETFA05, address = {Catania, Italy}, month = sep, year = 2005, publisher = {{IEEE} Industrial Electronics Society}, editor = {Lo Bello, Lucia and Sauter, Thilo}, acronym = {{ETFA}'05}, booktitle = {{P}roceedings of the 10th {IEEE} {I}nternational {C}onference on {E}merging {T}echnologies and {F}actory {A}utomation ({ETFA}'05)}, author = {Bel{ }mokadem, Houda and B{\'e}rard, B{\'e}atrice and Gourcuff, Vincent and Roussel, Jean-Marc and De{~}Smet, Olivier}, title = {Verification of a timed multitask system with {U}ppaal}, pages = {347-354}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ETFA05-FV.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ETFA05-FV.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ETFA05-FV.ps}, abstract = {Since it is an important issue for users and system designers, verification of PLC programs has already been studied in various contexts, mostly for untimed programs. More recently, timed features were introduced and modeled with timed automata. In this case study, we consider a part of the so-called MSS (Mecatronic Standard System) platform from Bosh Group, a framework where time aspects are combined with multitask programming. Our model for station~2 of the MSS platform is a network of timed automata, including automata for the operative part and for the control program, written in \emph{Ladder Diagram}. This model is constrained with atomicity hypotheses concerning program execution and model checking of a reaction time property is performed with the tool~{\scshape Uppaal}.} }
@inproceedings{BC-icmtd05, address = {Giens, France}, nmnote = {Informal proceedings. Selected papers to appear in a journal}, month = may, year = 2005, acronym = {{ICMTD}'05}, booktitle = {Proceedings of the 1st {I}nternational {C}onference on {M}emory {T}echnology and {D}esign ({ICMTD}'05)}, author = {Baclet, Manuel and Chevallier, R{\'e}my}, title = {Timed Verification of the {SPSMALL} Memory}, pages = {89-92}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC05-spsmall.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC05-spsmall.pdf}, abstract = {The aim of the paper is to verify a small synchronous memory component with the real-time model checker Uppaal, taking into account the electrical propagation delays through gates and along wires.}, missingdoi = {} }
@inproceedings{BH-ICTAC05, address = {Hanoi, Vietnam}, month = oct, year = 2005, volume = 3722, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hung, Dang Van and Wirsing, Martin}, acronym = {{ICTAC}'05}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}olloquium on {T}heoretical {A}spects of {C}omputing ({ICTAC}'05)}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {Externalized and Internalized Notions of Behavioral Refinement}, pages = {334-350}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ictac05-ID128.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ictac05-ID128.pdf}, doi = {10.1007/11560647_22}, abstract = {Many different behavioral refinement notions for algebraic specifications have been proposed in the literature but the relationship between the various concepts is still unclear. In this paper we provide a classification and a comparative study of behavioral refinements according to two directions, the externalized approach which uses an explicit behavioral abstraction operator that is applied to the specification to be implemented, and the internalized approach which uses a built-in behavioral semantics of specifications. We show that both concepts are equivalent under suitable conditions. The formal basis of our study is provided by the COL institution (constructor-based observational logic). Hence, as a side-effect of our study on internalized behavioral refinements, we introduce also a novel concept of behavioral refinement for COL-specifications.} }
@misc{bouyer-jsi05, author = {Bouyer, Patricia}, title = {Timed Automata and Extensions: Decidability Limits}, year = 2005, month = mar, howpublished = {Invited talk, 5{\`e}mes Journ{\'e}es Syst{\`e}mes Infinis ({JSI}'05), Cachan, France} }
@misc{bouyer-games05, author = {Bouyer, Patricia}, title = {Synthesis of Timed Systems}, year = 2005, month = mar, howpublished = {Invited lecture, Spring School on Infinite Games and Their Applications, Bonn, Germany} }
@misc{bouyer-gdv05, author = {Bouyer, Patricia}, title = {Partial Observation of Timed Systems}, year = 2005, month = jul, howpublished = {Invited talk, 2nd Workshop on Games in Design and Verification, Edinburgh, Scotland} }
@misc{gastin-wpv05, author = {Gastin, Paul}, title = {On the synthesis of distributed controllers}, year = 2005, month = nov, howpublished = {Invited talk, Workshop Perspectives in Verification, in honor of Wolfgang Thomas on the occasion of his Doctorate Honoris Causa, Cachan, France} }
@inproceedings{BCD-fossacs05, address = {Edinburgh, Scotland, UK}, month = apr, year = 2005, volume = 3441, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sassone, Vladimiro}, acronym = {{FoSSaCS}'05}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'05)}, author = {Bouyer, Patricia and Chevalier, Fabrice and D'Souza, Deepak}, title = {Fault Diagnosis Using Timed Automata}, pages = {219-233}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/fossacs05-BCD.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/fossacs05-BCD.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/fossacs05-BCD.pdf}, doi = {10.1007/b106850}, abstract = {Fault diagnosis consists in observing behaviours of systems, and in detecting online whether an error has occurred or not. In the context of discrete event systems this problem has been well-studied, but much less work has been done in the timed framework. In this paper, we consider the problem of diagnosing faults in behaviours of timed plants. We focus on the problem of synthesizing fault diagnosers which are realizable as deterministic timed automata, with the motivation that such diagnosers would function as efficient online fault detectors. We study two classes of such mechanisms, the class of deterministic timed automata~(DTA) and the class of event-recording timed automata~(ERA). We show that the problem of synthesizing diagnosers in each of these classes is decidable, provided we are given a bound on the resources available to the diagnoser. We prove that under this assumption diagnosability is 2EXPTIME-complete in the case of DTA's whereas it becomes PSPACE-complete for ERA's.} }
@inproceedings{BBBL-concur2005, address = {San Francisco, California, USA}, month = aug, year = 2005, volume = 3653, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abadi, Mart{\'\i}n and de Alfaro, Luca}, acronym = {{CONCUR}'05}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'05)}, author = {Bel{ }mokadem, Houda and B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois}, title = {A New Modality for Almost Everywhere Properties in Timed Automata}, pages = {110-124}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBL05-concur.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBL05-concur.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBBL05-concur.ps}, doi = {10.1007/11539452_12}, abstract = {The context of this study is timed temporal logics for timed automata. In this paper, we propose an extension of the classical logic TCTL with a new Until modality, called {"}Until almost everywhere{"}. In the extended logic, it is possible, for instance, to express that a property is true at all positions of all runs, except on a negligible set of positions. Such properties are very convenient, for example in the framework of boolean program verification, where transitions result from changing variable values. We investigate the expressive power of this modality and in particular, we prove that it cannot be expressed with classical TCTL modalities. However, we show that model-checking the extended logic remains PSPACE-complete as for~TCTL.} }
@inproceedings{BCL-concur2005, address = {San Francisco, California, USA}, month = aug, year = 2005, volume = 3653, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abadi, Mart{\'\i}n and de Alfaro, Luca}, acronym = {{CONCUR}'05}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'05)}, author = {Bouyer, Patricia and Cassez, Franck and Laroussinie, Fran{\c{c}}ois}, title = {Modal Logics for Timed Control}, pages = {81-94}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCL05-concur.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCL05-concur.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCL05-concur.ps}, doi = {10.1007/11539452_10}, abstract = {In this paper we use the timed modal logic \(L_{\nu}\) to specify control objectives for timed plants. We show that the control problem for a large class of objectives can be reduced to a model-checking problem for an extension (\(L_{\nu}^{\mathrm{\small cont}}\)) of the logic \(L_{\nu}\) with a new modality. \par More precisely we define a fragment of~\(L_{\nu}\), namely \(L_{\nu}^{\mathrm{\small det}}\), such that any control objective of~\(L_{\nu}^{\mathrm{\small det}}\) can be translated into an \(L_{\nu}^{\mathrm{\small cont}}\) formula that holds for the plant if and only if there is a controller that can enforce the control objective. \par We also show that the new modality of~\(L_{\nu}^{\mathrm{\small cont}}\) strictly increases the expressive power of~\(L_{\nu}\), while model-checking of~\(L_{\nu}^{\mathrm{\small cont}}\) remains EXPTIME-complete. } }
@inproceedings{BLR-formats2005, address = {Uppsala, Sweden}, month = nov, year = 2005, volume = 3829, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pettersson, Paul and Yi, Wang}, acronym = {{FORMATS}'05}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'05)}, author = {Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois and Reynier, Pierre-Alain}, title = {Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems}, pages = {112-126}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLR05-DBM.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLR05-DBM.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLR05-DBM.ps}, doi = {10.1007/11603009_10}, abstract = {Timed automata (TA) are a widely used model for real-time systems. Several tools are dedicated to this model, and they mostly implement a forward analysis for checking reachability properties. Though diagonal constraints do not add expressive power to classical~TA, the standard forward analysis algorithm is not correct for this model. In this paper we survey several approaches to handle diagonal constraints and propose a refinement-based method for patching the usual algorithm: erroneous traces found by the classical algorithm are analyzed, and used for refining the model.} }
@inproceedings{BCK-ICALP2005, address = {Lisboa, Portugal}, month = jul, year = 2005, volume = {3580}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Caires, Lu{\'\i}s and Italiano, Giuseppe F. and Monteiro, Lu{\'\i}s and Palamidessi, Catuscia and Yung, Moti}, acronym = {{ICALP}'05}, booktitle = {{P}roceedings of the 32nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'05)}, author = {Baudet, Mathieu and Cortier, V{\'e}ronique and Kremer,Steve}, title = {Computationally Sound Implementations of Equational Theories against Passive Adversaries}, pages = {652-663}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-icalp05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-icalp05.pdf}, doi = {10.1007/11523468_53}, abstract = {In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not consider a fixed set of primitives but aim at results for an arbitrary equational theory. We define a framework for comparing a cryptographic implementation and its idealization w.r.t.\ various security notions. In particular, we concentrate on the computationnal soundness of static equivalence, a standard tool in cryptographic \(\pi\)-calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, we establish new soundness results for the Exclusive Or, as well as a theory of ciphers and lists.} }
@book{lncs3426, editor = {Bouyssonouse, Bruno and Sifakis, Joseph}, title = {Embedded Systems Design: The {ARTIST} Roadmap for Research and Development}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, volume = 3436, year = 2005, url = {http://www.springer.com/978-3-540-25107-3}, olderurl = {http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-25107-3}, isbn = {3-540-25107-3}, doi = {10.1007/b106761} }
@inproceedings{ComDel-rta2005, address = {Nara, Japan}, month = apr, year = 2005, volume = 3467, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Giesl, J{\"u}rgen}, acronym = {{RTA}'05}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'05)}, author = {Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {The finite variant property: {H}ow to get rid of some algebraic properties}, pages = {294-307}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-CD.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/rta05-CD.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-CD.pdf}, doi = {10.1007/b135673}, abstract = {We consider the following problem: Given a term \(t\), a rewrite system \(\mathcal{R}\), a finite set of equations \(E'\) such that \(\mathcal{R}\) is convergent modulo~\(E'\), compute finitely many instances of~\(t\): \(t_1,\ldots,t_n\) such that, for every substitution~\(\sigma\), there is an index \(i\) and a substitution~\(\theta\) such that \( t\sigma\mathord{\downarrow}=_{E'} t_i\theta\) (where \(t\sigma\mathord{\downarrow}\) is the normal form of \(t\sigma\) w.r.t.~\(\mathcal{R}/E'\)). \par The goal of this paper is to give equivalent (resp. sufficient) conditions for the finite variant property and to systematically investigate this property for equational theories, which are relevant to security protocols verification. For instance, we prove that the finite variant property holds for Abelian Groups, and a theory of modular exponentiation and does not hold for the theory~\textit{ACUNh} (Associativity, Commutativity, Unit, Nilpotence, homomorphism).} }
@article{CF-icomp05, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {C{\'e}c{\'e}, G{\'e}rard and Finkel, Alain}, title = {Verification of Programs with Half-Duplex Communication}, year = 2005, month = nov, volume = 202, number = 2, pages = {166-190}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CF-icomp05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CF-icomp05.pdf}, doi = {10.1016/j.ic.2005.05.006}, abstract = {We consider the analysis of infinite \emph{half-duplex systems} made of finite state machines that communicate over unbounded channels. The half-duplex property for two machines and two channels (one in each direction) says that each reachable configuration has at most one channel non-empty. We prove in this paper that such half-duplex systems have a recognizable reachability set. We show how to compute, in polynomial time, a symbolic representation of this reachability set and how to use that description to solve several verification problems. Furthermore, though the model of communicating finite state machines is Turing-powerful, we prove that membership of the class of half-duplex systems is decidable. Unfortunately, the natural generalization to systems with more than two machines is Turing-powerful. We also prove that the model-checking of those systems against PLTL (Propositional Linear Temporal Logic) or CTL (Computational Tree Logic) is undecidable. Finally, we show how to apply the previous decidability results to the Regular Model Checking. We propose a new symbolic reachability semi-algorithm with accelerations which successfully terminates on half-duplex systems of two machines and some interesting non-half-duplex systems.} }
@misc{cortos05, author = {Bouyer, Patricia and others}, title = {{ACI} {S}{\'e}curit{\'e} {I}nformatique {CORTOS} <<~{C}ontrol and {O}bservation of {R}eal-{T}ime {O}pen {S}ystems~>>~--- Rapport {\`a} mi-parcours}, year = 2005, month = apr, type = {Contract Report}, note = {6~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/cortos-MP.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/cortos-MP.pdf}, missingdoi = {} }
@inproceedings{Cortos-MSR05-impl, address = {Autrans, France}, month = oct, year = 2005, publisher = {Herm{\`e}s}, editor = {Alla, Hassane and Rutten, {\'E}ric}, acronym = {{MSR}'05}, booktitle = {{A}ctes du 5{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'05)}, author = {Altisen, Karine and Markey, Nicolas and Reynier, Pierre-Alain and Tripakis, Stavros}, title = {Impl{\'e}mentabilit{\'e} des automates temporis{\'e}s}, pages = {395-406}, nonote = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSR05-impl.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSR05-impl.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MSR05-impl.ps}, abstract = {In this paper, we present the problem of the implementability of timed automata. The theoretical semantics of timed automata can not be exactly implemented in practice, because computers are digital and more or less precise; the properties verified on a timed automaton are not necessarily preserved when implementing it. We deal with two approaches: the first one is based on the modeling of the execution platform and the second studies an enlarged semantics for timed automata that takes the imprecision into account.} }
@inproceedings{Cortos-MSR05-obs, address = {Autrans, France}, month = oct, year = 2005, publisher = {Herm{\`e}s}, editor = {Alla, Hassane and Rutten, {\'E}ric}, acronym = {{MSR}'05}, booktitle = {{A}ctes du 5{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'05)}, author = {Bouyer, Patricia and Chevalier, Fabrice and Krichen, Moez and Tripakis, Stavros}, title = {Observation partielle des syst{\`e}mes temporis{\'e}s}, pages = {381-393}, nonote = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSR05-obs.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSR05-obs.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MSR05-obs.ps}, abstract = {In this paper, we present the partial observability constraint, which naturally appears when modeling real-time systems. We have selected three problems in which this hypothesis is fundamental but leads to more difficult problems: control of timed systems, fault diagnosis, and conformance testing. We describe methods which can be used for solving such problems. } }
@inproceedings{Cortos-MSR05-control, address = {Autrans, France}, month = oct, year = 2005, publisher = {Herm{\`e}s}, editor = {Alla, Hassane and Rutten, {\'E}ric}, acronym = {{MSR}'05}, booktitle = {{A}ctes du 5{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'05)}, author = {Altisen, Karine and Bouyer, Patricia and Cachat, Thierry and Cassez, Franck and Gardey, Guillaume}, title = {Introduction au contr{\^o}le des syst{\`e}mes temps-r{\'e}el}, pages = {367-380}, nonote = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSR05-control.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSR05-control.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MSR05-control.ps}, abstract = {In this paper we give a quick overview of the area of control of real-time systems.} }
@misc{demri-RSFDGrC05, author = {Demri, St{\'e}phane}, title = {On the complexity of information logics}, year = 2005, month = aug, howpublished = {Invited talk, Workshop on Logical and Algebraic Foundations of Rough Sets, Regina, Canada} }
@article{demri-JLC05, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane}, title = {A reduction from {DLP} to~{PDL}}, year = 2005, month = oct, volume = 15, number = 5, pages = {767-785}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-jlc05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-jlc05.pdf}, doi = {10.1093/logcom/exi043}, abstract = {We present a reduction from a new logic extending van der Meyden's dynamic logic of permission~(DLP) into propositional dynamic logic (PDL), providing a 2EXPTIME decision procedure and showing that all the machinery for~PDL can be reused for reasoning about dynamic policies. As a side-effect, we establish that DLP is EXPTIME-complete. The logic we introduce extends the logic~DLP so that the policy set can be updated depending on its current value and such an update corresponds to add\slash delete transitions in the model, showing similarities with van Benthem's sabotage modal logic.} }
@article{ddn-jlli05, publisher = {Kluwer Academic Publishers}, journal = {Journal of Logic, Language and Information}, author = {Demri, St{\'e}phane and de Nivelle, Hans}, title = {Deciding Regular Grammar Logics with Converse through First-Order Logic}, volume = 14, number = 3, pages = {289-319}, year = {2005}, month = jun, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ddn-gf-issue.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ddn-gf-issue.pdf}, oldnote = {special issue dedicated to guarded logics.}, doi = {10.1007/s10849-005-5788-9}, abstract = {We provide a simple translation of the satisfiability problem for regular grammar logics with converse into GF2 , which is the intersection of the guarded fragment and the 2-variable fragment of first-order logic. The translation is theoretically interesting because it translates modal logics with certain frame conditions into first-order logic, without explicitly expressing the frame conditions. It is practically relevant because it makes it possible to use a decision procedure for the guarded fragment in order to decide regular grammar logics with converse. The class of regular grammar logics includes numerous logics from various application domains.\par A consequence of the translation is that the general satisfiability problem for every regular grammar logics with converse is in~EXPTIME. This extends a previous result of the first author for grammar logics without converse. Other logics that can be translated into GF2 include nominal tense logics and intuitionistic logic. In our view, the results in this paper show that the natural first-order fragment corresponding to regular grammar logics is simply GF2 without extra machinery such as fixed point-operators.} }
@inproceedings{DZG05-aplas, address = {Tsukuba, Japan}, month = nov, year = 2005, volume = 3780, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Yi, Kwangkeun}, acronym = {{APLAS}'05}, booktitle = {{P}roceedings of the 3rd {A}sian {S}ymposium on {P}rogramming {L}anguages and {S}ystems ({APLAS}'05)}, author = {Dal Zilio, Silvano and Gascon, R{\'e}gis}, title = {Resource Bound Certification for a Tail-Recursive Virtual Machine}, pages = {247-263}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DZG-APLAS05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DZG-APLAS05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DZG-APLAS05.ps}, doi = {10.1007/11575467_17}, abstract = {We define a method to statically bound the size of values computed during the execution of a program as a function of the size of its parameters. More precisely, we consider bytecode programs that should be executed on a simple stack machine with support for algebraic data types, pattern-matching and tail-recursion. Our size verification method is expressed as a static analysis, performed at the level of the bytecode, that relies on machine-checkable certificates. We follow here the usual assumption that code and certificates may be forged and should be checked before execution.\par Our approach extends a system of static analyses based on the notion of quasi-interpretations that has already been used to enforce resource bounds on first-order functional programs. This paper makes two additional contributions. First, we are able to check optimized programs, containing instructions for unconditional jumps and tail-recursive calls, and remove restrictions on the structure of the bytecode that was imposed in previous works. Second, we propose a direct algorithm that depends only on solving a set of arithmetical constraints.} }
@inproceedings{DG-concur2005, address = {San Francisco, California, USA}, month = aug, year = 2005, volume = 3653, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abadi, Mart{\'\i}n and de Alfaro, Luca}, acronym = {{CONCUR}'05}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'05)}, author = {Demri, St{\'e}phane and Gascon, R{\'e}gis}, title = {Verification of Qualitative {\(\mathbb{\MakeUppercase{Z}}\)}-Constraints}, pages = {518-532}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-Concur05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-Concur05.pdf}, doi = {10.1007/11539452_39}, abstract = {We introduce an LTL-like logic with atomic formulae built over a constraint language interpreting variables in~\(\mathbb{Z}\). The constraint language includes periodicity constraints, comparison constraints of the form \(x = y\) and \(x < y\), it is closed under Boolean operations and it admits a restricted form of existential quantification. This is the largest set of qualitative constraints over~\(\mathbb{Z}\) known so far, shown to admit a decidable LTL extension. Such constraints are those used for instance in calendar formalisms or in abstractions of counter automata by using congruences modulo some power of two. Indeed, various programming languages perform arithmetic operators modulo some integer. We show that the satisfiability and model-checking problems (with respect to an appropriate class of constraint automata) for this logic are decidable in polynomial space improving significantly known results about its strict fragments. As a by-product, LTL model-checking over integral relational automata is proved complete for polynomial space which contrasts with the known undecidability of its CTL counterpart.} }
@inproceedings{DKR-FEE2005, address = {Milan, Italy}, month = sep, year = 2005, optaddress = {}, acronym = {{FEE} 2005}, booktitle = {{P}roceedings of the {W}orkshop {F}rontiers in {E}lectronic {E}lections ({FEE} 2005)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Receipt-Freeness: Formal Definition and Fault Attacks (Extended Abstract)}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-fee05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-fee05.pdf}, preliminary-version-of = {DKR-csfw06} }
@inproceedings{DLN-time05, address = {Burlington, Vermont, USA}, month = jun, year = 2005, publisher = {{IEEE} Computer Society Press}, acronym = {{TIME}'05}, booktitle = {{P}roceedings of the 12th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'05)}, author = {Demri, St{\'e}phane and Lazi{\'c}, Ranko and Nowak, David}, title = {On the Freeze Quantifier in Constraint {LTL}: Decidability and Complexity}, pages = {113-121}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-03.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-03.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-03.pdf}, doi = {10.1109/TIME.2005.28}, abstract = {Constraint LTL, a generalization of LTL over Presburger constraints, is often used as a formal language to specify the behavior of operational models with constraints. The freeze quantifier can be part of the language, as in some real-time logics, but this variable-binding mechanism is quite general and ubiquitous in many logical languages (first-order temporal logics, hybrid logics, logics for sequence diagrams, navigation logics, etc.). We show that Constraint LTL over the simple domain \(\langle \mathbb{N}, = \rangle\) augmented with the freeze operator is undecidable which is a surprising result regarding the poor language for constraints (only equality tests). Many versions of freeze-free Constraint LTL are decidable over domains with qualitative predicates and our undecidability result actually establishes \(\Sigma_{1}^{1}\)-completeness. On the positive side, we provide complexity results when the domain is finite (EXPSPACE-completeness) or when the formulae are flat in a sense introduced in the paper. Our undecidability results are quite sharp (\emph{i.e.}~with restrictions on the number of variables) and all our complexity characterizations insure completeness with respect to some complexity class (mainly PSPACE and~EXPSPACE).} }
@inproceedings{DN-atva05, address = {Taipei, Taiwan}, month = oct, year = {2005}, volume = 3707, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Peled, Doron A. and Tsay, Yih-Kuen}, acronym = {{ATVA}'05}, booktitle = {{P}roceedings of the 3rd {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'05)}, author = {Demri, St{\'e}phane and Nowak, David}, title = {Reasoning about transfinite sequences (extended abstract)}, pages = {248-262}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DN-atva2005.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DN-atva2005.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DN-atva2005.ps}, doi = {10.1007/11562948_20}, abstract = {We introduce a family of temporal logics to specify the behavior of systems with Zeno behaviors. We extend linear-time temporal logic LTL to authorize models admitting Zeno sequences of actions and quantitative temporal operators indexed by ordinals replace the standard next-time and until future-time operators. Our aim is to control such systems by designing controllers that safely work on \(\omega\)-sequences but interact synchronously with the system in order to restrict their behaviors. We show that the satisfiability problem for the logics working on \(\omega^{k}\)-sequences is EXPSPACE-complete when the integers are represented in binary, and PSPACE-complete with a unary representation. To do so, we substantially extend standard results about LTL by introducing a new class of succinct ordinal automata that can encode the interaction between the different quantitative temporal operators.} }
@inproceedings{FM-podc05, address = {Las Vegas, Nevada, USA}, month = jul, year = 2005, publisher = {ACM Press}, editor = {Aguilera, Marcos Kawazoe and Aspnes, James}, acronym = {{PODC}'05}, booktitle = {{P}roceedings of the {T}wenty-{F}ourth {A}nnual {ACM} {SIGACT}-{SIGOPS} {S}ymposium on {P}rinciples of {D}istributed {C}omputing ({PODC}'05)}, author = {Fribourg, Laurent and Messika, St{\'e}phane}, title = {Brief Announcement: Coupling for {M}arkov Decision Processes~--- {A}pplication to Self-Stabilization with Arbitrary Schedulers}, pages = {322}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ba173-messika.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ba173-messika.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ba173-messika.ps}, doi = {10.1145/1073814.1073875} }
@inproceedings{Gascon-m4m2005, address = {Berlin, Germany}, month = dec, year = 2005, volume = 194, series = {Informatik Bericht}, publisher = {Humboldt Universit{\"a}t zu Berlin}, editor = {Schlingloff, Holger}, acronym = {{M4M-4}}, booktitle = {{P}roceedings of the 4th {W}orkshop on {M}ethods for {M}odalities ({M4M-4})}, author = {Gascon, R{\'e}gis}, title = {Verifying qualitative and quantitative properties with~{LTL} over concrete domains}, pages = {54-61}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Gascon-M4M05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Gascon-M4M05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Gascon-M4M05.ps}, abstract = {We introduce different extensions of LTL where propositional variables are replaced by constraints interpreted in~\(\mathbb{Z}\). We show different decidability and complexity results for the satisfiability and model checking problems of these logics. The extension of LTL over a wide set of qualitative constraints is shown to be PSPACE-complete. When introducing some quantitative constraints, we must consider strong restrictions to regain decidability.} }
@inproceedings{Gastin-ICALP2005, address = {Lisboa, Portugal}, month = jul, year = 2005, volume = {3580}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Caires, Lu{\'\i}s and Italiano, Giuseppe F. and Monteiro, Lu{\'\i}s and Palamidessi, Catuscia and Yung, Moti}, acronym = {{ICALP}'05}, booktitle = {{P}roceedings of the 32nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'05)}, author = {Droste, Manfred and Gastin, Paul}, title = {Weighted Automata and Weighted Logics}, pages = {513-525}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/icalp05dg-final.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/icalp05dg-final.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/icalp05dg-final.pdf}, doi = {10.1007/11523468_42}, abstract = {Weighted automata are used to describe quantitative properties in various areas such as probabilistic systems, image compression, speech-to-text processing. The behaviour of such an automaton is a mapping, called a formal power series, assigning to each word a weight in some semiring. We generalize B{\"{u}}chi's and Elgot's fundamental theorems to this quantitative setting. We introduce a weighted version of MSO~logic and prove that, for commutative semirings, the behaviours of weighted automata are precisely the formal power series definable with our weighted logic. We also consider weighted first-order logic and show that aperiodic series coincide with the first-order definable ones, if the semiring is locally finite, commutative and has some aperiodicity property.} }
@inproceedings{GLP:VMCAI, address = {Paris, France}, month = jan, year = 2005, volume = 3385, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cousot, Radhia}, acronym = {{VMCAI}'05}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'05)}, author = {Goubault{-}Larrecq, Jean and Parrennes, Fabrice}, title = {Cryptographic Protocol Analysis on Real {C}~Code}, pages = {363-379}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf}, doi = {10.1007/b105073}, abstract = {Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e.g., SSL or TLS). We describe how cryptographic protocol verification techniques based on solving clause sets can be applied to detect vulnerabilities of C programs in the Dolev-Yao model, statically. This involves integrating fairly simple pointer analysis techniques with an analysis of which messages an external intruder may collect and forge. This also involves relating concrete run-time data with abstract, logical terms representing messages. To this end, we make use of so-called trust assertions. The output of the analysis is a set of clauses in the decidable class H1, which can then be solved independently. This can be used to establish secrecy properties, and to detect some other bugs. } }
@article{JGL-ipl2005, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Goubault{-}Larrecq, Jean}, title = {Deciding {\(\mathcal{\MakeUppercase{H}}_1\)} by Resolution}, year = {2005}, volume = 95, number = 3, pages = {401-408}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Goubault-h1.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Goubault-h1.pdf}, doi = {10.1016/j.ipl.2005.04.007}, abstract = {Nielson, Nielson and Seidl's class \(\mathcal{H}_1\) is a decidable class of first-order Horn clause sets, describing strongly regular relations. We give another proof of decidability, and of the regularity of the defined languages, based on fairly standard automated deduction techniques. } }
@article{VGL-dmtcs05, journal = {Discrete Mathematics \& Theoretical Computer Science}, author = {Verma, Kumar N. and Goubault{-}Larrecq, Jean}, title = {{K}arp-{M}iller Trees for a Branching Extension of~{VASS}}, volume = 7, number = 1, pages = {217-230}, year = 2005, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VGL-dmtcs05.pdf}, secondurl = {http://www.dmtcs.org/volumes/abstracts/dm070113.abs.html}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VGL-dmtcs05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VGL-dmtcs05.ps}, abstract = {We study BVASS (Branching VASS) which extend VASS (Vector Addition Systems with States) by allowing addition transitions that merge two configurations. Runs in BVASS are tree-like structures instead of linear ones as for VASS. We show that the construction of Karp-Miller trees for VASS can be extended to BVASS. This entails that the coverability set for BVASS is computable. This allows us to obtain decidability results for certain classes of equational tree automata with an associative-commutative symbol. Recent independent work by de Groote \emph{et al.} implies that decidability of reachability in BVASS is equivalent to decidability of provability in MELL (multiplicative exponential linear logic), which is still an open problem. Hence our results are also a step towards answering this question in the affirmative.} }
@inproceedings{MukhamedovKremerRitter2005, address = {Roseau, The Commonwealth Of Dominica}, month = aug, year = 2005, volume = 3570, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Patrick, Andrew S. and Yung, Moti}, acronym = {{FC}'05}, booktitle = {{R}evised {P}apers from the 9th {I}nternational {C}onference on {F}inancial {C}ryptography and {D}ata {S}ecurity ({FC}'05)}, author = {Mukhamedov, Aybek and Kremer, Steve and Ritter, Eike}, title = {Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model}, pages = {255-269}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MKR-fcrypto05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MKR-fcrypto05.pdf}, doi = {10.1007/11507840_23}, abstract = {A multi-party fair exchange protocol is a cryptographic protocol allowing several parties to exchange commodities in such a way that everyone gives an item away if and only if it receives an item in return. In this paper we discuss a multi-party fair exchange protocol originally proposed by Franklin and Tsudik, and subsequently shown to have flaws and fixed by Gonz\'alez and Markowitch. We identify flaws in the fixed version of the protocol, propose a corrected version, and give a formal proof of correctness in the strand space model.} }
@inproceedings{KremerRyan2005, address = {Edinburgh, Scotland, UK}, month = apr, year = 2005, volume = 3444, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sagiv, Mooly}, acronym = {{ESOP}'05}, booktitle = {{P}rogramming {L}anguages and {S}ystems~--- {P}roceedings of the 14th {E}uropean {S}ymposium on {P}rogramming ({ESOP}'05)}, author = {Kremer, Steve and Ryan, Mark D.}, title = {Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus}, pages = {186-200}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-esop05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Kremer-esop05.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-esop05.pdf}, doi = {10.1007/b107380}, abstract = {Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. The applied pi calculus is a formalism for modelling such protocols, and allows us to verify properties by using automatic tools, and to rely on manual proof techniques for cases that automatic tools are unable to handle. We model a known protocol for elections known as FOO~92 in the applied pi calculus, and we formalise three of its expected properties, namely fairness, eligibility, and privacy. We use the ProVerif tool to prove that the first two properties are satisfied. In the case of the third property, ProVerif is unable to prove it directly, because its ability to prove observational equivalence between processes is not complete. We provide a manual proof of the required equivalence.} }
@inproceedings{GK-concur05, address = {San Francisco, California, USA}, month = aug, year = 2005, volume = 3653, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abadi, Mart{\'\i}n and de Alfaro, Luca}, acronym = {{CONCUR}'05}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'05)}, author = {Gastin, Paul and Kuske, Dietrich}, title = {Uniform Satisfiability Problem for Local Temporal Logics over {M}azurkiewicz Traces}, pages = {533-547}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/concur05gk-final.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/concur05gk-final.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/concur05gk-final.ps}, doi = {10.1007/11539452_40}, abstract = {We continue our study of the complexity of temporal logics over concurrent systems that can be described by Mazurkiewicz traces. In a previous paper (CONCUR~2003), we investigated the class of local and MSO definable temporal logics that capture all known temporal logics and we showed that the satisfiability problem for any such logic is in PSPACE (provided the dependence alphabet is fixed). In this paper, we concentrate on the uniform satisfiability problem: we consider the dependence alphabet (\emph{i.e.}, the architecture of the distributed system) as part of the input. We prove lower and upper bounds for the uniform satisfiability problem that depend on the number of monadic quantifier alternations present in the chosen MSO-modalities.} }
@inproceedings{LLT-rta2005, address = {Nara, Japan}, month = apr, year = 2005, volume = 3467, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Giesl, J{\"u}rgen}, acronym = {{RTA}'05}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'05)}, author = {Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf}, title = {Intruder Deduction for {AC}-like Equational Theories with Homomorphisms}, pages = {308-322}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-LLT.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-LLT.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/rta05-LLT.ps}, doi = {10.1007/b135673}, abstract = {Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocols rely on rewriting techniques and automated deduction in order to implement or mimic the process calculus describing the protocol execution. \par We focus on the intruder deduction problem, that is the vulnerability to passive attacks, in presence of several variants of \textit{AC}-like axioms (from \textit{AC} to Abelian groups, including the theory of \emph{exclusive or}) and homomorphism which are the most frequent axioms arising in cryptographic protocols. Solutions are known for the cases of \emph{exclusive or}, of Abelian groups, and of homomorphism alone. In this paper we address the combination of these \textit{AC}-like theories with the law of homomorphism which leads to much more complex decision problems.\par We prove decidability of the intruder deduction problem in all cases considered. Our decision procedure is in EXPTIME, except for a restricted case in which we have been able to get a PTIME decision procedure using a property of one-counter and pushdown automata.} }
@inproceedings{Laroussinie-m4m05, address = {Berlin, Germany}, month = dec, year = 2005, volume = 194, series = {Informatik Bericht}, publisher = {Humboldt Universit{\"a}t zu Berlin}, editor = {Schlingloff, Holger}, acronym = {{M4M-4}}, booktitle = {{P}roceedings of the 4th {W}orkshop on {M}ethods for {M}odalities ({M4M-4})}, author = {Laroussinie, Fran{\c{c}}ois}, title = {Timed modal logics for the verification of real-time systems}, pages = {293-305}, nonote = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Lar-M4M05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Lar-M4M05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Lar-M4M05.ps}, abstract = {The timed modal logic \(L_{\nu}\) has been proposed in order to express timed properties over real-time systems modeled as (compositions of) timed automata. In this paper, we present a short survey of results about~\(L_{\nu}\): complexity of model checking, expressivity, compositional methods, relationship with strong timed bisimulation etc. We also show how \(L_{\nu}\) can be extended in order to express new properties. } }
@inproceedings{LS-fossacs05, address = {Edinburgh, Scotland, UK}, month = apr, year = 2005, volume = 3441, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sassone, Vladimiro}, acronym = {{FoSSaCS}'05}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'05)}, author = {Laroussinie, Fran{\c{c}}ois and Sproston, Jeremy}, title = {Model Checking Durational Probabilistic Systems}, pages = {140-154}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/fossacs05-FS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/fossacs05-FS.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/fossacs05-FS.ps}, doi = {10.1007/b106850}, abstract = {We consider model-checking algorithms for durational probabilistic systems, which are systems exhibiting nondeterministic, probabilistic and discrete-timed behaviour. We present two semantics for durational probabilistic systems, and show how formulae of the probabilistic and timed temporal logic PTCTL can be verified on such systems. We also address complexity issues, in particular identifying the cases in which model checking durational probabilistic systems is harder than verifying non-probabilistic durational systems.} }
@inproceedings{LNZ-appsem05, address = {Frauenchiemsee, Germany}, month = sep, year = 2005, editor = {Hofmann, Martin and Loidl, Hans-Wolfgang}, acronym = {{APPSEM}'05}, booktitle = {{P}roceedings of the 3rd {APPSEM~II} Workshop ({APPSEM}'05)}, author = {Lasota, S{\l}awomir and Nowak, David and Zhang, Yu}, title = {On completeness of logical relations for monadic types}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LNZ-monad-complete.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LNZ-monad-complete.pdf}, abstract = {Interesting properties of programs can be expressed using contextual equivalence. The latter is difficult to prove directly, hence (pre-)logical relations are often used as a tool to prove it. Whereas pre-logical relations are complete at all types, logical relations are only complete up to first-order types. We propose a notion of contextual equivalence for Moggi's computational lambda calculus, and define pre-logical and logical relations for this calculus. Monads introduce new difficulties: in particular the usual proofs of completeness up to first-order types do not go through. We prove completeness up to first order for several of Moggi's monads. In the case of the non-determinism monad we obtain, as a corollary, completness of strong bisimulation w.r.t.~contextual equivalence in lambda calculus with monadic non-determinism.} }
@techreport{rr-LSV:05:11, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Automated Induction for Complex Data Structures}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2005}, month = jul, type = {Research Report}, number = {LSV-05-11}, note = {24~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-11.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-11.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-11.ps}, abstract = {We develop a new approach for mechanizing induction on complex data structures (like sets, sorted lists, trees, powerlists...). The key idea is to compute a tree grammar with constraints which describes exactly the initial model of the given specification, unlike test sets or cover sets which are approximative induction schemes when the constructors are not free. This grammar is used for the generation of subgoals during the proof by induction. Our procedure is sound and refutationally complete even with constrained axioms for constructors. it subsumes all test set induction techniques, and yields very natural proofs for several examples on which other approaches failed.} }
@techreport{rr-LSV:05:17, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Automatic Verification of Sufficient Completeness for Specifications of Complex Data Structures}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2005, month = aug, type = {Research Report}, number = {LSV-05-17}, note = {14~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-17.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-17.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-17.ps}, abstract = {We present a new procedure for testing sufficient completeness for conditional and constrained term rewriting systems in presence of constrained axioms for constructors. Such axioms allow to specify complex data structures like e.g. sets or sorted lists. Our approach is based on tree grammars with constraints, a formalism which permits an exact representation of languages of ground constructor terms in normal form. The procedure is sound and complete and has been successfully used for checking the sufficient completeness of several specifications where related former techniques fail.} }
@techreport{LSV:05:19, author = {Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf}, title = {Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2005, month = oct, type = {Research Report}, number = {LSV-05-19}, note = {39~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-19.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-19.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-19.ps}, abstract = {Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocols are based on rewriting techniques and automated deduction in order to implement or mimic the process calculus describing the execution of a protocol.\par We are interested in the intruder deduction problem, that is the vulnerability to passive attacks, in presence of the theory of an encryption operator which distributes over the \emph{exclusive-or}. This equational theory describes very common properties of cryptographic primitives. Solutions to the intruder deduction problem modulo an equational theory are known for the cases of \emph{exclusive-or}, of Abelian groups, of a homomorphism symbol alone, and of combinations of these theories. In this paper we consider the case where the encryption distributes over \emph{exclusive-or}. The interaction of the distributive law of the encryption with the cancellation law of \emph{exclusive-or} leads to a much more complex decision problem. We prove decidability of the intruder deduction problem for an encryption which distributes over \emph{exclusive-or} with an EXPTIME procedure and we give a PTIME decision procedure relying on prefix rewrite systems for a restricted case, the \emph{binary} case.} }
@article{LugSch-IC, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Lugiez, Denis and Schnoebelen, {\relax Ph}ilippe}, title = {Decidable first-order transition logics for {PA}-processes}, year = 2005, month = nov, volume = 203, number = 1, pages = {75-113}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/InfComp-C2707.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/InfComp-C2707.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/InfComp-C2707.ps}, doi = {10.1016/j.ic.2005.02.003}, abstract = {We show the decidability of model checking PA-processes against several first-order logics based upon the reachability predicate. The main tool for this result is the recognizability by tree automata of the reachability relation. The tree automata approach and the transition logics we use allow a smooth and general treatment of parameterized model checking for PA. This approach is extended to handle a quite general notion of costs of PA-steps. In particular, when costs are Parikh images of traces, we show decidability of a transition logic extended by some form of first-order reasoning over costs.} }
@inproceedings{Orchids-cav05, address = {Edinburgh, Scotland, UK}, month = jul, year = 2005, volume = 3576, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Etessami, Kousha and Rajamani, Sriram}, acronym = {{CAV}'05}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'05)}, author = {Olivain, Julien and Goubault{-}Larrecq, Jean}, title = {The {O}rchids Intrusion Detection Tool}, pages = {286-290}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf}, doi = {10.1007/11513988_28} }
@misc{PERSEE-RC1, author = {Bardin, S{\'e}bastien and Herbreteau, Fr{\'e}d{\'e}ric and Sighireanu, Mihaela and Sutre, Gr{\'e}goire and Vincent, Aymeric}, title = {Int{\'e}gration des outils {PERS\'EE} (Proposition d'architecture)}, howpublished = {D\'elivrable~3.1~--- Partie~1 du Projet PERS\'EE de l'ACI S\'ecurit\'e Informatique}, year = 2005, month = jun, url = {http://www.labri.fr/perso/herbrete/persee/downloads/integration/deliverable3.1.pdf}, pdf = {http://www.labri.fr/perso/herbrete/persee/downloads/integration/deliverable3.1.pdf}, note = {35~pages} }
@misc{persee-miparcours05, author = {Schnoebelen, {\relax Ph}ilippe and others}, title = {{ACI} {S}{\'e}curit{\'e} {I}nformatique {PERS{\'E}E}~--- Rapport {\`a} mi-parcours}, year = 2005, month = nov, type = {Contract Report}, note = {8~pages} }
@techreport{Prouve:rap5, author = {Bozga, Liana and Delaune, St{\'e}phanie and Klay, Francis and Vigneron, Laurent}, title = {Retour d'exp{\'e}rience sur la validation du porte-monnaie {\'e}lectronique}, institution = {projet RNTL PROUV{\'E}}, month = mar, year = 2005, type = {Technical Report}, number = 5, note = {29~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap5.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap5.ps}, abstract = {Le domaine de la mod{\'e}lisation et de la v{\'e}rification est une activit{\'e} d{\'e}licate et importante qui a connu une v{\'e}ritable explosion dans les ann{\'e}es~1990. On dispose {\`a} l'entr{\'e}e des ann{\'e}es~2000 de toute une gamme de mod{\`e}les et de m{\'e}thodes plus ou moins avanc{\'e}s en ce qui concerne l'expressivit{\'e} et l'automatisation. \par Afin de d{\'e}finir les besoins et les priorit{\'e}s {\`a} mettre sur les outils consacr{\'e}s {\`a} la v{\'e}rification de protocoles cryptographiques qui seront d{\'e}velopp{\'e}s au sein du projet RNTL PROUV{\'E}, nous proposons de travailler en situation r{\'e}elle, sur des protocoles plut{\^o}t <<~durs~>>, en effectuant le cycle suivant: mod{\'e}lisation, formalisation puis validation dans des outils existants. Ce travail est effectu{\'e} ici pour deux versions d'un protocole de porte-monnaie {\'e}lectronique, dont l'une a {\'e}t{\'e} d{\'e}velopp{\'e}e r{\'e}cemment par une {\'e}quipe de France T{\'e}l{\'e}com. Les outils retenus pour la r{\'e}alisation de cette {\'e}tude sont ProVerif, Hermes et Casrul, en raison de leurs caract{\'e}ristiques tr{\`e}s diff{\'e}rentes.} }
@techreport{Prouve:rap6, author = {Delaune, St{\'e}phanie and Klay, Francis and Kremer, Steve}, title = {Sp{\'e}cification du protocole de vote {\'e}lectronique}, institution = {projet RNTL PROUV{\'E}}, month = nov, year = 2005, type = {Technical Report}, number = 6, note = {19~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap6.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap6.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Prouve-rap6.ps}, abstract = {Cette nouvelle \'etude de cas a pour but de tester les limites du langage~{\scshape Prouv\'e}. En effet, le protocole que nous avons choisi d'\'etudier est volontairement complexe tant au niveau de la mod\'elisation des propri\'et\'es de s\'ecurit\'e que de la description du protocole lui-m\^eme en raison de la manipulation de structures de donn\'ees telles que les listes.\par Notre \'etude de cas est un protocole de vote qui a \'et\'e mis au point par J.~Traor\'e, ing\'enieur de recherche chez France~T\'el\'ecom. Ce protocole est bas\'e sur le m\'ecanisme de signature en aveugle et peut \^etre consid\'er\'e comme un d\'eriv\'e du protocole de Fujioka, Okamoto et~Ohta. Ce document introduit dans un premier temps le probl\`eme du vote \'electronique en g\'en\'eral avant de d\'ecrire le protocole en lui-m\^eme et sa formalisation dans le langage~{\scshape Prouv\'e}.} }
@techreport{Prouve:rap7, author = {Kremer, Steve and Lakhnech, Yassine and Treinen, Ralf}, title = {The {P}{\scshape rouv\'e} Manual: Specifications, Semantics, and Logics}, institution = {projet RNTL PROUV{\'E}}, month = dec, year = 2005, type = {Technical Report}, number = 7, note = {49~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap7.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap7.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Prouve-rap7.ps}, abstract = { In this report we describe the {\scshape Prouv\'e} specification language for cryptographic protocols. A main feature of the language is that it separates the roles of a protocol, which are defined in a simple imperative programming language, from the scenario which defines how instances of the roles are created.\par We give a formal semantics of the protocol specification language, and define both an expressive logics for safety conditions of protocols and a more limited assertion language.\par This version of the report~(2.0.x) describes version~2.0 of the {\scshape Prouv\'e} language.} }
@inproceedings{PinchinatRiedweg05, address = {Portland, Oregon, USA}, month = jun, year = 2005, publisher = {IEEECSP}, editor = {Balakrishnan, S. N.}, acronym = {{ACC}'05}, booktitle = {{P}roceedings of the 24th {A}merican {C}ontrol {C}onference ({ACC}'05)}, author = {Pinchinat, Sophie and Riedweg, St{\'e}phane}, title = {You Can Always Compute Maximally Permissive Controllers Under Partial Observation When They Exist}, pages = {2287-2292}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PR-ACC05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PR-ACC05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PR-ACC05.ps}, abstract = {The maximal permissivity property of controllers is an optimal criterion that is often taken for granted as the result of synthesis algorithms: the algorithms are designed for frameworks where the existence and the uniqueness of a maximal permissive controller is demonstrated apart, as it fulfills sufficient hypotheses; these algorithms precisely compute this object. Still, maximally permissive solutions might exist in circumstances which do not fall into such identified frameworks, but there is no way to ensure that the algorithms deliver an optimal solution. In this paper, we propose a general synthesis procedure which always computes a maximal permissive controller when it exists.} }
@inproceedings{PR-cdc05, address = {Seville, Spain}, month = dec, year = 2005, publisher = {{IEEE} Control System Society}, acronym = {{CDC-ECC}'05}, booktitle = {{P}roceedings of the 44th {IEEE} {C}onference on Decision and Control and European Control Conference ({CDC-ECC}'05)}, author = {Pinchinat, Sophie and Riedweg, St{\'e}phane}, title = {On the Architectures in Decentralized Supervisory Control}, pages = {12-17}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PR-cdc05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PR-cdc05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PR-cdc05.ps}, abstract = {In this paper, we clarify the notion of architecture in decentralized control, in order to investigate the realizability problem: given a discrete-event system, a desired behavior and an architecture for a decentralized control, can the desired behavior be achieved by decentralized controllers in accordance with the given architecture? We consider the problem for any mu-calculus definable behavior and for classic architectures from the literature. The method consists in compiling in a single formula both the desired behavior and the architecture. Applications of this approach are a single synthesis algorithm of decentralized controllers (with full observation) for the whole considered family of architectures, and the development of a convenient mathematical framework for a theory of decentralized control architectures.} }
@article{PR-IPL05, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Pinchinat, Sophie and Riedweg, St{\'e}phane}, title = {A Decidable Class of Problems for Control under Partial Observation}, year = 2005, month = aug, volume = 95, number = 4, pages = {454-465}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PR-IPL05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PR-IPL05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/PR-IPL05.ps}, doi = {10.1016/j.ipl.2005.04.011} }
@phdthesis{THESE-bardin05, author = {Bardin, S{\'e}bastien}, title = {Vers un model checking avec acc{\'e}l{\'e}ration plate de syst{\`e}mes h{\'e}t{\'e}rog{\`e}nes}, year = 2005, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bardin-THESE.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bardin-THESE.pdf} }
@phdthesis{THESE-zhang05, author = {Zhang, Yu}, title = {Cryptographic logical relations~-- What is the contextual equivalence for cryptographic protocols and how to prove~it?}, year = 2005, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/zy-thesis.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/zy-thesis.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/zy-thesis.ps} }
@phdthesis{THESE-baclet05, author = {Baclet, Manuel}, title = {Applications du model-checking {\`a} des probl{\`e}mes de v{\'e}rification de syst{\`e}mes sur puce}, year = 2005, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-baclet.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-baclet.pdf} }
@phdthesis{treinen-hab2005, author = {Treinen, Ralf}, title = {R{\'e}solution symbolique de contraintes}, year = 2005, month = nov, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris-Sud~11, Orsay, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RT-habil.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RT-habil.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RT-habil.ps} }
@phdthesis{FL-hab2005, author = {Laroussinie, Fran{\c{c}}ois}, title = {Model checking temporis{\'e}~--- Algorithmes efficaces et complexit{\'e}}, year = 2005, month = dec, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris~7, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FL-habil.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FL-habil.pdf} }
@mastersthesis{pinot-master, author = {Pinot, Simon}, title = {Analyse de stabilit{\'e} d'algorithme distribu{\'e}s probabilistes}, school = {{M}aster de {L}ogique {M}ath{\'e}matique et {F}ondements de l'{I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2005, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Pinot-M2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Pinot-M2.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Pinot-M2.ps} }
@mastersthesis{sznajder-master, author = {Sznajder, Nathalie}, title = {Synth{\`e}se de contr{\^o}leur pour les syst{\`e}mes distribu{\'e}s synchrones}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2005, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sznajder-M2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Sznajder-M2.pdf} }
@article{FL-ACMtecs05, publisher = {ACM Press}, journal = {ACM Transactions in Embedded Computing Systems}, author = {{The Artist Education Group}}, fullauthor = {Caspi, Paul and Sangiovanni-Vincentelli, Alberto L. and Almeida Lu{\'\i}s and Benveniste, Albert and Bouyssounouse, Bruno and Buttazzo, Giorgio C. and Crnkovic, Ivica and Damm, Werner and Engblom, Jakob and Fohler, Gerhard and Garc{\'\i}a-Valls, Marisol and Kopetz, hermann and Lakhnech, Yassine and Laroussinie, Fran{\c{c}}ois and Lavagno, Luciano and Lipari, Guiseppe and Maraninchi, Florence and Peti, Philipp and Antonio de la Puente, Juan and Scaife, Norman and Sifakis, Joseph and de{ }Simone, Robert and T{\"o}rngren, Martin and Ver{\'\i}ssimo, Paulo and Wellings, Andy J. and Wilhelm, Reinhard and Willemse, Tim A. C. and Yi, Wang}, title = {Guidelines for a graduate curriculum on embedded software and systems}, volume = 4, number = 3, year = 2005, month = aug, pages = {587-611}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Artist-tecs05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Artist-tecs05.pdf}, doi = {10.1145/1086519.1086526}, abstract = {The design of embedded real-time systems requires skills from multiple specific disciplines, including, but not limited to, control, computer science, and electronics. This often involves experts from differing backgrounds, who do not recognize that they address similar, if not identical, issues from complementary angles. Design methodologies are lacking in rigor and discipline so that demonstrating correctness of an embedded design, if at all possible, is a very expensive proposition that may delay significantly the introduction of a critical product. While the economic importance of embedded systems is widely acknowledged, academia has not paid enough attention to the education of a community of high-quality embedded system designers, an obvious difficulty being the need of interdisciplinarity in a period where specialization has been the target of most education systems. This paper presents the reflections that took place in the European Network of Excellence Artist leading us to propose principles and structured contents for building curricula on embedded software and systems.} }
@techreport{FGRV-ulb05, author = {Finkel, Alain and Geeraerts, Gilles and Raskin, Jean-Fran{\c{c}}ois and Van{~}Begin, Laurent}, title = {A counter-example the the minimal coverability tree algorithm}, institution = {Universit\'e Libre de Bruxelles, Belgium}, year = {2005}, number = {535}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGRV-ulb05.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGRV-ulb05.pdf}, abstract = {In [Finkel, 1993], an~algorithm to compute a minimal coverability tree for Petri nets has been presented. This document demonstrates, thanks to a simple counter-example, that this algorithm may compute an under-approximation of a coverability tree, i.e., a~tree whose set of nodes is not sufficient to cover all the reachable markings.} }
@article{CL-tsi06, publisher = {Herm{\`e}s}, journal = {Technique et Science Informatiques}, author = {Cassez, Franck and Laroussinie, Fran{\c{c}}ois}, editor = {Cassez, Franck and Laroussinie, Fran{\c{c}}ois}, title = {Contr{\^o}le des applications temps-r{\'e}el~: mod{\`e}les temporis{\'e}s et hybrides}, volume = 25, number = 3, year = 2006, url = {http://www.lavoisier.fr/notice/fr2746214830.html} }
@incollection{jgl-encyc06, author = {Goubault{-}Larrecq, Jean}, title = {Preuve et v{\'e}rification pour la s{\'e}curit{\'e} et la s{\^u}ret{\'e}}, booktitle = {Encyclop{\'e}die de l'informatique et des syst{\`e}mes d'information}, editor = {Akoka, Jacky and Comyn-Wattiau, Isabelle}, pages = {683-703}, publisher = {Vuibert}, year = 2006, month = dec, chapter = {I.6}, url = {http://www.vuibert.com/livre12401.html}, abstract = {La s\^uret\'e, comme la s\'ecurit\'e, \'enonce qu'un mal n'arrive jamais. Le but de cet article est de d\'efinir la notion de propri\'et\'e de s\^uret\'e, et d'en d\'ecrire quelques techniques de v\'erification et de preuve~: model-checking, interpr\'etation abstraite notamment. Apr\`es avoir remarqu\'e qu'il n'y avait pas de s\'ecurit\'e sans s\^uret\'e, il est expliqu\'e que l'analyse de s\'ecurit\'e d'un syst\`eme repose sur un mod\`ele, des hypoth\`eses, des propri\'et\'es \`a v\'erifier, et une architecture de s\'ecurit\'e. Finalement, il est donn\'e un aper\c{c}u de quelques mod\`eles et m\'ethodes de preuve de protocoles cryptographiques.} }
@inproceedings{BJ-secret06, address = {Venice, Italy}, month = jul, year = 2006, editor = {Fern{\'a}ndez, Maribel and Kirchner, Claude}, acronym = {{SecReT}'06}, booktitle = {{P}reliminary {P}roceedings of the 1st {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'06)}, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Security Protocols Verification with Implicit Induction and Explicit Destructors}, pages = {37-44}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-secret06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-secret06.pdf}, abstract = {We present a new method for automatic implicit induction theorem proving, and its application for the verification of a key distribution cryptographic protocol. The~method can handle axioms between constructor terms, a~feature generally not supported by other induction procedure. We~use such axioms in order to specify explicit destructors representing cryptographic operators.} }
@inproceedings{BBS-forte06, address = {Paris, France}, month = sep, year = 2006, volume = 4229, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Najm, Elie and Pradat{-}Peyre, Jean-Fran{\c{c}}ois and Vigui{\'e} Donzeau-Gouge, V{\'e}ronique}, acronym = {{FORTE}'06}, booktitle = {{P}roceedings of 26th {IFIP} {WG6.1} {I}nternational {C}onference on {F}ormal {T}echniques for {N}etworked and {D}istributed {S}ystems ({FORTE}'06)}, author = {Baier, Christel and Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {Symbolic verification of communicating systems with probabilistic message losses: liveness and fairness}, pages = {212-227}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-forte06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-forte06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBS-forte06.ps}, doi = {10.1007/11888116_17}, abstract = {NPLCS's are a new model for nondeterministic channel systems where unreliable communication is modeled by probabilistic message losses. We~show that, for \(\omega\)-regular linear-time properties and finite-memory schedulers, qualitative model-checking is decidable. The~techniques extend smoothly to questions where fairness restrictions are imposed on the schedulers. The~symbolic procedure underlying our decidability proofs has been implemented and used to study a simple protocol handling two-way transfers in an unreliable setting.} }
@inproceedings{BC-asian06, address = {Tokyo, Japan}, month = jan, year = 2008, volume = 4435, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Okada, Mitsu and Satoh, Ichiro}, acronym = {{ASIAN}'06}, booktitle = {{R}evised {S}elected {P}apers of the 11th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'06)}, author = {Bernat, Vincent and Comon{-}Lundh, Hubert}, title = {Normal proofs in intruder theories}, pages = {151-166}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC-asian06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC-asian06.pdf}, doi = {10.1007/978-3-540-77505-8_12}, abstract = {Given an arbitrary intruder deduction capability, modeled as an inference system~\(\mathcal{S}\) and a protocol, we show how to compute an inference system~\(\widehat{\mathcal{S}}\) such that the security problem for an unbounded number of sessions is equivalent to the deducibility of some message in~\(\widehat{\mathcal{S}}\). Then, assuming that \(\mathcal{S}\)~has some subformula property, we lift such a property to~\(\widehat{\mathcal{S}}\), thanks to a proof normalisation theorem. In~general, for an unbounded number of sessions, this provides with a complete deduction strategy. In case of a bounded number of sessions, our theorem implies that the security problem is co-NP-complete. As an instance of our result we get a decision algorithm for the theory of blind-signatures, which, to our knowledge, was not known before.} }
@inproceedings{LNZ-asian06, address = {Tokyo, Japan}, month = jan, year = 2008, volume = 4435, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Okada, Mitsu and Satoh, Ichiro}, acronym = {{ASIAN}'06}, booktitle = {{R}evised {S}elected {P}apers of the 11th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'06)}, author = {Lasota, S{\l}awomir and Nowak, David and Yu, Zhang}, title = {On completeness of logical relations for monadic types}, pages = {223-230}, nmnote = {autc parce que c'est un short paper, pas ant pour Zhang Yu}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LNZ-monad-complete.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LNZ-monad-complete.pdf}, doi = {10.1007/978-3-540-77505-8_17}, abstract = {Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases. In~particular, programs can be modeled in the framework of lambda-calculi, and interesting properties can be expressed formally by contextual equivalence (a.k.a.~observational equivalence). Furthermore, imperative features, which exist in most real-life software, can be nicely expressed in the so-called computational lambda-calculus. Contextual equivalence is difficult to prove directly, but we can often use logical relations as a tool to establish it in lambda-calculi. We~have already defined logical relations for the computational lambda-calculus in previous work. We~devote this paper to the study of their completeness w.r.t.~contextual equivalence in the computational lambda-calculus.} }
@inproceedings{BP06, address = {Taipei, Taiwan}, month = aug, year = 2006, volume = 4094, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Ibarra, Oscar H. and Yen, Hsu-Chun}, acronym = {{CIAA}'06}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'06)}, author = {Baclet, Manuel and Pagetti, Claire}, title = {Around {H}opcroft's Algorithm}, pages = {114-125}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BP-ciaa06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BP-ciaa06.pdf}, doi = {10.1007/11812128_12}, abstract = {In this paper, a reflection is made on an indeterminism inherent to Hopcroft's minimization algorithm: the splitter choice. We have implemented two natural policies (FIFO and~FILO) for managing the set of splitters for which we obtain the following practical results: the FILO strategy performs better than the FIFO strategy, in the case of a one letter alphabet, the FILO practical complexity never exceeds a linear one and our implementation is more efficient than the minimization algorithm of the FSM tool. This implementation is being integrated in a finite automata library, the Dash library. Thus, we present an efficient manner to manipulate automata by using canonical minimal automata.} }
@inproceedings{abw-fossacs2006, address = {Vienna, Austria}, month = mar, year = 2006, volume = 3921, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Ing{\'o}lfsd{\'o}ttir, Anna}, acronym = {{FoSSaCS}'06}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'06)}, author = {Abadi, Mart{\'\i}n and Baudet, Mathieu and Warinschi, Bogdan}, title = {Guessing Attacks and the Computational Soundness of Static Equivalence}, pages = {398-412}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABW_Fossacs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABW_Fossacs06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ABW_Fossacs06.ps}, doi = {10.1007/11690634_27}, abstract = {The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence depends on an underlying equational theory. The choice of an inappropriate equational theory can lead to overly pessimistic or overly optimistic notions of indistinguishability, and in turn to security criteria that require protection against impossible attacks or ---worse yet--- that ignore feasible ones. In this paper, we define and justify an equational theory for standard, fundamental cryptographic operations. This equational theory yields a notion of static equivalence that implies computational indistinguishability. Static equivalence remains liberal enough for use in applications. In particular, we develop and analyze a principled formal account of guessing attacks in terms of static equivalence.} }
@inproceedings{BKRS-fsttcs2006, address = {Kolkata, India}, month = dec, year = 2006, volume = 4337, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Garg, Naveen and Arun-Kumar, S.}, acronym = {{FSTTCS}'06}, booktitle = {{P}roceedings of the 26th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'06)}, author = {Bozzelli, Laura and K{\v{r}}et{\'\i}nsk{\'y}, Mojm{\'\i}r and {\v{R}}eh{\'a}k, Vojt{\v{e}}ch and Strej{\v c}ek, Jan}, title = {On Decidability of {LTL} Model Checking for Process Rewrite Systems}, pages = {248-259}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKRS-fsttcs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKRS-fsttcs06.pdf}, doi = {10.1007/11944836_24} }
@inproceedings{BLMR-fsttcs2006, address = {Kolkata, India}, month = dec, year = 2006, volume = 4337, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Garg, Naveen and Arun-Kumar, S.}, acronym = {{FSTTCS}'06}, booktitle = {{P}roceedings of the 26th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'06)}, author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas and Rasmussen, Jacob Illum}, title = {Almost Optimal Strategies in One-Clock Priced Timed Automata}, pages = {345-356}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLMR-fsttcs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLMR-fsttcs06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLMR-fsttcs06.ps}, doi = {10.1007/11944836_32}, abstract = {We consider timed games extended with cost information, and prove computability of the optimal cost and of \(\epsilon\)-optimal memoryless strategies in timed games with one~clock. In~contrast, this problem has recently been proved undecidable for timed games with three clocks.} }
@proceedings{GDV06, editor = {Bouyer, Patricia and Madhusudan, P.}, title = {Proceedings of the 3rd Workshop on Games in Design and Verification ({GDV}'06)}, booktitle = {Proceedings of the 3rd Workshop on Games in Design and Verification ({GDV}'06)}, address = {Seattle, Washington, USA}, year = 2006, month = aug }
@inproceedings{BBBL-atva06, address = {Beijing, China}, month = oct, year = {2006}, volume = 4218, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Graf, Susanne and Zhang, Wenhui}, acronym = {{ATVA}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'06)}, author = {Bel{ }mokadem, Houda and B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois}, title = {Timed temporal logics for abstracting transient states}, pages = {337-351}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBL-atva06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBL-atva06.pdf}, doi = {10.1007/11901914_26}, abstract = {In previous work, the timed logic TCTL was extended with an {"}almost everywhere{"} Until modality which abstracts negligible sets of positions (i.e.,~with a null duration) along a run of a timed automaton. We~propose here an extension of this logic with more powerful modalities, in order to specify properties abstracting transient states, which are events that last for less than k time units. Our main result is that modelchecking is still decidable and PSPACE-complete for this extension. On the other hand, a second semantics is defined, in which we consider the total duration where the property does not hold along a run. In~this case, we prove that model-checking is undecidable.} }
@inproceedings{BBC-concur06, address = {Bonn, Germany}, month = aug, year = 2006, volume = 4137, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baier, Christel and Hermanns, Holger}, acronym = {{CONCUR}'06}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'06)}, author = {Bouyer, Patricia and Bozzelli, Laura and Chevalier, Fabrice}, title = {Controller Synthesis for {MTL} Specifications}, pages = {450-464}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-concur06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-concur06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBC-concur06.ps}, doi = {10.1007/11817949_30}, abstract = {We consider the control problem for timed automata against specifications given as MTL formulas. The logic MTL is a linear-time timed temporal logic which extends LTL with timing constraints on modalities, and recently, its model-checking has been proved decidable in several cases. We investigate these decidable fragments of MTL (full MTL when interpreted over finite timed words, and SafetyMTL when interpreted over infinite timed words), and prove two kinds of results. (1)~We first prove that, contrary to model-checking, the control problem is undecidable. Roughly, the computation of a lossy channel system could be encoded as a model-checking problem, and we prove here that a perfect channel system can be encoded as a control problem. (2)~We then prove that if we fix the resources of the controller (by resources we mean clocks and constants that the controller can use), the control problem becomes decidable. This decidability result relies on properties of well (and better) quasi-orderings.} }
@article{BBLP-STTT05, publisher = {Springer}, journal = {International Journal on Software Tools for Technology Transfer}, author = {Behrmann, Gerd and Bouyer, Patricia and Larsen, Kim G. and Pel{\'a}nek, Radek}, title = {Lower and Upper Bounds in Zone-Based Abstractions of Timed Automata}, year = 2006, month = jun, pages = {204-215}, number = 3, volume = 8, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBLP-STTT05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBLP-STTT05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBLP-STTT05.ps}, doi = {10.1007/s10009-005-0190-0}, abstract = {The semantics of timed automata is defined using an infinite-state transition system. For verification purposes, one usually uses zone based abstractions w.r.t.~the maximal constants to which clocks of the timed automaton are compared. We show that by distinguishing maximal lower and upper bounds, significantly coarser abstractions can be obtained. We show soundness and completeness of the new abstractions w.r.t.~reachability. We demonstrate how information about lower and upper bounds can be used to optimise the algorithm for bringing a difference bound matrix into normal form. Finally, we experimentally demonstrate that the new techniques dramatically increases the scalability of the real-time model checker~{\scshape Uppaal}.} }
@article{BC06-beatcs, publisher = {European Association for Theoretical Computer Science}, journal = {EATCS Bulletin}, author = {Bouyer, Patricia and Chevalier, Fabrice}, title = {On the Control of Timed and Hybrid Systems}, volume = 89, year = {2006}, month = jun, pages = {79-96}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC-beatcs89.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC-beatcs89.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BC-beatcs89.ps}, abstract = {In this paper, we survey some of the results which have been obtained the last ten years on the control of hybrid and timed systems.} }
@inproceedings{BBC-lics2006, address = {Seattle, Washington, USA}, month = aug, year = 2006, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'06}, booktitle = {{P}roceedings of the 21st {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'06)}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Chevalier, Fabrice}, title = {Control in o-Minimal Hybrid Systems}, pages = {367-378}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-lics06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-lics06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBC-lics06.ps}, doi = {10.1109/LICS.2006.22}, abstract = {In this paper, we consider the control of general hybrid systems. In this context we show that time-abstract bisimulation is not adequate for solving such a problem. That is why we consider an other equivalence, namely the suffix equivalence based on the encoding of trajectories through words. We show that this suffix equivalence is in general a correct abstraction for control problems. We apply this result to o-minimal hybrid systems, and get decidability and computability results in this framework.} }
@inproceedings{BLP-cav06, address = {Seattle, Washington, USA}, month = aug, year = 2006, volume = 4144, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ball, {\relax Th}omas and Jones, Robert B.}, acronym = {{CAV}'06}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'06)}, author = {Bardin, S{\'e}bastien and Leroux, J{\'e}r{\^o}me and Point, G{\'e}rald}, title = {{FAST} {E}xtended {R}elease}, pages = {63-66}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLP-cav06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLP-cav06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLP-cav06.ps}, doi = {10.1007/11817963_9}, abstract = {{\scshape Fast} is a tool designed for the analysis of counter systems, \emph{i.e.}~automata extended with unbounded integer variables. Despite the reachability set is not recursive in general, Fast implements several innovative techniques such as acceleration and circuit selection to solve this problem in practice. In its latest version, the tool is built upon an open architecture: the Presburger library is manipulated through a clear and convenient interface, thus any Presburger arithmetics package can be plugged to the tool. We provide four implementations of the interface using Lash, Mona, Omega and a new shared automata package with computation cache. Finally new features are available, like different acceleration algorithms.} }
@inproceedings{BFLS-avis06, address = {Vienna, Austria}, month = apr, year = 2006, editor = {Bharadwaj, Ramesh}, acronym = {{AVIS}'06}, booktitle = {{P}roceedings of the 5th {I}nternational {W}orkshop on {A}utomated {V}erification of {I}nfinite-{S}tate {S}ystems ({AVIS}'06)}, author = {Bardin, S{\'e}bastien and Finkel, Alain and Lozes, {\'E}tienne and Sangnier, Arnaud}, title = {From Pointer Systems to Counter Systems Using Shape Analysis}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFLS-AVIS-06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFLS-AVIS-06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BFLS-AVIS-06.ps}, abstract = {We aim at checking safety properties on systems manipulating dynamic linked lists. First we prove that every pointer system is bisimilar to an effectively constructible counter system. We then deduce a two-step analysis procedure. We first build an over-approximation of the reachability set of the pointer system. If this over-approximation is too coarse to conclude, we then extract from it a bisimilar counter system which is analyzed via efficient symbolic techniques developed for general counter systems.} }
@inproceedings{edos2006wsl, address = {Porto Allegre, Brazil}, month = apr, year = 2006, editor = {Berger, Olivier}, acronym = {{IWFS}'06}, booktitle = {{P}roceedings of the {I}nternational {W}orkshop on {F}ree {S}oftware ({IWFS}'06)}, author = {Boender, Jaap and Di Cosmo, Roberto and Durak, Berke and Leroy, Xavier and Mancinelli, Fabio and Morgado, Mario and Pinheiro, David and Treinen, Ralf and Trezentos, Paulo and Vouillon, J{\'e}r{\^o}me}, title = {News from the {EDOS} project: improving the maintenance of free software distributions}, pages = {199-207}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/wsl06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/wsl06.pdf}, abstract = {The EDOS research project aims at contributing to the quality assurance of free software distributions. This is a major technical and engineering challenge, due to the size and complexity of these distributions (tens of thousands of software packages). We present here some of the challenges that we have tackled so far, and some of the advanced tools that are already available to the community as an outcome of the first year of work. } }
@inproceedings{edos2006ase, address = {Tokyo, Japan}, month = sep, year = 2006, publisher = {{IEEE} Computer Society Press}, acronym = {{ASE}'06}, booktitle = {{P}roceedings of the 21st {IEEE}/{ACM} {I}nternational {C}onference on {A}utomated {S}oftware {E}ngineering ({ASE}'06)}, author = {Mancinelli, Fabio and Boender, Jaap and Di Cosmo, Roberto and Vouillon, J{\'e}r{\^o}me and Durak, Berke and Leroy, Xavier and Treinen, Ralf}, title = {Managing the Complexity of Large Free and Open Source Package-Based Software Distributions}, pages = {199-208}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/edos-ase06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/edos-ase06.pdf}, doi = {10.1109/ASE.2006.49}, abstract = {The widespread adoption of Free and Open Source Software~(FOSS) in many strategic contexts of the information technology society has drawn the attention on the issues regarding how to handle the complexity of assembling and managing a huge number of (packaged) components in a consistent and effective~way. FOSS~distributions (and~in particular GNU\slash Linux-based~ones) have always provided tools for managing the tasks of installing, removing and upgrading the (packaged) components they were made~of. While these tools provide a (not always effective) way to handle these tasks on the client side, there is still a lack of tools that could help the distribution editors to maintain, on the server side, large and high-quality distributions. In~this paper we present our research whose main goal is to fill this gap: we~show our approach, the tools we have developed and their application with experimental results. Our~contribution provides an effective and automatic way to support distribution editors in handling those issues that were, until now, mostly addressed using ad-hoc tools and manual techniques.} }
@inproceedings{BKSS-tacas06, address = {Vienna, Austria}, month = mar, year = 2006, volume = {3920}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hermanns, Holger and Palsberg, Jens}, acronym = {{TACAS}'06}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'06)}, author = {Bollig, Benedikt and Kern, Carsten and Schl{\"u}tter, Markus and Stolz, Volker}, title = {{MSC}an: A Tool for Analyzing {MSC} Specifications}, pages = {455-458}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSCan.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MSCan.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MSCan.ps}, doi = {10.1007/11691372_32}, abstract = {We present the tool MSCan, which supports MSC-based system development. In particular, it automatically checks high-level MSC specifications for implementability.} }
@article{BBM-ipl06, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Markey, Nicolas}, title = {Improved Undecidability Results on Weighted Timed Automata}, year = 2006, month = jun, volume = 98, number = 5, pages = {188-194}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/IPL-BBM06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/IPL-BBM06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/IPL-BBM06.ps}, doi = {10.1016/j.ipl.2006.01.012}, abstract = {In this paper, we improve two recent undecidability results of Brihaye, Bruy{\`e}re and Raskin about weighted timed automata, an extension of timed automata with a cost variable. Our results rely on a new encoding of the two counters of a Minsky machine that only require three clocks and one stopwatch cost, while previous reductions required five clocks and one stopwatch cost.} }
@inproceedings{BBS-lpar06, address = {Phnom Penh, Cambodia}, month = nov, year = 2006, volume = 4246, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Hermann, Miki and Voronkov, Andrei}, acronym = {{LPAR}'06}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'06)}, author = {Baier, Christel and Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {On Computing Fixpoints in Well-Structured Regular Model Checking, with Applications to Lossy Channel Systems}, pages = {347-361}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-lpar06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBS-lpar06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBS-lpar06.ps}, doi = {10.1007/11916277_24}, abstract = {We prove a general finite convergence theorem for {"}upward-guarded{"} fixpoint expressions over a well-quasi-ordered~set. This has immediate applications in regular model checking of well-structured systems, where a main issue is the eventual convergence of fixpoint computations. In~particular, we are able to directly obtain several new decidability results on lossy channel systems.} }
@article{BBS-ipl05, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Baier, Christel and Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {A note on the attractor-property of infinite-state {M}arkov chains}, year = 2006, month = jan, number = 2, volume = 97, pages = {58-63}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/IPL-BBS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/IPL-BBS.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/IPL-BBS.ps}, doi = {10.1016/j.ipl.2005.09.011}, abstract = {In the past five years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, \emph{i.e.}, a set that will be visited infinitely often almost surely starting from any state. \par In this paper, we establish a sufficient criterion for the existence of an attractor. We show that if the states of a Markov chain can be given levels (positive integers) such that the expected next level for states at some level \(n > 0\) is less than \(n-\Delta\) for some positive \(\Delta\), then the states at level~\(0\) constitute an attractor for the chain. As an application, we obtain a direct proof that some probabilistic channel systems combining message losses with duplication and insertion errors have a finite attractor.} }
@inproceedings{BG-lpar06, address = {Phnom Penh, Cambodia}, month = nov, year = 2006, volume = 4246, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Hermann, Miki and Voronkov, Andrei}, acronym = {{LPAR}'06}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'06)}, author = {Bozzelli, Laura and Gascon, R{\'e}gis}, title = {Branching Time Temporal Logic Extended with {P}resburger Constraints}, pages = {197-211}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BG-LPAR06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BG-LPAR06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BG-LPAR06.ps}, doi = {10.1007/11916277_14}, abstract = {Recently, \(\mathrm{LTL}\) extended with atomic formulas built over a constraint language interpreting variables in~\(\mathbb{Z}\) has been shown to have a decidable satisfiability and model-checking problem. This~language allows to compare the variables at different states of the model and include periodicity constraints, comparison constraints, and a restricted form of quantification. On the other hand, the \(\mathrm{CTL}\) counterpart of this logic (and hence also its \(\mathrm{CTL}^{*}\) counterpart which subsumes both \(\mathrm{LTL}\) and~\(\mathrm{CTL}\)) has an undecidable model-checking problem. In~this paper, we substantially extend the decidability border, by considering a meaningful fragment of \(\mathrm{CTL}^{*}\) extended with such constraints (which subsumes both the universal and existential fragments, as well as the \(\mathrm{EF}\)-like fragment) and show that satisfiability and model-checking over relational automata that are abstraction of counter machines are decidable. The~correctness and the termination of our algorithm rely on a suitable well quasi-ordering defined over the set of variable valuations.} }
@misc{chevalier-prefsttcs06, author = {Chevalier, Fabrice}, title = {Decision procedures for timed logics}, year = 2006, month = dec, howpublished = {Invited talk, Advances and Issues in Timed Systems, Kolkata, India} }
@misc{gastin-prefsttcs06, author = {Gastin, Paul}, title = {Refinements and Abstractions of Signal-Event (Timed) Languages}, year = 2006, month = dec, howpublished = {Invited talk, Advances and Issues in Timed Systems, Kolkata, India} }
@misc{gastin-wata06, author = {Gastin, Paul}, title = {Weigthed logics and weighted automata}, year = 2006, month = mar, howpublished = {Invited talk, Workshop Weighted Automata: Theory and Applications, Leipzig, Germany} }
@misc{gastin-epit06, author = {Gastin, Paul}, title = {Distributed synthesis: synchronous and asynchronous semantics}, year = 2006, month = may, howpublished = {Invited talk, 34{\`e}me {\'E}cole de Printemps en Informatique Th{\'e}orique, Ile de R{\'e}, France} }
@misc{gastin-mfps22, author = {Gastin, Paul}, title = {Refinements and Abstractions of Signal-Event (Timed) Languages}, year = 2006, month = may, howpublished = {Invited talk, 22nd {C}onference on {M}athematical {F}oundations of {P}rogramming {S}emantics ({MFPS}'06)} }
@inproceedings{Bouyer-MFPS22, address = {Genova, Italy}, month = may, year = 2006, volume = 158, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Brookes, Steve and Mislove, Michael}, acronym = {{MFPS}'06}, booktitle = {{P}roceedings of the 22nd {C}onference on {M}athematical {F}oundations of {P}rogramming {S}emantics ({MFPS}'06)}, author = {Bouyer, Patricia}, title = {Weighted Timed Automata: {M}odel-Checking and Games}, pages = {3-17}, note = {Invited paper}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-mfps06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-mfps06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/bouyer-mfps06.ps}, doi = {10.1016/j.entcs.2006.04.002}, abstract = {In this paper, we present weighted\slash priced timed automata, an extension of timed automaton with costs, and solve several interesting problems on that model.} }
@article{bid-hen-JLAP-2005, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Programming}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {Constructor-Based Observational Logic}, year = {2006}, month = apr # {-} # may, number = {1-2}, volume = 67, pages = {3-51}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BID-HEN-JLAP.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BID-HEN-JLAP.pdf}, doi = {10.1016/j.jlap.2005.09.002}, abstract = {This paper focuses on the integration of reachability and observability concepts within an algebraic, institution-based framework. In the first part of this work, we develop the essential ingredients that are needed to define the constructor-based observational logic institution, called COL, which takes into account both the generation- and observation-oriented aspects of software systems. The underlying paradigm of our approach is that the semantics of a specification should be as loose as possible to capture all its correct realizations. We also consider the {"}black box{"} semantics of a specification which is useful to study the behavioral properties a user can observe when he\slash she is experimenting with the system.\par In the second part of this work, we develop proof techniques for structured COL-specifications. For this purpose we introduce an institution encoding from the COL institution to the institution of many-sorted first-order logic with equality and sort-generation constraints. Using this institution encoding, we can then reduce proofs of consequences of structured specifications built over COL to proofs of consequences of structured specifications written in a simple subset of the algebraic specification language {\scshape Casl}. This means, in particular, that any inductive theorem prover, such as \emph{e.g.} the Larch Prover or PVS, can be used to prove theorems over structured COL-specifications.} }
@inproceedings{BH-Goguen06, address = {San Diego, California, USA}, month = jun, year = 2006, volume = 4060, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Futatsugi, Kokichi and Jouannaud, Jean-Pierre and Meseguer, Jos{\'e}}, acronym = {{A}lgebra, {M}eaning and {C}omputation}, booktitle = {{A}lgebra, {M}eaning and {C}omputation~--- Essays dedicated to Joseph~A.~Goguen on the Occasion of His 65th~Birthday}, author = {Bidoit, Michel and Hennicker, Rolf}, title = {Proving Behavioral Refinements of {COL}-Specifications}, pages = {333-354}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BH-Goguen06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BH-Goguen06.pdf}, doi = {10.1007/11780274_18}, abstract = {The COL institution (constructor-based observational logic) has been introduced as a formal framework to specify both generation- and observation-oriented properties of software systems. In this paper we consider behavioral refinement relations between COL-specifications taking into account implementation constructions. We propose a general strategy for proving the correctness of such refinements by reduction to (standard) first-order theorem proving with induction. Technically our strategy relies on appropriate proof rules and on a lifting construction to encode the reachability and observability notions of the COL institution.} }
@inproceedings{BHR06-acsd, address = {Turku, Finland}, month = jun, year = 2006, publisher = {{IEEE} Computer Society Press}, editor = {Goossens, Kees and Petrucci, Laure}, acronym = {{ACSD}'06}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'06)}, author = {Bouyer, Patricia and Haddad, Serge and Reynier, Pierre-Alain}, title = {Extended Timed Automata and Time {P}etri Nets}, pages = {91-100}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-01.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-01.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2006-01.ps}, doi = {10.1109/ACSD.2006.6}, abstract = {Timed Automata (TA) and Time Petri Nets (TPN) are two well-established formal models for real-time systems. Recently, a linear transformation of TA to TPNs preserving reachability properties and timed languages has been proposed, which does however not extend to larger classes of TA which would allow diagonal constraints or more general resets of clocks. Though these features do not add expressiveness, they yield exponentially more concise models. \par In this work, we propose two translations: one from extended TA to TPNs whose size is either linear or quadratic in the size of the original TA, depending on the features which are allowed; another one from a parallel composition of TA to TPNs, which is also linear. As a consequence, we get that TPNs are exponentially more concise than~TA.} }
@inproceedings{BHR-ICALP2006, address = {Venice, Italy}, month = jul, year = 2006, volume = 4052, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Buglesi, Michele and Preneel, Bart and Sassone, Vladimiro and Wegener, Ingo}, acronym = {{ICALP}'06}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'06)~--- {P}art~{II}}, author = {Bouyer, Patricia and Haddad, Serge and Reynier, Pierre-Alain}, title = {Timed {P}etri Nets and Timed Automata: On the Discriminating Power of {Z}eno Sequences}, pages = {420-431}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-icalp06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-icalp06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHR-icalp06.ps}, doi = {10.1007/11787006_36}, abstract = {Timed Petri nets and timed automata are two standard models for the analysis of real-time systems. In this paper, we prove that they are incomparable for the timed language equivalence. Thus we propose an extension of timed Petri nets with read-arcs~(RA-TdPN), whose coverability problem is decidable. We also show that this model unifies timed Petri nets and timed automata. Then, we establish numerous expressiveness results and prove that Zeno behaviours discriminate between several sub-classes of RA-TdPNs. This has surprising consequences on timed automata, \emph{e.g.}~on the power of non-deterministic clock resets.} }
@inproceedings{BHR-atva06, address = {Beijing, China}, month = oct, year = {2006}, volume = 4218, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Graf, Susanne and Zhang, Wenhui}, acronym = {{ATVA}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'06)}, author = {Bouyer, Patricia and Haddad, Serge and Reynier, Pierre-Alain}, title = {Timed Unfoldings for Networks of Timed Automata}, pages = {292-306}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-atva06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-atva06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHR-atva06.ps}, doi = {10.1007/11901914_23}, abstract = {Whereas partial order methods have proved their efficiency for the analysis of discrete-event systems, their application to timed systems remains a challenging research topic. Here, we design a verification algorithm for networks of timed automata with invariants. Based on the unfolding technique, our method produces a branching process as an acyclic Petri net extended with read arcs. These arcs verify conditions on tokens without consuming them, thus expressing concurrency between conditions checks. They are useful for avoiding the explosion of the size of the unfolding due to clocks which are compared with constants but not reset. Furthermore, we attach zones to events, in addition to markings. We~then compute a complete finite prefix of the unfolding. The~presence of invariants goes against the concurrency since it entails a global synchronization on time. The use of read arcs and the analysis of the clock constraints appearing in invariants will help increasing the concurrency relation between events. Finally, the finite prefix we compute can be used to decide reachability properties, and transition enabling.} }
@incollection{BL-VAT06, author = {Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois}, title = {V{\'e}rification par automates temporis{\'e}s}, booktitle = {Syst{\`e}mes temps-r{\'e}el~1~: techniques de description et de v{\'e}rification}, editor = {Navet, Nicolas}, publisher = {Herm{\`e}s}, year = 2006, month = jun, pages = {121-150}, url = {http://www.lavoisier.fr/fr/livres/index.asp?texte=2746213030&select=isbn&from=Hermes}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BL-VAT06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BL-VAT06.ps}, isbn = {2-7462-1303-6} }
@inproceedings{BMR-latin06, address = {Valdivia, Chile}, month = mar, year = 2006, volume = 3887, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Correa, Jose R. and Hevia, Alejandro and Kiwi, Marcos}, acronym = {{LATIN}'06}, booktitle = {{P}roceedings of the 7th {L}atin {A}merican {S}ymposium on {T}heoretical {I}nformatics ({LATIN}'06)}, author = {Bouyer, Patricia and Markey, Nicolas and Reynier, Pierre-Alain}, title = {Robust Model-Checking of Linear-Time Properties in Timed Automata}, pages = {238-249}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMR-latin06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMR-latin06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BMR-latin06.ps}, doi = {10.1007/11682462_25}, abstract = {Formal verification of timed systems is well understood, but their \emph{implementation} is still challenging. Recent works by Raskin \emph{et al.} have brought out a model of parameterized timed automata that can be used to prove \emph{implementability} of timed systems for safety properties. We define here a more general notion of robust model-checking for linear-time properties, which consists in verifying whether a property still holds even if the transitions are slightly delayed or expedited. We provide PSPACE algorithms for the robust model-checking of B{\"u}chi-like and LTL properties. We also verify bounded-response-time properties. } }
@book{Bollig06, author = {Bollig, Benedikt}, title = {Formal Models of Communicating Systems~--- Languages, Automata, and Monadic Second-Order Logic}, year = {2006}, month = jun, publisher = {Springer}, isbn = {3-540-32922-6}, otherurl = {http://www.springer.com/978-3-540-32922-6}, url = {http://www.lsv.ens-cachan.fr/~bollig/fmcs/}, abstract = {This book studies the relationship between automata and monadic second-order logic, focusing on classes of automata that describe the concurrent behavior of distributed systems.\par It provides a unifying theory of communicating automata and their logical properties. Based on Hanf's Theorem and Thomas's graph acceptors, it develops a result that allows us to characterize many popular models of distributed computation in terms of the existential fragment of monadic second-order logic. In particular, the book covers finite automata, asynchronous (cellular) automata, communicating finite-state machines, and lossy channel systems. Model behavior is described using graphs and partial orders, leading to the notions of Mazurkiewicz traces, message sequence charts, and live sequence charts.\par This book is suitable for senior undergraduate and graduate courses on advanced automata theory, concurrency and communication issues. It can also be used as a reference by researchers concerned with the formal modeling of concurrent systems. Some knowledge of automata theory is a prerequisite. Numerous exercises, chapter summaries, and suggested reading allow for self-study, while the book is supported with a website containing course material and solutions.} }
@inproceedings{BS05-express, address = {San Francisco, California, USA}, month = jul, year = 2006, number = 3, volume = 154, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Baeten, Jos and Phillips, Iain}, acronym = {{EXPRESS}'05}, booktitle = {{P}roceedings of the 12th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'05)}, author = {Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {A short visit to the {STS} hierarchy}, pages = {59-69}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BS05-express.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BS05-express.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BS05-express.ps}, doi = {10.1016/j.entcs.2006.05.007}, abstract = {The hierarchy of Symbolic Transition Systems, introduced by Henzinger, Majumdar and Raskin, is an elegant classification tool for some families of infinite-state operational models that support some variants of a symbolic {"}backward closure{"} verification algorithm. It was first used and illustrated with families of hybrid systems.\par In this paper we investigate whether the STS hierarchy can account for classical families of infinite-state systems outside of timed or hybrid systems.} }
@inproceedings{TED-hldvt06, address = {Monterey, California, USA}, month = nov, year = 2006, publisher = {{IEEE} Computer Society Press}, acronym = {{HLDVT}'06}, booktitle = {{P}roceedings of the {IEEE} {H}igh {L}evel {D}esign {V}erification and {T}est Workshop ({HLDVT}'06)}, author = {Taktak, Sami and Encrenaz, Emmanuelle and Desbarbieux, Jean-Lou}, title = {A Tool for Automatic Detection of Deadlock in Wormhole Networks on Chip}, pages = {203-210}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/TED-hldvt06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/TED-hldvt06.pdf}, doi = {10.1109/HLDVT.2006.319992}, abstract = {We present an extension of Duato's necessary and sufficient condition a routing function must satisfy in order to be deadlock-free, to support environment constraints inducing extra-dependencies between messages. We also present an original algorithm to automatically check the deadlock-freeness of a network with a given routing function. A~prototype tool has been developed and automatic deadlock checking of large scale networks with various routing functions have been successfully achieved.} }
@inproceedings{BE-rsp06, address = {Chania, Crete}, month = jun, year = 2006, publisher = {{IEEE} Computer Society Press}, acronym = {{RSP}'06}, booktitle = {{P}roceedings of the 17th {I}nternational {W}orkshop on {R}apid {S}ystem {P}rototyping ({RSP}'06)}, author = {Braunstein, C{\'e}cile and Encrenaz, Emmanuelle}, title = {Formalizing the incremental design and verification process of a pipelined protocol converter}, pages = {103-109}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BE-rsp06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BE-rsp06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BE-rsp06.ps}, doi = {10.1109/RSP.2006.19}, abstract = {This work studies the relations between pipeline architectures and their specification expressed in~CTL. We propose a method to build pipeline structures incrementally from a simple one (already verified) to a more complex one. Moreover, we show how each increment can be integrated in a CTL specification. We define increments to model treatment delay and treatment abortion of a pipeline flow, and we formalize the composition of the different increments. In order to represent the increments added to an architecture, we derive a set of CTL formulae transformations. Finally we model a control flow of a protocol converter by composition of these increments. We show how CTL properties of the complex architecture are built by applying automatic transformations on the set of CTL properties of the simplest architecture.} }
@inproceedings{GSZ-fsttcs2006, address = {Kolkata, India}, month = dec, year = 2006, volume = 4337, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Garg, Naveen and Arun-Kumar, S.}, acronym = {{FSTTCS}'06}, booktitle = {{P}roceedings of the 26th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'06)}, author = {Gastin, Paul and Sznajder, Nathalie and Zeitoun, Marc}, title = {Distributed synthesis for well-connected architectures}, pages = {321-332}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GSZ-fsttcs2006.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GSZ-fsttcs2006.pdf}, doi = {10.1007/11944836_30}, abstract = {We study the synthesis problem for external linear or branching specifications and distributed, synchronous architectures with arbitrary delays on processes. External means that the specification only relates input and output variables. We~introduce the subclass of uniformly well-connected~(UWC) architectures for which there exists a routing allowing each output process to get the values of all inputs it is connected to, as soon as possible. We~prove that the distributed synthesis problem is decidable on UWC architectures if and only if the set of all sets of input variables visible by output variables is totally ordered, under set inclusion. We~also show that if we extend this class by letting the routing depend on the output process, then the previous decidability result fails. Finally, we provide a natural restriction on specifications under which the whole class of~UWC architectures is decidable.} }
@proceedings{AB-lncs4202, title = {{P}roceedings of the 4th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'06)}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'06)}, editor = {Asarin, Eug{\`e}ne and Bouyer, Patricia}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 4202, year = 2006, month = sep, address = {Paris, France}, isbn = {3-540-45026-2}, url = {http://www.springer.com/978-3-540-45026-2}, doi = {10.1007/11867340} }
@inproceedings{BGP1-formats06, address = {Paris, France}, month = sep, year = 2006, volume = 4202, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Asarin, Eug{\`e}ne and Bouyer, Patricia}, acronym = {{FORMATS}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'06)}, author = {B{\'e}rard, B{\'e}atrice and Gastin, Paul and Petit, Antoine}, title = {Refinements and abstractions of signal-event (timed) languages}, pages = {67-81}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGP1-formats06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGP1-formats06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BGP1-formats06.ps}, doi = {10.1007/11867340_6}, abstract = {In the classical framework of formal languages, a refinement operation is modeled by a substitution and an abstraction by an inverse substitution. These mechanisms have been widely studied, because they describe a change in the specification level, from an abstract view to a more concrete one, or conversely. For~timed systems, there is up to now no uniform notion of substitutions. In~this paper, we study the timed substitutions in the general framework of signal-event languages, where both signals and events are taken into account. We~prove that regular signal-event languages are closed under substitutions and inverse substitutions. } }
@inproceedings{BGP2-formats06, address = {Paris, France}, month = sep, year = 2006, volume = 4202, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Asarin, Eug{\`e}ne and Bouyer, Patricia}, acronym = {{FORMATS}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'06)}, author = {B{\'e}rard, B{\'e}atrice and Gastin, Paul and Petit, Antoine}, title = {Intersection of regular signal-event (timed) languages}, pages = {52-66}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGP2-formats06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGP2-formats06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BGP2-formats06.ps}, doi = {10.1007/11867340_5}, abstract = {We propose in this paper a construction for a {"}well known{"} result: regular signal-event languages are closed by intersection. In~fact, while this result is indeed trivial for languages defined by Alur and Dill's timed automata (the proof is an immediate extension of the one in the untimed case), it turns out that the construction is much more tricky when considering the most involved model of signal-event automata. While several constructions have been proposed in particular cases, it is the first time, up to our knowledge, that a construction working on finite and infinite signal-event words and taking into account signal stuttering, unobservability of zero-duration \(\tau\)-signals and Zeno runs is proposed.} }
@inproceedings{CDP-fsttcs2006, address = {Kolkata, India}, month = dec, year = 2006, volume = 4337, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Garg, Naveen and Arun-Kumar, S.}, acronym = {{FSTTCS}'06}, booktitle = {{P}roceedings of the 26th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'06)}, author = {Chevalier, Fabrice and D'Souza, Deepak and Prabhakar, Pavithra}, title = {On continuous timed automata with input-determined guards}, pages = {369-380}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDP-fsttcs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDP-fsttcs06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CDP-fsttcs06.ps}, doi = {10.1007/11944836_34}, abstract = {We consider a general class of timed automata parameterized by a set of {"}input-determined{"} operators, in a continuous time setting. We show that for any such set of operators, we have a monadic second order logic characterization of the class of timed languages accepted by the corresponding class of automata. Further, we consider natural timed temporal logics based on these operators, and show that they are expressively equivalent to the first-order fragment of the corresponding MSO logics. As~a~corollary of these general results we obtain an expressive completeness result for the continuous version of MTL.} }
@inproceedings{CKKW-fsttcs2006, address = {Kolkata, India}, month = dec, year = 2006, volume = 4337, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Garg, Naveen and Arun-Kumar, S.}, acronym = {{FSTTCS}'06}, booktitle = {{P}roceedings of the 26th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'06)}, author = {Cortier, V{\'e}ronique and Kremer, Steve and K{\"u}sters, Ralf and Warinschi, Bogdan}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, pages = {176-187}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CKKW-fsttcs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CKKW-fsttcs06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CKKW-fsttcs06.ps}, doi = {10.1007/11944836_18}, abstract = {The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In~this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our~results hold for standard security notions for encryption and hash functions modeled as random oracles.} }
@article{CDL05-survey, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie and Lafourcade, Pascal}, title = {A Survey of Algebraic Properties Used in Cryptographic Protocols}, year = {2006}, volume = 14, number = 1, pages = {1-43}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/surveyCDL.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/surveyCDL.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/surveyCDL.ps}, abstract = {Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We give a list of some relevant algebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.} }
@inproceedings{CEFX-formats06, address = {Paris, France}, month = sep, year = 2006, volume = 4202, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Asarin, Eug{\`e}ne and Bouyer, Patricia}, acronym = {{FORMATS}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'06)}, author = {Chevallier, R{\'e}my and Encrenaz{-}Tiph{\`e}ne, Emmanuelle and Fribourg, Laurent and Xu, Weiwen}, title = {Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata}, pages = {113-127}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CEFX-formats06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CEFX-formats06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CEFX-formats06.ps}, econtrat = {MEDEA+ Blueberries}, doi = {10.1007/11867340_9}, abstract = {Using a variant of Clariso-Cortadella's parametric method for verifying asynchronous circuits, we formally derive a set of linear constraints that ensure the correctness of some crucial timing behaviours of the architecture of SPSMALL memory. This allows us to check two different implementations of this architecture.} }
@article{CEFX-wseas06, publisher = {World Scientific and Engineering Academy and Society}, journal = {WSEAS Transactions on Circuits and Systems}, author = {Chevallier, R{\'e}my and Encrenaz{-}Tiph{\`e}ne, Emmanuelle and Fribourg, Laurent and Xu, Weiwen}, title = {Timing analysis of an embedded memory: {SPSMALL}}, pages = {973-978}, volume = 5, number = 7, year = 2006, month = jul, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CEFX-wseas06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CEFX-wseas06.pdf}, abstract = {This paper proposes a high-level formalism, called Abstract Functional and Timing Graph~(AFTG), for describing a memory architecture, which combines logical functionality and timing. After translation of the~AFTG into the form a timed automaton, we are able to compute the response times of the modeled memory, and check their consistency with the values specified in the datasheet. We also address the problem of finding optimal values of setup timings.} }
@inproceedings{DDFG-atva06, address = {Beijing, China}, month = oct, year = {2006}, volume = 4218, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Graf, Susanne and Zhang, Wenhui}, acronym = {{ATVA}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'06)}, author = {Demri, St{\'e}phane and Finkel, Alain and Goranko, Valentin and van Drimmelen, Govert}, title = {Towards a model-checker for counter systems}, pages = {493-507}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDFG-atva06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDFG-atva06.pdf}, doi = {10.1007/11901914_36}, abstract = {This paper deals with model-checking of fragments and extensions of~\(\mathrm{CTL}^{*}\) on infinite-state Presburger counter systems, where the states are vectors of integers and the transitions are determined by means of relations definable within Presburger arithmetic. We have identified a natural class of admissible counter systems~(ACS) for which we show that the quantification over paths in~\(\mathrm{CTL}^{*}\) can be simulated by quantification over tuples of natural numbers, eventually allowing translation of the whole Presburger-\(\mathrm{CTL}^{*}\) into Presburger arithmetic, thereby enabling effective model checking. We have provided evidence that our results are close to optimal with respect to the class of counter systems described above. Finally, we design a complete semi-algorithm to verify first-order~\(\mathrm{LTL}\) properties over trace-flattable counter systems, extending the previous underlying FAST semi-algorithm to verify reachability questions over flattable counter systems. } }
@inproceedings{DL-lics2006, address = {Seattle, Washington, USA}, month = aug, year = 2006, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'06}, booktitle = {{P}roceedings of the 21st {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'06)}, author = {Demri, St{\'e}phane and Lazi{\'c}, Ranko}, title = {{LTL} with the freeze quantifier and register automata}, pages = {17-26}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DL-lics2006.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DL-lics2006.pdf}, doi = {10.1109/LICS.2006.31}, abstract = {Temporal logics, first-order logics, and automata over data words have recently attracted considerable attention. A~data word is a word over a finite alphabet, together with a datum (an element of an infinite domain) at each position. Examples include timed words and XML documents. To refer to the data, temporal logics are extended with the freeze quantifier, first-order logics with predicates over the data domain, and automata with registers or pebbles.\par We investigate relative expressiveness and complexity of standard decision problems for~\(\mathrm{LTL}\) with the freeze quantifier~(\(\mathrm{LTL}^{\downarrow}\)), 2-variable first-order logic (\(\mathrm{FO}^{2}\)) over data words, and register automata. The only predicate available on data is equality. Previously undiscovered connections among those formalisms, and to counter automata with in- crementing errors, enable us to answer several questions left open in recent literature.\par We show that the future-time fragment of~\(\mathrm{LTL}^{\downarrow}\) which corresponds to \(\mathrm{FO}^{2}\) over finite data words can be extended considerably while preserving decidability, but at the expense of non-primitive recursive complexity, and that most of further extensions are undecidable. We also prove that surprisingly, over infinite data words, \(\mathrm{LTL}^{\downarrow}\) without the `until' operator, as well as nonemptiness of one-way universal register automata, are undecidable even when there is only one register.} }
@inproceedings{DL-ijcar06, address = {Seattle, Washington, USA}, month = aug, year = 2006, volume = 4130, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Furbach, Ulrich and Shankar, Natarajan}, acronym = {{IJCAR}'06}, booktitle = {{P}roceedings of the 3rd {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'06)}, author = {Demri, St{\'e}phane and Lugiez, Denis}, title = {{P}resburger Modal Logic is Only {PSPACE}-complete}, pages = {541-556}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-25.pdf}, doi = {10.1007/11814771_44}, abstract = {We introduce a Presburger modal logic PML with regularity constraints and full Presburger constraints on the number of children that generalize graded modalities, also known as number restrictions in description logics. We~show that PML satisfiability is only PSPACE-complete by designing a Ladner-like algorithm that can be turned into an analytic proof system algorithm. This extends a well-known and non-trivial PSPACE upper bound for graded modal logic. Furthermore, we provide a detailed comparison with logics that contain Presburger constraints and that are dedicated to query XML documents. As~an application, we show that satisfiability for Sheaves Logic SL is PSPACE-complete, improving significantly its best known upper bound.} }
@article{delaune-tcs06, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Delaune, St{\'e}phanie}, title = {An Undecidability Result for~{\textsf{\MakeUppercase{AG}h}}}, volume = 368, number = {1-2}, pages = {161-167}, year = 2006, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/delaune-tcs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/delaune-tcs06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/delaune-tcs06.ps}, doi = {10.1016/j.tcs.2006.08.018}, abstract = {We present an undecidability result for the verification of security protocols. Since the \emph{perfect cryptography assumption} is unrealistic for cryptographic primitives with visible algebraic properties, several recent works relax this assumption, allowing the intruder to exploit these properties. We are interested in the \emph{Abelian groups} theory in combination with the homomorphism axiom. We show that satisfaisability of symbolic deducibility constraints is undecidable, obtaining in this way the first undecidability result concerning a theory for which unification is known to be decidable~[F.~Baader, Unification in commutative theories, Hilbert's basis theorem, and Gr{\"{o}}bner bases, J.~ACM~40(3) (1993)~477-503].} }
@inproceedings{DKR-wote06, address = {Cambridge, UK}, month = jun, year = 2006, acronym = {{WOTE}'06}, booktitle = {{P}roceedings of the {IAVoSS} {W}orkshop {O}n {T}rustworthy {E}lections ({WOTE}'06)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Verifying Properties of Electronic Voting Protocols}, pages = {45-52}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-wote06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-wote06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DKR-wote06.ps}, abstract = {In this paper we report on some recent work to formally specify and verify electronic voting protocols. In particular, we use the formalism of the applied pi calculus: the applied pi calculus is a formal language similar to the pi calculus but with useful extensions for modelling cryptographic protocols. We model several important properties, namely fairness, eligibility, privacy, receipt-freeness and coercion-resistance. Verification of these properties is illustrated on two cases studies and has been partially automated using the Blanchet's ProVerif tool.} }
@inproceedings{DKR-csfw06, address = {Venice, Italy}, month = jul, year = 2006, publisher = {{IEEE} Computer Society Press}, acronym = {{CSFW}'06}, booktitle = {{P}roceedings of the 19th {IEEE} {C}omputer {S}ecurity {F}oundations {W}orkshop ({CSFW}'06)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Coercion-Resistance and Receipt-Freeness in Electronic Voting}, pages = {28-39}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-csfw06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-csfw06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DKR-csfw06.ps}, doi = {10.1109/CSFW.2006.8}, abstract = {In this paper we formally study important properties of electronic voting protocols. In particular we are interested in coercion-resistance and receipt-freeness. Intuitively, an election protocol is coercion-resistant if a voter \(A\) cannot prove to a potential coercer~\(C\) that she voted in a particular way. We assume that \(A\) cooperates with~\(C\) in an interactive way. Receipt-freeness is a weaker property, for which we assume that \(A\) and~\(C\) cannot interact during the protocol, but \(A\) later provides evidence (the receipt) of how she voted. While receipt-freeness can be expressed using observational equivalence from the applied pi calculus, we need to introduce a new relation to capture coercion-resistance. Our formalization of coercion-resistance and receipt-freeness are quite different. Nevertheless, we show in accordance with intuition that coercion-resistance implies receipt-freeness, which implies privacy, the basic anonymity property of voting protocols, as defined in previous work. Finally we illustrate the definitions on a simplified version of the Lee~\emph{et~al.}\ voting protocol.} }
@inproceedings{DLLT-ICALP2006, address = {Venice, Italy}, month = jul, year = 2006, volume = 4052, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Buglesi, Michele and Preneel, Bart and Sassone, Vladimiro and Wegener, Ingo}, acronym = {{ICALP}'06}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'06)~--- {P}art~{II}}, author = {Delaune, St{\'e}phanie and Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf}, title = {Symbolic Protocol Analysis in Presence of a Homomorphism Operator and {\emph{Exclusive~Or}}}, pages = {132-143}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLLT-icalp06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLLT-icalp06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DLLT-icalp06.ps}, doi = {10.1007/11787006_12}, abstract = {Security of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. We show that symbolic trace reachability for well-defined protocols is decidable in presence of the exclusive or theory in combination with the homomorphism axiom. These theories allow us to model basic properties of important cryptographic operators. This trace reachability problem can be expressed as a system of symbolic deducibility constraints for a certain inference system describing the capabilities of the attacker. One main step of our proof consists in reducing deducibility constraints to constraints for deducibility in one step of the inference system. This constraint system, in turn, can be expressed as a system of quadratic equations of a particular form over \(\mathbb{Z}/2\mathbb{Z}[h]\), the ring of polynomials in one indeterminate over the finite field \(\mathbb{Z}/2\mathbb{Z}\). We show that satisfiability of such systems is decidable. } }
@proceedings{CK-fcc2006, editor = {Cortier, V{\'e}ronique and Kremer, Steve}, booktitle = {{P}roceedings of the 2nd {W}orkshop on {F}ormal and {C}omputational {C}ryptography ({FCC}'06)}, title = {{P}roceedings of the 2nd {W}orkshop on {F}ormal and {C}omputational {C}ryptography ({FCC}'06)}, address = {Venice, Italy}, year = 2006, month = jul, url = {http://hal.inria.fr/FCC2006/} }
@article{CKS-jar2005, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Chadha, Rohit and Kremer, Steve and Scedrov, Andre}, title = {Formal Analysis of Multi-Party Contract Signing}, volume = 36, number = {1-2}, pages = {39-83}, year = 2006, month = jan, nmnote = {Special Issue on Automated Reasoning for Security Protocol Analysis}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mpcs-CKS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mpcs-CKS.pdf}, doi = {10.1007/s10817-005-9019-5}, abstract = {We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, {\scshape Mocha}, which allows specification of protocol properties in a branching-time temporal logic with game semantics. While our analysis does not reveal any errors in the BW protocol, in the GM protocol we discover serious problems with fairness for four signers and an oversight regarding abuse-freeness for three signers. We propose a complete revision of the GM subprotocols in order to restore fairness.} }
@article{dj-jar05, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Delaune, St{\'e}phanie and Jacquemard, Florent}, title = {Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks}, volume = 36, number = {1-2}, year = 2006, month = jan, pages = {85-124}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-jar05.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-jar05.ps}, doi = {10.1007/s10817-005-9017-7}, abstract = {We consider the problem of formal automatic verification of cryptographic protocols when some data, like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a theory of these attacks and propose an inference system modeling the deduction capabilities of an intruder. This system extends a set of well studied deduction rules for symmetric and public key encryption often called Dolev-Yao rules with the introduction of a probabilistic encryption operator and guessing abilities for the intruder. Then, we show that the intruder deduction problem in this extended model is decidable in~PTIME. The proof is based on a locality lemma for our inference system. This first result yields to an NP decision procedure for the protocol insecurity problem in presence of a passive intruder. In the active case, the same problem is proved to be NP-complete: we give a procedure for simultaneously solving symbolic constraints with variables which represent intruder deductions. We illustrate the procedure with examples of published protocols and compare our model to other recent formal definitions of dictionary attacks.} }
@article{SD-ipl05, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Delaune, St{\'e}phanie}, title = {Easy Intruder Deduction Problems with Homomorphisms}, volume = 97, number = 6, pages = {213-218}, month = mar, year = 2006, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SD-ipl05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SD-ipl05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/SD-ipl05.ps}, doi = {10.1016/j.ipl.2005.11.008}, abstract = {We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, we extend the classical \emph{Dolev-Yao} model by permitting the intruder to exploit these properties. More precisely, we are interested in theories such as \emph{Exclusive or} and \emph{Abelian groups} in combination with the homomorphism axiom. We show that the intruder deduction problem is in PTIME in both cases, improving the EXPTIME complexity results presented in~(Lafourcade, Lugiez, Treinen,~2005).} }
@article{Demri06, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Demri, St{\'e}phane}, title = {{LTL} over integer periodicity constraints}, year = {2006}, volume = 360, number = {1-3}, pages = {96-123}, month = aug, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-tcs06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-tcs06.pdf}, doi = {10.1016/j.tcs.2006.02.019}, abstract = {Periodicity constraints are used in many logical formalisms, in fragments of Presburger~LTL, in calendar logics, and in logics for access control, to quote a few examples. In the paper, we introduce the logic PLTL\(^{\mathrm{mod}}\), an extension of Linear-Time Temporal Logic LTL with past-time operators whose atomic formulae are defined from a first-order constraint language dealing with periodicity. Although the underlying constraint language is a fragment of Presburger arithmetic shown to admit a {\scshape pspace}-complete satisfiability problem, we establish that PLTL\(^{\mathrm{mod}}\) model-checking and satisfiability problems remain in {\scshape pspace} as plain~LTL (full Presburger LTL is known to be highly undecidable). This is particularly interesting for dealing with periodicity constraints since the language of PLTL\(^{\mathrm{mod}}\) has a language more concise than existing languages and the temporalization of our first-order language of periodicity constraints has the same worst case complexity as the underlying constraint language. Finally, we show examples of introduction the quantification in the logical language that provide to PLTL\(^{\mathrm{mod}}\), {\scshape expspace}-complete problems. As another application, we establish that the equivalence problem for extended single-string automata, known to express the equality of time granularities, is {\scshape pspace}-complete by designing a reduction from~QBF and by using our results for PLTL\(^{\mathrm{mod}}\). } }
@article{DLS-jcss-param, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Demri, St{\'e}phane and Laroussinie, Fran{\c{c}}ois and Schnoebelen, {\relax Ph}ilippe}, title = {A Parametric Analysis of the State Explosion Problem in Model Checking}, year = 2006, month = jun, volume = 72, number = 4, pages = {547-575}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLS-jcss-param.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLS-jcss-param.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DLS-jcss-param.ps}, doi = {10.1016/j.jcss.2005.11.003}, abstract = {In model checking, the state-explosion problem occurs when one checks a non-flat system, \emph{i.e.}, a system implicitly described as a synchronized product of elementary subsystems. In this paper, we investigate the complexity of a wide variety of model checking problems for non-flat systems under the light of parameterized complexity, taking the number of synchronized components as a parameter. We provide precise complexity measures (in the parameterized sense) for most of the problems we investigate, and evidence that the results are robust.} }
@article{FGRV-tcs05, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Finkel, Alain and Geeraerts, Gilles and Raskin, Jean-Fran{\c{c}}ois and Van{~}Begin, Laurent}, title = {On the \(\omega\)-Language Expressive Power of Extended {P}etri Nets}, year = 2006, month = may, volume = 356, number = 3, pages = {374-386}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGRV-TCS04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGRV-TCS04.pdf}, doi = {10.1016/j.tcs.2006.02.008}, abstract = {In this paper, we study the expressive power of several monotonic extensions of Petri nets. We compare the expressive power of Petri nets, Petri nets extended with \emph{non-blocking arcs} and Petri nets extended with \emph{transfer arcs}, in terms of \(\omega\)-languages. We show that the hierarchy of expressive powers of those models is strict. To prove these results, we propose \emph{original techniques} that rely on well-quasi orderings and monotonicity properties.} }
@article{FMP-dc05, publisher = {Springer}, journal = {Distributed Computing}, author = {Fribourg, Laurent and Messika, St{\'e}phane and Picaronny, Claudine}, title = {Coupling and Self-Stabilization}, year = 2006, month = feb, volume = 18, number = 3, pages = {221-232}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dcmessika.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/dcmessika.ps}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dcmessika.pdf}, doi = {10.1007/s00446-005-0142-7}, abstract = {A randomized self-stabilizing algorithm~\(\mathcal{A}\) is an algorithm that, whatever the initial configuration is, reaches a set~\(\mathcal{L}\) of \emph{legal configurations} in finite time with probability~1. The proof of convergence towards~\(\mathcal{L}\) is generally done by exhibiting a potential function~\(\varphi\), which measures the {"}vertical{"} distance of any configuration to~\(\mathcal{L}\), such that \(\varphi\) decreases with non-null probability at each step of~\(\mathcal{A}\). We propose here a method, based on the notion of coupling, which makes use of a {"}horizontal{"} distance~\(\delta\) between any pair of configurations, such that \(\delta\) decreases in expectation at each step of~\(\mathcal{A}\). In contrast with classical methods, our coupling method does not require the knowledge of~\(\mathcal{L}\). In addition to the proof of convergence, the method allows us to assess the convergence rate according to two different measures. Proofs produced by the method are often simpler or give better upper bounds than their classical counterparts, as examplified here on Herman's mutual exclusion and Iterated Prisoner's Dilemma algorithms in the case of cyclic graphs.} }
@inproceedings{BGM-atva2006, address = {Beijing, China}, month = oct, year = {2006}, volume = 4218, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Graf, Susanne and Zhang, Wenhui}, acronym = {{ATVA}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'06)}, author = {Bhateja, Puneet and Gastin, Paul and Mukund, Madhavan}, title = {A fresh look at testing for asynchronous communication}, pages = {369-383}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGM-atva06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGM-atva06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BGM-atva06.ps}, doi = {10.1007/11901914_28}, abstract = {Testing is one of the fundamental techniques for verifying if a computing system conforms to its specification. We~take a fresh look at the theory of testing for message-passing systems based on a natural notion of observability in terms of input-output relations. We~propose two notions of test equivalence: one which corresponds to presenting all test inputs up front and the other which corresponds to interactively feeding inputs to the system under test. We compare our notions with those studied earlier, notably the equivalence proposed by Tretmans. In~Tretmans' framework, asynchrony is modelled using synchronous communication by augmenting the state space of the system with queues. We~show that the first equivalence we consider is strictly weaker than Tretmans' equivalence and undecidable, whereas the second notion is incomparable. We~also establish (un)decidability results for these equivalences.} }
@article{DG-icomp2006, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Diekert, Volker and Gastin, Paul}, title = {Pure future local temporal logics are expressively complete for {M}azurkiewicz traces}, pages = {1597-1619}, year = 2006, month = nov, volume = 204, number = 11, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-icomp06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-icomp06.pdf}, doi = {10.1016/j.ic.2006.07.002}, abstract = {The paper settles a long standing problem for Mazurkiewicz traces: the pure future local temporal logic defined with the basic modalities exists-next and until is expressively complete. This means every first-order definable language of Mazurkiewicz traces can be defined in a pure future local temporal logic. The~analogous result with a global interpretation has been known, but the treatment of a local interpretation turned out to be much more involved. Local logics are interesting because both the satisfiability problem and the model checking problem are solvable in PSPACE for these logics whereas they are non-elementary for global logics. Both, the (previously known) global and the (new) local results generalize Kamp's Theorem for words, because for sequences local and global viewpoints coincide. } }
@article{DG06-TCS, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Diekert, Volker and Gastin, Paul}, title = {From local to global temporal logics over {M}azurkiewicz traces}, year = 2006, month = may, volume = 356, number = {1-2}, pages = {126-135}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG06-TCS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG06-TCS.pdf}, doi = {10.1016/j.tcs.2006.01.035}, abstract = {We review some results on global and local temporal logic on Mazurkiewicz traces. Our~main contribution is to show how to derive the expressive completeness of global temporal logic with respect to first-order logic [V.~Diekert, P.~Gastin, LTL~is expressively complete for Mazurkiewicz traces, J.~Comput. System Sci.~64 (2002) 396-418] from the similar result on local temporal logic [V.~Diekert, P.~Gastin, Pure future local temporal logics are expressively complete for Mazurkiewicz traces, in: M.~Farach-Colton~(Ed.), Proc.~LATIN'04, Lecture Notes in Computer Science, Vol.~2976, Springer, Berlin, 2004, pp.~232-241, Full version available as Research Report LSV-05-22, Laboratoire Sp\'ecification et V\'erification, ENS Cachan, France].} }
@inproceedings{JRV-ijcar06, address = {Seattle, Washington, USA}, month = aug, year = 2006, volume = 4130, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Furbach, Ulrich and Shankar, Natarajan}, acronym = {{IJCAR}'06}, booktitle = {{P}roceedings of the 3rd {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'06)}, author = {Jacquemard, Florent and Rusinowitch, Micha{\"e}l and Vigneron, Laurent}, title = {Tree automata with equality constraints modulo equational theories}, pages = {557-571}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-07.pdf}, doi = {10.1007/11814771_45}, abstract = {This paper presents new classes of tree automata combining automata with equality test and automata modulo equational theories. We believe that this class has a good potential for application in \emph{e.g.}~software verification. These tree automata are obtained by extending the standard Horn clause representations with equational conditions and rewrite systems. We show in particular that a generalized membership problem (extending the emptiness problem) is decidable by proving that the saturation of tree automata presentations with suitable paramodulation strategies terminates. Alternatively our results can be viewed as new decidable classes of first-order formula.} }
@misc{markey-SynthVerif06, author = {Markey, Nicolas}, title = {Verification of Multi-Agent Systems with~{ATL}}, year = 2006, month = oct, howpublished = {Invited talk, FNRS meeting on {"}Synthesis and Verification{"}} }
@article{KucSch-TCS, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Ku{\v c}era, Anton{\'\i}n and Schnoebelen, {\relax Ph}ilippe}, title = {A General Approach to Comparing Infinite-State Systems with Their Finite-State Specifications}, number = {2-3}, volume = {358}, pages = {315-333}, month = aug, year = 2006, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KucSch-TCS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KucSch-TCS.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KucSch-TCS.ps}, doi = {10.1016/j.tcs.2006.01.021}, abstract = {We introduce a generic family of behavioral relations for which the regular equivalence problem (\emph{i.e.}, comparing an arbitrary transition system to some finite-state specification) can be reduced to the model checking problem against simple modal formulae. As an application, we derive decidability of several regular equivalence problems for well-known families of infinite-state systems. } }
@inproceedings{Laf-secret06, address = {Venice, Italy}, month = jul, year = 2007, number = 4, volume = 171, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Fern{\'a}ndez, Maribel and Kirchner, Claude}, acronym = {{SecReT}'06}, booktitle = {{P}roceedings of the 1st {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'06)}, author = {Lafourcade, Pascal}, title = {Intruder Deduction for the Equational Theory of {\emph{Exclusive-or}} with Commutative and Distributive Encryption}, pages = {37-57}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Laf-secret06-long.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Laf-secret06-long.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Laf-secret06-long.ps}, nomorelongpdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/ rr-lsv-2005-21.pdf}, nomorelongps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-21.ps}, nomorelongpsgz = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PSGZ/ rr-lsv-2005-21.ps.gz}, doi = {10.1016/j.entcs.2007.02.054}, abstract = {The first step in the verification of cryptographic protocols is to decide the intruder deduction problem, that is the vulnerability to a so-called passive attacker. We~extend the Dolev-Yao model in order to model this problem in presence of the equational theory of a commutative encryption operator which distributes over the \emph{exclusive-or} operator. The~interaction between the commutative distributive law of the encryption and \emph{exclusive-or} offers more possibilities to decrypt an encrypted message than in the non-commutative case, which imply a more careful analysis of the proof system. We~prove decidability of the intruder deduction problem for a commutative encryption which distributes over \emph{exclusive-or} with a DOUBLE-EXPTIME procedure. And~we obtain that this problem is EXPSPACE-hard in the binary case.} }
@inproceedings{LLT-unif2006, address = {Seattle, Washington, USA}, month = aug, year = 2006, editor = {Levy, Jordi}, acronym = {{UNIF}'06}, booktitle = {{P}roceedings of the 20th {I}nternational {W}orkshop on {U}nification ({UNIF}'06)}, author = {Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf}, title = {{ACUNh}: Unification and Disunification Using Automata Theory}, pages = {6-20}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LLT-unif06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LLT-unif06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LLT-unif06.ps}, abstract = {We show several results about unification problems in the equational theory~ACUNh consisting of the theory of exclusive or with one homomorphism. These results are shown using only techniques of automata and combinations of unification problems. We~show how to construct a most-general unifier for ACUNh-unification problems with constants using automata. We also prove that the first-order theory of ground terms modulo~ACUNh is decidable if the signature does not contain free non-constant function symbols, and that the existential fragment is decidable in the general case. Furthermore, we show a technical result about the set of most-general unifiers obtained for general unification problems.} }
@inproceedings{BJ-unif2006, address = {Seattle, Washington, USA}, month = aug, year = 2006, editor = {Levy, Jordi}, acronym = {{UNIF}'06}, booktitle = {{P}roceedings of the 20th {I}nternational {W}orkshop on {U}nification ({UNIF}'06)}, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Automating Sufficient Completeness Check for Conditional and Constrained~{TRS}}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-unif06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-unif06.pdf}, abstract = {We present a procedure for checking sufficient completeness for conditional and constrained term rewriting systems containing axioms for constructors which may be constrained (by~e.g.~equalities, disequalities, ordering, membership...). Such axioms allow to specify complex data structures like e.g.~sets, sorted lists or powerlists. Our approach is integrated in a framework for inductive theorem proving based on tree grammars with constraints, a formalism which permits an exact representation of languages of ground constructor terms in normal form. The key technique used in the procedure is a generalized form of narrowing where, given a term, instead of unifying it with left members of rewrite rules, we instantiate it, at selected variables, following the productions of a constrained tree grammar, and test whether it can be rewritten. Our~procedure is sound and complete and has been successfully applied to several examples, yielding very natural proofs and, in case of negative answer, a counter example suggesting how to complete the specification. Moreover, it is a decision procedure when the TRS is unconditional but constrained, for a large class of constrained constructor axioms.} }
@inproceedings{LMO-formats06, address = {Paris, France}, month = sep, year = 2006, volume = 4202, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Asarin, Eug{\`e}ne and Bouyer, Patricia}, acronym = {{FORMATS}'06}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'06)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Oreiby, Ghassan}, title = {Model Checking Timed {ATL} for Durational Concurrent Game Structures}, pages = {245-259}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMO-formats06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMO-formats06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMO-formats06.ps}, doi = {10.1007/11867340_18}, abstract = {We extend the framework of ATL model-checking to {"}simply timed{"} concurrent game structures, i.e., multi-agent structures where each transition carry an integral duration (or interval thereof). While the case of single durations is easily handled from the semantics point of view, intervals of durations raise several interesting questions. Moreover subtle algorithmic problems have to be handled when dealing with model checking. We propose a semantics for which we develop efficient (PTIME) algorithms for timed ATL without equality constraints, while the general case is shown to be EXPTIME-complete.} }
@article{LMS-tcs05, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Efficient Timed Model Checking for Discrete-Time Systems}, volume = 353, number = {1-3}, pages = {249-271}, month = mar, year = 2006, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-TCS05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMS-TCS05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMS-TCS05.ps}, doi = {10.1016/j.tcs.2005.11.020}, abstract = {We consider model checking of timed temporal formulae in \emph{durational transition graphs} (DTGs), \emph{i.e.}, Kripke structures where transitions have integer durations. Two semantics for DTGs are presented and motivated. We consider timed versions of CTL where subscripts put quantitative constraints on the time it takes before a property is satisfied. \par We exhibit an important gap between logics where subscripts of the form {"}\(= c\){"} (exact duration) are allowed, and simpler logics that only allow subscripts of the form {"}\(\leq c\){"} or {"}\(\geq c\){"} (bounded duration).\par Without exact durations, model checking can be done in polynomial time, but with exact durations, it becomes \(\Delta_{2}^{P}\)-complete or PSPACE-complete depending on the considered semantics.} }
@inproceedings{MOJ-aisc2006, address = {Beijing, China}, month = sep, year = 2006, volume = 4120, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Calmet, Jacques and Ida, Tetsuo and Wang, Dongming}, acronym = {{AISC}'06}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {A}rtificial {I}ntelligence and {S}ymbolic {C}omputation ({AISC}'06)}, author = {Mitsuhashi, Ichiro and Oyamaguchi, Michio and Jacquemard, Florent}, title = {The Confluence Problem for Flat~{TRSs}}, pages = {68-81}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MOJ-aisc06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MOJ-aisc06.pdf}, doi = {10.1007/11856290_8}, abstract = {We prove that the properties of reachability, joinability and confluence are undecidable for flat~TRSs. Here, a~TRS is flat if the heights of the left and right-hand sides of each rewrite rule are at most one.} }
@article{MR-TCS05, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Markey, Nicolas and Raskin, Jean-Fran{\c{c}}ois}, title = {Model Checking Restricted Sets of Timed Paths}, year = {2006}, month = aug, volume = 358, number = {2-3}, pages = {273-292}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Markey-Raskin-TCS05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Markey-Raskin-TCS05.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ Markey-Raskin-TCS05.ps}, doi = {10.1016/j.tcs.2006.01.019}, abstract = {In this paper, we study the complexity of model-checking formulas of four important real-time logics (TPTL, MTL, MITL, and TCTL) over restricted sets of timed paths. The classes of restricted sets of timed paths that we consider are \textit{(i)}~a~single finite (or ultimately periodic) timed path, \textit{(ii)}~an~infinite set of finite (or infinite) timed paths defined by a finite (or ultimately periodic) path in a region graph, \textit{(iii)}~an~infinite set of finite (or infinite) timed paths defined by a finite (or ultimately periodic) path in a zone graph. \par Several results are quite negative: TPTL and MTL remain undecidable along region- and zone-paths. On the other hand, we obtained PTIME algorithms for model checking TCTL along a region path, and for MTL along a single timed path.} }
@article{MS05-IPL, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Markey, Nicolas and Schnoebelen, {\relax Ph}ilippe}, title = {Mu-Calculus Path Checking}, volume = 97, number = 6, month = mar, year = 2006, pages = {225-230}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS05-IPL.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MS05-IPL.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/MS05-IPL.ps}, doi = {10.1016/j.ipl.2005.11.010}, abstract = {We investigate the path model checking problem for the \(\mu\)-calculus. Surprisingly, restricting to deterministic structures does not allow for more efficient model checking algorithm, as we prove that it can encode any instance of the standard model checking problem for the \(\mu\)-calculus. } }
@article{RS-btl2, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Rabinovich, Alexander and Schnoebelen, {\relax Ph}ilippe}, title = {{\(\mathit{\MakeUppercase{BTL}}_2\)} and the expressive power of {\(\mathit{\MakeUppercase{ECTL}}^+\)}}, year = 2006, month = jul, volume = 204, number = 7, pages = {1023-1044}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BTL2-InfComp.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BTL2-InfComp.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BTL2-InfComp.ps}, doi = {10.1016/j.ic.2005.07.006}, abstract = {We show that \(\mathit{ECTL}^+\), the classical extension of \(\mathit{CTL}\) with fairness properties, is expressively equivalent to \(\mathit{BTL}_2\), a natural fragment of the monadic logic of order. \(\mathit{BTL}_2\)~is the branching-time logic with arbitrary quantification over paths, and where path formulae are restricted to quantifier depth~\(2\) first-order formulae in the monadic logic of order. This result, linking \(\mathit{ECTL}^+\) to a natural fragment of the monadic logic of order, provides a characterization that other branching-time logics, \emph{e.g.}, \(\mathit{CTL}\), lack. \par We then go on to show that \(\mathit{ECTL}^+\) and \(\mathit{BTL}_2\) are not finitely based (\emph{i.e.}, they cannot be defined by a finite set of temporal modalities) and that their model-checking problems are of the same complexity. } }
@misc{phs-lipn2006, author = {Schnoebelen, {\relax Ph}ilippe}, title = {De nouvelles applications pour le model-checking}, year = {2006}, month = nov, howpublished = {Invited lecture, Journ{\'e}es {\`a} l'occasion des 20~ans du~LIPN, Villetaneuse, France} }
@phdthesis{THESE-bernat06, author = {Bernat, Vincent}, title = {Th{\'e}ories de l'intrus pour la v{\'e}rification des protocoles cryptographiques}, year = 2006, month = jun, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-bernat.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-bernat.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-bernat.ps} }
@phdthesis{THESE-delaune06, author = {Delaune, St{\'e}phanie}, title = {V{\'e}rification des protocoles cryptographiques et propri{\'e}t{\'e}s alg{\'e}briques}, year = 2006, month = jun, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-delaune.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-delaune.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-delaune.ps}, abstract = {Cryptographic protocols are small concurrent programs designed to guarantee the security of exchanges between participants using non-secure medium. Establishing the correctness of these protocols is crucial given the increasing number of applications, such as electronic commerce, that exchange information on the Internet. Unfortunately, the existence of cryptographic primitives such as encryption is not sufficient to ensure security. The security of exchanges is ensured by cryptographic protocols which are notoriously error-prone.\par The formal verification of cryptographic protocols is a difficult problem that can be seen as a particular model-checking problem in an hostile environment. To verify such protocols, a line of research consists in considering encryption as a black box and assuming that an adversary can't learn anything from an encrypted message except if he has the key. This is called the \emph{perfect cryptography} assumption. Many results have been obtained under this assumption, but such an assumption is too strong in general. Some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. \par In this thesis, we relax the perfect cryptography assumption by taking into account some algebraic properties of cryptographic primitives. We give decision procedures for the security problem in presence of several algebraic operators.} }
@phdthesis{THESE-lafourcade06, author = {Lafourcade, Pascal}, title = {V{\'e}rification des protocoles cryptographiques en pr{\'e}sence de th{\'e}ories {\'e}quationnelles}, year = 2006, month = sep, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-lafourcade.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-lafourcade.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-lafourcade.ps}, note = {209~pages}, abstract = {The rise of the internet of new technologies has reinforced the key role of computer science in communication technology. The recent progress in these technologies has brought a dramatic change in the ways how we communicate and consume. All these communication activities are subject to complex communication protocols that a user does not control completely. Users of communication protocols require that their communications are {"}secure{"}. The developers of these communication protocols aim to secure communications in a hostile environment by cryptographic means. Such an environment consists of a dishonest communication participant, called an {"}intruder{"} or {"}attacker{"}... We suppose that the intruder controls the network on which the messages are exchanged.\par The verification of a cryptographic protocol either ensures that no attack is possible against the execution of the protocol in presence of a certain intruder, or otherwise exhibits an attack. One important assumption in the verification of cryptographic protocols is the so-called {"}perfect cryptography assumption{"}, which states that the only way to obtain knowledge about an encrypted message is to know its decryption key. This hypothesis is not sufficient to guarantee security in reality. It is possible that certain properties used in the protocol allow the intruder to obtain some information.\par One way to weaken this perfect cryptography assumption is to take into account in the model certain algebraic properties. We develop a formal approach for verifying the so-called secrecy property of cryptographic protocols in the presence of equational theories and of homomorphism.} }
@phdthesis{THESE-belmokadem06, author = {Bel{ }mokadem, Houda}, title = {V{\'e}rification des propri{\'e}t{\'e}s temporis{\'e}es des automates programmables industriels}, year = 2006, month = sep, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-mokadem.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-mokadem.pdf} }
@phdthesis{THESE-bertrand06, author = {Bertrand, Nathalie}, title = {Mod{\`e}les stochastiques pour les pertes de messages dans les protocoles asynchrones et techniques de v{\'e}rification automatique}, year = 2006, month = oct, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-bertrand.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-bertrand.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-bertrand.ps} }
@mastersthesis{naves-master, author = {Naves, Guyslain}, title = {Accessibilit{\'e} dans les automates temporis{\'e}s {\`a} deux horloges}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2006, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-naves.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-naves.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/master-naves.ps} }
@mastersthesis{akshay-master, author = {Akshay, S.}, title = {Formal Specification and Verification of Timed Communicating Systems}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, month = sep, year = 2006, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Akshay-M2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Akshay-M2.pdf} }
@mastersthesis{brochenin-master, author = {Brochenin, R{\'e}mi}, title = {Techniques d'automates pour raisonner sur la m{\'e}moire}, school = {{M}aster {R}echerche {I}nformatique de {L}yon~--- {I}nformatique {F}ondamentale, Lyon, France}, type = {Rapport de {M}aster}, month = jun, year = 2006, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Brochenin-M2.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Brochenin-M2.ps} }
@mastersthesis{bursuc-master, author = {Bursuc, Sergiu}, title = {Contraintes de d{\'e}ductibilit{\'e} modulo Associativit{\'e}-Commutativit{\'e}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, month = sep, year = 2006, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bursuc-M2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bursuc-M2.pdf} }
@techreport{LSV:06:11, author = {Bollig, Benedikt and Kuske, Dietrich}, title = {Distributed {M}uller Automata and Logics}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2006, month = may, type = {Research Report}, number = {LSV-06-11}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-11.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-11.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2006-11.ps}, note = {23~pages}, abstract = {We consider Muller asynchronous cellular automata running on infinite dags over distributed alphabets. We show that they have the same expressive power as the existential fragment of a monadic second-order logic featuring a first-order quantifier to express that there are infinitely many elements satisfying some property. Our result is based on an extension of the classical Ehrenfeucht-Fra{\"\i}ss{\'e} game to cope with infinite structures and the new first-order quantifier. As a byproduct, we obtain a logical characterization of unbounded Muller message-passing automata running on infinite message sequence charts.} }
@techreport{LSV:06:13, author = {Olivain, Julien and Goubault{-}Larrecq, Jean}, title = {Detecting Subverted Cryptographic Protocols by Entropy Checking}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2006, month = jun, type = {Research Report}, number = {LSV-06-13}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2006-13.pdf}, note = {19~pages}, abstract = {What happens when your implementation of SSL or some other cryptographic protocol is subverted through a buffer overflow attack? You have been hacked, right. Unfortunately, you may be unaware of~it: since normal traffic is encrypted, most IDSs cannot monitor~it. We propose a simple, yet efficient technique to detect such attacks, by computing the entropy of the flow and comparing it against known thresholds. This was implemented in the Net-Entropy sensor.} }
@inproceedings{DLS-fossacs08, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Demri, St{\'e}phane and Lazi{\'c}, Ranko and Sangnier, Arnaud}, title = {Model checking freeze {LTL} over one-counter automata}, pages = {490-504}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLS-fossacs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLS-fossacs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DLS-fossacs08.ps}, doi = {10.1007/978-3-540-78499-9_34}, abstract = {We study complexity issues related to the model-checking problem for LTL with registers (a.k.a. freeze LTL) over one-counter automata. We~consider several classes of one-counter automata (mainly deterministic vs.~nondeterministic) and several syntactic fragments (restriction on the number of registers and on the use of propositional variables for control locations). The~logic has the ability to store a counter value and to test it later against the current counter value. By~introducing a non-trivial abstraction on counter values, we~show that model checking LTL with registers over deterministic one-counter automata is PSPACE-complete with infinite accepting runs. By~constrast, we prove that model checking LTL with registers over nondeterministic one-counter automata is \(\Sigma_{1}^{1}\)-complete [resp. \(\Sigma_{1}^{0}\)-complete] in the infinitary [resp. finitary] case even if only one register is used and with no propositional variable. This makes a difference with the facts that several verification problems for one-counter automata are known to be decidable with relatively low complexity, and that finitary satisfiability for LTL with a unique register is decidable. Our~results pave the way for model-checking LTL with registers over other classes of operational models, such as reversal-bounded counter machines and deterministic pushdown systems.} }
@inproceedings{HIV-fossacs08, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Habermehl, Peter and Iosif, Radu and Vojnar, Tom{\'a}{\v{s}}}, title = {What else is decidable about arrays?}, pages = {474-489}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hiv07-TR.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hiv07-TR.pdf}, doi = {10.1007/978-3-540-78499-9_33}, abstract = {We introduce a new decidable logic for reasoning about infinite arrays of integers. The logic is in the \(\exists^{*}\forall^{*}\) first-order fragment and allows (1)~Presburger constraints on existentially quantified variables, (2)~difference constraints as well as periodicity constraints on universally quantified indices, and (3)~difference constraints on values. In~particular, using our logic, one can express constraints on consecutive elements of arrays (\emph{e.g.}~\(\forall i.\ 0 \leq i < n \rightarrow a[i + 1] = a[i] - 1\)) as well as periodic facts (\emph{e.g.}~\(\forall i.\ i \equiv_2 0 \rightarrow a[i] = 0\)). The decision procedure follows the automata-theoretic approach: we~translate formulae into a special class of B{\"u}chi counter automata such that any model of a formula corresponds to an accepting run of the automaton, and vice versa. The~emptiness problem for this class of counter automata is shown to be decidable, as a consequence of earlier results on counter automata with a flat control structure and transitions based on difference constraints. We~show interesting program properties expressible in our logic, and give an example of invariant verification for programs that handle integer arrays.} }
@inproceedings{BMR-fossacs08, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Bouyer, Patricia and Markey, Nicolas and Reynier, Pierre-Alain}, title = {Robust Analysis of Timed Automata {\em via} Channel Machines}, pages = {157-171}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMR-fossacs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMR-fossacs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BMR-fossacs08.ps}, doi = {10.1007/978-3-540-78499-9_12}, abstract = {Whereas formal verification of timed systems has become a very active field of research, the idealised mathematical semantics of timed automata cannot be faithfully implemented. Several works have thus focused on a modified semantics of timed automata which ensures implementability, and robust model-checking algorithms for safety, and later LTL properties have been designed. Recently, a~new approach has been proposed, which reduces (standard) model-checking of timed automata to other verification problems on channel machines. Thanks to a new encoding of the modified semantics as a network of timed systems, we propose an original combination of both approaches, and prove that robust model-checking for coFlat-MTL, a large fragment of~MTL, is EXPSPACE-Complete.} }
@inproceedings{CS-fossacs08, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {The \(\omega\)-Regular {P}ost Embedding Problem}, pages = {97-111}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-fossacs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-fossacs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CS-fossacs08.ps}, doi = {10.1007/978-3-540-78499-9_8}, abstract = {Post's Embedding Problem is a new variant of Post's Correspondence Problem where words are compared with embedding rather than equality. It~has been shown recently that adding regular constraints on the form of admissible solutions makes the problem highly non-trivial, and relevant to the study of lossy channel systems. Here we consider the infinitary version and its application to recurrent reachability in lossy channel systems.} }
@inproceedings{Gou-fossacs08b, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Goubault{-}Larrecq, Jean}, title = {Simulation Hemi-Metrics Between Infinite-State Stochastic Games}, pages = {50-65}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-34.pdf}, doi = {10.1007/978-3-540-78499-9_5}, abstract = {We investigate simulation hemi-metrics between certain forms of turn-based \(2\frac{1}{2}\)-player games played on infinite topological spaces. They have the desirable property of bounding the difference in payoffs obtained by starting from one state or another. All constructions are described as the special case of a unique one, which we call the Hutchinson hemi-metric on various spaces of continuous previsions. We show a directed form of the Kantorovich-Rubinstein theorem, stating that the Hutchinson hemi-metric on spaces of continuous probability valuations coincides with a notion of trans-shipment hemi-metric. We also identify the class of so-called sym-compact spaces as the right class of topological spaces, where the theory works out as nicely as possible.} }
@inproceedings{Gou-fossacs08a, address = {Budapest, Hungary}, month = mar # {-} # apr, year = 2008, volume = 4962, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Amadio, Roberto}, acronym = {{FoSSaCS}'08}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'08)}, author = {Goubault{-}Larrecq, Jean}, title = {Prevision Domains and Convex Powercones}, pages = {318-333}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-33.pdf}, doi = {10.1007/978-3-540-78499-9_23}, abstract = {Two recent semantic families of models for mixed probabilistic and non-deterministic choice over a space~\(X\) are the convex powercone models, due independently to Mislove, and to Tix, Keimel, and Plotkin, and the continuous prevision model of the author. We show that, up to some minor details, these models are isomorphic whenever \(X\) is a continuous, coherent cpo, and whether the particular brand of non-determinism we focus on is demonic, angelic, or chaotic. The construction also exhibits domains of continuous previsions as retracts of well-known continuous cpos, providing simple bases for the various continuous cpos of continuous previsions. This has practical relevance to computing approximations of operations on previsions.} }
@inproceedings{Kremer-tgc07, address = {Sophia-Antipolis, France}, year = 2008, volume = 4912, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Barthe, Gilles and Fournet, C{\'e}dric}, acronym = {{TGC}'07}, booktitle = {{R}evised {S}elected {P}apers from the 3rd {S}ymposium on {T}rustworthy {G}lobal {C}omputing ({TGC}'07)}, author = {Kremer, Steve}, title = {Computational soundness of equational theories (Tutorial)}, pages = {363-382}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-tgc07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-tgc07.pdf}, doi = {10.1007/978-3-540-78663-4}, abstract = {We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal result by Abadi and Rogaway and shortly discuss some of its extensions. Then we describe a general model for reasoning about the soundness of implementations of equational theories. We illustrate this model on several examples of computationally sound implementations of equational theories.} }
@article{JRV-jlap07, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Programming}, author = {Jacquemard, Florent and Rusinowitch, Micha{\"e}l and Vigneron, Laurent}, title = {Tree automata with equality constraints modulo equational theories}, year = 2008, month = apr, volume = 75, number = 2, pages = {182-208}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JRV-jlap08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JRV-jlap08.pdf}, doi = {10.1016/j.jlap.2007.10.006}, abstract = {This paper presents new classes of tree automata combining automata with equality test and automata modulo equational theories. We believe that these classes have a good potential for application in \emph{e.g.} software verification. These tree automata are obtained by extending the standard Horn clause representations with equational conditions and rewrite systems. We~show in particular that a generalized membership problem (extending the emptiness problem) is decidable by proving that the saturation of tree automata presentations with suitable paramodulation strategies terminates. Alternatively our results can be viewed as new decidable classes of first-order formula.} }
@inproceedings{BJ-arspa07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, editor = {Degano, Pierpaolo and K{\"u}sters, Ralf and Vigan{\`o}, Luca and Zdancewic, Steve}, acronym = {{FCS-ARSPA}'07}, booktitle = {{P}roceedings of the {J}oint {W}orkshop on {F}oundations of {C}omputer {S}ecurity and {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis ({FCS-ARSPA}'07)}, author = {Adel Bouhoula and Florent Jacquemard}, title = {Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction}, pages = {27-44}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-arspa07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-arspa07.pdf}, abstract = {We present a procedure for the verification of cryptographic protocols based on a new method for automatic implicit induction theorem proving for specifications made of conditional and constrained rewrite rules. The~method handles axioms between constructor terms which are used to introduce explicit destructor symbols for the specification of cryptographic operators. Moreover, it can deal with non-confluent rewrite systems. This is required in the context of the verification of security protocols because of the non-deterministic behavior of attackers. Our~induction method makes an intensive use of constrained tree grammars, which are used in proofs both as induction schemes and as oracles for checking validity and redundancy criteria by reduction to an emptiness problem. The grammars make possible the development of a generic framework for the specification and verification of protocols, where the specifications can be parametrized with (possibly infinite) regular sets of user names or attacker's initial knowledge and complex security properties can be expressed, referring to some fixed regular sets of bad traces representing potential vulnerabilities. We present some case studies giving very promising results, for the detection of attacks (our~procedure is complete for refutation), and also for the validation of protocols.} }
@mastersthesis{chambart-master, author = {Chambart, Pierre}, title = {Canaux fiables et non-fiables~: fronti{\`e}res de la d{\'e}cidabilit{\'e}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2007, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/chambart-m2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/chambart-m2.pdf} }
@phdthesis{gascon-these2007, author = {Gascon, R{\'e}gis}, title = {Sp{\'e}cification et v{\'e}rification de propri{\'e}t{\'e}s quantitatives sur des automates {\`a} contraintes}, year = 2007, month = nov, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-RG07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-RG07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-RG07.ps}, futureslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/ these-FC07-slides.pdf} }
@inproceedings{BMOSW-stacs08, address = {Bordeaux, France}, month = feb, year = 2008, volume = 1, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Albers, Susanne and Weil, Pascal}, acronym = {{STACS}'08}, booktitle = {{P}roceedings of the 25th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'08)}, author = {Bouyer, Patricia and Markey, Nicolas and Ouaknine, Jo{\"e}l and Schnoebelen, {\relax Ph}ilippe and Worrell, James}, title = {On Termination for Faulty Channel Machines}, pages = {121-132}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bmosw-stacs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bmosw-stacs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/bmosw-stacs08.ps}, abstract = {A channel machine consists of a finite controller together with several fifo channels; the controller can read messages from the head of a channel and write messages to the tail of a channel. In this paper, we focus on channel machines with \emph{insertion errors}, \textit{i.e.}, machines in whose channels messages can spontaneously appear. Such devices have been previously introduced in the study of Metric Temporal Logic. We~consider the termination problem: are all the computations of a given insertion channel machine finite? We~show that this problem has non-elementary, yet primitive recursive complexity.} }
@inproceedings{FLS-ilc07, address = {Cape Town, South Africa}, month = oct, year = 2009, volume = 5489, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Archibald, Margaret and Brattka, Vasco and Goranko, Valentin and L{\"o}we, Benedikt}, acronym = {{ILC}'07}, booktitle = {{R}evised {S}elected {P}apers of the {I}nternational {C}onference on {I}nfinity in {L}ogic {\&} {C}omputation ({ILC}'07)}, author = {Finkel, Alain and Lozes, {\'E}tienne and Sangnier, Arnaud}, title = {Towards Model Checking Pointer Systems}, pages = {56-82}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FLS-ilc07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FLS-ilc07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FLS-ilc07.ps}, doi = {10.1007/978-3-642-03092-5_6}, abstract = {We aim at checking safety and temporal properties over models representing the behavior of programs manipulating dynamic singly-linked lists. The properties we consider not only allow to perform a classical shape analysis, but we also want to check quantitative aspect on the manipulated memory heap. We first explain how a translation of programs into counter systems can be used to check safety problems and temporal properties. We then study the decidability of these two problems considering some restricted classes of programs, namely flat programs without destructive update. We obtain the following results: (1)~the model-checking problem is decidable if the considered program works over acyclic lists; (2)~the safety problem is decidable for programs without alias test. We finally explain the limit of our decidability results, showing that relaxing one of the hypothesis leads to undecidability results.} }
@inproceedings{Bur-nordsec07, address = {Reykjavik, Iceland}, month = oct, year = 2007, editor = {Erlingsson, {\'U}lfar and Sabelfeld, Andrei}, acronym = {{NordSec}'07}, booktitle = {{P}roceedings of the 12th {N}ordic {W}orkshop on {S}ecure {IT} {S}ystems ({NordSec}'07)}, author = {Bursztein, Elie}, title = {Time has something to tell us about network address translation}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bur-nordsec07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bur-nordsec07.pdf}, abstract = { In this paper we introduce a new technique to count the number of host behind a~NAT. This technique based on TCP timestamp option, work with Linux and BSD system and therefore is complementary to the previous one base on IPID than does not work for those systems. Our~implementation demonstrates the practicability of this method.} }
@article{CEFX-fmsd08, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Chevallier, R{\'e}my and Encrenaz{-}Tiph{\`e}ne, Emmanuelle and Fribourg, Laurent and Xu, Weiwen}, title = {Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata}, volume = 34, number = 1, pages = {59-81}, year = 2009, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CEFX-fmsd08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CEFX-fmsd08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CEFX-fmsd08.ps}, doi = {10.1007/s10703-008-0061-x}, abstract = {Using a variant of Clariso-Cortadella's parametric method for verifying asynchronous circuits, we analyse some crucial timing behaviors of the architecture of SPSMALL memory, a~commercial product of STMicroelectronics. Using the model of parametric timed automata and model checker HYTECH, we~formally derive a set of linear constraints that ensure the correctness of the response times of the memory. We are also able to infer the constraints characterizing the optimal setup timings of input signals. We have checked, for two different implementations of this architecture, that the values given by our model match remarkably with the values obtained by the designer through electrical simulation. } }
@article{TED-todaes08, publisher = {ACM Press}, journal = {ACM Transactions on Design Automation of Electronic Systems}, author = {Taktak, Sami and Encrenaz, Emmanuelle and Desbarbieux, Jean-Lou}, title = {A tool for automatic detection of deadlocks in wormhole networks on chip}, nopages = {}, volume = 13, number = 1, year = 2008, month = jan, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/TED-todaes07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/TED-todaes07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/TED-todaes07.ps}, doi = {10.1145/1297666.1297672}, abstract = {We present an extension of Duato's necessary and sufficient condition a routing function must satisfy in order to be deadlock-free, to support environment constraints inducing \emph{extra-dependencies} between messages. We~also present an original algorithm to automatically check the deadlock-freeness of a network with a given routing function. A~prototype tool has been developed and automatic deadlock checking of large scale networks with various routing functions have been successfully achieved. We~provide comparative results with standard approach, highlighting the benefits of our method.} }
@inproceedings{BE-acsd07, address = {Bratislava, Slovak Republik}, month = jul, year = 2007, publisher = {{IEEE} Computer Society Press}, editor = {Basten, Twan and Shukla, Sandeep}, acronym = {{ACSD}'07}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'07)}, author = {Braunstein, C{\'e}cile and Encrenaz, Emmanuelle}, title = {Using {CTL} formulae as component abstraction in a design and verification flow}, pages = {80-89}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BE-acsd07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BE-acsd07.pdf}, doi = {10.1109/ACSD.2007.76}, abstract = {The verification of global properties (involving several components) is difficult to achieve, due to combinatorial explosion problem, while the verification of each component is easier to perform. Following the idea of~[F.~Xie and J.~Browne. \textit{Verified Systems by Composition from Verified Components}. In~ESEC/FSE'03, pages~277-286, Helsinki, Finland, 2003. ACM~Press], we~propose to build an abstraction of a component already verified, starting from a subset of its specification described as CTL formulae. This abstraction replaces the concrete component in the context of global properties verification. } }
@inproceedings{EF-infinity07, optaddress = {Lisbon, Portugal}, month = jul, year = 2009, volume = 239, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, realeditor = {Madhusudan, P. and Kahlon, Vineet}, editor = {Habermehl, Peter and Vojnar, Tom{\'a}{\v{s}}}, acronym = {{INFINITY}'06,'07,'08}, booktitle = {{J}oint {P}roceedings of the 8th, 9th and 10th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'06,'07,'08)}, author = {Encrenaz, Emmanuelle and Finkel, Alain}, title = {Automatic verification of counter systems with ranking functions}, pages = {85-103}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EF-infinity07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EF-infinity07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/EF-infinity07.ps}, doi = {10.1016/j.entcs.2009.05.032}, abstract = {The verification of final termination for counter systems is undecidable. For non flattable counter systems, the verification of this type of property is generally based on the exhibition of a ranking function. Proving the existence of a ranking function for general counter systems is also undecidable. We~provide a framework in which the verification whether a given function is a ranking function is decidable. This framework is applicable to convex counter systems which admit a Presburger or a LPDS ranking function. This extends the results of [A.~Bradley, Z.~Manna, and B.~Sipma. \textit{Termination analysis of integer linear loops}. In~CONCUR'05, LNCS~3653, p.~488-502. Springer]. From this framework, we derive a model-checking algorithm to verify whether a final termination property is satisfied or not. This approach has been successfully applied to the verification of a parametric version of the ZCSP protocol.} }
@inproceedings{Bouyer-M4M5, address = {Cachan, France}, month = mar, year = 2009, volume = 231, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Areces, Carlos and Demri, St{\'e}phane}, acronym = {{M4M-5}}, booktitle = {{P}roceedings of the 4th {W}orkshop on {M}ethods for {M}odalities ({M4M-5})}, author = {Bouyer, Patricia}, title = {Model-Checking Timed Temporal Logics}, pages = {323-341}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-M4M5.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-M4M5.pdf}, doi = {10.1016/j.entcs.2009.02.044}, abstract = {In this paper, we present several timed extensions of temporal logics, that can be used for model-checking real-time systems. We give different formalisms and the corresponding decidability/complexity results. We also give intuition to explain these results.} }
@proceedings{M4M5-AD, editor = {Areces, Carlos and Demri, St{\'e}phane}, title = {{P}roceedings of the 5th {I}nternational {W}orkshop on {M}ethods for {M}odalities ({M4M-5})}, booktitle = {{P}roceedings of the 5th {I}nternational {W}orkshop on {M}ethods for {M}odalities ({M4M-5})}, publisher = {Elsevier Science Publishers}, series = {Electronic Notes in Theoretical Computer Science}, volume = 231, year = 2009, month = mar, address = {Cachan, France}, url = {http://www.sciencedirect.com/science/journal/15710661/231}, doi = {10.1016/j.entcs.2009.02.025} }
@techreport{Prouve:rap10, author = {Delaune, St{\'e}phanie and Klay, Francis}, title = {Synth{\`e}se des exp{\'e}rimentations}, institution = {projet RNTL PROUV{\'E}}, month = may, year = 2007, type = {Technical Report}, number = 10, note = {10~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/prouve-rap10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/prouve-rap10.pdf}, abstract = {Dans ce document nous pr{\'e}sentons une synth{\`e}se des deux cas d'{\'e}tude trait{\'e}s durant le projet. Rappelons qu'il s'agit d'une part d'un protocole de commerce {\'e}lectronique et d'autre part d'un protocole de vote. Pour chacun de ces protocoles, nous analysons les r{\'e}sultats obtenus afin de d{\'e}gager l'apport des travaux issus du projet et les aspects qui n'ont pas pu etre compl{\`e}tement trait{\'e}s. Compte tenu des enseignements tir{\'e}s, dans la derni{\`e}re partie nous mettons en perspectives les axes de recherches envisageables pour traiter compl{\`e}tement des protocoles aussi complexes que celui du vote {\'e}lectronique.} }
@techreport{Prouve:rap9, author = {Klay, Francis and Bozga, Liana and Lakhnech, Yassine and Mazar{\'e}, Laurent and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Retour d'exp{\'e}rience sur la validation du vote {\'e}lectronique}, institution = {projet RNTL PROUV{\'E}}, month = nov, year = 2006, type = {Technical Report}, number = 9, note = {47~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/prouve-rap9.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/prouve-rap9.pdf}, abstract = {Dans ce rapport, nous pr{\'e}sentons le travail de v{\'e}rification qui a {\'e}t{\'e} r{\'e}alis{\'e} sur le protocole de vote {\'e}lectronique que nous avons introduit et formalis{\'e} dans le rapport RNTL Prouv{\'e} num{\'e}ro~\(6\). Ce protocole a {\'e}t{\'e} mis au point par J.~Traor{\'e}, ing{\'e}nieur de recherche chez France T{\'e}l{\'e}com. Il est bas{\'e} sur le m{\'e}canisme de signature en aveugle et peut {\^e}tre consid{\'e}r{\'e} comme un d{\'e}riv{\'e} du protocole de Fujioka, Okamoto et~Ohta.\par La formalisation de ce protocole {\`a} mis en {\'e}vidence une grande complexit{\'e} due en particulier aux structures de donn{\'e}es et aux primitives cryptographiques manipul{\'e}es. D'un autre c{\^o}t{\'e} ce travail a {\'e}galement r{\'e}v{\'e}l{\'e} que les propri{\'e}t{\'e}s de s{\^u}ret{\'e} {\`a} garantir sont particuli{\`e}rement subtiles. Ce~document pr{\'e}sente les r{\'e}sultats qui ont {\'e}t{\'e} obtenus lors de la v{\'e}rification de ce protocole. En particulier nous montrons que certaines propri{\'e}t{\'e}s de s{\^u}ret{\'e} ont pu {\^e}tre prouv{\'e}es automatiquement alors que pour d'autres une preuve manuelle s'est av{\'e}r{\'e}e n{\'e}cessaire.} }
@techreport{LSV:07:31, author = {Jacquemard, Florent and Rusinowitch, Micha{\"e}l}, title = {Rewrite Closure of {H}edge-Automata Languages}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = oct, type = {Research Report}, number = {LSV-07-31}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-31.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-31.pdf}, note = {22~pages}, abstract = {We investigate some preservation properties for classes of regular languages of unranked ordered terms under an appropriate generalization of term rewriting subsuming both standard term rewriting and word rewriting.\par The considered classes include languages of hedge automata (HA) and some extension (called CF-HA) with context-free languages in transitions, instead of regular languages. In~particular, we~show, with a HA completion procedure, that the set of unranked terms reachable from a given HA language, using a so called inverse context-free rewrite system, is an HA language. Moreover, we~prove, using different techniques, the closure of CF-HA languages with respect to context-free rewrite systems, the symmetric case of the above rewrite systems. As~a consequence, the~problems of ground reachability and regular hedge model checking are decidable in both cases. We~give several several counter examples showing that we cannot relax the restrictions.} }
@mastersthesis{dacosta-master, author = {Da{~}Costa, Arnaud}, title = {Propri{\'e}t{\'e}s de jeux multi-agents}, school = {{M}aster de {L}ogique {M}ath{\'e}matique et {F}ondements de l'{I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2007, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dacosta-m2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dacosta-m2.pdf} }
@article{BHR-ietc07, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bouyer, Patricia and Haddad, Serge and Reynier, Pierre-Alain}, title = {Timed {P}etri Nets and Timed Automata: On the Discriminating Power of {Z}eno Sequences}, year = {2008}, month = jan, volume = 206, number = 1, pages = {73-107}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-ic07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-ic07.pdf}, doi = {10.1016/j.ic.2007.10.004}, abstract = {Timed Petri nets and timed automata are two standard models for the analysis of real-time systems. We~study in this paper their relationship, and prove in particular that they are incomparable w.r.t. language equivalence. In~fact, we~study the more general model of timed Petri nets with read-arcs (RA-TdPN), already introduced in~[Ji{\v{r}}{\'\i}~Srba, \textit{Timed-arc petri nets vs. networks of timed automata}, Proc.\ ICATPN'05, LNCS~3536, Springer], which unifies both models of timed Petri nets and of timed automata, and prove that the coverability problem remains decidable for this model. Then, we establish numerous expressiveness results and prove that Zeno behaviours discriminate between several sub-classes of RA-TdPNs. This has surprising consequences on timed automata, for~instance on the power of non-deterministic clock resets.} }
@mastersthesis{villard-master, author = {Villard, Jules}, title = {Logique spatiale pour le pi-calcul appliqu{\'e}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2007, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/villard-m2.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/villard-m2.pdf} }
@mastersthesis{vacher-master, author = {Vacher, Camille}, title = {Accessibilit{\'e} inverse dans les automates d'arbres {\`a} m{\'e}moire d'ordre sup{\'e}rieur}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = 2007, month = sep, oldurl = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vacher-m2.pdf}, oldpdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vacher-m2.pdf}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-35.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-35.pdf} }
@inproceedings{CL-avocs07, address = {Oxford, UK}, month = sep, year = {2007}, editor = {Goldsmith, Michael and Roscoe, Bill}, acronym = {{AVoCS}'07}, booktitle = {{P}re-proceedings of the 7th {I}nternational {W}orkshop on {A}utomated {V}erification of {C}ritical {S}ystems ({AVoCS}'07)}, author = {Cremers, Cas and Lafourcade, Pascal}, title = {Comparing State Spaces in Automatic Security Protocol Verification}, nmnote = {Pas paru dans les proceedings ENTCS}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CL-avocs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CL-avocs07.pdf}, abstract = {Many tools exist for automatic security protocol verification, and most of them have their own particular language for specifying protocols and properties. Several protocol specification models and security properties have been already formally related to each other. However, there is a further difference between verification tools, which has not been investigated in depth before: the~explored state space. Some tools explore all possible behaviors, whereas others explore strict subsets, often by using so-called scenarios. Ignoring such differences can lead to wrong interpretations of the output of a tool. We~relate the explored state spaces to each other and find previously unreported differences between the various approaches. We~apply our study of state space relations in a performance comparison of several well-known automatic tools for security protocol verification. We~model a set of protocols and their properties as homogeneous as possible for each tool. We~analyze the performance of the tools over comparable state spaces. This work allows us for the first time to compare these automatic tools fairly, i.e.,~using the same protocol description and exploring the same state space. We~also propose some explanations for our experimental results, leading to a better understanding of the tools.} }
@inproceedings{BG-asian07, address = {Doha, Qatar}, month = dec, year = 2007, volume = 4846, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cervesato, Iliano}, acronym = {{ASIAN}'07}, booktitle = {{P}roceedings of the 12th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'07)}, author = {Bursztein, Elie and Goubault{-}Larrecq, Jean}, title = {A Logical Framework for Evaluating Network Resilience Against Faults and Attacks}, pages = {212-227}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGL-asian07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGL-asian07.pdf}, doi = {10.1007/978-3-540-76929-3_20}, abstract = {We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faults. Our model uses a two-layered presentation of dependencies between files and services, and of timed games to represent not just incidents, but also the dynamic responses from administrators and their respective delays. We demonstrate that a variant TATL\(\Diamond\) of timed alternating-time temporal logic is a convenient language to express several desirable properties of networks, including several forms of survivability. We illustrate this on a simple redundant Web service architecture, and show that checking such timed games against the so-called TATL\(\Diamond\) variant of the timed alternating time temporal logic TATL is EXPTIME-complete.} }
@inproceedings{HIRV-atva2007, address = {Tokyo, Japan}, month = oct, year = {2007}, volume = 4762, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Namjoshi, Kedar and Yoneda, Tomohiro}, acronym = {{ATVA}'07}, booktitle = {{P}roceedings of the 5th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'07)}, author = {Habermehl, Peter and Iosif, Radu and Rogalewicz, Adam and Vojnar, Tom{\'a}{\v{s}}}, title = {Proving Termination of Tree Manipulating Programs}, pages = {145-161}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HIRV-atva07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HIRV-atva07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/HIRV-atva07.ps}, doi = {10.1007/978-3-540-75596-8_12}, abstract = {We consider the termination problem of programs manipulating tree-like dynamic data structures. Our~approach is based on a counter-example guided abstraction refinement loop. We use abstract regular tree model-checking to infer invariants of the program. Then, we~translate the program to a counter automaton~(CA) which simulates~it. If~the CA can be shown to terminate using existing techniques, the~program terminates. If~not, we analyse the possible counterexample given by a~CA termination checker and either conclude that the program does not terminate, or else refine the abstraction and repeat. We~show that the spuriousness problem for lasso-shaped counterexamples is decidable in some non-trivial cases. We~applied the method successfully on several interesting case studies. } }
@inproceedings{BHJS-fct07, address = {Budapest, Hungary}, month = aug, year = 2007, volume = 4639, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Csuhaj-Varj{\'u}, Erzs{\'e}bet and {\'E}sik, Zolt{\'a}n}, acronym = {{FCT}'07}, booktitle = {{P}roceedings of the 16th {I}nternational {S}ymposium on {F}undamentals of {C}omputation {T}heory ({FCT}'07)}, author = {Bouajjani, Ahmed and Habermehl, Peter and Jurski, Yan and Sighireanu, Mihaela}, title = {Rewriting Systems with Data~-- {A} Framework for Reasoning About Systems with Unbounded Structures over Infinite Data Domains}, pages = {1-22}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHJS-fct07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHJS-fct07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHJS-fct07.ps}, doi = {10.1007/978-3-540-74240-1_1}, abstract = {We introduce a uniform framework for reasoning about infinite-state systems with unbounded control structures and unbounded data domains. Our~framework is based on constrained rewriting systems on words over an infinite alphabet. We~consider several rewriting semantics: factor, prefix, and multiset rewriting. Constraints are expressed in a logic on such words which is parametrized by a first-order theory on the considered data domain. We show that our framework is suitable for reasoning about various classes of systems such as recursive sequential programs, multithreaded programs, parametrized and dynamic networks of processes,~etc. Then, we provide generic results (1)~for the decidability of the satisfiability problem of the fragment of this logic provided that the underlying logic on data is decidable, and (2)~for proving inductive invariance and for carrying out Hoare style reasoning within this fragment. We also show that the reachability problem if decidable for a class of prefix rewriting systems with integer data.} }
@inproceedings{GPT-aplas07, address = {Singapore}, month = nov # {-} # dec, year = 2007, volume = 4807, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Shao, Zhong}, acronym = {{APLAS}'07}, booktitle = {{P}roceedings of the 5th {A}sian {S}ymposium on {P}rogramming {L}anguages and {S}ystems ({APLAS}'07)}, author = {Goubault{-}Larrecq, Jean and Palamidessi, Catuscia and Troina, Angelo}, title = {A Probabilistic Applied Pi-Calculus}, pages = {175-290}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GPT-aplas07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GPT-aplas07.pdf}, doi = {10.1007/978-3-540-76637-7_12}, abstract = {We propose an extension of the Applied Pi-calculus by introducing nondeterministic and probabilistic choice operators. The semantics of the resulting model, in which probability and nondeterminism are combined, is given by Segala's Probabilistic Automata driven by schedulers which resolve the nondeterministic choice among the probability distributions over target states. Notions of static and observational equivalence are given for the enriched calculus. In order to model the possible interaction of a process with its surrounding environment a labeled semantics is given together with a notion of weak bisimulation which is shown to coincide with the observational equivalence. Finally, we prove that results in the probabilistic framework are preserved in a purely nondeterministic setting.} }
@inproceedings{ABG-fsttcs07, address = {New~Delhi, India}, month = dec, year = 2007, volume = 4855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, V. and Prasad, Sanjiva}, acronym = {{FSTTCS}'07}, booktitle = {{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)}, author = {Akshay, S. and Bollig, Benedikt and Gastin, Paul}, title = {Automata and Logics for Timed Message Sequence Charts}, pages = {290-302}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABG-fsttcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABG-fsttcs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ABG-fsttcs07.ps}, doi = {10.1007/978-3-540-77050-3_24}, abstract = {We provide a framework for distributed systems that impose timing constraints on their executions. We~propose a timed model of communicating finite-state machines, which communicate by exchanging messages through channels and use event clocks to generate collections of timed message sequence charts~(T-MSCs). As~a specification language, we~propose a monadic second-order logic equipped with timing predicates and interpreted over~T-MSCs. We establish expressive equivalence of our automata and logic. Moreover, we prove that, for (existentially) bounded channels, emptiness and satisfiability are decidable for our automata and logic.} }
@inproceedings{CS-fsttcs07, address = {New~Delhi, India}, month = dec, year = 2007, volume = 4855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, V. and Prasad, Sanjiva}, acronym = {{FSTTCS}'07}, booktitle = {{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {{P}ost Embedding Problem is not Primitive Recursive, with Applications to Channel Systems}, pages = {265-276}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-fsttcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-fsttcs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CS-fsttcs07.ps}, doi = {10.1007/978-3-540-77050-3_22}, abstract = {We introduce \textsf{PEP}, the Post Embedding Problem, a variant of \textsf{PCP} where one compares strings with the subword relation, and \textsf{PEP}\textsuperscript{reg}, a further variant where solutions are constrained and must belong to a given regular language. \textsf{PEP}\textsuperscript{reg} is decidable but not primitive recursive. This entails the decidability of reachability for unidirectional systems with one reliable and one lossy channel. } }
@inproceedings{CDD-fsttcs07, address = {New~Delhi, India}, month = dec, year = 2007, volume = 4855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, V. and Prasad, Sanjiva}, acronym = {{FSTTCS}'07}, booktitle = {{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)}, author = {Cortier, V{\'e}ronique and Delaitre, J{\'e}r{\'e}mie and Delaune, St{\'e}phanie}, title = {Safely Composing Security Protocols}, pages = {352-363}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDD-fsttcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDD-fsttcs07.pdf}, addendumpdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ CDD-fsttcs07-addendum.pdf}, doi = {10.1007/978-3-540-77050-3_29}, abstract = {Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of active attackers that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or long-term symmetric keys, are executed.\par In this paper, we show that security of protocols can be easily composed. More precisely, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols are executed, provided each encryption contains some tag identifying each protocol, like e.g.~the name of the protocol.} }
@inproceedings{BBBBG-fsttcs07, address = {New~Delhi, India}, month = dec, year = 2007, volume = 4855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, V. and Prasad, Sanjiva}, acronym = {{FSTTCS}'07}, booktitle = {{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)}, author = {Baier, Christel and Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Gr{\"o}{\ss}er, Marcus}, title = {Probabilistic and Topological Semantics for Timed Automata}, pages = {179-191}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBBG-fsttcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBBG-fsttcs07.pdf}, doi = {10.1007/978-3-540-77050-3_15}, abstract = {Like most models used in model-checking, timed automata are an idealized mathematical model used for representing systems with strong timing requirements. In~such mathematical models, properties can be violated, due to unlikely (sequences~of) events. We~propose two new semantics for the satisfaction of LTL formulas, one based on probabilities, and the other one based on topology, to rule out these sequences. We~prove that the two semantics are equivalent and lead to a PSPACE-Complete model-checking problem for LTL over finite executions.} }
@inproceedings{BKM-fsttcs07, address = {New~Delhi, India}, month = dec, year = 2007, volume = 4855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, V. and Prasad, Sanjiva}, acronym = {{FSTTCS}'07}, booktitle = {{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)}, author = {Bollig, Benedikt and Kuske, Dietrich and Meinecke, Ingmar}, title = {Propositional Dynamic Logic for Message-Passing Systems}, pages = {303-315}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKM-fsttcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKM-fsttcs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BKM-fsttcs07.ps}, doi = {10.1007/978-3-540-77050-3_25}, abstract = {We examine a bidirectional Propositional Dynamic Logic~(PDL) for message sequence charts~(MSCs) extending LTL and~TLC\textsuperscript{-}. Every formula is translated into an equivalent communicating finite-state machine~(CFM) of exponential size. This synthesis problem is solved in full generality, i.e.,~also for MSCs with unbounded channels. The model checking problems for CFMs and for HMSCs against PDL formulas are shown to be in PSPACE for existentially bounded~MSCs. It~is shown that CFMs are to weak to capture the semantics of PDL with intersection.} }
@inproceedings{DKR-fsttcs07, address = {New~Delhi, India}, month = dec, year = 2007, volume = 4855, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arvind, V. and Prasad, Sanjiva}, acronym = {{FSTTCS}'07}, booktitle = {{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Symbolic Bisimulation for the Applied Pi-Calculus}, pages = {133-145}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-fsttcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-fsttcs07.pdf}, doi = {10.1007/978-3-540-77050-3_11}, abstract = {We propose a symbolic semantics for the finite applied pi calculus, which is a variant of the pi calculus with extensions for modelling cryptgraphic protocols. By~treating inputs symbolically, our semantics avoids potentially infinite branching of execution trees due to inputs from the environment. Correctness is maintained by associating with each process a set of constraints on symbolic terms. Based on the semantics, we~define a sound symbolic labelled bisimulation relation. This~is an important step towards automation of observational equivalence for the finite applied pi calculus, \emph{e.g.}, for verification of anonymity or strong secrecy properties of protocols with a bounded number of sessions.} }
@inproceedings{DR-lpar07, address = {Yerevan, Armenia}, month = oct, year = 2007, volume = 4790, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Dershowitz, Nachum and Voronkov, Andrei}, acronym = {{LPAR}'07}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'07)}, author = {Demri, St{\'e}phane and Rabinovich, Alexander}, title = {The complexity of temporal logic with until and since over ordinals}, pages = {531-545}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DR-lpar07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DR-lpar07.pdf}, doi = {10.1007/978-3-540-75560-9_38}, abstract = {We consider the temporal logic with since and until modalities. This temporal logic is expressively equivalent over the class of ordinals to first-order logic thanks to Kamp's theorem. We~show that it has a PSPACE-complete satisfiability problem over the class of ordinals. Among the consequences of our proof, we show that given the code of some countable ordinal~\(\alpha\) and a formula, we can decide in PSPACE whether the formula has a model over~\(\alpha\). In~order to show these results, we~introduce a class of simple ordinal automata, as expressive as B{\"u}chi ordinal automata. The PSPACE upper bound for the satisfiability problem of the temporal logic is obtained through a reduction to the nonemptiness problem for the simple ordinal automata.} }
@inproceedings{DLL-lpar07, address = {Yerevan, Armenia}, month = oct, year = 2007, volume = 4790, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Dershowitz, Nachum and Voronkov, Andrei}, acronym = {{LPAR}'07}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'07)}, author = {Delaune, St{\'e}phanie and Lin, Hai and Lynch, {\relax Ch}ristopher}, title = {Protocol verification via rigid{\slash}flexible resolution}, pages = {242-256}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLL-lpar07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLL-lpar07.pdf}, doi = {10.1007/978-3-540-75560-9_19}, abstract = {In this paper we propose a decision procedure, i.e., an~inference system for clauses containing rigid and flexible variables. Rigid variables are only allowed to have one instantiation, whereas flexible variables are allowed as many instantiations as desired. We~assume a set of clauses containing only rigid variables together with a set of clauses containing only flexible variables. When the flexible clauses fall into a particular class, we propose an inference system based on ordered resolution that is sound and complete and for which the inference procedure will halt.\par An interest in this form of problem is for cryptographic protocol verification for a bounded number of protocol instances. Our class allows us to obtain a generic decidability result for a large class of cryptographic protocols that may use for instance~CBC (Cipher Block Chaining) encryption and blind signature. } }
@inproceedings{CD-lpar07, address = {Yerevan, Armenia}, month = oct, year = 2007, volume = 4790, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Dershowitz, Nachum and Voronkov, Andrei}, acronym = {{LPAR}'07}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'07)}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Deciding Knowledge in Security Protocols for Monoidal Equational Theories}, pages = {196-210}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-lpar07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-lpar07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CD-lpar07.ps}, doi = {10.1007/978-3-540-75560-9_16}, abstract = {In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic functions (encryption, exclusive or,~...). The~analysis of cryptographic protocols requires a precise understanding of the attacker knowledge. Two standard notions are usually used: deducibility and indistinguishability. Only few results have been obtained (in~an ad-hoc~way) for equational theories with associative and commutative properties, especially in the case of static equivalence. The~main contribution of this paper is to propose a general setting for solving deducibility and indistinguishability for an important class (called monoidal) of these theories. Our~setting relies on the correspondence between a monoidal theory~{\(E\)} and a semiring~{\(S_E\)} which allows us to give an algebraic characterization of the deducibility and indistinguishability problems. As~a consequence we recover easily existing decidability results and obtain several new ones.} }
@article{DLLT-IC07, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Delaune, St{\'e}phanie and Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf}, title = {Symbolic protocol analysis for monoidal equational theories}, pages = {312-351}, volume = 206, number = {2-4}, year = 2008, month = feb # {-} # apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLLT-ic07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLLT-ic07.pdf}, doi = {10.1016/j.ic.2007.07.005}, abstract = {We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved in the protocol. This~leads to a more realistic model than what we get under the perfect cryptography assumption, but it implies that protocol analysis deals with terms modulo some equational theory instead of terms in a free algebra. The main goal of this paper is to set up a general approach that works for a whole class of monoidal theories which contains many of the specific cases that have been considered so far in an ad-hoc way (e.g.~exclusive~or, Abelian groups, exclusive or in combination with the homomorphism axiom). We~follow a classical schema for cryptographic protocol analysis which proves first a locality result and then reduces the insecurity problem to a symbolic constraint solving problem. This approach strongly relies on the correspondence between a monoidal theory~{\(E\)} and a semiring~{\(S_E\)} which we use to deal with the symbolic constraints. We~show that the well-defined symbolic constraints that are generated by reasonable protocols can be solved provided that unification in the monoidal theory satisfies some additional properties. The~resolution process boils down to solving particular quadratic Diophantine equations that are reduced to linear Diophantine equations, thanks to linear algebra results and the well-definedness of the problem. Examples of theories that do not satisfy our additional properties appear to be undecidable, which suggests that our characterization is reasonably tight.} }
@proceedings{secret2007-pre, title = {{P}reliminary {P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'07)}, booktitle = {{P}reliminary {P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'07)}, editor = {Nesi, Monica and Treinen, Ralf}, year = 2007, month = jul, address = {Paris, France} }
@inproceedings{phs-time07, address = {Alicante, Spain}, month = jun, year = 2007, publisher = {{IEEE} Computer Society Press}, editor = {Goranko, Valentin and Wang, X. Sean}, acronym = {{TIME}'07}, booktitle = {{P}roceedings of the 14th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'07)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Model Checking Branching-Time Logics}, pages = {5}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/phs-time07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/phs-time07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/phs-time07.ps}, doi = {10.1109/TIME.2007.52} }
@inproceedings{CDP-formats07, address = {Salzburg, Austria}, month = oct, year = 2007, volume = 4763, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Raskin, Jean-Fran{\c{c}}ois and Thiagarajan, P. S.}, acronym = {{FORMATS}'07}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'07)}, author = {Chevalier, Fabrice and D'Souza, Deepak and Prabhakar, Pavithra}, title = {Counter-free Input Determined Timed Automata}, pages = {82-97}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDP-formats07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDP-formats07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CDP-formats07.ps}, doi = {10.1007/978-3-540-75454-1_8}, abstract = {We identify a class of timed automata, which we call counter-free input-determined automata, which characterize the class of timed languages definable by several timed temporal logics in the literature, including~MTL. We~make use of this characterization to show that MTL+Past satisfies an {"}ultimate stability{"} property with respect to periodic sequences of timed words. Our results hold for both the pointwise and continuous semantics. Along the way we generalize the result of McNaughton-Papert to show a counter-free automata characterization of FO-definable finitely varying functions.} }
@inproceedings{BM-formats07, address = {Salzburg, Austria}, month = oct, year = 2007, volume = 4763, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Raskin, Jean-Fran{\c{c}}ois and Thiagarajan, P. S.}, acronym = {{FORMATS}'07}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'07)}, author = {Bouyer, Patricia and Markey, Nicolas}, title = {Costs are Expensive!}, pages = {53-68}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BM-formats07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BM-formats07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BM-formats07.ps}, doi = {10.1007/978-3-540-75454-1_6}, abstract = {We study the model-checking problem for WMTL, a~cost-extension of the linear-time timed temporal logic MTL, that is interpreted over weighted timed automata. We~draw a complete picture of the decidability for that problem: it~is decidable only for the class of one-clock weighted timed automata with a restricted stopwatch cost, and any slight extension of this model leads to undecidability. We~finally give some consequences on the undecidability of linear hybrid automata.} }
@inproceedings{BCD-jouannaud, address = {Cachan, France}, month = jun, year = 2007, volume = 4600, series = {Lecture Notes in Computer Science}, publisher = {Springer}, acronym = {{R}ewriting, {C}omputation and {P}roof}, booktitle = {{R}ewriting, {C}omputation and {P}roof~--- {E}ssays {D}edicated to {J}ean-{P}ierre {J}ouannaud on the {O}ccasion of his 60th {B}irthday}, editor = {Comon{-}Lundh, Hubert and Kirchner, Claude and Kirchner, H{\'e}l{\`e}ne}, author = {Bursuc, Sergiu and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Deducibility Constraints, Equational Theory and Electronic Money}, pages = {196-212}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCD-jpj07.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCD-jpj07.ps}, doi = {10.1007/978-3-540-73147-4_10}, abstract = {The starting point of this work is a case study (from France T\'el\'ecom) of an electronic purse protocol. The~goal was to prove that the protocol is secure or that there is an attack. Modeling the protocol requires algebraic properties of a fragment of arithmetic, typically containing modular exponentiation. The~usual equational theories described in papers on security protocols are too weak: the~protocol cannot even be executed in these models. We~consider here an equational theory which is powerful enough for the protocol to be executed, and for which unification is still decidable.\par Our main result is the decidability of the so-called intruder deduction problem, i.e.,~security in presence of a passive attacker, taking the algebraic properties into account. Our~equational theory is a combination of several equational theories over non-disjoint signatures.} }
@proceedings{CLKK-jouannaud07, editor = {Comon{-}Lundh, Hubert and Kirchner, Claude and Kirchner, H{\'e}l{\`e}ne}, booktitle = {Rewriting, Computation and Proof~--- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday}, title = {Rewriting, Computation and Proof~--- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 4600, year = 2007, month = jun, address = {Cachan, France}, url = {http://www.springerlink.com/content/p0p40764x486/}, doi = {10.1007/978-3-540-73147-4}, isbn = {978-3-540-73146-7} }
@phdthesis{chevalier-these2007, author = {Chevalier, Fabrice}, title = {Logiques pour les syst{\`e}mes temporis{\'e}s~: contr{\^o}le et expressivit{\'e}}, year = 2007, month = jun, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-FC07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-FC07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-FC07.ps} }
@phdthesis{reynier-these2007, author = {Reynier, Pierre-Alain}, title = {V{\'e}rification de syst{\`e}mes temporis{\'e}s et distribu{\'e}s~: mod{\`e}les, algorithmes et impl{\'e}mentabilit{\'e}}, year = 2007, month = jun, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-reynier.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-reynier.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-reynier.ps} }
@phdthesis{demri-hab2007, author = {Demri, St{\'e}phane}, title = {Logiques pour la sp{\'e}cification et v{\'e}rification}, year = 2007, month = jun, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris~7, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SD-habil07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SD-habil07.pdf}, futureslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/ SD-habil-slides.ps.gz} }
@phdthesis{encrenaz-hab2007, author = {Encrenaz{-}Tiph{\`e}ne, Emmanuelle}, title = {Contributions pour la conception et la v{\'e}rification de syst{\`e}mes mat{\'e}riels embarqu{\'e}s}, year = 2007, month = jun, type = {M{\'e}moire d'habilitation}, school = {Universit{\'e} Paris~6, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EE-habil07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EE-habil07.pdf}, futureslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/ EE-habil-slides.ps.gz} }
@techreport{LSV:07:21, author = {Chamseddine, Najla and Duflot, Marie and Fribourg, Laurent and Picaronny, Claudine}, title = {Determinate Probabilistic Timed Automata as {M}arkov Chains with Parametric Costs}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = may, type = {Research Report}, number = {LSV-07-21}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-21.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-21.pdf}, note = {17~pages}, abstract = {We consider probabilistic systems modeled under the form of a special class of probabilistic timed automata. Such automata have {"}no choice{"}: when the automaton arrives at a node, the time at which it will leave it is determined; and when the automaton leaves the node, there is just one distribution of target nodes.\par In the paper, we give a method for computing the expected time~\(A\) for the automaton to reach an {"}absorbing{"} node. Roughly speaking, the method consists in putting the automaton under the form of a Markov chain with costs (corresponding to durations). Under certain conditions, the method is parametric in the sense that \(A\)~is computed as a function of the constants appearing in the outgoing conditions and the invariants of nodes, but does not assume known their explicit values.\par We illustrate the method on the CSMA/CD protocol.} }
@techreport{LSV:07:20, author = {Bresciani, Riccardo}, title = {The {ZRTP} Protocol~--- Security Considerations}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = may, type = {Research Report}, number = {LSV-07-20}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-20.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2007-20.ps}, note = {23~pages}, abstract = {ZRTP is draft of key agreement protocol by Phil~Zimmermann, which relies on a Diffie-Hellman exchange to generate SRTP session parameters, providing confidentiality and protecting against \emph{Man-in-the-Middle} attacks even without a public key infrastructure or endpoint certificates. This is an analysis of the protocol performed with AVISPA and ProVerif, which tests security properties of ZRTP; in~order to perform the analysis, the protocol has been modeled in HLPSL (for~AVISPA) and in the applied \(\pi\)-calculus (for~Proverif). An improvement to gather some extra resistance against \emph{Man-in-the-Middle} attacks is also proposed.} }
@inproceedings{AMN-concur07, address = {Lisbon, Portugal}, month = sep, year = 2007, volume = 4703, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Caires, Lu{\'\i}s and Vasconcelos, Vasco T.}, acronym = {{CONCUR}'07}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'07)}, author = {Akshay, S. and Mukund, Madhavan and Narayan Kumar, K.}, title = {Checking Coverage for Infinite Collections of Timed Scenarios}, pages = {181-196}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AMN-concur07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AMN-concur07.pdf}, doi = { 10.1007/978-3-540-74407-8_13}, abstract = {We consider message sequence charts enriched with timing constraints between pairs of events. As in the untimed setting, an infinite family of time-constrained message sequence charts~(TC-MSCs) is generated using an HMSC ---a finite-state automaton whose nodes are labelled by TC-MSCs. A~timed MSC is an MSC in which each event is assigned an explicit time-stamp. A~timed MSC covers a TC-MSC if it satisfies all the time constraints of the~TC-MSC. A~natural recognizer for timed MSCs is a message-passing automaton~(MPA) augmented with clocks. The~question we address is the following: given a timed system specified as a time-constrained HMSC H and an implementation in the form of a timed MPA~\(A\), is~every TC-MSC generated by~\(H\) covered by some timed MSC recognized by~\(A\)? We~give a complete solution for locally synchronized time-constrained HMSCs, whose underlying behaviour is always regular. We~also describe a restricted solution for the general case.} }
@inproceedings{ACD-frocos07, address = {Liverpool, UK}, month = sep, year = 2007, volume = 4720, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Wolter, Franck}, acronym = {{FroCoS}'07}, booktitle = {{P}roceedings of the 6th {I}nternational {S}ymposium on {F}rontiers of {C}ombining {S}ystems ({FroCoS}'07)}, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Combining algorithms for deciding knowledge in security protocols}, pages = {103-117}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACD-frocos07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACD-frocos07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ACD-frocos07.ps}, doi = {10.1007/978-3-540-74621-8_7}, abstract = {In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic functions (encryption, exclusive or,~...). The analysis of cryptographic protocols requires a precise understanding of the attacker knowledge. Two standard notions are usually used: deducibility and indistinguishability. Those notions are well-studied and a lot of decidability results already exist to deal with a variety of equational theories.\par We~show that decidability results can be easily combined for any disjoint equational theories: if the deducibility and indistinguishability relations are decidable for two disjoint theories, they are also decidable for their union. As~an application, new decidability results can be obtained using this combination theorem.} }
@inproceedings{KM-esorics07, address = {Dresden, Germany}, month = sep, year = 2007, volume = 4734, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Biskup, Joachim and Lopez, Javier}, acronym = {{ESORICS}'07}, booktitle = {{P}roceedings of the 12th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'07)}, author = {Kremer, Steve and Mazar{\'e}, Laurent}, title = {Adaptive Soundness of Static Equivalence}, pages = {610-625}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KM-esorics07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KM-esorics07.pdf}, doi = {10.1007/978-3-540-74835-9_40}, abstract = {We define a framework to reason about implementations of equational theories in the presence of an adaptive adversary. We particularly focus on soundess of static equivalence. We illustrate our framework on several equational theories: symmetric encryption, XOR, modular exponentiation and also joint theories of encryption and modular exponentiation. This last example relies on a combination result for reusing proofs for the separate theories. Finally, we~define a model for symbolic analysis of dynamic group key exchange protocols, and show its computational soundness.} }
@inproceedings{BLMO-concur07, address = {Lisbon, Portugal}, month = sep, year = 2007, volume = 4703, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Caires, Lu{\'\i}s and Vasconcelos, Vasco T.}, acronym = {{CONCUR}'07}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'07)}, author = {Brihaye, {\relax Th}omas and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Oreiby, Ghassan}, title = {Timed Concurrent Game Structures}, pages = {445-459}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLMO-concur07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLMO-concur07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLMO-concur07.ps}, doi = {10.1007/978-3-540-74407-8_30}, abstract = {We propose a new model for timed games, based on concurrent game structures~(CGSs). Compared to the classical \emph{timed game automata} of~Asarin \emph{et~al.}, our timed~CGSs are {"}more concurrent{"}, in the sense that they always allow all the agents to act on the system, independently of the delay they want to elapse before their action. Timed CGSs weaken the {"}element of surprise{"} of timed game automata reported by de~Alfaro \emph{et~al.}\par We prove that our model has nice properties, in particular that model-checking timed CGSs against timed \(\textsf{ATL}\) is decidable \emph{via} region abstraction, and in particular that strategies are {"}region-stable{"} if winning objectives are. We also propose a new extension of \(\textsf{TATL}\), containing~\(\textsf{ATL}^{*}\), which we call~\(\textsf{TALTL}\). We~prove that model-checking this logic remains decidable on timed CGSs. Last, we explain how our algorithms can be adapted in order to rule out Zeno (co-)strategies, based on the ideas of Henzinger \emph{et~al.}} }
@inproceedings{Gou-csl07, address = {Lausanne, Switzerland}, month = sep, year = 2007, volume = 4646, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Duparc, Jacques and Henzinger, {\relax Th}omas A.}, acronym = {{CSL}'07}, booktitle = {{P}roceedings of the 16th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'07)}, author = {Goubault{-}Larrecq, Jean}, title = {Continuous Previsions}, pages = {542-557}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-csl07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-csl07.pdf}, doi = {10.1007/978-3-540-74915-8_40}, abstract = {We define strong monads of continuous (lower, upper) previsions, and of forks, modeling both probabilistic and non-deterministic choice. This is an elegant alternative to recent proposals by Mislove, Tix, Keimel, and Plotkin. We show that our monads are sound and complete, in the sense that they model exactly the interaction between probabilistic and (demonic, angelic, chaotic) choice.} }
@article{bozzelli-tcs07, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Bozzelli, Laura}, title = {Complexity results on branching-time pushdown model checking}, year = 2007, volume = 379, number = {1-2}, pages = {286-297}, month = jun, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bozzelli-tcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bozzelli-tcs07.pdf}, doi = {10.1016/j.tcs.2007.03.049}, abstract = {The model checking problem of pushdown systems (PMC~problem, for~short) against standard branching temporal logics has been intensively studied in the literature. In particular, for the modal \(\mu\)-calculus, the most powerful branching temporal logic used for verification, the problem is known to be EXPTIME-complete (even~for a fixed~formula). The~problem remains EXPTIME-complete also for the logic~CTL, which corresponds to a fragment of the alternation-free modal \(\mu\)-calculus. For~the logic~CTL\(^{*}\), the problem is known to be in 2EXPTIME. In~this paper, we~show that the complexity of the PMC problem for CTL\(^{\*}\) is in fact 2EXPTIME-complete. Moreover, we give a new optimal algorithm to solve this problem based on automata theoretic techniques. Finally, we prove that the program complexity of the PMC problem against CTL (i.e.,~the complexity of the problem in terms of the size of the~system) is EXPTIME-complete.} }
@inproceedings{BGMN-fct07, address = {Budapest, Hungary}, month = aug, year = 2007, volume = 4639, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Csuhaj-Varj{\'u}, Erzs{\'e}bet and {\'E}sik, Zolt{\'a}n}, acronym = {{FCT}'07}, booktitle = {{P}roceedings of the 16th {I}nternational {S}ymposium on {F}undamentals of {C}omputation {T}heory ({FCT}'07)}, author = {Bhateja, Puneet and Gastin, Paul and Mukund, Madhavan and Narayan Kumar, K.}, title = {Local testing of message sequence charts is difficult}, pages = {76-87}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGMN-fct07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGMN-fct07.pdf}, doi = {10.1007/978-3-540-74240-1_8}, abstract = {Message sequence charts are an attractive visual formalism used to specify distributed communicating systems. One~way to test such a system is to substitute a component by a test process and observe its interaction with the rest of the system. We~study the question of whether we can characterize the distributed behaviour of the system based on such local observations. The~main difficulty is that local observations can combine in unexpected ways to define implied scenarios not present in the original specification. It~is known that checking whether a scenario specification is closed with respect to implied scenarios is undecidable when observations are made one process at a time, even for regular specifications. We~show that this undecidability holds even if we have only two processes in the system. We then strengthen the observer to be able to observe multiple processes simultaneously. Even in this stronger framework, the problem remains undecidable. In~fact, undecidability continues to hold even without message labels, provided we observe two or more processes simultaneously. On~the other hand, if we do not have message labels and we restrict observations to one process at a time, the problem of checking for implied scenarios is decidable.} }
@inproceedings{GM-spin07, address = {Berlin, Germany}, month = jul, year = 2007, volume = 4595, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bo{\v{s}}nacki, Dragan and Edelkamp, Stefan}, acronym = {{SPIN}'07}, booktitle = {{P}roceedings of the 14th {I}nternational {SPIN} {W}orkshop on {M}odel {C}hecking {S}oftware ({SPIN}'07)}, author = {Gastin, Paul and Moro, Pierre}, title = {Minimal counter-example generation for {SPIN}}, pages = {24-38}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GM-spin07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GM-spin07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GM-spin07.ps}, doi = {10.1007/978-3-540-73370-6_4}, abstract = {In this paper, we propose an algorithm to compute a counter-example of minimal size to some property in a finite state program, using the same programmation constraints than~SPIN. This algorithm uses nested Breadth-first searches guided by priority queues. This algorithm works in quadratic time and is linear in memory.} }
@misc{versydis-final, author = {Gastin, Paul and others}, title = {{ACI} {S}{\'e}curit{\'e} {I}nformatique {VERSYDIS}~--- Rapport final}, year = 2006, month = oct, type = {Contract Report}, note = {10~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Versydis-final.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Versydis-final.pdf} }
@article{GK-fi07, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Gastin, Paul and Kuske, Dietrich}, title = {Uniform satisfiability in {PSPACE} for local temporal logics over {M}azurkiewicz traces}, volume = 80, number = {1-3}, pages = {169-197}, year = 2007, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GK-fi07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GK-fi07.pdf}, abstract = {We study the complexity of temporal logics over concurrent systems that can be described by Mazurkiewicz traces. We develop a general method to prove that the uniform satisfiability problem of local temporal logics is in~PSPACE. We~also demonstrate that this method applies to all known local temporal logics.} }
@misc{cortos-final, author = {Bouyer, Patricia and others}, title = {{ACI} {S}{\'e}curit{\'e} {I}nformatique {CORTOS}~--- Rapport final}, year = 2006, month = nov, type = {Contract Report}, note = {17~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Cortos-final.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Cortos-final.pdf} }
@misc{persee-final, author = {Schnoebelen, {\relax Ph}ilippe and Bouajjani, Ahmed and Sutre, Gr{\'e}goire}, title = {{ACI} {S}{\'e}curit{\'e} {I}nformatique {PERS{\'E}E}~--- Rapport final}, year = 2006, month = nov, type = {Contract Report}, note = {12~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Persee-final.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Persee-final.pdf} }
@techreport{DGA:rap3, author = {Lafourcade, Pascal}, title = {Rapport final d'activit{\'e} {\`a}~{\(11\)}~mois, contrat~{CNRS/DGA} r{\'e}f{\'e}rence~: 06~60~019~00~470~75~01 <<~{U}tilisation et exploitation des th{\'e}ories {\'e}quationnelles dans l'analyse des protocoles cryptographiques~>>}, type = {Contract Report}, institution = {DGA}, year = {2007}, month = oct, note = {6~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PS/DGA-rap3.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PS/DGA-rap3.ps} }
@techreport{DGA:rap2, author = {Lafourcade, Pascal}, title = {Rapport d'activit{\'e}s {\`a}~{\(6\)}~mois, contrat~{CNRS/DGA} r{\'e}f{\'e}rence~: 06~60~019~00~470~75~01 <<~{U}tilisation et exploitation des th{\'e}ories {\'e}quationnelles dans l'analyse des protocoles cryptographiques~>>}, type = {Contract Report}, institution = {DGA}, year = {2007}, month = apr, note = {5~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PS/DGA-rap2.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PS/DGA-rap2.ps} }
@techreport{DGA:rap1, author = {Lafourcade, Pascal}, title = {Rapport d'activit{\'e}s {\`a}~{\(3\)}~mois, contrat~{CNRS/DGA} r{\'e}f{\'e}rence~: 06~60~019~00~470~75~01 <<~{U}tilisation et exploitation des th{\'e}ories {\'e}quationnelles dans l'analyse des protocoles cryptographiques~>>}, type = {Contract Report}, institution = {DGA}, year = {2007}, month = jan, note = {3~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PS/DGA-rap1.ps}, ps = {http://www.lsv.ens-cachan.fr/Publis/PS/DGA-rap1.ps} }
@inproceedings{DG-time07, address = {Alicante, Spain}, month = jun, year = 2007, publisher = {{IEEE} Computer Society Press}, editor = {Goranko, Valentin and Wang, X. Sean}, acronym = {{TIME}'07}, booktitle = {{P}roceedings of the 14th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'07)}, author = {Demri, St{\'e}phane and Gascon, R{\'e}gis}, title = {The Effects of Bounding Syntactic Resources on {P}resburger {LTL} (Extended Abstract)}, pages = {94-104}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-time07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-time07.pdf}, doi = {10.1109/TIME.2007.63}, abstract = {We study decidability and complexity issues for fragments of LTL with Presburger constraints by restricting the syntactic resources of the formulae (the~class of constraints, the number of variables and the distance between two states for which counters can be compared) while preserving the strength of the logical operators. We provide a complete picture refining known results from the literature, in some cases pushing forward the known decidability limits. By~way of example, we show that model-checking formulae from LTL with quantifier-free Presburger arithmetic over one-counter automata is only PSPACE-complete. In~order to establish the PSPACE upper bound, we show that the nonemptiness problem for Buchi one-counter automata taking values in~\(\mathbb{Z}\) and allowing zero tests and sign tests, is only NLOGSPACE-complete.} }
@article{BGP-fmsd07, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {B{\'e}rard, B{\'e}atrice and Gastin, Paul and Petit, Antoine}, title = {Timed substitutions for regular signal-event languages}, volume = 31, number = 2, pages = {101-134}, year = 2007, month = oct, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGP-fmsd07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGP-fmsd07.pdf}, doi = {10.1007/s10703-007-0034-5}, abstract = {In the classical framework of formal languages, a refinement operation is modeled by a substitution and an abstraction by an inverse substitution. These mechanisms have been widely studied, because they describe a change in the specification level, from an abstract view to a more concrete one, or conversely. For timed systems, there is up to now no uniform notion of substitution. In~this paper, we~study timed substitutions in the general framework of signal-event languages, where both signals and events are taken into account. We prove that regular signal-event languages are closed under substitution and inverse substitution.\par To obtain these results, we use in a crucial way a {"}well known{"} result: regular signal-event languages are closed under intersection. In fact, while this result is indeed easy for languages defined by Alur and Dill's timed automata, it turns out that the construction is much more tricky when considering the most involved model of signal-event automata. We give here a construction working on finite and infinite signal-event words and taking into account signal stuttering, unobservability of zero-duration \(\tau\)-signals and Zeno runs. Note that if several constructions have been proposed in particular cases, it is the first time that a general construction is provided.} }
@inproceedings{JGL-icalp07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, volume = 4596, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arge, Lars and Cachin, {\relax Ch}ristian and Jurdzi{\'n}ski, Tomasz and Tarlecki, Andrzej}, acronym = {{ICALP}'07}, booktitle = {{P}roceedings of the 34th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'07)}, author = {Goubault{-}Larrecq, Jean}, title = {Continuous Capacities on Continuous State Spaces}, pages = {764-776}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-icalp07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-icalp07.pdf}, doi = {10.1007/978-3-540-73420-8_66}, abstract = {We propose axiomatizing some stochastic games, in a continuous state space setting, using continuous belief functions, resp. plausibilities, instead of measures. Then, stochastic games are just variations on continuous Markov chains. We argue that drawing at random along a belief function is the same as letting the probabilistic player~\(P\) play first, then letting the non-deterministic player~\(C\) play demonically. The same holds for an angelic~\(C\), using plausibilities instead. We then define a simple modal logic, and characterize simulation in terms of formulae of this logic. Finally, we show that (discounted) payoffs are defined and unique, where in the demonic case, \(P\)~maximizes payoff, while \(C\)~minimizes it} }
@inproceedings{BHPR-icalp07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, volume = 4596, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Arge, Lars and Cachin, {\relax Ch}ristian and Jurdzi{\'n}ski, Tomasz and Tarlecki, Andrzej}, acronym = {{ICALP}'07}, booktitle = {{P}roceedings of the 34th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'07)}, author = {Brihaye, {\relax Th}omas and Henzinger, {\relax Th}omas A. and Prabhu, Vinayak and Raskin, Jean-Fran{\c{c}}ois}, title = {Minimum-Time Reachability in Timed Games}, pages = {825-837}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHPR-icalp07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHPR-icalp07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BHPR-icalp07.ps}, doi = {10.1007/978-3-540-73420-8_71}, abstract = {We consider the minimum-time reachability problem in concurrent two-player timed automaton game structures. We~show how to compute the minimum time needed by a player to reach a location against all possible choices of the opponent. We~do not put any syntactic restriction on the game structure, nor do we require any player to guarantee time divergence. We~only require players to use physically realizable strategies. The~minimal time is computed in part using a fixpoint expression which we show can be used on equivalence classes of a non-trivial extension of the region equivalence relation.} }
@inproceedings{CDS-csf07, address = {Venice, Italy}, month = jul, year = 2007, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'07}, booktitle = {{P}roceedings of the 20th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'07)}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie and Steel, Graham}, title = {A Formal Theory of Key Conjuring}, pages = {79-93}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDS-csf07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDS-csf07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CDS-csf07.ps}, doi = {10.1109/CSF.2007.5}, abstract = {We describe a formalism for \emph{key conjuring}, the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. This technique has been used to attack the security APIs of several Hardware Security Modules~(HSMs), which are widely deployed in the ATM (cash machine) network. We~propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security~API. We~show that security in the presence of key conjuring operations is decidable for a particular class of~APIs, which includes the key management~API of IBM's Common Cryptographic Architecture~(CCA).} }
@inproceedings{Gou-lics07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'07}, booktitle = {{P}roceedings of the 22nd {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'07)}, author = {Goubault{-}Larrecq, Jean}, title = {On {N}oetherian Spaces}, pages = {453-462}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-lics07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-lics07.pdf}, doi = {10.1109/LICS.2007.34}, abstract = {A topological space is Noetherian iff every open is compact. Our~starting point is that this notion generalizes that of well-quasi order, in the sense that an Alexandroff-discrete space is Noetherian iff its specialization quasi-ordering is well. For~more general spaces, this opens the way to verifying infinite transition systems based on non-well quasi ordered sets, but where the preimage operator satisfies an additional continuity assumption. The technical development rests heavily on techniques arising from topology and domain theory, including sobriety and the de Groot dual of a stably compact space. We~show that the category Nthr of Noetherian spaces is finitely complete and finitely cocomplete. Finally, we note that if \(X\)~is a Noetherian space, then the set of all (even infinite) subsets of~\(X\) is again Noetherian, a~result that fails for well-quasi orders.} }
@inproceedings{BMOW-lics07, address = {Wroc{\l}aw, Poland}, month = jul, year = 2007, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'07}, booktitle = {{P}roceedings of the 22nd {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'07)}, author = {Bouyer, Patricia and Markey, Nicolas and Ouaknine, Jo{\"e}l and Worrell, James}, title = {The Cost of Punctuality}, pages = {109-118}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMOW-lics07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMOW-lics07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BMOW-lics07.ps}, doi = {10.1109/LICS.2007.49}, abstract = {In an influential paper titled {"}The Benefits of Relaxing Punctuality{"}, Alur, Feder, and~Henzinger introduced Metric Interval Temporal Logic~(MITL) as a fragment of the real-time logic Metric Temporal Logic~(MTL) in which exact or punctual timing constraints are banned. Their main result showed that model checking and satisfiability for~MITL are both EXPSPACE-Complete.\par Until recently, it was widely believed that admitting even the simplest punctual specifications in any linear-time temporal logic would automatically lead to undecidability. Although this was recently disproved, until now no punctual fragment of~MTL was known to have even primitive recursive complexity (with certain decidable fragments having provably non-primitive recursive complexity).\par In this paper we identify a `co-flat' subset of~MTL that is capable of expressing a large class of punctual specifications and for which model checking (although not satisfiability) has no complexity cost over~MITL. Our logic is moreover qualitatively different from~MITL in that it can express properties that are not timed-regular. Correspondingly, our decision procedures do not involve translating formulas into finite-state automata, but rather into certain kinds of reversal-bounded Turing machines. Using this translation we show that the model checking problem for our logic is EXPSPACE-Complete, and is even PSPACE-Complete if timing constraints are encoded in unary.} }
@inproceedings{BDL-hav07, address = {Braga, Portugal}, month = mar, year = 2007, editor = {Berdine, Josh and Sagiv, Mooly}, acronym = {{HAV}'07}, booktitle = {{P}roceedings of the 1st {W}orkshop on {H}eap {A}nalysis and {V}erification ({HAV}'07)}, author = {Brochenin, R{\'e}mi and Demri, St{\'e}phane and Lozes, {\'E}tienne}, title = {Reasoning about Sequences of Memory States}, preliminary-version-of = {BDL-lfcs2007}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-hav07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-hav07.pdf}, abstract = {In order to verify programs with pointer variables, we introduce a temporal logic LTL\textsuperscript{mem} whose underlying assertion language is the quantifier-free fragment of separation logic and the temporal logic on the top of it is the standard linear-time temporal logic~LTL. We~state the complexity of various model-checking and satisfiability problems for LTL\textsuperscript{mem} , considering various fragments of separation logic (including pointer arithmetic), various classes of models (with or without constant heap), and the influence of fixing the initial memory state. Our main decidability result is PSPACE-completeness of the satisfiability problems on the record fragment and on a classical fragment allowing pointer arithmetic. \(\Sigma^{0}_{1}\)-completeness or \(\Sigma^{1}_{1}\)-completeness results are established for various problems, and underline the tightness of our decidability results.} }
@techreport{LSV:07:10, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Tree Automata, Implicit Induction and Explicit Destructors for Security Protocol Verification}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = feb, type = {Research Report}, number = {LSV-07-10}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-10.pdf}, note = {21~pages}, abstract = {We present a new method for automatic implicit induction theorem proving, and its application for the verification of cryptographic protocols. The~method is based on constrained tree grammars and handles non-confluent rewrite systems which are required in the context of the verification of security protocols because of the non-deterministic behavior of attackers. It~also handles axioms between constructor terms which allows us to specify explicit destructors representing cryptographic operators. Constrained tree grammars are used in our procedure both as induction schemes and as oracles for checking validity and redundancy by reduction to an emptiness problem. They also permit to characterize security failure of cryptographic protocols as sets of execution traces corresponding to an attack. This~way, we obtain a generic framework for the verification of protocols, in~which we can verify reachability properties like confidentiality, but also more complex properties like authentication. We present three case studies which gave very promising results.} }
@techreport{KL-eth07, author = {Ksi{\k e}{\. z}opolski, Bogdan and Lafourcade, Pascal}, title = {Attack and Revison of an Electronic Auction Protocol using~{OFMC}}, institution = {Department of Computer Science, ETH Zurich, Switzerland}, year = 2007, month = feb, type = {Technical Report}, number = {549}, note = {13~pages}, nmnote = {on peut pas dire que ce soit un papier du labo... Si en fait, car Pascal etait la-bas sur un contrat gere par le LSV}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KL-eth549.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KL-eth549.pdf}, abstract = {In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [Ksiezopolski and Kotulski, \textit{Cryptographic protocol for electronic auctions with extended requirements},~2004]. The found attack consists of authentication breach and secret retrieval. It~is a kind of {"}man-in-the-middle attack{"}. The intruder impersonates an agent and learns some secret information. We have discovered this flaw unsing OFMC an automatic tool of cryptographic protocol verification. After a description of this attack, we propose a new version of the e-auction protocol. We also check with OFMC the secrecy for the new protocol and give an informal proof of the other properties that this new e-auction protocol has to guarantee.} }
@inproceedings{Maz-wits07, address = {Braga, Portugal}, month = mar, year = 2007, editor = {Focardi, Riccardo}, acronym = {{WITS}'07}, booktitle = {{P}reliminary {P}roceedings of the 7th {I}nternational {W}orkshop on {I}ssues in the {T}heory of {S}ecurity ({WITS}'07)}, author = {Mazar{\'e}, Laurent}, title = {Computationally Sound Analysis of Protocols using Bilinear Pairings}, pages = {6-21}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Maz-wits07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Maz-wits07.pdf}, abstract = {In this paper, we introduce a symbolic model to analyse protocols that use a bilinear pairing between two cyclic groups. This model consists in an extension of the Abadi-Rogaway logic and we prove that the logic is still computationally sound: symbolic indistinguishability implies computational indistinguishability provided that the Bilinear Decisional Diffie-Hellman assumption is verified and that the encryption scheme is IND-CPA secure. We~illustrate our results on classical protocols using bilinear pairing like Joux tripartite Diffie-Hellman protocol or the TAK-2 and TAK-3 protocols.} }
@inproceedings{BDL-lfcs2007, address = {New~York, New~York, USA}, month = jun, year = 2007, volume = 4514, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Artemov, Sergei N. and Nerode, Anil}, acronym = {{LFCS}'07}, booktitle = {{P}roceedings of the {S}ymposium on {L}ogical {F}oundations of {C}omputer {S}cience ({LFCS}'07)}, author = {Brochenin, R{\'e}mi and Demri, St{\'e}phane and Lozes, {\'E}tienne}, title = {Reasoning about sequences of memory states}, pages = {100-114}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-lfcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-lfcs07.pdf}, doi = { 10.1007/978-3-540-72734-7_8}, abstract = {Motivated by the verification of programs with pointer variables, we introduce a temporal logic LTL\textsuperscript{mem} whose underlying assertion language is the quantifier-free fragment of separation logic and the temporal logic on the top of it is the standard linear-time temporal logic~LTL. We analyze the complexity of various model-checking and satisfiability problems for LTL\textsuperscript{mem}, considering various fragments of separation logic (including pointer arithmetic), various classes of models (with or without constant heap), and the influence of fixing the initial memory state. We~provide a complete picture based on these criteria. Our main decidability result is PSPACE-completeness of the satisfiability problems on the record fragment and on a classical fragment allowing pointer arithmetic. \(\Sigma^{0}_{1}\)-completeness or \(\Sigma^{1}_{1}\)-completeness results are established for various problems by reducing standard problems for Minsky machines, and underline the tightness of our decidability results.} }
@inproceedings{BK-lata2007, address = {Tarragona, Spain}, month = mar # {-} # apr, year = 2007, futureseries = {Lecture Notes in Computer Science}, nmnote = {published as Report 35/07 Research Group on Mathematical Linguistics, Universitat Rovira i Virgili, Tarragona}, editor = {{\'E}sik, Zolt{\'a}n and Mart{\'\i}n-Vide, Carlos and Mitrana, Victor}, acronym = {{LATA}'07}, booktitle = {{P}reliminary {P}roceedings of the 1st {I}nternational {C}onference on {L}anguage and {A}utomata {T}heory and {A}pplications ({LATA}'07)}, author = {Bollig, Benedikt and Kuske, Dietrich}, title = {{M}uller Message-Passing Automata and Logics}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BK-lata07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BK-lata07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BK-lata07.ps}, abstract = {We study nonterminating message-passing automata whose behavior is described by infinite message sequence charts. As~a~first result, we show that Muller, B{\"u}chi, and termination-detecting Muller acceptance are equivalent for these devices. To describe the expressive power of these automata, we give a logical characterization. More precisely, we show that they have the same expressive power as the existential fragment of a monadic second-order logic featuring a first-order quantifier to express that there are infinitely many elements satisfying some property. Our result is based on a new extension of the classical Ehrenfeucht-Fra{\"\i}ss{\'e} game to cope with infinite structures and the new first-order quantifier.} }
@techreport{LSV:07:03, author = {Goubault{-}Larrecq, Jean}, title = {Believe It Or Not, {GOI}~is a Model of Classical Linear Logic}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = jan, type = {Research Report}, number = {LSV-07-03}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-03.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-03.pdf}, note = {18~pages}, othernote = {a draft of the longer version of this report is available at http://www.lsv.ens-cachan.fr/~goubault/isg.pdf}, abstract = {We introduce the Danos-R\'egnier category \(\mathcal{DR}(M)\) of a linear inverse monoid~\(M\), a categorical description of geometries of interaction~(GOI). The usual setting for GOI is that of a weakly Cantorian linear inverse monoid. It is well-known that GOI is perfectly suited to describe the multiplicative fragment of linear logic, and indeed \(\mathcal{DR}(M)\) will be a \(*\)-autonomous category in this case. It is also well-known that the categorical interpretation of the other linear connectives conflicts with GOI interpretations. We make this precise, and show that \(\mathcal{DR}(M)\) has no terminal object, no cartesian product, and no exponential---whatever \(M\) is, unless \(M\) is trivial. However, a form of coherence completion of~\(\mathcal{DR}(M)\) \`a la Hu-Joyal provides a model of full classical linear logic, as soon as \(M\) is weakly Cantorian.} }
@article{LS-ipl07, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Laroussinie, Fran{\c{c}}ois and Sproston, Jeremy}, title = {State Explosion in Almost-Sure Probabilistic Reachability}, year = 2007, volume = {102}, number = {6}, pages = {236-241}, month = jun, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LS-ipl07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LS-ipl07.pdf}, doi = {10.1016/j.ipl.2007.01.003}, abstract = {We show that the problem of reaching a state set with probability~\(1\) in probabilistic-nondeterministic systems operating in parallel is EXPTIME-complete. We then show that this probabilistic reachability problem is EXPTIME-complete also for probabilistic timed automata.} }
@article{DO-fi2007, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Demri, St{\'e}phane and Or{\l}owska, Ewa}, title = {Relative Nondeterministic Information Logic is {EXPTIME}-complete}, year = {2007}, volume = {75}, number = {1-4}, pages = {163-178}, nmnote = {Special issue in memory of Z.~Paw{\l}ak}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DO-fi07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DO-fi07.pdf}, abstract = {We define a relative version of the logic NIL introduced by Or{\l}owska, Paw{\l}ak and Vakarelov and we show that its satisfiability is not only decidable but also EXPTIME-complete. Such a logic combines two ingredients that are seldom present simultaneously in information logics: frame conditions involving more than one information relation and relative frames. The~EXPTIME upper bound is obtained by designing a well-suited decision procedure based on the nonemptiness problem of B{\"u}chi automata on infinite trees. The paper provides evidence that B{\"u}chi automata on infinite trees are crucial language acceptors even for relative information logics with multiple types of relations.} }
@techreport{LSV:07:02, author = {Reynier, Pierre-Alain}, title = {Diagonal constraints handled efficiently in~{UPPAAL}}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2007, month = jan, type = {Research Report}, number = {LSV-07-02}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-02.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-02.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2007-02.ps}, note = {4~pages}, abstract = {Timed automata (TA) are widely used to model real-time systems, and UPPAAL is one of the most popular model-checker for this framework which has been successfully applied over numerous industrial case studies. Diagonal constraints are a natural extension of TA, that does not increase expressive power, but gives conciseness. Unfortunately the classical forward algorithm for reachability analysis cannot be used to deal directly with diagonal constraints. Thus the current method implemented consists in removing them on-the-fly, which implies a complexity blow-up. In~[P.~Bouyer, F.~Laroussinie, and P.-A.~Reynier. \textit{Diagonal constraints in timed automata: Forward analysis of timed systems}. Proceedings of FORMATS'06, LNCS~3829, p.~112-126, Springer], a counter-example guided refinement algorithm has been proposed. In~this paper, we present its implementation, and give some benchmarks on a variant of Fischer's protocol. } }
@phdthesis{THESE-baudet07, author = {Baudet, Mathieu}, title = {S{\'e}curit{\'e} des protocoles cryptographiques~: aspects logiques et calculatoires}, year = 2007, month = jan, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-baudet.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-baudet.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-baudet.ps}, abstract = {This thesis is dedicated to the automatic verification of cryptographic protocols in the logical and computational settings. \par The~first part concerns the security of procotols in the logical ({"}formal{"}) framework. To~begin with, we show how to specify various security properties of protocols in a concurrent language, and how to analyze them automatically for a bounded number of sessions. The~properties under consideration include notably simple secrecy, authentication and resistance to dictionary attacks. \par The~second part deals with the computational soundness of logical models. The~main question here is to what extent the fact that no logical attack exists on a protocol implies that it is provably secure in the usual cryptographic model (called the computational model). We~concentrate on static equivalence, applied notably to several kinds of encryption and data vulnerable to dictionary attacks (such as passwords). We~show that under simple conditions, any (logical) proof of static equivalence between two messages implies their (computational) indistinguishability. This entails computational soundness in the passive case for the notion of dictionary attacks developped in the first part.} }
@inproceedings{BM-lfcs2007, address = {New~York, New~York, USA}, month = jun, year = 2007, volume = 4514, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Artemov, Sergei N. and Nerode, Anil}, acronym = {{LFCS}'07}, booktitle = {{P}roceedings of the {S}ymposium on {L}ogical {F}oundations of {C}omputer {S}cience ({LFCS}'07)}, author = {Bollig, Benedikt and Meinecke, Ingmar}, title = {Weighted Distributed Systems and Their Logics}, pages = {54-68}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BM-lfcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BM-lfcs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BM-lfcs07.ps}, doi = {10.1007/978-3-540-72734-7_5}, abstract = {We provide a model of weighted distributed systems and give a logical characterization thereof. Distributed systems are represented as weighted asynchronous cellular automata. Running over directed acyclic graphs, Mazurkiewicz traces, or (lossy) message sequence charts, they allow for modeling several communication paradigms in a unifying framework, among them probabilistic shared-variable and probabilistic lossy-channel systems. We~show that any such system can be described by a weighted existential MSO formula and, vice versa, any formula gives rise to a weighted asynchronous cellular automaton.} }
@inproceedings{DDG-lfcs2007, address = {New~York, New~York, USA}, month = jun, year = 2007, volume = 4514, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Artemov, Sergei N. and Nerode, Anil}, acronym = {{LFCS}'07}, booktitle = {{P}roceedings of the {S}ymposium on {L}ogical {F}oundations of {C}omputer {S}cience ({LFCS}'07)}, author = {Demri, St{\'e}phane and D'Souza, Deepak and Gascon, R{\'e}gis}, title = {Decidable Temporal Logic with Repeating Values}, pages = {180-194}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDG-lfcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDG-lfcs07.pdf}, doi = {10.1007/978-3-540-72734-7_13}, abstract = {Various logical formalisms with the freeze quantifier have been recently considered to model computer systems even though this is a powerful mechanism that often leads to undecidability. In~this paper, we study a linear-time temporal logic with past-time operators such that the freeze operator is only used to express that some value from an infinite set is repeated in the future or in the past. Such a restriction has been inspired by a recent work on spatio-temporal logics. We~show decidability of finitary and infinitary satisfiability by reduction into the verification of temporal properties in Petri nets. This is a surprising result since the logic is closed under negation, contains future-time and past-time temporal operators and can express the nonce property and its negation. These ingredients are known to lead to undecidability with a more liberal use of the freeze quantifier. The~paper contains also insights about the relationships between temporal logics with the freeze operator and counter automata.} }
@inproceedings{BBC-lfcs2007, address = {New~York, New~York, USA}, month = jun, year = 2007, volume = 4514, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Artemov, Sergei N. and Nerode, Anil}, acronym = {{LFCS}'07}, booktitle = {{P}roceedings of the {S}ymposium on {L}ogical {F}oundations of {C}omputer {S}cience ({LFCS}'07)}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Chevalier, Fabrice}, title = {Weighted O-Minimal Hybrid Systems are more Decidable than Weighted Timed Automata!}, pages = {69-83}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-lfcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-lfcs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBC-lfcs07.ps}, doi = {10.1007/978-3-540-72734-7_6}, abstract = {We consider weighted o-minimal hybrid systems, which extend classical o-minimal hybrid systems with cost functions. These cost functions are {"}observer variables{"} which increase while the system evolves but do not constrain the behaviour of the system. In this paper, we prove two main results: (i)~optimal o-minimal hybrid games are decidable; (ii)~the model-checking of~WCTL, an extension of CTL which can constrain the cost variables, is decidable over that model. This has to be compared with the same problems in the framework of timed automata where both problems are undecidable in general, while they are decidable for the restricted class of one-clock timed automata. } }
@article{VG-icomp2007, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Verma, Kumar N. and Goubault{-}Larrecq, Jean}, title = {Alternating Two-Way {AC}-Tree Automata}, pages = {817-869}, year = {2007}, month = jun, volume = 205, number = 6, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VG-icomp07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VG-icomp07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/VG-icomp07.ps}, doi = {10.1016/j.ic.2006.12.006}, abstract = {We explore the notion of alternating two-way tree automata modulo the theory of finitely many associative-commutative (AC) symbols. This was prompted by questions arising in cryptographic protocol verification, in~particular in modeling group key agreement schemes based on Diffie-Hellman-like functions, where the emptiness question for intersections of such automata is fundamental. This also has independent interest. We~show that the use of general push clauses, or of alternation, leads to undecidability, already in the case of one AC symbol, with only functions of arity zero. On~the other hand, emptiness is decidable in the general case of several function symbols, including several AC symbols, provided push clauses are unconditional and intersection clauses are final. This class of automata is also shown to be closed under intersection.} }
@inproceedings{JLS-tacas07, address = {Braga, Portugal}, month = mar, year = 2007, volume = {4424}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Grumberg, Orna and Huth, Michael}, acronym = {{TACAS}'07}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'07)}, author = {Jurdzi{\'n}ski, Marcin and Laroussinie, Fran{\c{c}}ois and Sproston, Jeremy}, title = {Model Checking Probabilistic Timed Automata with One or Two Clocks}, pages = {170-184}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JLS-tacas07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JLS-tacas07.pdf}, doi = {10.1007/978-3-540-71209-1_15}, abstract = {Probabilistic timed automata are an extension of timed automata with discrete probability distributions. We~consider model-checking algorithms for the subclasses of probabilistic timed automata which have one or two clocks. Firstly, we show that PCTL probabilistic model-checking problems (such~as determining whether a set of target states can be reached with probability at least~0.99 re- gardless of how nondeterminism is resolved) are PTIME-complete for one clock probabilistic timed automata, and are EXPTIME-complete for probabilistic timed automata with two clocks. Secondly, we show that the model-checking problem for the probabilistic timed temporal logic PTCTL is EXPTIME-complete for one clock probabilistic timed automata. However, the corresponding model-checking problem for the subclass of PTCTL which does not permit both (1)~punctual tim- ing bounds, which require the occurrence of an event at an exact time point, and (2)~comparisons with probability bounds other than 0 or~1, is PTIME-complete.} }
@inproceedings{DADSS-tacas07, address = {Braga, Portugal}, month = mar, year = 2007, volume = {4424}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Grumberg, Orna and Huth, Michael}, acronym = {{TACAS}'07}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'07)}, author = {D'Aprile, Davide and Donatelli, Susanna and Sangnier, Arnaud and Sproston, Jeremy}, title = {From Time {P}etri Nets to Timed Automata: An Untimed Approach}, pages = {216-230}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DADSS-tacas07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DADSS-tacas07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DADSS-tacas07.ps}, doi = {10.1007/978-3-540-71209-1_18}, abstract = {Time Petri Nets~(TPN) and Timed Automata~(TA) are widely-used formalisms for the modeling and analysis of timed systems. A recently-developed approach for the analysis of TPNs concerns their translation to~TAs, at which point efficient analysis tools for TAs can then be applied. One~feature of much of this previous work has been the use of timed reachability analysis on the TPN in order to construct the~TA. In this paper we present a method for the translation from TPNs to~TAs which bypasses the timed reachability analysis step. Instead, our method relies on the reachability graph of the underlying untimed Petri~net. We show that our approach is competitive for the translation of a wide class of TPNs to~TAs in comparison with previous approaches, both with regard to the time required to perform the translation, and with regard to the number of locations and clocks of the produced~TA.} }
@inproceedings{BKKL-tacas07, address = {Braga, Portugal}, month = mar, year = 2007, volume = {4424}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Grumberg, Orna and Huth, Michael}, acronym = {{TACAS}'07}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'07)}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin}, title = {Replaying Play in and Play out: Synthesis of Design Models from Scenarios by Learning}, pages = {435-450}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-tacas07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-tacas07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BKKL-tacas07.ps}, doi = {10.1007/978-3-540-71209-1_33}, abstract = {This paper is concerned with bridging the gap between requirements, provided as a set of scenarios, and conforming design models. The~novel aspect of our approach is to exploit learning for the synthesis of design models. In particular, we present a procedure that infers a message-passing automaton~(MPA) from a given set of positive and negative scenarios of the systems behavior provided as message sequence charts~(MSCs). The~paper investigates which classes of regular MSC languages and corresponding MPAs can (not) be learned, and presents a dedicated tool based on the learning library LearnLib that supports our approach.} }
@inproceedings{CJP-fossacs07, address = {Braga, Portugal}, month = mar, year = 2007, volume = 4423, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Seidl, Helmut}, acronym = {{FoSSaCS}'07}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'07)}, author = {Comon{-}Lundh, Hubert and Jacquemard, Florent and Perrin, Nicolas}, title = {Tree Automata with Memory, Visibility and Structural Constraints}, pages = {168-182}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CJP-fossacs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CJP-fossacs07.pdf}, doi = {10.1007/978-3-540-71389-0_13}, abstract = {Tree automata with one memory have been introduced in~2001. They generalize both pushdown (word) automata and the tree automata with constraints of equality between brothers of Bogaert and Tison. Though it has a decidable emptiness problem, the main weakness of this model is its lack of good closure properties. We~propose a generalization of the visibly pushdown automata of Alur and Madhusudan to a family of tree recognizers which carry along their (bottom-up) computation an auxiliary unbounded memory with a tree structure (instead of a symbol stack). In~other words, these recognizers, called visibly Tree Automata with Memory~(VTAM) define a subclass of tree automata with one memory enjoying Boolean closure properties. We show in particular that they can be determinized and the problems like emptiness, inclusion and universality are decidable for~VTAM. Moreover, we propose an extension of VTAM whose transitions may be constrained by structural equality and disequality tests between memories, and show that this extension preserves the good closure and decidability properties. } }
@inproceedings{LMO-fossacs07, address = {Braga, Portugal}, month = mar, year = 2007, volume = 4423, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Seidl, Helmut}, acronym = {{FoSSaCS}'07}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'07)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Oreiby, Ghassan}, title = {On the Expressiveness and Complexity of~{ATL}}, pages = {243-257}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMO-fossacs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LMO-fossacs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LMO-fossacs07.ps}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LMO-lmcs08-erratum.pdf}, doi = {10.1007/978-3-540-71389-0_18}, abstract = {ATL is a temporal logic geared towards the specification and verification of properties in multi-agents systems. It allows to reason on the existence of strategies for coalitions of agents in order to enforce a given property. We prove that the standard definition of~ATL (built on modalities {"}Next{"}, {"}Always{"} and~{"}Until{"}) has to be completed in order to express the duals of its modalities: it~is necessary to add the modality {"}Release{"}. We~then precisely characterize the complexity of ATL model-checking when the number of agents is not fixed. We prove that it is \(\Delta_{2}^{P}\) and \(\Delta_{3}^{P}\)-complete, depending on the underlying multi-agent model (ATS and CGS,~resp.). We also prove that~ATL\({}^{+}\) model-checking is \(\Delta_{3}^{P}\)-complete over both models, even with a fixed number of agents.} }
@inproceedings{BLM-fossacs07, address = {Braga, Portugal}, month = mar, year = 2007, volume = 4423, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Seidl, Helmut}, acronym = {{FoSSaCS}'07}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'07)}, author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas}, title = {Model-Checking One-Clock Priced Timed Automata}, pages = {108-122}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLM-fossacs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLM-fossacs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BLM-fossacs07.ps}, doi = {10.1007/978-3-540-71389-0_9}, abstract = {We consider the model of priced (a.k.a.~weighted) timed automata, an extension of timed automata with cost information on both locations and transitions. We prove that model-checking this class of models against the logic~WCTL, CTL~with cost-constrained modalities, is PSPACE-complete under the {"}single-clock{"} assumption. In~contrast, it~has been recently proved that the model-checking problem is undecidable for this model as soon as the system has three clocks. We also prove that the model-checking of~WCTL becomes undecidable, even under this {"}single-clock{"} assumption. } }
@article{DLN-icomp2006, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Demri, St{\'e}phane and Lazi{\'c}, Ranko and Nowak, David}, title = {On the freeze quantifier in constraint~{LTL}: Decidability and complexity}, pages = {2-24}, year = {2007}, month = jan, volume = 205, number = 1, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLN-icomp06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DLN-icomp06.pdf}, doi = {10.1016/j.ic.2006.08.003}, abstract = {Constraint LTL, a generalisation of LTL over Presburger constraints, is often used as a formal language to specify the behavior of operational models with constraints. The freeze quantifier can be part of the language, as in some real-time logics, but this variable-binding mechanism is quite general and ubiquitous in many logical languages (first-order temporal logics, hybrid logics, logics for sequence diagrams, navigation logics, logics with \(\lambda\)-abstraction,~etc.). We show that Constraint~LTL over the simple domain~\(\langle\mathbb{N}, =\rangle\) augmented with the freeze quantifier is undecidable which is a surprising result in view of the poor language for constraints (only equality tests). Many versions of freeze-free Constraint LTL are decidable over domains with qualitative predicates and our undecidability result actually establishes \(\Sigma_{1}^{1}\)-completeness. On the positive side, we provide complexity results when the domain is finite ({\scshape ExpSpace}-completeness) or when the formulae are flat in a sense introduced in the paper. Our undecidability results are sharp (\emph{i.e.}~with restrictions on the number of variables) and all our complexity characterisations ensure completeness with respect to some complexity class (mainly {\scshape PSpace} and {\scshape ExpSpace}).} }
@article{DN-ijfcs07, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Demri, St{\'e}phane and Nowak, David}, title = {Reasoning about transfinite sequences}, year = 2007, volume = {18}, number = {1}, pages = {87-112}, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DN-ijfcs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DN-ijfcs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DN-ijfcs07.ps}, doi = {10.1142/S0129054107004589}, abstract = {We introduce a family of temporal logics to specify the behavior of systems with Zeno behaviors. We~extend linear-time temporal logic LTL to authorize models admitting Zeno sequences of actions and quantitative temporal operators indexed by ordinals replace the standard next-time and until future-time operators. Our aim is to control such systems by designing controllers that safely work on \(\omega\)-sequences but interact synchronously with the system in order to restrict their behaviors. We show that the satisfiability and model-checking for the logics working on \(\omega^{k}\)-sequences is \textsc{expspace}-complete when the integers are represented in binary, and pspace-complete with a unary representation. To do so, we substantially extend standard results about LTL by introducing a new class of succinct ordinal automata that can encode the interaction between the different quantitative temporal operators. } }
@inproceedings{BCD-stacs2007, address = {Aachen, Germany}, month = feb, year = 2007, volume = 4393, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Thomas, Wolfgang and Weil, Pascal}, acronym = {{STACS}'07}, booktitle = {{P}roceedings of the 24th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'07)}, author = {Bursuc, Sergiu and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Associative-Commutative Deducibility Constraints}, pages = {634-645}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCD-stacs07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCD-stacs07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCD-stacs07.ps}, doi = {10.1007/978-3-540-70918-3_54}, abstract = {We consider deducibility constraints, which are equivalent to particular Diophantine systems, arising in the automatic verification of security protocols, in presence of associative and commutative symbols. We show that deciding such Diophantine systems is, in general, undecidable. Then, we consider a simple subclass, which we show decidable. Though the solutions of these problems are not necessarily semi-linear sets, we show that there are (computable) semi-linear sets whose minimal solutions are not too far from the minimal solutions of the system. Finally, we consider a small variant of the problem, for which there is a much simpler decision algorithm. } }
@article{BBBR-fmsd06, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Bruy{\`e}re, V{\'e}ronique and Raskin, Jean-Fran{\c{c}}ois}, title = {On the optimal reachability problem on weighted timed automata}, volume = 31, number = 2, year = 2007, month = oct, pages = {135-175}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBR-FMSD06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBR-FMSD06.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBBR-FMSD06.ps}, doi = {10.1007/s10703-007-0035-4}, abstract = {We study the cost-optimal reachability problem for weighted timed automata such that positive and negative costs are allowed on edges and locations. By~optimality, we mean an infimum cost as well as a supremum cost. We show that this problem is PSPACE-complete. Our~proof uses techniques of linear programming, and thus exploits an important property of optimal runs : their time-transitions use a time which is arbitrarily closed to an integer. We~then propose an extension of the region graph, the weighted discrete graph, whose structure gives light on the way to solve the cost-optimal reachability problem. We~also give an application of the cost-optimal reachability problem in the context of timed games.} }
@article{BBL-fmsd06, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Bouyer, Patricia and Brinksma, Ed and Larsen, Kim G.}, title = {Optimal Infinite Scheduling for Multi-Priced Timed Automata}, volume = {32}, number = {1}, pages = {2-23}, year = 2008, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-FMSD04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-FMSD04.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BBL-FMSD04.ps}, doi = {10.1007/s10703-007-0043-4}, abstract = {This paper is concerned with the derivation of infinite schedules for timed automata that are in some sense optimal. To~cover a wide class of optimality criteria we start out by introducing an extension of the (priced) timed automata model that includes both costs and rewards as separate modelling features. A~precise definition is then given of what constitutes optimal infinite behaviours for this class of models. We subsequently show that the derivation of optimal non-terminating schedules for such double-priced timed automata is computable. This is done by a reduction of the problem to the determination of optimal mean-cycles in finite graphs with weighted edges. This reduction is obtained by introducing the so-called corner-point abstraction, a~powerful abstraction technique of which we show that it preserves optimal schedules.} }
@article{BBS-arxiv05, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Baier, Christel and Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {Verifying nondeterministic probabilistic channel systems against {{\(\omega\)}}-regular linear-time properties}, year = 2007, volume = 9, number = 1, nopages = {}, month = dec, url = {http://arxiv.org/abs/cs.LO/0511023}, pdf = {http://arxiv.org/pdf/cs.LO/0511023}, ps = {http://arxiv.org/ps/cs.LO/0511023}, doi = {10.1145/1297658.1297663}, abstract = {Lossy channel systems (LCS's) are systems of finite state processes that communicate via unreliable unbounded fifo channels. We introduce NPLCS's, a variant of LCS's where message losses have a probabilistic behavior while the component processes behave nondeterministically, and study the decidability of qualitative verification problems for \(\omega\)-regular linear-time properties.\par We show that ---in contrast to finite-state Markov decision processes--- the satisfaction relation for linear-time formulas depends on the type of schedulers that resolve the nondeterminism. While the qualitative model checking problems for the full class of history-dependent schedulers is undecidable, the same questions for finite-memory schedulers can be solved algorithmically. Additionally, some special kinds of reachability, or recurrent reachability, qualitative properties yield decidable verification problems for the full class of schedulers, which ---for this restricted class of problems--- are as powerful as finite-memory schedulers, or even a subclass of them.} }
@article{BC-JALC2005, journal = {Journal of Automata, Languages and Combinatorics}, author = {Bouyer, Patricia and Chevalier, Fabrice}, title = {On Conciseness of Extensions of Timed Automata}, year = 2005, volume = 10, number = 4, pages = {393-405}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC05-jalc.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BC05-jalc.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BC05-jalc.ps}, abstract = {In this paper we study conciseness of various extensions of timed automata, and prove that several features like diagonal constraints or updates lead to exponentially more concise timed models.} }
@article{Baudet05jalc, journal = {Journal of Automata, Languages and Combinatorics}, author = {Baudet, Mathieu}, title = {Random Polynomial-Time Attacks and {D}olev-{Y}ao Models}, year = 2006, volume = 11, number = 1, pages = {7-21}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bau05-jalc.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bau05-jalc.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/Bau05-jalc.ps}, abstract = {In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao models can be seen as transition systems, possibly infinite. We then extend these transition systems with computation times and probabilities. The extended models can account for normal Dolev-Yao transitions as well as nonstandard operations such as inverting a one-way function. Our main contribution consists of showing that under reasonable assumptions the extended models are equivalent to standard Dolev-Yao models as far as (safety) security properties are concerned.} }
@article{DD-icomp06, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Demri, St{\'e}phane and D'Souza, Deepak}, title = {An automata-theoretic approach to constraint~{LTL}}, year = 2007, pages = {380-415}, volume = 205, number = 3, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DD-icomp06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DD-icomp06.pdf}, doi = {10.1016/j.ic.2006.09.006}, abstract = {We consider an extension of linear-time temporal logic~(LTL) with constraints interpreted over a concrete domain. We~use a new automata-theoretic technique to show pspace decidability of the logic for the constraint systems \((\mathbb{Z}, <, =)\) and \((\mathbb{N}, <, =)\). Along the way, we give an automata-theoretic proof of a result of [Ph.~Balbiani, J.~Condotta, \textit{Computational complexity of propositional linear temporal logics based on qualitative spatial or temporal reasoning}, 2002] when the constraint system satisfies the completion property. Our decision procedures extend easily to handle extensions of the logic with past-time operators and constants, as well as an extension of the temporal language itself to monadic second order logic. Finally we show that the logic becomes undecidable when one considers constraint systems that allow a counting mechanism.} }
@article{Demri-jancl06, publisher = {Taylor \& Francis}, journal = {Journal of Applied Non-Classical Logics}, author = {Demri, St{\'e}phane}, title = {Linear-Time Temporal Logics with {P}resburger Constraints: An~Overview}, year = 2006, volume = 16, number = {3-4}, pages = {311-347}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-jancl06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-jancl06.pdf}, abstract = {We present an overview of linear-time temporal logics with Presburger constraints whose models are sequences of tuples of integers. Such formal specification languages are well-designed to specify and verify systems that can be modelled with counter systems. The paper recalls the general framework of LTL over concrete domains and presents the main decidability and complexity results related to fragments of Presburger~LTL. Related formalisms are also briefly presented.} }
@article{DrGa06tocsys, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Droste, Manfred and Gastin, Paul}, title = {On aperiodic and star-free formal power series in partially commuting variables}, year = 2008, month = may, volume = 42, number = 4, pages = {608-631}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-12.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-12.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-12.ps}, doi = {10.1007/s00224-007-9064-z}, abstract = {Formal power series over non-commuting variables have been investigated as representations of the behavior of automata with multiplicities. Here we introduce and investigate the concepts of aperiodic and of star-free formal power series over semirings and partially commuting variables. We prove that if the semiring~\(K\) is idempotent and commutative, or if \(K\) is idempotent and the variables are non-commuting, then the product of any two aperiodic series is again aperiodic. We also show that if \(K\) is idempotent and the matrix monoids over~\(K\) have a Burnside property (satisfied, \textit{e.g.}~by the tropical semiring), then the aperiodic and the star-free series coincide. This generalizes a classical result of Sch{\"u}tzenberger~(1961) for aperiodic regular languages and subsumes a result of Guaiana, Restivo and Salemi~(1992) on aperiodic trace languages. } }
@article{DrGa07tcs, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Droste, Manfred and Gastin, Paul}, title = {Weighted automata and weighted logics}, year = 2007, month = jun, volume = 380, number = {1-2}, pages = {69-86}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-13.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2005-13.ps}, doi = {10.1016/j.tcs.2007.02.055}, abstract = {Weighted automata are used to describe quantitative properties in various areas such as probabilistic systems, image compression, speech-to-text processing. The~behaviour of such an automaton is a mapping, called a formal power series, assigning to each word a weight in some semiring. We~generalize B{\"u}chi's and Elgot's fundamental theorems to this quantitative setting. We~introduce a weighted version of MSO logic and prove that, for commutative semirings, the behaviours of weighted automata are precisely the formal power series definable with particular sentences of our weighted logic. We~also consider weighted first-order logic and show that aperiodic series coincide with the first-order definable ones, if the semiring is locally finite, commutative and has some aperiodicity property.}, oldnote = {Special issue of ICALP'05. To appear. Also available as Research Report LSV-05-13, Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France, July 2005.} }
@article{LLT-icomp07, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Lafourcade, Pascal and Lugiez, Denis and Treinen, Ralf}, title = {Intruder Deduction for the Equational Theory of {A}belian Groups with Distributive Encryption}, year = 2007, volume = 205, number = 4, pages = {581-623}, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LLT-icomp07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LLT-icomp07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LLT-icomp07.ps}, doi = {10.1016/j.ic.2006.10.008}, abstract = {Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The~most successful methods to verify such protocols are based on rewriting techniques and automated deduction in order to implement or mimic the process calculus describing the execution of a protocol. We~are interested in the intruder deduction problem, that is vulnerability to passive attacks in presence of equational theories which model the protocol specification and properties of the cryptographic operators.\par In the present paper we consider the case where the encryption distributes over the operator of an Abelian group or over an exclusive-or operator. We~prove decidability of the intruder deduction problem in both cases. We~obtain a PTIME decision procedure in a restricted case, the so-called binary case.\par These decision procedures are based on a careful analysis of the proof system modeling the deductive power of the intruder, taking into account the algebraic properties of the equational theories under consideration. The~analysis of the deduction rules interacting with the equational theory relies on the manipulation of \(\mathbb{Z}\)-modules in the general case, and on results from prefix rewriting in the binary case.} }
@book{TATA07, author = {Comon{-}Lundh, Hubert and Dauchet, Max and Gilleron, R{\'e}mi and L{\"o}ding, Cristof and Jacquemard, Florent and Lugiez, Denis and Tison, Sophie and Tommasi, Marc}, title = {Tree Automata Techniques and Applications}, year = 2007, month = nov, url = {http://www.grappa.univ-lille3.fr/tata/}, nmhowpublished = {Available on: \url{http://www.grappa.univ-lille3.fr/tata}}, nmnote = {release October, 12th 2007} }
@inproceedings{AA+-pvldb08, address = {Auckland, New Zealand}, month = aug, year = 2008, volume = 1, series = {Proceedings of the {VLDB} Endowment}, publisher = {ACM Press}, editor = {Weber, Gerald}, acronym = {{VLDB}'08}, booktitle = {{P}roceedings of the 34th {I}nternational {C}onference on {V}ery {L}arge {D}ata {B}ases ({VLDB}'08)}, author = {Abiteboul, Serge and Allard, Tristan and Chatalic, {\relax Ph}ilippe and Gardarin, Georges and Ghitescu, Anca and Goasdou{\'e}, Fran{\c{c}}ois and Manolescu, Ioana and Nguyen, Benjamin and Ouazara, Mohamed and Somani, Aditya and Travers, Nicolas and Vasile, Gabriel and Zoupanos, Spyros}, title = {Web{C}ontent: efficient {P2P} warehousing of web data}, pages = {1428-1431}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Aetal-pvldb08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Aetal-pvldb08.pdf}, abstract = {We present the WebContent platform for managing distributed repositories of XML and semantic Web data. The platform allows integrating various data processing building blocks (crawling, translation, semantic annotation, full-text search, structured XML querying, and semantic querying), presented as Web services, into a large-scale efficient platform. Calls to various services are combined inside ActiveXML documents, which are XML documents including service calls. An ActiveXML optimizer is used to: (i)~efficiently distribute computations among sites; (ii)~perform XQuery-specific optimizations by leveraging an algebraic XQuery optimizer; and (iii)~given an XML query, chose among several distributed indices the most appropriate in order to answer the query.} }
@article{ABM-vldb08, publisher = {ACM Press}, journal = {The VLDB Journal}, author = {Abiteboul, Serge and Benjelloun, Omar and Milo, Tova}, title = {The Active~{XML} project: an~overview}, volume = 17, number = 5, pages = {1019-1040}, year = {2008}, month = aug, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABM-vldb08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABM-vldb08.pdf}, doi = {10.1007/s00778-007-0049-y}, abstract = {This paper provides an overview of the Active XML project developed at INRIA over the past five years. Active XML (AXML, for short), is a declarative framework that harnesses Web services for distributed data management, and is put to work in a peer-to-peer architecture.\par The model is based on AXML documents, which are XML documents that may contain embedded calls to Web services, and on AXML services, which are Web services capable of exchanging AXML documents. An AXML peer is a repository of AXML documents that acts both as a client by invoking the embedded service calls, and as a server by providing AXML services, which are generally defined as queries or updates over the persistent AXML documents.\par The approach gracefully combines stored information with data defined in an intensional manner as well as dynamic information. This simple, rather classical idea leads to a number of technically challenging problems, both theoretical and practical.\par In this paper, we describe and motivate the AXML model and language, overview the research results obtained in the course of the project, and show how all the pieces come together in our implementation.} }
@inproceedings{AMPPS-icde08, address = {Cancun, Mexico}, month = apr, year = 2008, publisher = {{IEEE} Computer Society Press}, editor = {Alonso, Gustavo and Blakeley, Jos{\'e} A. and Chen, Arbee L. P.}, acronym = {{ICDE}'08}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'08)}, author = {Abiteboul, Serge and Manolescu, Ioana and Polyzotis, Neoklis and Preda, Nicoleta and Sun, Chong}, title = {{XML} processing in {DHT} networks}, pages = {606-615}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMPPS-icde08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMPPS-icde08.pdf}, doi = {10.1109/ICDE.2008.4497469}, abstract = {We study the scalable management of XML data in P2P networks based on distributed hash tables (DHTs). We identify performance limitations in this context, and propose an array o ftechniques to lift them. First, we adapt the DHT platform to the needs of massive data processing. (This primarily consists of replacing the DHT store by an efficient native store and in streaming the communications with the DHT.) Second, we introduce a distributed hierarchical index and efficient algorithms taking advantage of this index to speed up query processing. Third, we present an innovative, XML-specific flavor of Bloom filters, to reduce data transfers entailed by query processing. Our approach is fully implemented in the KadoP DHT-based XML processing system, used in a real-life software manufacturing application. We present experiments that demonstrate the benefits of the proposed techniques.} }
@inproceedings{AMZ-icde08, address = {Cancun, Mexico}, month = apr, year = 2008, publisher = {{IEEE} Computer Society Press}, editor = {Alonso, Gustavo and Blakeley, Jos{\'e} A. and Chen, Arbee L. P.}, acronym = {{ICDE}'08}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'08)}, author = {Abiteboul, Serge and Manolescu, Ioana and Zoupanos, Spyros}, title = {{O}ptim{AX}: efficient support for data-intensive mash-ups}, pages = {1564-1567}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMZ-icde08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMZ-icde08.pdf}, doi = {10.1109/ICDE.2008.4497622}, abstract = {Mash-ups are being used in various Web-based applications of Web 2.0 which combine instantly information from different sources. Active XML (AXML, in short) language is a tool for decentralized, data-centric Web service integration. AXML document includes calls to services that may be either simple request-responses either long running subscriptions. Being fully composable and allowing resource sharing makes AXML ideal for mash-up style integration. In this demo we present how AXML can be used as a specification, optimization and distributed execution language for dynamic distributed mash-ups in varied P2P settings. We also demonstrate our AXML optimizer's (OptimAX) optimization rules and rewriting engine with a help of GUI.} }
@inproceedings{AMB-icde08, address = {Cancun, Mexico}, month = apr, year = 2008, publisher = {{IEEE} Computer Society Press}, editor = {Alonso, Gustavo and Blakeley, Jos{\'e} A. and Chen, Arbee L. P.}, acronym = {{ICDE}'08}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'08)}, author = {Abiteboul, Serge and Marinoiu, Bogdan and Bourhis, Pierre}, title = {Distributed Monitoring of Peer-to-Peer Systems}, pages = {1572-1575}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMB-icde08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMB-icde08.pdf}, doi = {10.1109/ICDE.2008.4497624}, abstract = {Observing highly dynamic Peer-to-Peer systems is essential for many applications such as fault management or business processing. We demonstrate P2PMonitor, a P2P system for monitoring such systems. Alerters deployed on the monitored peers are designed to detect particular kinds of local events. They generate streams of XML data that form the primary sources of information for P2PMonitor. The core of the system is composed of processing components implementing the operators of an algebra over data streams.\par From a user viewpoint, monitoring a P2P system can be as simple as querying an XML document. The document is an ActiveXML document that aggregates a (possibly very large) number of streams generated by alerters on the monitored peers. Behind the scene, P2PMonitor compiles the monitoring query into a distributed monitoring plan, deploys alerters and stream algebra processors and issues notifications that are sent to users.\par The system functionalities are demonstrated by simulating the supply chain of a large company.} }
@inproceedings{AMZ-icwe08, address = {Yorktown Heights, New York, USA}, month = jul, year = 2008, publisher = {{IEEE} Computer Society Press}, editor = {Schwabe, Daniel and Curbera, Francisco and Dantzig, Paul}, acronym = {{ICWE}'08}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {W}eb {E}ngineering ({ICWE}'08)}, author = {Abiteboul, Serge and Manolescu, Ioana and Zoupanos, Spyros}, title = {{O}ptim{AX}: Optimizing Distributed {A}ctive{XML} Applications}, pages = {299-310}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMZ-icwe08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMZ-icwe08.pdf}, doi = {10.1109/ICWE.2008.11}, abstract = {The Web has become a platform of choice for the deployment of complex applications involving several business partners. Typically, such applications interoperate by means of Web services, exchanging XML information.\par We present OptimAX, an optimization Web service that applies at the static level (prior to enacting an application) in order to rewrite it into one whose execution will be more performant. OptimAX builds on the ActiveXML (AXML) data-centric Web service composition language, and demonstrates how database-style techniques can be efficiently integrated in a loosely-coupled, distributed application based on Web services. OptimAX has been fully implemented and we describe its experimental performance.} }
@inproceedings{AGM-widm08, address = {Napa Valley, California, USA}, month = oct, year = 2008, publisher = {ACM Press}, editor = {Chan, Chee Yong and Polyzotis, Neoklis}, acronym = {{WIDM}'08}, booktitle = {{P}roceedings of the 10th {ACM} {I}nternational {W}orkshop on {W}eb {I}nformation and {D}ata {M}anagement ({WIDM}'08)}, author = {Abiteboul, Serge and Greenshpan, Ohad and Milo, Tova}, title = {Modeling the mashup space}, pages = {87-94}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGM-widm08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGM-widm08.pdf}, doi = {10.1145/1458502.1458517}, abstract = {We introduce a formal model for capturing the notion of mashup in its globality. The basic component in our model is the mashlet. A mashlet may query data sources, import other mashlets, use external Web services, and specify complex interaction patterns between its components. A mashlet state is modeled by a set of relations and its logic specified by datalog-style active rules. We are primarily concerned with changes in a mashlet state relations and rules. The interactions with users and other applications, as well as the consequent effects on the mashlets composition and behavior, are captured by streams of changes. The model facilitates dynamic mashlets composition, interaction and reuse, and captures the fundamental behavioral aspects of mashups.} }
@article{SAG-ercim08, publisher = {European Research Consortium for Informatics and Mathematics}, journal = {ERCIM News}, author = {Senellart, Pierre and Abiteboul, Serge and Gilleron, R{\'e}mi}, title = {Understanding the Hidden Web}, volume = 72, pages = {32-33}, year = 2008, month = jan, url = {http://ercim-news.ercim.eu/en72/special/understanding-the-hidden-web} }
@inproceedings{HCL-fsttcs08, address = {Bangalore, India}, month = dec, year = 2008, volume = 2, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Hariharan, Ramesh and Mukund, Madhavan and Vinay, V.}, acronym = {{FSTTCS}'08}, booktitle = {{P}roceedings of the 28th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'08)}, author = {Comon{-}Lundh, Hubert}, title = {About models of security protocols}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HCL-fsttcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HCL-fsttcs08.pdf}, abstract = {In this paper, mostly consisting of definitions, we~revisit the models of security protocols: we~show that the symbolic and the computational models (as~well as others) are instances of a same generic model. Our definitions are also parametrized by the security primitives, the notion of attacker and, to some extent, the process calculus.} }
@phdthesis{oreiby-these2008, author = {Oreiby, Ghassan}, title = {Logiques temporelles pour le contr{\^o}le temporis{\'e}}, year = 2008, month = dec, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-GO08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-GO08.pdf} }
@article{GLLN-mscs08, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean and Lasota, S{\l}awomir and Nowak, David}, title = {Logical Relations for Monadic Types}, volume = 18, number = 6, pages = {1169-1217}, month = dec, year = 2008, note = {81~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLLN-arxiv05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLLN-arxiv05.pdf}, doi = {10.1017/S0960129508007172}, abstract = {Logical relations and their generalisations are a fundamental tool in proving properties of lambda calculi, for example, for yielding sound principles for observational equivalence. We propose a natural notion of logical relations that is able to deal with the monadic types of Moggi's computational lambda calculus. The treatment is categorical, and is based on notions of subsconing, mono factorisation systems and monad morphisms. Our approach has a number of interesting applications, including cases for lambda calculi with non-determinism (where being in a logical relation means being bisimilar), dynamic name creation and probabilistic systems.} }
@phdthesis{bursztein-these2008, author = {Bursztein, Elie}, title = {Anticipation games. Th{\'e}orie des jeux appliqu{\'e}s {\`a} la s{\'e}curit{\'e} r{\'e}seau}, year = 2008, month = nov, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-EB08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-EB08.pdf}, futureslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/ these-AS07-slides.pdf} }
@phdthesis{sangnier-these2008, author = {Sangnier, Arnaud}, title = {V{\'e}rification de syst{\`e}mes avec compteurs et pointeurs}, year = 2008, month = nov, type = {Th{\`e}se de doctorat}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-AS07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-AS07.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/these-AS07.ps} }
@phdthesis{arapinis-these2008, author = {Arapinis, Myrto}, title = {S{\'e}curit{\'e} des protocoles cryptographiques~: d{\'e}cidabilit{\'e} et r{\'e}sultats de r{\'e}duction}, year = 2008, month = nov, type = {Th{\`e}se de doctorat}, school = {Universit{\'e} Paris~12, Cr{\'e}teil, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-MA07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/these-MA07.pdf}, futureslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/ these-FC07-slides.pdf} }
@article{BB-lmcs08, journal = {Logical Methods in Computer Science}, author = {Bollig, Benedikt}, title = {On the Expressive Power of {\(2\)}-Stack Visibly Pushdown Automata}, volume = 4, number = {4\string:16}, month = dec, year = 2008, nopages = {}, doi = {10.2168/LMCS-4(4:16)2008}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BB-lmcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BB-lmcs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BB-lmcs08.ps}, abstract = {Visibly pushdown automata are input-driven pushdown automata that recognize some non-regular context-free languages while preserving the nice closure and decidability properties of finite automata. Visibly pushdown automata with multiple stacks have been considered recently by La~Torre, Madhusudan, and Parlato, who exploit the concept of visibility further to obtain a rich automata class that can even express properties beyond the class of context-free languages. At the same time, their automata are closed under boolean operations, have a decidable emptiness and inclusion problem, and enjoy a logical characterization in terms of a monadic second-order logic over words with an additional nesting structure. These results require a restricted version of visibly pushdown automata with multiple stacks whose behavior can be split up into a fixed number of phases. In this paper, we~consider 2-stack visibly pushdown automata (i.e., visibly pushdown automata with two stacks) in their unrestricted form. We show that they are expressively equivalent to the existential fragment of monadic second-order logic. Furthermore, it turns out that monadic second-order quantifier alternation forms an infinite hierarchy wrt.~words with multiple nestings. Combining these results, we conclude that 2-stack visibly pushdown automata are not closed under complementation. Finally, we discuss the expressive power of B{\"u}chi 2-stack visibly pushdown automata running on infinite (nested) words. Extending the logic by an infinity quantifier, we can likewise establish equivalence to existential monadic second-order logic.} }
@incollection{DH-afsec08, author = {Donatelli, Susanna and Haddad, Serge}, title = {V{\'e}rification quantitative de cha{\^\i}nes de {M}arkov}, booktitle = {Approches formelles des syst{\`e}mes embarqu{\'e}s communicants}, editor = {Roux, Olivier H. and Jard, Claude}, publisher = {Herm{\`e}s}, year = 2008, month = oct, pages = {177-198}, chapter = 6, url = {http://www.lavoisier.fr/notice/fr335499.html}, futureisbn = {} }
@incollection{CM-afsec08, author = {Cassez, Franck and Markey, Nicolas}, title = {Contr{\^o}le des syst{\`e}mes temporis{\'e}s}, booktitle = {Approches formelles des syst{\`e}mes embarqu{\'e}s communicants}, editor = {Roux, Olivier H. and Jard, Claude}, publisher = {Herm{\`e}s}, year = 2008, month = oct, pages = {105-144}, chapter = 4, url = {http://www.lavoisier.fr/notice/fr335499.html}, nops = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/.ps}, nopsgz = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PSGZ/.ps.gz}, futureisbn = {} }
@article{CD-fmsd08, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Safely Composing Security Protocols}, volume = 34, number = 1, pages = {1-36}, month = feb, year = 2009, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-fmsd08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-fmsd08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CD-fmsd08.ps}, doi = {10.1007/s10703-008-0059-4}, abstract = {Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of an active attacker that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols are executed, possibly sharing some common keys like public keys or long-term symmetric keys.\par In this paper, we show that security of protocols can be easily composed. More precisely, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols satisfying a reasonable (syntactic) condition are executed. This result holds for a large class of security properties that encompasses secrecy and various formulations of authentication.} }
@inproceedings{GGJ-wrs08, address = {Castle of Hagenberg, Austria}, month = apr, year = 2009, volume = 237, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Middeldorp, Aart}, acronym = {{WRS}'08}, booktitle = {{P}roceedings of the 8th {I}nternational {W}orkshop on {R}eduction {S}trategies in {R}ewriting and {P}rogramming ({WRS}'08)}, author = {Gasc{\'o}n, Adri{\`a} and Godoy, Guillem and Jacquemard, Florent}, title = {Closure of Tree Automata Languages under Innermost Rewriting}, pages = {23-38}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GGJ-wrs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GGJ-wrs08.pdf}, doi = {10.1016/j.entcs.2009.03.033}, abstract = {Preservation of regularity by a term rewriting system~(TRS) states that the set of reachable terms from a tree automata~(TA) language (a.k.a.~regular term set) is also a TA language. It~is an important and useful property, and there have been many works on identifying classes of TRS ensuring~it; unfortunately, regularity is not preserved for restricted classes of TRS like shallow~TRS. Nevertheless, this property has not been studied for important strategies of rewriting like the innermost strategy which corresponds to the call by value computation of programming languages.\par We prove that the set of innermost-reachable terms from a TA language by a shallow TRS is not necessarily regular, but it can be recognized by a TA with equality and disequality constraints between brothers. As~a consequence we conclude decidability of regularity of the reachable set of terms from a TA language by innermost rewriting and shallow TRS. This result is in contrast with plain (not necessarily innermost) rewriting for which we prove undecidability. We also show that, like for plain rewriting, innermost rewriting with linear and right-shallow TRS preserves regularity.} }
@misc{NM-AV2008, author = {Markey, Nicolas}, title = {Infinite Runs In Weighted Times Games with Energy Constraints}, year = 2008, month = aug, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/.pdf}, howpublished = {Invited talk, Workshop {A}utomata and {V}erification ({AV}'08), Mons, Belgium} }
@misc{PB-AV2008, author = {Bouyer, Patricia}, title = {Probabilities in Timed Automata}, year = 2008, month = aug, noslides = {}, howpublished = {Invited talk, Workshop {A}utomata and {V}erification ({AV}'08), Mons, Belgium} }
@misc{PhS-AV2008, author = {Schnoebelen, {\relax Ph}ilippe}, title = {The complexity of lossy channel systems}, year = 2008, month = aug, noslides = {}, howpublished = {Invited talk, Workshop {A}utomata and {V}erification ({AV}'08), Mons, Belgium} }
@inproceedings{EB-fast08, address = {Malaga, Spain}, month = apr, year = 2009, volume = 5491, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua and Martinelli, Fabio}, acronym = {{FAST}'08}, booktitle = {{R}evised {S}elected {P}apers of the 5th {I}nternational {W}orkshop on {F}ormal {A}spects in {S}ecurity and {T}rust ({FAST}'08)}, author = {Bursztein, Elie}, title = {Extending Anticipation Games with Location, Penalty and Timeline}, pages = {272-286}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/eb-fast08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/eb-fast08.pdf}, doi = {10.1007/978-3-642-01465-9_18}, abstract = {Over the last few years, attack graphs have became a well recognized tool to analyze and model complex network attack. The most advanced evolution of attack graphs, called anticipation games, is based on game theory. However even if anticipation games allow to model time, collateral effects and player interactions with the network, there is still key aspects of the network security that cannot be modeled in this framework. Theses aspects are network cooperation to fight unknown attack, the cost of attack based on its duration and the introduction of new attack over the time. In this paper we address these needs, by introducing a three-fold extension to anticipation games. We prove that this extension does not change the complexity of the framework. We illustrate the usefulness of this extension by presenting how it can be used to find a defense strategy against 0 days that use an honey net. Finally, we have implemented this extension into a prototype, to show that it can be used to analyze large networks security.} }
@inproceedings{CLC-ccs08, address = {Alexandria, Virginia, USA}, month = oct, year = 2008, publisher = {ACM Press}, acronym = {{CCS}'08}, booktitle = {{P}roceedings of the 15th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'08)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique}, title = {Computational Soundness of Observational Equivalence}, pages = {109-118}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CLC-ccs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CLC-ccs08.pdf}, doi = {10.1145/1455770.1455786}, abstract = {Many security properties are naturally expressed as indistinguishability between two versions of a protocol. In this paper, we show that computational proofs of indistinguishability can be considerably simplified, for a class of processes that covers most existing protocols. More precisely, we show a soundness theorem, following the line of research launched by Abadi and Rogaway in~2000: computational indistinguishability in presence of an active attacker is implied by the observational equivalence of the corresponding symbolic processes. We prove our result for symmetric encryption, but the same techniques can be applied to other security primitives such as signatures and public-key encryption. The proof requires the introduction of new concepts, which are general and can be reused in other settings.} }
@mastersthesis{ciobaca-master, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan}, title = {Verification of anonymity properties in e-voting protocols}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2008}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-ciobaca.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-ciobaca.pdf} }
@misc{dots-rapp-18m, author = {Fran{\c{c}}ois Laroussinie and others}, title = {Projet DOTS (ANR-06-SETI-003)~: Rapport {\`a} \(18\)~mois}, year = 2008, month = sep, type = {Contract Report}, note = {5~pages} }
@misc{dots-rapp-12m, author = {Fran{\c{c}}ois Laroussinie and others}, title = {Projet DOTS (ANR-06-SETI-003)~: Rapport {\`a} \(12\)~mois}, year = 2008, month = mar, type = {Contract Report}, note = {6~pages} }
@misc{dots-rapp-6m, author = {Fran{\c{c}}ois Laroussinie and others}, title = {Projet DOTS (ANR-06-SETI-003)~: Rapport {\`a} \(6\)~mois}, year = 2007, month = aug, type = {Contract Report}, note = {7~pages} }
@misc{dots-1.1, author = {Cassez, Franck and Laroussinie, Fran{\c{c}}ois and Lime, Didier and Markey, Nicolas}, title = {Quantitative Objectives in Timed Games}, howpublished = {Deliverable DOTS~1.1 (ANR-06-SETI-003)}, year = 2008, month = sep }
@misc{dots-3.1, author = {Bollig, Benedikt and Bouyer, Patricia and Cassez, Franck and Chatain, {\relax Th}omas and Gastin, Paul and Haddad, Serge and Jard, Claude}, title = {Model for distributed timed systems}, howpublished = {Deliverable DOTS~3.1 (ANR-06-SETI-003)}, year = 2008, month = sep }
@inproceedings{ADK-lpar08, address = {Doha, Qatar}, month = nov, year = 2008, volume = {5330}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Cervesato, Iliano and Veith, Helmut and Voronkov, Andrei}, acronym = {{LPAR}'08}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'08)}, author = {Arapinis, Myrto and Delaune, St{\'e}phanie and Kremer, Steve}, title = {From One Session to Many: Dynamic Tags for Security Protocols}, pages = {128-142}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ADK-lpar08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ADK-lpar08.pdf}, doi = {10.1007/978-3-540-89439-1_9}, abstract = {The design and verification of cryptographic protocols is a notoriously difficult task, even in abstract Dolev-Yao models. This is mainly due to several sources of unboundedness (size of messages, number of sessions,~...). In~this paper, we~present a transformation which maps a protocol that is secure for a single session to a protocol that is secure for an unbounded number of sessions. The~transformation is surprisingly simple, computationally light and works for arbitrary protocols that rely on usual cryptographic primitives, such as symmetric and asymmetric encryption as well as digital signatures. Our~result provides an effective strategy to design secure protocols: (i)~design a protocol intended to be secure for one session (this can be verified with existing automated tools); (ii)~apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. A~side-effect of this result is that we characterize a class of protocols for which secrecy for an unbounded number of sessions is decidable.} }
@inproceedings{HCL-ijcar08, address = {Sydney, Australia}, month = aug, year = 2008, volume = {5195}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Armando, Alessandro and Baumgartner, Peter and Dowek, Gilles}, acronym = {{IJCAR}'08}, booktitle = {{P}roceedings of the 4th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'08)}, author = {Comon{-}Lundh, Hubert}, title = {Challenges in the Automated Verification of Security Protocols}, pages = {396-409}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HCL-ijcar08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HCL-ijcar08.pdf}, doi = {10.1007/978-3-540-71070-7_34}, abstract = {The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.} }
@article{DKR-jcs08, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Verifying Privacy-type Properties of Electronic Voting Protocols}, volume = 17, number = 4, month = jul, year = 2009, pages = {435-487}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-jcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-jcs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DKR-jcs08.ps}, doi = {10.3233/JCS-2009-0340}, abstract = {Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. We study three privacy-type properties of electronic voting protocols: in increasing order of strength, they are vote-privacy, receipt-freeness, and coercion-resistance.\par We use the applied pi calculus, a formalism well adapted to modelling such protocols, which has the advantages of being based on well-understood concepts. The privacy-type properties are expressed using observational equivalence and we show in accordance with intuition that coercion-resistance implies receipt-freeness, which implies vote-privacy.\par We illustrate our definitions on three electronic voting protocols from the literature. Ideally, these three properties should hold even if the election officials are corrupt. However, protocols that were designed to satisfy receipt-freeness or coercion-resistance may not do so in the presence of corrupt officials. Our model and definitions allow us to specify and easily change which authorities are supposed to be trustworthy.} }
@article{DG-tcs08, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Demri, St{\'e}phane and Gascon, R{\'e}gis}, title = {Verification of Qualitative {\(\mathbb{\MakeUppercase{Z}}\)}~constraints}, volume = 409, number = 1, month = dec, year = 2008, pages = {24-40}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-tcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-tcs08.pdf}, doi = {10.1016/j.tcs.2008.07.023}, abstract = {We introduce an LTL-like logic with atomic formulae built over a constraint language interpreting variables in~\(\mathbb{Z}\). The~constraint language includes periodicity constraints, comparison constraints of the form \({x = y}\) and \({x < y}\), is~closed under Boolean operations and admits a restricted form of existential quantification. Such constraints are used for instance in calendar formalisms or abstractions of counter automata by using congruences modulo some power of two. Indeed, various programming languages perform arithmetic operators modulo some integer. We~show that the satisfiability and model-checking problems (with respect to an appropriate class of constraint automata) for this logic are decidable in polynomial space improving significantly known results about its strict fragments. This is the largest set of qualitative constraints over~\(\mathbb{Z}\) known so~far, shown to admit a decidable LTL extension.} }
@inproceedings{BCFH-valuetools08, address = {Athens, Greece}, month = oct, year = 2008, publisher = {Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering}, editor = {Chahed, Tijani and Toumpis, Stavros and Yechiali, Uri}, acronym = {{VALUETOOLS}'08}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {P}erformance {E}valuation {M}ethodologies and {T}ools ({VALUETOOLS}'08)}, author = {Beccuti, Marco and Codetta{-}Raiteri, Daniele and Franceschinis, Giuliana and Haddad, Serge}, title = {Non Deterministic Repairable Fault Trees for Computing Optimal Repair Strategy}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFH-valuetools08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFH-valuetools08.pdf}, doi = {10.4108/ICST.VALUETOOLS2008.4411}, abstract = {In~this paper, the Non deterministic Repairable Fault Tree~(NdRFT) formalism is proposed: it allows to model failure modes of complex systems as well as their repair processes. The originality of this formalism with respect to other Fault Tree extensions is that it allows to face repair strategies optimization problems: in~an NdRFT model, the decision on whether to start or not a given repair action is non deterministic, so that all the possibilities are left open. The formalism is rather powerful allowing to specify which failure events are observable, whether local repair or global repair can be applied, and the resources needed to start a repair action. The optimal repair strategy can then be computed by solving an optimization problem on a Markov Decision Process~(MDP) derived from the NdRFT. A~software framework is proposed in order to perform in automatic way the derivation of an MDP from a NdRFT model, and to deal with the solution of the MDP.} }
@article{DDMR-fmsd08, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {De{~}Wulf, Martin and Doyen, Laurent and Markey, Nicolas and Raskin, Jean-Fran{\c{c}}ois}, title = {Robust Safety of Timed Automata}, year = 2008, month = dec, volume = 33, number = {1-3}, pages = {45-84}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDMR-fmsd08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDMR-fmsd08.pdf}, doi = {10.1007/s10703-008-0056-7}, abstract = {Timed automata are governed by an idealized semantics that assumes a perfectly precise behavior of the clocks. The traditional semantics is not robust because the slightest perturbation in the timing of actions may lead to completely different behaviors of the automaton. Following several recent works, we consider a relaxation of this semantics, in which guards on transitions are widened by~\(\Delta>0\) and clocks can drift by~\(\epsilon>0\). The relaxed semantics encompasses the imprecisions that are inevitably present in an implementation of a timed automaton, due to the finite precision of digital clocks.\par We solve the safety verification problem for this robust semantics: given a timed automaton and a set of bad states, our algorithm decides if there exist positive values for the parameters~\(\Delta\) and~\(\epsilon\) such that the timed automaton never enters the bad states under the relaxed semantics.} }
@inproceedings{Bur-atva08, address = {Seoul, Korea}, month = oct, year = {2008}, volume = 5311, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cha, Sungdeok and Choi, Jin-Young and Kim, Moonzoo and Lee, Insup and Viswanathan, Mahesh}, acronym = {{ATVA}'08}, booktitle = {{P}roceedings of the 6th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'08)}, author = {Bursztein, Elie}, title = {Net{Q}i: A~Model Checker for Anticipation Game}, pages = {246-251}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bur-atva08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bur-atva08.pdf}, doi = {10.1007/978-3-540-88387-6_22}, abstract = {NetQi is a freely available model-checker designed to analyze network incidents such as intrusion. This tool is an implementation of the anticipation game framework, a variant of timed game tailored for network analysis. The main purpose of NetQi is to find, given a network initial state and a set of rules, the best strategy that fulfills player objectives by model-checking the anticipation game and comparing the outcome of each play that fulfills strategy constraints. For instance, it can be used to find the best patching strategy. NetQi has been successfully used to analyze service failure due to hardware, network intrusion, worms and multiple-site intrusion defense cooperation.} }
@inproceedings{ACEF-rp08, address = {Liverpool, UK}, month = dec, year = 2008, volume = 223, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Halava, Vesa and Potapov, Igor}, acronym = {{RP}'08}, booktitle = {{P}roceedings of the 2nd {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'08)}, author = {Andr{\'e}, {\'E}tienne and Chatain, {\relax Th}omas and Encrenaz, Emmanuelle and Fribourg, Laurent}, title = {An Inverse Method for Parametric Timed Automata}, pages = {29-46}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACEF-rp08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACEF-rp08.pdf}, doi = {10.1016/j.entcs.2008.12.029}, abstract = {Given a timed automaton with parametric timings, our objective is to describe a procedure for deriving constraints on the parametric timings in order to ensure that, for~each value of parameters satisfying these constraints, the behaviors of the timed automata are time-abstract equivalent. We~will exploit a reference valuation of the parameters that is supposed to capture a characteristic proper behavior of the system. The~method has been implemented and is illustrated on various examples of asynchronous circuits.} }
@inproceedings{BFS-infinity08, optaddress = {Toronto, Canada}, month = jul, year = 2009, volume = 239, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Habermehl, Peter and Vojnar, Tom{\'a}{\v{s}}}, acronym = {{INFINITY}'06,'07,'08}, booktitle = {{J}oint {P}roceedings of the 8th, 9th and 10th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'06,'07,'08)}, author = {Bouchy, Florent and Finkel, Alain and Sangnier, Arnaud}, title = {Reachability in Timed Counter Systems}, pages = {167-178}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFS-infinity08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFS-infinity08.pdf}, doi = {10.1016/j.entcs.2009.05.038}, abstract = {We introduce Timed Counter Systems, a~new class of systems mixing clocks and counters. Such systems have an infinite state space, hence their reachability problems are undecidable. By~abstracting clock values with a Region Graph, we~show the Counter Reachability Problem to be decidable for three subclasses: Timed~VASS, Bounded Timed Counter Systems, and Reversal-Bounded Timed Counter Systems.} }
@proceedings{HV-infinity2008, title = {{J}oint {P}roceedings of the 8th, 9th and 10th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'06,'07,'08)}, booktitle = {{J}oint {P}roceedings of the 8th, 9th and 10th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'06,'07,'08)}, optacronym = {{INFINITY}'06,'07,'08}, editor = {Habermehl, Peter and Vojnar, Tom{\'a}{\v{s}}}, publisher = {Elsevier Science Publishers}, doi = {10.1016/j.entcs.2009.05.026}, series = {Electronic Notes in Theoretical Computer Science}, volume = 239, year = 2009, month = jul, optaddress = {Toronto, Canada} }
@techreport{LSV:08:18, author = {Goubault{-}Larrecq, Jean}, title = {A Cone-Theoretic {K}rein-{M}ilman Theorem}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2008, month = jun, type = {Research Report}, number = {LSV-08-18}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-18.pdf}, note = {8~pages}, abstract = {We prove the following analogue of the Krein-Milman Theorem: in any locally convex \(T_{0}\) topological cone, every convex compact saturated subset is the compact saturated convex hull of its extreme points.} }
@inproceedings{bbjlr-formats08, address = {Saint-Malo, France}, month = sep, year = 2008, volume = 5215, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cassez, Franck and Jard, Claude}, acronym = {{FORMATS}'08}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'08)}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Jurdzi{\'n}ski, Marcin and Lazi{\'c}, Ranko and Rutkowski, Micha{\l}}, title = {Average-Price and Reachability-Price Games on Hybrid Automata with Strong Resets}, pages = {63-77}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bbjlr-formats08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bbjlr-formats08.pdf}, doi = {10.1007/978-3-540-85778-5_6}, abstract = {We introduce and study hybrid automata with strong resets. They generalize o-minimal hybrid automata, a class of hybrid automata which allows modeling of complex continuous dynamics. A number of analysis problems, such as reachability testing and controller synthesis, are decidable for classes of o-minimal hybrid automata. We generalize existing decidability results for controller synthesis on hybrid automata and we establish new ones by proving that average-price and reachability-price games on hybrid systems with strong resets are decidable, provided that the structure on which the hybrid automaton is defined has a decidable first-order theory. Our proof techniques include a novel characterization of values in games on hybrid systems by optimality equations, and a definition of a new finitary equivalence relation on the states of a hybrid system which enables a reduction of games on hybrid systems to games on finite graphs. } }
@inproceedings{bflms-formats08, address = {Saint-Malo, France}, month = sep, year = 2008, volume = 5215, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cassez, Franck and Jard, Claude}, acronym = {{FORMATS}'08}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'08)}, author = {Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim G. and Markey, Nicolas and Srba, Ji{\v{r}}{\'\i}}, title = {Infinite Runs in Weighted Timed Automata with Energy Constraints}, pages = {33-47}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFLMS-formats08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFLMS-formats08.pdf}, doi = {10.1007/978-3-540-85778-5_4}, abstract = {We~study the problems of existence and construction of infinite schedules for finite weighted automata and one-clock weighted timed automata, subject to boundary constraints on the accumulated weight. More specifically, we~consider automata equipped with positive and negative weights on transitions and locations, corresponding to the production and consumption of some resource (\emph{e.g.}~energy). We~ask the question whether there exists an infinite path for which the accumulated weight for any finite prefix satisfies certain constraints (\emph{e.g.}~remains between~\(0\) and some given upper-bound). We~also consider a game version of the above, where certain transitions may be uncontrollable.} }
@article{CJP-lmcs08, journal = {Logical Methods in Computer Science}, author = {Comon{-}Lundh, Hubert and Jacquemard, Florent and Perrin, Nicolas}, title = {Visibly Tree Automata with Memory and Constraints}, year = 2008, month = jun, volume = 4, number = {2\string:8}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CJP-lmcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CJP-lmcs08.pdf}, doi = {10.2168/LMCS-4(2:8)2008}, abstract = {Tree automata with one memory have been introduced in~2001. They generalize both pushdown (word) automata and the tree automata with constraints of equality between brothers of Bogaert and Tison. Though it has a decidable emptiness problem, the main weakness of this model is its lack of good closure properties.\par We propose a generalization of the visibly pushdown automata of Alur and~Madhusudan to a family of tree recognizers which carry along their (bottom-up) computation an auxiliary unbounded memory with a tree structure (instead of a symbol stack). In~other words, these recognizers, called Visibly Tree Automata with Memory~(VTAM) define a subclass of tree automata with one memory enjoying Boolean closure properties. We~show in particular that they can be determinized and the problems like emptiness, membership, inclusion and universality are decidable for VTAM. Moreover, we propose several extensions of VTAM whose transitions may be constrained by different kinds of tests between memories and also constraints \emph{{\`a}~la} Bogaert and~Tison. We~show that some of these classes of constrained VTAM keep the good closure and decidability properties, and we demonstrate their expressiveness with relevant examples of tree languages.} }
@incollection{DG-hwa08, year = 2009, series = {EATCS Monographs in Theoretical Computer Science}, publisher = {Springer}, editor = {Kuich, Werner and Vogler, Heiko and Droste, Manfred}, booktitle = {Handbook of Weighted Automata}, author = {Droste, Manfred and Gastin, Paul}, title = {Weighted automata and weighted logics}, pages = {175-211}, chapter = 5, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-hwa08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-hwa08.pdf} }
@incollection{DG-pct08, futureaddress = {}, month = jan, year = 2009, series = {IARCS-Universities}, publisher = {Universities Press}, booktitle = {Perspectives in Concurrency Theory}, editor = {Lodaya, Kamal and Mukund, Madhavan and Ramanujam, R.}, author = {Diekert, Volker and Gastin, Paul}, title = {Local safety and local liveness for distributed systems}, pages = {86-106}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-pct08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-pct08.pdf}, abstract = {We introduce local safety and local liveness for distributed systems whose executions are modeled by Mazurkiewicz traces. We characterize local safety by local closure and local liveness by local density. Restricting to first-order definable properties, we prove a decomposition theorem in the spirit of the separation theorem for linear temporal logic. We then characterize local safety and local liveness by means of canonical local temporal logic formulae.} }
@inproceedings{ABH-dlt08, address = {Kyoto, Japan}, month = sep, year = 2008, volume = 5257, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ito, Masami and Toyama, Masafumi}, acronym = {{DLT}'08}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'08)}, author = {Atig, Mohamed Faouzi and Bollig, Benedikt and Habermehl, Peter}, title = {Emptiness of multi-pushdown automata is \(2\){ETIME}-complete}, pages = {121-133}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABH-dlt08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABH-dlt08.pdf}, doi = {10.1007/978-3-540-85780-8_9}, abstract = {We consider multi-pushdown automata, a multi-stack extension of pushdown automata that comes with a constraint on stack operations: a pop can only be performed on the first non-empty stack (which implies that we assume a linear ordering on the collection of stacks). We show that the emptiness problem for multi-pushdown automata is 2ETIME-complete wrt.~the number of stacks. Containment in 2ETIME is shown by translating an automaton into a grammar for which we can check if the generated language is empty. The lower bound is established by simulating the behavior of an alternating Turing machine working in exponential space. We also compare multi-pushdown automata with the model of bounded-phase multi-stack (visibly) pushdown automata.} }
@inproceedings{CDFPS-qest08, address = {Saint~Malo, France}, month = sep, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'08}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'08)}, author = {Chamseddine, Najla and Duflot, Marie and Fribourg, Laurent and Picaronny, Claudine and Sproston, Jeremy}, title = {Computing Expected Absorption Times for Parametric Determinate Probabilistic Timed Automata}, pages = {254-263}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDFPS-qest08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDFPS-qest08.pdf}, doi = {10.1109/QEST.2008.34}, abstract = {We consider a variant of probabilistic timed automata called \emph{parametric determinate probabilistic timed automata}. Such~automata are fully probabilistic: there~is a single distribution of outgoing transitions from each of the automaton's nodes, and~it~is possible to remain at a node only for a given amount of time. The~residence time within a node may be given in terms of a parameter, and~hence we do not assume that its concrete value is known.\par We claim that, often in practice, the maximal expected time to reach a given absorbing node of a probabilistic timed automaton can be captured using a parametric determinate probabilistic timed automaton. We give a method for computing the expected time for a parametric determinate probabilistic timed automaton to reach an absorbing node. The~method consists in constructing a variant of a Markov chain with costs (where the costs correspond to durations), and~is parametric in the sense that the expected absorption time is computed as a function of the model's parameters. The~complexity of the analysis is independent from the maximal constant bounding the values of the clocks, and is polynomial in the number of edges of the original parametric determinate probabilistic timed automaton.} }
@inproceedings{JR-rta2008, address = {Hagenberg, Austria}, month = jul, year = 2008, volume = 5117, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Voronkov, Andrei}, acronym = {{RTA}'08}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'08)}, author = {Jacquemard, Florent and Rusinowitch, Micha{\"e}l}, title = {Closure of {H}edge-Automata Languages by {H}edge Rewriting}, pages = {157-171}, doi = {10.1007/978-3-540-70590-1_11}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JR-rta08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JR-rta08.pdf}, abstact = {We consider rewriting systems for unranked ordered terms, \textit{i.e.}, trees where the number of successors of a node is not determined by its label, and is not \textit{a priori} bounded. The rewriting systems are defined such that variables in the rewrite rules can be substituted by hedges (sequences of terms) instead of just terms. Consequently, this notion of rewriting subsumes both standard term rewriting and word rewriting.\par We investigate some preservation properties for two classes of languages of unranked ordered terms under this generalization of term rewriting. The considered classes include languages of hedge automata (HA) and some extension (called CF-HA) with context-free languages in transitions, instead of regular languages.\par In particular, we show that the set of unranked terms reachable from a given HA language, using a so called inverse context-free rewrite system, is a HA language. The proof, based on a HA completion procedure, reuses and combines known techniques with non-trivial adaptations. Moreover, we prove, with different techniques, that the closure of CF-HA languages with respect to restricted context-free rewrite systems, the symmetric case of the above rewrite systems, is a CF-HA language. As a consequence, the problems of ground reachability and regular hedge model checking are decidable in both cases. We give several counter examples showing that we cannot relax the restrictions.} }
@proceedings{DJ-time2008, title = {{P}roceedings of the 15th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'08)}, booktitle = {{P}roceedings of the 15th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'08)}, editor = {Demri, St{\'e}phane and Jensen, {\relax Ch}ristian S.}, publisher = {{IEEE} Computer Society Press}, year = 2008, month = jun, address = {Montr{\'e}al, Canada} }
@article{DL-tocl08, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Demri, St{\'e}phane and Lazi{\'c}, Ranko}, title = {{LTL} with the freeze quantifier and register automata}, volume = 10, number = 3, nopages = {}, month = apr, year = 2009, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DL-tocl08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DL-tocl08.pdf}, doi = {10.1145/1507244.1507246}, abstract = {A data word is a sequence of pairs of a letter from a finite alphabet and an element from an infinite set, where the latter can only be compared for equality. To reason about data words, linear temporal logic is extended by the freeze quantifier, which stores the element at the current word position into a register, for equality comparisons deeper in the formula. By translations from the logic to alternating automata with registers and then to faulty counter automata whose counters may erroneously increase at any time, and from faulty and error-free counter automata to the logic, we obtain a complete complexity table for logical fragments defined by varying the set of temporal operators and the number of registers. In~particular, the~logic with future-time operators and \(1\)~register is decidable but not primitive recursive over finite data words. Adding past-time operators or \(1\)~more register, or switching to infinite data words, cause undecidability.} }
@inproceedings{CS-concur08, address = {Toronto, Canada}, month = aug, year = 2008, volume = 5201, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Chechik, Marsha}, acronym = {{CONCUR}'08}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'08)}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {Mixing Lossy and Perfect Fifo Channels}, pages = {340-355}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-concur08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-concur08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CS-concur08.ps}, doi = {10.1007/978-3-540-85361-9_28}, abstract = {We~consider asynchronous networks of finite-state systems communicating \emph{via} a combination of reliable and lossy fifo channels. Depending on the topology, the~reachability problem for such networks may be decidable. We~provide a complete classification of network topologies according to whether they lead to a decidable reachability problem. Furthermore, this classification can be decided in polynomial-time.} }
@inproceedings{BCHK-concur08, address = {Toronto, Canada}, month = aug, year = 2008, volume = 5201, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Chechik, Marsha}, acronym = {{CONCUR}'08}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'08)}, author = {Baldan, Paolo and Chatain, {\relax Th}omas and Haar, Stefan and K{\"o}nig, Barbara}, title = {Unfolding-based Diagnosis of Systems with an Evolving Topology}, pages = {203-217}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCHK-concur08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCHK-concur08.pdf}, doi = {10.1007/978-3-540-85361-9_19}, abstract = {We propose a framework for model-based diagnosis of systems with mobility and variable topologies, modelled as graph transformation systems. Generally speaking, model-based diagnosis is aimed at constructing explanations of observed faulty behaviours on the basis of a given model of the system. Since the number of possible explanations may be huge we exploit the unfolding as a compact data structure to store them, along the lines of previous work dealing with Petri net models. Given a model of a system and an observation, the explanations can be constructed by unfolding the model constrained by the observation, and then removing incomplete explanations in a pruning phase. The theory is formalised in a general categorical setting: constraining the system by the observation corresponds to taking a product in the chosen category of graph grammars, so that the correctness of the procedure can be proved by using the fact that the unfolding is a right adjoint and thus it preserves products. The theory thus should be easily applicable to a wide class of system models, including graph grammars and Petri nets.} }
@inproceedings{BKKL-concur08, address = {Toronto, Canada}, month = aug, year = 2008, volume = 5201, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Chechik, Marsha}, acronym = {{CONCUR}'08}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'08)}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin}, title = {{\itshape Smyle}: A Tool for Synthesizing Distributed Models from Scenarios by Learning}, pages = {162-166}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-concur08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-concur08.pdf}, doi = {10.1007/978-3-540-85361-9_15} }
@inproceedings{LV-concur08, address = {Toronto, Canada}, month = aug, year = 2008, volume = 5201, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Chechik, Marsha}, acronym = {{CONCUR}'08}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'08)}, author = {Lozes, {\'E}tienne and Villard, Jules}, title = {A Spatial Equational Logic for the Applied {{\(\pi\)}}-Calculus}, pages = {387-401}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LV-concur08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LV-concur08.pdf}, doi = {10.1007/978-3-540-85361-9_31}, abstract = {Spatial logics have been proposed to reason locally and modularly on algebraic models of distributed systems. In this paper we define the spatial equational logic A\(\pi\)L whose models are processes of the applied \(\pi\)-calculus. This extension of the \(\pi\)-calculus allows term manipulation and records communications as active substitutions in a frame, thus augmenting the underlying predefined equational theory. Our logic allows one to reason locally either on frames or on processes, thanks to static and dynamic spatial operators. We study the logical equivalences induced by various relevant fragments of~A\(\pi\)L, and~show in particular that the whole logic induces a coarser equivalence than structural congruence. We give characteristic formulae for some of these equivalences and for static equivalence. Going further into the exploration of A\(\pi\)L's expressivity, we~also show that it can eliminate standard term quantification.} }
@inproceedings{ABGMN-concur08, address = {Toronto, Canada}, month = aug, year = 2008, volume = 5201, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Chechik, Marsha}, acronym = {{CONCUR}'08}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'08)}, author = {Akshay, S. and Bollig, Benedikt and Gastin, Paul and Mukund, Madhavan and Narayan Kumar, K.}, title = {Distributed Timed Automata with Independently Evolving Clocks}, pages = {82-97}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABGMN-concur08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABGMN-concur08.pdf}, doi = {10.1007/978-3-540-85361-9_10}, abstract = { We propose a model of distributed timed systems where each component is a timed automaton with a set of local clocks that evolve at a rate independent of the clocks of the other components. A clock can be read by any component in the system, but it can only be reset by the automaton it belongs to.\par There are two natural semantics for such systems. The \emph{universal} semantics captures behaviors that hold under any choice of clock rates for the individual components. This is a natural choice when checking that a system always satisfies a positive specification. However, to check if a system avoids a negative specification, it is better to use the \emph{existential} semantics---the set of behaviors that the system can possibly exhibit under some choice of clock rates.\par We show that the existential semantics always describes a regular set of behaviors. However, in the case of universal semantics, checking emptiness turns out to be undecidable. As an alternative to the universal semantics, we propose a \emph{reactive} semantics that allows us to check positive specifications and yet describes a regular set of behaviors. } }
@inproceedings{FS-mfcs08, address = {Toru{\'n}, Poland}, month = aug, year = 2008, volume = {5162}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ochma{\'n}ski, Edward and Tyszkiewicz, Jerzy}, acronym = {{MFCS}'08}, booktitle = {{P}roceedings of the 33rd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'08)}, author = {Finkel, Alain and Sangnier, Arnaud}, title = {Reversal-bounded Counter Machines Revisited}, pages = {323-334}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-mfcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-mfcs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FS-mfcs08.ps}, doi = {10.1007/978-3-540-85238-4_26}, abstract = {We~extend the class of reversal-bounded counter machines by authorizing a finite number of alternations between increasing and decreasing mode over a given bound. We~prove that extended reversal-bounded counter machines also have effective semi-linear reachability sets. We~also prove that the property of being reversal-bounded is undecidable in general even when we fix the bound, whereas this problem becomes decidable when considering Vector Addition System with States.} }
@inproceedings{place-csl08, address = {Bertinoro, Italy}, month = sep, year = 2008, volume = 5213, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kaminski, Michael and Martini, Simone}, acronym = {{CSL}'08}, booktitle = {{P}roceedings of the 17th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'08)}, author = {Place, {\relax Th}omas}, title = {Characterization of Logics Over Ranked Tree Languages}, pages = {401-415}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/place-csl08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/place-csl08.pdf}, doi = {10.1007/978-3-540-87531-4_29}, abstract = {We study the expressive power of the logics \(\textit{EF}+\textit{F}^{-1}\), \(\Delta_{2}\), and boolean combinations of \(\Sigma_{1}\) over ranked trees. In~particular, we provide effective characterizations of those three logics using algebraic identities. Characterizations had already been obtained for those logics over unranked trees, but both the algebra and the proofs were dependant on the properties of the unranked structure and the problem remained open for ranked trees.} }
@inproceedings{BDL-csl08, address = {Bertinoro, Italy}, month = sep, year = 2008, volume = 5213, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kaminski, Michael and Martini, Simone}, acronym = {{CSL}'08}, booktitle = {{P}roceedings of the 17th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'08)}, author = {Brochenin, R{\'e}mi and Demri, St{\'e}phane and Lozes, {\'E}tienne}, title = {On~the Almighty Wand}, pages = {323-338}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-csl08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-csl08.pdf}, doi = {10.1007/978-3-540-87531-4_24}, abstract = {We investigate decidability, complexity and expressive power issues for (first-order) separation logic with one record field (herein called~SL) and its fragments. SL~can specify properties about the memory heap of programs with singly-linked lists. Separation logic with two record fields is known to be undecidable by reduction of finite satisfiability for classical predicate logic with one binary relation. Surprisingly, we~show that second-order logic is as expressive as SL and as a by-product we get undecidability of~SL. This is refined by showing that SL without the separating conjunction is as expressive as~SL, whence undecidable too. As~a consequence of this deep result, in~SL the magic wand can simulate the separating conjunction. By~contrast, we~establish that SL without the magic wand is decidable with non-elementary complexity by reduction from satisfiability for the first-order theory over finite words. Equivalence between second-order logic and separation logic extends to the case with more than one selector.} }
@inproceedings{bhhtv08ciaa, address = {San Francisco, California, USA}, month = jul, year = 2008, volume = 5148, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Ibarra, Oscar H. and Ravikumar, Bala}, acronym = {{CIAA}'08}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'08)}, author = {Bouajjani, Ahmed and Habermehl, Peter and Hol\'{\i}k, Luk{\'a}{\v{s}} and Touili, Tayssir and Vojnar, Tom{\'a}{\v{s}}}, title = {Antichain-based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata}, pages = {57-67}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bhhtv-ciaa08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bhhtv-ciaa08.pdf}, doi = {10.1007/978-3-540-70844-5_7}, abstract = {We propose new antichain-based algorithms for checking universality and inclusion of nondeterministic tree automata. We have implemented these algorithms in a prototype tool and we present experiments which show that the algorithms provide a significant improvement over the traditional determinisation-based approaches. Furthermore, we use the proposed antichain-based inclusion checking algorithm to build an abstract regular tree model checking framework based entirely on nondeterministic tree automata. We show the significantly improved efficiency of this framework on a series of experiments with verifying various programs over dynamic tree-shaped data structures linked by pointers.} }
@inproceedings{tCS-pods08, address = {Vancouver, Canada}, month = jun, year = 2008, publisher = {ACM Press}, editor = {Lenzerini, Maurizio and Lembo, Domenico}, acronym = {{PODS}'08}, booktitle = {{P}roceedings of the 27th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'08)}, author = {ten~Cate, Balder and Segoufin, Luc}, title = {{XP}ath, Transitive Closure Logic, and Nested Tree Walking Automata}, pages = {251-260}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/tCS-pods08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/tCS-pods08.pdf}, doi = {10.1145/1376916.1376952}, abstract = {We consider the navigational core of XPath, extended with two operators: the Kleene star for taking the transitive closure of path expressions, and a subtree relativisation operator, allowing one to restrict attention to a specific subtree while evaluating a subexpression. We show that the expressive power of this XPath dialect equals that of FO(MTC), first order logic extended with monadic transitive closure. We also give a characterization in terms of nested tree-walking automata. Using the latter we then proceed to show that the language is strictly less expressive than MSO. This solves an open question about the relative expressive power of FO(MTC) and MSO on trees. We~also investigate the complexity for our XPath dialect. We~show that query evaluation be done in polynomial time (combined complexity), but that satisfiability and query containment (as~well as emptiness for our automaton model) are 2ExpTime-complete (it is ExpTime-complete for Core XPath).} }
@inproceedings{ASV-pods08, address = {Vancouver, Canada}, month = jun, year = 2008, publisher = {ACM Press}, editor = {Lenzerini, Maurizio and Lembo, Domenico}, acronym = {{PODS}'08}, booktitle = {{P}roceedings of the 27th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'08)}, author = {Abiteboul, Serge and Segoufin, Luc and Vianu, Victor}, title = {Static Analysis of Active {XML} Systems}, pages = {221-230}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ASV-pods08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ASV-pods08.pdf}, doi = {10.1145/1376916.1376948}, abstract = {Active XML is a high-level specification language tailored to data-intensive, distributed, dynamic Web services. Active XML is based on XML documents with embedded function calls. The state of a document evolves depending on the result of internal function calls (local computations) or external ones (interactions with users or other services). Function calls return documents that may be active, so may activate new subtasks. The focus of the paper is on the verification of temporal properties of runs of Active XML systems, specified in a tree-pattern based temporal logic, Tree-LTL, that allows expressing a rich class of semantic properties of the application. The main results establish the boundary of decidability and the complexity of automatic verification of Tree-LTL properties.} }
@inproceedings{BBBM-qest08, address = {Saint~Malo, France}, month = sep, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'08}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'08)}, author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Markey, Nicolas}, title = {Quantitative Model-Checking of One-Clock Timed Automata under Probabilistic Semantics}, pages = {55-64}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBM-qest08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBM-qest08.pdf}, doi = {10.1109/QEST.2008.19}, abstract = {In [Baier \emph{et~al.}, \textit{Probabilistic and Topological Semantics for Timed Automata}, FSTTCS'07] a probabilistic semantics for timed automata has been defined in order to rule out unlikely (sequences of) events. The qualitative model-checking problem for LTL properties has been investigated, where the aim is to check whether a given LTL property holds with probability~\(1\) in a timed automaton, and solved for the class of single-clock timed automata.\par In this paper, we consider the quantitative model-checking problem for \(\omega\)-regular properties: we aim at computing the exact probability that a given timed automaton satisfies an \(\omega\)-regular property. We develop a framework in which we can compute a closed-form expression for this probability; we furthermore give an approximation algorithm, and finally prove that we can decide the threshold problem in that framework.} }
@article{BLM-lmcs08, journal = {Logical Methods in Computer Science}, author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas}, title = {Model Checking One-clock Priced Timed Automata}, volume = 4, number = {2\string:9}, nopages = {}, month = jun, year = 2008, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLM-lmcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLM-lmcs08.pdf}, doi = {10.2168/LMCS-4(2:9)2008}, abstract = {We consider the model of priced (a.k.a.~weighted) timed automata, an extension of timed automata with cost information on both locations and transitions, and we study various model-checking problems for that model based on extensions of classical temporal logics with cost constraints on modalities. We prove that, under the assumption that the model has only one clock, model-checking this class of models against the logic~WCTL, CTL with cost-constrained modalities, is PSPACE-complete (while it has been shown undecidable as soon as the model has three clocks). We~also prove that model checking WMTL (LTL with cost-constrained modalities) is decidable only if there is a single clock in the model and a single stopwatch cost variable (\textit{i.e.}, whose slopes lie in~\(\{0,1\}\)).} }
@inproceedings{AFFM-wollic08, address = {Edinburgh, Scotland, UK}, month = jul, year = 2008, volume = 5110, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hodges, Wilfrid and de Queiroz, Ruy}, acronym = {{WoLLIC}'08}, booktitle = {{P}roceedings of the 15th {W}orkshop on {L}ogic, {L}anguage, {I}nformation and {C}omputation ({WoLLIC}'08)}, author = {Areces, Carlos and Figueira, Diego and Figueira, Santiago and Mera, Sergio}, title = {Expressive Power and Decidability for Memory Logics}, pages = {56-68}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AFFM-wollic08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AFFM-wollic08.pdf}, doi = {10.1007/978-3-540-69937-8_7}, abstract = {Taking as inspiration the hybrid logic~\(\mathcal{HL}(\downarrow)\), we~introduce a new family of logics that we call memory logics. In~this article we~present in detail two interesting members of this family defining their formal syntax and semantics. We then introduce a proper notion of bisimulation and investigate their expressive power (in comparison with modal and hybrid logics). We~will prove that in terms of expressive power, the memory logics we discuss in this paper are more expressive than orthodox modal logic, but less expressive than~\(\mathcal{HL}(\downarrow)\). We~also establish the undecidability of their satisfiability problems.} }
@inproceedings{EF-lix06, address = {Palaiseau, France}, month = apr, year = 2008, volume = 209, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Palamidessi, Catuscia and Valencia, Franck}, acronym = {{LIX}'06}, booktitle = {{P}roceedings of the {LIX} {C}olloquium on {E}merging {T}rends in {C}oncurrency {T}heory ({LIX}'06)}, author = {Encrenaz, Emmanuelle and Fribourg, Laurent}, title = {Time Separation of Events: An Inverse Method}, pages = {135-148}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EF-lix06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/EF-lix06.pdf}, doi = {10.1016/j.entcs.2008.04.008}, abstract = {The problem of {"}time separation{"} can be stated as follows: Given a system made of several connected components, each one entailing a local delay known with uncertainty, what is the maximum time for traversing the global system? This problem is useful, \textit{e.g.} in the domain of digital circuits, for determining the global traversal time of a signal from the knowledge of bounds on the component propagation delays. The uncertainty on each component delay is given under the form of an interval. The general problem is NP-complete. We focus here on the inverse problem: we seek intervals for component delays for which the global traversal time is guaranteed to be no greater than a specified maximum. We give a polynomial time method to solve it. As a typical application, we show how to use the method in order to relax some specified local delays while preserving the maximum traversal time. This is especially useful, in the area of digital circuits, for optimizing {"}setup{"} timings of input signals (minimum timings required for stability).} }
@article{LMO-lmcs08, journal = {Logical Methods in Computer Science}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Oreiby, Ghassan}, title = {On the Expressiveness and Complexity of~{ATL}}, volume = {4}, number = {2\string:7}, month = may, year = 2008, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LMO-lmcs08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LMO-lmcs08.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LMO-lmcs08-erratum.pdf}, doi = {10.2168/LMCS-4(2:7)2008}, abstract = {ATL is a temporal logic geared towards the specification and verification of properties in multi-agents systems. It allows to reason on the existence of strategies for coalitions of agents in order to enforce a given property. We prove that the standard definition of~ATL (built on modalities {"}Next{"}, {"}Always{"} and~{"}Until{"}) has to be completed in order to express the duals of its modalities: it~is necessary to add the modality {"}Release{"}. We~then precisely characterize the complexity of ATL model-checking when the number of agents is not fixed. We prove that it is \(\Delta_{2}^{P}\) and \(\Delta_{3}^{P}\)-complete, depending on the underlying multi-agent model (ATS and CGS,~resp.). We also prove that~ATL\({}^{+}\) model-checking is \(\Delta_{3}^{P}\)-complete over both models, even with a fixed number of agents.} }
@inproceedings{BJ-ijcar08, address = {Sydney, Australia}, month = aug, year = 2008, volume = {5195}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Armando, Alessandro and Baumgartner, Peter and Dowek, Gilles}, acronym = {{IJCAR}'08}, booktitle = {{P}roceedings of the 4th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'08)}, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Automated Induction with Constrained Tree Automata}, pages = {539-553}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-ijcar08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BJ-ijcar08.pdf}, doi = {10.1007/978-3-540-71070-7_44}, abstract = {We propose a procedure for automated implicit inductive theorem proving for equational specifications made of rewrite rules with conditions and constraints. The constraints are interpreted over constructor terms (representing data values), and may express syntactic equality, disequality, ordering and also membership in a fixed tree language. Constrained equational axioms between constructor terms are supported and can be used in order to specify complex data structures like sets, sorted lists, trees, powerlists...\par Our procedure is based on tree grammars with constraints, a formalism which can describe exactly the initial model of the given specification (when it is sufficiently complete and terminating). They are used in the inductive proofs first as an induction scheme for the generation of subgoals at induction steps, second for checking validity and redundancy criteria by reduction to an emptiness problem, and third for defining and solving membership constraints.\par We show that the procedure is sound and refutationally complete. It~generalizes former test set induction techniques and yields natural proofs for several non-trivial examples presented in the paper, these examples are difficult (if not impossible) to specify and carry on automatically with other induction procedures.} }
@inproceedings{KMT-ijcar08, address = {Sydney, Australia}, month = aug, year = 2008, volume = {5195}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Armando, Alessandro and Baumgartner, Peter and Dowek, Gilles}, acronym = {{IJCAR}'08}, booktitle = {{P}roceedings of the 4th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'08)}, author = {Kremer, Steve and Mercier, Antoine and Treinen, Ralf}, title = {Proving Group Protocols Secure Against Eavesdroppers}, pages = {116-131}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-ijcar08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-ijcar08.pdf}, doi = {10.1007/978-3-540-71070-7_9}, abstract = {Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate automated verification of a particular type of security protocols, called \emph{group protocols}, in the presence of an eavesdropper, i.e., a passive attacker. The specificity of group protocols is that the number of participants is not bounded.\par Our approach consists in representing an infinite set of messages exchanged during an unbounded number of sessions, one session for each possible number of participants, as well as the infinite set of associated secrets. We use so-called visibly tree automata with memory and structural constraints (introduced recently by Comon-Lundh \textit{et~al.}) to represent over-approximations of these two sets. We~identify restrictions on the specification of protocols which allow us to reduce the attacker capabilities guaranteeing that the above mentioned class of automata is closed under the application of the remaining attacker rules. The class of protocols respecting these restrictions is large enough to cover several existing protocols, such as the GDH family, GKE, and others.} }
@inproceedings{BHHKT-wodes08, address = {Gothenburg, Sweden}, month = may, year = 2008, acronym = {{WODES}'08}, booktitle = {{P}roceedings of the 9th {W}orkshop on {D}iscrete {E}vent {S}ystems ({WODES}'08)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Hillah, Lom Messan and Kordon, Fabrice and Thierry{-}Mieg, Yann}, title = {Collision Avoidance in Intelligent Transport Systems: Towards an Application of Control Theory}, pages = {346-351}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHHKT-wodes08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHHKT-wodes08.pdf}, doi = {10.1109/WODES.2008.4605970}, abstract = {Safety is a prevalent issue in Intelligent Transport Systems~(ITS). To~ensure such a vital requirement, methodologies must offer support for the careful design and analysis of such systems. Indeed these steps must cope with temporal and spatial constraints associated with mobility rules and parallelism which induce a high complexity. Here we handle the problem of unexpected and uncontrollable vehicles which significantly endanger the traffic. In~this context, we~propose to apply discrete control theory to a model of automatic motorway in order to synthesize a controller that handles collision avoidance. This approach includes two parts: the design of a formal model and an efficient implementation based on hierarchical decision diagrams.} }
@proceedings{CKR-dagstuhl07, editor = {Chen, Liqun and Kremer, Steve and Ryan, Mark D.}, booktitle = {Formal Protocol Verification Applied}, title = {Formal Protocol Verification Applied}, year = 2008, address = {Dagstuhl, Germany}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, url = {http://drops.dagstuhl.de/portals/index.php?semnr=07421} }
@incollection{HM-mvrts08, author = {Haddad, Serge and Moreaux, Patrice}, title = {Verification of Probabilistic Systems Methods and Tools}, booktitle = {Modeling and Verification of Real-Time Systems}, editor = {Merz, Stephan and Navet, Nicolas}, year = {2008}, month = jan, pages = {289-318}, publisher = {ISTE Ltd. -- John Wiley \& Sons, Ltd.}, url = {http://www.lavoisier.fr/notice/fr1848210130.html} }
@inproceedings{BS-icalp08, address = {Reykjavik, Iceland}, month = jul, year = 2008, volume = 5126, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Damg{\aa}rd, Ivan and Goldberg, Leslie~Ann and Halld{\'o}rsson, Magn{\'u}s M. and Ing{\'o}lfsd{\'o}ttir, Anna and Walukiewicz, Igor}, acronym = {{ICALP}'08}, booktitle = {{P}roceedings of the 35th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'08)~-- {P}art~{II}}, author = {Boja{\'n}czyk, Miko{\l}aj and Segoufin, Luc}, title = {Tree languages defined in first-order logic with one quantifier alternation}, pages = {233-245}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BS-icalp08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BS-icalp08.pdf}, doi = {10.1007/978-3-540-70583-3_20}, abstract = {We study tree languages that can be defined in \(\Delta_{2}\). These are tree languages definable by a first-order formula whose quantifier prefix is~\(\exists^{*}\forall^{*}\), and simultaneously by a first-order formula whose quantifier prefix is~\(\forall^{*}\exists^{*}\), both formulas over the signature with the descendant relation. We~provide an effective characterization of tree languages definable in~\(\Delta_{2}\). This characterization is in terms of algebraic equations. Over words, the class of word languages definable in~\(\Delta_{2}\) forms a robust class, which was given an effective algebraic characterization by Pin and Weil.} }
@inproceedings{BMOW-icalp08, address = {Reykjavik, Iceland}, month = jul, year = 2008, volume = 5126, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Damg{\aa}rd, Ivan and Goldberg, Leslie~Ann and Halld{\'o}rsson, Magn{\'u}s M. and Ing{\'o}lfsd{\'o}ttir, Anna and Walukiewicz, Igor}, acronym = {{ICALP}'08}, booktitle = {{P}roceedings of the 35th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'08)~-- {P}art~{II}}, author = {Bouyer, Patricia and Markey, Nicolas and Ouaknine, Jo{\"e}l and Worrell, James}, title = {On Expressiveness and Complexity in Real-time Model Checking}, pages = {124-135}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMOW-icalp08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BMOW-icalp08.pdf}, doi = {10.1007/978-3-540-70583-3_11}, abstract = {Metric Interval Temporal Logic (MITL) is a popular formalism for expressing real-time specifications. This logic achieves decidability by restricting the precision of timing constraints, in particular, by banning so-called \emph{punctual} specifications. In~this paper we~introduce a significantly more expressive logic that can express a wide variety of punctual specifications, but whose model-checking problem has the same complexity as that of~MITL. We~conclude that for model checking the most commonly occurring specifications, such as invariance and bounded response, punctuality can be accommodated at no cost.} }
@techreport{LSV:08:10, author = {Villard, Jules and Lozes, {\'E}tienne and Treinen, Ralf}, title = {A Spatial Equational Logic for the Applied pi-calculus}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2008, month = mar, type = {Research Report}, number = {LSV-08-10}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-10.pdf}, note = {44~pages}, abstract = {Spatial logics have been proposed to reason locally and modularly on algebraic models of distributed systems. In~this paper we~investigate a spatial equational logic (A\(\pi\)L) whose models are processes of the applied \(\pi\)-calculus, an extension of the \(\pi\)-calculus allowing term manipulation modulo a predefined equational theory, and wherein communications are recorded as active substitutions in a frame. Our logic allows us to reason locally either on frames or on processes, thanks to static and dynamic spatial operators. We study the logical equivalences induced by various relevant fragments of~A\(\pi\)L, and show in particular that the whole logic induces a coarser equivalence than structural congruence. We give characteristic formulae for this new equivalence as well as for static equivalence on frames. Going further into the exploration of A\(\pi\)L's expressivity, we also show that it can eliminate standard term quantication, and that the model-checking problem for the adjunct-free fragment of A\(\pi\)L can be reduced to satisfiability of a purely first-order logic of a term algebra.} }
@inproceedings{JGL:badweeds, address = {Budapest, Hungary}, month = mar, year = 2008, volume = 5289, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Leucker, Martin}, acronym = {{RV}'08}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}untime {V}erification ({RV}'08)}, author = {Goubault{-}Larrecq, Jean and Olivain, Julien}, title = {A Smell of Orchids}, pages = {1-20}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/go-rv08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/go-rv08.pdf}, doi = {10.1007/978-3-540-89247-2_1}, abstract = {Orchids is an intrusion detection tool based on techniques for fast, on-line model-checking. Orchids detects complex, correlated strands of events with very low overhead in practice, although its detec- tion algorithm has worst-case exponential time complexity.\par The purpose of this paper is twofold. First, we explain the salient features of the basic model-checking algorithm in an intuitive way, as a form of dynamically-spawned monitors. One distinctive feature of the Orchids algorithm is that fresh monitors need to be spawned at a pos- sibly alarming rate.\par The second goal of this paper is therefore to explain how we tame the complexity of the procedure, using abstract interpretation techniques to safely kill useless monitors. This includes monitors which will provably detect nothing, but also monitors that are subsumed by others, in the sense that they will definitely fail the so-called shortest run criterion. We take the opportunity to show how the Orchids algorithm maintains its monitors sorted in such a way that the subsumption operation is effected with no overhead, and we correct a small, but definitely annoying bug in its core algorithm, as it was published in~2001.} }
@article{BCHLR08-tcs, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {B{\'e}rard, B{\'e}atrice and Cassez, Franck and Haddad, Serge and Lime, Didier and Roux, Olivier H.}, title = {When are Timed Automata Weakly Timed Bisimilar to Time {P}etri Nets?}, year = 2008, month = sep, volume = 403, number = {2-3}, pages = {202-220}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCHLR-tcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCHLR-tcs08.pdf}, doi = {10.1016/j.tcs.2008.03.030}, abstract = {In this paper, we compare Timed Automata~(TA) and Time Petri Nets~(TPN) with respect to weak timed bisimilarity. It~is already known that the class of bounded TPNs is strictly included in the class of~TA. It~is thus natural to try and identify the subclass~\(\mathcal{TA}^{\textit{wtb}}\) of~TA equivalent to some TPN for the weak timed bisimulation relation. We~give a characterization of this subclass and we show that the membership problem and the reachability problem for \(\mathcal{TA}^{\textit{wtb}}\) are PSPACE-complete. Furthermore we show that for a TA in~\(\mathcal{TA}^{\textit{wtb}}\) with integer constants, an~equivalent TPN can be built with integer bounds but with a size exponential w.r.t.~the original model. Surprisingly, using rational bounds yields a TPN whose size is linear.} }
@inproceedings{JGL-csf08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'08}, booktitle = {{P}roceedings of the 21st {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'08)}, author = {Goubault{-}Larrecq, Jean}, title = {Towards Producing Formally Checkable Security Proofs, Automatically}, pages = {224-238}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-15.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-15.pdf}, doi = {10.1109/CSF.2008.21}, abstract = {First-order logic models of security for cryptographic protocols, based on variants of the Dolev-Yao model, are now well-established tools. Given that we have checked a given security protocol~\(\pi\) using a given first-order prover, how hard is it to extract a formally checkable proof of~it, as~required in, e.g., common criteria at evaluation level~\(7\)? We~demonstrate that this is surprisingly hard: the problem is non-recursive in general. On~the practical side, we show how we can extract finite models~\(\mathcal{M}\) from a set~\(\mathcal{S}\) of clauses representing~\(\pi\), automatically, in two ways. We~then define a model-checker testing \(\mathcal{M} \models \mathcal{S}\), and show how we can instrument it to output a formally checkable proof, e.g., in~Coq. This was implemented in the \texttt{h1} tool suite. Experience on a number of protocols shows that this is practical.} }
@inproceedings{DKR-csf08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'08}, booktitle = {{P}roceedings of the 21st {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'08)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Composition of Password-based Protocols}, pages = {239-251}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-csf08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-csf08.pdf}, doi = {10.1109/CSF.2008.6}, abstract = {We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study whether resistance against guessing attacks composes when the same password is used. We model guessing attacks using a common definition based on static equivalence in a cryptographic process calculus close to the applied pi calculus. We show that resistance against guessing attacks composes in the presence of a passive attacker. However, composition does not preserve resistance against guessing attacks for an active attacker. We therefore propose a simple syntactic criterion under which we show this composition to hold. Finally, we present a protocol transformation that ensures this syntactic criterion and preserves resistance against guessing attacks.} }
@inproceedings{DKS-csf08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'08}, booktitle = {{P}roceedings of the 21st {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'08)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Steel, Graham}, title = {Formal Analysis of {PKCS}\#11}, pages = {331-344}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-csf08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-csf08.pdf}, doi = {10.1109/CSF.2008.16}, abstract = {PKCS\#11 defines an API for cryptographic devices that has been widely adopted in industry. However, it~has been shown to be vulnerable to a variety of attacks that could, for example, compromise the sensitive keys stored on the device. In~this paper, we~set out a formal model of the operation of the API, which differs from previous security API models notably in that it accounts for non-monotonic mutable global state. We~give decidability results for our formalism, and describe an implementation of the resulting decision procedure using a model checker. We~report some new attacks and prove the safety of some configurations of the API in our model.} }
@techreport{LSV:08:08, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {Presburger Functions are Piecewise Linear}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2008, month = mar, type = {Research Report}, number = {LSV-08-08}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-08.pdf}, note = {9~pages}, abstract = {In this paper we geometrically characterize sets and functions definable in the first order additive theory of the reals and the integers, a decidable extension of the Presburger arithmetic combining both integral and real variables. We introduce the notion of polinear sets, an extension of the linear sets that characterizes these sets and we prove that a function is definable in this logic if and only if it is piecewise rational linear.} }
@inproceedings{BSS-lics08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'08}, booktitle = {{P}roceedings of the 23rd {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'08)}, author = {Boja{\'n}czyk, Miko{\l}aj and Segoufin, Luc and Straubing, Howard}, title = {Piecewise Testable Tree Languages}, pages = {442-451}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BSS-lics08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BSS-lics08.pdf}, doi = {10.1109/LICS.2008.46}, abstract = {This paper presents a decidable characterization of tree languages that can be defined by a boolean combination of \(\Sigma_{1}\) formulas. This is a tree extension of the Simon theorem, which says that a string language can be defined by a boolean combination of \(\Sigma_{1}\) formulas if and only if its syntactic monoid is \(J\)-trivial. } }
@inproceedings{CS-lics08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'08}, booktitle = {{P}roceedings of the 23rd {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'08)}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {The Ordinal Recursive Complexity of Lossy Channel Systems}, pages = {205-216}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-lics08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-lics08.pdf}, doi = {10.1109/LICS.2008.47}, abstract = {We show that reachability and termination for lossy channel systems is exactly at level \(\mathcal{F}_{\omega^{\omega}}\) in the Fast-Growing Hierarchy of recursive functions, the first level that dominates all multiply-recursive functions.} }
@inproceedings{BBBBG-lics08, address = {Pittsburgh, Pennsylvania, USA}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'08}, booktitle = {{P}roceedings of the 23rd {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'08)}, author = {Baier, Christel and Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Gr{\"o}{\ss}er, Marcus}, title = {Almost-Sure Model Checking of Infinite Paths in One-Clock Timed Automata}, pages = {217-226}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBBG-lics08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBBG-lics08.pdf}, doi = {10.1109/LICS.2008.25}, abstract = { In this paper, we~define two relaxed semantics (one based on probabilities and the other one based on the topological notion of largeness) for LTL over infinite runs of timed automata which rule out unlikely sequences of events. We~prove that these two semantics match in the framework of single-clock timed automata (and~only in that framework), and prove that the corresponding relaxed model-checking problems are PSPACE-Complete. Moreover, we~prove that the probabilistic non-Zenoness can be decided for single-clock timed automata in NLOGSPACE.} }
@inproceedings{DKS-TFIT2008, address = {Taipei, Taiwan}, month = mar, year = 2008, editor = {Kuo, Tei-Wei and Cruz-Lara, Samuel}, acronym = {{TFIT}'08}, booktitle = {{P}roceedings of the 4th {T}aiwanese-{F}rench {C}onference on {I}nformation {T}echnology ({TFIT}'08)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Steel, Graham}, title = {Formal Analysis of {PKCS}\#11}, pages = {267-278}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-tfit08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-tfit08.pdf}, abstract = {PKCS\#11 defines an API for cryptographic devices that has been widely adopted in industry. However, it~has been shown to be vulnerable to a variety of attacks that could, for~example, compromise the sensitive keys stored on the device. In~this paper, we~set out a formal model of the operation of the API, which differs from previous security API models notably in that it accounts for non-monotonic mutable global state. We give decidability results for our formalism, and describe an implementation of the resulting decision procedure using a model checker. We report some new attacks and prove the safety of some configurations of the API in our model.} }
@inproceedings{poti-TFIT2008, address = {Taipei, Taiwan}, month = mar, year = 2008, editor = {Kuo, Tei-Wei and Cruz-Lara, Samuel}, acronym = {{TFIT}'08}, booktitle = {{P}roceedings of the 4th {T}aiwanese-{F}rench {C}onference on {I}nformation {T}echnology ({TFIT}'08)}, author = {Bouyer, Patricia}, title = {Model-Checking Timed Temporal Logics}, pages = {132-142}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bouyer-tfit08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bouyer-tfit08.pdf}, abstract = {In this paper, we~present several timed extensions of temporal logics, that can be used for model-checking real-time systems. We~give different formalisms and the corresponding decidability\slash complexity results. We also give intuition to explain these results.} }
@inproceedings{DRS-ifiptm08, address = {Trondheim, Norway}, month = jun, year = 2008, volume = 263, series = {IFIP Conference Proceedings}, publisher = {Springer}, editor = {Karabulut, Yuecel and Mitchell, John and Herrmann, Peter and Jensen, Christian Damsgaard}, acronym = {IFIPTM'08}, booktitle = {{P}roceedings of the 2nd {J}oint i{T}rust and {PST} {C}onferences on {P}rivacy, {T}rust {M}anagement and {S}ecurity (IFIPTM'08)}, author = {Delaune, St{\'e}phanie and Ryan, Mark D. and Smyth, Ben}, title = {Automatic verification of privacy properties in the applied pi-calculus}, pages = {263-278}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DRS-ifiptm08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DRS-ifiptm08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DRS-ifiptm08.ps}, abstract = {We develop a formal method verification technique for cryptographic protocols. We~focus on proving observational equivalences of the kind \(P \sim Q\), where the processes \(P\) and~\(Q\) have the same structure and differ only in the choice of terms. The calculus of ProVerif, a variant of the applied pi-calculus, makes some progress in this direction. We~expand the scope of ProVerif, to provide reasoning about further equivalences. We~also provide an extension which allows modelling of protocols which require global synchronisation. Finally we develop an algorithm to enable automated reasoning.\par We demonstrate the practicality of our work with two case studies.} }
@inproceedings{BFL-time08, address = {Montr{\'e}al, Canada}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, noeditor = {Demri, St{\'e}phane and Jensen, {\relax Ch}ristian S.}, acronym = {{TIME}'08}, booktitle = {{P}roceedings of the 15th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'08)}, author = {Bouchy, Florent and Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {Decomposition of Decidable First-Order Logics over Integers and Reals}, pages = {147-155}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFL-time08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFL-time08.pdf}, doi = {10.1109/TIME.2008.22}, abstract = {We tackle the issue of representing infinite sets of realvalued vectors. This paper introduces an operator for combining integer and real sets. Using this operator, we~decompose three well-known logics extending Presburger with reals. Our decomposition splits the logic into two parts: one~integer, and one decimal (\textit{i.e.},~on the interval~\([0,1[\)). We~also give some basis for an implementation of our representation.} }
@inproceedings{Bur-wistp08, address = {Sevilla, Spain}, month = may, year = 2008, volume = 5019, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Onieva, Jose A. and Sauveron, Damien and Chaumette, Serge and Gollmann, Dieter and Markantonakis, Konstantinos}, acronym = {{WISTP}'08}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {I}nformation {S}ecurity {T}heory and {P}ractices ({WISTP}'08)}, author = {Bursztein, Elie}, title = {Probabilistic Protocol Identification for Hard to Classify Protocol}, pages = {49-63}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bur-wistp08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bur-wistp08.pdf}, doi = {10.1007/978-3-540-79966-5_4}, note = {Best paper award}, abstract = {With the growing use of protocols obfuscation techniques, protocol identification for Q.O.S enforcement, traffic prohibition, and intrusion detection has became a complex task. This paper address this issue with a probabilistic identification analysis that combines multiples advanced identification techniques and returns an ordered list of probable protocols. It~combines a payload analysis with a classifier based on several discriminators, including packet entropy and size. We~show with its implementation, that it overcomes the limitations of traditional port-based protocol identification when dealing with hard to classify protocol such as peer to peer protocols. We also details how it deals with tunneled session and covert channel.} }
@inproceedings{BGMR-time08, address = {Montr{\'e}al, Canada}, month = jun, year = 2008, publisher = {{IEEE} Computer Society Press}, noeditor = {Demri, St{\'e}phane and Jensen, {\relax Ch}ristian S.}, acronym = {{TIME}'08}, booktitle = {{P}roceedings of the 15th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'08)}, author = {Brihaye, {\relax Th}omas and Ghannem, Mohamed and Markey, Nicolas and Rieg, Lionel}, title = {Good friends are hard to find!}, pages = {32-40}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGMR-time08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGMR-time08.pdf}, doi = {10.1109/TIME.2008.10}, abstract = {We focus on the problem of finding (the~size of) a~minimal winning coalition in a multi-player game. More precisely, we~prove that deciding whether there is a winning coalition of size at most~\(k\) is NP-complete, while deciding whether \(k\) is the optimal size is DP-complete. We~also study different variants of our original problem: the function problem, where the aim is to effectively compute the coalition; more succinct encoding of the game; and richer families of winning objectives.} }
@article{DGK-ijfcs08, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Diekert, Volker and Gastin, Paul and Kufleitner, Manfred}, title = {A Survey on Small Fragments of First-Order Logic over Finite Words}, volume = 19, number = 3, pages = {513-548}, year = 2008, month = jun, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DGK-ijfcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DGK-ijfcs08.pdf}, doi = {10.1142/S0129054108005802}, abstract = {We consider fragments of first-order logic over finite words. In~particular, we~deal with first-order logic with a restricted number of variables and with the lower levels of the alternation hierarchy. We~use the algebraic approach to show decidability of expressibility within these fragments. As~a byproduct, we~survey several characterizations of the respective fragments. We~give complete proofs for all characterizations and we provide all necessary background. Some of the proofs seem to be new and simpler than those which can be found elsewhere. We also give a proof of Simon's theorem on factorization forests restricted to aperiodic monoids because this is simpler and sufficient for our purpose.} }
@techreport{LSV:08:02, author = {Bursztein, Elie}, title = {Network Administrator and Intruder Strategies}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = 2008, month = feb, type = {Research Report}, number = {LSV-08-02}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-02.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-02.pdf}, note = {23~pages}, abstract = {The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator interactions with the network. In this paper we extend this framework with cost and reward in order to analyze and find player strategies. Additionally this extension allows to take into account the financial aspect of network security in the analysis. Intuitively a strategy is the best succession of actions that the administrator or the intruder can perform to achieve his objectives. Player objectives range from patching the network efficiently to compromising the most valuable network assets. We prove that finding the optimal strategy is decidable and only requires a linear memory space. Finally we show that finding strategy can be done in practice by evaluating the performance of our analyzer called NetQi.} }
@article{BFLP-sttt08, publisher = {Springer}, journal = {International Journal on Software Tools for Technology Transfer}, author = {Bardin, S{\'e}bastien and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Petrucci, Laure}, title = {{FAST}: Acceleration from theory to practice}, year = 2008, month = oct, volume = 10, number = 5, pages = {401-424}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-16.pdf}, doi = {10.1007/s10009-008-0064-3}, abstract = {Fast acceleration of symbolic transition systems~(\textsc{Fast}) is a tool for the analysis of systems manipulating unbounded integer variables. We~check safety properties by computing the reachability set of the system under study. Even if this reachability set is not necessarily recursive, we~use innovative techniques, namely symbolic representation, acceleration and circuit selection, to~increase convergence. \textsc{Fast} has proved to perform very well on case studies. This~paper describes the tool, from the underlying theory to the architecture choices. Finally, \textsc{Fast} capabilities are compared with those of other tools. A~range of case studies from the literature is investigated.} }
@misc{hcl:lecture07, author = {Comon{-}Lundh, Hubert}, title = {Soundness of abstract cryptography}, oldhowpublished = {Lecture notes, part 1. Available at \url{http://staff.aist.go.jp/h.comon-lundh/}}, year = {2007}, note = {Course notes (part~1), Symposium on Cryptography and Information Security (SCIS2008), Tokai, Japan}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CL-sac08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CL-sac08.pdf} }
@misc{bouyer-cortos06, author = {Bouyer, Patricia}, title = {Weighted Timed Automata: Model-Checking and Games}, year = {2005}, month = aug, howpublished = {Invited talk, Workshop CORTOS'06, Bonn, Germany} }
@misc{bouyer-avocs05, author = {Bouyer, Patricia}, title = {Optimal Timed Games}, year = {2005}, month = sep, howpublished = {Invited talk, 5th {I}nternational {W}orkshop on {A}utomated {V}erification of {C}ritical {S}ystems ({AVoCS}'05), Warwick, UK} }
@misc{bouyer-infinity05, author = {Bouyer, Patricia}, title = {Optimal Reachability Timed Games}, year = {2005}, month = aug, howpublished = {Invited talk, 7th {I}nternational {W}orkshop on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'05), San Francisco, USA} }
@misc{bouyer-fac04, author = {Bouyer, Patricia}, title = {Automates temporis{\'e}s, de la th{\'e}orie {\`a} l'impl{\'e}mentation}, year = {2004}, month = mar, howpublished = {Invited talk, Journ\'ees Formalisation des Activit?s Concurrentes (FAC'04), Toulouse, France} }
@inproceedings{bouyer-etr05, address = {Nancy, France}, month = sep, year = 2005, noeditor = {}, acronym = {{ETR}'05}, booktitle = {{A}ctes de la 4{\`e}me {\'E}cole {T}emps-{R}{\'e}el ({ETR}'05)}, author = {Bouyer, Patricia}, title = {An Introduction to Timed Automata}, pages = {111-123}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-etr05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-etr05.pdf} }
@inproceedings{bouyer-artist2-05, author = {Bouyer, Patricia}, title = {Foundations of Timed Systems}, booktitle = {Proc. of the ARTIST2 Summer School on Component \& Modelling, Testing \& Verification, and Statical Analysis of Embedded Systems}, address = {N{\"a}sslingen, Sweden}, month = sep # {-} # oct, year = {2005}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-nasslingen.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bouyer-nasslingen.pdf} }
@incollection{BL-litron08, author = {Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois}, title = {Model Checking Timed Automata}, booktitle = {Modeling and Verification of Real-Time Systems}, editor = {Merz, Stephan and Navet, Nicolas}, year = {2008}, month = jan, pages = {111-140}, publisher = {ISTE Ltd. -- John Wiley \& Sons, Ltd.}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BL-litron08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BL-litron08.pdf} }
@misc{Demri0506, author = {Demri, St{\'e}phane}, title = {Temporal logics}, year = {2005}, note = {Course notes, {M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-2.8-TL.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-2.8-TL.pdf} }
@misc{Demri0304, author = {Demri, St{\'e}phane}, title = {Complexit{\'e} algorithmique de variantes de {LTL} pour la v{\'e}rification}, year = {2004}, note = {Course notes, {DEA} Algorithmique, Paris, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-coursLTL.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Demri-coursLTL.pdf} }
@article{PPSLBCH-commag08, publisher = {{IEEE} Communications Society}, journal = {IEEE Communications Magazine}, author = {Papadimitratos, Panos and Poturalski, Marcin and Schaller, Patrick and Lafourcade, Pascal and Basin, David and {\v{C}}apkun, Srdjan and Hubaux, Jean-Pierre}, title = {Secure Neighborhood Discovery: A~Fundamental Element for Mobile Ad Hoc Networking}, year = 2008, month = feb, volume = 46, number = 2, pages = {132-139}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PPSLBCH-commag08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PPSLBCH-commag08.pdf}, doi = {10.1109/MCOM.2008.4473095}, abstract = {Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood Discovery~(ND), namely, the discovery of devices directly reachable for communication or in physical proximity, becomes a fundamental requirement and a building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications. Thus, providing methods to mitigate this vulnerability and to secure ND is crucial. In~this article, we~focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed a difficult and largely open problem. Moreover, given the severity of the problem, we advocate the need to formally model neighborhood and to analyze ND schemes.} }
@misc{NB-SuMo-2006, author = {Bertrand, Nathalie}, title = {SuMo~-- Reachability analysis for lossy channels}, month = feb, year = {2006}, note = {See~\cite{BBS-forte06} for a description. Written in~OCaml (3000~lines)}, note-fr = {Voir la description dans~\cite{BBS-forte06}. {\'E}crit en~OCaml (3000~lignes)} }
@article{BK-IC08, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bollig, Benedikt and Kuske, Dietrich}, title = {{M}uller Message-Passing Automata and Logics}, volume = 206, number = {9-10}, pages = {1084-1094}, year = 2008, month = sep # {-} # oct, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BK-IC08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BK-IC08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BK-IC08.ps}, doi = {10.1016/j.ic.2008.03.010}, abstract = {We study nonterminating message-passing automata whose behavior is described by infinite message sequence charts. As~a first result, we~show that Muller, B{\"u}chi, and termination-detecting Muller acceptance are equivalent for these devices. To~describe the expressive power of these automata, we give a logical characterization. More precisely, we~show that they have the same expressive power as the existential fragment of a monadic second-order logic featuring a first-order quantifier to express that there are infinitely many elements satisfying some property. This result is based on Vinner's extension of the classical Ehrenfeucht-Fra{\"\i}ss{\'e} game to cope with the infinity quantifier.} }
@unpublished{JLC-rc, author = {Carr{\'e}, Jean-Loup}, title = {R{\'e}{\'e}criture, confluence}, year = {2007}, month = dec, note = {Course notes, {P}r{\'e}paration {\`a} l'agr{\'e}gation, ENS Cachan, France} }
@misc{averiles07-f1.6, author = {Ourghanlian, Alain and Bozga, Marius and Roglewicz, Adam and Sangnier, Arnaud}, title = {Projet {RNTL} {A}veriles~-- Fourniture F1.6~: Exp{\'e}rimentation}, year = 2007, month = sep, type = {Contract Report}, note = {16~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f16.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f16.pdf} }
@misc{averiles07-f1.4, author = {LIAFA and LSV and Verimag}, title = {Projet {RNTL} {A}veriles~-- Fourniture F1.4~: Prototypes d'outil}, year = 2007, month = sep, type = {Contract Report}, note = {3~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f14.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f14.pdf} }
@misc{averiles07-f1.3, author = {LIAFA and {CRIL Technology} and {EDF R\&D} and LSV and Verimag}, title = {Projet {RNTL} {A}veriles~-- Fourniture F1.3~: Algorithmes de v{\'e}rification}, year = 2007, month = sep, type = {Contract Report}, note = {19~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f13.pdf} }
@misc{averiles07-f1.2, author = {LIAFA and {CRIL Technology} and {EDF R\&D} and LSV and Verimag}, title = {Projet {RNTL} {A}veriles~-- Fourniture F1.2~: Extraction de mod{\`e}les}, year = 2007, month = sep, type = {Contract Report}, note = {19~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f12.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f12.pdf} }
@misc{averiles07-f1.1, author = {LIAFA and {CRIL Technology} and {EDF R\&D} and LSV and Verimag}, title = {Projet {RNTL} {A}veriles~-- Fourniture F1.1~: Mod{\`e}les}, year = 2007, month = sep, type = {Contract Report}, note = {6~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f11.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-f11.pdf} }
@misc{averiles07, author = {LIAFA and {CRIL Technology} and {EDF R\&D} and LSV and Verimag}, title = {Rapport {\`a} mi-parcours du projet {RNTL} {A}veriles (analyse et v{\'e}rification de logiciels embarqu{\'e}s avec structures de m{\'e}moire dynamique}, year = 2007, month = sep, type = {Contract Report}, note = {4~pages}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-MP.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/averiles-MP.pdf} }
@unpublished{PG-algo, author = {Gastin, Paul}, title = {Algorithmique}, year = {2007}, month = nov, note = {Course notes, {M}agist{\`e}re STIC, ENS Cachan, France} }
@unpublished{PG-languages, author = {Gastin, Paul}, title = {Langages formels}, year = {2007}, month = may, note = {Course notes, {M}agist{\`e}re STIC, ENS Cachan, France} }
@misc{ltl2ba-v1.1, author = {Gastin, Paul and Oddoux, Denis}, title = {LTL2BA~v1.1}, year = {2007}, month = aug, nohowpublished = {Available at http://www.lsv.ens-cachan.fr/~gastin/ltl2ba/}, note = {Written in~C++ (about 4000 lines)}, note-fr = {\'Ecrit en~C++ (environ 4000 lignes)}, url = {http://www.lsv.ens-cachan.fr/~gastin/ltl2ba/} }
@misc{gastex-v2.8, author = {Gastin, Paul}, title = {Gas{{\TeX}}: Graphs and Automata Simplified in~{{\TeX}} (v2.8)}, year = {2006}, month = nov, nohowpublished = {Available at http://www.lsv.ens-cachan.fr/~gastin/gastex/gastex.html}, note = {Written in~\TeX (about 2000 lines)}, note-fr = {\'Ecrit en~\TeX (environ 2000 lignes)}, url = {http://www.lsv.ens-cachan.fr/~gastin/gastex/gastex.html} }
@misc{pronobis-final, author = {ARC ProNoBis}, title = {ProNoBis: Probability and Nondeterminism, Bisimulations and Security~-- {R}apport Final}, year = 2007, month = oct, type = {Contract Report}, nonote = {78~slides}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/pronobis-final.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/pronobis-final.pdf} }
@misc{netanalyser-v0.7.5, author = {Bursztein, Elie}, title = {NetAnalyzer~v0.7.5}, year = {2008}, month = jan, nohowpublished = {Available at .... }, note = {Written in~C and Perl (about 25000 lines)}, note-fr = {\'Ecrit en~C et en Perl (environ 25000 lignes)} }
@misc{netqi-v1, author = {Bursztein, Elie}, title = {NetQi~v1rc1}, year = {2007}, month = dec, howpublished = {Available at \url{http://www.netqi.org/}}, note = {Written in~C and Java (about 10000 lines)}, note-fr = {\'Ecrit en~C et en Java (environ 10000 lignes)}, url = {http://www.netqi.org} }
@incollection{DiGa08Thomas, author = {Diekert, Volker and Gastin, Paul}, title = {First-order definable languages}, booktitle = {Logic and Automata: History and Perspectives}, editor = {Flum, J{\"o}rg and Gr{\"a}del, Erich and Wilke, Thomas}, publisher = {Amsterdam University Press}, series = {Texts in Logic and Games}, volume = 2, year = 2008, pages = {261-306}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-WT08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-WT08.pdf}, abstract = {We give an essentially self-contained presentation of some principal results for first-order definable languages over finite and infinite words. We~introduce the notion of a \emph{counter-free} B{\"u}chi automaton; and we relate counter-freeness to \emph{aperiodicity} and to the notion of \emph{very weak alternation}. We also show that aperiodicity of a regular \(\infty\)-language can be decided in polynomial space, if the language is specified by some B{\"u}chi automaton.} }
@proceedings{AGHMR-sasyft04, title = {Selected papers of the International Workshop on Security Analysis of Systems: Formalisms and Tools ({SASYFT}'04)}, booktitle = {Selected papers of the International Workshop on Security Analysis of Systems: Formalisms and Tools ({SASYFT}'04)}, editor = {Anantharaman, Siva and Gastin, Paul and Hains, Ga{\'e}tan and Mullins, John and Rusinowitch, Micha{\"e}l}, year = 2006, address = {Orl{\'e}ans, France}, journal = {jalc}, volume = 11, number = 1 }
@mastersthesis{bouchy-master, author = {Bouchy, Florent}, title = {Biblioth{\`e}que de m{\'e}thodes pour la classification}, school = {{M}aster {R}echerche {I}nformatique, Tours, France}, type = {Rapport de {M}aster}, year = 2005, month = sep }
@inproceedings{HMY-csndsp08, address = {Graz, Austria}, month = jul, year = 2008, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{CSNDSP}'08}, booktitle = {{P}roceedings of the 6th {S}ymposium on {C}ommunication {S}ystems, {N}etworks and {D}igital {S}ignal {P}rocessing ({CSNDSP}'08)}, author = {Haddad, Serge and Mokdad, Lynda and Youcef, Samir}, title = {Response Time Analysis of Composite Web Services}, pages = {506-510}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HMY-csndsp08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HMY-csndsp08.pdf}, abstract = {Service Oriented Computing (SOC) strives for applications with services as the fundamental items of design, and Web services acting as the enabling technology. Web services use open XML-based standards and are becoming the most important technology for communication between heterogenous business applications over Internet. In this paper, we focus on mean response times. Thus we propose analytical formulas for mean response times for structured BPEL constructors such as sequence, flow and switch. We propose also a response time formula for multi-choice pattern which is a generalization of switch constructor. Contrarily to previous studies in the literature, we consider that the servers can be heterogenous and the number of invoked elementary Web services can be variable.} }
@article{AP-ieeedeb09, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Data Engineering Bulletin}, author = {Abiteboul, Serge and Polyzotis, Neoklis}, title = {Searching Shared Content in Communities with the Data Ring}, volume = 32, number = 2, pages = {44-51}, year = 2009, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AP-ieeedeb09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AP-ieeedeb09.pdf}, doi = {}, abstract = {Information ubiquity has created a large crowd of users (most notably scientists), who could employ DBMS technology to share and search their data more effectively. Still, this user base prefers to keep its data in files that can be easily managed by applications such as spreadsheets, rather than deal with the complexity and rigidity of modern database systems.\par In this article, we describe a vision for enabling non-experts, such as scientists, to build content sharing communities in a true database fashion: declaratively. The proposed infrastructure, called the data ring, enables users to share and search their data with minimal effort; the user points to the data that should be shared, and the data ring becomes responsible for automatically indexing the data (to make it accessible), replicating it (for availability), and reorganizing its physical storage (for better query performance). We outline the salient features of our proposal, and outline recent technical advancements in realizing data rings.} }
@article{ASV-ieeedeb09, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Data Engineering Bulletin}, author = {Abiteboul, Serge and Segoufin, Luc and Vianu, Victor}, title = {Modeling and Verifying Active {XML} Artifacts}, volume = 32, number = 3, pages = {10-15}, year = 2009, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-ieeedeb09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-ieeedeb09.pdf}, doi = {} }
@article{AKSS-jvldb09, publisher = {ACM Press}, journal = {The VLDB Journal}, author = {Abiteboul, Serge and Kimelfeld, Benny and Sagiv, Yehoshua and Senellart, Pierre}, title = {On the expressiveness of probabilistic {XML} models}, volume = 18, number = 5, pages = {1041-1064}, year = 2009, month = oct, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AKSS-jvldb09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AKSS-jvldb09.pdf}, doi = {10.1007/s00778-009-0146-1}, abstract = {Various known models of probabilistic XML can be represented as instantiations of the abstract notion of \emph{p-documents}. In addition to ordinary nodes, p-documents have \emph{distributional} nodes that specify the possible worlds and their probabilistic distribution. Particular families of p-documents are determined by the types of distributional nodes that can be used as well as by the structural constraints on the placement of those nodes in a p-document. Some of the resulting families provide natural extensions and combinations of previously studied probabilistic XML models. The focus of the paper is on the expressive power of families of p-documents. In particular, two main issues are studied. The first is the ability to (efficiently) \emph{translate} a given p-document of one family into another family. The second is \emph{closure under updates}, namely, the ability to (efficiently) represent the result of updating the instances of a p-document of a given family as another p-document of that family. For both issues, we distinguish two variants corresponding to \emph{value-based} and \emph{object-based} semantics of p-documents.} }
@inproceedings{ABM-edbt09, address = {Saint Petersburg, Russia}, month = mar, year = 2009, novolume = {}, series = {ACM International Conference Proceeding Series}, publisher = {Springer}, editor = {Kersten, Martin L. and Novikov, Boris and Teubner, Jens and Polutin, Vladimir and Manegold, Stefan}, acronym = {{EDBT}'09}, booktitle = {{A}dvances in {D}atabase {T}echnology~--- {P}roceedings of the 12th {I}nternational {C}onference on {E}xtending {D}atabase {T}echnology ({EDBT}'09)}, author = {Abiteboul, Serge and Bourhis, Pierre and Marinoiu, Bogdan}, title = {Efficient maintenance techniques for views over active documents}, pages = {1076-1087}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABM-edbt09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABM-edbt09.pdf}, doi = {10.1145/1516360.1516483}, abstract = {Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when monitoring distributed autonomous systems. Our work is in this challenging context that has generated recently a lot of attention; see Web~2.0. We introduce the axlog formal model for capturing such interactions and show how this model can be supported efficiently. The central component is the axlog widget defined by one tree-pattern query or more, over an active document (in the Active XML style) that includes some input streams of updates. A widget generates a stream of updates for each query, the updates that are needed to maintain the view corresponding to the query. We exploit an array of known technologies: datalog optimization techniques such as Differential or MagicSet, constraint query languages, and efficient XML filtering (YFilter). The novel optimization technique we propose is based on fundamental new notions: a relevance (different than that of MagicSet), satisfiability and provenance for active documents. We briefly discuss an implementation of an axlog engine, an application that we used to test the approach, and results of experiments.} }
@inproceedings{AGMP-icde2009, address = {Shanghai, China}, month = mar # {-} # apr, year = 2009, publisher = {{IEEE} Computer Society Press}, editor = {Ioannidis, Yannis E. and Lee, Dik Lun and Ng, Raymond T.}, acronym = {{ICDE}'09}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'09)}, author = {Abiteboul, Serge and Greenshpan, Ohad and Milo, Tova and Polyzotis, Neoklis}, title = {Match{U}p: Autocompletion for Mashups}, pages = {1479-1482}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGMP-icde2009.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGMP-icde2009.pdf}, doi = {10.1109/ICDE.2009.47}, abstract = {A~\emph{mashup} is a Web application that integrates data, computation and GUI provided by several systems into a unique tool. The concept originated from the understanding that the number of applications available on the Web and the need for combining them to meet user requirements, are growing very rapidly. This demo presents \emph{MatchUp}, a system that supports rapid, on-demand, intuitive development of \emph{mashups}, based on a novel \emph{autocompletion} mechanism. The key observation guiding the development of \emph{MatchUp} is that mashups developed by different users typically share common characteristics; they use similar classes of mashup components and glue them together in a similar manner. \emph{MatchUp} exploits these similarities to predict, given a user's partial mashup specification, what are the most likely potential \emph{completions} (missing components and connection between them) for the specification. Using a novel ranking algorithm, users are then offered top-k completions from which they choose and refine according to their needs.} }
@inproceedings{BFLM-hscc10, address = {Stockholm, Sweden}, month = apr, year = 2010, publisher = {ACM Press}, editor = {Johansson, Karl Henrik and Yi, Wang}, acronym = {{HSCC}'10}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {H}ybrid {S}ystems: {C}omputation and {C}ontrol ({HSCC}'10)}, author = {Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim G. and Markey, Nicolas}, title = {Timed Automata with Observers under Energy Constraints}, pages = {61-70}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLM-hscc10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLM-hscc10.pdf}, doi = {10.1145/1755952.1755963}, abstract = {In this paper, we study one-clock priced timed automata in which prices can grow linearly (\(\frac{dp}{dt}=k\)) or exponentially (\(\frac{dp}{dt}=kp\)), with discontinuous updates on edges. We propose EXPTIME algorithms to decide the existence of controllers that ensure existence of infinite runs or reachability of some goal location with non-negative observer value all along the run. These algorithms consist in computing the optimal delays that should be elapsed in each location along a run, so that the final observer value is maximized (and never goes below zero).} }
@inproceedings{VLC-tacas10, address = {Paphos, Cyprus}, month = mar, year = 2010, volume = {6015}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Majumdar, Rupak}, acronym = {{TACAS}'10}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'10)}, author = {Villard, Jules and Lozes, {\'E}tienne and Calcagno, Cristiano}, title = {Tracking Heaps that Hop with Heap-Hop}, pages = {275-279}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/VLC-tacas10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/VLC-tacas10.pdf}, doi = {10.1007/978-3-642-12002-2_23}, abstract = {Heap-Hop is a program prover for concurrent heap-manipulating programs that use Hoare monitors and message-passing synchronization. Programs are annotated with pre and post-conditions and loop invariants, written in a fragment of separation logic. Communications are governed by a form of session types called contracts. Heap-Hop can prove safety and race-freedom and, thanks to contracts, absence of memory leaks and deadlock-freedom. It has been used in several case studies, including concurrent programs for copyless list transfer, service provider protocols, and load-balancing parallel tree disposal.} }
@inproceedings{DS-fossacs10, address = {Paphos, Cyprus}, month = mar, year = 2010, volume = {6014}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ong, C.-H. Luke}, acronym = {{FoSSaCS}'10}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'10)}, author = {Demri, St{\'e}phane and Sangnier, Arnaud}, title = {When Model-Checking Freeze {LTL} over Counter Machines Becomes Decidable}, pages = {176-190}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DS-fossacs10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DS-fossacs10.pdf}, doi = {10.1007/978-3-642-12032-9_13}, abstract = {We study the decidability status of model-checking freeze LTL over various subclasses of counter machines for which the reachability problem is known to be decidable (reversal-bounded counter machines, vector additions systems with states, flat counter machines, one-counter machines). In freeze LTL, a register can store a counter value and at some future position an equality test can be done between a register and a counter value. Herein, we complete an earlier work started on one-counter machines by considering other subclasses of counter machines, and especially the class of reversal-bounded counter machines. This gives us the opportuniy to provide a systematic classification that distinguishes determinism vs. nondeterminism and we consider subclasses of formulae by restricting the set of atomic formulae or\slash and the polarity of the occurrences of the freeze operators, leading to the flat fragment.} }
@inproceedings{tCF-fossacs10, address = {Paphos, Cyprus}, month = mar, year = 2010, volume = {6014}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ong, C.-H. Luke}, acronym = {{FoSSaCS}'10}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'10)}, author = {ten~Cate, Balder and Fontaine, Ga{\"e}lle}, title = {An Easy Completeness Proof for the Modal \(\mu\)-Calculus on Finite Trees}, pages = {161-175}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/tCF-fossacs10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/tCF-fossacs10.pdf}, doi = { 10.1007/978-3-642-12032-9_12}, abstract = {We give a complete axiomatization for the modal \(\mu\)-calculus on finite trees. While the completeness of our axiomatization already follows from a more powerful result by Igor Walukiewicz, our proof is easier and uses very different tools, inspired from model theory. We show that our approach generalizes to certain axiomatic extensions, and to the extension of the \(\mu\)-calculus with graded modalities. We hope that the method might be helpful for other completeness proofs as well.} }
@inproceedings{CS-fossacs10, address = {Paphos, Cyprus}, month = mar, year = 2010, volume = {6014}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ong, C.-H. Luke}, acronym = {{FoSSaCS}'10}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'10)}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {Toward a compositional theory of leftist grammars and transformations}, pages = {237-251}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-fossacs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-fossacs10.pdf}, doi = {10.1007/978-3-642-12032-9_17}, abstract = {Leftist grammars [Motwani \textit{et~al.}, STOC~2000] are special semi-Thue systems where symbols can only insert or erase to their left. We~develop a theory of leftist grammars seen as word transformers as a tool toward rigorous analyses of their computational power. Our~main contributions in this first paper are (1)~constructions proving that leftist transformations are closed under compositions and transitive closures, and (2)~a~proof that bounded reachability is NP-complete even for leftist grammars with acyclic rules.} }
@article{CDMP-apal09, publisher = {Elsevier Science Publishers}, journal = {Annals of Pure and Applied Logics}, author = {Chevalier, Fabrice and D'Souza, Deepak and Matteplackel, Raj Mohan and Prabhakar, Pavithra}, title = {Automata and logics over finitely varying functions}, year = {2009}, month = dec, volume = {161}, number = {3}, pages = {324-336}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDMP-apal09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDMP-apal09.pdf}, doi = {10.1016/j.apal.2009.07.007}, abstract = {We extend some of the classical connections between automata and logic due to B{\"u}chi~(1960) and McNaughton and Papert~(1971) to languages of finitely varying functions or {"}signals{"}. In particular, we introduce a natural class of automata for generating finitely varying functions called ST-NFAs, and show that it coincides in terms of language definability with a natural monadic second-order logic interpreted over finitely varying functions (Rabinovich, 2002). We also identify a {"}counter-free{"} subclass of ST-NFAs which characterise the first-order definable languages of finitely varying functions. Our proofs mainly factor through the classical results for word languages. These results have applications in automata characterisations for continuously interpreted real-time logics like Metric Temporal Logic (MTL) (Chevalier \emph{et~al.}, 2006,~2007).} }
@phdthesis{mercier-phd2009, author = {Mercier, Antoine}, title = {Contributions {\`a} l'analyse automatique des protocoles cryptographiques en pr{\'e}sence de propri{\'e}t{\'e}s alg{\'e}briques : protocoles de groupe, {\'e}quivalence statique}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2009, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AM-these09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AM-these09.pdf} }
@phdthesis{bursuc-phd2009, author = {Bursuc, Sergiu}, title = {Contraintes de d{\'e}ductibilit{\'e} dans une alg{\`e}bre quotient: r{\'e}duction de mod{\`e}les et applications {\`a} la s{\'e}curit{\'e}}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2009, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SB-these09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SB-these09.pdf} }
@article{schmitz-scp10, publisher = {Elsevier Science Publishers}, journal = {Science of Computer Programming}, author = {Sylvain Schmitz}, title = {An Experimental Ambiguity Detection Tool}, volume = 75, number = {1-2}, pages = {71-84}, month = jan, year = 2010, doi = {10.1016/j.scico.2009.07.002}, url = {http://hal.archives-ouvertes.fr/hal-00436398}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/schmitz-scp10.pdf}, abstract = {Although programs convey an unambiguous meaning, the grammars used in practice to describe their syntax are often ambiguous, and completed with disambiguation rules. Whether these rules achieve the removal of all the ambiguities while preserving the original intended language can be difficult to ensure. We present an experimental ambiguity detection tool for GNU Bison, and illustrate how it can assist a grammatical development for a subset of Standard~ML.} }
@incollection{CM-CES09, author = {Cassez, Franck and Markey, Nicolas}, title = {Control of Timed Systems}, booktitle = {Communicating Embedded Systems~-- Software and Design}, editor = {Jard, Claude and Roux, Olivier H.}, publisher = {Wiley-ISTE}, year = 2009, month = oct, pages = {83-120}, chapter = 3, url = {http://www.iste.co.uk/index.php?f=x&ACTION=View&id=288}, nops = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/.ps}, nopsgz = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PSGZ/.ps.gz}, isbn = {9781848211438} }
@incollection{DH-CES09, author = {Donatelli, Susanna and Haddad, Serge}, title = {Quantitative Verification of {M}arkov Chains}, booktitle = {Communicating Embedded Systems~-- Software and Design}, editor = {Jard, Claude and Roux, Olivier H.}, publisher = {Wiley-ISTE}, year = 2009, month = oct, pages = {139-163}, chapter = 5, url = {http://www.iste.co.uk/index.php?f=x&ACTION=View&id=288}, nops = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/.ps}, nopsgz = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PSGZ/.ps.gz}, isbn = {9781848211438} }
@inproceedings{CLPV-vmcai10, address = {Madrid, Spain}, month = jan, year = 2010, volume = 5944, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Barthe, Gilles and Hermenegildo, Manuel}, acronym = {{VMCAI}'10}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'10)}, author = {Chadha, Rohit and Legay, Axel and Prabhakar, Pavithra and Viswanathan, Mahesh}, title = {Complexity bounds for the verification of real-time software}, pages = {95-111}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CLPV-vmcai10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CLPV-vmcai10.pdf}, doi = {10.1007/978-3-642-11319-2_10}, abstract = {We present uniform approaches to establish complexity bounds for decision problems such as reachability and simulation, that arise naturally in the verification of timed software systems. We model timed software systems as timed automata augmented with a data store (like a pushdown stack) and show that there is at least an exponential blowup in complexity of verification when compared with untimed systems. Our proof techniques also establish complexity results for boolean programs, which are automata with stores that have additional boolean variables.} }
@article{JGL-mscs09, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {{D}e~{G}root Duality and Models of Choice: Angels, Demons, and Nature}, volume = {20}, number = 2, pages = {169-237}, month = apr, year = 2010, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-mscs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-mscs09.pdf}, doi = {10.1017/S0960129509990363}, abstract = {We introduce convex-concave duality for various models of non-deterministic choice, probabilistic choice, and the two of them together. This complements the well-known duality of stably compact spaces in a pleasing way: convex-concave duality swaps angelic and demonic choice, and leaves probabilistic choice invariant.} }
@inproceedings{JGL-asian09, address = {Seoul, Korea}, month = dec, year = 2009, volume = 5913, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Datta, Anupam}, acronym = {{ASIAN}'09}, booktitle = {{P}roceedings of the 13th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'09)}, author = {Goubault{-}Larrecq, Jean}, title = {{\textquotedbl}{L}ogic Wins!{\textquotedbl}}, pages = {1-16}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-asian09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-asian09.pdf}, doi = {10.1007/978-3-642-10622-4_1}, abstract = {Clever algorithm design is sometimes superseded by simple encodings into logic. We apply this motto to a few case studies in the formal verification of security properties. In particular, we examine confidentiality objectives in hardware circuit descriptions written in VHDL.} }
@phdthesis{chamseddine-phd2009, author = {Chamseddine, Najla}, title = {Analyse quantitative parametr{\'e}e d'automates temporis{\'e}s probabilistes}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2009, month = oct, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NC-these09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NC-these09.pdf} }
@phdthesis{bouchy-phd2009, author = {Bouchy, Florent}, title = {Logiques et mod{\`e}les pour la v{\'e}rification de syst{\`e}mes infinis}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2009, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FB-these09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FB-these09.pdf} }
@phdthesis{sznajder-phd2009, author = {Sznajder, Nathalie}, title = {Synth{\`e}se de syst{\`e}mes distribu{\'e}s ouverts}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2009, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NS-these09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/NS-these09.pdf} }
@inproceedings{SRKK-wissec09, address = {Louvain-la-Neuve, Belgium}, month = nov, year = 2009, editor = {Pereira, Olivier and Quisquater, Jean-Jacques and Standaert, Fran\c{c}ois-Xavier}, acronym = {{WISSEC}'09}, booktitle = {{P}roceedings of the 4th {B}enelux {W}orkshop on {I}nformation and {S}ystem {S}ecurity ({WISSEC}'09)}, author = {Smyth, Ben and Ryan, Mark D. and Kremer, Steve and Kourjieh, Mounira}, title = {Election verifiability in electronic voting protocols (Preliminary version)}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SRKK-wissec09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SRKK-wissec09.pdf}, abstract = {We~present a symbolic definition of election verifiability for electronic voting protocols. Our definition is given in terms of reachability assertions in the applied pi calculus and is amenable to automated reasoning using the tool ProVerif. The~definition distinguishes three aspects of verifiability, which we call individual, universal, and eligibility verifiability. It also allows us to determine precisely what aspects of the system are required to be trusted. We demonstrate our formalism by analysing the protocols due to Fujioka, Okamoto \&~Ohta and Juels, Catalano \&~Jakobsson; the~latter of which has been implemented by Clarkson, Chong \&~Myers. } }
@inproceedings{CCD-secco09, address = {Bologna, Italy}, month = oct, year = 2009, editor = {Boreale, Michele and Kremer, Steve}, acronym = {{SecCo}'09}, booktitle = {{P}reliminary {P}roceedings of the 7th {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oordination {M}odels, {L}anguages and {S}ystems ({SecCo}'09)}, author = {Cheval, Vincent and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {A~decision procedure for proving observational equivalence}, nmnote = {did not appear in postproceedings EPTCS7}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCD-secco09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCD-secco09.pdf} }
@proceedings{BK-secco2009, title = {{P}roceedings of the 7th {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oncurrency ({S}ec{C}o'09)}, booktitle = {{P}roceedings of the 7th {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oncurrency ({S}ec{C}o'09)}, acronym = {{S}ec{C}o'09}, editor = {Boreale, Michele and Kremer, Steve}, doi = {10.4204/EPTCS.7}, url = {http://eptcs.web.cse.unsw.edu.au/content.cgi?SECCO2009}, series = {Electronic Proceedings in Theoretical Computer Science}, volume = 7, year = 2009, month = aug, address = {Bologna, Italy} }
@article{bbc09-lmcs, journal = {Logical Methods in Computer Science}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Chevalier, Fabrice}, title = {O-Minimal Hybrid Reachability Games}, year = 2010, month = jan, volume = 6, number = {1:1}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBC-lmcs09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBC-lmcs09.pdf}, doi = {10.2168/LMCS-6(1:1)2010}, abstract = {In this paper, we consider reachability games over general hybrid systems, and distinguish between two possible observation frameworks for those games: either the precise dynamics of the system is seen by the players (this is the perfect observation framework), or only the starting point and the delays are known by the players (this is the partial observation framework). In the first more classical framework, we show that time-abstract bisimulation is not adequate for solving this problem, although it is sufficient in the case of timed automata. That is why we consider an other equivalence, namely the suffix equivalence based on the encoding of tra jectories through words. We show that this suffix equivalence is in general a correct abstraction for games. We apply this result to o-minimal hybrid systems, and get decidability and computability results in this framework. For the second framework which assumes a partial observation of the dynamics of the system, we propose another abstraction, called the superword encoding, which is suitable to solve the games under that assumption. In that framework, we also provide decidability and computability results.} }
@article{BCM-icomp2009, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bouyer, Patricia and Chevalier, Fabrice and Markey, Nicolas}, title = {On the Expressiveness of {TPTL} and~{MTL}}, volume = {208}, number = 2, pages = {97-116}, month = feb, year = 2010, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCM-icomp09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCM-icomp09.pdf}, doi = {10.1016/j.ic.2009.10.004}, abstract = {TPTL and MTL are two classical timed extensions of~LTL. In~this paper, we prove the 20-year-old conjecture that TPTL is strictly more expressive than~MTL. But we show that, surprisingly, the TPTL~formula proposed by Alur and Henzinger for witnessing this conjecture \emph{can} be expressed in~MTL. More generally, we show that TPTL formulae using only modality~F can be translated into~MTL.} }
@mastersthesis{dimino-m1, author = {Dimino, J{\'e}r{\'e}mie}, title = {Les syst{\`e}mes {\`a} canaux non-fiables vus comme des transducteurs}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de stage de {M1}}, year = {2009}, month = oct, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dimino-m1.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dimino-m1.pdf} }
@inproceedings{FS-sofsem10, address = {\v{S}pindler\r{u}v Ml\'{y}n, Czech Republic}, month = jan, year = 2010, volume = 5901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Peleg, David and Muscholl, Anca}, acronym = {{SOFSEM}'10}, booktitle = {{P}roceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science ({SOFSEM}'10)}, author = {Finkel, Alain and Sangnier, Arnaud}, title = {Mixing coverability and reachability to analyze {VASS} with one zero-test}, pages = {394-406}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-sofsem10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-sofsem10.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FS-sofsem10.ps}, doi = {10.1007/978-3-642-11266-9_33}, abstract = {We study Vector Addition Systems with States (VASS) extended in such a way that one of the manipulated integer variables can be tested to zero. For this class of system, it has been proved that the reachability problem is decidable. We prove here that boundedness, termination and reversal-boundedness are decidable for VASS with one zero-test. To decide reversal-boundedness, we provide an original method which mixes both the construction of the coverability graph for VASS and the computation of the reachability set of reversal-bounded counter machines. The same construction can be slightly adapted to decide boundedness and hence termination.} }
@article{BKKL-tse09, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Transactions on Software Engineering}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin}, title = {Learning Communicating Automata from~{MSCs}}, volume = {36}, number = {3}, pages = {390-408}, month = may # {-} # jun, year = 2010, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-tse09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-tse09.pdf}, doi = {10.1109/TSE.2009.89}, abstract = {This paper is concerned with bridging the gap between requirements and distributed systems. Requirements are defined as basic message sequence charts (MSCs) specifying positive and negative scenarios. Communicating finite-state machines (CFMs), \textit{i.e.}, finite automata that communicate via FIFO buffers, act as system realizations. The key contribution is a generalization of Angluin's learning algorithm for synthesizing CFMs from MSCs. This approach is exact---the resulting CFM precisely accepts the set of positive scenarions and rejects all negative ones---and yields fully asynchronous implementations. The paper investigates for which classes of MSC languages CFMs can be learned, presents an optimization technique for learning partial orders, and provides substantial empirical evidence indicating the practical feasibility of the approach.} }
@article{BKKL-cai09, publisher = {Slovak Academy of Sciences}, journal = {Computing and Informatics}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin}, title = {{SMA}---The Smyle Modeling Approach}, volume = {29}, number = {1}, pages = {45-72}, year = 2010, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-cai09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-cai09.pdf}, abstract = {This paper introduces the model-based software development lifecycle model \emph{SMA}---the Smyle \emph{Modeling Approach}---which is centered around \emph{Smyle}. \emph{Smyle} is a dedicated learning procedure to support engineers to interactively obtain design models from requirements, characterized as either being desired (positive) or unwanted (negative) system behavior. Within \emph{SMA}, the learning approach is complemented by so-called \emph{scenario patterns} where the engineer can specify \emph{clearly} desired or unwanted behavior. This way, user interaction is reduced to the interesting scenarios limiting the design effort considerably. In~\emph{SMA}, the learning phase is further complemented by an effective analysis phase that allows for detecting design flaws at an early design stage. Using learning techniques allows us to gradually develop and refine requirements, naturally supporting evolving requirements, and allows for a rather inexpensive redesign in case anomalous system behavior is detected during analysis, testing, or maintenance. This paper describes the approach and reports on first practical experiences.} }
@mastersthesis{cheval-master, author = {Cheval, Vincent}, title = {Algorithme de d{\'e}cision de l'{\'e}quivalence symbolique de syst{\`e}mes de contraintes}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2009}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-cheval.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-cheval.pdf} }
@mastersthesis{brenguier-master, author = {Brenguier, Romain}, title = {Calcul des {\'e}quilibres de Nash dans les jeux temporis{\'e}s}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2009}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-brenguier.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/master-brenguier.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/master-brenguier.ps} }
@techreport{LSV:09:20, author = {Andr{\'e}, {\'E}tienne}, title = {Everything You Always Wanted to Know About {IMITATOR} (But~Were Afraid to~Ask)}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = jul, type = {Research Report}, number = {LSV-09-20}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-20.pdf}, note = {11~pages}, abstract = {We present here the user manual of IMITATOR, a tool for synthesizing constraints on timing bounds (seen as parameters) in the framework of timed automata. Unlike classical synthesis methods, the tool IMITATOR takes advantage of a given reference valuation of the parameters for which the system is known to behave properly. The goal of IMITATOR is to generate a constraint such that, under any valuation satisfying this constraint, the system is guaranteed to behave, in terms of alternating sequences of locations and actions, as under the reference valuation.\par We give here the installation requirements and the launching commands of IMITATOR, as well as the source code of a toy example.} }
@inproceedings{DJLL-fsttcs09, address = {Kanpur, India}, month = dec, year = 2009, volume = 4, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Kannan, Ravi and Narayan Kumar, K.}, acronym = {{FSTTCS}'09}, booktitle = {{P}roceedings of the 29th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'09)}, author = {Demri, St{\'e}phane and Jurdzi{\'n}ski, Marcin and Lachish, Oded and Lazi{\'c}, Ranko}, title = {The covering and boundedness problems for branching vector addition systems}, pages = {181-192}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/djll-fsttcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/djll-fsttcs09.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2009.2317}, abstract = {The covering and boundedness problems for branching vector addition systems are shown complete for doubly-exponential time.} }
@inproceedings{DKP-fsttcs09, address = {Kanpur, India}, month = dec, year = 2009, volume = 4, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Kannan, Ravi and Narayan Kumar, K.}, acronym = {{FSTTCS}'09}, booktitle = {{P}roceedings of the 29th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'09)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Pereira, Olivier}, title = {Simulation based security in the applied pi calculus}, pages = {169-180}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKP-fsttcs09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKP-fsttcs09.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2009.2316}, abstract = {We present a symbolic framework for refinement and composition of security protocols. The framework uses the notion of ideal functionalities. These are abstract systems which are secure by construction and which can be combined into larger systems. They can be separately refined in order to obtain concrete protocols implementing them. Our work builds on ideas from computational models such as the universally composable security and reactive simulatability frameworks. The underlying language we use is the applied pi calculus which is a general language for specifying security protocols. In our framework we can express the different standard flavours of simulation-based security which happen to all coincide. We illustrate our framework on an authentication functionality which can be realized using the Needham-Schroeder-Lowe protocol. For this we need to define an ideal functionality for asymmetric encryption and its realization. We also show a joint state result for this functionality which allows composition (even though the same key material is reused) using a tagging mechanism.} }
@article{BCHMMR-ijwsr09, publisher = {{IGI} Publishing}, journal = {International Journal of Web Services Research}, author = {Boutrous{-}Saab, C{\'e}line and Coulibaly, Demba and Haddad, Serge and Melliti, Tarek and Moreaux, Patrice and Rampacek, Sylvain}, title = {An Integrated Framework for Web Services Orchestration}, volume = 6, number = 4, pages = {1-29}, year = 2009, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHMMR-ijwsr09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHMMR-ijwsr09.pdf}, abstract = {Currently, Web services give place to active research and this is due both to industrial and theoretical factors. On one hand, Web services are essential as the design model of applications dedicated to the electronic business. On the other hand, this model aims to become one of the major formalisms for the design of distributed and cooperative applications in an open environment (the Internet). In this article, the authors will focus on two features of Web services. The first one concerns the interaction problem: given the interaction protocol of a Web service described in BPEL, how to generate the appropriate client? Their approach is based on a formal semantics for BPEL via process algebra and yields an algorithm which decides whether such a client exists and synthesizes the description of this client as a (timed) automaton. The second one concerns the design process of a service. They propose a method which proceeds by two successive refinements: first the service is described via UML, then refined in a BPEL model and finally enlarged with JAVA code using JCSWL, a new language that we introduce here. Their solutions are integrated in a service development framework that will be presented in a synthetic way.} }
@inproceedings{VLC-aplas09, address = {Seoul, Korea}, month = dec, year = 2009, volume = {5904}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hu, Zhenjiang}, acronym = {{APLAS}'09}, booktitle = {{P}roceedings of the 7th {A}sian {S}ymposium on {P}rogramming {L}anguages and {S}ystems ({APLAS}'09)}, author = {Villard, Jules and Lozes, {\'E}tienne and Calcagno, Cristiano}, title = {Proving Copyless Message Passing}, pages = {194-209}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VLC-aplas09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VLC-aplas09.pdf}, doi = {10.1007/978-3-642-10672-9_15}, abstract = {Handling concurrency using a shared memory and locks is tedious and error-prone. One solution is to use message passing instead. We study here a particular, contract-based flavor that makes the ownership transfer of messages explicit. In this case, ownership of the heap region representing the content of a message is lost upon sending, which can lead to efficient implementations. In this paper, we define a proof system for a concurrent imperative programming language implementing this idea and inspired by the Singularity OS. The proof system, for which we prove soundness, is an extension of separation logic, which has already been used successfully to study various ownership-oriented paradigms.} }
@inproceedings{AFS-avocs09, address = {Swansea, UK}, month = sep, year = {2009}, volume = 23, series = {Electronic Communications of the EASST}, publisher = {European Association of Software Science and Technology}, editor = {Roggenbach, Markus}, acronym = {{AVoCS}'09}, booktitle = {{P}roceedings of the 9th {I}nternational {W}orkshop on {A}utomated {V}erification of {C}ritical {S}ystems ({AVoCS}'09)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and Sproston, Jeremy}, title = {An Extension of the Inverse Method to Probabilistic Timed Automata}, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AFS-avocs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AFS-avocs09.pdf}, abstract = {Probabilistic timed automata can be used to model systems in which probabilistic and timing behavior coexist. Verification of probabilistic timed automata models is generally performed with regard to a single reference valuation of the timing parameters. Given such a parameter valuation, we present a method for obtaining automatically a constraint on timing parameters for which the reachability probabilities (1)~remain invariant and (2)~are~equal to the reachability probabilities for the reference valuation. The method relies on parametric analysis of a non-probabilistic version of the probabilistic timed automata model using the {"}inverse method{"}. Our approach is useful for avoiding repeated executions of probabilistic model checking analyses for the same model with different parameter valuations. We provide examples of the application of our technique to models of randomized protocols.} }
@incollection{HI-petrinet-diaz, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge and Ili{\'e}, Jean-Michel}, title = {Symmetry and Temporal Logic}, pages = {435-460}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@incollection{HV-petrinet-diaz-b, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge and Vernadat, Fran{\c{c}}ois}, title = {Verification of Specific Properties}, pages = {349-414}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@incollection{HM-petrinet-diaz-c, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge and Moreaux, Patrice}, title = {Tensor Methods and Stochastic {P}etri Nets}, pages = {321-346}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@incollection{HM-petrinet-diaz-b, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge and Moreaux, Patrice}, title = {Stochastic Well-formed {P}etri Nets}, pages = {303-320}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@incollection{HM-petrinet-diaz-a, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge and Moreaux, Patrice}, title = {Stochastic {P}etri Nets}, pages = {269-302}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@incollection{H-petrinet-diaz, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge}, title = {Decidability and Complexity of {P}etri Net Problems}, pages = {87-122}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@incollection{HV-petrinet-diaz-a, year = 2009, publisher = {Wiley-ISTE}, editor = {Diaz, Michel}, booktitle = {Petri Nets: Fundamental Models, Verification and Applications}, author = {Haddad, Serge and Vernadat, Fran{\c{c}}ois}, title = {Analysis Methods for {P}etri Nets}, pages = {41-86}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1848210795.html} }
@article{BBC-apal09, publisher = {Elsevier Science Publishers}, journal = {Annals of Pure and Applied Logics}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Chevalier, Fabrice}, title = {Weighted O-Minimal Hybrid Systems}, year = {2009}, month = dec, volume = {161}, number = {3}, pages = {268-288}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-apal09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBC-apal09.pdf}, doi = {10.1016/j.apal.2009.07.014}, abstract = {We consider weighted o-minimal hybrid systems, which extend classical o-minimal hybrid systems with cost functions. These cost functions are 'observer variables' which increase while the system evolves but do not constrain the behaviour of the system. In this paper, we prove two main results: (i)~optimal o-minimal hybrid games are decidable; (ii)~the~model-checking of~WCTL, an~extension of CTL which can constrain the cost variables, is decidable over that model. This has to be compared with the same problems in the framework of timed automata where both problems are undecidable in general, while they are decidable for the restricted class of one-clock timed automata.} }
@inproceedings{ZBH-lads09, address = {Turin, Italy}, year = 2010, volume = 6039, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dastani, Mehdi and El~Fallah Seghrouchni, Amal and Leite, Jo{\~a}o and Torroni, Paolo}, acronym = {{LADS}'09}, booktitle = {{R}evised {S}elected {P}apers of the 2nd {W}orkshop on {LA}nguages, methodologies and {D}evelopment tools for multi-agent system{S} ({LADS}'09)}, author = {Zargayouna, Mahdi and Balbo, Flavien and Haddad, Serge}, title = {Agents Secure Interaction in Data Driven Languages}, pages = {72-91}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ZBH-lads09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ZBH-lads09.pdf}, doi = {10.1007/978-3-642-13338-1_5}, abstract = {This paper discusses the security issues in data driven coordination languages. These languages rely on a data space shared by the agents and used to coordinate their activities. We extend these languages with a main distinguishing feature, which is the possibility to define fine-grained security conditions, associated with every datum in the shared space. Two main ideas makes it possible: the consideration of an abstraction of agents' states in the form of data at language level and the introduction of a richer interaction mechanism than state-of-the-art templates. This novel security mechanism allows both agents and system designers to prohibit undesirable interactions.} }
@inproceedings{FLS-nordsec09, address = {Oslo, Norway}, month = oct, year = 2009, volume = 5838, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {J{\o}sang, Audun and Maseng, Torleiv and Knapskog, Svein Johan}, acronym = {{NordSec}'09}, booktitle = {{P}roceedings of the 14th {N}ordic {W}orkshop on {S}ecure {IT} {S}ystems ({NordSec}'09)}, author = {Focardi, Riccardo and Luccio, Flaminia L. and Steel, Graham}, title = {Blunting Differential Attacks on {PIN} Processing {API}s}, pages = {88-103}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FLS-nordsec09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FLS-nordsec09.pdf}, doi = {10.1007/978-3-642-04766-4_7}, abstract = {We~propose a countermeasure for a class of known attacks on the PIN processing API used in the ATM (cash machine) network. This API controls access to the tamper-resistant Hardware Security Modules where PIN encryption, decryption and verification takes place. The~attacks are differential attacks, whereby an attacker gains information about the plaintext values of encrypted customer PINs by making changes to the non-confidential inputs to a command. Our~proposed fix adds an integrity check to the parameters passed to the command. It~is novel in that it involves very little change to the existing ATM network infrastructure.} }
@inproceedings{KMT-asian09, address = {Seoul, Korea}, month = dec, year = 2009, volume = 5913, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Datta, Anupam}, acronym = {{ASIAN}'09}, booktitle = {{P}roceedings of the 13th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'09)}, author = {Kremer, Steve and Mercier, Antoine and Treinen, Ralf}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, pages = {94-108}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-asian09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-asian09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KMT-asian09.ps}, doi = {10.1007/978-3-642-10622-4_8}, abstract = {Static equivalence is a well established notion of indistinguishability of sequences of terms which is useful in the symbolic analysis of cryptographic protocols. Static equivalence modulo equational theories allows a more accurate representation of cryptographic primitives by modelling properties of operators by equational axioms. We develop a method that allows in some cases to simplify the task of deciding static equivalence in a multi-sorted setting, by removing a symbol from the term signature and reducing the problem to several simpler equational theories. We illustrate our technique at hand of bilinear pairings.} }
@inproceedings{AF-ijcai09, address = {Pasadena, California, USA}, month = jul, year = 2009, publisher = {AAAI Press}, editor = {Boutilier, Craig}, acronym = {{IJCAI}'09}, booktitle = {{P}roceedings of the 21st {I}nternational {J}oint {C}onference on {A}rtificial {I}ntelligence ({IJCAI}'09)}, author = {Areces, Carlos and Figueira, Diego}, title = {Which Semantics for Neighbourhood Semantics?}, pages = {671-676}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AF-ijcai09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AF-ijcai09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/AF-ijcai09.ps}, abstract = {In this article we discuss two alternative proposals for neighbourhood semantics (which we call strict and loose neighbourhood semantics, NSS~and~NSL respectively) that have been previously introduced in the literature. Our~main tools are suitable notions of bisimulation. While an elegant notion of bisimulation exists for NSL, the required bisimulation for NSS is rather involved. We~propose a simple extension of NSS with a universal modality that we call NSS(E), which comes together with a natural notion of bisimulation. We~also investigate the complexity of the satisfiability problem for NSL and NSS(E).} }
@article{DKS-jcs09, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Steel, Graham}, title = {Formal Analysis of {PKCS\#11} and Proprietary Extensions}, volume = 18, number = 6, pages = {1211-1245}, year = 2010, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-jcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-jcs09.pdf}, doi = {10.3233/JCS-2009-0394}, abstract = {PKCS\#11 denes an API for cryptographic devices that has been widely adopted in industry. However, it has been shown to be vulnerable to a variety of attacks that could, for example, compromise the sensitive keys stored on the device. In this paper, we set out a formal model of the operation of the API, which diers from previous security API models notably in that it accounts for non-monotonic mutable global state. We give decidability results for our formalism, and describe an implementation of the resulting decision procedure using the model checker NuSMV. We report some new attacks and prove the safety of some congurations of the API in our model. We also analyse proprietary extensions proposed by nCipher (Thales) and Eracom (Safenet), designed to address the shortcomings of PKCS\#11.} }
@techreport{LSV:09:16, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu}, title = {Verification on Interrupt Timed Automata}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = jul, type = {Research Report}, number = {LSV-09-16}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-16.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-16.pdf}, note = {16~pages}, abstract = {The class of Interrupt Timed Automata (ITA) has been introduced to model multi-task systems with interruptions in a single processor environment. This is a subclass of hybrid automata in which real valued variables consist of a restricted type of stopwatches (variables with rate \(0\) or~\(1\)) organized along levels. While reachability is undecidable with usual stopwatches, it was proved that this problem is decidable in ITA and that untimed languages of ITA are effectively regular. Here we investigate the problem of model checking timed extensions of CTL over ITA and show in contrast that this problem is undecidable. On~the other hand, we prove that model checking is decidable for two relevant fragments of this timed logic: (1)~the~first one where formula contain only model clocks and (2)~the~second one where formulas have a single external clock.} }
@techreport{LSV:09:15, author = {H{\'e}am, Pierre-Cyrille and Nicaud, Cyril}, title = {Seed: an Easy-to-Use Random Generator of Recursive Data Structures for Testing}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = jul, type = {Research Report}, number = {LSV-09-15}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-15.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-15.pdf}, note = {16~pages}, abstract = {Random testing represents a simple and tractable way for software assessment. This paper presents the Seed tool dedicated to the uniform random generation of recursive data structures as labelled trees or logical formulas. We show how Seed can be used in several testing contexts, from model based testing to performance testing. Generated data structures are defined by grammar-like rules, given in an XML format, multiplying Seed possible applications. Seed is based on combinatorial techniques, and can generate uniformly at random \(k\)~structures of size~\(n\) with a time complexity in \(O(n^{2}+ kn\cdot \log(n))\). Finally, Seed is available as a free java application and a great effort has been made to make it easy-to-use.} }
@techreport{LSV:09:13, author = {Andr{\'e}, {\'E}tienne and Encrenaz, Emmanuelle and Fribourg, Laurent}, title = {Synthesizing Parametric Constraints on Various Case Studies Using {IMITATOR}}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = jun, type = {Research Report}, number = {LSV-09-13}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-13.pdf}, note = {18~pages}, abstract = {We present here applications of IMITATOR, a tool for synthesizing constraints on timing bounds (seen as parameters) in the framework of timed automata. Unlike classical synthesis methods, we take advantage of a given reference valuation of the parameters for which the system is known to behave properly. Our aim is to generate a constraint such that, under any valuation satisfying this constraint, the system is guaranteed to behave, in terms of alternating sequences of locations and actions, as under the reference valuation. This is useful for safely relaxing some values of the reference valuation, and optimizing timing bounds of the system. We have successfully applied our tool to various examples of asynchronous circuits and protocols, which are detailed in this report.} }
@inproceedings{BFSP-infinity09, address = {Bologna, Italy}, month = nov, year = 2009, volume = 10, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Farzan, Azadeh and Legay, Axel}, acronym = {{INFINITY}'09}, booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'09)}, author = {Bouchy, Florent and Finkel, Alain and San{ }Pietro, Pierluigi}, title = {Dense-choice Counter Machines Revisited}, pages = {3-22}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFSP-infinity09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFSP-infinity09.pdf}, doi = {10.4204/EPTCS.10.1}, abstract = {This paper clarifies the picture about Dense-choice Counter Machines, which have been less studied than (discrete) Counter Machines. We revisit the definition of {"}Dense Counter Machines{"} so that it now extends (discrete) Counter Machines, and we provide new undecidability and decidability results. Using the first-order additive mixed theory of reals and integers, we give a logical characterization of the sets of configurations reachable by reversal-bounded Dense-choice Counter Machines.} }
@inproceedings{AF-infinity09, address = {Bologna, Italy}, month = nov, year = 2009, volume = 10, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Farzan, Azadeh and Legay, Axel}, acronym = {{INFINITY}'09}, booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'09)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent}, title = {An Inverse Method for Policy-Iteration Based Algorithms}, pages = {44-61}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AF-infinity09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AF-infinity09.pdf}, doi = {10.4204/EPTCS.10.4}, abstract = {We present an extension of two policy-iteration based algorithms on weighted graphs (viz.,~Markov Decision Problems and Max-Plus Algebras). This extension allows us to solve the following inverse problem: considering the weights of the graph to be unknown constants or parameters, we suppose that a reference instantiation of those weights is given, and we aim at computing a constraint on the parameters under which an optimal policy for the reference instantiation is still optimal. The original algorithm is thus guaranteed to behave well around the reference instantiation, which provides us with some criteria of robustness. We present an application of both methods to simple examples. A prototype implementation has been done.} }
@inproceedings{BCLD-asian09, address = {Seoul, Korea}, month = dec, year = 2009, volume = 5913, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Datta, Anupam}, acronym = {{ASIAN}'09}, booktitle = {{P}roceedings of the 13th {A}sian {C}omputing {S}cience {C}onference ({ASIAN}'09)}, author = {Bursuc, Sergiu and Delaune, St{\'e}phanie and Comon{-}Lundh, Hubert}, title = {Deducibility constraints}, pages = {24-38}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCD-asian09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCD-asian09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/BCD-asian09.ps}, doi = {10.1007/978-3-642-10622-4_3}, abstract = {In their work on tractable deduction systems, D.~McAllester and later D.~Basin and H.~Ganzinger have identified a property of inference systems (the~locality property) that ensures the tractability of the \textit{Entscheidungsproblem}.\par On~the other hand, deducibility constraints are sequences of deduction problems in which some parts (formulas) are unknown. The~problem is to decide their satisfiability and to represent the set of all possible solutions. Such constraints have also been used for deciding some security properties of cryptographic protocols.\par In this paper we show that local inference systems (actually a slight modification of such systems) yield not only a tractable deduction problem, but also decidable deducibility constraints. Our algorithm not only allows to decide the existence of a solution, but also gives a representation of all solutions.} }
@incollection{ACL-fps09, noaddress = {}, month = may, year = 2009, volume = 5458, series = {Lecture Notes in Computer Science}, publisher = {Springer}, noacronym = {}, booktitle = {{F}ormal to {P}ractical {S}ecurity}, editor = {Cortier, V{\'e}ronique and Kirchner, Claude and Okada, Mitsuhiro and Sakurada, Hideki}, author = {Affeldt, Reynald and Comon{-}Lundh, Hubert}, title = {Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables}, pages = {1-20}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACL-fps09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACL-fps09.pdf}, doi = {10.1007/978-3-642-02002-5_1}, abstract = {First-order logic resolution is a standard way to automate the verification of security protocols. However, it sometimes fails to produce security proofs for secure protocols because of the detection of false attacks. For the verification of a bounded number of sessions, false attacks can be avoided by introducing rigid variables. Unfortunately, this yields complicated resolution procedures. We show here that there is a simple translation of the security problem for a bounded number of sessions into first-order logic, that does not introduce false attacks. This is shown by translating clauses involving rigid variables into classical first-order clauses, while preserving satisfiability. We illustrate this approach by giving a complete and terminating strategy for a first-order logic fragment resulting from the above translation, that yields a decision procedure for a bounded number of sessions.} }
@inproceedings{HMY-msr09, address = {Nantes, France}, month = nov, year = 2009, number = {7-9}, volume = {43}, series = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {Herm{\`e}s}, editor = {Lime, Didier and Roux, Olivier H.}, acronym = {{MSR}'09}, booktitle = {{A}ctes du 7{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'09)}, author = {Haddad, Serge and Mokdad, Lynda and Youcef, Samir}, title = {Bornes du temps de r{\'e}ponse des services Web composites}, pages = {969-983}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HMY-msr09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HMY-msr09.pdf}, abstract = {The quality of service (QoS) of Web services is a key factor of their success. This requires to design new methods in order to study~it. Here we propose families of upper bounding models for the response time of composite Web services for two kinds of composition: the statical and random {"}fork and merge{"}. In~the first~case, the~complexity of bounding models belongs to~\(O(n\cdot \sqrt{n})\) where \(n\)~is the number of called services whereas the complexity of the exact model belongs to~\(O(n^2)\). In~the second~case, the~complexity of bounding models still belongs to~\(O(n\cdot \sqrt{n})\) whereas the complexity of the exact model belongs to~\(O(n^3)\). Furthermore, having a family of bounding models allows to choose the bounding model depending on the parameters of the exact model. The numerical results show the interest of our approach w.r.t. complexity and accuracy of the bound.} }
@inproceedings{ACDFR-msr09, address = {Nantes, France}, month = nov, year = 2009, number = {7-9}, volume = {43}, series = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {Herm{\`e}s}, editor = {Lime, Didier and Roux, Olivier H.}, acronym = {{MSR}'09}, booktitle = {{A}ctes du 7{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'09)}, author = {Andr{\'e}, {\'E}tienne and Chatain, {\relax Th}omas and De{ }Smet, Olivier and Fribourg, Laurent and Ruel, Silvain}, title = {Synth{\`e}se de contraintes temporis{\'e}es pour une architecture d'automatisation en r{\'e}seau}, pages = {1049-1064}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACDFR-msr09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACDFR-msr09.pdf}, abstract = {We deal with the problem of synthesis of timing constraints for concurrent systems. Such systems are modeled by networks of timed automata where some constants, represented as parameters, can be tuned. A suitable value of these parameters is assumed to be known from a preliminarily simulation process. We present a method which infers a zone of suitable points around this reference functioning point. This zone is defined by a system of linear inequalities over the parameters. This method is applied to the case study of a networked automation system.} }
@inproceedings{ABC-cav09, address = {Grenoble, France}, month = jun # {-} # jul, year = 2009, volume = 5643, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bouajjani, Ahmad and Maler, Oded}, acronym = {{CAV}'09}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'09)}, author = {Abadi, Mart{\'\i}n and Blanchet, Bruno and Comon{-}Lundh, Hubert}, title = {Models and Proofs of Protocol Security: A~Progress Report}, pages = {35-49}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABC-cav09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABC-cav09.pdf}, doi = {10.1007/978-3-642-02658-4_5}, abstract = {This paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.} }
@inproceedings{CDL-adhs09, address = {Zaragoza, Spain}, month = sep, year = 2009, editor = {Giua, Alessandro and Silva, Manuel and Zaytoon, Janan}, acronym = {{ADHS}'09}, booktitle = {{P}roceedings of the 3rd {IFAC} {C}onference on {A}nalysis and {D}esign of {H}ybrid {S}ystems ({ADHS}'09)}, author = {Chatain, {\relax Th}omas and David, Alexandre and Larsen, Kim G.}, title = {Playing Games with Timed Games}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDL-adhs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDL-adhs09.pdf}, abstract = {In this paper we focus on property-preserving preorders between timed game automata and their application to control of partially observable systems. Following the example of timed simulation between timed automata, we define timed alternating simulation as a preorder between timed game automata, which preserves controllability. We define a method to reduce the timed alternating simulation problem to a safety game. We show how timed alternating simulation can be used to control efficiently a partially observable system. This method is illustrated by a generic case study.} }
@inproceedings{BHK-rp09, address = {Palaiseau, France}, month = sep, year = 2009, volume = 5797, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bournez, Olivier and Potapov, Igor}, acronym = {{RP}'09}, booktitle = {{P}roceedings of the 3rd {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'09)}, author = {Boichut, Yohan and H{\'e}am, Pierre-Cyrille and Kouchnarenko, Olga}, title = {How to Tackle Integer Weighted Automata Positivity}, pages = {79-92}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHK-rp09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHK-rp09.pdf}, doi = {10.1007/978-3-642-04420-5_9}, abstract = {This paper is dedicated to candidate abstractions to capture relevant aspects of the integer weighted automata. The expected effect of applying these abstractions is studied to build the deterministic reachability graphs allowing us to semi-decide the positivity problem on these automata. Moreover, the papers reports on the implementations and experimental results, and discusses other encodings.} }
@article{BCHK-ijfcs09, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Boichut, Yohan and Courbis, Rom{\'e}o and H{\'e}am, Pierre-Cyrille and Kouchnarenko, Olga}, title = {Handling Non-left Linear Rules when Completing Tree Automata}, volume = 20, number = 5, pages = {837-849}, year = 2009, month = oct, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCHK-ijfcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCHK-ijfcs09.pdf}, doi = {10.1142/S0129054109006917}, abstract = {This paper addresses the following general problem of tree regular model-checking: decide whether \(\mathcal{R}^*(\mathcal{L}) \cap \mathcal{L}_p = \emptyset\) where \(\mathcal{R}^*\) is the reflexive and transitive closure of a successor relation induced by a term rewriting system~\(\mathcal{R}\), and \(\mathcal{L}\) and~\(\mathcal{L}_p\) are both regular tree languages. We~develop an automatic approximation-based technique to handle this---undecidable in general---problem in the case when term rewriting system rules are non left-linear.} }
@article{BDL-apal09, publisher = {Elsevier Science Publishers}, journal = {Annals of Pure and Applied Logics}, author = {Brochenin, R{\'e}mi and Demri, St{\'e}phane and Lozes, {\'E}tienne}, title = {Reasoning about sequences of memory states}, volume = {161}, number = {3}, pages = {305-323}, year = 2009, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-apal09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDL-apal09.pdf}, doi = {10.1016/j.apal.2009.07.004}, abstract = {Motivated by the verification of programs with pointer variables, we introduce a temporal logic LTL\textsuperscript{mem} whose underlying assertion language is the quantifier-free fragment of separation logic and the temporal logic on the top of it is the standard linear-time temporal logic LTL. We analyze the complexity of various model-checking and satisfiability problems for LTL\textsuperscript{mem}, considering various fragments of separation logic (including pointer arithmetic), various classes of models (with or without constant heap), and the influence of fixing the initial memory state. We provide a complete picture based on these criteria. Our main decidability result is pspace-completeness of the satisfiability problems on the record fragment and on a classical fragment allowing pointer arithmetic. \(\Sigma_1^0\)-completeness or \(\Sigma_1^1\)-completeness results are established for various problems by reducing standard problems for Minsky machines, and underline the tightness of our decidability results.} }
@inproceedings{BCDL-formats09, address = {Budapest, Hungary}, month = sep, year = 2009, volume = 5813, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Vaandrager, Frits}, acronym = {{FORMATS}'09}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'09)}, author = {Bulychev, Peter and Chatain, {\relax Th}omas and David, Alexandre and Larsen, Kim G.}, title = {Checking simulation relation between timed game automata}, pages = {73-87}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCDL-formats09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCDL-formats09.pdf}, doi = {10.1007/978-3-642-04368-0_8}, abstract = {In this paper we focus on property-preserving preorders between timed game automata and their application to control of partially observable systems. We define timed weak alternating simulation as a preorder between timed game automata, which preserves controllability. We define the rules of building a symbolic turn-based two-player game such that the existence of a winning strategy is equivalent to the simulation being satisfied. We also propose an on-the-fly algorithm for solving this game. This simulation checking method can be applied to the case of non-alternating or strong simulations as well. We illustrate our algorithm by a case study and report on results.} }
@inproceedings{HP-qest09, address = {Budapest, Hungary}, month = sep, year = 2009, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'09}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'09)}, author = {Haddad, Serge and Pekergin, Nihal}, title = {Using Stochastic Comparison for Efficient Model Checking of Uncertain {M}arkov Chains}, pages = {177-186}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HP-qest09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HP-qest09.pdf}, doi = {10.1109/QEST.2009.42}, abstract = {We consider model checking of Discrete Time Markov Chains~(DTMC) with transition probabilities which are not exactly known but lie in a given interval. Model checking a Probabilistic Computation Tree Logic~(PCTL) formula for interval-valued DTMCs~(IMC) has been shown to be NP hard and co-NP hard. Since the state space of a realistic DTMC is generally huge, these lower bounds prevent the application of exact algorithms for such models. Therefore we propose to apply the stochastic comparison method to check an extended version of PCTL for IMCs. More precisely, we first design linear time algorithms to quantitatively analyze IMCs. Then we develop an efficient, semi-decidable PCTL model checking procedure for IMCs. Furthermore, our procedure returns more refined answers than traditional ones: YES, NO, DON'T~KNOW. Thus we may provide useful partial information for modelers in the {"}DON'T~KNOW{"} case.} }
@inproceedings{CFLS-esorics09, address = {Saint~Malo, France}, month = sep, year = 2009, volume = 5789, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Backes, Michael and Ning, Peng}, acronym = {{ESORICS}'09}, booktitle = {{P}roceedings of the 14th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'09)}, author = {Centenaro, Matteo and Focardi, Riccardo and Luccio, Flaminia L. and Steel, Graham}, title = {Type-based Analysis of {PIN} Processing {API}s}, pages = {53-68}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CFLS-esorics09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CFLS-esorics09.pdf}, doi = {10.1007/978-3-642-04444-1_4}, abstract = {We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamper-resistant Hardware Security Modules used in the network. We specify this API in an imperative language with cryptographic primitives, and show how its flaws are captured by a notion of robustness that extends the one of Myers, Sabelfeld and Zdancewic to our cryptographic setting. We~propose an improved API, give an extended type system for assuring integrity and for preserving confidentiality via randomized and non-randomized encryptions, and show our new API to be type-checkable.} }
@inproceedings{CS-esorics09, address = {Saint~Malo, France}, month = sep, year = 2009, volume = 5789, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Backes, Michael and Ning, Peng}, acronym = {{ESORICS}'09}, booktitle = {{P}roceedings of the 14th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'09)}, author = {Cortier, V{\'e}ronique and Steel, Graham}, title = {A~generic security {API} for symmetric key management on cryptographic devices}, pages = {605-620}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-esorics09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CS-esorics09.pdf}, doi = {10.1007/978-3-642-04444-1_37}, abstract = {Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In~this paper, we~give a new generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for our API. In~particular, our API offers a high level of security even when the host machine is controlled by an attacker. Our API is generic in the sense that it can implement a wide variety of (symmetric~key) protocols. As a proof of concept, we give an algorithm for automatically instantiating the API commands for a given key management protocol. We demonstrate the algorithm on a set of key establishment protocols from the Clark-Jacob suite.} }
@article{CAM-jcss09, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Cautis, Bogdan and Abiteboul, Serge and Milo, Tova}, title = {Reasoning about {XML} update constraints}, month = sep, year = 2009, volume = 75, number = 6, pages = {336-358}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CAM-jcss09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CAM-jcss09.pdf}, doi = {10.1016/j.jcss.2009.02.001}, abstract = {We introduce in this paper a class of constraints for describing how an XML document can evolve, namely \emph{XML update constraints}. For these constraints, we~study the implication problem, giving algorithms and complexity results for constraints of varying expressive power. Besides classical constraint implication, we also consider an instance-based approach in which we take into account data. More precisely, we study implication with respect to a current tree instance, resulting from a series of unknown updates. The main motivation of our work is reasoning about data integrity under update restrictions in contexts where owners may lose control over their data, such as in publishing or exchange.} }
@inproceedings{FS-mfcs09, address = {Novy Smokovec, Slovakia}, month = aug, year = 2009, volume = 5734, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kr{\'a}lovi{\v c}, Rastislav and Niwi{\'n}ski, Damian}, acronym = {{MFCS}'09}, booktitle = {{P}roceedings of the 34th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'09)}, author = {Figueira, Diego and Segoufin, Luc}, title = {Future-looking logics on data words and trees}, pages = {331-343}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-mfcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-mfcs09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/FS-mfcs09.ps}, doi = {10.1007/978-3-642-03816-7_29}, abstract = {In a data word or a data tree each position carries a label from a finite alphabet and a data value from an infinite domain. These models have been considered in the realm of semistructured data, timed automata and extended temporal logics.\par Over data words we consider the logic 1-reg-LTL(\(\textbf{F}\)), that extends LTL(\(\textbf{F}\)) with one register for storing data values for later comparisons. We show that satisfiability over data words of 1-reg-LTL(\(\textbf{F}\)) is already not primitive recursive. We also show that the extension of 1-reg-LTL(\(\textbf{F}\)) with either the reverse modality \(\textbf{F}^{-1}\) or with one extra register is undecidable. All those lower bounds were already known for 1-reg-LTL(\(\textbf{X}\),\(\textbf{F}\)) and our results essentially show that the \(\textbf{X}\) modality was not necessary.\par Moreover we show that over data trees similar lower bounds hold for certain fragments of XPATH.} }
@article{DG-jlc09, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane and Gascon, R{\'e}gis}, title = {The Effects of Bounding Syntactic Resources on {P}resburger {LTL}}, pages = {1541-1575}, volume = {19}, number = {6}, month = dec, year = 2009, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DG-jlc09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DG-jlc09.pdf}, doi = {10.1093/logcom/exp037}, abstract = {LTL over Presburger constraints is the extension of LTL where the atomic formulae are quantifier-free Presburger formulae having as free variables the counters at different states of the model. This logic is known to admit undecidable satisfiability and model-checking problems. We~study decidability and complexity issues for fragments of LTL with Presburger constraints obtained by restricting the syntactic resources of the formulae (the number of variables, the maximal distance between two states for which counters can be compared and, to a smaller extent, the set of Presburger constraints) while preserving the strength of the logical operators. We~provide a complete picture refining known results from the literature. We~show that model-checking and satisfiability problems for the fragments of LTL with difference constraints restricted to two variables and distance one and to one variable and distance two are highly undecidable, enlarging significantly the class of known undecidable fragments. On the positive side, we prove that the fragment restricted to one variable and to distance one augmented with propositional variables is \textsc{pspace}-complete. Since the atomic formulae can state quantitative properties on the counters, this extends some results about model-checking pushdown systems and one-counter automata. In~order to establish the pspace upper bound, we show that the nonemptiness problem for B{\"u}chi one-counter automata taking values in~\(\mathbb{Z}\) and allowing zero tests and sign tests, is~only \textsc{nlogspace}-complete. Finally, we~establish that model-checking one-counter automata with complete quantifier-free Presburger LTL restricted to one variable is also \textsc{pspace}-complete whereas the satisfiability problem is undecidable.} }
@inproceedings{KAS-arspawits09, address = {York, UK}, month = aug, year = 2009, volume = 5511, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Vigan{\`o}, Luca}, acronym = {{ARSPA-WITS}'09}, booktitle = {{R}evised {S}elected {P}apers of the {J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA-WITS}'09)}, author = {Keighren, Gavin and Aspinall, David and Steel, Graham}, title = {Towards a Type System for Security {API}s}, pages = {173-192}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KAS-arspawits09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KAS-arspawits09.pdf}, doi = {10.1007/978-3-642-03459-6_12}, abstract = {Security API analysis typically only considers a subset of an API's functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakage of sensitive information are usually not covered. Type-based static analysis has the potential to alleviate these shortcomings. To that end, we present a type system for secure information flow based upon the one of Volpano, Smith and Irvine, extended with types for cryptographic keys and ciphertext similar to those in Sumii and Pierce. In~contrast to some other type systems, the encryption and decryption of keys does not require special treatment. We show that a well-typed sequence of commands is non-interferent, based upon a definition of indistinguishability where, in certain circumstances, the adversary can distinguish between ciphertexts that correspond to encrypted public data.} }
@inproceedings{FS-arspawits09, address = {York, UK}, month = aug, year = 2009, volume = 5511, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Vigan{\`o}, Luca}, acronym = {{ARSPA-WITS}'09}, booktitle = {{R}evised {S}elected {P}apers of the {J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA-WITS}'09)}, author = {Fr{\"o}schle, Sibylle and Steel, Graham}, title = {Analysing {PKCS}\#11 Key Management {API}s with Unbounded Fresh Data}, pages = {92-106}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-arspawits09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FS-arspawits09.pdf}, doi = {10.1007/978-3-642-03459-6_7}, abstract = {We extend Delaune, Kremer and Steel's framework for analysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an \emph{attribute policy}; showing that a well-designed API should have a certain class of policy we call \emph{complete}; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these \emph{static} APIs can be analysed in a small bounded model such that security properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Eracom PKCS#11 API, used in their ProtectServer product, preserves the secrecy of sensitive keys for unbounded numbers of fresh keys and \emph{handles}, i.e.~pointers to keys. We also show that this API is not robust: if~an encryption key is lost to the intruder, SATMC finds an attack whereby all the keys may be compromised.} }
@inproceedings{CDK-secret09, address = {Port Jefferson, New~York, USA}, month = jul, year = 2009, editor = {Comon{-}Lundh, Hubert and Meadows, Catherine}, acronym = {{SecReT}'09}, booktitle = {{P}reliminary {P}roceedings of the 4th {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'09)}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Computing knowledge in security protocols under convergent equational theories}, pages = {47-58}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDK-secret09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDK-secret09.pdf}, abstract = {We propose a procedure for the intruder deduction problem and for the static equivalence problem, in the case where cryptographic primitives are modeled by a convergent equational theory. Our~procedure terminates on a wide range of equational theories. In~particular, we~obtain a new decidability result for a theory of trapdoor commitment that we encountered in the study of e-voting protocols. We~also provide a prototype implementation.} }
@inproceedings{ACD-secret09, address = {Port Jefferson, New~York, USA}, month = jul, year = 2009, editor = {Comon{-}Lundh, Hubert and Meadows, Catherine}, acronym = {{SecReT}'09}, booktitle = {{P}reliminary {P}roceedings of the 4th {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'09)}, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Modeling and Verifying Ad Hoc Routing Protocol}, pages = {33-46}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACD-secret09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACD-secret09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ACD-secret09.ps}, abstract = {Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In~such a network, a~central issue, ensured by routing protocols, is to find a route from one device to another. Those protocols use cryptographic mechanisms in order to prevent a malicious node from compromising the discovered route.\par We present a calculus for modeling and reasoning about security protocols, including in particular secured routing protocols. Our calculus extends standard symbolic models to take into account the characteristics of routing protocols and to model wireless communication in a more accurate way. Then, by using constraint solving techniques, we propose a decision procedure for analyzing routing protocols for a bounded number of sessions and for a fixed network topology. We~demonstrate the usage and usefulness of our approach by analyzing the protocol SRP applied to~DSR.} }
@inproceedings{KMT-secret09, address = {Port Jefferson, New~York, USA}, month = jul, year = 2009, editor = {Comon{-}Lundh, Hubert and Meadows, Catherine}, acronym = {{SecReT}'09}, booktitle = {{P}reliminary {P}roceedings of the 4th {I}nternational {W}orkshop on {S}ecurity and {R}ewriting {T}echniques ({SecReT}'09)}, author = {Kremer, Steve and Mercier, Antoine and Treinen, Ralf}, title = {Reducing Equational Theories for the Decision of Static Equivalence (Preliminary Version)}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-secret09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-secret09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/KMT-secret09.ps}, abstract = {Static equivalence is a well established notion of indistinguishability of sequences of terms which is useful in the symbolic analysis of cryptographic protocols. Static equivalence modulo equational theories allows a more accurate representation of cryptographic primitives by modelling properties of operators by equational axioms. We develop a method that allows in some cases to simplify the task of deciding static equivalence in a multi-sorted setting, by removing a symbol from the term signature and reducing the problem to several simpler equational theories. We illustrate our technique at hand of bilinear pairings.} }
@article{ACEF-ijfcs09, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Andr{\'e}, {\'E}tienne and Chatain, {\relax Th}omas and Encrenaz, Emmanuelle and Fribourg, Laurent}, title = {An Inverse Method for Parametric Timed Automata}, volume = 20, number = 5, pages = {819-836}, month = oct, year = 2009, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACEF-ijfcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACEF-ijfcs09.pdf}, doi = {10.1142/S0129054109006905}, abstract = {We consider in this paper systems modeled by timed automata. The timing bounds involved in the action guards and location invariants of our timed automata are not constants, but parameters. Those parametric timed automata allow the modelling of various kinds of timed systems, \textit{e.g.} communication protocols or asynchronous circuits. We will also assume that we are given an initial tuple~\(\pi_0\) of values for the parameters, which corresponds to values for which the system is known to behave properly. Our goal is to compute a constraint~\(K_0\) on the parameters, satisfied by~\(\pi_0\), guaranteeing that, under any parameter valuation satisfying~\(K_0\), the system behaves in the same manner: for any two parameter valuations satisfying~\(K_0\), the behaviors of the timed automata are (time-abstract) equivalent, \textit{i.e.}, the traces of execution viewed as alternating sequences of actions and locations are identical. We present an algorithm \texttt{InverseMethod} that terminates in the case of acyclic models, and discuss how to extend it in the cyclic case. We also explain how to combine our method with classical synthesis methods which are based on the avoidance of a given set of bad states. A prototype implementation has been done, and various experiments are described.} }
@techreport{LSV:09:09, author = {Goubault{-}Larrecq, Jean}, title = {On a Generalization of a Result by {V}alk and {J}antzen}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = may, type = {Research Report}, number = {LSV-09-09}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-09.pdf}, note = {18~pages}, abstract = {We~show that, under mild assumptions on the effective, well quasi-ordered set~\(X\), one~can compute a finite basis of an upward-closed subset~\(U\) of~\(X\) if and only if one can decide whether \(U \cap \downarrow z\) is empty for every \(z \in \widehat{X}\). Here \(\widehat{X}\) is the completion of \(X\) as defined in Finkel and Goubault-Larrecq, {\em Forward Analysis for WSTS, Part~{I:} Completions}, STACS'09, pages 433-444, 2009. This generalizes a useful result proved by Valk and Jantzen in~1985, which is the case \(X = \\mathbb{N}^k\).} }
@inproceedings{RBH-formats09, address = {Budapest, Hungary}, month = sep, year = 2009, volume = 5813, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Vaandrager, Frits}, acronym = {{FORMATS}'09}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'09)}, author = {Bouillard, Anne and Haar, Stefan and Rosario, Sidney}, title = {Critical paths in the Partial Order Unfolding of a Stochastic {P}etri Net}, pages = {43-57}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-formats09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHR-formats09.pdf}, doi = {10.1007/978-3-642-04368-0_6}, abstract = {In concurrent real-time processes, the speed of individual components has a double impact: on the one hand, the overall latency of a compound process is affected by the latency of its components. But, if the composition has race conditions, the very outcome of the process will also depend on the latency of component processes. Using stochastic Petri nets, we investigate the probability of a transition occurrence being critical for the entire process, i.e. such that a small increase or decrease of the duration of the occurrence entails an increase or decrease of the total duration of the process. The first stage of the analysis focuses on occurrence nets, as obtained by partial order unfoldings, to determine criticality of events; we then lift to workflow nets to investigate criticality of transitions inside a workflow.} }
@inproceedings{LA-ictac09, address = {Kuala Lumpur, Malaysia}, month = aug, year = 2009, volume = 5684, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Leucker, Martin and Morgan, Carroll}, acronym = {{ICTAC}'09}, booktitle = {{P}roceedings of the 6th {I}nternational {C}olloquium on {T}heoretical {A}spects of {C}omputing ({ICTAC}'09)}, author = {Longuet, Delphine and Aiguier, Marc}, title = {Integration Testing from Structured First-Order Specifications via Deduction Modulo}, pages = {261-276}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LA-ictac09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LA-ictac09.pdf}, doi = {10.1007/978-3-642-03466-4_17}, abstract = {Testing from first-order specifications has mainly been studied for flat specifications, that are specifications of a single software module. However, the specifications of large software systems are generally built out of small specifications of individual modules, by enriching their union. The aim of integration testing is to test the composition of modules assuming that they have previously been verified, i.e. assuming their correctness. One of the main method for the selection of test cases from first-order specifications, called axiom unfolding, is based on a proof search for the different instances of the property to be tested, thus allowing the coverage of this property. The idea here is to use deduction modulo as a proof system for structured first-order specifications in the context of integration testing, so as to take advantage of the knowledge of the correctness of the individual modules.} }
@inproceedings{andre-ictac09, address = {Kuala Lumpur, Malaysia}, month = aug, year = 2009, volume = 5684, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Leucker, Martin and Morgan, Carroll}, acronym = {{ICTAC}'09}, booktitle = {{P}roceedings of the 6th {I}nternational {C}olloquium on {T}heoretical {A}spects of {C}omputing ({ICTAC}'09)}, author = {Andr{\'e}, {\'E}tienne}, title = {{IMITATOR}: A~Tool for Synthesizing Constraints on Timing Bounds of Timed Automata}, pages = {336-342}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/andre-ictac09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/andre-ictac09.pdf}, doi = {10.1007/978-3-642-03466-4_22}, abstract = {We present here Imitator, a tool for synthesizing constraints on timing bounds (seen as parameters) in the framework of timed automata. Unlike classical synthesis methods, we take advantage of a given reference valuation of the parameters for which the system is known to behave properly. Our aim is to generate a constraint such that, under any valuation satisfying this constraint, the system is guaranteed to behave, in terms of alternating sequences of locations and actions, as under the reference valuation. This is useful for safely relaxing some values of the reference valuation, and optimizing timing bounds of the system. We have successfully applied our tool to various examples of asynchronous circuits and protocols.} }
@article{RBHJ-tsc08, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Transactions on Services Computing}, author = {Rosario, Sidney and Benveniste, Albert and Haar, Stefan and Jard, Claude}, title = {Probabilistic {Q}o{S} and Soft Contracts for Transaction-Based Web Services Orchestrations}, pages = {187-200}, volume = 1, number = 4, month = oct # {-} # dec, year = 2008, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RBHJ-tsc08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RBHJ-tsc08.pdf}, doi = {10.1109/TSC.2008.17}, abstract = {Service level agreements (SLAs), or contracts, have an important role in web services. They define the obligations and rights between the provider of a web service and its client, about the function and the Quality of the service (QoS). For composite services like orchestrations, contracts are deduced by a process called QoS contract composition, based on contracts established between the orchestration and the called web services. Contracts are typically stated as hard guarantees (e.g., response time always less than 5 msec). Using hard bounds is not realistic, however, and more statistical approaches are needed. In this paper we propose using soft probabilistic contracts instead, which consist of a probability distribution for the considered QoS parameter---in this paper, we focus on timing. We show how to compose such contracts, to yield a global probabilistic contract for the orchestration. Our approach is implemented by the TOrQuE tool. Experiments on TOrQuE show that overly pessimistic contracts can be avoided and significant room for safe overbooking exists. An essential component of SLA management is then the continuous monitoring of the performance of called web services, to check for violations of the SLA. We propose a statistical technique for run-time monitoring of soft contracts.} }
@inproceedings{BRBH-atpn09, address = {Paris, France}, month = jun, year = 2009, volume = 5606, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Franceschinis, Giuliana and Wolf, Karsten}, acronym = {{PETRI~NETS}'09}, booktitle = {{P}roceedings of the 30th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'09)}, author = {Bouillard, Anne and Rosario, Sidney and Benveniste, Albert and Haar, Stefan}, title = {Monotonicity in Service Orchestrations}, pages = {263-282}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BRBH-atpn09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BRBH-atpn09.pdf}, doi = {10.1007/978-3-642-02424-5_16}, abstract = {Web Service orchestrations are compositions of different Web Services to form a new service. The services called during the orchestration guarantee a given performance to the orchestrater, usually in the form of contracts.\par These contracts can be used by the orchestrater to deduce the contract it can offer to its own clients, by performing contract composition. An implicit assumption in contract based QoS management is: {"}the better the component services perform, the better the orchestration's performance will~be{"}. Thus, contract based QoS management for Web services orchestrations implicitly assumes monotony.\par In some orchestrations, however, monotony can be violated, i.e., the performance of the orchestration improves when the performance of a component service degrades. This is highly undesirable since it can render the process of contract composition inconsistent.\par In this paper we define monotony for orchestrations modelled by Colored Occurrence Nets (CO-nets) and we characterize the classes of monotonic orchestrations. We show that few orchestrations are indeed monotonic, mostly since latency can be traded for quality of data. We also propose a sound refinement of monotony, called \emph{conditional monotony}, which forbids this kind of cheating and show that conditional monotony is widely satisfied by orchestrations. This finding leads to reconsidering the way SLAs should be formulated.} }
@inproceedings{BDMR-concur09, address = {Bologna, Italy}, month = sep, year = 2009, volume = 5710, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bravetti, Mario and Zavattaro, Gianluigi}, acronym = {{CONCUR}'09}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'09)}, author = {Bouyer, Patricia and Duflot, Marie and Markey, Nicolas and Renault, Gabriel}, title = {Measuring Permissivity in Finite Games}, pages = {196-210}, doi = {10.1007/978-3-642-04081-8_14}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDMR-concur09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDMR-concur09.pdf}, abstract = {In this paper, we extend the classical notion of strategies in turn-based finite games by allowing several moves to be selected. We~define and study a quantitative measure for permissivity of such strategies by assigning penalties when blocking transitions. We~prove that for reachability objectives, most permissive strategies exist, can be chosen memoryless, and can be computed in polynomial time, while it is in \(\textsf{NP}\cap\textsf{coNP}\) for discounted and mean penalties.} }
@incollection{EFH-tsmaai09, author = {El~Fallah Seghrouchni, Amal and Haddad, Serge}, title = {Interop{\'e}rabilit{\'e} des syst{\`e}mes multi-agents {\`a} l'aide des services web}, booktitle = {Technologies des syst{\`e}mes multi-agents et applications industrielles}, editor = {El~Fallah Seghrouchni, Amal and Briot, Jean-Pierre}, publisher = {Herm{\`e}s}, year = 2009, month = apr, pages = {77-99}, chapter = 3, url = {http://www.lavoisier.fr/notice/fr2746217850.html}, nops = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/.ps}, nopsgz = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PSGZ/.ps.gz}, futureisbn = {} }
@inproceedings{HKPPT-acc09, address = {Saint Louis, Missouri, USA}, month = jun, year = 2009, acronym = {{ACC}'09}, booktitle = {{P}roceedings of the 28th {A}merican {C}ontrol {C}onference ({ACC}'09)}, author = {Haddad, Serge and Kordon, Fabrice and Petrucci, Laure and Pradat{-}Peyre, Jean-Fran{\c{c}}ois and Tr{\`e}ves, Nicolas}, title = {Efficient State-Based Analysis by Introducing Bags in {P}etri Nets Color Domains}, pages = {5018-5025}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HKPPT-acc09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HKPPT-acc09.pdf}, doi = {10.1109/ACC.2009.5160020}, abstract = {The use of high-level nets, such as coloured Petri nets, is very convenient for modelling complex controllable systems in order to have a compact, readable and structured specification. However, when coming to the analysis phase, using too elaboratc types becomes a burden.\par A good trade-off between expressivene and analy is capabilities is then to have only imple types, which is achieved with symmetric nels. These latter nels enjoy the possibility of generating a symbolic reachability gralph, which is much smallcr than the whole state space and still allows for exhaustive analysis.\par In this paper, we extend the symmetric net model with bags on arcs. Hence, variables can be bags of tokens,leading to more flexible models. We show that symmetric nets with bags also allow for applying the symbolic reachability graph technique with application to deadlock detection and more generally for safety properties.} }
@misc{dots-2.2, author = {Chatain, {\relax Th}omas and Gastin, Paul and Muscholl, Anca and Sznajder, Nathalie and Walukiewicz, Igor and Zeitoun, Marc}, title = {Distributed control for restricted specifications}, howpublished = {Deliverable DOTS~2.2 (ANR-06-SETI-003)}, year = 2009, month = mar }
@misc{dots-1.2a, author = {Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois and Lime, Didier and Markey, Nicolas}, title = {Synthesis of timed controllers}, howpublished = {Deliverable DOTS~1.2a (ANR-06-SETI-003)}, year = 2009, month = mar }
@article{DHS-tose09, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Transactions on Software Engineering}, author = {Donatelli, Susanna and Haddad, Serge and Sproston, Jeremy}, title = {Model Checking Timed and Stochastic Properties with {CSL\textsuperscript{TA}}}, volume = 35, number = 2, month = mar # {-} # apr, year = 2009, pages = {224-240}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DHS-tose09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DHS-tose09.pdf}, doi = {10.1109/TSE.2008.108}, abstract = {Markov chains are a well-known stochastic process that provide a balance between being able to adequately model the system's behavior and being able to afford the cost of the model solution. Systems can be modelled directly as Markov chains, or with a higher-level formalism for which Markov chains represent the underlying semantics. Markov chains are widely used to study the performance of computer and telecommunication systems. The definition of stochastic temporal logics like Continuous Stochastic Logic~(CSL) and its variant~asCSL, and of their model-checking algorithms, allows a unified approach to the verification of systems, allowing the mix of performance evaluation and probabilistic verification. \par In this paper we present the stochastic logic CSL\textsuperscript{TA} , which is more expressive than CSL and~asCSL, and in which properties can be specified using automata (more precisely, timed automata with a single clock). The extension with respect to expressiveness allows the specification of properties referring to the probability of a finite sequence of timed events. A~typical example is the responsiveness property {"}with probability at least~0.75, a~message sent at time~0 by a system~\(A\) will be received before time~5 by system~\(B\) and the acknowledgment will be back at~\(A\) before time~7{"}, a property that cannot be expressed in either CSL or~asCSL. Furthermore, the choice of using automata rather than the classical temporal operators Next and Until should help in enlarging the accessibility of model checking to a larger public. We~also present a model-checking algorithm for~CSL\textsuperscript{TA}.} }
@inproceedings{AFGM-tableaux09, address = {Oslo, Norway}, month = jul, year = 2009, volume = 5607, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Giese, Martin and Waaler, Arild}, acronym = {{TABLEAUX}'09}, booktitle = {{P}roceedings of the 18th {I}nternational {W}orkshop on {T}heorem {P}roving with {A}nalytic {T}ableaux and {R}elated {M}ethods ({TABLEAUX}'09)}, author = {Areces, Carlos and Figueira, Diego and Gor{\'\i}n, Daniel and Mera, Sergio}, title = {Tableaux and Model Checking for Memory Logics}, pages = {47-61}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AFGM-tableaux09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AFGM-tableaux09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/AFGM-tableaux09.ps}, doi = {10.1007/978-3-642-02716-1_5}, abstract = {Memory logics are modal logics whose semantics is specified in terms of relational models enriched with additional data structure to represent memory. The logical language is then extended with a collection of operations to access and modify the data structure. In~this paper we study their satisfiability and the model checking problems.\par We first give sound and complete tableaux calculi for the memory logic \(ML(k,r,e)\) (the basic modal language extended with the operator \(r\) used to memorize a state, the operator \(e\) used to wipe out the memory, and the operator \(k\) used to check if the current point of evaluation is memorized) and some of its sublanguages. As the satisfiability problem of \(ML(k,r,e)\) is undecidable, the tableau calculus we present is non terminating. Hence, we furthermore study a variation that ensures termination, at the expense of completeness, and we use model checking to ensure soundness. Secondly, we show that the model checking problem is PSpace-complete.} }
@inproceedings{DHL-mbt09, address = {York, UK}, month = oct, year = 2009, number = {2}, volume = {253}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, acronym = {{MBT}'09}, booktitle = {{P}roceedings of the 5th Workshop on Model-Based Testing ({MBT}'09)}, author = {Dadeau, Fr{\'e}d{\'e}ric and H{\'e}am, Pierre-Cyrille and Levrey, Jocelyn}, title = {On the Use of Uniform Random Generation of Automata for Testing}, pages = {37-51}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DHL-mbt09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DHL-mbt09.pdf}, doi = {10.1016/j.entcs.2009.09.050 }, abstract = {Developing efficient and automatic testing techniques is one of the major challenges facing software validation community. In this paper, we show how a uniform random generation process of finite automata, developed in a recent work by Bassino and Nicaud, is relevant for many faces of automatic testing. The main contribution is to show how to combine two major testing approaches: model-based testing and random testing. This leads to a new testing technique successfully experimented on a realistic case study. We also illustrate how the power of random testing, applied on a Chinese Postman Problem implementation, points out an error in a well-known algorithm. Finally, we provide some statistics on model-based testing algorithms.} }
@article{BHK-njc09, journal = {Nordic Journal of Computing}, author = {Boichut, Yohan and H{\'e}am, Pierre-Cyrille and Kouchnarenko, Olga}, title = {Approximation-based Tree Regular Model-Checking}, volume = {14}, number = {3}, pages = {216-241}, month = oct, year = 2008, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHK-njc09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHK-njc09.pdf}, abstract = {This paper addresses the following general problem of tree regular model-checking: decide whether \(\mathcal{R}^*(L)\cap L_{p} = \varnothing\) where \(\mathcal{R}^*\) is the reflexive and transitive closure of a successor relation induced by a term rewriting system~\(\mathcal{R}\), and \(L\) and \(L_p\) are both regular tree languages. We develop an automatic approximation-based technique to handle this---undecidable in general---problem in most practical cases, extending a recent work by Feuillade, Genet and Viet~Triem~Tong. We also make this approach fully automatic for practical validation of security protocols.} }
@inproceedings{CDK-cade09, address = {Montreal, Canada}, month = aug, year = 2009, volume = {5663}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Schmidt, Renate}, acronym = {{CADE}'09}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {A}utomated {D}eduction ({CADE}'09)}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Computing knowledge in security protocols under convergent equational theories}, pages = {355-370}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDK-cade09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDK-cade09.pdf}, doi = {10.1007/978-3-642-02959-2_27}, abstract = {In the symbolic analysis of security protocols, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems. We~propose a procedure for both problems under arbitrary convergent equational theories. Our~procedure terminates on a wide range of equational theories. In~particular, we~obtain a new decidability result for a theory we encountered when studying electronic voting protocols. We~also provide a prototype implementation.} }
@inproceedings{CHK-ciaa09, address = {Sydney, Australia}, month = jul, year = 2009, volume = 5642, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Maneth, Sebastian}, acronym = {{CIAA}'09}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'09)}, author = {Courbis, Rom{\'e}o and H{\'e}am, Pierre-Cyrille and Kouchnarenko, Olga}, title = {{TAGED} Approximations for Veriying Temporal Patterns}, pages = {135-144}, doi = {10.1007/978-3-642-02979-0_17}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CHK-ciaa09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CHK-ciaa09.pdf}, abstract = {This paper investigates the use of tree automata with global equalities and disequalities (TAGED for short) in reachability analysis over term rewriting systems (TRSs). The reachability problem being in general undecidable on non terminating TRSs, we provide TAGED-based construction, and then design approximation-based semi-decision procedures to model-check useful temporal patterns on infinite state rewriting graphs. To show that the above TAGED-based construction can be effectively carried out, complexity analysis for rewriting TAGED-definable languages is given.} }
@inproceedings{HNS-ciaa09, address = {Sydney, Australia}, month = jul, year = 2009, volume = 5642, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Maneth, Sebastian}, acronym = {{CIAA}'09}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'09)}, author = {H{\'e}am, Pierre-Cyrille and Nicaud, Cyril and Schmitz, Sylvain}, title = {Random Generation of Deterministic Tree (Walking) Automata}, pages = {115-124}, doi = {10.1007/978-3-642-02979-0_15}, url = {http://hal.inria.fr/inria-00408316}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HNS-ciaa09.pdf}, abstract = {Uniform random generators deliver a simple empirical means to estimate the average complexity of an algorithm. We present a general rejection algorithm that generates sequential letter-to-letter transducers up to isomorphism. We tailor this general scheme to randomly generate deterministic tree walking automata and deterministic top-down tree automata. We apply our implementation of the generator to the estimation of the average complexity of a deterministic tree walking automata to nondeterministic top-down tree automata construction we also implemented.} }
@inproceedings{BG-dlt09, address = {Stuttgart, Germany}, month = jun # {-} # jul, year = 2009, volume = {5583}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Diekert, Volker and Nowotka, Dirk}, acronym = {{DLT}'09}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'09)}, author = {Bollig, Benedikt and Gastin, Paul}, title = {Weighted versus Probabilistic Logics}, pages = {18-38}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BG-dlt09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BG-dlt09.pdf}, doi = {10.1007/978-3-642-02737-6_2}, abstract = {While a mature theory around logics such as MSO, LTL, and CTL has been developed in the pure boolean setting of finite automata, weighted automata lack such a natural connection with (temporal) logic and related verification algorithms. In this paper, we will identify weighted versions of MSO and CTL that generalize the classical logics and even other quantitative extensions such as probabilistic CTL. We establish expressiveness results on our logics giving translations from weighted and probabilistic CTL into weighted MSO.} }
@inproceedings{AGM-pods09, address = {Providence, Rhode Island, USA}, month = jun # {-} # jul, year = 2009, publisher = {ACM Press}, editor = {Su, Jianwen}, acronym = {{PODS}'09}, booktitle = {{P}roceedings of the 28th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'09)}, author = {Abiteboul, Serge and Gottlob, Georg and Manna, Marco}, title = {Distributed {XML} Design}, pages = {247-258}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AGM-pods09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/AGM-pods09.pdf}, doi = {10.1145/1559795.1559833}, abstract = {A \emph{distributed XML document} is an XML document that spans several machines or Web repositories. We assume that a distribution design of the document tree is given, providing an XML tree some of whose leaves are {"}docking points{"}, to which XML subtrees can be attached. These subtrees may be provided and controlled by peers at remote locations, or may correspond to the result of function calls, e.g., Web services. If a global type~\(t\), e.g. a DTD, is specified for a distributed document~\(T\), it~would be most desirable to be able to break this type into a collection of local types, called a local typing, such that the document satisfies~\(t\) if and only if each peer (or~function) satisfies its local type. In this paper we lay out the fundamentals of a theory of local typing and provide formal definitions of three main variants of locality: local typing, maximal local typing, and perfect typing, the latter being the most desirable. We study the following relevant decision problems: (i)~given a typing for a design, determine whether it is local, maximal local, or perfect; (ii)~given a design, establish whether a (maximal) local, or perfect typing does exist. For some of these problems we provide tight complexity bounds (polynomial space), while for the others we show exponential upper bounds. A~main contribution is a polynomial-space algorithm for computing a perfect typing in this context, if it exists.} }
@inproceedings{ABM-pods09, address = {Providence, Rhode Island, USA}, month = jun # {-} # jul, year = 2009, publisher = {ACM Press}, editor = {Su, Jianwen}, acronym = {{PODS}'09}, booktitle = {{P}roceedings of the 28th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'09)}, author = {Abiteboul, Serge and Bourhis, Pierre and Marinoiu, Bogdan}, title = {Satisfiability and relevance for queries over active documents}, pages = {87-96}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABM-pods09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ABM-pods09.pdf}, doi = {10.1145/1559795.1559810}, abstract = {Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when monitoring distributed autonomous systems. This is a challenging problem that has generated recently a lot of attention; see~Web~2.0. For capturing interactions between Web components, we use active documents interacting with the rest of the world via streams of updates. Their input streams specify updates to the document (in the spirit of RSS feeds), whereas their output streams are defined by queries on the document. In most of the paper, the focus is on input streams where the updates are only insertions, although we do consider also deletions. \par We introduce and study two fundamental concepts in this setting, namely, satisfiability and relevance. Some fact is \emph{satisfiable} for an active document and a query if it has a chance to be in the result of the query in some future state. Given an active document and a query, a call in the document is \emph{relevant} if the data brought by this call has a chance to impact the answer to the query. We analyze the complexity of computing satisfiability in our core model (insertions only) and for extensions (e.g., with deletions). We also analyze the complexity of computing relevance in the core model.} }
@inproceedings{BLPS-pods09, address = {Providence, Rhode Island, USA}, month = jun # {-} # jul, year = 2009, publisher = {ACM Press}, editor = {Su, Jianwen}, acronym = {{PODS}'09}, booktitle = {{P}roceedings of the 28th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'09)}, author = {Barcel{\'o}, Pablo and Libkin, Leonid and Poggi, Antonella and Sirangelo, Cristina}, title = {{XML} with Incomplete Information: Models, Properties, and Query Answering}, pages = {237-246}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLPS-pods09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BLPS-pods09.pdf}, doi = {10.1145/1559795.1559832}, abstract = {We study models of incomplete information for XML, their computational properties, and query answering. While our approach is motivated by the study of relational incompleteness, incomplete information in XML documents may appear not only as null values but also as missing structural information. Our goal is to provide a classification of incomplete descriptions of XML documents, and separate features---or groups of features---that lead to hard computational problems from those that admit efficient algorithms. Our classification of incomplete information is based on the combination of null values with partial structural descriptions of documents. The key computational problems we consider are consistency of partial descriptions, representability of complete documents by incomplete ones, and query answering. We show how factors such as schema information, the presence of node ids, and missing structural information affect the complexity of these main computational problems, and find robust classes of incomplete XML descriptions that permit tractable query evaluation.} }
@inproceedings{fig-pods09, address = {Providence, Rhode Island, USA}, month = jun # {-} # jul, year = 2009, publisher = {ACM Press}, editor = {Su, Jianwen}, acronym = {{PODS}'09}, booktitle = {{P}roceedings of the 28th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'09)}, author = {Figueira, Diego}, title = {Satisfiability of Downward {XP}ath with Data Equality Tests}, pages = {197-206}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/fig-pods09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/fig-pods09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/fig-pods09.ps}, doi = {10.1145/1559795.1559827}, abstract = {In this work we investigate the satisfiability problem for the logic \(\textup{XPath}(\downarrow,\downarrow^{*},=)\), that includes all downward axes as well as equality and inequality tests. We address this problem in the absence of DTDs and the sibling axis. We prove that this fragment is decidable, and we nail down its complexity, showing the problem to be ExpTime-complete. The result also holds when path expressions allow closure under the Kleene star operator. To obtain these results, we introduce a new automaton model over data trees that captures \(\textup{XPath}(\downarrow,\downarrow^*,=)\) and has an ExpTime emptiness problem. Furthermore, we give the exact complexity of several downward-looking fragments. } }
@inproceedings{PS-icalp09, address = {Rhodes, Greece}, month = jul, year = 2009, volume = 5556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Thomas, Wolfgang}, acronym = {{ICALP}'09}, booktitle = {{P}roceedings of the 36th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'09)}, author = {Place, {\relax Th}omas and Segoufin, Luc}, title = {A decidable characterization of Locally Testable Tree Languages}, pages = {285-296}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PS-icalp09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PS-icalp09.pdf}, doi = {10.1007/978-3-642-02930-1_24}, abstract = {A regular tree language~\(L\) is locally testable if the membership of a tree into~\(L\) depends only on the presence or absence of some neighborhoods in the tree. In~this paper we show that it is decidable whether a regular tree language is locally testable.} }
@article{goubault-jcs09, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Goubault{-}Larrecq, Jean}, title = {Finite Models for Formal Security Proofs}, volume = 18, number = 6, pages = {1247-1299}, year = 2010, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-jcs09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-jcs09.pdf}, doi = {10.3233/JCS-2009-0395}, abstract = {First-order logic models of security for cryptographic protocols, based on variants of the Dolev-Yao model, are now well-established tools. Given that we have checked a given security protocol using a given first-order prover, how hard is it to extract a formally checkable proof of it, as required in, \textit{e.g.}, common criteria at the highest evaluation level~(EAL7)? We~demonstrate that this is surprisingly hard in the general case: the problem is non-recursive. Nonetheless, we show that we can instead extract finite models~\(\mathcal{M}\) from a set~\(S\) of clauses representing~\(\pi\), automatically, and give two ways of doing~so. We~then define a model-checker testing \(\mathcal{M} \models S\), and show how we can instrument it to output a formally checkable proof, \textit{e.g.}, in~Coq. Experience on a number of protocols shows that this is practical, and that even complex (secure) protocols modulo equational theories have small finite models, making our approach suitable.} }
@inproceedings{FGL-icalp09, address = {Rhodes, Greece}, month = jul, year = 2009, volume = 5556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Thomas, Wolfgang}, acronym = {{ICALP}'09}, booktitle = {{P}roceedings of the 36th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'09)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for {WSTS}, Part~{II}: Complete {WSTS}}, pages = {188-199}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-icalp09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-icalp09.pdf}, doi = {10.1007/978-3-642-02930-1_16}, abstract = {We~describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathcal{S}\). This computes the \emph{clover} of a state~\(s_0\) , \textit{i.e.}, a~finite description of the closure of the cover of~\(s_0\) . When \(S\) is the completion of a WSTS~\(\mathcal{X}\), the clover in~\(\mathcal{S}\) is a finite description of the cover in~\(\mathcal{X}\). We~show that this applies exactly when \(\mathcal{X}\) is an \(\omega^2\)-WSTS, a~new robust class of WSTS. We~show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we~apply this to well-structured counter systems.} }
@inproceedings{BBBB-icalp09, address = {Rhodes, Greece}, month = jul, year = 2009, volume = 5556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Thomas, Wolfgang}, acronym = {{ICALP}'09}, booktitle = {{P}roceedings of the 36th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'09)}, author = {Baier, Christel and Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas}, title = {When are Timed Automata Determinizable?}, pages = {43-54}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBB-icalp09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBBB-icalp09.pdf}, doi = {10.1007/978-3-642-02930-1_4}, abstract = {In this paper, we propose an abstract procedure which, given a timed automaton, produces a language-equivalent deterministic infinite timed tree. We~prove that under a certain boundedness condition, the infinite timed tree can be reduced into a classical deterministic timed automaton. The boundedness condition is satisfied by several subclasses of timed automata, some of them were known to be determinizable (event-clock timed automata, automata with integer resets), but some others were not. We prove for instance that strongly non-Zeno timed automata can be determinized. As a corollary of those constructions, we get for those classes the decidability of the universality and of the inclusion problems, and compute their complexities (the inclusion problem is for instance EXPSPACE-complete for strongly non-Zeno timed automata).} }
@inproceedings{BF-icalp09, address = {Rhodes, Greece}, month = jul, year = 2009, volume = 5556, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Thomas, Wolfgang}, acronym = {{ICALP}'09}, booktitle = {{P}roceedings of the 36th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'09)}, author = {Bouyer, Patricia and Forejt, Vojt{\v e}ch}, title = {Reachability in Stochastic Timed Games}, pages = {103-114}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BF-icalp09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BF-icalp09.pdf}, doi = {10.1007/978-3-642-02930-1_9}, abstract = {We define stochastic timed games, which extend two-player timed games with probabilities (following a recent approach by Baier \textit{et~al.}), and which extend in a natural way continuous-time Markov decision processes. We~focus on the reachability problem for these games, and ask whether one of the players has a strategy to ensure that the probability of reaching a fixed set of states is equal~to (or~below, resp.~above) a~certain number~\(r\), whatever the second player does. We~show that the problem is undecidable in general, but that it becomes decidable if we restrict to single-clock 1\(\frac{1}{2}\)-player games and ask whether the player can ensure that the probability of reaching the set is~\(=1\) (or~\(>0\),~\(=0\)).} }
@inproceedings{CD-csf09, address = {Port Jefferson, New York, USA}, month = jul, year = 2009, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'09}, booktitle = {{P}roceedings of the 22nd {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'09)}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {A~method for proving observational equivalence}, pages = {266-276}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-csf09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-csf09.pdf}, doi = {10.1109/CSF.2009.9}, abstract = {Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require the notion of \emph{observational equivalence}. Typical examples are anonymity, privacy related properties or statements closer to security properties used in cryptography.\par In this paper, we consider the applied pi calculus and we show that for \emph{determinate} processes, observational equivalence actually coincides with trace equivalence, a notion simpler to reason with. We~exhibit a large class of determinate processes, called \emph{simple processes}, that capture most existing protocols and cryptographic primitives. Then, for simple processes without replication, we~reduce the decidability of trace equivalence to deciding an equivalence relation introduced by M.~Baudet. Altogether, this yields the first decidability result of observational equivalence for a general class of equational theories.} }
@inproceedings{CDK-forte09, address = {Lisbon, Portugal}, month = jun, year = 2009, volume = {5522}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lee, David and Lopes, Ant{\'o}nia and Poetzsch-Heffter, Arnd}, acronym = {{FMOODS/FORTE}'09}, booktitle = {{P}roceedings of {IFIP} {I}nternational {C}onference on {F}ormal {T}echniques for {D}istributed {S}ystems ({FMOODS/FORTE}'09)}, author = {Chadha, Rohit and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Epistemic Logic for the Applied Pi Calculus}, pages = {182-197}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/cdk-forte09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/cdk-forte09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/cdk-forte09.ps}, doi = {10.1007/978-3-642-02138-1_12}, abstract = {We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as equivalences. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain security properties such as secrecy and anonymity.\par We intend to bridge the gap between these two approaches: using the set of traces generated by a process as models, we define a logic which has constructs for reasoning about both intruder's epistemic knowledge and the set of messages in possession of the intruder. As an example we consider two formalizations of privacy in electronic voting and study the relationship between them.} }
@inproceedings{BHKL-ijcai2009, address = {Pasadena, California, USA}, month = jul, year = 2009, publisher = {AAAI Press}, editor = {Boutilier, Craig}, acronym = {{IJCAI}'09}, booktitle = {{P}roceedings of the 21st {I}nternational {J}oint {C}onference on {A}rtificial {I}ntelligence ({IJCAI}'09)}, author = {Bollig, Benedikt and Habermehl, Peter and Kern, Carsten and Leucker, Martin}, title = {Angluin-Style Learning of~{NFA}}, pages = {1004-1009}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHKL-ijcai09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BHKL-ijcai09.pdf}, abstract = {We introduce NL\(^{*}\), a learning algorithm for inferring non-deterministic finite-state automata using membership and equivalence queries. More specifically, residual finite-state automata (RFSA) are learned similarly as in Angluin's popular L\(^{*}\) algorithm, which, however, learns deterministic finite-state automata~(DFA). Like in a~DFA, the~states of an RFSA represent residual languages. Unlike a~DFA, an~RFSA restricts to prime residual languages, which cannot be described as the union of other residual languages. In~doing~so, RFSA can be exponentially more succinct than~DFA. They are, therefore, the preferable choice for many learning applications. The implementation of our algorithms is applied to a collection of examples and confirms the expected advantage of NL\(^{*}\) over L\(^{*}\).} }
@inproceedings{BCDDH-tacas09, address = {York, UK}, month = mar, year = 2009, volume = {5505}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kowalewski, Stefan and Philippou, Anna}, acronym = {{TACAS}'09}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'09)}, author = {Berwanger, Dietmar and Chatterjee, Krishnendu and De{~}Wulf, Martin and Doyen, Laurent and Henzinger, {\relax Th}omas~A.}, title = {Alpaga: A~Tool for Solving Parity Games with Imperfect Information}, pages = {58-61}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCDDH-tacas09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCDDH-tacas09.pdf}, doi = {10.1007/978-3-642-00768-2_7}, abstract = {Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it~determines whether the first player can ensure to win and, if~so, it~constructs a winning strategy. The~tool provides a symbolic implementation of a recent algorithm based on antichains.} }
@inproceedings{BCL-rta09, address = {Bras{\'\i}lia, Brazil}, month = jun # {-} # jul, year = 2009, volume = 5595, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Treinen, Ralf}, acronym = {{RTA}'09}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'09)}, author = {Bursuc, Sergiu and Comon{-}Lundh, Hubert}, title = {Protocol security and algebraic properties: decision results for a bounded number of sessions}, pages = {133-147}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCL-rta09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCL-rta09.pdf}, doi = {10.1007/978-3-642-02348-4_10}, abstract = {We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the security primitives, for instance Abelian group properties. We propose a general method for deriving decision algorithms, splitting the task into 4 properties of the rewriting system describing the intruder capabilities: locality, conservativity, finite variant property and decidability of one-step deducibility constraints. We illustrate this method on a non trivial example, combining several Abelian Group properties, exponentiation and a homomorphism, showing a decidability result for this combination. } }
@inproceedings{GJ-rta09, address = {Bras{\'\i}lia, Brazil}, month = jun # {-} # jul, year = 2009, volume = 5595, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Treinen, Ralf}, acronym = {{RTA}'09}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'09)}, author = {Godoy, Guillem and Jacquemard, Florent}, title = {Unique Normalization for Shallow {TRS}}, pages = {63-77}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-21.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-21.pdf}, doi = {10.1007/978-3-642-02348-4_5}, abstract = {Computation with a term rewrite system (TRS) consists in the application of its rules from a given starting term until a normal form is reached, which is considered the result of the computation. The unique normalization (UN) property for a TRS~\(R\) states that any starting term can reach at most one normal form when \(R\) is used, i.e. that the computation with R is unique. \par We study the decidability of this property for classes of TRS defined by syntactic restrictions such as linearity (variables can occur only once in each side of the rules), flatness (sides of the rules have depth at most one) and shallowness (variables occur at depth at most one in the rules).\par We prove that UN is decidable in polynomial time for shallow and linear TRS, using tree automata techniques. This result is very near to the limits of decidability, since this property is known undecidable even for very restricted classes like right-ground TRS, flat TRS and also right-flat and linear TRS. We also show that that UN is even undecidable for flat and right-linear TRS. The latter result is in contrast with the fact that many other natural properties like reachability, termination, confluence, weak normalization... are decidable for this class of TRS.} }
@inproceedings{BCD-rta09, address = {Bras{\'\i}lia, Brazil}, month = jun # {-} # jul, year = 2009, volume = 5595, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Treinen, Ralf}, acronym = {{RTA}'09}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications ({RTA}'09)}, author = {Baudet, Mathieu and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {{YAPA}: A~generic tool for computing intruder knowledge}, pages = {148-163}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCD-rta09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCD-rta09.pdf}, doi = {10.1007/978-3-642-02348-4_11}, abstract = {Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two relations: deducibility and static equivalence. Several decision procedures have been proposed for these relations under a variety of equational theories. However, each theory has its particular algorithm, and none has been implemented so~far.\par We provide a generic procedure for deducibility and static equivalence that takes as input any convergent rewrite system. We show that our algorithm covers all the existing decision procedures for convergent theories. We also provide an efficient implementation, and compare it briefly with the more general tool ProVerif.} }
@article{LAL-jar09, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Longuet, Delphine and Aiguier, Marc and Le{~}Gall, Pascale}, title = {Proof-guided test selection from first-order specifications with equality}, year = {2010}, month = dec, volume = 45, number = 4, pages = {437-473}, nmnote = {special issue on Tests and Proofs}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LAL-jar09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LAL-jar09.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LAL-jar09.ps}, doi = {10.1007/s10817-009-9128-7}, abstract = {This paper deals with test case selection from axiomatic specifications whose axioms are quantifier-free first-order formulas with equality. We first prove the existence of an ideal exhaustive test set to start the selection from. We then propose an extension of the test selection method called axiom unfolding, originally defined for algebraic specifications, to quantifier-free first-order specifications with equality. This method basically consists of a case analysis of the property under test (the test purpose) according to the specification axioms. It is based on a proof search for the different instances of the test purpose. Since the calculus is sound and complete, this allows us to provide a full coverage of this property. The generalisation we propose allows to deal with any kind of predicate (not only equality) and with any form of axiom and test purpose (not only equations or Horn clauses). Moreover, it improves our previous works with efficiently dealing with the equality predicate, thanks to the paramodulation rule.} }
@article{BHR-fi09, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Bouyer, Patricia and Haddad, Serge and Reynier, Pierre-Alain}, title = {Undecidability Results for Timed Automata with Silent Transitions}, year = 2009, volume = 92, number = {1-2}, pages = {1-25}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-12.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2007-12.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2007-12.ps}, abstract = {In this work, we study decision problems related to timed automata with silent transitions (TA-epsilon) which strictly extend the expressiveness of timed automata~(TA). First, we answer negatively a central question raised by the introduction of silent transitions: can we decide whether the language recognized by a TA-epsilon can be recognized by some TA? Then we establish in the framework of TA-epsilon some old open conjectures that O.~Finkel has recently solved for~TA. Its proofs follow a generic scheme which relies on the fact that only a finite number of configurations can be reached by a TA while reading a timed word. This property does not hold for TA-epsilon, the proofs in the framework of TA-epsilon thus require more elaborated arguments. We~establish undecidability of complementability, minimization of the number of clocks, and closure under shuffle. We~also show these results in the framework of infinite timed languages.} }
@techreport{LSV:09:02, author = {Bursuc, Sergiu and Comon{-}Lundh, Hubert}, title = {Protocols, insecurity decision and combination of equational theories}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2009}, month = feb, type = {Research Report}, number = {LSV-09-02}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-02.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2009-02.pdf}, note = {43~pages}, abstract = {We consider the problem of finding attacks for a bounded number of sessions of security protocols. We~contribute to this field, showing how to decompose the problem into pieces for a class of equational theories, which includes the hierarchical combinations, as well as non-hierarchical ones. We apply this result to an electronic purse case study: we~show the decidability in co-NP of the insecurity problem for a complex equational theory mixing three Abelian groups, exponentiation and homomorphism properties.\par The main technical contributions rely on equational logic, term rewriting and combination of theories.} }
@article{BS-tocl08, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Benedikt, Michael and Segoufin, Luc}, title = {Regular tree languages definable in {FO} and in {FO}\(_{\textit{mod}}\)}, volume = 11, number = 1, nopages = {}, month = oct, year = 2009, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-tocl09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-tocl09.pdf}, doi = {10.1145/1614431.1614435}, abstract = {We~consider regular languages of labeled trees. We~give an effective characterization of the regular languages over such trees that are definable in first-order logic in the language of labeled graphs. These languages are the analog on trees of the {"}locally threshold testable{"} languages on strings. We~show that this characterization yields a decision procedure for determining whether a regular tree language is first-order definable: the~procedure is polynomial time in the minimal automaton presenting the regular language. We~also provide an algorithm for deciding whether a regular language is definable in first-order logic supplemented with modular quantifiers.} }
@article{CCZ-tocl08, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique and Z{\u{a}}linescu, Eugen}, title = {Deciding security properties for cryptographic protocols. Application to key cycles}, volume = 11, number = 2, nopages = {}, month = jan, year = 2010, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCZ-tocl09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCZ-tocl09.pdf}, doi = {10.1145/1656242.1656244}, abstract = {There is a large amount of work dedicated to the formal verification of security protocols. In~this paper, we~revisit and extend the NP-complete decision procedure for a bounded number of sessions. We use a, now standard, deducibility constraint formalism for modeling security protocols. Our~first contribution is to give a simple set of constraint simplification rules, that allows to reduce any deducibility constraint to a set of solved forms, representing all solutions (within the bound on sessions).\par As a consequence, we prove that deciding the existence of key cycles is NP-complete for a bounded number of sessions. The problem of key-cycles has been put forward by recent works relating computational and symbolic models. The so-called soundness of the symbolic model requires indeed that no key cycle (\textit{e.g.},~enc\((k, k)\)) ever occurs in the execution of the protocol. Otherwise, stronger security assumptions (such as KDM-security) are required.\par We show that our decision procedure can also be applied to prove again the decidability of authentication-like properties and the decidability of a significant fragment of protocols with timestamps.} }
@misc{Quasimodo-3.1, author = {Bouyer, Patricia and Katoen, Joost-Pieter and Langerak, Rom and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Raskin, Jean-Fran{\c{c}}ois}, title = {Transfer of correctness from models to implementation}, howpublished = {Deliverable QUASIMODO~3.1 (ICT-FP7-STREP-214755)}, year = 2009, month = jan }
@inproceedings{JKV-lata09, address = {Tarragona, Spain}, month = apr, year = 2009, volume = 5457, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dediu, Adrian Horia and Mihai Ionescu, Armand and Mart{\'\i}n-Vide, Carlos}, acronym = {{LATA}'09}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {L}anguage and {A}utomata {T}heory and {A}pplications ({LATA}'09)}, author = {Jacquemard, Florent and Klay, Francis and Vacher, Camille}, title = {Rigid Tree Automata}, pages = {446-457}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-lata09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-lata09.pdf}, doi = {10.1007/978-3-642-00982-2_38}, abstract = {We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a restriction on the computation of RTA on trees: RTA can test for equality in subtrees reaching the same rigid state. RTA are able to perform local and global tests of equality between subtrees, non-linear tree pattern matching, and restricted disequality tests as well. Properties like determinism, pumping lemma, boolean closure, and several decision problems are studied in detail. In particular, the emptiness problem is shown decidable in linear time for RTA whereas membership of a given tree to the language of a given RTA is NP-complete. Our main result is the decidability of whether a given tree belongs to the rewrite closure of a RTA language under a restricted family of term rewriting systems, whereas this closure is not a RTA language. This result, one of the first on rewrite closure of languages of tree automata with constraints, is enabling the extension of model checking procedures based on finite tree automata techniques. Finally, a comparison of RTA with several classes of tree automata with local and global equality tests, and with dag automata is also provided.} }
@phdthesis{bouyer-hab2009, author = {Bouyer, Patricia}, title = {From Qualitative to Quantitative Analysis of Timed Systems}, school = {Universit{\'e} Paris~7, Paris, France}, type = {M{\'e}moire d'habilitation}, year = 2009, month = jan, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PB-hdr09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/PB-hdr09.pdf} }
@incollection{GMN-pct08, futureaddress = {}, month = jan, year = 2009, series = {IARCS-Universities}, publisher = {Universities Press}, booktitle = {Perspectives in Concurrency Theory}, editor = {Lodaya, Kamal and Mukund, Madhavan and Ramanujam, R.}, author = {Gastin, Paul and Mukund, Madhavan and Narayan Kumar, K.}, title = {Reachability and boundedness in time-constrained {MSC} graphs}, pages = {157-183}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GMN-pct08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GMN-pct08.pdf}, abstract = {Channel boundedness is a necessary condition for a message-passing system to exhibit regular, finite-state behaviour at the global level. For Message Sequence Graphs~(MSGs), the most basic form of High-level Message Sequence Charts~(HMSCs), channel boundedness can be characterized in terms of structural conditions on the underlying graph. We consider MSGs enriched with timing constraints between events. These constraints restrict the global behaviour and can impose channel boundedness even when it is not guaranteed by the graph structure of the MSG. We~show that we can use MSGs with timing constraints to simulate computations of a two-counter machine. As~a consequence, even the more fundamental problem of reachability, which is trivial for untimed MSGs, becomes undecidable when we add timing constraints. Different forms of channel boundedness also then turn out to be undecidable, using reductions from the reachability problem.} }
@incollection{BP-pct08, futureaddress = {}, month = jan, year = 2009, series = {IARCS-Universities}, publisher = {Universities Press}, booktitle = {Perspectives in Concurrency Theory}, editor = {Lodaya, Kamal and Mukund, Madhavan and Ramanujam, R.}, author = {Bouyer, Patricia and Petit, Antoine}, title = {On extensions of timed automata}, pages = {35-63}, abstract = {Since their definition in the early nineties, timed automata have been one of the most used and widely studied models for representing and analyzing real-time systems. In their seminal paper, Alur and Dill proved the probably most important property of timed automata: checking emptiness of the language accepted by a timed automaton, or equivalently checking a reachability property in a timed automaton, is decidable. This result relies on the construction of the so-called region automaton, which abstracts behaviours of a timed automaton into behaviours of a finite automaton. Since then, symbolic algorithms have been developed to solve that problem, several model-checkers have been implemented, and numerous case studies have been verified.\par Lots of works have naturally aimed at proposing extensions of timed automata with new features, while preserving the above-mentioned fundamental decidability result. The motivation for these extensions is basically twofold. First it can increase the expressiveness of timed automata, allowing to model larger classes of systems. Then it can improve the conciseness (and hence the readability) of models by constructing more compact representations for a given system.\par In this paper, we discuss and compare some of the most important extensions of timed automata that have been considered in the literature.} }
@inproceedings{BBL-Fossacs09, address = {York, UK}, month = mar, year = 2009, volume = 5504, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {de Alfaro, Luca}, acronym = {{FoSSaCS}'09}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'09)}, author = {Bansal, Kshitij and Brochenin, R{\'e}mi and Lozes, {\'E}tienne}, title = {Beyond Shapes: Lists with Ordered Data}, pages = {425-439}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-fossacs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BBL-fossacs09.pdf}, doi = {10.1007/978-3-642-00596-1_30}, abstract = {Standard analysis on recursive data structures restrict their attention to shape properties (for instance, a program that manipulates a list returns a list), excluding properties that deal with the actual content of these structures. For instance, these analysis would not establish that the result of merging two ordered lists is an ordered list. Separation logic, one of the prominent framework for these kind of analysis, proposed a heap model that could represent data, but, to our knowledge, no predicate dealing with data has ever been integrated to the logic while preserving decidability. We~establish decidability for (first-order) separation logic with a predicate that allows to compare two successive data in a list. We~then consider the extension where two data in arbitrary positions may be compared, and establish the undecidability in general. We~define a guarded fragment that turns out to be both decidable and sufficiently expressive to prove the preservation of the loop invariant of a standard program merging ordered lists. We~finally consider the extension with the magic-wand and prove that, by constrast with the data-free case, even a very restricted use of the magic wand already introduces undecidability.} }
@article{GSZ-fmsd09, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Gastin, Paul and Sznajder, Nathalie and Zeitoun, Marc}, title = {Distributed synthesis for well-connected architectures}, volume = 34, number = 3, pages = {215-237}, month = jun, year = 2009, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GSZ-fmsd09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GSZ-fmsd09.pdf}, doi = {10.1007/s10703-008-0064-7}, abstract = {We study the synthesis problem for external linear or branching specifications and distributed, synchronous architectures with arbitrary delays on processes. External means that the specification only relates input and output variables. We introduce the subclass of uniformly well-connected (UWC) architectures for which there exists a routing allowing each output process to get the values of all inputs it is connected to, as soon as possible. We prove that the distributed synthesis problem is decidable on UWC architectures if and only if the output variables are totally ordered by their knowledge of input variables. We also show that if we extend this class by letting the routing depend on the output process, then the previous decidability result fails. Finally, we provide a natural restriction on specifications under which the whole class of UWC architectures is decidable.} }
@article{LHS-lmcs08, journal = {Logical Methods in Computer Science}, author = {Lozes, {\'E}tienne and Hirschkoff, Daniel and Sangiorgi, Davide}, title = {Separability in the Ambient Logic}, volume = 4, number = {3:4}, year = 2008, month = sep, nopages = {}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LHS-lmcs08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LHS-lmcs08.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/LHS-lmcs08.ps}, doi = {10.2168/LMCS-4(3:4)2008}, abstract = {The Ambient Logic~(AL) has been proposed for expressing properties of process mobility in the calculus of Mobile Ambients~(MA), and as a basis for query languages on semistructured data. \par We study some basic questions concerning the discriminating power of~AL, focusing on the equivalence on processes induced by the logic~(\(=_{L}\)). As underlying calculi besides~MA we~consider a subcalculus in which an image-finiteness condition holds and that we prove to be Turing complete. Synchronous variants of these calculi are studied as well. \par In these calculi, we provide two operational characterisations of~\(=_{L}\): a~coinductive one (as a form of bisimilarity) and an inductive one (based on structual properties of processes). After showing \(=_{L}\) to be stricly finer than barbed congruence, we establish axiomatisations of~\(=_{L}\) on the subcalculus of~MA (both the asynchronous and the synchronous version), enabling us to relate~\(=_{L}\) to structural congruence. We~also present some (un)decidability results that are related to the above separation properties for~AL: the~undecidability of~\(=_{L}\) on~MA and its decidability on the subcalculus.} }
@proceedings{KP-secco2008, title = {{P}roceedings of the 6th {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oncurrency ({S}ec{C}o'08)}, booktitle = {{P}roceedings of the 6th {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oncurrency ({S}ec{C}o'08)}, editor = {Kremer, Steve and Panangaden, Prakash}, publisher = {Elsevier Science Publishers}, doi = {10.1016/j.entcs.2009.07.077}, url = {http://www.sciencedirect.com/science/journal/15710661/242/3}, series = {Electronic Notes in Theoretical Computer Science}, volume = 242, number = 3, year = 2009, month = aug, address = {Toronto, Canada} }
@article{BCK-IC09, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Baudet, Mathieu and Cortier, V{\'e}ronique and Kremer, Steve}, title = {Computationally Sound Implementations of Equational Theories against Passive Adversaries}, year = {2009}, month = apr, volume = 207, number = 4, pages = {496-520}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-ic09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-ic09.pdf}, doi = {10.1016/j.ic.2008.12.005}, abstract = {In~this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In~contrast to other works, we~do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We~define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In~particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We~present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, to~illustrate our framework, we~establish the soundness of static equivalence for the exclusive OR and a theory of ciphers and lists.} }
@inproceedings{BH-Fossacs09, address = {York, UK}, month = mar, year = 2009, volume = 5504, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {de Alfaro, Luca}, acronym = {{FoSSaCS}'09}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'09)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge}, title = {Interrupt Timed Automata}, pages = {197-211}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BH-fossacs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BH-fossacs09.pdf}, doi = {10.1007/978-3-642-00596-1_15}, abstract = {In this work, we introduce the class of Interrupt Timed Automata (ITA), which are well suited to the description of multi-task systems with interruptions in a single processor environment. This model is a subclass of hybrid automata. While reachability is undecidable for hybrid automata we show that in ITA the reachability problem is in 2EXPSPACE and in PSPACE when the number of clocks is fixed, with a procedure based on a generalized class graph. Furthermore we consider a subclass ITA\(_{-}\) which still describes usual interrupt systems and for which the reachability problem is in NEXPTIME and in NP when the number of clocks is fixed (without any class graph). There exist languages accepted by an ITA\(_{-}\) but neither by timed automata nor by controlled real-time automata (CRTA), another extension of timed automata. However we conjecture that CRTA is not contained in ITA. So, we combine ITA with CRTA in a model which encompasses both classes and show that the reachability problem is still decidable.} }
@article{KM-jcs09, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Kremer, Steve and Mazar{\'e}, Laurent}, title = {Computationally Sound Analysis of Protocols using Bilinear Pairings}, year = 2010, month = nov, volume = 18, number = 6, pages = {999-1033}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KM-jcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KM-jcs09.pdf}, doi = {10.3233/JCS-2009-0388}, abstract = {In this paper, we introduce a symbolic model to analyse protocols that use a bilinear pairing between two cyclic groups. This model consists in an extension of the Abadi-Rogaway logic and we prove that the logic is still computationally sound: symbolic indistinguishability implies computational indistinguishability provided that the Bilinear Decisional Diffie-Hellman assumption holds and that the encryption scheme is \textsf{IND-CPA} secure. We~illustrate our results on classical protocols using bilinear pairing like Joux tripartite Diffie-Hellman protocol or the TAK-2 and TAK-3 protocols. We also investigate the security of a newly designed variant of the Burmester-Desmedt protocol using bilinear pairings. More precisely, we show for each of these protocols that the generated key is indistinguishable from a random element.} }
@inproceedings{BGH-Fossacs09, address = {York, UK}, month = mar, year = 2009, volume = 5504, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {de Alfaro, Luca}, acronym = {{FoSSaCS}'09}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'09)}, author = {Bollig, Benedikt and Grindei, Manuela-Lidia and Habermehl, Peter}, title = {Realizability of Concurrent Recursive Programs}, pages = {410-424}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGH-fossacs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BGH-fossacs09.pdf}, doi = {10.1007/978-3-642-00596-1_29}, abstract = {We define and study an automata model of concurrent recursive programs. An~automaton consists of a finite number of pushdown systems running in parallel and communicating via shared actions. Actually, we combine multi-stack visibly pushdown automata and Zielonka's asynchronous automata towards a model with an undecidable emptiness problem. However, a reasonable restriction allows us to lift Zielonka's Theorem to this recursive setting and permits a logical characterization in terms of a suitable monadic second-order logic. Building on results from Mazurkiewicz trace theory and work by La~Torre, Madhusudan, and Parlato, we thus develop a framework for the specification, synthesis, and verification of concurrent recursive processes.} }
@article{DKR-jcs09, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Symbolic bisimulation for the applied pi~calculus}, year = 2010, month = mar, volume = 18, number = 2, pages = {317-377}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-jcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-jcs09.pdf}, doi = {10.3233/JCS-2010-0363}, abstract = {We propose a symbolic semantics for the finite applied pi~calculus. The~applied pi calculus is a variant of the pi~calculus with extensions for modelling cryptographic protocols. By~treating inputs symbolically, our semantics avoids potentially infinite branching of execution trees due to inputs from the environment. Correctness is maintained by associating with each process a set of constraints on terms. We~define a symbolic labelled bisimulation relation, which is shown to be sound but not complete with respect to standard bisimulation. We explore the lack of completeness and demonstrate that the symbolic bisimulation relation is sufficient for many practical examples. This~work is an important step towards automation of observational equivalence for the finite applied pi calculus, \textit{e.g.}~for verification of anonymity or strong secrecy properties.} }
@inproceedings{FGL-stacs2009, address = {Freiburg, Germany}, month = feb, year = 2009, volume = 3, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Albers, Susanne and Marion, Jean-Yves}, acronym = {{STACS}'09}, booktitle = {{P}roceedings of the 26th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'09)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for~{WSTS}, Part~{I}: Completions}, pages = {433-444}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-stacs2009.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FGL-stacs2009.pdf}, abstract = {Well-structured transition systems provide the right foundation to compute a finite basis of the set of predecessors of the upward closure of a state. The~dual problem, to compute a finite representation of the set of successors of the downward closure of a state, is~harder: Until now, the theoretical framework for manipulating downward-closed sets was missing. We~answer this problem, using insights from domain theory (dcpos and ideal completions), from topology (sobrifications), and shed new light on the notion of adequate domains of limits.} }
@inproceedings{CGS-sofsem09, address = {\v{S}pindler\r{u}v Ml\'{y}n, Czech Republic}, month = jan, year = 2009, volume = 5404, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Nielsen, Mogens and Ku{\v c}era, Anton{\'\i}n and Bro Miltersen, Peter and Palamidessi, Catuscia and T{\r{u}}ma, Petr and Valencia, Franck}, acronym = {{SOFSEM}'09}, booktitle = {{P}roceedings of the 35th International Conference on Current Trends in Theory and Practice of Computer Science ({SOFSEM}'09)}, author = {Chatain, {\relax Th}omas and Gastin, Paul and Sznajder, Nathalie}, title = {Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems}, pages = {141-152}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CGS-sofsem09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CGS-sofsem09.pdf}, doi = {10.1007/978-3-540-95891-8_16}, abstract = {We study the synthesis problem in an asynchronous distributed setting: a finite set of processes interact locally with an uncontrollable environment and communicate with each other by sending signals---actions that are immediately received by the target process. The synthesis problem is to come up with a local strategy for each process such that the resulting behaviours of the system meet a given specification. We consider external specifications over partial orders. External means that specifications only relate input and output actions from and to the environment and not signals exchanged by processes. We also ask for some closure properties of the specification. We present this new setting for studying the distributed synthesis problem, and give decidability results: the non-distributed case, and the subclass of networks where communication happens through a strongly connected graph. We believe that this framework for distributed synthesis yields decidability results for many more architectures.} }
@inproceedings{BDLM-lfcs09, address = {Deerfield Beach, Florida, USA}, month = jan, year = 2009, volume = 5407, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Artemov, Sergei N. and Nerode, Anil}, notefortitle = {6th edition of the conference}, acronym = {{LFCS}'09}, booktitle = {{P}roceedings of the {S}ymposium on {L}ogical {F}oundations of {C}omputer {S}cience ({LFCS}'09)}, author = {Brihaye, {\relax Th}omas and Da{~}Costa, Arnaud and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {{ATL}~with Strategy Contexts and Bounded Memory}, pages = {92-106}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDLM-lfcs09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDLM-lfcs09.pdf}, doi = {10.1007/978-3-540-92687-0_7}, abstract = {We extend the alternating-time temporal logics ATL and ATL\textsuperscript{*} with \emph{strategy contexts} and \emph{memory constraints}: the first extension make strategy quantifiers to not {"}forget{"} the strategies being executed by the other players. The second extension allows strategy quantifiers to restrict to memoryless or bounded-memory strategies.\par We first consider expressiveness issues. We show that our logics can express important properties such as equilibria, and we formally compare them with other similar formalisms (ATL, ATL\textsuperscript{*}, Game Logic, Strategy Logic,~...). We~then address the problem of model-checking for our logics, providing a PSPACE algoritm for the sublogics involving only memoryless strategies and an EXPSPACE algorithm for the bounded-memory case.} }
@inproceedings{ABGR-datalog10, address = {Oxford, UK}, month = mar, year = 2011, volume = 6702, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {de Moor, Oege and Gottlob, Georg and Furche, Tim and Sellers, Andrew Jon}, acronym = {{D}atalog'10}, booktitle = {{R}evised {S}elected {P}apers of the 1st {I}nternational {W}orkshop {D}atalog {R}eloaded ({D}atalog'10)}, author = {Abiteboul, Serge and Bienvenu, Meghyn and Galland, Alban and Rousset, Marie-{\relax Ch}ristine}, title = {Distributed {D}atalog Revisited}, pages = {252-261}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGR-datalog10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGR-datalog10.pdf}, doi = {10.1007/978-3-642-24206-9_15} }
@techreport{rr-lsv-10-23, author = {Bonnet, R{\'e}mi and Finkel, Alain and Haddad, Serge and Rosa{-}Velardo, Fernando}, title = {Comparing Petri Data Nets and Timed Petri Nets}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2010}, month = dec, type = {Research Report}, number = {LSV-10-23}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-23.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-23.pdf}, note = {16~pages}, abstract = {Well-Structured Transitions Systems (WSTS) constitute a generic class of infinite-state systems for which several properties like coverability remain decidable. The family of coverability languages that they generate is an appropriate criterium for measuring their expressiveness. Here we establish that Petri Data nets (PDNs) and Timed Petri nets (TdPNs), two powerful classes of WSTS are equivalent w.r.t this criterium.} }
@phdthesis{vacher-phd2010, author = {Vacher, Camille}, title = {Automates {\`a} contraintes globales pour la v{\'e}rification de propri{\'e}t{\'e}s de s{\'e}curit{\'e}}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2010, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vacher-phd.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vacher-phd.pdf} }
@phdthesis{place-phd2010, author = {Place, {\relax Th}omas}, title = {Decidable Characterizations for Tree Logics}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2010, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/place-phd.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/place-phd.pdf} }
@phdthesis{figueira-phd2010, author = {Figueira, Diego}, title = {On decidable automata on data words and data trees in relation to satisfiability of {LTL} and {XP}ath}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2010, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/figueira-phd.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/figueira-phd.pdf} }
@phdthesis{andre-phd2010, author = {Andr{\'e}, {\'E}tienne}, title = {An Inverse Method for the Synthesis of Timing Parameters in Concurrent Systems}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2010, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/andre-phd.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/andre-phd.pdf}, abstract = {This thesis proposes a novel approach for the synthesis of delays for timed systems. When verifying a real-time system, e.g., a hardware device or a communication protocol, it is important to check that not only the functional but also the timed behavior is correct. This correctness depends on the values of the delays of internal operations and of the environment.\par Formal verification methods guarantee the correctness of a timed system for a given set of delays, but do not give information for other values of the delays. Checking the correctness of for various values of those delays can be difficult and time consuming. It is thus interesting to consider that these delays are parameters. The problem then consists in synthesizing {"}good values{"} for those parameters, i.e., values for which the system is guaranteed to behave well.\par We are here interested in the synthesis of parameters in the framework of timed automata, a model for verifying real-time systems. Our approach relies on the following inverse method: given a reference valuation of the parameters, we synthesize a constraint on the parameters, guaranteeing the same time-abstract linear behavior as for the reference valuation. This gives a criterion of robustness to the system. By iterating this inverse method on various points of a bounded parameter domain, we are then able to partition the parametric space into good and bad zones, with respect to a given property one wants to verify. This gives a behavioral cartography of the system.\par This method extended to probabilistic systems allows to preserve minimum and maximum probabilities of reachability properties. We also present variants of the inverse method for directed weighted graphs and Markov Decision Processes. Several prototypes have been implemented; in particular, IMITATOR II implements the inverse method and the cartography for timed automata. It allowed us to synthesize parameter values for several case studies such as an abstract model of a memory circuit sold by the chipset manufacturer ST-Microelectronics, and various communication protocols. } }
@techreport{rr-lsv-10-22, author = {Soulat, Romain}, title = {On Properties of the Inverse Method: Commutation of Instanciation and Full Covering of the Behavioral Cartography}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2010}, month = dec, type = {Research Report}, number = {LSV-10-22}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-22.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-22.pdf}, note = {14~pages}, abstract = {When one performs an Inverse Method on a Parametric Timed Automata over an instance \(\pi_0\), one can instantiate some parameters at the very beginning of the analysis or at the end, with a restriction of the constraint \(K_0\) obtained in order to get a constraint over a subset of the parameters. In this report, we show that the results of either methods are the same. We present a theoretical proof and then an illustration of this property on the flip-flop example and the Root Contention protocol. We also present some results about the coverage of behavioral cartography and an illustration of the full covering on the SPSMALL memory.} }
@techreport{rr-lsv-10-21, author = {Andr{\'e}, {\'E}tienne}, title = {Synthesizing Parametric Constraints on Various Case Studies Using {IMITATOR}~{II}}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2010}, month = dec, type = {Research Report}, number = {LSV-10-21}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-21.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-21.pdf}, note = {66~pages}, abstract = {We present here various case studies analyzed using IMITATOR II, a tool implementing the {"}inverse method{"} in the framework of parametric timed automata: given a reference valuation of the parameters, it synthesizes a constraint such that the system behaves the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions.\par This is useful for safely relaxing some values of the reference valuation, and optimizing timing bounds of the system.\par Besides the inverse method, IMITATOR~II also implements the {"}behavioral cartography algorithm{"}, allowing to solve the following good parameters problem: find a set of valuations within a given rectangle for which the system behaves well.\par We present here a range of case studies, communication protocols, hardware circuits and industrial case studies for which constraints guaranteeing a good behavior were synthesized using IMITATOR~II.} }
@article{bbdfh-pe10, publisher = {Elsevier Science Publishers}, journal = {Performance Evaluation}, author = {Baarir, Souheib and Beccuti, Marco and Dutheillet, Claude and Franceschinis, Giuliana and Haddad, Serge}, title = {Lumping partially symmetrical stochastic models}, volume = 76, nunmber = 1, month = jan, pages = {21-44}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bbdfh-pe10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bbdfh-pe10.pdf}, doi = {10.1016/j.peva.2010.09.002}, abstract = {The performance and dependability evaluation of complex systems by means of dynamic stochastic models (e.g. Markov chains) may be impaired by the combinatorial explosion of their state space. Among the possible methods to cope with this problem, symmetry-based ones can be applied to systems including several similar components. Often however these systems are only partially symmetric: their behavior is in general symmetric except for some local situation when the similar components need to be differentiated.\par In this paper two methods to efficiently analyze partially symmetrical models are presented in a general setting and the requirements for their efficient implementation are discussed. Some case studies are presented to show the methods' effectiveness and their applicative interest.} }
@techreport{rr-lsv-10-20, author = {Andr{\'e}, {\'E}tienne}, title = {{IMITATOR}~{II} User Manual}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2010}, month = nov, type = {Research Report}, number = {LSV-10-20}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-20.pdf}, note = {31~pages}, abstract = {We present here the user manual of IMITATOR~II, a~tool implementing the {"}inverse method{"} in the framework of parametric timed automata: given a reference valuation of the parameters, its generates a constraint such that the system behaves the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions. This is useful for safely relaxing some values of the reference valuation, and optimizing timing bounds of the system.\par Besides the inverse method, IMITATOR II also implements the {"}behavioral cartography algorithm{"}, allowing to solve the following good parameters problem: find a set of valuations within a given rectangle for which the system behaves well.\par We give here the installation requirements and the launching commands of IMITATOR~II, as~well as the source code of a toy example.} }
@article{JKV-icomp10, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Jacquemard, Florent and Klay, Francis and Vacher, Camille}, title = {Rigid Tree Automata}, volume = {209}, number = 3, pages = {486-512}, year = 2011, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-icomp11.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-icomp11.pdf}, doi = {10.1016/j.ic.2010.11.015}, abstract = {We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a restriction on the computation of RTA on trees: RTA can test for equality in subtrees reaching the same rigid state. RTA are able to perform local and global tests of equality between subtrees, non-linear tree pattern matching, and restricted disequality tests as well. Properties like determinism, pumping lemma, boolean closure, and several decision problems are studied in detail. In particular, the emptiness problem is shown decidable in linear time for RTA whereas membership of a given tree to the language of a given RTA is NP-complete. Our main result is the decidability of whether a given tree belongs to the rewrite closure of a RTA language under a restricted family of term rewriting systems, whereas this closure is not a RTA language. This result, one of the first on rewrite closure of languages of tree automata with constraints, is enabling the extension of model checking procedures based on finite tree automata techniques. Finally, a comparison of RTA with several classes of tree automata with local and global equality tests, and with dag automata is also provided.} }
@mastersthesis{rodriguez-master, author = {Rodr{\'\i}guez, C{\'e}sar}, title = {Implementation of a complete prefix unfolder for contextual nets}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cr-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cr-m2.pdf} }
@article{AFFM-rsl10, publisher = {Cambridge University Press}, journal = {Review of Symbolic Logic}, author = {Areces, Carlos and Figueira, Diego and Figueira, Santiago and Mera, Sergio}, title = {The Expressive Power of Memory Logics}, year = {2011}, month = jun, volume = 4, number = 2, pages = {290 - 318 }, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFFM-rsl10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFFM-rsl10.pdf}, doi = {10.1017/S1755020310000389}, abstract = {We investigate the expressive power of \emph{memory logics}. These are modal logics extended with the possibility to store (or remove) the current node of evaluation in (or from) a \emph{memory}, and to perform membership tests on the current memory. From this perspective, the hybrid logic \(\mathcal{HL}(\downarrow)\), for example, can be thought of as a particular case of a memory logic where the memory is an indexed list of elements of the domain.\par This work focuses in the case where the memory is a set, and we can test whether the current node belongs to the set or not. We prove that, in terms of expressive power, the memory logics we discuss here lie between the basic modal logic \(\mathcal{K}\) and \(\mathcal{HL}(\downarrow)\). We show that the satisfiability problem of most of the logics we cover is undecidable. The only logic with a decidable satisfiability problem is obtained by imposing strong constraints on which elements can be memorized.} }
@inproceedings{hmy-bpsc10, address = {Leipzig, Germany}, month = sep # {-} # oct, year = 2010, volume = {177}, series = {Lecture Notes in Informatics}, publisher = {Gesellschaft f{\"u}r Informatik}, editor = {Abramowicz, Witold and Alt, Rainer and F{\"a}hnrich, Klaus-Peter and Franczyk, Bogdan and Maciaszek, Leszek A.}, acronym = {{ISSS}{\slash}{BPSC}'10}, booktitle = {{P}roceedings of the 2nd {I}nternational {S}ymposium on {S}ervices {S}cience and 3rd {I}nternational {C}onference on {B}usiness {P}rocess and {S}ervices {C}omputing ({ISSS}{\slash}{BPSC}'10)}, author = {Haddad, Serge and Mokdad, Lynda and Youcef, Samir}, title = {Selection of the Best composite Web Service Based on Quality of Service}, pages = {255-266}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hmy-bpsc10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hmy-bpsc10.pdf}, abstract = {The paper proposes a general framework to composite Web services selection based on multicriteria evaluation. The proposed framework extends the Web services architecture by adding, in the registry, a new Multicriteria Evaluation Component~(MEC) devoted to multicriteria evaluation. This additional component takes as input a set of composite Web services and a set of evaluation criteria and generates a set of recommended composite Web services. In~addition to the description of the conceptual architecture of the formwork, the paper also proposes solutions to construct and evaluate composite web services. In order to show the feasibility of the proposed architecture, we~have developed a prototype based on the open source jUDDI registry.} }
@inproceedings{CSV-vmcai11, address = {Austin, Texas, USA}, month = jan, year = 2011, volume = 6538, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jhala, Ranjit and Schmidt, David}, acronym = {{VMCAI}'11}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'11)}, author = {Chadha, Rohit and Sistla, A. Prasad and Viswanathan, Mahesh}, title = {Probabilistic {B}{\"u}chi automata with non-extremal acceptance thresholds}, pages = {103-117}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-vmcai11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-vmcai11.pdf}, doi = {10.1007/978-3-642-18275-4_9}, abstract = {This paper investigates the power of Probabilistic B{\"u}chi Automata~(PBA) when the threshold probability of acceptance is non-extremal, i.e., is a value strictly between 0 and 1. Many practical randomized algorithms are designed to work under non-extremal threshold probabilities and thus it is important to study power of PBAs for such cases.\par The paper presents a number of surprising expressiveness and decidability results for PBAs when the threshold probability is non-extremal. Some of these results sharply contrast with the results for extremal threshold probabilities. The paper also presents results for Hierarchical PBAs and for an interesting subclass of them called simple PBAs.} }
@inproceedings{steel-escar09, address = {D{\"u}sseldorf, Germany}, month = nov, year = 2009, editor = {Paar, Christof and Wollinger, Thomas}, acronym = {{ESCAR}'09}, booktitle = {{P}roceedings of the 7th {C}onference on {E}mbedded {S}ecurity in {C}ars ({ESCAR}'09)}, author = {Steel, Graham}, title = {Towards a Formal Analysis of the {S}e{V}e{C}o{M}~{API}}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/steel-escar09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/steel-escar09.pdf} }
@inproceedings{steel-fcc09, address = {Port Jefferson, New York, USA}, month = jul, year = 2009, editor = {K{\"u}sters, Ralf}, acronym = {{FCC}'09}, booktitle = {{P}roceedings of the 5th {W}orkshop on {F}ormal and {C}omputational {C}ryptography ({FCC}'09)}, author = {Steel, Graham}, title = {Computational Soundness for {API}s}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/steel-fcc09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/steel-fcc09.pdf} }
@inproceedings{SC-fcc07, address = {Venice, Italy}, month = jul, year = 2007, editor = {Backes, Michael and Lakhnech, Yassine}, acronym = {{FCC}'07}, booktitle = {{P}roceedings of the 3rd {W}orkshop on {F}ormal and {C}omputational {C}ryptography ({FCC}'07)}, author = {Steel ,Graham and Courant, Judica{\"e}l}, title = {A formal model for detecting parallel key search attacks}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SC-fcc07.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SC-fcc07.pdf} }
@mastersthesis{scerri-master, author = {Scerri, Guillaume}, title = {Mod{\'e}lisation des cl{\'e}s de l'intrus}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, nmnote = {Hubert prefere ne pas diffuser le rapport, et prepare une version 'conf'} }
@mastersthesis{bonnet-master, author = {Bonnet, R{\'e}mi}, title = {Well-structured {P}etri-nets extensions with data}, school = {{M}aster Computer Science, EPFL, Lausanne, Switzerland}, type = {Rapport de {M}aster}, year = {2010}, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-m2.pdf} }
@article{LMT-tcs10, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Lanotte, Ruggero and Maggiolo{-}Schettini, Andrea and Troina, Angelo}, title = {Weak bisimulation for Probabilistic Timed Automata?}, volume = 411, number = 50, year = 2010, month = nov, pages = {4291-4322}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LMT-tcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LMT-tcs10.pdf}, doi = {10.1016/j.tcs.2010.09.003}, abstract = {We are interested in describing timed systems that exhibit probabilistic behaviour. To this purpose, we consider a model of Probabilistic Timed Automata and introduce a concept of weak bisimulation for these automata, together with an algorithm to decide it. The weak bisimulation relation is shown to be preserved when either time, or probability is abstracted away. As an application, we use weak bisimulation for Probabilistic Timed Automata to model and analyze a timing attack on the dining cryptographers protocol.} }
@inproceedings{LS-DL09, address = {Oxford, UK}, month = jul, year = 2009, volume = 477, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Cuenca Grau, Bernardo and Horrocks, Ian and Motik, Boris and Sattler, Ulrike }, acronym = {{DL}'09}, booktitle = {{P}roceedings of the 22nd {I}nternational {W}orkshop {D}escription {L}ogic ({DL}'09)}, author = {Libkin, Leonid and Sirangelo, Cristina}, title = {Open and closed world assumptions in data exchange}, pages = {1-6}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-DL09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-DL09.pdf} }
@techreport{rr-lsv-10-17, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu and Zeitoun, Marc}, title = {Distributed Synthesis with Incomparable Information}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2010}, month = oct, type = {Research Report}, number = {LSV-10-17}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-17.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-17.pdf}, note = {20~pages}, abstract = {Given (1)~an architecture defined by processes and communication channels between them or with the environment, and (2)~a~specification on the messages transmitted over the channels, distributed synthesis aims at deciding existence of local programs, one for each process, that together meet the specification, whatever the environment does. Recent work shows that this problem can be solved when a \emph{linear preorder} sorts the agents w.r.t. the information received from the environment.\par In this paper we show a new decidability result in the case where this preorder is broken by the addition of noisy agents embedded in a pipeline architecture. This case cannot be captured by the classical framework. Besides, this architecture makes it possible to model particular security threats, known as covert channels, where two users (the sender and the receiver) manage to communicate via a noisy protocol, and despite incomparable views over the environment.} }
@article{CD-jar10, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Decidability and combination results for two notions of knowledge in security protocols}, volume = 48, number = {4}, pages = {441-487}, month = apr, year = 2012, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-jar10.pdf}, doi = {10.1007/s10817-010-9208-8}, abstract = {In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic functions (encryption, exclusive~or,~...). The analysis of cryptographic protocols requires a precise understanding of the attacker knowledge. Two standard notions are usually considered: deducibility and indistinguishability. Those notions are well-studied and several decidability results already exist to deal with a variety of equational theories. Most of the existing results are dedicated to specific equational theories and only few results, especially in the case of indistinguishability, have been obtained for equational theories with associative and commutative properties~(AC).\par In this paper, we show that existing decidability results can be easily combined for any disjoint equational theories: if the deducibility and indistinguishability relations are decidable for two disjoint theories, they are also decidable for their union. We also propose a general setting for solving deducibility and indistinguishability for an important class (called \emph{monoidal}) of equational theories involving AC operators.\par As a consequence of these two results, new decidability and complexity results can be obtained for many relevant equational theories.} }
@incollection{DR-lgtcs10, month = jan, year = 2011, publisher = {Cambridge University Press}, booktitle = {Lectures in Game Theory for Computer Scientists}, editor = {Apt, Krzysztof R. and Gr{\"a}del, Erich}, author = {Doyen, Laurent and Raskin, Jean-Fran{\c{c}}ois}, title = {Games with Imperfect Information: Theory and Algorithms}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-lgtcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-lgtcs10.pdf}, ps = {DR-lgtcs10.ps} }
@article{CDH-lmcs10, journal = {Logical Methods in Computer Science}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, {\relax Th}omas A.}, title = {Expressiveness and Closure Properties for Quantitative Languages}, volume = 6, number = {3:10}, nopages = {}, month = sep, year = 2010, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-lmcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-lmcs10.pdf}, ps = {CDH-lmcs10.ps}, doi = {10.2168/LMCS-6(3:10)2010}, abstract = {Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages~\(L\) that assign to each word~\(w\) a real number~\(L(w)\). In the case of infinite words, the value of a run is naturally computed as the maximum, limsup, liminf, limit-average, or discounted-sum of the transition weights. The value of a word \(w\) is the supremum of the values of the runs over \(w\). We study expressiveness and closure questions about these quantitative languages.\par We first show that the set of words with value greater than a threshold can be non-\(omega\)-regular for deterministic limit-average and discounted-sum automata, while this set is always \(omega\)-regular when the threshold is isolated (i.e., some neighborhood around the threshold contains no word). In the latter case, we prove that the \(omega\)-regular language is robust against small perturbations of the transition weights.\par We next consider automata with transition weights~\(0\) or \(1\) and show thatthey are as expressive as general weighted automata in the limit-average case, but not in the discounted-sum case.\par Third, for quantitative languages \(L_1\) and~\(L_2\), we consider the operations\(max(L_1,L_2)\), \(min(L_1,L_2)\), and \(1-L_1\), which generalize the booleanoperations on languages, as well as the sum \(L_1 + L_2\). We establish the closure properties of all classes of quantitative languages with respect to these four operations.} }
@inproceedings{CD-lpar10, address = {Yogyakarta, Indonesia}, month = oct, year = 2010, volume = {6397}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Fernm{\"u}ller, Chrisaitn G. and Voronkov, Andrei}, acronym = {{LPAR}'10}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'10)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {The Complexity of Partial-Observation Parity Games}, pages = {1-14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lpar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lpar10.pdf}, ps = {CD-lpar10.ps}, doi = {10.1007/978-3-642-16242-8_1}, abstract = {We consider two-player zero-sum games on graphs. On the basis of the information available to the players these games can be classified as follows: (a)~partial-observation (both players have partial view of the game); (b)~one-sided partial-observation (one player has partial-observation and the other player has complete-observation); and (c)~complete-observation (both players have complete view of the game). We survey the complexity results for the problem of deciding the winner in various classes of partial-observation games with \(\omega\)-regular winning conditions specified as parity objectives. We present a reduction from the class of parity objectives that depend on sequence of states of the game to the sub-class of parity objectives that only depend on the sequence of observations. We also establish that partial-observation acyclic games are PSPACE-complete.} }
@inproceedings{haar-wodes10, address = {Berlin, Germany}, month = aug # {-} # sep, year = 2010, publisher = {IFAC}, editor = {Raisch, J{\"o}rg and Giua, Alessandro and Lafortune, St{\'e}phane and Moor, Thomas}, acronym = {{WODES}'10}, booktitle = {{P}roceedings of the 10th {W}orkshop on {D}iscrete {E}vent {S}ystems ({WODES}'10)}, author = {Haar, Stefan}, title = {What Topology Tells us about Diagnosability in Partial Order Semantics}, pages = {221-226}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SH-wodes10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SH-wodes10.pdf}, abstract = {From a partial observation of the behaviour of a labeled Discrete Event System, fault Diagnosis strives to determine whether or not a given {"}invisible{"} fault event has occurred. The diagnosability problem can be stated as follows: does the labeling allow for an outside observer to determine the occurrence of the fault, no later than a bounded number of events after that unobservable occurrence? In concurrent systems, partial order semantics adds to the difficulty of the problem, but also provides a richer and more complex picture of observation and diagnosis. In particular, it is crucial to clarify the intuitive notion of {"}time after fault occurrence{"}. To this end, we will use a unifying metric framework for event structures, providing a general topological description of diagnosability in both sequential and nonsequential semantics for Petri nets.} }
@inproceedings{AJRG-comnet10, address = {Tozeur, Tunisia}, month = nov, year = 2010, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{C}om{N}et'10}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}onference on {C}ommunications and {N}etworking ({C}om{N}et'10)}, author = {Abassi, Ryma and Jacquemard, Florent and Rusinowitch, Micha{\"e}l and Guemara{ }El{~}Fatmi, Sihem}, title = {{XML} Access Control: from {XACML} to Annotated Schemas}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AJRG-comnet10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AJRG-comnet10.pdf}, doi = {10.1109/COMNET.2010.5699810}, abstract = {XML became the \textit{de facto} standard for the data representation and exchange on the internet. Regarding XML documents access control policy definition, OASIS ratified the XACML standard. It is a declarative language allowing the specification of authorizations as rules. Furthermore, it is common to formally represent XML documents as labeled trees and to handle secure requests through `user views'. A user view is the part of the document accessible to a given user according to the existing policy. Moreover, control access polices can be depicted as annotated rules where annotations define for each document node whether it is accessible. Hence, an annotated schema is a formal representation of `user views'.\par Our main contribution in this paper is then three folds. First, we compare XACML policies and annotated schemas. Second, we identify a significant fragment of XACML since this latter is very expressive and consequently complex. Third, we define adequate translation algorithms from XACML policies to annotated schemas.} }
@inproceedings{JR-ppdp10, address = {Hagenberg, Austria}, month = jul, year = 2010, publisher = {ACM Press}, editor = {Kutsia, Temur and Schreiner, Wolfgang and Fern{\'a}ndez, Maribel}, acronym = {{PPDP}'10}, booktitle = {{P}roceedings of the 12th {I}nternational {ACM} {SIGPLAN} {C}onference on {P}rinciples and {P}ractice of {D}eclarative {P}rogramming ({PPDP}'10)}, author = {Jacquemard, Florent and Rusinowitch, Micha{\"e}l}, title = {Rewrite-based verification of {XML} updates}, pages = {119-130}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JR-ppdp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JR-ppdp10.pdf}, doi = {10.1145/1836089.1836105}, abstract = {We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: {"}insert an unranked tree from a regular tree language~\(L\) as the first child of a node labeled by~\(a\){"}. For these rules, we give type inference algorithms, considering types defined by several classes of unranked tree automata. These type inference algorithms are directly applicable to XML static typechecking, which is the problem of verifying whether, a given document transformation always converts source documents of a given input type into documents of a given output type. We show that typechecking for arbitrary sequences of XML update primitives can be done in polynomial time when the unranked tree automaton defining the output type is deterministic and complete, and that it is EXPTIME-complete otherwise.\par We then apply the results to the verification of access control policies for XML updates. We propose in particular a polynomial time algorithm for the problem of local consistency of a policy, that is, for deciding the non-existence of a sequence of authorized update operations starting from a given document that simulates a forbidden update operation.} }
@article{NSV-tods10, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Nash, Alan and Segoufin, Luc and Vianu, Victor}, title = {Views and queries: Determinacy and rewriting}, volume = 35, number = 3, month = jul, year = 2010, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/NSV-tods10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NSV-tods10.pdf}, doi = {10.1145/1806907.1806913}, abstract = {We investigate the question of whether a query~\(Q\) can be answered using a set~\(\textbf{V}\) of views. We first define the problem in information-theoretic terms: we say that \(\textbf{V}\) determines~\(Q\) if \(\textbf{V}\)~provides enough information to uniquely determine the answer to~\(Q\). Next, we look at the problem of rewriting~\(Q\) in terms of~\(\textbf{V}\) using a specific language. Given a view language~\(\textbf{V}\) and query language~\(\mathcal{Q}\), we say that a rewriting language is complete for \(\mathcal{V}\)-to-\(\mathcal{Q}\) rewritings if every \(Q\in\mathcal{Q}\) can be rewritten in terms of \(\textbf{V}\in\mathcal{V}\) using a query in~\(\mathcal{R}\), whenever \(\textbf{V}\) determines~\(Q\). While query rewriting using views has been extensively investigated for some specific languages, the connection to the information-theoretic notion of determinacy, and the question of completeness of a rewriting language, have received little attention. In this paper we investigate systematically the notion of determinacy and its connection to rewriting. The results concern decidability of determinacy for various view and query languages, as well as the power required of complete rewriting languages. We consider languages ranging from first-order to conjunctive queries.} }
@inproceedings{KBBB-fmcad10, address = {Lugano, Switzerland}, month = oct, year = 2010, publisher = {{IEEE} Computer Society Press}, editor = {Bloem, Roderick and Sharygina, Natasha}, acronym = {{FMCAD}'10}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {F}ormal {M}ethods in {C}omputer {A}ided {D}esign ({FMCAD}'10)}, author = {K{\"u}hne, Ulrich and Beyer, Sven and Bormann, J{\"o}rg and Barstow, John}, title = {Automated Formal Verification of Processors Based on Architectural Models}, pages = {129-136}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KBBB-fmcad10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KBBB-fmcad10.pdf}, abstract = {To keep up with the growing complexity of digital systems, high level models are used in the design process. In today's processor design, a comprehensive tool chain can be built automatically from architectural or transaction level models, but disregarding formal verification. We present an approach to automatically generate a complete property suite from an architecture description, that can be used to formally verify a register transfer level (RTL) implementation of a processor. The property suite is complete by construction, i.e. an exhaustive verification of all the functionality of the processor is ensured by the method. It allows for the efficient verification of single pipeline processors, including several advanced processor features like multicycle instructions. At the same time, the structured approach reduces the effort for verification significantly compared to a manual complete formal verification. The presented techniques have been implemented in the tool FISACo, which is demonstrated on an industrial processor.} }
@article{AHLNW-mscs10, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Antonik, Adam and Huth, Michael and Larsen, Kim~G. and Nyman, Ulrik and W{\k{a}}sowski, Andrzej}, title = {Modal and mixed specifications: key decision problems and their complexities}, volume = 10, number = 1, month = feb, year = 2010, pages = {75-103}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AHLNW-mscs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AHLNW-mscs10.pdf}, doi = {10.1017/S0960129509990260}, abstract = {Modal and mixed transition systems are specification formalisms that allow the mixing of over- and under-approximation. We discuss three fundamental decision problems for such specifications: \begin{itemize} \item whether a set of specifications has a common implementation; \item whether an individual specification has an implementation; and \item whether all implementations of an individual specification are implementations of another one. \end{itemize} For each of these decision problems we investigate the worst-case computational complexity for the modal and mixed cases. We show that the first decision problem is EXPTIME-complete for both modal and mixed specifications. We prove that the second decision problem is EXPTIME-complete for mixed specifications (it is known to be trivial for modal ones). The third decision problem is also shown to be EXPTIME-complete for mixed specifications.} }
@inproceedings{BGGLP-scan10, address = {Lyon, France}, month = sep, year = 2010, noeditor = {}, acronym = {SCAN'10}, booktitle = {{P}roceedings of the 14th {GAMM}-{IMACS} {I}nternational {S}ymposium on {S}cientific {C}omputing, {C}omputer {A}rithmetic and {V}alidated {N}umerics ({SCAN}'10)}, author = {Bouissou, Olivier and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean and Putot, Sylvie}, title = {A Generalization of {P}-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs}, nopages = {} }
@article{GLK-mscs10, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean and Keimel, Klaus}, title = {{C}hoquet-{K}endall-{M}atheron Theorems for Non-{H}ausdorff Spaces}, volume = 21, number = 3, pages = {511-561}, month = jun, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf}, doi = {10.1017/S0960129510000617}, abstract = {We establish Choquet-Kendall-Matheron theorems on non-Hausdorff topological spaces. This typical result of random set theory is profitably recast in purely topological terms, using intuitions and tools from domain theory. We obtain three variants of the theorem, each one characterizing distributions, in the form of continuous valuations, over relevant powerdomains of demonic, resp. angelic, resp. erratic non-determinism.} }
@article{DR-lmcs10, journal = {Logical Methods in Computer Science}, author = {Demri, St{\'e}phane and Rabinovich, Alexander}, title = {The Complexity of Linear-time Temporal Logic over the Class of Ordinals}, volume = 6, number = 4, nopages = {}, month = dec, year = 2010, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-lmcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-lmcs10.pdf}, doi = {10.2168/LMCS-6(4:9)2010}, abstract = {We consider the temporal logic with since and until modalities. This temporal logic is expressively equivalent over the class of ordinals to first-order logic by Kamp's theorem. We show that it has a PSPACE-complete satisfiability problem over the class of ordinals. Among the consequences of our proof, we show that given the code of some countable ordinal~\(\alpha\) and a formula, we can decide in PSPACE whether the formula has a model over~\(\alpha\). In order to show these results, we introduce a class of simple ordinal automata, as expressive as B{\"u}chi ordinal automata. The PSPACE upper bound for the satisfiability problem of the temporal logic is obtained through a reduction to the nonemptiness problem for the simple ordinal automata.} }
@inproceedings{SD-jelia10, address = {Helsinki, Finland}, month = sep, year = 2010, volume = 6431, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Niemel{\"a}, Ilkka and Janhunen, Tomi}, acronym = {{JELIA}'10}, booktitle = {{P}roceedings of the 12th {E}uropean {C}onference on {L}ogics in {A}rtificial {I}ntelligence ({JELIA}'10)}, author = {Demri, St{\'e}phane}, title = {Counter Systems for Data Logics}, pages = {10}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SD-jelia10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SD-jelia10.pdf}, doi = {10.1007/978-3-642-15675-5_3}, abstract = {Data logics are logical formalisms that are used to specify properties on structures equipped with data (data words, data trees, runs from counter systems, timed words, etc.). In this survey talk, we shall see how satisfiability problems for such data logics are related to reachability problems for counter systems (including counter automata with errors, vector addition systems with states, etc.). This is the opportunity to provide an overview about the relationships between data logics and verification problems for counter systems.} }
@inproceedings{CSV-fsttcs10, address = {Chennai, India}, month = dec, year = 2010, volume = 8, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'10}, booktitle = {{P}roceedings of the 30th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'10)}, author = {Chadha, Rohit and Sistla, A. Prasad and Viswanathan, Mahesh}, title = {Model Checking Concurrent Programs with Nondeterminism and Randomization}, pages = {364-375}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-fsttcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-fsttcs10.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2010.364}, abstract = {For concurrent probabilistic programs having process-level nondeterminism, it is often necessary to restrict the class of schedulers that resolve nondeterminism to obtain sound and precise model checking algorithms. In this paper, we introduce two classes of schedulers called \emph{view consistent} and \emph{locally Markovian} schedulers and consider the model checking problem of concurrent, probabilistic programs under these alternate semantics. Specifically, given a B{\"u}chi automaton~\(\textsf{Spec}\), a~threshold~\(x\in[0,1]\), and a concurrent program~\(\mathbb{P}\), the model checking problem asks if the measure of computations of~\(\mathbb{P}\) that satisfy~\(\textsf{Spec}\) is at least~\(x\), under all view consistent (or locally Markovian) schedulers. We give precise complexity results for the model checking problem (for different classes of B{\"u}chi automata specifications) and contrast it with the complexity under the standard semantics that considers all schedulers. } }
@inproceedings{AGMN-fsttcs10, address = {Chennai, India}, month = dec, year = 2010, volume = 8, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'10}, booktitle = {{P}roceedings of the 30th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'10)}, author = {Akshay, S. and Gastin, Paul and Mukund, Madhavan and Narayan Kumar, K.}, title = {Model checking time-constrained scenario-based specifications}, pages = {204-215}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGMN-fsttcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGMN-fsttcs10.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2010.204}, abstract = {We consider the problem of model checking message-passing systems with real-time requirements. As behavioural specifications, we use message sequence charts (MSCs) annotated with timing constraints. Our system model is a network of communicating finite state machines with local clocks, whose global behaviour can be regarded as a timed automaton. Our goal is to verify that all timed behaviours exhibited by the system conform to the timing constraints imposed by the specification. In general, this corresponds to checking inclusion for timed languages, which is an undecidable problem even for timed regular languages. However, we show that we can translate regular collections of time-constrained MSCs into a special class of event-clock automata that can be determinized and complemented, thus permitting an algorithmic solution to the model checking problem.} }
@inproceedings{CDHR-fsttcs10, address = {Chennai, India}, month = dec, year = 2010, volume = 8, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'10}, booktitle = {{P}roceedings of the 30th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'10)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, {\relax Th}omas A. and Raskin, Jean-Fran{\c{c}}ois}, title = {Generalized Mean-payoff and Energy Games}, pages = {505-516}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDHR-fsttcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDHR-fsttcs10.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2010.505} }
@inproceedings{BFLZ-fsttcs10, address = {Chennai, India}, month = dec, year = 2010, volume = 8, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'10}, booktitle = {{P}roceedings of the 30th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'10)}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Zeitoun, Marc}, title = {Place-Boundedness for Vector Addition Systems with one zero-test}, pages = {192-203}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLZ-fsttcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLZ-fsttcs10.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2010.192}, abstract = {Reachability and boundedness problems have been shown decidable for Vector Addition Systems with one zero-test. Surprisingly, place-boundedness remained open. We provide here a variation of the Karp-Miller algorithm to compute a basis of the downward closure of the reachability set which allows to decide place-boundedness. This forward algorithm is able to pass the zero-tests thanks to a finer cover, hybrid between the reachability and cover sets, reclaiming accuracy on one component. We show that this filtered cover is still recursive, but that equality of two such filtered covers, even for usual Vector Addition Systems (with no zero-test), is undecidable.} }
@inproceedings{HBMOW-fsttcs10, address = {Chennai, India}, month = dec, year = 2010, volume = 8, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'10}, booktitle = {{P}roceedings of the 30th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'10)}, author = {Hunter, Paul and Bouyer, Patricia and Markey, Nicolas and Ouaknine, Jo{\"e}l and Worrell, James}, title = {Computing rational radical sums in uniform \(\textsf{TC}^{0}\)}, pages = {308-316}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HBMOW-fsttcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HBMOW-fsttcs10.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2010.308}, abstract = {A~fundamental problem in numerical computation and computational geometry is to determine the sign of arithmetic expressions in radicals. Here we consider the simpler problem of deciding whether \(\sum_{i=1}^m C_i \cdot A_i^{X_i}\) is zero for given rational numbers~\(A_i\), \(C_i\),~\(X_i\). It~has been known for almost twenty years that this can be decided in polynomial time. In this paper we improve this result by showing membership in uniform \(\textsf{TC}^0\). This requires several significant departures from Bl{\"o}mer's polynomial-time algorithm as the latter crucially relies on primitives, such as gcd computation and binary search, that are not known to be in~\(\textsf{TC}^0\).} }
@inproceedings{DLM-fsttcs10, address = {Chennai, India}, month = dec, year = 2010, volume = 8, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Lodaya, Kamal and Mahajan, Meena}, acronym = {{FSTTCS}'10}, booktitle = {{P}roceedings of the 30th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'10)}, author = {Da{~}Costa, Arnaud and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {{ATL} with strategy contexts: Expressiveness and Model Checking}, pages = {120-132}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-fsttcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-fsttcs10.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2010.120}, abstract = {We study the alternating-time temporal logics \(\textsf{ATL}\) and~\(\textsf{ATL}^{*}\) extended with strategy contexts: these make agents commit to their strategies during the evaluation of formulas, contrary to plain \(\textsf{ATL}\) and~\(\textsf{ATL}^{*}\) where strategy quantifiers reset previously selected strategies.\par We illustrate the important expressive power of strategy contexts by proving that they make the extended logics, namely \(\textsf{ATL}_{\textsf{sc}}\) and~\(\textsf{ATL}_{\textsf{sc}}^{*}\), equally expressive: any~formula in~\(\textsf{ATL}_{\textsf{sc}}^{*}\) can be translated into an equivalent, linear-size \(\textsf{ATL}_{\textsf{sc}}\) formula. Despite the high expressiveness of these logics, we prove that they remain decidable by designing a tree-automata-based algorithm for model-checking \(\textsf{ATL}_{\textsf{sc}}\) on the full class of \(n\)-player concurrent game structures.} }
@proceedings{MW-time2010, author = {Markey, Nicolas and Wijsen, Jef}, editor = {Markey, Nicolas and Wijsen, Jef}, title = {{P}roceedings of the 17th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'10)}, booktitle = {{P}roceedings of the 17th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'10)}, year = 2010, month = sep, publisher = {{IEEE} Computer Society Press}, address = {Paris, France}, url = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?reload=true&isnumber=5601852}, doi = {10.1109/TIME.2010.4} }
@proceedings{GL-concur10, author = {Gastin, Paul and Laroussinie, Fran{\c{c}}ois}, editor = {Gastin, Paul and Laroussinie, Fran{\c{c}}ois}, title = {{P}roceedings of the 21st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'10)}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'10)}, year = 2010, month = aug # {-} # sep, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6269}, url = {http://www.springerlink.com/content/978-3-642-15374-7}, doi = {10.1007/978-3-642-15375-4} }
@inproceedings{FHL-express2010, address = {Paris, France}, month = aug, year = 2010, volume = 41, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Fr{\"o}schle, Sibylle and Valencia, Franck}, acronym = {{EXPRESS}'10}, booktitle = {{P}roceedings of the 17th {I}nternational {W}orkshop on {E}xpressiveness in {C}oncurrency ({EXPRESS}'10)}, author = {Figueira, Diego and Hofman, Piotr and Lasota, S{\l}awomir}, title = {Relating timed and register automata}, pages = {61-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FHL-express10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FHL-express10.pdf}, doi = {10.4204/EPTCS.41.5}, abstract = {Timed automata and register automata are well-known models of computation over timed and data words respectively. The former has clocks that allow to test the lapse of time between two events, whilst the latter includes registers that can store data values for later comparison. Although these two models behave in appearance differently, several decision problems have the same (un)decidability and complexity results for both models. As a prominent example, emptiness is decidable for alternating automata with one clock or register, both with non-primitive recursive complexity. This is not by chance.\par This work confirms that there is indeed a tight relationship between the two models. We show that a run of a timed automaton can be simulated by a register automaton, and conversely that a run of a register automaton can be simulated by a timed automaton. Our results allow to transfer complexity and decidability results back and forth between these two kinds of models. We justify the usefulness of these reductions by obtaining new results on register automata.} }
@inproceedings{DKRS-fast10, address = {Pisa, Italy}, month = sep, year = 2010, volume = 6561, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Etalle, Sandro and Guttman, Joshua}, acronym = {{FAST}'10}, booktitle = {{R}evised {S}elected {P}apers of the 7th {I}nternational {W}orkshop on {F}ormal {A}spects in {S}ecurity and {T}rust ({FAST}'10)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham}, title = {A~Formal Analysis of Authentication in the {TPM}}, pages = {111-125}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-fast10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-fast10.pdf}, ps = {DKRS-fast10.ps}, doi = {10.1007/978-3-642-19751-2_8}, abstract = {The Trusted Platform Module~(TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM provides a way to store cryptographic keys and other sensitive data in its shielded memory. Through its API, one can use those keys to achieve some security goals. The TPM is a complex security component, whose specification consists of more than \(700\)~pages.\par We model a collection of four TPM commands, and we identify and formalise their security properties. Using the tool ProVerif, we rediscover some known attacks and some new variations on them. We propose modifications to the API and verify our properties for the modified API.} }
@inproceedings{DKRS-secco10, address = {Paris, France}, month = aug, year = 2010, editor = {Cortier, V{\'e}ronique and Chatzikokolakis, Kostas}, acronym = {{SecCo}'10}, booktitle = {{P}reliminary {P}roceedings of the 8th {I}nternational {W}orkshop on {S}ecurity {I}ssues in {C}oordination {M}odels, {L}anguages and {S}ystems ({SecCo}'10)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham}, title = {A~Formal Analysis of Authentication in the~{TPM} (short paper)}, nopages = {}, nmnote = {did not appear in postproc. EPTCS 51}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-secco10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-secco10.pdf}, ps = {DKRS-secco10.ps} }
@article{bwa-jcs10, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Baudet, Mathieu and Warinschi, Bogdan and Abadi, Mart{\'\i}n}, title = {Guessing Attacks and the Computational Soundness of Static Equivalence}, volume = 18, number = 5, pages = {909-968}, month = sep, year = 2010, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bwa-jcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bwa-jcs10.pdf}, doi = {10.3233/JCS-2009-0386}, abstract = {The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence depends on an underlying equational theory. The choice of an inappropriate equational theory can lead to overly pessimistic or overly optimistic notions of indistinguishability, and in turn to security criteria that require protection against impossible attacks or---worse yet---that ignore feasible ones. In this paper, we define and justify an equational theory for standard, fundamental cryptographic operations. This equational theory yields a notion of static equivalence that implies computational indistinguishability. Static equivalence remains liberal enough for use in applications. In particular, we develop and analyze a principled formal account of guessing attacks in terms of static equivalence.} }
@inproceedings{bgl-setop10, address = {Athens, Greece}, month = sep, year = 2010, volume = 6514, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cavalli, Ana and Leneutre, Jean}, acronym = {{DPM}{{\slash}}{SETOP}'10}, booktitle = {{R}evised {S}elected {P}apers of the 5th {I}nternational {W}orkshop on {D}ata {P}rivacy {M}anagement and {A}utonomous {S}pontaneous {S}ecurity ({DPM}'10) and 3rd {I}nternational {W}orkshop on {A}utonomous and {S}pontaneous {S}ecurity ({SETOP}'10)}, author = {Benzina, Hedi and Goubault{-}Larrecq, Jean}, title = {Some Ideas on Virtualized Systems Security, and Monitors}, pages = {244-258}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bgl-setop10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bgl-setop10.pdf}, doi = {10.1007/978-3-642-19348-4_18}, abstract = {Virtualized systems such as Xen, VirtualBox, VMWare or QEmu have been proposed to increase the level of security achievable on personal computers. On the other hand, such virtualized systems are now targets for attacks. We propose an intrusion detection architecture for virtualized systems, and discuss some of the security issues that arise. We argue that a weak spot of such systems is domain zero administration, which is left entirely under the administrator's responsibility, and is in particular vulnerable to trojans. To~avert some of the risks, we~propose to install a role-based access control model with possible role delegation, and to describe all undesired activity ows through simple temporal formulas. We show how the latter are compiled into Orchids rules, via a fragment of linear temporal logic, through a generalization of the so-called history variable mechanism.} }
@article{LV-dc10, publisher = {Springer}, journal = {Distributed Computing}, author = {Lozes, {\'E}tienne and Villard, Jules}, title = {A~spatial equational logic for the applied \(\pi\)-calculus}, pages = {61-83}, volume = 23, number = 1, year = 2010, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-discomp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-discomp10.pdf}, doi = {10.1007/s00446-010-0112-6}, abstract = {Spatial logics have been proposed to reason locally and modularly on algebraic models of distributed systems. In this paper we define the spatial equational logic \(\textsf{A}\pi\textsf{L}\) whose models are processes of the applied \(\pi\)-calculus. This extension of the \(\pi\)-calculus allows term manipulation and records communications as aliases in a frame, thus augmenting the predefined underlying equational theory. Our logic allows one to reason locally either on frames or on processes, thanks to static and dynamic spatial operators. We study the logical equivalences induced by various relevant fragments of \(\textsf{A}\pi\textsf{L}\), and show in particular that the whole logic induces a coarser equivalence than structural congruence. We give characteristic formulae for some of these equivalences and for static equivalence. Going further into the exploration of \(\textsf{A}\pi\textsf{L}\)'s expressivity, we also show that it can eliminate standard term quantification.} }
@inproceedings{andre-infinity2010, address = {Singapore}, month = sep, year = 2010, volume = 39, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Chen, Yu-Fang and Rezine, Ahmed}, acronym = {{INFINITY}'10}, booktitle = {{P}roceedings of the 12th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'10)}, author = {Andr{\'e}, {\'E}tienne}, title = {{IMITATOR~II}: A~Tool for Solving the Good Parameters Problem in Timed Automata}, pages = {91-99}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/andre-infinity10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/andre-infinity10.pdf}, doi = {10.4204/EPTCS.39.7}, abstract = {We present here IMITATOR~II, a~new version of IMITATOR, a~tool implementing the {"}inverse method{"} for parametric timed automata: given a reference valuation of the parameters, it~synthesizes a constraint such that, for any valuation satisfying this constraint, the system behaves the same as under the reference valuation in terms of traces, \textit{i.e.}, alternating sequences of locations and actions.\par IMITATOR~II also implements the {"}behavioral cartography algorithm{"}, allowing us to solve the following good parameters problem: find a set of valuations within a given bounded parametric domain for which the system behaves well.\par We present new features and optimizations of the tool, and give results of applications to various examples of asynchronous circuits and communication protocols.} }
@inproceedings{demri-infinity2010, address = {Singapore}, month = sep, year = 2010, volume = 39, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Chen, Yu-Fang and Rezine, Ahmed}, acronym = {{INFINITY}'10}, booktitle = {{P}roceedings of the 12th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'10)}, author = {Demri, St{\'e}phane}, title = {On Selective Unboundedness of~{VASS}}, pages = {1-15}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/demri-infinity10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/demri-infinity10.pdf}, doi = {10.4204/EPTCS.39.1}, abstract = {Numerous properties of vector addition systems with states amount to checking the (un)boundedness of some selective feature (\textit{e.g.}, number of reversals, run length). Some of these features can be checked in exponential space by using Rackoff's proof or its variants, combined with Savitch's theorem. However, the question is still open for many others, e.g., reversal-boundedness. In the paper, we introduce the class of generalized unboundedness properties that can be verified in exponential space by extending Rackoff's technique, sometimes in an unorthodox way. We obtain new optimal upper bounds, for example for place-boundedness problem, reversal-boundedness detection (several variants exist), strong promptness detection problem and regularity detection. Our analysis is sufficiently refined so as we also obtain a polynomial-space bound when the dimension is fixed.} }
@phdthesis{carre-phd2010, author = {Carr{\'e}, Jean-Loup}, title = {Analyse statique de programmes multi-thread pour l'embarqu{\'e}}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2010, month = jul, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/carre-these10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/carre-these10.pdf} }
@phdthesis{akshay-phd2010, author = {Akshay, S.}, title = {Sp{\'e}cification et v{\'e}rification pour des syst{\`e}mes distribu{\'e}s et temporis{\'e}s}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2010, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/akshay-phd.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/akshay-phd.pdf} }
@inproceedings{BDF-nsmc10, address = {Williamsburg, Virginia, USA}, month = sep, year = 2010, editor = {Benzi, Michele and Dayar, Tugrul}, acronym = {{NSMC}'10}, booktitle = {{P}roceedings of the 6th {I}nternational {M}eeting on the {N}umerical {S}olution of {M}arkov {C}hain ({NSMC}'10)}, author = {Bu\v{s}i\'{c}, Ana and Djafri, Hilal and Fourneau, Jean-Michel}, title = {Stochastic Bounds for Censored {M}arkov Chains}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDF-nsmc10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDF-nsmc10.pdf}, abstract = {Censored Markov chains~(CMC) allow to represent the conditional behavior of a system within a subset of observed states. They provide a theoretical framework to study the truncation of a discrete-time Markov chain when the generation of the state-space is too hard or when the number of states is too large. But the stochastic matrix of a CMC may be difficult to obtain. Dayar \textit{et~al.}~(2006) have proposed an algorithm, called DPY, that computes a stochastic bounding matrix for a CMC with a smaller complexity with only a partial knowledge of the chain. We prove that this algorithm is optimal for the information they take into account. We also show how some additional knowledge on the chain can improve stochastic bounds for~CMC.} }
@article{KMT-jar10, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Kremer, Steve and Mercier, Antoine and Treinen, Ralf}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, year = 2012, month = feb, pages = {197-217}, number = 48, volume = 2, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KMT-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KMT-jar10.pdf}, doi = {10.1007/s10817-010-9203-0}, abstract = {Static equivalence is a well established notion of indistinguishability of sequences of terms which is useful in the symbolic analysis of cryptographic protocols. Static equivalence modulo equational theories allows for a more accurate representation of cryptographic primitives by modelling properties of operators by equational axioms. We develop a method that allows us in some cases to simplify the task of deciding static equivalence in a multi-sorted setting, by removing a symbol from the term signature and reducing the problem to several simpler equational theories. We illustrate our technique at hand of bilinear pairings.} }
@article{CDK-jar10, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Computing knowledge in security protocols under convergent equational theories}, year = 2012, month = feb, pages = {219-262}, number = 2, volume = 48, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-jar10.pdf}, doi = {10.1007/s10817-010-9197-7}, abstract = {The analysis of security protocols requires reasoning about the knowledge an attacker acquires by eavesdropping on network traffic. In formal approaches, the messages exchanged over the network are modeled by a term algebra equipped with an equational theory axiomatizing the properties of the cryptographic primitives (e.g. encryption, signature). In this context, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems.\par We propose a procedure for both problems under arbitrary convergent equational theories. Since the underlying problems are undecidable we cannot guarantee termination. Nevertheless, our procedure terminates on a wide range of equational theories. In particular, we obtain a new decidability result for a theory we encountered when studying electronic voting protocols. We also provide a prototype implementation.} }
@inproceedings{BCFS-ccs10, address = {Chicago, Illinois, USA}, month = oct, year = 2010, publisher = {ACM Press}, acronym = {{CCS}'10}, booktitle = {{P}roceedings of the 17th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'10)}, author = {Bortolozzo, Matteo and Centenaro, Matteo and Focardi, Riccardo and Steel, Graham}, title = {Attacking and Fixing {PKCS}\#11 Security Tokens}, pages = {260-269}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCFS-ccs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCFS-ccs10.pdf}, doi = {10.1145/1866307.1866337}, abstract = {We show how to extract sensitive cryptographic keys from a variety of commercially available tamper resistant cryptographic security tokens, exploiting vulnerabilities in their RSA PKCS\#11 based APIs. The attacks are performed by Tookan, an automated tool we have developed, which reverse-engineers the particular token in use to deduce its functionality, constructs a model of its API for a model checker, and then executes any attack trace found by the model checker directly on the token. We describe the operation of Tookan and give results of testing the tool on 17 commercially available tokens: 9~were vulnerable to attack, while the other 8 had severely restricted functionality. One of the attacks found by the model checker has not previously appeared in the literature. We show how Tookan may be used to verify patches to insecure devices, and give a secure configuration that we have implemented in a patch to a software token simulator. This is the first such configuration to appear in the literature that does not require any new cryptographic mechanisms to be added to the standard. We comment on lessons for future key management APIs.} }
@article{BJLMO-jwcn10, publisher = {Hindawi Publishing Corp.}, journal = {EURASIP Journal on Wireless Communications and Networking}, author = {Brihaye, {\relax Th}omas and Jungers, Marc and Lasaulce, Samson and Markey, Nicolas and Oreiby, Ghassan}, title = {Using Model Checking for Analyzing Distributed Power Control Problems}, year = 2010, volume = {2010}, number = {861472}, nopages = {}, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BJLMO-jwcn10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BJLMO-jwcn10.pdf}, doi = {10.1155/2010/861472}, abstract = {Model checking~(MC) is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control~(PC) problem can be modeled by a timed game between a given transmitter and its environment, the authors wanted to know whether this approach can be applied to distributed~PC. It~turns out that it can be applied successfully and allows one to analyze realistic scenarios including the case of discrete transmit powers and games with incomplete information. The proposed methodology is as follows. We state some objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired properties are verified and determine a winning strategy.} }
@article{CKW-jar2010, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Cortier, V{\'e}ronique and Kremer, Steve and Warinschi, Bogdan}, title = {A~Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems}, year = 2010, month = apr, pages = {225-259}, number = {3-4}, volume = {46}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CKW-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CKW-jar10.pdf}, doi = {10.1007/s10817-010-9187-9}, abstract = {Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. However, the guarantees that it offers with respect to the more detailed computational models have been quite unclear.\par For more than twenty years the two approaches have coexisted but evolved mostly independently. Recently, significant research efforts attempt to develop paradigms for cryptographic systems analysis that combines the best of both worlds. There are two broad directions that have been followed. Computational soundness aims to establish sufficient conditions under which results obtained using symbolic models imply security under computational models. The direct approach aims to apply the principles and the techniques developed in the context of symbolic models directly to computational ones.\par In this paper we survey existing results along both of these directions. Our goal is to provide a rather complete summary that could act as a quick reference for researchers who want to contribute to the field, want to make use of existing results, or just want to get a better picture of what results already exist.} }
@inproceedings{KRS-esorics10, address = {Athens, Greece}, month = sep, year = 2010, volume = {6345}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gritzalis, Dimitris and Preneel, Bart}, acronym = {{ESORICS}'10}, booktitle = {{P}roceedings of the 15th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'10)}, author = {Kremer, Steve and Ryan, Mark D. and Smyth, Ben}, title = {Election verifiability in electronic voting protocols}, pages = {389-404}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KRS-esorics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KRS-esorics10.pdf}, doi = {10.1007/978-3-642-15497-3_24}, abstract = {We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of boolean tests which can be performed on the data produced by an election. The definition distinguishes three aspects of verifiability: individual, universal and eligibility verifiability. It also allows us to determine precisely which aspects of the system's hardware and software must be trusted for the purpose of election verifiability. In contrast with earlier work our definition is compatible with a large class of electronic voting schemes, including those based on blind signatures, homomorphic encryption and mixnets. We demonstrate the applicability of our formalism by analysing three protocols: FOO, Helios~2.0, and Civitas (the latter two have been deployed).} }
@inproceedings{DDS-esorics10, address = {Athens, Greece}, month = sep, year = 2010, volume = {6345}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gritzalis, Dimitris and Preneel, Bart}, acronym = {{ESORICS}'10}, booktitle = {{P}roceedings of the 15th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'10)}, author = {Dahl, Morten and Delaune, St{\'e}phanie and Steel, Graham}, title = {Formal Analysis of Privacy for Vehicular Mix-Zones}, pages = {55-70}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-esorics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-esorics10.pdf}, ps = {DDS-esorics10.ps}, doi = {10.1007/978-3-642-15497-3_4}, abstract = {Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks~(VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehicle to be tracked. Mix-zones, where vehicles encrypt their transmissions and then change their identifiers, have been proposed as a solution to this problem. \par In this work, we~describe a formal analysis of mix-zones. We~model a mix-zone and propose a formal definition of privacy for such a zone. We~give a set of necessary conditions for any mix-zone protocol to preserve privacy. We~analyse, using the tool ProVerif, a~particular proposal for key distribution in mix-zones, the CMIX protocol. We~report attacks on privacy and we propose a fix.} }
@inproceedings{phs-rp10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6227, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ku{\v c}era, Anton{\'\i}n and Potapov, Igor}, acronym = {{RP}'10}, booktitle = {{P}roceedings of the 4th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'10)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Lossy Counter Machines Decidability Cheat Sheet}, pages = {51-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/phs-rp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/phs-rp10.pdf}, doi = {10.1007/978-3-642-15349-5_4}, abstract = {Lossy counter machines (LCM's) are a variant of Minsky counter machines based on weak (or~unreliable) counters in the sense that they can decrease nondeterministically and without notification. This model, introduced by R.~Mayr [TCS~297:337-354 (2003)], is not yet very well known, even though it has already proven useful for establishing hardness results.\par In this paper we survey the basic theory of LCM's and their verification problems, with a focus on the decidability/undecidability divide. } }
@inproceedings{AF-rp10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6227, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ku{\v c}era, Anton{\'\i}n and Potapov, Igor}, acronym = {{RP}'10}, booktitle = {{P}roceedings of the 4th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'10)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent}, title = {Behavioral Cartography of Timed Automata}, pages = {76-90}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AF-rp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AF-rp10.pdf}, doi = {10.1007/978-3-642-15349-5_5}, abstract = {We aim at finding a set of timing parameters for which a given timed automaton has a {"}good{"} behavior. We~present here a novel approach based on the decomposition of the parametric space into behavioral tiles, \textit{i.e.}, sets of parameter valuations for which the behavior of the system is uniform. This gives us a behavioral cartography according to the values of the parameters.\par It is then straightforward to partition the space into a {"}good{"} and a {"}bad{"} subspace, according to the behavior of the tiles. We extend this method to probabilistic systems, allowing to decompose the parametric space into tiles for which the minimal (resp. maximal) probability of reaching a given location is uniform. An~implementation has been made, and experiments successfully conducted.} }
@inproceedings{CJ-notere10, address = {Tozeur, Tunisia}, month = may # {-} # jun, year = 2010, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{NOTERE}'10}, booktitle = {{A}ctes de la 10{\`e}me {C}onf{\'e}rence {I}nternationale sur les {NO}uvelles {TE}chnologies de la {R\'E}partition ({NOTERE}'10)}, author = {Chatain, {\relax Th}omas and Jard, Claude}, title = {S{\'e}mantique concurrente symbolique des r{\'e}seaux de {P}etri saufs et d{\'e}pliages finis des r{\'e}seaux temporels}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CJ-notere10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CJ-notere10.pdf}, abstract = {On consid\`ere des r\'eseaux de Petri color\'es, \`a contraintes lin\'eaires et pouvant poss\'eder des arcs de lecture. Sur cette classe, on d\'efinit une s\'emantique concurrente en termes de processus d'ordre partiel permettant de garder explicite l'ind\'ependance entre des tirs de transitions. L'ensemble des processus peut \^etre repr\'esent\'e en utilisant la notion de d\'epliage symbolique. Nous montrons alors comment les r\'eseaux de Petri temporels peuvent \^etre cod\'es dans ce mod\`ele \`a l'aide d'une transformation syntaxique pr\'eservant la concurrence. Cette transformation permet de d\'efinir la notion de d\'epliage de r\'eseaux de Petri temporels et d'en donner une repr\'esentation par pr\'efixe fini.} }
@inproceedings{BFCH-dsn09, address = {Estoril, Portugal}, month = jun # {-} # jul, year = 2009, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{DSN}'09}, booktitle = {{P}roceedings of the 39th {A}nnual {IEEE}{\slash}{IFIP} {I}nternational {C}onference on {D}ependable {S}ystems and {N}etworks ({DSN}'09)}, author = {Beccuti, Marco and Franceschinis, Giuliana and Codetta{-}Raiteri, Daniele and Haddad, Serge}, title = {Parametric {NdRFT} for the derivation of optimal repair strategies}, pages = {399-408}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFCH-dsn09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFCH-dsn09.pdf}, doi = {10.1109/DSN.2009.5270312}, abstract = {Non deterministic Repairable Fault Trees~(NdRFT) are a recently proposed modeling formalism for the study of optimal repair strategies: they are based on the widely adopted Fault Tree formalism, but in addition to the failure modes, NdRFTs allow to define possible repair actions. In a previous pa per the formalism has been introduced together with an analysis method and a tool allowing to automatically derive the best repair strategy to be applied in each state. The analysis technique is based on the generation and solution of a Markov Decision Process. In this paper we present an extension, ParNdRFT, that allows to exploit the presence of redundancy to reduce the complexity of the model and of the analysis. It is based on the translation of the ParNdRFT in to a Markov Decision Well-Formed Net, i.e. a model specified by means of an High Level Petri Net formalism. The translated model can be efficiently solved thanks to existing algorithms that generate a reduced state space automatically exploiting the model symmetries.} }
@inproceedings{DHLN-acsd10, address = {Braga, Portugal}, month = jun, year = 2010, publisher = {{IEEE} Computer Society Press}, editor = {Gomes, Lu{\'\i}s and Khomenko, Victor}, acronym = {{ACSD}'10}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'10)}, author = {Doyen, Laurent and Henzinger, {\relax Th}omas A. and Legay, Axel and Nickovic, Dejan}, title = {Robustness of Sequential Circuits}, pages = {77-84}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DHLN-acsd10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DHLN-acsd10.pdf}, doi = {10.1109/ACSD.2010.26}, abstract = {Digital components play a central role in the design of complex embedded systems. These components are interconnected with other, possibly analog, devices and the physical environment. This environment cannot be entirely captured and can provide inaccurate input data to the component. It~is thus important for digital components to have a robust behavior, \textit{i.e.},~the presence of a small change in the input sequences should not result in a drastic change in the output sequences.\par In this paper, we study a notion of robustness for sequential circuits. However, since sequential circuits may have parts that are naturally discontinuous (\textit{e.g.},~digital controllers with switching behavior), we~need a flexible framework that accommodates this fact and leaves discontinuous parts of the circuit out from the robustness analysis. As a consequence, we~consider sequential circuits that have their input variables partitioned into two disjoint sets: control and disturbance variables. Our contributions are (1)~a~definition of robustness for sequential circuits as a form of continuity with respect to disturbance variables, (2)~the~characterization of the exact class of sequential circuits that are robust according to our definition, (3)~an~algorithm to decide whether a sequential circuit is robust or~not.} }
@inproceedings{DDGRT-csl10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = {6247}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dawar, Anuj and Veith, Helmut}, acronym = {{CSL}'10}, booktitle = {{P}roceedings of the 19th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'10)}, author = {Degorre, Aldric and Doyen, Laurent and Gentilini, Raffaella and Raskin, Jean-Fran{\c{c}}ois and Toru{\'n}czyk, Szymon}, title = {Energy and Mean-Payoff Games with Imperfect Information}, pages = {260-274}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDGRT-csl10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDGRT-csl10.pdf}, doi = {10.1007/978-3-642-15205-4_22}, abstract = {We consider two-player games with imperfect information and quantitative objective. The game is played on a weighted graph with a state space partitioned into classes of indistinguishable states, giving players partial knowledge of the state. In an energy game, the weights represent resource consumption and the objective of the game is to maintain the sum of weights always nonnegative. In a mean-payoff game, the objective is to optimize the limit-average usage of the resource. We show that the problem of determining if an energy game with imperfect information with fixed initial credit has a winning strategy is decidable, while the question of the existence of some initial credit such that the game has a winning strategy is undecidable. This undecidability result carries over to mean-payoff games with imperfect information. On the positive side, using a simple restriction on the game graph (namely, that the weights are visible), we show that these problems become EXPTIME-complete.} }
@inproceedings{PhS-mfcs10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6281, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n}, acronym = {{MFCS}'10}, booktitle = {{P}roceedings of the 35th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'10)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Revisiting {A}ckermann-Hardness for Lossy Counter Machines and Reset {P}etri Nets}, pages = {616-628}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/phs-mfcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/phs-mfcs10.pdf}, doi = {10.1007/978-3-642-15155-2_54}, abstract = {We prove that coverability and termination are not primitive-recursive for lossy counter machines and for Reset Petri nets.} }
@inproceedings{CDGH-mfcs10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6281, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n}, acronym = {{MFCS}'10}, booktitle = {{P}roceedings of the 35th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'10)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Gimbert, Hugo and Henzinger, {\relax Th}omas A.}, title = {Randomness for Free}, pages = {246-257}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGH-mfcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGH-mfcs10.pdf}, doi = {10.1007/978-3-642-15155-2_23}, abstract = {We consider two-player zero-sum games on graphs. These games can be classified on the basis of the information of the players and on the mode of interaction between them. On the basis of information the classification is as follows: (a)~partial-observation (both players have partial view of the game); (b)~one-sided complete-observation (one player has complete observation); and (c)~complete-observation (both players have complete view of the game). On~the basis of mode of interaction we have the following classification: (a)~concurrent (players interact simultaneously); and (b)~turn-based (players interact in turn). The~two sources of randomness in these games are randomness in transition function and randomness in strategies. In general, randomized strategies are more powerful than deterministic strategies, and randomness in transitions gives more general classes of games. We~present a complete characterization for the classes of games where randomness is not helpful~in: (a)~the~transition function (probabilistic transition can be simulated by deterministic transition); and (b)~strategies (pure strategies are as powerful as randomized strategies). As~consequence of our characterization we obtain new undecidability results for these games.} }
@inproceedings{FP-mfcs10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6281, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n}, acronym = {{MFCS}'10}, booktitle = {{P}roceedings of the 35th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'10)}, author = {Fontaine, Ga{\"e}lle and Place, {\relax Th}omas}, title = {Classes of trees definable in the {{\(\mu\)}}-calculus}, pages = {381-392}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FP-mfcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FP-mfcs10.pdf}, doi = {10.1007/978-3-642-15155-2_34}, abstract = {We are interested in frame definability of classes of trees, using formulas of the \(\mu\)-calculus. In this set up, the proposition letters (or in other words, the free variables) in the \(\mu\)-formulas correspond to second order variables over which universally quantify. Our main result is a semantic characterization of the \textbf{MSO} definable classes of trees that are definable by a \(\mu\)-formula. We~also show that it is decidable whether a given \textbf{MSO} formula corresponds to a \(\mu\)-formula, in the sense that they define the same class of trees.} }
@inproceedings{CDH-mfcs10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6281, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n}, acronym = {{MFCS}'10}, booktitle = {{P}roceedings of the 35th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'10)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, {\relax Th}omas A.}, title = {Qualitative Analysis of Partially-observable {M}arkov Decision Processes}, pages = {258-269}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-mfcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-mfcs10.pdf}, doi = {10.1007/978-3-642-15155-2_24}, abstract = {We study observation-based strategies for partially-observable Markov decision processes (POMDPs) with parity objectives. An~observation-based strategy relies on partial information about the history of a play, namely, on the past sequence of observations. We~consider qualitative analysis problems: given a POMDP with a parity objective, decide whether there exists an observation-based strategy to achieve the objective with probability~\(1\) (almost-sure winning), or with positive probability (positive winning). Our main results are twofold. First, we present a complete picture of the computational complexity of the qualitative analysis problem for POMDPs with parity objectives and its subclasses: safety, reachability, B{\"u}chi, and coB{\"u}chi objectives. We~establish several upper and lower bounds that were not known in the literature. Second, we give optimal bounds (matching upper and lower bounds) for the memory required by pure and randomized observation-based strategies for each class of objectives.} }
@inproceedings{OU-mfcs10, address = {Brno, Czech Republic}, month = aug, year = 2010, volume = 6281, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n}, acronym = {{MFCS}'10}, booktitle = {{P}roceedings of the 35th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'10)}, author = {Olschewski, J{\"o}rg and Ummels, Michael}, title = {The Complexity of Finding Reset Words in Finite Automata}, pages = {568-579}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/OU-mfcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OU-mfcs10.pdf}, doi = {10.1007/978-3-642-15155-2_50}, abstract = {We study several problems related to finding reset words in deterministic finite automata. In~particular, we~establish that the problem of deciding whether a shortest reset word has length~\(k\) is complete for the complexity class~\(DP\). This result answers a question posed by Volkov. For the search problems of finding a shortest reset word and the length of a shortest reset word, we establish membership in the complexity classes FP\textsuperscript{NP} and FP\textsuperscript{NP[log]}, respectively. Moreover, we show that both these problems are hard for FP\textsuperscript{NP[log]}. Finally, we~observe that computing a reset word of a given length is FNP-complete.} }
@inproceedings{EHH-apnoc10, address = {Braga, Portugal}, month = jun, year = 2010, editor = {Sidorova, Natalia and Serebrenik, Alexander}, acronym = {{APNOC}'10}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {A}bstractions for {P}etri {N}ets and {O}ther {M}odels of {C}oncurrency ({APNOC}'10)}, author = {El{~}Hog{-}Benzina, Dorsaf and Haddad, Serge and Hennicker, Rolf}, title = {Process Refinement and Asynchronous Composition with Modalities}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/EHH-apnoc10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/EHH-apnoc10.pdf}, abstract = {We propose a framework for the specification of infinite state systems based on Petri nets with distinguished may- and must-transitions (called modalities) which specify the allowed and the required behavior of refinements and hence of implementations. Formally, refinements are defined by relating the modal language specifications generated by two modal Petri nets according to the refinement relation for modal language specifications. We show that this refinement relation is decidable if the underlying modal Petri nets are weakly deterministic. We also show that the membership problem for the class of weakly deterministic modal Petri nets is decidable. As an important application of our approach we consider I/O-Petri nets which are obtained by asynchronous composition and thus exhibit inherently an infinite behavior.} }
@inproceedings{CDEHR-concur10, address = {Paris, France}, month = aug # {-} # sep, year = 2010, volume = {6269}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gastin, Paul and Laroussinie, Fran{\c{c}}ois}, acronym = {{CONCUR}'10}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'10)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Edelsbrunner, Herbert and Henzinger, {\relax Th}omas A. and Rannou, Philippe}, title = {Mean-Payoff Automaton Expressions}, pages = {269-283}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDEHR-concur10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDEHR-concur10.pdf}, doi = {10.1007/978-3-642-15375-4_19}, abstract = {Quantitative languages are an extension of boolean languages that assign to each word a real number. Mean-payoff automata are finite automata with numerical weights on transitions that assign to each infinite path the long-run average of the transition weights. When the mode of branching of the automaton is deterministic, nondeterministic, or alternating, the corresponding class of quantitative languages is not robust as it is not closed under the pointwise operations of max, min, sum, and numerical complement. Nondeterministic and alternating mean-payoff automata are not decidable either, as the quantitative generalization of the problems of universality and language inclusion is undecidable. We introduce a new class of quantitative languages, defined by mean-payoff automaton expressions, which is robust and decidable: it is closed under the four pointwise operations, and we show that all decision problems are decidable for this class. Mean-payoff automaton expressions subsume deterministic mean-payoff automata, and we show that they have expressive power incomparable to nondeterministic and alternating mean-payoff automata. We also present for the first time an algorithm to compute distance between two quantitative languages, and in our case the quantitative languages are given as mean-payoff automaton expressions.} }
@inproceedings{BBM-concur10, address = {Paris, France}, month = aug # {-} # sep, year = 2010, volume = {6269}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gastin, Paul and Laroussinie, Fran{\c{c}}ois}, acronym = {{CONCUR}'10}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'10)}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas}, title = {{N}ash Equilibria for Reachability Objectives in Multi-player Timed Games}, pages = {192-206}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBM-concur10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBM-concur10.pdf}, doi = {10.1007/978-3-642-15375-4_14}, abstract = {We propose a procedure for computing Nash equilibria in multi-player timed games with reachability objectives. Our procedure is based on the construction of a finite concurrent game, and on a generic characterization of Nash equilibria in (possibly infinite) concurrent games. Along the way, we~use our characterization to compute Nash equilibria in finite concurrent games.} }
@inproceedings{BBM-formats10, address = {Vienna, Austria}, month = sep, year = 2010, volume = {6246}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chatterjee, Krishnendu and Henziner, Thomas A.}, acronym = {{FORMATS}'10}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'10)}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas}, title = {Computing Equilibria in Two-Player Timed Games {\textit{via}}~Turn-Based Finite Games}, pages = {62-76}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBM-formats10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBM-formats10.pdf}, doi = {10.1007/978-3-642-15297-9_7}, abstract = {We study two-player timed games where the objectives of the two players are not opposite. We focus on the standard notion of Nash equilibrium and propose a series of transformations that builds two finite turn-based games out of a timed game, with a precise correspondence between Nash equilibria in the original and in final games. This provides us with an algorithm to compute Nash equilibria in two-player timed games for large classes of properties.} }
@inproceedings{BCH-time10, address = {Paris, France}, month = sep, year = 2010, publisher = {{IEEE} Computer Society Press}, editor = {Markey, Nicolas and Wijsen, Jef}, acronym = {{TIME}'10}, booktitle = {{P}roceedings of the 17th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'10)}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {A~Concurrency-Preserving Translation from Time {P}etri Nets to Networks of Timed Automata}, pages = {77-84}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-time10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-time10.pdf}, doi = {10.1109/TIME.2010.12}, abstract = {Real-time distributed systems may be modeled in different formalisms such as time Petri nets~(TPN) and networks of timed automata~(NTA). This paper focuses on translating a \(1\)-bounded TPN into an NTA and considers an equivalence which takes the distribution of actions into account. This translation is extensible to bounded~TPNs. We~first use \(S\)-invariants to decompose the net into components that give the structure of the automata, then we add clocks to provide the timing information. Although we have to use an extended syntax in the timed automata, this is a novel approach since the other transformations and comparisons of these models did not consider the preservation of concurrency.} }
@inproceedings{BHS-time10, address = {Paris, France}, month = sep, year = 2010, publisher = {{IEEE} Computer Society Press}, editor = {Markey, Nicolas and Wijsen, Jef}, acronym = {{TIME}'10}, booktitle = {{P}roceedings of the 17th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'10)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu}, title = {Real Time Properties for Interrupt Timed Automata}, pages = {69-76}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHS-time10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHS-time10.pdf}, doi = {10.1109/TIME.2010.11}, abstract = {Interrupt Timed Automata (ITA) have been introduced to model multi-task systems with interruptions. They form a~subclass of stopwatch automata, where the real valued variables (with rate \(0\) or~\(1\)) are organized along priority levels. While reachability is undecidable with usual stopwatches, the problem was proved decidable for~ITA. In~this work, after giving answers to some questions left open about expressiveness, closure, and complexity for~ITA, our~main purpose is to investigate the verification of real time properties over~ITA. While we prove that model checking a variant of the timed logic TCTL is undecidable, we nevertheless give model checking procedures for two relevant fragments of this logic: one where formulas contain only model clocks and another one where formulas have a single external clock.} }
@inproceedings{HMY-iscc10, address = {Riccione, Italy}, month = jun, year = 2010, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{ISCC}'10}, booktitle = {{P}roceedings of the 15th {IEEE} {S}ymposium on {C}omputers and {C}ommunications ({ISCC}'10)}, author = {Haddad, Serge and Mokdad, Lynda and Youcef, Samir}, title = {Response time of {BPEL4WS} constructors}, pages = {695-700}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HMY-iscc10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HMY-iscc10.pdf}, doi = {10.1109/ISCC.2010.5546538}, abstract = {Response time is an important factor for every software system and it becomes more salient when it is associated with introducing novel technologies, such as Web services. Most performance evaluation of Web services are focused toward composite Web services and their response time. One important limitation of existing work is in the fact that only constant or service exponential time distribution are considered. However, experimental results have shown that the Web services response times is typically heavy-tailed, in particulary, if there are heterogeneous. So, heavy-tailed response times should be considered in the dimensioning Web services. In this study, we propose analytical formulas for mean response times for structured BPEL constructors such as \emph{sequence}, \emph{flow} and \emph{switch} constructors,~etc. The difference with previous studies in the literature, is that we consider heterogenous servers, the number of invoked elementary Web services can be variable and the elementary Web services response times are heavy-tailed.} }
@inproceedings{DDS-fcsprivmod10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, editor = {Cortier, V{\'e}ronique and Ryan, Mark D. and Shmatikov, Vitaly}, acronym = {{FCS-PrivMod}'10}, booktitle = {{P}roceedings of the {W}orkshop on {F}oundations of {S}ecurity and {P}rivacy ({FCS-PrivMod}'10)}, author = {Dahl, Morten and Delaune, St{\'e}phanie and Steel, Graham}, title = {Formal Analysis of Privacy for Vehicular Mix-Zones}, pages = {55-70}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-10.pdf}, ps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2010-10.ps}, doi = {10.1007/978-3-642-15497-3_4}, abstract = {Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehicle to be tracked. Mix-zones, where vehicles encrypt their transmissions and then change their identifiers, have been proposed as a solution to this problem.\par In this work, we describe a formal analysis of mix-zones. We model a mix-zone and propose a formal definition of privacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We report attacks on privacy and we propose a fix.} }
@article{BKM-lmcs10, journal = {Logical Methods in Computer Science}, author = {Bollig, Benedikt and Kuske, Dietrich and Meinecke, Ingmar}, title = {Propositional Dynamic Logic for Message-Passing Systems}, year = 2010, month = sep, volume = 6, number = {3:16}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-lmcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-lmcs10.pdf}, doi = {10.2168/LMCS-6(3:16)2010}, abstract = {We examine a bidirectional propositional dynamic logic~(PDL) for finite and infinite message sequence charts~(MSCs) extending \(\textsf{LTL}\) and \(\textsf{TLC}^{-}\). By~this kind of multi-modal logic we can express properties both in the entire future and in the past of an event. Path expressions strengthen the classical until operator of temporal logic. For every formula defining an MSC language, we construct a communicating finite-state machine~(CFM) accepting the same language. The CFM obtained has size exponential in the size of the formula. This synthesis problem is solved in full generality, \textit{i.e.}, also for MSCs with unbounded channels. The model checking problem for CFMs and HMSCs turns out to be in PSPACE for existentially bounded MSCs. Finally, we show that, for PDL with intersection, the semantics of a formula cannot be captured by a CFM anymore.} }
@inproceedings{CS-dlt2010, address = {London, Ontario, Canada}, month = aug, year = 2010, volume = {6224}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gao, Yuan and Lu, Hanlin and Seki, Shinnosuke and Yu, Sheng}, acronym = {{DLT}'10}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'10)}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {Computing blocker sets for the Regular {P}ost Embedding Problem}, pages = {136-147}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-dlt10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-dlt10.pdf}, doi = {10.1007/978-3-642-14455-4_14}, abstract = {Blocker and coblocker sets are regular languages involved in the algorithmic solution of the Regular Post Embedding Problem. We investigate the computability of these languages and related decision problems.} }
@inproceedings{Schmitz-acl10, address = {Uppsala, Sweden}, month = jul, year = 2010, publisher = {Association for Computational Linguistics}, acronym = {{ACL}'10}, booktitle = {{P}roceedings of the 48th {A}nnual {M}eeting of the {A}ssociation for {C}omputational {L}inguistics ({ACL}'10)}, author = {Schmitz, Sylvain}, title = {On the Computational Complexity of Dominance Links in Grammatical Formalisms}, pages = {514-524}, url = {http://hal.archives-ouvertes.fr/hal-00482396}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-acl10.pdf}, abstract = {Dominance links were introduced in grammars to model long distance scrambling phenomena, motivating the definition of multiset-valued linear indexed grammars (MLIGs) by Rambow~(1994b), and inspiring quite a few recent formalisms. It~turns out that MLIGs have since been rediscovered and reused in a variety of contexts, and that the complexity of their emptiness problem has become the key to several open questions in computer science. We survey complexity results and open issues on MLIGs and related formalisms, and provide new complexity bounds for some linguistically motivated restrictions.} }
@article{HNS-tcs10, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {H{\'e}am, Pierre-Cyrille and Nicaud, Cyril and Schmitz, Sylvain}, title = {Parametric Random Generation of Deterministic Tree Automata}, year = 2010, volume = 411, number = {38-39}, pages = {3469-3480}, month = aug, url = {http://hal.inria.fr/inria-00511450}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HNS-tcs10.pdf}, doi = {10.1016/j.tcs.2010.05.036}, abstract = {Uniform random generators deliver a simple empirical means to estimate the average complexity of an algorithm. We present a general rejection algorithm that generates sequential letter-to-letter transducers up to isomorphism. We~also propose an original parametric random generation algorithm to produce sequential letter-to-letter transducers with a fixed number of transitions. We~tailor this general scheme to randomly generate deterministic tree walking automata and deterministic top-down tree automata. We~apply our implementation of the generator to the estimation of the average complexity of a deterministic tree walking automata to nondeterministic top-down tree automata construction we also implemented.} }
@incollection{DKR-lncs6000, noaddress = {}, month = may, year = 2010, volume = 6000, series = {Lecture Notes in Computer Science}, publisher = {Springer}, noacronym = {}, booktitle = {{T}owards {T}rustworthy {E}lections -- {N}ew {D}irections in {E}lectronic {V}oting}, editor = {Chaum, David and Jakobsson, Markus and Rivest, Ronald L. and Ryan, Peter Y. A. and Benaloh, Josh and Kuty{\l}owski, Miros{\l}aw and Adida, Ben}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Verifying Privacy-Type Properties of Electronic Voting Protocols: A~Taster}, pages = {289-309}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKR-lncs6000.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKR-lncs6000.pdf}, doi = {10.1007/978-3-642-12980-3_18}, abstract = {While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadequacies in implemented systems. These inadequacies provide additional motivation for applying formal methods to the validation of electronic voting protocols.\par In this paper we report on some of our recent efforts in using the applied pi calculus to model and analyse properties of electronic elections. We particularly focus on anonymity properties, namely vote-privacy and receipt-freeness. These properties are expressed using observational equivalence and we show in accordance with intuition that receipt-freeness implies vote-privacy.\par We illustrate our definitions on two electronic voting protocols from the literature. Ideally, these properties should hold even if the election officials are corrupt. However, protocols that were designed to satisfy privacy or receipt-freeness may not do so in the presence of corrupt officials. Our model and definitions allow us to specify and easily change which authorities are supposed to be trustworthy.} }
@inproceedings{CCD-ijcar10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, volume = {6173}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Giesl, J{\"u}rgen and Haehnle, Reiner}, acronym = {{IJCAR}'10}, booktitle = {{P}roceedings of the 5th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'10)}, author = {Cheval, Vincent and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Automating security analysis: symbolic equivalence of constraint systems}, pages = {412-426}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-ijcar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-ijcar10.pdf}, doi = {10.1007/978-3-642-14203-1_35}, abstract = {We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy).\par Infinite sets of possible traces are symbolically represented using \emph{deducibility constraints}. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence.} }
@inproceedings{BH-monterey2008, address = {Budapest, Hungary}, month = apr, year = 2010, volume = 6028, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Choppy, {\relax Ch}ristine and Sokolsky, Oleg}, acronym = {{MONTEREY}'08}, booktitle = {{R}evised {S}elected {P}apers of the 15th {M}onterey {W}orkshop on {F}oundations of {C}omputer {S}oftware ({MONTEREY}'08)}, author = {Ben{ }Hmida, Mehdi and Haddad, Serge}, title = {Client Synthesis for Aspect Oriented Web Services}, pages = {24-42}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BH-monterey08.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BH-monterey08.pdf}, doi = {10.1007/978-3-642-12566-9_2}, abstract = {Client synthesis for complex Web services is a critical and still open topic as it will enable more flexibility in the deployment of such services. In previous works, our team has developed a theoretical framework based on process algebra that has led to algorithms and tools for the client interaction. Here, we show how to generalise our approach for aspect oriented Web services.} }
@inproceedings{JGL-icalp10, address = {Bordeaux, France}, month = jul, year = 2010, volume = 6199, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abramsky, Samson and Meyer{ }auf{ }der{ }Heide, Friedhelm and Spirakis, Paul}, acronym = {{ICALP}'10}, booktitle = {{P}roceedings of the 37th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'10)~-- {P}art~{II}}, author = {Goubault{-}Larrecq, Jean}, title = {Noetherian Spaces in Verification}, pages = {2-21}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-icalp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-icalp10.pdf}, doi = {10.1007/978-3-642-14162-1_2}, abstract = {Noetherian spaces are a topological concept that generalizes well quasiorderings. We explore applications to infinite-state verification problems, and show how this stimulated the search for infinite procedures \`a la Karp-Miller.} }
@inproceedings{CS-icalp10, address = {Bordeaux, France}, month = jul, year = 2010, volume = 6199, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abramsky, Samson and Meyer{ }auf{ }der{ }Heide, Friedhelm and Spirakis, Paul}, acronym = {{ICALP}'10}, booktitle = {{P}roceedings of the 37th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'10)~-- {P}art~{II}}, author = {Chambart, Pierre and Schnoebelen, {\relax Ph}ilippe}, title = {Pumping and Counting on the Regular {P}ost Embedding Problem}, pages = {64-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-icalp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-icalp10.pdf}, doi = {10.1007/978-3-642-14162-1_6}, abstract = {The Regular Post Embedding Problem is a variant of Post's Correspondence Problem where one compares strings with the subword relation and imposes additional regular constraints on admissible solutions. It is known that this problem is decidable, albeit with very high complexity.\par We consider and solve variant problems where the set of solutions is compared to regular constraint sets and where one counts the number of solutions. Our positive results rely on two non-trivial pumping lemmas for Post-embedding languages and their complements.} }
@inproceedings{CD-icalp10, address = {Bordeaux, France}, month = jul, year = 2010, volume = 6199, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abramsky, Samson and Meyer{ }auf{ }der{ }Heide, Friedhelm and Spirakis, Paul}, acronym = {{ICALP}'10}, booktitle = {{P}roceedings of the 37th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'10)~-- {P}art~{II}}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Energy Parity Games}, pages = {599-610}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp10.pdf}, doi = {10.1007/978-3-642-14162-1_50}, abstract = {Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (\textit{i.e.}, the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objective. Our main results are as follows: (a)~exponential memory is sufficient and may be necessary for winning strategies in energy parity games; (b)~the~problem of deciding the winner in energy parity games can be solved in NP\(\cap\)coNP; and (c)~we~give an algorithm to solve energy parity by reduction to energy games. We~also show that the problem of deciding the winner in energy parity games is polynomially equivalent to the problem of deciding the winner in mean-payoff parity games, which can thus be solved in NP\(\cap\)coNP. As~a consequence we also obtain a conceptually simple algorithm to solve mean-payoff parity games.} }
@inproceedings{BGMZ-icalp10, address = {Bordeaux, France}, month = jul, year = 2010, volume = 6199, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abramsky, Samson and Meyer{ }auf{ }der{ }Heide, Friedhelm and Spirakis, Paul}, acronym = {{ICALP}'10}, booktitle = {{P}roceedings of the 37th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'10)~-- {P}art~{II}}, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {Pebble weighted automata and transitive closure logics}, pages = {587-598}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-icalp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-icalp10.pdf}, doi = {10.1007/978-3-642-14162-1_49}, abstract = {We introduce new classes of weighted automata on words. Equipped with pebbles and a two-way mechanism, they go beyond the class of recognizable formal power series, but capture a weighted version of first-order logic with bounded transitive closure. In contrast to previous work, this logic allows for unrestricted use of universal quantification. Our main result states that pebble weighted automata, nested weighted automata, and this weighted logic are expressively equivalent. We also give new logical characterizations of the recognizable series.} }
@inproceedings{CC-csf10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'10}, booktitle = {{P}roceedings of the 23rd {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'10)}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Cortier, V{\'e}ronique}, title = {Protocol composition for arbitrary primitives}, pages = {322-336}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-09.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2010-09.pdf}, doi = {10.1109/CSF.2010.29}, abstract = {We study the composition of security protocols when protocols share secrets such as keys. We show (in a Dolev-Yao model) that if two protocols use disjoint cryptographic primitives, their composition is secure if the individual protocols are secure, even if they share data. Our result holds for any cryptographic primitives that can be modeled using equational theories, such as encryption, signature, MAC, exclusive-or, and Diffie-Hellman. Our main result transforms any attack trace of the combined protocol into an attack trace of one of the individual protocols. This allows various ways of combining protocols such as sequentially or in parallel, possibly with inner replications. As an application, we show that a protocol using preestablished keys may use any (secure) key-exchange protocol without jeopardizing its security, provided that they do not use the same primitives. This allows us, for example, to securely compose a Diffie-Hellman key exchange protocol with any other protocol using the exchanged key, provided that the second protocol does not use the Diffie-Hellman primitives. We also explore tagging, which is a way of forcing the disjointness of two protocols that share cryptographic primitives We explain why composing protocols which use tagged cryptographic primitives like encryption and hash functions is secure by reducing this problem to the previous one.} }
@inproceedings{ACD-csf10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'10}, booktitle = {{P}roceedings of the 23rd {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'10)}, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Modeling and Verifying Ad Hoc Routing Protocols}, pages = {59-74}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-csf10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-csf10.pdf}, doi = {10.1109/CSF.2010.12}, abstract = {Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such networks, a central issue, ensured by routing protocols, is to find a route from one device to another. Those protocols use cryptographic mechanisms in order to prevent malicious nodes from compromising the discovered route.\par Our contribution is twofold. We first propose a calculus for modeling and reasoning about security protocols, including in particular secured routing protocols. Our calculus extends standard symbolic models to take into account the characteristics of routing protocols and to model wireless communication in a more accurate way. Our second main contribution is a decision procedure for analyzing routing protocols for any network topology. By using constraint solving techniques, we show that it is possible to automatically discover (in NPTIME) whether there exists a network topology that would allow malicious nodes to mount an attack against the protocol, for a bounded number of sessions. We also provide a decision procedure for detecting attacks in case the network topology is given a priori. We demonstrate the usage and usefulness of our approach by analyzing the protocol \textsf{SRP} applied to~\textsf{DSR}.} }
@inproceedings{BKKLNP-cav10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, volume = {6174}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cook, Byron and Jackson, Paul and Touili, Tayssir}, acronym = {{CAV}'10}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'10)}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin and Neider, Daniel and Piegdon, David R.}, title = {libalf: the Automata Learning Framework}, pages = {360-364}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKKLNP-cav10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKKLNP-cav10.pdf}, doi = {10.1007/978-3-642-14295-6_32}, abstract = {This paper presents \texttt{libalf}, a comprehensive, open-source library for learning formal languages. \texttt{libalf} covers various well-known learning techniques for finite automata (e.g. Angluin's~\(\textsf{L}^*\), \textsf{Biermann}, \textsf{RPNI},~etc.) as well as novel learning algorithms (such as for NFA and visibly one-counter automata). \texttt{libalf}~is flexible and allows facilely interchanging learning algorithms and combining domain-specific features in a plug-and-play fashion. Its modular design and C++ implementation make it a suitable platform for adding and engineering further learning algorithms for new target models (\textit{e.g.}, B{\"u}chi automata).} }
@article{RHS-ijfcs09, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Recalde, Laura and Haddad, Serge and Silva, Manuel}, title = {Continuous {P}etri Nets: Expressive Power and Decidability Issues}, volume = 21, number = 2, pages = {235-256}, year = 2010, month = apr, doi = {10.1142/S0129054110007222}, abstract = {State explosion is a fundamental problem in the analysis and synthesis of discrete event systems. Continuous Petri nets can be seen as a relaxation of the corresponding discrete model. The expected gains are twofold: improvements in complexity and in decidability. In the case of autonomous nets we prove that liveness or deadlock-freeness remain decidable and can be checked more efficiently than in Petri nets. Then we introduce time in the model which now behaves as a dynamical system driven by differential equations and we study it w.r.t. expressiveness and decidability issues. On the one hand, we prove that this model is equivalent to timed differential Petri nets which are a slight extension of systems driven by linear differential equations~(LDE). On~the other hand, (contrary to the systems driven by~LDEs) we show that continuous timed Petri nets are able to simulate Turing machines and thus that basic properties become undecidable.} }
@inproceedings{SS-lics10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'10}, booktitle = {{P}roceedings of the 25th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'10)}, author = {Schweikardt, Nicole and Segoufin, Luc}, title = {Addition-invariant {FO} and regularity}, pages = {273-282}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SS-lics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SS-lics10.pdf}, doi = {10.1109/LICS.2010.16}, abstract = {We consider formulas which, in addition to the symbols in the vocabulary, may use two designated symbols~\(\prec\) and~\(+\) that must be interpreted as a linear order and its associated addition. Such a formula is called addition-invariant if, for each fixed interpretation of the initial vocabulary, its result is independent of the particular interpretation of~\(\prec\) and~\(+\).\par This paper studies the expressive power of addition-invariant first-order logic, \(+\)-inv-FO, on the class of finite strings. Our first main result gives a characterization of the regular languages definable in \(+\)-inv-FO: we show that these are exactly the languages definable in FO with extra predicates, denoted by {"}lm{"} for short, for testing the length of the string modulo some fixed number. Our second main result shows that every language definable in \(+\)-inv-FO, that is bounded or commutative or deterministic context-free, is regular. As an immediate consequence of these two main results, we obtain that \(+\)-inv-FO is equivalent to FO(lm) on the class of finite colored sets.\par Our proof methods involve Ehrenfeucht-Fra{\"\i}ss{\'e} games, tools from algebraic automata theory, and reasoning about semi-linear sets.} }
@inproceedings{PS-lics10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'10}, booktitle = {{P}roceedings of the 25th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'10)}, author = {Place, {\relax Th}omas and Segoufin, Luc}, title = {Deciding definability in \(\textrm{FO}_{2}(<)\) on trees}, pages = {253-262}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lics10.pdf}, doi = {10.1109/LICS.2010.17}, abstract = { We prove that it is decidable whether a regular unranked tree language is definable in~\(\textsf{FO}_{2}(<_{h}, <_{v})\). By~\(\textsf{FO}_{2}(<_{h}, <_{v})\) we refer to the two variable fragment of first order logic built from the descendant and following sibling predicates. In terms of expressive power it corresponds to a fragment of the navigational core of XPath that contains modalities for going up to some ancestor, down to some descendant, left to some preceding sibling, and right to some following sibling.\par We also investigate definability in some other fragments of XPath.} }
@inproceedings{JGL-lics10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'10}, booktitle = {{P}roceedings of the 25th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'10)}, author = {Goubault{-}Larrecq, Jean}, title = {{{\(\omega\)}}{\textbf{\MakeUppercase{QRB}}}-Domains and the Probabilistic Powerdomain}, pages = {352-361}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lics10.pdf}, doi = {10.1109/LICS.2010.50}, abstract = {Is there any cartesian-closed category of continuous domains that would be closed under Jones and Plotkin's probabilistic powerdomain construction? This is a major open problem in the area of denotational semantics of probabilistic higher-order languages. We relax the question, and look for quasi-continuous dcpos instead. We introduce a natural class of such quasi-continuous dcpos, the \(\omega\textbf{QRB}\)-domains. We show that they form a category \(\omega\textbf{QRB}\) with pleasing properties: \(\omega\textbf{QRB}\) is closed under the probabilistic powerdomain functor, has all finite products, all bilimits, and is stable under retracts, and even under so-called quasiretracts. But... \(\omega\textbf{QRB}\) is not cartesian closed.} }
@inproceedings{BCGJV-lics10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'10}, booktitle = {{P}roceedings of the 25th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'10)}, author = {Bargu{\~n}{\'o}, Luis and Creus, Carles and Godoy, Guillem and Jacquemard, Florent and Vacher, Camille}, title = {The Emptiness Problem for Tree Automata with Global Constraints}, pages = {263-272}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGJV-lics10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGJV-lics10.pdf}, doi = {10.1109/LICS.2010.28}, abstract = {We define tree automata with global constraints~(TAGC), generalizing the class of tree automata with global equality and disequality constraints~(TAGED). TAGC~can test for equality and disequality between subterms whose positions are defined by the states reached during a computation. In~particular, TAGC~can check that all the subterms reaching a given state are distinct. This constraint is related to monadic key constraints for XML documents, meaning that every two distinct positions of a given type have different values.\par We prove decidability of the emptiness problem for~TAGC. This solves, in particular, the open question of decidability of emptiness for TAGED. We further extend our result by allowing global arithmetic constraints for counting the number of occurrences of some state or the number of different subterms reaching some state during a computation. We also allow local equality and disequality tests between sibling positions and the extension to unranked ordered trees. As a consequence of our results for TAGC, we prove the decidability of a fragment of the monadic second order logic on trees extended with predicates for equality and disequality between subtrees, and cardinality.} }
@inproceedings{CF-pn10, address = {Braga, Portugal}, month = jun, year = 2010, volume = 6128, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lilius, Johan and Penczek, Wojciech}, acronym = {{PETRI~NETS}'10}, booktitle = {{P}roceedings of the 31st {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'10)}, author = {Chatain, {\relax Th}omas and Fabre, {\'E}ric}, title = {Factorization Properties of Symbolic Unfoldings of Colored {P}etri Nets}, pages = {165-184}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CF-pn10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CF-pn10.pdf}, doi = {10.1007/978-3-642-13675-7_11}, abstract = {The unfolding technique is an efficient tool to explore the runs of a Petri net in a true concurrency semantics, \textit{i.e.}, without constructing all the interleavings of concurrent actions. But even small real systems are never modeled directly as ordinary Petri nets: they use many high-level features that were designed as extensions of Petri nets. We focus here on two such features: colors and compositionality. We show that the symbolic unfolding of a product of colored Petri nets can be expressed as the product of the symbolic unfoldings of these nets. This is a necessary result in view of distributed computations based on symbolic unfoldings, as they have been developed already for standard unfoldings, to design modular verification techniques, or modular diagnosis procedures, for example. The factorization property of symbolic unfoldings is valid for several classes of colored or high-level nets. We derive it here for a class of (high-level) open nets, for which the composition is performed by connecting places rather than transitions.} }
@article{DL-jal10, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Demri, St{\'e}phane and Lugiez, Denis}, title = {Complexity of Modal Logics with {P}resburger Constraints}, year = {2010}, volume = {8}, number = {3}, pages = {233-252}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DL-jal10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DL-jal10.pdf}, doi = {10.1016/j.jal.2010.03.001}, abstract = {We introduce the extended modal logic EML with regularity constraints and full Presburger constraints on the number of children that generalize graded modalities, also known as number restrictions in description logics. We show that EML satisfiability is only \textsc{pspace}-complete by designing a Ladner-like algorithm. This extends a well-known and non-trivial \textsc{pspace} upper bound for graded modal logic. Furthermore, we provide a detailed comparison with logics that contain Presburger constraints and that are dedicated to query XML documents. As an application, we provide a logarithmic space reduction from a variant of Sheaves logic SL into EML that allows us to establish that its satisfiability problem is also \textsc{pspace}-complete, significantly improving the best known upper bound.} }
@article{LS-jal10, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Libkin, Leonid and Sirangelo, Cristina}, title = {Reasoning about {XML} with temporal logics and automata}, year = {2010}, volume = {8}, number = {2}, pages = {210-232}, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-jal10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-jal10.pdf}, doi = {10.1016/j.jal.2009.09.005}, abstract = {We show that problems arising in static analysis of XML specifications and transformations can be dealt with using techniques similar to those developed for static analysis of programs. Many properties of interest in the XML context are related to navigation, and can be formulated in temporal logics for trees. We choose a logic that admits a simple single-exponential translation into unranked tree automata, in the spirit of the classical LTL-to-B{\"u}chi automata translation. Automata arising from this translation have a number of additional properties; in particular, they are convenient for reasoning about unary node-selecting queries, which are important in the XML context. We give two applications of such reasoning: one deals with a classical XML problem of reasoning about navigation in the presence of schemas, and the other relates to verifying security properties of XML views.} }
@article{DLS-tcs10, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Demri, St{\'e}phane and Lazi{\'c}, Ranko and Sangnier, Arnaud}, title = {Model checking memoryful linear-time logics over one-counter automata}, year = {2010}, volume = {411}, number = {22-24}, pages = {2298-2316}, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DLS-tcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLS-tcs10.pdf}, doi = {10.1016/j.tcs.2010.02.021}, abstract = {We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL\(^{\downarrow}\)) and for first-order logic with data equality tests (written \(\textrm{FO}(\sim, <, +1)\)) over one-counter automata. We consider several classes of one-counter automata (mainly deterministic vs. nondeterministic) and several logical fragments (restriction on the number of registers or variables and on the use of propositional variables for control states). The logics have the ability to store a counter value and to test it later against the current counter value. We show that model checking LTL\(^{\downarrow}\) and \(\textrm{FO}(\sim , <, +1)\) over deterministic one-counter automata is PSpace-complete with infinite and finite accepting runs. By constrast, we prove that model checking LTL\(^{\downarrow}\) in which the until operator~\(\mathbf{U}\) is restricted to the eventually~\(\mathbf{F}\) over nondeterministic one-counter automata is \(\Sigma_1^1\)-complete [resp. \(\Sigma_1^0\)-complete] in the infinitary [resp. finitary] case even if only one register is used and with no propositional variable. As a corollary of our proof, this also holds for \(\textrm{FO}(\sim, <, +1)\) restricted to two variables (written \(\textrm{FO}_2 (\sim, <, +1)\)). This makes a difference with the facts that several verification problems for one-counter automata are known to be decidable with relatively low complexity, and that finitary satisfiability for LTL\(^{\downarrow}\) and \(\textrm{FO}_2 (\sim, <, +1)\) are decidable. Our results pave the way for model-checking memoryful (linear-time) logics over other classes of operational models, such as reversal-bounded counter machines.} }
@article{AF-ijmest10, publisher = {Taylor \& Francis}, journal = {International Journal of Mathematical Education in Science and Technology}, author = {Arnoux, Pierre and Finkel, Alain}, title = {Using mental imagery processes for teaching and research in mathematics and computer science}, volume = 41, number = 2, month = jan, year = 2010, pages = {229-242}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AF-ijmest10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AF-ijmest10.pdf}, doi = {10.1080/00207390903372429}, abstract = {The role of mental representations in mathematics and computer science (for teaching or research) is often downplayed or even completely ignored. Using an ongoing work on the subject, we argue for a more systematic study and use of mental representations, to get an intuition of mathematical concepts, and also to understand and build proofs. We give two detailed examples.} }
@article{GK-icomp10, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Gastin, Paul and Kuske, Dietrich}, title = {Uniform satisfiability problem for local temporal logics over {M}azurkiewicz traces}, volume = 208, number = 7, month = jul, year = 2010, pages = {797-816}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GK-icomp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GK-icomp10.pdf}, doi = {10.1016/j.ic.2009.12.003}, abstract = {We continue our study of the complexity of MSO-definable local temporal logics over concurrent systems that can be described by Mazurkiewicz traces. In previous papers, we showed that the satisfiability problem for any such logic is in PSPACE (provided the dependence alphabet is fixed) and remains in PSPACE for all classical local temporal logics even if the dependence alphabet is part of the input. In~this paper, we consider the uniform satisfiability problem for arbitrary MSO-definable local temporal logics. For this problem, we prove multi-exponential lower and upper bounds that depend on the number of alternations of set quantifiers present in the chosen MSO-modalities.} }
@article{Haar-tac10, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Transactions on Automatic Control}, author = {Haar, Stefan}, title = {Types of Asynchronous Diagnosability and the {\emph{Reveals}}-Relation in Occurrence Nets}, volume = 55, number = 10, month = oct, year = 2010, pages = {2310-2320}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-tac10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-tac10.pdf}, doi = {10.1109/TAC.2010.2063490}, abstract = {We consider asynchronous diagnosis in (safe) Petri net models of distributed systems, using the partial order semantics of occurrence net unfoldings. Both the observability and diagnosability properties will appear in two different forms, depending on the semantics chosen: \emph{strong} observability and diagnosability are the classical notions from the state machine model and correspond to interleaving semantics in Petri nets. By contrast, the \emph{weak} form is linked to characteristics of nonsequential processes, and requires an asynchronous \emph{progress} assumption on those processes. We give algebraic characterizations for both types, and give verification methods. The study of weak diagnosability leads us to the analysis of a relation in occurrence nets, first presented in~[S.~Haar~(2007): \textit{Unfold and Cover: Qualitative Diagnosability for Petri Nets.}]: given the occurrence of some event~\(a\) that \emph{reveals}~\(b\), the occurrence of~\(b\) is inevitable. Then \(b\) may already have occurred, be concurrent to, or even in the future of~\(a\). We show that the \emph{reveals}-relation can be effectively computed recursively---for each pair, a suitable finite prefix of bounded depth is sufficient---and show its use in asynchronous diagnosis. Based on this relation, a~decomposition of the Petri net unfolding into \emph{facets} is defined, yielding an abstraction technique that preserves and reflects maximal partially ordered runs.} }
@inproceedings{SRKK-arspawits10, address = {Paphos, Cyprus}, month = oct, year = 2010, volume = 6186, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Armando, Alessandro and Lowe, Gavin}, acronym = {{ARSPA-WITS}'10}, booktitle = {{P}roceedings of the {J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA-WITS}'10)}, author = {Smyth, Ben and Ryan, Mark D. and Kremer, Steve and Kourjieh, Mounira}, title = {Towards automatic analysis of election verifiability properties}, pages = {146-163}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SRKK-arspawits10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SRKK-arspawits10.pdf}, doi = {10.1007/978-3-642-16074-5_11}, abstract = {We present a symbolic definition that captures some cases of election verifiability for electronic voting protocols. Our definition is given in terms of reachability assertions in the applied pi calculus and is amenable to automated reasoning using the software tool ProVerif. The definition distinguishes three aspects of verifiability, which we call individual, universal, and eligibility verifiability. We demonstrate the applicability of our formalism by analysing the protocols due to Fujioka, Okamoto~\& Ohta and a variant of the one by Juels, Catalano~\& Jakobsson (implemented as Civitas by Clarkson, Chong~\& Myers).} }
@inproceedings{BH-csr10, address = {Kazan, Russia}, month = jun, year = 2010, volume = 6072, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mayr, Ernst W.}, acronym = {{CSR}'10}, booktitle = {{P}roceedings of the 5th {I}nternational {C}omputer {S}cience {S}ymposium in {R}ussia ({CSR}'10)}, author = {Bollig, Benedikt and H{\'e}lou{\"e}t, Lo{\"\i}c}, title = {Realizability of Dynamic {MSC} Languages}, pages = {48-59}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BH-csr10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BH-csr10.pdf}, doi = {10.1007/978-3-642-13182-0_5}, abstract = {We introduce dynamic communicating automata~(DCA), an~extension of communicating finite-state machines that allows for dynamic creation of processes. Their behavior can be described as sets of message sequence charts~(MSCs). We~consider the realizability problem for DCA: given a dynamic MSC grammar (a~high-level MSC specification), is there a DCA defining the same set of MSCs? We~show that this problem is decidable in doubly exponential time, and identify a class of realizable grammars that can be implemented by \emph{finite} DCA.} }
@article{CS-jacm10, publisher = {ACM Press}, journal = {Journal of the~{ACM}}, author = {ten~Cate, Balder and Segoufin, Luc}, title = {Transitive Closure Logic, Nested Tree Walking Automata, and {XP}ath}, volume = 57, number = 3, month = mar, year = 2010, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-jacm10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-jacm10.pdf}, doi = {10.1145/1706591.1706598}, abstract = {We study \textsf{FO(MTC)}, first-order logic with monadic transitive closure, a logical formalism in between \textsf{FO} and \textsf{MSO} on trees. We characterize the expressive power of \textsf{FO(MTC)} in terms of nested tree-walking automata. Using the latter we show that \textsf{FO(MTC)} is strictly less expressive than \textsf{MSO}, solving an open problem. We also present a temporal logic on trees that is expressivel complete for \textsf{FO(MTC)}, in the form of an extension of the XML document navigation language XPath with two operators: the Kleene star for taking the transitive closure of path expressions, and a subtree relativisation operator, allowing one to restrict attention to a specific subtree while evaluating a subexpression. We show that the expressive power of this XPath dialect equals that of \textsf{FO(MTC)} for Boolean, unary and binary queries. We also investigate the complexity of the automata model as well as the XPath dialect. We show that query evaluation be done in polynomial time (combined complexity), but that emptiness (or, satisfiability) is 2ExpTime-complete.} }
@article{ASV-tods09, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Abiteboul, Serge and Segoufin, Luc and Vianu, Victor}, title = {Static Analysis of {A}ctive {XML} Systems}, volume = 34, number = 4, month = dec, year = 2009, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-tods09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-tods09.pdf}, doi = {10.1145/1620585.1620590}, abstract = {Active XML is a high-level specification language tailored to data-intensive, distributed, dynamic Web services. Active XML is based on XML documents with embedded function calls. The state of a document evolves depending on the result of internal function calls (local computations) or external ones (interactions with users or other services). Function calls return documents that may be active, and so may activate new subtasks. The focus of this article is on the verification of temporal properties of runs of Active XML systems, specified in a tree-pattern-based temporal logic, Tree-LTL, which allows expressing a rich class of semantic properties of the application. The main results establish the boundary of decidability and the complexity of automatic verification of Tree-LTL properties.} }
@article{BMSS-jacm09, publisher = {ACM Press}, journal = {Journal of the~{ACM}}, author = {Boja{\'n}czyk, Miko{\l}aj and Muscholl, Anca and Schwentick, {\relax Th}omas and Segoufin, Luc}, title = {Two-variable logic on data trees and applications to {XML} reasoning}, volume = 56, number = 3, month = may, year = 2009, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMSS-jacm09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMSS-jacm09.pdf}, doi = {10.1145/1516512.1516515}, abstract = {Motivated by reasoning tasks for XML languages, the satisfiability problem of logics on \emph{data trees} is investigated. The nodes of a data tree have a \emph{label} from a finite set and a \emph{data value} from a possibly infinite set. It is shown that satisfiability for two-variable first-order logic is decidable if the tree structure can be accessed only through the \emph{child} and the \emph{next sibling} predicates and the access to data values is restricted to equality tests. From this main result, decidability of satisfiability and containment for a data-aware fragment of XPath and of the implication problem for unary key and inclusion constraints is concluded.} }
@article{BS-jsl09, publisher = {Association for Symbolic Logic}, journal = {Journal of Symbolic Logic}, author = {Benedikt, Michael and Segoufin, Luc}, title = {Towards a Characterization of Order-Invariant Queries over Tame Structures}, volume = 74, number = 1, pages = {168-186}, month = mar, year = 2009, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-jsl09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-jsl09.pdf}, doi = {10.2178/jsl/1231082307}, abstract = {This work deals with the expressive power of logics on finite graphs with access to an additional {"}arbitrary{"} linear order. The queries that can be expressed this way are the \emph{order-invariant queries} for the logic. For the standard logics used in computer science, such as first-order logic, it is known that access to an arbitrary linear order increases the expressiveness of the logic. However, when we look at the separating examples, we find that they have satisfying models whose Gaifman Graph is complex---unbounded in valence and in treewidth. We thus explore the expressiveness of order-invariant queries over well-behaved graphs. We prove that first-order order-invariant queries over strings and trees have no additional expressiveness over first-order logic in the original signature. We also prove new upper bounds on order-invariant queries over bounded treewidth and bounded valence graphs. Our results make use of a new technique of independent interest: the application of algebraic characterizations of definability to show collapse results.} }
@incollection{DBBetal-CES09, author = {David, Alexandre and Behrmann, Gerd and Bulychev, Peter and Byg, Joakin and Chatain, {\relax Th}omas and Larsen, Kim G. and Pettersson, Paul and Rasmussen, Jacob Illum and Srba, Ji{\v{r}}{\'\i} and Yi, Wang and Joergensen, Kenneth Y. and Lime, Didier and Magnin, Morgan and Roux, Olivier H. and Traonouez, Louis-Marie}, title = {Tools for Model-Checking Timed Systems}, booktitle = {Communicating Embedded Systems~-- Software and Design}, editor = {Jard, Claude and Roux, Olivier H.}, publisher = {Wiley-ISTE}, year = 2009, month = oct, pages = {165-225}, chapter = 6, url = {http://www.iste.co.uk/index.php?f=x&ACTION=View&id=288}, nops = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/.ps}, nopsgz = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PSGZ/.ps.gz}, isbn = {9781848211438} }
@article{BCHK-icomp10, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Baldan, Paolo and Chatain, {\relax Th}omas and Haar, Stefan and K{\"o}nig, Barbara}, title = {Unfolding-based Diagnosis of Systems with an Evolving Topology}, volume = 208, number = 10, pages = {1169-1192}, year = 2010, month = oct, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHK-icomp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHK-icomp10.pdf}, doi = {10.1016/j.ic.2009.11.009}, abstract = {We propose a framework for model-based diagnosis of systems with mobility and variable topologies, modelled as graph transformation systems. Generally speaking, model-based diagnosis is aimed at constructing explanations of observed faulty behaviours on the basis of a given model of the system. Since the number of possible explanations may be huge, we exploit the unfolding as a compact data structure to store them, along the lines of previous work dealing with Petri net models. Given a model of a system and an observation, the explanations can be constructed by unfolding the model constrained by the observation, and then removing incomplete explanations in a pruning phase. The theory is formalised in a general categorical setting: constraining the system by the observation corresponds to taking a product in the chosen category of graph grammars, so that the correctness of the procedure can be proved by using the fact that the unfolding is a right adjoint and thus it preserves products. The theory should hence be easily applicable to a wide class of system models, including graph grammars and Petri nets.} }
@incollection{Berwanger09, year = 2010, volume = 6006, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Bonnano, Giacomo and L{\"o}we, Benedikt and van der Hoek, Wiebe}, booktitle = {Logic and the Foundations of Game and Decision Theory (LOFT8)}, author = {Berwanger, Dietmar}, title = {Infinite Coordination Games}, pages = {1-19}, futurechapter = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Ber-loft8.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Ber-loft8.pdf}, doi = {10.1007/978-3-642-15164-4_1}, abstract = {We investigate the prescriptive power of sequential iterated admissibility in coordination games of the Gale-Stewart style, \textit{i.e.}, perfect-information games of infinite duration with only two payoffs. We show that, on this kind of games, the procedure of eliminating weakly dominated strategies is independent of the elimination order and that, under maximal simultaneous elimination, the procedure converges after at most omega many stages.} }
@article{BK-jlli10, publisher = {Kluwer Academic Publishers}, journal = {Journal of Logic, Language and Information}, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz}, title = {Information Tracking in Games on Graphs}, volume = 19, number = 4, pages = {395-412}, year = 2010, month = oct, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BK-jlli10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BK-jlli10.pdf}, doi = {10.1007/s10849-009-9115-8}, abstract = {When seeking to coordinate in a game with imperfect information, it is often relevant for a player to know what other players know. Keeping track of the information acquired in a play of infinite duration may, however, lead to infinite hierarchies of higher-order knowledge. We present a construction that makes explicit which higher-order knowledge is relevant in a game and allows us to describe a class of games that admit coordinated winning strategies with finite memory.} }
@article{BCL-jlli10, publisher = {Kluwer Academic Publishers}, journal = {Journal of Logic, Language and Information}, author = {Bouyer, Patricia and Cassez, Franck and Laroussinie, Fran{\c{c}}ois}, title = {Timed Modal Logics for Real-Time Systems: Specification, Verification and Control}, volume = 20, number = 2, pages = {169-203}, year = 2011, month = apr, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCL-jlli10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCL-jlli10.pdf}, doi = {10.1007/s10849-010-9127-4}, abstract = {In this paper, a timed modal logic~\(L_{c}\) is presented for the specification and verification of real-time systems. Several important results for~\(L_{c}\) are discussed. First we address the model checking problem and we show that it is an EXPTIME-complete problem. Secondly we consider expressiveness and we explain how to express strong timed bisimilarity and how to build characteristic formulas for timed automata. We also propose a compositional algorithm for~\(L_{c}\) model checking. Finally we consider several control problems for which \(L_{c}\) can be used to check controllability.} }
@proceedings{Seg-icdt10, author = {Segoufin, Luc}, editor = {Segoufin, Luc}, title = {Proceedings of the 13th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'10)}, booktitle = {Proceedings of the 13th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'10)}, year = 2010, month = mar, url = {http://portal.acm.org/citation.cfm?id=1804669&coll=ACM&dl=ACM} }
@inproceedings{ACKNS-icdt10, address = {Lausanne, Switzerland}, month = mar, year = 2010, publisher = {ACM Press}, editor = {Segoufin, Luc}, acronym = {{ICDT}'10}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'10)}, author = {Abiteboul, Serge and Chan, T.-H. Hubert and Kharlamov, Evgeny and Nutt, Werner and Senellart, Pierre}, title = {Aggregate queries for discrete and continuous probabilistic~{XML}}, pages = {50-61}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACKNS-icdt10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACKNS-icdt10.pdf}, doi = {10.1145/1804669.1804679}, abstract = {Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database models have been proposed, both in the relational and in the semi-structured setting. The latter is particularly well adapted to the management of uncertain data coming from a variety of automatic processes. An important problem, in the context of probabilistic XML databases, is that of answering aggregate queries (count, sum, avg, etc.), which has received limited attention so far. In a model unifying the various (discrete) semi-structured probabilistic models studied up to now, we present algorithms to compute the distribution of the aggregation values (exploiting some regularity properties of the aggregate functions) and probabilistic moments (especially, expectation and variance) of this distribution. We also prove the intractability of some of these problems and investigate approximation techniques. We finally extend the discrete model to a continuous one, in order to take into account continuous data values, such as measurements from sensor networks, and present algorithms to compute distribution functions and moments for various classes of continuous distributions of data values.} }
@inproceedings{Fig-icdt10, address = {Lausanne, Switzerland}, month = mar, year = 2010, publisher = {ACM Press}, editor = {Segoufin, Luc}, acronym = {{ICDT}'10}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'10)}, author = {Figueira, Diego}, title = {Forward-{XP}ath and extended register automata on data-trees}, pages = {230-240}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/fig-icdt10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/fig-icdt10.pdf}, ps = {fig-icdt10.ps}, doi = {10.1145/1804669.1804699}, abstract = {We consider a fragment of XPath named {"}forward-XPath{"}, which contains all descendant and rightwards sibling axes as well as data equality and inequality tests. The satisfiability problem for forward-XPath in the presence of DTDs and even of primary key constraints is shown here to be decidable.\par To show decidability we introduce a model of alternating automata on data trees that can move downwards and rightwards in the tree, have one register for storing data and compare them for equality, and have the ability to (1)~nondeterministically guess a data value and store it, and (2)~quantify universally over the set of data values seen so far during the run. This model extends the work of Jurdzi{\'n}ski and Lazi{\'c}. Decidability of the finitary non-emptiness problem for this model is obtained by a direct reduction to a well-structured transition system, contrary to previous approaches.} }
@article{CDH-tocl10, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, {\relax Th}omas A.}, title = {Quantitative Languages}, volume = 11, number = 4, nopages = {}, year = 2010, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-tocl10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-tocl10.pdf}, ps = {CDH-tocl10.ps}, abstract = {Quantitative generalizations of classical languages, which assign to each word a real number in- stead of a boolean value, have applications in modeling resource-constrained computation. We use weighted automata (finite automata with transition weights) to define several natural classes of quantitative languages over finite and infinite words; in particular, the real value of an infinite run is computed as the maximum, limsup, liminf, limit average, or discounted sum of the transition weights. We define the classical decision problems of automata theory (emptiness, universality, language inclusion, and language equivalence) in the quantitative setting and study their compu- tational complexity. As the decidability of the language-inclusion problem remains open for some classes of weighted automata, we introduce a notion of quantitative simulation that is decidable and implies language inclusion. We also give a complete characterization of the expressive power of the various classes of weighted automata. In particular, we show that most classes of weighted automata cannot be determinized.} }
@inproceedings{DR-tacas10, address = {Paphos, Cyprus}, month = mar, year = 2010, volume = {6015}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Majumdar, Rupak}, acronym = {{TACAS}'10}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'10)}, author = {Doyen, Laurent and Raskin, Jean-Fran{\c{c}}ois}, title = {Antichains Algorithms for Finite Automata}, pages = {2-22}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-tacas10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DR-tacas10.pdf}, ps = {DR-tacas10.ps}, doi = {10.1007/978-3-642-12002-2_2}, abstract = {We present a general theory that exploits simulation relations on transition systems to obtain antichain algorithms for solving the reachability and repeated reachability problems. Antichains are more succinct than the sets of states manipulated by the traditional fixpoint algorithms. The theory justifies the correctness of the antichain algorithms, and applications such as the universality problem for finite automata illustrate efficiency improvements. Finally, we show that new and provably better antichain algorithms can be obtained for the emptiness problem of alternating automata over finite and infinite words.} }
@article{BCDDH-icomp10, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Berwanger, Dietmar and Chatterjee, Krishnendu and Doyen, Laurent and De{~}Wulf, Martin and Henzinger, {\relax Th}omas A.}, title = {Strategy Construction for Parity Games with Imperfect Information}, volume = 208, number = 10, pages = {1206-1220}, year = 2010, month = oct, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCDDH-icomp10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCDDH-icomp10.pdf}, ps = {BCDDH-icomp10.ps}, doi = {10.1016/j.ic.2009.09.006}, abstract = {We consider two-player parity games with imperfect information in which strategies rely on observations that provide imperfect information about the history of a play. To solve such games, \textit{i.e.}, to determine the winning regions of players and corresponding winning strategies, one can use the subset construction to build an equivalent perfect-information game. Recently, an algorithm that avoids the inefficient subset construction has been proposed. The algorithm performs a fixed-point computation in a lattice of antichains, thus maintaining a succinct representation of state sets. However, this representation does not allow to recover winning strategies.\par In this paper, we build on the antichain approach to develop an algorithm for constructing the winning strategies in parity games of imperfect information. One major obstacle in adapting the classical procedure is that the complementation of attractor sets would break the invariant of downward-closedness on which the antichain representation relies. We overcome this difficulty by decomposing problem instances recursively into games with a combination of reachability, safety, and simpler parity conditions. We also report on an experimental implementation of our algorithm; to our knowledge, this is the first implementation of a procedure for solving imperfect-information parity games on graphs.} }
@misc{avote-D21, nocontributor = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Delaune, St{\'e}phanie and Kremer, Steve}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Cortier, V{\'e}ronique}, title = {Algorithmes pour l'{\'e}quivalence statique}, year = 2009, month = sep, type = {Contract Report}, howpublished = {Deliverable AVOTE~2.1 (ANR-07-SESU-002)}, note = {17~pages}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/avote-d21.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/avote-d21.pdf} }
@inproceedings{BBJ-iscc09, address = {Sousse, Tunisia}, month = jul, year = 2009, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{ISCC}'09}, booktitle = {{P}roceedings of the 14th {IEEE} {S}ymposium on {C}omputers and {C}ommunications ({ISCC}'09)}, author = {Ben Youssef, Nihel and Bouhoula, Adel and Jacquemard, Florent}, title = {Automatic Verification of Conformance of Firewall Configurations to Security Policies}, pages = {526 - 531}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBJ-iscc09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBJ-iscc09.pdf}, doi = {10.1109/ISCC.2009.5202309}, abstract = {The configuration of firewalls is highly error prone and automated solution are needed in order to analyze its correctness. We propose a formal and automatic method for checking whether a firewall reacts correctly with respect to a security policy given in an high level declarative language. When errors are detected, some feedback is returned to the user in order to correct the firewall configuration. Furthermore, the procedure verifies that no conflicts exist within the security policy. We show that our method is both correct and complete. Finally, it has been implemented in a prototype of verifier based on a satisfiability solver modulo theories (SMT). Experiment conducted on relevant case studies demonstrate the efficiency and scalability of the approach.} }
@misc{averiles09-f2.2, author = {LIAFA and CRIL and EDF and LSV and Verimag}, title = {Projet {RNTL} {A}veriles~-- Fourniture F2.2~: Algorithmes de v{\'e}rification~-- Rapport final}, year = 2009, month = nov, type = {Contract Report}, note = {25~pages}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/averiles-f22.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/averiles-f22.pdf} }
@inproceedings{haar-cdcccc09, address = {Shanghai, China}, month = dec, year = 2009, publisher = {{IEEE} Control System Society}, acronym = {{CDC/CCC}'09}, booktitle = {{P}roceedings of the Joint 48th {IEEE} {C}onference on {D}ecision and {C}ontrol ({CDC}'09) and 28th {C}hinese {C}ontrol {C}onference ({CCC}'09)}, author = {Haar, Stefan}, title = {Qualitative Diagnosability of Labeled {P}etri Nets Revisited}, pages = {1248-1253}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-cdc09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-cdc09.pdf}, doi = {10.1109/CDC.2009.5400917}, abstract = {In recent years, classical discrete event fault diagnosis techniques have been extended to Petri Net system models under partial order semantics. In~a recent paper, we showed how to take further advantage of the partial order representation of concurrent processes, by decomposing the unfolding into 'facets', formed by subnets whose events either all occur eventually, or none of them occurs. A~notion of \emph{q(ualitative)}-diagnosability was proposed based on this decomposition. The present paper corrects the definition of q-diagnosability and develops its properties. Sufficient and necessary criteria, on the transition labeling, for q-diagnosability are shown; for their verification, and diagnosis itself, compact data structures are sufficient.} }
@misc{Quasimodo-3.5, author = {Laroussinie, Fran{\c{c}}ois and Vaandrager, Frits and Neuh{\"a}u{\ss}er, Martin}, title = {Extended timed automata for scheduling}, howpublished = {Deliverable QUASIMODO~3.5 (ICT-FP7-STREP-214755)}, year = 2009, month = jul }
@misc{Quasimodo-3.4, author = {Markey, Nicolas and Li, Shuhao and Raskin, Jean-Fran{\c{c}}ois and Stoelinga, Mari{\"e}lle}, title = {Synthesizing controllers with bounded resources}, howpublished = {Deliverable QUASIMODO~3.4 (ICT-FP7-STREP-214755)}, year = 2010, month = jan }
@misc{Quasimodo-2.2, author = {Markey, Nicolas and Berendsen, Jasper and David, Alexandre and Han, Tingting and Hermanns, Holger and Larsen, Kim G. and Neuh{\"a}u{\ss}er, Martin}, title = {Symbolic data structures and analysis of models with multiple quantitative aspects}, howpublished = {Deliverable QUASIMODO~2.2 (ICT-FP7-STREP-214755)}, year = 2009, month = jul }
@article{LS-ipl10, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Libkin, Leonid and Sirangelo, Cristina}, title = {Disjoint pattern matching and implication in strings}, volume = 110, number = 4, pages = {143-147}, year = 2010, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-ipl10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-ipl10.pdf}, doi = {10.1016/j.ipl.2009.11.009}, abstract = {We deal with the problem of deciding whether a given set of string patterns implies the presence of a fixed pattern. While checking whether a set of patterns occurs in a string is solvable in polynomial time, this implication problem is well known to be intractable. Here we consider a version of the problem when patterns in the set are required to be disjoint. We show that for such a version of the problem the situation is reversed: checking whether a set of patterns occurs in a string is NP-complete, but the implication problem is solvable in polynomial time.} }
@mastersthesis{sankur-master, author = {Sankur, Ocan}, title = {Model-checking robuste des automates temporis{\'e}s \textit{via} les machines {\`a} canaux}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/sankur-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/sankur-m2.pdf} }
@mastersthesis{soulat-master, author = {Soulat, Romain}, title = {Am{\'e}liorations algorithmiques d'un moteur de model-checking et {\'e}tudes de cas}, school = {{M}aster 2 {R}echerche {I}nformatique {P}aris {S}ud~11}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/soulat-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/soulat-m2.pdf} }
@mastersthesis{boiret-master, author = {Boiret, Adrien}, title = {Grammaires context-free pour les arbres sans rang}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/boiret-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/boiret-m2.pdf} }
@mastersthesis{dimino-master, author = {Dimino, J{\'e}r{\'e}mie}, title = {Sur les arbres de rang non born{\'e} avec donn{\'e}es}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/dimino-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/dimino-m2.pdf} }
@mastersthesis{monmege-master, author = {Monmege, Benjamin}, title = {Propri{\'e}t{\'e}s quantitatives des mots et des arbres~-- Applications aux langages~{XML}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/monmege-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/monmege-m2.pdf} }
@inproceedings{ABGM-time09, address = {Brixen-Bressanone, Italy}, month = jul, year = 2009, publisher = {{IEEE} Computer Society Press}, noeditor = {Lutz, Carsten and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{TIME}'09}, booktitle = {{P}roceedings of the 16th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'09)}, title = {The {AXML} Artifact Model}, author = {Abiteboul, Serge and Bourhis, Pierre and Galland, Alban and Marinoiu, Bogdan}, pages = {11-17}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGM-time09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGM-time09.pdf}, abstract = {Towards a data-centric workflow approach, we introduce an \emph{artifact model} to capture data and workflow management activities in distributed settings. The model is built on Active XML, \textit{i.e.}, XML trees including Web service calls. We argue that the model captures the essential features of business artifacts as described informally in [Nigam and Caswell~(2003)] or discussed in [Hull~(2008)]. To illustrate, we briefly consider the \emph{monitoring} of distributed systems and the \emph{verification} of temporal properties for them.} }
@inproceedings{ABMG-vldb10, address = {Singapore}, month = sep, year = 2010, volume = 3, series = {Proceedings of the {VLDB} Endowment}, publisher = {ACM Press}, editor = {Chen, Yi and Tay, Y.C.}, acronym = {{VLDB}'10}, booktitle = {{P}roceedings of the 36th {I}nternational {C}onference on {V}ery {L}arge {D}ata {B}ases ({VLDB}'10)}, author = {Abiteboul, Serge and Bourhis, Pierre and Marinoiu, Bogdan and Galland, Alban}, title = {{AXART}~-- {E}nabling Collaborative Work with {AXML} Artifacts}, pages = {1553-1556}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABMG-vldb10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABMG-vldb10.pdf}, abstract = {The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, called \emph{business artifacts}, has been introduced by Nigam and Caswell. We follow this approach and propose a model where artifacts are XML documents that evolve in time due to interactions with their environment, i.e. human users or Web services. This paper proposes the AXART system as a distributed platform for collaborative work that harnesses the power of our model. We will illustrate AXART with an example taken from the movie industry. Indeed, applying for a role in a film is a typical collaborative process that involves various participants, inside and outside the film company. The demonstration scenario considers both standard workflow process and dynamic workflow modifications, based on two extension mechanisms: workflow specialization and workflow exception. The workflows, modeled using artifacts, are supported by the AXART system by combining techniques specific to active documents, like view maintenance, with security techniques to manage access rights.} }
@inproceedings{GAMS-wsdm10, address = {New~York, New~York, USA}, month = feb, year = 2010, publisher = {ACM Press}, editor = {Davison, Brian D. and Suel, Torsten and Craswell, Nick and Liu, Bing}, acronym = {{WSDM}'10}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {W}eb {S}earch and {W}eb {D}ata {M}ining ({WSDM}'10)}, author = {Galland, Alban and Abiteboul, Serge and Marian, Am{\'e}lie and Senellart, Pierre}, title = {Corroborating information from disagreeing views}, pages = {131-140}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GAMS-wsdm10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GAMS-wsdm10.pdf}, doi = {10.1145/1718487.1718504}, abstract = {We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want to predict the truth values of the facts. Beyond simple methods such as voting (typically rather accurate), we explore techniques based on {"}corroboration{"}, i.e., taking into account trust in the views. We introduce three fixpoint algorithms corresponding to different levels of complexity of an underlying probabilistic model. They all estimate both truth values of facts and trust in the views. We present experimental studies on synthetic and real-world data. This analysis illustrates how and in which context these methods improve corroboration results over baseline methods. We believe that corroboration can serve in a wide range of applications such as source selection in the semantic Web, data quality assessment or semantic annotation cleaning in social networks. This work sets the bases for a wide range of techniques for solving these more complex problems.} }
@inproceedings{BHB-sbmf10, address = {}, month = nov, year = 2010, volume = 6527, series = {Lecture Notes in Computer Science}, editor = {Davies, Jim and Silva, Leila and da~Silva Sim{\~a}o, Adenilso}, publisher = {Springer}, acronym = {{SBMF}'10}, booktitle = {{R}evised {S}elected {P}apers of the 13th {B}razilian {S}ymposium on {F}ormal {M}ethods ({SBMF}'10)}, author = {Bauer, Sebastian S. and Hennicker, Rolf and Bidoit, Michel}, title = {A~Modal Interface Theory with Data Constraints}, pages = {80-95}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHB-sbmf10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHB-sbmf10.pdf}, doi = {10.1007/978-3-642-19829-8_6}, abstract = {For the design of component-based software, the behavioral specification of component interfaces is crucial. We propose an extension of the theory of modal I{\slash}O-transition systems by Larsen \textit{et~al.} to cope with both control flow and data states of reactive components at the same time. In our framework, transitions model incoming or outgoing operation calls which are constrained by pre- and postconditions expressing the mutual assumptions and guarantees of the receiver and the sender of a message. We define a new interface theory by adapting synchronous composition, modal refinement and modal compatibility to the case of modal I{\slash}O-transition systems with data constraints. We show that in this formalism modal compatibility is preserved by refinement and modal refinement is preserved by composition which are basic requirements for any interface theory.} }
@article{AGM-jcss11, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Abiteboul, Serge and Gottlob, Georg and Manna, Marco}, title = {Distributed {XML} design}, volume = 77, number = 6, pages = {936-964}, month = nov, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGM-jcss11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGM-jcss11.pdf}, doi = {10.1016/j.jcss.2011.02.003}, abstract = {A distributed XML document is an XML document that spans several machines. We assume that a distribution design of the document tree is given, consisting of an \emph{XML kernel-document} \(T_{[\mathbf{f}_{1},...,\mathbf{f}_{n}]}\) where some leaves are {"}docking points{"} for external resources providing XML subtrees (\(\mathbf{f}_{1},...,\mathbf{f}_{n}\) standing, e.g., for Web services or peers at remote locations). The top-down design problem consists in, given a \emph{type} (a~schema document that may vary from a DTD to a tree automaton) for the distributed document, {"}propagating{"} locally this type into a collection of types, that we call \emph{typing}, while preserving desirable properties. We also consider the bottom-up design which consists in, given a type for each external resource, exhibiting a global type that is enforced by the local types, again with natural desirable properties. In the article, we lay out the fundamentals of a theory of distributed XML design, analyze problems concerning typing issues in this setting, and study their complexity.} }
@article{ACKNS-tods11, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Abiteboul, Serge and Chan, T.-H. Hubert and Kharlamov, Evgeny and Nutt, Werner and Senellart, Pierre}, title = {Capturing continuous data and answering aggregate queries in probabilistic~{XML}}, volume = {36}, number = {4:25}, month = dec, year = 2011, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACKNS-tods11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACKNS-tods11.pdf}, doi = {10.1145/2043652.2043658}, abstract = {Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database models have been proposed, both in the relational and in the semi-structured setting. The latter is particularly well adapted to the management of uncertain data coming from a variety of automatic processes. An important problem, in the context of probabilistic XML databases, is that of answering aggregate queries (count, sum, avg, etc.), which has received limited attention so~far. In a model unifying the various (discrete) semi-structured probabilistic models studied up to now, we present algorithms to compute the distribution of the aggregation values (exploiting some regularity properties of the aggregate functions) and probabilistic moments (especially expectation and variance) of this distribution. We also prove the intractability of some of these problems and investigate approximation techniques. We finally extend the discrete model to a continuous one, in order to take into account continuous data values, such as measurements from sensor networks, and extend our algorithms and complexity results to the continuous case.} }
@inproceedings{SGA-iswc11, address = {Bonn, Germany}, month = oct, year = 2011, volume = 7031, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aroyo, Lora and Welty, Chris and Alani, Harith and Taylor, Jamie and Bernstein, Abraham and Kagal, Lalana and Fridman{ }Noy,Natasha and Blomqvist, Eva}, acronym = {{ISWC}'11}, booktitle = {{P}roceedings of the 10th {I}nternational {S}emantic {W}eb {C}onference ({ISWC}'11)}, author = {Suchanek, Fabian M. and Gross{-}Amblard, David and Abiteboul, Serge}, title = {Watermarking for Ontologies}, pages = {697-713}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SGA-iswc11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SGA-iswc11.pdf}, doi = {10.1007/978-3-642-25073-6_44}, abstract = {In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.} }
@inproceedings{AGP-webdb11, address = {Athens, Greece}, month = jun, year = 2011, editor = {Marian, Am{\'e}lie and Vassalos, Vasilis}, acronym = {({W}eb{DB}'11)}, booktitle = {{P}roceedings of the 14th {I}nternational {W}orkshop on the {W}eb and {D}atabases ({W}eb{DB}'11)}, author = {Abiteboul, Serge and Galland, Alban and Polyzotis, Neoklis}, title = {Web information management with access control}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGP-webdb11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGP-webdb11.pdf}, abstract = {We investigate the problem of sharing private information on the Web, where the information is hosted on different machines that may use different access control and distribution schemes. We introduce a distributed knowledge-base model, termed WebdamExchange, that comprises logical statements for specifying data, access control, distribution and knowledge about other peers. The statements can be communicated, replicated, queried, and updated, while keeping track of time and provenance. This unified base allows applications to reason declaratively about what data is accessible, where it resides, and how to retrieve it securely.} }
@inproceedings{ABKT-icde11, editor = {Abiteboul, Serge and B{\"o}hm, Klemens and Koch, Christoph and Tan, Kian-Lee}, author = {Abiteboul, Serge and B{\"o}hm, Klemens and Koch, Christoph and Tan, Kian-Lee}, title = {{P}roceedings of the 27th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'11)}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'11)}, year = 2011, month = apr, publisher = {{IEEE} Computer Society Press}, address = {Hannover, Germany}, doi = {10.1109/ICDE.2011.5767975}, url = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?punumber=5765035} }
@inproceedings{ACK-icdt11, address = {Uppsala, Sweden}, month = mar, year = 2011, publisher = {ACM Press}, editor = {Milo, Tova}, acronym = {{ICDT}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'11)}, author = {Abiteboul, Serge and ten~Cate, Balder and Katsis, Yannis}, title = {On the equivalence of distributed systems with queries and communication}, pages = {126-137}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACK-icdt11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACK-icdt11.pdf}, doi = {10.1145/1938551.1938570}, abstract = {Distributed data management systems consist of peers that store, exchange and process data in order to collaboratively achieve a common goal, such as evaluate some query. We study the equivalence of such systems. We model a distributed system by a collection of Active XML documents, i.e., trees augmented with function calls for performing tasks such as sending, receiving and querying data. As our model is quite general, the equivalence problem turns out to be undecidable. However, we exhibit several restrictions of the model, for which equivalence can be effectively decided. We also study the computational complexity of the equivalence problem, and present an axiomatization of equivalence, in the form of a set of equivalence-preserving rewrite rules allowing us to optimize a system by rewriting it into an equivalent, but possibly more efficient system.} }
@inproceedings{ABV-icdt11, address = {Uppsala, Sweden}, month = mar, year = 2011, publisher = {ACM Press}, editor = {Milo, Tova}, acronym = {{ICDT}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'11)}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Comparing workflow specification languages: a~matter of views}, pages = {78-89}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt11.pdf}, doi = {10.1145/1938551.1938564}, abstract = {We address the problem of comparing the expressiveness of workflow specification formalisms using a notion of view of a workflow. Views allow to compare widely different workflow systems by mapping them to a common representation capturing the observables relevant to the comparison. Using this framework, we compare the expressiveness of several workflow specification mechanisms, including automata, temporal constraints, and pre-and-post conditions, with XML and relational databases as underlying data models. One surprising result shows the considerable power of static constraints to simulate apparently much richer workflow control mechanisms.} }
@inproceedings{ltc-GardentPPS11, address = {Pozna\'n, Poland}, month = nov, year = 2014, volume = {8387}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Vetulani, Zygmunt and Mariani, Joseph}, acronym = {{LTC}'11}, booktitle = {{P}roceedings of the 5th {L}anguage {\&} {T}echnology {C}onference ({LTC}'11)}, author = {Gardent, Claire and Perrier, Guy and Parmentier, Yannick and Schmitz, Sylvain}, title = {Lexical Disambiguation in {LTAG} using Left Context}, nopages = {}, url = {http://hal.archives-ouvertes.fr/hal-00629902/}, abstract = {In this paper, we present an automaton-based lexical disambiguation process for Lexicalized Tree-Adjoining Grammar (LTAG). This process builds on previous work of Bonfante \textit{et~al.}~(2004), and extends it by computing a polarity-based abstraction, which contains information about left context. This extension allows for a faster lexical disambiguation by reducing the filtering automaton.} }
@inproceedings{DMS-iwigp11, address = {Saarbr{\"u}cken, Germany}, month = mar, year = 2011, volume = 50, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Reich, Johannes and Finkbeiner, Bernd}, acronym = {{iWIGP}'11}, booktitle = {{P}roceedings of the {I}nternational {W}orkshop on {I}nteractions, {G}ames and {P}rotocols ({iWIGP}'11)}, author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa}, title = {Synchronizing Objectives for {M}arkov Decision Processes}, pages = {61-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-iwigp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-iwigp11.pdf} }
@inproceedings{CD-memics11, address = {Lednice, Czech Republic }, month = oct, year = 2011, volume = 7119, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bouda, Jan and {\v{C}}ern{\'a}, Ivana and Sekanina, Luk{\'a}{\v{s}} and Vojnar, Tom{\'a}{\v{s}}}, acronym = {{MEMICS}'11}, booktitle = {{P}roceedings of the 7th {A}nnual {D}octoral {W}orkshop on {M}athematical and {E}ngineering {M}ethods in {C}omputer {S}cience ({MEMICS}'11)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Games and Markov Decision Processes with Mean-payoff Parity and Energy Parity Objectives}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-memics11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-memics11.pdf}, abstract = {The analysis of games and probabilistic systems with quantitative objectives (such as mean-payoff and energy objectives) and \(\omega\)-regular objectives (such as parity objectives) provide the mathematical foundation for performance analysis and verification of various classes of systems. In this talk, we will present a survey of both classical results and recent results about mean-payoff, energy, and parity objectives. We will discuss about how to solve their combinations, their inter-relationship, and mention interesting open problems.} }
@inproceedings{BBDDR-atva11, address = {Taipei, Taiwan}, month = oct, year = {2011}, volume = 6996, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bultan, Tevfik and Hsiung, Pao-Ann}, acronym = {{ATVA}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'11)}, author = {Brihaye, {\relax Th}omas and Bruy{\`e}re, V{\'e}ronique and Doyen, Laurent and Ducobu, Marc and Raskin, Jean-Fran{\c{c}}ois}, title = {Antichain-based {QBF} Solving}, pages = {183-197}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBDDR-atva11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBDDR-atva11.pdf}, doi = {10.1007/978-3-642-24372-1_14} }
@article{BCDGR-fmsd2011, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Brim, Lubos and Chaloupka, Jakub and Doyen, Laurent and Gentilini, Raffaella and Raskin, Jean-Fran{\c{c}}ois}, title = {Faster algorithms for mean-payoff games}, year = {2011}, month = apr, volume = {38}, number = {2}, pages = {97-118}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCDGR-fmsd2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCDGR-fmsd2011.pdf}, doi = {10.1007/s10703-010-0105-x} }
@misc{JGL-tacl11, author = {Jean Goubault{-}Larrecq}, title = {A Few Pearls in the Theory of Quasi-Metric Spaces}, year = {2011}, month = jul, howpublished = {Invited talk, Fifth International Conference on Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July~2011} }
@article{FG-lmcs12, journal = {Logical Methods in Computer Science}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for {WSTS}, Part~{II}: Complete {WSTS}}, year = 2012, month = sep, volume = 8, number = {3:28}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-lmcs12.pdf}, doi = {10.2168/LMCS-8(3:28)2012}, abstract = {We describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathfrak{S}\). This computes the so-called \emph{clover} of a state. When \(\mathfrak{S}\) is the completion of a WSTS~\(\mathfrak{X}\), the clover in~\(\mathfrak{S}\) is a finite description of the downward closure of the reachability set. We show that such completions are infinity-complete exactly when \(\mathfrak{X}\) is an \(\omega^2\)-WSTS, a~new robust class of WSTS. We show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets and on lossy channel systems. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we apply this to well-structured counter systems.} }
@article{JGL-lmcs12, journal = {Logical Methods in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {{QRB}-Domains and the Probabilistic Powerdomain}, year = 2012, volume = 8, number = {1:14}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:14)2012}, abstract = {Is there any Cartesian-closed category of continuous domains that would be closed under Jones and Plotkin's probabilistic powerdomain construction? This is a major open problem in the area of denotational semantics of probabilistic higher-order languages. We relax the question, and look for quasi-continuous dcpos instead.\par We introduce a natural class of such quasi-continuous dcpos, the omega-QRB-domains. We show that they form a category omega-QRB with pleasing properties: omega-QRB is closed under the probabilistic powerdomain functor, under finite products, under taking bilimits of expanding sequences, under retracts, and even under so-called quasi-retracts. But... omega-QRB is not Cartesian closed. We conclude by showing that the QRB domains are just one half of an FS-domain, merely lacking control.} }
@article{BGGLP-comp11, publisher = {Springer}, journal = {Computing}, author = {Bouissou, Olivier and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean and Putot, Sylvie}, title = {A Generalization of {P}-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs}, year = 2012, month = mar, volume = 94, number = {2-4}, pages = {189-201}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGGLP-comp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGGLP-comp11.pdf}, doi = {10.1007/s00607-011-0182-8}, abstract = {We often need to deal with information that contains both interval and probabilistic uncertainties. P-boxes and Dempster-Shafer structures are models that unify both kind of information, but they suffer from the main defect of intervals, the wrapping effect. We present here a new arithmetic that mixes, in a guaranteed manner, interval uncertainty with probabilities, while using some information about variable dependencies, hence limiting the loss from not accounting for correlations. This increases the precision of the result and decreases the computation time compared to standard p-box arithmetic.} }
@article{BDMSS-tocl11, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Boja{\'n}czyk, Miko{\l}aj and David, Claire and Muscholl, Anca and Schwentick, {\relax Th}omas and Segoufin, Luc}, title = {Two-variable logic on data words}, volume = 12, number = {4:27}, nopages = {}, year = 2011, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDMSS-tocl11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDMSS-tocl11.pdf}, doi = {10.1145/1970398.1970403} }
@article{KS-lmcs11, journal = {Logical Methods in Computer Science}, author = {Kazana, Wojciech and Segoufin, Luc}, title = {First-order query evaluation on structures of bounded degree}, volume = 7, number = {2:20}, year = 2011, month = jun, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-lmcs11.pdf}, doi = {10.2168/LMCS-7(2:20)2011} }
@article{PS-lmcs11, journal = {Logical Methods in Computer Science}, author = {Place, {\relax Th}omas and Segoufin, Luc}, title = {A decidable characterization of locally testable tree languages}, volume = 7, number = {4:03}, year = 2011, month = nov, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lmcs11.pdf}, doi = {10.2168/LMCS-7(4:3)2011} }
@inproceedings{AGLMP-icde11, address = {Hannover, Germany}, month = apr, year = 2011, publisher = {{IEEE} Computer Society Press}, editor = {Abiteboul, Serge and B{\"o}hm, Klemens and Koch, Christoph and Tan, Kian-Lee}, acronym = {{ICDE}'11}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'11)}, author = {Antoine, {\'E}milien and Galland, Alban and Lyngbaek, Kristian and Marian, Am{\'e}lie and Polyzotis, Neoklis}, title = {Social networking on top of the WebdamExchange system}, pages = {1300-1303}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGLMP-icde11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGLMP-icde11.pdf}, doi = {10.1109/ICDE.2011.5767939}, abstract = {The demonstration presents the WebdamExchange system, \emph{a~distributed knowledge base management system with access rights, localization and provenance}. This system is based on the exchange of logical statements that describe documents, collections, access rights, keys and localization information and updates of this data.\par We illustrate how the model can be used in a social-network context to help users keep control on their data on the web. In particular, we show how users within very different schemes of data-distribution (centralized, dht, unstructured P2P,~etc.) can still transparently collaborate while keeping a good control over their own data.} }
@inproceedings{ABGA-pods11, address = {Athens, Greece}, month = jun, year = 2011, publisher = {ACM Press}, editor = {Lenzerini, Maurizio and Schwentick, {\relax Th}omas}, acronym = {{PODS}'11}, booktitle = {{P}roceedings of the 30th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'11)}, author = {Abiteboul, Serge and Bienvenu, Meghyn and Galland, Alban and Antoine, {\'E}milien}, title = {A rule-based language for Web data management}, pages = {293-304}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGA-pods11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGA-pods11.pdf}, doi = {10.1145/1989284.1989320}, abstract = {There is a new trend to use Datalog-style rule-based languages to specify modern distributed applications, notably on the Web. We introduce here such a language for a distributed data model where peers exchange messages (i.e.,~logical facts) as well as rules. The model is formally defined and its interest for distributed data management is illustrated through a variety of examples. A~contribution of our work is a study of the impact on expressiveness of {"}delegations{"} (the installation of rules by a peer in some other peer) and explicit timestamps. We also validate the semantics of our model by showing that under certain natural conditions, our semantics converges to the same semantics as the centralized system with the same rules. Indeed, we show this is even true when updates are considered.} }
@inproceedings{BC-post12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua D.}, acronym = {{POST}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'12)}, author = {Bana, Gergei and Comon{-}Lundh, Hubert}, title = {Towards Unconditional Soundness: Computationally Complete Symbolic Attacker}, pages = {189-208}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-post12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-post12.pdf}, doi = {10.1007/978-3-642-28641-4_11}, abstract = {We consider the question of the adequacy of symbolic models versus computational models for the verification of security protocols. We neither try to include properties in the symbolic model that reflect the properties of the computational primitives nor add computational requirements that enforce the soundness of the symbolic model. We propose in this paper a different approach: everything is possible in the symbolic model, unless it contradicts a computational assumption. In this way, we obtain unconditional soundness almost by construction. And we do not need to assume the absence of dynamic corruption or the absence of key-cycles, which are examples of hypotheses that are always used in related works. We set the basic framework, for arbitrary cryptographic primitives and arbitrary protocols, however for trace security properties only.} }
@inproceedings{CCS-post12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua D.}, acronym = {{POST}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'12)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique and Scerri, Guillaume}, title = {Security proof with dishonest keys}, pages = {149-168}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCS-post12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCS-post12.pdf}, doi = {10.1007/978-3-642-28641-4_9}, abstract = {Symbolic and computational models are the two families of models for rigorously analysing security protocols. Symbolic models are abstract but offer a high level of automation while computational models are more precise but security proof can be tedious. Since the seminal work of Abadi and Rogaway, a new direction of research aims at reconciling the two views and many soundness results establish that symbolic models are actually sound w.r.t. computational models.\par This is however not true for the prominent case of encryption. Indeed, all existing soundness results assume that the adversary only uses honestly generated keys. While this assumption is acceptable in the case of asymmetric encryption, it is clearly unrealistic for symmetric encryption. In this paper, we provide with several examples of attacks that do not show-up in the classical Dolev-Yao model, and that do not break the IND-CPA nor INT-CTXT properties of the encryption scheme.\par Our main contribution is to show the first soundness result for symmetric encryption and arbitrary adversaries. We consider arbitrary indistinguishability properties and an unbounded number of sessions. This result relies on an extension of the symbolic model, while keeping standard security assumptions: IND-CPA and IND-CTXT for the encryption scheme.} }
@inproceedings{CDD-post12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua D.}, acronym = {{POST}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'12)}, author = {Cortier, V{\'e}ronique and Degrieck, Jan and Delaune, St{\'e}phanie}, title = {Analysing routing protocols: four nodes topologies are sufficient}, pages = {30-50}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post12.pdf}, doi = {10.1007/978-3-642-28641-4_3}, abstract = {Routing protocols aim at establishing a route between nodes on a network. Secured versions of routing protocols have been proposed in order to provide more guarantees on the resulting routes. Formal methods have proved their usefulness when analysing standard security protocols such as confidentiality or authentication protocols. However, existing results and tools do not apply to routing protocols. This is due in particular to the fact that all possible topologies (infinitely many) have to be considered.\par In this paper, we propose a simple reduction result: when looking for attacks on properties such as the validity of the route, it is sufficient to consider topologies with only four nodes, resulting in a number of just five distinct topologies to consider. As an application, we analyse the SRP applied to DSR and the SDMSR protocols using the ProVerif tool.} }
@techreport{LSV-11-24, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Modeling and Verifying Ad~Hoc Routing Protocols}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = dec, type = {Research Report}, number = {LSV-11-24}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-24.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-24.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-24-v1.pdf, 20111220}, note = {66~pages}, abstract = {Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such networks, a central issue, ensured by routing protocols, is to find a route from one device to another. Those protocols use cryptographic mechanisms in order to prevent malicious nodes from compromising the discovered route.\par Our contribution is twofold. We first propose a calculus for modeling and reasoning about security protocols, including in particular secured routing protocols. Our calculus extends standard symbolic models to take into account the characteristics of routing protocols and to model wireless communication in a more accurate way. Our second main contribution is a decision procedure for analyzing routing protocols for any network topology. By using constraint solving techniques, we show that it is possible to automatically discover (in~NPTIME) whether there exists a network topology that would allow malicious nodes to mount an attack against the protocol, for a bounded number of sessions. We also provide a decision procedure for detecting attacks in case the network topology is given a priori. We demonstrate the usage and usefulness of our approach by analyzing protocols of the literature, such as SRP applied to DSR and SDMSR.} }
@inproceedings{BHP-tacas12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7214}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Flanagan, Cormac and K{\"o}nig, Barbara}, acronym = {{TACAS}'12}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'12)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {Coupling and Importance Sampling for Statistical Model Checking}, pages = {331-346}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-tacas12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-tacas12.pdf}, doi = {10.1007/978-3-642-28756-5_23}, abstract = {Statistical model-checking is an alternative verification technique applied on stochastic systems whose size is beyond numerical analysis ability. Given a model (most often a Markov chain) and a formula, it provides a confidence interval for the probability that the model satisfies the formula. One of the main limitations of the statistical approach is the computation time explosion triggered by the evaluation of very small probabilities. In order to solve this problem we develop a new approach based on importance sampling and coupling. The corresponding algorithms have been implemented in our tool cosmos. We present experimentation on several relevant systems, with estimated time reductions reaching a factor of~\(10^{120}\).} }
@inproceedings{CMV-tacas12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7214}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Flanagan, Cormac and K{\"o}nig, Barbara}, acronym = {{TACAS}'12}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'12)}, author = {Chadha, Rohit and Madhusudan, P. and Viswanathan, Mahesh}, title = {Reachability under Contextual Locking}, pages = {437-450}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CMV-tacas12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CMV-tacas12.pdf}, doi = {10.1007/978-3-642-28756-5_30}, abstract = {The pairwise reachability problem for a multi-threaded program asks, given control locations in two threads, whether they can be simultaneously reached in an execution of the program. The problem is important for static analysis and is used to detect statements that are concurrently enabled. This problem is in general undecidable even when data is abstracted and when the threads (with recursion) synchronize only using a finite set of locks. Popular programming paradigms that limit the lock usage patterns have been identified under which the pairwise reachability problem becomes decidable. In this paper, we consider a new natural programming paradigm, called contextual locking, which ties the lock usage to calling patterns in each thread: we assume that locks are released in the same context that they were acquired and that every lock acquired by a thread in a procedure call is released before the procedure returns. Our main result is that the pairwise reachability problem is polynomial-time decidable for this new programming paradigm as well.} }
@inproceedings{BCGK-fossacs12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = 7213, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Birkedal, Lars}, acronym = {{FoSSaCS}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'12)}, author = {Bollig, Benedikt and Cyriac, Aiswarya and Gastin, Paul and Narayan Kumar, K.}, title = {Model Checking Languages of Data Words}, pages = {391-405}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGK-fossacs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGK-fossacs12.pdf}, doi = {10.1007/978-3-642-28729-9_26}, abstract = {We consider the model-checking problem for data multi-pushdown automata (DMPA). DMPA generate data words, i.e, strings enriched with values from an infinite domain. The latter can be used to represent an unbounded number of process identifiers so that DMPA are suitable to model concurrent programs with dynamic process creation. To specify properties of data words, we use monadic second-order (MSO) logic, which comes with a predicate to test two word positions for data equality. While satisfiability for MSO logic is undecidable (even for weaker fragments such as first-order logic), our main result states that one can decide if all words generated by a DMPA satisfy a given formula from the full MSO logic.} }
@inproceedings{BBMU-fossacs12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = 7213, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Birkedal, Lars}, acronym = {{FoSSaCS}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'12)}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas and Ummels, Michael}, title = {Concurrent games with ordered objectives}, pages = {301-315}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fossacs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fossacs12.pdf}, doi = {10.1007/978-3-642-28729-9_20}, abstract = {We consider concurrent games played on graphs, in which each player has several qualitative (e.g. reachability or B{\"u}chi) objectives, and a preorder on these objectives (for instance the counting order, where the aim is to maximise the number of objectives that are fulfilled).\par We study two fundamental problems in that setting: (1)~the \emph{value problem}, which aims at deciding the existence of a strategy that ensures a given payoff; (2)~the \emph{Nash equilibrium problem}, where we want to decide the existence of a Nash equilibrium (possibly with a condition on the payoffs). We characterise the exact complexities of these problems for several relevant preorders, and several kinds of objectives.} }
@phdthesis{bourhis-phd2011, author = {Bourhis, Pierre}, title = {On the dynamics of active documents for distributed data management}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bourhis-these.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bourhis-these.pdf} }
@phdthesis{arnaud-phd2011, author = {Arnaud, Mathilde}, title = {Formal verification of secured routing protocols}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/arnaud-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/arnaud-these11.pdf} }
@phdthesis{ciobaca-phd2011, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan}, title = {Automated Verification of Security Protocols with Appplications to Electronic Voting}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ciobaca-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ciobaca-these11.pdf} }
@article{haar-deds11, publisher = {Springer}, journal = {Discrete Event Dynamic Systems: Theory and Applications}, author = {Haar, Stefan}, title = {What topology tells us about diagnosability in partial order semantics}, pages = {383-402}, volume = 22, number = 4, year = {2012}, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-deds11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-deds11.pdf}, doi = {10.1007/s10626-011-0121-z}, abstract = {From a partial observation of the behaviour of a labeled Discrete Event System, \emph{fault diagnosis} strives to determine whether or not a given {"}invisible{"} fault event has occurred. The \emph{diagnosability problem} can be stated as follows: does the labeling allow for an outside observer to determine the occurrence of the fault, no later than a bounded number of events after that unobservable occurrence? When this problem is investigated in the context of concurrent systems, partial order semantics adds to the difficulty of the problem, but also provides a richer and more complex picture of observation and diagnosis. In particular, it is crucial to clarify the intuitive notion of {"}\emph{time after fault occurrence}{"}. To this end, we will use a unifying metric framework for event structures, providing a general topological description of diagnosability in both sequential and nonsequential semantics for Petri nets.} }
@techreport{lsv-11-23, author = {Lozes, {\'E}tienne and Villard, Jules}, title = {Sharing Contract-Obedient Endpoints}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = dec, type = {Research Report}, number = {LSV-11-23}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-23.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-23.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2011-23-v1.pdf, 20111207}, note = {42~pages}, abstract = {Most of the existing verification techniques for programs based on message passing suppose either that channel endpoints are used in a linear fashion, where at most one thread can be considered as the owner of an endpoint at any given time, or that endpoints may be used arbitrarily by any number of threads. The former approach forbids the sharing of channels, while the latter limits what is provable about programs, since no constraint is put on the usage of channels. In this paper, we propose a midpoint between these techniques by extending a previously published proof system based on separation logic to allow the sharing of endpoints. We identify two independent mechanisms for supporting sharing: the standard technique based on reasoning with permissions, and a new technique based on what we call ownership on demand. We formalize these two techniques in a proof system, illustrate them on several examples, and we extend Villard's semantics and soundness proofs to support sharing.} }
@article{BCJST-ijis11, publisher = {Springer}, journal = {International Journal on Information Security}, author = {Backes, Michael and Cervesato, Iliano and Jaggard, Aaron and Scedrov, Andre and Tsay, Joe-Kai}, title = {Cryptographically sound security proofs for basic and public-key {K}erberos}, pages = {107-134}, volume = {10}, number = {2}, year = {2011}, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCJST-ijis11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCJST-ijis11.pdf}, doi = {10.1007/s10207-011-0125-6} }
@inproceedings{ILV-imacc11, address = {Oxford, UK}, month = dec, year = 2011, volume = {7089}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chen, Liqun}, acronym = {{IMACC}'11}, booktitle = {{P}roceedings of the 13th {IMA} {I}nternational {C}onference on {C}ryptography and {C}oding ({IMACC}'11)}, author = {Izabach{\`e}ne, Malika and Libert, Beno{\^\i}t and Vergnaud, Damien}, title = {Block-wise {P}-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes}, pages = {431-450}, doi = {10.1007/978-3-642-25516-8_26}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ILV-imacc11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ILV-imacc11.pdf}, abstract = {Anonymous credentials are protocols in which users obtain certificates from organizations and subsequently demonstrate their possession in such a way that transactions carried out by the same user cannot be linked. We present an anonymous credential scheme with non-interactive proofs of credential possession where credentials are associated with a number of attributes. Following recent results of Camenisch and Gro\ss{} (CCS~2008), the proof simultaneously convinces the verifier that certified attributes satisfy a certain predicate. Our construction relies on a new kind of P-signature, termed \emph{block-wise P-signature}, that allows a user to obtain a signature on a committed vector of messages and makes it possible to generate a short witness that serves as a proof that the signed vector satisfies the predicate. A~non-interactive anonymous credential is obtained by combining our \emph{block-wise} P-signature scheme with the Groth-Sahai proof system. It allows efficiently proving possession of a credential while simultaneously demonstrating that underlying attributes satisfy a predicate corresponding to the evaluation of inner products (and therefore disjunctions or polynomial evaluations). The security of our scheme is proved in the standard model under non-interactive assumptions.} }
@inproceedings{CD-lopstr11, address = {Odense, Denmark}, year = 2012, volume = {7225}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Vidal, Germ{\'a}n}, acronym = {{LOPSTR}'11}, booktitle = {{P}roceedings of the 21st {I}nternational {W}orkshop on {L}ogic {P}rogram {S}ynthesis and {T}ransformation ({LOPSTR}'11)}, author = {Cabalar, Pedro and Demri, St{\'e}phane}, title = {Automata-Based Computation of Temporal Equilibrium Models}, pages = {57-72}, doi = {10.1007/978-3-642-32211-2_5}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lopstr11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lopstr11.pdf}, abstract = {Temporal Equilibrium Logic~(TEL) is a formalism for temporal logic programming that generalizes the paradigm of Answer Set Programming~(ASP) introducing modal temporal operators from standard Linear-time Temporal Logic~(LTL). In this paper we solve some problems that remained open for TEL like decidability, bounds for computational complexity as well as computation of temporal equilibrium models for arbitrary theories. We propose a method for the latter that consists in building a B{\"u}chi automaton that accepts exactly the temporal equilibrium models of a given theory, providing an automata-based decision procedure and illustrating the \(\omega\)-regularity of such sets. We show that TEL satisfiability can be solved in exponential space and it is hard for polynomial space. Finally, given two theories, we provide a decision procedure to check if they have the same temporal equilibrium models.} }
@book{LPS-book11, author = {Luccio, Fabrizio and Pagli, Linda and Steel, Graham}, title = {Mathematical and Algorithmic Foundations of the Internet}, publisher = {CRC Press}, year = 2011, month = jul, url = {https://www.crcpress.com/9781439831380} }
@incollection{steel-crypt2011, author = {Steel, Graham}, title = {Formal Analysis of Security~{API}s}, booktitle = {Encyclopedia of Cryptography and Security}, edition = {2nd}, editor = {van Tilborg, Henk C. A. and Jajodia, Sushil}, year = {2011}, pages = {492-494}, publisher = {Springer}, doi = {10.1007/978-1-4419-5906-5_873} }
@article{BJ-jal11, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Sufficient completeness verification for conditional and constrained~{TRS}}, year = {2012}, month = mar, volume = {10}, number = {1}, pages = {127-143}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BJ-jal11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BJ-jal11.pdf}, doi = {10.1016/j.jal.2011.09.001}, abstract = {We present a procedure for checking sufficient completeness of conditional and constrained term rewriting systems containing axioms for constructors which may be constrained (by e.g. equalities, disequalities, ordering, membership,~...). Such axioms allow to specify complex data structures like e.g. sets, sorted lists or powerlists. Our approach is integrated into a framework for inductive theorem proving based on tree grammars with constraints, a formalism which permits an exact representation of languages of ground constructor terms in normal form.\par The procedure is presented by an inference system which is shown sound and complete. A~precondition of one inference of this system refers to a (undecidable) property called strong ground reducibility which is discharged to the above inductive theorem proving system. We have successfully applied our method to several examples, yielding readable proofs and, in case of negative answer, a counter-example suggesting how to complete the specification. Moreover, we show that it is a decision procedure when the TRS is unconditional but constrained, for an expressive class of constrained constructor axioms.} }
@inproceedings{JKS-frocos11, address = {Saarbr{\"u}cken, Germany}, month = oct, year = 2011, volume = 6989, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Tinelli, Cesare and Sofronie-Stokkermans, Viorica}, acronym = {{FroCoS}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {S}ymposium on {F}rontiers of {C}ombining {S}ystems ({FroCoS}'11)}, author = {Jacquemard, Florent and Kojima, Yoshiharu and Sakai, Masahiko}, title = {Controlled Term Rewriting}, pages = {179-194}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-frocos11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-frocos11.pdf}, doi = {}, abstract = {Motivated by the problem of verification of imperative tree transformation programs, we study the combination, called controlled term rewriting systems~(CTRS), of term rewriting rules with constraints selecting the possible rewrite positions. These constraints are specified, for each rewrite rule, by a selection automaton which defines a set of positions in a term based on tree automata computations.\par We show that reachability is PSPACE-complete for so-called monotonic CTRS, such that the size of every left-hand-side of every rewrite rule is larger or equal to the size of the corresponding right-hand-side, and also for the class of context-free non-collapsing CTRS, which transform CF tree language into CF tree languages.\par When allowing size-reducing rules, reachability becomes undecidable, even for flat CTRS (both sides of rewrite rules are of depth at most one) when restricting to words (i.e. function symbols have arity at most one), and for ground CTRS (rewrite rules have no variables).\par We also consider a restricted version of the control such that a position is selected if the sequence of symbols on the path from that position to the root of the tree belongs to a given regular language. This restriction enables decision results in the above cases.} }
@phdthesis{jacquemard-HDR11, author = {Jacquemard, Florent}, title = {Extended Tree Automata for the Verification of Infinite State Systems}, year = 2011, month = nov, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-fj11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-fj11.pdf} }
@article{CSV-lmcs11, journal = {Logical Methods in Computer Science}, author = {Chadha, Rohit and Sistla, A. Prasad and Viswanathan, Mahesh}, title = {Power of Randomization in Automata on Infinite Strings}, year = {2011}, month = sep, volume = {7}, number = {3:22}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CSV-lmcs11.pdf}, doi = {10.2168/LMCS-7(3:22)2011}, abstract = {Probabilistic B{\"u}chi Automata~(PBA) are randomized, finite state automata that process input strings of infinite length. Based on the threshold chosen for the acceptance probability, different classes of languages can be defined. In this paper, we present a number of results that clarify the power of such machines and properties of the languages they define. The broad themes we focus on are as follows. We present results on the decidability and precise complexity of the emptiness, universality and language containment problems for such machines, thus answering questions central to the use of these models in formal verification. Next, we characterize the languages recognized by PBAs topologically, demonstrating that though general PBAs can recognize languages that are not regular, topologically the languages are as simple as \(\omega\)-regular languages. Finally, we introduce Hierarchical PBAs, which are syntactically restricted forms of PBAs that are tractable and capture exactly the class of \(\omega\)-regular languages.} }
@inproceedings{FRS-infinity11, address = {Taipei, Taiwan}, month = oct, year = 2011, volume = 73, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Chen, Yu-Fang and Wang, Chao}, acronym = {{INFINITY}'11}, booktitle = {{P}roceedings of the 13th {I}nternational {W}orkshops on {V}erification of {I}nfinite {S}tate {S}ystems ({INFINITY}'11)}, author = {Fribourg, Laurent and Revol, Bertrand and Soulat, Romain}, title = {Synthesis of Switching Rules for Ensuring Reachability Properties of Sampled Linear Systems}, pages = {35-48}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FRS-infinity11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FRS-infinity11.pdf}, doi = {10.4204/EPTCS.73.6}, abstract = {We consider here systems with piecewise linear dynamics that are periodically sampled with a given period~\(\tau\). At each sampling time, the mode of the system, i.e., the parameters of the linear dynamics, can be switched, according to a switching rule. Such systems can be modelled as a special form of hybrid automata, called {"}switched systems{"}, that are automata with an \emph{infinite} real state space. The problem is to find a switching rule that guarantees the system to still be in a given area~\(V\) at the next sampling time, and so on indefinitely. In this paper, we will consider two approaches: the~\emph{indirect} one that abstracts the system under the form of a finite discrete event system, and the \emph{direct} one that works on the continuous state space.\par Our methods rely on previous works, but we specialize them to a simplified context (linearity, periodic switching instants, absence of control input), which is motivated by the features of a focused case study: a~DC-DC boost converter built by electronics laboratory SATIE (ENS~Cachan). Our enhanced methods allow us to treat successfully this real-life example.} }
@mastersthesis{kumardhar-master, author = {Kumar Dhar, Amit}, title = {Counter Systems with {P}resburger-definable Reachability Sets: Decidability and Complexity}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2011}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/akd11-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/akd11-m2.pdf} }
@inproceedings{BD-frocos11, address = {Saarbr{\"u}cken, Germany}, month = oct, year = 2011, volume = 6989, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Tinelli, Cesare and Sofronie-Stokkermans, Viorica}, acronym = {{FroCoS}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {S}ymposium on {F}rontiers of {C}ombining {S}ystems ({FroCoS}'11)}, author = {Bersani, Marcello and Demri, St{\'e}phane}, title = {The complexity of reversal-bounded model-checking}, pages = {71-86}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BD-frocos11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BD-frocos11.pdf}, doi = {10.1007/978-3-642-24364-6_6}, abstract = {We study model-checking problems on counter systems when guards are quantifier-free Presburger formulae, the specification languages are LTL-like dialects with arithmetical constraints and the runs are restricted to reversal-bounded ones. We introduce a generalization of reversal-boundedness and we show the NExpTime-completeness of the reversal-bounded model-checking problem as well as for related reversalbounded reachability problems. As a by-product, we show the effective Presburger definability for sets of configurations for which there is a reversal-bounded run verifying a given temporal formula. Our results generalize existing results about reversal-bounded counter automata and provides a uniform and more general framework.} }
@phdthesis{chambart-phd2011, author = {Chambart, Pierre}, title = {Du Probl{\`e}me de sous-mot de {P}ost et de la complexit{\'e} des canaux non fiables}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/chambart-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/chambart-these11.pdf} }
@phdthesis{galland-phd2011, author = {Galland, Alban}, title = {Distributed Data Management with Access Control}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/galland-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/galland-these11.pdf} }
@book{webdam2011, author = {Abiteboul, Serge and Manolescu, Ioana and Rigaux, {\relax Ph}ilippe and Rousset, Marie-{\relax Ch}ristine and Senellart, Pierre}, title = {Web Data Management}, year = 2011, publisher = {Cambridge University Press}, url = {http://webdam.inria.fr/Jorge/} }
@article{UW-lmcs11, journal = {Logical Methods in Computer Science}, author = {Ummels, Michael and Wojtczak, Dominik}, title = {The Complexity of {N}ash Equilibria in Stochastic Multiplayer Games}, year = {2011}, month = sep, volume = {7}, number = {3:20}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-lmcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-lmcs11.pdf}, doi = {10.2168/LMCS-7(3:20)2011}, abstract = {We analyse the computational complexity of finding Nash equilibria in turn-based stochastic multiplayer games with omega-regular objectives. We show that restricting the search space to equilibria whose payoffs fall into a certain interval may lead to undecidability. In particular, we prove that the following problem is undecidable: Given a game~\(G\), does there exist a Nash equilibrium of~\(G\) where Player~\(0\) wins with probability~\(1\)? Moreover, this problem remains undecidable when restricted to pure strategies or (pure) strategies with finite memory. One way to obtain a decidable variant of the problem is to restrict the strategies to be positional or stationary. For the complexity of these two problems, we obtain a common lower bound of NP and upper bounds of NP and PSPACE respectively. Finally, we single out a special case of the general problem that, in many cases, admits an efficient solution. In particular, we prove that deciding the existence of an equilibrium in which each player either wins or loses with probability~\(1\) can be done in polynomial time for games where the objective of each player is given by a parity condition with a bounded number of priorities.} }
@techreport{lsv-11-20, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz and Le{\ss}enich, Simon}, title = {Imperfect Recall and Counter Games}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = oct, type = {Research Report}, number = {LSV-11-20}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-20.pdf}, note = {21~pages}, abstract = {We study a class of omega-regular games with imperfect information and imperfect recall, and present a solution method which relies on the MSO-compatibility of graph unfoldings. Furthermore, we show a reduction from a large class of counter parity games to such games with imperfect recall. By combining the two results, we obtain the first elementary algorithm for solving counter parity games, which provides substantially improved complexity bounds for several problems in computational logic.} }
@phdthesis{dacosta-phd2011, author = {Da{~}Costa, Arnaud}, title = {Propri{\'e}t{\'e}s de jeux multi-agents}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/dacosta-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/dacosta-these11.pdf} }
@mastersthesis{pasaila-master, author = {Pasail{\u{a}}, Daniel}, title = {Verifying equivalence properties of security protocols}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2011}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/dp11-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/dp11-m2.pdf} }
@mastersthesis{degriek-master, author = {Degrieck, Jan}, title = {R{\'e}duction de graphes pour l'analyse de protocoles de routage s{\'e}curis{\'e}s}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2011}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/jd11-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/jd11-m2.pdf} }
@inproceedings{CFM-ncma11, address = {Milano, Italy}, month = jul, year = 2011, volume = 282, series = {books@ocg.at}, publisher = {Austrian Computer Society}, editor = {Freund, Rudolf and Holzer, Markus and Mereghetti, Carlo and Otto, Friedrich and Palano, Beatrice}, acronym = {{NCMA}'11}, booktitle = {{P}roceedings of the 3rd {W}orkshop on {N}on-{C}lassical {M}odels of {A}utomata and {A}pplications ({NCMA}'11)}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {On the Expressiveness of {P}arikh Automata and Related Models}, pages = {103-119}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ncma11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ncma11.pdf}, doi = {} }
@inproceedings{CFM-words11, address = {Prague, Czech Republic}, month = sep, year = 2011, volume = {63}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Ambro{\v{z}}, Petr and Holub, {\v{S}}t{\v{e}}p{\'a}n and Mas{\'a}kov{\'a}, Zuzana}, acronym = {{WORDS}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference {WORDS} ({WORDS}'11)}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Bounded {P}arikh Automata}, pages = {93-102}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-words11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-words11.pdf}, doi = {10.4204/EPTCS.63.13} }
@inproceedings{SR-dcfs11, address = {Limburg, Germany}, month = jul, year = 2011, volume = {6808}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Holzer, Markus and Kutrib, Martin and Pighizzini, Giovanni}, acronym = {{DCFS}'11}, booktitle = {{P}roceedings of the 13th {I}nternational {W}orkshop on {D}escriptional {C}omplexity of {F}ormal {S}ystems ({DCFS}'11)}, author = {Schwoon, Stefan and Rodr{\'\i}guez, C{\'e}sar}, title = {Construction and {SAT}-based verification of Contextual Unfoldings}, pages = {34-42}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SR-dcfs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SR-dcfs11.pdf}, doi = {10.1007/978-3-642-22600-7_3}, nonote = {Invited paper}, abstract = {Unfoldings succinctly represent the set of reachable markings of a Petri net. Here, we shall consider the case of contextual nets, which extend Petri nets with read arcs, and which are more suitable to represent the case of concurrent read access. We discuss the problem of (efficiently) constructing unfoldings of such nets. On the basis of these unfoldings, various verification problems can be encoded as satisfiability problems in propositional logic.} }
@inproceedings{HKS-gandalf11, address = {Minori, Italy}, month = jun, year = 2011, volume = 54, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {D'Agostino, Giovanna and La{~}Torre, Salvatore}, acronym = {{GandALF}'11}, booktitle = {{P}roceedings of the 2nd {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'11)}, author = {Haar, Stefan and Kern, Christian and Schwoon, Stefan}, title = {Computing the Reveals Relation in Occurrence Nets}, pages = {31-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HKS-gandalf11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HKS-gandalf11.pdf}, doi = {10.4204/EPTCS.54.3}, abstract = {Petri net unfoldings are a useful tool to tackle state-space explosion in verification and related tasks. Moreover, their structure allows to access directly the relations of causal precedence, concurrency, and conflict between events. Here, we explore the data structure further, to determine the following relation: event~\(a\) is said to reveal event~\(b\) iff the occurrence of~\(a\) implies that~\(b\) inevitably occurs, too, be it before, after, or concurrently with~\(a\). Knowledge of reveals facilitates in particular the analysis of partially observable systems, in the context of diagnosis, testing, or verification; it can also be used to generate more concise representations of behaviours via abstractions. The reveals relation was previously introduced in the context of fault diagnosis, where it was shown that the reveals relation was decidable: for a given pair~\(a,b\) in the unfolding~\(U\) of a safe Petri net~\(N\), a finite prefix~\(P\) of~\(U\) is sufficient to decide whether or not \(a\) reveals~\(b\). In this paper, we first considerably improve the bound on~\(|P|\). We then show that there exists an efficient algorithm for computing the relation on a given prefix. We have implemented the algorithm and report on experiments.} }
@inproceedings{bbcks-icgt10, address = {Enschede, The Netherlands}, month = sep # {-} # oct, year = 2010, volume = 6372, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ehrig, Hartmut and Rensink, Arend and Rozenberg, Grzegorz and Sch{\"u}rr, Andy}, acronym = {{ICGT}'10}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {G}raph {T}ransformations ({ICGT}'10)}, author = {Baldan, Paolo and Bruni, Alessandro and Corradini, Andrea and K{\"o}nig, Barbara and Schwoon, Stefan}, title = {On the Computation of {M}c{M}illan's Prefix for Contextual Nets and Graph Grammars}, pages = {91-106}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bbcks-icgt10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bbcks-icgt10.pdf}, doi = {10.1007/978-3-642-15928-2_7}, abstract = {In recent years, a research thread focused on the use of the unfolding semantics for verification purposes. This started with a paper by McMillan, which devises an algorithm for constructing a finite complete prefix of the unfolding of a safe Petri net, providing a compact representation of the reachability graph. The extension to contextual nets and graph transformation systems is far from being trivial because events can have multiple causal histories. Recently, we proposed an abstract algorithm that generalizes McMillan's construction to bounded contextual nets without resorting to an encoding into plain P\slash T nets. Here, we provide a more explicit construction that renders the algorithm effective. To allow for an inductive definition of concurrency, missing in the original proposal and essential for an efficient unfolding procedure, the key intuition is to associate histories not only with events, but also with places. Additionally, we outline how the proposed algorithm can be extended to graph transformation systems, for which previous algorithms based on the encoding of read arcs would not be applicable.} }
@inproceedings{CDS-fct11, address = {Oslo, Norway}, month = aug, year = 2011, volume = 6914, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Owe, Olaf and Steffen, Martin and Telle, Jan Arne}, acronym = {{FCT}'11}, booktitle = {{P}roceedings of the 18th {I}nternational {S}ymposium on {F}undamentals of {C}omputation {T}heory ({FCT}'11)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Singh, Rohit}, title = {On Memoryless Quantitative Objectives}, pages = {148-159}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDS-fct11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDS-fct11.pdf}, doi = {10.1007/978-3-642-22953-4_13}, abstract = {In two-player games on graph, the players construct an infinite path through the game graph and get a reward computed by a payoff function over infinite paths. Over weighted graphs, the typical and most studied payoff functions compute the limit-average or the discounted sum of the rewards along the path. Besides their simple definition, these two payoff functions enjoy the property that memoryless optimal strategies always exist.\par In an attempt to construct other simple payoff functions, we define a class of payoff functions which compute an (infinite) weighted average of the rewards. This new class contains both the limit-average and the discounted sum functions, and we show that they are the only members of this class which induce memoryless optimal strategies, showing that there is essentially no other simple payoff functions.} }
@inproceedings{DDMM-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Darondeau, {\relax Ph}ilippe and Demri, St{\'e}phane and Meyer, Roland and Morvan, {\relax Ch}ristophe}, title = {{P}etri Net Reachability Graphs: Decidability Status of {FO} Properties}, pages = {140-151}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.140}, abstract = {We investigate the decidability and complexity status of model-checking problems on unlabelled reachability graphs of Petri nets by considering first-order, modal and pattern-based languages without labels on transitions or atomic propositions on markings. We consider several parameters to separate decidable problems from undecidable ones. Not only are we able to provide precise borders and a systematic analysis, but we also demonstrate the robustness of our proof techniques.} }
@inproceedings{SBM-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Sankur, Ocan and Bouyer, Patricia and Markey, Nicolas}, title = {Shrinking Timed Automata}, pages = {90-102}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.90}, abstract = {We define and study a new approach to the implementability of timed automata, where the semantics is perturbed by imprecisions and finite frequency of the hardware. In order to circumvent these effects, we introduce \emph{parametric shrinking} of clock constraints, which corresponds to tightening the guards. We propose symbolic procedures to decide the existence of (and then compute) parameters under which the shrunk version of a given timed automaton is non-blocking and can time-abstract simulate the exact semantics. We then define an implementation semantics for timed automata with a digital clock and positive reaction times, and show that for shrinkable timed automata both properties are preserved in implementation.} }
@inproceedings{CDK-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Chevalier, C{\'e}line and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Transforming Password Protocols to Compose}, pages = {204-216}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.204}, abstract = {Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover flaws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment.\par In this paper, we study whether password protocols can be safely composed, even when a same password is reused. More precisely, we present a transformation which maps a password protocol that is secure for a single protocol session (a~decidable problem) to a protocol that is secure for an unbounded number of sessions. Our result provides an effective strategy to design secure password protocols: (i)~design a protocol intended to be secure for one protocol session; (ii)~apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. Our technique also applies to compose different password protocols allowing us to obtain both inter-protocol and inter-session composition.} }
@inproceedings{BBMU-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas and Ummels, Michael}, title = {{N}ash Equilibria in Concurrent Games with {B}{\"u}chi Objectives}, pages = {375-386}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.375}, abstract = {We study the problem of the existence (and computation) of Nash equilibria in multi-player concurrent games with B{\"u}chi-definable objectives. First, when the objectives are B{\"u}chi conditions on the game, we prove that the existence problem can be solved in polynomial time. In a second part, we extend our technique to objectives defined by deterministic B{\"u}chi automata, and prove that the problem then becomes EXPTIME-complete. We prove PSPACE-completeness for the case where the B{\"u}chi automata are 1-weak.} }
@inproceedings{BLP-fsttcs11, address = {Mumbai, India}, month = dec, year = 2011, volume = 13, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chakraborty, Supratik and Kumar, Amit}, acronym = {{FSTTCS}'11}, booktitle = {{P}roceedings of the 31st {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'11)}, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz and Puchala, Bernd}, title = {Perfect-Information Construction for Coordination in Games}, pages = {387-398}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLP-fsttcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLP-fsttcs11.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2011.387}, abstract = {We present a general construction for eliminating imperfect information from games with several players who coordinate against nature, and to transform them into two-player games with perfect information while preserving winning strategy profiles. The construction yields an infinite game tree with epistemic models associated to nodes. To obtain a more succinct representation, we define an abstraction based on homomorphic equivalence, which we prove to be sound for games with observable winning conditions. The abstraction generates finite game graphs in several relevant cases, and leads to a new semi-decision procedure for multi-player games with imperfect information.} }
@incollection{FLS-fosad11, noaddress = {}, month = sep, year = 2011, volume = 6858, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aldini, Alessandro and Gorrieri, Roberto}, acronym = {{FOSAD}'{VI}}, booktitle = {{F}oundations of {S}ecurity {A}nalysis and {D}esign~-- {FOSAD} {T}utorial {L}ectures ({FOSAD}'{VI})}, author = {Focardi, Riccardo and Luccio, Flaminia L. and Steel, Graham}, title = {An Introduction to Security {API} Analysis}, pages = {35-65}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FLS-fosad11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FLS-fosad11.pdf}, doi = {10.1007/978-3-642-23082-0_2}, abstract = {A~security API is an Application Program Interface that allows untrusted code to access sensitive resources in a secure way. Examples of security APIs include the interface between the tamper-resistant chip on a smartcard (trusted) and the card reader (untrusted), the~interface between a~cryptographic Hardware Security Module, or~HSM (trusted) and the client machine (untrusted), and the Google maps API (an~interface between a server, trusted by Google, and the rest of the Internet).} }
@inproceedings{CCD-ccs11, address = {Chicago, Illinois, USA}, month = oct, year = 2011, publisher = {ACM Press}, editor = {Chen, Yan and Danezis, George and Shmatikov, Vitaly}, acronym = {{CCS}'11}, booktitle = {{P}roceedings of the 18th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'11)}, author = {Cheval, Vincent and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Trace Equivalence Decision: Negative Tests and Non-determinism}, pages = {321-330}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf}, doi = {10.1145/2046707.2046744}, abstract = {We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.\par In this paper, we give a calculus that is close to the applied pi calculus and that allows one to capture most existing protocols that rely on classical cryptographic primitives. First, we propose a symbolic semantics for our calculus relying on constraint systems to represent infinite sets of possible traces, and we reduce the decidability of trace equivalence to deciding a notion of symbolic equivalence between sets of constraint systems. Second, we develop an algorithm allowing us to decide whether two sets of constraint systems are in symbolic equivalence or not. Altogether, this yields the first decidability result of trace equivalence for a general class of processes that may involve else branches and\slash or private channels (for a bounded number of sessions).} }
@incollection{haddad-DS11b, author = {Haddad, Serge}, title = {Introduction to Verification}, booktitle = {Models and Analysis in Distributed Systems}, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, publisher = {John Wiley \& Sons, Ltd.}, chapter = 6, pages = {137-154}, year = 2011 }
@incollection{DP-DS11b, author = {Demri, St{\'e}phane and Poitrenaud, Denis}, title = {Verification of Infinite-State Systems}, booktitle = {Models and Analysis in Distributed Systems}, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, publisher = {John Wiley \& Sons, Ltd.}, chapter = 8, pages = {221-269}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DP-DS11b.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DP-DS11b.pdf} }
@book{HKPP-DS11a, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, title = {Distributed Systems Design and Algorithms}, publisher = {John Wiley \& Sons, Ltd.}, year = {2011}, url = {http://www.iste.co.uk/index.php?f=a&ACTION=View&id=415} }
@book{HKPP-DS11b, editor = {Haddad, Serge and Kordon, Fabrice and Pautet, Laurent and Petrucci, Laure}, title = {Models and Analysis in Distributed Systems}, publisher = {John Wiley \& Sons, Ltd.}, year = {2011}, url = {http://www.iste.co.uk/index.php?f=a&ACTION=View&id=416} }
@inproceedings{ECGJ-msr11, address = {Lille, France}, month = nov, year = 2011, number = {1-3}, volume = {45}, series = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {Herm{\`e}s}, editor = {Craye, {\'E}tienne and Gamati{\'e}, Abdoulaye}, acronym = {{MSR}'11}, booktitle = {{A}ctes du 8{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'11)}, author = {Echeveste, Jod{\'e} and Cont, Arshia and Giavitto, Jean-Louis and Jacquemard, Florent}, title = {Formalisation des relations temporelles entre une partition et une performance musicale dans un contexte d'accompagnement automatique}, pages = {109-124}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ECGJ-msr11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ECGJ-msr11.pdf}, doi = {10.3166/jesa.45.109-124}, abstract = {We sketch the real-time features required by automatic musical accompaniment seen as a reactive system. We formalize the datation of musical event taking into account the various temporal scales used in music. Various strategies for the handling of synchronization constraints and the handling of errors are presented.} }
@inproceedings{BHP-msr11, address = {Lille, France}, month = nov, year = 2011, number = {1-3}, volume = {45}, series = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {Herm{\`e}s}, editor = {Craye, {\'E}tienne and Gamati{\'e}, Abdoulaye}, acronym = {{MSR}'11}, booktitle = {{A}ctes du 8{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'11)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {{\'E}chantillonnage pr{\'e}f{\'e}rentiel pour le model checking statistique}, pages = {237-252}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-msr11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-msr11.pdf}, doi = {10.3166/jesa.45.237-252}, abstract = {The statistical model checking can be usefully substituted for numerical model checking when the models to be studied are huge. However the statistical approach cannot evaluate too small probabilities. In order to solve the problem, we develop here a new approach based on importance sampling. While most of the techniques related to importance sampling are based on heuristics, we establish theoretical results under some hypotheses. These results ensure a reduction of the variance during application of importance sampling. We also characterize situations that fulfill the hypotheses and we extend our approach for handling other situations but then without theoretical guarantee. We have implemented this approach with the tool \textsc{Cosmos} after some extensions. At~last we have evaluated this approach for two examples and analysed the experimentations.} }
@inproceedings{BMS-formats11, address = {Aalborg, Denmark}, month = sep, year = 2011, volume = 6919, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Fahrenberg, Uli and Tripakis, Stavros}, acronym = {{FORMATS}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'11)}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robust Model-Checking of Timed Automata via Pumping in Channel Machines}, pages = {97-112}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-formats11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-formats11.pdf}, doi = {10.1007/978-3-642-24310-3_8}, abstract = {Timed automata are governed by a mathematical semantics which assumes perfectly continuous and precise clocks. This requirement is not satised by digital hardware on which the models are implemented. In~fact, it~was shown that the presence of imprecisions, however small they may be, may yield extra behaviours. Therefore correctness proven on the formal model does not imply correctness of the real system.\par The problem of robust model-checking was then dened to circumvent this inconsistency. It consists in computing a bound on the imprecision under which the system will be correct.\par In this work, we show that robust model-checking against \(\omega\)-regular properties for timed automata can be reduced to standard model-checking of timed automata, by computing an adequate bound on the imprecision. This yields a new algorithm for robust model-checking of \(\omega\)-regular properties, which is both optimal and valid for general timed automata.} }
@inproceedings{bonnet-RP11, address = {Genova, Italy}, month = sep, year = 2011, volume = {6945}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Delzanno, Giorgio and Potapov, Igor}, acronym = {{RP}'11}, booktitle = {{P}roceedings of the 5th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'11)}, author = {Bonnet, R{\'e}mi}, title = {Decidability of {LTL} Model Checking for Vector Addition Systems with one Zero-test}, pages = {85-95}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-RP11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-RP11.pdf}, doi = {10.1007/978-3-642-24288-5_9}, abstract = {We consider the class of Vector Addition Systems with one zero-test and we show that the model-checking problem for LTL is decidable thanks to a reduction to the computability of the cover and the decidability of reachability. Our proof uses the notion of increasing loop, that we refine to fit the non-standard monotony of our system.} }
@inproceedings{FK-RP11, address = {Genova, Italy}, month = sep, year = 2011, volume = {6945}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Delzanno, Giorgio and Potapov, Igor}, acronym = {{RP}'11}, booktitle = {{P}roceedings of the 5th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'11)}, author = {Fribourg, Laurent and K{\"u}hne, Ulrich}, title = {Parametric Verification and Test Coverage for Hybrid Automata Using the Inverse Method}, pages = {191-204}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FK-RP11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FK-RP11.pdf}, doi = {10.1007/978-3-642-24288-5_17}, abstract = {Hybrid systems combine continuous and discrete behavior. Hybrid Automata are a powerful formalism for the modeling and verification of such systems. A~common problem in hybrid system verification is the good parameters problem, which consists in identifying a set of parameter valuations which guarantee a certain behavior of a system. Recently, a method has been presented for attacking this problem for Timed Automata. In this paper, we show the extension of this methodology for hybrid automata with linear and affine dynamics. The method is demonstrated with a hybrid system benchmark from the literature.} }
@inproceedings{AS-RP11, address = {Genova, Italy}, month = sep, year = 2011, volume = {6945}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Delzanno, Giorgio and Potapov, Igor}, acronym = {{RP}'11}, booktitle = {{P}roceedings of the 5th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'11)}, author = {Andr{\'e}, {\'E}tienne and Soulat, Romain}, title = {Synthesis of Timing Parameters Satisfying Safety Properties}, pages = {31-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AS-RP11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AS-RP11.pdf}, doi = {10.1007/978-3-642-24288-5_5}, abstract = {Safety properties are crucial when verifying real-time concurrent systems. When reasoning parametrically, i.e., with unknown constants, it is of high interest to infer a set of parameter valuations consistent with such safety properties. We present here algorithms based on the inverse method for parametric timed automata: given a reference parameter valuation, it infers a constraint such that, for any valuation satisfying this constraint, the discrete behavior of the system is the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions. These algorithms do not guarantee the equality of the trace sets, but are significantly quicker, synthesize larger sets of parameter valuations than the original method, and still preserve various properties including safety (i.e., non-reachability) properties. Those algorithms have been implemented in Imitator~II and applied to various examples of asynchronous circuits and communication protocols. } }
@techreport{lsv-11-18, author = {Florentin, {\'E}ric and Fribourg, Laurent and K{\"u}hne, Ulrich and Lefebvre, St{\'e}phane and Rey, {\relax Ch}ristian}, title = {{COUPLET}: Coupled Electrothermal Simulation}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = jun, type = {Research Report}, number = {LSV-11-18}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-18.pdf}, note = {32~pages}, abstract = {The~aim of the project COUPLET (supported by Institut Farman) is to study the electrothermal effects of the degradation of the metallisation layer of power semiconductor dies. In this first technical report of the project, we describe our work of modeling and simulation of the behavior of a power transistor. The die is represented by four elementary transistors driven by a distributed gate signal. A~simplified electrical model is used to simulate the transistor behavior at turn-off. The thermal model is realized by finite elements methods and allows to estimate the maximum temperature on each elementary transistor. By~coupling the thermal model with the electric simulation, it is possible to take into account silicon and metallisation heating in the electrical model.} }
@inproceedings{SC-unif11, address = {Wroc{\l}aw, Poland}, month = jul, year = 2011, editor = {Baader, Franz}, acronym = {{UNIF}'11}, booktitle = {{P}roceedings of the 25th {I}nternational {W}orkshop on {U}nification ({UNIF}'11)}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan}, title = {Computing finite variants for subterm convergent rewrite systems}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SC-unif11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SC-unif11.pdf}, abstract = {Driven by an application in the verification of security protocols, we introduce the strong finite variant property, an extention of the finite variant property, and we show that subterm convergent rewrite systems enjoy the strong finite variant property modulo the empty equational theory.\par We argue that the strong finite variant property is more natural and more useful in practice than the finite variant property. We also compare the two properties and we provide a prototype implementation of an algorithm that computes a finite strongly complete set of variants for any term t with respect to a subterm convergent rewrite system.} }
@inproceedings{BMOU-atva11, address = {Taipei, Taiwan}, month = oct, year = {2011}, volume = 6996, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bultan, Tevfik and Hsiung, Pao-Ann}, acronym = {{ATVA}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'11)}, author = {Bouyer, Patricia and Markey, Nicolas and Olschewski, J{\"o}rg and Ummels, Michael}, title = {Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited}, pages = {135-149}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOU-atva11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOU-atva11.pdf}, doi = {10.1007/978-3-642-24372-1_11}, abstract = {We study nondeterministic strategies in parity games with the aim of computing a most permissive winning strategy. Following earlier work, we measure permissiveness in terms of the average number{\slash}weight of transitions blocked by a strategy. Using a translation into mean-payoff parity games, we prove that deciding (the permissiveness~of) a~most permissive winning strategy is in \(\textsf{NP}\cap\textsf{coNP}\). Along the way, we~provide a new study of mean-payoff parity games. In particular, we give a new algorithm for solving these games, which beats all previously known algorithms for this problem.} }
@inproceedings{CKVAK-qest11, address = {Aachen, Germany}, month = sep, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'11)}, author = {Chadha, Rohit and Korthikranthi, Vijay and Viswanathan, Mahesh and Agha, Gul and Kwon, Youngmin}, title = {Model Checking {MDP}s with a Unique Compact Invariant Set of Distributions}, pages = {121-130}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CKVAK-qest11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CKVAK-qest11.pdf}, doi = {10.1109/QEST.2011.22}, abstract = {The semantics of Markov Decision Processes (MDPs), when viewed as transformers of probability distributions, can described as a labeled transition system over the probability distributions over the states of the MDP. The MDP can be seen as defining a set of executions, where each execution is a sequence of probability distributions. Reasoning about sequences of distributions allows one to express properties not expressible in logics like PCTL; examples include expressing bounds on transient rewards and expected values of random variables, as well as comparing the probability of being in one set of states at a given time with another set of states. With respect to such a semantics, the problem of checking that the MDP never reaches a bad distribution is undecidable. In this paper, we identify a special class of MDPs called \emph{semi-regular} MDPs that have a unique non-empty, compact, invariant set of distributions, for which we show that checking any \(\omega\)-regular property is decidable. Our decidability result also implies that for semi-regular probabilistic finite automata with isolated cut-points, the emptiness problem is decidable.} }
@inproceedings{CD-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Energy and Mean-Payoff Parity {M}arkov Decision Processes}, pages = {206-218}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_21}, abstract = {We consider Markov Decision Processes (MDPs) with mean-payoff parity and energy parity objectives. In system design, the parity objective is used to encode \(\omega\)-regular specifications, while the mean-payoff and energy objectives can be used to model quantitative resource constraints. The energy condition requires that the resource level never drops below~\(0\), and the mean-payoff condition requires that the limit-average value of the resource consumption is within a threshold. While these two (energy and mean-payoff) classical conditions are equivalent for two-player games, we~show that they differ for MDPs. We show that the problem of deciding whether a state is almost-sure winning (i.e., winning with probability~\(1\)) in energy parity MDPs is in \(\textsf{NP}\cap\textsf{coNP}\), while for mean-payoff parity MDPs, the problem is solvable in polynomial time.} }
@inproceedings{DMS-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa}, title = {Infinite Synchronizing Words for Probabilistic Automata}, pages = {278-289}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_27}, abstract = {Probabilistic automata are finite-state automata where the transitions are chosen according to fixed probability distributions. We consider a semantics where on an input word the automaton produces a sequence of probability distributions over states. An~infinite word is accepted if the produced sequence is synchronizing, i.e. the sequence of the highest probability in the distributions tends to~\(1\). We show that this semantics generalizes the classical notion of synchronizing words for deterministic automata. We consider the emptiness problem, which asks whether some word is accepted by a given probabilistic automaton, and the universality problem, which asks whether all words are accepted. We provide reductions to establish the PSPACE-completeness of the two problems.} }
@inproceedings{BCGZ-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Bollig, Benedikt and Cyriac, Aiswarya and Gastin, Paul and Zeitoun, Marc}, title = {Temporal Logics for Concurrent Recursive Programs: Satisfiability and Model Checking}, pages = {132-144}, url = {http://hal.archives-ouvertes.fr/hal-00591139/en/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGZ-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_15}, abstract = {We develop a general framework for the design of temporal logics for concurrent recursive programs. A program execution is modeled as a partial order with multiple nesting relations. To specify properties of executions, we consider any temporal logic whose modalities are definable in monadic second-order logic and that, in addition, allows PDL-like path expressions. This captures, in a unifying framework, a wide range of logics defined for trees, nested words, and Mazurkiewicz traces that have been studied separately. We show that satisfiability and model checking are decidable in EXPTIME and 2EXPTIME, depending on the precise path modalities.} }
@inproceedings{Schmitz-fsmnlp11, address = {Blois, France}, month = jul, year = 2011, publisher = {ACL Press}, editor = {Maletti, Andreas}, acronym = {{FSMNLP}'11}, booktitle = {{P}roceedings of the 9th {I}nternational {W}orkshop on {F}inite-{S}tate {M}ethods and {N}atural {L}anguage {P}rocessing ({FSMNLP}'11)}, author = {Sylvain Schmitz}, title = {A~Note on Sequential Rule-Based {POS} Tagging}, pages = {83-87}, url = {http://hal.archives-ouvertes.fr/hal-00600260/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-fsmnlp11.pdf}, abstract = {Brill's part-of-speech tagger is defined through a cascade of leftmost rewrite rules. We revisit the compilation of such rules into a single sequential transducer given by Roche and Schabes (\textit{Comput. Ling.}~1995) and provide a direct construction of the minimal sequential transducer for each individual rule.} }
@inproceedings{BS-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Blockelet, Michel and Schmitz, Sylvain}, title = {Model-Checking Coverability Graphs of Vector Addition Systems}, pages = {108-119}, url = {http://hal.archives-ouvertes.fr/hal-00600077/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_13}, abstract = {A large number of properties of a vector addition system---for instance coverability, boundedness, or regularity---can be decided using its coverability graph, by looking for some characteristic pattern. We propose to unify the known exponential-space upper bounds on the complexity of such problems on vector addition systems, by seeing them as instances of the model-checking problem for a suitable extension of computation tree logic, which allows to check for the existence of these patterns. This provides new insights into what constitutes a {"}coverability-like{"} property.} }
@inproceedings{Sankur-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Sankur, Ocan}, title = {Untimed Language Preservation in Timed Systems}, pages = {556-567}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-mfcs11.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-mfcs11-erratum.pdf}, doi = {10.1007/978-3-642-22993-0_50}, abstract = {Timed automata are a model that is extensively used in formal verification of real-time systems. However, their mathematical semantics is an idealization which assumes perfectly precise clocks, but does not correspond to real hardware. In fact, it is known that imprecisions, however small they may be, may yield extra behaviours. Several works concentrated on a relaxation of the semantics of timed automata to model the imprecisions of the clocks. Algorithms were given, first for safety, then for richer linear-time properties, to decide the robustness of timed systems, that is, the existence of a bound on the imprecisions under which the system satisfies a given property. In this work, we study a stronger notion of robustness: we show how to decide whether the untimed language of a timed automaton is preserved under small enough imprecisions, and provide a bound on the imprecision parameter.} }
@inproceedings{Bonnet-mfcs11, address = {Warsaw, Poland}, month = aug, year = 2011, volume = 6907, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Murlak, Filip and Sankowski, Piotr}, acronym = {{MFCS}'11}, booktitle = {{P}roceedings of the 36th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'11)}, author = {Bonnet, R{\'e}mi}, title = {The reachability problem for Vector Addition Systems with one zero-test}, pages = {145-157}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RB-mfcs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RB-mfcs11.pdf}, doi = {10.1007/978-3-642-22993-0_16}, abstract = {We consider here a variation of Vector Addition Systems where one counter can be tested for zero. We extend the reachability proof for Vector Addition System recently published by Leroux to this model. This provides an alternate, more conceptual proof of the reachability problem that was originally proved by Reinhardt.} }
@inproceedings{NM-sies11, address = {V{\"a}ster{\aa}s, Sweden}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{SIES}'11}, booktitle = {{P}roceedings of the 6th {IEEE} {I}nternational {S}ymposium on {I}ndustrial {E}mbedded {S}ystems ({SIES}'11)}, author = {Markey, Nicolas}, title = {Robustness in Real-time Systems}, pages = {28-34}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/NM-sies11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NM-sies11.pdf}, doi = {10.1109/SIES.2011.5953652}, abstract = {We~review several aspects of robustness of real-time systems, and present recent results on the robust verification of timed automata.} }
@inproceedings{BDDHP-case11, address = {Trieste, Italy}, month = aug, year = 2011, publisher = {{IEEE} Robotics \& Automation Society}, noeditor = {}, acronym = {{CASE}'11}, booktitle = {{P}roceedings of the 7th {IEEE} {C}onference on {A}utomation {S}cience and {E}ngineering ({CASE}'11)}, author = {Ballarini, Paolo and Djafri, Hilal and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{P}etri Nets Compositional Modeling and Verification of Flexible Manufacturing Systems}, pages = {588-593}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-case11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-case11.pdf}, doi = {10.1109/CASE.2011.6042488}, abstract = {Flexible Manufacturing Systems (FMS) are amongst the most studied types of systems, however due to their increasing complexity, there is still room for improvement in their modeling and analysis. In this paper we consider the design and the analysis of stochastic models of FMS in two complementary respects. First we describe a (stochastic) Petri Nets based compositional framework which enables to model an FMS by combination of an arbitrary number of basic components. Second we demonstrate how classical transient-analysis of manufacturing systems, including reliability and performability analysis, can be enriched by application of a novel, sophisticated stochastic logic, namely the Hybrid Automata Stochastic Logic (HASL). We demonstrate the proposed methodology on an FMS example.} }
@inproceedings{BDDHP-qest11, address = {Aachen, Germany}, month = sep, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'11}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'11)}, author = {Ballarini, Paolo and Djafri, Hilal and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{COSMOS}: a~Statistical Model Checker for the Hybrid Automata Stochastic Logic}, pages = {143-144}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-qest11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-qest11.pdf}, doi = {10.1109/QEST.2011.24}, abstract = {This tool paper introduces COSMOS, a statistical model checker for the Hybrid Automata Stochastic Logic (HASL). HASL employs Linear Hybrid Automata (LHA), a generalization of Deterministic Timed Automata (DTA), to describe accepting execution paths of a Discrete Event Stochastic Process (DESP), a class of stochastic models which includes, but is not limited to, Markov chains. As a result HASL verification turns out to be a unifying framework where sophisticated temporal reasoning is naturally blended with elaborate reward-based analysis. COSMOS takes as input a DESP (described in terms of a Generalized Stochastic Petri Net), an LHA and an expression~\(Z\) representing the quantity to be estimated. It returns a confidence interval estimation of~\(Z\). COSMOS is written in C++ and is freely available to the research community.} }
@article{BFH-ijpe11, publisher = {RAMS Consultants}, journal = {International Journal of Performability Engineering}, author = {Beccuti, Marco and Franceschinis, Giuliana and Haddad, Serge}, title = {{MDWN}solver: A~Framework to Design and Solve {M}arkov Decision {P}etri Nets}, year = {2011}, month = sep, volume = 7, number = 5, pages = {417-428}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFH-ijpe11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFH-ijpe11.pdf}, abstract = {MDWNsolver is a framework for system modeling and optimization of performability measures based on Markov Decision Petri Net (MDPN) and Markov Decision Well-formed Net (MDWN) formalisms, two Petri Net extensions for high level specification of Markov Decision Processes (MDP). It is integrated in the GreatSPN suite which provides a GUI to design MDPN/MDWN models. From the analysis point of view, MDWNsolver uses efficient algorithms that take advantage of system symmetries, thus reducing the analysis complexity. In this paper the MDWNsolver framework features and architecture are presented, and some application examples are discussed.} }
@inproceedings{UW-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Ummels, Michael and Wojtczak, Dominik}, title = {The Complexity of {N}ash Equilibria in Limit-Average Games}, pages = {482-496}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/UW-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_32}, abstract = {We study the computational complexity of Nash equilibria in concurrent games with limit-average objectives. In particular, we prove that the existence of a Nash equilibrium in randomised strategies is undecidable, while the existence of a Nash equilibrium in pure strategies is decidable, even if we put a constraint on the payoff of the equilibrium. Our undecidability result holds even for a restricted class of concurrent games, where nonzero rewards occur only on terminal states. Moreover, we show that the constrained existence problem is undecidable not only for concurrent games but for turn-based games with the same restriction on rewards. Finally, we prove that the constrained existence problem for Nash equilibria in (pure or randomised) stationary strategies is decidable and analyse its complexity.} }
@inproceedings{Bol-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Bollig, Benedikt}, title = {An automaton over data words that captures {EMSO} logic}, pages = {171-186}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/B-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/B-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_12}, abstract = {We develop a general framework for the specification and implementation of systems whose executions are words, or partial orders, over an infinite alphabet. As a model of an implementation, we introduce class register automata, a one-way automata model over words with multiple data values. Our model combines register automata and class memory automata. It has natural interpretations. In particular, it captures communicating automata with an unbounded number of processes, whose semantics can be described as a set of (dynamic) message sequence charts. On the specification side, we provide a local existential monadic second-order logic that does not impose any restriction on the number of variables. We study the realizability problem and show that every formula from that logic can be effectively, and in elementary time, translated into an equivalent class register automaton.} }
@inproceedings{RSB-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan and Baldan, Paolo}, title = {Efficient contextual unfolding}, pages = {342-357}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RSB-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RSB-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_23}, abstract = {A~contextual net is a Petri net extended with read arcs, which allow transitions to check for tokens without consuming them. Contextual nets allow for better modelling of concurrent read access than Petri nets, and their unfoldings can be exponentially more compact than those of a corresponding Petri net. A~constructive but abstract procedure for generating those unfoldings was proposed in earlier work; however, no concrete implementation existed. Here, we~close this gap providing two concrete methods for computing contextual unfoldings, with a view to efficiency. We report on experiments carried out on a number of benchmarks. These show that not only are contextual unfoldings more compact than Petri net unfoldings, but they can be computed with the same or better efficiency, in~particular with respect to the place-replication encoding of contextual nets into Petri nets.} }
@inproceedings{BLMST-concur11, address = {Aachen, Germany}, month = sep, year = 2011, volume = 6901, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Katoen, Joost-Pieter and K{\"o}nig, Barbara}, acronym = {{CONCUR}'11}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'11)}, author = {Bouyer, Patricia and Larsen, Kim~G. and Markey, Nicolas and Sankur, Ocan and Thrane, Claus}, title = {Timed automata can always be made implementable}, pages = {76-91}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLMST-concur11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLMST-concur11.pdf}, doi = {10.1007/978-3-642-23217-6_6}, abstract = {Timed automata follow a mathematical semantics, which assumes perfect precision and synchrony of clocks. Since this hypothesis does not hold in digital systems, properties proven formally on a timed automaton may be lost at implementation. In order to ensure implementability, several approaches have been considered, corresponding to different hypotheses on the implementation platform. We address two of these: a~timed automaton is samplable if its semantics is preserved under a discretization of time; it is robust if its semantics is preserved when all timing constraints are relaxed by some small positive parameter. We propose a construction which makes timed automata implementable in the above sense: From any timed automaton~\(\mathcal{A}\), we build a timed automaton~\(\mathcal{A}'\) that exhibits the same behaviour as~\(\mathcal{A}\), and moreover is both robust and samplable by construction.} }
@article{DDG-jlc11, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane and D'Souza, Deepak and Gascon, R{\'e}gis}, title = {Temporal Logics of Repeating Values}, year = {2012}, month = oct, volume = 22, number = 5, pages = {1059-1096}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDG-jlc11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDG-jlc11.pdf}, doi = {10.1093/logcom/exr013}, abstract = {Various logical formalisms with the freeze quantifier have been recently considered to model computer systems even though this is a powerful mechanism that often leads to undecidability. In this paper, we study a linear-time temporal logic with past-time operators such that the freeze operator is only used to express that some value from an infinite set is repeated in the future or in the past. Such a restriction has been inspired by a recent work on spatio-temporal logics that suggests such a restricted use of the freeze operator. We show decidability of finitary and infinitary satisfiability by reduction into the verification of temporal properties in Petri nets by proposing a symbolic representation of models. This is a quite surprising result in view of the expressive power of the logic since the logic is closed under negation, contains future-time and past-time temporal operators and can express the nonce property and its negation. These ingredients are known to lead to undecidability with a more liberal use of the freeze quantifier. The paper also contains developments about the relationships between temporal logics with the freeze operator and counter automata as well as reductions into first-order logics over data words.} }
@inproceedings{BBBS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Stainer, Am{\'e}lie}, title = {Emptiness and Universality Problems in Timed Automata with Positive Frequency}, pages = {246-257}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBS-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_19}, abstract = {The languages of infinite timed words accepted by timed automata are traditionally dened using B{\"u}chi-like conditions. These acceptance conditions focus on the set of locations visited infinitely often along a run, but completely ignore quantitative timing aspects. In this paper we propose a natural quantitative semantics for timed automata based on the so-called frequency, which measures the proportion of time spent in the accepting locations. We study various properties of timed languages accepted with positive frequency, and in particular the emptiness and universality problems.} }
@inproceedings{BDGORW-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Brihaye, {\relax Th}omas and Doyen, Laurent and Geeraerts, Gilles and Ouaknine, Jo{\"e}l and Raskin, Jean-Fran{\c{c}}ois and Worrell, James}, title = {On~Reachability for Hybrid Automata over Bounded Time}, pages = {416-427}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDGORW-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDGORW-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_33}, abstract = {This paper investigates the time-bounded version of the reachability problem for hybrid automata. This problem asks whether a given hybrid automaton can reach a given target location within~\(\mathbf{T}\) time units, where \(\mathbf{T}\) is a constant rational value. We show that, in contrast to the classical (unbounded) reachability problem, the timed-bounded version is decidable for rectangular hybrid automata provided only non-negative rates are allowed. This class of systems is of practical interest and subsumes, among others, the class of stopwatch automata. We also show that the problem becomes undecidable if either diagonal constraints or both negative and positive rates are allowed.} }
@inproceedings{BCS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {B{\'a}r{\'a}ny, Vince and ten~Cate, Balder and Segoufin, Luc}, title = {Guarded negation}, pages = {356-367}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCS-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_28}, abstract = {We consider restrictions of first-order logic and of fixpoint logic in which all occurrences of negation are required to be guarded by an atomic predicate. In terms of expressive power, the logics in question, called GNFO and GNFP, extend the guarded fragment of first-order logic and guarded least fixpoint logic, respectively. They also extend the recently introduced unary negation fragments of first-order logic and of least fixpoint logic.\par We show that the satisfiability problem for GNFO and for GNFP is 2ExpTime-complete, both on arbitrary structures and on finite structures. We also study the complexity of the associated model checking problems. Finally, we show that GNFO and GNFP are not only computationally well behaved, but also model theoretically: we show that GNFO and GNFP have the tree-like model property and that GNFO has the finite model property, and we characterize the expressive power of GNFO in terms of invariance for an appropriate notion of bisimulation.} }
@inproceedings{SS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {Multiply-Recursive Upper Bounds with {H}igman's Lemma}, pages = {441-452}, url = {http://arxiv.org/abs/1103.4399}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_35}, abstract = {We develop a new analysis for the length of controlled bad sequences in well-quasi-orderings based on Higman's Lemma. This leads to tight multiply-recursive upper bounds that readily apply to several verification algorithms for well-structured systems.} }
@inproceedings{AMSS-icalp11, address = {Z{\"u}rich, Switzerland}, month = jul, year = 2011, volume = 6756, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Aceto, Luca and Henzinger, Monika and Sgall, Jir{\'\i}}, acronym = {{ICALP}'11}, booktitle = {{P}roceedings of the 38th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'11)~-- {P}art~{II}}, author = {Anderson, Matthew and van~Melkebeek, Dieter and Schweikardt, Nicole and Segoufin, Luc}, title = {Locality of queries definable in invariant first-order logic with arbitrary built-in predicates}, pages = {368-379}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-icalp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-icalp11.pdf}, doi = {10.1007/978-3-642-22012-8_29}, abstract = {We consider first-order formulas over relational structures which may use arbitrary numerical predicates. We require that the validity of the formula is independent of the particular interpretation of the numerical predicates and refer to such formulas as Arb-invariant first-order.\par Our main result shows a Gaifman locality theorem: two tuples of a structure with n elements, having the same neighborhood up to distance \((\log n)^{\omega(1)}\), cannot be distinguished by Arb-invariant first-order formulas. When restricting attention to word structures, we can achieve the same quantitative strength for Hanf locality. In both cases we show that our bounds are tight.\par Our proof exploits the close connection between Arb-invariant first-order formulas and the complexity class \(\textsf{AC}^{0}\), and hinges on the tight lower bounds for parity on constant-depth circuits.} }
@techreport{rr-lsv-11-08, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {Weighted Expressions and {DFS} Tree Automata}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = apr, type = {Research Report}, number = {LSV-11-08}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-08.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-08.pdf}, note = {32~pages}, abstract = {We introduce weighted expressions, a~calculus to express quantitative properties over unranked trees. They involve products and sums from a semiring as well as classical boolean formulas. We~show that weighted expressions are expressively equivalent to a new class of weighted tree-walking automata. This new automata model is equipped with pebbles, and follows a depth-first-search policy in the tree.} }
@article{BS-lmcs10, journal = {Logical Methods in Computer Science}, author = {Boja{\'n}czyk, Miko{\l}aj and Segoufin, Luc}, title = {Tree Languages Defined in First-Order Logic with One Quantifier Alternation}, volume = 6, number = {4:1}, nopages = {}, month = oct, year = 2010, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-lmcs10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-lmcs10.pdf}, doi = {10.2168/LMCS-6(4:1)2010}, abstract = {We study tree languages that can be defined in~\(\Delta_{2}\). These are tree languages definable by a first-order formula whose quantifier prefix is \(\exists^{*}\forall^{*}\), and simultaneously by a first-order formula whose quantifier prefix is \(\forall^{*}\exists^{*}\). For the quantifier free part we consider two signatures, either the descendant relation alone or together with the lexicographical order relation on nodes. We provide an effective characterization of tree and forest languages definable in~\(\Delta_{2}\). This characterization is in terms of algebraic equations. Over words, the class of word languages definable in~\(\Delta_{2}\) forms a robust class, which was given an effective algebraic characterization by Pin and Weil.} }
@inproceedings{benzina-iccans11, address = {Republic of Maldives}, month = may, year = 2011, noeditor = {}, acronym = {{ICCANS}'11}, booktitle = {{P}roceedings of the {I}nternational {C}onference on {C}omputer {A}pplications and {N}etwork {S}ecurity ({ICCANS}'11)}, author = {Benzina, Hedi}, title = {Logic in Virtualized Systems}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iccans11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iccans11.pdf}, abstract = {As virtualized systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A malicious driver downloaded and installed by the system administrator can trigger high-complexity behavior exhausting CPU time or stack space and making the whole system unavailable. Virtualized systems such as Xen or VirtualBox have been proposed to increase the level of security on computers. On the other hand, such virtualized systems are now targets for attacks. The weak spot of such systems is domain zero administration, which is left entirely under the administrator's responsibility, and is in particular vulnerable to attacks. \par We propose to let the administrator write and deploy security policies and rely on RuleGen, a policy compiler, and Orchids' fast, real-time monitoring engine to raise alerts in case any policy violation, expressed in a fragment of linear temporal logic, is detected. This approach has shown its efficiency against real DoS exploits. } }
@phdthesis{markey-HDR11, author = {Markey, Nicolas}, title = {Verification of Embedded Systems -- Algorithms and Complexity}, year = 2011, month = apr, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-nm.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-nm.pdf} }
@incollection{CDM-fmtasp11, author = {Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie and Millen, Jonathan K.}, title = {Constraint solving techniques and enriching the model with equational theories}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, editor = {Cortier, V{\'e}ronique and Kremer, Steve}, series = {Cryptology and Information Security Series}, volume = 5, publisher = {{IOS} Press}, nochapter = {}, pages = {35-61}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDM-fmtasp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDM-fmtasp11.pdf}, abstract = {Derivability constraints represent in a symbolic way the infinite set of possible executions of a finite protocol, in presence of an arbitrary active attacker. Solving a derivability constraint consists in computing a simplified representation of such executions, which is amenable to the verification of any (trace) security property. Our goal is to explain this method on a non-trivial combination of primitives.\par In this chapter we explain how to model the protocol executions using derivability constraints, and how such constraints are interpreted, depending on the cryptographic primitives and the assumed attacker capabilities. Such capabilities are represented as a deduction system that has some specific properties. We choose as an example the combination of exclusive-or, symmetric encryption{\slash}decryption and pairing{\slash}unpairing. We explain the properties of the deduction system in this case and give a complete and terminating set of rules that solves derivability constraints. A similar set of rules has been already published for the classical Dolev-Yao attacker, but it is a new result for the combination of primitives that we consider. This allows to decide trace security properties for this combination of primitives and arbitrary finite protocols.} }
@inproceedings{ACD-cade11, address = {Wroc{\l}aw, Poland}, month = jul, year = 2011, volume = {6803}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bj{\o}rner, Nikolaj and Sofronie-Stokkermans, Viorica}, acronym = {{CADE}'11}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {A}utomated {D}eduction ({CADE}'11)}, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Deciding security for protocols with recursive tests}, pages = {49-63}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-cade11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-cade11.pdf}, doi = {10.1007/978-3-642-22438-6_6}, abstract = {Security protocols aim at securing communications over public networks. Their design is notoriously dicult and error-prone. Formal methods have shown their usefulness for providing a careful security analysis in the case of standard authentication and condentiality protocols. However, most current techniques do not apply to protocols that perform recursive computation e.g. on a list of messages received from the network.\par While considering general recursive input{\slash}output actions very quickly yields undecidability, we focus on protocols that perform recursive tests on received messages but output messages that depend on the inputs in a standard way. This is in particular the case of secured routing protocols, distributed right delegation or PKI certication paths. We provide NPTIME decision procedures for protocols with recursive tests and for a bounded number of sessions. We also revisit constraint system solving, providing a complete symbolic representation of the attacker knowledge.} }
@inproceedings{KSW-csf11, address = {Cernay-la-Ville, France}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'11}, booktitle = {{P}roceedings of the 24th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'11)}, author = {Kremer, Steve and Steel, Graham and Warinschi, Bogdan}, title = {Security for Key Management Interfaces}, pages = {266-280}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KSW-csf11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KSW-csf11.pdf}, nolongps = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/ rr-lsv-2011-07.ps}, nolongpsgz = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PSGZ/ rr-lsv-2011-07.ps.gz}, doi = {10.1109/CSF.2011.25}, abstract = {We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the security of more expressive APIs which support richer functionality. We illustrate our approach by showing the security of APIs both in symbolic and computational models.} }
@inproceedings{DKRS-csf11, address = {Cernay-la-Ville, France}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'11}, booktitle = {{P}roceedings of the 24th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'11)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham}, title = {Formal analysis of protocols based on {TPM} state registers}, pages = {66-82}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-csf11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKRS-csf11.pdf}, doi = {10.1109/CSF.2011.12}, abstract = {We~present a Horn-clause-based framework for analysing security protocols that use platform configuration registers~(PCRs), which are registers for maintaining state inside the Trusted Platform Module~(TPM). In~our model, the~PCR state space is unbounded, and our experience shows that a na{\"i}ve analysis using ProVerif or SPASS does not terminate. To address this, we extract a set of instances of the Horn clauses of our model, for which ProVerif does terminate on our examples. We~prove the soundness of this extraction process: no~attacks are lost, that~is, any query derivable in the more general set of clauses is also derivable from the extracted instances. The~effectiveness of our framework is demonstrated in two case studies: a~simplified version of Microsoft Bitlocker, and a digital envelope protocol that allows a user to choose whether to perform a decryption, or to verifiably renounce the ability to perform the decryption.} }
@techreport{rr-lsv-11-04, author = {Fribourg, Laurent and K{\"u}hne, Ulrich}, title = {Parametric Verification of Hybrid Automata Using the Inverse Method}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2011}, month = mar, type = {Research Report}, number = {LSV-11-04}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-04.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2011-04.pdf}, note = {25~pages}, abstract = {Hybrid systems combine continuous and discrete behavior. Hybrid Automata are a powerful formalism for the modeling and verification of such systems. A~common problem in hybrid system verification is the good parameters problem, which consists in identifying a subset of parameters which guarantee a certain behavior of a system. Recently, a method has been presented for attacking this problem for Timed Automata. In this report, we show the extension of this methodology for hybrid automata with linear and affine dynamics. The method is demonstrated with a distributed temperature control system and several other hybrid system benchmarks from the literature.} }
@inproceedings{CLC-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique}, title = {How to prove security of communication protocols? A~discussion on the soundness of formal models w.r.t. computational ones}, pages = {29-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CLC-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CLC-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.29}, abstract = {Security protocols are short programs that aim at securing communication over a public network. Their design is known to be error-prone with flaws found years later. That is why they deserve a careful security analysis, with rigorous proofs. Two main lines of research have been (independently) developed to analyse the security of protocols. On the one hand, formal methods provide with symbolic models and often automatic proofs. On the other hand, cryptographic models propose a tighter modeling but proofs are more difficult to write and to check. An approach developed during the last decade consists in bridging the two approaches, showing that symbolic models are sound w.r.t. symbolic ones, yielding strong security guarantees using automatic tools. These results have been developed for several cryptographic primitives (e.g. symmetric and asymmetric encryption, signatures, hash) and security properties. While proving soundness of symbolic models is a very promising approach, several technical details are often not satisfactory. Focusing on symmetric encryption, we describe the difficulties and limitations of the available results.} }
@inproceedings{CS-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {ten~Cate, Balder and Segoufin, Luc}, title = {Unary negation}, pages = {344-355}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.344}, abstract = {We study fragments of first-order logic and of least fixed point logic that allow only unary negation: negation of formulas with at most one free variable. These logics generalize many interesting known formalisms, including modal logic and the \(\mu\)-calculus, as well as conjunctive queries and monadic Datalog. We show that satisfiability and finite satisfiability are decidable for both fragments, and we pinpoint the complexity of satisfiability, finite satisfiability, and model checking. We also show that the unary negation fragment of first-order logic is model-theoretically very well behaved. In particular, it enjoys Craig interpolation and the Beth property.} }
@inproceedings{ST-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {Segoufin, Luc and Toru{\'n}czyk, Szymon}, title = {Automata based verification over linearly ordered data domains}, pages = {81-92}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ST-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ST-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.81}, abstract = {In this paper we work over linearly ordered data domains equipped with finitely many unary predicates and constants. We consider nondeterministic automata processing words and storing finitely many variables ranging over the domain. During a transition, these automata can compare the data values of the current configuration with those of the previous configuration using the linear order, the unary predicates and the constants.\par We show that emptiness for such automata is decidable, both over finite and infinite words, under reasonable computability assumptions on the linear order.\par Finally, we show how our automata model can be used for verifying properties of workflow specifications in the presence of an underlying database.} }
@article{LS-jcss11, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Libkin, Leonid and Sirangelo, Cristina}, title = {Data exchange and schema mappings in open and closed worlds}, year = {2011}, month = may, volume = {77}, number = {3}, pages = {542-571}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-jcss11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-jcss11.pdf}, doi = {10.1016/j.jcss.2010.04.010} }
@article{BLPS-jacm10, publisher = {ACM Press}, journal = {Journal of the~{ACM}}, author = {Barcel{\'o}, Pablo and Libkin, Leonid and Poggi, Antonella and Sirangelo, Cristina}, title = {{XML} with incomplete information}, volume = {58}, number = {1}, year = {2010}, month = dec, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLPS-jacm10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLPS-jacm10.pdf}, doi = {10.1145/1870103.1870107} }
@phdthesis{kremer-HDR11, author = {Kremer, Steve}, title = {Modelling and analyzing security protocols in cryptographic process calculi}, year = 2011, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SK.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SK.pdf}, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/} }
@phdthesis{steel-HDR11, author = {Steel, Graham}, title = {Formal Analysis of Security {API}s}, year = 2011, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-GS.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-GS.pdf}, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/} }
@phdthesis{delaune-HDR11, author = {Delaune, St{\'e}phanie}, title = {Verification of security protocols: from confidentiality to privacy}, year = 2011, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SD.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SD.pdf}, abstract = {Security is a very old concern, which until quite recently was mostly of interest for military purposes. The deployment of electronic commerce changes this drastically. The security of exchanges is ensured by cryptographic protocols which are notoriously error prone. The formal verification of cryptographic protocols is a difficult problem that can be seen as a particular model-checking problem in an hostile environment. Many results and tools have been developed to automatically verify cryptographic protocols.\par Recently, new type of applications have emerged, in order to face new technological and societal challenges, e.g. electronic voting protocols, secure routing protocols for mobile ad hoc networks,~... These applications involve some features that are not taken into account by the existing verification tools, e.g. complex cryptographic primitives, privacy-type security properties,~... This prevents us from modelling these protocols in an accurate way. Moreover, protocols are often analysed in isolation and this is well-known to be not sufficient. In this thesis, we use formal methods to study these aspects concerning the verification of cryptographic protocols.} }
@inproceedings{pas-icdt11, address = {Uppsala, Sweden}, month = mar, year = 2011, publisher = {ACM Press}, editor = {Milo, Tova}, acronym = {{ICDT}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'11)}, author = {Pasail{\u{a}}, Daniel}, title = {Conjunctive queries determinacy and rewriting}, pages = {220-231}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/pasaila-icdt11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/pasaila-icdt11.pdf}, doi = {10.1145/1938551.1938580} }
@inproceedings{BCH-acsd11, address = {Newcastle upon Tyne, UK}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, editor = {Caillaud, Beno{\^\i}t and Carmona, Josep}, acronym = {{ACSD}'11}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'11)}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {Building Tight Occurrence Nets from Reveals Relations}, pages = {44-53}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-acsd11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-acsd11.pdf}, doi = {10.1109/ACSD.2011.16}, abstract = {Occurrence nets are a well known partial order model for the concurrent behavior of Petri nets. The causality and conflict relations between events, which are explicitly represented in occurrence nets, induce logical dependencies between event occurrences: the occurrence of an event~\(e\) in a run implies that all its causal predecessors also occur, and that no event in conflict with \(e\) occurs. But these structural relations do not express all the logical dependencies between event occurrences in maximal runs: in particular, the occurrence of~\(e\) in any maximal run may imply the occurrence of another event that is not a causal predecessor of~\(e\), in that run. The \emph{reveals} relation has been introduced in~[Haar, IEEE TAC 55(10):2310-2320, 2010] to express this dependency between two events. Here we generalize the reveals relation to express more general dependencies, involving more than two events, and we introduce ERL logic to express them as boolean formulas. Finally we answer the synthesis problem that arises: given an ERL formula~\(\varphi\), is there an occurrence net~\(\mathcal{N}\) such that \(\varphi\) describes exactly the dependencies between the events of~\(\mathcal{N}\)?} }
@inproceedings{HMN-atpn11, address = {Newcastle upon Tyne, UK}, month = jun, year = 2011, volume = {6709}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kristensen, Lars M. and Petrucci, Laure}, acronym = {{PETRI~NETS}'11}, booktitle = {{P}roceedings of the 32nd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'11)}, author = {Haddad, Serge and Mairesse, Jean and Nguyen, Hoang-Thach}, title = {Synthesis and Analysis of Product-form {P}etri Nets}, pages = {288-307}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HMN-atpn11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HMN-atpn11.pdf}, doi = {10.1007/978-3-642-21834-7_16}, abstract = {For a large Markovian model, a {"}product form{"} is an explicit description of the steady-state behaviour which is otherwise generally untractable. Being first introduced in queueing networks, it has been adapted to Markovian Petri nets. Here we address three relevant issues for product-form Petri nets which were left fully or partially open: (1)~we~provide a sound and complete set of rules for the synthesis; (2)~we~characterise the exact complexity of classical problems like reachability; (3)~we~introduce a new subclass for which the normalising constant (a crucial value for product-form expression) can be efficiently computed.} }
@inproceedings{CFS-atpn2011, address = {Newcastle upon Tyne, UK}, month = jun, year = 2011, volume = {6709}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kristensen, Lars M. and Petrucci, Laure}, acronym = {{PETRI~NETS}'11}, booktitle = {{P}roceedings of the 32nd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'11)}, author = {Chambart, Pierre and Finkel, Alain and Schmitz, Sylvain}, title = {Forward Analysis and Model Checking for Trace Bounded {WSTS}}, nopages = {49-68}, url = {http://arxiv.org/abs/1004.2802}, doi = {10.1007/978-3-642-21834-7_4}, abstract = {We investigate a subclass of well-structured transition systems~(WSTS), the bounded---in the sense of Ginsburg and Spanier (Trans. AMS 1964)---complete deterministic ones, which we claim provide an adequate basis for the study of forward analyses as developed by Finkel and Goubault-Larrecq (ICALP~2009). Indeed, we prove that, unlike other conditions considered previously for the termination of forward analysis, boundedness is decidable. Boundedness turns out to be a valuable restriction for WSTS verification, as we show that it further allows to decide all \(\omega\)-regular properties on the set of infinite traces of the system.} }
@inproceedings{ACGP-rsa11, address = {San Francisco, California, USA}, month = feb, year = 2011, volume = 6558, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kiayias, Aggelos}, acronym = {{CT-RSA}'11}, booktitle = {{P}roceedings of the {C}ryptographers' {T}rack at the {RSA} {C}onference 2011 ({CT-RSA}'11)}, author = {Abdalla, Michel and Chevalier, C{\'e}line and Granboulan, Louis and Pointcheval, David}, title = {Contributory Password-Authenticated Group Key Exchange with Join Capability}, pages = {142-160}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACGP-rsa11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACGP-rsa11.pdf}, doi = {10.1007/978-3-642-19074-2_11}, abstract = {Password-based authenticated group key exchange allows any group of users in possession of a low-entropy secret key to establish a common session key even in the presence of adversaries. In this paper, we propose a new generic construction of password-authenticated group key exchange protocol from any two-party password-authenticated key exchange with explicit authentication. Our new construction has several advantages when compared to existing solutions. First, our construction only assumes a common reference string and does not rely on any idealized models. Second, our scheme enjoys a simple and intuitive security proof in the universally composable framework and is optimal in the sense that it allows at most one password test per user instance. Third, our scheme also achieves a strong notion of security against insiders in that the adversary cannot bias the distribution of the session key as long as one of the players involved in the protocol is honest. Finally, we show how to easily extend our protocol to the dynamic case in a way that the costs of establishing a common key between two existing groups is significantly smaller than computing a common key from scratch.} }
@inproceedings{FFSS-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Figueira, Diego and Figueira, Santiago and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {{A}ckermannian and Primitive-Recursive Bounds with {D}ickson's Lemma}, pages = {269-278}, url = {http://arxiv.org/abs/1007.2989}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FFSS-lics11.pdf}, doi = {10.1109/LICS.2011.39}, abstract = {Dickson's Lemma is a simple yet powerful tool widely used in decidability proofs, especially when dealing with counters or related data structures in algorithmics, verification and model-checking, constraint solving, logic, etc. While Dickson's Lemma is well-known, most computer scientists are not aware of the complexity upper bounds that are entailed by its use. This is mainly because, on this issue, the existing literature is not very accessible.\par We propose a new analysis of the length of bad sequences over \((\mathbb{N}^{k},\leq)\), improving on earlier results and providing upper bounds that are essentially tight. This analysis is complemented by a {"}user guide{"} explaining through practical examples how to easily derive complexity upper bounds from Dickson's Lemma.} }
@inproceedings{GLV-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Goubault{-}Larrecq, Jean and Varacca, Daniele}, title = {Continuous Random Variables}, pages = {97-106}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLV-lics2011-errata.pdf}, doi = {10.1109/LICS.2011.23}, abstract = {We introduce the domain of continuous random variables (CRV) over a domain, as an alternative to Jones and Plotkin's probabilistic powerdomain. While no known Cartesian-closed category is stable under the latter, we show that the so-called thin (uniform) CRVs define a strong monad on the Cartesian-closed category of bc-domains. We also characterize their inequational theory, as (fair-)coin algebras. We apply this to solve a recent problem posed by M. Escard{\'o}: testing is semi-decidable for EPCF terms. CRVs arose from the study of the second author's (layered) Hoare indexed valuations, and we also make the connection apparent.} }
@inproceedings{Fig-lics2011, address = {Toronto, Canada}, month = jun, year = 2011, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'11}, booktitle = {{P}roceedings of the 26th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'11)}, author = {Figueira, Diego}, title = {A decidable two-way logic on data words}, pages = {365-374}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lics2011.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lics2011.pdf}, doi = {10.1109/LICS.2011.18}, abstract = {We study the satisfiability problem for a logic on data words. A~data word is a finite word where every position carries a label from a finite alphabet and a data value from an infinite domain. The logic we consider is two-way, contains \emph{future} and \emph{past} modalities, which are considered as reflexive and transitive relations, and data equality and inequality tests. This logic corresponds to the fragment of XPath with the 'followingsibling- or-self' and 'preceding-sibling-or-self' axes over data words. We show that this problem is decidable, EXPSPACE-complete. This is surprising considering that with the strict (non-reflexive) navigation relations the satisfiability problem is undecidable. To~prove this, we~first reduce the problem to a derivation problem for an infinite transition system, and then we show how to abstract this problem into a reachability problem of a finite transition system.} }
@article{LBDLNP-fmsd2010, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Li, Shuhao and Balaguer, Sandie and David, Alexandre and Larsen, Kim G. and Nielsen, Brian and Pusinskas, Saulius}, title = {Scenario-based verification of real-time systems using {\textsc{Uppaal}}}, year = {2010}, month = nov, volume = {37}, number = {2-3}, pages = {200-264}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LBDLNP-fmsd2010.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LBDLNP-fmsd2010.pdf}, doi = {10.1007/s10703-010-0103-z}, abstract = {This article proposes two approaches to tool-supported automatic verification of dense real-time systems against scenario-based requirements, where a system is modeled as a network of timed automata (TAs) or as a set of driving live sequence charts (LSCs), and a requirement is specified as a separate monitored LSC chart. We make timed extensions to a kernel subset of the LSC language and define a trace-based semantics. By translating a monitored LSC chart to a behavior-equivalent observer TA and then non-intrusively composing this observer with the original TA-modeled real-time system, the problems of scenario-based verification reduce to computation tree logic (CTL) real-time model checking problems. When the real-time system is modeled as a set of driving LSC charts, we translate these driving charts and the monitored chart into a behavior-equivalent network of TAs by using a {"}one-TA-per-instance line{"} approach, and then reduce the problems of scenario-based verification also to CTL real-time model checking problems. We show how we exploit the expressivity of the TA formalism and the CTL query language of the real-time model checker Uppaal to accomplish these tasks. The proposed two approaches are implemented in the Uppaal tool and built as a tool chain, respectively. We carry out a number of experiments with both verification approaches, and the results indicate that these methods are viable, computationally feasible, and the tools are effective.} }
@phdthesis{villard-phd2010, author = {Villard, Jules}, title = {Heaps and Hops}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2011, month = feb, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/villard-phd.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/villard-phd.pdf}, abstract = {This thesis is about the specification and verification of copyless message-passing programs, a particular kind of concurrent programs that communicate by message passing. Instead of copying messages over channels, processes exchange pointers into a shared memory where the actual contents of messages are stored. Channels are themselves objects in the heap that can be communicated, thus achieving full mobility. This flexible and efficient programming paradigm must be used carefully: every pointer that is communicated becomes shared between its sender and its recipient, which may introduce races. To err on the side of caution, the sender process should not attempt to access the area of storage circumscribed by a message once it has been sent. Indeed, this right is now reserved to the recipient, who may already have modified it or even disposed of it. In other words, the ownership of pieces of heap hops from process to process following the flow of messages.\par Copyless message passing combines two features of programs that make formal verification challenging: explicit memory management and concurrency. To tackle these difficulties, we base our approach on two recent developments. On the one hand, concurrent separation logic produces concise proofs of pointer-manipulating programs by keeping track only of those portions of storage owned by the program. We use such local reasoning techniques to analyse the fluxes of ownership in programs, and ensure in particular that no dangling pointer will be dereferenced or freed at runtime. On the other hand, channel contracts, a form of session types introduced by the Sing\# programming language, provide an abstraction of the exchanges of messages that can be used to statically verify that programs never face unexpected message receptions and that all messages are delivered before a channel is closed.\par The contributions contained in this thesis fall into three categories. First, we give a semantics to copyless message-passing programs, the ownership transfers they induce and contracts, and link the three together. In doing so, we provide the first formal model of a theoretically significant subset of the Sing\# programming language. In particular, we show that some properties of their contracts rub off on programs, which justifies their use as protocol specifications. Second, we introduce the first proof system for copyless message passing, based on separation logic and contracts. The proof system discharges parts of the verification of programs on the verification of their contracts. The marriage of these two techniques allows one to prove that programs are free from memory faults, race conditions and message-passing errors such as unspecified receptions and undelivered messages. Moreover, we show how the logic and contracts cooperate to prove the absence of memory leaks. Third, we give an implementation of our analysis, Heap-Hop, that takes annotated programs as input and automatically checks the given specifications and deduces which of the properties above are enjoyed by the program. The only annotations needed by Heap-Hop are pre and postconditions of each function, loop invariants, and the contracts followed by the communications.} }
@article{DFGD-jancl10, publisher = {Taylor \& Francis}, journal = {Journal of Applied Non-Classical Logics}, author = {Demri, St{\'e}phane and Finkel, Alain and Goranko, Valentin and van Drimmelen, Govert}, title = {Model-checking \(\textsf{CTL}^{*}\) over Flat {P}resburger Counter Systems}, year = {2010}, volume = {20}, number = {4}, pages = {313-344}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DFGD-jancl10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DFGD-jancl10.pdf}, doi = {10.3166/jancl.20.313-344}, abstract = {This paper studies model-checking of fragments and extensions of \(\textsf{CTL}^{*}\) on infinite-state counter systems, where the states are vectors of integers and the transitions are determined by means of relations definable within Presburger arithmetic. In general, reachability properties of counter systems are undecidable, but we have identified a natural class of admissible counter systems (ACS) for which we show that the quantification over paths in \(\textsf{CTL}^{*}\) can be simulated by quantification over tuples of natural numbers, eventually allowing translation of the whole Presburger-\(\textsf{CTL}^{*}\) into Presburger arithmetic, thereby enabling effective model checking. We provide evidence that our results are close to optimal with respect to the class of counter systems described above.} }
@book{CK-ios2011, editor = {Cortier, V{\'e}ronique and Kremer, Steve}, title = {Formal Models and Techniques for Analyzing Security Protocols}, publisher = {{IOS} Press}, year = {2011}, series = {Cryptology and Information Security Series}, volume = 5, url = {http://www.iospress.nl/loadtop/load.php?isbn=9781607507130} }
@inproceedings{DDS-tosca11, address = {Saarbr{\"u}cken, Germany}, month = jan, year = 2012, volume = 6993, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {M{\"o}dersheim, Sebastian A. and Palamidessi, Catuscia}, acronym = {{TOSCA}'11}, booktitle = {{R}evised {S}elected {P}apaers of the {W}orkshop on {T}heory of {S}ecurity and {A}pplications ({TOSCA}'11)}, author = {Dahl, Morten and Delaune, St{\'e}phanie and Steel, Graham}, title = {Formal Analysis of Privacy for Anonymous Location Based Services}, pages = {98-112}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-tosca11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-tosca11.pdf}, doi = {10.1007/978-3-642-27375-9_6}, abstract = {We propose a framework for formal analysis of privacy in location based services such as anonymous electronic toll collection. We give a formal definition of privacy, and apply it to the VPriv scheme for vehicular services. We analyse the resulting model using the ProVerif tool, concluding that our privacy property holds only if certain conditions are met by the implementation. Our analysis includes some novel features such as the formal modelling of privacy for a protocol that relies on interactive zero-knowledge proofs of knowledge and list permutations. } }
@inproceedings{JLTV-tosca11, address = {Saarbr{\"u}cken, Germany}, month = jan, year = 2012, volume = 6993, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {M{\"o}dersheim, Sebastian A. and Palamidessi, Catuscia}, acronym = {{TOSCA}'11}, booktitle = {{R}evised {S}elected {P}apaers of the {W}orkshop on {T}heory of {S}ecurity and {A}pplications ({TOSCA}'11)}, author = {Jacquemard, Florent and Lozes, {\'E}tienne and Treinen, Ralf and Villard, Jules}, title = {Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus}, pages = {166-185}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JLTV-tosca11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JLTV-tosca11.pdf}, doi = {10.1007/978-3-642-27375-9_10}, abstract = {We investigate the problem of deciding first-order theories of finite trees with several distinguished congruence relations, each of them given by some equational axioms. We give an automata-based solution for the case where the different equational axiom systems are linear and variable-disjoint (this includes the case where all axioms are ground), and where the logic does not permit to express tree relations \(x=f(y,z)\). We~show that the problem is undecidable when these restrictions are relaxed. As motivation and application, we show how to translate the model-checking problem of \(A\pi\mathcal{L}\), a~spatial equational logic for the applied pi-calculus, to the validity of first-order formulas in term algebras with multiple congruence relations.} }
@inproceedings{BDDHP-valuetools11, address = {Cachan, France}, month = may, year = 2011, acronym = {{VALUETOOLS}'11}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {P}erformance {E}valuation {M}ethodologies and {T}ools ({VALUETOOLS}'11)}, author = {Ballarini, Paolo and Djafri, Hilal and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{HASL}: An~Expressive Language for Statistical Verification of Stochastic Models}, pages = {306-315}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-valuetools11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDDHP-valuetools11.pdf}, abstract = {We introduce the Hybrid Automata Stochastic Logic (HASL), a new temporal logic formalism for the verification of discrete event stochastic processes (DESP). HASL employs Linear Hybrid Automata (LHA) as machineries to select prefixes of relevant execution paths of a DESP~\(\mathcal{D}\). The advantage with LHA is that rather elaborate information can be collected \emph{on-the-fly} during path selection, providing the user with a powerful means to express sophisticated measures. A formula of HASL consists of an LHA~\(\mathcal{A}\) and an expression~\(Z\) referring to moments of \emph{path random variables}. A~simulation-based statistical engine is employed to obtained a confidence-interval estimate of the expected value of~\(Z\). In essence HASL provide a unifying verification framework where sophisticated temporal reasoning is naturally blended with elabo- rate reward-based analysis. We illustrate the HASL approach by means of some examples and a discussion about its expressivity. We also provide empirical evidence obtained through COSMOS, a prototype software tool for HASL verification.} }
@article{BFLM-cacm11, publisher = {ACM Press}, journal = {Communications of the~{ACM}}, author = {Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim~G. and Markey, Nicolas}, title = {Quantitative analysis of real-time systems using priced timed automata}, volume = 54, number = 9, month = sep, pages = {78-87}, year = 2011, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLM-cacm11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLM-cacm11.pdf}, doi = {10.1145/1995376.1995396}, abstract = {The problems of time-dependent behavior in general, and dynamic resource allocation in particular, pervade many aspects of modern life. Prominent examples range from reliability and efficient use of communication resources in a telecommunication network to the allocation of tracks in a continental railway network, from scheduling the usage of computational resources on a chip for durations of nano-seconds to the weekly, monthly, or longer-range reactive planning in a factory or a supply chain.} }
@inproceedings{BFHR-fossacs11, address = {Saarbr{\"u}cken, Germany}, month = mar # {-} # apr, year = 2011, volume = {6604}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hofmann, Martin}, acronym = {{FoSSaCS}'11}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'11)}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Haddad, Serge and Rosa{-}Velardo, Fernando}, title = {Ordinal Theory for Expressiveness of Well Structured Transition Systems}, pages = {153-167}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHR-fossacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHR-fossacs11.pdf}, doi = {10.1007/978-3-642-19805-2_11} }
@inproceedings{FS-stacs11, address = {Dortmund, Germany}, month = mar, year = 2011, volume = 9, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D{\"u}rr, Christoph and Schwentick, {\relax Th}omas}, acronym = {{STACS}'11}, booktitle = {{P}roceedings of the 28th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'11)}, author = {Figueira, Diego and Segoufin, Luc}, title = {Bottom-up automata on data trees and vertical {XP}ath}, pages = {93-104}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-stacs11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-stacs11.pdf}, doi = {10.4230/LIPIcs.STACS.2011.93}, abstract = {A data tree is a tree whose every node carries a label from a finite alphabet and a datum from some infinite domain. We introduce a new model of automata over unranked data trees with a decidable emptiness problem. It is essentially a bottom-up alternating automaton with one register, enriched with epsilon-transitions that perform tests on the data values of the subtree. We show that it captures the expressive power of the vertical fragment of XPath --containing the child, descendant, parent and ancestor axes-- obtaining thus a decision procedure for its satisfiability problem.} }
@inproceedings{BKKL-ceeset2008, address = {Brno, Czech Republic}, year = 2011, volume = {4980}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Huzar, Zbigniew and Koc{\'\i}, Radek and Meyer, Bertrand and Walter, Bartosz and Zendulka, Jaroslav}, acronym = {{CEE-SET}'08}, booktitle = {{R}evised {S}elected {P}apars of the 3rd {IFIP} {TC2} {C}entral and {E}ast {E}uropean {C}onference on {S}oftware {E}ngineering {T}echniques ({CEE-SET}'08)}, author = {Bollig, Benedikt and Katoen, Joost-Pieter and Kern, Carsten and Leucker, Martin}, title = {{SMA}---The {S}myle Modeling Approach}, pages = {103-117}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-ceeset2008.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKKL-ceeset2008.pdf}, doi = {10.1007/978-3-642-22386-0_8}, abstract = {This paper introduces the model-based software development methodology SMA---the Smyle Modeling Approach---which is centered around Smyle, a dedicated learning procedure to support engineers to interactively obtain design models from requirements, characterized as either being desired (positive) or unwanted (negative) system behavior. The learning approach is complemented by scenario patterns where the engineer can specify clearly desired or unwanted behavior. This~way, user interaction is reduced to the interesting scenarios limiting the design effort considerably. In~SMA, the learning phase is complemented by an effective analysis phase that allows for detecting design flaws at an early design stage. This paper describes the approach and reports on first practical experiences.} }
@article{JGL-jyg10, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Musings Around the Geometry of Interaction, and Coherence}, volume = 412, number = 20, pages = {1998-2014}, year = 2011, month = apr, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf}, doi = {10.1016/j.tcs.2010.12.023}, abstract = {We introduce the Danos-R{\'e}gnier category \(\mathcal{DR}(M)\) of a linear inverse monoid~\(M\), as~a categorical description of geometries of interaction~(GOI) inspired from the weight algebra. The natural setting for GOI is that of a so-called weakly Cantorian linear inverse monoid, in which case \(\mathcal{DR}(M)\) is a kind of symmetrized version of the classical Abramsky-Haghverdi-Scott construction of a weak linear category from a GOI situation. It is well-known that GOI is perfectly suited to describe the multiplicative fragment of linear logic, and indeed \(\mathcal{DR}(M)\) will be a \(\star\)-autonomous category in this case. It is also well-known that the categorical interpretation of the other linear connectives conflicts with GOI interpretations. We make this precise, and show that \(\mathcal{DR}(M)\) has no terminal object, no cartesian product of any two objects, and no exponential---whatever \(M\)~is, unless \(M\)~is trivial. However, a form of coherence completion of \(\mathcal{DR}(M)\) \textit{{\`a} la} Hu-Joyal (which for additives resembles a layered approach \textit{{\`a} la} Hughes-van Glabbeek), provides a model of full classical linear logic, as soon as \(M\) is weakly Cantorian. One finally notes that Girard's notion of \emph{coherence} is pervasive, and instrumental in every aspect of this work.} }
@incollection{DG-iis09, author = {Demri, St{\'e}phane and Gastin, Paul}, title = {Specification and Verification using Temporal Logics}, booktitle = {Modern applications of automata theory}, editor = {D'Souza, Deepak and Shankar, Priti}, series = {IISc Research Monographs}, volume = 2, publisher = {World Scientific}, chapter = 15, pages = {457-494}, year = 2012, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DG-iis09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DG-iis09.pdf}, abstract = {This chapter illustrates two aspects of automata theory related to linear-time temporal logic LTL used for the verification of computer systems. First, we present a translation from LTL formulae to B{\"u}chi automata. The aim is to design an elementary translation which is reasonably efficient and produces small automata so that it can be easily taught and used by hand on real examples. Our translation is in the spirit of the classical tableau constructions but is optimized in several ways. Secondly, we recall how temporal operators can be defined from regular languages and we explain why adding even a single operator definable by a context-free language can lead to undecidability.} }
@mastersthesis{cyriac-master, author = {Cyriac, Aiswarya}, title = {Temporal Logics for Concurrent Recursive Programs}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2010}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ac-m2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ac-m2.pdf} }
@inproceedings{AC-clodem10, address = {Edinburgh, Scotland, UK}, month = jul, year = 2010, acronym = {{CL}o{D}e{M}'10}, booktitle = {{P}roceedings of the {W}orkshop on {C}omparing {L}ogical {D}ecision {M}ethods ({CL}o{D}e{M}'10)}, author = {Cyriac, Aiswarya}, title = {A~New Version of Focus Games for {LTL} Satisfiability}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ac-clodem10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ac-clodem10.pdf} }
@inproceedings{CU-fsttcs12, address = {Hyderabad, India}, month = dec, year = 2012, volume = 18, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D'Souza, Deepak and Radhakrishnan, Jaikumar and Telikepalli, Kavitha}, acronym = {{FSTTCS}'12}, booktitle = {{P}roceedings of the 32nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'12)}, author = {Chadha, Rohit and Ummels, Michael}, title = {The complexity of quantitative information flow in recursive programs}, pages = {534-545}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-15.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2012.534}, abstract = {Information-theoretic measures based upon mutual information can be employed to quantify the information that an \emph{execution} of a program reveals about its \emph{secret inputs}. The \emph{information leakage bounding problem} asks whether the information leaked by a program does not exceed a certain amount. We consider this problem for two scenarios: a)~the \emph{outputs} of the program are revealed, and b)~the \emph{timing} (measured in the number of execution steps) of the program is revealed. For both scenarios, we establish complexity results in the context of deterministic boolean programs, both for programs with and without recursion. In particular, we prove that for recursive programs the information leakage bounding problem is no harder than checking reachability.} }
@inproceedings{ASV-www12comp, address = {Lyon, France}, month = apr, year = 2012, publisher = {ACM Press}, editor = {Mille, Alain and Gandon, Fabien L. and Misselis, Jacques and Rabinovich, Michael and Staab, Steffen}, acronym = {{WWW}'12}, booktitle = {{P}roceedings of the 21st {W}orld {W}ide {W}eb {C}onference ({WWW}'12)~-- {C}ompanion {V}olume}, author = {Abiteboul, Serge and Senellart, Pierre and Vianu, Victor}, title = {The {ERC} webdam on foundations of web data management}, pages = {211-214}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-www12comp.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-www12comp.pdf}, abstract = {The Webdam ERC grant is a five-year project that started in December~2008. The goal is to develop a formal model for Web data management that would open new horizons for the development of the Web in a well-principled way, enhancing its functionality, performance, and reliability. Specifically, the goal is to develop a universally accepted formal framework for describing complex and flexible interacting Web applications featuring notably data exchange, sharing, integration, querying, and updating. We also propose to develop formal foundations that will enable peers to concurrently reason about global data management activities, cooperate in solving specific tasks, and support services with desired quality of service. Although the proposal addresses fundamental issues, its goal is to serve as the basis for future software development for Web data management.} }
@inproceedings{ABD-webdb12, address = {Scottsdale, Arizona, USA}, month = may, year = 2012, editor = {Ives, Zachary G. and Velegrakis, Yannis}, acronym = {({W}eb{DB}'12)}, booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshop on the {W}eb and {D}atabases ({W}eb{DB}'12)}, author = {Abiteboul, Serge and Bienvenu, Meghyn and Deutch, Daniel}, title = {Deduction in the Presence of Distribution and Contradictions}, pages = {31-36}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABD-webdb12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABD-webdb12.pdf}, abstract = {We study deduction, captured by \emph{datalog}-style rules, in the presence of contradictions, captured by \emph{functional dependency} (FD) violation. We propose a simple non-deterministic semantics for datalog with FDs based on inferring facts one at a time, never violating the FDs. We present a novel \emph{proof theory} for this semantics. We also discuss a set-at-a-time semantics, where at each iteration, all facts that can be inferred are added to the database, and then choices are made between contradicting facts. We then build upon a distributed datalog idiom, namely \emph{Webdamlog}, to define a semantics for the \emph{distributed setting}. Observe that contradictions naturally arise in such a setting, with different peers having conflicting information or opinions. We study different semantics for this setting.} }
@inproceedings{AAMS-sigmod12, address = {Scottsdale, Arizona, USA}, month = may, year = 2012, publisher = {ACM Press}, editor = {Candan, K. Sel{\c{c}}uk and Chen, Yi and Snodgrass, Richard T. and Gravano, Luis and Fuxman, Ariel}, acronym = {{SIGMOD}'12}, booktitle = {{P}roceedings of the {ACM} {SIGMOD} {I}nternaitonal {C}onference on {M}anagement of {D}ata ({SIGMOD}'12)}, author = {Abiteboul, Serge and Amsterdamer, Yael and Milo, Tova and Senellart, Pierre}, title = {Auto-completion learning for~{XML}}, pages = {669-672}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AAMS-sigmod12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AAMS-sigmod12.pdf}, doi = {10.1145/2213836.2213928}, abstract = {Editing an XML document manually is a complicated task. While many XML editors exist in the market, we argue that some important functionalities are missing in all of them. Our goal is to makes the editing task simpler and faster. We~present ALEX (Auto-completion Learning Editor for~XML), an editor that assists the users by providing intelligent autocompletion suggestions. These suggestions are adapted to the user needs, simply by feeding ALEX with a set of example XML documents to learn from. The~suggestions are also guaranteed to be compliant with a given XML schema, possibly including integrity constraints. To~fulfill this challenging goal, we rely on novel, theoretical foundations by us and others, which are combined here in a system for the first time.} }
@inproceedings{ABV-icdt12, address = {Berlin, Germany}, month = mar, year = 2012, publisher = {ACM Press}, editor = {Deutsch, Alin}, acronym = {{ICDT}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'12)}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Highly expressive query languages for unordered data trees}, pages = {46-60}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt12.pdf}, doi = {10.1145/2274576.2274583}, abstract = {We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay of different factors: the expressive power of basic queries, the embedding of computation into data (as~in Active~XML), and the use of deterministic vs. nondeterministic control. All languages are Turing complete, but not necessarily query complete in the sense of Chandra and Harel. Indeed, we show that some combinations of features yield serious limitations, analogous to \(FO^{k}\) definability in the relational context. On the other hand, the limitations come with benefits such as the existence of powerful normal forms. Other languages are {"}almost{"} complete, but fall short because of subtle limitations reminiscent of the copy elimination problem in object databases.} }
@inproceedings{AADMS-icdt12, address = {Berlin, Germany}, month = mar, year = 2012, publisher = {ACM Press}, editor = {Deutsch, Alin}, acronym = {{ICDT}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'12)}, author = {Abiteboul, Serge and Amsterdamer, Yael and Deutch, Daniel and Milo, Tova and Senellart, Pierre}, title = {Finding optimal probabilistic generators for {XML} collections}, pages = {127-139}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AADMS-icdt12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AADMS-icdt12.pdf}, doi = {10.1145/2274576.2274591}, abstract = {We study the problem of, given a corpus of XML documents and its schema, finding an optimal (generative) probabilistic model, where optimality here means maximizing the likelihood of the particular corpus to be generated. Focusing first on the structure of documents, we present an efficient algorithm for finding the best generative probabilistic model, in the absence of constraints. We further study the problem in the presence of integrity constraints, namely key, inclusion, and domain constraints. We study in this case two different kinds of generators. First, we consider a continuation-test generator that performs, while generating documents, tests of schema satisfiability; these tests prevent from generating a document violating the constraints but, as we will see, they are computationally expensive. We also study a restart generator that may generate an invalid document and, when this is the case, restarts and tries again. Finally, we consider the injection of data values into the structure, to obtain a full XML document. We study different approaches for generating these values.} }
@inproceedings{AAS-icde12, address = {Washington, D.C., USA}, month = apr, year = 2012, publisher = {{IEEE} Computer Society Press}, editor = {Kementsietsidis, Anastasios and Vaz{~}Salles, Marcos Antonio}, acronym = {{ICDE}'12}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'12)}, author = {Abiteboul, Serge and Antoine, {\'E}milien and Stoyanovich, Julia}, title = {Viewing the Web as a Distributed Knowledge Base}, pages = {1-4}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AAS-icde12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AAS-icde12.pdf}, doi = {10.1109/ICDE.2012.150}, abstract = {This papers addresses the challenges faced by everyday Web users, who interact with inherently heterogeneous and distributed information. Managing such data is currently beyond the skills of casual users. We describe ongoing work that has as its goal the development of foundations for declarative distributed data management. In this approach, we see the Web as a knowledge base consisting of distributed logical facts and rules. Our objective is to enable automated reasoning over this knowledge base, ultimately improving the quality of service and of data. For this, we use Webdamlog, a Datalog-style language with rule delegation. We outline ongoing efforts on the WebdamExchange platform that combines Webdamlog evaluation with communication and security protocols.} }
@inproceedings{SA-dl12, address = {Rome, Italy}, month = jun, year = 2012, volume = 846, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Kazakov, Yevgeny and Lembo, Domenico and Wolter, Frank }, acronym = {{DL}'12}, booktitle = {{P}roceedings of the 2012 {I}nternational {W}orkshop {D}escription {L}ogic ({DL}'09)}, author = {Abiteboul, Serge}, title = {Viewing the Web as a Distributed Knowledge Base}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-dl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-dl12.pdf} }
@inproceedings{SA-csl12, address = {Fontainebleau, France}, month = sep, year = 2012, volume = 16, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {C{\'e}gielski, Patrick and Durand, Arnaud}, acronym = {{CSL}'12}, booktitle = {{P}roceedings of the 21st {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'12)}, author = {Abiteboul, Serge}, title = {Sharing Distributed Knowledge on the Web (Invited Talk)}, pages = {6-8}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-csl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-csl12.pdf}, doi = {10.4230/LIPIcs.CSL.2012.6}, abstract = {To share information, we propose to see the Web as a knowledge base consisting of distributed logical facts and rules. Our objective is to help Web users finding information, as well as controlling their own, using automated reasoning over this knowledge base towards improving the quality of service and of data. For this, we introduce Webdamlog, a Datalog-style language with rule delegation. We~mention the implementation of a system to support this language as well as standard communications and security protocols.} }
@article{ABV-tods12, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Comparing workflow specification languages: A~matter of views}, volume = 37, number = {2:10}, nopages = {}, year = 2012, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-tods12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-tods12.pdf}, doi = {10.1145/2188349.2188352}, abstract = {We address the problem of comparing the expressiveness of workflow specification formalisms using a notion of view of a workflow. Views allow to compare widely different workflow systems by mapping them to a common representation capturing the observables relevant to the comparison. Using this framework, we compare the expressiveness of several workflow specification mechanisms, including automata, temporal constraints, and pre-and-post conditions, with XML and relational databases as underlying data models. One surprising result shows the considerable power of static constraints to simulate apparently much richer workflow control mechanisms.} }
@article{BSS-lmcs12, journal = {Logical Methods in Computer Science}, author = {Boja{\'n}czyk, Miko{\l}aj and Segoufin, Luc and Straubing, Howard}, title = {Piecewise testable tree languages}, volume = 8, number = {3:26}, nopages = {}, year = 2012, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BSS-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BSS-lmcs12.pdf}, doi = {10.2168/LMCS-8(3:26)2012}, abstract = {This paper presents a decidable characterization of tree languages that can be defined by a boolean combination of \(\Sigma_{1}\) sentences. This is a tree extension of the Simon theorem, which says that a string language can be defined by a boolean combination of \(\Sigma_{1}\) sentences if and only if its syntactic monoid is \(\mathcal{J}\)-trivial.} }
@article{AMSS-siamjc12, publisher = {SIAM}, journal = {SIAM Journal on Computing}, author = {Anderson, Matthew and van Melkebeek, Dieter and Schweikardt, Nicole and Segoufin, Luc}, title = {Locality from Circuit Lower Bounds}, volume = 41, number = 6, pages = {1481-1523}, year = {2012}, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-siamjc12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-siamjc12.pdf}, doi = {10.1137/110856873}, abstract = {We study the locality of an extension of first-order logic that captures graph queries computable in \(\textsf{AC}^{0}\), i.e., by families of polynomial-size constant-depth circuits. The extension considers first-order formulas over relational structures which may use arbitrary numerical predicates in such a way that their truth value is independent of the particular interpretation of the numerical predicates. We refer to such formulas as Arb-invariant first-order. We consider the two standard notions of locality, Gaifman and Hanf locality. Our main result gives a Gaifman locality theorem: An Arb-invariant first-order formula cannot distinguish between two tuples that have the same neighborhood up to distance \((\log n)^{c}\), where \(n\) represents the number of elements in the structure and \(c\) is a constant depending on the formula. When restricting attention to string structures, we achieve the same quantitative strength for Hanf locality. In both cases we show that our bounds are tight. We also present an application of our results to the study of regular languages. Our proof exploits the close connection between first-order formulas and the complexity class \(\textsf{AC}^{0}\) and hinges on the tight lower bounds for parity on constant-depth circuits.} }
@inproceedings{CB-post13, address = {Rome, Italy}, month = mar, year = 2013, volume = {7796}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Basin, David and Mitchell, John}, acronym = {{POST}'13}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'13)}, author = {Cheval, Vincent and Blanchet, Bruno}, title = {Proving More Observational Equivalences with ProVerif}, pages = {226-246}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CB-post13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CB-post13.pdf}, doi = {10.1007/978-3-642-36830-1_12}, abstract = {This paper presents an extension of the automatic protocol verifier ProVerif in order to prove more observational equivalences. ProVerif can prove observational equivalence between processes that have the same structure but differ by the messages they contain. In order to extend the class of equivalences that ProVerif handles, we extend the language of terms by defining more functions (destructors) by rewrite rules. In particular, we allow rewrite rules with inequalities as side-conditions, so that we can express tests {"}if then else{"} inside terms. Finally, we provide an automatic procedure that translates a process into an equivalent process that performs as many actions as possible inside terms, to allow ProVerif to prove the desired equivalence. These extensions have been implemented in ProVerif and allow us to automatically prove anonymity in the private authentication protocol by Abadi and Fournet.} }
@inproceedings{CD-post13, address = {Rome, Italy}, month = mar, year = 2013, volume = {7796}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Basin, David and Mitchell, John}, acronym = {{POST}'13}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'13)}, author = {Chr{\'e}tien, R{\'e}my and Delaune, St{\'e}phanie}, title = {Formal analysis of privacy for routing protocols in mobile ad~hoc networks}, pages = {1-20}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-post13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-post13.pdf}, doi = {10.1007/978-3-642-36830-1_1}, abstract = {Routing protocols aim at establishing a route between distant nodes in ad hoc networks. Secured versions of routing protocols have been proposed to provide more guarantees on the resulting routes, and some of them have been designed to protect the privacy of the users. In this paper, we propose a framework for analysing privacy-type properties for routing protocols. We use a variant of the applied-pi calculus as our basic modelling formalism. More precisely, using the notion of equivalence between traces, we formalise three security properties related to privacy, namely indistinguishability, unlinkability, and anonymity. We study the relationship between these definitions and we illustrate them using two versions of the ANODR routing protocol.} }
@phdthesis{benzina-phd2012, author = {Benzina, Hedi}, title = {Enforcing Virtualized Systems Security}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-these12.pdf} }
@phdthesis{balaguer-phd2012, author = {Balaguer, Sandie}, title = {La concurrence dans les syst{\`e}mes distribu{\'e}s temps-r{\'e}el}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/balaguer-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/balaguer-these12.pdf} }
@book{SA-bookCDF, author = {Abiteboul, Serge}, title = {Sciences des donn{\'e}es: De la logique du premier ordre {\`a} la Toile}, publisher = {Fayard}, year = {2012}, series = {Le{\c{c}}ons inaugurales du {C}oll{\`e}ge de {F}rance} }
@article{BFHR-icomp13, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Haddad, Serge and Rosa{-}Velardo, Fernando}, title = {Ordinal Theory for Expressiveness of Well-Structured Transition Systems}, year = 2013, month = mar, volume = 224, pages = {1-22}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHR-icomp12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHR-icomp12.pdf}, doi = {10.1016/j.ic.2012.11.003}, abstract = {We characterize the importance of resources (like counters, channels, or alphabets) when measuring the expressiveness of Well-Structured Transition Systems~(WSTS). We establish, for usual classes of well partial orders, the equivalence between the existence of order reflections (non-monotonic order embeddings) and the simulations with respect to coverability languages. We show that the non-existence of order reflections can be proved by the computation of order types. This allows us to extend the current classification of WSTS, in particular solving some open problems, and to unify the existing proofs.} }
@article{BCHLR-tcs13, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {B{\'e}rard, B{\'e}atrice and Cassez, Franck and Haddad, Serge and Lime, Didier and Roux, Olivier~H.}, title = {The Expressive Power of Time {P}etri Nets}, year = 2013, month = feb, volume = 474, ftturenumber = {}, pages = {1-20}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHLR-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHLR-tcs12.pdf}, doi = {10.1016/j.tcs.2012.12.005}, abstract = {We investigate expressiveness questions for time Petri nets (TPNs) and some their most usefull extensions. We first introduce generalised time Petri nets (GTPNs) as an abstract model that encompasses variants of TPNs such as self modifications and read, reset and inhibitor arcs.\par We give a syntactical translation from bounded GTPNs to timed automata (TA) that generates isomorphic transition systems. We prove that the class of bounded GTPNs is stricly less expressive than TA w.r.t. weak timed bisimilarity. We prove that bounded GTPNs, bounded TPNs and TA are equally expressive w.r.t. timed language acceptance. Finally, we characterise a syntactical subclass of TA that is equally expressive to bounded GTPNs {"}\`a~la Merlin{"} w.r.t. weak timed bisimilarity. These results provide a unified comparison of the expressiveness of many variants of timed models often used in practice. It leads to new important results for TPNs. Among them are: 1-safe TPNs and bounded-TPNs are equally expressive; \(\epsilon\)-transitions strictly increase the expressive power of TPNs; self modifying nets as well as read, inhibitor and reset arcs do not add expressiveness to bounded TPNs.} }
@techreport{rr-lsv-12-25, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Revol, Bertrand and Soulat, Romain}, title = {Correct-by-Design Control of 5-level and 7-level Power Converters}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = dec, type = {Research Report}, number = {LSV-12-25}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-25.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-25.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-25-v1.pdf, 20121205}, note = {8~pages}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. The state of the system is not guaranteed to stay within the limits that are admissible for its correct electrical behavior. We show here how to apply a formal method in order to synthesise a correct-by-design control that guarantees that the power converter will always stay within a predened safe zone of variations for its input parameters. Our method nds local invariants by decomposing the safety space into smaller zones. The method is applied in order to synthesize correct-by-design controls for a 5-level and 7-level power converters. We check the validity of our approach by numerical simulations and physical experimentations done with a prototype built by SATIE laboratory.} }
@techreport{rr-lsv-12-24, author = {Fribourg, Laurent and Soulat, Romain}, title = {Controlled Recurrent Subspaces for Sampled Switched Linear Systems}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = dec, type = {Research Report}, number = {LSV-12-24}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-24.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-24.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-24-v1.pdf, 20121205}, note = {11~pages}, abstract = {Sampled switched linear systems are governed by piecewise linear dynamics that are periodically sampled with a given period~\(\tau\). At each sampling time, the {"}mode{"} of the system, i.e., the parameters of the linear dynamics, are switched according to a control rule. We give here a procedure for showing that a given area~\(R\) of the state space has a {"}\(k\)-recurrent decomposition: such a decomposition induces a control that makes every trajectory starting from~\(R\) go back to~\(R\) within at most \(k\) steps (i.e, \(k\tau\)\ time). We can then determine an extended zone that contains all the trajectories issued from~\(R\); this allows us to check safety properties of the system. We show the practical interest of our approach on several examples of the literature. We also give a geometrical condition on~\(R\) that ensures the existence of a \(k\)-recurrent decomposition.} }
@techreport{rr-lsv-12-23, author = {Vester, Steen}, title = {Symmetric {N}ash equilibria}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = dec, type = {Research Report}, number = {LSV-12-23}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-23.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-23.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-23-v1.pdf, 20121204}, note = {51~pages} }
@mastersthesis{m2-chretien, author = {Chr{\'e}tien, R{\'e}my}, title = {Trace equivalence of protocols for an unbounded number of sessions}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2012}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-22.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-22.pdf}, note = {30~pages}, abstract = {The problem of deciding reachability for cryptographic protocols has been thoroughly studied for an unbounded number of sessions and proven to be undecidable in general. Nevertheless some fragments were shown to be decidable, either by tagging or by restricting the number of blind-copies. On the other hand, trace equivalenc has only been proven to be decidable for a bounded number of sessions. The objective of this talk is to provide the first results of decidability of trace equivalence for an unbounded number of sessions by lifting the approach followed by Comon-Lundh and Cortier to trace equivalence.\par Trace equivalence for a first class of protocols was shown undecidable under scarce restrictions one variable and symmetric encryption are indeed enough. Consequently, we restrained our class of protocols a step further by making the protocols deterministic in some sense and preventing it from disclosing secret keys. This tighter class of protocols was then shown to be decidable after reduction to an equivalence between deterministic pushdown automata.} }
@phdthesis{brenguier-phd2012, author = {Brenguier, Romain}, title = {{\'E}quilibres de {N}ash dans les Jeux Concurrents~-- {A}pplication aux Jeux Temporis{\'e}s}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/brenguier-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/brenguier-these12.pdf} }
@phdthesis{cheval-phd2012, author = {Cheval, Vincent}, title = {Automatic verification of cryptographic protocols: privacy-type properties}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cheval-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cheval-these12.pdf} }
@article{ABG-fmsd12, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Akshay, S. and Bollig, Benedikt and Gastin, Paul}, title = {Event-clock Message Passing Automata: A~Logical Characterization and an Emptiness-Checking Algorithm}, year = 2013, month = jun, volume = 42, number = {3}, pages = {262-300}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABG-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABG-fmsd12.pdf}, doi = {10.1007/s10703-012-0179-8}, abstract = {We are interested in modeling behaviors and verifying properties of systems in which time and concurrency play a crucial role. We introduce a model of distributed automata which are equipped with event clocks as in [Alur, Fix, Henzinger. Event-clock automata: A~determinizable class of timed automata. TCS 211(1-2):253-273, 1999.], which we call Event Clock Message Passing Automata (ECMPA). To describe the behaviors of such systems we use timed partial orders (modeled as message sequence charts with timing).\par Our first goal is to extend the classical B{\"u}chi-Elgot-Trakhtenbrot equivalence to the timed and distributed setting, by showing an equivalence between ECMPA and a timed extension of monadic second-order (MSO) logic. We obtain such a constructive equivalence in two different ways: (1)~by~restricting the semantics by bounding the set of timed partial orders (2)~by~restricting the timed MSO logic to its existential fragment. We next consider the emptiness problem for ECMPA, which asks if a given ECMPA has some valid timed execution. In general this problem is undecidable and we show that by considering only bounded timed executions, we can obtain decidability. We do this by constructing a timed automaton which accepts all bounded timed executions of the ECMPA and checking emptiness of this timed automaton.} }
@article{CFM-ijfcs12, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Bounded {P}arikh automata}, year = 2012, month = dec, volume = {23}, number = {8}, pages = {1691-1710}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ijfcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ijfcs12.pdf}, doi = {10.1142/S0129054112400709}, abstract = {The Parikh finite word automaton model~(PA) was introduced and studied by Klaedtke and Rue{\ss}. Here, we present some expressiveness properties of a restriction of the deterministic affine PA recently introduced, and use them as a tool to show that the bounded languages recognized by PA are the same as those recognized by deterministic PA. Moreover, this class of languages is shown equal to the class of bounded languages with a semilinear iteration set.} }
@article{CFM-rairo12, address = {Les Ulis, France}, publisher = {EDP Sciences}, journal = {RAIRO Informatique Th{\'e}orique et Applications}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Affine {P}arikh automata}, year = 2012, month = oct, volume = 46, number = 4, pages = {511-545}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-rairo12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-rairo12.pdf}, doi = {10.1051/ita/2012013}, abstract = {The Parikh finite word automaton (PA) was introduced and studied in 2003 by Klaedtke and Rue\ss. Natural variants of the PA arise from viewing a PA equivalently as an automaton that keeps a count of its transitions and semilinearly constrains their numbers. Here we adopt this view and define the affine PA, that extends the PA by having each transition induce an affine transformation on the PA registers, and the PA on letters, that restricts the PA by forcing any two transitions on the same letter to affect the registers equally. Then we report on the expressiveness, closure, and decidability properties of such PA variants. We note that deterministic PA are strictly weaker than deterministic reversal-bounded counter machines.} }
@inproceedings{CFM-dlt12, address = {Taipei, Taiwan}, month = aug, year = 2012, volume = 7410, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Yen, Hsu-Chun and Ibarra, Oscar H.}, acronym = {{DLT}'12}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'12)}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Unambiguous Constrained Automata}, pages = {239-250}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-dlt12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-dlt12.pdf}, doi = {10.1007/978-3-642-31653-1_22}, abstract = {The class of languages captured by Constrained Automata~(CA) that are unambiguous is shown to possess more closure properties than the provably weaker class captured by deterministic~CA. Problems decidable for deterministic CA are nonetheless shown to remain decidable for unambiguous CA, and testing for \emph{regularity} is added to this set of decidable problems. Unambiguous CA are then shown incomparable with deterministic reversal-bounded machines in terms of expressivity, and a \emph{deterministic} model equivalent to unambiguous CA is identified.} }
@article{BCH-fi12, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {Building Occurrence Nets from Reveals Relations}, year = 2013, month = may, volume = 123, number = 3, pages = {245-272}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-fi12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-fi12.pdf}, doi = {10.3233/FI-2013-809}, abstract = {Occurrence nets are a well known partial order model for the concurrent behavior of Petri nets. The causality and conflict relations between events, which are explicitly represented in occurrence nets, induce logical dependencies between event occurrences: the occurrence of an event~\(e\) in a run implies that all its causal predecessors also occur, and that no event in conflict with~\(e\) occurs. But these structural relations do not express all the logical dependencies between event occurrences in maximal runs: in particular, the occurrence of~\(e\) in any maximal run may imply the occurrence of another event that is not a causal predecessor of~\(e\), in that run. The \emph{reveals} relation has been introduced to express this dependency between two events. Here we generalize the reveals relation to express more general dependencies, involving more than two events, and we introduce ERL logic to express them as boolean formulas. Finally we answer the synthesis problem that arises: given an ERL formula~\(\varphi\), is there an occurrence net~\(\mathcal{N}\) such that \(\varphi\)~describes exactly the dependencies between the events of~\(\mathcal{N}\)?} }
@article{DDMM-lmcs12, journal = {Logical Methods in Computer Science}, author = {Darondeau, {\relax Ph}ilippe and Demri, St{\'e}phane and Meyer, Roland and Morvan, {\relax Ch}ristophe}, title = {{P}etri Net Reachability Graphs: Decidability Status of {FO} Properties}, volume = 8, number = {4:9}, nopages = {}, month = oct, year = 2012, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-lmcs12.pdf}, doi = {10.2168/LMCS-8(4:9)2012}, abstract = {We investigate the decidability and complexity status of model-checking problems on unlabelled reachability graphs of Petri nets by considering first-order and modal languages without labels on transitions or atomic propositions on markings. We consider several parameters to separate decidable problems from undecidable ones. Not only are we able to provide precise borders and a systematic analysis, but we also demonstrate the robustness of our proof techniques.} }
@techreport{AGL-arxiv12, author = {Adj{\'e}, Assal{\'e} and Goubault{-}Larrecq, Jean}, title = {Concrete Semantics of Programs with Non-Deterministic and Random Inputs}, year = {2012}, month = oct, type = {Research Report}, institution = {Computing Research Repository}, number = {cs.LO/1210.2605}, url = {http://arxiv.org/abs/1210.2605}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGL-arxiv12.pdf}, originalpdf = {http://arxiv.org/pdf/1210.2605}, note = {19~pages}, abstract = {This document gives semantics to programs written in a C-like programming language, featuring interactions with an external environment with noisy and imprecise data.} }
@inproceedings{BHP-simul12, address = {Lisbon, Portugal}, month = nov, year = 2012, publisher = {XPS}, editor = {Dini, Petre and Lorenz, Pascal}, acronym = {{SIMUL}'12}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {A}dvances in {S}ystem {S}imulation ({SIMUL}'12)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {Importance Sampling for Model Checking of Continuous Time {M}arkov Chains}, pages = {30-35}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-simul12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-simul12.pdf}, abstract = {Model checking real time properties on probabilistic systems requires computing transient probabilities on continuous time Markov chains. Beyond numerical analysis ability, a probabilistic framing can only be obtained using simulation. This statistical approach fails when directly applied to the estimation of very small probabilities. Here combining the uniformization technique and extending our previous results, we design a method which applies to continuous time Markov chains and formulas of a timed temporal logic. The corresponding algorithm has been implemented in our tool \textsc{cosmos}. We present experimentations on a relevant system, with drastic time reductions with respect to standard statistical model checking.} }
@misc{verydic-d2, author = {Iosif, Radu and Habermehl, Peter and Labbe, Sebastien and Lozes, {\'E}tienne and Yakobowski, Boris}, title = {Concurrent Programs with Simple Data Structures {{\slash}} Sequential Programs with Composite Data Structures}, howpublished = {Deliverable VERIDYC D~2 (ANR-09-SEGI-016)}, month = mar, year = {2012}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/veridyc-d2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/veridyc-d2.pdf} }
@inproceedings{LV-wsfm11, address = {Clermont-Ferrand, France}, year = 2012, volume = 7176, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Carbone, Marco and Petit, Jean-Marc}, acronym = {{WS-FM}'11}, booktitle = {{R}evised {S}elected {P}apers of the 8th {I}nternational {W}orkshop on {W}eb {S}ervices and {F}ormal {M}ethods ({WS}-{FM}'11)}, author = {Lozes, {\'E}tienne and Villard, Jules}, title = {Reliable Contracts for Unreliable Half-Duplex Communications}, pages = {2-16}, doi = {10.1007/978-3-642-29834-9_2}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-wsfm11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-wsfm11.pdf}, abstract = {Recent trends in formal models of web services description languages and session types focus on the asynchronicity of communications. In this paper, we study a core of these models that arose from our modelling of the Sing\# programming language, and demonstrate correspondences between Sing\# contracts, asynchronous session behaviors, and the subclass of communicating automata with two participants that satisfy the half-duplex property. This correspondence better explains the criteria proposed by Stengel and Bultan for Sing\# contracts to be reliable, and possibly indicate useful criteria for the design of WSDL. We moreover establish a polynomial-time complexity for the analysis of communication contracts under arbitrary models of asynchronicity, and we investigate the model-checking problems against LTL formulas.} }
@inproceedings{LL-fics12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = 77, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Miller, Dale and {\'E}sik, Zolt{\'a}n}, acronym = {{FICS}'12}, booktitle = {{P}roceedings of the 8th {W}orkshop on {F}ixed {P}oints in {C}omputer {S}cience ({FICS}'12)}, author = {Lange, Martin and Lozes, {\'E}tienne}, title = {Model-Checking the Higher-Dimensional Modal \(\mu\)-Calculus}, pages = {39-46}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LL-fics12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LL-fics12.pdf}, doi = {10.4204/EPTCS.77.6}, abstract = {The higher-dimensional modal \(\mu\)-calculus is an extension of the \(\mu\)-calculus in which formulas are interpreted in tuples of states of a labeled transition system. Every property that can be expressed in this logic can be checked in polynomial time, and conversely every polynomial-time decidable problem that has a bisimulation-invariant encoding into labeled transition systems can also be defined in the higher-dimensional modal \(\mu\)-calculus. We exemplify the latter connection by giving several examples of decision problems which reduce to model checking of the higher-dimensional modal \(\mu\)-calculus for some fixed formulas. This way generic model checking algorithms for the logic can then be used via partial evaluation in order to obtain algorithms for theses problems which may benefit from improvements that are well-established in the field of program verification, namely on-the-fly and symbolic techniques. The aim of this work is to extend such techniques to other fields as well, here exemplarily done for process equivalences, automata theory, parsing, string problems, and games.} }
@inproceedings{CD-lics12, address = {Dubrovnik, Croatia}, month = jun, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'12}, booktitle = {{P}roceedings of the 27th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'12)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Partial-Observation Stochastic Games: How to Win when Belief Fails}, pages = {175-184}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lics12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lics12.pdf}, doi = {10.1109/LICS.2012.28}, abstract = {We consider two-player stochastic games played on finite graphs with reachability objectives where the first player tries to ensure a target state to be visited almost-surely (i.e., with probability~\(1\)), or positively (i.e., with positive probability), no matter the strategy of the second player.\par We classify such games according to the information and the power of randomization available to the players. On the basis of information, the game can be one-sided with either (a)~player~1, or (b)~player~2 having partial observation (and the other player has perfect observation), or two-sided with (c)~both players having partial observation. On the basis of randomization, the players (a)~may not be allowed to use randomization (pure strategies), or (b)~may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c)~may use full randomization.\par Our main results for pure strategies are as follows. (1)~For one-sided games with player~1 having partial observation we show that (in contrast to full randomized strategies) belief-based (subset-construction based) strategies are not sufficient, and we present an exponential upper bound on memory both for almost-sure and positive winning strategies; we show that the problem of deciding the existence of almost-sure and positive winning strategies for player~1 is EXPTIME-complete. (2)~For one-sided games with player~2 having partial observation we show that non-elementary memory is both necessary and sufficient for both almost-sure and positive winning strategies. (3)~We~show that for the general (two-sided) case finite-memory strategies are sufficient for both positive and almost-sure winning, and at least non-elementary memory is required.\par We establish the equivalence of the almost-sure winning problems for pure strategies and for randomized strategies with actions invisible. Our equivalence result exhibits serious flaws in previous results of the literature: we show a non-elementary memory lower bound for almost-sure winning whereas an exponential upper bound was previously claimed.} }
@article{CD-tcs12, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Energy parity games}, volume = 458, year = 2012, month = nov, pages = {49-60}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tcs12.pdf}, doi = {10.1016/j.tcs.2012.07.038}, abstract = {Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objectives. Our main results are as follows: (a)~exponential memory is sufficient and may be necessary for winning strategies in energy parity games; (b)~the~problem of deciding the winner in energy parity games can be solved in \(\textsf{NP} \cap \textsf{coNP}\); and (c)~we~give an algorithm to solve energy parity by reduction to energy games. We also show that the problem of deciding the winner in energy parity games is logspace-equivalent to the problem of deciding the winner in mean-payoff parity games, which can thus be solved in \(\textsf{NP} \cap \textsf{coNP}\). As a consequence we also obtain a conceptually simple algorithm to solve mean-payoff parity games.} }
@misc{impro-D4.1, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {Concurrent semantics for timed distributed systems}, howpublished = {Deliverable ImpRo D~4.1 (ANR-2010-BLAN-0317)}, year = 2012, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d41.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d41.pdf} }
@misc{impro-D2.1, author = {Akshay, S. and B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Haar, Stefan and Haddad, Serge and Jard, Claude and Lime, Didier and Markey, Nicolas and Reynier, Pierre-Alain and Sankur, Ocan and Thierry-Mieg, Yann}, title = {Overview of Robustness in Timed Systems}, howpublished = {Deliverable ImpRo D~2.1 (ANR-2010-BLAN-0317)}, year = 2012, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d21.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d21.pdf} }
@inproceedings{KS-stm12, address = {Pisa, Italy}, month = sep, year = 2012, volume = 7783, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {J{\o}sang, Audun and Samarati, Pierangela and Petrocchi, Marinella}, acronym = {{STM}'12}, booktitle = {{R}evised {S}elected {P}apers of the 8th {W}orkshop on {S}ecurity and {T}rust {M}anagement ({STM}'12)}, author = {K{\"u}nnemann, Robert and Steel, Graham}, title = {{Y}ubi{S}ecure? Formal Security Analysis Results for the {Y}ubikey and {Y}ubi{HSM}}, pages = {257-272 }, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-stm12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-stm12.pdf}, doi = {10.1007/978-3-642-38004-4_17}, abstract = {The Yubikey is a small hardware device designed to authenticate a user against network-based services. Despite its widespread adoption (over a million devices have been shipped by Yubico to more than 20~000 customers including Google and Microsoft), the Yubikey protocols have received relatively little security analysis in the academic literature. In the first part of this paper, we give a formal model for the operation of the Yubikey one-time password (OTP) protocol. We prove security properties of the protocol for an unbounded number of fresh OTPs using a protocol analysis tool, tamarin.\par In the second part of the paper, we analyze the security of the protocol with respect to an adversary that has temporary access to the authentication server. To address this scenario, Yubico offers a small Hardware Security Module (HSM) called the YubiHSM, intended to protect keys even in the event of server compromise. We show if the same YubiHSM configuration is used both to set up Yubikeys and run the authentication protocol, then there is inevitably an attack that leaks all of the keys to the attacker. Our discovery of this attack lead to a Yubico security advisory in February 2012. For the case where separate servers are used for the two tasks, we give a configuration for which we can show using the same verification tool that if an adversary that can compromise the server running the Yubikey-protocol, but not the server used to set up new Yubikeys, then he cannot obtain the keys used to produce one-time passwords.} }
@article{BGKR-tcs12, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Berwanger, Dietmar and Gr{\"a}del, Erich and Kaiser, {\L}ukasz and Rabinovich, Roman}, title = {Entanglement and the complexity of directed graphs}, volume = 463, year = 2012, month = dec, pages = {2-25}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGKR-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGKR-tcs12.pdf}, doi = {10.1016/j.tcs.2012.07.010}, abstract = {Entanglement is a parameter for the complexity of finite directed graphs that measures to which extent the cycles of the graph are intertwined. It is defined by way of a game similar in spirit to the cops and robber games used to describe tree width, directed tree width, and hypertree width. Nevertheless, on many classes of graphs, there are significant differences between entanglement and the various incarnations of tree width.\par Entanglement is intimately related with the computational and descriptive complexity of the modal \(\mu\)-calculus. The number of fixed-point variables needed to describe a finite graph up to bisimulation is captured by its entanglement. This plays a crucial role in the proof that the variable hierarchy of the \(\mu\)-calculus is strict.\par We study complexity issues for entanglement and compare it to other structural parameters of directed graphs. One of our main results is that parity games of bounded entanglement can be solved in polynomial time. Specifically, we establish that the complexity of solving a parity game can be parametrised in terms of the minimal entanglement of subgames induced by a winning strategy.\par Furthermore, we discuss the case of graphs of entanglement two. While graphs of entanglement zero and one are very simple, graphs of entanglement two allow arbitrary nesting of cycles, and they form a sufficiently rich class for modelling relevant classes of structured systems. We provide characterisations of this class, and propose decomposition notions similar to the ones for tree width, DAG-width, and Kelly-width.} }
@inproceedings{BKL-mfcs12, address = {Bratislava, Slovakia}, month = aug, year = 2012, volume = 7464, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rovan, Branislav and Sassone, Vladimiro and Widmayer, Peter}, acronym = {{MFCS}'12}, booktitle = {{P}roceedings of the 37th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'12)}, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz and Le{\ss}enich, Simon}, title = {Solving Counter Parity Games}, pages = {160-171}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKL-mfcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKL-mfcs12.pdf}, doi = {10.1007/978-3-642-32589-2_17}, abstract = {We study a class of parity games equipped with counters that evolve according to arbitrary non-negative affine functions. These games capture several cost models for dynamic systems from the literature. We present an elementary algorithm for computing the exact value of a counter parity game, which both generalizes previous results and improves their complexity. To this end, we introduce a class of \(\omega\)-regular games with imperfect information and imperfect recall, solve them using automata-based techniques, and prove a correspondence between finite-memory strategies in such games and strategies in counter parity games.} }
@proceedings{rp2012-FLP, title = {{P}roceedings of the 6th {I}nternational {W}okshop on {R}eachability {P}roblems ({RP}'12)}, booktitle = {{P}roceedings of the 6th {I}nternational {W}okshop on {R}eachability {P}roblems ({RP}'12)}, acronym = {{RP}'12}, editor = {Finkel, Alain and Leroux, J{\'e}r{\^o}me and Potapov, Igor}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 7550, year = 2012, month = sep, address = {Bordeaux, France}, doi = {10.1007/978-3-642-33512-9}, url = {http://www.springerlink.com/content/978-3-642-33511-2/} }
@article{BDHKO-jctB12, publisher = {Elsevier Science Publishers}, journal = {Journal of Combinatorial Theory, Series~B}, author = {Berwanger, Dietmar and Dawar, Anuj and Hunter, Paul and Kreutzer, Staphan and Obdrz{\'a}lek, Jan}, title = {The {DAG}-width of directed graphs}, volume = 102, number = 4, year = 2012, month = jul, pages = {900-923}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDHKO-jctB12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDHKO-jctB12.pdf}, doi = {10.1016/j.jctb.2012.04.004}, abstract = {Tree-width is a well-known metric on undirected graphs that measures how tree-like a graph is and gives a notion of graph decomposition that proves useful in algorithm design. Tree-width can be characterised by a graph searching game where a number of cops attempt to capture a robber. We consider the natural adaptation of this game to directed graphs and show that monotone strategies in the game yield a measure, called DAG-width, that can be seen to describe how close a directed graph is to a directed acyclic graph (DAG). We also provide an associated decomposition and show how it is useful for developing algorithms on directed graphs. In particular, we show that the problem of determining the winner of a parity game is solvable in polynomial time on graphs of bounded DAG-width. We also consider the relationship between DAG-width and other connectivity measures such as directed tree-width and path-width. A consequence we obtain is that certain NP-complete problems such as Hamiltonicity and disjoint paths are polynomial-time computable on graphs of bounded DAG-width.} }
@article{FLC-rts12, publisher = {Springer}, journal = {Real-Time Systems}, author = {Faggioli, Dario and Lipari, Giuseppe and Cucinotta, Tommaso}, title = {Analysis and Implementation of the Multiprocessor Bandwidth Inheritance Protocol}, volume = {48}, number = {6}, year = {2012}, month = nov, pages = {789-825}, doi = {10.1007/s11241-012-9162-0}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FLC-rts12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FLC-rts12.pdf}, abstract = {The Multiprocessor Bandwidth Inheritance (M-BWI) protocol is an extension of the Bandwidth Inheritance (BWI) protocol for symmetric multiprocessor systems. Similar to Priority Inheritance, M-BWI lets a task that has locked a resource execute in the resource reservations of the blocked tasks, thus reducing their blocking time. The protocol is particularly suitable for open systems where different kinds of tasks dynamically arrive and leave, because it guarantees temporal isolation among independent subsets of tasks without requiring any information on their temporal parameters. Additionally, if the temporal parameters of the interacting tasks are known, it is possible to compute an upper bound to the interference suffered by a task due to other interacting tasks. Thus, it is possible to provide timing guarantees for a subset of interacting hard real-time tasks. Finally, the M-BWI protocol is neutral to the underlying scheduling policy: it can be implemented in global, clustered and semi-partitioned scheduling.\par After introducing the M-BWI protocol, in this paper we formally prove its isolation properties, and propose an algorithm to compute an upper bound to the interference suffered by a task. Then, we describe our implementation of the protocol for the LITMUS\textsuperscript{RT} real-time testbed, and measure its overhead. Finally, we compare M-BWI against FMLP and OMLP, two other protocols for resource sharing in multiprocessor systems.} }
@article{SLBC-rts12, publisher = {Springer}, journal = {Real-Time Systems}, author = {Santos, Rodrigo M. and Lipari, Giuseppe and Bini, Enrico and Cucinotta, Tommaso}, title = {On-line schedulability tests for adaptive reservations in fixed priority scheduling}, volume = {48}, number = {5}, year = {2012}, month = sep, pages = {601-634}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SLBC-rts12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SLBC-rts12.pdf}, doi = {10.1007/s11241-012-9156-y}, abstract = {Adaptive reservation is a real-time scheduling technique in which each application is associated a fraction of the computational resource (a reservation) that can be dynamically adapted to the varying requirements of the application by using appropriate feedback control algorithms. An adaptive reservation is typically implemented by using an aperiodic server (e.g. sporadic server) algorithm with fixed period and variable budget. When the feedback law demands an increase of the reservation budget, the system must run a schedulability test to check if there is enough spare bandwidth to accommodate such increase. The schedulability test must be very fast, as it may be performed at each budget update, i.e. potentially at each instance of a task; yet, it must be as efficient as possible, to maximize resource usage.\par In this paper, we tackle the problem of performing an efficient on-line schedulability test for adaptive resource reservations in fixed priority schedulers. In the literature, a number of algorithms have been proposed for on-line admission control in fixed priority systems. We describe four of these tests, with increasing complexity and performance. In addition, we propose a novel on-line test, called Spare-Pot algorithm, which has been specifically designed for the problem at hand, and which shows a good cost/performance ratio compared to the other tests.} }
@proceedings{atpn2012-HP, title = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({ICATPN}'12)}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({ICATPN}'12)}, acronym = {{ICATPN}'12}, editor = {Haddad, Serge and Pomello, Lucia}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 7347, year = 2012, month = jun, address = {Hamburg, Germany}, doi = {10.1007/978-3-642-31131-4}, url = {http://www.springer.com/978-3-642-31131-4} }
@inproceedings{FGL-pn12, address = {Hamburg, Germany}, month = jun, year = 2012, volume = 7347, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Haddad, Serge and Pomello, Lucia}, acronym = {{PETRI~NETS}'12}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'12)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {The~Theory of~{WSTS}: The~Case of Complete~{WSTS}}, pages = {3-31}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGL-atpn12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGL-atpn12.pdf}, doi = {10.1007/978-3-642-31131-4_2}, abstract = {We describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathfrak{S}\). This computes the so-called \emph{clover} of a state. When \(\mathfrak{S}\) is the completion of a WSTS~\(\mathfrak{X}\), the clover in~\(\mathfrak{S}\) is a finite description of the downward closure of the reachability set. We show that such completions are \(\infty\)-complete exactly when \(\mathfrak{X}\) is an \emph{\(\omega^{2}\)-WSTS}, a new robust class of WSTS. We show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we apply this to well-structured Presburger counter systems.} }
@inproceedings{BFP-fsttcs12, address = {Hyderabad, India}, month = dec, year = 2012, volume = 18, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D'Souza, Deepak and Radhakrishnan, Jaikumar and Telikepalli, Kavitha}, acronym = {{FSTTCS}'12}, booktitle = {{P}roceedings of the 32nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'12)}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Praveen, M.}, title = {Extending the {R}ackoff technique to affine nets}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFP-fsttcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFP-fsttcs12.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2012.301}, abstract = {We study the possibility of extending the Rackoff technique to Affine nets, which are Petri nets extended with affine functions. The Rackoff technique has been used for establishing \textsc{Expspace} upper bounds for the coverability and boundedness problems for Petri nets. We show that this technique can be extended to strongly increasing Affine nets, obtaining better upper bounds compared to known results. The possible copies between places of a strongly increasing Affine net make this extension non-trivial. One cannot expect similar results for the entire class of Affine nets since coverability is Ackermann-hard and boundedness is undecidable. Moreover, it can be proved that model checking a logic expressing generalized coverability properties is undecidable for strongly increasing Affine nets, while it is known to be \textsc{Expspace}-complete for Petri nets.} }
@article{bs-ipl12, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Berwanger, Dietmar and Serre, Olivier}, title = {Parity games on undirected graphs}, volume = 112, number = 23, year = 2012, month = dec, pages = {928-932}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bs-ipl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bs-ipl12.pdf}, doi = {10.1016/j.ipl.2012.08.021}, abstract = {We examine the complexity of solving parity games in the special case when the underlying game graph is undirected. For strictly alternating games, that is, when the game graph is bipartite between the players, we observe that the solution can be computed in linear time. In contrast, when the assumption of strict alternation is dropped, we show that the problem is as hard in the undirected case as it is in the general, directed, case.} }
@article{bbckrs-tcs12, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Baldan, Paolo and Bruni, Alessandro and Corradini, Andrea and K{\"o}nig, Barbara and Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {Efficient unfolding of contextual {P}etri nets}, volume = 449, number = 1, year = 2012, month = aug, pages = {2-22}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bbckrs-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bbckrs-tcs12.pdf}, doi = {10.1016/j.tcs.2012.04.046}, abstract = {A contextual net is a Petri net extended with read arcs, which allows transitions to check for tokens without consuming them. Contextual nets allow for better modelling of concurrent read access than Petri nets, and their unfoldings can be exponentially more compact than those of a corresponding Petri net. A constructive but abstract procedure for generating those unfoldings was proposed in previous work. However, it remained unclear whether the approach was useful in practice and which data structures and algorithms would be appropriate to implement it. Here, we address this question. We provide two concrete methods for computing contextual unfoldings, with a view to efficiency. We report on experiments carried out on a number of benchmarks. These show that not only are contextual unfoldings more compact than Petri net unfoldings, but they can be computed with the same or better efficiency, in particular with respect to alternative approaches based on encodings of contextual nets into Petri nets.} }
@inproceedings{BFKSST-crypto12, address = {Santa Barbara, California, USA}, month = aug, year = 2012, volume = 7417, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Safavi-Naini, Reihaneh and Canetti, Ran}, acronym = {{CRYPTO}'12}, booktitle = {{P}roceedings of the 32nd {A}nnual {I}nternational {C}ryptology {C}onference ({CRYPTO}'12)}, author = {Bardou, Romain and Focardi, Riccardo and Kawamoto, Yusuke and Simionato, Lorenzo and Steel, Graham and Tsay, Joe-Kai}, title = {Efficient Padding Oracle Attacks on Cryptographic Hardware}, pages = {608-625}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFKSST-crypto12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFKSST-crypto12.pdf}, doi = {10.1007/978-3-642-32009-5_36}, abstract = {We show how to exploit the encrypted key import functions of a variety of different cryptographic devices to reveal the imported key. The attacks are padding oracle attacks, where error messages resulting from incorrectly padded plaintexts are used as a side channel. In the asymmetric encryption case, we modify and improve Bleichenbacher's attack on RSA PKCS\#1v1.5 padding, giving new cryptanalysis that allows us to carry out the 'million message attack' in a mean of 49 000 and median of 14 500 oracle calls in the case of cracking an unknown valid ciphertext under a 1024 bit key (the original algorithm takes a mean of 215 000 and a median of 163 000 in the same case). We show how implementation details of certain devices admit an attack that requires only 9 400 operations on average (3 800 median). For the symmetric case, we adapt Vaudenay's CBC attack, which is already highly efficient. We demonstrate the vulnerabilities on a number of commercially available cryptographic devices, including security tokens, smartcards and the Estonian electronic ID card. The attacks are efficient enough to be practical: we give timing details for all the devices found to be vulnerable, showing how our optimisations make a qualitative difference to the practicality of the attack. We give mathematical analysis of the effectiveness of the attacks, extensive empirical results, and a discussion of countermeasures.} }
@article{GS-tocl12, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Gastin, Paul and Sznajder, Nathalie}, title = {Fair Synthesis for Asynchronous Distributed Systems}, nopages = {}, volume = 14, number = {2:9}, month = jun, year = 2013, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GS-tocl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GS-tocl12.pdf}, doi = {10.1145/2480759.2480761}, abstract = {We study the synthesis problem in an asynchronous distributed setting: a finite set of processes interact locally with an uncontrollable environment and communicate with each other by sending signals---actions controlled by a sender process and that are immediately received by the target process. The fair synthesis problem is to come up with a local strategy for each process such that the resulting fair behaviors of the system meet a given specification. We consider external specifications satisfying some natural closure properties related to the architecture. We present this new setting for studying the fair synthesis problem for distributed systems, and give decidability results for the subclass of networks where communications happen through a strongly connected graph. We claim that this framework for distributed synthesis is natural, convenient and avoids most of the usual sources of undecidability for the synthesis problem. Hence, it may open the way to a decidable theory of distributed synthesis.} }
@article{GS-ipl12, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Gastin, Paul and Sznajder, Nathalie}, title = {Decidability of well-connectedness for distributed synthesis}, pages = {963-968}, volume = {112}, number = {24}, month = dec, year = 2012, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GS-ipl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GS-ipl12.pdf}, doi = {10.1016/j.ipl.2012.08.018}, abstract = {Although the synthesis problem is often undecidable for distributed, synchronous systems, it becomes decidable for the subclass of uniformly well-connected (UWC) architectures, provided that only robust specifications are considered. It is then an important issue to be able to decide whether a given architecture falls in this class. This is the problem addressed in this paper: we establish the decidability and precise complexity of checking this property. This problem is in EXPSPACE and NP-hard in the general case, but falls into PSPACE when restricted to a natural subclass of architectures.} }
@article{BS-fmsd2012, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {Computable fixpoints in well-structured symbolic model checking}, pages = {233-267}, volume = 43, number = 2, month = oct, year = 2013, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-fmsd12.pdf}, doi = {10.1007/s10703-012-0168-y}, abstract = {We prove a general finite-time convergence theorem for fixpoint expressions over a well-quasi-ordered set. This has immediate applications for the verification of well-structured systems, where a main issue is the computability of fixpoint expressions, and in particular for game-theoretical properties and probabilistic systems where nesting and alternation of least and greatest fixpoints are common.} }
@incollection{HM-lncis433, author = {Haar, Stefan and Masopust, Tom{\'a}{\v{s}}}, title = {Languages, Decidability, and Complexity}, booktitle = {Control of Discrete-Event Systems~-- Automata and {P}etri Net Perspectives}, editor = {Seatzu, Carla and Silva, Manuel and van Schuppen, Jan H.}, year = {2013}, pages = {23-43}, publisher = {Springer}, series = {Lecture Notes in Control and Information Sciences}, volume = 433, doi = {10.1007/978-1-4471-4276-8_2}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HM-lncis433.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HM-lncis433.pdf} }
@incollection{HS-lncis433, author = {Haar, Stefan and Fabre, {\'E}ric}, title = {Diagnosis with {P}etri Net Unfoldings}, booktitle = {Control of Discrete-Event Systems~-- Automata and {P}etri Net Perspectives}, editor = {Seatzu, Carla and Silva, Manuel and van Schuppen, Jan H.}, year = {2013}, pages = {301-318}, publisher = {Springer}, series = {Lecture Notes in Control and Information Sciences}, volume = 433, doi = {10.1007/978-1-4471-4276-8_15}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HS-lncis433.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HS-lncis433.pdf} }
@inproceedings{BDF-cdc12, address = {Maui, Hawaii, USA}, month = dec, year = 2012, publisher = {{IEEE} Control System Society}, acronym = {{CDC}'12}, booktitle = {{P}roceedings of the 51st {IEEE} {C}onference on {D}ecision and {C}ontrol ({CDC}'12)}, author = {Bu{\v{s}}i{\'c}, Ana and Djafri, Hilal and Fourneau, Jean-Michel}, title = {Bounded state space truncation and censored {M}arkov chains}, pages = {5828-5833}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDF-cdc12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDF-cdc12.pdf}, doi = {10.1109/CDC.2012.6426156}, abstract = {Censored Markov chains (CMC) allow to represent the conditional behavior of a system within a subset of observed states. They provide a theoretical framework to study the truncation of a discrete-time Markov chain when the generation of the state-space is too hard or when the number of states is too large. However, the stochastic matrix of a CMC may be difficult to obtain. Dayar \emph{et~al.} (2006) have proposed an algorithm, called DPY, that computes a stochastic bounding matrix for a CMC with a smaller complexity with only a partial knowledge of the chain. We prove that this algorithm is optimal for the information they take into account. We also show how some additional knowledge on the chain can improve stochastic bounds for~CMC.} }
@article{AFS-fmsd12, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and Sproston, Jeremy}, title = {An~Extension of the Inverse Method to Probabilistic Timed Automata}, year = 2013, month = apr, volume = 42, number = 2, pages = {119-145}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-fmsd12.pdf}, doi = {10.1007/s10703-012-0169-x}, abstract = {Probabilistic timed automata can be used to model systems in which probabilistic and timing behaviour coexist. Verification of probabilistic timed automata models is generally performed with regard to a single reference valuation pi0 of the timing parameters. Given such a parameter valuation, we present a method for obtaining automatically a constraint~\(K_0\) on timing parameters for which the reachability probabilities (1)~remain invariant and (2)~are equal to the reachability probabilities for the reference valuation. The method relies on parametric analysis of a non-probabilistic version of the probabilistic timed automata model using the {"}inverse method{"}. The method presents the following advantages. First, since \(K_0\) corresponds to a dense domain around pi0 on which the system behaves uniformly, it gives us a measure of robustness of the system. Second, it allows us to obtain a valuation satisfying \(K_0\) which is as small as possible while preserving reachability probabilities, thus making the probabilistic analysis of the system easier and faster in practice. We provide examples of the application of our technique to models of randomized protocols, and introduce an extension of the method allowing the generation of a {"}probabilistic cartography{"} of a system.} }
@inproceedings{jks-ifiptcs12, address = {Amsterdam, The Netherlands}, month = sep, year = 2012, volume = {7604}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baeten, Jos and Ball, Tom and de~Boer, Frank}, acronym = {{IFIP~TCS}'12}, booktitle = {{P}roceedings of the 7th {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({IFIP~TCS}'12)}, author = {Jan\v{c}ar, Petr and Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {Unidirectional channel systems can be tested}, pages = {149-163}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-ifiptcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-ifiptcs12.pdf}, doi = {10.1007/978-3-642-33475-7_11}, abstract = {{"}Unidirectional channel systems{"} (Chambart~\& Schnoebelen, CONCUR~2008) are systems where one-way communication from a sender to a receiver goes via one reliable and one unreliable (unbounded fifo) channel. Equipping these systems with the possibility of testing regular properties on the contents of channels makes verification undecidable. Decidability is preserved when only emptiness and nonemptiness tests are considered: the proof relies on a series of reductions eventually allowing us to take advantage of recent results on Post's Embedding Problem.} }
@techreport{rr-lsv-12-16, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Revol, Bertrand and Soulat, Romain}, title = {Numerical simulation and physical experimentation of a 5-level and 7-level power converter under a control designed by a formal method}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = jul, type = {Research Report}, number = {LSV-12-16}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-16.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-16.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-16-v1.pdf, 20120727}, note = {18~pages}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. There is no formal guarantee of correctness in zones around nominal values. In [3], we have applied a backward-oriented formal method to guarantee the good behavior of the systems within predefined zones of variations for the input parameters. Here, for numerical stability reasons, we choose to use a forward-oriented method. We apply this method to a 5-level and 7-level power converters. We check the correctness of our approach by numerical simulations and physical experimentations.} }
@article{AGG-lmcs12, journal = {Logical Methods in Computer Science}, author = {Adj{\'e}, Assal{\'e} and Gaubert, St{\'e}phane and Goubault, {\'E}ric}, title = {Coupling policy iteration with semi-definite relaxation to compute accurate numerical invariants in static analysis}, year = 2012, month = jan, volume = {8}, number = {1:1}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGG-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGG-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:01)2012}, abstract = {We introduce a new domain for finding precise numerical invariants of programs by abstract interpretation. This domain, which consists of level sets of non-linear functions, generalizes the domain of linear {"}templates{"} introduced by Manna, Sankaranarayanan, and Sipma. In the case of quadratic templates, we use Shor's semi-definite relaxation to derive computable yet precise abstractions of semantic functionals, and we show that the abstract fixpoint equation can be solved accurately by coupling policy iteration and semi-definite programming. We demonstrate the interest of our approach on a series of examples (filters, integration schemes) including a degenerate one (symplectic scheme).} }
@article{Fig-lmcs12, journal = {Logical Methods in Computer Science}, author = {Figueira, Diego}, title = {Alternating register automata on finite words and trees}, year = 2012, volume = {8}, number = {1:22}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:22)2012}, abstract = {We study alternating register automata on data words and data trees in relation to logics. A data word (resp. data tree) is a word (resp. tree) whose every position carries a label from a finite alphabet and a data value from an infinite domain. We investigate one-way automata with alternating control over data words or trees, with one register for storing data and comparing them for equality. This is a continuation of the study started by Demri, Lazi{\'c} and Jurdzi{\'n}ski. From the standpoint of register automata models, this work aims at two objectives: (1)~simplifying the existent decidability proofs for the emptiness problem for alternating register automata; and (2)~exhibiting decidable extensions for these models. From the logical perspective, we show that (a)~in~the case of data words, satisfiability of LTL with one register and quantification over data values is decidable; and (b)~the~satisfiability problem for the so-called forward fragment of XPath on XML documents is decidable, even in the presence of DTDs and even of key constraints. The decidability is obtained through a reduction to the automata model introduced. This fragment contains the child, descendant, next-sibling and following-sibling axes, as well as data equality and inequality tests.} }
@article{BFLZ-lmcs12, journal = {Logical Methods in Computer Science}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Zeitoun, Marc}, title = {Model Checking Vector Addition Systems with one zero-test}, year = 2012, volume = {8}, number = {2:11}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLZ-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLZ-lmcs12.pdf}, doi = {10.2168/LMCS-8(2:11)2012}, abstract = {We design a variation of the Karp-Miller algorithm to compute, in a forward manner, a finite representation of the cover (i.e., the downward closure of the reachability set) of a vector addition system with one zero-test. This algorithm yields decision procedures for several problems for these systems, open until now, such as place-boundedness or LTL model-checking. The proof techniques to handle the zero-test are based on two new notions of cover: the refined and the filtered cover. The refined cover is a hybrid between the reachability set and the classical cover. It inherits properties of the reachability set: equality of two refined covers is undecidable, even for usual Vector Addition Systems (with no zero-test), but the refined cover of a Vector Addition System is a recursive set. The second notion of cover, called the filtered cover, is the central tool of our algorithms. It inherits properties of the classical cover, and in particular, one can effectively compute a finite representation of this set, even for Vector Addition Systems with one zero-test.} }
@phdthesis{lozes-HDR12, author = {Lozes, {\'E}tienne}, title = {Separation Logic: Expressiveness and Copyless Message-Passing}, year = 2012, month = jul, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-el12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-el12.pdf} }
@techreport{rr-lsv-12-14, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Lefebvre, St{\'e}phane and Revol, Bertrand and Soulat, Romain}, title = {Control of Multilevel Power Converters using Formal Methods}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = jun, type = {Research Report}, number = {LSV-12-14}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-14.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-14.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-14-v1.pdf, 20120626}, note = {14~pages}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. There is no formal guarantee of correctness in zones around nominal values. It is therefore interesting to apply formal methods to guarantee the good behavior of the systems within predefined zones of variations for the input parameters. As far as we know, such formal methods have been applied only to small electronic power devices (like DC-DC boost converters) containing one switching cell. We show in this paper that one can apply formal methods to more complicated systems, such as multi-level converters containing several pairs of switching cells.} }
@inproceedings{GM-ciaa12, address = {Porto, Portugal}, month = jul, year = 2012, volume = {7381}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Moreira, Nelma and Reis, Rog{\'e}rio}, acronym = {{CIAA}'12}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'12)}, author = {Gastin, Paul and Monmege, Benjamin}, title = {Adding Pebbles to Weighted Automata}, pages = {28-51}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-ciaa12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-ciaa12.pdf}, doi = {10.1007/978-3-642-31606-7_4}, abstract = {We extend weighted automata and weighted rational expressions with 2-way moves and (reusable) pebbles. We show with examples from natural language modeling and quantitative model-checking that weighted expressions and automata with pebbles are more expressive and allow much more natural and intuitive specifications than classical ones.\par We extend Kleene-Sch{\"u}tzenberger theorem showing that weighted expressions and automata with pebbles have the same expressive power. We focus on an efficient translation from expressions to automata.\par We also prove that the evaluation problem for weighted automata can be done very efficiently if the number of (reusable) pebbles is low.} }
@inproceedings{BGMZ-atva12, address = {Thiruvananthapuram, India}, month = oct, year = {2012}, volume = {7561}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mukund, Madhavan and Chakraborty, Supratik}, acronym = {{ATVA}'12}, booktitle = {{P}roceedings of the 10th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'12)}, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {A Probabilistic {K}leene Theorem}, pages = {400-415}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-atva12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-atva12.pdf}, doi = {10.1007/978-3-642-33386-6_31}, abstract = {We provide a Kleene Theorem for (Rabin) probabilistic automata over finite words. Probabilistic automata generalize deterministic finite automata and assign to a word an acceptance probability. We provide probabilistic expressions with probabilistic choice, guarded choice, concatenation, and a star operator. We prove that probabilistic expressions and probabilistic automata are expressively equivalent. Our result actually extends to two-way probabilistic automata with pebbles and corresponding expressions.} }
@phdthesis{djafri-phd2011, author = {Djafri, Hilal}, title = {Approches num{\'e}riques et statistiques pour le model checking des processus stochastiques}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/djafri-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/djafri-these11.pdf} }
@inproceedings{CD-aiml12, address = {Copenhagen, Denmark}, month = aug, year = 2012, publisher = {College Publications}, editor = {Bolander, Thomas and Bra{\"u}ner, Torben and Ghilardi, Silvio and Moss, Lawrence}, acronym = {{AiML}'12}, booktitle = {{S}elected {P}apers from the 9th {W}orkshop on {A}dvances in {M}odal {L}ogics ({AiML}'12)}, author = {Carreiro, Facundo and Demri, St{\'e}phane}, title = {Beyond Regularity for {P}resburger Modal Logics}, pages = {161-182}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-aiml12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-aiml12.pdf}, abstract = {Satisfiability problem for modal logic~K with quantifier-free Presburger and regularity constraints~(EML) is known to be pspace-complete. In this paper, we consider its extension with nonregular constraints, and more specifically those expressed by visibly pushdown languages~(VPL). This class of languages behaves nicely, in particular when combined with Propositional Dynamic Logic~(PDL). By extending EML, we show that decidability is preserved if we allow at most one positive VPL-constraint at each modal depth. However, the presence of two VPL-contraints or the presence of a negative occurrence of a single VPL-constraint leads to undecidability. These results contrast with the decidability of PDL augmented with VPL-constraints.} }
@inproceedings{PHL-tap12, address = {Prague, Czech Republic}, month = may # {-} # jun, year = 2012, volume = 7305, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Brucker, Achim D. and Julliand, Jacques}, acronym = {{TAP}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {T}ests and {P}roofs ({TAP}'12)}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and Longuet, Delphine}, title = {Conformance Relations for Labeled Event Structures}, pages = {83-98}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-tap12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-tap12.pdf}, doi = {10.1007/978-3-642-30473-6_8}, abstract = {We propose a theoretical framework for testing concurrent systems from true concurrency models like Petri nets or networks of automata. The underlying model of computation of such formalisms are labeled event structures, which allow to represent concurrency explicitly. The activity of testing relies on the definition of a conformance relation that depends on the observable behaviors on the system under test, which is given for sequential systems by ioco type relations. However, these relations are not capable of capturing and exploiting concurrency of non sequential behavior. We~study different conformance relations for labeled event structures, relying on different notions of observation, and investigate their properties and connections.} }
@inproceedings{HSS-lics2012, address = {Dubrovnik, Croatia}, month = jun, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'12}, booktitle = {{P}roceedings of the 27th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'12)}, author = {Haddad, Serge and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {The Ordinal-Recursive Complexity of Timed-Arc {P}etri Nets, Data Nets, and Other Enriched Nets}, pages = {355-364}, url = {http://hal.archives-ouvertes.fr/hal-00793811}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HSS-lics12.pdf}, doi = {10.1109/LICS.2012.46}, abstract = {We show how to reliably compute fast-growing functions with timed-arc Petri nets and data nets. This construction provides ordinal-recursive lower bounds on the complexity of the main decidable properties (safety, termination, regular simulation,~etc.) of these models. Since these new lower bounds match the upper bounds that one can derive from wqo theory, they precisely characterise the computational power of these so-called {"}enriched{"} nets.} }
@inproceedings{DDS-ijcar12, address = {Manchester, UK}, month = jun, year = 2012, volume = {7364}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Gramlich, Bernhard and Miller, Dale and Sattler, Uli}, acronym = {{IJCAR}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'12)}, author = {Demri, St{\'e}phane and Dhar, Amit Kumar and Sangnier, Arnaud}, title = {Taming Past {LTL} and Flat Counter Systems}, pages = {179-193}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-ijcar12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-ijcar12.pdf}, doi = {10.1007/978-3-642-31365-3_16}, abstract = {Reachability and LTL model-checking problems for flat counter systems are known to be decidable but whereas the reachability problem can be shown in NP, the best known complexity upper bound for the latter problem is made of a tower of several exponentials. Herein, we show that the problem is only NP-complete even if LTL admits past-time operators and arithmetical constraints on counters. Actually, the NP upper bound is shown by adequately combining a new stuttering theorem for Past LTL and the property of small integer solutions for quantifier-free Presburger formulae. Other complexity results are proved, for instance for restricted classes of flat counter systems.} }
@inproceedings{RS-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {Verification of {P}etri Nets with Read Arcs}, pages = {471-485}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_33}, abstract = {Recent work studied the unfolding construction for contextual nets, i.e. nets with read arcs. Such unfoldings are more concise and can usually be constructed more efficiently than for Petri nets. However, concrete verification algorithms exploiting these advantages were lacking so far. We address this question and propose SAT-based verification algorithms for deadlock and reachability of contextual nets. Moreover, we study optimizations of the SAT encoding and report on experiments.} }
@inproceedings{CGN-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Cyriac, Aiswarya and Gastin, Paul and Narayan Kumar, K.}, title = {{MSO} Decidability of Multi-Pushdown Systems via Split-Width}, pages = {547-561}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CGN-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CGN-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_38}, abstract = {Multi-threaded programs with recursion are naturally modeled as multi-pushdown systems. The behaviors are represented as multiply nested words (MNWs), which are words enriched with additional binary relations for each stack matching a push operation with the corresponding pop operation. Any MNW can be decomposed by two basic and natural operations: shuffle of two sequences of factors and merge of consecutive factors of a sequence. We say that the split-width of a MNW is~\(k\) if it admits a decomposition where the number of factors in each sequence is at most~\(k\). The MSO theory of MNWs with split-width~\(k\) is decidable. We introduce two very general classes of MNWs that strictly generalize known decidable classes and prove their MSO decidability via their split-width and obtain comparable or better bounds of tree-width of known classes.} }
@inproceedings{BGS-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Brenguier, Romain and G{\"o}ller, Stefan and Sankur, Ocan}, title = {A~Comparison of Succinctly Represented Finite-State Systems}, pages = {147-161}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_12}, abstract = {We study the succinctness of different classes of succinctly presented finite transition systems with respect to bisimulation equivalence. Our results show that synchronized product of finite automata, hierarchical graphs, and timed automata are pairwise incomparable in this sense. We moreover study the computational complexity of deciding simulation preorder and bisimulation equivalence on these classes.} }
@inproceedings{BHSS-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu and Sznajder, Nathalie}, title = {Concurrent Games on~{VASS} with Inhibition}, pages = {39-52}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHSS-CONCUR12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHSS-CONCUR12.pdf}, doi = {10.1007/978-3-642-32940-1_5}, abstract = {We propose to study concurrent games on a new extension of Vector Addition Systems with States, where inhibition conditions are added for modeling purposes. Games are a well-suited framework to solve control problems, and concurrent semantics reflect realistic situations where the environment can always produce a move before the controller, although it is never required to do so. This is in contrast with previous works, which focused mainly on turn-based semantics. Moreover, we consider asymmetric games, where environment and controller do not have the same capabilities, although they both have restricted power. In this setting, we investigate reachability and safety objectives, which are not dual to each other anymore, and we prove that (i)~reachability games are undecidable for finite targets, (ii)~they are 2-EXPTIME-complete for upward-closed targets and (iii)~safety games are co-NP-complete for finite, upward-closed and semi-linear targets. Moreover, for the decidable cases, we build a finite representation of the corresponding controllers.} }
@inproceedings{BC-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas}, title = {Avoiding Shared Clocks in Networks of Timed Automata}, pages = {100-114}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_9}, abstract = {Networks of timed automata~(NTA) are widely used to model distributed real-time systems. Quite often in the literature, the automata are allowed to share clocks. This is a problem when one considers implementing such model in a distributed architecture, since reading clocks a priori requires communications which are not explicitly described in the model. We focus on the following question: given a NTA \(A_{1} \parallel A_{2}\) where \(A_{2}\) reads some clocks reset by~\(A_{1}\), does there exist a NTA \(A'_{1} \parallel A'_{2}\) without shared clocks with the same behavior as the initial NTA? For this, we allow the automata to exchange information during synchronizations only. We discuss a formalization of the problem and give a criterion using the notion of contextual timed transition system, which represents the behavior of~\(A_{2}\) when in parallel with~\(A_{1}\). Finally, we effectively build \(A'_{1} \parallel A'_{2}\) when it exists.} }
@inproceedings{DLM-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Da{~}Costa, Arnaud and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {Quantified {CTL}: expressiveness and model checking}, pages = {177-192}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_14}, abstract = {While it was defined long ago, the extension of CTL with quantification over atomic propositions has never been studied extensively. Considering two different semantics (depending whether propositional quantification refers to the Kripke structure or to its unwinding tree), we study its expressiveness (showing in particular that QCTL coincides with Monadic Second-Order Logic for both semantics) and characterize the complexity of its model-checking problem, depending on the number of nested propositional quantifiers (showing that the structure semantics populates the polynomial hierarchy while the tree semantics populates the exponential hierarchy). We also show how these results apply to model checking ATL-like temporal logics for games.} }
@inproceedings{FLMS-time12, address = {Leicester, UK}, month = sep, year = 2012, publisher = {{IEEE} Computer Society Press}, editor = {Reynolds, Mark and Terenziani, Paolo and Moszkowski, Ben}, acronym = {{TIME}'12}, booktitle = {{P}roceedings of the 19th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'12)}, author = {Fribourg, Laurent and Lesens, David and Moro, Pierre and Soulat, Romain}, title = {Robustness Analysis for Scheduling Problems using the Inverse Method}, pages = {73-80}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FLMS-time12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FLMS-time12.pdf}, doi = {10.1109/TIME.2012.10}, abstract = {Given a Parametric Timed Automaton (PTA)~\(\mathcal{A}\) and a tuple~\(\pi_{0}\) of reference valuations for timings, the \emph{Inverse Method~(IM)} synthesizes a constraint around~\(\pi_{0}\) where \(\mathcal{A}\) behaves in the same time-abstract manner. This provides us with a quantitative measure of robustness of the behavior of~\(\mathcal{A}\) around~\(\pi_{0}\). We~show in this paper how \textit{IM} can be applied in a specific way to treat the robustness of scheduling systems. We also explain how to use the method in order to synthesize large zones of the timing parameter space where the system is guaranteed to be schedulable. We illustrate the method on several examples of the literature as well as a case study originating from an industrial design project.} }
@inproceedings{AFKS12, address = {Paris, France}, month = aug, year = 2012, volume = {7436}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Giannakopoulou, Dimitra and M{\'e}ry, Dominique}, acronym = {{FM}'12}, booktitle = {{P}roceedings of the 18th {I}nternational {S}ymposium on {F}ormal {M}ethods ({FM}'12)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and K{\"u}hne, Ulrich and Soulat, Romain}, title = {{IMITATOR}~2.5: A~Tool for Analyzing Robustness in Scheduling Problems}, pages = {33-36}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFKS-fm12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFKS-fm12.pdf}, doi = {10.1007/978-3-642-32759-9_6}, abstract = {The tool \textsc{Imitator} implements the \emph{Inverse Method~(IM)} for Timed Automata~(TAs). Given a TA~\(\mathcal{A}\) and a tuple~\(\pi_{0}\) of reference valuations for timings, \textit{IM} synthesizes a constraint around~\(\pi_{0}\) where \(\mathcal{A}\) behaves in the same discrete manner. This provides us with a quantitative measure of robustness of the behavior of~\(\mathcal{A}\) around~\(\pi_{0}\). The new version \textsc{Imitator}~2.5 integrates the new features of stopwatches (in~addition to standard clocks) and updates (in addition to standard clock resets), as well as powerful algorithmic improvements for state space reduction. These new features make the tool well-suited to analyze the robustness of solutions in several classes of preemptive scheduling problems.} }
@inproceedings{AMH-safep12, address = {Mexico City, Mexico}, month = aug, year = 2012, publisher = {IFAC}, acronym = {{SAFEPROCESS}'12}, booktitle = {{P}roceedings of the 8th {IFAC} {S}ymposium on {F}ault {D}etection, {S}upervision and {S}afety for {T}echnical {P}rocesses ({SAFEPROCESS}'12)}, author = {Agarwal, Anoopam and Madalinski, Agnes and Haar, Stefan}, title = {Effective Verification of Weak Diagnosability}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMH-safep12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMH-safep12.pdf}, doi = {10.3182/20120829-3-MX-2028.00083}, abstract = {The \emph{diagnosability} problem can be stated as follows: does a given labeled Discrete Event System allow for an outside observer to determine the occurrence of the {"}invisible{"} fault, no later than a bounded number of events after that unobservable occurrence, and based on the partial observation of the behaviour? When this problem is investigated in the context of concurrent systems, partial order semantics induces a separation between classical or strong diagnosability on the one hand, and \emph{weak diagnosability} on the other hand. The present paper presents the first solution for checking weak diagnosability, via a \emph{verifier} construction.} }
@inproceedings{BBJM-qest12, address = {London, UK}, month = sep, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'12}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'12)}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Jurdzi{\'n}ski, Marcin and Menet, Quentin}, title = {Almost-Sure Model-Checking of Reactive Timed Automata}, pages = {138-147}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBJM-qest12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBJM-qest12.pdf}, doi = {10.1109/QEST.2012.10}, abstract = {We consider the model of stochastic timed automata, a model in which both delays and discrete choices are made probabilistically. We are interested in the almost-sure model-checking problem, which asks whether the automaton satisfies a given property with probability~\(1\). While this problem was shown decidable for single-clock automata few years ago, it was also proven that the algorithm for this decidability result could not be used for general timed automata. In this paper we describe the subclass of reactive timed automata, and we prove decidability of the almost-sure model-checking problem under that restriction. Decidability relies on the fact that this model is almost-surely fair. As a desirable property of real systems, we show that reactive automata are almost-surely non-Zeno. Finally we show that the almost-sure model-checking problem can be decided for specifications given as deterministic timed automata.} }
@inproceedings{BLM-qest12, address = {London, UK}, month = sep, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'12}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'12)}, author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas}, title = {Lower-Bound Constrained Runs in Weighted Timed Automata}, pages = {128-137}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-qest12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-qest12.pdf}, doi = {10.1109/QEST.2012.28}, noontract = {}, abstract = {We investigate a number of problems related to infinite runs of weighted timed automata, subject to lower-bound constraints on the accumulated weight. Closing an open problem from [Bouyer \textit{et~al.}, {"}Infinite runs in weighted timed automata with energy constraints{"}, FORMATS'08], we show that the existence of an infinite lower-bound-constrained run is---for us somewhat unexpectedly---undecidable for weighted timed automata with four or more clocks.\par This undecidability result assumes a fixed and know initial credit. We show that the related problem of existence of an initial credit for which there ex- ist a feasible run is decidable in PSPACE. We also investigate the variant of these problems where only bounded-duration runs are considered, showing that this restriction makes our original problem decidable in NEXPTIME. Finally, we prove that the universal versions of all those problems (i.e, checking that all the considered runs satisfy the lower-bound constraint) are decidable in PSPACE.} }
@article{BMOSW-fac12, publisher = {Springer}, journal = {Formal Aspects of Computing}, author = {Bouyer, Patricia and Markey, Nicolas and Ouaknine, Jo{\"e}l and Schnoebelen, {\relax Ph}ilippe and Worrell, James}, title = {On Termination and Invariance for Faulty Channel Systems}, year = 2012, month = jul, volume = 24, number = {4-6}, pages = {595-607}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOSU-fac12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOSU-fac12.pdf}, doi = {10.1007/s00165-012-0234-7}, abstract = {A~\emph{channel machine} consists of a finite controller together with several fifo channels; the controller can read messages from the head of a channel and write messages to the tail of a channel. In this paper we focus on channel machines with \emph{insertion errors}, i.e., machines in whose channels messages can spontaneously appear. We consider the invariance problem: does a given insertion channel machine have an infinite computation all of whose configurations satisfy a given predicate? We show that this problem is primitive-recursive if the predicate is closed under message losses. We also give a non-elementary lower bound for the invariance problem under this restriction. Finally, using the previous result, we show that the satisfiability problem for the safety fragment of Metric Temporal Logic is non-elementary.} }
@inproceedings{BDL-tase12, address = {Beijing, China}, month = jul, year = 2012, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{TASE}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {S}ymposium on {T}heoretical {A}spects of {S}oftware {E}ngineering ({TASE}'12)}, author = {Bollig, Benedikt and Decker, Normann and Leucker, Martin}, title = {Frequency Linear-time Temporal Logic}, pages = {85-92}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-tase12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-tase12.pdf}, doi = {10.1109/TASE.2012.43}, abstract = {We propose fLTL, an extension to linear-time temporal logic (LTL) that allows for expressing relative frequencies by a generalization of temporal operators. This facilitates the specification of requirements such as the deadlines in a real-time system must be met in at least~\(95\%\) of all cases. For our novel logic, we establish an undecidability result regarding the satisfiability problem but identify a decidable fragment which strictly increases the expressiveness of LTL by allowing, e.g., to express non-context-free properties.} }
@inproceedings{IL-pairing12, address = {Cologne, Germany}, month = may, year = 2012, volume = 7708, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abdalla, Michel and Lange, Tanja}, acronym = {{PAIRING}'12}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {P}airing-Based {C}ryptography ({PAIRING}'12)}, author = {Izabach{\`e}ne, Malika and Libert, Beno{\^\i}t}, title = {Divisible E-Cash in the Standard Model}, pages = {314-332}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/IL-pairing12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/IL-pairing12.pdf}, doi = {10.1007/978-3-642-36334-4_20}, abstract = {Off-line e-cash systems are the digital analogue of regular cash. One of the main desirable properties is anonymity: spending a coin should not reveal the identity of the spender and, at the same time, users should not be able to double-spend coins without being detected. Compact e-cash systems make it possible to store a wallet of \(O(2^{L})\) coins using \(O(L + \lambda)\) bits, where \(\lambda\) is the security parameter. They are called \emph{divisible} whenever the user has the flexibility of spending an amount of~\(2^{\ell}\), for some \(\ell\leq L\), more efficiently than by repeatedly spending individual coins. This paper presents the first construction of divisible e-cash in the standard model (i.e., without the random oracle heuristic). The scheme allows a user to obtain a wallet of~\(2^{L}\) coins by running a withdrawal protocol with the bank. Our construction is built on the traditional binary tree approach, where the wallet is organized in such a way that the monetary value of a coin depends on how deep the coin is in the tree.} }
@inproceedings{BMS-icalp12, address = {Warwick, UK}, month = jul, year = 2012, volume = {7392}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Czumaj, Artur and Mehlhorn, Kurt and Pitts, Andrew and Wattenhofer, Roger}, acronym = {{ICALP}'12}, booktitle = {{P}roceedings of the 39th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'12)~-- {P}art~{II}}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robust Reachability in Timed Automata: A~Game-based Approach}, pages = {128-140}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-icalp12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-icalp12.pdf}, doi = {10.1007/978-3-642-31585-5_15}, abstract = {Reachability checking is one of the most basic problems in verification. By solving this problem, one synthesizes a strategy that dictates the actions to be performed for ensuring that the target location is reached. In this work, we are interested in synthesizing {"}robust{"} strategies for ensuring reachability of a location in a timed automaton; with {"}robust{"}, we mean that it must still ensure reachability even when the delays are perturbed by the environment. We model this perturbed semantics as a game between the controller and its environment, and solve the parameterized robust reachability problem: we show that the existence of an upper bound on the perturbations under which there is a strategy reaching a target location is EXPTIME-complete.} }
@incollection{topnoc12-ehh, year = 2012, volume = 6900, series = {Lecture Notes in Computer Science}, editor = {Jensen, Kurt and Donatelli, Susanna and Kleijn, Jetty}, publisher = {Springer}, booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{V}}, author = {El{~}Hog{-}Benzina, Dorsaf and Haddad, Serge and Hennicker, Rolf}, title = {Refinement and Asynchronous Composition of Modal {P}etri Nets}, pages = {96-120}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc12-ehh.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc12-ehh.pdf}, doi = {10.1007/978-3-642-29072-5_4}, abstract = {We propose a framework for the specification of infinite state systems based on Petri nets with distinguished \emph{may}- and \emph{must}-transitions (called modalities) which specify the allowed and the required behavior of refinements and hence of implementations. For any modal Petri net, we define its generated modal language specification which abstracts away silent transitions. On this basis we consider refinements of modal Petri nets by relating their generated modal language specifications. We show that this refinement relation is decidable if the underlying modal Petri nets are weakly deterministic. We also show that the membership problem for the class of weakly deterministic modal Petri nets is decidable. As an important application scenario of our approach we consider I/O-Petri nets and their asynchronous composition which typically leads to an infinite state system.} }
@inproceedings{benzina-dictap12, address = {Bangkok, Thailand}, month = may, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{DICTAP}'12}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}onference on {D}igital {I}nformation and {C}ommunication {T}echnology and its {A}pplication ({DICTAP}'12)}, author = {Benzina, Hedi}, title = {Towards Designing Secure Virtualized Systems}, pages = {250-255}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HB-dictap12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HB-dictap12.pdf}, doi = {10.1109/DICTAP.2012.6215385}, abstract = {Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterprise data centers. It is most known for improving efficiency and ease of management. However, it also provides a compelling approach to enhancing system security, offering new ways to rearchitect todays systems and opening the door for a wide range of future security technologies. While this technology is meant to enhance the security of computer systems, some recent attacks show that virtual machine technology has many weaknesses and becomes exposed to many security threats. In this paper we present some of these threats and show how we protect these systems through intrusion detection and security policies mechanisms.} }
@article{jcss12-DJLL, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Demri, St{\'e}phane and Jurdzi{\'n}ski, Marcin and Lachish, Oded and Lazi{\'c}, Ranko}, title = {The covering and boundedness problems for branching vector addition systems}, year = {2012}, volume = 79, number = 1, pages = {23-38}, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/djll-jcss12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/djll-jcss12.pdf}, doi = {10.1016/j.jcss.2012.04.002}, abstract = {The covering and boundedness problems for branching vector addition systems are shown complete for doubly-exponential time.} }
@inproceedings{ACD-csf12, address = {Cambridge Massachusetts, USA}, month = jun, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'12}, booktitle = {{P}roceedings of the 25th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'12)}, author = {Arapinis, Myrto and Cheval, Vincent and Delaune, St{\'e}phanie}, title = {Verifying privacy-type properties in a modular way}, pages = {95-109}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-csf12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-csf12.pdf}, doi = {10.1109/CSF.2012.16}, abstract = {Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkability) that play an important role in many modern applications are formalised using a notion of equivalence.\par In this paper, we study the notion of trace equivalence and we show how to establish such an equivalence relation in a modular way. It is well-known that composition works well when the processes do not share secrets. However, there is no result allowing us to compose processes that rely on some shared secrets such as long term keys. We show that composition works even when the processes share secrets provided that they satisfy some reasonable conditions. Our composition result allows us to prove various equivalence-based properties in a modular way, and works in a quite general setting. In particular, we consider arbitrary cryptographic primitives and processes that use non-trivial else branches.\par As an example, we consider the ICAO e-passport standard, and we show how the privacy guarantees of the whole application can be derived from the privacy guarantees of its sub-protocols.} }
@inproceedings{benzina-iscc12, address = {Nev{\c{s}}ehir, Turkey}, month = jul, year = 2012, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{ISCC}'12}, booktitle = {{P}roceedings of the 17th {IEEE} {S}ymposium on {C}omputers and {C}ommunications ({ISCC}'12)}, author = {Benzina, Hedi}, title = {A~Network Policy Model for Virtualized Systems}, pages = {680-683}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iscc12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iscc12.pdf}, doi = {10.1109/ISCC.2012.6249376}, abstract = {Modern hypervisors offer the ability to build virtual networks between virtual machines. These networks are very useful in both personal and professional activities since they offer the same opportunities as physical networks, but in a much lower cost in terms of hardware and time. On the other hand, these networks are facing many security threats due to the absence of rigourous security policies that protect the sensitive ressources of the network. In this paper, we propose a multilevel security policy model for these networks, this policy covers not only network operations, but also operations related to the management of the virtual architecture.} }
@inproceedings{DKP-ijcar12, address = {Manchester, UK}, month = jun, year = 2012, volume = {7364}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Gramlich, Bernhard and Miller, Dale and Sattler, Uli}, acronym = {{IJCAR}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'12)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Pasail{\u{a}}, Daniel}, title = {Security protocols, constraint systems, and group theories}, pages = {164-178}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKP-ijcar12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKP-ijcar12.pdf}, doi = {10.1007/978-3-642-31365-3_15}, abstract = {When formally analyzing security protocols it is often important to express properties in terms of an adversary's inability to distinguish two protocols. It has been shown that this problem amounts to deciding the equivalence of two constraint systems, i.e., whether they have the same set of solutions. In this paper we study this equivalence problem when cryptographic primitives are modeled using a group equational theory, a special case of monoidal equational theories. The results strongly rely on the isomorphism between group theories and rings. This allows us to reduce the problem under study to the problem of solving systems of equations over rings.\par We provide several new decidability and complexity results, notably for equational theories which have applications in security protocols, such as exclusive or and Abelian groups which may additionally admit a unary, homomorphic symbol.} }
@article{BCD-tocl12, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Baudet, Mathieu and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {{YAPA}: A~generic tool for computing intruder knowledge}, year = 2013, month = feb, nopages = {}, number = {1:4}, volume = 14, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCD-tocl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCD-tocl12.pdf}, doi = {10.1145/2422085.2422089}, abstract = {Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two relations: deducibility and static equivalence. Several decision procedures have been proposed for these relations under a variety of equational theories. However, each theory has its particular algorithm, and none has been implemented so far. \par We provide a generic procedure for deducibility and static equivalence that takes as input any convergent rewrite system. We show that our algorithm covers most of the existing decision procedures for convergent theories. We also provide an efficient implementation, and compare it briefly with the tools ProVerif and KiSs.} }
@inproceedings{KS-csr12, address = {Nizhni Novgorod, Russia}, month = jul, year = 2012, volume = {7353}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hirsch, Edward A. and Karhum{\"a}ki, Juhani and Lepist{\"o}, Arto and Prilutskii, Michail}, acronym = {{CSR}'12}, booktitle = {{P}roceedings of the 7th {I}nternational {C}omputer {S}cience {S}ymposium in {R}ussia ({CSR}'12)}, author = {Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {Cutting Through Regular {P}ost Embedding Problems}, pages = {229-240}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csr12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csr12.pdf}, doi = {10.1007/978-3-642-30642-6_22}, abstract = {The Regular Post Embedding Problem extended with partial (co)directness is shown decidable. This extends to universal and{\slash}or counting versions. It is also shown that combining directness and codirectness in Post Embedding problems leads to undecidability.} }
@phdthesis{doyen-HDR11, author = {Doyen, Laurent}, title = {Games and Automata: From Boolean to Quantitative Verification}, year = 2012, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-ld.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-ld.pdf}, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/hdr-ld-slides.pdf} }
@techreport{rr-lsv-12-05, author = {Soulat, Romain}, title = {Scheduling with {IMITATOR}: Some Case Studies}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = mar, type = {Research Report}, number = {LSV-12-05}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-05.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-05-v1.pdf, 20120313}, note = {13~pages}, abstract = {The tool IMITATOR implements the \emph{Inverse Method (IM)} for Timed Automata (TAs). Given a TA~\(\mathcal{A}\) and a tuple~\(\pi_0\) of reference valuations for timings, IM synthesizes a constraint around pi0 where A behaves in the same discrete manner. This provides us with a quantitative measure of robustness of the behavior of~\(\mathcal{A}\) around~\(\pi_0\).\par The new version IMITATOR~2.5 integrates the new features of stopwatches (in addition to standard clocks) and updates (in addition to standard clock resets), as well as powerful algorithmic improvements for state space reduction. We illustrate on several case studies of preemptive scheduling problems how such features make the tool well-suited to analyze robustness.} }
@article{BCH-fmsd12, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {A~Concurrency-Preserving Translation from Time {P}etri Nets to Networks of Timed Automata}, year = 2012, month = jun, volume = 40, number = 3, pages = {330-355}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-fmsd12.pdf}, doi = {10.1007/s10703-012-0146-4}, abstract = {Several formalisms to model distributed real-time systems coexist in the literature. This naturally induces a need to compare their expressiveness and to translate models from one formalism to another when possible. The first formal comparisons of the expressiveness of these models focused on the preservation of the sequential behavior of the models, using notions like timed language equivalence or timed bisimilarity. They do not consider preservation of concurrency. In~this paper we define timed traces as a partial order representation of executions of our models for real-time distributed systems. Timed traces provide an alternative to timed words, and take the distribution of actions into account. We propose a translation between two popular formalisms that describe timed concurrent systems: \(1\)-bounded time Petri nets~(TPN) and networks of timed automata~(NTA). Our translation preserves the distribution of actions, that is we require that if the TPN represents the product of several components (called processes), then each process should have its counterpart as one timed automaton in the resulting~NTA.} }
@techreport{rr-lsv-12-04, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {Importance Sampling for Model Checking of Time-Bounded Until}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = feb, type = {Research Report}, number = {LSV-12-04}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-04.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-04.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-04-v1.pdf, 20120227}, note = {14~pages}, abstract = {Statistical model-checking is an alternative verification technique applied on stochastic systems whose size is beyond numerical analysis ability. Given a model (most often a Markov chain) and a formula, it provides a confidence interval for the probability that the model satisfies the formula. In a previous contribution, we have overtaken the main limitation of the statistical approach, i.e. the computation time explosion associated with the evaluation of very small probabilities. This method was valid only for the standard ``Until'' of temporal logics. We establish a similar validity condition which applies to the ``Bounded Until'', using more elaborate arguments. We also address the problem of additional memory requirements necessary to apply the method and we design several algorithms depending on the intended trade-off between time and memory. The corresponding algorithms have been implemented in our tool Cosmos. We present experimentations on several relevant systems, with drastic time reductions w.r.t. standard statistical model checking.} }
@book{JGL-topology, author = {Goubault{-}Larrecq, Jean}, title = {Non-{H}ausdorff Topology and Domain Theory---Selected Topics in Point-Set Topology}, publisher = {Cambridge University Press}, series = {New Mathematical Monographs}, volume = {22}, year = {2013}, month = mar, url = {http://www.cambridge.org/9781107034136}, isbn = {9781107034136} }
@inproceedings{AFS-nfm12, address = {Norfolk, Virginia, USA}, month = apr, year = 2012, volume = 7226, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Goodloe, Alwyn and Person, Suzette}, acronym = {{NFM}'12}, booktitle = {{P}roceedings of the 4th {NASA} {F}ormal {M}ethods {S}ymposium ({NFM}'12)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and Soulat, Romain}, title = {Enhancing the Inverse Method with State Merging}, pages = {100-105}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-nfm12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-nfm12.pdf}, doi = {10.1007/978-3-642-28891-3_10}, abstract = {Keeping the state space small is essential when verifying real-time systems using Timed Automata~(TA). In~the model-checker Uppaal, the merging operation has been used extensively in order to reduce the number of states. Actually, Uppaal's merging technique applies within the more general setting of Parametric Timed Automata (PTA). The \emph{Inverse Method~(IM)} for a PTA~\(\mathcal{A}\) is a procedure that synthesizes a zone around a given point~\(\pi^{0}\) (parameter valuation) over which \(\mathcal{A}\) is guaranteed to behave similarly. We show that the integration of merging into~\emph{IM} leads to the synthesis of larger zones around~\(\pi^{0}\). It~also often improves the performance of~\emph{IM}, both in terms of computational space and time, as shown by our experimental results.} }
@article{BHS-fmsd2012, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu}, title = {Interrupt Timed Automata: Verification and Expressiveness}, year = {2012}, month = feb, volume = {40}, number = {1}, pages = {41-87}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHS-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHS-fmsd12.pdf}, doi = {10.1007/s10703-011-0140-2}, abstract = {We introduce the class of Interrupt Timed Automata (ITA), a subclass of hybrid automata well suited to the description of timed multi-task systems with interruptions in a single processor environment.\par While the reachability problem is undecidable for hybrid automata we show that it is decidable for ITA. More precisely we prove that the untimed language of an ITA is regular, by building a finite automaton as a generalized class graph. We then establish that the reachability problem for ITA is in NEXPTIME and in PTIME when the number of clocks is fixed. To prove the first result, we define a subclass ITA\(_{-}\) of ITA, and show that (1)~any ITA can be reduced to a language-equivalent automaton in ITA\(_{-}\) and (2)~the reachability problem in this subclass is in NEXPTIME (without any class graph).\par In the next step, we investigate the verification of real time properties over ITA. We prove that model checking SCL, a fragment of a timed linear time logic, is undecidable. On the other hand, we give model checking procedures for two fragments of timed branching time logic.\par We also compare the expressive power of classical timed automata and ITA and prove that the corresponding families of accepted languages are incomparable. The result also holds for languages accepted by controlled real-time automata (CRTA), that extend timed automata. We finally combine ITA with CRTA, in a model which encompasses both classes and show that the reachability problem is still decidable. Additionally we show that the languages of ITA are neither closed under complementation nor under intersection.} }
@article{BK-jal12, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Bollig, Benedikt and Kuske, Dietrich}, title = {An optimal construction of {H}anf sentences}, year = {2012}, month = jun, volume = {10}, number = {2}, pages = {179-186}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BK-jal12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BK-jal12.pdf}, doi = {10.1016/j.jal.2012.01.002}, abstract = {We give a new construction of formulas in Hanf normal form that are equivalent to first-order formulas over structures of bounded degree. This is the first algorithm whose running time is shown to be elementary. The triply exponential upper bound is complemented by a matching lower bound.} }
@article{GMM-fmsd2012, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Ganty, Pierre and Majumdar, Rupak and Monmege, Benjamin}, title = {Bounded underapproximations}, year = {2012}, month = apr, volume = {40}, number = {2}, pages = {206-231}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GMM-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GMM-fmsd12.pdf}, doi = {10.1007/s10703-011-0136-y}, abstract = {We show a new and constructive proof of the following language-theoretic result: for every context-free language~\(L\), there is a bounded context-free language \(L'\subseteq L\) which has the same Parikh (commutative) image as~\(L\). Bounded languages, introduced by Ginsburg and Spanier, are subsets of regular languages of the form \(w_{1}^{*}w_{2}^{*}\cdots w_{m}^{*}\) for some \(w_1,\cdots,w_{m}\in \Sigma^{*}\). In particular bounded context-free languages have nice structural and decidability properties. Our proof proceeds in two parts. First, we give a new construction that shows that each context free language~\(L\) has a subset~\(L_{N}\) that has the same Parikh image as~\(L\) and that can be represented as a sequence of substitutions on a linear language. Second, we inductively construct a Parikh-equivalent bounded context-free subset of~\(L_{N}\).\par We show two applications of this result in model checking: to underapproximate the reachable state space of multithreaded procedural programs and to underapproximate the reachable state space of recursive counter programs. The bounded language constructed above provides a decidable underapproximation for the original problems. By iterating the construction, we get a semi-algorithm for the original problems that constructs a sequence of underapproximations such that no two underapproximations of the sequence can be compared. This provides a progress guarantee: every word~\(w\in L\) is in some underapproximation of the sequence, and hence, a program bug is guaranteed to be found. In particular, we show that verification with bounded languages generalizes context-bounded reachability for multithreaded programs.} }
@inproceedings{CCK-esop12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7211}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Seidl, Helmut}, acronym = {{ESOP}'12}, booktitle = {{P}rogramming {L}anguages and {S}ystems~--- {P}roceedings of the 22nd {E}uropean {S}ymposium on {P}rogramming ({ESOP}'12)}, author = {Chadha, Rohit and Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Kremer, Steve}, title = {Automated verification of equivalence properties of cryptographic protocols}, pages = {108-127}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCK-esop12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCK-esop12.pdf}, doi = {10.1007/978-3-642-28869-2_6}, abstract = {Indistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity properties, strong versions of confidentiality and resistance to offline guessing attacks, and can be conveniently modeled using process equivalences. We present a novel procedure to verify equivalence properties for bounded number of sessions. Our procedure is able to verify trace equivalence for determinate cryptographic protocols. On determinate protocols, trace equivalence coincides with observational equivalence which can therefore be automatically verified for such processes. When protocols are not determinate our procedure can be used for both under- and over-approximations of trace equivalence, which proved successful on examples. The procedure can handle a large set of cryptographic primitives, namely those which can be modeled by an optimally reducing convergent rewrite system. Although, we were unable to prove its termination, it has been implemented in a prototype tool and has been effectively tested on examples, some of which were outside the scope of existing tools.} }
@article{BDL-icomp12, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Brochenin, R{\'e}mi and Demri, St{\'e}phane and Lozes, {\'E}tienne}, title = {On the Almighty Wand}, year = {2012}, volume = 211, pages = {106-137}, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-icomp12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-icomp12.pdf}, doi = {10.1016/j.ic.2011.12.003}, abstract = {We investigate decidability, complexity and expressive power issues for (first-order) separation logic with one record field (herein called~\texttt{SL}) and its fragments. \texttt{SL}~can specify properties about the memory heap of programs with singly-linked lists. Separation logic with two record fields is known to be undecidable by reduction of finite satisfiability for classical predicate logic with one binary relation. Surprisingly, we show that second-order logic is as expressive as \texttt{SL} and as a by-product we get undecidability of~\texttt{SL}. This is refined by showing that \texttt{SL} without the separating conjunction is as expressive as~\texttt{SL}, whence undecidable too. As a consequence, in \texttt{SL} the separating implication (also known as the magic wand) can simulate the separating conjunction. By~contrast, we establish that \texttt{SL} without the magic wand is decidable, and we~prove a non-elementary complexity by reduction from satisfiability for the first-order theory over finite words. This result is extended with a bounded use of the magic wand that appears in Hoare-style rules. As a generalisation, it~is shown that~\(k\texttt{SL}\), the separation logic over heaps with \(k\geq 1\) record fields, is equivalent to~\(k\texttt{SO}\), the second-order logic over heaps with \(k\) record fields.} }
@inproceedings{GLS-rr13, address = {Mannheim, Germany}, month = jul, year = 2013, volume = 7994, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Faber, Wolfgang and Lembo, Domenico}, acronym = {{WRRS}'13}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {W}eb {R}easoning and {R}ule {S}ystems ({WRRS}'13)}, author = {Gheerbrant, Am{\'e}lie and Libkin, Leonid and Sirangelo, Cristina}, affiliaton = {Scotland, University of Edinburgh, School of Informatics and Scotland, University of Edinburgh, School of Informatics and France, ENS Cachan \& CNRS \& INRIA, LSV[Dahu]}, title = {Reasoning About Pattern-Based {XML} Queries}, pages = {4-18}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-rr13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-rr13.pdf}, doi = {10.1007/978-3-642-39666-3_2}, abstract = {We survey results about static analysis of pattern-based queries over XML documents. These queries are analogs of conjunctive queries, their unions and Boolean combinations, in which tree patterns play the role of atomic formulae. As in the relational case, they can be viewed as both queries and incomplete documents, and thus static analysis problems can also be viewed as finding certain answers of queries over such documents. We look at satisfiability of patterns under schemas, containment of queries for various features of XML used in queries, finding certain answers, and applications of pattern-based queries in reasoning about schema mappings for data exchange.} }
@incollection{AV-buneman13, noaddress = {}, month = sep, year = 2013, volume = 8000, series = {Lecture Notes in Computer Science}, editor = {Tannen, Val and Wong, Limsoon and Libkin, Leonid and Fan, Wenfei and Tan, Wang-Chiew and Fourman, Michael}, publisher = {Springer}, booktitle = {{I}n~{S}earch of {E}legance in the {T}heory and {P}ractice of {C}omputation~-- {E}ssays {D}edicated to {P}eter~{B}uneman}, author = {Abiteboul, Serge and Vianu, Victor}, title = {Models for Data-Centric Workflows}, pages = {1-12}, doi = {10.1007/978-3-642-41660-6_1}, abstract = {We present two models for data-centric workflows: the first based on business artifacts and the second on Active XML. We then compare the two models and argue that Active XML is strictly more expressive, based on a natural semantics and choice of observables. Finally, we mention several verification results for the two models.} }
@inproceedings{AAMST-sigmod13, address = {New~York, New~York, USA}, month = jun, year = 2013, publisher = {ACM Press}, editor = {Ross, Kenneth A. and Srivastava, Divesh and Papadias, Dimitris}, acronym = {{SIGMOD}'13}, booktitle = {{P}roceedings of the {ACM} {SIGMOD} {I}nternaitonal {C}onference on {M}anagement of {D}ata ({SIGMOD}'13)}, author = {Abiteboul, Serge and Antoine, {\'E}milien and Miklau, Gerome and Stoyanovich, Julia and Testard, Jules}, title = {Rule-based application development using Webdamlog}, pages = {965-968}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AAMST-sigmod13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AAMST-sigmod13.pdf}, doi = {10.1145/2463676.2465251}, abstract = {We present the WebdamLog system for managing distributed data on the Web in a peer-to-peer manner. We demonstrate the main features of the system through an application called Wepic for sharing pictures between attendees of the sigmod conference. Using Wepic, the attendees will be able to share, download, rate and annotate pictures in a highly decentralized manner. We show how WebdamLog handles heterogeneity of the devices and services used to share data in such a Web setting. We exhibit the simple rules that define the Wepic application and show how to easily modify the Wepic application.} }
@inproceedings{BD-csr13, address = {Ekaterinburg, Russia}, month = jun, year = 2013, volume = {7913}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Bulatov, Andrei A. and Shur, Arseny M.}, acronym = {{CSR}'13}, booktitle = {{P}roceedings of the 8th {I}nternational {C}omputer {S}cience {S}ymposium in {R}ussia ({CSR}'13)}, author = {Bansal, Kshitij and Demri, St{\'e}phane}, title = {Model-checking bounded multi-pushdown systems}, pages = {405-417}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BD-csr13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BD-csr13.pdf}, doi = {10.1007/978-3-642-38536-0_35}, abstract = {We provide complexity characterizations of model checking multi-pushdown systems. We consider three standard notions for boundedness: context boundedness, phase boundedness and stack ordering. The logical formalism is a linear-time temporal logic extending well-known logic \texttt{CaRet} but dedicated to multi-pushdown systems in which abstract operators are parameterized by stacks. We show that the problem is ExpTime-complete for context-bounded runs and unary encoding of the number of context switches; we also prove that the problem is 2ExpTime-complete for phase-bounded runs and unary encoding of the number of phase switches. In both cases, the value~\(k\) is given as an input, which makes a substantial difference in the complexity.} }
@misc{cassting-D41, author = {Markey, Nicolas and Larsen, Kim G. and Skou, Arne and Lux, Daniel and Rozenkilde, Jesper and Pedersen, Keld L. and S{\o}rensen, Susanne M.}, title = {Description of case studies}, howpublished = {Cassting deliverable~D4.1 (FP7-ICT-601148)}, month = oct, year = {2013}, note = {19~pages}, type = {Contract Report}, nourlnote = {confidentiel} }
@misc{cassting-D51, author = {Valette, Sophie and Markey, Nicolas}, title = {Cassting website}, howpublished = {Cassting deliverable~D6.1 (FP7-ICT-601148)}, month = jun, year = {2013}, note = {10~pages}, type = {Contract Report}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cassting-d51.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cassting-d51.pdf} }
@misc{cassting-D61, author = {Valette, Sophie and Markey, Nicolas}, title = {Minutes of the Kick-Off Meeting}, howpublished = {Cassting deliverable~D6.1 (FP7-ICT-601148)}, month = apr, year = {2013}, note = {9~pages}, type = {Contract Report}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cassting-d61.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cassting-d61.pdf} }
@phdthesis{chatain-HDR13, author = {Chatain, {\relax Th}omas}, title = {Concurrency in Real-Time Distributed Systems, from Unfoldings to Implementability}, year = 2013, month = dec, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-chatain13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-chatain13.pdf} }
@phdthesis{crodriguez-phd2013, author = {Rodr{\'\i}guez, C{\'e}sar}, title = {Verification Based on Unfoldings of {P}etri Nets with Read Arcs}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cr-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cr-phd13.pdf} }
@misc{impro-D31, author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas and Mullins, John and Sankur, Ocan and Sassolas, Mathieu and Thrane, Claus}, title = {Measuring the robustness}, howpublished = {Deliverable ImpRo~3.1, (ANR-10-BLAN-0317)}, month = jan, year = {2013}, note = {59~pages}, type = {Contract Report}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d31.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d31.pdf} }
@misc{impro-D51, author = {Bouyer, Patricia and Faucou, S{\'e}bastien and Haar, Stefan and Jovanivi{\'c}, Aleksandra and Lime, Didier and Markey, Nicolas and Roux, Olivier H. and Sankur, Ocan}, title = {Control tasks for Timed System; Robustness issues}, howpublished = {Deliverable ImpRo~5.1, (ANR-10-BLAN-0317)}, month = jan, year = {2013}, note = {34~pages}, type = {Contract Report}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d51.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d51.pdf} }
@phdthesis{schwoon-HDR13, author = {Schwoon, Stefan}, title = {Efficient verification of sequential and concurrent systems}, year = 2013, month = dec, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-schwoon13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-schwoon13.pdf} }
@phdthesis{eantoine-phd2013, author = {Antoine, {\'E}milien}, title = {Distributed data management with a declarative rule-based language: \emph{Webdamlog}}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/eantoine-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/eantoine-phd13.pdf} }
@article{CS-lmcs13, journal = {Logical Methods in Computer Science}, author = {ten~Cate, Balder and Segoufin, Luc}, title = {Unary negation}, volume = 9, number = {3:25}, month = sep, year = 2013, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-lmcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-lmcs13.pdf}, doi = {10.2168/LMCS-9(3:25)2013}, abstract = {We study fragments of first-order logic and of least fixed point logic that allow only unary negation: negation of formulas with at most one free variable. These logics generalize many interesting known formalisms, including modal logic and the \(\mu\)-calculus, as well as conjunctive queries and monadic Datalog. We show that satisfiability and finite satisfiability are decidable for both fragments, and we pinpoint the complexity of satisfiability, finite satisfiability, and model checking. We also show that the unary negation fragment of first-order logic is model-theoretically very well behaved. In particular, it enjoys Craig Interpolation and the Projective Beth Property.} }
@inproceedings{BC-fossacs13, address = {Rome, Italy}, month = mar, year = 2013, volume = {7794}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pfenning, Frank}, acronym = {{FoSSaCS}'13}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'13)}, author = {Bonnet, R{\'e}mi and Chadha, Rohit}, title = {Bounded Context-Switching and Reentrant Locking}, pages = {65-80}, doi = {10.1007/978-3-642-37075-5_5}, abstract = {Reentrant locking is a \emph{recursive locking} mechanism which allows a thread in a multi-threaded program to acquire the reentrant lock multiple times. The thread must release this lock an equal number of times before another thread can acquire this lock. We consider the control state reachability problem for recursive multi-threaded programs synchronizing via a finite number of reentrant locks. Such programs can be abstracted as multi-pushdown systems with a finite number of counters. The pushdown stacks model the call stacks of the threads and the counters model the reentrant locks. The control state reachability problem is already undecidable for non-reentrant locks. As a consequence, for non-reentrant locks, under-approximation techniques which restrict the search space have gained traction. One popular technique is to limit the number of context switches. Our main result is that the problem of checking whether a control state is reachable within a bounded number of context switches is decidable for recursive multi-threaded programs synchronizing via a finite number of reentrant locks if we restrict the lock-usage to contextual locking: a release of an instance of reentrant lock can only occur if the instance was acquired before in the same procedure and each instance of a reentrant lock acquired in a procedure call must be released before the procedure returns. The decidability is obtained by a reduction to the reachability problem of Vector Addition Systems with States~(VASS).} }
@article{BCMV-lmcs13, journal = {Logical Methods in Computer Science}, author = {Bonnet, R{\'e}mi and Chadha, Rohit and Madhusudan, P. and Viswanathan, Mahesh}, title = {Reachability under contextual locking}, volume = 9, number = {3:21}, month = sep, year = 2013, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCMV-lmcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCMV-lmcs13.pdf}, doi = {10.2168/LMCS-9(3:21)2013}, abstract = {The pairwise reachability problem for a multi-threaded program asks, given control locations in two threads, whether they can be simultaneously reached in an execution of the program. The problem is important for static analysis and is used to detect statements that are concurrently enabled. This problem is in general undecidable even when data is abstracted and when the threads (with recursion) synchronize only using a finite set of locks. Popular programming paradigms that limit the lock usage patterns have been identified under which the pairwise reachability problem becomes decidable. In this paper, we consider a new natural programming paradigm, called contextual locking, which ties the lock usage to calling patterns in each thread: we assume that locks are released in the same context that they were acquired and that every lock acquired by a thread in a procedure call is released before the procedure returns. Our main result is that the pairwise reachability problem is polynomial-time decidable for this new programming paradigm as well. The problem becomes undecidable if the locks are reentrant; reentrant locking is a recursive locking mechanism which allows a thread in a multi-threaded program to acquire the reentrant lock multiple times.} }
@proceedings{BF-formats2013, title = {{P}roceedings of the 11th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'13)}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'13)}, acronym = {{FORMATS}'13}, editor = {Braberman, V{\'\i}ctor and Fribourg, Laurent}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 8053, url = {http://link.springer.com/978-3-642-40228-9}, year = 2013, month = aug, address = {Buenos Aires, Argentina} }
@article{BC-lmcs13, journal = {Logical Methods in Computer Science}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas}, title = {Avoiding Shared Clocks in Networks of Timed Automata}, volume = 9, number = {4:13}, nopages = {}, year = 2013, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-lmcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-lmcs13.pdf}, doi = {10.2168/LMCS-9(4:13)2013}, abstract = {Networks of timed automata~(NTA) are widely used to model distributed real-time systems. Quite often in the literature, the automata are allowed to share clocks. This is a problem when one considers implementing such model in a distributed architecture, since reading clocks a priori requires communications which are not explicitly described in the model. We focus on the following question: given a NTA \(A_{1} \parallel A_{2}\) where \(A_{2}\) reads some clocks reset by~\(A_{1}\), does there exist a NTA \(A'_{1} \parallel A'_{2}\) without shared clocks with the same behavior as the initial NTA? For this, we allow the automata to exchange information during synchronizations only. We discuss a formalization of the problem and give a criterion using the notion of contextual timed transition system, which represents the behavior of~\(A_{2}\) when in parallel with~\(A_{1}\). Finally, we effectively build \(A'_{1} \parallel A'_{2}\) when it exists.} }
@article{CD-pourlascience13, publisher = {Belin}, journal = {Pour La Science}, author = {Chr{\'e}tien, R{\'e}my and Delaune, St{\'e}phanie}, title = {La protection des informations sensibles}, volume = {433}, month = nov, year = 2013, pages = {70-77}, url = {http://www.pourlascience.fr/ewb_pages/a/article-la-protection-des-informations-sensibles-32228.php} }
@phdthesis{monmege-phd2013, author = {Monmege, Benjamin}, title = {Sp{\'e}cification et v{\'e}rification de propri{\'e}t{\'e}s quantitatives~: expressions, logiques, et automates}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = oct, url = {http://www.lsv.fr/Publis/PAPERS/PDF/monmege-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/monmege-phd13.pdf} }
@book{FS-book13, author = {Fribourg, Laurent and Soulat, Romain}, title = {Control of Switching Systems by Invariance Analysis: Application to Power Electronics}, publisher = {Wiley-ISTE}, year = 2013, month = jul, isbn = {9781848216068}, note = {144~pages}, url = {http://www.iste.co.uk/index.php?f=a&ACTION=View&id=684}, abstract = {This book presents correct-by-design control techniques for switching systems, using different methods of stability analysis. Switching systems are increasingly used in the electronics and mechanical industries; in power electronics and the automotive industry, for example. This is due to their flexibility and simplicity in accurately controlling industrial mechanisms. By adopting appropriate control rules, we can steer a switching system to a region centered at a desired equilibrium point, while avoiding {"}unsafe{"} regions of parameter saturation.\par The authors explain various correct-by-design methods for control synthesis, using different methods of stability and invariance analysis. They also provide several applications of these methods to industrial examples of power electronics.} }
@inproceedings{BL-ewili13, address = {Toulouse, France}, month = aug, year = 2013, noeditor = {}, acronym = {{EW}i{L}i'13}, booktitle = {{P}roceedings of the 3rd {E}mbedded {O}perating {S}ystems {W}orkshop ({EW}i{L}i'13)}, author = {Benedetto, Salvatore and Lipari, Giuseppe}, title = {{{ADOK}: A~Minimal Object Oriented Real-Time Operating System in~{C++}}}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BL-ewili13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BL-ewili13.pdf}, abstract = {Most embedded software is currently developed using the C programming language, even though its low level of abstraction requires a lot of effort to the programmer. The C++ language is a better choice because: it raises the level of abstraction; it is strongly typed, so it prevents many common programming mistakes; it can be made as efficient as C through fine-grained customisation of memory mechanisms; it can be easily adapted to domain-specific needs. In addition, recent compilers have grown in maturity and performance, and the new standard considerably improves the language by introducing new concepts and an easier syntax.\par In this paper we present ADOK, a minimal Real-Time Operating System entirely written in C++ with the exception of a few lines of assembler code. It directly offers a C++ interface to the developer, and it provides a flexible scheduling framework which allows the developer to customise the scheduling to its needs. In particular, we implement a two-level scheduler based on Earliest Deadline First, the Stack Resource Policy protocol for sharing resources and support for mode changes. We demonstrate through examples and a small case-study that ADOK can substantially improve productivity without sacrificing on performance.} }
@inproceedings{BLBL-iceac13, address = {Istanbul, Turkey}, month = dec, year = 2013, publisher = {{IEEE} Circuits and Systems Society}, noeditor = {}, acronym = {{ICEAC}'13}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {E}nergy-{A}ware {C}omputing {S}ystems and {A}pplications ({ICEAC}'14),}, author = {Bambagini, Mario and Lelli, Juri and Buttazzo, Giorgio and Lipari, Giuseppe}, title = {On the Energy-Aware Partitioning of Real-Time Tasks on Homogeneous Multi-Processor Systems}, pages = {69-74}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLBL-iceac13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLBL-iceac13.pdf}, doi = {10.1109/ICEAC.2013.6737640}, abstract = {In high-performance computing systems, efficient energy management is a key feature for keeping energy bills low and avoiding thermal dissipation problems, as well as for controlling the application performance. This paper considers the problem of partitioning and scheduling a set of real-time tasks on a realistic hardware platform consisting of a number of homogeneous processors. Several well-known heuristics are compared to identify the approach that better reduces the overall energy consumption of the entire system. Despite the actual state of art, the approach which minimizes the number of active cores is the most energy efficient.} }
@inproceedings{PLML-rtlws2013, address = {Lugano-Manno, Switzerland}, month = oct, year = 2013, publisher = {Open Source Automation Development Lab (OSADL)}, noeditor = {}, acronym = {{RTLWS}'13}, booktitle = {{P}roceedings of the 15th {R}eal-{T}ime {L}inux {W}orkshop ({RTLWS}'13)}, author = {Parri, Andrea and Lelli, Juri and Marinoni, Mauro and Lipari, Giuseppe}, title = {Design and Implementation of the Multiprocessor Bandwidth Inheritance Protocol on {L}inux}, oldtitle = {An~implementation of the Bandwidth Inheritance Protocol in the {L}inux Kernel}, pages = {41-54}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PLML-rtlws13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PLML-rtlws13.pdf}, abstract = {The Resource Reservation (RR) framework has been proven very effective in the joint scheduling of hard real time and soft real time application in Open Systems. A fundamental problem in this context concerns the extension of the Resource Reservation approach to systems where tasks interact through shared resources.\par The Bandwidth Inheritance (BWI) protocol was first proposed in [Lamastra~G., Lipari~G., Abeni~L.~(2001). A~bandwidth inheritance algorithm for real-time task synchronization in open systems. In:~Proc. 22nd IEEE Real-Time Systems Symposium] to preserve Bandwidth Isolation between independent groups of tasks, and to enable a schedulability analysis for hard real time tasks.\par In this paper, we present the first implementation of the BWI protocol within the Linux kernel. We describe the protocol, the way it has been implemented in Linux, and we report some early experiments to measure its overhead. Our work is based on the SCHED\_DEADLINE patch, a scheduling class for the Linux kernel that provides Resource Reservation using the Constant Bandwidth Server algorithm. The BWI implementation extends Linux's current implementation of the Priority Inheritance protocol, without affecting past design decisions. Our implementation is neutral to the underlying scheduling scheme and can be adopted in global, clustered and partitioned scheduling.\par Results show agreement with theoretical analysis, and performance{\slash}overheads comparable with the current implementation of Priority Inheritance in Linux.\par The work presented here has practical implications for applications running on Linux with SCHED\_DEADLINE scheduling policy and share resources through mutex semaphores. In fact, the protocol guarantees temporal isolation between non-interacting threads, hence real-time guarantees are possible even where no a-priori information about tasks' scheduling parameters are available.} }
@inproceedings{LGBB-burns13, address = {York, UK}, month = mar, year = 2013, editor = {Audsley, Neil and Baruah, Sanjoy}, publisher = {CreateSpace Independent Publishing Platform}, booktitle = {Real-Time Sytems: the past, the present, and the future~-- {P}roceedings of a conference organized in celebration of {P}rofessor {A}lan~{B}urns' sixtieth birthday}, author = {Lipari, Giuseppe and George, Laurent and Bini, Enrico and Bertogna, Marko}, title = {On the Average Complexity of the Processor Demand Analysis for Earliest Deadline Scheduling}, pages = {75-86}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LGBB-burns13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LGBB-burns13.pdf}, abstract = {Schedulability analysis of a set of sporadic tasks scheduled by EDF on a single processor system is a well known and solved problem: the Processor Demand Analysis is a necessary and sufficient test for EDF with pseudo-polynomial complexity. Over the years, many researchers have tried to find efficient methods for reducing the average-case running time of this test. The problem becomes relevant when doing sensitivity analysis of the worst-case execution times of the tasks: the number of constraints to check is directly linked to the complexity of the analysis. In this paper we describe the problem and present some known facts, with the aim of summarising the state of the art and stimulate research in this direction.} }
@inproceedings{LB-burns13, address = {York, UK}, month = mar, year = 2013, editor = {Audsley, Neil and Baruah, Sanjoy}, publisher = {CreateSpace Independent Publishing Platform}, booktitle = {Real-Time Sytems: the past, the present, and the future~-- {P}roceedings of a conference organized in celebration of {P}rofessor {A}lan~{B}urns' sixtieth birthday}, author = {Lipari, Giuseppe and Buttazzo, Giorgio}, title = {{Resource reservation for Mixed Criticality Systems}}, pages = {60-74}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LB-burns13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LB-burns13.pdf}, abstract = {This paper presents a reservation-based approach to schedule mixed criticality systems in a way that guarantees the schedulability of high-criticality tasks independently of the behaviour of low-criticality tasks. Two key ideas are presented: first, to reduce the system uncertainty and advance the time at which a high-criticality task reveals its actual execution time, the initial portion of its code is handled by a dedicated server with a bandwidth reserved for the worst-case, but with a shorter deadline; second, to avoid the pessimism related to off-line budget allocation, an efficient reclaiming mechanism, namely the GRUB algorithm, is used to exploit the budget left by high-criticality tasks in favor of those low-criticality tasks that can still complete within their deadline.} }
@inproceedings{SSLAF-ftscs13, address = {Queenstown, New Zealand}, month = oct, year = 2013, editor = {Artho, Cyrille and {\"O}lveczky, Peter Csaba}, acronym = {{FTSCS}'13}, booktitle = {{P}reproceedings of the 2nd {I}nternational {W}orkshop on {F}ormal {T}echniques for {S}afety-{C}ritical {S}ystems ({FTSCS}'13)}, author = {Sun, Youcheng and Soulat, Romain and Lipari, Giuseppe and Andr{\'e}, {\'E}tienne and Fribourg, Laurent}, title = {Parametric Schedulability Analysis of Fixed Priority Real-Time Distributed Systems}, pages = {179-194}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SSLAF-ftscs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SSLAF-ftscs13.pdf}, abstract = {In this paper, we address the problem of parametric schedulability analysis of distributed real-time systems scheduled by fixed priority. We propose two different approaches to parametric analysis. The first one is a novel analytic technique that extends single-processor sensitivity analysis to the case of distributed systems. The second approach is based on model checking of Parametric Stopwatch Automata~(PSA): we~generate a PSA model from a high-level description of the system, and then we apply the Inverse Method to obtain all possible behaviours of the system. Both techniques have been implemented in two software tools, and they have been compared with classical holistic analysis on two meaningful test cases. The results show that the analytic method provides results similar to classical holistic analysis in a very efficient way, whereas the PSA approach is slower but covers the entire space of solutions.} }
@inproceedings{BL-etfa13, address = {Cagliari, Italy}, month = sep, year = 2013, publisher = {{IEEE} Industrial Electronics Society}, noeditor = {}, acronym = {{ETFA}'13}, booktitle = {{P}roceedings of the 18th {IEEE} {I}nternational {C}onference on {E}merging {T}echnologies and {F}actory {A}utomation ({ETFA}'13)}, author = {Buttazzo, Giorgio and Lipari, Giuseppe}, title = {Ptask: An~Educational {C}~Library for Programming Real-Time Systems on Linux}, nopages = {}, doi = {10.1109/ETFA.2013.6648001}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BL-etfa13.pdf}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BL-etfa13.pdf}, abstract = {When learning real-time programming, the novice is faced with many technical difficulties due to low-level C libraries that require considerable programming effort even for implementing a simple periodic task. For example, the POSIX Real-Time standard only provides a low level notion of thread, hence programmers usually build higher level code on top of the POSIX API, every time re-inventing the wheel.\par In this paper we present a simple C library that simplifies real-time programming in Linux by hiding low-level details of task creation, allocation and synchronization, and provides utilities for more high-level functionalities, like support for mode-change and adaptive systems. The library is released as open-source and it is currently being employed to teach real-time programming in university courses in embedded systems.} }
@phdthesis{brochenin-phd2013, author = {Brochenin, R{\'e}mi}, title = {Separation Logic: Expressiveness, Complexity, Temporal Extension}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/brochenin-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/brochenin-phd13.pdf} }
@phdthesis{kazana-phd2013, author = {Kazana, Wojciech}, title = {Query Evaluation with Constant Delay}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/kazana-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/kazana-phd13.pdf} }
@inproceedings{HHMS-fsttcs13, address = {Guwahati, India}, month = dec, year = 2013, volume = {24}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Seth, Anil and Vishnoi, Nisheeth}, acronym = {{FSTTCS}'13}, booktitle = {{P}roceedings of the 33rd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'13)}, author = {Haar, Stefan and Haddad, Serge and Melliti, Tarek and Schwoon, Stefan}, title = {Optimal Constructions for Active Diagnosis}, pages = {527-539}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHMS13-fsttcs.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHMS13-fsttcs.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2013.527}, abstract = {The task of diagnosis consists in detecting, without ambiguity, occurrence of faults in a partially observed system. Depending on the degree of observability, a discrete event system may be diagnosable or not. Active diagnosis aims at controlling the system in order to make it diagnosable. Solutions have already been proposed for the active diagnosis problem, but their complexity remains to be improved. We solve here the active diagnosability decision problem and the active diagnoser synthesis problem, proving that (1)~our procedures are optimal w.r.t. to computational complexity, and (2)~the memory required for the active diagnoser produced by the synthesis is minimal. Furthermore, focusing on the minimal delay before detection, we establish that the memory required for any active diagnoser achieving this delay may be highly greater than the previous one. So we refine our construction to build with the same complexity and memory requirement an active diagnoser that realizes a delay bounded by twice the minimal delay.} }
@inproceedings{EJS-fsttcs13, address = {Guwahati, India}, month = dec, year = 2013, volume = {24}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Seth, Anil and Vishnoi, Nisheeth}, acronym = {{FSTTCS}'13}, booktitle = {{P}roceedings of the 33rd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'13)}, author = {Esparza, Javier and Jezequel, Lo{\"\i}g and Schwoon, Stefan}, title = {Computation of summaries using net unfoldings}, pages = {225-236}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/EJS-fsttcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/EJS-fsttcs13.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2013.225}, abstract = {We study the following summarization problem: given a parallel composition \(A = A_1\Vert\cdots\Vert A_n\) of labelled transition systems communicating with the environment through a distinguished component \(A_i\), efficiently compute a summary~\(S_i\) such that \(E\Vert A\) and \(E\Vert S_i\) are trace-equivalent for every environment~\(E\). While \(S_i\) can be computed using elementary automata theory, the resulting algorithm suffers from the state-explosion problem. We present a new, simple but subtle algorithm based on net unfoldings, a partial-order semantics, give some experimental results using an implementation on top of Mole, and show that our algorithm can handle divergences and compute weighted summaries with minor modifications.} }
@inproceedings{RS-fsfma13, address = {Singapore}, month = jul, year = 2013, volume = 31, series = {Open Access Series in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Choppy, {\relax Ch}ristine and Sun, Jun}, acronym = {{FSFMA}'13}, booktitle = {{P}roceedings of the 1st {F}rench-{S}ingaporean {W}orkshop on {F}ormal {M}ethods and {A}pplications ({FSFMA}'13)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {An Improved Construction of {P}etri Net Unfoldings}, pages = {47-52}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-fsfma13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-fsfma13.pdf}, doi = {10.4230/OASIcs.FSFMA.2013.47}, abstract = {Petri nets are a well-known model language for concurrent systems. The unfolding of a Petri net is an acyclic net bisimilar to the original one. Because it is acyclic, it admits simpler decision problems though it is in general larger than the net. In this paper, we revisit the problem of efficiently constructing an unfolding. We propose a new method that avoids computing the concurrency relation and therefore uses less memory than some other methods but still represents a good time-space tradeoff. We implemented the approach and report on experiments.} }
@article{HMY-jocs13, publisher = {Elsevier Science Publishers}, journal = {Journal of Computational Science}, author = {Haddad, Serge and Mokdad, Lynda and Youcef, Samir}, title = {Bounding models families for performance evaluation in composite Web services}, volume = {4}, number = {4}, year = {2013}, pages = {232-241}, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HMY-jocs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HMY-jocs13.pdf}, doi = {10.1016/j.jocs.2011.11.003}, abstract = {One challenge of composite Web service architectures is the guarantee of the Quality of Service~(QoS). Performance evaluation of these architectures is essential but complex due to synchronizations inside the orchestration of services. We propose methods to automatically derive from the original model a family of bounding models for the composite Web response time. These models allow to find the appropriate trade-off between accuracy of the bounds and the computational complexity. The numerical results show the interest of our approach w.r.t. complexity and accuracy of the response time bounds.} }
@techreport{rr-lsv-13-13, author = {Hirschi, Lucca}, title = {R{\'e}duction d'entrelacements pour l'{\'e}quivalence de traces}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2013}, month = sep, type = {Research Report}, number = {LSV-13-13}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2013-13.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2013-13.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2013-13-v1.pdf, 20130910}, note = {22~pages}, abstract = {La trace \'equivalence permet notamment de mod\'eliser l'anonymat de protocoles cryptographiques. Cette propri\'et\'e est d\'ecidable pour de nombreuses classes de protocoles et quelques outils permettent de la prouver automatiquement. Mais malheureusement, tous ces outils sont tr\`es lents et peu de protocoles r\'eellement int\'eressants peuvent \^etre analys\'es dans un temps raisonnable. Ces outils doivent r\'ealiser un parcours exhaustif des traces (symboliques) possibles. Mais le parall\`ele introduit de nombreux entrelacements dont un grand nombre sont peu pertinents. Cette explosion combinatoire est une des causes de cette inefficacit\'e.\par Une optimisation dont l'id\'ee est emprunt\'ee \`a la POR (Partial Order Reduction) permet de r\'eduire significativement l'espace de recherche en reconnaissant certaines redondances entre les traces. Elle a \'et\'e d\'evelopp\'ee dans le cas des propri\'et\'es d'accessibilit\'e. L'objectif est de l'adapter au cas de l'\'equivalence, de l'automatiser, d'augmenter son champ d'action et de l'introduire dans un outil existant.} }
@inproceedings{BMS-rp13, address = {Uppsala, Sweden}, month = sep, year = 2013, volume = {8169}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abdulla, Parosh Aziz and Potapov, Igor}, acronym = {{RP}'13}, booktitle = {{P}roceedings of the 7th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'13)}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robustness in timed automata}, pages = {1-18}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-rp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-rp13.pdf}, doi = {10.1007/978-3-642-41036-9_1}, abstract = {In this paper we survey several approaches to the robustness of timed automata, that~is, the ability of a system to resist to slight perturbations or errors. We will concentrate on robustness against timing errors which can be due to measuring errors, imprecise clocks, and unexpected runtime behaviors such as execution times that are longer or shorter than expected.\par We consider the perturbation model of guard enlargement and formulate several robust verification problems that have been studied recently, including robustness analysis, robust implementation, and robust control.} }
@inproceedings{CH-pnse13, address = {Milano, Italy}, month = jun, year = 2013, volume = 969, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Moldt, Daniel and R{\"o}lke, Heiko}, acronym = {{PNSE}'13}, booktitle = {{P}roceedings of the 7th {I}nternational {W}orkshop on {P}etri {N}ets and {S}oftware {E}ngineering ({PNSE}'13)}, author = {Chatain, {\relax Th}omas and Haar, Stefan}, title = {A~Canonical Contraction for Safe {P}etri Nets}, pages = {25-39}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CH-pnse13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CH-pnse13.pdf}, abstract = {Under maximal semantics, the occurrence of an event~\(a\) in a concurrent run of an occurrence net may imply the occurrence of other events, not causally related to~\(a\), in the same run. In recent works, we have formalized this phenomenon as the \emph{reveals} relation, and used it to obtain a contraction of sets of events called \emph{facets} in the context of occurrence nets. Here, we extend this idea to propose a canonical contraction of general safe Petri nets into pieces of partial-order behaviour which can be seen as {"}macro-transitions{"} since all their events must occur together in maximal semantics. On occurrence nets, our construction coincides with the facets abstraction. Our contraction preserves the maximal semantics in the sense that the maximal processes of the contracted net are in bijection with those of the original net.} }
@inproceedings{PHL-ictss13, address = {Istanbul, Turkey}, month = nov, year = 2013, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Yenig{\"u}n, H{\"u}sn{\"u} and Yilmaz, Cemal and Ulrich, Andreas}, acronym = {{ICTSS}'13}, booktitle = {{P}roceedings of the 25th {IFIP} {I}nternational {C}onference on {T}esting {S}oftware and {S}ystems ({ICTSS}'13)}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and Longuet, Delphine}, title = {Unfolding-based Test Selection for Concurrent Conformance}, pages = {98-113}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-ictss13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-ictss13.pdf}, doi = {10.1007/978-3-642-41707-8_7}, abstract = {Model-based testing has mainly focused on models where currency is interpreted as interleaving (like the ioco theory for labeled transition systems), which may be too coarse when one wants concurrency to be preserved in the implementation. In order to test such concurrent systems, we choose to use Petri nets as specifications and define a concurrent conformance relation named co-ioco. We propose a test generation algorithm based on Petri net unfolding able to build a complete test suite w.r.t our co-ioco conformance relation. In addition we propose a coverage criterion based on a dedicated notion of complete prefixes that selects a manageable test suite.} }
@inproceedings{PBB-dx13, address = {Jerusalem, Israel}, month = oct, year = 2013, editor = {Kalech, Meir and Feldman, Alexander and Provan, Gregory}, acronym = {{DX}'13}, booktitle = {{P}roceedings of the 24th {I}nternational {W}orkshop on {P}rinciples of {D}iagnosis ({DX}'13)}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Bonigo, Gonzalo and Brand{\'a}n{ }Briones, Laura}, title = {Distributed Analysis of Diagnosability in Concurrent Systems}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PBB-dx13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PBB-dx13.pdf}, abstract = {Complex systems often exhibit unexpected faults that are difficult to handle. Such systems are desirable to be diagnosable, i.e. faults can be automatically detected as they occur (or shortly afterwards), enabling the system to handle the fault or recover. A system is diagnosable if it is possible to detect every fault, in a finite time after they occurred, by only observing the available information from the system. Complex systems are usually built from simpler components running concurrently. We study how to infer the diagnosability property of a complex system (distributed and with multiple faults) from a parallelized analysis of the diagnosability of each of its components synchronizing with fault free versions of the others. In this paper we make the following contributions: (1)~we~address the diagnosability problem of concurrent systems with arbitrary faults occurring freely in each component. (2)~We~distribute the diagnosability analysis and illustrate our approach with examples. Moreover, (3)~we~present a prototype tool that implements our techniques showing promising results.} }
@inproceedings{reichert-rp13, address = {Uppsala, Sweden}, month = sep, year = 2013, volume = {8169}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abdulla, Parosh Aziz and Potapov, Igor}, acronym = {{RP}'13}, booktitle = {{P}roceedings of the 7th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'13)}, author = {Reichert, Julien}, title = {On The Complexity of Counter Reachability Games}, pages = {196-208}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JR-rp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JR-rp13.pdf}, doi = {10.1007/978-3-642-41036-9_18}, abstract = {Counter reachability games are played by two players on a graph with labelled edges. Each move consists in picking an edge from the current location and adding its label to a counter vector. The objective is to reach a given counter value in a given location. We distinguish three semantics for counter reachability games, according to what happens when a counter value would become negative: the edge is either disabled, or enabled but the counter value becomes zero, or enabled. We consider the problem of deciding the winner in counter reachability games and show that, in most cases, it has the same complexity under all semantics. Surprisingly, under one semantics, the complexity in dimension one depends on whether the objective value is zero or any other integer.} }
@inproceedings{BHJL-rp13, address = {Uppsala, Sweden}, month = sep, year = 2013, volume = {8169}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abdulla, Parosh Aziz and Potapov, Igor}, acronym = {{RP}'13}, booktitle = {{P}roceedings of the 7th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'13)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Jovanovic, Aleksandra and Lime, Didier}, title = {Parametric Interrupt Timed Automata}, pages = {59-69}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHJL-rp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHJL-rp13.pdf}, doi = {10.1007/978-3-642-41036-9_7}, abstract = {Parametric reasoning is particularly relevant for timed models, but very often leads to undecidability of reachability problems. We propose a parametrised version of Interrupt Timed Automata (an~expressive model incomparable to Timed Automata), where polynomials of parameters can occur in guards and updates. We prove that different reachability problems, including robust reachability, are decidable for this model, and we give complexity upper bounds for a fixed or variable number of clocks and parameters.} }
@inproceedings{FS-rp13, address = {Uppsala, Sweden}, month = sep, year = 2013, volume = {8169}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abdulla, Parosh Aziz and Potapov, Igor}, acronym = {{RP}'13}, booktitle = {{P}roceedings of the 7th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'13)}, author = {Fribourg, Laurent and Soulat, Romain}, title = {Stability Controllers for Sampled Switched Systems}, pages = {135-145}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-rp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-rp13.pdf}, doi = {10.1007/978-3-642-41036-9_13}, abstract = {We consider in this paper switched systems, a class of hybrid systems recently used with success in various domains such as automotive industry and power electonics. We propose a state-dependent control strategy which makes the trajectories of the analyzed system converge to finite cyclic sequences of points. Our method relies on a technique of decomposition of the state space into local regions where the control is uniform. We have implemented the procedure using zonotopes, and applied it successfully to several examples of the literature.} }
@incollection{DKNPPPS-book13, author = {Duflot, Marie and Kwiatkowska, Marta and Norman, Gethin and Parker, David and Peyronnet, Sylvain and Picaronny, Claudine and Sproston, Jeremy}, title = {Practical Applications of Probabilistic Model Checking to Communication Protocols}, booktitle = {Formal Methods for Industrial Critical Systems: A Survey of Applications}, editor = {Gnesi, Stefania and Margaria, Tiziana}, publisher = {John Wiley \& Sons, Ltd. and {IEEE} Computer Society Press}, year = 2013, chapter = 7, pages = {133-150}, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKNPPPS-book13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKNPPPS-book13.pdf}, doi = {10.1002/9781118459898.ch7} }
@inproceedings{DDS-icalp13, address = {Riga, Latvia}, month = jul, year = 2013, volume = {7966}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Fomin, Fedor V. and Freivalds, R{\=u}si{\c{n}}{\v{s}} and Kwiatkowska, Marta and Peleg, David}, acronym = {{ICALP}'13}, booktitle = {{P}roceedings of the 40th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'13)~-- {P}art~{II}}, author = {Demri, St{\'e}phane and Dhar, Amit Kumar and Sangnier, Arnaud}, title = {On the Complexity of Verifying Regular Properties on Flat Counter Systems}, pages = {162-173}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-icalp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-icalp13.pdf}, doi = {10.1007/978-3-642-39212-2_17}, abstract = {Among the approximation methods for the verification of counter systems, one of them consists in model-checking their flat unfoldings. Unfortunately, the complexity characterization of model-checking problems for such operational models is not always well studied except for reachability queries or for Past LTL. In this paper, we characterize the complexity of model-checking problems on flat counter systems for the specification languages including first-order logic, linear mu-calculus, infinite automata, and related formalisms. Our results span different complexity classes (mainly from PTime to PSpace) and they apply to languages in which arithmetical constraints on counter values are systematically allowed. As far as the proof techniques are concerned, we provide a uniform approach that focuses on the main issues.} }
@inproceedings{JGL-mfcs13, address = {Klosterneuburg, Austria}, month = aug, year = 2013, volume = {8087}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chatterjee, Krishnendu and Sgall, Ji{\v{r}}{\'\i}}, acronym = {{MFCS}'13}, booktitle = {{P}roceedings of the 38th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'13)}, author = {Goubault{-}Larrecq, Jean}, title = {A Constructive Proof of the Topological {K}ruskal Theorem}, pages = {22-41}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mfcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mfcs13.pdf}, doi = {10.1007/978-3-642-40313-2_3}, abstract = {We give a constructive proof of Kruskal's Tree Theorem---precisely, of a topological extension of~it. The proof is in the style of a constructive proof of Higman's Lemma due to Murthy and Russell~(1990), and illuminates the role of regular expressions there. In the process, we discover an extension of Dershowitz' recursive path ordering to a form of cyclic terms which we call \(\mu\)-terms. This all came from recent research on Noetherian spaces, and serves as a teaser for their theory.} }
@inproceedings{Fribourg-fsfma13, address = {Singapore}, month = jul, year = 2013, volume = 31, series = {Open Access Series in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Choppy, {\relax Ch}ristine and Sun, Jun}, acronym = {{FSFMA}'13}, booktitle = {{P}roceedings of the 1st {F}rench-{S}ingaporean {W}orkshop on {F}ormal {M}ethods and {A}pplications ({FSFMA}'13)}, author = {Fribourg, Laurent}, title = {Control of Switching Systems by Invariance Analysis (Invited~Talk)}, pages = {1}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/F-fsfma13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/F-fsfma13.pdf}, doi = {10.4230/OASIcs.FSFMA.2013.1}, abstract = {Switched systems are embedded devices widespread in industrial applications such as power electronics and automotive control. They consist of continuous-time dynamical subsystems and a rule that controls the switching between them. Under a suitable control rule, the system can improve its steady-state performance and meet essential properties such as safety and stability in desirable operating zones. We explain that such controller synthesis problems are related to the construction of appropriate invariants of the state space, which approximate the limit sets of the system trajectories. We present a new approach of invariant construction based on a technique of state space decomposition interleaved with forward fixed point computation. The method is illustrated in a case study taken from the field of power electronics.} }
@inproceedings{FKS-fsfma13, address = {Singapore}, month = jul, year = 2013, volume = 31, series = {Open Access Series in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Choppy, {\relax Ch}ristine and Sun, Jun}, acronym = {{FSFMA}'13}, booktitle = {{P}roceedings of the 1st {F}rench-{S}ingaporean {W}orkshop on {F}ormal {M}ethods and {A}pplications ({FSFMA}'13)}, author = {Fribourg, Laurent and K{\"u}hne, Ulrich and Soulat, Romain}, title = {Constructing Attractors of Nonlinear Dynamical Systems by State Space Decomposition}, pages = {53-60}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FKS-fsfma13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FKS-fsfma13.pdf}, doi = {10.4230/OASIcs.FSFMA.2013.53}, abstract = {In a previous work, we have shown how to generate attractor sets of affine hybrid systems using a method of state space decomposition. We show here how to adapt the method to polynomial dynamics systems by approximating them as switched affine systems. We show the practical interest of the method on standard examples of the literature.} }
@inproceedings{GHPR-pn13, address = {Milano, Italy}, month = jun, year = 2013, volume = {7927}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Colom, Jos{\'e}-Manuel and Desel, J{\"o}rg}, acronym = {{PETRI~NETS}'13}, booktitle = {{P}roceedings of the 34th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'13)}, author = {Geeraerts, Gilles and Heu{\ss}ner, Alexander and Praveen, M. and Raskin, Jean-Fran{\c{c}}ois}, title = {{{\(\omega\)}}-{P}etri nets}, pages = {49-69}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GHPR-atpn13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GHPR-atpn13.pdf}, doi = {10.1007/978-3-642-38697-8_4}, abstract = {We introduce \(\omega\)-Petri nets (\(\omega\)PN), an extension of plain Petri nets with \(\omega\)-labeled input and output arcs, that is well-suited to analyse parametric concurrent systems with dynamic thread creation. Most techniques (such as the Karp and Miller tree or the Rackoff technique) that have been proposed in the setting of plain Petri nets do not apply directly to \(\omega\)PN because \(\omega\)PN define transition systems that have infinite branching. This motivates a thorough analysis of the computational aspects of~\(\omega\)PN. We show that an \(\omega\)PN can be turned into a plain Petri net that allows to recover the reachability set of the \(\omega\)PN, but that does not preserve termination. This yields complexity bounds for the reachability, (place) boundedness and coverability problems on \(\omega\)PN. We provide a practical algorithm to compute a coverability set of the \(\omega\)PN and to decide termination by adapting the classical Karp and Miller tree construction. We also adapt the Rackoff technique to \(\omega\)PN, to obtain the exact complexity of the termination problem. Finally, we consider the extension of \(\omega\)PN with reset and transfer arcs, and show how this extension impacts the decidability and complexity of the aforementioned problems.} }
@article{KS-tocl13, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Kazana, Wojciech and Segoufin, Luc}, title = {Enumeration of monadic second-order queries on trees}, volume = 14, number = {4}, year = 2013, month = nov, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-tocl13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-tocl13.pdf}, doi = {10.1145/2528928}, abstract = {We consider the enumeration problem of monadic second-order (MSO) queries with first-order free variables over trees. In [Bagan 2006] it was shown that this problem is in \textsc{Constant-Delay}\(_{\text{lin}}\). An enumeration problem belongs to \textsc{Constant-Delay}\(_{\text{lin}}\) if for an input structure of size~\(n\) it can be solved by: \begin{itemize} \item an \(O(n)\) precomputation phase building an index structure, \item followed by a phase enumerating the answers with no repetition and a constant delay between two consecutive outputs. \end{itemize} In this article we give a different proof of this result based on the deterministic factorization forest decomposition theorem of Colcombet [Colcombet~2007].} }
@inproceedings{BST-pods13, address = {New~York, New~York, USA}, month = jun, year = 2013, publisher = {ACM Press}, editor = {Fan, Wenfei}, acronym = {{PODS}'13}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'13)}, author = {Boja{\'n}czyk, Miko{\l}aj and Segoufin, Luc and Toru{\'n}czyk, Szymon}, title = {Verification of Database-driven Systems via Amalgamation}, pages = {63-74}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BST-pods13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BST-pods13.pdf}, doi = {10.1145/2463664.2465228}, abstract = {We describe a general framework for static verification of systems that base their decisions upon queries to databases. The database is specified using constraints, typically a schema, and is not modified during a run of the system. The system is equipped with a finite number of registers for storing intermediate information from the database and the specification consists of a transition table described using quantifier-free formulas that can query either the database or the registers.\par Our main result concerns systems querying XML databases---modeled as data trees---using quantifier-free formulas with predicates such as the descendant axis or comparison of data values. In this scenario we show an ExpSpace algorithm for deciding reachability.\par Our technique is based on the notion of amalgamation and is quite general. For instance it also applies to relational databases (with an optimal \textsc{PSpace} algorithm).\par We also show that minor extensions of the model lead to undecidability.} }
@inproceedings{GLS-pods13, address = {New~York, New~York, USA}, month = jun, year = 2013, publisher = {ACM Press}, editor = {Fan, Wenfei}, acronym = {{PODS}'13}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'13)}, author = {Gheerbrant, Am{\'e}lie and Libkin, Leonid and Sirangelo, Cristina}, title = {When is Na{\"\i}ve Evaluation Possible?}, pages = {75-86}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pods13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pods13.pdf}, doi = {10.1145/2463664.2463674}, abstract = {The term na{\"\i}ve evaluation refers to evaluating queries over incomplete databases as if nulls were usual data values, i.e., to using the standard database query evaluation engine. Since the semantics of query answering over incomplete databases is that of certain answers, we would like to know when na{\"\i}ve evaluation computes them: i.e., when certain answers can be found without inventing new specialized algorithms. For relational databases it is well known that unions of conjunctive queries possess this desirable property, and results on preservation of formulae under homomorphisms tell us that within relational calculus, this class cannot be extended under the open-world assumption.\par Our goal here is twofold. First, we develop a general framework that allows us to determine, for a given semantics of incompleteness, classes of queries for which na{\"\i}ve evaluation computes certain answers. Second, we apply this approach to a variety of semantics, showing that for many classes of queries beyond unions of conjunctive queries, na{\"\i}ve evaluation makes perfect sense under assumptions different from open-world. Our key observations are: (1)~na{\"\i}ve evaluation is equivalent to monotonicity of queries with respect to a semantics-induced ordering, and (2)~for most reasonable semantics, such monotonicity is captured by preservation under various types of homomorphisms. Using these results we find classes of queries for which na{\"\i}ve evaluation works, e.g., positive first-order formulae for the closed-world semantics. Even more, we introduce a general relation-based framework for defining semantics of incompleteness, show how it can be used to capture many known semantics and to introduce new ones, and describe classes of first-order queries for which na{\"\i}ve evaluation works under such semantics.} }
@inproceedings{AV-pods13, address = {New~York, New~York, USA}, month = jun, year = 2013, publisher = {ACM Press}, editor = {Fan, Wenfei}, acronym = {{PODS}'13}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'13)}, author = {Abiteboul, Serge and Vianu, Victor}, title = {Collaborative Data-Driven Workflows: Think Global, Act Local}, pages = {91-102}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AV-pods13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AV-pods13.pdf}, doi = {10.1145/2463664.2463672}, abstract = {We introduce and study a model of collaborative data-driven workflows. In a local-as-view style, each peer has a partial view of a global instance that remains purely virtual. Local updates have side effects on other peers' data, defined via the global instance. We also assume that the peers provide (an abstraction of) their specifications, so that each peer can actually see and reason on the specification of the entire system. We study the ability of a peer to carry out runtime reasoning about the global run of the system, and in particular about actions of other peers, based on its own local observations. A main contribution is to show that, under a reasonable restriction (namely, key-visibility ), one can construct a finite symbolic representation of the infinite set of global runs consistent with given local observations. Using the symbolic representation, we show that we can evaluate in pspace a large class of properties over global runs, expressed in an extension of first-order logic with past linear-time temporal operators, PLTL-FO. We also provide a variant of the algorithm allowing to incrementally monitor a statically defined property, and then develop an extension allowing to monitor an infinite class of properties sharing the same temporal structure, defined dynamically as the run unfolds. Finally, we consider an extension of the language, augmeting workflow control with PLTL-FO formulas. We prove that this does not increase the power of the workflow specification language, thereby showing that the language is closed under such introspective reasoning.} }
@inproceedings{KS-pods13, address = {New~York, New~York, USA}, month = jun, year = 2013, publisher = {ACM Press}, editor = {Fan, Wenfei}, acronym = {{PODS}'13}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'13)}, author = {Kazana, Wojciech and Segoufin, Luc}, title = {Enumeration of First-Order Queries on Classes of Structures With Bounded Expansion}, pages = {297-308}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-pods13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-pods13.pdf}, doi = {10.1145/2463664.2463667}, abstract = {We consider the evaluation of first-order queries over classes of databases with bounded expansion. The notion of bounded expansion is fairly broad and generalizes bounded degree, bounded treewidth and exclusion of at least one minor. It was known that over a class of databases with bounded expansion, first-order sentences could be evaluated in time linear in the size of the database. We first give a different proof of this result. Moreover, we show that answers to first-order queries can be enumerated with constant delay after a linear time preprocessing. We also show that counting the number of answers to a query can be done in time linear in the size of the database.} }
@inproceedings{SHLRFLF-epe13, address = {Lille, France}, month = sep, year = 2013, publisher = {{IEEE} Power Electronics Society}, editor = {Lataire, {\relax Ph}ilippe}, booktitle = {{P}roceedings of the 15th {E}uropean {C}onference on {P}ower {E}lectronics and {A}pplications ({EPE}'13)}, author = {Soulat, Romain and H{\'e}rault, Guillaume and Labrousse, Denis and Revol, Bertrand and Feld, Gilles and Lefebvre, St{\'e}phane and Fribourg, Laurent}, title = {Use of a full wave correct-by-design command to control a multilevel modular converter}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SHLRFLF-epe13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SHLRFLF-epe13.pdf}, doi = {10.1109/EPE.2013.6634448}, abstract = {This paper proposes a method to synthesize a full wave control applied to a multilevel modular converter~(MMC). This method guarantees the output waveform and the balancing of the capacitors. Numerical simulations and experiments are used to check the validity of the approach.} }
@inproceedings{ABDHHKLP-icfem13, address = {Queenstown, New~Zealand}, month = oct # {-} # nov, year = 2013, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Groves, Lindsay and Sub, Jing}, acronym = {{ICFEM}'13}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}ormal {E}ngineering {M}ethods ({ICFEM}'13)}, author = {Andr{\'e}, {\'E}tienne and Barbot, Beno{\^\i}t and D{\'e}moulins, Cl{\'e}ment and Hillah, Lom Messan and Hulin{-}Hubard, Francis and Kordon, Fabrice and Linard, Alban and Petrucci, Laure}, title = {A Modular Approach for Reusing Formalisms in Verification Tools of Concurrent Systems}, pages = {199-214}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDHHKLP-icfem13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDHHKLP-icfem13.pdf}, doi = {10.1007/978-3-642-41202-8_14}, abstract = {Over the past two decades, numerous verification tools have been successfully used for verifying complex concurrent systems, modelled using various formalisms. However, it is still hard to coordinate these tools since they rely on such a large number of formalisms. Having a proper syntactical mechanism to interrelate them through variability would increase the capability of effective integrated formal methods. In this paper, we propose a modular approach for defining new formalisms by reusing existing ones and adding new features and/or constraints. Our approach relies on standard XML technologies; their use provides the capability of rapidly and automatically obtaining tools for representing and validating models. It thus enables fast iterations in developing and testing complex formalisms. As a case study, we applied our modular definition approach on families of Petri nets and timed automata.} }
@inproceedings{AHHKLLP-iceccs13, address = {Singapore}, month = jul, year = 2013, publisher = {{IEEE} Computer Society Press}, editor = {Liu, Yang and Martin, Andrew}, acronym = {{ICECCS}'13}, booktitle = {{P}roceedings of the 18th {IEEE} {I}nternational {C}onference on {E}ngineering of {C}omplex {C}omputer {S}ystems ({ICECCS}'13)}, author = {Andr{\'e}, {\'E}tienne and Hillah, Lom Messan and Hulin{-}Hubard, Francis and Kordon, Fabrice and Lembachar, Yousra and Linard, Alban and Petrucci, Laure}, title = {{C}osy{V}erif: An~Open Source Extensible Verification Environment}, pages = {33-36}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AHHKLLP-iceccs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AHHKLLP-iceccs13.pdf}, doi = {10.1109/ICECCS.2013.15}, abstract = {CosyVerif aims at gathering within a common framework various existing tools for specification and verification. It has been designed in order to 1)~support different formalisms with the ability to easily create new ones, 2)~provide a graphical user interface for every formalism, 3)~include verification tools called via the graphical interface or via an API as a Web service, and 4)~offer the possibility for a developer to integrate his/her own tool without much effort, also allowing it to interact with the other tools. Several tools have already been integrated for the formal verification of (extensions~of) Petri nets and timed automata.} }
@inproceedings{LM-gandalf13, address = {Borca di Cadore, Italy}, month = aug, year = 2013, volume = {119}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Puppis, Gabriele and Villa, Tiziano}, acronym = {{GandALF}'13}, booktitle = {{P}roceedings of the 4th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'13)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {Satisfiability of {ATL} with strategy contexts}, pages = {208-223}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LM-gandalf13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LM-gandalf13.pdf}, doi = {10.4204/EPTCS.119.18}, abstract = {Various extensions of the temporal logic ATL have recently been introduced to express rich properties of multi-agent systems. Among these, ATLsc extends ATL with \emph{strategy contexts}, while Strategy Logic has \emph{first-order quantification} over strategies. There is a price to pay for the rich expressiveness of these logics: model-checking is non-elementary, and satisfiability is undecidable.\par We prove in this paper that satisfiability is decidable in several special cases. The most important one is when restricting to \emph{turn-based} games. We~prove that decidability also holds for concurrent games if the number of moves available to the agents is bounded. Finally, we~prove that restricting strategy quantification to memoryless strategies brings back undecidability.} }
@inproceedings{BDGORW-atva13, address = {Hanoi, Vietnam}, month = oct, year = {2013}, volume = {8172}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dang{-}Van, Hung and Ogawa, Mizuhito}, acronym = {{ATVA}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'13)}, author = {Brihaye, {\relax Th}omas and Doyen, Laurent and Geeraerts, Gilles and Ouaknine, Jo{\"e}l and Raskin, Jean-Fran{\c{c}}ois and Worrell, James}, title = {Time-Bounded Reachability for Monotonic Hybrid Automata: Complexity and Fixed Points}, pages = {55-70}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDGORW-atva13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDGORW-atva13.pdf}, doi = {10.1007/978-3-319-02444-8_6}, abstract = {We study the \emph{time-bounded reachability problem} for \emph{monotonic hybrid automata} (MHA), i.e., rectangular hybrid automata for which the rate of each variable is either always non-negative or always non-positive. In this paper, we revisit the decidability results presented in [Brihaye et~al., \textit{On reachability for hybrid automata over bounded time}, ICALP~2011] and show that the problem is NExpTime-complete. We also show that we can effectively compute fixed points that characterise the sets of states that are reachable (resp. co-reachable) within \(T\) time units from a given state.} }
@inproceedings{CDRR-atva13, address = {Hanoi, Vietnam}, month = oct, year = {2013}, volume = {8172}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dang{-}Van, Hung and Ogawa, Mizuhito}, acronym = {{ATVA}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'13)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Randour, Mickael and Raskin, Jean-Fran{\c{c}}ois}, title = {Looking at Mean-Payoff and Total-Payoff through Windows}, pages = {118-132}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDRR-atva13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDRR-atva13.pdf}, doi = {10.1007/978-3-319-02444-8_10}, abstract = {We consider two-player games played on weighted directed graphs with mean-payoff and total-payoff objectives, two classical quantitative objectives. While for single-dimensional games the complexity and memory bounds for both objectives coincide, we show that in contrast to multi-dimensional mean-payoff games that are known to be coNP-complete, multi-dimensional total-payoff games are undecidable. We introduce conservative approximations of these objectives, where the payoff is considered over a local finite window sliding along a play, instead of the whole play. For single dimension, we show that (i)~if the window size is polynomial, deciding the winner takes polynomial time, and (ii)~the existence of a bounded window can be decided in NP coNP, and is at least as hard as solving mean-payoff games. For multiple dimensions, we show that (i)~the problem with fixed window size is EXPTIME-complete, and (ii)~there is no primitive-recursive algorithm to decide the existence of a bounded window.} }
@inproceedings{RS-atva13, address = {Hanoi, Vietnam}, month = oct, year = {2013}, volume = {8172}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dang{-}Van, Hung and Ogawa, Mizuhito}, acronym = {{ATVA}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'13)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {Cunf: A~Tool for Unfolding and Verifying Petri Nets with Read Arcs}, pages = {492-495}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-atva13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-atva13.pdf}, doi = {10.1007/978-3-319-02444-8_42}, abstract = {Cunf is a tool for building and analyzing unfoldings of Petri nets with read arcs. An unfolding represents the behaviour of a net by a partial order, effectively coping with the state-explosion problem stemming from the interleaving of concurrent actions. C-net unfoldings can be up to exponentially smaller than Petri net unfoldings, and recent work proposed algorithms for their construction and verification. Cunf is the first implementation of these techniques, it has been carefully engineered and optimized to ensure that the theoretical gains are put into practice.} }
@inproceedings{AFS-atva13, address = {Hanoi, Vietnam}, month = oct, year = {2013}, volume = {8172}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dang{-}Van, Hung and Ogawa, Mizuhito}, acronym = {{ATVA}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'13)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and Soulat, Romain}, title = {Merge and Conquer: State Merging in Parametric Timed Automata}, pages = {381-396}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-atva13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-atva13.pdf}, doi = {10.1007/978-3-319-02444-8_27}, abstract = {Parameter synthesis for real-time systems aims at synthesizing dense sets of valuations for the timing requirements, guaranteeing a good behavior. A popular formalism for modeling parameterized realtime systems is parametric timed automata (PTAs). Compacting the state space of PTAs as much as possible is fundamental. We present here a state merging reduction based on convex union, that reduces the state space, but yields an over-approximation of the executable paths. However, we show that it preserves the sets of reachable locations and executable actions. We also show that our merging technique associated with the inverse method, an algorithm for parameter synthesis, preserves locations as well, and outputs larger sets of parameter valuations.} }
@article{CCD-tcs13, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Cheval, Vincent and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Deciding equivalence-based properties using constraint solving}, year = {2013}, month = jun, volume = {492}, pages = {1-39}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-tcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-tcs13.pdf}, doi = {10.1016/j.tcs.2013.04.016}, abstract = {Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require a notion of behavioural equivalence. Typical examples are anonymity, privacy related properties or statements closer to security properties used in cryptography.\par In this paper, we consider three notions of equivalence defined in the applied pi calculus: observational equivalence, may-testing equivalence, and trace equivalence. First, we study the relationship between these three notions. We show that for determinate processes, observational equivalence actually coincides with trace equivalence, a notion simpler to reason with. We exhibit a large class of determinate processes, called simple processes, that capture most existing protocols and cryptographic primitives. While trace equivalence and may-testing equivalence seem very similar, we show that may-testing equivalence is actually strictly stronger than trace equivalence. We prove that the two notions coincide for image-finite processes, such as processes without replication.\par Second, we reduce the decidability of trace equivalence (for finite processes) to deciding symbolic equivalence between sets of constraint systems. For simple processes without replication and with trivial else branches, it turns out that it is actually sufficient to decide symbolic equivalence between pairs of positive constraint systems. Thanks to this reduction and relying on a result first proved by M. Baudet, this yields the first decidability result of observational equivalence for a general class of equational theories (for processes without else branch nor replication). Moreover, based on another decidability result for deciding equivalence between sets of constraint systems, we get decidability of trace equivalence for processes with else branch for standard primitives.} }
@inproceedings{SS-concur13, address = {Buenos Aires, Argentina}, month = aug, year = 2013, volume = 8052, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {D'Argenio, Pedro R. and Melgratti, Hern{\'a}n)}, acronym = {{CONCUR}'13}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'13)}, author = {Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {The Power of Well-Structured Systems}, pages = {5-24}, url = {http://arxiv.org/abs/1402.2908}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SS-concur13.pdf}, doi = {10.1007/978-3-642-40184-8_2}, abstract = {Well-structured systems, aka WSTS, are computational models where the set of possible configurations is equipped with a well-quasi-ordering which is compatible with the transition relation between configurations. This structure supports generic decidability results that are important in verification and several other fields. This paper recalls the basic theory underlying well-structured systems and shows how two classic decision algorithms can be formulated as an exhaustive search for some {"}bad{"} sequences. This lets us describe new powerful techniques for the complexity analysis of WSTS algorithms. Recently, these techniques have been successful in precisely characterizing the power, in a complexity-theoretical sense, of several important WSTS models like unreliable channel systems, monotonic counter machines, or networks of timed systems.} }
@inproceedings{CCS-cade2013, address = {Lake Placid, New~York, USA}, month = jun, year = 2013, volume = 7898, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Bonacina, Maria Paola}, acronym = {{CADE}'13}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {A}utomated {D}eduction ({CADE}'13)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique and Scerri, Guillaume}, title = {Tractable inference systems: an extension with a deducibility predicate}, pages = {91-108}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCS-cade2013.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCS-cade2013.pdf}, doi = {10.1007/978-3-642-38574-2_6}, abstract = {The main contribution of the paper is a PTIME decision procedure for the satisfiability problem in a class of first-order Horn clauses. Our result is an extension of the tractable classes of Horn clauses of Basin & Ganzinger in several respects. For instance, our clauses may contain atomic formulas \(S \vdash t\) where \(\vdash\) is a predicate symbol and \(S\) is a finite set of terms instead of a term. \(\vdash\)~is used to represent any possible computation of an attacker, given a set of messages~\(S\). The class of clauses that we consider encompasses the clauses designed by Bana~\& Comon-Lundh for security proofs of protocols in a computational model. \par Because of the (variadic) \(\vdash\) predicate symbol, we cannot use ordered resolution strategies only, as in Basin~\& Ganzinger: given \(S \vdash t\), we must avoid computing \(S' \vdash t\) for all subsets \(S'\) of~\(S\). Instead, we design PTIME entailment procedures for increasingly expressive fragments, such procedures being used as oracles for the next fragment. \par Finally, we obtain a PTIME procedure for arbitrary ground clauses and saturated Horn clauses (as in Basin~\& Ganzinger), together with a particular class of (non saturated) Horn clauses with the \(\vdash\) predicate and constraints (which are necessary to cover the application).} }
@inproceedings{HRS-acsd13, address = {Barcelona, Spain}, month = jul, year = 2013, publisher = {{IEEE} Computer Society Press}, editor = {Pietkiewicz{-}Koutny, Marta and Lazarescu, Mihai Teodor}, acronym = {{ACSD}'13}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'13)}, author = {Haar, Stefan and Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {Reveal Your Faults: It's Only Fair!}, pages = {120-129}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HRS-acsd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HRS-acsd13.pdf}, doi = {10.1109/ACSD.2013.15}, abstract = {We present a methodology for fault diagnosis in concurrent, partially observable systems with additional fairness constraints. In this weak diagnosis, one asks whether a concurrent chronicle of observed events allows to determine that a non-observable fault will inevitably occur, sooner or later, on any maximal system run compatible with the observation. The approach builds on strengths and techniques of unfoldings of safe Petri nets, striving to compute a compact prefix of the unfolding that carries sufficient information for the diagnosis algorithm. Our work extends and generalizes the unfolding-based diagnosis approaches by Benveniste \textit{et~al.} as well as Esparza and Kern. Both of these focused mostly on the use of sequential observations, in particular did not exploit the capacity of unfoldings to reveal inevitable occurrences of concurrent or future events studied by Balaguer \textit{et~al.}. Our diagnosis method captures such indirect, revealed dependencies. We~develop theoretical foundations and an algorithmic solution to the diagnosis problem, and present a SAT solving method for practical diagnosis with our approach.} }
@article{HKS-tcs13, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Haar, Stefan and Kern, Christian and Schwoon, Stefan}, title = {Computing the Reveals Relation in Occurrence Nets}, year = 2013, month = jul, volume = 493, pages = {66-79}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HKS-tcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HKS-tcs13.pdf}, doi = {10.1016/j.tcs.2013.04.028}, abstract = {Petri net unfoldings are a useful tool to tackle state-space explosion in verification and related tasks. Moreover, their structure allows to access directly the relations of causal precedence, concurrency, and conflict between events. Here, we explore the data structure further, to determine the following relation: event~\(a\) is said to reveal event~\(b\) iff the occurrence of~\(a\) implies that~\(b\) inevitably occurs, too, be it before, after, or concurrently with~\(a\). Knowledge of reveals facilitates in particular the analysis of partially observable systems, in the context of diagnosis, testing, or verification; it can also be used to generate more concise representations of behaviours via abstractions. The reveals relation was previously introduced in the context of fault diagnosis, where it was shown that the reveals relation was decidable: for a given pair~\(a,b\) in the unfolding~\(U\) of a safe Petri net~\(N\), a finite prefix~\(P\) of~\(U\) is sufficient to decide whether or not \(a\) reveals~\(b\). In this paper, we first considerably improve the bound on~\(|P|\). We then show that there exists an efficient algorithm for computing the relation on a given prefix. We have implemented the algorithm and report on experiments.} }
@inproceedings{FS-ncmip13, address = {Cachan, France}, month = may, year = 2013, number = {012007}, volume = 464, series = {Journal of Physics: Conference Series}, publisher = {{IOS} Press}, editor = {Blanc{-}F{\'e}raud, Laure and Joubert, Pierre-Yves}, acronym = {{NCMIP}'13}, booktitle = {{P}roceedings of the 3rd {I}nternational {W}orkshop on {N}ew {C}omputational {M}ethods for {I}nverse {P}roblems ({NCMIP}'13)}, author = {Fribourg, Laurent and Soulat, Romain}, title = {Limit Cycles of Controlled Switched Systems: Existence, Stability, Sensitivity}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-ncmip13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FS-ncmip13.pdf}, doi = {10.1088/1742-6596/464/1/012007}, abstract = {We present a control method which makes the trajectories of a switched system converge to a stable limit cycle lying in a desired region of equilibrium. The method is illustrated on the boost DC-DC converter example. We also point out in this example the sensitivity of limit cycles to parameter variations by showing how the limit cycle evolves in presence of small perturbations of some system parameters. This suggests that limit cycles are good candidates for reliable estimations of the physical parameters of switched systems, using an appropriate inverse approach.} }
@inproceedings{ABHH-qest13, address = {Buenos Aires, Argentina}, month = aug, year = 2013, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'13}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'13)}, author = {Akshay, S. and Bertrand, Nathalie and Haddad, Serge and H{\'e}lou{\"e}t, Lo{\"\i}c}, title = {The steady-state control problem for Markov decision processes}, pages = {290-304}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABHH-qest13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABHH-qest13.pdf}, doi = {10.1007/978-3-642-40196-1_26}, abstract = {This paper addresses a control problem for probabilistic models in the setting of Markov decision processes~(MDP). We~are interested in the steady-state control problem which asks, given an ergodic MDP~\(M\) and a distribution~\(\delta_{\text{goal}}\), whether there exists a (history-dependent randomized) policy \(\pi\) ensuring that the steady-state distribution of~\(M\) under~\(\pi\) is exactly~\(\delta_{\text{goal}}\). We~first show that stationary randomized policies suffice to achieve a given steady-state distribution. Then we infer that the steady-state control problem is decidable for~MDP, and can be represented as a linear program which is solvable in PTIME. This decidability result extends to labeled MDP (LMDP) where the objective is a steady-state distribution on labels carried by the states, and we provide a PSPACE algorithm. We also show that a related steady-state language inclusion problem is decidable in EXPTIME for LMDP. Finally, we prove that if we consider MDP under partial observation (POMDP), the steady-state control problem becomes undecidable.} }
@inproceedings{KKS-esorics13, address = {Egham, U.K.}, month = sep, year = 2013, volume = {8134}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Crampton, Jason and Jajodia, Sushil and Mayes, Keith}, acronym = {{ESORICS}'13}, booktitle = {{P}roceedings of the 18th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'13)}, author = {Kremer, Steve and K{\"u}nnemann, Robert and Steel, Graham}, title = {Universally Composable Key-Management}, pages = {327-344}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KKS-esorics13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KKS-esorics13.pdf}, doi = {10.1007/978-3-642-40203-6_19}, abstract = {We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in simulation-based security frameworks.} }
@phdthesis{sankur-phd2013, author = {Sankur, Ocan}, title = {Robustness in Timed Automata: Analysis, Synthesis, Implementation}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/sankur-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/sankur-phd13.pdf} }
@article{FK-ijfcs13, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Fribourg, Laurent and K{\"u}hne, Ulrich}, title = {Parametric Verification and Test Coverage for Hybrid Automata using the Inverse Method}, year = 2013, month = feb, volume = 24, number = 2, pages = {233-249}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FK-ijfcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FK-ijfcs13.pdf}, doi = {10.1142/S0129054113400091}, abstract = {Hybrid systems combine continuous and discrete behavior. Hybrid Automata are a powerful formalism for the modeling and verification of such systems. A~common problem in hybrid system verification is the good parameters problem, which consists in identifying a set of parameter valuations which guarantee a certain behavior of a system. Recently, a method has been presented for attacking this problem for Timed Automata. In this paper, we show the extension of this methodology for hybrid automata with linear and affine dynamics. The method is demonstrated with a hybrid system benchmark from the literature.} }
@inproceedings{CJ-formats13, address = {Buenos Aires, Argentina}, month = aug, year = 2013, volume = 8053, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Braberman, V{\'\i}ctor and Fribourg, Laurent}, acronym = {{FORMATS}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'13)}, author = {Chatain, {\relax Th}omas and Jard, Claude}, title = {Back in Time {P}etri Nets}, pages = {91-105}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CJ-formats13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CJ-formats13.pdf}, doi = {10.1007/978-3-642-40229-6_7}, abstract = {The time progress assumption is at the core of the semantics of real-time formalisms. It is also the major obstacle to the development of partial-order techniques for real-time distributed systems since the events are ordered both by causality and by their occurrence in time. Anyway, extended free choice safe time Petri nets (TPNs) were already identified as a class where partial order semantics behaves well. We show that, for this class, the time progress assumption can even be dropped (time may go back in case of concurrency), which establishes a nice relation between partial-order semantics and time progress assumption.} }
@inproceedings{BMS-formats13, address = {Buenos Aires, Argentina}, month = aug, year = 2013, volume = 8053, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Braberman, V{\'\i}ctor and Fribourg, Laurent}, acronym = {{FORMATS}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'13)}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robust Weighted Timed Automata and Games}, pages = {31-46}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-formats13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-formats13.pdf}, doi = {10.1007/978-3-642-40229-6_3}, abstract = {Weighted timed automata extend timed automata with cost variables that can be used to model the evolution of various quantities. Although cost-optimal reachability is decidable (in polynomial space) on this model, it becomes undecidable on weighted timed games. This paper studies cost-optimal reachability problems on weighted timed automata and games under robust semantics. More precisely, we consider two perturbation game semantics that introduce imprecisions in the standard semantics, and bring robustness properties w.r.t. timing imprecisions to controllers. We give a polynomial-space algorithm for weighted timed automata, and prove the undecidability of cost-optimal reachability on weighted timed games, showing that the problem is robustly undecidable.} }
@inproceedings{HSS-concur13, address = {Buenos Aires, Argentina}, month = aug, year = 2013, volume = 8052, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {D'Argenio, Pedro R. and Melgratti, Hern{\'a}n)}, acronym = {{CONCUR}'13}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'13)}, author = {Haase, Christoph and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {The Power of Priority Channel Systems}, pages = {319-333}, url = {http://arxiv.org/abs/1301.5500}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HSS-corr13.pdf}, arxivpdf = {http://arxiv.org/pdf/1301.5500}, doi = {10.1007/978-3-642-40184-8_23}, abstract = {We introduce Priority Channel Systems, a new natural class of channel systems where messages carry a numeric priority and where higher-priority messages can supersede lower-priority messages preceding them in the fifo communication buffers. The decidability of safety and inevitability properties is shown via the introduction of a \emph{priority embedding}, a~well-quasi-ordering that has not previously been used in well-structured systems. We then show how Priority Channel Systems can compute Fast-Growing functions and prove that the aforementioned verification problems are \(F_{\epsilon_{0}}\)-complete.} }
@inproceedings{SBMR-concur13, address = {Buenos Aires, Argentina}, month = aug, year = 2013, volume = 8052, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {D'Argenio, Pedro R. and Melgratti, Hern{\'a}n)}, acronym = {{CONCUR}'13}, booktitle = {{P}roceedings of the 24th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'13)}, author = {Sankur, Ocan and Bouyer, Patricia and Markey, Nicolas and Reynier, Pierre-Alain}, title = {Robust Controller Synthesis in Timed Automata}, pages = {546-560}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SBMR-concur13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SBMR-concur13.pdf}, doi = {10.1007/978-3-642-40184-8_38}, abstract = {We consider the fundamental problem of B{\"u}chi acceptance in timed automata in a robust setting. The problem is formalised in terms of controller synthesis: timed automata are equipped with a parametrised game-based semantics that models the possible perturbations of the decisions taken by the controller. We characterise timed automata that are robustly controllable for some parameter, with a simple graph theoretic condition, by showing the equivalence with the existence of an aperiodic lasso that satisfies the winning condition (aperiodicity was defined and used earlier in different contexts to characterise convergence phenomena in timed automata). We then show decidability and PSPACE-completeness of our problem.} }
@inproceedings{FGH-mfcs13, address = {Klosterneuburg, Austria}, month = aug, year = 2013, volume = {8087}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chatterjee, Krishnendu and Sgall, Ji{\v{r}}{\'\i}}, acronym = {{MFCS}'13}, booktitle = {{P}roceedings of the 38th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'13)}, author = {Finkel, Alain and G{\"o}ller, Stefan and Haase, Christoph}, title = {Reachability in Register Machines with Polynomial Updates}, pages = {409-420}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGH-mfcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGH-mfcs13.pdf}, ps = {FGH-mfcs13.ps}, doi = {10.1007/978-3-642-40313-2_37}, abstract = {This paper introduces a class of register machines whose registers can be updated by polynomial functions when a transition is taken, and the domain of the registers can be constrained by linear constraints. This model strictly generalises a variety of known formalisms such as various classes of Vector Addition Systems with States. Our main result is that reachability in our class is PSPACE-complete when restricted to one register. We moreover give a classification of the complexity of reachability according to the type of polynomials allowed and the geometry induced by the range-constraining formula.} }
@article{ACK-jcss13, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Abiteboul, Serge and ten~Cate, Balder and Katsis, Yannis}, title = {On the equivalence of distributed systems with queries and communication}, volume = 79, number = 6, pages = {739-762}, year = 2013, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACK-jcss13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACK-jcss13.pdf}, doi = {10.1016/j.jcss.2013.01.001}, abstract = {Distributed data management systems consist of peers that store, exchange and process data in order to collaboratively achieve a common goal, such as evaluating some query. We study the equivalence of such systems. We model a distributed system by a collection of Active XML documents, i.e., trees augmented with function calls for performing tasks such as sending, receiving and querying data. As our model is quite general, the equivalence problem turns out to be undecidable. However, we exhibit several restrictions of the model, for which equivalence can be effectively decided. We also study the computational complexity of the equivalence problem, and present an axiomatization of equivalence, in the form of a set of equivalence-preserving rewrite rules allowing us to optimize a system by rewriting it into an equivalent, but possibly more efficient system.} }
@inproceedings{McK-dcfs13, address = {London, Ontario, Canada}, month = jul, year = 2013, volume = {8031}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, acronym = {{DCFS}'13}, booktitle = {{P}roceedings of the 15th {W}orkshop on {D}escriptional {C}omplexity of {F}ormal {S}ystems ({DCFS}'13)}, author = {McKenzie, Pierre}, title = {Can chimps go it alone?}, pages = {17}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/McK-dcfs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/McK-dcfs13.pdf}, doi = {10.1007/978-3-642-39310-5_3} }
@inproceedings{CCD-icalp13, address = {Riga, Latvia}, month = jul, year = 2013, volume = {7966}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Fomin, Fedor V. and Freivalds, R{\=u}si{\c{n}}{\v{s}} and Kwiatkowska, Marta and Peleg, David}, acronym = {{ICALP}'13}, booktitle = {{P}roceedings of the 40th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'13)~-- {P}art~{II}}, author = {Chr{\'e}tien, R{\'e}my and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {From security protocols to pushdown automata}, pages = {137-149}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-icalp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-icalp13.pdf}, doi = {10.1007/978-3-642-39212-2_15}, abstract = {Formal methods have been very successful in analyzing security protocols for reachability properties such as secrecy or authentication. In contrast, there are very few results for equivalence-based properties, crucial for studying e.g. privacy-like properties such as anonymity or vote secrecy.\par We study the problem of checking equivalence of security protocols for an unbounded number of sessions. Since replication leads very quickly to undecidability (even in the simple case of secrecy), we focus on a limited fragment of protocols (standard primitives but pairs, one variable per protocol's rules) for which the secrecy preservation problem is known to be decidable. Surprisingly, this fragment turns out to be undecidable for equivalence. Then, restricting our attention to deterministic protocols, we propose the first decidability result for checking equivalence of protocols for an unbounded number of sessions. This result is obtained through a characterization of equivalence of protocols in terms of equality of languages of (generalized, real-time) deterministic pushdown automata.} }
@inproceedings{ABMW-icdt13, address = {Genoa, Italy}, month = mar, year = 2013, publisher = {ACM Press}, editor = {Tan, Wang-Chiew and Guerrini, Giovanna and Catania, Barbara and Gounaris, Anastasios}, acronym = {{ICDT}'13}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'13)}, author = {Abiteboul, Serge and Bourhis, Pierre and Muscholl, Anca and Wu, Zhilin}, title = {Recursive queries on trees and data trees}, pages = {93-104}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABMW-icdt13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABMW-icdt13.pdf}, doi = {10.1145/2448496.2448509}, abstract = {The analysis of datalog programs over relational structures has been studied in depth, most notably the problem of containment. The analysis problems that have been considered were shown to be undecidable with the exception of (i)~containment of arbitrary programs in nonrecursive ones, (ii)~containment of monadic programs, and (iii)~emptiness. In~this paper, we are concerned with a much less studied problem, the analysis of datalog programs over data trees. We show that the analysis of datalog programs is more complex for data trees than for arbitrary structures. In particular we prove that the three aforementioned problems are undecidable for data trees. But in practice, data trees (e.g., XML trees) are often of bounded depth. We prove that all three problems are decidable over bounded depth data trees. Another contribution of the paper is the study of a new form of automata called pattern automata, that are essentially equivalent to linear datalog programs. We use pattern automata to show that the emptiness problem for linear monadic datalog programs with data value inequalities is decidable over arbitrary data trees.} }
@article{BCGJV-lmcs13, journal = {Logical Methods in Computer Science}, author = {Bargu{\~n}{\'o}, Luis and Creus, Carles and Godoy, Guillem and Jacquemard, Florent and Vacher, Camille}, title = {Decidable Classes of Tree Automata Mixing Local and Global Constraints Modulo Flat Theories}, volume = 9, number = 2, nopages = {}, month = apr, year = 2013, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGJV-lmcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGJV-lmcs13.pdf}, doi = {10.2168/LMCS-9(2:1)2013}, abstract = {We define a class of ranked tree automata TABG generalizing both the tree automata with local tests between brothers of Bogaert and Tison (1992) and with global equality and disequality constraints (TAGED) of Filiot et al. (2007). TABG can test for equality and disequality modulo a given flat equational theory between brother subterms and between subterms whose positions are defined by the states reached during a computation. In particular, TABG can check that all the subterms reaching a given state are distinct. This constraint is related to monadic key constraints for XML documents, meaning that every two distinct positions of a given type have different values. We prove decidability of the emptiness problem for TABG. This solves, in particular, the open question of the decidability of emptiness for TAGED. We further extend our result by allowing global arithmetic constraints for counting the number of occurrences of some state or the number of different equivalence classes of subterms (modulo a given flat equational theory) reaching some state during a computation. We also adapt the model to unranked ordered terms. As a consequence of our results for TABG, we prove the decidability of a fragment of the monadic second order logic on trees extended with predicates for equality and disequality between subtrees, and cardinality.} }
@inproceedings{ABGGP-vstte13, address = {Atherton, California, USA}, year = 2014, volume = 8164, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cohen, Ernie and Rybalchenko, Andrey}, acronym = {{VSTTE}'13}, booktitle = {{R}evised {S}elected {P}apers of the 5th {IFIP} {TC2}\slash{WG2.3} {C}onference {V}erified {S}oftware---{T}heories, {T}ools, and {E}xperiments ({VSTTE}'13)}, author = {Adj{\'e}, Assal{\'e} and Bouissou, Olivier and Goubault{-}Larrecq, Jean and Goubault, {\'E}ric and Putot, Sylvie}, title = {Static Analysis of Programs with Imprecise Probabilistic Inputs}, pages = {22-47}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGGP-vstte13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGGP-vstte13.pdf}, doi = {10.1007/978-3-642-54108-7}, abstract = {Having a precise yet sound abstraction of the inputs of numerical programs is important to analyze their behavior. For many programs, these inputs are probabilistic, but the actual distribution used is only partially known. We present a static analysis framework for reasoning about programs with inputs given as imprecise probabilities: we define a collecting semantics based on the notion of previsions and an abstract semantics based on an extension of Dempster-Shafer structures. We prove the correctness of our approach and show on some realistic examples the kind of invariants we are able to infer.} }
@inproceedings{BKM-lics13, address = {New-Orleans, Louisiana, USA}, month = jun, year = 2013, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'13}, booktitle = {{P}roceedings of the 28th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'13)}, author = {Bollig, Benedikt and Kuske, Dietrich and Mennicke, Roy}, title = {The Complexity of Model Checking Multi-Stack Systems}, pages = {163-170}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-lics13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-lics13.pdf}, doi = {10.1109/LICS.2013.22}, abstract = {We consider the linear-time model-checking problem for boolean concurrent programs with recursive procedure calls. While sequential recursive programs are usually modeled as pushdown automata, concurrent recursive programs involve several processes and can be naturally abstracted as pushdown automata with multiple stacks. Their behavior can be understood as words with multiple nesting relations, each relation connecting a procedure call with its corresponding return. To reason about multiply nested words, we consider the class of all temporal logics as defined in the book by Gabbay, Hodkinson, and Reynolds~(1994). The unifying feature of these temporal logics is that their modalities are defined in monadic second-order~(MSO) logic. In particular, this captures numerous temporal logics over concurrent and/or recursive programs that have been defined so far. Since the general model checking problem is undecidable, we restrict attention to phase bounded executions as proposed by La~Torre, Madhusudan, and Parlato (LICS~2007). While the MSO model checking problem in this case is non-elementary, our main result states that the model checking (and satisfiability) problem for all MSO-definable temporal logics is decidable in elementary time. More precisely, it is solvable in \((n+2)\)-EXPTIME where \(n\) is the maximal level of the MSO modalities in the monadic quantifier alternation hierarchy. We complement this result and provide, for each level~\(n\), a~temporal logic whose model checking problem is \(n\)-EXPSPACE-hard.} }
@inproceedings{DFP-lics13, address = {New-Orleans, Louisiana, USA}, month = jun, year = 2013, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'13}, booktitle = {{P}roceedings of the 28th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'13)}, author = {Demri, St{\'e}phane and Figueira, Diego and Praveen, M.}, title = {Reasoning about Data Repetitions with Counter Systems}, pages = {33-42}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DFP-lics13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DFP-lics13.pdf}, doi = {10.1109/LICS.2013.8}, abstract = {We study linear-time temporal logics interpreted over data words with multiple attributes. We restrict the atomic formulas to equalities of attribute values in successive positions and to repetitions of attribute values in the future or past. We demonstrate correspondences between satisfiability problems for logics and reachability-like decision problems for counter systems. We show that allowing/disallowing atomic formulas expressing repetitions of values in the past corresponds to the reachability\slash coverability problem in Petri nets. This gives us 2EXPSPACE upper bounds for several satisfiability problems. We prove matching lower bounds by reduction from a reachability problem for a newly introduced class of counter systems. This new class is a succinct version of vector addition systems with states in which counters are accessed via pointers, a potentially useful feature in other contexts. We strengthen further the correspondences between data logics and counter systems by characterizing the complexity of fragments, extensions and variants of the logic. For instance, we precisely characterize the relationship between the number of attributes allowed in the logic and the number of counters needed in the counter system.} }
@inproceedings{BS-lics13, address = {New-Orleans, Louisiana, USA}, month = jun, year = 2013, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'13}, booktitle = {{P}roceedings of the 28th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'13)}, author = {Boral, Anudhyan and Schmitz, Sylvain}, title = {Model Checking Parse Trees}, pages = {153-162}, url = {http://arxiv.org/abs/1211.5256}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-lics13.pdf}, arxivpdf = {http://arxiv.org/pdf/1211.5256}, doi = {10.1109/LICS.2013.21}, abstract = {Parse trees are fundamental syntactic structures in both computational linguistics and compilers construction. We argue in this paper that, in both fields, there are good incentives for model-checking sets of parse trees for some word according to a context-free grammar. We put forward the adequacy of propositional dynamic logic (PDL) on trees in these applications, and study as a sanity check the complexity of the corresponding model-checking problem: although complete for exponential time in the general case, we find natural restrictions on grammars for our applications and establish complexities ranging from nondeterministic polynomial time to polynomial space in the relevant cases.} }
@inproceedings{ABBDF-pads13, address = {Montreal, Canada}, month = may, year = 2013, publisher = {ACM Press}, editor = {Wainer, Gabriel A.}, acronym = {{PADS}'13}, booktitle = {{P}roceedings of the 1st {ACM} {SIGSIM} {C}onference on {P}rinciples of {A}dvanced {D}iscrete {S}imulation ({PADS}'13)}, author = {Amparore, Elvio Gilberto and Barbot, Beno{\^\i}t and Beccuti, Marco and Donatelli, Susanna and Franceschinis, Giuliana}, title = {Simulation-based Verification of Hybrid Automata Stochastic Logic Formulas for Stochastic Symmetric Nets}, pages = {253-264}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABBDF-pads13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABBDF-pads13.pdf}, doi = {10.1145/2486092.2486124}, abstract = {The Hybrid Automata Stochastic Logic (HASL) has been recently defined as a flexible way to express classical performance measures as well as more complex, path-based ones (generically called {"}HASL formulas{"}). The considered paths are executions of Generalized Stochastic Petri Nets (GSPN), which are an extension of the basic Petri net formalism to define discrete event stochastic processes. The computation of the HASL formulas for a GSPN model is demanded to the COSMOS tool, that applies simulation techniques to the formula computation. Stochastic Symmetric Nets (SSN) are an high level Petri net formalism, of the \emph{colored} type, in which tokens can have an identity, and it is well known that colored Petri nets allow one to describe systems in a more compact and parametric form than basic (uncolored) Petri nets. In this paper we propose to extend HASL and COSMOS to support colors, so that performance formulas for SSN can be easily defined and evaluated. This requires a new definition of the logic, to ensure that colors are taken into account in a correct and useful manner, and a significant extension of the COSMOS tool.} }
@inproceedings{BHLM-dlt13, address = {Marne-la-Vall{\'e}e, France}, month = jun, year = 2013, volume = {7907}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {B{\'e}al, Marie-Pierre and Carton, Olivier}, acronym = {{DLT}'13}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'13)}, author = {Bollig, Benedikt and Habermehl, Peter and Leucker, Martin and Monmege, Benjamin}, title = {A~Fresh Approach to Learning Register Automata}, pages = {118-130}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHLM-dlt13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHLM-dlt13.pdf}, doi = {10.1007/978-3-642-38771-5_12}, abstract = {This paper provides an Angluin-style learning algorithm for a class of register automata supporting the notion of \emph{fresh} data values. More specifically, we introduce \emph{session automata} which are well suited for modeling protocols in which sessions using fresh values are of major interest, like in security protocols or ad-hoc networks. We show that session automata (i)~have an expressiveness partly extending, partly reducing that of register automata, (ii)~admit a symbolic regular representation, and (iii)~have a decidable equivalence and model-checking problem (unlike register automata). Using these results, we establish a learning algorithm to infer session automata through membership and equivalence queries. Finally, we strengthen the robustness of our automaton by its characterization in monadic second-order logic.} }
@inproceedings{BCHKS-lata13, address = {Bilbao, Spain}, month = apr, year = 2013, volume = {7810}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dediu, Adrian Horia and Mart{\'\i}n-Vide, Carlos and Truthe, Bianca}, acronym = {{LATA}'13}, booktitle = {{P}roceedings of the 7th {I}nternational {C}onference on {L}anguage and {A}utomata {T}heory and {A}pplications ({LATA}'13)}, author = {Bollig, Benedikt and Cyriac, Aiswarya and H{\'e}lou{\"e}t, Lo{\"\i}c and Kara, Ahmet and Schwentick, {\relax Th}omas}, title = {Dynamic Communicating Automata and Branching High-Level {MSC}s}, pages = {177-189}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHKS-lata13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCHKS-lata13.pdf}, doi = {10.1109/REVET.2012.6195253}, abstract = {We study dynamic communicating automata~(DCA), an~extension of classical communicating finite-state machines that allows for dynamic creation of processes. The behavior of a DCA can be described as a set of message sequence charts~(MSCs). While DCA serve as a model of an implementation, we propose branching high-level MSCs~(bHMSCs) on the specification side. Our focus is on the implementability problem: given a bHMSC, can one construct an equivalent DCA? As this problem is undecidable, we introduce the notion of executability, a decidable necessary criterion for implementability. We show that executability of bHMSCs is EXPTIME-complete. We~then identify a class of bHMSCs for which executability effectively implies implementability.} }
@inproceedings{BLLJKFSFR-revet12, address = {Hammamet, Tunisia}, month = mar, year = 2012, publisher = {{IEEE} Power~\& Energy Society}, editor = {Neji, Rafik}, acronym = {{REVET}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {R}enewable {E}nergies and {VE}hicular {T}echnology ({REVET}'12)}, author = {Belkacem, Ghania and Labrousse, Denis and Lefebvre, St{\'e}phane and Joubert, Pierre-Yves and K{\"u}hne, Ulrich and Fribourg, Laurent and Soulat, Romain and Florentin, {\'E}ric and Rey, {\relax Ch}ristian}, title = {Distributed and Coupled Electrothermal Model of Power Semiconductor Devices}, pages = {84-89}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLLJKFSFR-revet12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLLJKFSFR-revet12.pdf}, doi = {10.1109/REVET.2012.6195253}, abstract = {Electro-thermal model of power semiconductor devices are of key importance in order to optimize their thermal design and increase their reliability. The development of such an electro-thermal model for power MOSFET transistors (COOLMOS\textsuperscript{(TM)}) based on the coupling between two computation softwares (Matlab and Cast3M) is described in the paper. The elaborated 2D electro-thermal model is able to predict i)~the~temperature distribution on chip surface well as in volume, ii)~the~effect of the temperature on the distribution of the current flowing within the die and iii)~the~effects of the ageing of the metallization layer on the current density and the temperature. In the paper, the used electrical and thermal models are described as well as the implemented coupling scheme.} }
@inproceedings{CCP-cav13, address = {Saint Petersburg, Russia}, month = jul, year = 2013, volume = {8044}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sharygina, Natasha and Veith, Helmut}, acronym = {{CAV}'13}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'13)}, author = {Cheval, Vincent and Cortier, V{\'e}ronique and Plet, Antoine}, title = {Lengths may break privacy~---or~how to check for equivalences with length}, pages = {708-723}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCP-cav13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCP-cav13.pdf}, doi = {10.1007/978-3-642-39799-8_50}, abstract = {Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes. While some decision procedures have been proposed for automatically deciding process equivalence, all existing approaches abstract away the information an attacker may get when observing the length of messages.\par In this paper, we study process equivalence with length tests. We first show that, in the static case, almost all existing decidability results (for static equivalence) can be extended to cope with length tests. In the active case, we prove decidability of trace equivalence with length tests, for a bounded number of sessions and for standard primitives. Our result relies on a previous decidability result from Cheval~\emph{et~al.} (without length tests). Our procedure has been implemented and we have discovered a new flaw against privacy in the biometric passport protocol.} }
@inproceedings{HIOP-cav13, address = {Saint Petersburg, Russia}, month = jul, year = 2013, volume = {8044}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sharygina, Natasha and Veith, Helmut}, acronym = {{CAV}'13}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'13)}, author = {Haase, Christoph and Ishtiaq, Samin and Ouaknine, Jo{\"e}l and Parkinson, Matthew}, title = {SeLoger: A~Tool for Graph-Based Reasoning in Separation Logic}, pages = {790-795}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HIOP-cav13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HIOP-cav13.pdf}, doi = {10.1007/978-3-642-39799-8_55}, abstract = {This paper introduces the tool SeLoger, which is a reasoner for satisfiability and entailment in a fragment of separation logic with pointers and linked lists. SeLoger builds upon and extends graph-based algorithms that have recently been introduced in order to settle both decision problems in polynomial time. Running SeLoger on standard benchmarks shows that the tool outperforms current state-of-the-art tools by orders of magnitude.} }
@inproceedings{OS-cav13, address = {Saint Petersburg, Russia}, month = jul, year = 2013, volume = {8044}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sharygina, Natasha and Veith, Helmut}, acronym = {{CAV}'13}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'13)}, author = {Sankur, Ocan}, title = {Shrinktech: A~Tool for the Robustness Analysis of Timed Automata}, pages = {1006-1012}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-cav13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OS-cav13.pdf}, doi = {10.1007/978-3-642-39799-8_72}, abstract = {We present a tool for the robustness analysis of timed automata, that can check whether a given time-abstract behaviour of a timed automaton is still present when the guards are perturbed. The perturbation model we consider is shrinking, which corresponds to increasing lower bounds and decreasing upper bounds in the clock guards by parameters. The tool synthesizes these parameters for which the given behaviour is preserved in the new automaton if possible, and generates a counter-example otherwise. This can be used for 1)~robustness analysis, and for 2)~deriving implementations under imprecisions.} }
@inproceedings{RB-cav13, address = {Saint Petersburg, Russia}, month = jul, year = 2013, volume = {8044}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sharygina, Natasha and Veith, Helmut}, acronym = {{CAV}'13}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'13)}, author = {Brenguier, Romain}, title = {{PRALINE}: A~Tool for Computing Nash Equilibria in Concurrent Games}, pages = { 890-895}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RB-cav13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RB-cav13.pdf}, doi = {10.1007/978-3-642-39799-8_63}, abstract = {We present PRALINE, which is the first tool to compute Nash equilibria in games played over graphs. We consider concurrent games: at each step, players choose their actions independently. There can be an arbitrary number of players. The preferences of the players are given by payoff functions that map states to integers, the goal for a player is then to maximize the limit superior of her payoff; this can be seen as a generalization of B{\"u}chi objectives. PRALINE looks for pure Nash equilibria in these games. It can construct the strategies of the equilibrium and users can play against it to test the equilibrium. We give the idea behind its implementation and present examples of its practical use.} }
@inproceedings{RSK-pn13, address = {Milano, Italy}, month = jun, year = 2013, volume = {7927}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Colom, Jos{\'e}-Manuel and Desel, J{\"o}rg}, acronym = {{PETRI~NETS}'13}, booktitle = {{P}roceedings of the 34th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'13)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan and Khomenko, Victor}, title = {Contextual Merged Processes}, pages = {29-48}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RSK-atpn13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RSK-atpn13.pdf}, doi = {10.1007/978-3-642-38697-8_3}, abstract = {We integrate two compact data structures for representing state spaces of Petri nets: merged processes and contextual prefixes. The resulting data structure, called contextual merged processes (CMP), combines the advantages of the original ones and copes with several important sources of state space explosion: concurrency, sequences of choices, and concurrent read accesses to shared resources. In particular, we demonstrate on a number of benchmarks that CMPs are more compact than either of the original data structures. Moreover, we sketch a polynomial (in the CMP size) encoding into SAT of the model-checking problem for reachability properties.} }
@inproceedings{FH-pn13, address = {Milano, Italy}, month = jun, year = 2013, volume = {7927}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Colom, Jos{\'e}-Manuel and Desel, J{\"o}rg}, acronym = {{PETRI~NETS}'13}, booktitle = {{P}roceedings of the 34th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'13)}, author = {Fraca, Est{\'\i}baliz and Haddad, Serge}, title = { Complexity Analysis of Continuous {P}etri Nets}, pages = {170-189}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FH-pn13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FH-pn13.pdf}, doi = {10.1007/978-3-642-38697-8_10}, abstract = {At the end of the eighties, continuous Petri nets were introduced for: (1)~alleviating the combinatory explosion triggered by discrete Petri nets and, (2)~modelling the behaviour of physical systems whose state is composed of continuous variables. Since then several works have established that the computational complexity of deciding some standard behavioural properties of Petri nets is reduced in this framework. Here we first establish the decidability of additional properties like boundedness and reachability set inclusion. We also design new decision procedures for the reachability and lim-reachability problems with a better computational complexity. Finally we provide lower bounds characterising the exact complexity class of the boundedness, the reachability, the deadlock freeness and the liveness problems.} }
@inproceedings{HHM-pn13, address = {Milano, Italy}, month = jun, year = 2013, volume = {7927}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Colom, Jos{\'e}-Manuel and Desel, J{\"o}rg}, acronym = {{PETRI~NETS}'13}, booktitle = {{P}roceedings of the 34th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'13)}, author = {Haddad, Serge and Hennicker, Rolf and M{\o}ller, Mikael H.}, title = {Channel Properties of Asynchronously Composed {P}etri~Nets}, pages = {369-388}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHM-pn13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHM-pn13.pdf}, doi = {10.1007/978-3-642-38697-8_20}, abstract = {We consider asynchronously composed I/O-Petri nets (AIOPNs) with built-in communication channels. They are equipped with a compositional semantics in terms of asynchronous I/O-transition systems (AIOTSs) admitting infinite state spaces. We study various channel properties that deal with the production and consumption of messages exchanged via the communication channels and establish useful relationships between them. In order to support incremental design we show that the channel properties considered in this work are preserved by asynchronous composition, i.e. they are compositional. As a crucial result we prove that the channel properties are decidable for AIOPNs.} }
@inproceedings{AR-qapl2013, address = {Rome, Italy}, volume = {117}, series = {Electronic Proceedings in Theoretical Computer Science}, month = jun, year = 2013, editor = {Bortolussi, Luca and Wiklicky, Herbert}, acronym = {{QAPL}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshop on {Q}uantitative {A}spects of {P}rogramming {L}anguages ({QAPl}'13)}, author = {Arul, Arjun and Reichert, Julien}, title = {The Complexity of Robot Games on the Integer Line}, pages = {132-148}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AR-qapl13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AR-qapl13.pdf}, doi = {10.4204/EPTCS.117.9}, abstract = {In robot games on~\(\mathbb{Z}\), two players add integers to a counter. Each player has a finite set from which he picks the integer to add, and the objective of the first player is to let the counter reach~\(0\). We present an exponential-time algorithm for deciding the winner of a robot game given the initial counter value, and prove a matching lower bound.} }
@inproceedings{BS-qapl2013, address = {Rome, Italy}, volume = {117}, series = {Electronic Proceedings in Theoretical Computer Science}, month = jun, year = 2013, editor = {Bortolussi, Luca and Wiklicky, Herbert}, acronym = {{QAPL}'13}, booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshop on {Q}uantitative {A}spects of {P}rogramming {L}anguages ({QAPl}'13)}, author = {Bertrand, Nathalie and Schnoebelen, {\relax Ph}ilippe}, title = {Solving stochastic B{\"u}chi games on infinite arenas with a finite attractor}, pages = {116-131}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-qapl2013.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS-qapl2013.pdf}, doi = {10.4204/EPTCS.117.8}, abstract = {We consider games played on an infinite probabilistic arena where the first player aims at satisfying generalized B{\"u}chi objectives almost surely, i.e., with probability one. We provide a fixpoint characterization of the winning sets and associated winning strategies in the case where the arena satisfies the finite-attractor property. From this we directly deduce the decidability of these games on probabilistic lossy channel systems.} }
@book{AS-book13, author = {Andr{\'e}, {\'E}tienne and Soulat, Romain}, title = {The~Inverse Method}, publisher = {Wiley-ISTE}, year = 2013, month = jan, isbn = {9781848214477}, note = {176~pages}, url = {http://www.iste.co.uk/index.php?f=a&ACTION=View&id=546}, abstract = {This book introduces state-of-the-art verification techniques for real-time embedded systems, based on the inverse method for parametric timed automata. It reviews popular formalisms for the specification and verification of timed concurrent systems and, in particular, timed automata as well as several extensions such as timed automata equipped with stopwatches, linear hybrid automata and affine hybrid automata.\par The inverse method is introduced, and its benefits for guaranteeing robustness in real-time systems are shown. Then, it is shown how an iteration of the inverse method can solve the good parameters problem for parametric timed automata by computing a behavioral cartography of the system. Different extensions are proposed particularly for hybrid systems and applications to scheduling problems using timed automata with stopwatches. Various examples, both from the literature and industry, illustrate the techniques throughout the book.\par Various parametric verifications are performed, in particular of abstractions of a memory circuit sold by the chipset manufacturer ST-Microelectronics, as well as of the prospective flight control system of the next generation of spacecraft designed by ASTRIUM Space Transportation.} }
@article{CDH-fmsd13, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, {\relax Th}omas A.}, title = {A~survey of partial-observation stochastic parity games}, volume = 43, number = 2, pages = {268-284}, month = oct, year = 2013, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-fmsd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-fmsd13.pdf}, doi = {10.1007/s10703-012-0164-2}, abstract = {We consider two-player zero-sum stochastic games on graphs with \(\omega\)-regular winning conditions specified as parity objectives. These games have applications in the design and control of reactive systems. We survey the complexity results for the problem of deciding the winner in such games, and in classes of interest obtained as special cases, based on the information and the power of randomization available to the players, on the class of objectives and on the winning mode.\par On the basis of information, these games can be classified as follows: (a)~partial-observation (both players have partial view of the game); (b)~one-sided partial-observation (one player has partial-observation and the other player has complete-observation); and (c)~complete-observation (both players have complete view of the game). The one-sided partial-observation games have two important subclasses: the one-player games, known as partial-observation Markov decision processes~(POMDPs), and the blind one-player games, known as probabilistic automata.\par On the basis of randomization, (a)~the players may not be allowed to use randomization (pure strategies), or (b)~they may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c)~they may use full randomization.\par Finally, various classes of games are obtained by restricting the parity objective to a reachability, safety, B{\"u}chi, or coB{\"u}chi condition. We also consider several winning modes, such as sure-winning (i.e., all outcomes of a strategy have to satisfy the winning condition), almost-sure winning (i.e., winning with probability~\(1\)), limit-sure winning (i.e., winning with probability arbitrarily close to~\(1\)), and value-threshold winning (i.e., winning with probability at least~\(v\), where \(v\) is a given rational).} }
@article{CDKR-fmsd13, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Chevalier, C{\'e}line and Delaune, St{\'e}phanie and Kremer, Steve and Ryan, Mark D.}, title = {Composition of Password-based Protocols}, volume = {43}, number = {3}, pages = {369-413}, month = dec, year = 2013, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDKR-fmsd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDKR-fmsd13.pdf}, doi = {10.1007/s10703-013-0184-6}, abstract = {Formal and symbolic techniques are extremely useful for modelling and analysing security protocols. They have helped to improve our understanding of such protocols, allowed us to discover flaws, and they also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided when the protocol is executed in a more complex environment.\par In this paper, we study whether password protocols can be safely composed, even when a same password is reused. More precisely, we present a transformation which maps a password protocol that is secure for a single protocol session (a~decidable problem) to a protocol that is secure for an unbounded number of sessions. Our result provides an effective strategy to design secure password protocols: (i)~design a protocol intended to be secure for one protocol session; (ii)~apply our transformation and obtain a protocol which is secure for an unbounded number of sessions. Our technique also applies to compose different password protocols allowing us to obtain both inter-protocol and inter-session composition.} }
@article{HMN-fi13, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Haddad, Serge and Mairesse, Jean and Nguyen, Hoang-Thach}, title = {Synthesis and Analysis of Product-form {P}etri Nets}, year = {2013}, volume = {122}, number = {1-2}, pages = {147-172}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HMN-fi13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HMN-fi13.pdf}, doi = {10.3233/FI-2013-786}, abstract = {For a large Markovian model, a {"}product form{"} is an explicit description of the steady-state behaviour which is otherwise generally untractable. Being first introduced in queueing networks, it has been adapted to Markovian Petri nets. Here we address three relevant issues for product-form Petri nets which were left fully or partially open: (1)~we~provide a sound and complete set of rules for the synthesis; (2)~we~characterise the exact complexity of classical problems like reachability; (3)~we~introduce a new subclass for which the normalising constant (a~crucial value for product-form expression) can be efficiently computed.} }
@inproceedings{BGM-fossacs13, address = {Rome, Italy}, month = mar, year = 2013, volume = {7794}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pfenning, Frank}, acronym = {{FoSSaCS}'13}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'13)}, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin}, title = {Weighted Specifications over Nested Words}, pages = {385-400}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-fossacs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-fossacs13.pdf}, doi = {10.1007/978-3-642-37075-5_25}, abstract = {This paper studies several formalisms to specify quantitative properties of finite nested words (or~equivalently finite unranked trees). These can be used for XML documents or recursive programs: for~instance, counting how often a given entry occurs in an XML document, or~computing the memory required for a recursive program execution. Our main interest is to translate these properties, as efficiently as possible, into an automaton, and to use this computational device to decide problems related to the properties (e.g.,~emptiness, model checking, simulation) or to compute the value of a quantitative specification over a given nested word. The specification formalisms are weighted regular expressions (with forward and backward moves following linear edges or call-return edges), weighted first-order logic, and weighted temporal logics. We~introduce weighted automata walking in nested words, possibly dropping\slash lifting (reusable) pebbles during the traversal. We prove that the evaluation problem for such automata can be done very efficiently if the number of pebble names is small, and we also consider the emptiness problem.} }
@article{demri-jcss13, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Demri, St{\'e}phane}, title = {On selective unboundedness of~{VASS}}, year = {2013}, volume = {79}, number = {5}, pages = {689-713}, month = aug, url = {http://www.lsv.fr/Publis/PAPERS/PDF/demri-jcss13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/demri-jcss13.pdf}, doi = {10.1016/j.jcss.2013.01.014}, abstract = {Numerous properties of vector addition systems with states amount to checking the (un)boundedness of some selective feature (e.g., number of reversals, counter values, run lengths). Some of these features can be checked in exponential space by using Rackoff's proof or its variants, combined with Savitch's Theorem. However, the question is still open for many others, e.g., regularity detection problem and reversal-boundedness detection problem. In the paper, we introduce the class of generalized unboundedness properties that can be verified in exponential space by extending Rackoff's technique, sometimes in an unorthodox way. We obtain new optimal upper bounds, for example for place boundedness problem, reversal-boundedness detection (several variants are present in the paper), strong promptness detection problem and regularity detection. Our analysis is sufficiently refined so as to obtain a polynomial-space bound when the dimension is fixed.} }
@incollection{GLJ-hg13, noaddress = {}, month = jan, year = 2013, volume = 7797, series = {Lecture Notes in Computer Science}, publisher = {Springer}, noacronym = {}, booktitle = {Programming Logics~-- Essays in Memory of {H}arald {G}anzinger}, editor = {Voronkov, Andrei and Weidenbach, Christoph}, author = {Goubault{-}Larrecq, Jean and Jouannaud, Jean-Pierre}, title = {The Blossom of Finite Semantic Trees}, pages = {90-122}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-hg13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-hg13.pdf} }
@phdthesis{bonnet-phd2013, author = {Bonnet, R{\'e}mi}, title = {Theory of Well-Structured Transition Systems and Extended Vector-Addition Systems}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2013, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-phd13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bonnet-phd13.pdf} }
@techreport{rr-lsv-13-02, author = {Doyen, Laurent and Rabinovich, Alexander}, title = {Robot games}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2013}, month = jan, type = {Research Report}, number = {LSV-13-02}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2013-02.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2013-02.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2013-02-v1.pdf, 20130124}, note = {2~pages}, abstract = {We introduce robot games, and we give the simplest definition for which decidability is open.} }
@inproceedings{SVMM-sbbd2012, address = {S{\~a}o~Paulo, Brazil}, month = oct, year = 2012, editor = {Casanova, Marco A.}, publisher = {Sociedade Brasileira de Computa{\c{c}}{\~a}o}, acronym = {{SBBD}'12}, booktitle = {{P}roceedings of the 27th {B}razilian {S}ymposium on {D}atabases ({SBBD}'12)}, author = {Sim{\~o}es{ }De{~}Sousa, Diego V. and Viana, Henrique and Markey, Nicolas and de Mac{\^e}do, Jose Ant{\^o}nio F.}, title = {Querying Trajectories through Model Checking based on Timed Automata}, pages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SVMM-sbbd2012.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SVMM-sbbd2012.pdf}, abstract = {The popularization of geographical position devices (e.g.~GPS) creates new opportunities for analyzing behavior of moving objects. However, such analysis are hindered by a lack of semantic information associated to the basic information provided by~GPS. Previous works propose semantic enrichment of trajectories. Through the semantic enrichment, we~could check which trajectories have a given moving sequence in an application. Often, this~sequence is expressed according to the semantic application, using the approach of semantic trajectories proposed in the literature. This~trajectory can be represented as a sequence of predicates that holds in some time interval. However, the solutions for querying moving sequence proposed by previous works have a high computational cost. In~this paper, we~propose an expressive query language to semantic trajectories that allows temporal constraints. To~evaluate a query we will use model checking based on timed automata, that can be performed in polynomial time. As~this model checking algorithm is not implemented yet, we propose to use UPPAAL tool, that can be more expensive theoretically, but we expected that will be ecient for our approach. In addition, we will present a query example that demonstrates the expressive power of our language. Although in this paper we will focus on semantic trajectories data, our approach is general enough for being applied to other purposes.} }
@inproceedings{BNS-cc13, address = {Rome, Italy}, month = mar, year = 2013, volume = {7791}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {De{~}Bosschere, Koen and Jhala, Ranjit}, acronym = {{CC}'13}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {C}ompiler {C}onstruction ({CC}'13)}, author = {Eberhard Bertsch and Mark-Jan Nederhof and Sylvain Schmitz}, title = {On {LR} Parsing with Selective Delays}, pages = {244-263}, url = {http://hal.archives-ouvertes.fr/hal-00769668}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BNS-cc13.pdf}, doi = {10.1007/978-3-642-37051-9_13}, abstract = {The paper investigates an extension of LR parsing that allows the delay of parsing decisions until a sufficient amount of context has been processed. We provide two characterizations for the resulting class of grammars, one based on grammar transformations, the other on the direct construction of a parser. We also report on experiments with a grammar collection.} }
@inproceedings{KS-fossacs13, address = {Rome, Italy}, month = mar, year = 2013, volume = {7794}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pfenning, Frank}, acronym = {{FoSSaCS}'13}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'13)}, author = {Karandikar, Prateek and Schmitz, Sylvain}, title = {The Parametric Ordinal-Recursive Complexity of {P}ost Embedding Problems}, pages = {273-288}, url = {http://arxiv.org/abs/1211.5259}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-fossacs13.pdf}, doi = {10.1007/978-3-642-37075-5_18}, abstract = {Post Embedding Problems are a family of decision problems based on the interaction of a rational relation with the subword embedding ordering, and are used in the literature to prove non multiply-recursive complexity lower bounds. We refine the construction of Chambart and Schnoebelen (LICS~2008) and prove parametric lower bounds depending on the size of the alphabet.} }
@mastersthesis{m2-lefaucheux, author = {Lefaucheux, Engel}, title = {D{\'e}tection de fautes dans les syst{\`e}mes probabilistes}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2014}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lefaucheux.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lefaucheux.pdf}, note = {35~pages} }
@mastersthesis{m2-dubut, author = {Dubut, J{\'e}r{\'e}my}, title = {{H}omologie dirig{\'e}e}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2014}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-dubut.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-dubut.pdf}, note = {35~pages} }
@mastersthesis{m2-halfon, author = {Halfon, Simon}, title = {Non Primitive Recursive Complexity Classes}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2014}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-halfon.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-halfon.pdf}, note = {21~pages} }
@inproceedings{FFLRS-fsfma14, address = {Singapore}, month = may, year = 2014, volume = 156, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Lin, Shang{-}Wei and Petrucci, Laure}, acronym = {{FSFMA}'14}, booktitle = {{P}roceedings of the 2nd {F}rench-{S}ingaporean {W}orkshop on {F}ormal {M}ethods and {A}pplications ({FSFMA}'14)}, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Revol, Bertrand and Soulat, Romain}, title = {Correct-by-design Control Synthesis for Multilevel Converters using State Space Decomposition}, pages = {5-16}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FFLRS-fsfma14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FFLRS-fsfma14.pdf}, doi = {10.4204/EPTCS.156.5}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. The state of the system is not guaranteed to stay within the limits that are admissible for its correct electrical behavior. We show here how to apply a formal method in order to synthesize a correct-by-design control that guarantees that the power converter will always stay within a predefined safe zone of variations for its input parameters. The method is applied in order to synthesize a correct-by-design control for 5-level and 7-level power converters with a flying capacitor topology. We check the validity of our approach by numerical simulations for 5 and 7 levels. We also perform physical experimentations using a prototype built by SATIE laboratory for 5 levels} }
@misc{reachard-18, author = {Finkel, Alain}, title = {REACHARD~-- Compte-rendu interm{\'e}diaire}, month = mar, year = {2013}, note = {9~pages}, type = {Contract Report}, howpublished = {Deliverable~D2 Reachard (ANR-11-BS02-001)} }
@misc{reachard-30, author = {Finkel, Alain}, title = {REACHARD~-- Compte-rendu interm{\'e}diaire}, month = feb, year = {2014}, note = {18~pages}, type = {Contract Report}, howpublished = {Deliverable~D3 Reachard (ANR-11-BS02-001)} }
@misc{cassting-D62, author = {Markey, Nicolas and Valette, Sophie}, title = {Annual report for Year~1}, howpublished = {Cassting deliverable~D6.2 (FP7-ICT-601148)}, month = may, year = {2014}, note = {38~pages}, type = {Contract Report} }
@misc{cassting-D31, author = {Markey, Nicolas and Brihaye, {\relax Th}omas and Larsen, Kim G.}, title = {Robustness of collective adaptive systems}, howpublished = {Cassting deliverable~D3.1 (FP7-ICT-601148)}, month = mar, year = {2014}, note = {17~pages}, type = {Contract Report}, url = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-31.pdf}, pdf = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-31.pdf} }
@misc{cassting-D24, author = {Markey, Nicolas and Chaturvedi, Namit and Geeraerts, Gilles and Srba, Ji{\v{r}}{\'\i}}, title = {Efficient strategy synthesis for complex objectives}, howpublished = {Cassting deliverable~D2.4 (FP7-ICT-601148)}, month = oct, year = {2014}, note = {20~pages}, type = {Contract Report}, url = {http://www.cassting-project.eu/wp-content/uploads/2014/10/deliv-24.pdf}, pdf = {http://www.cassting-project.eu/wp-content/uploads/2014/10/deliv-24.pdf} }
@misc{cassting-D14, author = {Brihaye, {\relax Th}omas and Markey, Nicolas}, title = {Solution concepts for collective adaptive systems}, howpublished = {Cassting deliverable~D1.4 (FP7-ICT-601148)}, month = mar, year = {2014}, note = {13~pages}, type = {Contract Report}, url = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-14.pdf}, pdf = {http://www.cassting-project.eu/wp-content/uploads/2014/05/deliv-14.pdf} }
@article{BFCH-compj14, publisher = {Oxford University Press}, journal = {The Computer Journal}, author = {Beccuti, Marco and Franceschinis, Giuliana and Codetta{-}Raiteri, Daniele and Haddad, Serge}, title = {Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis}, volume = 57, number = 12, month = dec, year = 2014, pages = {1870-1892}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFCH-compj14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFCH-compj14.pdf}, doi = {10.1093/comjnl/bxt134}, abstract = {In this paper, the \emph{Non-deterministic Repairable Fault Tree}~(NdRFT) formalism is proposed: it allows the modeling of failures of complex systems in addition to their repair processes. Its originality with respect to other Fault Tree extensions allows us to address repair strategy optimization problems: in an NdRFT model, the decision as to whether to start or not a given repair action is non-deterministic, so that all the possibilities are left open. The formalism is rather powerful, it allows: the specification of self-revealing events, the representation of components degradation, the choice among local repair, global repair, preventive maintenance, and the specification of the resources needed to start a repair action. The optimal repair strategy with respect to some relevant system state function, e.g. system unavailability, can then be computed by solving an optimization problem on a Markov Decision Process derived from the NdRFT. Such derivation is obtained by converting the NdRFT model into an intermediate formalism called Markov Decision Petri Net~(MDPN). In the paper, the NdRFT syntax and semantics are formally described, together with the conversion rules to derive from the NdRFT the corresponding MDPN model. The application of NdRFT is illustrated through examples.} }
@article{GLS-tods14, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Gheerbrant, Am{\'e}lie and Libkin, Leonid and Sirangelo, Cristina}, title = {Na{\"\i}ve Evaluation of Queries over Incomplete Databases}, volume = {39}, number = {4:31}, nopages = {}, month = dec, year = {2014}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-tods14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-tods14.pdf}, doi = {10.1145/2691190.2691194}, abstract = {The term na{\"\i}ve evaluation refers to evaluating queries over incomplete databases as if nulls were usual data values, i.e., to using the standard database query evaluation engine. Since the semantics of query answering over incomplete databases is that of certain answers, we would like to know when na{\"\i}ve evaluation computes them: i.e., when certain answers can be found without inventing new specialized algorithms. For relational databases it is well known that unions of conjunctive queries possess this desirable property, and results on preservation of formulae under homomorphisms tell us that within relational calculus, this class cannot be extended under the open-world assumption.\par Our goal here is twofold. First, we develop a general framework that allows us to determine, for a given semantics of incompleteness, classes of queries for which na{\"\i}ve evaluation computes certain answers. Second, we apply this approach to a variety of semantics, showing that for many classes of queries beyond unions of conjunctive queries, na{\"\i}ve evaluation makes perfect sense under assumptions different from open-world. Our key observations are: (1)~na{\"\i}ve evaluation is equivalent to monotonicity of queries with respect to a semantics-induced ordering, and (2)~for most reasonable semantics of incompleteness, such monotonicity is captured by preservation under various types of homomorphisms. Using these results we find classes of queries for which na{\"\i}ve evaluation works, e.g., positive first-order formulae for the closed-world semantics. Even more, we introduce a general relation-based framework for defining semantics of incompleteness, show how it can be used to capture many known semantics and to introduce new ones, and describe classes of first-order queries for which na{\"\i}ve evaluation works under such semantics.} }
@article{BKM-cc14, publisher = {Birkh{\"a}user}, journal = {Computational Complexity}, author = {Blondin, Michael and Krebs, Andreas and McKenzie, Pierre}, title = {The Complexity of Intersecting Finite Automata Having Few Final States}, volume = {25}, number = {4}, pages = {775-814}, month = dec, year = 2016, note = {To appear}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-cc14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKM-cc14.pdf}, doi = {10.1007/s00037-014-0089-9}, abstract = {The problem of determining whether several finite automata accept a word in common is closely related to the well-studied membership problem in transformation monoids. We raise the issue of limiting the number of final states in the automata intersection problem. For automata with two final states, we show the problem to be \(\oplus{L}\)-complete or NP-complete according to whether a nontrivial monoid other than a direct product of cyclic groups of order~2 is allowed in the automata. We further consider idempotent commutative automata and (Abelian, mainly) group automata with one, two, or three final states over a singleton or larger alphabet, elucidating (under the usual hypotheses on complexity classes) the complexity of the intersection nonemptiness and related problems in each case.} }
@inproceedings{BC-ccs14, address = {Scottsdale, Arizona, USA}, month = nov, year = 2014, publisher = {ACM Press}, editor = {Ahn, Gail-Joon and Yung, Moti and Li, Ninghui}, acronym = {{CCS}'14}, booktitle = {{P}roceedings of the 21st {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'14)}, author = {Bana, Gergei and Comon{-}Lundh, Hubert}, title = {A~Computationally Complete Symbolic Attacker for Equivalence Properties}, pages = {609-620}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-ccs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-ccs14.pdf}, doi = {10.1145/2660267.2660276}, abstract = {We consider the problem of computational indistinguishability of protocols. We design a symbolic model, amenable to automated deduction, such that a successful inconsistency proof implies computational indistinguishability. Conversely, symbolic models of distinguishability provide clues for likely computational attacks. We follow the idea we introduced earlier for reachability properties, axiomatizing what an attacker cannot violate. This results a computationally complete symbolic attacker, and ensures unconditional computational soundness for the symbolic analysis. We present a small library of computationally sound, modular axioms, and test our technique on an example protocol. Despite additional difficulties stemming from the equivalence properties, the models and the soundness proofs turn out to be simpler than they were for reachability properties.} }
@phdthesis{ponce-phd2014, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n}, title = {Testing Concurrent Systems Through Event Structures}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2014, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ponce-phd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ponce-phd14.pdf} }
@phdthesis{barbot-phd2014, author = {Barbot, Beno{\^\i}t}, title = {Acceleration for Statistical Model Checking}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2014, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/barbot-phd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/barbot-phd14.pdf} }
@phdthesis{sirangelo-HDR14, author = {Sirangelo, Cristina}, title = {Representing and querying incomplete information: a~data interoperability perspective}, year = 2014, month = dec, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-CS14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-CS14.pdf} }
@article{LLV-tcs14, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Lange, Martin and Lozes, {\'E}tienne and Vargas{ }Guzm{\'a}n, Manuel}, title = {Model-checking process equivalences}, volume = {560}, number = {3}, year = {2014}, month = dec, pages = {326-347}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LLV-tcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LLV-tcs14.pdf}, doi = {10.1016/j.tcs.2014.08.020}, abstract = {Process equivalences are formal methods that relate programs and systems which, informally, behave in the same way. Since there is no unique notion of what it means for two dynamic systems to display the same behaviour there are a multitude of formal process equivalences, ranging from bisimulation to trace equivalence, categorised in the linear-time branching-time spectrum.\par We present a logical framework based on an expressive modal fixpoint logic which is capable of defining many process equivalence relations: for each such equivalence there is a fixed formula which is satisfied by a pair of processes if and only if they are equivalent with respect to this relation.\par We explain how to do model checking for this logic in EXPTIME. This allows model checking technology to be used for process equivalence checking. We introduce two fragments of the logic for which it is possible to do model-checking in PTIME and PSPACE respectively, and show that the formulas that define the process equivalences we consider are in one of these fragments. This yields a generic proof technique for establishing the complexities of these process equivalences.\par Finally, we show how partial evaluation can be used to obtain decision procedures for process equivalences from the generic model checking scheme.} }
@article{BHLM-lmcs14, journal = {Logical Methods in Computer Science}, author = {Bollig, Benedikt and Habermehl, Peter and Leucker, Martin and Monmege, Benjamin}, title = {A~Robust Class of Data Languages and an Application to Learning}, year = {2014}, month = dec, volume = 10, number = {4:19}, nopages = {}, url = {http://arxiv.org/abs/1411.6646}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHLM-lmcs14.pdf}, doi = {10.2168/LMCS-10(4:19)2014}, abstract = {We~introduce session automata, an automata model to process data words, i.e., words over an infinite alphabet. Session automata support the notion of fresh data values, which are well suited for modeling protocols in which sessions using fresh values are of major interest, like in security protocols or ad-hoc networks. Session automata have an expressiveness partly extending, partly reducing that of classical register automata. We~show that, unlike register automata and their various extensions, session automata are robust: They (i)~are closed under intersection, union, and (resource-sensitive) complementation, (ii)~admit a symbolic regular representation, (iii)~have a decidable inclusion problem (unlike register automata), and (iv)~enjoy logical characterizations. Using these results, we establish a learning algorithm to infer session automata through membership and equivalence queries.} }
@article{JKS-lmcs14, journal = {Logical Methods in Computer Science}, author = {Jancar, Petr and Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {On Reachability for Unidirectional Channel Systems Extended with Regular Tests}, year = {2015}, volume = 11, number = {{2:2}}, month = apr, nopages = {}, url = {http://arxiv.org/abs/1406.5067}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-lmcs14.pdf}, doi = {10.2168/LMCS-11(2:2)2015}, abstract = {{"}Unidirectional channel systems{"} (Chambart~\& Schnoebelen, CONCUR~2008) are finite-state systems where one-way communication from a Sender to a Receiver goes via one reliable and one unreliable unbounded fifo channel. While reachability is decidable for these systems, equipping them with the possibility of testing regular properties on the contents of channels makes it undecidable. Decidability is preserved when only emptiness and nonemptiness tests are considered: the proof relies on an elaborate reduction to a generalized version of Post's Embedding Problem.} }
@article{KKS-ipl14, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Karandikar, Prateek and Kufleitner, Manfred and Schnoebelen, {\relax Ph}ilippe}, title = {On the index of {S}imon's congruence for piecewise testability}, year = {2015}, month = apr, volume = {15}, number = {4}, pages = {515-519}, url = {http://arxiv.org/abs/1310.1278}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KKS-ipl14.pdf}, doi = {10.1016/j.ipl.2014.11.008}, abstract = {Simon's congruence, denoted \(\sim_{n}\), relates words having the same subwords of length up to~\(n\). We~show that, over a \(k\)-letter alphabet, the~number of words modulo~\(\sim_{n}\) is in \(2^{\Theta(n^{k-1}\cdot\log n)}\).} }
@article{HSS-lmcs14, journal = {Logical Methods in Computer Science}, author = {Haase, Christoph and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {The Power of Priority Channel Systems}, year = {2014}, month = dec, volume = 10, number = {4:4}, nopages = {}, url = {http://arxiv.org/abs/1301.5500}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HSS-lmcs14.pdf}, doi = {10.2168/LMCS-10(4:4)2014}, abstract = {We introduce Priority Channel Systems, a new class of channel systems where messages carry a numeric priority and where higher-priority messages can supersede lower-priority messages preceding them in the fifo communication buffers. The decidability of safety and inevitability properties is shown via the introduction of a priority embedding, a well-quasi-ordering that has not previously been used in well-structured systems. We then show how Priority Channel Systems can compute Fast-Growing functions and prove that the aforementioned verification problems are \(\mathbf{F}_{\epsilon_{0}}\)-complete.} }
@inproceedings{DSS-pods14, address = {Snowbird, Utah, USA}, month = jun, year = 2014, publisher = {ACM Press}, editor = {Hull, Richard and Grohe, Martin}, acronym = {{PODS}'14}, booktitle = {{P}roceedings of the 33rd {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'14)}, author = {Durand, Arnaud and Schweikardt, Nicole and Segoufin, Luc}, title = {Enumerating answers to first-order queries over databases of low degree}, pages = {121-131}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DSS-pods14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DSS-pods14.pdf}, doi = {10.1145/2594538.2594539}, abstract = {A~class of relational databases has low degree if for all~\(\delta\), all but finitely many databases in the class have degree at most~\(n^{\delta}\), where \(n\) is the size of the database. Typical examples are databases of bounded degree or of degree bounded by \(\textrm{log} n\).\par It is known that over a class of databases having low degree, first-order boolean queries can be checked in pseudo-linear time, i.e. in time bounded by \(n^{1+\epsilon}\), for all~\(\epsilon\). We~generalise this result by considering query evaluation.\par We show that counting the number of answers to a query can be done in pseudo-linear time and that enumerating the answers to a query can be done with constant delay after a pseudo-linear time preprocessing.} }
@inproceedings{segoufin-stacs14, address = {Lyon, France}, month = mar, year = 2014, volume = 25, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Mayr, Ernst W. and Portier, Natacha}, acronym = {{STACS}'14}, booktitle = {{P}roceedings of the 31st {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'14)}, author = {Segoufin, Luc}, title = {A~glimpse on constant delay enumeration}, pages = {13-27}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/segoufin-stacs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/segoufin-stacs14.pdf}, doi = {10.4230/LIPIcs.STACS.2014.13}, abstract = {We survey some of the recent results about enumerating the answers to queries over a database. We focus on the case where the enumeration is performed with a constant delay between any two consecutive solutions, after a linear time preprocessing. This cannot be always achieved. It requires restricting either the class of queries or the class of databases. We describe here several scenarios when this is possible.} }
@inproceedings{ADV-icdt14, address = {Athens, Greece}, month = mar, year = 2014, editor = {Schweikardt, Nicole and Christophides, Vassilis and Leroy, Vincent}, acronym = {{ICDT}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'14)}, author = {Abiteboul, Serge and Deutch, Daniel and Vianu, Victor}, title = {Deduction with Contradictions in Datalog}, pages = {143-154}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ADV-icdt14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ADV-icdt14.pdf}, doi = {10.5441/002/icdt.2014.17}, abstract = {We study deduction in the presence of inconsistencies. Following previous works, we capture deduction via datalog programs and inconsistencies through violations of functional dependencies (FDs). We study and compare two semantics for datalog with FDs: the first, of a logical nature, is based on inferring facts one at a time, while never violating the FDs; the second, of an operational nature, consists in a fixpoint computation in which maximal sets of facts consistent with the FDs are inferred at each stage.\par Both semantics are nondeterministic, yielding sets of possible worlds. We introduce a PTIME (in the size of the extensional data) algorithm, that given a datalog program, a set of FDs and an input instance, produces a c-table representation of the set of possible worlds. Then, we propose to quantify nondeterminism with probabilities, by means of a probabilistic semantics. We consider the problem of capturing possible worlds along with their probabilities via probabilistic c-tables.\par We then study classical computational problems in this novel context. We consider the problems of computing the probabilities of answers, of identifying most likely supports for answers, and of determining the extensional facts that are most influential for deriving a particular fact. We show that the interplay of recursion and FDs leads to novel technical challenges in the context of these problems.} }
@article{ABV-tocsys15, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Highly Expressive Query Languages for Unordered Data Trees}, pages = {927-966}, year = 2015, month = nov, volume = {57}, number = {4}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-tocsys15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-tocsys15.pdf}, doi = {10.1007/s00224-015-9617-5}, abstract = {We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay of different factors: the expressive power of basic queries, the embedding of computation into data (as in Active XML), and the use of deterministic vs. nondeterministic control. All languages are Turing complete, but not necessarily query complete in the sense of Chandra and Harel. Indeed, we show that some combinations of features yield serious limitations, analogous to FO\(^{k}\) definability in the relational context. On the other hand, the limitations come with benefits such as the existence of powerful normal forms providing opportunities for optimization. Other languages are {"}almost{"} complete, but fall short because of subtle limitations reminiscent of the copy elimination problem in object databases.} }
@article{AADMS-tocsys14, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Abiteboul, Serge and Amsterdamer, Yael and Deutch, Daniel and Milo, Tova and Senellart, Pierre}, title = {Optimal Probabilistic Generation of {XML} Documents}, pages = {806-842}, year = 2015, month = nov, volume = {57}, number = {4}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AADMS-tocsys14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AADMS-tocsys14.pdf}, doi = {10.1007/s00224-014-9581-5}, abstract = {We study the problem of, given a corpus of XML documents and its schema, finding an optimal (generative) probabilistic model, where optimality here means maximizing the likelihood of the particular corpus to be generated. Focusing first on the structure of documents, we present an efficient algorithm for finding the best generative probabilistic model, in the absence of constraints. We further study the problem in the presence of integrity constraints, namely key, inclusion, and domain constraints. We study in this case two different kinds of generators. First, we consider a continuation-test generator that performs, while generating documents, tests of schema satisfiability; these tests prevent from generating a document violating the constraints but, as we will see, they are computationally expensive. We also study a restart generator that may generate an invalid document and, when this is the case, restarts and tries again. Finally, we consider the injection of data values into the structure, to obtain a full XML document. We study different approaches for generating these values.} }
@inproceedings{JLMX-mfps30, address = {Ithaca, New~York, USA}, month = jun, year = 2014, volume = 308, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jacobs, Bart and Silva, Alexandra and Staton, Sam}, acronym = {{MFPS}'14}, booktitle = {{P}roceedings of the 30th {C}onference on {M}athematical {F}oundations of {P}rogramming {S}emantics ({MFPS}'14)}, author = {Jaziri, Samy and Larsen, Kim G. and Mardare, Radu and Xue, Bingtian}, title = {Adequacy and Complete Axiomatization for Timed Modal Logic}, pages = {183-210}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JLMX-mfps14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JLMX-mfps14.pdf}, doi = {10.1016/j.entcs.2014.10.011}, abstract = {In this paper we develop the metatheory for Timed Modal Logic~(TML), which is the modal logic used for the analysis of timed transition systems~(TTSs). We solve a series of long-standing open problems related to~TML. Firstly, we prove that TML enjoys the Hennessy-Milner property and solve one of the open questions in the field. Secondly, we prove that the set of validities are not recursively enumerable. Nevertheless, we develop a strongly-complete proof system for~TML. Since the logic is not compact, the proof system contains infinitary rules, but only with countable sets of instances. Thus, we~can involve topological results regarding Stone spaces, such as the Rasiowa-Sikorski lemma, to complete the proofs.} }
@inproceedings{GLJ-mfps30, address = {Ithaca, New~York, USA}, month = jun, year = 2014, volume = 308, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jacobs, Bart and Silva, Alexandra and Staton, Sam}, acronym = {{MFPS}'14}, booktitle = {{P}roceedings of the 30th {C}onference on {M}athematical {F}oundations of {P}rogramming {S}emantics ({MFPS}'14)}, author = {Goubault{-}Larrecq, Jean and Jung, Achim}, title = {{QRB}, {QFS}, and the Probabilistic Powerdomain}, pages = {167-182}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-mfps14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLJ-mfps14.pdf}, doi = {10.1016/j.entcs.2014.10.010}, abstract = {We show that the first author's QRB-domains coincide with Li and Xu's QFS-domains, and also with Lawson-compact quasi-continuous dcpos, with stably-compact locally finitary compact spaces, with sober QFS-spaces, and with sober QRB-spaces. The first three coincidences were discovered independently by Lawson and~Xi. The equivalence with sober QFS-spaces is then applied to give a novel, direct proof that the probabilistic powerdomain of a QRB-domain is a QRB-domain. This improves upon a previous, similar result, which was limited to pointed, second-countable QRB-domains.} }
@article{PHL-sttt14, publisher = {Springer}, journal = {International Journal on Software Tools for Technology Transfer}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and Longuet, Delphine}, title = {Model-based Testing for Concurrent Systems: Unfolding-based Test Selection}, volume = {18}, number = 3, year = {2016}, month = jun, pages = {305-318}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-sttt14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-sttt14.pdf}, doi = {10.1007/s10009-014-0353-y}, abstract = {Model-based testing has mainly focused on models where concurrency is interpreted as interleaving (like the ioco theory for labeled transition systems), which may be too coarse when one wants concurrency to be preserved in the implementation. In order to test such concurrent systems, we choose to use Petri nets as specifications and define a concurrent conformance relation named co-ioco. We present a test generation algorithm based on Petri net unfolding able to build a complete test suite w.r.t our co-ioco conformance relation. In addition we propose several coverage criteria that allow to select finite prefixes of an unfolding in order to build manageable test suites.} }
@article{CDGH-ic15, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Gimbert, Hugo and Henzinger, Thomas A.}, title = {Randomness for free}, volume = {245}, month = dec, year = 2015, pages = {3-16}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGH-ic15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGH-ic15.pdf}, doi = {10.1016/j.ic.2015.06.003}, abstract = {We consider two-player zero-sum games on finite-state graphs. These games can be classified on the basis of the information of the players and on the mode of interaction between them. On the basis of information the classification is as follows: (a)~partial-observation (both players have partial view of the game); (b)~one-sided complete-observation (one player has complete observation); and (c)~complete-observation (both players have complete view of the game). On~the basis of mode of interaction we have the following classification: (a)~concurrent (players interact simultaneously); and (b)~turn-based (players interact in turn). The~two sources of randomness in these games are randomness in the transition function and randomness in the strategies. In general, randomized strategies are more powerful than deterministic strategies, and probabilistic transitions give more general classes of games. We present a complete characterization for the classes of games where randomness is not helpful~in: (a)~the transition function (probabilistic transitions can be simulated by deterministic transitions); and (b)~strategies (pure strategies are as powerful as randomized strategies). As~a consequence of our characterization we obtain new undecidability results for these games.} }
@article{LM-ic14, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {Augmenting {ATL} with strategy contexts}, volume = {245}, month = dec, year = 2015, pages = {98-123}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2014-05.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2014-05.pdf}, doi = {10.1016/j.ic.2014.12.020}, abstract = {We study the extension of the alternating-time temporal logic (ATL) with strategy contexts: contrary to the original semantics, in this semantics the strategy quantifiers do not reset the previously selected strategies.\par We show that our extension ATLsc is very expressive, but that its decision problems are quite hard: model checking is \(k\)-EXPTIME-complete when the formula has k nested strategy quantifiers; satisfiability is undecidable, but we prove that it is decidable when restricting to turn-based games. Our algorithms are obtained through a very convenient translation to QCTL (the~computation-tree logic CTL extended with atomic quantification), which we show also applies to Strategy Logic, as well as when strategy quantification ranges over memoryless strategies.} }
@inproceedings{AG-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {Aiswarya, C. and Gastin, Paul}, title = {Reasoning about distributed systems: {WYSIWYG}}, pages = {11-30}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AG-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AG-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.11}, abstract = {There are two schools of thought on reasoning about distributed systems: one~following interleaving based semantics, and one following partial-order{{\slash}}graph based semantics. This paper compares these two approaches and argues in favour of the latter. An~introductory treatment of the split-width technique is also provided.} }
@article{jgl-jlap14, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Methods in Programming}, author = {Goubault{-}Larrecq, Jean}, title = {Full Abstraction for Non-Deterministic and Probabilistic Extensions of {PCF}~{I}: the~Angelic Cases}, volume = 84, number = 1, year = 2015, month = jan, pages = {155-184}, opteditor = {Berger, Ulrich}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/jgl-jlap14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/jgl-jlap14.pdf}, doi = {10.1016/j.jlamp.2014.09.003}, abstract = {We examine several extensions and variants of Plotkin's language~PCF, including non-deterministic and probabilistic choice constructs. For~each, we give an operational and a denotational semantics, and compare them. In each case, we show soundness and computational adequacy: the two semantics compute the same values at ground types. Beyond this, we establish full abstraction (the~observational preorder coincides with the denotational preorder) in a number of cases. In~the probabilistic cases, this requires the addition of so-called statistical termination testers to the language.} }
@article{haar-mvlsc15, publisher = {Old City Publishing}, journal = {Journal of Multiple-Valued Logic and Soft Computing}, author = {Haar, Stefan}, title = {Cyclic Ordering through Partial Orders}, volume = {27}, number = {2-3}, year = 2016, month = sep, pages = {209-228}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-mvlsc16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-mvlsc16.pdf}, abstract = {The orientation problem for ternary cyclic order relations has been attacked in the literature from combinatorial perspectives, through rotations, and by connection with Petri nets. We propose here a two-fold characterization of orientable cyclic orders in terms of symmetries of partial orders as well as in terms of separating sets (cuts). The results are inspired by properties of non-sequential discrete processeses, but also apply to dense structures of any cardinality.} }
@article{BFHP-fi14, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Bernardinello, Luca and Ferigato, Carlo and Haar, Stefan and Pomello, Lucia}, title = {Closed Sets in Occurrence Nets with Conflicts}, volume = 133, number = 4, year = 2014, pages = {323-344}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHP-fi14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHP-fi14.pdf}, doi = {10.3233/FI-2014-1079}, abstract = {The semantics of concurrent processes can be defined in terms of partially ordered sets. Occurrence nets, which belong to the family of Petri nets, model concurrent processes as partially ordered sets of occurrences of local states and local events. On the basis of the associated concurrency relation, a closure operator can be defined, giving rise to a lattice of closed sets. Extending previous results along this line, the present paper studies occurrence nets with forward conflicts, modelling families of processes. It is shown that the lattice of closed sets is orthomodular, and the relations between closed sets and some particular substructures of an occurrence net are studied. In particular, the paper deals with runs, modelling concurrent histories, and trails, corresponding to possible histories of sequential components. A~second closure operator is then defined by means of an iterative procedure. The~corresponding closed sets, here called 'dynamically closed', are shown to form a complete lattice, which in general is not orthocomplemented. Finally, it is shown that, if an occurrence net satisfies a property called B-density, which essentially says that any antichain meets any trail, then the two notions of closed set coincide, and they form a complete, algebraic orthomodular lattice.} }
@inproceedings{BHL-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {Bertrand, Nathalie and Haddad, Serge and Lefaucheux, Engel}, title = {Foundation of Diagnosis and Predictability in Probabilistic Systems}, pages = {417-429}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.417}, abstract = {In discrete event systems prone to unobservable faults, a diagnoser must eventually detect fault occurrences. The diagnosability problem consists in deciding whether such a diagnoser exists. Here we investigate diagnosis for probabilistic systems modelled by partially observed Markov chains also called probabilistic labeled transition systems (pLTS). First we study different specifications of diagnosability and establish their relations both in finite and infinite pLTS. Then we analyze the complexity of the diagnosability problem for finite pLTS: we show that the polynomial time procedure earlier proposed is erroneous and that in fact for all considered specifications, the problem is PSPACE-complete. We also establish tight bounds for the size of diagnosers. Afterwards we consider the dual notion of predictability which consists in predicting that in a safe run, a fault will eventually occur. Predictability is an easier problem than diagnosability: it is NLOGSPACE-complete. Yet the predictor synthesis is as hard as the diagnoser synthesis. Finally we introduce and study the more flexible notion of prediagnosability that generalizes predictability and diagnosability.} }
@inproceedings{BGK-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {Bollig, Benedikt and Gastin, Paul and Kumar, Akshay}, title = {Parameterized Communicating Automata: Complementation and Model Checking}, pages = {625-637}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGK-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGK-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.625}, abstract = {We study the language-theoretical aspects of parameterized communicating automata (PCAs), in which processes communicate via rendez-vous. A given PCA can be run on any topology of bounded degree such as pipelines, rings, ranked trees, and grids. We show that, under a context bound, which restricts the local behavior of each process, PCAs are effectively complementable. Complementability is considered a key aspect of robust automata models and can, in particular, be exploited for verification. In this paper, we use it to obtain a characterization of context-bounded PCAs in terms of monadic second-order (MSO) logic. As the emptiness problem for context-bounded PCAs is decidable for the classes of pipelines, rings, and trees, their model-checking problem wrt. MSO properties also becomes decidable. While previous work on model checking parameterized systems typically uses temporal logics without next operator, our MSO logic allows one to express several natural next modalities.} }
@inproceedings{CMS-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {Chadha, Rohit and Mathur, Umang and Schwoon, Stefan}, title = {Computing Information Flow Using Symbolic Model-Checking}, pages = {505-516}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CMS-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CMS-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.505}, abstract = {Several measures have been proposed in literature for quantifying the information leaked by the public outputs of a program with secret inputs. We consider the problem of computing information leaked by a deterministic or probabilistic program when the measure of information is based on (a)~min-entropy and (b)~Shannon entropy. The key challenge in computing these measures is that we need the total number of possible outputs and, for each possible output, the number of inputs that lead to it. A direct computation of these quantities is infeasible because of the state-explosion problem. We therefore propose symbolic algorithms based on binary decision diagrams (BDDs). The advantage of our approach is that these symbolic algorithms can be easily implemented in any BDD-based model-checking tool that checks for reachability in deterministic non-recursive programs by computing program summaries. We demonstrate the validity of our approach by implementing these algorithms in a tool Moped-QLeak, which is built upon Moped, a model checker for Boolean programs. Finally, we show how this symbolic approach extends to probabilistic programs.} }
@inproceedings{DFM-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {David, Claire and Francis, Nadime and Murlak, Filip}, title = {Consistency of injective tree patterns}, pages = {279-290}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DFM-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DFM-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.279}, abstract = {Testing if an incomplete description of an XML document is consistent, that is, if it describes a real document conforming to the imposed schema, amounts to deciding if a given tree pattern can be matched injectively into a tree accepted by a fixed automaton. This problem can be solved in polynomial time for patterns that use the child relation and the sibling order, but do not use the descendant relation. For general patterns the problem is in NP, but no lower bound has been known so far. We show that the problem is NP-complete already for patterns using only child and descendant relations. The source of hardness turns out to be the interplay between these relations: for patterns using only descendant we give a polynomial algorithm. We also show that the algorithm can be adapted to patterns using descendant and following-sibling, but combining descendant and next-sibling leads to intractability.} }
@inproceedings{DJLMS-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {Doyen, Laurent and Juhl, Line and Larsen, Kim G. and Markey, Nicolas and Shirmohammadi, Mahsa}, title = {Synchronizing words for weighted and timed automata}, pages = {121-132}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DJLMS-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DJLMS-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.121}, abstract = {The problem of synchronizing automata is concerned with the existence of a word that sends all states of the automaton to one and the same state. This problem has classically been studied for complete deterministic finite automata, with the existence problem being NLOGSPACE-complete.\par In this paper we consider synchronizing-word problems for weighted and timed automata. We consider the synchronization problem in several variants and combinations of these, including deterministic and non-deterministic timed and weighted automata, synchronization to unique location with possibly different clock valuations or accumulated weights, as well as synchronization with a safety condition forbidding the automaton to visit states outside a safety-set during synchronization (e.g. energy constraints). For deterministic weighted automata, the synchronization problem is proven PSPACE-complete under energy constraints, and in 3-EXPSPACE under general safety constraints. For timed automata the synchronization problems are shown to be PSPACE-complete in the deterministic case, and undecidable in the non-deterministic case.} }
@inproceedings{BMS-fsttcs14, address = {New~Dehli, India}, month = dec, year = 2014, volume = {29}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Raman, Venkatesh and Suresh, S.~P.}, acronym = {{FSTTCS}'14}, booktitle = {{P}roceedings of the 34th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'14)}, author = {Bouyer, Patricia and Markey, Nicolas and Stan, Daniel}, title = {Mixed {N}ash Equilibria in Concurrent Games}, pages = {351-363}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-fsttcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-fsttcs14.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2014.351}, abstract = {We study mixed-strategy Nash equilibria in multiplayer deterministic concurrent games played on graphs, with terminal-reward payoffs (that is, absorbing states with a value for each player). We show undecidability of the existence of a constrained Nash equilibrium (the constraint requiring that one player should have maximal payoff), with only three players and 0/1-rewards (i.e., reachability objectives). This has to be compared with the undecidability result by Ummels and Wojtczak for turn-based games which requires 14 players and general rewards. Our proof has various interesting consequences: (i)~the~undecidability of the existence of a Nash equilibrium with a constraint on the social welfare; (ii)~the~undecidability of the existence of an (unconstrained) Nash equilibrium in concurrent games with terminal-reward payoffs.} }
@article{BBBMBGJ-lmcs14, journal = {Logical Methods in Computer Science}, author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Menet, Quentin and Baier, Christel and Gr{\"o}{\ss}er, Marcus and Jurdzi{\'n}ski, Marcin}, title = {Stochastic Timed Automata}, volume = 10, number = {4:6}, nopages = {}, month = dec, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBMBGJ-mfcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBMBGJ-mfcs14.pdf}, doi = {10.2168/LMCS-10(4:6)2014}, abstract = {A~stochastic timed automaton is a purely stochastic process defined on a timed automaton, in which both delays and discrete choices are made randomly. We study the almost-sure model-checking problem for this model, that is, given a stochastic timed automaton~\(\mathcal{A}\) and a property~\(\varphi\), we want to decide whether \(\mathcal{A}\) satisfies~\(\varphi\) with probability~\(1\). In this paper, we identify several classes of automata and of properties for which this can be decided. The proof relies on the construction of a finite abstraction, called the thick graph, that we interpret as a finite Markov chain, and for which we can decide the almost-sure model-checking problem. Correctness of the abstraction holds when automata are almost-surely fair, which we show, is the case for two large classes of systems, single-clock automata and so-called weak-reactive automata. Techniques employed in this article gather tools from real-time verification and probabilistic verification, as well as topological games played on timed automata.} }
@article{BCGZ-jal14, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Bollig, Benedikt and Cyriac, Aiswarya and Gastin, Paul and Zeitoun, Marc}, title = {Temporal logics for concurrent recursive programs: Satisfiability and model checking}, volume = 12, number = 4, pages = {395-416}, month = dec, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGZ-jal14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGZ-jal14.pdf}, doi = {10.1016/j.jal.2014.05.001}, abstract = {We develop a general framework for the design of temporal logics for concurrent recursive programs. A program execution is modeled as a partial order with multiple nesting relations. To specify properties of executions, we consider any temporal logic whose modalities are definable in monadic second-order logic and which, in addition, allows PDL-like path expressions. This captures, in a unifying framework, a wide range of logics defined for ranked and unranked trees, nested words, and Mazurkiewicz traces that have been studied separately. We show that satisfiability and model checking are decidable in EXPTIME and 2EXPTIME, depending on the precise path modalities.} }
@proceedings{KHY-topnoc2014, editor = {Koutny, Maciej and Haddad, Serge and Yakovlev, Alex}, title = {Transactions on {P}etri Nets and Other Models of Concurrency~{IX}}, booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{IX}}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 8910, year = {2014}, noaddress = {}, url = {http://www.springer.com/978-3-662-45729-0} }
@incollection{topnoc14-CH, year = 2014, volume = {8910}, series = {Lecture Notes in Computer Science}, editor = {Koutny, Maciej and Haddad, Serge and Yakovlev, Alex}, publisher = {Springer}, booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{IX}}, author = {Chatain, {\relax Th}omas and Haar, Stefan}, title = {A Canonical Contraction for Safe {P}etri Nets}, pages = {83-98}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc14-CH.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc14-CH.pdf}, doi = {10.1007/978-3-662-45730-6_5}, abstract = {Under maximal semantics, the occurrence of an event~\(a\) in a concurrent run of an occurrence net may imply the occurrence of other events, not causally related to~\(a\), in the same run. In recent works, we have formalized this phenomenon as the reveals relation, and used it to obtain a contraction of sets of events called facets in the context of occurrence nets. Here, we extend this idea to propose a canonical contraction of general safe Petri nets into pieces of partial-order behaviour which can be seen as {"}macro-transitions{"} since all their events must occur together in maximal semantics. On occurrence nets, our construction coincides with the facets abstraction. Our contraction preserves the maximal semantics in the sense that the maximal processes of the contracted net are in bijection with those of the original net.} }
@inproceedings{CHJPS-cmsb14, address = {Manchester, UK}, month = nov, year = 2014, volume = {8859}, series = {Lecture Notes in Bioinformatics}, publisher = {Springer-Verlag}, editor = {Mendes, Pedro}, acronym = {{CMSB}'14}, booktitle = {{P}roceedings of the 12th {C}onference on {C}omputational {M}ethods in {S}ystem {B}iology ({CMSB}'14)}, author = {Chatain, {\relax Th}omas and Haar, Stefan and Jezequel, Lo{\"\i}g and Paulev{\'e}, Lo{\"\i}c and Schwoon, Stefan}, title = {Characterization of Reachable Attractors Using {P}etri Net Unfoldings}, pages = {129-142}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CHJPS-cmsb14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CHJPS-cmsb14.pdf}, doi = {10.1007/978-3-319-12982-2_10}, abstract = {Attractors of network dynamics represent the long-term behaviours of the modelled system. Their characterization is therefore crucial for understanding the response and differentiation capabilities of a dynamical system. In the scope of qualitative models of interaction networks, the computation of attractors reachable from a given state of the network faces combinatorial issues due to the state space explosion. In this paper, we present a new algorithm that exploits the concurrency between transitions of parallel acting components in order to reduce the search space. The algorithm relies on Petri net unfoldings that can be used to compute a compact representation of the dynamics. We illustrate the applicability of the algorithm with Petri net models of cell signalling and regulation networks, Boolean and multi-valued. The proposed approach aims at being complementary to existing methods for deriving the attractors of Boolean models, while being generic since they apply to any safe Petri net.} }
@inproceedings{BHHP-simul14, address = {Nice, France}, month = oct, year = 2014, publisher = {XPS}, editor = {Arisha, Amr and Bobashev, Georgiy}, acronym = {{SIMUL}'14}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {A}dvances in {S}ystem {S}imulation ({SIMUL}'14)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Heiner, Monika and Picaronny, Claudine}, title = {Rare Event Handling in Signalling Cascades}, pages = {126-131}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHP-simul14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHP-simul14.pdf}, abstract = {Signalling cascades are a recurrent pattern of biological regulatory systems whose analysis has deserved a lot of attention. It has been shown that stochastic Petri nets are appropriate to model such systems and evaluate the probabilities of specific properties. Such an evaluation can be done numerically when the combinatorial state space explosion is manageable or statistically otherwise. However, when the probabilities to be evaluated are too small, random simulation requires more sophisticated techniques for the handling of rare events. In this paper, we show how such involved methods can be successfully applied for signalling cascades. More precisely, we study three relevant properties of a signalling cascade with the help of the Cosmos tool. Our experiments point out interesting dependencies between quantitative parameters of the regulatory system and its transient behaviour. In addition, they demonstrate that we can go beyond the capabilities of Marcie which provides one of the most efficient numerical solvers.} }
@article{BMS-tcs14, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robust Reachability in Timed Automata and Games: A~Game-based Approach}, volume = 563, year = {2015}, month = jan, pages = {43-74}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-tcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-tcs14.pdf}, doi = {10.1016/j.tcs.2014.08.014 }, abstract = {Reachability checking is one of the most basic problems in verification. By solving this problem in a game, one can synthesize a strategy that dictates the actions to be performed for ensuring that the target location is reached. In this work, we are interested in synthesizing {"}robust{"} strategies for ensuring reachability of a location in timed automata. By robust, we mean that it must still ensure reachability even when the delays are perturbed by the environment. We model this perturbed semantics as a game between the controller and its environment, and solve the parameterized robust reachability problem: we show that the existence of an upper bound on the perturbations under which there is a strategy reaching a target location is EXPTIME-complete. We also extend our algorithm, with the same complexity, to turn-based timed games, where the successor state is entirely determined by the environment in some locations.} }
@inproceedings{DDS-rp14, address = {Oxford, UK}, month = sep, year = 2014, volume = {8762}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James}, acronym = {{RP}'14}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)}, author = {Demri, St{\'e}phane and Dhar, Amit Kumar and Sangnier, Arnaud}, title = {Equivalence Between Model-Checking Flat Counter Systems and {P}resburger Arithmetic}, pages = {85-97}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-rp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-rp14.pdf}, doi = {10.1007/978-3-319-11439-2_7}, abstract = {We show that model-checking flat counter systems over CTL\textsuperscript{*} (with arithmetical constraints on counter values) has the same complexity as the satisfiability problem for Presburger arithmetic. The lower bound already holds with the temporal operator EF only, no~arithmetical constraints in the logical language and with guards on transitions made of simple linear constraints. This complements our understanding of model-checking flat counter systems with linear-time temporal logics, such as LTL for which the problem is already known to be (only) NP-complete with guards restricted to the linear fragment.} }
@proceedings{DKW-ijcar2014, editor = {Demri, St{\'e}phane and Kapur, Deepak and Weidenbach, Christoph}, title = {{P}roceedings of the 7th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'14)}, booktitle = {{P}roceedings of the 7th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'14)}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 8562, year = {2014}, month = jul, address = {Vienna, Austria}, url = {http://www.springer.com/978-3-319-08586-9} }
@article{CD-interstices14, publisher = {INRIA}, journal = {Interstices}, author = {Chr{\'e}tien, R{\'e}my and Delaune, St{\'e}phanie}, title = {Le~bitcoin, une monnaie \(100\%\) num{\'e}rique}, month = sep, year = {2014}, url = {https://interstices.info/jcms/ni_78681/le-bitcoin-une-monnaie-100-numerique}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-interstices14.pdf} }
@inproceedings{CDR-tgc14, address = {Rome, Italy}, month = dec, year = 2014, volume = {8902}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Maffei, Matteo and Tuosto, Emilio}, acronym = {{TGC}'14}, booktitle = {{R}evised {S}elected {P}apers of the 9th {S}ymposium on {T}rustworthy {G}lobal {C}omputing ({TGC}'14)}, author = {Cheval, Vincent and Delaune, St{\'e}phanie and Ryan, Mark D.}, title = {Tests for establishing security properties}, pages = {82-96}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDR-tgc14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDR-tgc14.pdf}, doi = {10.1007/978-3-662-45917-1_6}, abstract = {Ensuring strong security properties in some cases requires participants to carry out tests during the execution of a protocol. A~classical example is electronic voting: participants are required to verify the presence of their ballots on a bulletin board, and to verify the computation of the election outcome. The notion of certificate transparency is another example, in which participants in the protocol are required to perform tests to verify the integrity of a certificate log.\par We present a framework for modelling systems with such `testable properties', using the applied pi calculus. We model the tests that are made by participants in order to obtain the security properties. Underlying our work is an attacker model called {"}malicious but cautious{"}, which lies in between the Dolev-Yao model and the {"}honest but curious{"} model. The malicious-but-cautious model is appropriate for cloud computing providers that are potentially malicious but are assumed to be cautious about launching attacks that might cause user tests to fail.} }
@inproceedings{schmitz-rp14, address = {Oxford, UK}, month = sep, year = 2014, volume = {8762}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James}, acronym = {{RP}'14}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)}, author = {Schmitz, Sylvain}, title = {Complexity Bounds for Ordinal-Based Termination}, pages = {1-19}, url = {http://arxiv.org/abs/1407.5896}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/schmitz-rp14.pdf}, doi = {10.1007/978-3-319-11439-2_1}, abstract = {`What more than its truth do we know if we have a proof of a theorem in a given formal system?' We examine Kreisel's question in the particular context of program termination proofs, with an eye to deriving complexity bounds on program running times.\par Our main tool for this are length function theorems, which provide complexity bounds on the use of well quasi orders. We illustrate how to prove such theorems in the simple yet until now untreated case of ordinals. We show how to apply this new theorem to derive complexity bounds on programs when they are proven to terminate thanks to a ranking function into some ordinal.} }
@inproceedings{GLS-pp14, year = 2014, volume = 8464, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van Breugel, Franck and Kashefi, Elham and Palamidessi, Catuscia and Rutten, Jan}, booktitle = {Horizons of the Mind. A~Tribute to Prakash Panangaden}, author = {Goubault{-}Larrecq, Jean and Segala, Roberto}, title = {Random Measurable Selections}, pages = {343-362}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-pp14.pdf}, doi = {10.1007/978-3-319-06880-0_18}, abstract = {We make the first steps towards showing a general {"}randomness for free{"} theorem for stochastic automata. The goal of such theorems is to replace randomized schedulers by averages of pure schedulers. Here, we explore the case of measurable multifunctions and their measurable selections. This involves constructing probability measures on the measurable space of measurable selections of a given measurable multifunction, which seems to be a fairly novel problem. We then extend this to the case of IT automata, namely, non-deterministic (infinite) automata with a history-dependent transition relation. Throughout, we strive to make our assumptions minimal.} }
@inproceedings{BGS-rp14, address = {Oxford, UK}, month = sep, year = 2014, volume = {8762}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James}, acronym = {{RP}'14}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)}, author = {Bollig, Benedikt and Gastin, Paul and Schubert, Jana}, title = {Parameterized Verification of Communicating Automata under Context Bounds}, pages = {45-57}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-rp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-rp14.pdf}, doi = {10.1007/978-3-319-11439-2_4}, abstract = {We study the verification problem for parameterized communicating automata~(PCA), in which processes synchronize via message passing. A~given PCA can be run on any topology of bounded degree (such as pipelines, rings, or ranked trees), and communication may take place between any two processes that are adjacent in the topology. Parameterized verification asks if there is a topology from a given topology class that allows for an accepting run of the given PCA. In general, this problem is undecidable even for synchronous communication and simple pipeline topologies. We therefore consider context-bounded verification, which restricts the behavior of each single process. For several variants of context bounds, we show that parameterized verification over pipelines, rings, and ranked trees is decidable. Our approach is automata-theoretic and uniform. We introduce a notion of graph acceptor that identifies those topologies allowing for an accepting run. Depending on the given topology class, the topology acceptor can then be restricted, or adjusted, so that the verification problem reduces to checking emptiness of finite automata or tree automata.} }
@inproceedings{HM-rp14, address = {Oxford, UK}, month = sep, year = 2014, volume = {8762}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James}, acronym = {{RP}'14}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)}, author = {Haddad, Serge and Monmege, Benjamin}, title = {Reachability in {MDP}s: Refining Convergence of Value Iteration}, pages = {125-137}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-07.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-07.pdf}, doi = {10.1007/978-3-319-11439-2_10}, abstract = {Markov Decision Processes (MDP) are a widely used model including both non-deterministic and probabilistic choices. Minimal and maximal probabilities to reach a target set of states, with respect to a policy resolving non-determinism, may be computed by several methods including value iteration. This algorithm, easy to implement and efficient in terms of space complexity, consists in iteratively finding the probabilities of paths of increasing length. However, it raises three issues: (1)~defining a stopping criterion ensuring a bound on the approximation, (2)~analyzing the rate of convergence, and (3)~specifying an additional procedure to obtain the exact values once a sufficient number of iterations has been performed. The first two issues are still open and for the third one a {"}crude{"} upper bound on the number of iterations has been proposed. Based on a graph analysis and transformation of MDPs, we address these problems. First we introduce an interval iteration algorithm, for which the stopping criterion is straightforward. Then we exhibit convergence rate. Finally we significantly improve the bound on the number of iterations required to get the exact values.} }
@inproceedings{LS-rp14, address = {Oxford, UK}, month = sep, year = 2014, volume = {8762}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James}, acronym = {{RP}'14}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)}, author = {Leroux, J{\'e}r{\^o}me and Schnoebelen, {\relax Ph}ilippe}, title = {On Functions Weakly Computable by {P}etri Nets and Vector Addition Systems}, pages = {190-202}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-rp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-rp14.pdf}, doi = { 10.1007/978-3-319-11439-2_15}, abstract = {We show that any unbounded function weakly computable by a Petri net or a VASS cannot be sublinear. This answers a long-standing folklore conjecture about weakly computing the inverses of some fast-growing functions. The proof relies on a pumping lemma for sets of runs in Petri nets or VASSes.} }
@inproceedings{HH-rp14, address = {Oxford, UK}, month = sep, year = 2014, volume = {8762}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ouaknine, Jo{\"e}l and Potapov, Igor and Worrell, James}, acronym = {{RP}'14}, booktitle = {{P}roceedings of the 8th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'14)}, author = {Haase, Christoph and Halfon, Simon}, title = {Integer Vector Addition Systems with States}, pages = {112-124}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-rp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-rp14.pdf}, doi = {10.1007/978-3-319-11439-2_9}, abstract = {This paper studies reachability, coverability and inclusion problems for Integer Vector Addition Systems with States (\(\mathbb{Z}\)-VASS) and extensions and restrictions thereof. A~\(\mathbb{Z}\)-VASS comprises a finite-state controller with a finite number of counters ranging over the integers. Although it is folklore that reachability in \(\mathbb{Z}\)-VASS is NP-complete, it turns out that despite their naturalness, from a complexity point of view this class has received little attention in the literature. We fill this gap by providing an in-depth analysis of the computational complexity of the aforementioned decision problems. Most interestingly, it turns out that while the addition of reset operations to ordinary VASS leads to undecidability and Ackermann-hardness of reachability and coverability, respectively, they can be added to \(\mathbb{Z}\)-VASS while retaining NP-completeness of both coverability and reachability.} }
@article{PHL-stvr14, publisher = {John Wiley \& Sons, Ltd.}, journal = {Software Testing, Verification and Reliability}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and Longuet, Delphine}, title = {Model-Based Testing for Concurrent Systems with Labeled Event Structures}, volume = 24, number = 7, year = {2014}, month = nov, pages = {558-590}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-stvr14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-stvr14.pdf}, doi = {10.1002/stvr.1543}, abstract = {We propose a theoretical testing framework and a test generation algorithm for concurrent systems specified with true concurrency models, such as Petri nets or networks of automata. The semantic model of computation of such formalisms are labeled event structures, which allow to represent concurrency explicitly. We introduce the notions of strong and weak concurrency: strongly concurrent events must be concurrent in the implementation, while weakly concurrent ones may eventually be ordered. The ioco type conformance relations for sequential systems rely on the observation of sequences of actions and blockings, thus they are not capable of capturing and exploiting concurrency of non sequential behaviors. We propose an extension of \textbf{ioco} for labeled event structures, named \textbf{co-ioco}, allowing to deal with strong and weak concurrency. We~extend the notions of test cases and test execution to labeled event structures, and give a test generation algorithm building a complete test suite for \textbf{co-ioco}.} }
@inproceedings{BMP-dx14, address = {Graz, Austria}, month = sep, year = 2014, editor = {Abreu, Rui and Pill, Ingo and Wotawa, Franz}, acronym = {{DX}'14}, booktitle = {{P}roceedings of the 25th {I}nternational {W}orkshop on {P}rinciples of {D}iagnosis ({DX}'14)}, author = {Brand{\'a}n{ }Briones, Laura and Madalinski, Agnes and Ponce{ }de{~}Le{\'o}n, Hern{\'a}n}, title = {Distributed Diagnosability Analysis with {P}etri Nets}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMP-dx14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMP-dx14.pdf}, abstract = {We propose a framework to distributed diagnosability analysis of concurrent systems modeled with Petri nets as a collection of components synchronizing on common observable transitions, where faults can occur in several components. The diagnosability analysis of the entire system is done in parallel by verifying the interaction of each component with the fault free versions of the other components. Furthermore, we use existing efficient methods and tools, in particular parallel LTL-X model checking based on unfoldings, for diagnosability verification.} }
@article{FL-sosym14, publisher = {Springer}, journal = {Software~\& System Modeling}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {Recent and simple algorithms for {P}etri nets}, volume = 14, number = 2, year = {2015}, month = may, pages = {719-725}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FL-sosym14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FL-sosym14.pdf}, doi = {10.1007/s10270-014-0426-0}, abstract = {We show how inductive invariants can be used to solve coverability, boundedness and reachability problems for Petri nets. This approach provides algorithms that are conceptually simpler than previously pblished ones.} }
@article{EM-integers14, journal = {INTEGERS -- Electronic Journal of Combinatorial Number Theory}, author = {Elias, Yara and McKenzie, Pierre}, title = {On Generalized Addition Chains}, volume = 14, number = {A16}, nopages = {}, year = 2014, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/EM-integers14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/EM-integers14.pdf}, abstract = {Given integers \(d \geq 1\), and \(g \geq 2\), a~\(g\)-addition chain for~\(d\) is a sequence of integers \(a_0 = 1\), \(a_1\), \(a_2\), ... , \(a_{r-1}\), \(a_r = d\) where \(a_i = a_{j_{1}} + a_{j_{2}} + \cdots + a_{j_{k}}\), with \(2 \leq k \leq g\), and \(0 \leq j_1 \leq j_2 \cdots j_k \leq i-1\). The length of a \(g\)-addition chain is~\(r\), the number of terms following~\(1\) in the sequence. We denote by~\(l_{g}(d)\) the length of a shortest addition chain for~\(d\). Many results have been established in the case \(g = 2\). Our aim is to establish the same sort of results for arbitrary fixed~\(g\). In~particular, we adapt methods for constructing \(g\)-addition chains when \(g = 2\) to the case \(g > 2\) and we study the asymptotic behavior of~\(l_g\).} }
@inproceedings{CKM-ncma14, address = {Kassel, Germany}, month = jul, year = 2014, volume = 304, series = {books@ocg.at}, publisher = {Austrian Computer Society}, editor = {Bensch, Suna and Freund, Rudolf and Otto, Friedrich}, acronym = {{NCMA}'14}, booktitle = {{P}roceedings of the 6th {W}orkshop on {N}on-{C}lassical {M}odels of {A}utomata and {A}pplications ({NCMA}'14)}, author = {Cadilhac, Micha{\"e}l and Krebs, Andreas and McKenzie, Pierre}, title = {Extremely uniform branching programs}, pages = {73-83}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CKM-ncma14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CKM-ncma14.pdf}, abstract = {We propose a new descriptive complexity notion of uniformity for branching programs solving problems defined on structured data. We observe that FO[=]-uniform (\(n\)-way) branching programs are unable to solve the tree evaluation problem studied by Cook, McKenzie, Wehr, Braverman and Santhanam because such programs possess a variant of their thriftiness property. Similarly, FO[=]-uniform (\(n\)-way) branching programs are unable to solve the P-complete GEN problem because such programs possess the incremental property studied by G{\'a}l, Kouck{\'y} and McKenzie.} }
@inproceedings{AGN-atva14, address = {Sydney, Australia}, month = nov, year = {2014}, volume = 8837, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cassez, Franck and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{ATVA}'14}, booktitle = {{P}roceedings of the 12th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'14)}, author = {Aiswarya, C. and Gastin, Paul and Narayan Kumar, K.}, title = {Verifying Communicating Multi-pushdown Systems via Split-width}, pages = {1-17}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGN-atva14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGN-atva14.pdf}, doi = {10.1007/978-3-319-11936-6_1}, abstract = {Communicating multi-pushdown systems model networks of multi-threaded recursive programs communicating via reliable FIFO channels. We extend the notion of split-width to this setting, improving and simplifying the earlier definition. Split-width, while having the same power of clique-{{\slash}}tree-width, gives a divide-and-conquer technique to prove the bound of a class, thanks to the two basic operations, shuffle and merge, of the split-width algebra. We illustrate this technique on examples. We also obtain simple, uniform and optimal decision procedures for various verification problems parametrised by split-width.} }
@article{FKS-fmsd14, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Fribourg, Laurent and K{\"u}hne, Ulrich and Soulat, Romain}, title = {Finite Controlled Invariants for Sampled Switched Systems}, year = 2014, month = dec, volume = 45, number = 3, pages = {303-329}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FKS-fmsd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FKS-fmsd14.pdf}, doi = {10.1007/s10703-014-0211-2}, abstract = {We consider in this paper switched systems, a class of hybrid systems recently used with success in various domains such as automotive industry and power electronics. We propose a state-dependent control strategy which makes the trajectories of the analyzed system converge to finite cyclic sequences of points. Our method relies on a technique of decomposition of the state space into local regions where the control is uniform. We have implemented the procedure using zonotopes, and applied it successfully to several examples of the literature and industrial case studies in power electronics.} }
@inproceedings{SLAF-syncop14, address = {Grenoble, France}, volume = 145, series = {Electronic Proceedings in Theoretical Computer Science}, month = apr, year = 2014, editor = {Andr{\'e}, {\'E}tienne and Frehse, Goran}, acronym = {{SYNCOP}'14}, booktitle = {{P}roceedings of the 1st {I}nternational {W}orkshop on {S}ynthesis of {C}ontinuous {P}arameters ({SYNCOP}'14)}, author = {Sun, Youcheng and Lipari, Giuseppe and Andr{\'e}, {\'E}tienne and Fribourg, Laurent}, title = {Toward Parametric Timed Interfaces for Real-Time Components}, pages = {49-64}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SLAF-syncop14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SLAF-syncop14.pdf}, doi = {10.4204/EPTCS.145.6}, abstract = {We propose here a framework to model real-time components consisting of concurrent real-time tasks running on a single processor, using parametric timed automata. Our framework is generic and modular, so as to be easily adapted to different schedulers and more complex task models. We first perform a parametric schedulability analysis of the components using the inverse method. We show that the method unfortunately does not provide satisfactory results when the task periods are considered as parameters. After identifying and explaining the problem, we present a solution adapting the model by making use of the worst-case scenario in schedulability analysis. We show that the analysis with the inverse method always converges on the modified model when the system load is strictly less than~\(100\%\). Finally, we show how to use our parametric analysis for the generation of timed interfaces in compositional system design.} }
@inproceedings{BGM-atva14, address = {Sydney, Australia}, month = nov, year = {2014}, volume = 8837, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cassez, Franck and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{ATVA}'14}, booktitle = {{P}roceedings of the 12th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'14)}, author = {Bouyer, Patricia and Gardy, Patrick and Markey, Nicolas}, title = {Quantitative verification of weighted {K}ripke structures}, pages = {64-80}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-atva14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-atva14.pdf}, doi = {10.1007/978-3-319-11936-6_6}, abstract = {Extending formal verification techniques to handle quantitative aspects, both for the models and for the properties to be checked, has become a central research topic over the last twenty years. Following several recent works, we study model checking for (one-dimensional) weighted Kripke structures with positive and negative weights, and temporal logics constraining the total and/or average weight. We prove decidability when only accumulated weight is constrained, while allowing average-weight constraints alone already is undecidable.} }
@inproceedings{MV-atva14, address = {Sydney, Australia}, month = nov, year = {2014}, volume = 8837, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Cassez, Franck and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{ATVA}'14}, booktitle = {{P}roceedings of the 12th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'14)}, author = {Markey, Nicolas and Vester, Steen}, title = {Symmetry Reduction in Infinite Games with Finite Branching}, pages = {281-296}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MV-atva14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MV-atva14.pdf}, doi = {10.1007/978-3-319-11936-6_21}, abstract = {Symmetry reductions have been applied extensively for the verification of finite-state concurrent systems and hardware designs using model-checking of temporal logics such as LTL, CTL and CTL\textsuperscript{*}, as well as real-time and probabilistic-system model-checking. In this paper we extend the technique to handle infinite-state games on graphs with finite branching where the objectives of the players can be very general. As particular applications, it is shown that the technique can be applied to reduce the state space in parity games as well as when doing model-checking of the temporal logic ATL\textsuperscript{*}.} }
@article{ADK-lmcs14, journal = {Logical Methods in Computer Science}, author = {Arapinis, Myrto and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Dynamic Tags for Security Protocols}, volume = 10, number = {2:11}, nopages = {}, month = jun, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ADK-lmcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ADK-lmcs14.pdf}, doi = {10.2168/LMCS-10(2:11)2014}, abstract = {The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which yields a verification problem that has several sources of unboundedness (size of messages, number of sessions, etc. In this paper, we characterize a class of protocols for which deciding security for an unbounded number of sessions is decidable. More precisely, we present a simple transformation which maps a protocol that is secure for a bounded number of protocol sessions (a~decidable problem) to a protocol that is secure for an unbounded number of sessions. The precise number of sessions that need to be considered is a function of the security property and we show that for several classical security properties a single session is sufficient. Therefore, in many cases our results yields a design strategy for security protocols: (i)~design a protocol intended to be secure for a {single session}; and (ii)~apply our transformation to obtain a protocol which is secure for an unbounded number of sessions.} }
@article{FL-is14, publisher = {Springer}, journal = {Informatik Spektrum}, author = {Finkel, Alain and Leroux, J{\'e}r{\^o}me}, title = {Neue, einfache {A}lgorithmen f{\"u}r {P}etrinetze}, volume = 37, number = {3}, month = jun, year = 2014, pages = {229-236}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FL-is14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FL-is14.pdf}, doi = {10.1007/s00287-013-0753-5}, abstract = {Wir zeigen, wie die Entscheidungsprobleme der {\"U}berdeckung, der Beschr{\"a}nktheit und der Erreichbarkeit mithilfe induktiver Invarianten einfacher l{\"o}sbar sind als mit herk{\"o}mmlichen Methoden} }
@article{CD-tocl14, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Partial-Observation Stochastic Games: How to Win when Belief Fails}, volume = 15, number = {2:16}, month = apr, year = 2014, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tocl14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tocl14.pdf}, doi = {10.1145/2579819}, abstract = {In two-player finite-state stochastic games of partial observation on graphs, in every state of the graph, the players simultaneously choose an action, and their joint actions determine a probability distribution over the successor states. The game is played for infinitely many rounds and thus the players construct an infinite path in the graph. We consider reachability objectives where the first player tries to ensure a target state to be visited almost-surely (i.e., with probability~1) or positively (i.e., with positive probability), no matter the strategy of the second player.\par We classify such games according to the information and to the power of randomization available to the players. On the basis of information, the game can be one-sided with either (a)~player~1, or (b)~player 2 having partial observation (and the other player has perfect observation), or two-sided with (c)~both players having partial observation. On the basis of randomization, (a)~the players may not be allowed to use randomization (pure strategies), or (b)~they may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c)~they may use full randomization.\par Our main results for pure strategies are as follows: (1)~For one-sided games with player~2 having perfect observation we show that (in contrast to full randomized strategies) belief-based (subset-construction based) strategies are not sufficient, and we present an exponential upper bound on memory both for almost-sure and positive winning strategies; we show that the problem of deciding the existence of almost-sure and positive winning strategies for player~1 is EXPTIME-complete and present symbolic algorithms that avoid the explicit exponential construction. (2)~For one-sided games with player~1 having perfect observation we show that non-elementary memory is both necessary and sufficient for both almost-sure and positive win- ning strategies. (3)~We~show that for the general (two-sided) case finite-memory strategies are sufficient for both positive and almost-sure winning, and at least non-elementary memory is required. We establish the equivalence of the almost-sure winning problems for pure strategies and for randomized strategies with actions invisible. Our equivalence result exhibit serious flaws in previous results of the literature: we show a non-elementary memory lower bound for almost-sure winning whereas an exponential upper bound was previously claimed.} }
@inproceedings{CS-mfcs14, address = {Budapest, Hungary}, month = aug, year = 2014, volume = {8634}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {{\'E}sik, Zolt{\'a}n and Csuhaj{-}Varj{\'u}, Erzs{\'e}bet and Dietzfelbinger, Martin}, acronym = {{MFCS}'14}, booktitle = {{P}roceedings of the 39th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'14)~-- {P}art~{I}}, author = {Courtois, Jean-Baptiste and Schmitz, Sylvain}, title = {Alternating Vector Addition Systems with States}, pages = {220-231}, url = {http://hal.inria.fr/hal-00980878}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CS-mfcs14.pdf}, doi = {10.1007/978-3-662-44522-8_19}, abstract = {Alternating vector addition systems are obtained by equipping vector addition systems with states (VASS) with 'fork' rules, and provide a natural setting for infinite-arena games played over a VASS. Initially introduced in the study of propositional linear logic, they have more recently gathered attention in the guise of \emph{multi-dimensional energy} games for quantitative verification and synthesis.\par We show that establishing who is the winner in such a game with a state reachability objective is 2-ExpTime-complete. As a further application, we show that the same complexity result applies to the problem of whether a VASS is simulated by a finite-state system.} }
@inproceedings{CGK-concur14, address = {Rome, Italy}, month = sep, year = 2014, volume = 8704, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baldan, Paolo and Gorla, Daniele}, acronym = {{CONCUR}'14}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'14)}, author = {Cyriac, Aiswarya and Gastin, Paul and Narayan Kumar, K.}, title = {Controllers for the Verification of Communicating Multi-Pushdown Systems}, pages = {297-311}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CGK-concur14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CGK-concur14.pdf}, doi = {10.1007/978-3-662-44584-6_21}, abstract = {Multi-pushdowns communicating via queues are formal models of multi-threaded programs communicating via channels. They are turing powerful and much of the work on their verification has focussed on under-approximation techniques. Any error detected in the under-approximation implies an error in the system. However the successful verification of the under-approximation is not as useful if the system exhibits unverified behaviours. Our aim is to design controllers that observe/restrict the system so that it stays within the verified under-approximation. We identify some important properties that a good controller should satisfy. We consider an extensive under-approximation class, construct a distributed controller with the desired properties and also establish the decidability of verification problems for this class.} }
@inproceedings{CCD-concur14, address = {Rome, Italy}, month = sep, year = 2014, volume = 8704, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baldan, Paolo and Gorla, Daniele}, acronym = {{CONCUR}'14}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'14)}, author = {Chr{\'e}tien, R{\'e}my and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Typing messages for free in security protocols: the~case of equivalence properties}, pages = {372-386}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-concur14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-concur14.pdf}, doi = {10.1007/978-3-662-44584-6_26}, abstract = {Privacy properties such as untraceability, vote secrecy, or anonymity are typically expressed as behavioural equivalence in a process algebra that models security protocols. In this paper, we study how to decide one particular relation, namely trace equivalence, for an unbounded number of sessions.\par Our first main contribution is to reduce the search space for attacks. Specifically, we show that if there is an attack then there is one that is well-typed. Our result holds for a large class of typing systems and a large class of determinate security protocols. Assuming finitely many nonces and keys, we can derive from this result that trace equivalence is decidable for an unbounded number of sessions for a class of tagged protocols, yielding one of the first decidability results for the unbounded case. As an intermediate result, we also provide a novel decision procedure in the case of a bounded number of sessions.} }
@inproceedings{DMS-concur14, address = {Rome, Italy}, month = sep, year = 2014, volume = 8704, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baldan, Paolo and Gorla, Daniele}, acronym = {{CONCUR}'14}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'14)}, author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa}, title = {Robust Synchronization in {M}arkov Decision Processes}, pages = {234-248}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-concur14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-concur14.pdf}, doi = {10.1007/978-3-662-44584-6_17}, abstract = {We consider synchronizing properties of Markov decision processes (MDP), viewed as generators of sequences of probability distributions over states. A~probability distribution is \(p\)-synchronizing if the probability mass is at least~\(p\) in some state, and a sequence of probability distributions is weakly \(p\)-synchronizing, or strongly \(p\)-synchronizing if respectively infinitely many, or all but finitely many distributions in the sequence are \(p\)-synchronizing.\par For each synchronizing mode, an MDP can be \textit{(i)}~sure winning if there is a strategy that produces a \(1\)-synchronizing sequence; \textit{(ii)}~almost-sure winning if there is a strategy that produces a sequence that is, for all \(\epsilon>0\), a \((1-\epsilon)\)-synchronizing sequence; \textit{(iii)}~limit-sure winning if for all \(\epsilon>0\), there is a strategy that produces a \((1-\epsilon)\)-synchronizing sequence.\par For each synchronizing and winning mode, we consider the problem of deciding whether an MDP is winning, and we establish matching upper and lower complexity bounds of the problems, as well as the optimal memory requirement for winning strategies: \textit{(a)}~for all winning modes, we show that the problems are PSPACE-complete for weakly synchronizing, and PTIME-complete for strongly synchronizing; \textit{(b)}~we~show that for weakly synchronizing, exponential memory is sufficient and may be necessary for sure winning, and infinite memory is necessary for almost-sure winning; for strongly synchronizing, linear-size memory is sufficient and may be necessary in all modes; \textit{(c)}~we~show a robustness result that the almost-sure and limit-sure winning modes coincide for both weakly and strongly synchronizing.} }
@inproceedings{BMM-concur14, address = {Rome, Italy}, month = sep, year = 2014, volume = 8704, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baldan, Paolo and Gorla, Daniele}, acronym = {{CONCUR}'14}, booktitle = {{P}roceedings of the 25th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'14)}, author = {Bouyer, Patricia and Markey, Nicolas and Matteplackel, Raj~Mohan}, title = {Averaging in~{LTL}}, pages = {266-280}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMM-concur14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMM-concur14.pdf}, doi = {10.1007/978-3-662-44584-6_19}, abstract = {For the accurate analysis of computerized systems, powerful quantitative formalisms have been designed, together with efficient verification algorithms. However, verification has mostly remained boolean---either a property is~true, or it~is false. We~believe that this is too crude in a context where quantitative information and constraints are crucial: correctness should be quantified!\par In a recent line of works, several authors have proposed quantitative semantics for temporal logics, using e.g. \emph{discounting} modalities (which give less importance to distant events). In~the present paper, we define and study a quantitative semantics of~LTL with \emph{averaging} modalities, either on the long run or within an until modality. This, in a way, relaxes the classical Boolean semantics of~LTL, and provides a measure of certain properties of a model. We~prove that computing and even approximating the value of a formula in this logic is undecidable.} }
@inproceedings{PHL-ictac14, address = {Bucharest, Romania}, month = sep, year = 2014, volume = 8687, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ciobanu, Gabriel and M{\'e}ry, Dominique}, acronym = {{ICTAC}'14}, booktitle = {{P}roceedings of the 11th {I}nternational {C}olloquium on {T}heoretical {A}spects of {C}omputing ({ICTAC}'14)}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and Longuet, Delphine}, title = {Distributed testing of concurrent systems: vector clocks to the rescue}, pages = {369-387}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-ictac14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-ictac14.pdf}, doi = {10.1007/978-3-319-10882-7_22}, abstract = {The ioco relation has become a standard in model-based conformance testing. The co-ioco conformance relation is an extension of this relation to concurrent systems specified with true-concurrency models. This relation assumes a global control and observation of the system under test, which is not usually realistic in the case of physically distributed systems. Such systems can be partially observed at each of their points of control and observation by the sequences of inputs and outputs exchanged with their environment. Unfortunately, in general, global observation cannot be reconstructed from local ones, so global conformance cannot be decided with local tests. We propose to append time stamps to the observable actions of the system under test in order to regain global conformance from local testing.} }
@inproceedings{KS-dcfs2014, address = {Turku, Finland}, month = aug, year = 2014, volume = {8614}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {J{\"u}rgensen, Helmut and Karhum{\"a}ki, Juhani and Okhotin, Alexander}, acronym = {{DCFS}'14}, booktitle = {{P}roceedings of the 16th {W}orkshop on {D}escriptional {C}omplexity of {F}ormal {S}ystems ({DCFS}'14)}, author = {Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {On the state complexity of closures and interiors of regular languages with subwords}, pages = {234-245}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-dcfs2014.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-dcfs2014.pdf}, doi = {10.1007/978-3-319-09704-6_21}, abstract = {We study the state complexity of the set of subwords and superwords of regular languages, and provide new lower bounds in the case of languages over a two-letter alphabet. We also consider the dual interior sets, for which the nondeterministic state complexity has a doubly-exponential upper bound. We prove a matching doubly-exponential lower bound for downward interiors in the case of an unbounded alphabet.} }
@incollection{CD-nato12, author = {Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Formal Security Proofs}, booktitle = {Software Safety and Security}, pages = {26-63}, editor = {Nipkow, Tobias and Grumberg, Orna and Hauptmann, Benedikt}, series = {NATO Science for Peace and Security Series~-- D:~Information and Communication Security}, volume = {33}, publisher = {{IOS} Press}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-nato12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-nato12.pdf}, year = 2012, month = may }
@inproceedings{CLHKS-ispec12, address = {Hangzhou, China}, year = 2012, month = apr, volume = 7232, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ryan, Mark D. and Smyth, Ben and Wang, Guilin}, acronym = {{ISPEC}'12}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {I}nformation {S}ecurity {P}ractice and {E}xperience ({ISPEC}'12)}, author = {Comon{-}Lundh, Hubert and Hagiya, Masami and Kawamoto, Yusuke and Sakurada, Hideki}, title = {Computational Soundness of Indistinguishability Properties without Computable Parsing}, pages = {63-79}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CHKS-ispec12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CHKS-ispec12.pdf}, doi = {10.1007/978-3-642-29101-2_5}, abstract = {We provide a symbolic model for protocols using public-key encryption and hash function, and prove that this model is computationally sound: if there is an attack in the computational world, then there is an attack in the symbolic (abstract) model. Our original contribution is that we deal with the security properties, such as anonymity, which cannot be described using a single execution trace, while considering an unbounded number of sessions of the protocols in the presence of active and adaptive adversaries. Our soundness proof is different from all existing studies in that it does not require a computable parsing function from bit strings to terms. This allows us to deal with more cryptographic primitives, such as a preimage-resistant and collision-resistant hash function whose input may have different lengths.} }
@article{KS-msttocs14, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {Generalized {P}ost Embedding Problems}, year = {2015}, volume = 56, number = 4, pages = {697-716}, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-msttocs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-msttocs14.pdf}, doi = {10.1007/s00224-014-9561-9}, abstract = {The Regular Post Embedding Problem extended with partial (co)directness is shown decidable. This extends to universal and\slash or counting versions. It is also shown that combining directness and codirectness in Post Embedding problems leads to undecidability.} }
@inproceedings{KH-acsd14, address = {Tunis, Tunisia}, month = jun, year = 2014, publisher = {{IEEE} Computer Society Press}, acronym = {{ACSD}'14}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'14)}, author = {Kordon, Fabrice and Hulin{-}Hubard, Francis}, title = {BenchKit, a Tool for Massive Concurrent Benchmarking}, pages = {159-165}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KH-acsd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KH-acsd14.pdf}, doi = {10.1109/ACSD.2014.12}, abstract = {Benchmarking numerous programs in a reasonable time requires the use of several (potentially multicore) computers. We experimented such a situation in the context of the MCC (Model Checking Contest @ Petri net) where we had to operate more than 52000 runs for the 2013 edition. This paper presents BenchKit, a tool to operate programs on sets of potentially parallel machines and to gather monitoring information like CPU or memory usage. It also samples such data over the execution time. BenchKit has been elaborated in the context of the MCC and will be used for the 2014 edition.} }
@inproceedings{GHKS-acsd14, address = {Tunis, Tunisia}, month = jun, year = 2014, publisher = {{IEEE} Computer Society Press}, acronym = {{ACSD}'14}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'14)}, author = {Germanos, Vasileios and Haar, Stefan and Khomenko, Victor and Schwoon, Stefan}, title = {Diagnosability under Weak Fairness}, pages = {132-141}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GHKS-acsd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GHKS-acsd14.pdf}, doi = {10.1109/ACSD.2014.9}, abstract = {In partially observed Petri nets, diagnosis is the task of detecting whether or not the given sequence of observed labels indicates that some unobservable fault has occurred. Diagnosability is an associated property of the Petri net, stating that in any possible execution an occurrence of a fault can eventually be diagnosed.\par In this paper we consider diagnosability under the weak fairness (WF) assumption, which intuitively states that no transition from a given set can stay enabled forever---it~must eventually either fire or be disabled. We show that a previous approach to WF-diagnosability in the literature has a major flaw, and present a corrected notion. Moreover, we present an efficient method for verifying WF-diagnosability based on a reduction to LTL-X model checking. An important advantage of this method is that the LTL-X formula is fixed---in~particular, the WF assumption does not have to be expressed as a part of it (which would make the formula length proportional to the size of the specification), but rather the ability of existing model checkers to handle weak fairness directly is exploited.} }
@inproceedings{SLSFM-rtcsa14, address = {Chongqing, China}, month = aug, year = 2014, publisher = {{IEEE} Computer Society Press}, acronym = {{RTCSA}'14}, booktitle = {{P}roceedings of the 20th {IEEE} {I}nternational {C}onference on {E}mbedded and {R}eal-{T}ime {C}omputing {S}ystems and {A}pplications ({RTCSA}'14)}, author = {Sun, Youcheng and Lipari, Giuseppe and Soulat, Romain and Fribourg, Laurent and Markey, Nicolas}, title = {Component-Based Analysis of Hierarchical Scheduling using Linear Hybrid Automata}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SLSFM-rtcsa14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SLSFM-rtcsa14.pdf}, doi = {10.1109/RTCSA.2014.6910502}, abstract = {Formal methods (e.g. Timed Automata or Linear Hybrid Automata) can be used to analyse a real-time system by performing a reachability analysis on the model. The advantage of using formal methods is that they are more expressive than classical analytic models used in schedulability analysis. For example, it is possible to express state-dependent behaviour, arbitrary activation patterns,~etc.\par In this paper we use the formalism of Linear Hybrid Automata to encode a hierarchical scheduling system. In particular, we model a dynamic server algorithm and the tasks contained within, abstracting away the rest of the system, thus enabling component-based scheduling analysis. We prove the correctness of the model and the decidability of the reachability analysis for the case of periodic tasks. Then, we compare the results of our model against classical schedulability analysis techniques, showing that our analysis performs better than analytic methods in terms of resource utilisation. We further present two case studies: a~component with state-dependent tasks, and a simplified model of a real avionics system. Finally, through extensive tests with various configurations, we demonstrate that this approach is usable for medium size components.} }
@article{BFSP-tcs14, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Bouchy, Florent and Finkel, Alain and San{ }Pietro, Pierluigi}, title = {Dense-choice Counter Machines Revisited}, volume = {542}, month = jul, year = 2014, pages = {17-31}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFSP-tcs14.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFSP-tcs14.pdf}, doi = {10.1016/j.tcs.2014.04.029}, abstract = {This paper clarifies the picture about Dense-choice Counter Machines (DCM), a less studied version of Counter Machines where counters range on a dense, rather than discrete, domain. The definition of DCM is revisited to make it extend (discrete) Counter Machines, and new undecidability and decidability results are proved. Using the first-order additive mixed theory of reals and integers, the paper presents a logical characterization of the sets of configurations reachable by reversal-bounded DCM. We also relate the DCM model to more common models of systems.} }
@techreport{rr-lsv-14-06, author = {Sun, Youcheng and Lipari, Giuseppe}, title = {A Weak Simulation Relation for Real-Time Schedulability Analysis of Global Fixed Priority Scheduling Using Linear Hybrid Automata}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2014}, month = apr, type = {Research Report}, number = {LSV-14-06}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-06.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-06.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2014-06-v1.pdf, 20140428}, note = {17~pages}, abstract = {In this paper we present an exact schedulability test for sporadic real-time tasks scheduled by the Global Fixed Priority Fully Preemptive Scheduler on a multiprocessor system. The analysis consists in modelling the system as a Linear Hybrid Automaton, and in performing a reachability analysis for states representing deadline miss conditions. To mitigate the problem of state space explosion, we propose a partial order relationship over the symbolic states of the model and we prove that this is a weak simulation relation. We then present an implementation of the analysis in a software tool, and we show that the use of the proposed model permits to analyse larger systems than other exact algorithms in the literature.} }
@inproceedings{CD-icalp14, address = {Copenhagen, Denmark}, month = jul, year = 2014, volume = 8573, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Fraigniaud, Pierre and Koutsoupias, Elias}, acronym = {{ICALP}'14}, booktitle = {{P}roceedings of the 41st {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'14)~-- {P}art~{II}}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Games with a Weak Adversary}, pages = {110-121}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp14.pdf}, doi = {10.1007/978-3-662-43951-7_10}, abstract = {We consider multi-player graph games with partial-observation and parity objective. While the decision problem for three-player games with a coalition of the first and second players against the third player is undecidable in general, we present a decidability result for partial-observation games where the first and third player are in a coalition against the second player, thus where the second player is adversarial but weaker due to partial-observation. We establish tight complexity bounds in the case where player~1 is less informed than player~2, namely 2-EXPTIME-completeness for parity objectives. The symmetric case of player~1 more informed than player~2 is much more complicated, and we show that already in the case where player~1 has perfect observation, memory of size non-elementary is necessary in general for reachability objectives, and the problem is decidable for safety and reachability objectives. Our results have tight connections with partial-observation stochastic games for which we derive new complexity results.} }
@inproceedings{BFM-icalp14, address = {Copenhagen, Denmark}, month = jul, year = 2014, volume = 8573, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Fraigniaud, Pierre and Koutsoupias, Elias}, acronym = {{ICALP}'14}, booktitle = {{P}roceedings of the 41st {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'14)~-- {P}art~{II}}, author = {Blondin, Michael and Finkel, Alain and McKenzie, Pierre}, title = {Handling Infinitely Branching {WSTS}}, pages = {13-25}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFM-icalp14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFM-icalp14.pdf}, doi = {10.1007/978-3-662-43951-7_2}, abstract = {Most decidability results concerning well-structured transition systems apply to the \emph{finitely branching} variant. Yet some models (inserting automata, \(\omega\)-Petri nets,~...) are naturally infinitely branching. Here we develop tools to handle infinitely branching WSTS by exploiting the crucial property that in the (ideal) completion of a well-quasi-ordered set, downward-closed sets are finite unions of ideals. Then, using these tools, we derive decidability results and we delineate the undecidability frontier in the case of the termination, the control-state maintainability and the coverability problems. Coverability and boundedness under new effectivity conditions are shown decidable.} }
@inproceedings{DD-aiml14, address = {Groningen, The Netherlands}, month = aug, year = 2014, publisher = {College Publications}, editor = {Gor{\'e}, Rajeev and Kooi, Barteld P. and Kurucz, Agi}, acronym = {{AiML}'14}, booktitle = {{P}roceedings of the 10th {C}onference on {A}dvances in {M}odal {L}ogics ({AiML}'14)}, author = {Demri, St{\'e}phane and Deters, Morgan}, title = {The effects of modalities in separation logics (extended abstract)}, pages = {134-138}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-aiml14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-aiml14.pdf}, abstract = {Like modal logic, temporal logic, or description logic, separation logic has become a popular class of logical formalisms in computer science, conceived as assertion languages for Hoare-style proof systems with the goal to perform automatic program analysis. We present similarities with modal and temporal logics, and we present landmark results about decidability, complexity and expressive power.} }
@inproceedings{DD-csllics14, address = {Vienna, Austria}, month = jul, year = 2014, publisher = {ACM Press}, acronym = {{CSL\slash LICS}'14}, booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)}, author = {Demri, St{\'e}phane and Deters, Morgan}, title = {Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction}, nopages = {}, chapter = {37}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-csllics14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-csllics14.pdf}, doi = {10.1145/2603088.2603142}, abstract = {We show that first-order separation logic with one record field restricted to two variables and the separating implication (no separating conjunction) is as expressive as weak second-order logic, substantially sharpening a previous result. Capturing weak second-order logic with such a restricted form of separation logic requires substantial updates to known proof techniques. We develop these, and as a by-product identify the smallest fragment of separation logic known to be undecidable: first-order separation logic with one record field, two variables, and no separating conjunction.} }
@inproceedings{BGMZ-csllics14, address = {Vienna, Austria}, month = jul, year = 2014, publisher = {ACM Press}, acronym = {{CSL\slash LICS}'14}, booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)}, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {Logical Characterization of Weighted Pebble Walking Automata}, nopages = {}, chapter = 19, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-csllics14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-csllics14.pdf}, doi = {10.1145/2603088.2603118}, abstract = {Weighted automata are a conservative quantitative extension of finite automata that enjoys applications, e.g., in language processing and speech recognition. Their expressive power, however, appears to be limited, especially when they are applied to more general structures than words, such as graphs. To address this drawback, weighted automata have recently been generalized to weighted pebble walking automata, which proved useful as a tool for the specification and evaluation of quantitative properties over words and nested words. In this paper, we establish the expressive power of weighted pebble walking automata in terms of transitive closure logic, lifting a similar result by Engelfriet and Hoogeboom from the Boolean case to a quantitative setting. This result applies to general classes of graphs, including all the aforementioned classes.} }
@inproceedings{Haase-csllics14, address = {Vienna, Austria}, month = jul, year = 2014, publisher = {ACM Press}, acronym = {{CSL\slash LICS}'14}, booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)}, author = {Haase, Christoph}, title = {Subclasses of {P}resburger Arithmetic and the Weak {EXP} Hierarchy}, nopages = {}, chapter = 47, url = {http://arxiv.org/abs/1401.5266}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Haase-csllics14.pdf}, doi = {10.1145/2603088.2603092}, abstract = {It is shown that for any fixed \(i>0\), the \(\Sigma_{i+1}\)-fragment of Presburger arithmetic, i.e., its restriction to \(i+1\) quantifier alternations beginning with an existential quantifier, is complete for \(\Sigma^{\textsc{EXP}}_{i}\), the \(i\)-th level of the weak EXP hierarchy, an~analogue to the polynomial-time hierarchy residing between \textsc{NEXP} and \textsc{EXPSPACE}. This result completes the computational complexity landscape for Presburger arithmetic, a~line of research which dates back to the seminal work by Fischer~\& Rabin in~1974. Moreover, we~apply some of the techniques developed in the proof of the lower bound in order to establish bounds on sets of naturals definable in the \(\Sigma_1\)-fragment of Presburger arithmetic: given a \(\Sigma_1\)-formula \(\Phi(x)\), it~is shown that the set of non-negative solutions is an ultimately periodic set whose period is at most doubly-exponentially and that this bound is tight.} }
@inproceedings{BB-csllics14, address = {Vienna, Austria}, month = jul, year = 2014, publisher = {ACM Press}, acronym = {{CSL\slash LICS}'14}, booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)}, author = {Bollig, Benedikt}, title = {Logic for Communicating Automata with Parameterized Topology}, nopages = {}, chapter = 18, exturl = {http://hal.inria.fr/hal-00872807/}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BB-csllics14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BB-csllics14.pdf}, doi = {10.1145/2603088.2603093}, abstract = {We introduce parameterized communicating automata~(PCA) as a model of systems where finite-state processes communicate through FIFO channels. Unlike classical communicating automata, a given PCA can be run on any network topology of bounded degree. The topology is thus a parameter of the system. We provide various B{\"u}chi-Elgot-Trakhtenbrot theorems for~PCA, which roughly read as follows: Given a logical specification~\(\phi\) and a class of topologies~\(T\), there is a~PCA that is equivalent to~\(\phi\) on all topologies from~\(T\). We~give uniform constructions which allow us to instantiate~\(T\) with concrete classes such as pipelines, ranked trees, grids, rings,~etc. The proofs build on a locality theorem for first-order logic due to Schwentick and Barthelmann, and they exploit concepts from the non-parameterized case, notably a result by Genest, Kuske, and Muscholl.} }
@inproceedings{CDNV-fossacs14, address = {Grenoble, France}, month = apr, year = 2014, volume = {8412}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Muscholl, Anca}, acronym = {{FoSSaCS}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'14)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Nain, Sumit and Vardi, Moshe Y.}, title = {The Complexity of Partial-Observation Stochastic Parity Games with Finite-Memory Strategies}, pages = {242-257}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDNV-fossacs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDNV-fossacs14.pdf}, doi = {10.1007/978-3-642-54830-7_16}, abstract = { We consider two-player partial-observation stochastic games on finite-state graphs where player~1 has partial observation and player~2 has perfect observation. The winning condition we study are \(\omega\)-regular conditions specified as parity objectives. The qualitative-analysis problem given a partial-observation stochastic game and a parity objective asks whether there is a strategy to ensure that the objective is satisfied with probability~1 (resp.~positive probability). These qualitative-analysis problems are known to be undecidable. However in many applications the relevant question is the existence of finite-memory strategies, and the qualitative-analysis problems under finite-memory strategies was recently shown to be decidable in 2EXPTIME. We improve the complexity and show that the qualitative-analysis problems for partial-observation stochastic parity games under finite-memory strategies are EXPTIME-complete; and also establish optimal (exponential) memory bounds for finite-memory strategies required for qualitative analysis. } }
@inproceedings{CDGO-fossacs14, address = {Grenoble, France}, month = apr, year = 2014, volume = {8412}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Muscholl, Anca}, acronym = {{FoSSaCS}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'14)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Gimbert, Hugo and Oualhadj, Youssouf}, title = {Perfect-Information Stochastic Mean-Payoff Parity Games}, pages = {210-225}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGO-fossacs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDGO-fossacs14.pdf}, doi = {10.1007/978-3-642-54830-7_4}, abstract = {The theory of graph games is the foundation for modeling and synthesizing reactive processes. In the synthesis of stochastic processes, we use \(2\frac{1}{2}\)-player games where some transitions of the game graph are controlled by two adversarial players, the System and the Environment, and the other transitions are determined probabilistically. We consider \(2\frac{1}{2}\)-player games where the objective of the System is the conjunction of a qualitative objective (specified as a parity condition) and a quantitative objective (specified as a mean-payoff condition). We establish that the problem of deciding whether the System can ensure that the probability to satisfy the mean-payoff parity objective is at least a given threshold is in \(\textsf{NP}\cap\textsf{coNP}\), matching the best known bound in the special case of 2-player games (where all transitions are deterministic) with only parity objectives, or with only mean-payoff objectives. We present an algorithm running in time~\(O(d \cdot n^{2d} \cdot \textsf{MeanGame}) to compute the set of almost-sure winning states from which the objective can be ensured with probability~1, where n is the number of states of the game, d the number of priorities of the parity objective, and MeanGame is the complexity to compute the set of almost-sure winning states in \(2\frac{1}{2}\)-player mean-payoff games. Our results are useful in the synthesis of stochastic reactive systems with both functional requirement (given as a qualitative objective) and performance requirement (given as a quantitative objective).} }
@inproceedings{DMS-fossacs14, address = {Grenoble, France}, month = apr, year = 2014, volume = {8412}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Muscholl, Anca}, acronym = {{FoSSaCS}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'14)}, author = {Doyen, Laurent and Massart, {\relax Th}ierry and Shirmohammadi, Mahsa}, title = {Limit Synchronization in Markov Decision Processes}, pages = {58-72}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-fossacs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DMS-fossacs14.pdf}, doi = {10.1007/978-3-642-54830-7_4}, abstract = {Markov decision processes (MDP) are finite-state systems with both strategic and probabilistic choices. After fixing a strategy, an MDP produces a sequence of probability distributions over states. The sequence is eventually synchronizing if the probability mass accumulates in a single state, possibly in the limit. Precisely, for \(0 \leq p \leq 1\) the sequence is \(p\)-synchronizing if a probability distribution in the sequence assigns probability at least~\(p\) to some state, and we distinguish three synchronization modes: \textit{(i)}~sure winning if there exists a strategy that produces a 1-synchronizing sequence; \textit{(ii)}~almost-sure winning if there exists a strategy that produces a sequence that is, for all \(\varepsilon>0\), a \((1-\varepsilon)\)-synchronizing sequence; \textit{(iii)}~limit-sure winning if for all \(\varepsilon>0\), there exists a strategy that produces a \((1-\varepsilon)\)-synchronizing sequence. We~consider the problem of deciding whether an MDP is sure, almost-sure, or limit-sure winning, and we establish the decidability and optimal complexity for all modes, as well as the memory requirements for winning strategies. Our main contributions are as follows: \textit{(a)}~for~each winning modes we~present characterizations that give a PSPACE complexity for the decision problems, and we establish matching PSPACE lower bounds; \textit{(b)}~we~show that for sure winning strategies, exponential memory is sufficient and may be necessary, and that in general infinite memory is necessary for almost-sure winning, and unbounded memory is necessary for limit-sure winning; \textit{(c)}~along with our results, we establish new complexity results for alternating finite automata over a one-letter alphabet.} }
@inproceedings{FSS-icdt14, address = {Athens, Greece}, month = mar, year = 2014, editor = {Schweikardt, Nicole and Christophides, Vassilis and Leroy, Vincent}, acronym = {{ICDT}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'14)}, author = {Francis, Nadime and Segoufin, Luc and Sirangelo, Cristina}, title = {Datalog Rewritings of Regular Path Queries using Views}, pages = {107-118}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FSS-icdt14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FSS-icdt14.pdf}, doi = {10.5441/002/icdt.2014.14}, abstract = {We consider query answering using views on graph databases, i.e. databases structured as edge-labeled graphs. We consider views and queries specified by Regular Path Queries. These are queries selecting pairs of nodes in a graph database that are connected via a path whose sequence of edge labels belongs to some regular language.\par A~view~\(\mathbf{V}\) determines a query~\(Q\) if for all graph databases~\(D\), the view image~\(\mathbf{V}(D)\) always contains enough information to answer~\(Q\) on~\(D\). In other words, there is a well defined function from~\(\mathbf{V}(D)\) to~\(Q(D)\).\par Our main result shows that when this function is monotone, there exists a rewriting of~\(Q\) as a Datalog query over the view instance~\(\mathbf{V}(D)\). In~particular the query can be evaluated in time polynomial in the size of~\(\mathbf{V}(D)\).\par As a side result we also prove that it is decidable whether an RPQ query can be rewritten in Datalog using RPQ views.} }
@techreport{BB-arxiv14, author = {Brault{-}Baron, Johann}, title = {Hypergraph Acyclicity Revisited}, institution = {Computing Research Repository}, number = {1403.7076}, year = {2014}, month = feb, type = {Research Report}, url = {http://arxiv.org/abs/1403.7076}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BB-arxiv14.pdf}, note = {32~pages}, abstract = {The notion of graph acyclicity has been extended to several different notions of hypergraph acyclicity, in increasing order of generality: \emph{gamma} acyclicity, \emph{beta} acyclicity, and \emph{alpha} acyclicity, that have met a great interest in many fields. \parWe prove the equivalence between the numerous characterizations of each notion with a new, simpler proof, in a self-contained manner. For that purpose, we introduce new notions of alpha, beta and gamma leaf that allow to define new {"}rule-based{"} characterizations of each notion.\par The~combined presentation of the notions is completed with a study of their respective closure properties. New closure results are established, and alpha, beta and gamma acyclicity are proved optimal w.r.t. their closure properties.} }
@article{BBMU-lmcs14, journal = {Logical Methods in Computer Science}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas and Ummels, Michael}, title = {Pure {N}ash Equilibria in Concurrent Games}, volume = {11}, number = {2:9}, nopages = {}, month = jun, year = 2015, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-lmcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-lmcs15.pdf}, doi = {10.2168/LMCS-11(2:9)2015}, abstract = {We study pure-strategy Nash equilibria in multiplayer concurrent games, for a variety of omega-regular objectives. For simple objectives (e.g. reachability, B{\"u}chi objectives), we transform the problem of deciding the existence of a Nash equilibrium in a given concurrent game into that of deciding the existence of a winning strategy in a turn-based two-player game (with a refined objective). We use that transformation to design algorithms for computing Nash equilibria, which in most cases have optimal worst-case complexity. For automata-defined objectives, we extend the above algorithms using a simulation relation which allows us to consider the product of the game with the automata defining the objectives. Building on previous algorithms for simple qualitative objectives, we define and study a semi-quantitative framework, where all players have several boolean objectives equipped with a preorder; a player may for instance want to satisfy all her objectives, or to maximise the number of objectives that she achieves. In most cases, we prove that the algorithms we obtain match the complexity of the problem they address.} }
@article{LM-lmcs14, journal = {Logical Methods in Computer Science}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {Quantified {CTL}: Expressiveness and Complexity}, volume = 10, number = {4:17}, nopages = {}, month = dec, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LM-lmcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LM-lmcs14.pdf}, doi = {10.2168/LMCS-10(4:17)2014}, abstract = {While it was defined long ago, the extension of CTL with quantification over atomic propositions has never been studied extensively. Considering two different semantics (depending whether propositional quantification refers to the Kripke structure or to its unwinding tree), we~study its expressiveness (showing in particular that QCTL coincides with Monadic Second-Order Logic for both semantics) and characterise the complexity of its model-checking and satisfiability problems, depending on the number of nested propositional quantifiers (showing that the structure semantics populates the polynomial hierarchy while the tree semantics populates the exponential hierarchy).} }
@article{NM-ercim14, publisher = {European Research Consortium for Informatics and Mathematics}, journal = {ERCIM News}, author = {Markey, Nicolas}, title = {Cassting: Synthesizing Complex Systems Using Non-Zero-Sum Games}, volume = 97, pages = {25-26}, year = 2014, month = apr, url = {http://ercim-news.ercim.eu/en97/special/cassting-synthesizing-complex-systems-using-non-zero-sum-games}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NM-ercim14.pdf} }
@inproceedings{DGLM-csr14, address = {Moscow, Russia}, month = jun, year = 2014, volume = {8476}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Pin, Jean-{\'E}ric}, acronym = {{CSR}'14}, booktitle = {{P}roceedings of the 9th {I}nternational {C}omputer {S}cience {S}ymposium in {R}ussia ({CSR}'14)}, author = {Demri, St{\'e}phane and Galmiche, Didier and Larchey-Wendling, Dominique and M{\'e}ry, Daniel}, title = {Separation Logic with One Quantified Variable}, pages = {125-138}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGLM-csr14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGLM-csr14.pdf}, doi = {10.1007/978-3-319-06686-8_10}, abstract = {We investigate first-order separation logic with one record field restricted to a unique quantified variable (1SL1). Undecidability is known when the number of quantified variables is unbounded and the satisfiability problem is PSPACE-complete for the propositional fragment. We show that the satisfiability problem for 1SL1 is PSPACE-complete and we characterize its expressive power by showing that every formula is equivalent to a Boolean combination of atomic properties. This contributes to our understanding of fragments of first-order separation logic that can specify properties about the memory heap of programs with singly-linked lists. When the number of program variables is fixed, the complexity drops to polynomial time. All the fragments we consider contain the magic wand operator and first-order quantification over a single variable.} }
@phdthesis{mahsa-phd2014, author = {Shirmohammadi, Mahsa}, title = {Qualitative Analysis of Synchronizing Probabilistic Systems}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France and Universit\'e Libre de Bruxelles, Belgium}, type = {Th{\`e}se de doctorat}, year = 2014, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/mahsa-phd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/mahsa-phd14.pdf} }
@phdthesis{soulat-phd2014, author = {Soulat, Romain}, title = {Synthesis of Correct-by-Design Schedulers for Hybrid Systems}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2014, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/soulat-phd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/soulat-phd14.pdf} }
@article{CFM-ijfcs13, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Unambiguous Contrained Automata}, volume = 24, number = 7, month = nov, year = 2013, pages = {1099-1116}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ijfcs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ijfcs13.pdf}, doi = {10.1142/S0129054113400339}, abstract = {The class of languages captured by Constrained Automata~(CA) that are unambiguous is shown to possess more closure properties than the provably weaker class captured by deterministic~CA. Problems decidable for deterministic CA are nonetheless shown to remain decidable for unambiguous~CA, and testing for regularity is added to this set of decidable problems. Unambiguous CA~are then shown incomparable with deterministic reversal-bounded machines in terms of expressivity, and a deterministic model equivalent to unambiguous~CA is identified.} }
@techreport{rr-lsv-14-03, author = {Fribourg, Laurent and Goubault, {\'E}ric and Mohamed, Sameh and Putot, Sylvie and Soulat, Romain}, title = {Synthesis of robust boundary control for systems governed by semi-discrete differential equations}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2014}, month = feb, type = {Research Report}, number = {LSV-14-03}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-03.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2014-03.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2014-03-v1.pdf, 20140228}, note = {8~pages}, abstract = {The topic of boundary control of PDEs has been the subject of a considerable literature since the seminal works of J.-L. Lions in the 90s. In this paper, we consider the boundary control of systems represented by spatial discretizations of~PDEs (i.e.,~semi-discrete equations). We~focus on control laws which are sampled and piecewise constant: periodically, at every sampling time, a fixed control amplitude is applied to the system until the next sampling instant. We show that, under some conditions, sampled piecewise-constant boundary control allows to achieve {"}approximate controllability{"}: Given a time \(T>0\), the controlled system evolves to a neighborhood of a given final state. The result is illustrated on the boundary control of the semi-discrete version of the heat equation.} }
@inproceedings{BDD-frocos13, address = {Nancy, France}, month = sep, year = 2013, volume = 8152, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Fontaine, Pascal and Ringeissen, Christophe and Schmidt, Renate A.}, acronym = {{FroCoS}'13}, booktitle = {{P}roceedings of the 9th {I}nternational {S}ymposium on {F}rontiers of {C}ombining {S}ystems ({FroCoS}'13)}, author = {Barrett, Clark and Demri, St{\'e}phane and Deters, Morgan}, title = {Witness runs for counter machines}, pages = {120-150}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDD-frocos13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDD-frocos13.pdf}, doi = {10.1007/978-3-642-40885-4_9}, abstract = {In this paper, we present recent results about the verification of counter machines by using decision procedures for Presburger arithmetic. We recall several known classes of counter machines for which the reachability sets are Presburger-definable as well as temporal logics with arithmetical constraints. We discuss issues related to flat counter machines, path schema enumeration, and the use of SMT solvers.} }
@inproceedings{CDFR-vmcai14, address = {San~Diego, California, USA}, month = jan, year = 2014, volume = 8318, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {McMillan, Kenneth and Rival, Xavier}, acronym = {{VMCAI}'14}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'14)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Filiot, Emmanuel and Raskin, Jean-Fran{\c{c}}ois}, title = {Doomsday Equilibria for Omega-Regular Games}, pages = {78-97}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-vmcai14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-vmcai14.pdf}, doi = {10.1007/978-3-642-54013-4_5}, abstract = {Two-player games on graphs provide the theoretical framework for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games.\par In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated.\par We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of \(\omega\)-regular objectives, both for imperfect-information games, and for perfect-information games.We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games.} }
@inproceedings{Schmitz-rta14, address = {Vienna, Austria}, month = jul, year = 2014, volume = {8560}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dowek, Gilles}, acronym = {{RTA\slash TLCA}'14}, booktitle = {{P}roceedings of the {J}oint 25th {I}nternational {C}onference on {R}ewriting {T}echniques and {A}pplications and 12th {I}nternational {C}onference on {T}yped {L}ambda-{C}alculi and {A}pplications ({RTA\slash TLCA}'14)}, author = {Schmitz, Sylvain}, title = {Implicational Relevance Logic is 2-{E}xp{T}ime-Complete}, pages = {395-409}, url = {http://arxiv.org/abs/1402.0705}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-rta14.pdf}, doi = {10.1007/978-3-319-08918-8_27}, abstract = {We show that provability in the implicational fragment of relevance logic is complete for doubly exponential time, using reductions to and from coverability in branching vector addition systems.} }
@inproceedings{LS-csllics14, address = {Vienna, Austria}, month = jul, year = 2014, publisher = {ACM Press}, acronym = {{CSL\slash LICS}'14}, booktitle = {{P}roceedings of the Joint Meeting of the 23rd {EACSL} {A}nnual {C}onference on {C}omputer {S}cience {L}ogic and the 29th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({CSL\slash LICS}'14)}, author = {Lazi{\'c}, Ranko and Schmitz, Sylvain}, title = {Non-Elementary Complexities for Branching {VASS}, {MELL}, and Extensions}, nopages = {}, chapter = 61, url = {http://arxiv.org/abs/1401.6785}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-csllics14.pdf}, doi = {10.1145/2603088.2603129}, abstract = {We study the complexity of reachability problems on branching extensions of vector addition systems, which allows us to derive new non-elementary complexity bounds for fragments and variants of propositional linear logic. We show that provability in the multiplicative exponential fragment is Tower-hard already in the affine case---and hence non-elementary. We match this lower bound for the full propositional affine linear logic, proving its Tower-completeness. We also show that provability in propositional contractive linear logic is Ackermann-complete.} }
@inproceedings{BDH-post14, address = {Grenoble, France}, month = apr, year = 2014, volume = {8414}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abadi, Mart{\'\i}n and Kremer, Steve}, acronym = {{POST}'14}, booktitle = {{P}roceedings of the 3rd {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'14)}, author = {Baelde, David and Delaune, St{\'e}phanie and Hirschi, Lucca}, title = {A~reduced semantics for deciding trace equivalence using constraint systems}, pages = {1-21}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-post14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-post14.pdf}, doi = {10.1007/978-3-642-54792-8_1}, abstract = {Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e.,~without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer from a classical combinatorial explosion problem caused by the exploration of many interleavings in the behaviour of processes. Modersheim et~al. have tackled this problem for reachability properties using partial order reduction techniques. We revisit their work, generalize it and adapt it for equivalence checking. We obtain an optimization in the form of a reduced symbolic semantics that eliminates redundant interleavings on the fly.} }
@inproceedings{BM-sr14, address = {Grenoble, France}, month = apr, year = 2014, volume = 146, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Mogavero, Fabio and Murano, Aniello}, acronym = {{SR}'14}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}trategic {R}easoning ({SR}'14)}, author = {Berwanger, Dietmar and Mathew, Anup Basil}, title = {Games with Recurring Certainty}, pages = {91-96}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BM-sr14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BM-sr14.pdf}, doi = {10.4204/EPTCS.146.12}, abstract = {Infinite games where several players seek to coordinate under imperfect information are known to be intractable, unless the information flow is severely restricted. Examples of undecidable cases typically feature a situation where players become uncertain about the current state of the game, and this uncertainty lasts forever.\par Here we consider games where the players attain certainty about the current state over and over again along any play. For finite-state games, we note that this kind of \emph{recurring} certainty implies a stronger condition of \emph{periodic} certainty, that is, the events of state certainty ultimately occur at uniform, regular intervals. We show that it is decidable whether a given game presents recurring certainty, and that, if so, the problem of synthesising coordination strategies under \(\omega\)-regular winning conditions is solvable.} }
@inproceedings{CDFR-sr14, address = {Grenoble, France}, month = apr, year = 2014, volume = 146, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Mogavero, Fabio and Murano, Aniello}, acronym = {{SR}'14}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}trategic {R}easoning ({SR}'14)}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Filiot, Emmanuel and Raskin, Jean-Fran{\c{c}}ois}, title = {Doomsday Equilibria for Omega-Regular Games}, pages = {43-48}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-sr14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-sr14.pdf}, doi = {10.4204/EPTCS.146.6}, abstract = {Two-player games on graphs provide the theoretical framework for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games.\par In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated.\par We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of \(\omega\)-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games.} }
@inproceedings{BMV-sr14, address = {Grenoble, France}, month = apr, year = 2014, volume = 146, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Mogavero, Fabio and Murano, Aniello}, acronym = {{SR}'14}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}trategic {R}easoning ({SR}'14)}, author = {Bouyer, Patricia and Markey, Nicolas and Vester, Steen}, title = {Nash Equilibria in Symmetric Games with Partial Observation}, pages = {49-55}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-sr14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-sr14.pdf}, doi = {10.4204/EPTCS.146.7}, abstract = {We investigate a model for representing large multiplayer games, which satisfy strong symmetry properties. This model is made of multiple copies of an arena; each player plays in his own arena, and can partially observe what the other players do. Therefore, this game has partial information and symmetry constraints, which make the computation of Nash equilibria difficult. We show several undecidability results, and for bounded-memory strategies, we precisely characterize the complexity of computing pure Nash equilibria (for qualitative objectives) in this game model.} }
@mastersthesis{m2-stan13, author = {Stan, Daniel}, title = {{\'E}quilibres mixtes dans les jeux concurrents}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2013}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-stan13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-stan13.pdf}, note = {29~pages} }
@phdthesis{cyriac-phd2014, author = {Cyriac, Aiswarya}, title = {Verification of Communicating Recursive Programs via Split-width}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2014, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cyriac-phd14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cyriac-phd14.pdf} }
@inproceedings{AGHKO-fossacs14, address = {Grenoble, France}, month = apr, year = 2014, volume = {8412}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Muscholl, Anca}, acronym = {{FoSSaCS}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'14)}, author = {Antonopoulos, Timos and Gorogiannis, Nikos and Haase, Christoph and Kanovich, Max and Ouaknine, Jo{\"e}l}, title = {Foundations for Decision Problems in Separation Logic with General Inductive Predicates}, pages = {411-425}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGHKO-fossacs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGHKO-fossacs14.pdf}, doi = {10.1007/978-3-642-54830-7_27}, abstract = {We establish foundational results on the computational complexity of deciding entailment in Separation Logic with general inductive predicates whose underlying base language allows for pure formulas, pointers and existentially quantified variables. We show that entailment is in general undecidable, and \textsc{ExpTime}-hard in a fragment recently shown to be decidable by Iosif~\emph{et~al.} Moreover, entailment in the base language is \(\Pi_2^{\text{P}}\)-complete, the upper bound even holds in the presence of list predicates. We additionally show that entailment in essentially any fragment of Separation Logic allowing for general inductive predicates is intractable even when strong syntactic restrictions are imposed.} }
@article{BS13-TSI-games, publisher = {Herm{\`e}s}, journal = {Technique et Science Informatiques}, author = {Berwanger, Dietmar and Serre, Olivier}, editor = {Berwanger, Dietmar and Serre, Olivier}, title = {Th{\'e}orie des jeux en informatique}, booktitle = {Th{\'e}orie des jeux en informatique}, volume = 32, number = {9-10}, year = 2013, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BS13-TSI-games.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BS13-TSI-games.pdf} }
@inproceedings{BFHHH-fossacs14, address = {Grenoble, France}, month = apr, year = 2014, volume = {8412}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Muscholl, Anca}, acronym = {{FoSSaCS}'14}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'14)}, author = {Bertrand, Nathalie and Fabre, {\'E}ric and Haar, Stefan and Haddad, Serge and H{\'e}lou{\"e}t, Lo{\"\i}c}, title = {Active diagnosis for probabilistic systems}, pages = {29-42}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHHH-fossacs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHHH-fossacs14.pdf}, doi = {10.1007/978-3-642-54830-7_4}, abstract = {The diagnosis problem amounts to deciding whether some specific {"}fault{"} event occurred or not in a system, given the observations collected on a run of this system. This system is then diagnosable if the fault can always be detected, and the active diagnosis problem consists in controlling the system in order to ensure its diagnosability. We consider here a stochastic framework for this problem: once a control is selected, the system becomes a stochastic process. In this setting, the active diagnosis problem consists in deciding whether there exists some observation-based strategy that makes the system diagnosable with probability one. We prove that this problem is EXPTIME-complete, and that the active diagnosis strategies are belief-based. The safe active diagnosis problem is similar, but aims at enforcing diagnosability while preserving a positive probability to non faulty runs, i.e. without enforcing the occurrence of a fault. We prove that this problem requires non belief-based strategies, and that it is undecidable. However, it belongs to NEXPTIME when restricted to belief-based strategies. Our work also refines the decidability/undecidability frontier for verification problems on partially observed Markov decision processes.} }
@article{ABGMN-fi13, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Akshay, S. and Bollig, Benedikt and Gastin, Paul and Mukund, Madhavan and Narayan Kumar, K.}, title = {Distributed Timed Automata with Independently Evolving Clocks}, volume = {130}, number = {4}, month = apr, year = 2014, pages = {377-407}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGMN-fi13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABGMN-fi13.pdf}, doi = {10.3233/FI-2014-996}, abstract = {We propose a model of distributed timed systems where each component is a timed automaton with a set of local clocks that evolve at a rate independent of the clocks of the other components. A~clock can be read by any component in the system, but it can only be reset by the automaton it belongs~to.\par There are two natural semantics for such systems. The \emph{universal} semantics captures behaviors that hold under any choice of clock rates for the individual components. This is a natural choice when checking that a system always satisfies a positive specification. To check if a system avoids a negative specification, it is better to use the \emph{existential} semantics—the set of behaviors that the system can possibly exhibit under some choice of clock rates.\par We show that the existential semantics always describes a regular set of behaviors. However, in the case of universal semantics, checking emptiness or universality turns out to be undecidable. As an alternative to the universal semantics, we propose a \emph{reactive} semantics that allows us to check positive specifications and yet describes a regular set of behaviors.} }
@article{BGMZ-tocl13, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {Pebble Weighted Automata and Weighted Logics}, volume = 15, number = {2:15}, month = apr, year = 2014, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-tocl13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-tocl13.pdf}, doi = {10.1145/2579819}, abstract = {We introduce new classes of weighted automata on words. Equipped with pebbles, they go beyond the class of recognizable formal power series: they capture weighted first-order logic enriched with a quantitative version of transitive closure. In contrast to previous work, this calculus allows for unrestricted use of existential and universal quantifications over positions of the input word. We actually consider both two-way and one-way pebble weighted automata. The latter class constrains the head of the automaton to walk left-to-right, resetting it each time a pebble is dropped. Such automata have already been considered in the Boolean setting, in the context of data words. Our main result states that two-way pebble weighted automata, one-way pebble weighted automata, and our weighted logic are expressively equivalent. We also give new logical characterizations of standard recognizable series.} }
@article{SBM-ic14, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Sankur, Ocan and Bouyer, Patricia and Markey, Nicolas}, title = {Shrinking Timed Automata}, volume = 234, month = feb, year = 2014, pages = {107-132}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-ic14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SBM-ic14.pdf}, doi = {10.1016/j.ic.2014.01.002}, abstract = {We define and study a new approach to the implementability of timed automata, where the semantics is perturbed by imprecisions and finite frequency of the hardware. In order to circumvent these effects, we introduce \emph{parametric shrinking} of clock constraints, which corresponds to tightening the guards. We propose symbolic procedures to decide the existence of (and then compute) parameters under which the shrunk version of a given timed automaton is non-blocking and can time-abstract simulate the exact semantics. We then define an implementation semantics for timed automata with a digital clock and positive reaction times, and show that for shrinkable timed automata, non-blockingness and time-abstract simulation are preserved in implementation.} }
@article{GM-tcs14, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Gastin, Paul and Monmege, Benjamin}, title = {Adding Pebbles to Weighted Automata~-- Easy Specification {\&} Efficient Evaluation}, volume = {534}, month = may, year = 2014, pages = {24-44}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-tcs14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-tcs14.pdf}, doi = {10.1016/j.tcs.2014.02.034}, abstract = {We extend weighted automata and weighted rational expressions with 2-way moves and reusable pebbles. We show with examples from natural language modeling and quantitative model-checking that weighted expressions and automata with pebbles are more expressive and allow much more natural and intuitive specifications than classical ones. We extend Kleene-Sch{\"u}tzenberger theorem showing that weighted expressions and automata with pebbles have the same expressive power. We focus on an efficient translation from expressions to automata. We also prove that the evaluation problem for weighted automata can be done very efficiently if the number of reusable pebbles is low.} }
@article{BLM-peva13, publisher = {Elsevier Science Publishers}, journal = {Performance Evaluation}, author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas}, title = {Lower-Bound Constrained Runs in Weighted Timed Automata}, volume = 73, month = mar, year = 2014, pages = {91-109}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-peva13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-peva13.pdf}, doi = { 10.1016/j.peva.2013.11.002}, abstract = {We investigate a number of problems related to infinite runs of weighted timed automata (with a single weight variable), subject to lower-bound constraints on the accumulated weight. Closing an open problem from an earlier paper, we show that the existence of an infinite lower-bound-constrained run is--for us somewhat unexpectedly--undecidable for weighted timed automata with four or more clocks.\par This undecidability result assumes a fixed and known initial credit. We show that the related problem of existence of an initial credit for which there exists a feasible run is decidable in PSPACE. We also investigate the variant of these problems where only bounded-duration runs are considered, showing that this restriction makes our original problem decidable in NEXPTIME. We prove that the universal versions of all those problems (i.e, checking that all the considered runs satisfy the lower-bound constraint) are decidable in PSPACE.\par Finally, we extend this study to multi-weighted timed automata: the existence of a feasible run becomes undecidable even for bounded duration, but the existence of initial credits remains decidable (in~PSPACE).} }
@inproceedings{KL-pdp14, address = {Turin, Italy}, month = feb, year = 2014, publisher = {{IEEE} Computer Society Press}, editor = {Aldinucci, Marco and D'Agostino, Daniele and Kilpatrick, Peter}, acronym = {{PDP}'14}, booktitle = {{P}roceedings of the 22nd {E}uromicro {I}nternational {C}onference on {P}arallel, {D}istributed, and {N}etwork-{B}ased {P}rocessing ({PDP}'14)}, author = {Kumar, Sunil and Lipari, Giuseppe}, title = {Latency Analysis of Network-On-Chip-based Many-Core Processors}, pages = {432-439}, doi = {10.1109/PDP.2014.107}, abstract = {The next generation of processor will contain an increasing number of cores, connected to the main memory and to each other using fast Network-on-Chip (NoC) organised in complex mesh structures. In order to analyse real-time programs running on such architectures, it is necessary to estimate the communication latency between processes running on different cores. The goal of this paper is to propose an analytic model for bounding the communication latency on NoC for many-core architectures. In particular, we introduce a new approach to analyse the communication latency on NoC with wormhole switching and credit-based virtual channel flow control. The proposed model is evaluated by comparing the results predicted by the model with real measurements obtained running a set of experiments on an Intel SCC platform.} }
@article{ACD-icomp13, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Modeling and Verifying Ad~Hoc Routing Protocols}, volume = 238, pages = {30-67}, month = nov, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-icomp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-icomp13.pdf}, doi = {10.1016/j.ic.2014.07.004}, abstract = {Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such networks, a central issue, ensured by routing protocols, is to find a route from one device to another. Those protocols use cryptographic mechanisms in order to prevent malicious nodes from compromising the discovered route.\par Our contribution is twofold. We first propose a calculus for modeling and reasoning about security protocols, including in particular secured routing protocols. Our calculus extends standard symbolic models to take into account the characteristics of routing protocols and to model wireless communication in a more accurate way. Our second main contribution is a decision procedure for analyzing routing protocols for any network topology. By using constraint solving techniques, we show that it is possible to automatically discover (in~NPTIME) whether there exists a network topology that would allow malicious nodes to mount an attack against the protocol, for a bounded number of sessions. We also provide a decision procedure for detecting attacks in case the network topology is given a priori. We demonstrate the usage and usefulness of our approach by analyzing protocols of the literature, such as SRP applied to DSR and SDMSR.} }
@inproceedings{HHM-tgc13, address = {Buenos Aires, Argentina}, month = mar, year = 2014, volume = {8358}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abadi, Mart{\'\i}n and Lluch{ }Lafuente, Alberto}, acronym = {{TGC}'13}, booktitle = {{R}evised {S}elected {P}apers of the 8th {S}ymposium on {T}rustworthy {G}lobal {C}omputing ({TGC}'13)}, author = {Haddad, Serge and Hennicker, Rolf and M{\o}ller, Mikael H.}, title = {Specification of Asynchronous Component Systems with Modal {I}{{\slash}}{O}-{P}etri Nets}, pages = {219-234}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHM-tgc13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHM-tgc13.pdf}, doi = {10.1007/978-3-319-05119-2_13}, abstract = {We consider Petri nets with distinguished labels for inputs, outputs, internal communications and silent actions and with {"}must{"} and {"}may{"} modalities for transitions. The input\slash output labels show the interaction capabilities of a net to the outside used to build larger nets by asynchronous composition via communication channels. The modalities express constraints for Petri net refinement taking into account observational abstraction from silent transitions. Modal I\slash O-Petri nets are equipped with a modal transition system semantics. We show that refinement is preserved by asynchronous composition and by hiding of communication channels. We study conformance properties which express communication requirements for composed systems and we show that those properties are preserved by refinement. On this basis we propose a methodology for the specification of distributed systems in terms of modal I\slash O-Petri nets which supports incremental design, encapsulation of components and stepwise refinement. Finally we show that our communication properties are decidable.} }
@article{GL-acs13, publisher = {Springer}, journal = {Applied Categorical Structures}, author = {Goubault{-}Larrecq, Jean}, title = {Exponentiable streams and prestreams}, volume = {22}, number = {3}, year = 2014, month = jun, pages = {515-549}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13.pdf}, corrigendumpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf}, doi = { 10.1007/s10485-013-9315-x}, note = {Errata 1: \url{http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf}; Errata 2: \url{http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum2.pdf}}, abstract = {Inspired by a construction of Escard{\'o}, Lawson, and Simpson, we give a general construction of \(\mathcal C\)-generated objects in a topological construct. When \(\mathcal C\) consists of exponentiable objects, the resulting category is Cartesian-closed. This generalizes the familiar construction of compactly-generated spaces, and we apply this to Krishnan's categories of streams and prestreams, as well as to Haucourt streams. For that, we need to identify the exponentiable objects in these categories: for prestreams, we show that these are the preordered core-compact topological spaces, and for streams, these are the core-compact streams.} }
@article{GL-mscs13, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {A~short proof of the {S}chr{\"o}der-{S}impson theorem}, volume = 25, number = 1, year = 2015, month = jan, pages = {1-5}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-mscs13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GL-mscs13.pdf}, doi = {10.1017/S0960129513000467}, abstract = {We give a short and elementary proof of the Schr{\"o}der-Simpson Theorem, which states that the space of all continuous maps from a given space~\(X\) to the non-negative reals with their Scott topology is the cone-theoretic dual of the probabilistic powerdomain on~\(X\).} }
@article{BCD-icomp13, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bursuc, Sergiu and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Deducibility constraints and blind signatures}, year = {2014}, month = nov, volume = 238, pages = {106-127}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCD-icomp13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCD-icomp13.pdf}, nonote = {32~pages}, doi = {10.1016/j.ic.2014.07.006}, abstract = {Deducibility constraints represent in a symbolic way the infinite set of possible executions of a finite protocol. Solving a deducibility constraint amounts to finding all possible ways of filling the gaps in a proof. For finite local inference systems, there is an algorithm that reduces any deducibility constraint to a finite set of solved forms. This allows one to decide any trace security property of cryptographic protocols.\par We investigate here the case of infinite local inference systems, through the case study of blind signatures. We show that, in this case again, any deducibility constraint can be reduced to finitely many solved forms (hence we can decide trace security properties). We sketch also another example to which the same method can be applied.} }
@inproceedings{Lozes-fics15, address = {Berlin, Germany}, month = sep, year = 2015, volume = 191, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Matthes, Ralph and Mio, Matteo}, acronym = {{FICS}'15}, booktitle = {{P}roceedings of the 10th {W}orkshop on {F}ixed {P}oints in {C}omputer {S}cience ({FICS}'15)}, author = {Lozes, {\'{E}}tienne}, title = {A Type-Directed Negation Elimination}, pages = {132-142}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Lozes-fics15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Lozes-fics15.pdf}, doi = {10.4204/EPTCS.191.12}, abstract = {In the modal mu-calculus, a formula is well-formed if each recursive variable occurs underneath an even number of negations. By means of De Morgan's laws, it is easy to transform any well-formed formula into an equivalent formula without negations - its negation normal form. Moreover, if the formula is of size n, its negation normal form of is of the same size O(n). The full modal mu-calculus and the negation normal form fragment are thus equally expressive and concise. In this paper we extend this result to the higher-order modal fixed point logic (HFL), an extension of the modal mu-calculus with higher-order recursive predicate transformers. We present a procedure that converts a formula into an equivalent formula without negations of quadratic size in the worst case and of linear size when the number of variables of the formula is fixed.} }
@article{LV-scp15, publisher = {Elsevier Science Publishers}, journal = {Science of Computer Programming}, author = {Lozes, {\'{E}}tienne and Villard, Jules}, title = {Shared contract-obedient channels}, year = 2015, month = mar, volume = {100}, pages = {28-60}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-scp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-scp15.pdf}, doi = {10.1016/j.scico.2014.09.008}, abstract = {Recent advances in the formal verification of message-passing programs are based on proving that programs correctly implement a given protocol. Many existing verification techniques for message-passing programs assume that at most one thread may attempt to send or receive on a channel endpoint at any given point in time, and expressly forbid endpoint sharing. Approaches that do allow such sharing often do not prove that channels obey their protocols. In this paper, we identify two principles that can guarantee obedience to a communication protocol even in the presence of endpoint sharing. Firstly, threads may concurrently use an endpoint in any way that does not advance the state of the protocol. Secondly, threads may compete for receiving on an endpoint provided that the successful reception of the message grants them ownership of that endpoint retrospectively. We develop a program logic based on separation logic that unifies these principles and allows fine-grained reasoning about endpoint-sharing programs. We demonstrate its applicability on a number of examples. The program logic is shown sound against an operational semantics of programs, and proved programs are guaranteed to follow the given protocols and to be free of data races, memory leaks, and communication errors.} }
@inproceedings{LL-fct15, address = {Gda{\'{n}}sk, Poland}, month = aug, year = 2015, volume = 9210, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kosowski, Adrian and Walukiewicz, Igor}, acronym = {{FCT}'15}, booktitle = {{P}roceedings of the 20th {I}nternational {S}ymposium on {F}undamentals of {C}omputation {T}heory ({FCT}'15)}, author = {Lange, Martin and Lozes, {\'{E}}tienne}, title = {Conjunctive Visibly-Pushdown Path Queries}, pages = {327-338}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LL-fct15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LL-fct15.pdf}, doi = {10.1007/978-3-319-22177-9_25}, abstract = {Weinvestigateanextensionofconjunctiveregularpathqueries in which path properties and path relations are defined by visibly push- down automata. We study the problem of query evaluation for extended conjunctive visibly pushdown path queries and their subclasses, and give a complete picture of their combined and data complexity. In particular, we introduce a weaker notion called extended conjunctive reachability queries for which query evaluation has a polynomial data complexity. We also show that query containment is decidable in 2-EXPTIME for (non-extended) conjunctive visibly pushdown path queries.} }
@mastersthesis{m2-dallon, author = {Dallon, Antoine}, title = {Verification of Cryptographic Protocols : a bound on the number of agents}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2015}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-dallon.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-dallon.pdf}, note = {38~pages} }
@proceedings{KDH-topnoc2015, editor = {Koutny, Maciej and Desel, J{\"o}rg and Haddad, Serge}, title = {Transactions on {P}etri Nets and Other Models of Concurrency~{X}}, booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{X}}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 9410, year = {2015}, noaddress = {}, url = {http://www.springer.com/978-3-662-48649-8} }
@article{KNS-tcs2015, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Karandikar, Prateek and Niewerth, Matthias and Schnoebelen, {\relax Ph}ilippe}, title = {On the state complexity of closures and interiors of regular languages with subwords and superwords}, volume = {610}, number = {A}, pages = { 91-107}, year = {2016}, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KNS-tcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KNS-tcs15.pdf}, doi = {10.1016/j.tcs.2015.09.028}, abstract = {The downward and upward closures of a regular language~\(L\) are obtained by collecting all the subwords and superwords of its elements, respectively. The downward and upward interiors of~\(L\) are obtained dually by collecting words having all their subwords and superwords in~\(L\), respectively.\par We provide lower and upper bounds on the size of the smallest automata recognizing these closures and interiors. We also consider the computational complexity of decision problems for closures of regular languages.} }
@misc{cassting-D13, author = {Markey, Nicolas and Doyen, Laurent and Berwanger, Dietmar}, title = {Models for large-scale systems}, howpublished = {Cassting deliverable~D1.3 (FP7-ICT-601148)}, month = sep, year = {2015}, note = {17~pages}, type = {Contract Report}, url = {http://www.cassting-project.eu/wp-content/uploads/deliv-13.pdf}, pdf = {http://www.cassting-project.eu/wp-content/uploads/deliv-13.pdf} }
@misc{cassting-D21, author = {Geeraerts, Gilles and Dehouck, Samuel and Markey, Nicolas and Larsen, Kim G.}, title = {Efficient algorithms for multi-player games with quantitative aspects}, howpublished = {Cassting deliverable~D2.1 (FP7-ICT-601148)}, month = mar, year = {2015}, note = {22~pages}, type = {Contract Report}, url = {http://www.cassting-project.eu/wp-content/uploads/deliv-21.pdf}, pdf = {http://www.cassting-project.eu/wp-content/uploads/deliv-21.pdf} }
@misc{cassting-D63, author = {Markey, Nicolas and Delaborde, Arthur}, title = {Annual report for Year~2}, howpublished = {Cassting deliverable~D6.3 (FP7-ICT-601148)}, month = may, year = {2015}, note = {34~pages}, type = {Contract Report}, nourlnote = {confidentiel} }
@article{BHJL-fi15, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Jovanovi{\'c}, Aleksandra and Lime, Didier}, title = {Interrupt Timed Automata with Auxiliary Clocks and Parameters}, volume = {143}, number = {3-4}, pages = {235-259}, month = mar, year = 2016, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHJL-fi15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHJL-fi15.pdf}, doi = {10.3233/FI-2016-1313}, abstract = {Interrupt Timed Automata (ITA) are an expressive timed model, introduced to take into account interruptions according to levels. Due to this feature, this formalism is incomparable with Timed Automata.\par However several decidability results related to reachability and model checking have been obtained. We add auxiliary clocks to ITA, thereby extending its expressive power while preserving decidability of reachability. Moreover, we define a parametrized version of ITA, with polynomials of parameters appearing in guards and updates. While parametric reasoning is particularly relevant for timed models, it very often leads to undecidability results. We prove that various reachability problems, including robust reachability, are decidable for this model, and we give complexity upper bounds for a fixed or variable number of clocks, levels and parameters.} }
@article{GHKS-tecs15, publisher = {ACM Press}, journal = {ACM Transactions in Embedded Computing Systems}, author = {Germanos, Vasileios and Haar, Stefan and Khomenko, Victor and Schwoon, Stefan}, title = {Diagnosability under Weak Fairness}, volume = 14, number = {4:69}, nopages = {}, month = dec, year = 2015, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GHKS-tecs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GHKS-tecs15.pdf}, doi = {10.1145/2832910}, abstract = {In partially observed Petri nets, diagnosis is the task of detecting whether or not the given sequence of observed labels indicates that some unobservable fault has occurred. Diagnosability is an associated property of the Petri net, stating that in any possible execution an occurrence of a fault can eventually be diagnosed.\par In this paper we consider diagnosability under the weak fairness (WF) assumption, which intuitively states that no transition from a given set can stay enabled forever---it~must eventually either fire or be disabled. We show that a previous approach to WF-diagnosability in the literature has a major flaw, and present a corrected notion. Moreover, we present an efficient method for verifying WF-diagnosability based on a reduction to LTL-X model checking. An~important advantage of this method is that the LTL-X formula is fixed---in~particular, the WF assumption does not have to be expressed as a part of it (which would make the formula length proportional to the size of the specification), but rather the ability of existing model checkers to handle weak fairness directly is exploited.} }
@article{BGM-ipl15, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Bouyer, Patricia and Gardy, Patrick and Markey, Nicolas}, title = {On~the semantics of Strategy Logic}, volume = {116}, number = {2}, pages = {75-79}, month = feb, year = {2016}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-ipl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-ipl15.pdf}, doi = {10.1016/j.ipl.2015.10.004}, abstract = {We define and study a slight variation on the semantics of Strategy Logic: while in the classical semantics, all strategies are shifted during the evaluation of temporal modalities, we propose to only shift the strategies that have been assigned to a player, thus matching the intuition that we can assign the very same strategy to the players at different points in time. We prove that surprisingly, this renders the model-checking problem undecidable.} }
@article{HK-ipl15, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Haase, Christoph and Kiefer, Stefan}, title = {The Complexity of the \(K\)th Largest Subset Problem and Related Problems}, volume = {116}, number = {2}, pages = {111-115}, month = feb, year = {2016}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HK-ipl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HK-ipl15.pdf}, doi = {10.1016/j.ipl.2015.09.015}, abstract = {We show that the \textsc{\(K\)th largest subset} problem and the \textsc{\(K\)th largest \(m\)-tuple} problem are in PP and hard for PP under polynomial-time Turing reductions. Several problems from the literature were previously shown NP-hard via reductions from those two problems, and by our main result they become PP-hard as well. We also provide complementary PP-upper bounds for some of them.} }
@inproceedings{BGHLM-fsttcs15, address = {Bangalore, India}, month = dec, year = 2015, volume = {45}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Harsha, Prahladh and Ramalingam, G.}, acronym = {{FSTTCS}'15}, booktitle = {{P}roceedings of the 35th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'15)}, author = {Brihaye, {\relax Th}omas and Geeraerts, Gilles and Haddad, Axel and Lefaucheux, Engel and Monmege, Benjamin}, title = {Simple Priced Timed Games Are Not That Simple}, pages = {278-292}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGHLM-fsttcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGHLM-fsttcs15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2015.278}, abstract = {Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock).} }
@inproceedings{MLBHB-vecos15, address = {Bucharest, Romania}, month = sep, year = 2015, volume = {1431}, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Ben{~}Hedia, Belgacem and Popentiu{ }Vladicescu, Florin}, acronym = {{VECoS}'15}, booktitle = {{P}roceedings of the 9th {W}orkshop on {V}erification and {E}valuation of {C}omputer and {C}ommunication {S}ystems({VECoS}'15)}, author = {Methni, Amira and Lemerre, Matthieu and Ben{~}Hedia, Belgacem and Haddad, Serge and Barkaoui, Kamel}, title = {State Space Reduction Strategie for Model Checking Concurrent {C}~Programs}, pages = {65-76}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MLBHB-vecos15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MLBHB-vecos15.pdf}, abstract = {Model checking is an effective technique for uncovering subtle errors in concurrent systems. Unfortunately, the state space explosion is the main bottleneck in model checking tools. Here we propose a state space reduction technique for model checking concurrent programs written in~C. The reduction technique consists in an analysis phase, which defines an approximate agglomeration predicate. This latter states whether a statement can be agglomerated or~not. We~implement this predicate using a syntactic analysis, as well as a semantic analysis based on abstract interpretation. We show the usefulness of using agglomeration technique to reduce the state space, as well as to generate an abstract TLA+ specification from a~C~program.} }
@inproceedings{BHHHS-cdc15, address = {Osaka, Japan}, month = dec, year = 2015, publisher = {{IEEE} Control System Society}, noeditor = {}, acronym = {{CDC}'15}, booktitle = {{P}roceedings of the 54th {IEEE} {C}onference on {D}ecision and {C}ontrol ({CDC}'15)}, author = {B{\"o}hm, Stanislav and Haar, Stefan and Haddad, Serge and Hofman, Piotr and Schwoon, Stefan}, title = {Active Diagnosis with Observable Quiescence}, pages = {1663-1668}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHHS-cdc15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHHS-cdc15.pdf}, doi = {10.1109/CDC.2015.7402449}, abstract = {Active diagnosis of a discrete-event system consists in controlling the system such that faults can be detected. Here we extend the framework of active diagnosis by introducing modalities for actions and states and a new capability for the controller, namely observing that the system is quiescent. We design a game-based construction for both the decision and the synthesis problems that is computationally optimal. Furthermore we prove that the size and the delay provided by the active diagnoser (when it exists) are almost optimal.} }
@article{AGMN-tcs15, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Akshay, S. and Gastin, Paul and Mukund, Madhavan and Kumar, K. Narayan}, title = {Checking conformance for time-constrained scenario-based specifications}, volume = {594}, pages = {24-43}, month = aug, year = {2015}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGMN-tcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGMN-tcs15.pdf}, doi = {10.1016/j.tcs.2015.03.030}, abstract = {We consider the problem of model checking message-passing systems with real-time requirements. As behavioral specifications, we use message sequence charts (MSCs) annotated with timing constraints. Our system model is a network of communicating finite state machines with local clocks, whose global behavior can be regarded as a timed automaton. Our goal is to verify that all timed behaviors exhibited by the system conform to the timing constraints imposed by the specification. In general, this corresponds to checking inclusion for timed languages, which is an undecidable problem even for timed regular languages. However, we show that we can translate regular collections of time-constrained MSCs into a special class of event-clock automata that can be determinized and complemented, thus permitting an algorithmic solution to the model checking/conformance problem.} }
@inproceedings{BV-fsttcs15, address = {Bangalore, India}, month = dec, year = 2015, volume = {45}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Harsha, Prahladh and Ramalingam, G.}, acronym = {{FSTTCS}'15}, booktitle = {{P}roceedings of the 35th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'15)}, author = {Berwanger, Dietmar and Van{ }den{ }Bogaard, Marie}, title = {Games with Delays. A~{F}rankenstein Approach}, pages = {307-319}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BV-fsttcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BV-fsttcs15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2015.307}, abstract = {We investigate infinite games on finite graphs where the information flow is perturbed by non-deterministic signalling delays. It is known that such perturbations make synthesis problems virtually unsolvable, in the general case. On the classical model where signals are attached to states, tractable cases are rare and difficult to identify. In this paper, we propose a model where signals are detached from control states, and we identify a subclass on which equilibrium outcomes can be preserved, even if signals are delivered with a delay that is finitely bounded. To offset the perturbation, our solution procedure combines responses from a collection of virtual plays following an equilibrium strategy in the instant-signalling game to synthesise, in a Dr.~Frankenstein manner, an equivalent equilibrium strategy for the delayed-signalling game.} }
@inproceedings{KS-fsttcs15, address = {Bangalore, India}, month = dec, year = 2015, volume = {45}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Harsha, Prahladh and Ramalingam, G.}, acronym = {{FSTTCS}'15}, booktitle = {{P}roceedings of the 35th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'15)}, author = {Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {Decidability in the logic of subsequences and supersequences}, pages = {84-97}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-fsttcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-fsttcs15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2015.84}, abstract = {We consider first-order logics of sequences ordered by the subsequence ordering, aka sequence embedding. We show that the \(\Sigma_{2}\)-theory is undecidable, answering a question left open by Kuske. Regarding fragments with a bounded number of variables, we show that the \(\textsf{FO}^{2}\)-theory is decidable while the \(\textsf{FO}^{3}\)-theory is undecidable.} }
@inproceedings{BGM-fsttcs15, address = {Bangalore, India}, month = dec, year = 2015, volume = {45}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Harsha, Prahladh and Ramalingam, G.}, acronym = {{FSTTCS}'15}, booktitle = {{P}roceedings of the 35th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'15)}, author = {Bouyer, Patricia and Gardy, Patrick and Markey, Nicolas}, title = {Weighted strategy logic with boolean goals over one-counter games}, pages = {69-83}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-fsttcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGM-fsttcs15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2015.69}, abstract = {Strategy Logic is a powerful specification language for expressing non-zero-sum properties of multi-player games. SL conveniently extends the logic ATL with explicit quantification and assignment of strategies. In this paper, we consider games over one-counter automata, and a quantitative extension 1cSL of SL with assertions over the value of the counter. We prove two results: we first show that, if decidable, model checking the so-called Boolean-goal fragment of 1cSL has non-elementary complexity; we actually prove the result for the Boolean-goal fragment of SL over finite-state games, which was an open question in (Mogavero \emph{et~al.} Reasoning about strategies: On the model-checking problem. 2014). As a first step towards proving decidability, we then show that the Boolean-goal fragment of 1cSL over one-counter games enjoys a nice periodicity property.} }
@inproceedings{adhs15-HT, address = {Atlanta, Georgia, USA}, month = oct, year = 2015, number = 27, volume = 48, series = {IFAC-PapersOnLine}, publisher = {Elsevier Science Publishers}, editor = {Lennartson, Bengt and Tabuada, Paulo}, acronym = {{ADHS}'15}, booktitle = {{P}roceedings of the 5th {IFAC} {C}onference on {A}nalysis and {D}esign of {H}ybrid {S}ystems ({ADHS}'15)}, author = {Haar, Stefan and Theissing, Simon}, title = {A~Hybrid-Dynamical Model for Passenger-flow in Transportation Systems}, pages = {236-241}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/adhs15-HT.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/adhs15-HT.pdf}, doi = {10.1016/j.ifacol.2015.11.181}, abstract = {In a network with different transportation modes, or multimodal public transportation system (MPTS), modes are linked among one another not by resources or infrastructure elements---which are not shared, e.g., between different metro lines---but by the flow of passengers between them. Now, the movements of passengers are steered by the destinations that individual passengers have, and by which they can be grouped into trip profiles. To use the strength of fluid dynamics, we therefore introduce a multiphase hybrid Petri net model, in which the vehicle dynamics is rendered by individual tokens moving in an infrastructure net, while passenger quantities are given as vectors---whose components correspond to trip profiles---and evolve at stations according to fluid dynamics. This model is intended as a building block for obtaining supervisory control, via transport operator actions, to mitigate congestion.} }
@inproceedings{ncma2015-bou, address = {Porto, Portugal}, month = aug, year = 2015, volume = 318, series = {books@ocg.at}, publisher = {Austrian Computer Society}, editor = {Freund, Rudolf and Holzer, Markus and Moreira, Nelma and Reis, Rog{\'e}rio}, acronym = {{NCMA}'15}, booktitle = {{P}roceedings of the 7th {W}orkshop on {N}on-{C}lassical {M}odels of {A}utomata and {A}pplications ({NCMA}'15)}, author = {Bouyer, Patricia}, title = {On the optimal reachability problem in weighted timed automata and games}, pages = {11-36}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ncma15-bou.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ncma15-bou.pdf}, abstract = {In these notes, we survey works made on the models of weighted timed automata and games, and more specifically on the optimal reachability problem.} }
@inproceedings{MAS-sigspatial15, address = {Seattle, Washington, USA}, month = nov, year = 2015, editor = {Ali, Mohamed and Huang Yan and Gertz, Michael and Renz, Matthias and Sankaranarayanan, Jagan}, acronym = {{GIS}'15}, booktitle = {{P}roceedings of the 23rd {ACM} {SIGSPATIAL} {I}nternational {C}onference on {A}dvances in {G}eographic {I}nformation {S}ystems ({GIS}'15)}, author = {Montoya, David and Abiteboul, Serge and Senellart, Pierre}, title = {Hup-Me: Inferring and Reconciling a Timeline of User Activity with Smartphone and Personal Data}, pages = {62:1-4}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MAS-sigspatial15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MAS-sigspatial15.pdf}, doi = {10.1145/2820783.2820852}, abstract = {We designed a system to infer multimodal itineraries traveled by a user from a combination of smartphone sensor data (e.g., GPS, Wi-Fi, accelerometer) and knowledge of the transport network infrastructure (e.g., road and rail maps, public transportation timetables). The system uses a Transportation network that captures the set of possible paths of this network for the modes, e.g., foot, bicycle, road_vehicle, and rail. This Transportation network is constructed from OpenStreetMap data and public transportation routes published online by transportation agencies in GTFS format. The system infers itineraries from a sequence of smartphone observations in two phases. The first phase uses a dynamic Bayesian network that models the probabilistic relationship between paths in Transportation network and sensor data. The second phase attempts to match portions recognized as road_vehicle or rail with possible public transportation routes of type bus, train, metro, or tram extracted from the GTFS source. We evaluated the performance of our system with data from users traveling over the Paris area who were asked to record data for different trips via an Android application. Itineraries were annotated with modes and public transportation routes taken and we report on the results of the recognition.} }
@article{CCD-tocl15, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Chr{\'e}tien, R{\'e}my and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {From security protocols to pushdown automata}, volume = {17}, number = {1:3}, nopages = {}, year = 2015, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-tocl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-tocl15.pdf}, doi = {10.1145/2811262}, abstract = {Formal methods have been very successful in analyzing security protocols for reachability properties such as secrecy or authentication. In contrast, there are very few results for equivalence-based properties, crucial for studying e.g. privacy-like properties such as anonymity or vote secrecy.\par We study the problem of checking equivalence of security protocols for an unbounded number of sessions. Since replication leads very quickly to undecidability (even in the simple case of secrecy), we focus on a limited fragment of protocols (standard primitives but pairs, one variable per protocol's rules) for which the secrecy preservation problem is known to be decidable. Surprisingly, this fragment turns out to be undecidable for equivalence. Then, restricting our attention to deterministic protocols, we propose the first decidability result for checking equivalence of protocols for an unbounded number of sessions. This result is obtained through a characterization of equivalence of protocols in terms of equality of languages of (generalized, real-time) deterministic pushdown automata. We further show that checking for equivalence of protocols is actually equivalent to checking for equivalence of generalized, real-time deterministic pushdown automata.\par Very recently, the algorithm for checking for equivalence of deterministic pushdown automata has been implemented. We have implemented our translation from protocols to pushdown automata, yielding the first tool that decides equivalence of (some class of) protocols, for an unbounded number of sessions. As an application, we have analyzed some protocols of the literature including a simplified version of the basic access control (BAC) protocol used in biometric passports.} }
@inproceedings{CCD-esorics15, address = {Vienna, Austria}, month = sep, year = 2015, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ryan, Peter and Weippl, Edgar}, acronym = {{ESORICS}'15}, booktitle = {{P}roceedings of the 20th {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'15)}, author = {Chr{\'e}tien, R{\'e}my and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Checking trace equivalence: How to get rid of nonces?}, pages = {230-251}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-esorics15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-esorics15.pdf}, doi = {10.1007/978-3-319-24177-7_12}, abstract = {Security protocols can be successfully analysed using formal methods. When proving security in symbolic settings for an unbounded number of sessions, a typical technique consists in abstracting away fresh nonces and keys by a bounded set of constants. While this abstraction is clearly sound in the context of secrecy properties (for protocols without else branches), this is no longer the case for equivalence properties.\par In this paper, we study how to soundly get rid of nonces in the context of equivalence properties. We show that nonces can be replaced by constants provided that each nonce is associated to two constants (instead of typically one constant for secrecy properties). Our result holds for deterministic (simple) protocols and a large class of primitives that includes e.g. standard primitives, blind signatures, and zero-knowledge proofs.} }
@phdthesis{karandikar-phd15, author = {Karandikar, Prateek}, title = {Subwords: automata, embedding problems, and verification}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France and Chennai Mathematical Institute, India}, type = {Th{\`e}se de doctorat}, year = 2015, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/karandikar-phd15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/karandikar-phd15.pdf} }
@phdthesis{francis-phd15, author = {Francis, Nadime}, title = {View-based Query Determinacy and Rewritings over Graph Databases}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2015, month = dec, url = {https://tel.archives-ouvertes.fr/tel-01247115} }
@phdthesis{reichert-phd15, author = {Reichert, Julien}, title = {D{\'e}cidabilit{\'e} et complexit{\'e} de jeux d'accessibilit{\'e} sur des syst{\`e}mes {\`a} compteurs}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2015, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/reichert-phd15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/reichert-phd15.pdf} }
@inproceedings{FGMMP-rp15, address = {Warsaw, Poland}, month = sep, year = 2015, volume = {9328}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Boja{\'n}czyk, Miko{\l}aj and Lasota, S{\l}awomir and Potapov, Igor}, acronym = {{RP}'15}, booktitle = {{P}roceedings of the 9th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'15)}, author = {Fribourg, Laurent and Goubault, {\'E}ric and Mohamed, Sameh and Mrozek, Marian and Putot, Sylvie}, title = {A~Topological Method for Finding Invariants of Continuous Systems}, pages = {63-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGMMP-rp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGMMP-rp15.pdf}, doi = {10.1007/978-3-319-24537-9_7}, abstract = {A~usual way to find positive invariant sets of ordinary differential equations is to restrict the search to predefined finitely generated shapes, such as linear templates, or ellipsoids as in classical quadratic Lyapunov function based approaches. One then looks for generators or parameters for which the corresponding shape has the property that the flow of the ODE goes inwards on its border. But for non-linear systems, where the structure of invariant sets may be very complicated, such simple predefined shapes are generally not well suited. The present work proposes a more general approach based on a topological property, namely Wa\.{z}ewski's property. Even for complicated non-linear dynamics, it is possible to successfully restrict the search for isolating blocks of simple shapes, that are bound to contain non-empty invariant sets. This approach generalizes the Lyapunov-like approaches, by allowing for inwards and outwards flow on the boundary of these shapes, with extra topological conditions. We developed and implemented an algorithm based on Wa\.{z}ewski's property, SOS optimization and some extra combinatorial and algebraic properties, that shows very nice results on a number of classical polynomial dynamical systems.} }
@inproceedings{LS-rp15, address = {Warsaw, Poland}, month = sep, year = 2015, volume = {9328}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Boja{\'n}czyk, Miko{\l}aj and Lasota, S{\l}awomir and Potapov, Igor}, acronym = {{RP}'15}, booktitle = {{P}roceedings of the 9th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'15)}, author = {Lazi{\'c}, Ranko and Schmitz, Sylvain}, title = {The Ideal View on {R}ackoff's Coverability Technique}, pages = {76-88}, url = {https://hal.inria.fr/hal-01176755}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-rp15.pdf}, doi = {10.1007/978-3-319-24537-9_8}, abstract = {Rackoff's small witness property for the coverability problem is the standard means to prove tight upper bounds in vector addition systems (VAS) and many extensions. We show how to derive the same bounds directly on the computations of the VAS instantiation of the generic backward coverability algorithm. This relies on a dual view of the algorithm using ideal decompositions of downwards-closed sets, which exhibits a key structural invariant in the VAS case. The same reasoning readily generalises to several VAS extensions.} }
@inproceedings{BHPSS-rp15, address = {Warsaw, Poland}, month = sep, year = 2015, volume = {9328}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Boja{\'n}czyk, Miko{\l}aj and Lasota, S{\l}awomir and Potapov, Igor}, acronym = {{RP}'15}, booktitle = {{P}roceedings of the 9th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'15)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Picaronny, Claudine and Safey{ }El{~}Din, Mohab and Sassolas, Mathieu}, title = {Polynomial Interrupt Timed Automata}, pages = {20-32}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHPSS-rp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHPSS-rp15.pdf}, doi = {10.1007/978-3-319-24537-9_3}, abstract = {Interrupt Timed Automata (ITA) form a subclass of stopwatch automata where reachability and some variants of timed model checking are decidable even in presence of parameters. They are well suited to model and analyze real-time operating systems. Here we extend ITA with polynomial guards and updates, leading to the class of polynomial ITA (PolITA). We prove that reachability is decidable in 2EXPTIME on PolITA, using an adaptation of the cylindrical decomposition method for the first-order theory of reals. Compared to previous approaches, our procedure handles parameters and clocks in a unified way. We also obtain decidability for the model checking of a timed version of CTL and for reachability in several extensions of PolITA.} }
@inproceedings{BFM-avocs15, address = {Edinburgh, UK}, month = sep, year = {2015}, volume = 72, series = {Electronic Communications of the EASST}, publisher = {European Association of Software Science and Technology}, editor = {Grov, Gudmund and Ireland, Andrew}, acronym = {{AVoCS}'15}, booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshop on {A}utomated {V}erification of {C}ritical {S}ystems ({AVoCS}'15)}, author = {Bouyer, Patricia and Fang, Erwin and Markey, Nicolas}, title = {Permissive strategies in timed automata and games}, nopages = {263-277}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFM-avocs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFM-avocs15.pdf}, doi = {10.14279/tuj.eceasst.72.1015}, abstract = {Timed automata are a convenient framework for modelling and reasoning about real-time systems. While these models are now very well-understood, they do not offer a convenient way of taking timing imprecisions into account. Several solutions (e.g. parametric guard enlargement) have recently been proposed over the last ten years to take such imprecisions into account. In this paper, we propose a new approach for handling robust reachability, based on permissive strategies. While classical strategies propose to play an action at an exact point in time, permissive strategies return an interval of possible dates when to play the selected action. With such a permissive strategy, we associate a penalty, which is the inverse of the length of the proposed interval, and accumulates along the run. We show that in that setting, optimal strategies can be computed in polynomial time for one-clock timed automata.} }
@inproceedings{B-time15, address = {Kassel, Germany}, month = sep, year = 2015, publisher = {{IEEE} Computer Society Press}, editor = {Grandi, Fabio and Lange, Martin and Lomuscio, Alessio}, acronym = {{TIME}'15}, booktitle = {{P}roceedings of the 22nd {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'15)}, author = {Bollig, Benedikt}, title = {Towards Formal Verification of Distributed Algorithms}, pages = {3}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/B-time15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/B-time15.pdf}, doi = {10.1109/TIME.2015.23} }
@inproceedings{B-ciaa15, address = {Ume{\aa}, Sweden}, month = aug, year = 2015, volume = {9223}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Drewes, Frank}, acronym = {{CIAA}'15}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'15)}, author = {Bollig, Benedikt}, title = {Automata and Logics for Concurrent Systems: Five Models in Five Pages}, pages = {3-12}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/B-ciaa15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/B-ciaa15.pdf}, doi = {10.1007/978-3-319-22360-5_1}, abstract = {We~survey various automata models of concurrent systems and their connection with monadic second-order logic: finite automata, class memory automata, nested-word automata, asynchronous automata, and message-passing automata.} }
@inproceedings{RG-bda15, address = {{\^I}le de Porquerolles, France}, month = sep, year = 2015, noeditor = {}, acronym = {{BDA}'15}, booktitle = {{A}ctes de la 31{\`e}me {C}onf{\'e}rence sur la {G}estion de {D}onn{\'e}es~-- {P}rincipes, {T}echnologies et {A}pplications ({BDA}'15)}, author = {Rafes, Karima and Germain, C{\'e}cile}, title = {A~platform for scientific data sharing}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RG-bda15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RG-bda15.pdf}, abstract = {In this paper, we use the semantic web technology, notably RDF, SPARQL and Linked Open Data in the context of scientific data sharing. More precisely, we present the LinkedWiki platform that is being developed at the Center for Data Science of Paris-Saclay University for scientific data integration. The~goal is to facilitate the discovery and exploitation of scientists' datasets by their colleagues. For this, we notably rely on the use by scientists of Wikipedia for specifying the semantics of datasets, and the use of Wikidata (the~Wikipedia's knowledge base) identifiers for annotating these datasets and thereby facilitating their discovery.} }
@inproceedings{BMRLL-gandalf15, address = {Genova, Italy}, month = sep, year = 2015, volume = {193}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Esparza, Javier and Tronci, Enrico}, acronym = {{GandALF}'15}, booktitle = {{P}roceedings of the 6th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'15)}, author = {Bouyer, Patricia and Markey, Nicolas and Randour, Mickael and Larsen, Kim G. and Laursen, Simon}, title = {Average-energy games}, pages = {1-15}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMRLL-gandalf15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMRLL-gandalf15.pdf}, doi = {10.4204/EPTCS.193.1}, abstract = {Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy.\par We study \emph{average-energy} games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in \textsf{NP}{{\(\cap\)}}\textsf{coNP} and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements.} }
@inproceedings{LMS-gandalf15, address = {Genova, Italy}, month = sep, year = 2015, volume = {193}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Esparza, Javier and Tronci, Enrico}, acronym = {{GandALF}'15}, booktitle = {{P}roceedings of the 6th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'15)}, author = {Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Sangnier, Arnaud}, title = {{{\(\textsf{ATL}_{\textsf{sc}}\)}} with partial observation}, pages = {43-57}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LMS-gandalf15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LMS-gandalf15.pdf}, doi = {10.4204/EPTCS.193.4}, abstract = {Alternating-time temporal logic with strategy contexts ({{\(\textsf{ATL}_{\textsf{sc}}\)}}) is a powerful formalism for expressing properties of multi-agent systems: it~extends \textsf{CTL} with \emph{strategy quantifiers}, offering a convenient way of expressing both collaboration and antagonism between several agents. Incomplete observation of the state space is a desirable feature in such a framework, but it quickly leads to undecidable verification problems. In this paper, we prove that \emph{uniform} incomplete observation (where all players have the same observation) preserves decidability of the model checking problem, even for very expressive logics such as {{\(\textsf{ATL}_{\textsf{sc}}\)}}.} }
@inproceedings{BV-dlt15, address = {Liverpool, UK}, month = jul, year = 2015, volume = {9168}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Potapov, Igor}, acronym = {{DLT}'15}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'15)}, author = {Berwanger, Dietmar and Van{ }den{ }Bogaard, Marie}, title = {Consensus Game Acceptors}, pages = {108-119}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BV-dlt15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BV-dlt15.pdf}, doi = {10.1007/978-3-319-21500-6_8}, abstract = {We study a game for recognising formal languages, in which two players with imperfect information need to coordinate on a common decision, given private input strings correlated by a finite graph. The players have a joint objective to avoid an inadmissible decision, in spite of the uncertainty induced by the input.\par We show that the acceptor model based on consensus games characterises context-sensitive languages, and conversely, that winning strategies in such games can be described by context-sensitive languages. We also discuss consensus game acceptors with a restricted observation pattern that describe nondeterministic linear-time languages.} }
@inproceedings{BMV-atva15, address = {Shanghai, China}, month = oct, year = {2015}, volume = {9364}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Finkbeiner, Bernd and Pu, Geguang and Zhang, Lijun}, acronym = {{ATVA}'15}, booktitle = {{P}roceedings of the 13th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'15)}, author = {Berwanger, Dietmar and Mathew, Anup Basil and Van{ }den{ }Bogaard, Marie}, title = {Hierarchical Information Patterns and Distributed Strategy Synthesis}, pages = {378-393}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-atva15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-atva15.pdf}, doi = {10.1007/978-3-319-24953-7_28}, abstract = {Infinite games with imperfect information tend to be undecidable unless the information flow is severely restricted. One fundamental decidable case occurs when there is a total ordering among players, such that each player has access to all the information that the following ones receive.\par In this paper we consider variations of this hierarchy principle for synchronous games with perfect recall, and identify new decidable classes for which the distributed synthesis problem is solvable with finite-state strategies. In particular, we show that decidability is maintained when the information hierarchy may change along the play, or when transient phases without hierarchical information are allowed.} }
@inproceedings{PRCHH-atva15, address = {Shanghai, China}, month = oct, year = {2015}, volume = {9364}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Finkbeiner, Bernd and Pu, Geguang and Zhang, Lijun}, acronym = {{ATVA}'15}, booktitle = {{P}roceedings of the 13th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'15)}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Rodr{\'\i}guez, C{\'e}sar and Carmona, Josep and Heljanko, Keijo and Haar, Stefan}, title = {Unfolding-Based Process Discovery}, pages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PRCHH-atva15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PRCHH-atva15.pdf}, doi = {10.1007/978-3-319-24953-7_4}, abstract = {This paper presents a novel technique for process discovery. In contrast to the current trend, which only considers an event log for discovering a process model, we assume two additional inputs: an independence relation on the set of logged activities, and a collection of negative traces. After deriving an intermediate net unfolding from them, we perform a controlled folding giving rise to a Petri net which contains both the input log and all independence-equivalent traces arising from~it. Remarkably, the derived Petri net cannot execute any trace from the negative collection. The entire chain of transformations is fully automated. A tool has been developed and experimental results are provided that witness the significance of the contribution of this paper.} }
@article{BCGMNTW-jfr14, publisher = {University of Bologna}, journal = {Journal of Formalized Reasoning}, author = {Baelde, David and Chaudhuri, Kaustuv and Gacek, Andrew and Miller, Dale and Nadathur, Gopalan and Tiu, Alwen and Wang, Yuting}, title = {Abella: A~System for Reasoning about Relational Specifications}, volume = {7}, number = {2}, year = {2014}, pages = {1-89}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGMNTW-jfr14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGMNTW-jfr14.pdf}, doi = {10.6092/issn.1972-5787/4650}, abstract = {The Abella interactive theorem prover is based on an intuitionistic logic that allows for inductive and co-inductive reasoning over relations. Abella supports the \(\lambda\)-tree approach to treating syntax containing binders: it~allows simply typed \(\lambda\)-terms to be used to represent such syntax and it provides higher-order (pattern) unification, the \(\nabla\) quantifier, and nominal constants for reasoning about these representations. As such, it is a suitable vehicle for formalizing the meta-theory of formal systems such as logics and programming languages. This tutorial exposes Abella incrementally, starting with its capabilities at a first-order logic level and gradually presenting more sophisticated features, ending with the support it offers to the \emph{two-level logic approach} to meta-theoretic reasoning. Along the way, we show how Abella can be used prove theorems involving natural numbers, lists, and automata, as well as involving typed and untyped \(\lambda\)-calculi and the \(\pi\)-calculus.} }
@inproceedings{BDS-csl15, address = {Berlin, Germany}, month = sep, year = 2015, volume = {41}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Kreuzer, Stephan}, acronym = {{CSL}'15}, booktitle = {{P}roceedings of the 24th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'15)}, author = {Baelde, David and Doumane, Amina and Saurin, Alexis}, title = {Least and Greatest Fixed Points in Ludics}, pages = {549-566}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDS-csl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDS-csl15.pdf}, doi = {10.4230/LIPIcs.CSL.2015.549}, abstract = {Various logics have been introduced in order to reason over (co)inductive specifications and, through the Curry-Howard correspondence, to study computation over inductive and coinductive data. The logic mu-MALL is one of those logics, extending multiplicative and additive linear logic with least and greatest fixed point operators.\par In this paper, we investigate the semantics of mu-MALL proofs in (computational) ludics. This framework is built around the notion of design, which can be seen as an analogue of the strategies of game semantics. The infinitary nature of designs makes them particularly well suited for representing computations over infinite data.\par We provide mu-MALL with a denotational semantics, interpreting proofs by designs and formulas by particular sets of designs called behaviours. Then we prove a completeness result for the class of {"}essentially finite designs{"}, which are those designs performing a finite computation followed by a copycat. On the way to completeness, we investigate semantic inclusion, proving its decidability (given two formulas, we can decide whether the semantics of one is included in the other's) and completeness (if semantic inclusion holds, the corresponding implication is provable in mu-MALL).} }
@article{CLMT-dagstuhl15, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, journal = {Dagstuhl Reports}, editor = {Chatterjee, Krishnendu and Lafortune, St{\'e}phane and Markey, Nicolas and Thomas, Wolfgang}, author = {Chatterjee, Krishnendu and Lafortune, St{\'e}phane and Markey, Nicolas and Thomas, Wolfgang}, title = {Non-Zero-Sum-Games and Control ({D}agstuhl Seminar~15061)}, pages = {1-25}, year = {2015}, volume = {5}, number = {2}, month = jun, url = {http://drops.dagstuhl.de/opus/volltexte/2015/5042}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CLMT-dagstuhl15.pdf}, doi = {10.4230/DagRep.5.2.1}, abstract = {In this report, the program, research issues, and results of Dagstuhl Seminar 15061 {"}Non-Zero-Sum-Games and Control{"} are described. The area of non-zero-sum games is addressed in a wide range of topics: multi-player games, partial-observation games, quantitative game models, and---as~a special focus---connections with control engineering (supervisory control).} }
@inproceedings{HPRV-ppdp15, address = {Siena, Italy}, month = jul, year = 2015, publisher = {ACM Press}, editor = {Albert, Elvira}, acronym = {{PPDP}'15}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {P}rinciples and {P}ractice of {D}eclarative {P}rogramming ({PPDP}'15)}, author = {Haar, Stefan and Perchy, Salim and Rueda, Camilo and Valencia, Franck}, title = {An Algebraic View of Space{{\slash}}Belief and Extrusion{{\slash}}Utterance for Concurrency{{\slash}}Epistemic Logic}, pages = {161-172}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HPRV-ppdp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HPRV-ppdp15.pdf}, doi = {10.1007/978-3-319-19488-2_6}, abstract = {We enrich spatial constraint systems with operators to specify information and processes moving from a space to another. We shall refer to these news structures as spatial constraint systems with extrusion. We shall investigate the properties of this new family of constraint systems and illustrate their applications. From a computational point of view the new operators provide for process\slash information extrusion, a central concept in formalisms for mobile communication. From an epistemic point of view extrusion corresponds to a notion we shall call utterance; a~piece of information that an agent communicates to others but that may be inconsistent with the agent's beliefs. Utterances can then be used to express instances of epistemic notions, which are common place in social media, such as hoaxes or intentional lies. Spatial constraint systems with extrusion can be seen as complete Heyting algebras equipped with maps to account for spatial and epistemic specifications.} }
@inproceedings{BMPS-formats15, address = {Madrid, Spain}, month = sep, year = 2015, volume = {9268}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sankaranarayanan, Sriram and Vicario, Enrico}, acronym = {{FORMATS}'15}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'15)}, author = {Bouyer, Patricia and Markey, Nicolas and Perrin, Nicolas and Schlehuber, Philipp}, title = {Timed automata abstraction of switched dynamical systems using control funnels}, pages = {60-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMPS-formats15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMPS-formats15.pdf}, doi = {10.1007/978-3-319-22975-1_5}, abstract = {The~development of formal methods for control design is an important challenge with potential applications in a wide range of safety-critical cyber-physical systems. Focusing on switched dynamical systems, we~propose a new abstraction, based on time-varying regions of invariance (the~\emph{control funnels}), that models behaviors of systems as timed automata. The main advantage of this method is that it allows automated verification of formal specifications and reactive controller synthesis without discretizing the evolution of the state of the system. Efficient constructions are possible in the case of linear dynamics. We~demonstrate the potential of our approach with two examples.} }
@inproceedings{AM-formats15, address = {Madrid, Spain}, month = sep, year = 2015, volume = {9268}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Sankaranarayanan, Sriram and Vicario, Enrico}, acronym = {{FORMATS}'15}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'15)}, author = {Andr{\'e}, {\'E}tienne and Markey, Nicolas}, title = {Language Preservation Problems in Parametric Timed Automata}, pages = {27-43}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AM-formats15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AM-formats15.pdf}, doi = {10.1007/978-3-319-22975-1_3}, abstract = {Parametric timed automata (PTA) are a powerful formalism to model and reason about concurrent systems with some unknown timing delays. In this paper, we address the (untimed) language- and trace-preservation problems: given a reference parameter valuation, does there exist another parameter valuation with the same untimed language (or trace)? We show that these problems are undecidable both for general PTA, and even for the restricted class of L/U-PTA. On the other hand, we exhibit decidable subclasses: 1-clock PTA, and 1-parameter deterministic L-PTA and U-PTA.} }
@inproceedings{ABG-concur15, address = {Madrid, Spain}, month = sep, year = 2015, volume = {42}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Aceto, Luca and de Frutos-Escrig, David}, acronym = {{CONCUR}'15}, booktitle = {{P}roceedings of the 26th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'15)}, author = {Aiswarya, C. and Bollig, Benedikt and Gastin, Paul}, title = {An Automata-Theoretic Approach to the Verification of Distributed Algorithms}, pages = {340-353}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABG-concur15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABG-concur15.pdf}, doi = {10.4230/LIPIcs.CONCUR.2015.340}, abstract = {We introduce an automata-theoretic method for the verification of distributed algorithms running on ring networks. In a distributed algorithm, an arbitrary number of processes cooperate to achieve a common goal (e.g., elect a leader). Processes have unique identifiers (pids) from an infinite, totally ordered domain. An algorithm proceeds in synchronous rounds, each round allowing a process to perform a bounded sequence of actions such as send or receive a pid, store it in some register, and compare register contents wrt. the associated total order. An algorithm is supposed to be correct independently of the number of processes. To specify correctness properties, we introduce a logic that can reason about processes and pids. Referring to leader election, it may say that, at the end of an execution, each process stores the maximum pid in some dedicated register. Since the verification of distributed algorithms is undecidable, we propose an underapproximation technique, which bounds the number of rounds. This is an appealing approach, as the number of rounds needed by a distributed algorithm to conclude is often exponentially smaller than the number of processes. We provide an automata-theoretic solution, reducing model checking to emptiness for alternating two-way automata on words. Overall, we show that round-bounded verification of distributed algorithms over rings is PSPACE-complete.} }
@inproceedings{BDH-concur15, address = {Madrid, Spain}, month = sep, year = 2015, volume = {42}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Aceto, Luca and de Frutos-Escrig, David}, acronym = {{CONCUR}'15}, booktitle = {{P}roceedings of the 26th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'15)}, author = {Baelde, David and Delaune, St{\'e}phanie and Hirschi, Lucca}, title = {Partial Order Reduction for Security Protocols}, pages = {497-510}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-concur15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-concur15.pdf}, doi = {10.4230/LIPIcs.CONCUR.2015.497}, abstract = {Security protocols are concurrent processes that communicate using cryptography with the aim of achieving various security properties. Recent work on their formal verification has brought procedures and tools for deciding trace equivalence properties (\textit{e.g.},~anonymity, unlinkability, vote secrecy) for a bounded number of sessions. However, these procedures are based on a naive symbolic exploration of all traces of the considered processes which, unsurprisingly, greatly limits the scalability and practical impact of the verification tools.\par In this paper, we mitigate this difficulty by developing partial order reduction techniques for the verification of security protocols. We provide reduced transition systems that optimally elim- inate redundant traces, and which are adequate for model-checking trace equivalence properties of protocols by means of symbolic execution. We have implemented our reductions in the tool \textsf{Apte}, and demonstrated that it achieves the expected speedup on various protocols.} }
@inproceedings{BJM-concur15, address = {Madrid, Spain}, month = sep, year = 2015, volume = {42}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Aceto, Luca and de Frutos-Escrig, David}, acronym = {{CONCUR}'15}, booktitle = {{P}roceedings of the 26th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'15)}, author = {Bouyer, Patricia and Jaziri, Samy and Markey, Nicolas}, title = {On~the Value Problem in Weighted Timed Games}, pages = {311-324}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BJM-concur15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BJM-concur15.pdf}, doi = {10.4230/LIPIcs.CONCUR.2015.311}, abstract = {A~weighted timed game is a timed game with extra quantitative information representing e.g. energy consumption. Optimizing the cost for reaching a target is a natural question, which has been investigated for ten years. Existence of optimal strategies is known to be undecidable in general, and only very restricted classes of games have been described for which optimal cost and almost-optimal strategies can be computed.\par In this paper, we show that the value problem is undecidable in general weighted timed games. The undecidability proof relies on that for the existence of optimal strategies and on a diagonalization construction recently designed in the context of quantitative temporal logics. We then provide an algorithm to compute arbitrary approximations of the value in a game, and almost-optimal strategies. The algorithm applies in a large subclass of weighted timed games, and is the first approximation scheme which is designed in the current context.} }
@inproceedings{CDV-icalp15, address = {Kyoto, Japan}, month = jul, year = 2015, volume = {9135}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Halld{\'o}rsson, Magnus M. and Iwama, Kazuo and Kobayashi, Naoki and Speckmann, Bettina}, acronym = {{ICALP}'15}, booktitle = {{P}roceedings of the 42nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'15)~-- {P}art~{II}}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Vardi, Moshe}, title = {The Complexity of Synthesis from Probabilistic Components}, pages = {108-120}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDV-icalp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDV-icalp15.pdf}, doi = {10.1007/978-3-662-47666-6_9}, abstract = {The synthesis problem asks for the automatic construction of a system from its specification. In the traditional setting, the system is {"}constructed from scratch{"} rather than composed from reusable components. However, this is rare in practice, and almost every non-trivial software system relies heavily on the use of libraries of reusable components. Recently, Lustig and Vardi introduced dataflow and controlflow synthesis from libraries of reusable components. They proved that dataflow synthesis is undecidable, while controlflow synthesis is decidable. The problem of controlflow synthesis from libraries of probabilistic components was considered by Nain, Lustig and Vardi, and was shown to be decidable for qualitative analysis (that asks that the specification be satisfied with probability~1). Our main contribution for controlflow synthesis from probabilistic components is to establish better complexity bounds for the qualitative analysis problem, and to show that the more general quantitative problem is undecidable. For the qualitative analysis, we show that the problem (i)~is EXPTIME-complete when the specification is given as a deterministic parity word automaton, improving the previously known 2EXPTIME upper bound; and (ii)~belongs to UP\(\cap\)coUP and is parity-games hard, when the specification is given directly as a parity condition on the components, improving the previously known EXPTIME upper bound.} }
@inproceedings{JLS-icalp15, address = {Kyoto, Japan}, month = jul, year = 2015, volume = {9135}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Halld{\'o}rsson, Magnus M. and Iwama, Kazuo and Kobayashi, Naoki and Speckmann, Bettina}, acronym = {{ICALP}'15}, booktitle = {{P}roceedings of the 42nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'15)~-- {P}art~{II}}, author = {Jurdzi{\'n}ski, Marcin and Lazi{\'c}, Ranko and Schmitz, Sylvain}, title = {Fixed-Dimensional Energy Games are in Pseudo Polynomial Time}, pages = {260-272}, url = {http://arxiv.org/abs/1502.06875}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JLS-arxiv15.pdf}, doi = {10.1007/978-3-662-47666-6_21}, abstract = {We generalise the hyperplane separation technique (Chatterjee and Velner,~2013) from multi-dimensional mean-payoff to energy games, and achieve an algorithm for solving the latter whose running time is exponential only in the dimension, but not in the number of vertices of the game graph. This answers an open question whether energy games with arbitrary initial credit can be solved in pseudo-polynomial time for fixed dimensions~\(3\) or larger (Chaloupka,~2013). It~also improves the complexity of solving multi-dimensional energy games with given initial credit from non-elementary (Br\'azdil, Jan\v{c}ar, and Ku\v{c}era,~2010) to 2EXPTIME, thus establishing their 2EXPTIME-completeness.} }
@phdthesis{bollig-HDR15, author = {Bollig, Benedikt}, title = {Automata and Logics for Concurrent Systems: Realizability and Verification}, year = 2015, month = jun, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-bollig15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-bollig15.pdf} }
@inproceedings{CCD-csf15, address = {Verona, Italy}, month = jul, year = 2015, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'15}, booktitle = {{P}roceedings of the 28th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'15)}, author = {Chr{\'e}tien, R{\'e}my and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Decidability of trace equivalence for protocols with nonces}, pages = {170-184}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-csf15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCD-csf15.pdf}, doi = {10.1109/CSF.2015.19}, abstract = {Privacy properties such as anonymity, unlinkability, or vote secrecy are typically expressed as equivalence properties.\par In this paper, we provide the first decidability result for trace equivalence of security protocols, for an unbounded number of sessions and unlimited fresh nonces. Our class encompasses most symmetric key protocols of the literature, in their tagged variant.} }
@inproceedings{MLBHB-ftscs15, address = {Luxembourg}, optnmonth = 11, optmonth = nov, year = 2015, volume = {476}, series = {Communications in Computer and Information Science}, publisher = {Springer}, editor = {Artho, Cyrille and {\"O}lveczky, Peter Csaba}, acronym = {{FTSCS}'14}, booktitle = {{P}roceedings of the 3rd {I}nternational {W}orkshop on {F}ormal {T}echniques for {S}afety-{C}ritical {S}ystems, Nov. 2014 ({FTSCS}'14)}, author = {Methni, Amira and Lemerre, Matthieu and Ben{~}Hedia, Belgacem and Haddad, Serge and Barkaoui, Kamel}, title = {Specifying and Verifying Concurrent {C}~Programs with {TLA+}}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MLBHB-ftscs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MLBHB-ftscs15.pdf}, doi = {10.1007/978-3-319-17581-2_14}, pages = {206-222}, nonote = {17~pages}, abstract = {Verifying software systems automatically from their source code rather than modelling them in a dedicated language gives more confidence in establishing their properties. Here we propose a formal specification and verification approach for concurrent C programs directly based on the semantics of~C. We define a set of translation rules and implement it in a tool~(C2TLA+) that automatically translates C code into a TLA+ specification. The~TLC model checker can use this specification to generate a model, allowing to check the absence of runtime errors and dead code in the C program in a given configuration. In addition, we show how translated specifications interact with manually written ones~to: check the C code against safety or liveness properties; provide concurrency primitives or model hardware that cannot be expressed in~C; and use abstract versions of translated C functions to address the state explosion problem. All these verifications have been conducted on an industrial case study, which is a part of the microkernel of the PharOS real-time system.} }
@article{FH-fundi15, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Fraca, Est{\'\i}baliz and Haddad, Serge}, title = {Complexity Analysis of Continuous Petri Nets}, volume = 137, number = {1}, pages = {1-28}, year = 2015, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FH-fundi15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FH-fundi15.pdf}, doi = {10.3233/FI-2015-1168}, abstract = {At the end of the eighties, continuous Petri nets were introduced for: (1)~alleviating the combinatory explosion triggered by discrete Petri nets (i.e. usual Petri nets) and, (2)~modelling the behaviour of physical systems whose state is composed of continuous variables. Since then several works have established that the computational complexity of deciding some standard behavioural properties of Petri nets is reduced in this framework. Here we first establish the decidability of additional properties like coverability, boundedness and reachability set inclusion. We also design new decision procedures for reachability and lim-reachability problems with a better computational complexity. Finally we provide lower bounds characterising the exact complexity class of the reachability, the coverability, the boundedness, the deadlock freeness and the liveness problems. A~small case study is introduced and analysed with these new procedures.} }
@article{BHHP-ijasm15, publisher = {IARIA}, journal = {International Journal on Advances in Systems and Measurements}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Heiner, Monika and Picaronny, Claudine}, title = {Rare Event Handling in Signalling Cascades}, volume = 8, number = {1-2}, pages = {69-79}, year = 2015, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHP-ijasm15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHHP-ijasm15.pdf}, abstract = {Signalling cascades are a recurrent pattern of biological regulatory systems whose analysis has deserved a lot of attention. It has been shown that stochastic Petri nets are appropriate to model such systems and evaluate the probabilities of specific properties. Such an evaluation can be done numerically when the combinatorial state space explosion is manageable or statistically otherwise. However, when the probabilities to be evaluated are too small, random simulation requires more sophisticated techniques for the handling of rare events. In this paper, we show how such involved methods can be successfully applied for signalling cascades. More precisely, we study three relevant properties of a signalling cascade with the help of the COSMOS tool. Our experiments point out interesting dependencies between quantitative parameters of the regulatory system and its transient behaviour. In addition, they demonstrate that we can go beyond the capabilities of MARCIE, which provides one of the most efficient numerical solvers.} }
@inproceedings{RNG-ldq15, address = {Portoro{\v z}, Slovenia}, month = jun, year = 2015, volume = {1376}, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Rula, Anisa and Zaveri, Amrapali and Knuth, Magnus and Kontokostas, Dimitris}, acronym = {{LDQ}'15}, booktitle = {{P}roceedings of the 2nd {W}orkshop on {L}inked {D}ata {Q}uality ({LDQ}'15)}, author = {Rafes, Karima and Nauroy, Julien and Germain, C{\'e}cile}, title = {Certifying the interoperability of {RDF} database systems}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RNG-ldq15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RNG-ldq15.pdf}, abstract = {In~March~2013, the W3C recommended SPARQL~1.1 to retrieve and manipulate decentralized RDF data. Real-world usage requires advanced features of SPARQL~1.1. recommendations As these are not consistently implemented, we propose a test framework named TFT (Tests for Triple stores) to test the interoperability of the SPARQL end-point of RDF database systems. This framework can execute the W3C's SPARQL~1.1 test suite and also its own tests of interoperability. To help the developers and end-users of RDF databases, we perform daily tests on Jena-Fuseki, Marmotta-KiWistore, 4Store and three other commercial databases. With these tests, we have built a scoring system named SPARQLScore and share our results on the website \url{http://sparqlscore.com}.} }
@article{BFRR-ic15, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bruy{\`e}re, V{\'e}ronique and Filiot, Emmanuel and Randour, Mickael and Raskin, Jean-Fran{\c{c}}ois}, title = {Meet Your Expectations With Guarantees: Beyond Worst-Case Synthesis in Quantitative Games}, volume = {254}, number = {2}, month = jun, year = 2017, pages = {259-295}, note = {To appear}, doi = {10.1016/j.ic.2016.10.011}, abstract = {Classical analysis of two-player quantitative games involves an adversary (modeling the environment of the system) which is purely antagonistic and asks for strict guarantees while Markov decision processes model systems facing a purely randomized environment: the aim is then to optimize the expected payoff, with no guarantee on individual outcomes. We introduce the beyond worst-case synthesis problem, which is to construct strategies that guarantee some quantitative requirement in the worst-case while providing a higher expected value against a particular stochastic model of the environment given as input. We study the beyond worst-case synthesis problem for two important quantitative settings: the mean-payoff and the shortest path. In both cases, we show how to decide the existence of finite-memory strategies satisfying the problem and how to synthesize one if one exists. We establish algorithms and we study complexity bounds and memory requirements.} }
@inproceedings{RRS-cav15, address = {San Francisco, CA, USA}, month = jul, year = 2015, volume = 9206, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kroening, Daniel and Pasareanu, Corina}, acronym = {{CAV}'15}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'15)~-- Part~{I}}, author = {Randour, Mickael and Raskin, Jean-Fran{\c{c}}ois and Sankur, Ocan}, title = {Percentile Queries in Multi-Dimensional {M}arkov Decision Processes}, pages = {123-139}, url = {http://arxiv.org/abs/1410.4801}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RRS-arxiv14.pdf}, doi = {10.1007/978-3-319-21690-4_8}, abstract = {Multi-dimensional weighted Markov decision processes (MDPs) are useful to analyze systems with multiple objectives that are potentially conflicting and make necessary the analysis of trade-offs. In this paper, we study the complexity of percentile queries in such MDPs and provide algorithms to synthesize strategies that enforce such constraints. Given a multi-dimensional weighted MDP and a quantitative payoff function~\(f\), quantitative thresholds~\(v_i\) (one per dimension), and probability thresholds~\(\alpha_{i}\), we show how to compute a single strategy that enforces that for all dimension~\(i\), the probability that an outcome~\(\rho\) satisfies \(f_{i}(\rho) \geq v_{i}\) is at least~\(\alpha_{i}\). We study this problem for the classical quantitative payoffs studied in the literature (sup, inf, lim sup, lim inf, mean-payoff, truncated sum, discounted sum). So our work can be seen as an extension to the quantitative case of the multi-objective model checking problem on MDPs studied by Etessami et al. in unweighted MDPs.} }
@article{DD-jlc15, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane and Deters, Morgan}, title = {Temporal Logics on Strings with Prefix Relation}, year = 2016, volume = {26}, number = {3}, pages = {989-1017}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-jlc15-v2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-jlc15-v2.pdf}, doi = {10.1093/logcom/exv028}, abstract = {We show that linear-time temporal logic over concrete domains made of finite strings and the prefix relation admits a PSpace-complete satisfiability problem. Actually, we extend a known result with the concrete domain made of the set of natural numbers and the greater than relation (corresponding to the singleton alphabet case) and we solve an open problem mentioned in several publications. Since the prefix relation is not a total ordering, it~is not possible to take advantage of existing techniques dedicated to temporal logics with concrete domains that are essentially linearly ordered structures. Instead, we introduce an adequate encoding of string constraints into length constraints that allows us to reduce the problem on strings to the problem on natural numbers. To~do~so, we~also propose an extended version of the logic on strings that is able to compare lengths of longest common prefixes and for which the satisfiability problem is shown in PSpace. Finally, we show how to lift the result for the branching-time case in order to get decidability when the underlying temporal logic is~CTL\textsuperscript*.} }
@inproceedings{HK-icalp15, address = {Kyoto, Japan}, month = jul, year = 2015, volume = {9135}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Halld{\'o}rsson, Magnus M. and Iwama, Kazuo and Kobayashi, Naoki and Speckmann, Bettina}, acronym = {{ICALP}'15}, booktitle = {{P}roceedings of the 42nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'15)~-- {P}art~{II}}, author = {Haase, Christoph and Kiefer, Stefan}, title = {The Odds of Staying on Budget}, pages = {234-246}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HK-icalp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HK-icalp15.pdf}, doi = {10.1007/978-3-662-47666-6_19}, abstract = {Given Markov chains and Markov decision processes (MDPs) whose transitions are labelled with non-negative integer costs, we study the computational complexity of deciding whether the probability of paths whose accumulated cost satisfies a Boolean combination of inequalities exceeds a given threshold. For acyclic Markov chains, we show that this problem is PP-complete, whereas it is hard for the POSSLP problem and in PS PACE for general Markov chains. Moreover, for acyclic and general MDPs, we prove PSPACE- and EXP-completeness, respectively. Our results have direct implications on the complexity of computing reward quantiles in succinctly represented stochastic systems.} }
@inproceedings{DGGL-icalp15, address = {Kyoto, Japan}, month = jul, year = 2015, volume = {9135}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Halld{\'o}rsson, Magnus M. and Iwama, Kazuo and Kobayashi, Naoki and Speckmann, Bettina}, acronym = {{ICALP}'15}, booktitle = {{P}roceedings of the 42nd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'15)~-- {P}art~{II}}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {Natural Homology}, pages = {171-183}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-icalp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-icalp15.pdf}, doi = {10.1007/978-3-662-47666-6_14}, abstract = {We propose a notion of homology for directed algebraic topology, based on so-called natural systems of abelian groups, and which we call natural homology. Contrarily to previous proposals, and as we show, natural homology has many desirable properties: it~is invariant under isomorphisms of directed spaces, it is invariant under refinement (subdivision), and it is computable on cubical complexes.} }
@inproceedings{LS-lics15, address = {Kyoto, Japan}, month = jul, year = 2015, publisher = {{IEEE} Press}, acronym = {{LICS}'15}, booktitle = {{P}roceedings of the 30th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'15)}, author = {Leroux, J{\'e}r{\^o}me and Schmitz, Sylvain}, title = {Demystifying Reachability in Vector Addition Systems}, pages = {56-67}, url = {http://arxiv.org/abs/1503.00745}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-arxiv15.pdf}, doi = {10.1109/LICS.2015.1}, abstract = {More than 30 years after their inception, the decidability proofs for reachability in vector addition systems (VAS) still retain much of their mystery. These proofs rely crucially on a decomposition of runs successively refined by Mayr, Kosaraju, and Lambert, which appears rather magical, and for which no complexity upper bound is known.\par We first offer a justification for this decomposition technique, by showing that it emerges naturally in the study of the ideals of a well quasi ordering of VAS runs. In a second part, we apply recent results on the complexity of termination thanks to well quasi orders and well orders to obtain fast-growing complexity upper bounds for the decomposition algorithms, thus providing the first known upper bounds for general VAS reachability.} }
@inproceedings{BFGHM-lics15, address = {Kyoto, Japan}, month = jul, year = 2015, publisher = {{IEEE} Press}, acronym = {{LICS}'15}, booktitle = {{P}roceedings of the 30th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'15)}, author = {Blondin, Michael and Finkel, Alain and G{\"o}ller, Stefan and Haase, Christoph and McKenzie, Pierre}, title = {Reachability in Two-Dimensional Vector Addition Systems with States is {PSPACE}-Complete}, pages = {32-43}, url = {http://arxiv.org/abs/1412.4259}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFGHM-lics15-long.pdf}, doi = {10.1109/LICS.2015.14}, abstract = {Determining the complexity of the reachability problem for vector addition systems with states (VASS) is a long-standing open problem in computer science. Long known to be decidable, the problem to this day lacks any complexity upper bound whatsoever. In this paper, reachability for two-dimensional VASS is shown PSPACE-complete. This improves on a previously known doubly exponential time bound established by Howell, Rosier, Huynh and Yen in~1986. The coverability and boundedness problems are also noted to be PSPACE-complete. In addition, some complexity results are given for the reachability problem in two-dimensional VASS and in integer VASS when numbers are encoded in unary.} }
@inproceedings{ACR-acsd15, address = {Brussels, Belgium}, month = jun, year = 2015, publisher = {{IEEE} Computer Society Press}, editor = {Haar, Stefan and Meyer, Roland}, acronym = {{ACSD}'15}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'15)}, author = {Andr{\'e}, {\'E}tienne and Chatain, {\relax Th}omas and Rodr{\'\i}guez, C{\'e}sar}, title = {Preserving Partial Order Runs in Parametric Time {P}etri Nets}, pages = {120-129}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACR-acsd15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACR-acsd15.pdf}, doi = {10.1109/ACSD.2015.16}, abstract = {Parameter synthesis for timed systems aims at deriving parameter valuations satisfying a given property. In this paper we target concurrent systems; it is well known that concurrency is a source of state-space explosion, and partial order techniques were defined to cope with this problem. Here we use partial order semantics for parametric time Petri nets as a way to significantly enhance the result of an existing synthesis algorithm. Given a reference parameter valuation, our approach synthesizes other valuations preserving, up to interleaving, the behavior of the reference parameter valuation. We show the applicability of our approach using acyclic asynchronous circuits.} }
@inproceedings{CHKS-pn15, address = {Brussels, Belgium}, month = jun, year = 2015, volume = {9115}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Devillers, Raymond and Valmari, Antti}, acronym = {{PETRI~NETS}'15}, booktitle = {{P}roceedings of the 36th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'15)}, author = {Chatain, {\relax Th}omas and Haar, Stefan and Koutny, Maciej and Schwoon, Stefan}, title = {Non-Atomic Transition Firing in Contextual Nets}, pages = {117-136}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CHKS-pn15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CHKS-pn15.pdf}, doi = {10.1007/978-3-319-19488-2_6}, abstract = {The firing rule for Petri nets assumes instantaneous and simultaneous consumption and creation of tokens. In the context of ordinary Petri nets, this poses no particular problem because of the system's asynchronicity, even if token creation occurs later than token consumption in the firing. With read arcs, the situation changes, and several different choices of semantics are possible. The step semantics introduced by Janicki and Koutny can be seen as imposing a two-phase firing scheme: first, the presence of the required tokens is checked, then consumption and production of tokens happens. Pursuing this approach further, we develop a more general framework based on explicitly splitting the phases of firing, allowing to synthesize coherent steps. This turns out to define a more general non-atomic semantics, which has important potential for safety as it allows to detect errors that were missed by the previous semantics. Then we study the characterization of partial-order processes feasible under one or the other semantics.} }
@incollection{BH-im15, year = 2015, publisher = {CNRS \'Editions}, editor = {Ollinger, Nicolas}, booktitle = {Informatique Math{\'e}matique. Une~photographie en~2015}, author = {Bertrand, Nathalie and Haddad, Serge}, title = {Contr{\^o}le, probabilit{\'e}s et observation partielle}, chapter = 5, pages = {177-227}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BH-im15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BH-im15.pdf} }
@article{DDS-ic15, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Demri, St{\'e}phane and Dhar, Amit Kumar and Sangnier, Arnaud}, title = {Taming Past {LTL} and Flat Counter Systems}, volume = {242}, month = jun, year = 2015, pages = {306-339}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-ic15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-ic15.pdf}, doi = {10.1016/j.ic.2015.03.007}, abstract = {Reachability and LTL model-checking problems for flat counter systems are known to be decidable but whereas the reachability problem can be shown in NP, the best known complexity upper bound for the latter problem is made of a tower of several exponentials. Herein, we show that this problem is only NP-complete even if LTL admits past-time operators and arithmetical constraints on counters. As far as past-time operators are concerned, their addition to LTL immediately leads to complications and hence an NP upper bound cannot be deduced by translating formulae into LTL and studying the problem only for this latter logic. Actually, the NP upper bound is shown by adequately combining a new stuttering theorem for Past LTL and the property of small integer solutions for quantifier-free Presburger formulae. This latter complexity bound extends known and recent results on model-checking weak Kripke structures with LTL formulae as well as reachability problems for flat counter systems. We also provide other complexity results obtained by restricting further the class of flat counter systems.} }
@article{BBDHP-peva15, publisher = {Elsevier Science Publishers}, journal = {Performance Evaluation}, author = {Ballarini, Paolo and Barbot, Beno{\^\i}t and Duflot, Marie and Haddad, Serge and Pekergin, Nihal}, title = {{HASL}: A~New Approach for Performance Evaluation and Model Checking from Concepts to Experimentation}, year = {2015}, month = aug, volume = 90, pages = {53-77}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2015-04.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2015-04.pdf}, doi = {10.1016/j.peva.2015.04.003}, abstract = {We introduce the Hybrid Automata Stochastic Language (HASL), a new temporal logic formalism for the verification of Discrete Event Stochastic Processes (DESP). HASL employs a Linear Hybrid Automaton (LHA) to select prefixes of relevant execution paths of a DESP. LHA allows rather elaborate information to be collected \emph{on-the-fly} during path selection, providing the user with powerful means to express sophisticated measures. A~formula of HASL consists of an LHA and an expression~\(Z\) referring to moments of \emph{path random variables}. A~simulation-based statistical engine is employed to obtain a confidence interval estimate of the expected value of~\(Z\). In~essence, HASL~provides a unifying verification framework where temporal reasoning is naturally blended with elaborate reward-based analysis. Moreover, we have implemented a tool, named COSMOS, for performing analysis of HASL formula for DESP modelled by Petri nets. Using this tool we have developed two detailed case studies: a flexible manufacturing system and a genetic oscillator.} }
@article{LS-tocl15, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Lazi{\'c}, Ranko and Schmitz, Sylvain}, title = {Non-Elementary Complexities for Branching~{VASS}, {MELL}, and Extensions}, volume = {16}, number = {3:20}, nopages = {}, month = jul, year = 2015, url = {http://arxiv.org/abs/1401.6785}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-tocl15.pdf}, doi = {10.1145/2733375}, abstract = {We study the complexity of reachability problems on branching extensions of vector addition systems, which allows us to derive new non-elementary complexity bounds for fragments and variants of propositional linear logic. We show that provability in the multiplicative exponential fragment is Tower-hard already in the affine case---and hence non-elementary. We match this lower bound for the full propositional affine linear logic, proving its Tower-completeness. We also show that provability in propositional contractive linear logic is Ackermann-complete.} }
@article{Schmitz-jsl15, publisher = {Association for Symbolic Logic}, journal = {Journal of Symbolic Logic}, author = {Schmitz, Sylvain}, title = {Implicational Relevance Logic is \(2\)-{ExpTime}-Complete}, volume = {81}, number = {2}, pages = {641-661}, month = jun, year = 2016, url = {http://arxiv.org/abs/1402.0705}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Schmitz-jsl15.pdf}, doi = {10.1017/jsl.2015.7}, abstract = {We show that provability in the implicational fragment of relevance logic is complete for doubly exponential time, using reductions to and from coverability in branching vector addition systems.} }
@inproceedings{FKM-syncop15, address = {London, UK}, volume = 44, series = {Open Access Series in Informatics}, month = apr, year = 2015, editor = {Andr{\'e}, {\'E}tienne and Frehse, Goran}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, acronym = {{SYNCOP}'15}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ynthesis of {C}ontinuous {P}arameters ({SYNCOP}'15)}, author = {Fribourg, Laurent and K{\"u}hne, Ulrich and Markey, Nicolas}, title = {Game-based Synthesis of Distributed Controllers for Sampled Switched Systems}, pages = {47-61}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FKM-syncop15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FKM-syncop15.pdf}, doi = {10.4230/OASIcs.SynCoP.2015.47}, abstract = {Switched systems are a convenient formalism for modeling physical processes interacting with a digital controller. Unfortunately, the formalism does not capture the distributed nature encountered e.g. in cyber-physical systems, which are organized as networks of elements interacting with each other and with local controllers. Most current methods for control synthesis can only produce a centralized controller, which is assumed to have complete knowledge of all the component states and can interact with all of them. In~this paper, we~consider a controller synthesis method based on state space decomposition, and propose a game-based approach in order to extend it within a distributed framework.} }
@inproceedings{LDRCF-syncop15, address = {London, UK}, volume = 44, series = {Open Access Series in Informatics}, month = apr, year = 2015, editor = {Andr{\'e}, {\'E}tienne and Frehse, Goran}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, acronym = {{SYNCOP}'15}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ynthesis of {C}ontinuous {P}arameters ({SYNCOP}'15)}, author = {Le{~}Co{\"e}nt, Adrien and De{~}Vuyst, Florian and Rey, {\relax Ch}ristian and Chamoin, Ludovic and Fribourg, Laurent}, title = {Guaranteed control of switched control systems using model order reduction and state-space bisection}, pages = {32-46}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LDCRF-syncop15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LDCRF-syncop15.pdf}, doi = {10.4230/OASIcs.SynCoP.2015.32}, abstract = {This paper considers discrete-time linear systems controlled by a quantized law, i.e., a piecewise constant time function taking a finite set of values. We show how to generate the control by, first, applying model reduction to the original system, then using a {"}state-space bisection{"} method for synthesizing a control at the reduced-order level, and finally computing an upper bound to the deviations between the controlled output trajectories of the reduced-order model and those of the original model. The effectiveness of our approach is illustrated on several examples of the literature.} }
@inproceedings{ACD-post15, address = {London, UK}, month = apr, year = 2015, volume = {9036}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Focardi, Riccardo and Myers, Andrew}, acronym = {{POST}'15}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'15)}, author = {Arapinis, Myrto and Cheval, Vincent and Delaune, St{\'e}phanie}, title = {Composing security protocols: from confidentiality to privacy}, pages = {324-343}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-post15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-post15.pdf}, doi = {10.1007/978-3-662-46666-7_17}, abstract = {Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus.\par Relying on these composition results, we derive some security properties on a protocol from the security analysis performed on each of its sub-protocols individually. We consider parallel composition and the case of key-exchange protocols. Our results apply to deal with confidentiality but also privacy-type properties (e.g. anonymity) expressed using a notion of equivalence. We illustrate the usefulness of our composition results on protocols from the 3G phone application and electronic passport.} }
@techreport{KNS-arxiv14, author = {Karandikar, Prateek and Niewerth, Matthias and Schnoebelen, {\relax Ph}ilippe}, title = {On the state complexity of closures and interiors of regular languages with subwords}, institution = {Computing Research Repository}, number = {1406.0690}, year = {2014}, month = nov, type = {Research Report}, url = {http://arxiv.org/abs/1406.0690}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KNS-arxiv14.pdf}, note = {24~pages}, abstract = {We study the state complexity of the set of subwords and superwords of regular languages, and provide new lower bounds in the case of languages over a two-letter alphabet. We also consider the dual interior sets, for which the nondeterministic state complexity has a doubly-exponential upper bound. We prove a matching doubly-exponential lower bound for downward interiors in the case of an unbounded alphabet.} }
@phdthesis{scerri-phd15, author = {Scerri, Guillaume}, title = {Proofs of security protocols revisited}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2015, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/scerri-phd15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/scerri-phd15.pdf} }
@article{DD-jancl15, publisher = {Taylor \& Francis}, journal = {Journal of Applied Non-Classical Logics}, author = {Demri, St{\'e}phane and Deters, Morgan}, title = {Separation Logics and Modalities: A~Survey}, volume = 25, number = 1, pages = {50-99}, year = 2015, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-jancl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-jancl15.pdf}, doi = {10.1080/11663081.2015.1018801}, abstract = {Like modal logic, temporal logic, or description logic, separation logic has become a popular class of logical formalisms in computer science, conceived as assertion languages for Hoare-style proof systems with the goal to perform automatic program analysis. In a broad sense, separation logic is often understood as a programming language, an assertion language and a family of rules involving Hoare triples. In this survey, we present similarities between separation logic as an assertion language and modal and temporal logics. Moreover, we propose a selection of landmark results about decidability, complexity and expressive power.} }
@article{DD-tocl15, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Demri, St{\'e}phane and Deters, Morgan}, title = {Two-variable separation logic and its inner circle}, volume = 16, number = {2:15}, nopages = {}, month = mar, year = 2015, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-tocl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-tocl15.pdf}, doi = {10.1145/2724711}, abstract = {Separation logic is a well-known assertion language for Hoare-style proof systems. We show that first-order separation logic with a unique record field restricted to two quantified variables and no program variables is undecidable. This is among the smallest fragments of separation logic known to be undecidable, and this contrasts with decidability of two-variable first-order logic. We also investigate its restriction by dropping the magic wand connective, known to be decidable with non-elementary complexity, and we show that the satisfiability problem with only two quantified variables is not yet elementary recursive. Furthermore, we establish insightful and concrete relationships between two-variable separation logic and propositional in- terval temporal logic (PITL), data logics, and modal logics, providing an inner circle of closely-related logics.} }
@inproceedings{KV-icdt15, address = {Brussels, Belgium}, month = mar, year = 2015, volume = 31, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Arenas, Marcelo}, acronym = {{ICDT}'15}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'15)}, author = {Koutsos, Adrien and Vianu, Victor}, title = {Process-Centric Views of Data-Driven Business Artifacts}, pages = {247-264}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KV-icdt15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KV-icdt15.pdf}, doi = {10.4230/LIPIcs.ICDT.2015.247}, abstract = {Declarative, data-aware workflow models are becoming increasingly pervasive. While these have numerous benefits, classical process-centric specifications retain certain advantages. Workflow designers are used to development tools such as BPMN or UML diagrams, that focus on control flow. Views describing valid sequences of tasks are also useful to provide stake-holders with high-level descriptions of the workflow, stripped of the accompanying data. In this paper we study the problem of recovering process-centric views from declarative, data-aware workflow specifications in a variant of IBM's business artifact model. We focus on the simplest and most natural process-centric views, specified by finite-state transition systems, and describing regular languages. The results characterize when process-centric views of artifact systems are regular, using both linear and branching-time semantics. We also study the impact of data dependencies on regularity of the views.} }
@inproceedings{NF-icdt15, address = {Brussels, Belgium}, month = mar, year = 2015, volume = 31, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Arenas, Marcelo}, acronym = {{ICDT}'15}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'15)}, author = {Francis, Nadime}, title = {Asymptotic Determinacy of Path Queries using Union-of-Paths Views}, pages = {44-59}, note = {Best student paper award}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/NF-icdt15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NF-icdt15.pdf}, doi = {10.4230/LIPIcs.ICDT.2015.44}, abstract = {We consider the view determinacy problem over graph databases for queries defined as (possibly infinite) unions of path queries. These queries select pairs of nodes in a graph that are connected through a path whose length falls in a given set. A~view specification is a set of such queries. We~say that a view specification~\(\textbf{V}\) determines a query~\(Q\) if, for all databases~\(D\), the answers to~\(\textbf{V}\) on~\(D\) contain enough information to answer~\(Q\).\par Our main result states that, given a view~\(\textbf{V}\), there exists an explicit bound that depends on~\(\textbf{V}\) such that we can decide the determinacy problem for all queries that ask for a path longer than this bound, and provide first-order rewritings for the queries that are determined. We call this notion asymptotic determinacy. As a corollary, we can also compute the set of almost all path queries that are determined by~\(\textbf{V}\).} }
@article{AFG-sif15, publisher = {SIF}, journal = {1024~-- Bulletin de la soci{\'e}t{\'e} informatique de France}, author = {Abiteboul, Serge and Fribourg, Laurent and Goubault{-}Larrecq, Jean}, title = {{G}{\'e}rard {B}erry~: un~informaticien m{\'e}daille d'or du {CNRS}~2014}, volume = 4, pages = {139-142}, month = oct, year = 2014, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFG-sif15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFG-sif15.pdf}, abstract = {C'est un chercheur en informatique qui vient de recevoir la m{\'e}daille d'or du CNRS, la plus haute distinction scientifique fran{\c c}aise toutes disciplines confondues. Les informaticiens sont rares {\`a} avoir {\'e}t{\'e} ainsi honor{\'e}s : ce n'est que la seconde fois apr{\`e}s Jacques Stern en~2006.} }
@inproceedings{RRS-vmcai15, address = {Mumbai, India}, month = jan, year = 2015, volume = 8931, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {D'Souza, Deepak and Lal, Akash and Larsen, Kim Guldstrand}, acronym = {{VMCAI}'15}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'15)}, author = {Randour, Mickael and Raskin, Jean-Fran{\c{c}}ois and Sankur, Ocan}, title = {Variations on the Stochastic Shortest Path Problem}, pages = {1-18}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RRS-vmcai15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RRS-vmcai15.pdf}, doi = {10.1007/978-3-662-46081-8_1}, abstract = {In this invited contribution, we revisit the stochastic shortest path problem, and show how recent results allow one to improve over the classical solutions: we present algorithms to synthesize strategies with multiple guarantees on the distribution of the length of paths reaching a given target, rather than simply minimizing its expected value. The concepts and algorithms that we propose here are applications of more general results that have been obtained recently for Markov decision processes and that are described in a series of recent papers.} }
@article{VCDHRR-icomp15, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Velner, Yaron and Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, Thomas A. and Rabinovich, Alexander Moshe and Raskin, Jean-Fran{\c{c}}ois}, title = {The complexity of multi-mean-payoff and multi-energy games}, year = 2015, month = apr, volume = 241, pages = {177-196}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDRR-icomp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDRR-icomp15.pdf}, doi = {10.1016/j.ic.2015.03.001}, abstract = {In mean-payoff games, the objective of the protagonist is to ensure that the limit average of an infinite sequence of numeric weights is nonnegative. In energy games, the objective is to ensure that the running sum of weights is always nonnegative. Multi-mean-payoff and multi-energy games replace individual weights by tuples, and the limit average (resp., running sum) of each coordinate must be (resp.,~remain) nonnegative. We prove finite-memory determinacy of multi-energy games and show inter-reducibility of multi-mean-payoff and multi-energy games for finite-memory strategies. We improve the computational complexity for solving both classes with finite-memory strategies: we prove coNP-completeness improving the previous known \textsf{EXPSPACE} bound. For memoryless strategies, we show that deciding the existence of a winning strategy for the protagonist is NP-complete. We present the first solution of multi-mean-payoff games with infinite-memory strategies: we show that mean-payoff-sup objectives can be decided in \textsf{NP}{{\(\cap\)}}\textsf{coNP}, whereas mean-payoff-inf objectives are coNP-complete.} }
@article{CDRR-icomp15, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Chatterjee, Krishnendu and Doyen, Laurent and Randour, Mickael and Raskin, Jean-Fran{\c{c}}ois}, title = {Looking at Mean-Payoff and Total-Payoff through Windows}, year = 2015, month = jun, volume = 242, pages = {25-52}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDRR-icomp15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDRR-icomp15.pdf}, doi = {10.1016/j.ic.2015.03.010}, abstract = {We consider two-player games played on weighted directed graphs with mean-payoff and total-payoff objectives, two classical quantitative objectives. While for single-dimensional games the complexity and memory bounds for both objectives coincide, we show that in contrast to multi-dimensional mean-payoff games that are known to be coNP-complete, multi-dimensional total-payoff games are undecidable. We introduce conservative approximations of these objectives, where the payoff is considered over a local finite window sliding along a play, instead of the whole play. For single dimension, we show that (i)~if the window size is polynomial, deciding the winner takes polynomial time, and (ii)~the existence of a bounded window can be decided in \(\textsf{NP}\cap\textsf{coNP}\), and is at least as hard as solving mean-payoff games. For multiple dimensions, we show that (i)~the problem with fixed window size is EXPTIME-complete, and (ii)~there is no primitive-recursive algorithm to decide the existence of a bounded window.} }
@inproceedings{GLO-fps13, address = {La Rochelle, France}, month = oct, year = 2013, volume = 8352, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Danger, Jean-Luc and Debbabi, Mourad and Marion, Jean-Yves and Garcia{-}Alfaro, Joaquin and Zincir{-}Heywood,Nur}, acronym = {{FPS}'13}, booktitle = {{R}evised {S}elected {P}apers of the 6th {I}nternational {S}ymposium on {F}oundations and {P}ractice of {S}ecurity ({FPS}'13)}, author = {Goubault{-}Larrecq, Jean and Olivain, Julien}, title = {On~the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.}, pages = {3-16}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GLO-fps13.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLO-fps13.pdf}, doi = {10.1007/978-3-319-05302-8_1}, abstract = {NetEntropy is a plugin to the Orchids intrusion detection tool that is originally meant to detect some subtle attacks on implementations of cryptographic protocols such as {SSL\slash TLS}. NetEntropy compares the sample entropy of a data stream to a known profile, and flags any significant variation. Our point is to stress the \emph{mathematics} behind NetEntropy: the reason of the rather incredible precision of NetEntropy is to be found in theorems due to Paninski and Moddemeijer.} }
@inproceedings{MA-bda14, address = {Autrans, France}, month = oct, year = 2014, editor = {Gross-Amblard, David and Collet, {\relax Ch}ristine and Bobineau, {\relax Ch}ristophe and Jouanot, Fabrice}, acronym = {{BDA}'14}, booktitle = {{A}ctes de la 30{\`e}me {C}onf{\'e}rence sur la {G}estion de {D}onn{\'e}es~-- {P}rincipes, {T}echnologies et {A}pplications ({BDA}'14)}, author = {Montoya, David and Abiteboul, Serge}, title = {Inf{\'e}rence d'itin{\'e}raires multimodaux {\`a}~partir de donn{\'e}es smartphone}, pages = {38-42}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MA-bda14.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MA-bda14.pdf}, abstract = {We designed a system to infer the multimodal itineraries traveled by a user from a combination of smartphone sensor data (e.g., GPS, Wi-Fi, inertial sensors), personal information, and knowledge of the transport network topology (e.g., maps, transportation timetables). The system operates with a Multimodal Transport Network that captures the set of admissible multimodal itineraries, i.e., paths of this network with weights providing the statistics (expected time and variance) of the paths. The network takes into account public transportation schedules. Our Multimodal Transport Network is constructed from publicly available transport data of Paris and its neighbourhoods published by different transport agencies and map organizations. The system models sensor uncertainty with probabilities, and the likelihood that a multimodal itinerary was taken by the user is captured in a Dynamic Bayesian Network. For this demonstration, we captured data from users travelling over the Paris region who were asked to record data for different trips via an Android application. After uploading their data into our system, a set of most likely itineraries is computed for each trip. For each trip, the system displays recognized multimodal itineraries and their estimated likelihood over an interactive map.} }
@article{GJL-tocl15, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {G{\"o}ller, Stefan and Jung, Jean Christoph and Lohrey, Markus}, title = {The Complexity of Decomposing Modal and First-Order Theories}, volume = 16, number = {1:9}, nopages = {}, month = mar, year = 2015, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GJL-tocl15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GJL-tocl15.pdf}, doi = {10.1145/2699918}, abstract = {We study the satisfiability problem of the logic \(\textbf{K}^{2}=\textbf{K}\times\textbf{K}\), i.e., the two-dimensional variant of unimodal logic, where models are restricted to asynchronous products of two Kripke frames. Gabbay and Shehtman proved in 1998 that this problem is decidable in a tower of exponentials. So far the best known lower bound is NEXP-hardness shown by Marx and Mikul\'as in~2001.\par Our first main result closes this complexity gap: We show that satisfiability in~\(\textbf{K}^{2}\) is nonelementary. More precisely, we prove that it is \(k\)-NEXP-complete, where \(k\) is the switching depth (the~minimal modal rank among the two dimensions) of the input formula, hereby solving a conjecture of Marx and Mikul\'as. Using our lower-bound technique allows us to derive also nonelementary lower bounds for the two-dimensional modal logics \(\textbf{K}^{4}\times\textbf{K}\) and \(\textbf{S5}_{2}\times\textbf{K}\) for which only elementary lower bounds were previously known.\par Moreover, we apply our technique to prove nonelementary lower bounds for the sizes of Feferman-Vaught decompositions with respect to product for any decomposable logic that is at least as expressive as unimodal\(\textbf{K}\), generalizing a recent result by the first author and~Lin. For the three-variable fragment \(\textsf{FO}^3\) of first-order logic, we obtain the following immediate corollaries: (i)~the~size of Feferman-Vaught decompositions with respect to disjoint sum are inherently nonelementary and (ii)~equivalent formulas in Gaifman normal form are inherently nonelementary.\par Our second main result consists in providing effective elementary (more precisely, doubly exponential) upper bounds for the two-variable fragment \(\textsf{FO}^2\) of first-order logic both for Feferman-Vaught decompositions and for equivalent formulas in Gaifman normal form.} }
@misc{qcover16, author = {Blondin, Michael and Finkel, Alain and Haase, Christoph and Haddad, Serge}, title = {{QCover: an efficient coverability verifier for discrete and continuous Petri nets}}, url = {https://github.com/blondimi/qcover}, year = {2016} }
@phdthesis{theissing-PhD16, author = {Theissing, Simon}, title = {Supervision in Multi-Modal Transportation System}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = {2016}, month = dec, url = {https://tel.archives-ouvertes.fr/tel-01419126}, pdf = {https://hal.inria.fr/tel-01419126v3/document} }
@article{BCEZ-dmtcs2016, journal = {Discrete Mathematics \& Theoretical Computer Science}, author = {Brough, Tara and Ciobanu, Laura and Elder, Murray and Zetzsche, Georg}, title = {{Permutations of context-free, ET0L and indexed languages}}, volume = {17}, number = {3}, year = {2016}, month = may, pages = {167-178}, url = {https://dmtcs.episciences.org/2164}, pdf = {https://arxiv.org/pdf/1604.05431.pdf} }
@inproceedings{DLV-pods16, acronym = {{PODS}'16}, publisher = {ACM Press}, month = jun, booktitle = {{P}roceedings of the 35th {ACM} {SIGMOD-SIGACT-SIGAI} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'16)}, title = {{P}roceedings of the 35th {ACM} {SIGMOD-SIGACT-SIGAI} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'16)}, address = {San Francisco, California, USA}, abstract = {Data-driven workflows, of which IBM's Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The present work represents a significant advance on the problem of artifact verification, by considering a much richer and more realistic model than in previous work, incorporating core elements of IBM's successful Guard-Stage-Milestone model. In particular, the model features task hierarchy, concurrency, and richer artifact data. It also allows database key and foreign key dependencies, as well as arithmetic constraints. The results show decidability of verification and establish its complexity, making use of novel techniques including a hierarchy of Vector Addition Systems and a variant of quantifier elimination tailored to our context.}, author = {Deutsch, Alin and Li, Yuliang and Vianu, Victor}, pages = {179-194}, doi = {10.1145/2902251.2902275}, year = {2016} }
@inproceedings{BJ-fossacs17, address = {Uppsala, Sweden}, month = apr, year = 2017, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Murawski, Andrzej}, acronym = {{FoSSaCS}'17}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'17)}, author = {Bouyer, Patricia and Jug{\'e}, Vincent}, title = {Dynamic Complexity of the {D}yck Reachability}, pages = {265-280}, url = {https://arxiv.org/abs/1610.07499}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BJ-fossacs17.pdf}, doi = {10.1007/978-3-662-54458-7_16}, abstract = {Dynamic complexity is concerned with updating the output of a problem when the input is slightly changed. We study the dynamic complexity of Dyck reachability problems in directed and undirected graphs, where updates may add or delete edges. We show a strong dichotomy between such problems, based on the size of the Dyck alphabet. Some of them are P-complete (under a strong notion of reduction) while the others lie either in DynFO or in NL.} }
@inproceedings{BHMRZ-fossacs17, address = {Uppsala, Sweden}, month = apr, year = 2017, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Murawski, Andrzej}, acronym = {{FoSSaCS}'17}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'17)}, author = {Bouyer, Patricia and Hofman, Piotr and Markey, Nicolas and Randour, Mickael and Zimmermann, Martin}, title = {Bounding Average-energy Games}, pages = {179-195}, url = {https://arxiv.org/abs/1610.07858}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHMRZ-fossacs17.pdf}, doi = {10.1007/978-3-662-54458-7_11}, abstract = {We consider average-energy games, where the goal is to minimize the long-run average of the accumulated energy. Decidability of average-energy games with a lower-bound constraint on the energy level (but no upper bound) is an open problem; in particular, there is no known upper bound on the memory that is required for winning strategies. By reducing average-energy games with lower-bounded energy to infinite-state mean-payoff games and analyzing the frequency of low-energy configurations, we show an almost tight doubly-exponential upper bound on the necessary memory, and that the winner of average-energy games with lower-bounded energy can be determined in doubly-exponential time. We also prove EXPSPACE-hardness of this problem. Finally, we consider multi-dimensional extensions of all types of average-energy games: without bounds, with only a lower bound, and with both a lower and an upper bound on the energy. We show that the fully-bounded version is the only case to remain decidable in multiple dimensions.} }
@article{J-ijac16, publisher = {World Scientific}, journal = {International Journal of Algebra and Computation}, author = {Jug{\'e}, Vincent}, title = {The Relaxation Normal Form of Braids is Regular}, volume = {27}, number = {1}, year = {2017}, pages = {61-106}, month = feb, url = {https://arxiv.org/abs/1507.03248}, doi = {10.1142/S0218196717500059}, abstract = {Braids can be represented geometrically as laminations of punctured disks. The geometric complexity of a braid is the minimal complexity of a lamination that represents it, and tight laminations are representatives of minimal complexity. These laminations give rise to a normal form of braids, via a relaxation algorithm. We study here this relaxation algorithm and the associated normal form. We prove that this normal form is regular and prefix-closed. We provide an effective construction of a deterministic automaton that recognizes this normal form.} }
@inproceedings{BGHH-stacs17, address = {Hannover, Germany}, month = mar, year = 2017, volume = {}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Vall{\'e}e, Brigitte and Vollmer, Heribert}, acronym = {{STACS}'17}, booktitle = {{P}roceedings of the 34th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'17)}, author = {B{\"o}hm, Stanislav and G{\"o}ller, Stefan and Halfon, Simon and Hofman, Piotr}, title = {On B{\"u}chi one-counter automata}, pages = {14:1-14:13}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=7019}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7019/pdf/LIPIcs-STACS-2017-14.pdf}, doi = {10.4230/LIPIcs.STACS.2017.14}, abstract = {Equivalence of deterministic pushdown automata is a famous problem in theoretical computer science whose decidability has been shown by S{\'e}nizergues. Our first result shows that decidability no longer holds when moving from finite words to infinite words. This solves an open problem that has recently been raised by L{\"o}ding. In fact, we show that already the equivalence problem for deterministic B{\"u}chi one-counter automata is undecidable. Hence, the decidability border is rather tight when taking into account a recent result by L{\"o}ding and Repke that equivalence of deterministic weak parity pushdown automata (a subclass of deterministic B{\"u}chi pushdown automata) is decidable. Another known result on finite words is that the universality problem for vector addition systems is decidable. We show undecidability when moving to infinite words. In fact, we prove that already the universality problem for nondeterministic B{\"u}chi one-counter nets (or equivalently vector addition systems with one unbounded dimension) is undecidable.} }
@inproceedings{CG-stacs17, address = {Hannover, Germany}, month = mar, year = 2017, volume = {}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Vall{\'e}e, Brigitte and Vollmer, Heribert}, acronym = {{STACS}'17}, booktitle = {{P}roceedings of the 34th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'17)}, author = {Carayol, Arnaud and G{\"o}ller, Stefan}, title = {On long words avoiding Zimin patterns}, pages = {19:1-19:13}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=7014}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7014/pdf/LIPIcs-STACS-2017-19.pdf}, doi = {10.4230/LIPIcs.STACS.2017.19}, abstract = {A pattern is encountered in a word if some infix of the word is the image of the pattern under some non-erasing morphism. A pattern p is unavoidable if, over every finite alphabet, every sufficiently long word encounters p. A theorem by Zimin and independently by Bean, Ehrenfeucht and McNulty states that a pattern over n distinct variables is unavoidable if, and only if, p itself is encountered in the n-th Zimin pattern. Given an alphabet size k, we study the minimal length f(n,k) such that every word of length f(n,k) encounters the n-th Zimin pattern. It is known that f is upper-bounded by a tower of exponentials. Our main result states that f(n,k) is lower-bounded by a tower of n-3 exponentials, even for k=2. To the best of our knowledge, this improves upon a previously best-known doubly-exponential lower bound. As a further result, we prove a doubly-exponential upper bound for encountering Zimin patterns in the abelian sense.} }
@inproceedings{LZ-stacs17, address = {Hannover, Germany}, month = mar, year = 2017, volume = {}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Vall{\'e}e, Brigitte and Vollmer, Heribert}, acronym = {{STACS}'17}, booktitle = {{P}roceedings of the 34th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'17)}, author = {Lohrey, Markus and Zetzsche, Georg}, title = {The Complexity of Knapsack in Graph Groups}, pages = {52:1-52:14}, doi = {10.4230/LIPIcs.STACS.2017.52}, abstract = {Myasnikov et al. have introduced the knapsack problem for arbitrary finitely generated groups. In LohreyZ16 the authors proved that for each graph group, the knapsack problem can be solved in NP. Here, we determine the exact complexity of the problem for every graph group. While the problem is TC0-complete for complete graphs, it is LogCFL-complete for each (non-complete) transitive forest. For every remaining graph, the problem is NP-complete.} }
@phdthesis{mvdb-phd2016, author = {Van{ }den{ }Bogaard, Marie}, title = {Motifs de Flot d'Information dans les Jeux {\`a} Information Imparfaite}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2016, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/mvdb-phd16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/mvdb-phd16.pdf} }
@mastersthesis{m2-jacomme, author = {Jacomme, Charlie}, title = {Automated applications of Cryptographic Assumptions}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2016}, month = sep, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-jacomme.pdf} }
@mastersthesis{m2-lehaut, author = {Lehaut, Mathieu}, title = {PDL on infinite alphabet}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2016}, month = aug, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lehaut.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lehaut.pdf}, note = {19~pages} }
@article{HHMS-jcss16, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Stefan Haar and Serge Haddad and Tarek Melliti and Stefan Schwoon}, title = {Optimal constructions for active diagnosis}, pages = {101-120}, volume = {83}, number = {1}, year = {2017}, doi = {10.1016/j.jcss.2016.04.007}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHMS-jcss16.pdf}, abstract = {Diagnosis is the task of detecting fault occurrences in a partially observed sys- tem. Depending on the possible observations, a discrete-event system may be diagnosable or not. Active diagnosis aims at controlling the system to render it diagnosable. Past research has proposed solutions for this problem, but their complexity remains to be improved. Here, we solve the decision and synthesis problems for active diagnosability, proving that (1) our procedures are optimal with respect to computational complexity, and (2) the memory required for our diagnoser is minimal. We then study the delay between a fault occurrence and its detection by the diagnoser. We construct a memory-optimal diagnoser whose delay is at most twice the minimal delay, whereas the memory required to achieve optimal delay may be highly greater. We also provide a solution for parametrized active diagnosis, where we automatically construct the most permissive controller respecting a given delay.} }
@article{BKM-tocs17, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Bollig, Benedikt and Kuske, Dietrich and Mennicke, Roy}, title = {The Complexity of Model Checking Multi-Stack Systems}, volume = {60}, number = {4}, pages = {695-736}, year = {2017}, url = {http://link.springer.com/article/10.1007/s00224-016-9700-6?wt_mc=Internal.Event.1.SEM.ArticleAuthorOnlineFirst}, doi = {10.1007/s00224-016-9700-6}, abstract = {We study the linear-time model checking problem for boolean concurrent programs with recursive procedure calls. While sequential recursive programs are usually modeled as pushdown automata, concurrent recursive programs involve several processes and can be naturally abstracted as pushdown automata with multiple stacks. Their behavior can be understood as words with multiple nesting relations, each relation connecting a procedure call with its corresponding return. To reason about multiply nested words, we consider the class of all temporal logics as defined in the book by Gabbay, Hodkinson, and Reynolds. The unifying feature of these temporal logics is that their modalities are defined in monadic second-order (MSO) logic. In particular, this captures numerous temporal logics over concurrent and/or recursive programs that have been defined so far. Since the general model checking problem is undecidable, we restrict attention to phase bounded executions as proposed by La Torre, Madhusudan, and Parlato. While the MSO model checking problem in this case is non-elementary, our main result states that the model checking (and satisfiability) problem for all MSO-definable temporal logics is decidable in elementary time. More precisely, it is solvable in time exponential in the formula and (n+2)-fold exponential in the number of phases where n is the maximal level of the MSO modalities in the monadic quantifier alternation hierarchy (which is a vast improvement over the conference version of this paper from LICS 2013 where the space was also (n+2)-fold exponential in the size of the temporal formula). We complement this result and provide, for each level n, a temporal logic whose model checking problem is n-EXPSPACE-hard.} }
@article{DH-jlamp16, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Methods in Programming}, author = {Delaune, St{\'e}phanie and Hirschi, Lucca}, title = {A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols}, volume = {87}, year = {2016}, pages = {127-144}, url = {http://www.sciencedirect.com/science/article/pii/S235222081630133X}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DH-jlamp16.pdf}, doi = {10.1016/j.jlamp.2016.10.005}, note = {To~appear}, abstract = {Cryptographic protocols aim at securing communications over insecure networks such as the Internet, where dishonest users may listen to communications and interfere with them. A secure communication has a different meaning depending on the underlying application. It ranges from the confidentiality of a data to e.g. verifiability in electronic voting systems. Another example of a security notion is privacy. Formal symbolic models have proved their usefulness for analysing the security of protocols. Until quite recently, most results focused on trace properties like confidentiality or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require a notion of behavioural equivalence. Typical examples are anonymity, and privacy related properties. During the last decade, several results and verification tools have been developed to analyse equivalence-based security properties. We propose here a synthesis of decidability and undecidability results for equivalence-based security properties. Moreover, we give an overview of existing verification tools that may be used to verify equivalence-based security properties.} }
@techreport{BGMS-arxiv16, author = {Beame, Paul and Grosshans, Nathan and McKenzie, Pierre and Segoufin, Luc}, title = {Nondeterminism and an abstract formulation of {N}eciporuk's lower bound method}, institution = {Computing Research Repository}, number = {1608.01932}, year = {2016}, url = {http://arxiv.org/abs/1608.01932}, pdf = {http://arxiv.org/abs/1608.01932}, month = aug, type = {Research Report}, note = {34~pages} }
@article{BMPS-rts16, publisher = {Kluwer Academic Publishers}, journal = {Real-Time Systems}, author = {Bouyer, Patricia and Markey, Nicolas and Perrin, Nicolas and Schlehuber{-}Caissier, Philipp}, title = {Timed automata abstraction of switched dynamical systems using control funnels}, volume = {53}, number = {3}, year = {2017}, pages = {327-353}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMPS-rts16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMPS-rts16.pdf}, doi = {10.1007/s11241-016-9262-3}, abstract = {The development of formal methods for control design is an important challenge with potential applications in a wide range of safety-critical cyber-physical systems. Focusing on switched dynamical systems, we propose a new abstraction, based on time-varying regions of invariance (control funnels), that models behaviors of systems as timed automata. The~main advantage of this method is that it allows for the automated verification and reactive controller synthesis without discretizing the evolution of the state of the system. Efficient and analytic constructions are possible in the case of linear dynamics whereas bounding funnels with conjectured properties based on numerical simulations can be used for general nonlinear dynamics. We~demonstrate the potential of our approach with three examples.} }
@inproceedings{MPAS-cikm16, address = {Indianapolis, Indiana, USA}, month = oct, publisher = {ACM}, acronym = {{CIKM}'16}, booktitle = {{P}roceedings of the 25th {ACM} {I}nternational {C}onference on {I}nformation and {K}nowledge {M}anagement ({CIKM}'16)}, author = {Montoya, David and Pellissier Tanon, Thomas and Abiteboul, Serge and Suchanek, Fabian}, title = {{T}hymeflow, {A} {P}ersonal {K}nowledge {B}ase with {S}patio-temporal {D}ata}, pages = {2477-2480}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MPAS-cikm16.pdf}, year = {2016}, doi = {10.1145/2983323.2983337}, abstract = {The typical Internet user has data spread over several devices and across several online systems. We demonstrate an open-source system for integrating user's data from dierent sources into a single Knowledge Base. Our system integrates data of dierent kinds into a coherent whole, starting with email messages, calendar, contacts, and location history. It is able to detect event periods in the user's location data and align them with calendar events. We will demonstrate how to query the system within and across dierent dimensions, and perform analytics over emails, events, and locations.} }
@mastersthesis{m2-lick, author = {Lick, Anthony}, title = {Syst{\`e}mes de preuves pour logiques modales}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2016}, month = aug, url = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lick.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/m2-lick.pdf}, note = {20~pages} }
@phdthesis{blondin-phd2016, author = {Blondin, Michael}, title = {Algorithmique et complexit{\'e} des syst{\`e}mes {\`a} compteurs}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France and Universit{\'e} de Montr{\'e}al}, type = {Th{\`e}se de doctorat}, year = {2016}, month = jun, url = {https://tel.archives-ouvertes.fr/tel-01359000/} }
@phdthesis{mohamed-PhD16, author = {Mohamed, Sameh}, title = {Une m{\'e}thode topologique pour la recherche d'ensembles invariants de syst{\`e}mes continus et {\`a} commutation}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = {2016}, month = oct, url = {http://www.lsv.fr/Publis/PAPERS/PDF/mohamed-phd16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/mohamed-phd16.pdf} }
@phdthesis{C-phd2016, author = {Cauderlier, Rapha{\"e}l}, title = {{Object-Oriented Mechanisms for Interoperability between Proof Systems}}, school = {{Conservatoire National Des Arts et M{\'e}tiers, Paris}}, type = {Th{\`e}se de doctorat}, year = 2016, month = oct, url = {https://hal.inria.fr/tel-01415945/}, pdf = {https://hal.inria.fr/tel-01415945/file/main.pdf} }
@book{DGL-cup2016, author = {Demri, St{\'e}phane and Goranko, Valentin and Lange, Martin}, title = {{T}emporal {L}ogics in {C}omputer {S}cience}, publisher = {Cambridge University Press}, series = {Cambridge Tracts in Theoretical Computer Science}, volume = {58}, year = {2016}, month = oct, url = {http://www.cambridge.org/9781107028364}, isbn = {9781107028364} }
@inproceedings{HHKLL-syncop16, address = {Eindhoven, The Netherlands}, month = apr, year = 2016, volume = 220, series = {Electronic Proceedings in Theoretical Computer Science}, acronym = {{C}assting/{SYNCOP}'16}, booktitle = {{P}roceedings of the {C}assting {W}orkshop on {G}ames for the {S}ynthesis of {C}omplex {S}ystems and 3rd {I}nternational {W}orkshop on {S}ynthesis of {C}omplex {P}arameters ({C}assting/{SYNCOP}'16)}, author = {Hutagalung, Milka and Hundeshagen, Norbert and Kuske, Dietrich and Lange, Martin and Lozes, {\'{E}}tienne}, title = {Two-Buffer Simulation Games}, pages = {213-227}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-syncop16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-syncop16.pdf}, doi = {10.4204/EPTCS.220.3}, abstract = {We consider simulation games played between Spoiler and Duplicator on two B{\"u}chi automata in which the choices made by Spoiler can be buffered by Duplicator in two different buffers before she executes them on her structure. Previous work on such games using a single buffer has shown that they are useful to approximate language inclusion problems. We study the decidability and complex- ity and show that games with two buffers can be used to approximate corresponding problems on finite transducers, i.e. the inclusion problem for rational relations over infinite words.} }
@inproceedings{HHKLL-gandalf16, address = {Catania, Italy}, month = sep, year = 2016, volume = {226}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Cantone, Domenico and Delzanno, Giorgio}, acronym = {{GandALF}'16}, booktitle = {{P}roceedings of the 7th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'16)}, author = {Hutagalung, Milka and Hundeshagen, Norbert and Kuske, Dietrich and Lange, Martin and Lozes, {\'{E}}tienne}, title = {Multi-Buffer Simulations for Trace Language Inclusion}, pages = {213-227}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-gandalf16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HHKLL-gandalf16.pdf}, doi = {10.4204/EPTCS.226.15}, abstract = {We consider simulation games played between Spoiler and Duplicator on two B{\"u}chi automata in which the choices made by Spoiler can be buffered by Duplicator in several buers before she executes them on her structure. We show that the simulation games are useful to approximate the inclusion of trace closures of languages accepted by finite-state automata, which is known to be undecidable. We study the decidability and complexity and show that the game with bounded buffers can be decided in polynomial time, whereas the game with one unbounded and one bounded buffer is highly undecidable. We also show some sufficient conditions on the automata for Duplicator to win the game (with unbounded buffers).} }
@inproceedings{Halmagrand-ictac16, address = {Taipei, Taiwan}, month = oct, volume = 9965, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alves Sampaio, Cesar and Wang, Farn}, acronym = {{ICTAC}'16}, booktitle = {{P}roceedings of the 13th {I}nternational {C}olloquium on {T}heoretical {A}spects of {C}omputing ({ICTAC}'16)}, author = {Halmagrand, Pierre}, title = {{{Soundly Proving B Method Formulae Using Typed Sequent Calculus}}}, pages = {196-213}, year = {2016}, doi = {10.1007/978-3-319-46750-4_12}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Halmagrand-ictac2016.pdf}, url = {https://hal.archives-ouvertes.fr/hal-01342849}, abstract = {The B Method is a formal method mainly used in the railway industry to specify and develop safety-critical software. To guarantee the consistency of a B project, one decisive challenge is to show correct a large amount of proof obligations, which are mathematical formulae expressed in a classical set theory extended with a specific type system. To improve automated theorem proving in the B Method, we propose to use a first-order sequent calculus extended with a polymorphic type system, which is in particular the output proof-format of the tableau-based automated theorem prover Zenon. After stating some modifications of the B syntax and defining a sound elimination of comprehension sets, we propose a translation of B formulae into a polymorphic first-order logic format. Then, we introduce the typed sequent calculus used by Zenon, and show that Zenon proofs can be translated to proofs of the initial B formulae in the B proof system.} }
@techreport{PS-arxiv16, author = {Place, Thomas and Segoufin, Luc}, title = {Decidable Characterization of FO2(<, +1) and locality of {DA}}, institution = {Computing Research Repository}, number = {1606.03217}, year = {2016}, url = {http://arxiv.org/abs/1606.03217}, pdf = {http://arxiv.org/abs/1606.03217}, month = jun, type = {Research Report}, note = {8~pages} }
@article{JSD-lmcs16, journal = {Logical Methods in Computer Science}, author = {Jacquemard, Florent and Segoufin, Luc and Dimino, Jer{\'{e}}mie}, title = {FO2(<, +1,{\textasciitilde}) on data trees, data tree automata and branching vector addition systems}, volume = {12}, number = {2}, pages = {1-28}, year = {2016}, url = {http://www.lmcs-online.org/ojs/viewarticle.php?id=1789&layout=abstract}, doi = {10.2168/LMCS-12(2:3)2016}, pdf = {https://arxiv.org/pdf/1601.01579.pdf}, abstract = {} }
@techreport{arxiv16-BFMK, author = {Blondin, Michael and Finkel, Alain and McKenzie, Pierre}, title = {Well Behaved Transition Systems}, institution = {Computing Research Repository}, number = {1608.02636}, year = {2016}, month = aug, type = {Research Report}, url = {http://arxiv.org/abs/1608.02636}, pdf = {http://arxiv.org/abs/1608.02636}, note = {18~pages}, abstract = {The well-quasi-ordering (i.e., a well-founded quasi-ordering such that all antichains are finite) that defines well-structured transition systems (WSTS) is shown not to be the weakest hypothesis that implies decidability of the coverability problem. We show coverability decidable for monotone transition systems that only require the absence of infinite antichains and call well behaved transitions systems (WBTS) the new strict superclass of the class of WSTS that arises. By contrast, we confirm that boundedness and termination are undecidable for WBTS under the usual hypotheses, and show that stronger monotonicity conditions can enforce decidability. Proofs are similar or even identical to existing proofs but the surprising message is that a hypothesis implicitely assumed minimal for twenty years in the theory of WSTS can meaningfully be relaxed, allowing more orderings to be handled in an abstract way.} }
@inproceedings{vDCC-EMISA16, address = {Vienna, Austria}, month = oct, publisher = {{CEUR-WS.org}}, volume = {1701}, series = {{CEUR} Workshop Proceedings}, editor = {Rinderle-Ma, Stefanie and Mendling, Jan}, acronym = {{EMISA}'16}, booktitle = {{P}roceedings of the 7th {I}nt. {W}orkshop on {E}nterprise {M}odelling and {I}nformation {S}ystems {A}rchitectures ({EMISA}'16)}, author = {van Dongen, Boudewijn and Carmona, Josep and Chatain, {\relax Th}omas}, title = {{Alignment-based Quality Metrics in Conformance Checking}}, pages = {87-90}, year = {2016}, doi = {}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/vanDongen-EMISA16.pdf}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/vanDongen-EMISA16.pdf}, abstract = {The holy grail in process mining is a process discovery algorithm that, given an event log, produces fitting, precise, properly generalizing and simple process models. Within the field of process mining, conformance checking is considered to be anything where observed behaviour, e.g., in the form of event logs or event streams, needs to be related to already modelled behaviour. In the conformance checking domain, the relation between an event log and a model is typically quantified using fitness, precision and generalization. In this paper, we present metrics for fitness, precision and generalization, based on alignments and the newer concept named anti-alignments.} }
@article{GLSSW-dagrep16, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, journal = {Dagstuhl Reports}, author = {Goubault{-}Larrecq, Jean and Seisenberger, Monika and Selivanov, Victor and Weiermann, Andreas}, title = {Well {Q}uasi-{O}rders in {C}omputer {S}cience ({D}agstuhl {S}eminar 16031)}, year = 2016, month = jan, volume = {6}, number = {1}, pages = {69-98}, url = {http://dx.doi.org/10.4230/DagRep.6.1.69}, pdf = {http://dx.doi.org/10.4230/DagRep.6.1.69}, doi = {10.4230/DagRep.6.1.69}, abstract = {This report documents the program and the outcomes of Dagstuhl Seminar 16031 {"}Well Quasi{-}Orders in Computer Science{"}, the first seminar devoted to the multiple and deep interactions between the theory of Well quasi{-}orders (known as the Wqo{-}Theory) and several fields of Computer Science (Verification and Termination of Infinite-State Systems, Automata and Formal Languages, Term Rewriting and Proof Theory, topological complexity of computational problems on continuous functions). Wqo{-}Theory is a highly developed part of Combinatorics with ever-growing number of applications in Mathematics and Computer Science, and Well quasi-orders are going to become an important unifying concept of Theoretical Computer Science. In this seminar, we brought together several communities from Computer Science and Mathematics in order to facilitate the knowledge transfer between Mathematicians and Computer Scientists as well as between established and younger researchers and thus to push forward the interaction between Wqo{-}Theory and Computer Science.} }
@inproceedings{MHP-HSB16, address = {Grenoble France}, month = oct, optvolume = 9957, series = {Lecture Notes in Computer Science}, publisher = {Springer}, opteditor = {Cinquemani, Eugenio and Donz{\'{e}, Alexandre}}, acronym = {{HSB}'16}, booktitle = {{P}roceedings of the 5th {I}nternational {W}orkshop on {H}ybrid {S}ystems {B}iology}, author = {Mandon, Hugues and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, title = {{Relationship between the Reprogramming Determinants of Boolean Networks and their Interaction Graph}}, pages = {113-127}, year = {2016}, doi = {10.1007/978-3-319-47151-8_8}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MHP-HSB16.pdf}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MHP-HSB16.pdf}, abstract = {In this paper, we address the formal characterization of tar- gets triggering cellular trans-differentiation in the scope of Boolean net- works with asynchronous dynamics. Given two fixed points of a Boolean network, we are interested in all the combinations of mutations which allow to switch from one fixed point to the other, either possibly, or in- evitably. In the case of existential reachability, we prove that the set of nodes to (permanently) flip are only and necessarily in certain connected components of the interaction graph. In the case of inevitable reachabil- ity, we provide an algorithm to identify a subset of possible solutions.} }
@inproceedings{GLL-rv16, address = {Madrid, Spain}, volume = 10012, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Madrid, Spain}, acronym = {{RV}'16}, booktitle = {{P}roceedings of the 16th {C}onference on {R}untime {V}erification ({RV}'16)}, author = {Goubault{-}Larrecq, Jean and Lachance, Jean{-}Philippe}, title = {On the {C}omplexity of {M}onitoring {O}rchids {S}ignatures}, year = 2016, month = sep, pages = {169-164}, opturl = {http://link.springer.com/chapter/10.1007%2F978-3-319-46982-9_11}, optpdf = {http://link.springer.com/chapter/10.1007%2F978-3-319-46982-9_11}, doi = {10.1007/978-3-319-46982-9_11}, abstract = {Modern monitoring tools such as our intrusion detection tool Orchids work by firing new monitor instances dynamically. Given an Orchids signature (a.k.a. a rule, a specification), what is the complexity of checking that specification, that signature? In other words, let f(n) be the maximum number of monitor instances that can be fired on a sequence of n events: we design an algorithm that decides whether f(n) is asymptotically exponential or polynomial, and in the latter case returns an exponent d such that f(n)=Theta(n^d) . Ultimately, the problem reduces to the following mathematical question, which may have other uses in other domains: given a system of recurrence equations described using the operators + and max, and defining integer sequences u_n, what is the asymptotic behavior of u_n as n tends to infinity? We show that, under simple assumptions, u_n is either exponential or polynomial, and that this can be decided, and the exponent computed, using a simple modification of Tarjan’s strongly connected components algorithm, in linear time.} }
@inproceedings{KSHP-sasb16, address = {Edinburgh, UK}, month = sep, missingnumber = {2}, missingvolume = {}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, acronym = {{SASB}'16}, booktitle = {{P}roceedings of {T}he {S}eventh {I}nternational {W}orkshop on {S}tatic {A}nalysis and {S}ystems {B}iology (SASB 2016)}, title = {{Unfolding of Parametric Logical Regulatory Networks}}, author = {Kolc{\'a}k, Juraj and {\v S}afr{\'a}nek, David and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, year = {2016}, note = {To appear}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KSHP-SASB16.pdf}, url = {https://hal.archives-ouvertes.fr/hal-01354109}, abstract = {In systems biology, models of cellular regulatory processes such as gene regulatory networks or signalling pathways are crucial to understanding the behaviour of living cells. Available biological data are however often insufficient for full model specification. In this paper, we focus on partially specified models where the missing information is abstracted in the form of parameters. We introduce a novel approach to analysis of parametric logical regulatory networks addressing both sources of combinatoric explosion native to the model. First, we introduce a new compact representation of admissible parameters using Boolean lattices. Then, we define the unfolding of parametric regulatory networks. The resulting structure provides a partial- order reduction of concurrent transitions, and factorises the common transitions among the concrete models. A comparison is performed against state-of-the-art approaches to parametric model analysis.} }
@article{KGHPAJRHH-tpnomc2016, publisher = {Springer}, journal = {Transactions on Petri Nets and Other Models of Concurrency}, author = {Kordon, Fabrice and Garavel, Hubert and Hillah, Lom{-}Messan and Paviot{-}Adet, Emmanuel and Jezequel, Lo{\"{\i}}g and Rodr{\'{\i}}guez, C{\'{e}}sar and Hulin{-}Hubard, Francis }, title = {{MCC}'2015 - {T}he {F}ifth {M}odel {C}hecking {C}ontest}, volume = {11}, pages = {262-273}, year = {2016}, url = {http://dx.doi.org/10.1007/978-3-662-53401-4_12}, doi = {10.1007/978-3-662-53401-4_12}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KGHPAJRHH-tpnomc2016.pdf} }
@article{ADFLP-fi2016, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Abdulla, Parosh Aziz and Demri, St{\'e}phane and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Potapov, Igor}, editor = {Abdulla, Parosh Aziz and Demri, St{\'e}phane and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Potapov, Igor}, number = {3--4}, title = {Selected papers of Reachability Problems Workshop 2012 (Bordeaux) and 2013 (Uppsala)}, url = {http://content.iospress.com/journals/fundamenta-informaticae/143/3-4}, volume = {143}, year = {2016} }
@proceedings{BDM-aiml16, title = {{P}roceedings of the 11th {C}onference on {A}dvances in {M}odal {L}ogic ({AiML}'16)}, booktitle = {{P}roceedings of the 11th {C}onference on {A}dvances in {M}odal {L}ogic ({AiML}'16)}, acronym = {{AiML}'16}, editor = {Beklemishev, Lev and Demri, St{\'e}phane and Mat{\'e}, Andr{\'a}s}, publisher = {College Publications}, year = 2016, month = sep, address = {Budapest, Hungary}, url = {http://www.collegepublications.co.uk/aiml/?00008} }
@inproceedings{Bollig-fsttcs16, address = {Chennai, India}, month = dec, year = 2016, volume = {65}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {S. Akshay and Akash Lal and Saket Saurabh and Sandeep Sen}, acronym = {{FSTTCS}'16}, booktitle = {{P}roceedings of the 36th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'16)}, author = {Bollig, Benedikt}, title = {One-Counter Automata with Counter Observability}, pages = {20:1-20:14}, url = {http://drops.dagstuhl.de/opus/volltexte/2016/6855/}, doi = {10.4230/LIPIcs.FSTTCS.2016.20}, abstract = {In a one-counter automaton (OCA), one can produce a letter from some finite alphabet, increment and decrement the counter by one, or compare it with constants up to some threshold. It is well-known that universality and language inclusion for OCAs are undecidable. In this paper, we consider OCAs with counter observability: Whenever the automaton produces a letter, it outputs the current counter value along with it. Hence, its language is now a set of words over an infinite alphabet. We show that universality and inclusion for that model are PSPACE-complete, thus no harder than the corresponding problems for finite automata. In fact, by establishing a link with visibly one-counter automata, we show that OCAs with counter observability are effectively determinizable and closed under all boolean operations. Moreover, it turns out that they are expressively equivalent to strong automata, in which transitions are guarded by MSO formulas over the natural numbers with successor.} }
@proceedings{FM-formats16, title = {{P}roceedings of the 14th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'16)}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'16)}, acronym = {{FORMATS}'16}, editor = {Fr{\"a}nzle, Martin and Markey, Nicolas}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {9884}, doi = {10.1007/978-3-319-44878-7}, url = {http://link.springer.com/book/10.1007/978-3-319-44878-7}, year = 2016, month = aug, address = {Qu\'ebec City, Canada} }
@proceedings{BDJMS-casstingsyncop16, title = {{P}roceedings of the {C}assting Workshop on {G}ames for the {S}ynthesis of {C}omplex {S}ystems ({C}assting'16) and of the 3rd {I}nternational {W}orkshop on {S}ynthesis of {C}omplex {P}arameters ({S}yn{C}o{P}'16)}, booktitle = {{P}roceedings of the {C}assting Workshop on {G}ames for the {S}ynthesis of {C}omplex {S}ystems ({C}assting'16) and of the 3rd {I}nternational {W}orkshop on {S}ynthesis of {C}omplex {P}arameters ({S}yn{C}o{P}'16)}, acronym = {{C}assting{{\slash}}{S}yn{C}o{P}'16}, editor = {Brihaye, {\relax Th}omas and Delahaye, Beno{\^\i}t and Jezequel, Lo{\"\i}g and Markey, Nicolas and Srba, Ji{\v{r}}{\'i}}, doi = {10.4204/EPTCS.220}, url = {http://eptcs.web.cse.unsw.edu.au/content.cgi?CASSTINGSynCoP2016}, series = {Electronic Proceedings in Theoretical Computer Science}, volume = 220, year = 2016, month = jul, address = {Eindhoven, The~Netherlands} }
@incollection{BFLMOW-hmc18, author = {Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim G. and Markey, Nicolas and Ouaknine, Jo{\"e}l and Worrell, James}, title = {Model Checking Real-Time Systems}, booktitle = {Handbook of Model Checking}, editor = {Clarke, Ed and Henzinger, Tom and Veith, Helmut}, publisher = {Springer}, year = 2018, pages = {1001-1046}, nochapter = {29}, doi = {10.1007/978-3-319-10575-8_29}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLMOW-hmc17.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLMOW-hmc17.pdf}, isbn = {978-3-319-10574-1}, abstract = {This chapter surveys timed automata as a formalism for model checking real-time systems. We begin with introducing the model, as an extension of finite-state automata with real-valued variables for measuring time. We then present the main model-checking results in this framework, and give a hint about some recent extensions (namely weighted timed automata and timed games).} }
@inproceedings{BMS-gandalf16, address = {Catania, Italy}, month = sep, year = 2016, volume = {226}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Cantone, Domenico and Delzanno, Giorgio}, acronym = {{GandALF}'16}, booktitle = {{P}roceedings of the 7th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'16)}, author = {Bouyer, Patricia and Markey, Nicolas and Stan, Daniel}, title = {Stochastic Equilibria under Imprecise Deviations in Terminal-Reward Concurrent Games}, pages = {61-75}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-gandalf16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-gandalf16.pdf}, doi = {10.4204/EPTCS.226.5}, abstract = {We study the existence of mixed-strategy equilibria in concurrent games played on graphs. While existence is guaranteed with safety objectives for each player, Nash equilibria need not exist when players are given arbitrary terminal-reward objectives, and their existence is undecidable with qualitative reachability objectives (and~only three players). However, these results rely on the fact that the players can enforce infinite plays while trying to improve their payoffs. In this paper, we introduce a relaxed notion of equilibria, where deviations are imprecise. We prove that contrary to Nash equilibria, such (stationary) equilibria always exist, and we develop a PSPACE algorithm to compute one.} }
@inproceedings{Finkel-rp16, address = {Aalborg, Denmark}, month = sep, year = 2016, volume = {9899}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}}, acronym = {{RP}'16}, booktitle = {{P}roceedings of the 10th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)}, author = {Finkel, Alain}, title = {The Ideal Theory for {WSTS}}, pages = {1-22}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Finkel-rp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Finkel-rp16.pdf}, doi = {10.1007/978-3-319-45994-3_1}, abstract = {We begin with a survey on well structured transition systems and, in particular, we present the ideal framework [FG09a, BFM14] which was recently used to obtain new deep results on Petri nets and extensions. We argue that the theory of ideals prompts a renewal of the theory of WSTS by providing a way to define a new class of monotonic systems, the so-called Well Behaved Transition Systems, which properly contains WSTS, and for which coverability is still decidable by a forward algorithm. We then recall the completion of WSTS which leads to defining a conceptual Karp-Miller procedure that terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets.} }
@inproceedings{ABDL-rp16, address = {Aalborg, Denmark}, month = sep, year = 2016, volume = {9899}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}}, acronym = {{RP}'16}, booktitle = {{P}roceedings of the 10th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)}, author = {Alechina, Natasha and Bulling, Nils and Demri, St{\'e}phane and Logan, Brian}, title = {On the Complexity of Resource-Bounded Logics}, pages = {36-50}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDL-rp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDL-rp16.pdf}, doi = {10.1007/978-3-319-45994-3_3}, abstract = {We revisit decidability results for resource-bounded logics and use decision problems on VASS to establish complexity characterisation of (decidable) model-checking problems. We show that the model-checking problem for the logic RB\(\pm\)ATL is 2EXPTIME-complete by using recent results on alternating VASS. Moreover, we establish that the model-checking problem for RBTL is EXPSPACE-complete and that the problem is decidable and of the same complexity for RBTL\textsuperscript{*}, proving a new decidability result as a by-product of the approach. We establish that the model-checking problem for RB\(\pm\)ATL\textsuperscript{*}, the extension of RB\(\pm\)ATL with arbitrary path formulae is decidable by a reduction into parity games. We are also able to synthesise values for resource parameters. Hence, the paper establishes formal correspondences between model-checking problems and decision problems on alternating VASS, paving the way to more applications.} }
@inproceedings{LFS-rp16, address = {Aalborg, Denmark}, month = sep, year = 2016, volume = {9899}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}}, acronym = {{RP}'16}, booktitle = {{P}roceedings of the 10th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)}, author = {Le{~}Co{\"e}nt, Adrien and Fribourg, Laurent and Soulat, Romain}, title = {Compositional analysis of Boolean networks using local fixed-point iterations}, pages = {134-147}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LFS-rp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LFS-rp16.pdf}, doi = {10.1007/978-3-319-45994-3_10}, abstract = {We present a compositional method which allows to over-approximate the set of attractors and under-approximate the set of basins of attraction of a Boolean network~(BN). This merely consists in replacing a global fixed-point computation by a composition of local fixed-point computations. Once these approximations have been computed, it~becomes much more tractable to generate the exact sets of attractors and basins of attraction. We illustrate the interest of our approach on several examples, among which is a BN modeling a railway interlocking system with 50 nodes and millions of attractors.} }
@inproceedings{LFMDC-rp16, address = {Aalborg, Denmark}, month = sep, year = 2016, volume = {9899}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Larsen, Kim G. and Srba, Ji{\v{r}}{\'\i}}, acronym = {{RP}'16}, booktitle = {{P}roceedings of the 10th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'16)}, author = {Le{~}Co{\"e}nt, Adrien and Fribourg, Laurent and Markey, Nicolas and De{~}Vuyst, Florian and Chamoin, Ludovic}, title = {Distributed Synthesis of State-Dependent Switching Control}, pages = {119-133}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LFMDC-rp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LFMDC-rp16.pdf}, doi = {10.1007/978-3-319-45994-3_9}, abstract = {We present a correct-by-design method of state-dependent control synthesis for linear discrete-time switching systems. Given an objective region~\(R\) of the state space, the method builds a capture set~\(S\) and a control which steers any element of~\(S\) into~\(R\). The method works by iterated backward reachability from~\(R\). More precisely, \(S\)~is given as a parametric extension of~\(R\), and the maximum value of the parameter is solved by linear programming. The method can also be used to synthesize a stability control which maintains indefinitely within~\(R\) all the states starting at~\(R\). We~explain how the synthesis method can be performed in a distributed manner. The method has been implemented and successfully applied to the synthesis of a distributed control of a concrete floor heating system with 11 rooms and \(2^11 = 2048\) switching modes.} }
@article{BMRLL-acta16, publisher = {Springer}, journal = {Acta Informatica}, author = {Bouyer, Patricia and Markey, Nicolas and Randour, Mickael and Larsen, Kim G. and Laursen, Simon}, title = {Average-energy games}, volume = {55}, number = {2}, year = 2018, month = jul, pages = {91-127}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMRLL-acta16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMRLL-acta16.pdf}, doi = {10.1007/s00236-016-0274-1}, abstract = {Two-player quantitative zero-sum games provide a natural framework to synthesize controllers with performance guarantees for reactive systems within an uncontrollable environment. Classical settings include mean-payoff games, where the objective is to optimize the long-run average gain per action, and energy games, where the system has to avoid running out of energy. We study average-energy games, where the goal is to optimize the long-run average of the accumulated energy. We show that this objective arises naturally in several applications, and that it yields interesting connections with previous concepts in the literature. We prove that deciding the winner in such games is in NP coNP and at least as hard as solving mean-payoff games, and we establish that memoryless strategies suffice to win. We also consider the case where the system has to minimize the average-energy while maintaining the accumulated energy within predefined bounds at all times: this corresponds to operating with a finite-capacity storage for energy. We give results for one-player and two-player games, and establish complexity bounds and memory requirements.} }
@inproceedings{HT-pasm16, address = {M{\"u}nster, Germany}, month = apr, year = 2016, volume = {327}, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Haverkort, Boudewijn and Knottenbelt, William and Remke, Anne and Thomas, Nigel}, booktitle = {{P}roceedings of the 8th {I}nternational {W}orkshop on {P}ractical {A}pplications of {S}tochastic {M}odelling ({PASM}'16)}, author = {Haar, Stefan and Theissing, Simon}, title = {Forecasting Passenger Loads in Transportation Networks}, pages = {49-69}, url = {https://hal.inria.fr/hal-01259585}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-pasm16.pdf}, doi = {10.1016/j.entcs.2016.09.023}, abstract = {This work is part of an ongoing effort to understand the dynamics of passenger loads in modern, multimodal transportation networks (TNs) and to mitigate the impact of perturbations. The challenge is that the percentage of passengers at any given point of the TN that have a certain destination, i.e. their distribution over different trip profiles, is unknown. We introduce a stochastic hybrid automaton model for multimodal TNs that allows to compute how such probabilistic load vectors are propagated through the TN, and develop a computation strategy for forecasting the network's load a certain time into the future.} }
@misc{vip-D42, author = {Delaune, St{\'e}phanie and Gazeau, Ivan}, howpublished = {Deliverable VIP~4.2 (ANR-11-JS02-0006)}, month = jun, note = {5~pages}, type = {Contract Report}, title = {Combination issues}, year = {2016}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d42.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d42.pdf} }
@misc{vip-D22, author = {Delaune, St{\'e}phanie and Gazeau, Ivan}, howpublished = {Deliverable VIP~2.2 (ANR-11-JS02-0006)}, month = jun, note = {8~pages}, type = {Contract Report}, title = {Results on the case studies}, year = {2016}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d22.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/vip-d22.pdf} }
@techreport{HT-hal16, author = {Haar, Stefan and Theissing, Simon}, title = {A~Passenger-centric Multi-agent System Model for Multimodal Public Transportation}, institution = {HAL-inria}, number = {hal-01322956}, month = may, year = {2016}, type = {Research Report}, url = {https://hal.inria.fr/hal-01322956}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-hal16.pdf}, note = {12~pages}, abstract = {If we want to understand how perturbations spread across a multi-modal public transportation system, we have to include passenger flows into the model and the analysis. Indeed, in general no two different lines in such a system are physically connected directly, or share tracks or other resources. Rather, they are connected by passengers changing lines and thus transmit perturbations from one line or mode to another. We present a formal passenger-centric multi-agent system model that can capture (i)~individual and possibly multi-modal trip profiles with branches resulting from different decision outcomes, (ii)~the~movement of fixed-route operated transportation means, and (iii)~in-vehicle and in-station capacity constraints. The model is based on a nets-within-nets approach with Petri nets as the basic building entities. Thus, it has a convenient graphical representation, and the possibility of execution.} }
@inproceedings{HT-qest16, address = {Qu{\'e}bec City, Canada}, month = aug, year = 2016, volume = {9826}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Agha, Gul and Van{~}Houdt, Benny}, acronym = {{QEST}'16}, booktitle = {{P}roceedings of the 13th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'16)}, author = {Haar, Stefan and Theissing, Simon}, title = {Decoupling Passenger Flows for Improved Load Prediction}, pages = {364-379}, url = {https://hal.inria.fr/hal-01330136}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-qest16.pdf}, doi = {10.1007/978-3-319-43425-4_24}, abstract = {This paper continues our work on perturbation analysis of multimodal transportation networks~(TNs) by means of a stochastic hybrid automaton~(SHA) model. We focus here on the approximate computation , in particular on the major bottleneck consisting in the high dimensionality of systems of stochastic differential balance equations (SDEs) that define the continuous passenger-flow dynamics in the different modes of the SHA model. In fact, for every pair of a mode and a station, one system of coupled SDEs relates the passenger loads of all discrete points such as platforms considered in this station, and all vehicles docked to it, to the passenger flows in between. In general, such an SDE system has many dimensions, which makes its numerical computation and thus the approximate computation of the SHA model intractable. We show how these systems can be canonically replaced by lower-dimensional ones, by decoupling the passenger flows inside every mode from one another. We prove that the resulting approximating passenger-flow dynamics converges to the original one, if the replacing set of balance equations set up for all decoupled passenger flows communicate their results among each other in vanishing time intervals.} }
@inproceedings{HT-acc16, address = {Boston, Massachusetts, USA}, month = jul, year = 2016, publisher = {{IEEE} Control System Society}, acronym = {{ACC}'16}, booktitle = {{P}roceedings of the 35th {A}merican {C}ontrol {C}onference ({ACC}'16)}, author = {Haar, Stefan and Theissing, Simon}, title = {Predicting Traffic Load in Public Transportation Networks}, pages = {821-826}, url = {https://hal.inria.fr/hal-01329632}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HT-acc16.pdf}, doi = {10.1109/ACC.2016.7525015}, abstract = {This work is part of an ongoing effort to understand the dynamics of passenger loads in modern, multimodal transportation networks (TNs) and to mitigate the impact of perturbations, under the restrictions that the precise number of passengers in some point of the TN that intend to reach a certain destination (i.e. their distribution over different trip profiles) is unknown. We introduce an approach based on a stochastic hybrid automaton model for a TN that allows to compute how such probabilistic load vectors are propagated through the TN, and develop a computation strategy for forecasting the network's load a certain time in the future.} }
@inproceedings{FHLM-wodes16, address = {Xi'an, China}, month = may # {-} # jun, year = 2016, publisher = {{IEEE} Control System Society}, editor = {Cassandras, Christos G. and Giua, Alessandro}, acronym = {{WODES}'16}, booktitle = {{P}roceedings of the 13th {W}orkshop on {D}iscrete {E}vent {S}ystems ({WODES}'16)}, author = {Fabre, {\'E}ric and H{\'e}lou{\"e}t, Lo{\"i}c and Lefaucheux, Engel and Marchand, Herv{\'e}}, title = {Diagnosability of Repairable Faults}, pages = {230-236}, url = {https://hal.inria.fr/hal-01302562}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FHLM-wodes16.pdf}, doi = {10.1109/WODES.2016.7497853}, abstract = {The diagnosis problem for discrete event systems consists in deciding whether some fault event occurred or not in the system, given partial observations on the run of that system. Diagnosability checks whether a correct diagnosis can be issued in bounded time after a fault, for all faulty runs of that system. This problem appeared two decades ago and numerous facets of it have been explored, mostly for permanent faults. It is known for example that diagnosability of a system can be checked in polynomial time, while the construction of a diagnoser is exponential. The present paper examines the case of transient faults, that can appear and be repaired. Diagnosability in this setting means that the occurrence of a fault should always be detected in bounded time, but also before the fault is repaired. Checking this notion of diagnosability is proved to be PSPACE-complete. It is also shown that faults can be reliably counted provided the system is diagnosable for faults and for repairs.} }
@inproceedings{vDCC-bpm16, address = {Rio de Janeiro, Brazil}, month = sep, year = 2016, volume = {9850}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {La{~}Rosa, Marcello and Loos, Peter and Pastor, Oscar}, acronym = {{BPM}'16}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {B}usiness {P}rocess {M}anagement ({BPM}'16)}, author = {van Dongen, Boudewijn F. and Carmona, Josep and Chatain, {\relax Th}omas}, title = {A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments}, pages = {39-56}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/vDCC-bpm16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/vDCC-bpm16.pdf}, doi = {10.1007/978-3-319-45348-4_3}, abstract = {The holy grail in process mining is an algorithm that, given an event log, produces fitting, precise, properly generalizing and simple process models. While there is consensus on the existence of solid metrics for fitness and simplicity, current metrics for precision and generalization have important flaws, which hamper their applicability in a general setting. In this paper, a novel approach to measure precision and generalization is presented, which relies on the notion of anti-alignments. An anti-alignment describes highly deviating model traces with respect to observed behavior. We propose metrics for precision and generalization that resemble the leave-one-out cross-validation techniques, where individual traces of the log are removed and the computed anti-alignment assess the model's capability to describe precisely or generalize the observed behavior.} }
@inproceedings{KS-csl16, address = {Marseille, France}, month = sep, year = 2016, volume = {62}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Regnier, Laurent and Talbot, Jean-Marc}, acronym = {{CSL}'16}, booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'16)}, author = {Prateek Karandikar and Schnoebelen, {\relax Ph}ilippe}, title = {The height of piecewise-testable languages with applications in logical complexity}, pages = {37:1-37:22}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csl16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csl16.pdf}, doi = {10.4230/LIPIcs.CSL.2016.37}, abstract = {The height of a piecewise-testable language~\(L\) is the maximum length of the words needed to define~\(L\) by excluding and requiring given subwords. The height of~\(L\) is an important descriptive complexity measure that has not yet been investigated in a systematic way. This paper develops a series of new techniques for bounding the height of finite languages and of languages obtained by taking closures by subwords, superwords and related operations.\par As an application of these results, we show that \({\textsf{FO}}^2(A^*,\sqsubseteq)\), the two-variable fragment of the first-order logic of sequences with the subword ordering, can only express piecewise-testable properties and has elementary complexity.} }
@inproceedings{GGL-csl16, address = {Marseille, France}, month = sep, year = 2016, volume = {62}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Regnier, Laurent and Talbot, Jean-Marc}, acronym = {{CSL}'16}, booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'16)}, author = {Ganardi, Moses and G{\"o}ller, Stefan and Lohrey, Markus}, title = {On the Parallel Complexity of Bisimulation over Finite Systems}, pages = {12:1-12:17}, doi = {10.4230/LIPIcs.CSL.2016.12}, abstract = {In this paper the computational complexity of the (bi)simulation problem over restricted graph classes is studied. For trees given as pointer structures or terms the (bi)simulation problem is complete for logarithmic space or NC\(^1\), respectively. This solves an open problem from Balc{\'a}zar, Gabarr{\'o}, and S{\'a}ntha. We also show that the simulation problem is P-complete even for graphs of bounded path-width.} }
@inproceedings{DGGL-csl16, address = {Marseille, France}, month = sep, year = 2016, volume = {62}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Regnier, Laurent and Talbot, Jean-Marc}, acronym = {{CSL}'16}, booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'16)}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {The Directed Homotopy Hypothesis}, pages = {9:1-9:16}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DBS-csl16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DBS-csl16.pdf}, doi = {10.4230/LIPIcs.CSL.2016.9}, abstract = {The homotopy hypothesis was originally stated by Grothendieck: topological spaces should be {"}equivalent{"} to (weak) infinite-groupoids, which give algebraic representatives of homotopy types. Much later, several authors developed geometrizations of computational models, e.g., for rewriting, distributed systems, (homotopy) type theory etc. But an essential feature in the work set up in concurrency theory, is that time should be considered irreversible, giving rise to the field of directed algebraic topology. Following the path proposed by Porter, we state here a directed homotopy hypothesis: Grandis' directed topological spaces should be {"}equivalent{"} to a weak form of topologically enriched categories, still very close to (infinite,1)-categories. We develop, as in ordinary algebraic topology, a directed homotopy equivalence and a weak equivalence, and show invariance of a form of directed homology.} }
@inproceedings{DBS-csl16, address = {Marseille, France}, month = sep, year = 2016, volume = {62}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Regnier, Laurent and Talbot, Jean-Marc}, acronym = {{CSL}'16}, booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'16)}, author = {Amina Doumane and David Baelde and Alexis Saurin}, title = {Infinitary proof theory: the multiplicative additive case}, pages = {42:1-42:17}, doi = {10.4230/LIPIcs.CSL.2016.42}, abstract = {Infinitary and regular proofs are commonly used in fixed point logics. Being natural intermediate devices between semantics and traditional finitary proof systems, they are commonly found in completeness arguments, automated deduction, verification, etc. However, their proof theory is surprisingly underdeveloped. In particular, very little is known about the computational behavior of such proofs through cut elimination. Taking such aspects into account has unlocked rich developments at the intersection of proof theory and programming language theory. One would hope that extending this to infinitary calculi would lead, e.g., to a better understanding of recursion and corecursion in programming languages. Structural proof theory is notably based on two fundamental properties of a proof system: cut elimination and focalization. The first one is only known to hold for restricted (purely additive) infinitary calculi, thanks to the work of Santocanale and Fortier; the second one has never been studied in infinitary systems. In this paper, we consider the infinitary proof system muMALLi for multiplicative and additive linear logic extended with least and greatest fixed points, and prove these two key results. We thus establish muMALLi as a satisfying computational proof system in itself, rather than just an intermediate device in the study of finitary proof systems.} }
@inproceedings{BLS-hal15, address = {Marseille, France}, month = sep, year = 2016, volume = {62}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Regnier, Laurent and Talbot, Jean-Marc}, acronym = {{CSL}'16}, booktitle = {{P}roceedings of the 25th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'16)}, author = {Baelde, David and Lunel, Simon and Schmitz, Sylvain}, title = {A~Sequent Calculus for a Modal Logic on Finite Data Trees}, pages = {32:1-32:16}, url = {https://hal.inria.fr/hal-01191172}, doi = {10.4230/LIPIcs.CSL.2016.32}, abstract = {We investigate the proof theory of a modal fragment of XPath equipped with data (in)equality tests over finite data trees, i.e. over finite unranked trees where nodes are labelled with both a symbol from a finite alphabet and a single data value from an infinite domain. We present a sound and complete sequent calculus for this logic, which yields the optimal PSPACE complexity bound for its validity problem.} }
@inproceedings{Bouyer-mfcs16, address = {Krakow, Poland}, month = aug, year = 2016, volume = {58}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Faliszewski, Piotr and Muscholl, Anca and Niedermeier, Rolf}, acronym = {{MFCS}'16}, booktitle = {{P}roceedings of the 41st {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'16)}, author = {Bouyer, Patricia}, title = {Optimal Reachability in Weighted Timed Automata and Games}, pages = {3:1-3:3}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bouyer-mfcs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bouyer-mfcs16.pdf}, doi = {10.4230/LIPIcs.MFCS.2016.3}, abstract = {This is an overview of the invited talk delivered at the 41st International Symposium on Math- ematical Foundations of Computer Science (MFCS-2016).} }
@inproceedings{ABKMT-mfcs16, address = {Krakow, Poland}, month = aug, year = 2016, volume = {58}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Faliszewski, Piotr and Muscholl, Anca and Niedermeier, Rolf}, acronym = {{MFCS}'16}, booktitle = {{P}roceedings of the 41st {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'16)}, author = {Akshay, S. and Bouyer, Patricia and Krishna, Shankara Narayanan and Manasa, Lakshmi and Trivedi, Ashutosh }, title = {Stochastic Timed Games Revisited}, pages = {8:1-8:14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABKMT-mfcs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABKMT-mfcs16.pdf}, doi = {10.4230/LIPIcs.MFCS.2016.8}, abstract = {Stochastic timed games (STGs), introduced by Bouyer and Forejt, naturally generalize both continuous-time Markov chains and timed automata by providing a partition of the locations between those controlled by two players (Player Box and Player Diamond) with competing objectives and those governed by stochastic laws. Depending on the number of players---2,~1, or~0---subclasses of stochastic timed games are often classified as \(2\frac{1}{2}\)-player, \(1\frac{1}{2}\)-player, and \(\frac{1}{2}\)-player games where the \(\frac{1}{2}\) symbolizes the presence of the stochastic {"}nature{"} player. For STGs with reachability objectives it is known that \(1\frac{1}{2}\)-player one-clock STGs are decidable for qualitative objectives, and that \(2\frac{1}{2}\)-player three-clock STGs are undecidable for quantitative reachability objectives. This paper further refines the gap in this decidability spectrum. We show that quantitative reachability objectives are already undecidable for \(1\frac{1}{2}\)-player four-clock STGs, and even under the time-bounded restriction for \(2\frac{1}{2}\)-player five-clock~STGs. We~also obtain a class of \(1\frac{1}{2}\), \(2\frac{1}{2}\)-player STGs for which the quantitative reachability problem is decidable.} }
@inproceedings{NPR-mfcs16, address = {Krakow, Poland}, month = aug, year = 2016, volume = {58}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Faliszewski, Piotr and Muscholl, Anca and Niedermeier, Rolf}, acronym = {{MFCS}'16}, booktitle = {{P}roceedings of the 41st {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'16)}, author = {Reino Niskanen and Igor Potapov and Julien Reichert}, title = {Undecidability of Two-dimensional Robot Games}, pages = {73:1-73:13}, url = {http://arxiv.org/abs/1604.08779}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/NPR-mfcs16.pdf}, doi = {10.4230/LIPIcs.MFCS.2016.73}, abstract = {Robot game is a two-player vector addition game played on the integer lattice \(\mathbb{Z}^n\). Both players have sets of vectors and in each turn the vector chosen by a player is added to the current configuration vector of the game. One of the players, called Eve, tries to play the game from the initial configuration to the origin while the other player, Adam, tries to avoid the origin. The problem is to decide whether or not Eve has a winning strategy. In this paper we prove undecidability of the robot game in dimension two answering the question formulated by Doyen and Rabinovich in 2011 and closing the gap between undecidable and decidable cases.} }
@inproceedings{DGGL-concur16, address = {Qu{\'e}bec City, Canada}, month = aug, year = 2016, volume = {59}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha}, acronym = {{CONCUR}'16}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'16)}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {Bisimulations and unfolding in {{\(\mathcal{P}\)}}-accessible categorical models}, pages = {25:1-25:14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-concur16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGGL-concur16.pdf}, doi = {10.4230/LIPIcs.CONCUR.2016.25}, abstract = {We propose a categorical framework for bisimulations and unfoldings that unifies the classical approach from Joyal \emph{et~al.} via open maps and unfoldings. This is based on a notion of categories accessible with respect to a subcategory of path shapes, i.e., for which one can define a nice notion of trees as glueings of paths. We show that transition systems and presheaf models are instances of our framework. We also prove that in our framework, several notions of bisimulation coincide, in particular an {"}operational~one{"} akin to the standard definition in transition systems. Also, our notion of accessibility is preserved by coreflections. This also leads us to a notion of unfolding that behaves well in the accessible case: it~is a right adjoint and is a universal covering, i.e., it is initial among the morphisms that have the unique lifting property with respect to path shapes. As an application, we prove that the universal covering of a groupoid, a standard construction in algebraic topology, is an unfolding, when the category of path shapes is well chosen.} }
@inproceedings{AGS-concur16, address = {Qu{\'e}bec City, Canada}, month = aug, year = 2016, volume = {59}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha}, acronym = {{CONCUR}'16}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'16)}, author = {Akshay, S. and Paul Gastin and Krishna, Shankara Narayanan}, title = {Analyzing Timed Systems Using Tree Automata}, pages = {27:1-27:14}, url = {http://arxiv.org/abs/1604.08443}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGS-concur16.pdf}, doi = {10.4230/LIPIcs.CONCUR.2016.27}, abstract = {Timed systems, such as timed automata, are usually analyzed using their operational semantics on timed words. The classical region abstraction for timed automata reduces them to (untimed) finite state automata with the same time-abstract properties, such as state reachability. We propose a new technique to analyze such timed systems using finite tree automata instead of finite word automata. The main idea is to consider timed behaviors as graphs with matching edges capturing timing constraints. Such graphs can be interpreted in trees opening the way to tree automata based techniques which are more powerful than analysis based on word automata. The technique is quite general and applies to many timed systems. In this paper, as an example, we develop the technique on timed pushdown systems, which have recently received considerable attention. Further, we also demonstrate how we can use it on timed automata and timed multi-stack pushdown systems (with boundedness restrictions).} }
@inproceedings{BHL-concur16, address = {Qu{\'e}bec City, Canada}, month = aug, year = 2016, volume = {59}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha}, acronym = {{CONCUR}'16}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'16)}, author = {Nathalie Bertrand and Serge Haddad and Engel Lefaucheux}, title = {Diagnosis in Infinite-State Probabilistic Systems}, pages = {37:1-37:15}, url = {https://hal.inria.fr/hal-01334218}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-concur16.pdf}, doi = {10.4230/LIPIcs.CONCUR.2016.37}, abstract = {In a recent work, we introduced four variants of diagnosability (\textsf{FA}, \textsf{IA}, \textsf{FF},~\textsf{IF}) in (finite) probabilistic systems (pLTS) depending whether one considers (1)~finite or infinite runs and (2)~faulty or all runs. We studied their relationship and established that the corresponding decision problems are PSPACE-complete. A~key ingredient of the decision procedures was a characterisation of diagnosability by the fact that a random run almost surely lies in an open set whose specification only depends on the qualitative behaviour of the pLTS. Here we investigate similar issues for infinite pLTS. We~first show that this characterisation still holds for \textsf{FF}-diagnosability but with a~\(G_{\delta}\) set instead of an open set and also for \textsf{IF}-and \textsf{IA}-diagnosability when pLTS are finitely branching. We also prove that surprisingly \textsf{FA}-diagnosability cannot be characterised in this way even in the finitely branching case. Then we apply our characterisations for a partially observable probabilistic extension of visibly pushdown automata (POpVPA), yielding EXPSPACE procedures for solving diagnosability problems. In~addition, we~establish some computational lower bounds and show that slight extensions of POpVPA lead to undecidability.} }
@inproceedings{DLM-concur16, address = {Qu{\'e}bec City, Canada}, month = aug, year = 2016, volume = {59}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Desharnais, Jos{\'e}e and Jagadeesan, Radha}, acronym = {{CONCUR}'16}, booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'16)}, author = {David, Am{\'e}lie and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {On~the expressiveness of~{QCTL}}, pages = {28:1-28:15}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur16.pdf}, doi = {10.4230/LIPIcs.CONCUR.2016.28}, abstract = {QCTL extends the temporal logic CTL with quantification over atomic propositions. While the algorithmic questions for QCTL and its fragments with limited quantification depth are well-understood (e.g. satisfiability of QCTL\textsuperscript{\(k\)}, with at most \(k\) nested blocks of quantifiers, is \(k+1\)-EXPTIME-complete), very few results are known about the expressiveness of this logic. We~address such expressiveness questions in this paper. We first consider the \emph{distinguishing power} of these logics (i.e.,~their ability to separate models), their relationship with behavioural equivalences, and their ability to capture the behaviours of finite Kripke structures with so-called characteristic formulas. We then consider their \emph{expressive power} (i.e.,~their ability to express a property), showing that in terms of expressiveness the hierarchy QCTL\textsuperscript{\(k\)} collapses at level~2 (in~other terms, any~QCTL formula can be expressed using at most two nested blocks of quantifiers).} }
@inproceedings{GR-langonto16, address = {Portoro{\v{z}}, Slovenia}, editor = {Grci{\'c} Simeunovi, Larisa and Vintar, {\u{S}}pela and Khan, Fahad and Le{\'o}n Ara{\'u}z, Pilar and Faber, Pamela and Fontini, Francesca and Parvisi, Artemis and Unger, Christina}, acronym = {{LangOnto+TermiKS}'16}, booktitle = {{P}roceedings of the {J}oint 2nd {W}orkshop on {L}anguage and {O}ntology~\& {T}erminology and {K}nowledge {S}tructures ({LangOnto+TermiKS}'16)}, author = {Grefenstette, Gregory and Rafes, Karima}, title = {Transforming {W}ikipedia into an Ontology-based Information Retrieval Search Engine for Local Experts using a Third-Party Taxonomy}, year = 2016, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GR-langonto16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GR-langonto16.pdf}, note = {To appear}, abstract = {Wikipedia is widely used for finding general information about a wide variety of topics. Its vocation is not to provide local information. For~example, it~provides plot, cast, and production information about a given movie, but not showing times in your local movie theatre. Here we describe how we can connect local information to Wikipedia, without altering its content. The~case study we present involves finding local scientific experts. Using a third-party taxonomy, independent from Wikipedia's category hierarchy, we index information connected to our local experts, present in their activity reports, and we re-index Wikipedia content using the same taxonomy. The connections between Wikipedia pages and local expert reports are stored in a relational database, accessible through as public SPARQL endpoint. A~Wikipedia gadget (or plugin) activated by the interested user, accesses the endpoint as each Wikipedia page is accessed. An~additional tab on the Wikipedia page allows the user to open up a list of teams of local experts associated with the subject matter in the Wikipedia page. The technique, though presented here as a way to identify local experts, is generic, in that any third party taxonomy, can be used in this to connect Wikipedia to any non-Wikipedia data source.} }
@article{DGG-acs16, publisher = {Springer}, journal = {Applied Categorical Structures}, author = {Dubut, J{\'e}r{\'e}my and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean}, title = {Directed homology theories and {E}ilenberg-{S}teenrod axioms}, year = 2017, month = oct, volume = {25}, number = {5}, pages = {775-807}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGG-acs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGG-acs16.pdf}, doi = {doi:10.1007/s10485-016-9438-y}, abstract = {In this paper, we define and study a homology theory, that we call {"}natural homology{"}, which associates a natural system of abelian groups to every space in a large class of directed spaces and precubical sets. We show that this homology theory enjoys many important properties, as an invariant for directed homotopy. Among its properties, we show that subdivided precubical sets have the same homology type as the original ones ; similarly, the natural homology of a precubical set is of the same type as the natural homology of its geometric realization. By same type we mean equivalent up to some form of bisimulation, that we define using the notion of open map. Last but not least, natural homology, for the class of spaces we consider, exhibits very important properties such as Hurewicz theorems, and most of Eilenberg-Steenrod axioms, in particular the dimension, homotopy, additivity and exactness axioms. This last axiom is studied in a general framework of (generalized) exact sequences.} }
@article{LDRCF-ijdc16, publisher = {Springer}, journal = {International Journal of Dynamics and Control}, author = {Le{~}Co{\"e}nt, Adrien and De{~}Vuyst, Florian and Rey, Christian and Chamoin, Ludovic and Fribourg, Laurent}, title = {Control of mechanical systems using set-based methods}, pages = {1-17}, year = 2016, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LDRCF-ijdc16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LDRCF-ijdc16.pdf}, doi = {10.1007/s40435-016-0245-y}, abstract = {This paper considers large discrete-time linear systems obtained from discretized partial differential equations, and controlled by a \emph{quantized} law, i.e., a piecewise constant time function taking a finite set of values. We show how to generate the control by, first, applying \emph{model reduction} to the original system, then using a {"}state-space bisection{"} method for synthesizing a control at the reduced-order level, and finally computing an upper bound on the deviations between the controlled output trajectories of the reduced-order model and those of the original model. The effectiveness of our approach is illustrated on several examples of the literature.} }
@inproceedings{LACF-snr16, address = {Vienna, Austria}, month = apr, year = 2016, publisher = {{IEEE} Computer Society Press}, acronym = {{SNR}'16}, booktitle = {{P}roceedings of the 2nd {I}nternational {W}orkshop on {S}ymbolic and {N}umerical {M}ethods for {R}eachability {A}nalysis ({SNR}'16)}, author = {Le{~}Co{\"e}nt, Adrien and Alexandre{ }dit{ }Sandretto, Julien and Chapoutot, Alexandre and Fribourg, Laurent}, title = {Control of Nonlinear Switched Systems Based on Validated Simulation}, pages = {1-6}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LACF-snr16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LACF-snr16.pdf}, abstract = {We present an algorithm of control synthesis for nonlinear switched systems, based on an existing procedure of state-space bisection and made available for nonlinear systems with the help of validated simulation. The use of validated simulation also permits to take bounded perturbations and varying parameters into account. The whole approach is entirely guaranteed and the induced controllers are correct-by-design.} }
@article{DFP-lmcs16, journal = {Logical Methods in Computer Science}, author = {Demri, St{\'e}phane and Figueira, Diego and Praveen, M}, title = {Reasoning about Data Repetitions with Counter Systems}, year = 2016, volume = {12}, number = {3}, month = aug, pages = {1:1-1:55}, url = {http://arxiv.org/abs/1604.02887}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DFP-lmcs16.pdf}, doi = {10.2168/LMCS-12(3:1)2016}, abstract = {We study linear-time temporal logics interpreted over data words with multiple attributes. We restrict the atomic formulas to equalities of attribute values in successive positions and to repetitions of attribute values in the future or past. We demonstrate correspondences between satisfiability problems for logics and reachability-like decision problems for counter systems. We show that allowing\slash disallowing atomic formulas expressing repetitions of values in the past corresponds to the reachability\slash coverability problem in Petri nets. This gives us 2EXPSPACE upper bounds for several satisfiability problems. We prove matching lower bounds by reduction from a reachability problem for a newly introduced class of counter systems. This new class is a succinct version of vector addition systems with states in which counters are accessed via pointers, apotentially useful feature in other contexts. We strengthen further the correspondences between data logics and counter systems by characterizing the complexity of fragments, extensions and variants of the logic. For instance, we precisely characterize the relationship between the number of attributes allowed in the logic and the number of counters needed in the counter system.} }
@inproceedings{BBCM-csr16, address = {St~Petersburg, Russia}, month = jun, year = 2016, volume = {9691}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Gerhard J. Woeginger}, acronym = {{CSR}'16}, booktitle = {{P}roceedings of the 11th {I}nternational {C}omputer {S}cience {S}ymposium in {R}ussia ({CSR}'16)}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Carlier, Pierre and Menet, Quentin}, title = {Compositional Design of Stochastic Timed Automata}, pages = {117-130}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBCM-csr16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBCM-csr16.pdf}, doi = {10.1007/978-3-319-34171-2_9}, abstract = {In this paper, we study the model of stochastic timed automata and we target the definition of adequate composition operators that will allow a compositional approach to the design of stochastic systems with hard real-time constraints. This paper achieves the first step towards that goal. Firstly, we define a parallel composition operator that (we~prove) corresponds to the interleaving semantics for that model; we give conditions over probability distributions, which ensure that the operator is well-defined; and we exhibit problematic behaviours when this condition is not satisfied. We furthermore identify a large and natural subclass which is closed under parallel composition. Secondly, we define a bisimulation notion which naturally extends that for continuous-time Markov chains. Finally, we importantly show that the defined bisimulation is a congruence w.r.t. the parallel composition, which is an expected property for a proper modular approach to system design.} }
@inproceedings{BBBC-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye, {\relax Th}omas and Carlier, Pierre}, title = {Analysing Decisive Stochastic Processes}, pages = {101:1-101:14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBC-icalp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBBC-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.101}, abstract = {In~2007, Abdulla \textit{et~al.} introduced the elegant concept of decisive Markov chain. Intuitively, decisiveness allows one to lift the good properties of finite Markov chains to infinite Markov chains. For instance, the approximate quantitative reachability problem can be solved for decisive Markov chains (enjoying reasonable effectiveness assumptions) including probabilistic lossy channel systems and probabilistic vector addition systems with states. In this paper, we extend the concept of decisiveness to more general stochastic processes. This extension is non trivial as we consider stochastic processes with a potentially continuous set of states and uncountable branching (common features of real-time stochastic processes). This allows us to obtain decidability results for both qualitative and quantitative verification problems on some classes of real-time stochastic processes, including generalized semi-Markov processes and stochastic timed automata.} }
@inproceedings{CH-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Dmitry Chistikov and Christoph Haase}, title = {The Taming of the Semi-Linear Set}, pages = {128:1-128:14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CH-icalp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CH-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.128}, abstract = {Semi-linear sets, which are finitely generated subsets of the monoid \((\mathbb{Z}^d, +)\), have numerous applications in theoretical computer science. Although semi-linear sets are usually given implicitly, by formulas in Presburger arithmetic or by other means, the effect of Boolean operations on semi-linear sets in terms of the size of generators has primarily been studied for explicit representations. In this paper, we develop a framework suitable for implicitly presented semi-linear sets, in which the size of a semi-linear set is characterized by its norm---the maximal magnitude of a generator.\par We put together a {"}toolbox{"} of operations and decompositions for semi-linear sets which give bounds in terms of the norm (as opposed to just the bit-size of the description), a unified presentation, and simplified proofs. This toolbox, in particular, provides exponentially better bounds for the complement and set-theoretic difference. We also obtain bounds on unambiguous decompositions and, as an application of the toolbox, settle the complexity of the equivalence problem for exponent-sensitive commutative grammars.} }
@inproceedings{Zetzche-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Georg Zetzsche}, title = {The complexity of downward closure comparisons}, pages = {123:1-123:14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Zetzche-icalp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Zetzche-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.123}, abstract = {The downward closure of a language is the set of all (not necessarily contiguous) subwords of its members. It is well-known that the downward closure of every language is regular. Moreover, recent results show that downward closures are computable for quite powerful system models.\par One advantage of abstracting a language by its downward closure is that then, equivalence and inclusion become decidable. In~this work, we study the complexity of these two problems. More precisely, we consider the following decision problems: Given languages~\(K\) and~\(L\) from classes~\(\mathcal{C}\) and~\(\mathcal{D}\), respectively, does the downward closure of~\(K\) include (equal) that of~\(L\)?\par These problems are investigated for finite automata, one-counter automata, context-free grammars, and reversal-bounded counter automata. For each combination, we prove a completeness result either for fixed or for arbitrary alphabets. Moreover, for Petri net languages, we show that both problems are Ackermann-hard and for higher-order pushdown automata of order~\(k\), we prove hardness for complements of nondeterministic \(k\)-fold exponential time.} }
@inproceedings{CD-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Computation Tree Logic for Synchronization Properties}, pages = {98:1-98:14}, url = {http://arxiv.org/abs/1604.06384}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.98}, abstract = {We present a logic that extends CTL (Computation Tree Logic) with operators that express synchronization properties. A property is synchronized in a system if it holds in all paths of a certain length. The new logic is obtained by using the same path quantifiers and temporal operators as in CTL, but allowing a different order of the quantifiers. This small syntactic variation induces a logic that can express non-regular properties for which known extensions of MSO with equality of path length are undecidable. We show that our variant of CTL is decidable and that the model-checking problem is in \(\Delta_3^P = P^{NP^NP}\), and is DP-hard. We analogously consider quantifier exchange in extensions of CTL, and we present operators defined using basic operators of CTL* that express the occurrence of infinitely many synchronization points. We show that the model-checking problem remains in \(\Delta_3^P\). The distinguishing power of CTL and of our new logic coincide if the Next operator is allowed in the logics, thus the classical bisimulation quotient can be used for state-space reduction before model checking.} }
@inproceedings{GLS-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Goubault{-}Larrecq, Jean and Schmitz, Sylvain}, title = {Deciding Piecewise Testable Separability for Regular Tree Languages}, pages = {97:1-97:15}, url = {https://hal.inria.fr/hal-01276119/}, optpdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GLS-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.97}, abstract = {The piecewise testable separability problem asks, given two input languages, whether there exists a piecewise testable language that contains the first input language and is disjoint from the second. We prove a general characterisation of piecewise testable separability on languages in a well-quasi-order, in terms of ideals of the ordering. This subsumes the known characterisations in the case of finite words. In the case of finite ranked trees ordered by homeomorphic embedding, we show using effective representations for tree ideals that it entails the decidability of piecewise testable separability when the input languages are regular. A~final byproduct is a new proof of the decidability of whether an input regular language of ranked trees is piecewise testable, which was first shown in the unranked case by Boja{\'n}czyk, Segoufin, and Straubing (Log.~Meth. in Comput.~Sci.,~8(3:26), 2012).} }
@inproceedings{GHLT-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Stefan G{\"o}ller and Christoph Haase and Ranko Lazi{\'c} and Patrick Totzke}, title = {A Polynomial-Time Algorithm for Reachability in Branching {VASS} in Dimension One}, pages = {105:1-105:13}, url = {http://arxiv.org/abs/1602.05547}, pfd = {http://www.lsv.fr/Publis/PAPERS/PDF/GHLT-icalp16.pdf}, doi = {10.4230/LIPIcs.ICALP.2016.105}, abstract = {Branching VASS (BVASS) generalise vector addition systems with states by allowing for special branching transitions that can non-deterministically distribute a counter value between two control states. A~run of a BVASS consequently becomes a tree, and reachability is to decide whether a given configuration is the root of a reachability tree. This paper shows P-completeness of reachability in BVASS in dimension one, the first decidability result for reachability in a subclass of BVASS known so~far. Moreover, we~show that coverability and boundedness in BVASS in dimension one are P-complete as~well.} }
@article{BMV-ic16, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Bouyer, Patricia and Markey, Nicolas and Vester, Steen}, title = {{N}ash Equilibria in Symmetric Graph Games with Partial Observation}, volume = {254}, number = {2}, month = jun, year = 2017, pages = {238-258}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-ic16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMV-ic16.pdf}, doi = {10.1016/j.ic.2016.10.010}, abstract = {We investigate a model for representing large multiplayer games, which satisfy strong symmetry properties. This model is made of multiple copies of an arena; each player plays in his own arena, and can partially observe what the other players do. Therefore, this game has partial information and symmetry constraints, which make the computation of Nash equilibria difficult. We show several undecidability results, and for bounded-memory strategies, we precisely characterize the complexity of computing pure Nash equilibria (for qualitative objectives) in this game model.} }
@inproceedings{BCM-cav16, address = {Toronto, Canada}, month = jul, year = 2016, volume = 9779, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chaudhuri, Swarat and Farzan, Azadeh}, acronym = {{CAV}'16}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'16)~-- {P}art~{I}}, author = {Bouyer, Patricia and Colange, Maximilien and Markey, Nicolas}, title = {Symbolic Optimal Reachability in Weighted Timed Automata}, pages = {513-530}, url = {http://arxiv.org/abs/1602.00481}, doi = {10.1007/978-3-319-41528-4_28}, abstract = {Weighted timed automata have been defined in the early 2000's for modelling resource-consumption or -allocation problems in real-time systems. Optimal reachability is decidable in weighted timed automata, and a symbolic forward algorithm has been developed to solve that problem. This algorithm uses so-called priced zones, an extension of standard zones with cost functions. In order to ensure termination, the algorithm requires clocks to be bounded. For unpriced timed automata, much work has been done to develop sound abstractions adapted to the forward exploration of timed automata, ensuring termination of the model-checking algorithm without bounding the clocks. In this paper, we take advantage of recent developments on abstractions for timed automata, and propose an algorithm allowing for symbolic analysis of all weighted timed automata, without requiring bounded clocks.} }
@inproceedings{BMRSS-icalp16, address = {Rome, Italy}, month = jul, year = 2016, volume = {55}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide}, acronym = {{ICALP}'16}, booktitle = {{P}roceedings of the 43rd {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'16)}, author = {Bouyer, Patricia and Markey, Nicolas and Randour, Mickael and Sangnier, Arnaud and Stan, Daniel}, title = {Reachability in Networks of Register Protocols under Stochastic Schedulers}, pages = {106:1-106:14}, url = {http://arxiv.org/abs/1602.05928}, doi = {10.4230/LIPIcs.ICALP.2016.106}, abstract = {We study the almost-sure reachability problem in a distributed system obtained as the asynchronous composition of~\(N\) copies (called \emph{processes}) of the same automaton (called \emph{protocol}), that can communicate via a shared register with finite domain. The automaton has two types of transitions: write-transitions update the value of the register, while read-transitions move to a new state depending on the content of the register. Non-determinism is resolved by a stochastic scheduler. Given a protocol, we focus on almost-sure reachability of a target state by one of the processes. The answer to this problem naturally depends on the number~\(N\) of processes. However, we prove that our setting has a cut-off property : the answer to the almost-sure reachability problem is constant when \(N\) is large enough; we~then develop an EXPSPACE algorithm deciding whether this constant answer is positive or negative.} }
@inproceedings{LS-lics16, address = {New York City, USA}, month = jul, year = 2016, publisher = {ACM Press}, editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan}, acronym = {{LICS}'16}, booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)}, author = {Ranko Lazi{\'c} and Sylvain Schmitz}, title = {The Complexity of Coverability in {{\(\nu\)}}-{P}etri Nets}, pages = {467-476}, url = {https://hal.inria.fr/hal-01265302}, doi = {10.1145/2933575.2933593}, abstract = {We show that the coverability problem in nu-Petri nets is complete for `double Ackermann' time, thus closing an open complexity gap between an Ackermann lower bound and a hyper-Ackermann upper bound. The coverability problem captures the verification of safety properties in this nominal extension of Petri nets with name management and fresh name creation. Our completeness result establishes nu-Petri nets as a model of intermediate power among the formalisms of nets enriched with data, and relies on new algorithmic insights brought by the use of well-quasi-order ideals.} }
@inproceedings{DBHS-lics16, address = {New York City, USA}, month = jul, year = 2016, publisher = {ACM Press}, editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan}, acronym = {{LICS}'16}, booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)}, author = {Amina Doumane and David Baelde and Lucca Hirschi and Alexis Saurin}, title = {Towards Completeness via Proof Search in the Linear Time {{\(\mu\)}}-calculus}, pages = {377-386}, url = {https://hal.archives-ouvertes.fr/hal-01275289/}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DBHS-lics16.pdf}, doi = {10.1145/2933575.2933598}, abstract = {Modal \(\mu\)-calculus is one of the central languages of logic and verification, whose study involves notoriously complex objects: automata over infinite structures on the model-theoretical side; infinite proofs and proofs by (co)induction on the proof-theoretical side. Nevertheless, axiomatizations have been given for both linear and branching time \(\mu\)-calculi, with quite involved completeness arguments. We come back to this central problem, considering it from a proof search viewpoint, and provide some new completeness arguments in the linear time \(\mu\)-calculus. Our results only deal with restricted classes of formulas that closely correspond to (non-alternating) \(\omega\)-automata but, compared to earlier proofs, our completeness arguments are direct and constructive. We first consider a natural circular proof system based on sequent calculus, and show that it is complete for inclusions of parity automata directly expressed as formulas, making use of Safra's construction directly in proof search. We then consider the corresponding finitary proof system, featuring (co)induction rules, and provide a partial translation result from circular to finitary proofs. This yields completeness of the finitary proof system for inclusions of sufficiently deterministic parity automata, and finally for arbitrary B{\"u}chi automata.} }
@inproceedings{CG-lics16, address = {New York City, USA}, month = jul, year = 2016, publisher = {ACM Press}, editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan}, acronym = {{LICS}'16}, booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)}, author = {{\relax Th}omas Colcombet and Stefan G{\"o}ller}, title = {Games with bound guess actions}, pages = {257-266}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CG-lics16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CG-lics16.pdf}, doi = {10.1145/2933575.2934502}, abstract = {We introduce games with (bound) guess actions. These are games in which the players may be asked along the play to provide num- bers that need to satisfy some bounding constraints. These are nat- ural extensions of domination games occurring in the regular cost function theory. In this paper we consider more specifically the case where the constraints to be bounded are regular cost functions, and the long term goal is an ?-regular winning condition. We show that such games are decidable on finite arenas.} }
@inproceedings{CD-lics16, address = {New York City, USA}, month = jul, year = 2016, publisher = {ACM Press}, editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan}, acronym = {{LICS}'16}, booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Perfect-information Stochastic Games with Generalized Mean-Payoff Objectives}, pages = {247-256}, url = {http://arxiv.org/abs/1604.06376}, doi = {10.1145/2933575.2934513}, abstract = {Graph games provide the foundation for modeling and synthesizing reactive processes. In the synthesis of stochastic reactive processes, the traditional model is perfect-information stochastic games, where some transitions of the game graph are controlled by two adversarial players, and the other transitions are executed probabilistically. We consider such games where the objective is the conjunction of several quantitative objectives (specified as mean-payoff conditions), which we refer to as generalized mean-payoff objectives. The basic decision problem asks for the existence of a finite-memory strategy for a player that ensures the generalized mean-payoff objective be satisfied with a desired probability against all strategies of the opponent. A special case of the decision problem is the almost-sure problem where the desired probability is~1. Previous results presented a semi-decision procedure for epsilon-approximations of the almost-sure problem. In this work, we show that both the almost-sure problem as well as the general basic decision problem are coNP-complete, significantly improving the previous results. Moreover, we show that in the case of 1-player stochastic games, randomized memoryless strategies are sufficient and the problem can be solved in polynomial time. In contrast, in two-player stochastic games, we show that even with randomized strategies exponential memory is required in general, and present a matching exponential upper bound. We also study the basic decision problem with infinite-memory strategies and present computational complexity results for the problem. Our results are relevant in the synthesis of stochastic reactive systems with multiple quantitative requirements. } }
@inproceedings{DOMZ-lics16, address = {New York City, USA}, month = jul, year = 2016, publisher = {ACM Press}, editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan}, acronym = {{LICS}'16}, booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)}, author = {D'Osualdo, Emanuele and Roland Meyer and Georg Zetzsche}, title = {First-order logic with reachability for infinite-state systems}, pages = {457-466}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DOMZ-lics16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DOMZ-lics16.pdf}, doi = {10.1145/2933575.2934552}, abstract = {First-order logic with the reachability predicate (FO(R)) is an important means of specification in system analysis. Its decidability status is known for some individual types of infinite-state systems such as pushdown (decidable) and vector addition systems (undecidable). \par This work aims at a general understanding of which types of systems admit decidability. As a unifying model, we employ valence systems over graph monoids, which feature a finite-state control and are parameterized by a monoid to represent their storage mechanism. As special cases, this includes pushdown systems, various types of counter systems (such as vector addition systems) and combinations thereof. Our main result is a complete characterization of those graph monoids where FO(R) is decidable for the resulting transition systems.} }
@inproceedings{ACHKSZ-lics16, address = {New York City, USA}, month = jul, year = 2016, publisher = {ACM Press}, editor = {Grohe, Martin and Koskinen, Eric and Shankar, Natarajan}, acronym = {{LICS}'16}, booktitle = {{P}roceedings of the 31st {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'16)}, author = {Atig, Mohamed Faouzi and Dmitry Chistikov and Piotr Hofman and Kumar, K. Narayan and Prakash Saivasan and Georg Zetzsche}, title = {Complexity of regular abstractions of one-counter languages}, pages = {207-216}, url = {http://arxiv.org/abs/1602.03419}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACHKSZ-lics16.pdf}, doi = {10.1145/2933575.2934561}, abstract = {We study the computational and descriptional complexity of the following transformation: Given a one-counter automaton~(OCA)~\(A\), construct a nondeterministic finite automaton~(NFA)~\(B\) that recognizes an abstraction of the language~\(L(A)\): its~(1)~downward closure, (2)~upward closure, or (3)~Parikh image. For the Parikh image over a fixed alphabet and for the upward and downward closures, we find polynomial-time algorithms that compute such an NFA. For the Parikh image with the alphabet as part of the input, we find a quasi-polynomial time algorithm and prove a completeness result: we construct a sequence of OCA that admits a polynomial-time algorithm iff there is one for all OCA. For all three abstractions, it was previously unknown if appropriate NFA of sub-exponential size exist.} }
@inproceedings{HBD-sp16, address = {San Jose, California, USA}, month = may, year = 2016, publisher = {IEEECSP}, editor = {Locasto, Michael and Shmatikov, Vitaly and Erlingsson, {\'U}lfar}, acronym = {{S\&P}'16}, booktitle = {{P}roceedings of the 37th {IEEE} {S}ymposium on {S}ecurity and {P}rivacy ({S\&P}'16)}, author = {Hirschi, Lucca and Baelde, David and Delaune, St{\'e}phanie}, title = {A~method for verifying privacy-type properties: the~unbounded case}, pages = {564-581}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HBD-sp16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HBD-sp16.pdf}, doi = {10.1109/SP.2016.40}, abstract = {In~this paper, we~consider the problem of verifying anonymity and unlinkability in the symbolic model, where protocols are represented as processes in a variant of the applied pi calculus notably used in the Proverif tool. Existing tools and techniques do not allow one to verify directly these properties, expressed as behavioral equivalences. We propose a different approach: we design two conditions on protocols which are sufficient to ensure anonymity and unlinkability, and which can then be effectively checked automatically using Proverif. Our two conditions correspond to two broad classes of attacks on unlinkability, corresponding to data and control-flow leaks.\par This theoretical result is general enough to apply to a wide class of protocols. In particular, we apply our techniques to provide the first formal security proof of the BAC protocol (e-passport). Our work has also lead to the discovery of new attacks, including one on the LAK protocol (RFID authentication) which was previously claimed to be unlinkable (in~a weak sense) and one on the PACE protocol (e-passport).} }
@inproceedings{CC-pn16, address = {Tor{\'u}n, Poland}, month = jun, year = 2016, volume = {9698}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kordon, Fabrice and Moldt, Daniel}, acronym = {{PETRI~NETS}'16}, booktitle = {{P}roceedings of the 37th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'16)}, author = {Carmona, Josep and Chatain, {\relax Th}omas}, title = {Anti-Alignments in Conformance Checking~-- The~Dark Side of Process Models}, pages = {240-258}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CC-pn16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CC-pn16.pdf}, doi = {10.1007/978-3-319-39086-4_15}, abstract = {Conformance checking techniques asses the suitability of a process model in representing an underlying process, observed through a collection of real executions. These techniques suffer from the well-known state space explosion problem, hence handling process models exhibiting large or even infinite state spaces remains a challenge. One important metric in conformance checking is to asses the precision of the model with respect to the observed executions, i.e., characterize the ability of the model to produce behavior unrelated to the one observed. By~avoiding the computation of the full state space of a model, current techniques only provide estimations of the precision metric, which in some situations tend to be very optimistic, thus hiding real problems a process model may have. In this paper we present the notion of anti-alignment as a concept to help unveiling traces in the model that may deviate significantly from the observed behavior. Using anti-alignments, current estimations can be improved, e.g., in precision checking. We show how to express the problem of finding anti-alignments as the satisfiability of a Boolean formula, and provide a tool which can deal with large models efficiently.} }
@comment{{B-arxiv16, author = Bollig, Benedikt, affiliation = aff-LSVmexico, title = One-Counter Automata with Counter Visibility, institution = Computing Research Repository, number = 1602.05940, month = feb, nmonth = 2, year = 2016, type = RR, axeLSV = mexico, NOcontrat = "", url = http://arxiv.org/abs/1602.05940, PDF = "http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf", lsvdate-new = 20160222, lsvdate-upd = 20160222, lsvdate-pub = 20160222, lsv-category = "rapl", wwwpublic = "public and ccsb", note = 18~pages, abstract = "In a one-counter automaton (OCA), one can read a letter from some finite alphabet, increment and decrement the counter by one, or test it for zero. It is well-known that universality and language inclusion for OCAs are undecidable. We consider here OCAs with counter visibility: Whenever the automaton produces a letter, it outputs the current counter value along with~it. Hence, its language is now a set of words over an infinite alphabet. We show that universality and inclusion for that model are in PSPACE, thus no harder than the corresponding problems for finite automata, which can actually be considered as a special case. In fact, we show that OCAs with counter visibility are effectively determinizable and closed under all boolean operations. As~a~strict generalization, we subsequently extend our model by registers. The general nonemptiness problem being undecidable, we impose a bound on the number of register comparisons and show that the corresponding nonemptiness problem is NP-complete.", }}
@techreport{CHH-arxiv16, author = {Chistikov, Dmitry and Haase, Christoph and Halfon, Simon}, title = {Context-Free Commutative Grammars with Integer Counters and Resets}, institution = {Computing Research Repository}, number = {1511-04893}, year = {2015}, month = nov, type = {Research Report}, url = {http://arxiv.org/abs/1511.04893}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CHH-arxiv16.pdf}, note = {31~pages}, abstract = {We study the computational complexity of reachability, coverability and inclusion for extensions of context-free commutative grammars with integer counters and reset operations on them. Those grammars can alternatively be viewed as an extension of communication-free Petri nets. Our main results are that reachability and coverability are inter-reducible and both NP-complete. In particular, this class of commutative grammars enjoys semi-linear reachability sets. We also show that the inclusion problem is, in general, coNEXP-complete and already \(\Pi^{P}_{2}\)-complete for grammars with only one non-terminal symbol. Showing the lower bound for the latter result requires us to develop a novel \(\Pi^{P}_{2}\)-complete variant of the classic subset sum problem.} }
@techreport{DD-arxiv16, author = {D{\'i}az{-}Caro, Alejandro and Dowek, Gilles}, title = {Quantum superpositions and projective measurement in the lambda calculus}, institution = {Computing Research Repository}, number = {1601.04294}, year = {2016}, month = jan, type = {Research Report}, url = {http://arxiv.org/abs/1601.04294}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-arxiv16.pdf}, note = {22~pages}, abstract = {We propose an extension of simply typed lambda-calculus to handle some properties of quantum computing. The equiprobable quantum superposition is taken as a commutative pair and the quantum measurement as a non-deterministic projection over it. Destructive interferences are achieved by introducing an inverse symbol with respect to pairs. The no-cloning property is ensured by using a combination of syntactic linearity with linear logic. Indeed, the syntactic linearity is enough for unitary gates, while a function measuring its argument needs to enforce that the argument is used only once.} }
@misc{vip-D32, author = {Baelde, David and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Decision procedures for equivalence based properties (part~{II})}, howpublished = {Deliverable VIP~3.2 (ANR-11-JS02-0006)}, month = sep, year = {2015}, note = {9~pages}, type = {Contract Report}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/vip-d32.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/vip-d32.pdf} }
@misc{vip-D41, author = {Delaune, St{\'e}phanie and Kremer, Steve}, title = {Composition results for equivalence-based security properties}, howpublished = {Deliverable VIP~3.1 (ANR-11-JS02-0006)}, month = sep, year = {2015}, note = {6~pages}, type = {Contract Report}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/vip-d41.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/vip-d41.pdf} }
@article{LS-sigmodrec15, publisher = {ACM Press}, journal = {SIGMOD Records}, author = {Segoufin, Luc}, title = {Constant Delay Enumeration for Conjunctive Queries}, year = 2015, volume = {44}, number = {1}, pages = {10-17}, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-sigmodrec15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LS-sigmodrec15.pdf}, doi = {10.1145/2783888.2783894}, abstract = {We survey some of the recent results about enumerating the answers to queries over a database. We focus on the case where the enumeration is performed with a constant delay between any two consecutive solutions, after a linear time preprocessing.\par This cannot be always achieved. It requires restricting either the class of queries or the class of databases.\par We consider conjunctive queries and describe several scenarios when this is possible.} }
@article{PS-lmcs15, journal = {Logical Methods in Computer Science}, author = {Place, {\relax Th}omas and Segoufin, Luc}, title = {Deciding definability in {{\(\textrm{FO}^{2}(<_{\textbf{h}},<_{\textbf{v}})\)}} on trees}, year = 2015, volume = {11}, number = {3:5}, nopages = {}, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lmcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PS-lmcs15.pdf}, doi = {10.2168/LMCS-11(3:5)2015}, abstract = {We provide a decidable characterization of regular forest languages definable in \(\textrm{FO}^{2}(<_{\textbf{h}},<_{\textbf{v}})\). By~\(\textrm{FO}^{2}(<_{\textbf{h}},<_{\textbf{v}})\) we refer to the two variable fragment of first order logic built from the descendant relation and the following sibling relation. In terms of expressive power it corresponds to a fragment of the navigational core of XPath that contains modalities for going up to some ancestor, down to some descendant, left to some preceding sibling, and right to some following sibling.\par We also show that our techniques can be applied to other two variable first-order logics having exactly the same vertical modalities as \(\textrm{FO}^{2}(<_{\textbf{h}},<_{\textbf{v}})\) but having different horizontal modalities.} }
@article{FSS-lmcs15, journal = {Logical Methods in Computer Science}, author = {Francis, Nadime and Segoufin, Luc and Sirangelo, Cristina}, title = {Datalog Rewritings of Regular Path Queries using Views}, year = 2015, volume = {11}, number = {4:14}, nopages = {}, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FSS-lmcs15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FSS-lmcs15.pdf}, doi = {10.2168/LMCS-11(4:14)2015}, abstract = {We consider query answering using views on graph databases, i.e. databases structured as edge-labeled graphs. We mainly consider views and queries specified by Regular Path Queries~(RPQ). These are queries selecting pairs of nodes in a graph database that are connected via a path whose sequence of edge labels belongs to some regular language. We say that a view~\(\textbf{V}\) determines a query~\(Q\) if for all graph databases~\(D\), the~view image~\(\textbf{V}(D)\) always contains enough information to answer~\(Q\) on~\(D\). In~other words, there is a well defined function from~\(\textbf{V}(D)\) to~\(Q(D)\).\par Our main result shows that when this function is monotone, there exists a rewriting of~\(Q\) as a Datalog query over the view instance~\(\textbf{V}(D)\). In particular the rewriting query can be evaluated in time polynomial in the size of~\(\textbf{V}(D)\). Moreover this implies that it is decidable whether an RPQ query can be rewritten in Datalog using RPQ views.} }
@article{BCS-jacm15, publisher = {ACM Press}, journal = {Journal of the~{ACM}}, author = {B{\'a}r{\'a}ny, Vince and ten Cate, Balder and Segoufin, Luc}, title = {Guarded nagation}, year = 2015, volume = {62}, number = {3:22}, nopages = {}, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCS-jacm15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCS-jacm15.pdf}, doi = {10.1145/2701414}, abstract = { We consider restrictions of first-order logic and of fixpoint logic in which all occurrences of negation are required to be guarded by an atomic predicate. In terms of expressive power, the logics in question, called GNFO and GNFP, extend the guarded fragment of first-order logic and the guarded least fixpoint logic, respectively. They also extend the recently introduced unary negation fragments of first-order logic and of least fixpoint logic.\par We show that the satisfiability problem for GNFO and for GNFP is 2ExpTime-complete, both on arbitrary structures and on finite structures. We also study the complexity of the associated model checking problems. Finally, we show that GNFO and GNFP are not only computationally well behaved, but also model theoretically: we~show that GNFO and GNFP have the tree-like model property and that GNFO has the finite model property, and we characterize the expressive power of GNFO in terms of invariance for an appropriate notion of bisimulation.\par Our complexity upper bounds for GNFO and GNFP hold true even for their {"}clique-guarded{"} extensions CGNFO and CGNFP, in which clique guards are allowed in the place of guards.} }
@inproceedings{DS-flc2, noaddress = {Berlin, Germany}, month = sep, year = 2015, volume = 9300, series = {Lecture Notes in Computer Science}, publisher = {Springer}, noacronym = {}, booktitle = {Fields of Logic and Computation~{II}~-- Essays Dedicated to {Y}uri {G}urevich on the Occasion of His 75th Birthday}, editor = { Beklemishev, Lev D. and Blass, Andreas and Dershowitz, Nachum and Finkbeiner, Bernd and Schulte, Wolfram}, author = {Dawar, Anuj and Segoufin, Luc}, title = {Capturing {MSO} with one quantifier}, pages = {142-152}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DS-flc2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DS-flc2.pdf}, doi = {10.1007/978-3-319-23534-9_8}, abstract = {We construct a single Lindstr{\"o}m quantifier~\(Q\) such that \(\textrm{FO} (Q)\), the extension of first-order logic with~\(Q\) has the same expressive power as monadic second-order logic on the class of binary trees (with distinct left and right successors) and also on unranked trees with a sibling order. This resolves a conjecture by ten~Cate and Segoufin. The quantifier~\(Q\) is a variation of a quantifier expressing the Boolean satisfiability problem.} }
@inproceedings{SA-adbis15, address = {Poitiers, France}, month = sep, year = 2015, nmnote = {post-proceedings published by LNCS, to appear}, editor = {Bellatreche, Ladjel}, acronym = {{ADBIS}'15}, booktitle = {{P}roceedings of the 19th {E}ast-{E}uropean {C}onference on {A}dvances in {D}atabases and {I}nformation {S}ystems ({ADBIS}'15)}, author = {Abiteboul, Serge}, title = {The Story of Webdamlog}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-adbis15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-adbis15.pdf}, abstract = {We~summarize in this paper works about the management of data in a distributed manner based on Webdamlog, a datalog-extension. We~point to relevant articles on these works. More references may be found there.} }
@inproceedings{FGMP-hscc16, address = {Vienna, Austria}, month = apr, year = 2016, publisher = {ACM Press}, editor = {Abate, Alessandro and Fainekos, Georgios}, acronym = {{HSCC}'16}, booktitle = {{P}roceedings of the 19th {ACM} {I}nternational {C}onference on {H}ybrid {S}ystems: {C}omputation and {C}ontrol ({HSCC}'16)}, author = {Fribourg, Laurent and Goubault, {\'E}ric and Mohamed, Sameh and Putot, Sylvie}, title = {A~Topological Method for Finding Invariant Sets of Switched Systems}, pages = {61-70}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGMP-hscc16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGMP-hscc16.pdf}, doi = {10.1145/2883817.2883822}, abstract = {We~revisit the problem of finding controlled invariants sets (viability), for a class of differential inclusions, using topological methods based on Wazewski property. In~many ways, this generalizes the Viability Theorem approach, which is itself a generalization of the Lyapunov function approach for systems described by ordinary differential equations. We give a computable criterion based on SoS methods for a class of differential inclusions to have a non-empty viability kernel within some given region. We use this method to prove the existence of (controlled) invariant sets of switched systems inside a region described by a polynomial template, both with time-dependent switching and with state-based switching through a finite set of hypersurfaces. A~Matlab implementation allows us to demonstrate its use.} }
@phdthesis{rc-phd2016, author = {Chr{\'e}tien, R{\'e}my}, title = {Analyse automatique de propri{\'e}t{\'e}s d'{\'e}quivalence pour les protocoles cryptographiques}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2016, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rc-phd16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rc-phd16.pdf} }
@article{DGLM-tocs16, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Demri, St{\'e}phane and Galmiche, Didier and Larchey-Wendling, Dominique and Mery, Daniel}, title = {Separation Logic with One Quantified Variable}, year = 2017, volume = {61}, number = {2}, pages = {371-461}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DGLM-tocs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DGLM-tocs16.pdf}, doi = {10.1007/s00224-016-9713-1}, abstract = {We investigate first-order separation logic with one record field restricted to a unique quantified variable (1SL1). Undecidability is known when the number of quantified variables is unbounded and the satisfiability problem is pspace-complete for the propositional fragment. We show that the satisfiability problem for 1SL1 is pspace-complete and we characterize its expressive power by showing that every formula is equivalent to a Boolean combination of atomic properties. This contributes to our understanding of fragments of first-order separation logic that can specify properties about the memory heap of programs with singly-linked lists. All the fragments we consider contain the magic wand operator and first-order quantification over a single variable.} }
@inproceedings{LS-stacs16, address = {Orl{\'e}ans, France}, month = feb, year = 2016, volume = {47}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ollinger, Nicolas and Vollmer, Heribert}, acronym = {{STACS}'16}, booktitle = {{P}roceedings of the 33rd {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'16)}, author = {Leroux, J{\'e}r{\^o}me and Schmitz, Sylvain}, title = {Ideal Decompositions for Vector Addition Systems}, pages = {1:1-1:13}, url = {http://drops.dagstuhl.de/opus/volltexte/2016/5702}, doi = {10.4230/LIPIcs.STACS.2016.1}, abstract = {Vector addition systems, or equivalently Petri nets, are one of the most popular formal models for the representation and the analysis of parallel processes. Many problems for vector addition systems are known to be decidable thanks to the theory of well-structured transition systems. Indeed, vector addition systems with configurations equipped with the classical point-wise ordering are well-structured transition systems. Based on this observation, problems like coverability or termination can be proven decidable.\par However, the theory of well-structured transition systems does not explain the decidability of the reachability problem. In this presentation, we show that runs of vector addition systems can also be equipped with a well quasi-order. This observation provides a unified understanding of the data structures involved in solving many problems for vector addition systems, including the central reachability problem.} }
@article{siglog16-Schmitz, publisher = {ACM Press}, journal = {SIGLOG News}, author = {Schmitz, Sylvain}, title = {Automata column: The~complexity of reachability in vector addition systems}, volume = 3, number = 1, pages = {3-21}, year = 2016, month = jan, url = {https://hal.inria.fr/hal-01275972}, doi = {10.1145/2893582.2893585}, annote = {Invited column}, abstract = {The program of the 30th Symposium on Logic in Computer Science held in 2015 in Kyoto included two contributions on the computational complexity of the reachability problem for vector addition systems: Blondin, Finkel, G{\"o}ller, Haase, and McKenzie~[2015] attacked the problem by providing the first tight complexity bounds in the case of dimension-2 systems with states, while Leroux and Schmitz~[2015] proved the first complexity upper bound in the general case. The purpose of this column is to present the main ideas behind these two results, and more generally survey the current state of affairs.} }
@article{CFS-tcs16, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Chambart, Pierre and Finkel, Alain and Schmitz, Sylvain}, title = {Forward Analysis and Model Checking for Trace Bounded~{WSTS}}, year = 2016, volume = {637}, pages = {1-29}, month = jul, url = {http://arxiv.org/abs/1004.2802}, doi = {10.1016/j.tcs.2016.04.020}, abstract = {We investigate a subclass of well-structured transition systems~(WSTS), the bounded---in the sense of Ginsburg and Spanier (Trans.~AMS, 1964)---complete deterministic ones, which we claim provide an adequate basis for the study of forward analyses as developed by Finkel and Goubault-Larrecq (ICALP~2009). Indeed, we prove that, unlike other conditions considered previously for the termination of forward analysis, boundedness is decidable. Boundedness turns out to be a valuable restriction for WSTS verification, as we show that it further allows to decide all {{\(\omega\)}}-regular properties on the set of infinite traces of the system.} }
@article{toct-Schmitz13, publisher = {ACM Press}, journal = {ACM Transactions on Computation Theory}, author = {Schmitz, Sylvain}, title = {Complexity Hierarchies Beyond {E}lementary}, volume = {8}, number = {1:3}, nopages = {}, year = 2016, month = feb, url = {http://arxiv.org/abs/1312.5686}, doi = {10.1145/2858784}, abstract = {We introduce a hierarchy of fast-growing complexity classes and show its suitability for completeness statements of many non elementary problems. This hierarchy allows the classification of many decision problems with a non-elementary complexity, which occur naturally in logic, combinatorics, formal languages, verification, etc., with complexities ranging from simple towers of exponentials to Ackermannian and beyond.} }
@proceedings{HM-acsd2015, editor = {Haar, Stefan and Meyer, Roland}, title = {{P}roceedings of the 15th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'15)}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'15)}, acronym = {{ACSD}'15}, publisher = {{IEEE} Computer Society Press}, year = 2015, month = jun, address = {Brussels, Belgium}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7352411} }
@inproceedings{ADESWSS-webdb15, address = {Melbourne, Australia}, month = may, year = 2015, publisher = {ACM Press}, editor = {Stoyanovich, Julia and Suchanek, Fabian M}, acronym = {({W}eb{DB}'15)}, booktitle = {{P}roceedings of the 18th {I}nternational {W}orkshop on the {W}eb and {D}atabases ({W}eb{DB}'15)}, author = {Abiteboul, Serge and Dong, Xin Luna and Etzioni, Oren and Srivastava, Divesh and Weikum, Gerhard and Stoyanovich, Julia and Suchanek, Fabian M.}, title = {The elephant in the room: getting value from Big Data}, pages = {1-5}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ADESWSS-webdb15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ADESWSS-webdb15.pdf}, doi = {10.1145/2767109.2770014} }
@inproceedings{MSAM-sigmod15, address = {Melbourne, Australia}, month = may # {-} # jun, year = 2015, publisher = {ACM Press}, editor = {Sellis, Timos K. and Davidson, Susan B. and Ives,Zachary G.}, acronym = {{SIGMOD}'15}, booktitle = {{P}roceedings of the {ACM} {SIGMOD} {I}nternaitonal {C}onference on {M}anagement of {D}ata ({SIGMOD}'15)}, author = {Moffitt, Vera Zaychik and Stoyanovich, Julia and Abiteboul, Serge and Miklau, Gerome}, title = {Collaborative Access Control in {W}ebdam{L}og}, pages = {197-211}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/MSAM-sigmod15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/MSAM-sigmod15.pdf}, doi = {10.1109/DSAA.2015.7344775}, abstract = {The management of Web users' personal information is increasingly distributed across a broad array of applications and systems, including online social networks and cloud-based services. Users wish to share data using these systems, but avoiding the risks of unintended disclosures or unauthorized access by applications has become a major challenge.\par We propose a novel access control model that operates within a distributed data management framework based on datalog. Using this model, users can control access to data they own and control applications they run. They can conveniently specify access control policies providing flexible tuple-level control derived using provenance information. We present a formal specification of the model, an implementation built using an open-source distributed datalog engine, and an extensive experimental evaluation showing that the computational cost of access control is modest.} }
@article{cacm15-AAK, publisher = {ACM Press}, journal = {Communications of the~{ACM}}, author = {Abiteboul, Serge and Andr{\'e}, Benjamin and Kaplan, Daniel}, title = {Managing your digital life}, volume = {58}, number = {5}, pages = {32-35}, year = 2015, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cacm15-AAK.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cacm15-AAK.pdf}, doi = {10.1145/2670528}, abstract = {Everyone should be able to manage their personal data with a personal information management system.} }
@inproceedings{CCHPW-fossacs16, address = {Eindhoven, The~Netherlands}, month = apr, year = 2016, volume = {9634}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jacobs, Bart and L{\"o}ding, Christof}, acronym = {{FoSSaCS}'16}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'16)}, author = {Chistikov, Dmitry and Czerwi{\'n}ski, Wojciech and Hofman, Piotr and Pilipczuk, Micha{\l} and Wehar, Michael}, title = {Shortest paths in one-counter systems}, pages = {462-478}, url = {http://arxiv.org/abs/1510.05460}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCHPW-fossacs16.pdf}, doi = {10.1007/978-3-662-49630-5_27}, abstract = {We show that any one-counter automaton with \(n\) states, if its language is non-empty, accepts some word of length at most~\(O(n^2)\). This closes the gap between the previously known upper bound of~\(O(n^3)\) and lower bound of~\(\Omega(n^2)\). More generally, we prove a tight upper bound on the length of shortest paths between arbitrary configurations in one-counter transition systems. Weaker bounds have previously appeared in the literature, and our result offers an improvement.} }
@inproceedings{HLLLST-fossacs16, address = {Eindhoven, The~Netherlands}, month = apr, year = 2016, volume = {9634}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jacobs, Bart and L{\"o}ding, Christof}, acronym = {{FoSSaCS}'16}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'16)}, author = {Hofman, Piotr and Lasota, S{\l}awomir and Lazi{\'c}, Ranko and Leroux, J{\'e}r{\^o}me and Schmitz, Sylvain and Totzke, Patrick}, title = {Coverability Trees for {P}etri Nets with Unordered Data}, pages = {445-461}, url = {https://hal.inria.fr/hal-01252674}, doi = {10.1007/978-3-662-49630-5_26}, abstract = {We study an extension of classical Petri nets where tokens carry values from a countable data domain, that can be tested for equality upon firing transitions. These Unordered Data Petri Nets (UDPN) are well-structured and therefore allow generic decision procedures for several verification problems including coverability and boundedness. We show how to construct a finite representation of the coverability set in terms of its ideal decomposition. This not only provides an alternative method to decide coverability and boundedness, but is also an important step towards deciding the reachability problem. This also allows to answer more precise questions about the reachability set, for instance whether there is a bound on the number of tokens on a given place (place boundedness), or if such a bound exists for the number of different data values carried by tokens (place width boundedness). We provide matching Hyper-Ackermann bounds on the size of cover-ability trees and on the running time of the induced decision procedures.} }
@inproceedings{FG-fossacs16, address = {Eindhoven, The~Netherlands}, month = apr, year = 2016, volume = {9634}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jacobs, Bart and L{\"o}ding, Christof}, acronym = {{FoSSaCS}'16}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'16)}, author = {Fortin, Marie and Gastin, Paul}, title = {Verification of parameterized communicating automata via split-width}, pages = {197-213}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-fossacs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-fossacs16.pdf}, doi = {10.1007/978-3-662-49630-5_12}, abstract = {We~study verification problems for distributed systems communicating via unbounded FIFO channels. The number of processes of the system as well as the communication topology are not fixed a~priori. Systems are given by parameterized communicating automata (PCAs) which can be run on any communication topology of bounded degree, with arbitrarily many processes. Such systems are Turing powerful so we concentrate on under-approximate verification. We extend the notion of split-width to behaviors of PCAs. We show that emptiness, reachability and model-checking problems of PCAs are decidable when restricted to behaviors of bounded split-width. Reachability and emptiness are EXPTIME-complete, but only polynomial in the size of the PCA. We also describe several concrete classes of bounded split-width, for which we prove similar results.} }
@inproceedings{CDD-post16, address = {Eindhoven, The~Netherlands}, month = apr, year = 2016, volume = { 9635}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Piessens, Frank and Vigan{\'o}, Luca}, acronym = {{POST}'16}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'16)}, author = {Cortier, V{\'e}ronique and Dallon, Antoine and Delaune, St{\'e}phanie}, title = {Bounding the number of agents, for equivalence~too}, pages = {211-232}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post16.pdf}, doi = {10.1007/978-3-662-49635-0_11}, abstract = {Bounding the number of agents is a current practice when modeling a protocol. In~2003, it has been shown that one honest agent and one dishonest agent are indeed sufficient to find all possible attacks, for secrecy properties. This is no longer the case for equivalence properties, crucial to express many properties such as vote privacy or untraceability.\par In this paper, we show that it is sufficient to consider two honest agents and two dishonest agents for equivalence properties, for deterministic processes with standard primitives and without else branches. More generally, we show how to bound the number of agents for arbitrary constructor theories and for protocols with simple else branches. We show that our hypotheses are tight, providing counter-examples for non actiondeterministic processes, non constructor theories, or protocols with complex else branches.} }
@inproceedings{tacas16-BFHH, address = {Eindhoven, The Netherlands}, month = apr, year = 2016, volume = {9636}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Chechik, Marsha and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{TACAS}'16}, booktitle = {{P}roceedings of the 22th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'16)}, author = {Blondin, Michael and Finkel, Alain and Haase, Christoph and Haddad, Serge}, title = {Approaching the Coverability Problem Continuously}, pages = {480-496}, url = {http://arxiv.org/abs/1510.05724}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/arxiv15-BFHH.pdf}, doi = {10.1007/978-3-662-49674-9_28}, abstract = {The coverability problem for Petri nets plays a central role in the verification of concurrent shared-memory programs. However, its high EXPSPACE-complete complexity poses a challenge when encountered in real-world instances. In this paper, we develop a new approach to this problem which is primarily based on applying forward coverability in continuous Petri nets as a pruning criterion inside a backward coverability framework. A cornerstone of our approach is the efficient encoding of a recently developed polynomial-time algorithm for reachability in continuous Petri nets into SMT. We demonstrate the effectiveness of our approach on standard benchmarks from the literature, which shows that our approach decides significantly more instances than any existing tool and is in addition often much faster, in particular on large instances.} }
@inproceedings{APS-tap15, address = {L'Aquila, Italy}, month = jul, year = 2015, volume = 9154, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = { Blanchette, Jasmin Christian and Kosmatov, Nikolai}, acronym = {{TAP}'15}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {T}ests and {P}roofs ({TAP}'15)}, author = {Athanasiou, Konstantinos and Ponce{ }de{~}Le{\'o}n, Hern\'an and Schwoon, Stefan}, title = {Test Case Generation for Concurrent Systems Using Event Structures}, pages = {19-37}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/APS-tap15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/APS-tap15.pdf}, doi = {10.1007/978-3-319-21215-9_2}, abstract = {This paper deals with the test-case generation problem for concurrent systems that are specified by true-concurrency models such as Petri nets. We show that using true-concurrency models reduces both the size and the number of test cases needed for achieving certain coverage criteria. We present a test-case generation algorithm based on Petri net unfoldings and a SAT encoding for solving controllability problems in test cases. Finally, we evaluate our algorithm against traditional test-case generation methods under interleaving semantics.} }
@inproceedings{HH-stacs16, address = {Orl{\'e}ans, France}, month = feb, year = 2016, volume = {47}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ollinger, Nicolas and Vollmer, Heribert}, acronym = {{STACS}'16}, booktitle = {{P}roceedings of the 33rd {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'16)}, author = {Haase, Christoph and Hofman, Piotr}, title = {Tightening the Complexity of Equivalence Problems for Commutative Grammars}, pages = {41:1-14}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-stacs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HH-stacs16.pdf}, doi = {10.4230/LIPIcs.STACS.2016.41}, abstract = {Given two finite-state automata, are the Parikh images of the languages they generate equivalent? This problem was shown decidable in coNEXP by Huynh in 1985 within the more general setting of context-free commutative grammars. Huynh conjectured that a~\(\Pi_{2}^{P}\) upper bound might be possible, and Kopczy{\'n}ski and To established in 2010 such an upper bound when the size of the alphabet is fixed. The contribution of this paper is to show that the language equivalence problem for regular and context-free commutative grammars is actually coNEXP-complete. In addition, our lower bound immediately yields further coNEXP-completeness results for equivalence problems for regular commutative expressions, reversal-bounded counter automata and communication-free Petri nets. Finally, we improve both lower and upper bounds for language equivalence for exponent-sensitive commutative grammars.} }
@article{JGL-mscs16, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {Isomorphism theorems between models of mixed choice}, volume = {27}, number = {6}, pages = {1032-1067}, month = sep, year = 2017, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mscs16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-mscs16.pdf}, doi = {10.1017/S0960129515000547}, abstract = {We relate the so-called powercone models of mixed non-deterministic and probabilistic choice proposed by Tix, Keimel, Plotkin, Mislove, Ouaknine, Worrell, Morgan, and McIver, to our own models of previsions. Under suitable topological assumptions, we show that they are isomorphic. We rely on Keimel's cone-theoretic variants of the classical Hahn-Banach separation theorems, using functional analytic methods, and on the Schr{\"o}der-Simpson Theorem.} }
@inproceedings{BHL-lata16, address = {Prague, Czech Republic}, month = mar, year = 2016, volume = {9618}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mart{\'\i}n-Vide, Carlos}, acronym = {{LATA}'16}, booktitle = {{P}roceedings of the 10th {I}nternational {C}onference on {L}anguage and {A}utomata {T}heory and {A}pplications ({LATA}'16)}, author = {Bertrand, Nathalie and Haddad, Serge and Lefaucheux, Engel}, title = {Accurate Approximate Diagnosability of Stochastic Systems}, pages = {549-561}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-lata16.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-lata16.pdf}, doi = {10.1007/978-3-319-30000-9_42}, abstract = {Diagnosis of partially observable stochastic systems prone to faults was introduced in the late nineties. Diagnosability, i.e. the existence of a diagnoser, may be specified in different ways: (1)~exact diagnosability (called A-diagnosability) requires that almost surely a fault is detected and that no fault is erroneously claimed while (2)~approximate diagnosability (called \(\varepsilon\)-diagnosability) allows a small probability of error when claiming a fault and (3)~accurate approximate diagnosability (called AA-diagnosability) requires that this error threshold may be chosen arbitrarily small. Here we mainly focus on approximate diagnoses. We first refine the almost sure requirement about finite delay introducing a uniform version and showing that while it does not discriminate between the two versions of exact diagnosability this is no more the case in approximate diagnosis. Then we establish a complete picture for the decidability status of the diagnosability problems: (uniform) \(\varepsilon\)-diagnosability and uniform AA-diagnosability are undecidable while AA-diagnosability is decidable in PTIME, answering a longstanding open question.} }
@article{DD-tocl15b, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Demri, St{\'e}phane and Deters, Morgan}, title = {Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction}, volume = {17}, number = {2}, pages = {12:1-12:44}, month = mar, year = 2016, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-tocl15b.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DD-tocl15b.pdf}, doi = {10.1145/2835490}, abstract = {Separation logic is used as an assertion language for Hoare-style proof systems about programs with pointers, and there is an ongoing quest for understanding its complexity and expressive power. Herein, we show that first-order separation logic with one record field restricted to two variables and the separating implication (no~separating conjunction) is as expressive as weak second-order logic, substantially sharpening a previous result. Capturing weak second-order logic with such a restricted form of separation logic requires substantial updates to known proof techniques. We develop these, and as a by-product identify the smallest fragment of separation logic known to be undecidable: first-order separation logic with one record field, two variables, and no separating conjunction. Because we forbid ourselves the use of many syntactic resources, this underscores even further the power of separating implication on concrete heaps.} }
@article{HOW-fi15, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Haase, Christoph and Ouaknine, Jo{\"e}l and Worrell, James}, title = {Relating Reachability Problems in Timed and Counter Automata}, volume = {143}, number = {3-4}, pages = {317-338}, year = 2016, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HOW-fi15.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HOW-fi15.pdf}, doi = {10.3233/FI-2016-1316}, abstract = {We establish a relationship between reachability problems in timed automata and space-bounded counter automata. We show that reachability in timed automata with three or more clocks is logarithmic-space inter-reducible with reachability in space-bounded counter automata with two counters. We moreover show the logarithmic-space equivalence of reachability in two-clock timed automata and space-bounded one-counter automata. This last reduction has recently been employed by Fearnley and Jurdzi{\'n}ski to settle the computational complexity of reachability in two-clock timed automata.} }
@techreport{BJM-arxiv16, author = {Bouyer, Patricia and Markey, Nicolas and Jug{\'e}, Vincent}, title = {Dynamic Complexity of Parity Games with Bounded Tree-Width}, institution = {Computing Research Repository}, number = {1610.00571}, year = {2016}, url = {https://arxiv.org/abs/1610.00571}, pdf = {https://arxiv.org/abs/1610.00571}, month = oct, type = {Research Report}, note = {33~pages} }
@misc{mcc:2017, author = {F. Kordon and H. Garavel and L. M. Hillah and Hulin{-}Hubard, Francis and B. Berthomieu and G. Ciardo and M. Colange and S. {Dal Zilio} and E. Amparore and M. Beccuti and T. Liebke and J. Meijer and A. Miner and C. Rohr and J. Srba and Y. Thierry-Mieg and J. van de Pol and K. Wolf}, month = jun, title = {{Complete Results for the 2017 Edition of the Model Checking Contest}}, year = {2017}, url = {http://mcc.lip6.fr/2017/results.php} }
@misc{mcc:2016, author = {F. Kordon and H. Garavel and L. M. Hillah and Hulin{-}Hubard, Francis and G. Chiardo and A. Hamez and L. Jezequel and A. Miner and J. Meijer and E. Paviot-Adet and D. Racordon and C. Rodriguez and C. Rohr and J. Srba and Y. Thierry-Mieg and G. Tr{\d i}nh and K. Wolf}, month = jun, title = {{Complete Results for the 2016 Edition of the Model Checking Contest}}, year = {2016}, url = {http://mcc.lip6.fr/2016/results.php} }
@misc{mcc:2015, author = {F. Kordon and H. Garavel and L. M. Hillah and Hulin{-}Hubard, Francis and A. Linard and M. Beccuti and A. Hamez and E. Lopez-Bobeda and L. Jezequel and J. Meijer and E. Paviot-Adet and C. Rodriguez and C. Rohr and J. Srba and Y. Thierry-Mieg and K. Wolf}, month = jun, title = {{Complete Results for the 2015 Edition of the Model Checking Contest}}, year = {2015}, url = {http://mcc.lip6.fr/2015/results.php} }
@misc{mcc:2014, author = {F. Kordon and H. Garavel and L.-M. Hillah and Hulin{-}Hubard, Francis and A. Linard and M. Beccuti and S. Evangelista and A. Hamez and N. Lohmann and E. Lopez and E. Paviot-Adet and C. Rodriguez and C. Rohr and J. Srba}, month = jun, title = {{Results for the MCC @ Petri Nets 2014}}, year = {2014}, url = {http://mcc.lip6.fr/2014} }
@phdthesis{montoya-phd2017, author = {Montoya, David}, title = {Une base de connaissance personnelle int\'egrant les donn\'ees d'un utilisateur et une chronologie de ses activit\'es}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2017, month = mar, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/montoya-phd17.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/montoya-phd17.pdf} }
@article{CMRZZ-dmtcs2017, journal = {Discrete Mathematics \& Theoretical Computer Science}, author = {Czerwi{\'{n}}ski, Wojciech and Martens, Wim and van Rooijen, Lorijn and Zeitoun, Marc and Zetzsche, Georg}, title = {A Characterization for Decidable Separability by Piecewise Testable Languages}, volume = {19}, number = {4}, year = {2017}, month = dec, nopages = {}, doi = {10.23638/DMTCS-19-4-1}, url = {https://dmtcs.episciences.org/4131}, pdf = {https://arxiv.org/pdf/1410.1042.pdf} }
@article{HKZ-sf2017, publisher = {Springer}, journal = {Semigroup Forum}, author = {Huschenbett, Martin and Kuske, Dietrich and Zetzsche, Georg}, title = {The Monoid of Queue Actions}, volume = {95}, number = {3}, year = {2017}, month = dec, pages = {475-508}, doi = {10.1007/s00233-016-9835-4}, abstract = {We model the behavior of a fifo-queue as a monoid of transformations that are induced by sequences of writing and reading. We describe this monoid by means of a confluent and terminating semi-Thue system and study some of its basic algebraic properties such as conjugacy. Moreover, we show that while several properties concerning its rational subsets are undecidable, their uniform membership problem is NL-complete. Furthermore, we present an algebraic characterization of this monoid's recognizable subsets. Finally, we prove that it is not Thurston-automatic.} }
@article{ZKL-tocs17, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Zetzsche, Georg and Kuske, Dietrich and Lohrey, Markus}, title = {On {Boolean} closed full trios and rational {Kripke} frames}, volume = {60}, number = {3}, year = {2017}, month = apr, pages = {438-472}, doi = {10.1007/s00224-016-9694-0} }
@mastersthesis{m2-riesner, author = {Riesner, M{\'e}lissa}, title = {Regularity of deterministic pushdown automata}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2017}, month = aug }
@inproceedings{D-lics17, address = {Reykjavik, Iceland}, month = jun, publisher = {{IEEE} Press}, editor = {Ouaknine, Jo{\"e}l}, acronym = {{LICS}'17}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'17)}, author = {Doumane, Amina}, title = {Constructive completeness for the linear-time {\(\mu\)}-calculus}, pages = {1-12}, year = {2017}, doi = {10.1109/LICS.2017.8005075}, abstract = {Modal \(\mu\)-calculus is one of the central logics for verification. In his seminal paper, Kozen proposed an axiomatization for this logic, which was proved to be complete, 13 years later, by Kaivola for the linear-time case and by Walukiewicz for the branching-time one. These proofs are based on complex, non-constructive arguments, yielding no reasonable algorithm to construct proofs for valid formulas. The problematic of constructiveness becomes central when we consider proofs as certificates, supporting the answers of verification tools. In our paper, we provide a new completeness argument for the linear-time \(\mu\)-calculus which is constructive, i.e. it builds a proof for every valid formula. To achieve this, we decompose this difficult problem into several easier ones, taking advantage of the correspondence between the \(\mu\)-calculus and automata theory. More precisely, we lift the well-known automata transformations (non-determinization for instance) to the logical level. To solve each of these smaller problems, we perform first a proof-search in a circular proof system, then we transform the obtained circular proofs into proofs of Kozen's axiomatization.} }
@inproceedings{G-fossacs17, address = {Uppsala, Sweden}, month = apr, year = 2017, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Esparza, Javier and Murawski, Andrzej}, acronym = {{FoSSaCS}'17}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'17)}, author = {Gilbert, Fr{\'e}d{\'e}ric}, title = {Automated Constructivization of Proofs}, pages = {480-495}, url = {https://hal.inria.fr/hal-01516788}, pdf = {https://hal.inria.fr/hal-01516788/file/constructivization.pdf}, doi = {10.1007/978-3-662-54458-7_28}, abstract = {No computable function can output a constructive proof from a classical one whenever its associated theorem also holds constructively. We show in this paper that it is however possible, in practice, to turn a large amount of classical proofs into constructive ones. We describe for this purpose a linear-time constructivization algorithm which is provably complete on large fragments of predicate logic.} }
@inproceedings{G-itp17, address = {Bras{\'{\i}}lia, Brazil}, year = 2017, month = sep, volume = 10499, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ayala{-}Rinc{\'{o}}n, Mauricio and Mu{\~{n}}oz, C{\'{e}}sar A.}, acronym = {{ITP}'17}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {I}nteractive {T}heorem {P}roving ({ITP}'17)}, author = {Gilbert, Fr{\'e}d{\'e}ric}, title = {Proof Certificates in {PVS}}, pages = {262-268}, url = {https://hal.inria.fr/hal-01673517}, pdf = {https://hal.inria.fr/hal-01673517/file/main.pdf}, doi = {10.1007/978-3-319-66107-0_17}, abstract = {The purpose of this work is to allow the proof system PVS to export proof certificates that can be checked externally. This is done through the instrumentation of PVS to record detailed proofs step by step during the proof search process. At the current stage of this work, proofs can be built for any PVS theory. However, some reasoning steps rely on unverified assumptions. For a restricted fragment of PVS, the proofs are exported to the universal proof checker Dedukti, and the unverified assumptions are proved externally using the automated theorem prover MetiTarski.} }
@inproceedings{B-ocaml17, author = {Bury, Guillaume}, title = {{mSAT: An OCaml SAT Solver}}, booktitle = {{OCaml Users and Developers Workshop}}, nopages = {}, noeditor = {}, month = sep, year = 2017, address = {Oxford, UK}, url = {https://hal.inria.fr/hal-01670765}, pdf = {https://hal.inria.fr/hal-01670765/file/poster.pdf}, abstract = {mSAT: a SAT solving library in OCaml. It solves the satisfibility of propositional clauses. It is Modular: the user provides the theory. And it produces formal proofs.}, note = {Poster} }
@inproceedings{JS-lpar17, address = {Maun, Botswana}, month = may, volume = {46}, series = {EPiC Series in Computing}, publisher = {EasyChair}, editor = {Eiter, Thomas and Sands, David}, acronym = {{LPAR}'17}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {L}ogic for {P}rogramming, {A}rtificial {I}ntelligence, and {R}easoning ({LPAR}'17)}, author = {Jouannaud, Jean-Pierre and Strub, Pierre-Yves}, title = {{Coq without Type Casts: A Complete Proof of Coq Modulo Theory}}, pages = {474-489}, year = {2017}, pdf = {https://hal.inria.fr/hal-01664457/file/final-version.pdf}, url = {https://easychair.org/publications/paper/BKQ}, abstract = {Incorporating extensional equality into a dependent intensional type system such as the Calculus of Constructions provides with stronger type-checking capabilities and makes the proof development closer to intuition. Since strong forms of extensionality lead to undecidable type-checking, a good trade-off is to extend intensional equality with a decidable first-order theory T, as done in CoqMT, which uses matching modulo T for the weak and strong elimination rules, we call these rules T-elimination. So far, type-checking in CoqMT is known to be decidable in presence of a cumulative hierarchy of universes and weak T-elimination. Further, it has been shown by Wang with a formal proof in Coq that consistency is preserved in presence of weak and strong elimination rules, which actually implies consistency in presence of weak and strong T-elimination rules since T is already present in the conversion rule of the calculus. \par We justify here CoqMT's type-checking algorithm by showing strong normalization as well as the Church-Rosser property of \(\beta\)-reductions augmented with CoqMT's weak and strong T-elimination rules. This therefore concludes successfully the meta-theoretical study of CoqMT.} }
@article{BFM-lmcs17, journal = {Logical Methods in Computer Science}, author = {Blondin, Michael and Finkel, Alain and McKenzie, Pierre}, title = {Well Behaved Transition Systems}, volume = {13}, number = {3}, year = {2017}, month = sep, pages = {1-19}, doi = {10.23638/LMCS-13(3:24)2017}, url = {https://doi.org/10.23638/LMCS-13(3:24)2017} }
@article{FS-lmcs17, journal = {Logical Methods in Computer Science}, author = {Figueira, Diego and Segoufin, Luc}, title = {Bottom-up automata on data trees and vertical {XP}ath}, volume = {13}, number = {4:5}, year = {2017}, month = nov, doi = {10.23638/LMCS-13(4:5)2017}, abstract = {A data tree is a finite tree whose every node carries a label from a finite alphabet and a datum from some infinite domain. We introduce a new model of automata over unranked data trees with a decidable emptiness problem. It is essentially a bottom-up alternating automaton with one register that can store one data value and can be used to perform equality tests with the data values occurring within the subtree of the current node. We show that it captures the expressive power of the vertical fragment of XPath - containing the child, descendant, parent and ancestor axes - obtaining thus a decision procedure for its satisfiability problem.} }
@phdthesis{schmitz-hdr2017, author = {Schmitz, Sylvain}, title = {Algorithmic Complexity of Well-Quasi-Orders}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {M{\'e}moire d'habilitation}, year = 2017, month = nov, url = {http://tel.archives-ouvertes.fr/tel-01663266} }
@inproceedings{GBM-stacs18, address = {Caen, France}, month = feb, volume = {96}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Niedermeier, Rolf and Vall{\'e}e, Brigitte}, acronym = {{STACS}'18}, booktitle = {{P}roceedings of the 35th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'18)}, author = {Gardy, Patrick and Bouyer, Patricia and Markey, Nicolas}, title = {Dependences in Strategy Logic}, pages = {34:1-34:15}, year = {2018}, doi = {10.4230/LIPIcs.STACS.2018.34}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/8532/pdf/LIPIcs-STACS-2018-34.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=8532}, abstract = {Strategy Logic (SL) is a very expressive logic for specifying and verifying properties of multi-agent systems: in SL, one can quantify over strategies, assign them to agents, and express properties of the resulting plays. Such a powerful framework has two drawbacks: first, model checking SL has non-elementary complexity; second, the exact semantics of SL is rather intricate, and may not correspond to what is expected. In this paper, we focus on strategy dependences in SL, by tracking how existentially-quantified strategies in a formula may (or may not) depend on other strategies selected in the formula. We study different kinds of dependences, refining the approach of [Mogavero et al., Reasoning about strategies: On the model-checking problem, 2014], and prove that they give rise to different satisfaction relations. In the setting where strategies may only depend on what they have observed, we identify a large fragment of SL for which we prove model checking can be performed in 2-EXPTIME.} }
@inproceedings{BFG-stacs18, address = {Caen, France}, month = feb, volume = {96}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Niedermeier, Rolf and Vall{\'e}e, Brigitte}, acronym = {{STACS}'18}, booktitle = {{P}roceedings of the 35th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'18)}, author = {Bollig, Benedikt and Fortin, Marie and Gastin, Paul}, title = {Communicating Finite-State Machines and Two-Variable Logic}, pages = {17:1-17:14}, year = {2018}, doi = {10.4230/LIPIcs.STACS.2018.17}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/8529/pdf/LIPIcs-STACS-2018-17.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=8529}, abstract = {Communicating finite-state machines are a fundamental, well-studied model of finite-state processes that communicate via unbounded first-in first-out channels. We show that they are expressively equivalent to existential MSO logic with two first-order variables and the order relation.} }
@inproceedings{GKLZ-stacs18, address = {Caen, France}, month = feb, volume = {96}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Niedermeier, Rolf and Vall{\'e}e, Brigitte}, acronym = {{STACS}'18}, booktitle = {{P}roceedings of the 35th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'18)}, author = {Ganardi, Moses and K{\"o}nig, Daniel and Lohrey, Markus and Zetzsche, Georg}, title = {Knapsack problems for wreath products}, pages = {32:1-32:13}, year = {2018}, doi = {10.4230/LIPIcs.STACS.2018.32}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/8520/pdf/LIPIcs-STACS-2018-32.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=8520} }
@inproceedings{PhS-mfcs17, address = {Aalborg, Denmark}, month = aug, year = 2017, volume = {83}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Larsen, Kim G. and Bodlaender, Hans L. and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{MFCS}'17}, booktitle = {{P}roceedings of the 42nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'17)}, author = {Schnoebelen, {\relax Ph}ilippe}, title = {Ideal-Based Algorithms for the Symbolic Verification of Well-Structured Systems (Invited Talk)}, pages = {85:1-85:4}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/8139/}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/8139/pdf/LIPIcs-MFCS-2017-85.pdf}, doi = {10.4230/LIPIcs.MFCS.2017.85}, abstract = {We explain how the downward-closed subsets of a well-quasi-ordering (\(X,\leq\)) can be represented via the ideals of \(X\) and how this leads to simple and efficient algorithms for the verification of well-structured systems.} }
@article{JGL-minimax17, publisher = {Heldermann Verlag}, journal = {Minimax Theory and its Applications}, author = {Goubault{-}Larrecq, Jean}, title = {A Non-{H}ausdorff Minimax Theorem}, volume = {3}, number = {1}, year = {2017}, pages = {73-80} }
@inproceedings{MHP-cmsb17, address = {Darmstadt, Germany}, month = sep, year = 2017, volume = {10545}, series = {Lecture Notes in Bioinformatics}, publisher = {Springer-Verlag}, editor = {Feret, J{\'e}r{\^o}me and Koeppl, Heinz}, acronym = {{CMSB}'17}, booktitle = {{P}roceedings of the 15th {C}onference on {C}omputational {M}ethods in {S}ystem {B}iology ({CMSB}'17)}, author = {Mandon, Hugues and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, title = {{Temporal Reprogramming of Boolean Networks}}, pages = {179-195}, pdf = {https://hal.inria.fr/hal-01589251/document}, doi = {10.1007/978-3-319-67471-1\_11}, abstract = {Cellular reprogramming, a technique that opens huge opportunities in modern and regenerative medicine, heavily relies on identifying key genes to perturb. Most of computational methods focus on finding mutations to apply to the initial state in order to control which attractor the cell will reach. However, it has been shown, and is proved in this article, that waiting between the perturbations and using the transient dynamics of the system allow new reprogramming strategies. To identify these temporal perturbations, we consider a qualitative model of regulatory networks, and rely on Petri nets to model their dynamics and the putative perturbations. Our method establishes a complete characterization of temporal perturbations, whether permanent (mutations) or only temporary, to achieve the existential or inevitable reachability of an arbitrary state of the system. We apply a prototype implementation on small models from the literature and show that we are able to derive temporal perturbations to achieve trans-differentiation.} }
@article{BFM-ic17, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Blondin, Michael and Finkel, Alain and McKenzie, Pierre}, title = {Handling Infinitely Branching Well-structured Transition Systems}, volume = {258}, year = {2018}, pages = {28--49}, doi = {10.1016/j.ic.2017.11.001} }
@techreport{CDD-hal17, author = {Cortier, V{\'e}ronique and Dallon, Antoine and Delaune, St{\'e}phanie}, institution = {HAL}, month = oct, number = {hal-01615265}, type = {Research Report}, title = {A typing result for trace inclusion (for pair and symmetric encryption only)}, year = {2017}, url = {https://hal.archives-ouvertes.fr/hal-01615265}, pdf = {https://hal.archives-ouvertes.fr/hal-01615265/document}, abstract = {Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed using the notion of trace equivalence in a process algebra that models security protocols. In this paper, we propose some results to reduce the search space when we are looking for an attack regarding trace equivalence. Our work is strongly inspired from [10], which establishes that, if there is a witness of non trace equivalence, then there is one that is well-typed.\par Our main contribution is to establish a similar result for trace inclusion. Our motivation is twofolds: first, this small attack property is needed for proving soundness of the tool SatEquiv [13]. Second, we revisit the proof in order to simplify it. Specifically, we show two results. First, if there is a witness of non-inclusion then there is one that is well-typed. We establish this result by providing a decision procedure for trace inclusion similar to the one proposed in [10] for trace equivalence. We also show that we can reduce the search space when considering the notion of static inclusion. Acutally, if there is a witness of static non-inclusion there is one of a specific shape.\par Even if our setting slightly differs from the one considered in [10], our proofs essentially follow the same ideas than the existing proof for trace equivalence. Nevertheless, we hope that this proof will be easier to extend to other primitives such as asymmetric encryption or signatures.} }
@article{DDS-tcs17, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Demri, St{\'e}phane and Dhar, Amit and Sangnier, Arnaud}, title = {Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic}, volume = {735}, optnumber = {}, year = {2017}, pages = {2-23}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-tcs17.pdf} }
@article{GLL-fmsd17, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Goubault{-}Larrecq, Jean and Lachance, Jean-Philippe}, title = {On the Complexity of Monitoring {O}rchids Signatures, and Recurrence Equations}, volume = {53}, number = {1}, year = {2018}, month = aug, pages = {6-32}, doi = {10.1007/s10703-017-0303-x}, url = {https://doi.org/10.1007/s10703-017-0303-x}, abstract = {Modern monitoring tools such as our intrusion detection tool Orchids work by firing new monitor instances dynamically. Given an Orchids signature (a.k.a. a rule, a specification), what is the complexity of checking that specification, that signature? In other words, let \(f(n)\) be the maximum number of monitor instances that can be fired on a sequence of \(n\) events: we design an algorithm that decides whether \(f(n)\) is asymptotically exponential or polynomial, and in the latter case returns an exponent \(d\) such that \(f(n)=\Theta(n^d)\). Ultimately, the problem reduces to the following mathematical question, which may have other uses in other domains: given a system of recurrence equations described using the operators \(+\) and \(\max\), and defining integer sequences \(u_n\), what is the asymptotic behavior of \(u_n\) as \(n\) tends to infinity? We show that, under simple assumptions, \(u_n\) is either exponential or polynomial, and that this can be decided, and the exponent computed, using a simple modification of Tarjan's strongly connected components algorithm, in linear time.}, note = {Special issue of RV'16} }
@article{GLN-lmcs17, journal = {Logical Methods in Computer Science}, author = {Goubault{-}Larrecq, Jean and Ng, Kok Min}, title = {A Few Notes on Formal Balls}, volume = {13}, number = {4}, year = {2017}, month = nov, pages = {1-34}, doi = {10.23638/LMCS-13(4:18)2017}, url = {https://lmcs.episciences.org/4100}, pdf = {https://lmcs.episciences.org/4100/pdf}, note = {Special Issue of the Domains XII Workshop} }
@incollection{CDH-kimfest17, author = {Chatterjee, Krishnendu and Doyen, Laurent and Henzinger, {\relax Th}omas~A.}, title = {The Cost of Exactness in Quantitative Reachability}, editor = {Aceto, Luca and Bacci, Giorgio and Bacci, Giovani and Ing{\'o}lfsd{\'o}ttir, Anna and Legay, Axel and Mardare, Radu}, booktitle = {Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {10460}, year = {2017}, pages = {367-381}, month = aug, doi = {10.1007/978-3-319-63121-9_18}, abstract = {In the analysis of reactive systems a quantitative objective assigns a real value to every trace of the system. The value decision problem for a quantitative objective requires a trace whose value is at least a given threshold, and the exact value decision problem requires a trace whose value is exactly the threshold. We compare the compu- tational complexity of the value and exact value decision problems for classical quantitative objectives, such as sum, discounted sum, energy, and mean-payoff for two standard models of reactive systems, namely, graphs and graph games.}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDH-2017.pdf} }
@article{CDFR-ic17, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Krishnendu Chatterjee and Laurent Doyen and Emmanuel Filiot and Jean{-}Fran{\c{c}}ois Raskin}, title = {Doomsday equilibria for omega-regular games}, volume = {254}, year = {2017}, pages = {296-315}, doi = {10.1016/j.ic.2016.10.012}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDFR-ic2017.pdf}, abstract = {Two-player games on graphs provide the theoretical framework for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games.\par In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated.\par We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of ?-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect- information games.} }
@inproceedings{D-rp17, address = {London, UK}, month = sep, year = 2017, volume = {10506}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Matthew Hague and Igor Potapov}, acronym = {{RP}'17}, booktitle = {{P}roceedings of the 11th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'17)}, author = {Doyen, Laurent}, title = {The Multiple Dimensions of Mean-Payoff Games}, pages = {1-8}, url = {https://doi.org/10.1007/978-3-319-67089-8_1}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Doyen-rp2017.pdf}, doi = {10.1007/978-3-319-67089-8_1}, abstract = {We consider quantitative game models for the design of reactive systems working in resource-constrained environment. The game is played on a finite weighted graph where some resource (e.g., battery) can be consumed or recharged along the edges of the graph.} }
@article{LS-siglog17, publisher = {ACM Press}, journal = {SIGLOG News}, abstract = {We consider a logical framework building on existential positive formulas and then adding guarded negations and guarded fixpoints, where the guards are atomic formulas containing all free variables. The resulting first-order and fixpoint logics turn out to have nice algorithmic properties and nice expressive power. We survey some of them.}, author = {Segoufin, Luc}, doi = {10.1145/3129173.3129178}, month = jul, number = {3}, pages = {12-26}, title = {A survey on guarded negation}, volume = {4}, year = {2017} }
@inproceedings{TFL-async17, address = {San Diego, California, USA}, month = may, publisher = {{IEEE} Computer Society}, editor = {Beign{\'e}, Edith and Stevens, Ken}, acronym = {{ASYNC}'17}, booktitle = {{P}roceedings of the 23rd {IEEE} {I}nternational {S}ymposium on {A}synchronous {C}ircuits and {S}ystems ({ASYNC}'17)}, author = {Ghaith Tarawneh and Matthias F{\"u}gger and Christoph Lenzen}, title = {Metastability Tolerant Computing}, pages = {25-32}, year = {2017}, doi = {10.1109/ASYNC.2017.9}, pdf = {http://www.lsv.fr/~mfuegger/papers/TFL17_async.pdf}, url = {http://ieeexplore.ieee.org/abstract/document/8097381/}, abstract = {Synchronization using flip-flop chains imposes a latency of a few clock cycles when transferring data and control signals between clock domains. We propose a design scheme that avoids this latency by performing synchronization as part of state/data computations while guaranteeing that metastability is contained and its effects tolerated (with an acceptable failure probability). We present a theoretical framework for modeling synchronous state machines in the presence of metastability and use it to prove properties that guarantee some form of reliability. Specifically, we show that the inevitable state/data corruption resulting from propagating metastable states can be confined to a subset of computations. Applications that can tolerate certain failures can exploit this property to leverage low-latency and quasi-reliable operation simultaneously. We demonstrate the approach by designing a Network-on-Chip router with zero- latency asynchronous ports and show via simulation that it outperforms a variant with two flip-flop synchronizers at a negligible cost in packet transfer reliability.} }
@inproceedings{FKLP-async17, address = {San Diego, California, USA}, month = may, publisher = {{IEEE} Computer Society}, editor = {Beign{\'e}, Edith and Stevens, Ken}, acronym = {{ASYNC}'17}, booktitle = {{P}roceedings of the 23rd {IEEE} {I}nternational {S}ymposium on {A}synchronous {C}ircuits and {S}ystems ({ASYNC}'17)}, author = {Matthias F{\"u}gger and Attila Kinali and Christoph Lenzen and Thomas Polzer}, title = {Metastability-Aware Memory-Efficient Time-to-Digital Converter}, pages = {49-56}, year = {2017}, doi = {10.1109/ASYNC.2017.12}, pdf = {http://www.lsv.fr/~mfuegger/pub/FKLP17.pdf}, url = {https://doi.org/10.1109/ASYNC.2017.12}, abstract = {We propose a novel method for transforming delay- line time-to-digital converters (TDCs) into TDCs that output Gray code without relying on synchronizers. We formally prove that the inevitable metastable memory upsets (Marino, TC'81) do not induce an additional time resolution error. Our modified design provides suitable inputs to the recent metastability-containing sorting networks by Lenzen and Medina (ASYNC'16) and Bund et al. (DATE'17). In contrast, employing existing TDCs would require using thermometer code at the TDC output (followed by conversion to Gray code) or resolving metastability inside the TDC. The former is too restrictive w.r.t. the dynamic range of the TDCs, while the latter loses the advantage of enabling (accordingly much faster) computation without having to first resolve metastability.\par Our all-digital designs are also of interest in their own right: they support high sample rates and large measuring ranges at nearly optimal bit-width of the output, yet maintain the original delay-line?s time resolution. No previous approach unifies all these properties in a single device.} }
@inproceedings{FNS-disc17, address = {Vienna, Austria}, month = oct, year = 2017, volume = 91, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Richa, Andr{\'e}a}, acronym = {{DISC}'17}, booktitle = {{P}roceedings of the 31st {I}nternational {S}ymposium on {D}istributed {C}omputing ({DISC}'17)}, author = {Matthias F{\"u}gger and {\relax Th}omas Nowak and Manfred Schwarz}, title = {Brief Announcement: Lower Bounds for Asymptotic Consensus in Dynamic Networks}, pages = {51:1-51:3}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7992/}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7992/pdf/LIPIcs-DISC-2017-51.pdf}, doi = {10.4230/LIPIcs.DISC.2017.51}, abstract = {In this work we study the performance of asymptotic and approximate consensus algorithms in dynamic networks. The asymptotic consensus problem requires a set of agents to repeatedly set their outputs such that the outputs converge to a common value within the convex hull of initial values. This problem, and the related approximate consensus problem, are fundamental building blocks in distributed systems where exact consensus among agents is not required, e.g., man- made distributed control systems, and have applications in the analysis of natural distributed systems, such as flocking and opinion dynamics. We prove new nontrivial lower bounds on the contraction rates of asymptotic consensus algorithms, from which we deduce lower bounds on the time complexity of approximate consensus algorithms. In particular, the obtained bounds show optimality of asymptotic and approximate consensus algorithms presented in [Charron-Bost et al., ICALP’16] for certain classes of networks that include classical failure assumptions, and confine the search for optimal bounds in the general case. Central to our lower bound proofs is an extended notion of valency, the set of reachable limits of an asymptotic consensus algorithm starting from a given configuration. We further relate topological properties of valencies to the solvability of exact consensus, shedding some light on the relation of these three fundamental problems in dynamic networks.} }
@article{BCMW-fi17, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {David Baelde and Arnaud Carayol and Ralph Matthes and Igor Walukiewicz}, title = {Preface: Special Issue of {Fixed Points in Computer Science} ({FICS}'13)}, volume = {150}, number = {3-4}, pages = {i-ii}, year = {2017}, url = {https://doi.org/10.3233/FI-2017-1468}, doi = {10.3233/FI-2017-1468} }
@inproceedings{BDGK-csf17, address = {Santa Barbara, California, USA}, month = aug, publisher = {{IEEE} Computer Society Press}, editor = {K{\"o}pf, Boris and Chong, Steve}, acronym = {{CSF}'17}, booktitle = {{P}roceedings of the 30th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'17)}, author = {Baelde, David and Delaune, St{\'e}phanie and Gazeau, Ivan and Kremer, Steve}, title = {Symbolic Verification of Privacy-Type Properties for Security Protocols with {XOR}}, pages = {234-248}, year = {2017}, doi = {10.1109/CSF.2017.22}, pdf = {https://hal.inria.fr/hal-01533694/document}, url = {https://hal.inria.fr/hal-01533694}, abstract = {In symbolic verification of security protocols, process equivalences have recently been used extensively to model strong secrecy, anonymity and unlinkability properties. However, tool support for automated analysis of equivalence properties is limited compared to trace properties, e.g., modeling authentication and weak notions of secrecy. In this paper, we present a novel procedure for verifying equivalences on finite processes, i.e., without replication, for protocols that rely on various cryptographic primitives including exclusive or (xor). We have implemented our procedure in the tool AKISS, and successfully used it on several case studies that are outside the scope of existing tools, e.g., unlinkability on various RFID protocols, and resistance against guessing attacks on protocols that use xor.} }
@inproceedings{CDD-csf17, address = {Santa Barbara, California, USA}, month = aug, publisher = {{IEEE} Computer Society Press}, editor = {K{\"o}pf, Boris and Chong, Steve}, acronym = {{CSF}'17}, booktitle = {{P}roceedings of the 30th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'17)}, author = {Cortier, V{\'e}ronique and Dallon, Antoine and Delaune, St{\'e}phanie}, title = {{SAT-Equiv}: An Efficient Tool for Equivalence Properties}, pages = {481-494}, year = {2017}, doi = {10.1109/CSF.2017.15}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-csf17.pdf}, url = {http://ieeexplore.ieee.org/document/8049740/}, abstract = {Automatic tools based on symbolic models have been successful in analyzing security protocols. Such tools are particularly adapted for trace properties (e.g. secrecy or authentication), while they often fail to analyse equivalence properties.Equivalence properties can express a variety of security properties, including in particular privacy properties (vote privacy, anonymity, untraceability). Several decision procedures have already been proposed but the resulting tools are rather inefficient.In this paper, we propose a novel algorithm, based on graph planning and SAT-solving, which significantly improves the efficiency of the analysis of equivalence properties. The resulting implementation, SAT-Equiv, can analyze several sessions where most tools have to stop after one or two sessions.} }
@inproceedings{CCV-er17, address = {Valencia, Spain}, month = nov, volume = 10650, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mayr, Heinrich C. and Guizzardi, Giancarlo and Ma, Hui and Pastor, Oscar}, booktitle = {{P}roceedings of the 36th {I}nternational {C}onference on {C}onceptual {M}odeling ({ER}'17)}, author = {Chatain, {\relax Th}omas and Carmona, Josep and van Dongen, Boudewijn}, title = {Alignment-Based Trace Clustering}, pages = {295-308}, year = {2017}, doi = {10.1007/978-3-319-69904-2_24}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCV-er17.pdf}, url = {https://doi.org/10.1007/978-3-319-69904-2_24}, abstract = {A novel method to cluster event log traces is presented in this paper. In contrast to the approaches in the literature, the clustering approach of this paper assumes an additional input: a process model that describes the current process. The core idea of the algorithm is to use model traces as centroids of the clusters detected, computed from a generalization of the notion of alignment. This way, model explanations of observed behavior are the driving force to compute the clusters, instead of current model agnostic approaches, e.g., which group log traces merely on their vector-space similarity. We believe alignment-based trace clustering provides results more useful for stakeholders. Moreover, in case of log incompleteness, noisy logs or concept drift, they can be more robust for dealing with highly deviating traces. The technique of this paper can be combined with any clustering technique to provide model explanations to the clusters computed. The proposed technique relies on encoding the individual alignment problems into the (pseudo-)Boolean domain, and has been implemented in our tool DarkSider that uses an open-source solver.}, note = {To appear} }
@mastersthesis{m2-hirschi, author = {Hirschi, Lucca}, title = {Reduction of interleavings for trace equivalence checking of security protocols}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2013}, month = aug }
@mastersthesis{m2-doumane, author = {Doumane, Amina}, title = {{\'E}tudes des automates en ludique}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2014}, month = sep }
@phdthesis{doumane-phd2017, author = {Doumane, Amina}, title = {On the infinitary proof theory of logics with fixed points}, school = {Universit{\'e} Paris-Diderot, Paris, France}, type = {Th{\`e}se de doctorat}, year = 2017, month = jun, url = {https://www.irif.fr/~doumane/these.pdf}, pdf = {https://www.irif.fr/~doumane/these.pdf} }
@inproceedings{LDCF-snr17, address = {Uppsala, Sweden}, month = apr, year = 2017, volume = 247, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Erika {\'{A}}brah{\'{a}}m and Sergiy Bogomolov}, acronym = {{SNR}'17}, booktitle = {{P}roceedings of the 3rd {I}nternational {W}orkshop on {S}ymbolic and {N}umerical {M}ethods for {R}eachability {A}nalysis ({SNR}'17)}, author = {Adrien Le{ }Co{\"e}nt and Florian De{ }Vuyst and Ludovic Chamoin and Laurent Fribourg}, title = {Control Synthesis of Nonlinear Sampled Switched Systems using Euler's Method}, pages = {18-33}, url = {https://arxiv.org/abs/1704.03102v1}, pdf = {https://arxiv.org/pdf/1704.03102v1.pdf}, doi = {10.4204/EPTCS.247.2}, abstract = {In this paper, we propose a symbolic control synthesis method for nonlinear sampled switched systems whose vector fields are one-sided Lipschitz. The main idea is to use an approximate model obtained from the forward Euler method to build a guaranteed control. The benefit of this method is that the error introduced by symbolic modeling is bounded by choosing suitable time and space discretizations. The method is implemented in the interpreted language Octave. Several examples of the literature are performed and the results are compared with results obtained with a previous method based on the Runge-Kutta integration method.} }
@inproceedings{F-formats17, address = {Berlin, Germany}, month = sep, year = 2017, volume = {10419}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abate, Alessandro and Geeraerts, Gilles}, acronym = {{FORMATS}'17}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'17)}, author = {Fribourg, Laurent}, title = {Euler's Method Applied to the Control of Switched Systems}, pages = {3-21}, url = {https://doi.org/10.1007/978-3-319-65765-3_1}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/F-formats17.pdf}, doi = {10.1007/978-3-319-65765-3_1}, abstract = {Hybrid systems are a powerful formalism for modeling and reasoning about cyber-physical systems. They mix the continuous and discrete natures of the evolution of computerized systems. Switched systems are a special kind of hybrid systems, with restricted discrete behaviours: those systems only have finitely many different modes of (continuous) evolution, with isolated switches between modes. Such systems provide a good balance between expressiveness and controllability, and are thus in widespread use in large branches of industry such as power electronics and automotive control. The control law for a switched system defines the way of selecting the modes during the run of the system. Controllability is the problem of (automatically) synthesizing a control law in order to satisfy a desired property, such as safety (maintaining the variables within a given zone) or stabilisation (confinement of the variables in a close neighborhood around an objective point). In order to compute the control of a switched system, we need to compute the solutions of the differential equations governing the modes. Euler's method is the most basic technique for approximating such solutions. We present here an estimation of the Euler's method local error, using the notion of ''one-sided Lispchitz constant'' for modes. This yields a general control synthesis approach which can encompass several features such as bounded disturbance and compositionality.} }
@inproceedings{BLL-rp17, address = {London, UK}, month = sep, year = 2017, volume = {10506}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Matthew Hague and Igor Potapov}, acronym = {{RP}'17}, booktitle = {{P}roceedings of the 11th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'17)}, author = {Florian Bruse and Martin Lange and {\'E}tienne Lozes}, title = {Space-Efficient Fragments of Higher-Order Fixpoint Logic}, pages = {26-41}, url = {https://doi.org/10.1007/978-3-319-67089-8_3}, doi = {10.1007/978-3-319-67089-8_3}, abstract = {Higher-Order Fixpoint Logic (HFL) is a modal specification language whose expressive power reaches far beyond that of Monadic Second-Order Logic, achieved through an incorporation of a typed \(\lambda\)-calculus into the modal \(\mu\)-calculus. Its model checking problem on finite transition systems is decidable, albeit of high complexity, namely \(k\)-EXPTIME-complete for formulas that use functions of type order at most \(k>0\). In this paper we present a fragment with a presumably easier model checking problem. We show that so-called tail-recursive formulas of type order \(k\) can be model checked in \((k-1)\)-EXPSPACE, and also give matching lower bounds. This yields generic results for the complexity of bisimulation-invariant non-regular properties, as these can typically be defined in HFL.} }
@inproceedings{LACFDC-rp17, address = {London, UK}, month = sep, year = 2017, volume = {10506}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Matthew Hague and Igor Potapov}, acronym = {{RP}'17}, booktitle = {{P}roceedings of the 11th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'17)}, author = {Adrien Le{ }Co{\"{e}}nt and Julien {Alexandre dit Sandretto} and Alexandre Chapoutot and Laurent Fribourg and Florian De{ }Vuyst and Ludovic Chamoin}, title = {Distributed Control Synthesis Using Euler's Method}, pages = {118-131}, url = {https://link.springer.com/chapter/10.1007/978-3-319-67089-8_9}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LACFDC-rp17.pdf}, doi = {10.1007/978-3-319-67089-8_9}, abstract = {In a previous work, we explained how Euler's method for computing approximate solutions of systems of ordinary differential equations can be used to synthesize safety controllers for sampled switched systems. We continue here this line of research by showing how Euler's method can also be used for synthesizing safety controllers in a distributed manner. The global system is seen as an interconnection of two (or more) sub-systems where, for each component, the sub-state corresponding to the other component is seen as an ?input?; the method exploits (a variant of) the notions of incremental input-to-state stability (\(\delta\)-ISS) and ISS Lyapunov function. We illustrate this distributed control synthesis method on a building ventilation example.} }
@article{HM-tcs17, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Haddad, Serge and Monmege, Benjamin}, title = {Interval iteration algorithm for {MDP}s and {IMDP}s}, volume = {735}, year = {2018}, pages = {111-131}, month = jul, doi = {10.1016/j.tcs.2016.12.003}, url = {http://authors.elsevier.com/sd/article/S0304397516307095}, abstract = {Markov Decision Processes (MDP) are a widely used model including both non-deterministic and probabilistic choices. Minimal and maximal probabilities to reach a target set of states, with respect to a policy resolving non-determinism, may be computed by several methods including value iteration. This algorithm, easy to implement and efficient in terms of space complexity, iteratively computes the probabilities of paths of increasing length. However, it raises three issues: (1) defining a stopping criterion ensuring a bound on the approximation, (2) analysing the rate of convergence, and (3) specifying an additional procedure to obtain the exact values once a sufficient number of iterations has been performed. The first two issues are still open and, for the third one, an upper bound on the number of iterations has been proposed. Based on a graph analysis and transformation of MDPs, we address these problems. First we introduce an interval iteration algorithm, for which the stopping criterion is straightforward. Then we exhibit its convergence rate. Finally we significantly improve the upper bound on the number of iterations required to get the exact values. We extend our approach to also deal with Interval Markov Decision Processes (IMDP) that can be seen as symbolic representations of MDPs.} }
@article{FHLM-deds17, publisher = {Springer}, journal = {Discrete Event Dynamic Systems: Theory and Applications}, author = {{\'E}ric Fabre and Lo{\"i}c H{\'e}lou{\"e}t and Engel Lefaucheux and Herv{\'e} Marchand}, title = {Diagnosability of Repairable Faults}, volume = {28}, number = {2}, month = jun, year = {2018}, pages = {183-213}, doi = {10.1007/s10626-017-0255-8}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FHLM-deds17.pdf}, abstract = {The diagnosis problem for discrete event systems consists in deciding whether some fault event occurred or not in the system, given partial observations on the run of that system. Diagnosability checks whether a correct diagnosis can be issued in bounded time after a fault, for all faulty runs of that system. This problem appeared two decades ago and numerous facets of it have been explored, mostly for permanent faults. It is known for example that diagnosability of a system can be checked in polynomial time, while the construction of a diagnoser is exponential. The present paper examines the case of transient faults, that can appear and be repaired. Diagnosability in this setting means that the occurrence of a fault should always be detected in bounded time, but also before the fault is repaired, in order to prepare for the detection of the next fault or to take corrective measures while they are needed. Checking this notion of diagnosability is proved to be PSPACE-complete. It is also shown that faults can be reliably counted provided the system is diagnosable for faults and for repairs.} }
@inproceedings{BHL-msr17, address = {Marseille, France}, month = nov, year = 2017, futureseries = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {HAL}, editor = {Demongodin, Isabel and Reynier, Pierre-Alain}, acronym = {{MSR}'17}, booktitle = {{A}ctes du 11{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'17)}, author = {Nathalie Bertrand and Serge Haddad and Engel Lefaucheux}, title = {Diagnostic et contr{\^o}le de la d{\'e}gradation des syst{\`e}mes probabilistes}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-msr17.pdf}, abstract = {Le diagnostic actif est op{\'e}r{\'e} par un contr{\^o}leur en vue de rendre un syst{\`e}me diagnosticable. Afin d'{\'e}viter que le contr{\^o}leur ne d{\'e}grade trop fortement le syst{`e}me, on lui affecte g{\'e}n{\'e}ralement un second objectif en termes de qualit{\'e} de service. Dans le cadre des syst{\`e}mes probabilistes, une sp{\'e}cification possible consiste {\`a} assurer une probabilit{\'e} positive qu'une ex{\'e}cution infinie soit correcte, ce qu'on appelle le diagnostic actif s{\^u}r. Nous introduisons ici deux sp{\'e}cifications alternatives. La gamma-correction du syst{\`e}me affecte {\`a} une ex{\'e}cution une valeur de correction d{\'e}pendant d'un facteur de d{\'e}cote gamma et le contr{\^o}leur doit assurer une valeur moyenne sup{\'e}rieure {\`a} un seuil fix{\'e}. La alpha-d{\'e}gradation requiert qu'asymptotiquement, {\`a} chaque unit{\'e} de temps une proportion sup{\'e}rieure {\`a} alpha des ex{\'e}cutions jusqu'alors correctes le demeure. D'un point de vue s{\'e}mantique, nous explicitons des liens significatifs entre les diff{\'e}rentes notions. Algorithmiquement, nous {\'e}tablissons la fronti{\`e}re entre d{\'e}cidabilit{\'e} et ind{\'e}cidabilit{\'e} des probl{\`e}mes et dans le cas positif nous exhibons la complexit{\'e} pr{\'e}cise ainsi qu'une synth{\`e}se, potentiellement {\`a} m{\'e}moire infinie.} }
@inproceedings{BHL-fsttcs17, address = {Kanpur, India}, month = dec, year = 2017, volume = {93}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Satya Lokam and R. Ramanujam}, acronym = {{FSTTCS}'17}, booktitle = {{P}roceedings of the 37th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'17)}, author = {B{\'e}atrice B{\'e}rard and Serge Haddad and Engel Lefaucheux}, title = {Probabilistic Disclosure: Maximisation vs. Minimisation}, pages = {13:1-13:14}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=8384}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/8384/pdf/LIPIcs-FSTTCS-2017-13.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2017.13}, abstract = {We consider opacity questions where an observation function provides to an external attacker a view of the states along executions and secret executions are those visiting some state from a fixed subset. Disclosure occurs when the observer can deduce from a finite observation that the execution is secret, the epsilon-disclosure variant corresponding to the execution being secret with probability greater than 1 - epsilon. In a probabilistic and non deterministic setting, where an internal agent can choose between actions, there are two points of view, depending on the status of this agent: the successive choices can either help the attacker trying to disclose the secret, if the system has been corrupted, or they can prevent disclosure as much as possible if these choices are part of the system design. In the former situation, corresponding to a worst case, the disclosure value is the supremum over the strategies of the probability to disclose the secret (maximisation), whereas in the latter case, the disclosure is the infimum (minimisation). We address quantitative problems (comparing the optimal value with a threshold) and qualitative ones (when the threshold is zero or one) related to both forms of disclosure for a fixed or finite horizon. For all problems, we characterise their decidability status and their complexity. We discover a surprising asymmetry: on the one hand optimal strategies may be chosen among deterministic ones in maximisation problems, while it is not the case for minimisation. On the other hand, for the questions addressed here, more minimisation problems than maximisation ones are decidable.} }
@inproceedings{BFG-fsttcs17, address = {Kanpur, India}, month = dec, year = 2017, volume = {93}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Satya Lokam and R. Ramanujam}, acronym = {{FSTTCS}'17}, booktitle = {{P}roceedings of the 37th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'17)}, author = {Michael Blondin and Alain Finkel and Jean Goubault{-}Larrecq}, title = {Forward Analysis for {WSTS}, {Part III}: {Karp-Miller} Trees}, pages = {16:1-16:15}, url = {https://hal.archives-ouvertes.fr/hal-01736704/}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/8403/pdf/LIPIcs-FSTTCS-2017-16.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2017.16}, abstract = {This paper is a sequel of ''Forward Analysis for WSTS, Part I: Completions'' [STACS 2009, LZI Intl. Proc. in Informatics 3, 433-444] and ''Forward Analysis for WSTS, Part II: Complete WSTS'' [Logical Methods in Computer Science 8(3), 2012]. In these two papers, we provided a framework to conduct forward reachability analyses of WSTS, using finite representations of downwards-closed sets. We further develop this framework to obtain a generic Karp-Miller algorithm for the new class of very-WSTS. This allows us to show that coverability sets of very-WSTS can be computed as their finite ideal decompositions. Under natural assumptions on positive sequences, we also show that LTL model checking for very-WSTS is decidable. The termination of our procedure rests on a new notion of acceleration levels, which we study. We characterize those domains that allow for only finitely many accelerations, based on ordinal ranks.} }
@inproceedings{DLL-fsttcs17, address = {Kanpur, India}, month = dec, year = 2017, volume = {93}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Satya Lokam and R. Ramanujam}, acronym = {{FSTTCS}'17}, booktitle = {{P}roceedings of the 37th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'17)}, author = {St{\'e}phane Demri and {\'E}tienne Lozes and Denis Lugiez}, title = {On Symbolic Heaps Modulo Permission Theories}, pages = {25:1-25:14}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLL-fsttcs17.pdf}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2017.25}, doi = {10.4230/LIPIcs.FSTTCS.2017.25} }
@phdthesis{dubut-phd2017, author = {Dubut, J{\'e}r{\'e}my}, title = {Directed homotopic and homologic theories for geometric models of true concurrency}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2017, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/dubut-phd17.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/dubut-phd17.pdf} }
@phdthesis{gardy-phd2017, author = {Gardy, Patrick}, title = {Semantics of {S}trategy {L}ogic}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2017, month = jun, url = {https://tel.archives-ouvertes.fr/tel-01561802}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/gardy-phd17.pdf} }
@inproceedings{GBBLM-gretsi17, address = {Juan-les-Pins, France}, month = sep, year = 2017, publisher = {}, editor = {}, acronym = {{GRETSI}'17}, booktitle = {Actes du XXVI$^{\text{\`eme}}$ colloque GRETSI}, author = {Mauricio Gonz{\'a}lez and Olivier Beaude and Patricia Bouyer and Samson Lasaulce and Nicolas Markey}, title = {Strat{\'e}gies d'ordonnancement de consommation d'{\'e}nergie en pr{\'e}sence d'information imparfaite de pr{\'e}vision}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GBBLM-gretsi17.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GBBLM-gretsi17.pdf} }
@techreport{Haddad-hal17, author = {Haddad, Serge}, title = {Memoryless Determinacy of Finite Parity Games: Another Simple Proof}, institution = {HAL-inria}, number = {hal-01541508}, month = jun, year = {2017}, type = {Research Report}, url = {https://hal.inria.fr/hal-01541508}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Haddad-hal17.pdf}, note = {7~pages}, abstract = {Memoryless determinacy of (infinite) parity games is an important result with numerous applications. It was first independently established by Emerson and Jutla [1] and Mostowski [2] but their proofs involve elaborate developments. The elegant and simpler proof of Zielonka [3] still requires a nested induction on the finite number of priorities and on ordinals for sets of vertices. There are other proofs for finite games like the one of Bj{\"o}rklund, Sandberg and Vorobyovin [4] that relies on relating infinite and finite duration games. We present here another simple proof that finite parity games are determined with memoryless strategies using induction on the number of relevant states. The closest proof that relies on induction over non absorbing states is the one of Graedel [5]. However instead of focusing on a single appropriate vertex for induction as we do here, he considers two reduced games per vertex, for all the vertices of the game. The idea of reasoning about a single state has been inspired to me by the analysis of finite stochastic priority games by Karelovic and Zielonka [6].} }
@techreport{BJM-arxiv17, author = {Bouyer, Patricia and Markey, Nicolas and Jug{\'e}, Vincent}, institution = {Computing Research Repository}, month = feb, note = {14~pages}, number = {1702.05183}, type = {Research Report}, title = {Courcelle's Theorem Made Dynamic}, year = {2017}, url = {https://arxiv.org/abs/1702.05183}, pdf = {https://arxiv.org/abs/1702.05183} }
@inproceedings{CP-concur17, address = {Berlin, Germany}, month = sep, year = 2017, volume = {85}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Meyer, Roland and Nestmann, Uwe}, acronym = {{CONCUR}'17}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'17)}, author = {Chatain, {\relax Th}omas and Paulev{\'e}, Lo{\"i}c}, title = {Goal-Driven Unfolding of {P}etri Nets}, pages = {18:1-18:16}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7773}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7773/pdf/LIPIcs-CONCUR-2017-18.pdf}, doi = {10.4230/LIPIcs.CONCUR.2017.18}, abstract = {Unfoldings provide an efficient way to avoid the state-space explosion due to interleavings of concurrent transitions when exploring the runs of a Petri net. The theory of adequate orders allows one to define finite prefixes of unfoldings which contain all the reachable markings. In this paper we are interested in reachability of a single given marking, called the goal. We propose an algorithm for computing a finite prefix of the unfolding of a 1-safe Petri net that preserves all minimal configurations reaching this goal. Our algorithm combines the unfolding technique with on-the-fly model reduction by static analysis aiming at avoiding the exploration of branches which are not needed for reaching the goal. We present some experimental results.} }
@inproceedings{BHJ-concur17, address = {Berlin, Germany}, month = sep, year = 2017, volume = {85}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Meyer, Roland and Nestmann, Uwe}, acronym = {{CONCUR}'17}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'17)}, author = {Bouyer, Patricia and Haddad, Serge and Jug{\'e}, Vincent}, title = {Unbounded product-form {P}etri nets}, pages = {31:1--31:16}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7795}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7795/pdf/LIPIcs-CONCUR-2017-31.pdf}, doi = {10.4230/LIPIcs.CONCUR.2017.31}, abstract = {Computing steady-state distributions in infinite-state stochastic systems is in general a very difficult task. Product-form Petri nets are those Petri nets for which the steady-state distribution can be described as a natural product corresponding, up to a normalising constant, to an exponentiation of the markings. However, even though some classes of nets are known to have a product-form distribution, computing the normalising constant can be hard. The class of (closed) \(\Pi^3\)-nets has been proposed in an earlier work, for which it is shown that one can compute the steady-state distribution efficiently. However these nets are bounded. In this paper, we generalise queuing Markovian networks and closed \(\Pi^3\)-nets to obtain the class of open \(\Pi^3\)-nets, that generate infinite-state systems. We show interesting properties of these nets: (1) we prove that liveness can be decided in polynomial time, and that reachability in live \(\Pi^3\)-nets can be decided in polynomial time; (2) we show that we can decide ergodicity of such nets in polynomial time as well; (3) we provide a pseudo-polynomial time algorithm to compute the normalising constant.} }
@inproceedings{AGKS-concur17, address = {Berlin, Germany}, month = sep, year = 2017, volume = {85}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Meyer, Roland and Nestmann, Uwe}, acronym = {{CONCUR}'17}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'17)}, author = {Akshay, S. and Gastin, Paul and Krishna, Shankara Narayanan and Sarkar, Ilias}, title = {Towards an Efficient Tree Automata based technique for Timed Systems}, pages = {39:1--39:15}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7801}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7801/pdf/LIPIcs-CONCUR-2017-39.pdf}, doi = {10.4230/LIPIcs.CONCUR.2017.39}, abstract = {The focus of this paper is the analysis of real-time systems with recursion, through the development of good theoretical techniques which are implementable. Time is modeled using clock variables, and recursion using stacks. Our technique consists of modeling the behaviours of the timed system as graphs, and interpreting these graphs on tree terms by showing a bound on their tree-width. We then build a tree automaton that accepts exactly those tree terms that describe realizable runs of the timed system. The emptiness of the timed system thus boils down to emptiness of a finite tree automaton that accepts these tree terms. This approach helps us in obtaining an optimal complexity, not just in theory (as done in earlier work e.g.[concur16]), but also in going towards an efficient implementation of our technique. To do this, we make several improvements in the theory and exploit these to build a first prototype tool that can analyze timed systems with recursion.} }
@inproceedings{BQS-concur17, address = {Berlin, Germany}, month = sep, year = 2017, volume = {85}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Meyer, Roland and Nestmann, Uwe}, acronym = {{CONCUR}'17}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'17)}, author = {Bollig, Benedikt and Quaas, Karin and Sangnier, Arnaud}, title = {The Complexity of Flat Freeze LTL}, pages = {33:1--33:16}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7799}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7799/pdf/LIPIcs-CONCUR-2017-33.pdf}, doi = {10.4230/LIPIcs.CONCUR.2017.33}, abstract = {We consider the model-checking problem for freeze LTL on one-counter automata (OCAs). Freeze LTL extends LTL with the freeze quantifier, which allows one to store different counter values of a run in registers so that they can be compared with one another. As the model-checking problem is undecidable in general, we focus on the flat fragment of freeze LTL, in which the usage of the freeze quantifier is restricted. Recently, Lechner et al. showed that model checking for flat freeze LTL on OCAs with binary encoding of counter updates is decidable and in 2NEXPTIME. In this paper, we prove that the problem is, in fact, NEXPTIME-complete no matter whether counter updates are encoded in unary or binary. Like Lechner et al., we rely on a reduction to the reachability problem in OCAs with parameterized tests (OCAPs). The new aspect is that we simulate OCAPs by alternating two-way automata over words. This implies an exponential upper bound on the parameter values that we exploit towards an NP algorithm for reachability in OCAPs with unary updates. We obtain our main result as a corollary.} }
@inproceedings{BJM-formats17, address = {Berlin, Germany}, month = sep, year = 2017, volume = {10419}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abate, Alessandro and Geeraerts, Gilles}, acronym = {{FORMATS}'17}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'17)}, author = {Bouyer, Patricia and Jaziri, Samy and Markey, Nicolas}, title = {On the Determinization of Timed Systems}, pages = {25-41}, url = {https://hal.archives-ouvertes.fr/hal-01566436/}, doi = {10.1007/978-3-319-65765-3_2}, abstract = {We introduce a new formalism called automata over a timed domain which provides an adequate framework for the determinization of timed systems. In this formalism, determinization w.r.t. timed language is always possible at the cost of changing the timed domain. We give a condition for determinizability of automata over a timed domain without changing the timed domain, which allows us to recover several known determinizable classes of timed systems, such as strongly-non-zeno timed automata, integer-reset timed automata, perturbed timed automata, etc. Moreover in the case of timed automata this condition encompasses most determinizability conditions from the literature.} }
@inproceedings{GMS-mfcs17, address = {Aalborg, Denmark}, month = aug, year = 2017, volume = {83}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Larsen, Kim G. and Bodlaender, Hans L. and Raskin, Jean-Fran{\c{c}}ois}, acronym = {{MFCS}'17}, booktitle = {{P}roceedings of the 42nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'17)}, author = {Grosshans, Nathan and McKenzie, Pierre and Segoufin, Luc}, title = {The power of programs over monoids in {DA}}, pages = {2:1--2:20}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/8090/}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/8090/pdf/LIPIcs-MFCS-2017-2.pdf}, doi = {10.4230/LIPIcs.MFCS.2017.2}, abstract = {The program-over-monoid model of computation originates with Barrington's proof that it captures the complexity class NC^1. Here we make progress in understanding the subtleties of the model. First, we identify a new tameness condition on a class of monoids that entails a natural characterization of the regular languages recognizable by programs over monoids from the class. Second, we prove that the class known as DA satisfies tameness and hence that the regular languages recognized by programs over monoids in DA are precisely those recognizable in the classical sense by morphisms from QDA. Third, we show by contrast that the well studied class of monoids called J is not tame and we exhibit a regular language, recognized by a program over a monoid from J, yet not recognizable classically by morphisms from the class QJ. Finally, we exhibit a program-length-based hierarchy within the class of languages recognized by programs over monoids from DA.} }
@article{BGH-fmsd17, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Bollig, Benedikt and Grindei, Manuela-Lidia and Habermehl, Peter}, title = {Realizability of Concurrent Recursive Programs}, volume = {53}, number = {3}, year = {2018}, pages = {339-362}, doi = {10.1007/s10703-017-0282-y}, abstract = {We study the realizability problem for concurrent recursive programs: Given a distributed system architecture and a sequential specification over words, find a distributed automata implementation that is equivalent to the specification. This problem is well-studied as far as finite-state processes are concerned, and it has a solution in terms of Zielonka's Theorem. We lift Zielonka's Theorem to the case where processes are recursive and modeled as visibly pushdown (or, equivalently, nested-word) automata. However, contrarily to the finite-state case, it is undecidable whether a specification is realizable or not. Therefore, we also consider suitable underapproximation techniques from the literature developed for multi-pushdown systems, and we show that they lead to a realizability framework with effective algorithms. } }
@article{BDH-lmcs17, journal = {Logical Methods in Computer Science}, author = {Baelde, David and Delaune, St{\'e}phanie and Hirschi, Lucca}, title = {{A Reduced Semantics for Deciding Trace Equivalence}}, volume = {13}, number = {2:8}, year = {2017}, pages = {1-48}, doi = {10.23638/LMCS-13(2:8)2017}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDH-lmcs17.pdf}, url = {https://lmcs.episciences.org/3703}, abstract = {Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e. without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer from a classical combinatorial explosion problem caused by the exploration of many interleavings in the behaviour of processes. M{\"o}dersheim et al. [40] have tackled this problem for reachability properties using partial order reduction techniques. We revisit their work, generalize it and adapt it for equivalence checking. We obtain an optimisation in the form of a reduced symbolic semantics that eliminates redundant interleavings on the fly. The obtained partial order reduction technique has been integrated in a tool called Apte. We conducted complete benchmarks showing dramatic improvements.} }
@article{BFHH-tocl17, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Blondin, Michael and Finkel, Alain and Haase, Christoph and Haddad, Serge}, title = {The Logical View on Continuous {P}etri Nets}, volume = {18}, number = {3}, year = {2017}, pages = {24:1--24:28}, url = {http://doi.acm.org/10.1145/3105908}, doi = {10.1145/3105908}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFHH-tocl17.pdf}, abstract = {Continuous Petri nets are a relaxation of classical discrete Petri nets in which transitions can be fired a fractional number of times, and consequently places may contain a fractional number of tokens. Such continuous Petri nets are an appealing object to study since they over approximate the set of reachable configurations of their discrete counterparts, and their reachability problem is known to be decidable in polynomial time. The starting point of this paper is to show that the reachability relation for continuous Petri nets is definable by a sentence of linear size in the existential theory of the rationals with addition and order. Using this characterization, we obtain decidability and complexity results for a number of classical decision problems for continuous Petri nets. In particular, we settle the open problem about the precise complexity of reachability set inclusion. Finally, we show how continuous Petri nets can be incorporated inside the classical backward coverability algorithm for discrete Petri nets as a pruning heuristic in order to tackle the symbolic state explosion problem. The cornerstone of the approach we present is that our logical characterization enables us to leverage the power of modern SMT-solvers in order to yield a highly performant and robust decision procedure for coverability in Petri nets. We demonstrate the applicability of our approach on a set of standard benchmarks from the literature.} }
@phdthesis{hirschi-phd2017, author = {Hirschi, Lucca}, title = {{Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory \& Practice}}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2017, month = apr, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hirschi-phd17.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hirschi-phd17.pdf} }
@inproceedings{SV-icdt17, address = {Venice, Italy}, month = mar, year = 2017, volume = 68, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Benedikt, Michael and Orsi, Georgio}, acronym = {{ICDT}'17}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'17)}, author = {Segoufin, Luc and Vigny, Alexandre}, title = {Constant Delay Enumeration for FO Queries over Databases with Local Bounded Expansion}, pages = {20:1-20:16}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=7060}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7060/pdf/LIPIcs-ICDT-2017-20.pdf}, doi = {10.4230/LIPIcs.ICDT.2017.20}, abstract = {We consider the evaluation of first-order queries over classes of databases with local bounded expansion. This class was introduced by Nesetril and Ossona de Mendez and generalizes many well known classes of databases, such as bounded degree, bounded tree width or bounded expansion. It is known that over classes of databases with local bounded expansion, first-order sentences can be evaluated in pseudo-linear time (pseudo-linear time means that for all \(\epsilon\) there exists an algorithm working in time \(O(n^{1+\epsilon})\)). Here, we investigate other scenarios, where queries are not sentences. We show that first-order queries can be enumerated with constant delay after a pseudo-linear preprocessing over any class of databases having locally bounded expansion. We also show that, in this context, counting the number of solutions can be done in pseudo-linear time.} }
@phdthesis{stan-phd2017, author = {Stan, Daniel}, title = {Randomized Strategies in Concurrent Games}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2017, month = mar, url = {https://hal.archives-ouvertes.fr/tel-01519354}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/stan-phd17.pdf} }
@article{ABG-ic17, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Aiswarya, C. and Bollig, Benedikt and Gastin, Paul}, title = {An Automata-Theoretic Approach to the Verification of Distributed Algorithms}, volume = {259}, month = apr, year = {2018}, pages = {305-327}, doi = {10.1016/j.ic.2017.05.006}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABG-ic17.pdf}, abstract = {We introduce an automata-theoretic method for the verification of distributed algorithms running on ring networks. In a distributed algorithm, an arbitrary number of processes cooperate to achieve a common goal (e.g., elect a leader). Processes have unique identifiers (pids) from an infinite, totally ordered domain. An algorithm proceeds in synchronous rounds, each round allowing a process to perform a bounded sequence of actions such as send or receive a pid, store it in some register, and compare register contents wrt. the associated total order. An algorithm is supposed to be correct independently of the number of processes. To specify correctness properties, we introduce a logic that can reason about processes and pids. Referring to leader election, it may say that, at the end of an execution, each process stores the maximum pid in some dedicated register. We show that the verification problem of distributed algorithms can be reduced to satisfiability of a formula from propositional dynamic logic with loop and converse (LCPDL), interpreted over grids over a finite alphabet. This translation is independent of any restriction imposed on the algorithm. However, since the verification problem (and satisfiability for LCPDL) is undecidable, we propose an underapproximation technique, which bounds the number of rounds. This is an appealing approach, as the number of rounds needed by a distributed algorithm to conclude is often exponentially smaller than the number of processes. Using our reduction to LCPDL, we provide an automata-theoretic solution, reducing model checking to emptiness for alternating two-way automata on words. Overall, we show that round-bounded verification of distributed algorithms over rings is PSPACE-complete, provided the number of rounds is given in unary.} }
@inproceedings{CK-csf17, address = {Santa Barbara, California, USA}, month = aug, publisher = {{IEEE} Computer Society Press}, editor = {K{\"o}pf, Boris and Chong, Steve}, acronym = {{CSF}'17}, booktitle = {{P}roceedings of the 30th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'17)}, author = {Comon, Hubert and Koutsos, Adrien}, title = {Formal Computational Unlinkability Proofs of RFID Protocols}, pages = {100-114}, year = {2017}, doi = {10.1109/CSF.2017.9}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CK-csf17.pdf}, url = {http://ieeexplore.ieee.org/document/8049714/}, abstract = {We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: 1) To design (and prove sound) axioms reflecting the proper- ties of hash functions (Collision-Resistance, PRF). 2) To formalize computational unlinkability in the model. 3) To illustrate the method, providing the first formal proofs of unlinkability of RFID protocols, in the computational model.} }
@inproceedings{CGKM-csf17, address = {Santa Barbara, California, USA}, month = aug, publisher = {{IEEE} Computer Society Press}, editor = {K{\"o}pf, Boris and Chong, Steve}, acronym = {{CSF}'17}, booktitle = {{P}roceedings of the 30th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'17)}, author = {Calzavara, Stefano and Grishchenko, Ilya and Koutsos, Adrien and Maffei, Matteo}, title = {A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications}, pages = {22-36}, year = {2017}, doi = {10.1109/CSF.2017.19}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CGKM-csf17.pdf}, url = {http://ieeexplore.ieee.org/document/8049649/}, abstract = {The present paper proposes the first static analysis for Android applications which is both flow-sensitive on the heap abstraction and provably sound with respect to a rich formal model of the Android platform. We formulate the analysis as a set of Horn clauses defining a sound over-approximation of the semantics of the Android application to analyse, borrowing ideas from recency abstraction and extending them to our concurrent setting. Moreover, we implement the analysis in HornDroid, a state-of-the-art information flow analyser for Android applica- tions. Our extension allows HornDroid to perform strong updates on heap-allocated data structures, thus significantly increasing its precision, without sacrificing its soundness guarantees. We test our implementation on DroidBench, a popular benchmark of Android applications developed by the research community, and we show that our changes to HornDroid lead to an improvement in the precision of the tool, while having only a moderate cost in terms of efficiency. Finally, we assess the scalability of our tool to the analysis of real applications.} }
@article{KV-jcss17, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Koutsos, Adrien and Vianu, Victor}, title = {{Process-centric views of data-driven business artifacts}}, volume = {86}, number = {1}, year = {2017}, pages = {82-107}, doi = {10.1016/j.jcss.2016.11.012}, month = jun, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KV-jcss17.pdf}, url = {http://dx.doi.org/10.1016/j.jcss.2016.11.012}, abstract = {Declarative, data-aware workflow models are becoming increasingly pervasive. While these have numerous benefits, classical process-centric specifications retain certain advantages. Workflow designers are used to development tools such as BPMN or UML diagrams, that focus on control flow. Views describing valid sequences of tasks are also useful to provide stakeholders with high-level descriptions of the workflow, stripped of the accompanying data. In this paper we study the problem of recovering process-centric views from declarative, data-aware workflow specifications in a variant of IBM's business artifact model. We focus on the simplest process-centric views, specified by finite-state transition systems, describing regular languages. The results characterize when process-centric views of artifact systems are regular, using both linear and branching-time semantics. We also study the impact of data dependencies on regularity of the views. As a side effect, we obtain several new results on verification of business artifacts, including a decidability result for branching-time properties.} }
@inproceedings{FL-icalp17, address = {Warsaw, Poland}, month = jul, volume = {80}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Indyk, Piotr and Muscholl, Anca and Kuhn, Fabian}, acronym = {{ICALP}'17}, booktitle = {{P}roceedings of the 44th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'17)}, author = {Finkel, Alain and Lozes, {\'E}tienne}, title = {Synchronizability of Communicating Finite State Machines is not Decidable}, pages = {122:1-122:14}, year = {2017}, doi = {10.4230/LIPIcs.ICALP.2017.122}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7402/pdf/LIPIcs-ICALP-2017-122.pdf}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7402}, abstract = {A system of communicating finite state machines is synchronizable if its send trace semantics, i.e. the set of sequences of sendings it can perform, is the same when its communications are FIFO asynchronous and when they are just rendez-vous synchronizations. This property was claimed to be decidable in several conference and journal papers for either mailboxes or peer-to-peer communications, thanks to a form of small model property. In this paper, we show that this small model property does not hold neither for mailbox communications, nor for peer-to-peer communications, therefore the decidability of synchronizability becomes an open question. We close this question for peer-to-peer communications, and we show that synchronizability is actually undecidable. We show that synchronizability is decidable if the topology of communications is an oriented ring. We also show that, in this case, synchronizability implies the absence of unspecified receptions and orphan messages, and the channel-recognizability of the reachability set.} }
@inproceedings{Dowek-icalp17, address = {Warsaw, Poland}, month = jul, volume = {80}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Indyk, Piotr and Muscholl, Anca and Kuhn, Fabian}, acronym = {{ICALP}'17}, booktitle = {{P}roceedings of the 44th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'17)}, author = {Dowek, Gilles}, title = {Models and termination of proof reduction in the \(\lambda\Pi\)-calculus modulo theory}, pages = {109:1-109:14}, year = {2017}, doi = {10.4230/LIPIcs.ICALP.2017.109}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2017/7391/pdf/LIPIcs-ICALP-2017-109.pdf}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7391}, abstract = {We define a notion of model for the \(\lambda\Pi\)-calculus modulo theory and prove a soundness theorem. We then use this notion to define a notion of super-consistent theory and prove that proof reduction terminates in the \(\lambda\Pi\)-calculus modulo any super-consistent theory. We prove this way the termination of proof reduction in several theories including Simple type theory and the Calculus of constructions.} }
@inproceedings{FMW-cav17, address = {Heidelberg, Germany}, month = jul, volume = {10427}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Kuncak, Viktor and Majumdar, Rupak}, acronym = {{CAV}'17}, booktitle = {{P}roceedings of the 29th {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'17)}, author = {Fortin, Marie and Muscholl, Anca and Walukiewicz, Igor}, title = {Model-checking linear-time properties of parametrized asynchronous shared-memory pushdown systems}, pages = {155-175}, year = {2017}, doi = {10.1007/978-3-319-63390-9_9}, url = {https://arxiv.org/abs/1606.08707}, abstract = {} }
@inproceedings{HSZ-lics17, address = {Reykjavik, Iceland}, month = jun, publisher = {{IEEE} Press}, editor = {Ouaknine, Jo{\"e}l}, acronym = {{LICS}'17}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'17)}, author = {Halfon, Simon and Schnoebelen, {\relax Ph}ilippe and Zetzsche, Georg}, title = {Decidability, complexity, and expressiveness of first-order logic over the subword ordering}, pages = {1-12}, year = {2017}, doi = {10.1109/LICS.2017.8005141}, url = {https://arxiv.org/abs/1701.07470}, abstract = {We consider first-order logic over the subword ordering on finite words, where each word is available as a constant. Our first result is that the \(\Sigma_1\) theory is undecidable (already over two letters).\par We investigate the decidability border by considering fragments where all but a certain number of variables are alternation bounded, meaning that the variable must always be quantified over languages with a bounded number of letter alternations. We prove that when at most two variables are not alternation bounded, the \(\Sigma_1\) fragment is decidable, and that it becomes undecidable when three variables are not alternation bounded. Regarding higher quantifier alternation depths, we prove that the \(\Sigma_2\) fragment is undecidable already for one variable without alternation bound and that when all variables are alternation bounded, the entire first-order theory is decidable.} }
@inproceedings{CJLS-lics17, address = {Reykjavik, Iceland}, month = jun, publisher = {{IEEE} Press}, editor = {Ouaknine, Jo{\"e}l}, acronym = {{LICS}'17}, booktitle = {{P}roceedings of the 32nd {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'17)}, author = {Colcombet, {\relax Th}omas and Jurdzi{\'n}ski, Marcin and Lazi{\'c}, Ranko and Schmitz, Sylvain}, title = {Perfect Half Space Games}, pages = {1--11}, year = {2017}, doi = {10.1109/LICS.2017.8005105}, url = {http://arxiv.org/abs/1704.05626}, abstract = {We introduce perfect half space games, in which the goal of Player 2 is to make the sums of encountered multi-dimensional weights diverge in a direction which is consistent with a chosen sequence of perfect half spaces (chosen dynamically by Player 2). We establish that the bounding games of Jurdzinski et al. (ICALP 2015) can be reduced to perfect half space games, which in turn can be translated to the lexicographic energy games of Colcombet and Niwinski, and are positionally determined in a strong sense (Player 2 can play without knowing the current perfect half space). We finally show how perfect half space games and bounding games can be employed to solve multi-dimensional energy parity games in pseudo-polynomial time when both the numbers of energy dimensions and of priorities are fixed, regardless of whether the initial credit is given as part of the input or existentially quantified. This also yields an optimal 2EXP complexity with given initial credit, where the best known upper bound was non-elementary.} }
@inproceedings{HPV-icsc17, address = {San Diego, CA, USA}, month = jan, volume = 11, series = {IEEE ICSC}, publisher = {{IEEE} Press}, todoeditor = {D?Auria, Daniela and Liu, Jianquan and Pilato, Giovanni}, acronym = {{ICSC}'17}, booktitle = {{P}roceedings of the 11th International Conference on Semantic Computing ({ICSC}'17)}, author = {Haar, Stefan and Perchy, Salim and Valencia, Frank}, title = {{D-SPACES: Implementing Declarative Semantics for Spatially Structured Information}}, pages = {227-233}, year = {2017}, doi = {10.1109/ICSC.2017.34}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HPV-icsc17.pdf}, url = {https://hal.inria.fr/hal-01328189}, abstract = {We introduce in this paper D-SPACES, an implementation of constraint systems with space and extrusion operators. Constraint systems are algebraic models that allow for a semantic language-like representation of information in systems where the concept of space is a primary structural feature. We give this information mainly an epistemic interpretation and consider various agents as entities acting upon it. D-SPACES is coded as a c++11 library providing implementations for constraint systems, space functions and extrusion functions. The interfaces to access each implementation are minimal and thoroughly documented. D-SPACES also provides property-checking methods as well as an implementation of a specific type of constraint systems (a boolean algebra). This last implementation serves as an entry point for quick access and proof of concept when using these models. Furthermore, we offer an illustrative example in the form of a small social network where users post their beliefs and utter their opinions.} }
@article{GHPRV-jlamp17, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Methods in Programming}, author = {Guzm{\'a}n, Michell and Haar, Stefan and Perchy, Salim and Rueda, Camilo and Valencia, Frank}, title = {{Belief, Knowledge, Lies and Other Utterances in an Algebra for Space and Extrusion}}, volume = {86}, number = {1}, year = {2017}, pages = {107-133}, doi = {10.1016/j.jlamp.2016.09.001}, month = jan, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GHPRV-jlamp17.pdf}, url = {https://hal.inria.fr/hal-01257113}, abstract = {The notion of constraint system (cs) is central to declarative formalisms from concurrency theory such as process calculi for concurrent constraint programming (ccp). Constraint systems are often represented as lattices: their elements, called constraints, represent partial information and their order corresponds to entailment. Recently a notion of n-agent spatial cs was introduced to represent information in concurrent constraint programs for spatially distributed multi-agent systems. From a computational point of view a spatial constraint system can be used to specify partial information holding in a given agent's space (local information). From an epistemic point of view a spatial cs can be used to specify information that a given agent considers true (beliefs). Spatial constraint systems, however, do not provide a mechanism for specifying the mobility of information/processes from one space to another. Information mobility is a fundamental aspect of concurrent systems. In this article we develop the theory of spatial constraint systems with operators to specify information and processes moving from a space to another. We shall investigate the properties of this new family of constraint systems and illustrate their applications. From a computational point of view the new operators provide for process/information extrusion, a central concept in formalisms for mobile communication. From an epistemic point of view extrusion corresponds I to a notion we shall call utterance; a piece of information that an agent communicate to others but that may be inconsistent with the agent's beliefs. Utterances can then be used to express instances of epistemic notions such as hoaxes or intentional lies which are common place in social media. Spatial constraint system can express the epistemic notion of belief by means of space functions that specify local information. We shall also show that spatial constraint can also express the epistemic notion of knowledge by means of a derived spatial operator that specifies global information.} }
@inproceedings{OBH-most17, address = {San Jose, CA, USA}, month = may, editor = {Chen, Hao and Koved, Larry}, booktitle = {{P}roceedings of Mobile Security Technologies (MoST'17), held as part of the {IEEE} Computer Society Security and Privacy Workshops}, author = {{O'Hanlon}, Piers and Borgaonkar, Ravishankar and Hirschi, Lucca}, title = {Mobile subscriber WiFi privacy}, todopages = {252-261}, year = {2017}, tododoi = {}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/OBH-most17.pdf}, abstract = {This paper investigates and analyses the insufficient protections afforded to mobile identities when using today?s operator backed WiFi services. Specifically we detail a range of attacks, on a set of widely deployed authentication protocols, that enable a malicious user to obtain and track a user?s International Mobile Subscriber Identity (IMSI) over WiFi. These attacks are possible due to a lack of sufficient privacy protection measures, which are exacerbated by preconfigured device profiles. We provide a formal analysis of the protocols involved, examine their associated configuration profiles, and document our experiences with reporting the issues to the relevant stakeholders. We detail a range of potential countermeasures to tackle these issues to ensure that privacy is better protected in the future.} }
@inproceedings{VCCT-caise17, address = {Essen, Germany}, month = jun, volume = 10253, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Dubois, Eric and Pohl, Klaus}, acronym = {{CAiSE}'17}, booktitle = {{P}roceedings of the 29th {I}nternational {C}onference on {A}dvanced {I}nformation {S}ystems {E}ngineering ({CAiSE}'17)}, author = {{van Dongen}, Boudewijn and Carmona, Josep and Chatain, {\relax Th}omas and Taymouri, Farbod}, title = {Aligning Modeled and Observed Behavior: A Compromise Between Complexity and Quality}, pages = {94-109}, year = {2017}, doi = {10.1007/978-3-319-59536-8_7}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/VCCT-caise17.pdf}, abstract = {Certifying that a process model is aligned with the real process executions is perhaps the most desired feature a process model may have: aligned process models are crucial for organizations, since strategic decisions can be made easier on models instead of on plain data. In spite of its importance, the current algorithmic support for computing alignments is limited: either techniques that explicitly explore the model behavior (which may be worst-case exponential with respect to the model size), or heuristic approaches that cannot guarantee a solution, are the only alternatives. In this paper we propose a solution that sits right in the middle in the complexity spectrum of alignment techniques; it can always guarantee a solution, whose quality depends on the exploration depth used and local decisions taken at each step. We use linear algebraic techniques in combination with an iterative search which focuses on progressing towards a solution. The experiments show a clear reduction in the time required for reaching a solution, without sacrificing significantly the quality of the alignment obtained.} }
@inproceedings{BBDH-sia17, address = {Montigny-le-Bretonneux, France}, month = mar, editor = {{Di Valentin}, Laurent and Landel, Eric}, acronym = {SIA Simulation Num{\'e}rique}, booktitle = {SIA Simulation Num{\'e}rique}, author = {Barbot, Beno{\^i}t and B{\'e}rard, B{\'e}atrice and Duplouy, Yann and Haddad, Serge}, title = {Statistical Model-Checking for Autonomous Vehicle Safety Validation}, todopages = {}, year = {2017}, todolsvdate-pub = 20170320, tododoi = {}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBDH-sia17.pdf}, url = {https://hal.archives-ouvertes.fr/hal-01491064}, abstract = {We present an application of statistical model-checking to the verification of an autonomous vehicle controller. Our goal is to check safety properties in various traffic situations. More specifically, we focus on a traffic jam situation.\par The controller is specified by a C++ program. Using sensors, it registers positions and velocities of nearby vehicles and modifies the position and velocity of the controlled vehicle to avoid collisions. We model the environment using a stochastic high level Petri net, where random behaviors of other vehicles can be described. We use HASL, a quantitative variant of linear temporal logic, to express the desired properties. A large family of performance indicators can be specified in HASL and we target in particular the expectation of travelled distance or the collision probability.\par We evaluate the properties of this model using COSMOS1. This simulation tool implements numerous statistical techniques such as sequential hypothesis testing and most confidence range computation methods. Its efficiency allowed us to conduct several experiments with success.} }
@inproceedings{BHSS-pn17, address = {Zaragoza, Spain}, month = jun, volume = {10258}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {van der Aalst, Wifred and Best, Eike}, acronym = {{PETRI~NETS}'17}, booktitle = {{P}roceedings of the 38th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'17)}, author = {B{\'e}rard, B{\'e}atrice and Haar, Stefan and Schmitz, Sylvain and Schwoon, Stefan}, title = {The Complexity of Diagnosability and Opacity Verification for {P}etri Nets}, pages = {200-220}, year = {2017}, doi = {10.1007/978-3-319-57861-3_13}, url = {https://hal.inria.fr/hal-01484476}, abstract = {Diagnosability and opacity are two well-studied problems in discrete-event systems. We revisit these two problems with respect to expressiveness and complexity issues. We first relate different notions of diagnosability and opacity. We consider in particular fairness issues and extend the definition of Germanos et al. [ACM TECS, 2015] of weakly fair diagnosability for safe Petri nets to general Petri nets and to opacity questions. Second, we provide a global picture of complexity results for the verification of diagnosability and opacity. We show that diagnosability is NL-complete for finite state systems, PSPACE-complete for safe Petri nets (even with fairness), and EXPSPACE-complete for general Petri nets without fairness, while non diagnosability is inter-reducible with reachability when fault events are not weakly fair. Opacity is ESPACE-complete for safe Petri nets (even with fairness) and undecidable for general Petri nets already without fairness.} }
@misc{JGL:pls16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Encart dans l'article ''S'adapter {\`a} la cyberguerre'', de Karen Elazari, Pour La Science 459}, month = jan, title = {Les m{\'e}thodes formelles: l'autre arme de la cybers{\'e}curit{\'e}}, year = {2016}, pages = {50-55} }
@misc{JGL:stc16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk (plenary speaker), Summer Topology Conference, Leicester, UK}, month = aug, title = {A few things on Noetherian spaces}, year = {2016} }
@misc{JGL:gs16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Galway Symposium, Leicester, UK}, month = aug, title = {An introduction to asymmetric topology and domain theory: why, what, and how}, year = {2016} }
@misc{JGL:dom15, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Domains XII workshop, Cork, Ireland}, month = aug, title = {Formal balls}, year = {2015} }
@misc{JGL:lls14, author = {Goubault{-}Larrecq, Jean}, howpublished = {Matinale de l'innovation Logiciels Libres et S{\'e}curit{\'e}, Paris, France}, month = dec, title = {D{\'e}tection d'intrusions avec {OrchIDS}}, year = {2014} }
@misc{JGL:ccc14, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Continuity, Computability, Constructivity workshop (CCC), Ljubljana, Slovenia}, month = sep, title = {Noetherian spaces}, year = {2014} }
@misc{JGL:cps14, author = {Goubault{-}Larrecq, Jean}, howpublished = {CPS Summer School, Grenoble, France}, month = jul, title = {{OrchIDS}: on the value of rigor in intrusion detection}, year = {2014} }
@misc{JGL:stc13, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk (semi-plenary speaker), Summer Topology Conference, North Bay, Ontario, CA}, month = jul, title = {A few pearls in the theory of quasi-metric spaces}, year = {2013} }
@misc{JGL:dga13, author = {Goubault{-}Larrecq, Jean}, howpublished = {S{\'e}minaire DGA Innosciences. DGA, Bagneux}, month = jun, title = {{OrchIDS}, ou : de l'importance de la s{\'e}mantique}, year = {2013} }
@misc{JGL:at13, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Workshop on Asymmetric Topology, Summer Topology Conference, North Bay, Ontario, CA}, month = jul, title = {A short proof of the {Schr{\"o}der-Simpson} theorem}, year = {2013} }
@misc{JGL:dm16, author = {Goubault{-}Larrecq, Jean}, howpublished = {Invited talk, Dale Miller Festschrift, Paris Diderot University, Paris}, month = dec, title = {A semantics for {{\(\nabla\)}}}, year = {2016} }
@misc{GSHM:dga-inria16, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Hulin-Hubard, Francis and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Rapport final et fourniture 4 du contrat DGA-INRIA Orchids}, month = may, title = {Etat final des travaux engag{\'e}s sur {Orchids}}, year = {2016} }
@misc{GM:dga-inria16, author = {Goubault-Larrecq, Jean and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Fourniture 3 du contrat DGA-INRIA Orchids}, month = may, title = {G{\'e}n{\'e}ration de signatures pour le suivi de flux d'informations}, year = {2016} }
@misc{GSM:dga-inria15, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Rapport interm{\'e}diaire du contrat DGA-INRIA Orchids}, month = may, title = {Etat d'avancement interm{\'e}diaire des travaux engag{\'e}s sur {OrchIDS}}, year = {2015} }
@misc{GSM:dga-inria-2-14, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Fourniture 2 du contrat DGA-INRIA Orchids}, month = may, title = {Techniques et m{\'e}thodes de g{\'e}n{\'e}ration de signatures pour la d{\'e}tection d'intrusions}, year = {2014} }
@misc{GSM:dga-inria-1-14, author = {Goubault-Larrecq, Jean and Sentucq, Pierre-Arnaud and Majorczyk, Fr{\'e}d{\'e}ric}, howpublished = {Fourniture 1 du contrat DGA-INRIA Orchids}, month = may, title = {Politiques de s{\'e}curit{\'e} syst{\`e}me}, year = {2014} }
@misc{AG:anr-cpp12, author = {Adj{\'e}, Assal{\'e} and Goubault-Larrecq, Jean}, howpublished = {Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities), WP 2, version 1}, month = oct, title = {Concrete semantics of programs with non-deterministic and random inputs}, year = {2012}, url = {http://arxiv.org/abs/1210.2605} }
@misc{GL:ARC-ProNoBis-16, author = {Goubault-Larrecq, Jean}, howpublished = {Rapport final ARC ProNoBis}, month = oct, title = {{Pronobis: Probability and nondeterminism, bisimulations and security}}, year = {2007} }
@article{ABH-ijfcs17, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Atig, Mohamed Faouzi and Bollig, Benedikt and Habermehl, Peter}, title = {Emptiness of ordered multi-pushdown automata is {2ETIME}-complete}, volume = {28}, number = {8}, year = {2017}, pages = {945-975}, doi = {10.1142/S0129054117500332}, url = {http://www.worldscientific.com/doi/abs/10.1142/S0129054117500332}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABH-ijfcs17.pdf}, abstract = {We consider ordered multi-pushdown automata, a multi-stack extension of pushdown automata that comes with a constraint on stack operations: a pop can only be performed on the first non-empty stack (which implies that we assume a linear ordering on the collection of stacks). We show that the emptiness problem for multi-pushdown automata is 2ETIME-complete. Containment in 2ETIME is shown by translating an automaton into a grammar for which we can check if the generated language is empty. The lower bound is established by simulating the behavior of an alternating Turing machine working in exponential space. We also compare ordered multi-pushdown automata with the model of bounded-phase (visibly) multi-stack pushdown automata, which do not impose an ordering on stacks, but restrict the number of alternations of pop operations on different stacks.} }
@article{DKP-jar2017, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Demri, St{\'e}phane and Kapur, Deepak and Weidenbach, Christoph}, editor = {Demri, St{\'e}phane and Kapur, Deepak and Weidenbach, Christoph}, title = {Special Issue of Selected Extended Papers of IJCAR 2014}, url = {http://link.springer.com/journal/10817/58/1/page/1}, volume = {58}, number = {1}, year = {2017} }
@inproceedings{AMP-lfmtp16, address = {Porto, Portugal}, month = jun, publisher = {ACM Press}, editor = {Dowek, Gilles and Licata, Daniel R. and Alves, Sandra}, acronym = {{LFMTP}'16}, booktitle = {Proceedings of the 11th {I}nternational {W}orkshop on {L}ogical {F}rameworks and {M}eta-{L}anguages: {T}heory and {P}ractice ({LFMTP}'16)}, author = {Cauderlier, Rapha{\"e}l}, title = {{{A Rewrite System for Proof Constructivization}}}, pages = {2:1-2:7}, year = {2016}, doi = {10.1007/978-3-319-40578-0\_5}, url = {https://hal.inria.fr/hal-01420634/}, pdf = {https://hal.inria.fr/hal-01420634/file/LFMTP_2016.pdf}, abstract = {Proof constructivization is the problem of automatically extracting constructive proofs out of classical proofs. This process is required when classical theorem provers are integrated in intuitionistic proof assistants. We use the ability of rewrite systems to represent partial functions to implement heuristics for proof constructivization in Dedukti, a logical framework based on rewriting in which proofs are first-class objects which can be the subject of computation. We benchmark these heuristics on the proofs output by the automated theorem prover Zenon on the TPTP library of problems.} }
@inproceedings{AMP-rc16, address = {Bologna, Italy}, month = jul, volume = 9720, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Lanese, Ivan and Devitt, Simon}, acronym = {{RC}'16}, booktitle = {8th Conference on Reversible Computation (RC'16)}, author = {Arrighi, Pablo and Martiel, Simon and Perdrix, Simon}, title = {{{Reversible Causal Graph Dynamics}}}, pages = {73-88}, year = {2016}, doi = {10.1007/978-3-319-40578-0\_5}, url = {https://hal.archives-ouvertes.fr/hal-01361427}, abstract = {Causal Graph Dynamics extend Cellular Automata to arbitrary , bounded-degree, time-varying graphs. The whole graph evolves in discrete time steps, and this global evolution is required to have a number of physics-like symmetries: shift-invariance (it acts everywhere the same) and causality (information has a bounded speed of propagation). We add a further physics-like symmetry, namely reversibility.} }
@inproceedings{ADJL-hatt2016, author = {Assaf, Ali and Dowek, Gilles and Jouannaud, Jean-Pierre and Liu, Jiaxiang}, title = {{{Encoding Proofs in Dedukti: the case of Coq proofs}}}, nopages = {}, booktitle = {Preliminary Proceedings of the 1st International Workshop on Hammers for Type Theories (HaTT'16)}, year = {2016}, address = {Coimbra, Portugal}, url = {https://hal.inria.fr/hal-01330980}, pdf = {https://hal.inria.fr/hal-01330980/file/HaTT_2016_paper_3.pdf}, abstract = {A main ambition of the Inria project Dedukti is to serve as a common language for representing and type checking proof objects originating from other proof systems. Encoding these proof objects makes heavy use of the rewriting capabilities of LambdaPiModulo, the formal system on which Dedukti is based. So far, the proofs generated by two automatic proof systems, Zenon and iProver, have been encoded, and can therefore be read and checked by Dedukti. But Dedukti goes far beyond this so-called hammering technique of sending goals to automated provers. Proofs from HOL and Matita can be encoded as well. Some Coq?s proofs can be encoded already, when they do not use universe polymorphism. Our ambition here is to close this remaining gap. To this end, we describe a rewrite-based encoding in LambdaPiModulo of the Calculus of Constructions with a cumulative hierarchy of predicative universes above Prop, which is confluent on open terms.} }
@inproceedings{ADJL-hor2016, author = {Assaf, Ali and Dowek, Gilles and Jouannaud, Jean-Pierre and Liu, Jiaxiang}, title = {{{Untyped Confluence in Dependent Type Theories}}}, nopages = {}, booktitle = {Proceedings of the 8th International Workshop on Higher-Order Rewriting (HOR'16)}, year = {2016}, address = {Porto, Portugal}, url = {https://hal.inria.fr/hal-01330955}, pdf = {https://hal.inria.fr/hal-01330955/file/HOR_2016_paper.pdf}, abstract = {We investigate techniques based on van Oostrom's decreasing diagrams that reduce confluence proofs to the checking of critical pairs in the absence of termination properties, which are useful in dependent type calculi to prove confluence on untyped terms. These techniques are applied to a complex example originating from practice: a faithful encoding, in an extension of LF with rewrite rules on objects and types, of a subset of the calculus of inductive constructions with a cumulative hierarchy of predicative universes above Prop. The rules may be first-order or higher-order, plain or modulo, non-linear on the right or on the left. Variables which occur non-linearly in lefthand sides of rules must take their values in confined types: in our example, the natural numbers. The first-order rules are assumed to be terminating and confluent modulo some theory: in our example, associativity, commutativity and identity. Critical pairs involving higher-order rules must satisfy van Oostrom's decreasing diagram condition wrt their indexes taken as labels.} }
@inproceedings{A-types2016, address = {Novi Sad, Serbia}, volume = {97}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ghilezan, Silvia and Ivetic, Jelena}, acronym = {{TYPES}'16}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {T}ypes for {P}roofs and {P}rograms ({TYPES}'16)}, author = {Assaf, Ali and Burel, Guillaume and Cauderlier, Rapha{\"e}l and Delahaye, David and Dowek, Gilles and Dubois, Catherine and Gilbert, Fr{\'e}d{\'e}ric and Halmagrand, Pierre and Hermant, Olivier and Saillard, Ronan}, title = {{{Expressing theories in the {{\(\lambda\Pi\)}}-calculus modulo theory and in the Dedukti system}}}, year = {2016}, note = {To appear} }
@unpublished{D-preprint2016, title = {{Rules and derivations in an elementary logic course}}, author = {Dowek, Gilles}, note = {preprint}, year = {2016}, month = jan, url = {https://hal.inria.fr/hal-01252124/}, pdf = {https://hal.inria.fr/hal-01252124/file/ttl.pdf}, abstract = {When teaching an elementary logic course to students who have a general scientific background but have never been exposed to logic, we have to face the problem that the notions of deduction rule and of derivation are completely new to them, and are related to nothing they already know, unlike, for instance, the notion of model, that can be seen as a generalization of the notion of algebraic structure. In this note, we defend the idea that one strategy to introduce these notions is to start with the notion of inductive definition [1]. Then, the notion of derivation comes naturally. We also defend the idea that derivations are pervasive in logic and that defining precisely this notion at an early stage is a good investment to later define other notions in proof theory, computability theory, automata theory, ... Finally, we defend the idea that to define the notion of derivation precisely, we need to distinguish two notions of derivation: labeled with elements and labeled with rule names. This approach has been taken in [2].} }
@unpublished{AD-preprint2016, title = {{What is the Planck constant the magnitude of?}}, author = {Arrighi, Pablo and Dowek, Gilles}, note = {preprint}, year = {2016}, month = dec, url = {https://hal.inria.fr/hal-01421711}, pdf = {https://hal.inria.fr/hal-01421711/file/planck.pdf}, abstract = {The Planck constant is the minimal area of one bit.} }
@inproceedings{CD-ictac16, address = {Taipei, Taiwan}, month = oct, volume = 9965, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alves Sampaio, Cesar and Wang, Farn}, acronym = {{ICTAC}'16}, booktitle = {{P}roceedings of the 13th {I}nternational {C}olloquium on {T}heoretical {A}spects of {C}omputing ({ICTAC}'16)}, author = {Cauderlier, Rapha{\"e}l and Dubois, Catherine}, title = {{{ML Pattern-Matching, Recursion, and Rewriting: From FoCaLiZe to Dedukti}}}, pages = {459-468}, year = {2016}, pdf = {https://hal.inria.fr/hal-01420638/file/ICTAC_2016.pdf}, url = {https://hal.inria.fr/hal-01420638/}, abstract = {The programming environment FoCaLiZe allows the user to specify, implement, and prove programs with the help of the theorem prover Zenon. In the actual version, those proofs are verified by Coq. In this paper we propose to extend the FoCaLiZe compiler by a backend to the Dedukti language in order to benefit from Zenon Modulo, an extension of Zenon for Deduction modulo. By doing so, FoCaLiZe can benefit from a technique for finding and verifying proofs more quickly. The paper focuses mainly on the process that overcomes the lack of local pattern-matching and recursive definitions in Dedukti.} }
@mastersthesis{m2-thire, author = {Thir{\'e}, Fran{\c{c}}ois}, title = {Reverse engineering on arithmetic proofs}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2016}, month = aug, url = {https://hal.inria.fr/hal-01424816}, pdf = {https://hal.inria.fr/hal-01424816/file/main.pdf}, note = {26~pages} }
@phdthesis{ph-phd2016, author = {Halmagrand, Pierre}, title = {{Automated Deduction and Proof Certification for the B Method}}, school = {{Conservatoire National Des Arts et M{\'e}tiers, Paris}}, type = {Th{\`e}se de doctorat}, year = 2016, month = dec, url = {https://hal.inria.fr/tel-01420460/} }
@inproceedings{AD-dcm15, address = {Cali, Colombia}, month = mar, volume = 204, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Mu\~noz, C\'esar A. and P\'erez, Jorge A.}, acronym = {{DCM}'15}, booktitle = {{P}roceedings of the 11th {I}nternational {W}orkshop on {D}evelopments in {C}omputational {M}odels ({DCM}'15)}, author = {Arrighi, Pablo and Dowek, Gilles}, doi = {10.4204/EPTCS.204.1}, pages = {1-10}, title = {Free fall and cellular automata}, url = {https://hal.inria.fr/hal-01421712}, year = {2016}, abstract = {Three reasonable hypotheses lead to the thesis that physical phenomena can be described and simulated with cellular automata. In this work, we attempt to describe the motion of a particle upon which a constant force is applied, with a cellular automaton, in Newtonian physics, in Special Relativity, and in General Relativity. The results are very different for these three theories.} }
@article{BGMS-toct16, publisher = {ACM Press}, journal = {ACM Transactions on Computation Theory}, author = {Beame, Paul and Grosshans, Nathan and McKenzie, Pierre and Segoufin, Luc}, title = {Nondeterminism and An Abstract Formulation of {Ne\v{c}iporuk}'s Lower Bound Method}, volume = {9}, number = {1}, year = {2016}, pages = {5:1-5:34}, doi = {10.1145/3013516}, month = dec }
@article{ACR-tecs17, publisher = {ACM Press}, journal = {ACM Transactions in Embedded Computing Systems}, author = {Andr{\'e}, {\'E}tienne and Chatain, {\relax Th}omas and Rodr{\'\i}guez, C{\'e}sar}, title = {Preserving Partial-Order Runs in Parametric Time {P}etri Nets}, volume = {16}, number = {2}, year = {2017}, pages = {43:1-43:26}, doi = {10.1145/3012283}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACR-tecs17.pdf}, abstract = {Parameter synthesis for timed systems aims at deriving parameter valuations satisfying a given property. In this article, we target concurrent systems. We use partial-order semantics for parametric time Petri nets as a way to both cope with the well-known state-space explosion due to concurrency and significantly enhance the result of an existing synthesis algorithm. Given a reference parameter valuation, our approach synthesizes other valuations preserving the partial-order executions of the reference parameter valuation. We show the applicability of our approach using a tool applied to asynchronous circuits.} }
@incollection{BLMOW-kimfest17, author = {Bouyer, Patricia and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas and Ouaknine, Jo{\"e}l and Worrell, James}, title = {Timed temporal logics}, editor = {Aceto, Luca and Bacci, Giorgio and Bacci, Giovani and Ing{\'o}lfsd{\'o}ttir, Anna and Legay, Axel and Mardare, Radu}, booktitle = {Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {10460}, year = {2017}, pages = {211-230}, month = aug, doi = {10.1007/978-3-319-65764-6_11}, abstract = {Since the early 1990's, classical temporal logics have been extended with timing constraints. While temporal logics only express contraints on the order of events, their timed extensions can add quantitative constraints on delays between those events. We survey expressiveness and algorithmic results on those logics, and discuss semantic choices that may look unimportant but do have an impact on the questions we consider.}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLMOW-kimfest17.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLMOW-kimfest17.pdf} }
@inproceedings{BG-wst18, address = {Oxford, UK}, month = jul, editor = {Lucas, Salvador}, acronym = {{WST}'18}, booktitle = {{P}roceedings of the 16th {I}nternational {W}orkshop on {T}ermination ({WST}'18)}, author = {Blanqui, Fr{\'e}d{\'e}ric and Genestier, Guillaume}, title = {Termination of $\lambda \Pi$ modulo rewriting using the size-change principle}, pages = {10--14}, year = 2018, pdf = {https://hal.inria.fr/hal-01944731/file/main.pdf} }
@inproceedings{Thire-lfmtp2018, address = {Oxford, UK}, month = jul, year = 2018, publisher = {ACM Press}, editor = {Blanqui, Fr{\'e}d{\'e}ric and Reis, Giselle}, acronym = {{LFMTP}'18}, booktitle = {Proceedings of the 13th {I}nternational {W}orkshop on {L}ogical {F}rameworks and {M}eta-{L}anguages: {T}heory and {P}ractice ({LFMTP}'18)}, author = {Thir{\'e}, Fran{\c{c}}ois}, title = {{S}haring a {L}ibrary between {P}roof {A}ssistants: {R}eaching out to the {HOL} {F}amily *}, pages = {57--71}, url = {http://eptcs.web.cse.unsw.edu.au/paper.cgi?LFMTP2018.5}, pdf = {https://hal.inria.fr/hal-01929714/file/sttforall-lfmtp.pdf}, doi = {10.4204/EPTCS.274.4} }
@inproceedings{Burel-mfcs2018, address = {Liverpool, UK}, month = aug, volume = {117}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Potapov, Igor and Spirakis, Paul and Worrell, James}, acronym = {{MFCS}'18}, booktitle = {{P}roceedings of the 42nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'18)}, author = {Burel, Guillaume}, title = {Linking Focusing and Resolution with Selection}, pages = {9:1--9:14}, year = {2018}, doi = {10.4230/LIPIcs.MFCS.2018.9}, url = {https://hal.inria.fr/hal-01670476}, pdf = {https://hal.inria.fr/hal-01670476/file/lipics.pdf}, futureannote = {Keywords: logic in computer science, automated deduction, proof theory, sequent calculus, refinements of resolution, deduction modulo theory, polarization} }
@inproceedings{CLS-jfla19, address = {Lamoura, France}, month = jan, year = 2019, editor = {Nicolas Magaud and Zaynah Dargaye}, acronym = {{JFLA}'19}, booktitle = {{A}ctes des 30{\`e}mes {J}ourn{\'e}es {F}rancophones sur les {L}angages {A}pplicatifs ({JFLA}'19)}, author = {Simon Colin and Rodolphe Lepigre and Gabriel Scherer}, title = {{Unboxing Mutually Recursive Type Definitions}}, pdf = {https://lepigre.fr/files/publications/CLS2019.pdf}, abstract = {In modern OCaml, single-argument datatype declarations (variants with a single constructor, records with a single immutable field) can sometimes be ''unboxed''. This means that their memory representation is the same as their single argument, omitting an indirection through the variant or record constructor, thus achieving better memory efficiency. However, in the case of generalized/guarded algebraic datatypes (GADTs), unboxing is not always possible due to a subtle assumption about the runtime representation of OCaml values. The current correctness check is incomplete, rejecting many valid definitions, in particular those involving mutually-recursive datatype declarations. In this paper, we explain the notion of separability as a semantic for the unboxing criterion, and propose a set of inference rules to check separability. From these inference rules, we derive a new implementation of the unboxing check that properly supports mutually-recursive definitions.}, note = {To appear} }
@inproceedings{LR-lfmtp2018, address = {Oxford, UK}, month = jul, year = 2018, publisher = {ACM Press}, editor = {Blanqui, Fr{\'e}d{\'e}ric and Reis, Giselle}, acronym = {{LFMTP}'18}, booktitle = {Proceedings of the 13th {I}nternational {W}orkshop on {L}ogical {F}rameworks and {M}eta-{L}anguages: {T}heory and {P}ractice ({LFMTP}'18)}, author = {Rodolphe Lepigre and Christophe Raffalli}, title = {Abstract Representation of Binders in OCaml using the Bindlib Library}, pages = {42-56}, url = {https://arxiv.org/abs/1807.01872}, pdf = {https://arxiv.org/pdf/1807.01872.pdf}, doi = {10.4204/EPTCS.274.4}, abstract = {The Bindlib library for OCaml provides a set of tools for the manipulation of data structures with variable binding. It is very well suited for the representation of abstract syntax trees, and has already been used for the implementation of half a dozen languages and proof assistants (including a new version of the logical framework Dedukti). Bindlib is optimised for fast substitution, and it supports variable renaming. Since the representation of binders is based on higher-order abstract syntax, variable capture cannot arise during substitution. As a consequence, variable names are not updated at substitution time. They can however be explicitly recomputed to avoid ''visual capture'' (i.e., distinct variables with the same apparent name) when a data structure is displayed.} }
@article{LR-toplas18, publisher = {ACM Press}, journal = {ACM Transactions on Programming Languages and Systems}, author = {Rodolphe Lepigre and Christophe Raffalli}, title = {{Practical Subtyping for Curry-Style Languages}}, volume = {41}, number = {1}, year = {2018}, pages = {5:1--5:58}, doi = {10.1145/3285955}, pdf = {https://lepigre.fr/files/publications/LepRaf2018a.pdf}, abstract = {We present a new, syntax-directed framework for Curry-style type systems with subtyping. It supports a rich set of features, and allows for a reasonably simple theory and implementation. The system we consider has sum and product types, universal and existential quantifiers, and inductive and coinductive types. The latter two may carry size invariants that can be used to establish the termination of recursive programs. For example, the termination of quicksort can be derived by showing that partitioning a list does not increase its size. The system deals with complex programs involving mixed induction and coinduction, or even mixed polymorphism and (co-)induction. One of the key ideas is to separate the notion of size from recursion. We do not check the termination of programs directly, but rather show that their (circular) typing proofs are well-founded. Termination is then obtained using a standard (semantic) normalisation proof. To demonstrate the practicality of the system, we provide an implementation accepting all the examples discussed in the article.} }
@inproceedings{L-types2017, address = {Budapest, Hungary}, year = 2018, volume = {104}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ambrus Kaposi and Tam{\'a}s Kozsik}, acronym = {{TYPES}'17}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {T}ypes for {P}roofs and {P}rograms ({TYPES}'17}, author = {Rodolphe Lepigre}, title = {{PML\(_2\):} Integrated Program Verification in ML}, pages = {4:1--4:27}, url = {http://drops.dagstuhl.de/opus/volltexte/2018/10052/}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/10052/pdf/LIPIcs-TYPES-2017-4.pdf}, doi = {10.4230/LIPIcs.TYPES.2017.4}, abstract = {We present the PML\(_2\) language, which provides a uniform environment for programming, and for proving properties of programs in an ML-like setting. The language is Curry-style and call-by-value, it provides a control operator (interpreted in terms of classical logic), it supports general recursion and a very general form of (implicit, non-coercive) subtyping. In the system, equational properties of programs are expressed using two new type formers, and they are proved by constructing terminating programs. Although proofs rely heavily on equational reasoning, equalities are exclusively managed by the type-checker. This means that the user only has to choose which equality to use, and not where to use it, as is usually done in mathematical proofs. In the system, writing proofs mostly amounts to applying lemmas (possibly recursive function calls), and to perform case analyses (pattern matchings).} }
@inproceedings{CHKP-valuetools17, address = {Venice, Italy}, month = dec, year = 2017, acronym = {{VALUETOOLS}'17}, booktitle = {{P}roceedings of the 11th {I}nternational {C}onference on {P}erformance {E}valuation {M}ethodologies and {T}ools ({VALUETOOLS}'17)}, author = {Chatzikokolakis, Kostas and Haddad, Serge and Kassem, Ali and Palamidessi, Catuscia}, title = {{Trading Optimality for Performance in Location Privacy}}, pages = {221-222}, url = {https://arxiv.org/abs/1710.05524}, pdf = {https://arxiv.org/pdf/1710.05524.pdf}, doi = {10.1145/3150928.3150962}, abstract = {Location-Based Services (LBSs) provide invaluable aid in the everyday activities of many individuals, however they also pose serious threats to the user' privacy. There is, therefore, a growing interest in the development of mechanisms to protect location privacy during the use of LBSs. Nowadays, the most popular methods are probabilistic, and the so-called optimal method achieves an optimal trade-off between privacy and utility by using linear optimization techniques. Unfortunately, due to the complexity of linear programming, the method is unfeasible for a large number n of locations, because the constraints are \(O(n^3)\). In this paper, we propose a technique to reduce the number of constraints to \(O(n^2)\), at the price of renouncing to perfect optimality. We show however that on practical situations the utility loss is quite acceptable, while the gain in performance is significant.} }
@incollection{SD-EORM18, author = {Demri, St{\'e}phane}, title = {Reasoning about reversal-bounded counter machines}, editor = {Goli{\'n}ska-Pilarek, Joanna and Zawidzki, Micha\l}, booktitle = {Ewa Orlowska on Relational Methods in Logic and Computer Science}, publisher = {Springer}, series = {Outstanding Contributions to Logic}, volume = {17}, year = {2018}, pages = {441-479}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SD-EORM.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SD-EORM.pdf} }
@inproceedings{AFMS-vmcai2019, address = {Cascais/Lisbon, Portugal}, month = jan, year = 2019, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Enea, Constantin and Piskac, Ruzica}, acronym = {{VMCAI}'19}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'19)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and Mota, Jean-Marc and Soulat, Romain}, title = {Verification of an industrial asynchronous leader election algorithm using abstractions and parametric model checking}, pages = {409-424}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFMS-vmcai19.pdf}, abstract = {The election of a leader in a network is a challenging task, especially when the processes are asynchronous, i.e., execute an algorithm with time-varying periods. Thales developed an industrial election algorithm with an arbitrary number of processes, that can possibly fail. In this work, we prove the correctness of a variant of this industrial algorithm. We use a method combining abstraction, the SafeProver solver, and a parametric timed model-checker. This allows us to prove the correctness of the algorithm for a large number \(p\) of processes (\(p = 5000\)).} }
@inproceedings{HKP-vmcai2019, address = {Cascais/Lisbon, Portugal}, month = jan, year = 2019, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Enea, Constantin and Piskac, Ruzica}, acronym = {{VMCAI}'19}, booktitle = {{P}roceedings of the 20th {I}nternational {C}onference on {V}erification, {M}odel {C}hecking and {A}bstract {I}nterpretation ({VMCAI}'19)}, author = {Haar, Stefan and Kolc{\'a}k, Juraj and Paulev{\'e}, Lo{\"i}c}, title = {{Combining Refinement of Parametric Models with Goal-Oriented Reduction of Dynamics}}, pages = {555-576}, url = {https://hal.archives-ouvertes.fr/hal-01940174/}, pdf = {https://hal.archives-ouvertes.fr/hal-01940174/file/manuscript.pdf}, abstract = {Parametric models abstract part of the specification of dynamical models by integral parameters. They are for example used in computational systems biology, notably with parametric regulatory networks, which specify the global architecture (interactions) of the networks, while parameterising the precise rules for drawing the possible temporal evolutions of the states of the components. A key challenge is then to identify the discrete parameters corresponding to concrete models with desired dynamical properties. This paper addresses the restriction of the abstract execution of parametric regulatory (discrete) networks by the means of static analysis of reachability properties (goal states). Initially defined at the level of concrete parameterised models, the goal-oriented reduction of dynamics is lifted to parametric networks, and is proven to preserve all the minimal traces to the specified goal states. It results that one can jointly perform the refinement of parametric networks (restriction of domain of parameters) while reducing the necessary transitions to explore and preserving reachability properties of interest.} }
@phdthesis{dallon-phd2018, author = {Dallon, Antoine}, title = {{Verification of indistinguishability properties in cryptographic protocols} -- {Small attacks and efficient decision with SAT-Equiv}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2018, month = nov, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dallon-phd18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dallon-phd18.pdf} }
@phdthesis{duplouy-phd2018, author = {Duplouy, Yann}, title = {{Applying Formal Methods to Autonomous Vehicle Control}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2018, month = nov, url = {http://www.lsv.fr/~duplouy/defence/} }
@inproceedings{BGMR-gandalf18, address = {Saarbr{\"u}cken, Germany}, month = sep, volume = {277}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Andrea Orlandini and Martin Zimmermann}, acronym = {{GandALF}'18}, booktitle = {{P}roceedings of the 9th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'18)}, author = {Bouyer, Patricia and Gonz{\'a}lez, Mauricio and Markey, Nicolas and Randour, Mickael}, title = {Multi-weighted Markov Decision Processes with Reachability Objectives}, pages = {250-264}, year = {2018}, doi = {10.4204/EPTCS.277.18}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMR-gandalf18.pdf}, url = {http://arxiv.org/abs/1809.03107}, abstract = {In this paper, we are interested in the synthesis of schedulers in double-weighted Markov decision processes, which satisfy both a percentile constraint over a weighted reachability condition, and a quantitative constraint on the expected value of a random variable defined using a weighted reachability condition. This problem is inspired by the modelization of an electric-vehicle charging problem. We study the cartography of the problem, when one parameter varies, and show how a partial cartography can be obtained via two sequences of opimization problems. We discuss completeness and feasability of the method.} }
@inproceedings{BJM-rv18, address = {Limassol, Cyprus}, month = nov, volume = 11237, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Colombo, Christian and Leucker, Martin}, acronym = {{RV}'18}, booktitle = {{P}roceedings of the 18th {W}orkshop on {R}untime {V}erification ({RV}'18)}, author = {Bouyer, Patricia and Jaziri, Samy and Markey, Nicolas}, title = {Efficient Timed Diagnosis Using Automata with Timed Domains}, pages = {205-221}, year = {2018}, doi = {10.1007/978-3-030-03769-7_12}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BJM-rv18.pdf}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BJM-rv18.pdf}, abstract = {We consider the problems of efficiently diagnosing and predicting what did (or will) happen in a partially-observable one-clock timed automaton. We introduce timed sets as a formalism to keep track of the evolution of the reachable configurations over time, and use our previous work on automata over timed domains to build a candidate diagnoser for our timed automaton. We report on our implementation of this approach compared to the approach of [Tripakis, Fault diagnosis for timed automata, 2002].} }
@inproceedings{BDH-esorics18, address = {Barcelona, Spain}, month = sep, year = 2018, volume = {11098}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, acronym = {{ESORICS}'18}, booktitle = {{P}roceedings of the 23rd {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'18)}, author = {David Baelde and St{\'e}phanie Delaune and Lucca Hirschi}, title = {{POR} for Security Protocol Equivalences - Beyond Action-Determinism}, pages = {385-405}, url = {https://arxiv.org/abs/1804.03650}, doi = {10.1007/978-3-319-99073-6\_19}, abstract = {Formal methods have proved effective to automatically analyse protocols. Recently, much research has focused on verifying trace equivalence on protocols, which is notably used to model interesting privacy properties such as anonymity or unlinkability. Several tools for checking trace equivalence rely on a naive and expensive exploration of all interleavings of concurrent actions, which calls for partial-order reduction (POR) techniques. In this paper, we present the first POR technique for protocol equivalences that does not rely on an action-determinism assumption: we recast trace equivalence as a reachability problem, to which persistent and sleep set techniques can be applied, and we show how to effectively apply these results in the context of symbolic execution. We report on a prototype implementation, improving the tool DeepSec.} }
@inproceedings{CDD-esorics18, address = {Barcelona, Spain}, month = sep, year = 2018, volume = {11098}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, acronym = {{ESORICS}'18}, booktitle = {{P}roceedings of the 23rd {E}uropean {S}ymposium on {R}esearch in {C}omputer {S}ecurity ({ESORICS}'18)}, author = {V{\'e}ronique Cortier and Antoine Dallon and St{\'e}phanie Delaune}, title = {Efficiently Deciding Equivalence for Standard Primitives and Phases}, pages = {491-511}, url = {https://hal.archives-ouvertes.fr/hal-01819366}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-esorics18.pdf}, doi = {10.1007/978-3-319-99073-6\_24}, abstract = {Privacy properties like anonymity or untraceability are now well identified, desirable goals of many security protocols. Such properties are typically stated as equivalence properties. However, automatically checking equivalence of protocols often yields efficiency issues.\par We propose an efficient algorithm, based on graph planning and SATsolving. It can decide equivalence for a bounded number of sessions, for protocols with standard cryptographic primitives and phases (often necessary to specify privacy properties), provided protocols are well-typed, that is encrypted messages cannot be confused. The resulting implementation, SAT-Equiv, demonstrates a significant speed-up w.r.t. other existing tools that decide equivalence, covering typically more than 100 sessions. Combined with a previous result, SAT-Equiv can now be used to prove security, for some protocols, for an unbounded number of sessions.} }
@article{BLMP-jml18, publisher = {World Scientific}, journal = {Journal of Mathematical Logic}, author = {Brattka, Vasco and Le{~}Roux, St{\'e}phane and Miller, Joseph S. and Pauly, Arno}, title = {{Connected Choice and Brouwer's Fixed Point Theorem}}, year = {2018}, note = {To appear} }
@article{KS-lmcs19, journal = {Logical Methods in Computer Science}, author = {P. Karandikar and Schnoebelen, {\relax Ph}ilippe}, title = {The height of piecewise-testable languages and the complexity of the logic of subwords}, volume = {15}, number = {2}, pages = {6:1-6:27}, year = {2019}, month = apr, pdf = {https://lmcs.episciences.org/5409/pdf}, url = {https://lmcs.episciences.org/5409}, abstract = {The height of a piecewise-testable language \(L\) is the maximum length of the words needed to define \(L\) by excluding and requiring given subwords. The height of \(L\) is an important descriptive complexity measure that has not yet been investigated in a systematic way. This paper develops a series of new techniques for bounding the height of finite languages and of languages obtained by taking closures by subwords, superwords and related operations. As an application of these results, we show that \(FO^2(A^*,\sqsubseteq)\), the two-variable fragment of the first-order logic of sequences with the subword ordering, can only express piecewise-testable properties and has elementary complexity.} }
@inproceedings{D-time18, address = {Warsaw, Poland}, month = oct, year = 2018, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Natasha Alechina and Kjetil Norvag and Wojciech Penczek}, acronym = {{TIME}'18}, booktitle = {{P}roceedings of the 25th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'18)}, author = {Demri, St{\'e}phane}, title = {On temporal and separation logics}, pages = {1:1-1:4}, url = {http://drops.dagstuhl.de/opus/volltexte/2018/9766/pdf/LIPIcs-TIME-2018-1.pdf} }
@mastersthesis{m2-Hilaire, author = {Hilaire, Mathieu}, title = {{Complexity of the reachability problem for parametric timed automata}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2018}, month = sep, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hilaire-M2-2018.pdf} }
@techreport{CHKTP-hal18, author = {Chatain, {\relax Th}omas and Haar, Stefan and Kolc{\'a}k, Juraj and Thakkar, Aalok and Paulev{\'e}, Lo{\"i}c}, institution = {HAL}, month = oct, note = {33~pages}, number = {hal-01893106}, type = {Research Report}, title = {{Concurrency in Boolean networks}}, year = {2018}, url = {https://hal.inria.fr/hal-01893106}, pdf = {https://hal.inria.fr/hal-01893106/document}, abstract = {Boolean networks (BNs) are widely used to model the qualitative dynamics of biological systems. Besides the logical rules determining the evolution of each component with respect to the state of its regulators, the scheduling of components updates can have a dramatic impact on the predicted behaviours. In this paper, we explore the use of Contextual Petri Nets (CPNs) to study dynamics of BNs with a concurrency theory perspective. After showing bi-directional translations between CPNs and BNs and analogies between results on synchronism sensitivies, we illustrate that usual updating modes for BNs can miss plausible behaviours, i.e., incorrectly conclude on the absence/impossibility of reaching specific configurations. Taking advantage of CPN semantics enabling more behaviour than the generalized asynchronous updating mode, we propose an encoding of BNs ensuring a correct abstraction of any multivalued refinement, as one may expect to achieve when modelling biological systems with no assumption on its time features.} }
@phdthesis{Lefaucheux-phd2018, author = {Lefaucheux, Engel}, title = {Controlling Information in Probabilistic Systems}, school = {Universit{\'e} Rennes~1, Rennes, France}, type = {Th{\`e}se de doctorat}, year = 2018, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/lefaucheux-phd18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/lefaucheux-phd18.pdf} }
@phdthesis{Grosshans-phd2018, author = {Grosshans, Nathan}, title = {The limits of {Ne\v{c}iporuk}'s method and the power of programs over monoids taken from small varieties of finite monoids}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2018, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/grosshans-phd18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/grosshans-phd18.pdf} }
@inproceedings{LPR-fsttcs18, address = {Ahmedabad, India}, month = dec, year = 2018, volume = {122}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Sumit Ganguly and Paritosh Pandya}, acronym = {{FSTTCS}'18}, booktitle = {{P}roceedings of the 38th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'18)}, author = {Le{~}Roux, Stephane and Pauly, Arno and Randour, Mickael}, title = {Extending finite-memory determinacy to Boolean combinations of winning conditions}, pages = {38:1-38:20}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9937}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9937/pdf/LIPIcs-FSTTCS-2018-38.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2018.38}, abstract = {We study finite-memory (FM) determinacy in games on finite graphs, a central question for applications in controller synthesis, as FM strategies correspond to implementable controllers. We establish general conditions under which FM strategies suffice to play optimally, even in a broad multi-objective setting. We show that our framework encompasses important classes of games from the literature, and permits to go further, using a unified approach. While such an approach cannot match ad-hoc proofs with regard to tightness of memory bounds, it has two advantages: first, it gives a widely-applicable criterion for FM determinacy; second, it helps to understand the cornerstones of FM determinacy, which are often hidden but common in proofs for specific (combinations of) winning conditions.} }
@inproceedings{M-fsttcs18, address = {Ahmedabad, India}, month = dec, year = 2018, volume = {122}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Sumit Ganguly and Paritosh Pandya}, acronym = {{FSTTCS}'18}, booktitle = {{P}roceedings of the 38th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'18)}, author = {Alessio Mansutti}, title = {Extending propositional separation logic for robustness properties}, pages = {42:1-42:23}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9941}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9941/pdf/LIPIcs-FSTTCS-2018-42.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2018.42}, abstract = {We study an extension of propositional separation logic that can specify robustness properties, such as acyclicity and garbage freedom, for automatic verification of stateful programs with singly-linked lists. We show that its satisfiability problem is PSpace-complete, whereas modest extensions of the logic are shown to be Tower-hard. As separating implication, reachability predicates (under some syntactical restrictions) and a unique quantified variable are allowed, this logic subsumes several PSpace-complete separation logics considered in previous works.} }
@inproceedings{BHL-fsttcs18, address = {Ahmedabad, India}, month = dec, year = 2018, volume = {122}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Sumit Ganguly and Paritosh Pandya}, acronym = {{FSTTCS}'18}, booktitle = {{P}roceedings of the 38th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'18)}, author = {B{\'e}atrice B{\'e}rard and Stefan Haar and Lo{\"i}c H{\'e}lou{\"e}t}, title = {Hyper Partial Order Logic}, pages = {20:1-20:21}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9919}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9919/pdf/LIPIcs-FSTTCS-2018-20.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2018.20}, abstract = {We define HyPOL, a local hyper logic for partial order models, expressing properties of sets of runs. These properties depict shapes of causal dependencies in sets of partially ordered executions, with similarity relations defined as isomorphisms of past observations. Unsurprisingly, since comparison of projections are included, satisfiability of this logic is undecidable. We then address model checking of HyPOL and show that, already for safe Petri nets, the problem is undecidable. Fortunately, sensible restrictions of observations and nets allow us to bring back model checking of HyPOL to a decidable problem, namely model checking of MSO on graphs of bounded treewidth.} }
@inproceedings{FLS-fsttcs18, address = {Ahmedabad, India}, month = dec, year = 2018, volume = {122}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Sumit Ganguly and Paritosh Pandya}, acronym = {{FSTTCS}'18}, booktitle = {{P}roceedings of the 38th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'18)}, author = {Alain Finkel and J{\'e}r{\^o}me Leroux and Gr{\'e}goire Sutre}, title = {Reachability for Two-Counter Machines with One Test and One Reset}, pages = {31:1-31:14}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9930}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9930/pdf/LIPIcs-FSTTCS-2018-31.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2018.31}, abstract = {We prove that the reachability relation of two-counter machines with one zero-test and one reset is Presburger-definable and effectively computable. Our proof is based on the introduction of two classes of Presburger-definable relations effectively stable by transitive closure. This approach generalizes and simplifies the existing different proofs and it solves an open problem introduced by Finkel and Sutre in 2000.} }
@inproceedings{BLS-fsttcs18, address = {Ahmedabad, India}, month = dec, year = 2018, volume = {122}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Sumit Ganguly and Paritosh Pandya}, acronym = {{FSTTCS}'18}, booktitle = {{P}roceedings of the 38th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'18)}, author = {Baelde, David and Lick, Anthony and Schmitz, Sylvain}, title = {A Hypersequent Calculus with Clusters for Tense Logic over Ordinals}, pages = {15:1-15:19}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9914}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9914/pdf/LIPIcs-FSTTCS-2018-15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2018.15}, abstract = {Prior's tense logic forms the core of linear temporal logic, with both past-and future-looking modalities. We present a sound and complete proof system for tense logic over ordinals. Technically, this is a hypersequent system, enriched with an ordering, clusters, and annotations. The system is designed with proof search algorithms in mind, and yields an optimal coNP complexity for the validity problem. It entails a small model property for tense logic over ordinals: every satisfiable formula has a model of order type at most \(\omega^2\). It also allows to answer the validity problem for ordinals below or exactly equal to a given one.} }
@techreport{CHP-arxiv18, author = {Chatain, {\relax Th}omas and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, institution = {Computing Research Repository}, month = aug, note = {15~pages}, number = {1808.10240}, type = {Research Report}, title = {Most Permissive Semantics of Boolean Networks}, year = {2018}, url = {https://arxiv.org/abs/1808.10240}, pdf = {https://arxiv.org/pdf/1808.10240v1.pdf}, abstract = {As shown in [3], the usual update modes of Boolean networks (BNs), including synchronous and (generalized) asynchronous, fail to capture behaviours introduced by multivalued refinements. Thus, update modes do not allow a correct abstract reasoning on dynamics of biological systems, as they may lead to reject valid BN models.\par We introduce a new semantics for interpreting BNs which meets with a correct abstraction of any multivalued refinements, with any update mode. This semantics subsumes all the usual updating modes, while enabling new behaviours achievable by more concrete models. Moreover, it appears that classical dynamical analyses of reachability and attractors have a simpler computational complexity: \begin{itemize} \item reachability can be assessed in a polynomial number of iterations (instead of being PSPACE-complete with update modes); \item attractors are hypercubes, and deciding the existence of attractors with a given upper-bounded dimension is in NP (instead of PSPACE-complete with update modes). \end{itemize} The computation of iterations is in NP in the very general case, and is linear when local functions are monotonic, or with some usual representations of functions of BNs (binary decision diagrams, Petri nets, automata networks, etc.).\par In brief, the most permissive semantics of BNs enables a correct abstract reasoning on dynamics of BNs, with a greater tractability than previously introduced update modes.\par This technical report lists the main definitions and properties of the most permissive semantics of BNs, and draw some remaining open questions.} }
@inproceedings{JK-ccs18, address = {Toronto, Canada}, month = oct, publisher = {ACM Press}, editor = {Backes, Michael and Wang, XiaoFeng}, acronym = {{CCS}'18}, booktitle = {{P}roceedings of the 25th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'18)}, author = {Barthe, Gilles and Fan, Xiong and Gancher, Joshua and Gr{\'e}goire, Benjamin and Jacomme, Charlie and Shi, Elaine}, title = {Symbolic Proofs for Lattice-Based Cryptography}, pages = {538-555}, year = {2018}, pdf = {https://eprint.iacr.org/2018/765.pdf}, url = {https://dl.acm.org/citation.cfm?doid=3243734.3243825} }
@inproceedings{BLS-pods19, address = {Amsterdam, Netherlands}, month = jun # {-} # jul, publisher = {ACM Press}, editor = {Christoph Koch}, acronym = {{PODS}'19}, booktitle = {{P}roceedings of the 38th {A}nnual {ACM} {SIGACT}-{SIGMOD}-{SIGART} {S}ymposium on {P}rinciples of {D}atabase {S}ystems ({PODS}'19)}, author = {Baelde, David and Lick, Anthony and Schmitz, Sylvain}, title = {Decidable {XP}ath Fragments in the Real World}, pages = {285-302}, year = 2019, doi = {10.1145/3294052.3319685}, url = {https://hal.inria.fr/hal-01852475}, abstract = {XPath is arguably the most popular query language for selecting elements in XML documents. Besides query evaluation, query satisfiability and containment are the main computational problems for XPath; they are useful, for instance, to detect dead code or validate query optimisations. These problems are undecidable in general, but several fragments have been identified over time for which satisfiability (or query containment) is decidable: CoreXPath 1.0 and 2.0 without so-called data joins, fragments with data joins but limited navigation, etc. However, these fragments are often given in a simplified syntax, and sometimes wrt. a simplified XPath semantics. Moreover, they have been studied mostly with theoretical motivations, with little consideration for the practically relevant features of XPath. To investigate the practical impact of these theoretical fragments, we design a benchmark compiling thousands of real-world XPath queries extracted from open-source projects. These queries are then matched against syntactic fragments from the literature. We investigate how to extend these fragments with seldom-considered features such as free variables, data tests, data joins, and the last() and id() functions, for which we provide both undecidability and decidability results. We analyse the coverage of the original and extended fragments, and further provide a glimpse at which other practically-motivated features might be worth investigating in the future.} }
@inproceedings{FN-disc18, address = {New Orleans, USA}, month = oct, volume = 121, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ulrich Schmid}, acronym = {{DISC}'18}, booktitle = {{P}roceedings of the 32nd {I}nternational {S}ymposium on {D}istributed {C}omputing ({DISC}'18)}, author = {F{\"u}gger, Matthias and Nowak, {\relax Th}omas}, title = {Fast Multidimensional Asymptotic and Approximate Consensus}, pages = {27:1-27:15}, year = {2018}, url = {https://arxiv.org/abs/1805.04923} }
@inproceedings{BLS-atva18, address = {Los Angeles, California, USA}, month = oct, year = {2018}, volume = {11138}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Shuvendu Lahiri and Chao Wang}, acronym = {{ATVA}'18}, booktitle = {{P}roceedings of the 16th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'18)}, author = {Benedikt Bollig and Mathieu Lehaut and Nathalie Sznajder}, title = {Round-Bounded Control of Parameterized Systems}, pages = {370-386}, url = {https://hal.archives-ouvertes.fr/hal-01849206}, doi = {10.1007/978-3-030-01090-4_22}, abstract = {We consider systems with unboundedly many processes that communicate through shared memory. In that context, simple verification questions have a high complexity or, in the case of pushdown processes, are even undecidable. Good algorithmic properties are recovered under round-bounded verification, which restricts the system behavior to a bounded number of round-robin schedules. In this paper, we extend this approach to a game-based setting. This allows one to solve synthesis and control problems and constitutes a further step towards a theory of languages over infinite alphabets.} }
@phdthesis{halfon-phd2018, author = {Halfon, Simon}, title = {On Effective Representations of Well Quasi-Orderings}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2018, month = jun, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/halfon-phd18.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/halfon-phd18.pdf} }
@inproceedings{BBJ-csl18, address = {Birmingham, UK}, month = sep, year = 2018, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ghica, Dan R. and Jung, Achim}, acronym = {{CSL}'18}, booktitle = {{P}roceedings of the 27th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'18)}, author = {B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Jug{\'e}, Vincent}, title = {Finite bisimulations for dynamical systems with overlapping trajectories}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9693}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9693/pdf/LIPIcs-CSL-2018-26.pdf}, doi = {10.4230/LIPIcs.CSL.2018.26}, abstract = {Having a finite bisimulation is a good feature for a dynamical system, since it can lead to the decidability of the verification of reachability properties. We investigate a new class of o-minimal dynamical systems with very general flows, where the classical restrictions on trajectory intersections are partly lifted. We identify conditions, that we call Finite and Uniform Crossing: When Finite Crossing holds, the time-abstract bisimulation is computable and, under the stronger Uniform Crossing assumption, this bisimulation is finite and definable.} }
@inproceedings{GMS-concur18, address = {Beijing, China}, month = sep, year = 2018, volume = {118}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Schewe, Sven and Zhang, Lijun}, acronym = {{CONCUR}'18}, booktitle = {{P}roceedings of the 29th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'18)}, author = {Paul Gastin and Sayan Mukherjee and B. Srivathsan}, title = {Reachability in timed automata with diagonal constraints}, pages = {28:1-28:17}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9566}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9566/pdf/LIPIcs-CONCUR-2018-28.pdf}, doi = {10.4230/LIPIcs.CONCUR.2018.28}, abstract = {We consider the reachability problem for timed automata having diagonal constraints (like x - y < 5) as guards in transitions. The best algorithms for timed automata proceed by enumerating reachable sets of its configurations, stored in a data structure called ''zones''. Simulation relations between zones are essential to ensure termination and efficiency. The algorithm employs a simulation test Z <= Z' which ascertains that zone Z does not reach more states than zone Z', and hence further enumeration from Z is not necessary. No effective simulations are known for timed automata containing diagonal constraints as guards. We propose a simulation relation <=_{LU}^d for timed automata with diagonal constraints. On the negative side, we show that deciding Z not <=_{LU}^d Z' is NP-complete. On the positive side, we identify a witness for Z not <=_{LU}^d Z' and propose an algorithm to decide the existence of such a witness using an SMT solver. The shape of the witness reveals that the simulation test is likely to be efficient in practice.} }
@inproceedings{BFG-concur18, address = {Beijing, China}, month = sep, year = 2018, volume = {118}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Schewe, Sven and Zhang, Lijun}, acronym = {{CONCUR}'18}, booktitle = {{P}roceedings of the 29th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'18)}, author = {Bollig, Benedikt and Fortin, Marie and Gastin, Paul}, title = {It Is Easy to Be Wise After the Event: Communicating Finite-State Machines Capture First-Order Logic with ''Happened Before''}, pages = {7:1-7:17}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=9545}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2018/9545/pdf/LIPIcs-CONCUR-2018-7.pdf}, doi = {10.4230/LIPIcs.CONCUR.2018.7}, abstract = {Message sequence charts (MSCs) naturally arise as executions of communicating finite-state machines (CFMs), in which finite-state processes exchange messages through unbounded FIFO channels. We study the first-order logic of MSCs, featuring Lamport's happened-before relation. We introduce a star-free version of propositional dynamic logic (PDL) with loop and converse. Our main results state that (i) every first-order sentence can be transformed into an equivalent star-free PDL sentence (and conversely), and (ii) every star-free PDL sentence can be translated into an equivalent CFM. This answers an open question and settles the exact relation between CFMs and fragments of monadic second-order logic. As a byproduct, we show that first-order logic over MSCs has the three-variable property.} }
@article{CFMF-fac18, publisher = {Springer}, journal = {Formal Aspects of Computing}, author = {Rapha{\"e}l Chane-Yack-Fa and Marc Frappier and Amel Mammar and Alain Finkel}, title = {{Parameterized Verification of Monotone Information Systems}}, volume = {30}, number = {3-4}, year = {2018}, pages = {463-489}, doi = {10.1007/s00165-018-0460-8}, url = {https://link.springer.com/article/10.1007/s00165-018-0460-8}, abstract = {In this paper, we study the information system verification problem as a parameterized verification one. Informations systems are modeled as multi-parameterized systems in a formal language based on the Algebraic State-Transition Diagrams (ASTD) notation. Then, we use the Well Structured Transition Systems (WSTS) theory to solve the coverability problem for an unbounded ASTD state space. Moreover, we define a new framework to prove the effective pred-basis condition of WSTSs, i.e. the computability of a base of predecessors for every states.} }
@mastersthesis{m2-Gonzalez, author = {Gonz{\'a}lez, Mauricio}, title = {{Constructions d'Information Parfaite pour certains Jeux {\`a} Information Imparfaite. Quelques Algorithmes.}}, school = {Universit{\'e} Pierre et Marie Curie, Paris, France}, type = {Rapport de {M}aster}, year = {2015}, month = dec }
@mastersthesis{m2-Fang, author = {Fang, Erwin}, title = {{Permissive multi-strategies in timed games}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2013}, month = aug }
@mastersthesis{m2-Fortin, author = {Fortin, Marie}, title = {{Verification of distributed systems with parameterized network topology}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2015}, month = sep }
@mastersthesis{m2-Jaziri, author = {Jaziri, Samy}, title = {{Robustness issues in priced timed automata}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2014}, month = sep }
@inproceedings{BLS-aiml18, address = {Bern, Switzerland}, month = aug, year = 2018, publisher = {College Publications}, editor = {Guram Bezhanishvili and Giovanna D'Agostino and George Metcalfe and Thomas Studer}, acronym = {{AiML}'18}, booktitle = {{P}roceedings of the 10th {C}onference on {A}dvances in {M}odal {L}ogics ({AiML}'18)}, author = {Baelde, David and Lick, Anthony and Schmitz, Sylvain}, title = {A Hypersequent Calculus with Clusters for Linear Frames}, pages = {36-55}, url = {https://hal.inria.fr/hal-01756126}, abstract = {The logic Kt4.3 is the basic modal logic of linear frames. Along with its extensions, it is found at the core of linear-time temporal logics and logics on words. In this paper, we consider the problem of designing proof systems for these logics, in such a way that proof search yields decision procedures for validity with an optimal complexity---coNP in this case. In earlier work, Indrzejczak has proposed an ordered hypersequent calculus that is sound and complete for Kt4.3 but does not yield any decision procedure. We refine his approach, using a hypersequent structure that corresponds to weak rather than strict total orders, and using annotations that reflect the model-theoretic insights given by small models for Kt4.3. We obtain a sound and complete calculus with an associated coNP proof search algorithm. These results extend naturally to the cases of unbounded and dense frames, and to the complexity of the two-variable fragment of first-order logic over total orders.} }
@inproceedings{DF-aiml18, address = {Bern, Switzerland}, month = aug, year = 2018, publisher = {College Publications}, editor = {Guram Bezhanishvili and Giovanna D'Agostino and George Metcalfe and Thomas Studer}, acronym = {{AiML}'18}, booktitle = {{P}roceedings of the 10th {C}onference on {A}dvances in {M}odal {L}ogics ({AiML}'18)}, author = {Demri, St{\'e}phane and Fervari, Raul}, title = {On the complexity of modal separation logics}, pages = {179-198}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DF-aiml18.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DF-aiml18.pdf} }
@phdthesis{Gilbert-phd2018, author = {Gilbert, Fr{\'e}d{\'e}ric}, title = {{Extending higher-order logic with predicate subtyping}}, school = {Universit{\'e} Paris~7, Paris, France}, type = {Th{\`e}se de doctorat}, year = 2018, month = apr, pdf = {https://hal.inria.fr/hal-01673518/file/dissertation.pdf} }
@mastersthesis{m2-LeenaSubramaniam, author = {Chaitanya Leena Subramaniam}, title = {{Cubical Type Theory in Dedukti}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2017}, month = sep }
@techreport{Burel-hal18, author = {Burel, Guillaume}, institution = {HAL Research Report}, number = {hal-01670476}, type = {Research Report}, title = {{Linking Focusing and Resolution with Selection}}, year = {2018}, month = apr, url = {https://hal.inria.fr/hal-01670476}, pdf = {https://hal.inria.fr/hal-01670476/file/lipics.pdf}, abstract = {Focusing and selection are techniques that shrink the proof search space for respectively sequent calculi and resolution. To bring out a link between them, we generalize them both: we introduce a sequent calculus where each occurrence of an atom can have a positive or a negative polarity; and a resolution method where each literal, whatever its sign, can be selected in input clauses. We prove the equivalence between cut-free proofs in this sequent calculus and derivations of the empty clause in that resolution method. Such a generalization is not semi-complete in general, which allows us to consider complete instances that correspond to theories of any logical strength. We present three complete instances: first, our framework allows us to show that ordinary focusing corresponds to hyperresolution and semantic resolution; the second instance is deduction modulo theory and the related framework called superdeduction; and a new setting, not captured by any existing framework, extends deduction modulo theory with rewriting rules having several left-hand sides, which restricts even more the proof search space.} }
@techreport{Thire-hal17, author = {Thir{\'e}, Fran{\c{c}}ois}, institution = {HAL Research Report}, number = {hal-01668250}, type = {Research Report}, title = {{Exporting an Arithmetic Library from Dedukti to HOL}}, year = {2017}, month = dec, url = {https://hal.inria.fr/hal-01668250}, pdf = {https://hal.inria.fr/hal-01668250/file/sttforall-fscd.pdf}, abstract = {Today, we observe a large diversity of proof systems. This diversity has the negative consequence that a lot of theorems are proved many times. Unlike programming languages, it is difficult for these systems to cooperate because they do not implement the same logic. Logical frameworks are a class of theorems provers that overcome this issue by their capacity of implementing various logics. In this work, we study the STT\(\forall_{\beta\delta}\) logic, an extension of the Simple Type Theory that has been encoded in the logical framework Dedukti. We show that this new logic is a good candidate to export proofs to other provers. As an example, we show how this logic has been encoded into Dedukti and how we used it to export proofs to the HOL family provers via OpenTheory.} }
@mastersthesis{m2-genestier, author = {Genestier, Guillaume}, title = {Termination checking in the \(\lambda\Pi\)-calculus modulo theory}, school = {Universit{\'e} Paris~7, Paris, France}, type = {Rapport de {M}aster}, year = {2017}, month = sep, url = {https://hal.inria.fr/hal-01676409}, pdf = {https://hal.inria.fr/hal-01676409/file/Genestier_RapportLMFI.pdf} }
@mastersthesis{m2-defourne, author = {Defourn{\'e}, Antoine}, title = {{Proof Tactics in Dedukti}}, school = {Inria Saclay}, type = {Rapport de {M}aster}, year = {2017}, month = sep, url = {https://hal.inria.fr/hal-01661872}, pdf = {https://hal.inria.fr/hal-01661872/file/rapport_pfe_ensimag.pdf} }
@inproceedings{FNS-podc18, address = {Egham, UK}, month = jul, publisher = {ACM Press}, editor = {Keidar, Idit}, acronym = {{PODC}'18}, booktitle = {Proceedings of the {ACM} Symposium on Principles of Distributed Computing ({PODC}'18)}, author = {F{\"u}gger, Matthias and Nowak, {\relax Th}omas and Schwarz, Manfred}, title = {Tight Bounds for Asymptotic and Approximate Consensus}, pages = {325-334}, year = {2018}, doi = {10.1145/3212734.3212762}, url = {https://arxiv.org/abs/1705.02898}, abstract = {In this work we study the performance of asymptotic and approximate consensus algorithms in dynamic networks. The asymptotic consensus problem requires a set of agents to repeatedly set their outputs such that the outputs converge to a common value within the convex hull of initial values. This problem, and the related approximate consensus problem, are fundamental building blocks in distributed systems where exact consensus among agents is not required, e.g., man-made distributed control systems, and have applications in the analysis of natural distributed systems, such as flocking and opinion dynamics. We prove new nontrivial lower bounds on the contraction rates of asymptotic consensus algorithms, from which we deduce lower bounds on the time complexity of approximate consensus algorithms. In particular, the obtained bounds show optimality of asymptotic and approximate consensus algorithms presented in [Charron-Bost et al., ICALP'16] for certain classes of networks that include classical failure assumptions, and confine the search for optimal bounds in the general case. \par Central to our lower bound proofs is an extended notion of valency, the set of reachable limits of an asymptotic consensus algorithm starting from a given configuration. We further relate topological properties of valencies to the solvability of exact consensus, shedding some light on the relation of these three fundamental problems in dynamic networks.} }
@article{Z-icomp18, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Zetzsche, Georg}, title = {The Emptiness Problem for Valence Automata over Graph Monoids}, year = {2018}, note = {To appear} }
@article{LZ-tocs18, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Lohrey, Markus and Zetzsche, Georg}, title = {Knapsack in Graph Groups}, volume = {62}, number = {1}, year = {2018}, month = jan, pages = {192-246}, doi = {10.1007/s00224-017-9808-3} }
@article{BHL-icomp19, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Nathalie Bertrand and Serge Haddad and Engel Lefaucheux}, title = {{A Tale of Two Diagnoses in Probabilistic Systems}}, volume = {269}, year = {2019}, month = dec, doi = {10.1016/j.ic.2019.104441}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHL-icomp18.pdf}, abstract = {Diagnosis of partially observable stochastic systems prone to faults was introduced in the late nineties. Diagnosability, i.e. the existence of a diagnoser, may be specified in different ways: exact diagnosability requires that almost surely a fault is detected and that no fault is erroneously claimed; approximate diagnosability tolerates a small error probability when claiming a fault; last, accurate approximate diagnosability guarantees that the error probability can be chosen arbitrarily small. In this article, we first refine the specification of diagnosability by identifying three criteria: (1) detecting faulty runs or providing information for all runs (2) considering finite or infinite runs, and (3) requiring or not a uniform detection delay. We then give a complete picture of relations between the different diagnosability specifications for probabilistic systems and establish characterisations for most of them in the finite-state case. Based on these characterisations, we develop decision procedures, study their complexity and prove their optimality. We also design synthesis algorithms to construct diagnosers and we analyse their memory requirements. Finally we establish undecidability of the diagnosability problems for which we provided no characterisation.} }
@inproceedings{SGF-hscc18, address = {Porto, Portugal}, month = apr, publisher = {ACM Press}, editor = {Prandini, Maria and Deshmukh, Jyotirmoy V.}, acronym = {{HSCC}'18}, booktitle = {{P}roceedings of the 21st {ACM} {I}nternational {C}onference on {H}ybrid {S}ystems: {C}omputation and {C}ontrol ({HSCC}'18)}, author = {Saoud, Adnane and Girard, Antoine and Fribourg, Laurent}, title = {Contract based Design of Symbolic Controllers for Vehicle Platooning}, pages = {277-278}, year = {2018}, doi = {10.1145/3178126.3187001}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SGF-hscc18.pdf}, abstract = {In this work, we present an application of symbolic control and contract based design techniques to vehicle platooning. We use a compositional approach based on continuous-time assume-guarantee contracts. Each vehicle in the platoon is assigned an assumeguarantee contract; and a controller is synthesized using symbolic control to enforce the satisfaction of this contract. The assumeguarantee framework makes it possible to deal with different types of vehicles and asynchronous controllers (i.e controllers with different sampling periods). Numerical results illustrate the effectiveness of the approach.}, note = {Poster} }
@article{JGL-mscs18, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {A semantics for nabla}, volume = {29}, pages = {1250--1274}, year = {2019}, doi = {10.1017/S0960129518000063}, url = {https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science/article/semantics-for-nabla/A3337AB54DC58CBDDEC78116F4390777} }
@article{B-jfp18, publisher = {Cambridge University Press}, journal = {Journal of Functional Programming}, author = {Blanqui, Fr{\'e}d{\'e}ric}, title = {Size-based termination of higher-order rewriting}, volume = {28}, year = {2018}, month = apr, doi = {10.1017/S0956796818000072}, pdf = {https://hal.inria.fr/hal-01424921/file/main.pdf}, url = {https://www.cambridge.org/core/journals/journal-of-functional-programming/article/sizebased-termination-of-higherorder-rewriting/2134D9160988448FA62DD693D337892D}, abstract = {We provide a general and modular criterion for the termination of simply typed \(\lambda\)-calculus extended with function symbols defined by user-defined rewrite rules. Following a work of Hughes, Pareto and Sabry for functions defined with a fixpoint operator and pattern matching, several criteria use typing rules for bounding the height of arguments in function calls. In this paper, we extend this approach to rewriting-based function definitions and more general user-defined notions of size.} }
@article{AM-prd17, publisher = {American Physical Society}, journal = {Physical Review D}, author = {Arrighi, Pablo and Martiel, Simon}, title = {Quantum causal graph dynamics}, volume = {96}, number = {2}, year = {2017}, pdf = {https://arxiv.org/pdf/1607.06700.pdf}, abstract = {Consider a graph having quantum systems lying at each node. Suppose that the whole thing evolves in discrete time steps, according to a global, unitary causal operator. By causal we mean that information can only propagate at a bounded speed, with respect to the distance given by the graph. Suppose, moreover, that the graph itself is subject to the evolution, and may be driven to be in a quantum superposition of graphs—in accordance to the superposition principle. We show that these unitary causal operators must decompose as a finite-depth circuit of local unitary gates. This unifies a result on Quantum Cellular Automata with another on Reversible Causal Graph Dynamics. Along the way we formalize a notion of causality which is valid in the context of quantum superpositions of time-varying graphs, and has a number of good properties. } }
@book{AD18, title = {{Le temps des algorithmes}}, author = {Abiteboul, Serge and Dowek, Gilles}, url = {https://hal.inria.fr/hal-01502505}, publisher = {{Editions Le Pommier}}, pages = {192}, year = {2017}, isbn = {978-2-7465-1175-0} }
@article{AGK-lmcs18, journal = {Logical Methods in Computer Science}, author = {Akshay, S. and Gastin, Paul and Krishna, Shankara Narayanan}, title = {Analyzing Timed Systems Using Tree Automata}, volume = {14}, number = {2}, pages = {1-35}, year = {2018}, month = may, doi = {10.23638/LMCS-14(2:8)2018}, pdf = {https://lmcs.episciences.org/4489/pdf}, url = {https://lmcs.episciences.org/4489}, abstract = {Timed systems, such as timed automata, are usually analyzed using their operational semantics on timed words. The classical region abstraction for timed automata reduces them to (untimed) finite state automata with the same time-abstract properties, such as state reachability. We propose a new technique to analyze such timed systems using finite tree automata instead of finite word automata. The main idea is to consider timed behaviors as graphs with matching edges capturing timing constraints. When a family of graphs has bounded tree-width, they can be interpreted in trees and MSO-definable properties of such graphs can be checked using tree automata. The technique is quite general and applies to many timed systems. In this paper, as an example, we develop the technique on timed pushdown systems, which have recently received considerable attention. Further, we also demonstrate how we can use it on timed automata and timed multi-stack pushdown systems (with boundedness restrictions).} }
@inproceedings{BBFLMR-fm18, address = {Oxford, UK}, month = jul, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Roscoe, {Bill W.} and Peleska, Jan}, acronym = {{FM}'18}, booktitle = {{P}roceedings of the 22nd {I}nternational {S}ymposium on {F}ormal {M}ethods ({FM}'18)}, author = {Bacci, Giovanni and Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim G. and Markey, Nicolas and Reynier, Pierre-Alain}, title = {Optimal and Robust Controller Synthesis Using Energy Timed Automata with Uncertainty}, pages = {203-221}, year = {2018}, doi = {10.1007/978-3-319-95582-7_12}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBFLMR-fm18.pdf}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBFLMR-fm18.pdf}, note = {Best paper award}, abstract = {In this paper, we propose a novel framework for the synthesis of robust and optimal energy-aware controllers. The framework is based on energy timed automata, allowing for easy expression of timing-constraints and variable energy-rates. We prove decidability of the energy-constrained infinite-run problem in settings with both certainty and uncertainty of the energy-rates. We also consider the optimization problem of identifying the minimal upper bound that will permit existence of energy-constrained infinite runs. Our algorithms are based on quantifier elimination for linear real arithmetic. Using Mathematica and Mjollnir, we illustrate our framework through a real industrial example of a hydraulic oil pump. Compared with previous approaches our method is completely automated and provides improved results.} }
@article{BBBC-jlamp18, publisher = {Elsevier Science Publishers}, journal = {Journal of Logic and Algebraic Methods in Programming}, author = {Bertrand, Nathalie and Bouyer, Patricia and Brihaye, Thomas and Carlier, Pierre}, title = {When are Stochastic Transition Systems Tameable?}, volume = {99}, pages = {41-96}, year = {2018}, month = oct, doi = {10.1016/j.jlamp.2018.03.004}, pdf = {https://arxiv.org/pdf/1703.04806.pdf}, url = {https://doi.org/10.1016/j.jlamp.2018.03.004}, abstract = {A decade ago, Abdulla, Ben Henda and Mayr introduced the elegant concept of decisiveness for denumerable Markov chains [1]. Roughly speaking, decisiveness allows one to lift most good properties from finite Markov chains to denumerable ones, and therefore to adapt existing verification algorithms to infinite-state models. Decisive Markov chains however do not encompass stochastic real-time systems, and general stochastic transition systems (STSs for short) are needed. In this article, we provide a framework to perform both the qualitative and the quantitative analysis of STSs. First, we define various notions of decisiveness (inherited from [1]), notions of fairness and of attractors for STSs, and make explicit the relationships between them. Then, we define a notion of abstraction, together with natural concepts of soundness and completeness, and we give general transfer properties, which will be central to several verification algorithms on STSs. We further design a generic construction which will be useful for the analysis of ω-regular properties, when a finite attractor exists, either in the system (if it is denumerable), or in a sound denumerable abstraction of the system. We next provide algorithms for qualitative model-checking, and generic approximation procedures for quantitative model-checking. Finally, we instantiate our framework with stochastic timed automata (STA), generalized semi-Markov processes (GSMPs) and stochastic time Petri nets (STPNs), three models combining dense-time and probabilities. This allows us to derive decidability and approximability results for the verification of these models. Some of these results were known from the literature, but our generic approach permits to view them in a unified framework, and to obtain them with less effort. We also derive interesting new approximability results for STA, GSMPs and STPNs.} }
@inproceedings{JKS-eurosp17, address = {Paris, France}, month = apr, publisher = {{IEEE} Press}, editor = {Andrei Sabelfeld and Matthew Smith}, acronym = {{EuroS\&P}'17}, booktitle = {{P}roceedings of the 2nd IEEE European Symposium on Security and Privacy ({EuroS\&P}'17)}, author = {Jacomme, Charlie and Kremer, Steve and Scerri, Guillaume}, title = {Symbolic Models for Isolated Execution Environments}, pages = {530-545}, year = {2018}, doi = {10.1109/EuroSP.2017.16}, url = {https://ieeexplore.ieee.org/document/7962001/}, abstract = {Isolated Execution Environments (IEEs), such as ARM TrustZone and Intel SGX, offer the possibility to execute sensitive code in isolation from other malicious programs, running on the same machine, or a potentially corrupted OS. A key feature of IEEs is the ability to produce reports binding cryptographically a message to the program that produced it, typically ensuring that this message is the result of the given program running on an IEE. We present a symbolic model for specifying and verifying applications that make use of such features. For this we introduce the S{\(\ell\)}APIC process calculus, that allows to reason about reports issued at given locations. We also provide tool support, extending the SAPIC/TAMARIN toolchain and demonstrate the applicability of our framework on several examples implementing secure outsourced computation (SOC), a secure licensing protocol and a one-time password protocol that all rely on such IEEs.} }
@inproceedings{JK-csf18, address = {Oxford, UK}, month = jul, publisher = {{IEEE} Computer Society Press}, editor = {Chong, Steve and Delaune, St{\'e}phanie}, acronym = {{CSF}'18}, booktitle = {{P}roceedings of the 31st {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'18)}, author = {Jacomme, Charlie and Kremer, Steve}, title = {An extensive formal analysis of multi-factor authentication protocols}, pages = {1-15}, year = {2018}, doi = {10.1109/CSF.2018.00008}, pdf = {https://easychair.org/publications/preprint/m89p}, url = {https://ieeexplore.ieee.org/document/8429292/}, abstract = {Passwords are still the most widespread means for authenticating users, even though they have been shown to create huge security problems. This motivated the use of additional authentication mechanisms used in so-called multi-factor authentication protocols. In this paper we define a detailed threat model for this kind of protocols: while in classical protocol analysis attackers control the communication network, we take into account that many communications are performed over TLS channels, that computers may be infected by different kinds of malwares, that attackers could perform phishing, and that humans may omit some actions. We formalize this model in the applied pi calculus and perform an extensive analysis and comparison of several widely used protocols - variants of Google 2-step and FIDO's U2F. The analysis is completely automated, generating systematically all combinations of threat scenarios for each of the protocols and using the ProVerif tool for automated protocol analysis. Our analysis highlights weaknesses and strengths of the different protocols, and allows us to suggest several small modifications of the existing protocols which are easy to implement, yet improve their security in several threat scenarios.} }
@inproceedings{FMNNS-date18, address = {Dresden, Germany}, month = mar, publisher = {{IEEE} Computer Society Press}, acronym = {{DATE}'18}, booktitle = {{P}roceedings of the {C}onference on {D}esign, {A}utomation and {T}est in {E}urope (DATE'18)}, author = {Matthias F{\"u}gger and J{\"u}rgen Maier and Robert Najvirt and {\relax Th}omas Nowak and Ulrich Schmid}, title = {A Faithful Binary Circuit Model with Adversarial Noise}, pages = {1327-1332}, year = {2018}, doi = {10.23919/DATE.2018.8342219}, pdf = {http://www.lsv.fr/~mfuegger/papers/FMNNS18_date.pdf}, url = {https://doi.org/10.23919/DATE.2018.8342219}, abstract = {Accurate delay models are important for static and dynamic timing analysis of digital circuits, and mandatory for formal verification. However, F{\"u}gger et al. [IEEE TC 2016] proved that pure and inertial delays, which are employed for dynamic timing analysis in state-of-the-art tools like ModelSim, NC-Sim and VCS, do not yield faithful digital circuit models. Involution delays, which are based on delay functions that are mathematical involutions depending on the previous-output-to- input time offset, were introduced by F{\"u}gger et al. [DATE'15] as a faithful alternative (that can easily be used with existing tools). Although involution delays were shown to predict real signal traces reasonably accurately, any model with a deterministic delay function is naturally limited in its modeling power. \par In this paper, we thus extend the involution model, by adding non-deterministic delay variations (random or even adversarial), and prove analytically that faithfulness is not impaired by this generalization. Albeit the amount of non-determinism must be considerably restricted to ensure this property, the result is surprising: the involution model differs from non-faithful models mainly in handling fast glitch trains, where small delay shifts have large effects. This originally suggested that adding even small variations should break the faithfulness of the model, which turned out not to be the case. Moreover, the results of our simulations also confirm that this generalized involution model has larger modeling power and, hence, applicability.} }
@article{FFL-toc18, publisher = {{IEEE} Computer Society Press}, journal = {IEEE Transactions on Computers}, author = {Stephan Friedrichs and Matthias F{\"u}gger and Christoph Lenzen}, title = {Metastability-Containing Circuits}, volume = {67}, number = {8}, pages = {1167-1183}, year = {2018}, month = aug, doi = {10.1109/TC.2018.2808185}, url = {https://ieeexplore.ieee.org/document/8314764/}, abstract = {In digital circuits, metastability can cause deteriorated signals that neither are logical 0 nor logical 1, breaking the abstraction of Boolean logic. Synchronizers, the only traditional countermeasure, exponentially decrease the odds of maintained metastability over time. We propose a fundamentally different approach: It is possible to deterministically contain metastability by fine-grained logical masking so that it cannot infect the entire circuit. At the heart of our approach lies a time- and value-discrete model for metastability in synchronous clocked digital circuits, in which metastability is propagated in a worst-case fashion. The proposed model permits positive results and passes the test of reproducing Marino's impossibility results. We fully classify which functions can be computed by circuits with standard registers. Regarding masking registers, we show that more functions become computable with each clock cycle, and that masking registers permit exponentially smaller circuits for some tasks. Demonstrating the applicability of our approach, we present the first fault-tolerant distributed clock synchronization algorithm that deterministically guarantees correct behavior in the presence of metastability. As a consequence, clock domains can be synchronized without using synchronizers, enabling metastability-free communication between them.} }
@article{CFN-dam17, publisher = {Elsevier Science Publishers}, journal = {Discrete Applied Mathematics}, author = {Bernadette {Charron-Bost} and Matthias F{\"u}gger and {\relax Th}omas Nowak and Manfred Schwarz}, title = {New transience bounds for max-plus linear systems}, volume = {219}, pages = {83-99}, year = {2017}, month = mar, doi = {10.1016/j.dam.2016.11.003}, pdf = {http://www.lsv.fr/~mfuegger/papers/CFN17_dam.pdf}, url = {https://doi.org/10.1016/j.dam.2016.11.003}, abstract = {Linear max-plus systems describe the behavior of a large variety of complex systems. It is known that these systems show a periodic behavior after an initial transient phase. Assessment of the length of this transient phase provides important information on complexity measures of such systems, and so is crucial in system design. We identify relevant parameters in a graph representation of these systems and propose a modular strategy to derive new upper bounds on the length of the transient phase. By that we are the first to give asymptotically tight and potentially subquadratic transience bounds. We use our bounds to derive new complexity results, in particular in distributed computing.} }
@inproceedings{FKLW-async18, address = {Vienna, Austria}, month = may, publisher = {{IEEE} Computer Society}, editor = {Krstic, Milos and Jones, {Ian W.}}, acronym = {{ASYNC}'18}, booktitle = {{P}roceedings of the 24th {IEEE} {I}nternational {S}ymposium on {A}synchronous {C}ircuits and {S}ystems ({ASYNC}'18)}, author = {Matthias F{\"u}gger and Attila Kinali and Christoph Lenzen and Ben Wiederhake}, title = {Fast All-Digital Clock Frequency Adaptation Circuit for Voltage Droop Tolerance}, pages = {68-77}, year = {2018}, doi = {10.1109/ASYNC.2018.00025}, url = {https://hal.inria.fr/hal-01936403}, abstract = {Naive handling of supply voltage droops in synchronous circuits results in conservative bounds on clock speeds, resulting in poor performance even if droops are rare. Adaptive strategies detect such potentially hazardous events and either initiate a rollback to a previous state or proactively reduce clock speed in order to prevent timing violations. The performance of such solutions critically depends on a very fast response to droops. However, state-of-the-art solutions incur synchronization delay to avoid that the clock signal is affected by metastability. Addressing the challenges discussed by Keith Bowman in his ASYNC 2017 keynote talk, we present an all-digital circuit that can respond to droops within a fraction of a clock cycle. This is achieved by delaying clock signals based on measurement values while they undergo synchronization simultaneously. We verify our solution by formally proving correctness, complemented by VHDL and Spice simulations of a 65 nm ASIC design confirming the theoretically obtained results.} }
@article{BVdB-ijfcs18, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Berwanger, Dietmar and {van den Bogaard}, Marie}, title = {Consensus Game Acceptors and Iterated Transductions}, volume = {29}, number = {02}, pages = {165-185}, year = {2018}, month = feb, doi = {10.1142/S0129054118400026}, url = {https://www.worldscientific.com/doi/abs/10.1142/S0129054118400026}, abstract = {We study a game for recognising formal languages, in which two players with imperfect information should coordinate on a common decision, given private input words correlated by a finite graph. The players have a common objective to avoid an inadmissible decision, in spite of the uncertainty induced by the input. We show that the acceptor model based on consensus games characterises context-sensitive languages. Further, we describe the expressiveness of these games in terms of iterated synchronous transductions and identify a subclass that characterises context-free languages.}, pdf = {http://www.lsv.fr/~dwb/consensus.pdf} }
@article{BM-icomp17, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Berwanger, Dietmar and Mathew, Anup Basil}, title = {Infinite games with finite knowledge gaps}, volume = {254}, pages = {217-237}, year = {2017}, month = jun, url = {https://doi.org/10.1016/j.ic.2016.10.009}, doi = {10.1016/j.ic.2016.10.009}, abstract = {Infinite games where several players seek to coordinate under imperfect information are deemed to be undecidable, unless the information is hierarchically ordered among the players. We identify a class of games for which joint winning strategies can be constructed effectively without restricting the direction of information flow. Instead, our condition requires that the players attain common knowledge about the actual state of the game over and over again along every play. We show that it is decidable whether a given game satisfies the condition, and prove tight complexity bounds for the strategy synthesis problem under ω-regular winning conditions given by deterministic parity automata.}, pdf = {http://lsv.fr/~dwb/rec.pdf} }
@article{BMVdB-acta17, publisher = {Springer}, journal = {Acta Informatica}, author = {Berwanger, Dietmar and Mathew, Anup Basil and {van den Bogaard}, Marie}, title = {Hierarchical information and the synthesis of distributed strategies}, year = {2017}, month = jun, url = {https://doi.org/10.1007/s00236-017-0306-5}, doi = {10.1007/s00236-017-0306-5}, abstract = {Infinite games with imperfect information are known to be undecidable unless the information flow is severely restricted. One fundamental decidable case occurs when there is a total ordering among players, such that each player has access to all the information that the following ones receive. In this paper we consider variations of this hierarchy principle for synchronous games with perfect recall, and identify new decidable classes for which the distributed synthesis problem is solvable with finite-state strategies. In particular, we show that decidability is maintained when the information hierarchy may change along the play, or when transient phases without hierarchical information are allowed. Finally, we interpret our result in terms of distributed system architectures.}, pdf = {http://lsv.fr/~dwb/hi.pdf} }
@inproceedings{BR-sr17, address = {Liverpool, UK}, month = jul, editor = {{van der Hoek}, Wiebe and Maubert, Bastien and Murano, Aniello and Rubin, Sasha}, acronym = {{SR}'17}, booktitle = {{P}roceedings of the 5th International Workshop on Strategic Reasoning ({SR}'17)}, author = {Dietmar Berwanger and R. Ramanujam}, title = {{Deviator Detection under Imperfect Monitoring}}, year = {2017}, url = {https://arxiv.org/abs/1712.09686}, pdf = {https://arxiv.org/pdf/1712.09686.pdf}, abstract = {Grim-trigger strategies are a fundamental mechanism for sustaining equilibria in iterated games: the players cooperate along an agreed path, and as soon as one player deviates, the others form a coalition to play him down to his minmax level. A precondition to triggering such a strategy is that the identity of the deviating player becomes common knowledge among the other players. This can be difficult or impossible to attain in games where the information structure allows only imperfect monitoring of the played actions or of the global state. We study the problem of synthesising finite-state strategies for detecting the deviator from an agreed strategy profile in games played on finite graphs with different information structures. We show that the problem is undecidable in the general case where the global state cannot be monitored. On the other hand, we prove that under perfect monitoring of the global state and imperfect monitoring of actions, the problem becomes decidable, and we present an effective synthesis procedure that covers infinitely repeated games with private monitoring.} }
@inproceedings{DGK-lics18, address = {Oxford, UK}, publisher = {ACM Press}, editor = {Hofmann, Martin and Dawar, Anuj and Gr{\"a}del, Erich}, acronym = {{LICS}'18}, booktitle = {{P}roceedings of the 33rd {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'18)}, author = {Dave, Vrunda and Gastin, Paul and Krishna, Shankara Narayanan}, month = jul, title = {{Regular Transducer Expressions for Regular Transformations}}, year = {2018}, url = {https://arxiv.org/abs/1802.02094}, pdf = {https://arxiv.org/pdf/1802.02094.pdf}, pages = {315-324}, doi = {10.1145/3209108.3209182}, abstract = {Functional MSO transductions, deterministic two-way transducers, as well as streaming string transducers are all equivalent models for regular functions. In this paper, we show that every regular function, either on finite words or on infinite words, captured by a deterministic two-way transducer, can be described with a regular transducer expression (RTE). For infinite words, the transducer uses Muller acceptance and \(\omega\)-regular look-ahead. RTEs are constructed from constant functions using the combinators if-then-else (deterministic choice), Hadamard product, and unambiguous versions of the Cauchy product, the 2-chained Kleene-iteration and the 2-chained omega-iteration. Our proof works for transformations of both finite and infinite words, extending the result on finite words of Alur et al. in LICS'14. In order to construct an RTE associated with a deterministic two-way Muller transducer with look-ahead, we introduce the notion of transition monoid for such two-way transducers where the look-ahead is captured by some backward deterministic Büchi automaton. Then, we use an unambiguous version of Imre Simon's famous forest factorization theorem in order to derive a ''good'' (\(\omega\)-)regular expression for the domain of the two-way transducer. ''Good'' expressions are unambiguous and Kleene-plus as well as \(\omega\)-iterations are only used on subexpressions corresponding to idempotent elements of the transition monoid. The combinator expressions are finally constructed by structural induction on the ''Good'' (\(\omega\)-)regular expression describing the domain of the transducer.} }
@article{CCD-ic17, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'e}phanie Delaune}, title = {{A procedure for deciding symbolic equivalence between sets of constraint systems}}, volume = {255}, year = {2017}, pages = {94-125}, doi = {10.1016/j.ic.2017.05.004}, url = {https://www.sciencedirect.com/science/article/pii/S0890540117300949}, abstract = {We consider security properties of cryptographic protocols that can be modelled using trace equivalence, a crucial notion when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability. Infinite sets of possible traces are symbolically represented using deducibility constraints. We describe an algorithm that decides trace equivalence for protocols that use standard primitives and that can be represented using such constraints. More precisely, we consider symbolic equivalence between sets of constraint systems, and we also consider disequations. Considering sets and disequations is actually crucial to decide trace equivalence for processes that may involve else branches and/or private channels (for a bounded number of sessions). Our algorithm for deciding symbolic equivalence between sets of constraint systems is implemented and performs well in practice. Unfortunately, it does not scale up well for deciding trace equivalence between processes. This is however the first implemented algorithm deciding trace equivalence on such a large class of processes.} }
@article{KSHP-tcs19, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Kolc{\'a}k, Juraj and {\v S}afr{\'a}nek, David and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, title = {{Parameter Space Abstraction and Unfolding Semantics of Discrete Regulatory Networks}}, volume = {765}, year = {2019}, pages = {120-144}, doi = {10.1016/j.tcs.2018.03.009}, pdf = {https://hal.archives-ouvertes.fr/hal-01734805/document}, url = {https://hal.archives-ouvertes.fr/hal-01734805/}, abstract = {The modelling of discrete regulatory networks combines a graph specifying the pairwise influences between the variables of the system, and a parametrisation from which can be derived a discrete transition system. Given the influence graph only, the exploration of admissible parametrisations and the behaviours they enable is computationally demanding due to the combinatorial explosions of both parametrisation and reachable state space. This article introduces an abstraction of the parametrisation space and its refinement to account for the existence of given transitions, and for constraints on the sign and observability of influences. The abstraction uses a convex sub-lattice containing the concrete parametrisation space specified by its infimum and supremum parametrisations. It is shown that the computed abstractions are optimal, i.e., no smaller convex sublattice exists. Although the abstraction may introduce over-approximation, it has been proven to be conservative with respect to reachability of states. Then, an unfolding semantics for Parametric Regulatory Networks is defined, taking advantage of concurrency between transitions to provide a compact representation of reachable transitions. A prototype implementation is provided: it has been applied to several examples of Boolean and multi-valued networks, showing its tractability for networks with numerous components.} }
@inproceedings{JMS-wodes18, address = {Sorrento Coast, Italy}, month = may # {-} # jun, year = 2018, volume = {51(7)}, series = {IFAC-PapersOnLine}, publisher = {Elsevier Science Publishers}, editor = {Chris Hadjicostis and Jan Komenda}, acronym = {{WODES}'18}, booktitle = {{P}roceedings of the 14th {W}orkshop on {D}iscrete {E}vent {S}ystems ({WODES}'18)}, author = {Lo{\"i}g Jezequel and Agnes Madalinski and Stefan Schwoon}, title = {{Distributed computation of vector clocks in Petri nets unfolding for test selection}}, pages = {106-111}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JMS-wodes18.pdf}, abstract = {It has been shown that annotating Petri net unfoldings with time stamps allows for building distributed testers for distributed systems. However, the construction of the annotated unfolding of a distributed system currently remains a centralized task. In this paper we extend a distributed unfolding technique in order to annotate the resulting unfolding with time stamps. This allows for distributed construction of distributed testers for distributed systems.} }
@article{BHSS-fi18, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {B{\'e}atrice B{\'e}rard and Stefan Haar and Sylvain Schmitz and Stefan Schwoon}, title = {{The Complexity of Diagnosability and Opacity Verification for Petri Nets}}, volume = 161, number = 4, year = 2018, pages = {317-349}, doi = {10.3233/FI-2018-1706}, url = {https://hal.inria.fr/hal-01852119}, abstract = {Diagnosability and opacity are two well-studied problems in discrete-event systems. We revisit these two problems with respect to expressiveness and complexity issues. \par We first relate different notions of diagnosability and opacity. We consider in particular fairness issues and extend the definition of Germanos et al. [ACM TECS, 2015] of weakly fair diagnosability for safe Petri nets to general Petri nets and to opacity questions. \par Second, we provide a global picture of complexity results for the verification of diagnosability and opacity. We show that diagnosability is NL-complete for finite state systems, PSPACE-complete for safe convergent Petri nets (even with fairness), and EXPSPACE-complete for general Petri nets without fairness, while non diagnosability is inter-reducible with reachability when fault events are not weakly fair. Opacity is ESPACE-complete for safe Petri nets (even with fairness) and undecidable for general Petri nets already without fairness.} }
@inproceedings{CGR-automata18, address = {Ghent, Belgium}, month = jun, year = 2018, volume = 10875, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jan Baetens and Martin Kutrib}, acronym = {{AUTOMATA}'18}, booktitle = {{P}roceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems ({AUTOMATA}'18)}, author = {Carton, Olivier and Guillon, Bruno and Reiter, Fabian}, title = {{Counter Machines and Distributed Automata}}, pages = {13-28}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CGR-automata18.pdf}, doi = {10.1007/978-3-319-92675-9\_2}, abstract = {We prove the equivalence of two classes of counter machines and one class of distributed automata. Our counter machines operate on finite words, which they read from left to right while incrementing or decrementing a fixed number of counters. The two classes differ in the extra features they offer: one allows to copy counter values, whereas the other allows to compute copyless sums of counters. Our distributed automata, on the other hand, operate on directed path graphs that represent words. All nodes of a path synchronously execute the same finite-state machine, whose state diagram must be acyclic except for self-loops, and each node receives as input the state of its direct predecessor. These devices form a subclass of linear-time one-way cellular automata.} }
@inproceedings{CHP-automata18, address = {Ghent, Belgium}, month = jun, year = 2018, volume = 10875, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Jan Baetens and Martin Kutrib}, acronym = {{AUTOMATA}'18}, booktitle = {{P}roceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems ({AUTOMATA}'18)}, author = {Chatain, {\relax Th}omas and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, title = {{Boolean Networks: Beyond Generalized Asynchronicity}}, pages = {29-42}, url = {https://hal.inria.fr/hal-01768359v2}, doi = {10.1007/978-3-319-92675-9\_3}, abstract = {Boolean networks are commonly used in systems biology to model dynamics of biochemical networks by abstracting away many (and often unknown) parameters related to speed and species activity thresholds. It is then expected that Boolean networks produce an over-approximation of behaviours (reachable configurations), and that subsequent refinements would only prune some impossible transitions. However, we show that even generalized asynchronous updating of Boolean networks, which subsumes the usual updating modes including synchronous and fully asynchronous, does not capture all transitions doable in a multi-valued or timed refinement. We define a structural model transformation which takes a Boolean network as input and outputs a new Boolean network whose asynchronous updating simulates both synchronous and asynchronous updating of the original network, and exhibits even more behaviours than the generalized asynchronous updating. We argue that these new behaviours should not be ignored when analyzing Boolean networks, unless some knowledge about the characteristics of the system explicitly allows one to restrict its behaviour.} }
@inproceedings{LGS-atpn18, address = {Bratislava, Slovakia}, month = jun, year = 2018, volume = {10877}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Victor Khomenko and {Olivier H.} Roux}, acronym = {{PETRI~NETS}'18}, booktitle = {{P}roceedings of the 39th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'18)}, author = {Engel Lefaucheux and Alessandro Giua and Carla Seatzu}, title = {{Basis Coverability Graph for Partially Observable Petri Nets with Application to Diagnosability Analysis}}, pages = {164-183}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LGS-atpn18.pdf}, abstract = {Petri nets have been proposed as a fundamental model for discrete-event systems in a wide variety of applications and have been an asset to reduce the computational complexity involved in solving a series of problems, such as control, state estimation, fault diagnosis, etc. Many of those problems require an analysis of the reachability graph of the Petri net. The basis reachability graph is a condensed version of the reachability graph that was introduced to efficiently solve problems linked to partial observation. It was in particular used for diagnosis which consists in deciding whether some fault events occurred or not in the system, given partial observations on the run of the system. However this method is, with very specific exceptions, limited to bounded Petri nets. In this paper, we introduce the notion of basis coverability graph to remove this requirement. We then establish the relationship between the coverability graph and the basis coverability graph. Finally, we focus on the diagnosability problem: we show how the basis coverability graph can be used to get an efficient algorithm.} }
@inproceedings{BBDH-atpn18, address = {Bratislava, Slovakia}, month = jun, year = 2018, volume = {10877}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Victor Khomenko and {Olivier H.} Roux}, acronym = {{PETRI~NETS}'18}, booktitle = {{P}roceedings of the 39th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'18)}, author = {Barbot, Beno{\^i}t and B{\'e}rard, B{\'e}atrice and Duplouy, Yann and Haddad, Serge}, title = {{Integrating Simulink Models into the Model Checker Cosmos}}, pages = {363-373}, url = {https://hal.archives-ouvertes.fr/hal-01725835/}, pdf = {https://hal.archives-ouvertes.fr/hal-01725835/document}, doi = {10.1007/978-3-319-91268-4_19}, abstract = {We present an implementation for Simulink model executions in the statistical model-checker Cosmos. We take profit of this implementation for an hybrid modeling combining Petri nets and Simulink models.} }
@techreport{BBFHP-hal18, author = {Barbot, Beno{\^i}t and Beccuti, Marco and Franceschinis, Giuliana and Haddad, Serge and Picaronny, Claudine}, institution = {HAL-Inria}, month = mar, number = {hal-01726011}, type = {Research Report}, title = {Bounds Computation for Symmetric Nets}, year = {2018}, url = {https://hal.inria.fr/hal-01726011}, pdf = {https://hal.inria.fr/hal-01726011/file/main.pdf}, abstract = {Monotonicity in Markov chains is the starting point for quantitative abstraction of complex probabilistic systems leading to (upper or lower) bounds for probabilities and mean values relevant to their analysis. While numerous case studies exist in the literature, there is no generic model for which monotonicity is directly derived from its structure. Here we propose such a model and formalize it as a subclass of Stochastic Symmetric (Petri) Nets (SSNs) called Stochastic Monotonic SNs (SMSNs). On this subclass the monotonicity is proven by coupling arguments that can be applied on an abstract description of the state (symbolic marking). Our class includes both process synchronizations and resource sharings and can be extended to model open or cyclic closed systems. Automatic methods for transforming a non monotonic system into a monotonic one matching the MSN pattern, or for transforming a monotonic system with large state space into one with reduced state space are presented. We illustrate the interest of the proposed method by expressing standard monotonic models and modelling a flexible manufacturing system case study.} }
@article{GM-softc18, publisher = {Springer}, journal = {Soft Computing}, author = {Gastin, Paul and Monmege, Benjamin}, title = {{A unifying survey on weighted logics and weighted automata}}, volume = {22}, number = {4}, year = {2018}, month = feb, pages = {1047-1065}, doi = {10.1007/s00500-015-1952-6}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/softc2016-GM.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/softc2016-GM.pdf}, abstract = {Logical formalisms equivalent to weighted automata have been the topic of numerous research papers in the recent years. It started with the seminal result by Droste and Gastin on weighted logics over semirings for words. It has been extended in two dimensions by many authors. First, the weight domain has been extended to valuation monoids, valuation structures, etc. to capture more quantitative properties. Along another dimension, different structures such as ranked or unranked trees, nested words, Mazurkiewicz traces, etc. have been considered. The long and involved proofs of equivalences in all these papers are implicitly based on the same core arguments. This article provides a meta-theorem which unifies these different approaches. Towards this, we first revisit weighted automata by defining a new semantics for them in two phases---an abstract semantics based on multisets of weight structures (independent of particular weight domains) followed by a concrete semantics. Then, we introduce a core weighted logic with a minimal number of features and a simplified syntax, and lift the new semantics to this logic. We show at the level of the abstract semantics that weighted automata and core weighted logic have the same expressive power. Finally, we show how previous results can be recovered from our result by logical reasoning. In this paper, we prove the meta-theorem for words, ranked and unranked trees, showing the robustness of our approach.} }
@inproceedings{D-PxTP17, address = {Bras{\'{\i}}lia, Brazil}, month = sep, year = 2017, volume = {262}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Catherine Dubois and Bruno {Woltzenlogel Paleo}}, acronym = {{PxTP}'17}, booktitle = {Proceedings of the 5th Workshop on Proof eXchange for Theorem Proving ({PxTP}'17)}, author = {Gilles Dowek}, title = {Analyzing Individual Proofs as the Basis of Interoperability between Proof Systems}, pages = {3-12}, url = {https://arxiv.org/abs/1712.01485v1}, pdf = {https://arxiv.org/pdf/1712.01485v1.pdf}, doi = {10.4204/EPTCS.262.1}, abstract = {We describe the first results of a project of analyzing in which theories formal proofs can be expressed. We use this analysis as the basis of interoperability between proof systems.} }
@inproceedings{DD-tpnc17, address = {Prague, Czech Republic}, year = 2017, volume = 10687, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Carlos Mart{\'{\i}}n{-}Vide and Roman Neruda and Miguel A. Vega{-}Rodr{\'{\i}}guez}, acronym = {{TPNC}'17}, booktitle = {Proceedings of the 6th International Conference on Theory and Practice of Natural Computing ({TPNC}'17)}, author = {Alejandro D{\'{\i}}az{-}Caro and Gilles Dowek}, title = {Typing Quantum Superpositions and Measurement}, pages = {281-293}, url = {https://arxiv.org/abs/1601.04294}, doi = {10.1007/978-3-319-71069-3_22}, abstract = {We propose a way to unify two approaches of non-cloning in quantum lambda-calculi. The first approach is to forbid duplicating variables, while the second is to consider all lambda-terms as algebraic-linear functions. We illustrate this idea by defining a quantum extension of first-order simply-typed lambda-calculus, where the type is linear on superposition, while allows cloning base vectors. In addition, we provide an interpretation of the calculus where superposed types are interpreted as vector spaces and non-superposed types as their basis.} }
@article{D-lmcs17, journal = {Logical Methods in Computer Science}, author = {Dowek, Gilles}, title = {{Lineal: A linear-algebraic Lambda-calculus}}, volume = {13}, number = {1}, year = {2017}, month = mar, pages = {1-33}, doi = {10.23638/LMCS-13(1:8)2017}, url = {https://lmcs.episciences.org/3203}, pdf = {https://lmcs.episciences.org/3203/pdf} }
@article{D-flap17, publisher = {College Publications}, journal = {IfCoLoG Journal of Logics and their Applications}, author = {Dowek, Gilles}, title = {{Rules and derivations in an elementary logic course}}, volume = {4}, number = {1}, year = {2017}, pages = {21-32}, pdf = {https://hal.inria.fr/hal-01252124/file/ttl.pdf}, note = {Special Issue: Tools for Teaching Logic} }
@inproceedings{LFV-adhs18, address = {Oxford, UK}, month = jul, year = 2018, number = 16, volume = 51, series = {IFAC-PapersOnLine}, publisher = {Elsevier Science Publishers}, editor = {Alessandro Abate and Antoine Girard and Maurice Heemels}, acronym = {{ADHS}'18}, booktitle = {{P}roceedings of the 6th {IFAC} {C}onference on {A}nalysis and {D}esign of {H}ybrid {S}ystems ({ADHS}'18)}, author = {Adrien Le{ }Co{\"e}nt and Laurent Fribourg and Jonathan Vacher}, title = {Control Synthesis for Stochastic Switched Systems using the Tamed Euler Method}, pages = {259-264}, url = {https://doi.org/10.1016/j.ifacol.2018.08.044}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LFV-adhs18.pdf}, doi = {10.1016/j.ifacol.2018.08.044}, abstract = {In this paper, we explain how, under the one-sided Lipschitz (OSL) hypothesis, one can find an error bound for a variant of the Euler-Maruyama approximation method for stochastic switched systems. We then explain how this bound can be used to control stochastic switched switched system in order to stabilize them in a given region. The method is illustrated on several examples of the literature.} }
@inproceedings{SGF-ecc18, address = {Limassol, Cyprus}, month = jun, year = 2018, publisher = {{IEEE} Press}, editor = {Thomas Parisini}, acronym = {{ECC}'18}, booktitle = {{P}roceedings of the European Control Conference ({ECC}'18)}, author = {Adnane Saoud and Antoine Girard and Laurent Fribourg}, title = {On the Composition of Discrete and Continuous-time Assume-Guarantee Contracts for Invariance}, pages = {435-440}, url = {https://ieeexplore.ieee.org/document/8550622}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SGF-ecc18.pdf}, doi = {10.23919/ECC.2018.8550622}, abstract = {Many techniques for verifying invariance prop- erties are limited to systems of moderate size. In this paper, we propose an approach based on assume-guarantee contracts and compositional reasoning for verifying invariance properties of a broad class of discrete-time and continuous-time systems consisting of interconnected components. The notion of assume- guarantee contracts makes it possible to divide responsibil- ities among the system components: a contract specifies an invariance property that a component must fulfill under some assumptions on the behavior of its environment (i.e. of the other components). We define weak and strong semantics of assume- guarantee contracts for both discrete-time and continuous-time systems. We then establish a certain number of results for compositional reasoning, which allow us to show that a global invariance property of the whole system is satisfied when all components satisfy their own contract. Interestingly, we show that the weak satisfaction of the contract is sufficient to deal with cascade compositions, while strong satisfaction is needed to reason about feedback composition. Specific results for systems described by differential inclusions are then developed. Throughout the paper, the main results are illustrated using simple examples.} }
@article{LFMDC-tcs18, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Adrien Le{ }Co{\"e}nt and Laurent Fribourg and Nicolas Markey and Florian De{ }Vuyst and Ludovic Chamoin}, title = {Compositional synthesis of state-dependent switching control}, volume = {750}, year = {2018}, pages = {53-68}, doi = {10.1016/j.tcs.2018.01.021}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LFMDC-tcs18.pdf}, url = {https://doi.org/10.1016/j.tcs.2018.01.021}, abstract = {We present a correct-by-design method of state-dependent control synthesis for sampled switching systems. Given a target region R of the state space, our method builds a capture set S and a control that steers any element of S into R. The method works by iterated backward reachability from R. The method is also used to synthesize a recurrence control that makes any state of R return to R infinitely often. We explain how the synthesis method can be performed in a compositional manner, and apply it to the synthesis of a compositional control of a concrete floor-heating system with 11 rooms and up to 2^11=2048 toswitching modes.} }
@phdthesis{Carlier-phd2017, author = {Carlier, Pierre}, title = {{Verification of Stochastic Timed Automata}}, school = {{Ecole Normale Sup{\'e}rieure de Cachan (ENS Paris-Saclay) and Universit{\'e} de Mons}}, type = {Th{\`e}se de doctorat}, year = 2017, month = dec, url = {https://tel.archives-ouvertes.fr/tel-01696130}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/carlier-phd2017.pdf} }
@inproceedings{DLM-pnse16, address = {Torun, Poland}, month = jun, year = 2016, volume = 1591, series = {CEUR Workshop Proceedings}, publisher = {CEUR-WS.org}, editor = {Lawrence Cabac and Lars Michael Kristensen and Heiko R{\"o}lke:}, acronym = {{PNSE}'16}, booktitle = {{P}roceedings of the 10th {I}nternational {W}orkshop on {P}etri {N}ets and {S}oftware {E}ngineering ({PNSE}'16)}, author = {Alban Linard and Beno{\^{\i}}t Barbot and Didier Buchs and Maximilien Colange and Cl{\'{e}}ment D{\'{e}}moulins and Lom{-}Messan Hillah and Alexis Martin}, title = {Layered Data: {A} Modular Formal Definition without Formalisms}, pages = {287-306}, url = {http://ceur-ws.org/Vol-1591/}, pdf = {http://ceur-ws.org/Vol-1591/paper19.pdf}, abstract = {Defining formalisms and models in a modular way is a painful task. Metamodeling tools and languages have usually not been created with this goal in mind. This article proposes a data structure, called layered data, that allows defining easily modular abstract syntax for for- malisms and models. It also shows its use through an exhaustive example. As a side effect, this article discusses the notion of formalism, and asserts that they do not exist as standalone objects, but rather as relations between models.} }
@article{LACF-fmsd18, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Adrien Le{ }Co{\"{e}}nt and Julien {Alexandre dit Sandretto} and Alexandre Chapoutot and Laurent Fribourg}, title = {An improved algorithm for the control synthesis of nonlinear sampled switched systems}, volume = {53}, number = {3}, year = {2018}, pages = {363-383}, doi = {10.1007/s10703-017-0305-8}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LACF-fmsd18.pdf}, url = {https://link.springer.com/article/10.1007/s10703-017-0305-8}, abstract = {A novel algorithm for the control synthesis for nonlinear switched systems is presented in this paper. Based on an existing procedure of state-space bisection and made available for nonlinear systems with the help of guaranteed integration, the algorithm has been improved to be able to consider longer patterns of modes with a better pruning approach. Moreover, the use of guaranteed integration also permits to take bounded perturbations and varying parameters into account. It is particularly interesting for safety critical applications, such as in aeronautical, military or medical fields. The whole approach is entirely guaranteed and the induced controllers are correct-by-design. Some experimentations are performed to show the important gain of the new algorithm.} }
@article{ABDL-tcs18, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Alechina, Natasha and Bulling, Nils and Demri, St{\'e}phane and Logan, Brian}, title = {On the Complexity of Resource-Bounded Logics}, volume = {750}, year = {2018}, pages = {69--100}, doi = {10.1016/j.tcs.2018.01.019}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABDL-tcs18.pdf} }
@article{HGJX-lmcs18, journal = {Logical Methods in Computer Science}, author = {Ho, Weng Kin and Goubault-Larrecq, Jean and Jung, Achim and Xi, Xiaoyong}, title = {{The Ho-Zhao Problem}}, volume = {14}, number = {1}, year = {2018}, month = jan, pages = {1-19}, doi = {10.23638/LMCS-14(1:7)2018}, url = {https://lmcs.episciences.org/4218}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HGJX-lmcs18.pdf} }
@article{H-ipl18, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Haddad, Serge}, title = {{Memoryless determinacy of finite parity games: Another simple proof}}, volume = {132}, pages = {19-21}, month = apr, year = {2018}, pdf = {https://hal.inria.fr/hal-01541508/document}, doi = {10.1016/j.ipl.2017.11.012}, abstract = {Memoryless determinacy of (infinite) parity games is an important result with numerous applications. It was first independently established by Emerson and Jutla [1] and Mostowski [2] but their proofs involve elaborate developments. The elegant and simpler proof of Zielonka [3] still requires a nested induction on the finite number of priorities and on ordinals for sets of vertices. There are other proofs for finite games like the one of Björklund, Sandberg and Vorobyovin [4] that relies on relating infinite and finite duration games. We present here another simple proof that finite parity games are determined with memoryless strategies using induction on the number of relevant states. The closest proof that relies on induction over non absorbing states is the one of Grädel [5]. However instead of focusing on a single appropriate vertex for induction as we do here, he considers two reduced games per vertex, for all the vertices of the game. The idea of reasoning about a single state has been inspired to me by the analysis of finite stochastic priority games by Karelovic and Zielonka [6].} }
@inproceedings{CCDJR-lata18, address = {Bar-Ilan, Israel}, month = apr, year = 2018, volume = {10792}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mart{\'\i}n-Vide, Carlos}, acronym = {{LATA}'18}, booktitle = {{P}roceedings of the 12th {I}nternational {C}onference on {L}anguage and {A}utomata {T}heory and {A}pplications ({LATA}'18)}, author = {Chatain, {\relax Th}omas and Comlan, Maurice and Delfieu, David and Jezequel, Lo{\"i}g and Roux, Olivier H.}, title = {Pomsets and Unfolding of Reset Petri Nets}, pages = {258-270}, url = {https://doi.org/10.1007/978-3-319-77313-1_20}, doi = {10.1007/978-3-319-77313-1_20}, abstract = {Reset Petri nets are a particular class of Petri nets where transition firings can remove all tokens from a place without checking if this place actually holds tokens or not. In this paper we look at partial order semantics of such nets. In particular, we propose a pomset bisimulation for comparing their concurrent behaviours. Building on this pomset bisimulation we then propose a generalization of the standard finite complete prefixes of unfolding to the class of safe reset Petri nets.} }
@inproceedings{DLM-fossacs18, address = {Thessaloniki, Greece}, month = apr, year = 2018, volume = {10803}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baier, Christel and {Dal Lago}, Ugo}, acronym = {{FoSSaCS}'18}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'18)}, author = {St{\'e}phane Demri and {\'E}tienne Lozes and Alessio Mansutti}, title = {The Effects of Adding Reachability Predicates in Propositional Separation Logic}, pages = {476-493}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-fossacs18.pdf} }
@inproceedings{B-fossacs18, address = {Thessaloniki, Greece}, month = apr, year = 2018, volume = {10803}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baier, Christel and {Dal Lago}, Ugo}, acronym = {{FoSSaCS}'18}, booktitle = {{P}roceedings of the 21st {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'18)}, author = {Bouyer, Patricia}, title = {Games on graphs with a public signal monitoring}, pages = {530-547}, url = {https://arxiv.org/abs/1710.07163}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/B-fossacs18.pdf}, doi = {10.1007/978-3-319-89366-2_29}, abstract = {We study Nash equilibria in games on graphs with an imperfect monitoring based on a public signal. In such games, deviations and players responsible for those deviations can be hard to detect and track. We propose a generic epistemic game abstraction, which conveniently allows to represent the knowledge of the players about these deviations, and give a characterization of Nash equilibria in terms of winning strategies in the abstraction. We then use the abstraction to develop algorithms for some payoff functions.} }
@inproceedings{Genestier-hor19, address = {Dortmund, Germany}, month = jun, novolume = {??}, noseries = {??}, noeditor = {}, acronym = {{HOR}'19}, booktitle = {{P}roceedings of the 10th {I}nternational {W}orkshop on {H}igher-{O}rder {R}ewriting ({HOR}'19)}, author = {Genestier, Guillaume}, title = {{S}ize{C}hange{T}ool: {A} {T}ermination {C}hecker for {R}ewriting {D}ependent {T}ypes}, pages = {14--19}, year = 2019, pdf = {https://hal.archives-ouvertes.fr/hal-02442465/file/presentationSCT.pdf} }
@inproceedings{EBB-pxtp19, address = {Natal, Brazil}, month = aug, volume = {301}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Giselle Reis and Haniel Barbosa}, acronym = {{PxTP}'19}, booktitle = {{P}roceedings of the 6th {W}orkshop on {P}roof e{X}change for {T}heorem {P}roving ({PxTP}'19)}, author = {El Haddad, Mohamed and Burel, Guillaume and Blanqui, Fr{\'e}d{\'e}ric}, title = {{E}kstrakto: {A} tool to reconstruct {D}edukti proofs from {TSTP} files (extended abstract)}, pages = {27--35}, year = 2019, pdf = {https://hal.inria.fr/hal-02200548/file/main.pdf}, url = {http://eptcs.web.cse.unsw.edu.au/paper.cgi?PxTP2019.5} }
@inproceedings{JGL-lncs11760, volume = 11760, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {M{\'a}rio S. Alvim and Kostas Chatzikokolakis and Carlos Olarte and Franck Valencia}, acronym = {{The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy}}, booktitle = {The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy---Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday}, author = {Goubault{-}Larrecq, Jean}, title = {Fooling the Parallel or Tester with Probability $8/27$}, pages = {313--328}, year = 2019, note = {Updated version on arXiv:1903.12653}, url = {https://arxiv.org/abs/1903.12653}, abstract = {It is well-known that the higher-order language PCF is not fully abstract: there is a program - the so-called parallel or tester, meant to test whether its input behaves as a parallel or - which never terminates on any input, operationally, but is denotationally non-trivial. We explore a probabilistic variant of PCF, and ask whether the parallel or tester exhibits a similar behavior there. The answer is no: operationally, one can feed the parallel or tester an input that will fool it into thinking it is a parallel or. We show that the largest probability of success of such would-be parallel ors is exactly 8/27. The bound is reached by a very simple probabilistic program. The difficult part is to show that that bound cannot be exceeded.} }
@inproceedings{MSHPP-cmsb19, address = {Trieste, Italy}, month = sep, volume = {11773}, series = {Lecture Notes in Bioinformatics}, publisher = {Springer-Verlag}, editor = {Luca Bortolussi and Guido Sanguinetti}, acronym = {{CMSB}'19}, booktitle = {{P}roceedings of the 17th {C}onference on {C}omputational {M}ethods in {S}ystem {B}iology ({CMSB}'19)}, author = {Mandon, Hugues and Su, Cui and Haar, Stefan and Pang, Jun and Paulev{\'e}, Lo{\"i}c}, title = {Sequential Reprogramming of Boolean Networks Made Practical}, pages = {3-19}, doi = {10.1007/978-3-030-31304-3_1}, year = 2019, abstract = {We address the sequential reprogramming of gene regulatory networks modelled as Boolean networks. We develop an attractor-based sequential reprogramming method to compute all sequential reprogramming paths from a source attractor to a target attractor, where only attractors of the network are used as intermediates. Our method is more practical than existing reprogramming methods as it incorporates several practical constraints: (1) only biologically observable states, viz. attractors, can act as intermediates; (2) certain attractors, such as apoptosis, can be avoided as intermediates; (3) certain nodes can be avoided to perturb as they may be essential for cell survival or difficult to perturb with biomolecular techniques; and (4) given a threshold \(k\), all sequential reprogramming paths with no more than \(k\) perturbations are computed. We compare our method with the minimal one-step reprogramming and the minimal sequential reprogramming on a variety of biological networks. The results show that our method can greatly reduce the number of perturbations compared to the one-step reprogramming, while having comparable results with the minimal sequential reprogramming. Moreover, our implementation is scalable for networks of more than 60 nodes.} }
@inproceedings{DGJL-isdt19, address = {Yangzhou, China}, month = jun, volume = 345, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jung, Achim and Li, Qingguo and Xu, Luoshan and Zhang, Guo-Qiang}, acronym = {{ISDT}'19}, booktitle = {{P}roceedings of the {I}nternational {S}ymposium on {D}omain {T}heory ({ISDT}'19)}, author = {de Brecht, Matthew and Goubault{-}Larrecq, Jean and Jia, Xiaodong and Lyu, Zhenchao}, title = {Domain-complete and LCS-complete Spaces}, pages = {3-35}, doi = {10.1016/j.entcs.2019.07.014}, year = 2019 }
@inproceedings{GJ-isdt19, address = {Yangzhou, China}, month = jun, volume = 345, series = {Electronic Notes in Theoretical Computer Science}, publisher = {Elsevier Science Publishers}, editor = {Jung, Achim and Li, Qingguo and Xu, Luoshan and Zhang, Guo-Qiang}, acronym = {{ISDT}'19}, booktitle = {{P}roceedings of the {I}nternational {S}ymposium on {D}omain {T}heory ({ISDT}'19)}, author = {Goubault{-}Larrecq, Jean and Jia, Xiaodong}, title = {Algebras of the Extended Probabilistic Powerdomain Monad}, pages = {37-61}, doi = {10.1016/j.entcs.2019.07.015}, year = 2019 }
@article{GM-hjm20, publisher = {University of Houston}, journal = {Houston Journal of Mathematics}, author = {Goubault{-}Larrecq, Jean and Mynard, Fr{\'e}d{\'e}ric}, title = {Convergence without Points}, volume = {46}, number = {1}, pages = {227-282}, year = 2020, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GM-hjm20.pdf} }
@techreport{DH-hal19, author = {Donatelli, Susanna and Haddad, Serge}, institution = {HAL}, month = oct, note = {23~pages}, number = {hal-02306021}, type = {Research Report}, title = {{Autonomous Transitions Enhance CSLTA Expressiveness and Conciseness}}, year = {2019}, url = {https://hal.inria.fr/hal-02306021}, pdf = {https://hal.inria.fr/hal-02306021/document}, abstract = {CSLTA is a stochastic temporal logic for continuous-time Markov chains (CTMC) where formulas similarly to those of CTL* are inductively defined by nesting of timed path formulas and state formulas. In particular a timed path formula of CSLTA is specified by a single-clock Deterministic Timed Automaton (DTA). Such a DTA features two kinds of transitions: synchronizing transitions triggered by CTMC transitions and autonomous transitions triggered by time elapsing that change the location of the DTA when the clock reaches a given threshold. It has already been shown that CSLTA strictly includes stochastic logics like CSL and asCSL. An interesting variant of CSLTA consists in equipping transitions rather than locations by boolean formulas. Here we answer the following question: do autonomous transitions and/or boolean guards on transitions enhance expressiveness and/or conciseness of DTAs? We show that this is indeed the case. In establishing our main results we also identify an accurate syntactical characterization of DTAs for which the autonomous transitions do not add expressive power but lead to exponentially more concise DTAs.} }
@inproceedings{DLM-csl20, address = {Barcelona, Spain}, month = jan, year = 2020, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Fern{\'a}ndel, Maribel and Muscholl, Anca}, acronym = {{CSL}'20}, booktitle = {{P}roceedings of the 28th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'20)}, author = {St{\'e}phane Demri and {\'E}tienne Lozes and Alessio Mansutti}, title = {Internal Calculi for Separation Logics}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/11662/}, doi = {10.4230/LIPIcs.CSL.2020.19} }
@inproceedings{GF-fsttcs19, address = {Bombay, India}, month = dec, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Arkadev Chattopadhyay and Paul Gastin}, acronym = {{FSTTCS}'19}, booktitle = {{P}roceedings of the 39th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'19)}, author = {Ekanshdeep Gupta and Alain Finkel}, title = {The well structured problem for Presburger counter machines}, pages = {41:1-41:15}, year = 2019, doi = {10.4230/LIPIcs.FSTTCS.2019.41}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2019/11603/pdf/LIPIcs-FSTTCS-2019-41.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=11603}, abstract = {We introduce the well structured problem as the question of whether a model (here a counter machine) is well structured (here for the usual ordering on integers). We show that it is undecidable for most of the (Presburger-defined) counter machines except for Affine VASS of dimension one. However, the strong well structured problem is decidable for all Presburger counter machines. While Affine VASS of dimension one are not, in general, well structured, we give an algorithm that computes the set of predecessors of a configuration; as a consequence this allows to decide the well structured problem for 1-Affine VASS.} }
@inproceedings{BBM-fsttcs19, address = {Bombay, India}, month = dec, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Arkadev Chattopadhyay and Paul Gastin}, acronym = {{FSTTCS}'19}, booktitle = {{P}roceedings of the 39th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'19)}, author = {Nathalie Bertrand and Patricia Bouyer and Anirban Majumdar}, title = {Concurrent parameterized games}, pages = {31:1-31:15}, year = 2019, doi = {10.4230/LIPIcs.FSTTCS.2019.31}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2019/11593/pdf/LIPIcs-FSTTCS-2019-31.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=11593}, abstract = {Traditional concurrent games on graphs involve a fixed number of players, who take decisions simultaneously, determining the next state of the game. In this paper, we introduce a parameterized variant of concurrent games on graphs, where the parameter is precisely the number of players. Parameterized concurrent games are described by finite graphs, in which the transitions bear regular languages to describe the possible move combinations that lead from one vertex to another. We consider the problem of determining whether the first player, say Eve, has a strategy to ensure a reachability objective against any strategy profile of her opponents as a coalition. In particular Eve's strategy should be independent of the number of opponents she actually has. Technically, this paper focuses on an a priori simpler setting where the languages labeling transitions only constrain the number of opponents (but not their precise action choices). These constraints are described as semilinear sets, finite unions of intervals, or intervals. We establish the precise complexities of the parameterized reachability game problem, ranging from PTIME-complete to PSPACE-complete, in a variety of situations depending on the contraints (semilinear predicates, unions of intervals, or intervals) and on the presence or not of non-determinism.} }
@article{BQS-lmcs19, journal = {Logical Methods in Computer Science}, author = {Bollig, Benedikt and Quaas, Karin and Sangnier, Arnaud}, title = {The Complexity of Flat Freeze LTL}, volume = {15}, number = {3}, pages = {32:1-32:26}, year = 2019, doi = {10.23638/LMCS-15(3:32)2019}, pdf = {https://lmcs.episciences.org/5795/pdf}, url = {https://arxiv.org/abs/1609.06124}, abstract = {We consider the model-checking problem for freeze LTL on one-counter automata (OCA). Freeze LTL extends LTL with the freeze quantifier, which allows one to store different counter values of a run in registers so that they can be compared with one another. As the model-checking problem is undecidable in general, we focus on the flat fragment of freeze LTL, in which the usage of the freeze quantifier is restricted. In a previous work, Lechner et al. showed that model checking for flat freeze LTL on OCA with binary encoding of counter updates is decidable and in 2NEXPTIME. In this paper, we prove that the problem is, in fact, NEXPTIME-complete no matter whether counter updates are encoded in unary or binary. Like Lechner et al., we rely on a reduction to the reachability problem in OCA with parameterized tests (OCA(P)). The new aspect is that we simulate OCA(P) by alternating two-way automata over words. This implies an exponential upper bound on the parameter values that we exploit towards an NP algorithm for reachability in OCA(P) with unary updates. We obtain our main result as a corollary. As another application, relying on a reduction by Bundala and Ouaknine, one obtains an alternative proof of the known fact that reachability in closed parametric timed automata with one parametric clock is in NEXPTIME.} }
@article{DF-jlc19, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane and Fervari, Raul}, title = {The power of modal separation logics}, volume = {29}, number = {8}, pages = {1139--1184}, year = 2019, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DF-jlc19.pdf} }
@inproceedings{SZ-rp19, address = {Brussels, Belgium}, month = sep, volume = {11674}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rapha{\"e}l Jungers and Emmanuel Fillot and Igor Potapov}, acronym = {{RP}'19}, booktitle = {{P}roceedings of the 13th {W}orkshop on {R}eachability {P}roblems in {C}omputational {M}odels ({RP}'19)}, author = {Sylvain Schmitz and Georg Zetzsche}, title = {Coverability Is Undecidable in One-Dimensional Pushdown Vector Addition Systems with Resets}, year = 2019, pages = {193-201}, pdf = {https://arxiv.org/pdf/1906.07069.pdf}, url = {https://arxiv.org/abs/1906.07069}, doi = {10.1007/978-3-030-30806-3_15}, abstract = {We consider the model of pushdown vector addition systems with resets. These consist of vector addition systems that have access to a pushdown stack and have instructions to reset counters. For this model, we study the coverability problem. In the absence of resets, this problem is known to be decidable for one-dimensional pushdown vector addition systems, but decidability is open for general pushdown vector addition systems. Moreover, coverability is known to be decidable for reset vector addition systems without a pushdown stack. We show in this note that the problem is undecidable for one-dimensional pushdown vector addition systems with resets.} }
@inproceedings{BGH-fscd19, address = {Dortmund, Germany}, month = jun, volume = {131}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Herman Geuvers}, acronym = {{FSCD}'19}, booktitle = {{P}roceedings of the 4th International Conference on Formal Structures for Computation and Deduction ({FSCD}'19)}, author = {Fr{\'e}d{\'e}ric Blanqui and Guillaume Genestier and Olivier Hermant}, title = {Dependency Pairs Termination in Dependent Type Theory Modulo Rewriting}, pages = {9:1-9:21}, doi = {10.4230/LIPIcs.FSCD.2019.9}, year = 2019, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/10516/pdf/LIPIcs-FSCD-2019-9.pdf}, url = {http://drops.dagstuhl.de/opus/volltexte/2019/10516/}, abstract = {Dependency pairs are a key concept at the core of modern automated termination provers for first-order term rewriting systems. In this paper, we introduce an extension of this technique for a large class of dependently-typed higher-order rewriting systems. This extends previous results by Wahlstedt on the one hand and the first author on the other hand to strong normalization and non-orthogonal rewriting systems. This new criterion is implemented in the type-checker Dedukti.} }
@inproceedings{DD-fscd19, address = {Dortmund, Germany}, month = jun, volume = {131}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Herman Geuvers}, acronym = {{FSCD}'19}, booktitle = {{P}roceedings of the 4th International Conference on Formal Structures for Computation and Deduction ({FSCD}'19)}, author = {Alejandro {D{\'i}az-Caro} and Gilles Dowek}, title = {Proof Normalisation in a Logic Identifying Isomorphic Propositions}, pages = {14:1-14:23}, doi = {10.4230/LIPIcs.FSCD.2019.14}, year = 2019, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/10521/pdf/LIPIcs-FSCD-2019-14.pdf}, url = {http://drops.dagstuhl.de/opus/volltexte/2019/10521/}, abstract = {We define a fragment of propositional logic where isomorphic propositions, such as A wedge B and B wedge A, or A ==> (B wedge C) and (A ==> B) wedge (A ==> C) are identified. We define System I, a proof language for this logic, and prove its normalisation and consistency.} }
@inproceedings{GMG-dlt19, address = {Warsaw, Poland}, month = aug, volume = {11647}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Piotrek Hofman and Micha\l Skrzypczak}, acronym = {{DLT}'19}, booktitle = {{P}roceedings of the 23th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'19)}, author = {Paul Gastin and Amaldev Manuel and R. Govind}, title = {Logics for Reversible Regular Languages and Semigroups with Involution}, pages = {182-191}, doi = {10.1007/978-3-030-24886-4_13}, year = 2019, pdf = {https://arxiv.org/pdf/1907.01214.pdf}, url = {https://arxiv.org/abs/1907.01214}, abstract = {We present MSO and FO logics with predicates ``between'' and ``neighbour'' that characterise various fragments of the class of regular languages that are closed under the reverse operation. The standard connections that exist between MSO and FO logics and varieties of finite semigroups extend to this setting with semigroups extended with an involution. The case is different for FO with neighbour relation where we show that one needs additional equations to characterise the class.} }
@inproceedings{Gastin-cai19, address = {Ni{\u s}, Serbia}, month = jun, volume = 11545, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Miroslav {\'C}iri{\'c} and Manfred Droste and Jean-{\'E}ric Pin}, acronym = {{CAI}'19}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {A}lgebraic {I}nformatics ({CAI}'19)}, author = {Gastin, Paul}, title = {Modular Descriptions of Regular Functions}, pages = {3-9}, note = {Invited talk}, year = 2019, pdf = {https://arxiv.org/abs/1908.01137}, doi = {10.1007/978-3-030-21363-3_1}, abstract = {We discuss various formalisms to describe string-to-string transformations. Many are based on automata and can be seen as operational descriptions, allowing direct implementations when the input scanner is deterministic. Alternatively, one may use more human friendly descriptions based on some simple basic transformations (e.g., copy, duplicate, erase, reverse) and various combinators such as function com- position or extensions of regular operations.} }
@article{CHKPT-nc19, publisher = {Springer}, journal = {Natural Computing}, author = {Chatain, {\relax Th}omas and Haar, Stefan and Kolc{\'a}k, Juraj and Paulev{\'e}, Lo{\"i}c and Thakkar, Aalok}, title = {Concurrency in {Boolean} networks}, volume = {19}, pages = {91--109}, year = 2020, pdf = {https://hal.inria.fr/hal-01893106v2/document}, url = {https://link.springer.com/article/10.1007/s11047-019-09748-4}, abstract = {Boolean networks (BNs) are widely used to model the qualitative dynamics of biological systems. Besides the logical rules determining the evolution of each component with respect to the state of its regulators, the scheduling of component updates can have a dramatic impact on the predicted behaviours. In this paper, we explore the use of Read (contextual) Petri Nets (RPNs) to study dynamics of BNs from a concurrency theory perspective. After showing bi-directional translations between RPNs and BNs and analogies between results on synchronism sensitivity, we illustrate that usual updating modes for BNs can miss plausible behaviours, i.e., incorrectly conclude on the absence/impossibility of reaching specific configurations. We propose an encoding of BNs capitalizing on the RPN semantics enabling more behaviour than the generalized asynchronous updating mode. The proposed encoding ensures a correct abstraction of any multivalued refinement, as one may expect to achieve when modelling biological systems with no assumption on its time features.} }
@inproceedings{K-csf19, address = {Hoboken, NJ, USA}, month = jul, publisher = {{IEEE} Computer Society Press}, editor = {Delaune, St{\'e}phanie and Jia, Limin}, acronym = {{CSF}'19}, booktitle = {{P}roceedings of the 32nd {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'19)}, author = {Adrien Koutsos}, title = {Decidability of a Sound Set of Inference Rules for Computational Indistinguishability}, pages = {48-61}, year = 2019, doi = {10.1109/CSF.2019.00011}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/K-csf19.pdf}, abstract = {Computational indistinguishability is a key property in cryptography and verification of security protocols. Current tools for proving it rely on cryptographic game transformations. We follow Bana and Comon's approach, axiomatizing what an adversary cannot distinguish. We prove the decidability of a set of first-order axioms which are computationally sound, though incomplete, for protocols with a bounded number of sessions whose security is based on an IND-CCA_2 encryption scheme. Alternatively, our result can be viewed as the decidability of a family of cryptographic game transformations. Our proof relies on term rewriting and automated deduction techniques.} }
@inproceedings{K-eurosp19, address = {Stockholm, Sweden}, month = jun, publisher = {{IEEE} Press}, editor = {Frank Piessens and Frank Stajano}, acronym = {{EuroS\&P}'19}, booktitle = {{P}roceedings of the 4th IEEE European Symposium on Security and Privacy ({EuroS\&P}'19)}, author = {Adrien Koutsos}, title = {The {5G-AKA} Authentication Protocol Privacy}, pages = {464-479}, year = 2019, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/K-eurosp19.pdf}, doi = {10.1109/EuroSP.2019.00041}, abstract = {We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions through the use of asymmetric randomized encryption. Nonetheless, we show that except for the IMSI-catcher attack, all known attacks against 5G-AKA privacy still apply. Next, we modify the 5G-AKA protocol to prevent these attacks, while satisfying 5G-AKA efficiency constraints as much as possible. We then formally prove that our protocol is sigma-unlinkable. This is a new security notion, which allows for a fine-grained quantification of a protocol privacy. Our security proof is carried out in the Bana-Comon indistinguishability logic. We also prove mutual authentication as a secondary result.} }
@article{JGL-topa19, publisher = {Elsevier Science Publishers}, journal = {Topology and its Applications}, author = {Goubault{-}Larrecq, Jean}, title = {Formal Ball Monads}, volume = {263}, pages = {372--391}, year = 2019, doi = {10.1016/j.topol.2019.06.044}, url = {http://www.sciencedirect.com/science/article/pii/S0166864119302160}, abstract = {The formal ball construction B is a central tool of quasi-metric space theory. We show that it induces monads on certain natural categories of quasi-metric spaces, with 1-Lipschitz maps as morphisms, or with 1-Lipschitz continuous maps as morphisms. Those are left Kock-Zöberlein monads, and that allows us to characterize their algebras exactly. As an application, we study so-called Lipschitz regular spaces, a natural class of spaces that contain all standard algebraic quasi-metric spaces with relatively compact balls, in particular all metric spaces whose closed balls are compact. There are other Lipschitz regular spaces, as we show, and notably all B-algebras. That includes all spaces of formal balls, with their d+-Scott topology. The value of Lipschitz regularity is that, for a Lipschitz regular standard quasi-metric space X,d, the space LX of lower semicontinuous maps from X to the extended non-negative reals, with the Scott topology, retracts onto each of the spaces L_alpha(X,d) of alpha-Lipschitz continuous maps, and that the subspace topology on the latter coincides with the Scott topology.} }
@inproceedings{GMS-cav19, address = {New York, USA}, month = jul, volume = {11561}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Isil Dillig and Serdar Tasiran}, acronym = {{CAV}'19}, booktitle = {{P}roceedings of the 31st {I}nternational {C}onference on {C}omputer {A}ided {V}erification ({CAV}'19)}, author = {Paul Gastin and Sayan Mukherjee and B. Srivathsan}, title = {Fast algorithms for handling diagonal constraints in timed automata}, pages = {41-59}, year = 2019, doi = {10.1007/978-3-030-25540-4_3}, pdf = {https://arxiv.org/pdf/1904.08590.pdf}, url = {https://arxiv.org/abs/1904.08590} }
@inproceedings{BCC-atpn19, address = {Aachen, Germany}, month = jun, year = 2019, volume = {11522}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Susanna Donatelli and Stefan Haar}, acronym = {{PETRI~NETS}'19}, booktitle = {{P}roceedings of the 40th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'19)}, author = {Mathilde Boltenhagen and Thomas Chatain and Josep Carmona}, title = {Generalized Alignment-Based Trace Clustering of Process Behavior}, pages = {237-257}, url = {https://link.springer.com/chapter/10.1007/978-3-030-21571-2_14}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCC-atpn19.pdf}, doi = {10.1007/978-3-030-21571-2_14}, abstract = {Process mining techniques use event logs containing real process executions in order to mine, align and extend process models. The partition of an event log into trace variants facilitates the understanding and analysis of traces, so it is a common pre-processing in process mining environments. Trace clustering automates this partition; traditionally it has been applied without taking into consideration the availability of a process model. In this paper we extend our previous work on process model based trace clustering, by allowing cluster centroids to have a complex structure, that can range from a partial order, down to a subnet of the initial process model. This way, the new clustering framework presented in this paper is able to cluster together traces that are distant only due to concurrency or loop constructs in process models. We show the complexity analysis of the different instantiations of the trace clustering framework, and have implemented it in a prototype tool that has been tested on different datasets.} }
@inproceedings{BBM-mfcs19, address = {Aachen, Germany}, month = aug, volume = {138}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Pinar Heggernes and Joost-Pieter Katoen and Peter Rossmanith}, acronym = {{MFCS}'19}, booktitle = {{P}roceedings of the 42nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'19)}, author = {Manfred Droste and Paul Gastin}, title = {Aperiodic Weighted Automata and Weighted First-Order Logic}, pages = {76:1-76:15}, year = 2019, doi = {10.4230/LIPIcs.MFCS.2019.76}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/11020/pdf/LIPIcs-MFCS-2019-76.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=11020} }
@inproceedings{BT-mfcs19, address = {Aachen, Germany}, month = aug, volume = {138}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Pinar Heggernes and Joost-Pieter Katoen and Peter Rossmanith}, acronym = {{MFCS}'19}, booktitle = {{P}roceedings of the 42nd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'19)}, author = {Patricia Bouyer and Nathan Thomasset}, title = {Nash equilibria in games over graphs equipped with a communication mechanism}, pages = {9:1-9:14}, year = 2019, doi = {10.4230/LIPIcs.MFCS.2019.9}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/10953/pdf/LIPIcs-MFCS-2019-9.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=10953} }
@inproceedings{BBM-concur19, address = {Amsterdam, The Netherlands}, month = aug, volume = {140}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Wan Fokkink and Rob {van Glabbeek}}, acronym = {{CONCUR}'19}, booktitle = {{P}roceedings of the 30th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'19)}, author = {Nathalie Bertrand and Patricia Bouyer and Anirban Majumdar}, title = {Reconfiguration and message losses in parameterized broadcast networks}, pages = {32:1-32:15}, year = 2019, doi = {10.4230/LIPIcs.CONCUR.2019.32}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/10934/pdf/LIPIcs-CONCUR-2019-32.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=10934} }
@inproceedings{FP-concur19, address = {Amsterdam, The Netherlands}, month = aug, volume = {140}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Wan Fokkink and Rob {van Glabbeek}}, acronym = {{CONCUR}'19}, booktitle = {{P}roceedings of the 30th {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'19)}, author = {Alain Finkel and M. Praveen}, title = {Verification of Flat FIFO Systems}, pages = {12:1-12:17}, year = 2019, doi = {10.4230/LIPIcs.CONCUR.2019.12}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/10914/pdf/LIPIcs-CONCUR-2019-12.pdf}, url = {http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=10914}, abstract = {The decidability and complexity of reachability problems and model-checking for flat counter systems have been explored in detail. However, only few results are known for flat FIFO systems, only in some particular cases (a single loop or a single bounded expression). We prove, by establishing reductions between properties, and by reducing SAT to a subset of these properties that many verification problems like reachability, non-termination, unboundedness are NP-complete for flat FIFO systems, generalizing similar existing results for flat counter systems. We construct a trace-flattable counter system that is bisimilar to a given flat FIFO system, which allows to model-check the original flat FIFO system. Our results lay the theoretical foundations and open the way to build a verification tool for (general) FIFO systems based on analysis of flat subsystems.} }
@article{HBD-jcs19, publisher = {{IOS} Press}, journal = {Journal of Computer Security}, author = {Hirschi, Lucca and Baelde, David and Delaune, St{\'e}phanie}, title = {A method for unbounded verification of privacy-type properties}, volume = {27}, number = {3}, pages = {277-342}, year = 2019, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/HBD-jcs19.pdf}, doi = {10.3233/JCS-171070}, url = {https://content.iospress.com/articles/journal-of-computer-security/jcs171070} }
@article{GBM-tocsys19, publisher = {Springer}, journal = {Theory of Computing Systems}, author = {Gardy, Patrick and Bouyer, Patricia and Markey, Nicolas}, title = {Dependences in Strategy Logic}, volume = {64}, number = {3}, year = 2020, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GBM-tocsys19.pdf}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GBM-tocsys19.pdf} }
@inproceedings{BKMMMP-ijcai19, futureaddress = {}, month = jul, publisher = {IJCAI organization}, editor = {Kraus, Sarit}, acronym = {{IJCAI}'19}, booktitle = {{P}roceedings of the 28th {I}nternational {J}oint {C}onference on {A}rtificial {I}ntelligence ({IJCAI}'19)}, author = {Bouyer, Patricia and Kupferman, Orna and Markey, Nicolas and Maubert, Bastien and Murano, Aniello and Perelli, Giuseppe}, title = {Reasoning about Quality and Fuzziness of Strategic Behaviours}, pages = {1588-1594}, year = 2019, doi = {10.24963/ijcai.2019/220}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKMMMP-ijcai19.pdf}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BKMMMP-ijcai19.pdf} }
@inproceedings{BD-aamas19, address = {Montreal, Canada}, month = jun, publisher = {ACM Press}, acronym = {{AAMAS}'19}, booktitle = {{P}roceedings of the 18th {I}nternational {J}oint {C}onference on {A}utonomous {A}gents and {M}ulti-{A}gent {S}ystems ({AAMAS}'19)}, author = {Belardinelli, Francesco and Demri, St{\'e}phane}, title = {Resource-bounded ATL: the Quest for Tractable Fragments}, pages = {206--214}, year = 2019, pdf = {http://www.ifaamas.org/Proceedings/aamas2019/pdfs/p206.pdf}, url = {http://www.ifaamas.org/Proceedings/aamas2019/forms/contents.htm#3F} }
@article{MSPPHP-ipl19, publisher = {ACM Press}, journal = {IEEE/ACM Transaction on Computational Biology and Bioinformatics}, author = {Mandon, Hugues and Su, Cui and Pang, Jun and Paul, Soumya and Haar, Stefan and Paulev{\'e}, Lo{\"i}c}, title = {Algorithms for the Sequential Reprogramming of Boolean Networks}, volume = {16}, number = {5}, pages = {1610--1619}, year = 2019, pdf = {https://hal.archives-ouvertes.fr/hal-02113864/file/main.pdf}, url = {https://hal.archives-ouvertes.fr/hal-02113864} }
@inproceedings{Schmitz-icalp19, address = {Patras, Greece}, month = jul, volume = {132}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Merelli, Emanuela}, acronym = {{ICALP}'19}, booktitle = {{P}roceedings of the 46th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'19)}, author = {Schmitz, Sylvain}, title = {The Parametric Complexity of Lossy Counter Machines}, year = 2019, pages = {129:1-129:15}, doi = {10.4230/LIPIcs.ICALP.2019.129}, pdf = {https://hal.archives-ouvertes.fr/hal-02020728v2/document}, url = {http://drops.dagstuhl.de/opus/volltexte/2019/10705/}, abstract = {The reachability problem in lossy counter machines is the best-known ACKERMANN-complete problem and has been used to establish most of the ACKERMANN-hardness statements in the literature. This hides however a complexity gap when the number of counters is fixed. We close this gap and prove F_d-completeness for machines with d counters, which provides the first known uncontrived problems complete for the fast-growing complexity classes at levels 3 < d < omega. We develop for this an approach through antichain factorisations of bad sequences and analysing the length of controlled antichains.} }
@inproceedings{Fortin-icalp19, address = {Patras, Greece}, month = jul, volume = {132}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Chatzigiannakis, Ioannis and Merelli, Emanuela}, acronym = {{ICALP}'19}, booktitle = {{P}roceedings of the 46th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'19)}, author = {Fortin, Marie}, title = {FO = FO3 for linear orders with monotone binary relations}, year = 2019, pages = {116:1-116:13}, doi = {10.4230/LIPIcs.ICALP.2019.116}, pdf = {http://drops.dagstuhl.de/opus/volltexte/2019/10692/pdf/LIPIcs-ICALP-2019-116.pdf}, url = {http://drops.dagstuhl.de/opus/volltexte/2019/10692/}, abstract = {We show that over the class of linear orders with additional binary relations satisfying some monotonicity conditions, monadic first-order logic has the three-variable property. This generalizes (and gives a new proof of) several known results, including the fact that monadic first-order logic has the three-variable property over linear orders, as well as over (R, <, +1), and answers some open questions mentioned in a paper from Antonopoulos, Hunter, Raza and Worrell [FoSSaCS 2015]. Our proof is based on a translation of monadic first-order logic formulas into formulas of a star-free variant of Propositional Dynamic Logic, which are in turn easily expressible in monadic first-order logic with three variables.} }
@inproceedings{DFM-jelia19, address = {Rende, Italy}, month = jun, year = 2019, volume = 11468, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer}, editor = {Calimeri, Francesco and Leone, Nicola and Manna, Marco}, acronym = {{JELIA}'19}, booktitle = {{P}roceedings of the 16th {E}uropean {C}onference on {L}ogics in {A}rtificial {I}ntelligence ({JELIA}'19)}, author = {Demri, St{\'e}phane and Fervari, Raul and Mansutti, Alessio}, title = {Axiomatising logics with separating conjunctions and modalities}, pages = {692-708}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFM-jelia19.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFM-jelia19.pdf}, doi = {10.1007/978-3-030-19570-0_45} }
@article{HS-ipl19, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Halfon, Simon and Schnoebelen, {\relax Ph}ilippe}, title = {On shuffle products, acyclic automata and piecewise-testable languages}, volume = {145}, pages = {68-73}, year = 2019, doi = {10.1016/j.ipl.2019.01.012}, abstract = {We show that the shuffle $L\unicode{x29E2} F$ of a piecewise-testable language $L$ and a finite language $F$ is piecewise-testable. The proof relies on a classic but little-used automata-theoretic characterization of piecewise-testable languages. We also discuss some mild generalizations of the main result, and provide bounds on the piecewise complexity of $L\unicode{x29E2} F$.} }
@inproceedings{BGJKS-csf19, address = {Hoboken, NJ, USA}, month = jul, publisher = {{IEEE} Computer Society Press}, editor = {Delaune, St{\'e}phanie and Jia, Limin}, acronym = {{CSF}'19}, booktitle = {{P}roceedings of the 32nd {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'19)}, author = {Barthe, Gilles and Gr{\'e}goire, Benjamin and Jacomme, Charlie and Kremer, Steve and Strub, Pierre-Yves}, title = {Symbolic methods in computational cryptography proofs}, pages = {136-151}, year = 2019, doi = {10.1109/CSF.2019.00017}, pdf = {https://hal.inria.fr/hal-02117794/document}, url = {https://hal.inria.fr/hal-02117794}, abstract = {Code-based game-playing is a popular methodology for proving security of cryptographic constructions and side-channel countermeasures. This methodology relies on treating cryptographic proofs as an instance of relational program verification (between probabilistic programs), and decomposing the latter into a series of elementary relational program verification steps. In this paper, we develop principled methods for proving such elementary steps for probabilistic programs that operate over finite fields and related algebraic structures. We focus on three essential properties: program equivalence, information flow, and uniformity. We give characterizations of these properties based on deducibility and other notions from symbolic cryptography. We use (sometimes improve) tools from symbolic cryptography to obtain decision procedures or sound proof methods for program equivalence, information flow, and uniformity. Finally, we evaluate our approach using examples drawn from provable security and from side-channel analysis-for the latter, we focus on the masking countermeasure against differential power analysis. A partial implementation of our approach is integrated in EASYCRYPT, a proof assistant for provable security, and in MASKVERIF, a fully automated prover for masked implementations.} }
@inproceedings{FHK-atpn19, address = {Aachen, Germany}, month = jun, year = 2019, volume = {11522}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Susanna Donatelli and Stefan Haar}, acronym = {{PETRI~NETS}'19}, booktitle = {{P}roceedings of the 40th {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'19)}, author = {Finkel, Alain and Haddad, Serge and Khmelnitsky, Igor}, title = {Coverability and Termination in Recursive Petri Nets}, pages = { 429-448}, url = {https://hal.inria.fr/hal-02081019}, pdf = {https://hal.inria.fr/hal-02081019/document}, doi = {10.1007/978-3-030-21571-2_23}, abstract = {In the early two-thousands, Recursive Petri nets have been introduced in order to model distributed planning of multi-agent systems for which counters and recursivity were necessary. Although Recursive Petri nets strictly extend Petri nets and stack automata, most of the usual property problems are solvable but using non primitive recursive algorithms, even for coverability and termination. For almost all other extended Petri nets models containing a stack the complexity of coverability and termination are unknown or strictly larger than EXPSPACE. In contrast, we establish here that for Recursive Petri nets, the coverability and termination problems are EXPSPACE-complete as for Petri nets. From an expressiveness point of view, we show that coverability languages of Recursive Petri nets strictly include the union of coverability languages of Petri nets and context-free languages. Thus we get for free a more powerful model than Petri net.} }
@inproceedings{JGL-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {Goubault{-}Larrecq, Jean}, title = {A Probabilistic and Non-Deterministic Call-by-Push-Value Language}, pages = {1-13}, year = 2019, doi = {10.1109/LICS.2019.8785809}, abstract = {There is no known way of giving a domain-theoretic semantics to higher-order probabilistic languages, in such a way that the involved domains are continuous or quasi-continuous. We argue that the problem naturally disappears for languages with two kinds of types, where one kind is interpreted in a Cartesian-closed category of continuous dcpos, and the other is interpreted in a category that is closed under the probabilistic powerdomain functor. Such a setting is provided by Paul B. Levy's call-by-push-value paradigm. Following this insight, we define a call-by-push-value language, with probabilistic choice sitting inside the value types, and where conversion from a value type to a computation type involves demonic non-determinism. We give both a domain-theoretic semantics and an operational semantics for the resulting language, and we show that they are sound and adequate. With the addition of statistical termination testers and parallel if, we show that the language is even fully abstract-and those two primitives are required for that.} }
@inproceedings{AGJK-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {Akshay, S. and Gastin, Paul and Jug{\'e}, Vincent and Krishna, Shankara Narayanan}, title = {Timed systems through the lens of logic}, pages = {1-13}, year = 2019, doi = {10.1109/LICS.2019.8785684}, pdf = {https://arxiv.org/pdf/1903.03773.pdf}, url = {https://arxiv.org/abs/1903.03773}, abstract = {In this paper, we analyze timed systems with data structures, using a rich interplay of logic and properties of graphs. We start by describing behaviors of timed systems using graphs with timing constraints. Such a graph is called realizable if we can assign time-stamps to nodes or events so that they are consistent with the timing constraints. The logical definability of several graph properties has been a challenging problem, and we show, using a highly non-trivial argument, that the realizability property for collections of graphs with strict timing constraints is logically definable in a class of propositional dynamic logic (EQ-ICPDL), which is strictly contained in MSO. Using this result, we propose a novel, algorithmically efficient and uniform proof technique for the analysis of timed systems enriched with auxiliary data structures, like stacks and queues. Our technique unravels new results (for emptiness checking as well as model checking) for timed systems with richer features than considered so far, while also recovering existing results.} }
@inproceedings{BD-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {Bednarczyk, Bartosz and Demri, St{\'e}phane}, title = {Why propositional quantification makes modal logics on trees robustly hard ?}, pages = {1-13}, year = 2019, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BD-lics2019.pdf}, doi = {10.1109/LICS.2019.8785656} }
@inproceedings{CD-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Graph Planning with Expected Finite Horizon}, pages = {1-13}, year = 2019, doi = {10.1109/LICS.2019.8785706}, abstract = {Graph planning gives rise to fundamental algorithmic questions such as shortest path, traveling salesman problem, etc. A classical problem in discrete planning is to consider a weighted graph and construct a path that maximizes the sum of weights for a given time horizon T. However, in many scenarios, the time horizon is not fixed, but the stopping time is chosen according to some distribution such that the expected stopping time is T. If the stopping time distribution is not known, then to ensure robustness, the distribution is chosen by an adversary, to represent the worst-case scenario. A stationary plan for every vertex always chooses the same outgoing edge. For fixed horizon or fixed stopping-time distribution, stationary plans are not sufficient for optimality. Quite surprisingly we show that when an adversary chooses the stopping-time distribution with expected stopping time T, then stationary plans are sufficient. While computing optimal stationary plans for fixed horizon is NP-complete, we show that computing optimal stationary plans under adversarial stopping-time distribution can be achieved in polynomial time. Consequently, our polynomial-time algorithm for adversarial stopping time also computes an optimal plan among all possible plans.} }
@inproceedings{LS-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {J{\'e}r{\^o}me Leroux and Schmitz, Sylvain}, title = {Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension}, pages = {1-13}, year = 2019, doi = {10.1109/LICS.2019.8785796}, url = {https://arxiv.org/abs/1903.08575}, abstract = {The reachability problem in vector addition systems is a central question, not only for the static verification of these systems, but also for many inter-reducible decision problems occurring in various fields. The currently best known upper bound on this problem is not primitive-recursive, even when considering systems of fixed dimension. We provide significant refinements to the classical decomposition algorithm of Mayr, Kosaraju, and Lambert and to its termination proof, which yield an ACKERMANN upper bound in the general case, and primitive-recursive upper bounds in fixed dimension. While this does not match the currently best known TOWER lower bound for reachability, it is optimal for related problems.} }
@article{LS-icomp19, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Ranko Lazi\'c and Sylvain Schmitz}, title = {The Ideal View on {R}ackoff's Coverability Technique}, url = {https://hal.inria.fr/hal-01176755}, year = 2019, note = {To appear}, abstract = {Well-structured transition systems form a large class of infinite-state systems, for which safety verification is decidable thanks to a generic backward coverability algorithm. However, for several classes of systems, the generic upper bounds one can extract from the algorithm are far from optimal. In particular, in the case of vector addition systems (VAS) and several of their extensions, the known tight upper bounds were rather derived thanks to ad-hoc arguments based on Rackoff's small witness property. We show how to derive the same bounds directly on the computations of the VAS instantiation of the generic backward coverability algorithm. This relies on a dual view of the algorithm using ideal decompositions of downwards-closed sets, which exhibits a key structural invariant in the VAS case. This reasoning offers a uniform setting for all well-structured transition systems, including branching ones, and we further apply it to several VAS extensions: we derive optimal upper bounds for coverability in branching and alternating VAS, matching the previously known results from the literature.} }
@inproceedings{MFNS-async19, address = {Hirosaki, Japan}, month = may, publisher = {{IEEE} Computer Society}, editor = {Marly Roncken and Andrey Mokhov}, acronym = {{ASYNC}'19}, booktitle = {{P}roceedings of the 25th {IEEE} {I}nternational {S}ymposium on {A}synchronous {C}ircuits and {S}ystems ({ASYNC}'19)}, author = {J{\"u}rgen Maier and Matthias F{\"u}gger and Thomas Nowak and Ulrich Schmid}, title = {Transistor-Level Analysis of Dynamic Delay Models}, pages = {76-85}, year = {2019}, doi = {10.1109/ASYNC.2019.00019}, abstract = {Delay estimation is a crucial task in digital circuit design as it provides the possibility to assure the desired functionality, but also prevents undesired behavior very early. For this purpose elaborate delay models like the Degradation Delay Model (DDM) and the Involution Delay Model (IDM) have been proposed in the past, which facilitate accurate dynamic timing analysis: Both use delay functions that determine the delay of the current input transition based on the time difference T to the previous output one. Currently, however, extensive analog simulations are necessary to determine the (parameters of the) delay function, which is a very time-consuming and cumbersome task and thus limits the applicability of these models. In this paper, we therefore thoroughly investigate the characterization procedures of a CMOS inverter on the transistor level in order to derive analytical expressions for the delay functions. Based on reasonably simple transistor models we identify three operation regions, each described by a different estimation function. Using simulations with two independent technologies, we show that our predictions are not only accurate but also reasonably robust w.r.t. variations. Our results furthermore indicate that the exponential fitting proposed for DDM is actually only partially valid, while our analytic approach can be applied on the whole range. Even the more complex IDM is predicted reasonably accurate.} }
@inproceedings{BBR-fossacs19, address = {Prague, Czech Republic}, month = apr, year = 2019, volume = {11425}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Boja{\'n}czyk, Mikolaj and Simpson, Alex}, acronym = {{FoSSaCS}'19}, booktitle = {{P}roceedings of the 22nd {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'19)}, author = {Benedikt Bollig and Patricia Bouyer and Fabian Reiter}, title = {Identifiers in Registers - Describing Network Algorithms with Logic}, pages = {115-132}, url = {https://arxiv.org/abs/1811.08197}, pdf = {https://arxiv.org/pdf/1811.08197.pdf}, doi = {10.1007/978-3-030-17127-8}, abstract = {We propose a formal model of distributed computing based on register automata that captures a broad class of synchronous network algorithms. The local memory of each process is represented by a finite-state controller and a fixed number of registers, each of which can store the unique identifier of some process in the network. To underline the naturalness of our model, we show that it has the same expressive power as a certain extension of first-order logic on graphs whose nodes are equipped with a total order. Said extension lets us define new functions on the set of nodes by means of a so-called partial fixpoint operator. In spirit, our result bears close resemblance to a classical theorem of descriptive complexity theory that characterizes the complexity class PSPACE in terms of partial fixpoint logic (a proper superclass of the logic we consider here).} }
@inproceedings{JS-lics19, address = {Vancouver, Canada}, month = jun, publisher = {{IEEE} Press}, editor = {Bouyer, Patricia}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 34th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'19)}, author = {Jan{\v c}ar, Petr and Schmitz, Sylvain}, title = {Bisimulation Equivalence of First-Order Grammars is {ACKERMANN}-Complete}, pages = {1-12}, year = 2019, doi = {10.1109/LICS.2019.8785848}, url = {https://arxiv.org/abs/1901.07170}, abstract = {Checking whether two pushdown automata with restricted silent actions are weakly bisimilar was shown decidable by S{\'e}nizergues (1998, 2005). We provide the first known complexity upper bound for this famous problem, in the equivalent setting of first-order grammars. This ACKERMANN upper bound is optimal, and we also show that strong bisimilarity is primitive-recursive when the number of states of the automata is fixed.} }
@proceedings{JSC-pn20, title = {{P}roceedings of the 41st {C}onference on {P}etri {N}ets ({PN}'20)}, booktitle = {{P}roceedings of the 41st {C}onference on {P}etri {N}ets ({PN}'20)}, acronym = {{PN}'20}, editor = {Chatain, Thomas and Janicki, Ryszard and Sidorova, Natalia}, publisher = {Springer}, year = 2020, month = june, address = {Paris, France}, url = {https://www.springer.com/gp/book/9783030518301} }
@article{JMS-deds20, publisher = {Springer}, journal = {Discrete Event Dynamic Systems: Theory and Applications}, author = {Lo{\"i}g Jezequel and Agnes Madalinski and Stefan Schwoon}, title = {{Distributed computation of vector clocks in Petri net unfoldings for test selection}}, volume = {30}, number = {3}, pages = {441-464}, year = {2020} }
@article{AMP-nc20, publisher = {Springer}, journal = {Natural Computing}, author = {Pablo Arrighi and Simon Martiel and Simon Perdrix}, title = {{Reversible causal graph dynamics: invertibility, block representation, vertex-preservation}}, volume = {19}, number = {1}, pages = {157-178}, doi = {10.1007/s11047-019-09768-0}, year = {2020}, pdf = {https://hal.archives-ouvertes.fr/hal-02400095}, url = {https://hal.archives-ouvertes.fr/hal-02400095} }
@inproceedings{HB-types2020, address = {Turin, Italy}, year = 2021, volume = {188}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Ugo de Liguoro and Stefano Berardi and Thorsten Altenkirch}, acronym = {{TYPES}'20}, booktitle = {{P}roceedings of the 26th {I}nternational {C}onference on {T}ypes for {P}roofs and {P}rograms ({TYPES}'20)}, author = {Gabriel Hondet and Fr{\'e}d{\'e}ric Blanqui}, title = {{Encoding of Predicate Subtyping with Proof Irrelevance in the $\Lambda \Pi$-Calculus Modulo Theory}}, pages = {6:1--6:18}, url = {https://drops.dagstuhl.de/opus/volltexte/2021/13885/}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2021/13885/}, doi = {10.4230/LIPIcs.TYPES.2020.6} }
@inproceedings{BKMMMP-ecai20, address = {Santiago de Compostela, Spain}, month = sep, optvolume = {??}, optseries = {Frontiers in Artificial Intelligence and Applications}, publisher = {{IOS} Press}, editor = {Lang, J{\'e}r{\^o}me and De Giacomo, Giuseppe and Barro and Sen{\'e}n Barro and O'Sullivan, Barry}, acronym = {{ECAI}'20}, booktitle = {{P}roceedings of the 24th {E}uropean {C}onference on {A}rtificial {I}ntelligence ({ECAI}'20)}, author = {Patricia Bouyer and Orna Kupferman and Nicolas Markey and Bastien Maubert and Aniello Murano and Giuseppe Perelli}, title = {{Reasoning About Quality and Fuzziness of Strategic Behaviours}}, pages = {2887-2888}, year = 2020, pdf = {https://ebooks.iospress.nl/publication/55232}, url = {https://ebooks.iospress.nl/publication/55232}, doi = {10.3233/FAIA200437} }
@techreport{JFA-arxiv20, author = {Jawher Jerray and Laurent Fribourg and {\'E}tienne Andr{\'e}}, institution = {Computing Research Repository}, month = june, number = {2006.09993}, type = {Research Report}, title = {{Guaranteed phase synchronization of hybrid oscillators using symbolic Euler's method: The Brusselator and biped examples}}, year = {2020}, url = {https://arxiv.org/abs/2006.09993}, pdf = {https://arxiv.org/abs/2006.09993} }
@techreport{JFA-arxiv20bis, author = {Jawher Jerray and Laurent Fribourg and {\'E}tienne Andr{\'e}}, institution = {Computing Research Repository}, month = july, number = {2007.13644}, type = {Research Report}, title = {{Robust optimal control using dynamic programming and guaranteed Euler's method}}, year = {2020}, url = {https://arxiv.org/abs/2007.13644}, pdf = {https://arxiv.org/abs/2007.13644} }
@techreport{JF-arxiv20, author = {Jawher Jerray and Laurent Fribourg}, institution = {Computing Research Repository}, month = december, number = {2012.09310}, type = {Research Report}, title = {{Generation of bounded invariants via stroboscopic set-valued maps: Application to the stability analysis of parametric time-periodic systems}}, year = {2020}, url = {https://arxiv.org/abs/2012.09310}, pdf = {https://arxiv.org/abs/2012.09310} }
@techreport{Lopez-arxiv20, author = {Aliaume Lopez}, institution = {Computing Research Repository}, month = july, number = {2007.07879}, type = {Research Report}, title = {{Preservation Theorems Through the Lens of Topology}}, year = {2020}, url = {https://arxiv.org/abs/2007.07879}, pdf = {https://arxiv.org/abs/2007.07879} }
@inproceedings{Boltenhagen-bpm20, address = {Sevilla, Spain}, month = sep, volume = 397, series = {Lecture Notes in Business Information Processing}, publisher = {Springer}, editor = {Adela Del-Rio-Ortega and Henrik Leopold and Flavia Maria Santoro}, acronym = {{BPM}'20}, booktitle = {{B}usiness {P}rocess {M}anagement {W}orkshops ({BPM}'20), Revised Selected Papers}, author = {Mohammadreza Fani Sani and Mathilde Boltenhagen and Wil M.P. van der Aalst}, title = {Prototype Selection using Clustering and Conformance Metrics for Process Discovery}, pages = {281-294}, year = {2020}, doi = {https://doi.org/10.1007/978-3-030-66498-5_21}, pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-66498-5_21}, url = {https://link.springer.com/chapter/10.1007%2F978-3-030-66498-5_21} }
@article{BCC-is20, publisher = {Elsevier Science Publishers}, journal = {Information Systems}, author = {Mathilde Boltenhagen and Thomas Chatain and Josep Carmona}, title = {Model-based trace variant analysis of event logs}, year = 2020, doi = {https://doi.org/10.1016/j.is.2020.101675}, url = {https://www.sciencedirect.com/science/article/abs/pii/S0306437920301307?via%3Dihub}, note = {To appear} }
@inproceedings{BCH-icpm20, address = {Padua, Italy}, month = oct, publisher = {SPRINGER}, acronym = {{ICPM} 2020}, booktitle = {{Process Mining Workshops (ICPM'20)}}, author = {Mathilde Boltenhagen and Benjamin Chetioui and Laurine Huber}, title = {{Cost-Based Classification of Log Traces Using Machine-Learning}}, pages = {136-148}, year = {2020}, doi = {https://doi.org/10.1007/978-3-030-72693-5_11}, pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-72693-5_11}, url = {https://link.springer.com/chapter/10.1007%2F978-3-030-72693-5_11} }
@inproceedings{BM-lfmtp2020, address = {Paris, France}, month = june, year = 2020, publisher = {ACM Press}, editor = {Claudio Sacerdoti Coen and Alwen Tiu}, acronym = {{LFMTP}'20}, booktitle = {Proceedings of the 15th {I}nternational {W}orkshop on {L}ogical {F}rameworks and {M}eta-{L}anguages: {T}heory and {P}ractice ({LFMTP}'20)}, author = {Bruno Barras and Valentin Maestracci}, title = {{Implementation of Two Layers Type Theory in Dedukti and Application to Cubical Type Theory}}, pages = {54--67}, url = {https://arxiv.org/abs/2101.03810v1}, pdf = {https://arxiv.org/abs/2101.03810v1}, doi = {10.4204/EPTCS.332.4} }
@inproceedings{Finkel-vpthcvs2020, address = {Dublin, Ireland}, month = april, year = 2020, publisher = {Electronic Proceedings in Theoretical Computer Science}, editor = {Laurent Fribourg and Matthias Heizmann}, acronym = {{VPT/HCVS@ETAPS}'20}, booktitle = {Proceedings of 8th {I}nternational {W}orkshop on {V}erification and {P}rogram {T}ransformation and 7th {W}orkshop on {H}orn {C}lauses for {V}erification and {S}ynthesis ({VPT/HCVS@ETAPS 2020})}, author = {Alain Finkel}, title = {{From Well Structured Transition Systems to Program Verification}}, pages = {44--49}, url = {https://arxiv.org/abs/2008.02929v1}, pdf = {https://arxiv.org/abs/2008.02929v1}, doi = {10.4204/EPTCS.320.3} }
@inproceedings{LeRoux-cie2020, address = {Fisciano, Italy}, month = june, year = 2020, volume = 12098, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Marcella Anselmo and Gianluca Della Vedova and Florin Manea and Arno Pauly }, acronym = {{CiE}'20}, booktitle = {{P}roceedings of the 16th {C}onference on {C}omputability in {E}urope ({CiE 2020})}, author = {Le Roux, St{\'e}phane}, title = {{Time-Aware Uniformization of Winning Strategies}}, pages = {193-204}, url = {https://link.springer.com/chapter/10.1007%2F978-3-030-51466-2_17}, pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-51466-2_17}, doi = {https://doi.org/10.1007/978-3-030-51466-2_17} }
@article{BCC-comp21, publisher = {Springer}, journal = {Computing}, author = {Mathilde Boltenhagen and Thomas Chatain and Josep Carmona}, title = {Optimized {SAT} encoding of conformance checking artefacts}, volume = {103}, number = {1}, pages = {29-50}, year = 2021, doi = {10.1007/s00607-020-00831-8}, url = {https://doi.org/10.1007/s00607-020-00831-8} }
@article{BCC-is21, publisher = {Elsevier Science Publishers}, journal = {Information Systems}, author = {Mathilde Boltenhagen and Thomas Chatain and Josep Carmona}, title = {Anti-alignments—Measuring the precision of process models and event logs}, volume = {98}, year = 2021, doi = {https://doi.org/10.1016/j.is.2020.101708}, url = {https://doi.org/10.1016/j.is.2020.101708}, note = {To appear} }
@inproceedings{BDJKM-csl21, address = {online}, month = may, publisher = {{IEEE} Press}, editor = {Alina Oprea and Thorsten Holz}, acronym = {{S\&P}'21}, booktitle = {{P}roceedings of the 42nd IEEE Symposium on Security and Privacy ({S\&P}'21)}, author = {Baelde, David and Delaune, St{\'e}phanie and Jacomme, Charlie and Koutsos, Adrien and Moreau, Sol{\`e}ne}, title = {An {I}nteractive {P}rover for {P}rotocol {V}erification in the {C}omputational {M}odel}, year = {2021}, pdf = {https://hal.archives-ouvertes.fr/hal-03172119}, url = {https://hal.archives-ouvertes.fr/hal-03172119}, note = {To appear} }
@phdthesis{baelde-hdr2021, author = {Baelde, David}, title = {Contributions to the {V}erification of {C}ryptographic {P}rotocols}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {M{\'e}moire d'habilitation}, year = 2021, month = feb, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Baelde-Hab2021.pdf}, url = {http://www.lsv.fr/~baelde/hdr/index.html} }
@article{BLRPR-ic21, author = {Bruy{\`e}re, V{\'e}ronique and Le Roux, St{\'e}phane and Pauly, Arno and Raskin, Jean{-}Fran{\c{c}}ois}, title = {On the existence of weak subgame perfect equilibria}, volume = {276}, year = 2021, doi = {https://doi.org/10.1016/j.ic.2020.104553}, url = {https://www.sciencedirect.com/science/article/pii/S0890540120300419?via%3Dihub} }
@article{BBFLMR-fac21, publisher = {Springer}, journal = {Formal Aspects of Computing}, author = {Bacci, Giovanni and Bouyer, Patricia and Fahrenberg, Uli and Larsen, Kim and Markey, Nicolas and Reynier, Pierre{-}Alain}, title = {Optimal and robust controller synthesis using energy timed automata with uncertainty}, volume = {33}, pages = {3--25}, year = 2021, doi = {10.1007/s00165-020-00521-4}, url = {https://link.springer.com/article/10.1007/s00165-020-00521-4} }
@article{DFM-jlc21, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane and Fervari, Raul and Mansutti, Alessio}, title = {Internal proof calculi for modal logics with separating conjunction}, year = 2021, note = {Accepted for publication to the Special issue of JLC on External and Internal Calculi for Non Classical Logics.}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFM-jlc21.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DFM-jlc21.pdf} }
@article{DLM-jlc21, publisher = {ACM Press}, journal = {ACM Transactions on Computational Logic}, author = {Demri, St{\'e}phane and {\'E}tienne Lozes and Mansutti, Alessio}, title = {The Effects of Adding Reachability Predicates in Quantifier-Free Separation Logic}, year = 2021, note = {To appear}, url = {http://arxiv.org/abs/1810.05410}, pdf = {http://arxiv.org/abs/1810.05410} }
@phdthesis{thire-phd2020, author = {Thir{\'e}, Fran{\c{c}}ois}, title = {{Meta-theory of Cumulative Types Systems and their embeddings to the $\Lambda \Pi$-calculus modulo theory}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2020, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/thire-phd20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/thire-phd20.pdf} }
@inproceedings{GH-stacs21, address = {Saarbr{\"u}cken, Germany}, month = mar, volume = {187}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Markus Bl{\"a}ser and Benjamin Monmege}, acronym = {{STACS}'21}, booktitle = {{P}roceedings of the 38th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'21)}, author = {G{\"o}ller, Stefan and Hilaire, Mathieu}, title = {{Reachability in two-parametric timed automata with one parameter is EXPSPACE-complete}}, year = {2021}, doi = {10.4230/LIPIcs.STACS.2021.36}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2021/13681/pdf/LIPIcs-STACS-2021-36.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=13681} }
@article{GMG-fi20, publisher = {{IOS} Press}, journal = {Fundamenta Informaticae}, author = {Gastin, Paul and Manuel, Amaldev and Govind, R.}, title = {{Reversible Regular Languages: Logical and Algebraic Characterisations}}, year = {2020}, note = {To appear} }
@phdthesis{fortin-phd2020, author = {Fortin, Marie}, title = {{Expressivity of first-order logic, star-free propositional dynamic logic and communicating automata}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2020, month = nov, url = {https://tel.archives-ouvertes.fr/tel-03079438}, pdf = {https://tel.archives-ouvertes.fr/tel-03079438/document} }
@phdthesis{Mansutti-phd2020, author = {Mansutti, Alessio}, title = {{Reasoning with Separation Logics: Complexity, Expressive Power, Proof Systems}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2020, month = dec, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mansutti-phd20.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mansutti-phd20.pdf} }
@phdthesis{Genestier-phd2020, author = {Genestier, Guillaume}, title = {{Dependently-Typed Termination and Embedding of Extensional Universe-Polymorphic Type Theory using Rewriting}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2020, month = dec, opturl = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/genestier-phd20.pdf}, optpdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/genestier-phd20.pdf} }
@article{FHK-deds20, publisher = {Springer}, journal = {Discrete Event Dynamic Systems: Theory and Applications}, author = {Alain Finkel and Serge Haddad and Igor Khmelnitsky}, title = {{Commodification of accelerations for the Karp and Miller Construction}}, doi = {10.1007/s10626-020-00331-z}, year = {2020}, url = {https://link.springer.com/article/10.1007/s10626-020-00331-z} }
@article{BHL-deds20, publisher = {Springer}, journal = {Discrete Event Dynamic Systems: Theory and Applications}, author = {Nathalie Bertrand and Serge Haddad and Engel Lefaucheux}, title = {{Diagnosis and Degradation Control for Probabilistic Systems}}, volume = {30}, pages = {695–723}, doi = {10.1007/s10626-020-00320-2}, year = {2020}, url = {https://link.springer.com/article/10.1007/s10626-020-00320-2} }
@article{FG-mscs20, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {{Forward analysis for WSTS, part I: completions}}, volume = {30}, number = {7}, pages = {752-832}, doi = {10.1017/S0960129520000195}, year = {2020}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FG-mscs2020.pdf}, url = {http://dx.doi.org/10.1017/S0960129520000195} }
@article{FP-lmcs20, journal = {Logical Methods in Computer Science}, author = {Finkel, Alain and Praveen, M.}, title = {{Verification of Flat FIFO Systems}}, volume = {20}, number = {4}, doi = {10.23638/LMCS-16(4:4)2020}, year = {2020}, month = oct, url = {https://lmcs.episciences.org/6839} }
@proceedings{GLB-fossacs20, title = {{P}roceedings of the 23rd {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'20)}, booktitle = {{P}roceedings of the 23rd {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'20)}, acronym = {{FoSSaCS}'20}, editor = {Goubault{-}Larrecq, Jean and K{\"{o}}nig, Barbara}, publisher = {Springer}, year = 2020, month = april, address = {Dublin, Ireland}, url = {https://link.springer.com/book/10.1007/978-3-030-45231-5} }
@techreport{KY-arxiv20, author = {Khmelnitsky, Igor and Neider, Daniel and Roy, Rajarshi and Barbot, Beno{\^{\i}}t and Bollig, Benedikt and Finkel, Alain and Haddad, Serge and Leucker, Martin and Ye, Lina }, institution = {Computing Research Repository}, month = sep, number = {2009.10610}, type = {Research Report}, title = {Property-Directed Verification of Recurrent Neural Networks}, year = {2020}, url = {https://arxiv.org/abs/2009.10610}, pdf = {https://arxiv.org/pdf/2009.10610.pdf} }
@article{BJO-tcs20, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Blanqui, Fr{\'{e}}d{\'{e}}ric and Jouannaud, Jean{-}Pierre and Okada, Mitsuhiro}, title = {Corrigendum to {\em {I}nductive-data-type systems} [Theoret. Comput. Sci. 272 {(1-2)} {(2002)} 41-68]}, volume = {817}, pages = {81--82}, doi = {10.1016/j.tcs.2018.01.010}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2018.01.010} }
@techreport{DD-arxiv20, author = {D{\'{\i}}az{-}Caro, Alejandro and Dowek, Gilles}, institution = {Computing Research Repository}, month = jul, number = {2002.03762v3}, type = {Research Report}, title = {Extensional proofs in a propositional logic modulo isomorphisms}, year = {2020}, url = {https://arxiv.org/abs/2002.03762}, pdf = {https://arxiv.org/pdf/2002.03762v3.pdf} }
@article{DDR-biosys19, publisher = {Elsevier Science Publishers}, journal = {Biosystems}, author = {D{\'{\i}}az{-}Caro, Alejandro and Dowek, Gilles and Rinaldi, Juan Pablo}, title = {Two linearities for quantum computing in the lambda calculus}, volume = {186}, doi = {10.1016/j.biosystems.2019.104012}, year = {2019}, url = {10.1016/j.biosystems.2019.104012} }
@inproceedings{DM-csl21, address = {Ljubljana, Slovenia}, month = jan, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Baier, Christel and Goubault{-}Larrecq, Jean}, acronym = {{CSL}'21}, booktitle = {{P}roceedings of the 29th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'21)}, author = {Dinis, Bruno and Miquey, {\'E}tienne}, title = {Realizability with stateful computations for nonstandard analysis}, pages = {19:1-19:23}, year = {2021}, doi = {10.4230/LIPIcs.CSL.2021.19}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2021/13453/}, url = {https://drops.dagstuhl.de/opus/volltexte/2021/13453/} }
@inproceedings{Lopez-csl21, address = {Ljubljana, Slovenia}, month = jan, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Baier, Christel and Goubault{-}Larrecq, Jean}, acronym = {{CSL}'21}, booktitle = {{P}roceedings of the 29th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'21)}, author = {Aliaume Lopez}, title = {Preservation {T}heorems {T}hrough the {L}ens of {T}opology}, pages = {32:1-32:17}, year = {2021}, doi = {10.4230/LIPIcs.CSL.2021.32}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2021/13466/}, url = {https://drops.dagstuhl.de/opus/volltexte/2021/13466/} }
@inproceedings{Schnoebelen-csl21, address = {Ljubljana, Slovenia}, month = jan, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Baier, Christel and Goubault{-}Larrecq, Jean}, acronym = {{CSL}'21}, booktitle = {{P}roceedings of the 29th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'21)}, author = {{\relax Ph}ilippe Schnoebelen}, title = {On flat lossy channel machines}, pages = {37:1-37:22}, year = {2021}, doi = {10.4230/LIPIcs.CSL.2021.37}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2021/13471/}, url = {https://drops.dagstuhl.de/opus/volltexte/2021/13471/} }
@article{PKCH-natcommun20, publisher = {Nature Research}, journal = {Nature Communications}, author = {Lo{\"i}c Paulev{\'e} and Juraj Kolc{\'a}k and Thomas Chatain and Stefan Haar}, title = {Reconciling qualitative, abstract, and scalable modeling of biological networks}, volume = {11}, number = {4256}, month = aug, doi = {10.1038/s41467-020-18112-5}, year = {2020}, url = {https://www.nature.com/articles/s41467-020-18112-5} }
@inproceedings{HPS-cmsb20, address = {held online}, month = sep, volume = {12314}, series = {Lecture Notes in Bioinformatics}, publisher = {Springer-Verlag}, editor = {Alessandro Abate and Tatjana Petrov and Verena Wolf}, acronym = {{CMSB}'20}, booktitle = {{P}roceedings of the 18th {C}onference on {C}omputational {M}ethods in {S}ystem {B}iology ({CMSB}'20)}, author = {Stefan Haar and Lo{\"i}c Paulev{\'e} and Stefan Schwoon}, title = {{Drawing the Line: Basin Boundaries in Safe Petri Nets}}, pages = {321-336}, year = {2020}, doi = {10.1007/978-3-030-60327-4\_17} }
@inproceedings{CJS-ccs20, address = {Orlando, USA}, month = nov, publisher = {ACM Press}, editor = {Jonathan Katz and Giovanni Vigna}, acronym = {{CCS}'20}, booktitle = {{P}roceedings of the 27th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity ({CCS}'20)}, author = {Hubert Comon and Charlie Jacomme and Guillaume Scerri}, title = {Oracle simulation: a technique for protocol composition with long term shared secrets}, pages = {1427-1444}, year = {2020}, doi = {10.1145/3372297.3417229} }
@inproceedings{BRS-csl21, address = {Ljubljana, Slovenia}, month = jan, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Baier, Christel and Goubault{-}Larrecq, Jean}, acronym = {{CSL}'21}, booktitle = {{P}roceedings of the 29th {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'21)}, author = {Benedikt Bollig and Fedor Ryabinin and Arnaud Sangnier}, title = {Reachability in Distributed Memory Automata}, pages = {13:1-13:16}, year = {2021}, doi = {10.4230/LIPIcs.CSL.2021.13}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2021/13447/}, url = {https://drops.dagstuhl.de/opus/volltexte/2021/13447/} }
@inproceedings{HHSY-fsttcs20, address = {Goa, India}, month = dec, volume = {182}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Nitin Saxena and Sunil Simon}, acronym = {{FSTTCS}'20}, booktitle = {{P}roceedings of the 40th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'20)}, author = {Stefan Haar and Serge Haddad and Stefan Schwoon and Lina Ye}, title = {Active Prediction for Discrete Event Systems}, pages = {48:1--48:16}, year = {2020}, doi = {https://doi.org/10.4230/LIPIcs.FSTTCS.2020.48}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/13289/pdf/LIPIcs-FSTTCS-2020-48.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=13289} }
@inproceedings{BBM-fsttcs20, address = {Goa, India}, month = dec, volume = {182}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Nitin Saxena and Sunil Simon}, acronym = {{FSTTCS}'20}, booktitle = {{P}roceedings of the 40th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'20)}, author = {Nathalie Bertrand and Patricia Bouyer and Anirban Majumdar}, title = {Synthesizing safe coalition strategies}, pages = {39:1--39:17}, year = {2020}, doi = {https://doi.org/10.4230/LIPIcs.FSTTCS.2020.39}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/13280/pdf/LIPIcs-FSTTCS-2020-39.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=13280} }
@inproceedings{BBRRV-fsttcs20, address = {Goa, India}, month = dec, volume = {182}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Nitin Saxena and Sunil Simon}, acronym = {{FSTTCS}'20}, booktitle = {{P}roceedings of the 40th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'20)}, author = {Paul Gastin and Sayan Mukherjee and B Srivathsan}, title = {Reachability for updatable timed automata made faster and more effective}, pages = {47:1--47:17}, year = {2020}, doi = {https://doi.org/10.4230/LIPIcs.FSTTCS.2020.47}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/13288/pdf/LIPIcs-FSTTCS-2020-47.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=13288} }
@inproceedings{AG-fsttcs20, address = {Goa, India}, month = dec, volume = {182}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Nitin Saxena and Sunil Simon}, acronym = {{FSTTCS}'20}, booktitle = {{P}roceedings of the 40th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'20)}, author = {C. Aiswarya and Paul Gastin}, title = {Weighted Tiling Systems for Graphs: Evaluation Complexity}, year = {2020}, doi = {https://doi.org/10.4230/LIPIcs.FSTTCS.2020.34}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/13275/pdf/LIPIcs-FSTTCS-2020-34.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=13275} }
@techreport{DLM-arxiv20, author = {St{\'e}phane Demri and {\'E}tienne Lozes and Alessio Mansutti}, institution = {Computing Research Repository}, month = feb, note = {63~pages}, number = {2006.05156v2}, type = {Research Report}, title = {A {C}omplete {A}xiomatisation for {Q}uantifier-{F}ree {S}eparation {L}ogic}, year = {2021}, url = {https://arxiv.org/abs/2006.05156}, pdf = {https://arxiv.org/pdf/2006.05156v2.pdf} }
@inproceedings{ADL-aaai20, month = feb, publisher = {AAAI Press}, editor = {Rossi, Francesca and Conitzer, Vincent and Sha, Fei}, acronym = {{AAAI}'20}, booktitle = {{P}roceedings of the 34th {AAAI} {C}onference on {A}rtificial {I}ntelligence ({AAAI}'20)}, author = {Alechina, Natasha and Demri, St{\'e}phane and Logan, Brian}, title = {Parameterised Resource-Bounded ATL}, pages = {7040--7046}, year = {2020}, doi = {https://doi.org/10.1609/aaai.v34i05.6189}, url = {https://aaai.org/ojs/index.php/AAAI/article/view/6189} }
@inproceedings{BBRRV-gandalf20, address = {Brussels, Belgium}, month = sep, volume = {326}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Bresolin, Davide and Raskin, Jean-Fran\c{c}ois}, acronym = {{GandALF}'20}, booktitle = {{P}roceedings of the 11th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'20)}, author = {Bouyer, Patricia and Brihaye, Thomas and Randour, Mickael and Rivi{\`e}re, C{\'e}dric and Vandenhove, Pierre}, title = {Decisiveness of Stochastic Systems and its Application to Hybrid Models}, pages = {149?165}, year = {2020}, doi = {10.4204/EPTCS.326.10}, pdf = {http://eptcs.web.cse.unsw.edu.au/paper.cgi?GANDALF2020.10.pdf}, url = {http://eptcs.web.cse.unsw.edu.au/paper.cgi?GANDALF2020.10} }
@inproceedings{BBBFS-gandalf20, address = {Brussels, Belgium}, month = sep, volume = {326}, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Bresolin, Davide and Raskin, Jean-Fran\c{c}ois}, acronym = {{GandALF}'20}, booktitle = {{P}roceedings of the 11th {I}nternational {S}ymposium on {G}ames, {A}utomata, {L}ogics, and {F}ormal {V}erification ({GandALF}'20)}, author = {B{\'e}atrice B{\'e}rard and Benedikt Bollig and Patricia Bouyer and Matthias F{\"u}gger and Nathalie Sznajder}, title = {Synthesis in Presence of Dynamic Links}, pages = {33?49}, year = {2020}, doi = {10.4204/EPTCS.326.3}, pdf = {http://eptcs.web.cse.unsw.edu.au/paper.cgi?GANDALF2020.3.pdf}, url = {http://eptcs.web.cse.unsw.edu.au/paper.cgi?GANDALF2020.3} }
@inproceedings{DH-atpn20, address = {Vienna, Austria}, month = sep, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = { Nathalie Bertrand and Nils Jansen}, acronym = {{FORMATS}'20}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {F}ormal {M}odelling and {A}nalysis of {T}imed {S}ystems ({FORMATS}'20)}, author = {Susanna Donatelli and Serge Haddad}, title = {Guarded Autonomous Transitions Increase Conciseness and Expressiveness of Timed Automata}, pages = {215--230}, year = {2020}, url = {https://link.springer.com/chapter/10.1007%2F978-3-030-57628-8_13} }
@inproceedings{DFHKNS-disc20, address = {Freiburg, Germany}, month = oct, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Hagit Attiya}, acronym = {{DISC}'20}, booktitle = {{P}roceedings of the 34th {I}nternational {S}ymposium on {D}istributed {C}omputing ({DISC}'20)}, author = {Da{-}Jung Cho and Matthias F{\"{u}}gger and Corbin Hopper and Manish Kushwaha and Thomas Nowak and Quentin Soubeyran}, title = {Distributed Computation with Continual Population Growth}, pages = {7:1--7:17}, year = {2020}, doi = {https://doi.org/10.4230/LIPIcs.DISC.2020.7}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/13085/pdf/LIPIcs-DISC-2020-7.pdf}, url = {https://drops.dagstuhl.de/opus/frontdoor.php?source_opus=13085} }
@article{BFG-lmcs20, journal = {Logical Methods in Computer Science}, author = {Michael Blondin and Alain Finkel and Jean Goubault{-}Larrecq}, title = {{Forward Analysis for WSTS, Part {III:} Karp-Miller Trees}}, volume = {16}, number = {2}, doi = {10.23638/LMCS-16(2:13)2020}, year = {2020}, url = {https://lmcs.episciences.org/6591} }
@article{DGN-ic20, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Dave, Vrunda and Gastin, Paul and Krishna, Shankara Narayanan}, title = {Regular Transducer Expressions for Regular Transformations}, year = {2020}, url = {https://doi.org/10.1016/j.ic.2020.104655}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DGK20-IC-final.pdf} }
@inproceedings{DFG-mfcs20, address = {Prague, Czech Republic}, month = aug, volume = {170}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Javier Esparza and Dan Kr{\'a}l}, acronym = {{MFCS}'20}, booktitle = {{P}roceedings of the 43rd {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'20)}, author = {Dou{\'e}neau-Tabot, Ga{\"e}tan and Filiot, Emmanuel and Gastin, Paul}, title = {Register transducers are marble transducers}, pages = {29:1--29:14}, year = 2020, doi = {https://doi.org/10.4230/LIPIcs.MFCS.2020.29}, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/12697/pdf/LIPIcs-MFCS-2020-29.pdf}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12697/} }
@inproceedings{BLORV-concur20, address = {Vienna, Austria}, month = sep, volume = {171}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Igor Konnov and Laura Kovacs}, acronym = {{CONCUR}'20}, booktitle = {{P}roceedings of the 31st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'20)}, author = {Bouyer, Patricia and Le Roux, St{\'e}phane and Oualhadj, Youssouf and Randour, Mickael and Vandenhove, Pierre}, title = {Games Where You Can Play Optimally with Arena-Independent Finite Memory}, pages = {24:1--24:22}, year = 2020, doi = {10.4230/LIPIcs.CONCUR.2020.24}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12836} }
@inproceedings{AGSW-concur20, address = {Vienna, Austria}, month = sep, volume = {171}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Igor Konnov and Laura Kovacs}, acronym = {{CONCUR}'20}, booktitle = {{P}roceedings of the 31st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'20)}, author = {Bharat Adsul and Paul Gastin and Saptarshi Sarkar and Pascal Weil}, title = {Wreath/cascade products and related decomposition results for the concurrent setting of {M}azurkiewicz traces}, pages = {19:1--19:17}, year = 2020, doi = {10.4230/LIPIcs.CONCUR.2020.19}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12831} }
@inproceedings{BDM-concur20, address = {Vienna, Austria}, month = sep, volume = {171}, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Igor Konnov and Laura Kovacs}, acronym = {{CONCUR}'20}, booktitle = {{P}roceedings of the 31st {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'20)}, author = {Benedikt Bollig and Alain Finkel and Amrita Suresh}, title = {Bounded Reachability Problems are Decidable in {FIFO} Machines}, pages = {49:1--49:17}, year = 2020, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12861} }
@article{BFG-jcss20, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Benedikt Bollig and Marie Fortin and Paul Gastin}, title = {Communicating Finite-State Machines, First-Order Logic, and Star-Free Propositional Dynamic Logic}, pages = {22-53}, doi = {10.1016/j.jcss.2020.06.006}, year = {2020}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BFG20-JCSS.pdf}, abstract = {Message sequence charts (MSCs) naturally arise as executions of communicating finite-state machines (CFMs), in which finite-state processes exchange messages through unbounded FIFO channels. We study the first-order logic of MSCs, featuring Lamport's happened-before relation. To this end, we introduce a star-free version of propositional dynamic logic (PDL) with loop and converse. Our main results state that (i) every first-order sentence can be transformed into an equivalent star-free PDL sentence (and conversely), and (ii) every star-free PDL sentence can be translated into an equivalent CFM. This answers an open question and settles the exact relation between CFMs and fragments of monadic second-order logic. As a byproduct, we show that first-order logic over MSCs has the three-variable property.} }
@inproceedings{BDM-csf20, address = {Boston, MA, USA}, month = jul, publisher = {{IEEE} Computer Society Press}, editor = {Jia, Limin and K{\"u}sters, Ralf}, acronym = {{CSF}'19}, booktitle = {{P}roceedings of the 33rd {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'20)}, author = {David Baelde and St{\'e}phanie Delaune and Sol{\`e}ne Moreau}, title = {A Method for Proving Unlinkability of Stateful Protocols}, pages = {169--183}, year = 2020, url = {https://hal.archives-ouvertes.fr/hal-02459984/}, abstract = {The rise of contactless and wireless devices such as mobile phones and RFID chips justifies significant concerns over privacy, and calls for communication protocols that ensure some form of unlinkability. Formally specifying this property is difficult and context-dependent, and analysing it is very complex; as is common with security protocols, several incorrect unlinkability claims can be found in the literature. Formal verification is therefore desirable, but current techniques are not sufficient to directly analyse unlinkability. In [Hirschi et al., SP'19], two conditions have been identified that imply unlinkability and can be automatically verified. This work, however, only considers a restricted class of protocols. We adapt their formal definition as well as their proof method to the common setting of RFID authentication protocols, where readers access a central database of authorised users. Moreover, we also consider protocols where readers may update their database, and tags may also carry a mutable state. We propose sufficient conditions to ensure unlinkability, find new attacks, and obtain new proofs of unlinkability using Tamarin to establish our sufficient conditions.} }
@article{JGL-topa2020, publisher = {Elsevier Science Publishers}, journal = {Topology and its Applications}, author = {Goubault{-}Larrecq, Jean}, title = {{Some Topological Properties of Spaces of Lipschitz Continuous Maps on Quasi-Metric Spaces}}, volume = {282}, year = 2020, doi = {10.1016/j.topol.2020.107281}, url = {https://doi.org/10.1016/j.topol.2020.107281} }
@mastersthesis{m2-Doueneau, author = {Ga{\"e}tan Dou{\'e}neau-Tabot}, title = {{Register Models for Pebble Transducers and Applications to Optimization}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2019}, month = sep }
@mastersthesis{m2-Grienenberger, author = {Emilie Grienenberger}, title = {{Concept alignment in Logipedia - Alignement of logical connectives between HOL Light and Dedukti}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2019}, month = sep }
@mastersthesis{m2-Lopez, author = {Aliaume Lopez}, title = {Th{\'e}or{\`e}mes de pr{\'e}servation}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2019}, month = sep }
@mastersthesis{m2-Suresh, author = {Amrita Suresh}, title = {{Termination, boundedness and reachability for input-bounded FIFO Machines}}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2019}, month = sep }
@phdthesis{jaziri-phd2019, author = {Samy Jaziri}, title = {{Automata on Timed Structures}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = sep, url = {https://tel.archives-ouvertes.fr/tel-02384274}, pdf = {https://tel.archives-ouvertes.fr/tel-02384274/document} }
@phdthesis{bury-phd2019, author = {Guillaume Bury}, title = {{Integrating rewriting, tableau and superposition into SMT}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = may, url = {https://tel.archives-ouvertes.fr/tel-02612985}, pdf = {https://tel.archives-ouvertes.fr/tel-02612985/document} }
@phdthesis{mandon-phd2019, author = {Hugues Mandon}, title = {{Algorithms for Cell Reprogramming Strategies in Boolean Networks}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = dec, url = {https://tel.archives-ouvertes.fr/tel-02412717}, pdf = {https://hal.archives-ouvertes.fr/tel-02412717/document} }
@phdthesis{lick-phd2019, author = {Anthony Lick}, title = {{XPath-like Query Logics: Proof Systems and Real-World Applicability}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = jul, url = {https://tel.archives-ouvertes.fr/tel-02276423}, pdf = {https://tel.archives-ouvertes.fr/tel-02276423/document} }
@phdthesis{saoud-phd2019, author = {Adnane Saoud}, title = {{Compositional and Efficient Controller Synthesis for Cyber-Physical Systems}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = oct, url = {https://tel.archives-ouvertes.fr/tel-02317723}, pdf = {https://tel.archives-ouvertes.fr/tel-02317723/document} }
@phdthesis{koutsos-phd2019, author = {Adrien Koutsos}, title = {Preuves symboliques de propri{\'e}t{\'e}s d'indistinguabilit{\'e} calculatoire}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = sep, url = {https://tel.archives-ouvertes.fr/tel-02317745}, pdf = {https://tel.archives-ouvertes.fr/tel-02317745/document} }
@phdthesis{gonzalez-phd2019, author = {Gonz{\'a}lez, Mauricio}, title = {{Stochastic Games on Graphs with Applications to Smart-Grids Optimization}}, school = {{\'E}cole Normale Sup{\'e}rieure Paris-Saclay, France}, type = {Th{\`e}se de doctorat}, year = 2019, month = nov, url = {http://www.theses.fr/2019SACLN064}, pdf = {http://www.lsv.fr/~gonzalez/phd/Thesis_Gonzalez_V2_2.pdf} }
@article{LRP-dga20, publisher = {Springer}, journal = {Dynamic Games and Applications}, author = {Le Roux, St{\'e}phane and Pauly, Arno}, title = {A Semi-Potential for Finite and Infinite Games in Extensive Form}, volume = {10}, number = {1}, pages = {120-144}, year = 2020, doi = {10.1007/s13235-019-00301-7}, url = {https://doi.org/10.1007/s13235-019-00301-7} }
@inproceedings{AVLRM-sac20, address = {Brno, Czech Republic}, month = mar, publisher = {ACM Press}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, acronym = {{SAC}'20}, booktitle = {{P}roceedings of the 35th {ACM/SIGAPP} {S}ymposium on {A}pplied {C}omputing ({SAC}'20)}, author = {Nikolaos Alexopoulos and Emmanouil Vasilomanolakis and St{\'e}phane {Le Roux} and Steven Rowe and Max M{\"u}hlh{\"a}user}, title = {{TRIDEnT}: Towards a Decentralized Threat Indicator Marketplace}, pages = {332-341}, year = {2020}, doi = {10.1145/3341105.3374020}, url = {https://doi.org/10.1145/3341105.3374020} }
@inproceedings{ZSGF-ecc19, address = {Naples, Italy}, month = jun, publisher = {{IEEE} Press}, acronym = {{ECC}'19}, booktitle = {{P}roceedings of the 18th {E}uropean {C}ontrol {C}onference ({ECC}'19)}, author = {Daniele Zonetti and Adnane Saoud and Antoine Girard and Laurent Fribourg}, title = {A symbolic approach to voltage stability and power sharing in time-varying{DC} microgrids}, pages = {903-909}, year = {2019}, doi = {10.23919/ECC.2019.8796095}, url = {https://doi.org/10.23919/ECC.2019.8796095} }
@inproceedings{CF-cyphy19, address = {New York City, NY, USA}, month = oct, editor = {Roger D. Chamberlain and Martin Grimheden and Walid Taha}, volume = {11971}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, noeditor = {}, acronym = {{CyPhy/WESE}'19}, booktitle = {9th International Workshop on Cyber Physical Systems ({CyPhy}'19) and 15th International Workshop on Model-Based Design ({WESE}'19), Revised Selected Papers}, author = {Adrien {Le Co{\"{e}}nt} and Laurent Fribourg}, title = {Guaranteed Optimal Reachability Control of Reaction-Diffusion Equations Using One-Sided Lipschitz Constants and Model Reduction}, pages = {181-202}, year = {2019}, doi = {10.1007/978-3-030-41131-2_9}, url = {https://doi.org/10.1007/978-3-030-41131-2_9} }
@inproceedings{DFKN-dsd19, address = {Kallithea, Greece}, month = aug, publisher = {{IEEE} Press}, noeditor = {}, acronym = {{DSD}'19}, booktitle = {{P}roceedings of the 22nd {E}uromicro {C}onference on {D}igital {S}ystem {D}esign ({DSD}'19)}, author = {Jean{-}Luc Danger and Laurent Fribourg and Ulrich K{\"u}hne and Maha Naceur}, title = {LAOCO{\"O}N: {A} Run-Time Monitoring and Verification Approach for Hardware Trojan Detection}, pages = {269-276}, year = {2019}, doi = {10.1109/DSD.2019.00047}, url = {https://doi.org/10.1109/DSD.2019.00047} }
@inproceedings{CF-cdc19, address = {Nice, France}, month = dec, publisher = {{IEEE} Control System Society}, noeditor = {}, acronym = {{CDC}'19}, booktitle = {{P}roceedings of the 58th {IEEE} {C}onference on {D}ecision and {C}ontrol ({CDC}'19)}, author = {Adrien {Le Co{\"e}nt} and Laurent Fribourg}, title = {Guaranteed Control of Sampled Switched Systems using Semi-Lagrangian Schemes and One-Sided Lipschitz Constants}, pages = {599-604}, year = {2019}, doi = {10.1109/CDC40024.2019.9029376}, pdf = {https://arxiv.org/pdf/1903.05882.pdf}, url = {https://doi.org/10.1109/CDC40024.2019.9029376} }
@inproceedings{ACFJL-acsd19, address = {Aachen, Germany}, month = jun, publisher = {{IEEE} Computer Society Press}, editor = {J{\"o}rg Keller and Wojciech Penczek}, acronym = {{ACSD}'19}, booktitle = {{P}roceedings of the 19th {I}nternational {C}onference on {A}pplication of {C}oncurrency to {S}ystem {D}esign ({ACSD}'19)}, author = {{\'E}tienne Andr{\'e} and Emmanuel Coquard and Laurent Fribourg and Jawher Jerray and David Lesens}, title = {Parametric Schedulability Analysis of a Launcher Flight Control System Under Reactivity Constraints}, pages = {13-22}, year = {2019}, doi = {10.1109/ACSD.2019.00006}, url = {https://doi.org/10.1109/ACSD.2019.00006} }
@proceedings{CG-fsttcs2019, address = {Bombay, India}, month = dec, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Arkadev Chattopadhyay and Paul Gastin}, acronym = {{FSTTCS}'19}, booktitle = {{P}roceedings of the 39th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'19)}, title = {{P}roceedings of the 39th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'19)}, author = {Arkadev Chattopadhyay and Paul Gastin}, year = {2019}, url = {http://www.dagstuhl.de/dagpub/978-3-95977-131-3} }
@article{CFLS-ppet20, author = {Sergiu Carpov and Caroline Fontaine and Damien Ligier and Renaud Sirdey}, title = {{Illuminating the Dark or how to recover what should not be seen in FE-based classifiers}}, pages = {1-35}, year = {2020}, month = may, volume = {2020}, issue = {2}, doi = {10.2478/popets-2020-0015}, url = {https://content.sciendo.com/view/journals/popets/2020/2/article-p5.xml} }
@inproceedings{BCC-bpm19, address = {Vienna, Austria}, month = sep, volume = 362, series = {Lecture Notes in Business Information Processing}, publisher = {Springer}, editor = {Chiara Di Francescomarino and Remco M. Dijkman and Uwe Zdun}, acronym = {{BPM}'19}, booktitle = {{B}usiness {P}rocess {M}anagement {W}orkshops ({BPM}'19), Revised Selected Papers}, author = {Mathilde Boltenhagen and Thomas Chatain and Josep Carmona}, title = {Encoding Conformance Checking Artefacts in {SAT}}, pages = {160-171}, year = {2019}, doi = {10.1007/978-3-030-37453-2_14}, pdf = {https://hal.inria.fr/hal-02419980/document}, url = {https://doi.org/10.1007/978-3-030-37453-2_14} }
@article{ACCD-tpnomc19, publisher = {Springer}, journal = {Transactions on Petri Nets and Other Models of Concurrency}, author = {Wil M. P. van der Aalst and Josep Carmona and Thomas Chatain and Boudewijn F. van Dongen}, title = {A Tour in Process Mining: From Practice to Algorithmic Challenges}, pages = {1-35}, year = {2019}, volume = {14}, doi = {10.1007/978-3-662-60651-3_1}, url = {https://doi.org/10.1007/978-3-662-60651-3_1} }
@proceedings{DH-pn2019, author = {Susanna Donatelli and Stefan Haar}, editor = {Susanna Donatelli and Stefan Haar}, title = {Proceedings of the 40th International Conference on Application and Theory of Petri Nets and Concurrency ({PETRI NETS}'19)}, booktitle = {Proceedings of the 40th International Conference on Application and Theory of Petri Nets and Concurrency ({Petri Nets}'19)}, month = jun, series = {Lecture Notes in Computer Science}, volume = {11522}, publisher = {Springer}, year = {2019}, address = {Aachen, Germany}, url = {https://doi.org/10.1007/978-3-030-21571-2}, doi = {10.1007/978-3-030-21571-2} }
@inproceedings{OMFS-patmos19, address = {Rhodes, Greece}, month = jul, publisher = {{IEEE} Press}, acronym = {{PATMOS}'19}, booktitle = {{P}roceedings of the 29th {I}nternational {S}ymposium on {P}ower and {T}iming {M}odeling, {O}ptimization and {S}imulation ({PATMOS}'19)}, author = {Daniel {\"O}hlinger and J{\"u}rgen Maier and Matthias F{\"u}gger and Ulrich Schmid}, title = {The Involution Tool for Accurate Digital Timingand Power Analysis}, pages = {1-8}, year = {2019}, doi = {10.1109/PATMOS.2019.8862165}, url = {https://doi.org/10.1109/PATMOS.2019.8862165} }
@article{FNNS-tcad19, publisher = {{IEEE} Circuits and Systems Society}, journal = {IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems}, author = {Matthias F{\"u}gger and Robert Najvirt and Thomas Nowak and Ulrich Schmid}, title = {A faithful binary circuit model}, doi = {10.1109/TCAD.2019.2937748}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8818370} }
@article{BFLM-tcsi20, publisher = {{IEEE} Press}, journal = {IEEE Transactions on Circuits and Systems I}, author = {Johannes Bund and Matthias F{\"u}gger and Christoph Lenzen and Moti Medina}, title = {Synchronizer-free Digital Link Controller}, volume = {67}, number = {10}, pages = {3562-3573}, year = {2020}, doi = {10.1109/TCSI.2020.2989552}, url = {https://ieeexplore.ieee.org/document/9085899} }
@incollection{FKN-AiSB2020, publisher = {Springer}, booktitle = {Advances in Synthetic Biology}, editor = {Vijai Singh}, author = {Matthias F{\"u}gger and Manish Kushwaha and Thomas Nowak}, title = {Digital Circuit Design for Biological and Silicon Computers}, year = 2020, note = {To appear} }
@article{FNW-dapplmath20, publisher = {Elsevier Science Publishers}, journal = {Discrete Applied Mathematics}, author = {Matthias F{\"u}gger and Thomas Nowak and Kyrill Winkler}, title = {On the radius of nonsplit graphs and information dissemination in dynamic networks}, volume = {282}, pages = {257-264}, year = {2020}, doi = {10.1016/j.dam.2020.02.013}, url = {http://www.sciencedirect.com/science/article/pii/S0166218X20300809} }
@inproceedings{BFLMR-async20, address = {Publication only}, month = may, publisher = {{IEEE} Computer Society}, editor = {Andreas Steininger and Matheus T. Moreira}, acronym = {{ASYNC}'20}, booktitle = {{P}roceedings of the 26th {IEEE} {I}nternational {S}ymposium on {A}synchronous {C}ircuits and {S}ystems ({ASYNC}'20)}, author = {Johannes Bund and Matthias F{\"u}gger and Christoph Lenzen and Moti Medina and Will Rosenbaum}, title = {{PALS: Plesiochronous and Locally Synchronous Systems}}, year = {2020}, pdf = {https://arxiv.org/pdf/2003.05542.pdf} }
@article{ABF-qip20, publisher = {Springer}, journal = {Quantum Information Processing}, author = {Pablo Arrighi and C{\'{e}}dric B{\'{e}}ny and Terry Farrelly}, title = {A quantum cellular automaton for one-dimensional {QED}}, volume = {19}, number = {88}, year = {2020}, url = {https://arxiv.org/abs/1903.07007}, doi = {10.1007/s11128-019-2555-4} }
@article{MA-qip20, publisher = {Springer}, journal = {Quantum Information Processing}, author = {Giuseppe Di Molfetta and Pablo Arrighi}, title = {A quantum walk with both a continuous-time limit and a continuous-spacetime limit}, volume = {19}, number = {47}, year = {2020}, url = {https://arxiv.org/abs/1906.04483}, doi = {10.1007/s11128-019-2549-2} }
@inproceedings{B-atva19, address = {Taipei, Taiwan}, month = oct, volume = {11781}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Yu{-}Fang Chen and Chih{-}Hong Cheng and Javier Esparza}, acronym = {{ATVA}'19}, booktitle = {{P}roceedings of the 17th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'19)}, author = {Patricia Bouyer}, title = {{A Note on Game Theory and Verification (Invited Talk)}}, pages = {3-22}, doi = {10.1007/978-3-030-31784-3_1}, year = 2019 }
@inproceedings{B-time19, address = {M{\'{a}}laga, Spain}, month = oct, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Johann Gamper and Sophie Pinchinat and Guido Sciavicco}, acronym = {{TIME}'19}, booktitle = {{P}roceedings of the 26th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'19)}, author = {Patricia Bouyer}, title = {{On the Computation of Nash Equilibria in Games on Graphs (Invited Talk)}}, pages = {3:1-3:3}, doi = {10.4230/LIPIcs.TIME.2019.3}, year = 2019 }
@inproceedings{HK-atpn20, address = {Paris, France}, month = jun, volume = {12152}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ryszard Janicki and Natalia Sidorova and Thomas Chatain}, acronym = {{PETRI~NETS}'20}, booktitle = {{P}roceedings of the 41st {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'20)}, author = {Serge Haddad and Igor Khmelnitsky}, title = {{D}ynamic {R}ecursive {P}etri {N}ets}, pages = {345-366}, doi = {10.1007/978-3-030-51831-8\_17}, year = 2020, url = {https://hal.inria.fr/hal-02511321} }
@article{BFNS-mscs20, publisher = {Cambridge University Press}, journal = {Mathematical Structures in Computer Science}, author = {David Baelde and Amy P. Felty and Gopalan Nadathur and Alexis Saurin}, title = {A special issue on structural proof theory, automated reasoning and computation in celebration of Dale Miller's 60th birthday}, volume = {29}, number = {8}, pages = {1007--1008}, year = 2020, doi = {10.1017/S0960129519000136}, abstract = {The genesis of this special issue was in a meeting that took place at Université Paris Diderot on December 15 and 16, 2016. Dale Miller, Professor at École polytechnique, had turned 60 a few days earlier. In a career spanning over three decades and in work conducted in collaboration with several students and colleagues, Dale had had a significant influence in an area that can be described as structural proof theory and its application to computation and reasoning. In recognition of this fact, several of his collaborators thought it appropriate to celebrate the occasion by organizing a symposium on topics broadly connected to his areas of interest and achievements. The meeting was a success in several senses: it was attended by over 35 people, there were 15 technical presentations describing new results, and, quite gratifyingly, we managed to spring the event as a complete surprise to Dale.} }
@article{LRP-ic20, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Le Roux, St{\'e}phane and Pauly, Arno}, title = {Equilibria in multi-player multi-outcome infinite sequential games}, volume = {276}, year = 2021, doi = {https://doi.org/10.1016/j.ic.2020.104557}, url = {https://www.sciencedirect.com/science/article/pii/S0890540120300456?via%3Dihub} }
@article{BGHLR-ic20, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Brihaye, Thomas and Geeraerts, Gilles and Hallet, Marion and Le Roux, St{\'e}phane}, title = {On the termination of dynamics in sequential games}, volume = {272}, year = 2020, doi = {10.1016/j.ic.2019.104505} }
@inproceedings{Blanqui-fscd20, address = {Paris, France}, month = jun, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Zena Ariola}, acronym = {{FSCD}'20}, booktitle = {{P}roceedings of the 5th International Conference on Formal Structures for Computation and Deduction ({FSCD}'20)}, author = {Blanqui, Fr{\'e}d{\'e}ric}, title = {Type safety of rewriting rules in dependent types}, doi = {10.4230/LIPIcs.FSCD.2020.13}, year = 2020, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/12335/}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12335/} }
@inproceedings{Genestier-fscd20, address = {Paris, France}, month = jun, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Zena Ariola}, acronym = {{FSCD}'20}, booktitle = {{P}roceedings of the 5th International Conference on Formal Structures for Computation and Deduction ({FSCD}'20)}, author = {Genestier, Guillaume}, title = {Encoding {A}gda Programs using Rewriting}, doi = {10.4230/LIPIcs.FSCD.2020.31}, year = 2020, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/12353/}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12353/} }
@inproceedings{HB-fscd20, address = {Paris, France}, month = jun, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Zena Ariola}, acronym = {{FSCD}'20}, booktitle = {{P}roceedings of the 5th International Conference on Formal Structures for Computation and Deduction ({FSCD}'20)}, author = {Hondet, Gabriel and Blanqui, Fr{\'e}d{\'e}ric}, title = {The new rewriting engine of {D}edukti ({S}ystem {D}escription)}, pages = {35:1-35:16}, doi = {10.4230/LIPIcs.FSCD.2020.35}, year = 2020, pdf = {https://drops.dagstuhl.de/opus/volltexte/2020/12357/}, url = {https://drops.dagstuhl.de/opus/volltexte/2020/12357/} }
@article{JLDJ-compj20, publisher = {Oxford University Press}, journal = {The Computer Journal}, author = {Jiang, Ying and Liu, Jian and Dowek, Gilles and Ji, Kailiang}, title = {Towards Combining Model Checking and Proof Checking}, volume = {62}, number = {9}, pages = {1365--1402}, year = 2020, doi = {10.1093/comjnl/bxy112}, pdf = {https://hal.inria.fr/hal-01970274/file/sctl_paper.pdf} }
@article{BBCDHH-jar20, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Burel, Guillaume and Bury, Guillaume and Cauderlier, Raphaël and Delahaye, David and Halmagrand, Pierre and Hermant, Olivier}, title = {First-Order Automated Reasoning with Theories: When Deduction Modulo Theory Meets Practice}, volume = {64}, pages = {1001-1050}, year = 2020, doi = {10.1007/s10817-019-09533-z}, pdf = {https://hal.archives-ouvertes.fr/hal-02305831/file/dmt-in-atp.pdf}, url = {https://hal.archives-ouvertes.fr/hal-02305831} }
@inproceedings{BDFM-lics20, address = {Saarbrucken, Germany}, month = jul, publisher = {{IEEE} Press}, editor = {Kobayashi, Naoki}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 35th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'20)}, author = {Bednarczyk, Bartosz and Demri, St{\'e}phane and Fervari, Ra{\'u}l and Mansutti, Alessio}, title = {Modal Logics with Composition on Finite Forests: Expressivity and Complexity}, pages = {167--180}, year = 2020, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BDFM-lics2020.pdf}, doi = {https://dl.acm.org/doi/10.1145/3373718.3394787} }
@inproceedings{HM-lics20, address = {Saarbrucken, Germany}, month = jul, publisher = {{IEEE} Press}, editor = {Kobayashi, Naoki}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 35th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'20)}, author = {Herbelin, Hugo and Miquey, {\'E}tienne}, title = {A calculus of expandable stores. {C}ontinuation-and-environment-passing style translations}, pages = {564-577}, year = 2020, optpdf = {}, url = {https://dl.acm.org/doi/10.1145/3373718.3394792}, optdoi = {} }
@inproceedings{JKB-lics20, address = {Saarbrucken, Germany}, month = jul, publisher = {{IEEE} Press}, editor = {Kobayashi, Naoki}, acronym = {{LICS}'19}, booktitle = {{P}roceedings of the 35th {A}nnual {ACM\slash IEEE} {S}ymposium on {L}ogic {I}n {C}omputer {S}cience ({LICS}'20)}, author = {Jacomme, Charlie and Kremer, Steve and Barthe, Gilles}, title = {Universal equivalence and majority on probabilistic programs over finite fields}, pages = {155-166}, year = 2020, optpdf = {}, url = {https://dl.acm.org/doi/10.1145/3373718.3394746}, optdoi = {} }
@inproceedings{BDM-ijcai20, month = jul, publisher = {IJCAI organization}, editor = {Bessi{\`e}re, Christian}, acronym = {{IJCAI}'20}, booktitle = {{P}roceedings of the 29th {I}nternational {J}oint {C}onference on {A}rtificial {I}ntelligence ({IJCAI}'20)}, author = {Bednarczyk, Bartosz and Demri, St{\'e}phane and Mansutti, Alessio}, title = {A Framework for Reasoning about Dynamic Axioms in Description Logics}, optpages = {}, year = 2020, optpdf = {}, url = {https://www.ijcai.org/Proceedings/2020/233}, optdoi = {} }
@inproceedings{BD-ecai20, address = {Santiago de Compostela, Spain}, month = sep, optvolume = {??}, optseries = {Frontiers in Artificial Intelligence and Applications}, publisher = {{IOS} Press}, editor = {Lang, J{\'e}r{\^o}me and De Giacomo, Giuseppe and Barro and Sen{\'e}n Barro and O'Sullivan, Barry}, acronym = {{ECAI}'20}, booktitle = {{P}roceedings of the 24th {E}uropean {C}onference on {A}rtificial {I}ntelligence ({ECAI}'20)}, author = {Belardinelli, Francesco and Demri, St{\'e}phane}, title = {Reasoning with a Bounded Number of Resources in ATL+}, pages = {624-631}, year = 2020, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BD-ecai2020.pdf}, url = {http://ebooks.iospress.nl/publication/54942}, doi = {10.3233/FAIA200147} }
@inproceedings{DH-lata2020, address = {Milan, Italy}, month = mar, volume = {12038}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Alberto Leporati and Carlos Mart{\'{\i}}n{-}Vide and Dana Shapira and Claudio Zandron}, acronym = {{LATA}'20}, booktitle = {{P}roceedings of the 14th {I}nternational {C}onference on {L}anguage and {A}utomata {T}heory and {A}pplications ({LATA}'20)}, author = {Susanna Donatelli and Serge Haddad}, title = {Expressiveness and Conciseness of Timed Automata for the Verification of Stochastic Models}, pages = {170-183}, year = 2020 }
@incollection{GHKNS-til2020, volume = 53, series = {Trends In Logic}, publisher = {Springer}, booktitle = {Well-Quasi Orders in Computation, Logic, Language and Reasoning}, editor = {Schuster, Peter M. and Seisenberger, Monika and Weiermann, Andreas}, author = {Jean Goubault{-}Larrecq and Simon Halfon and P. Karandikar and K. {Narayan Kumar} and {\relax Ph}ilippe Schnoebelen}, title = {The Ideal Approach to Computing Closed Subsets in Well-Quasi-Orderings}, pages = {55-105}, year = 2020, doi = {10.1007/978-3-030-30229-0_3} }
@incollection{DSS-til2020, volume = 53, series = {Trends In Logic}, publisher = {Springer}, booktitle = {Well-Quasi Orders in Computation, Logic, Language and Reasoning}, editor = {Schuster, Peter M. and Seisenberger, Monika and Weiermann, Andreas}, author = {D{\v{z}}amonja, Mirna and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {On Ordinal Invariants in Well Quasi Orders and Finite Antichain Orders}, pages = {2-54}, year = 2020, doi = {10.1007/978-3-030-30229-0_2} }
@article{LPSS-lmcs2020, journal = {Logical Methods in Computer Science}, author = {J{\'e}r{\^o}me Leroux and M. Praveen and Gr{\'e}goire Sutre and Schnoebelen, {\relax Ph}ilippe}, title = {On Functions Weakly Computable by Pushdown {Petri} Nets and Related Systems}, volume = {15}, number = {4}, year = 2019, doi = {10.23638/LMCS-15(4:15)2019}, pdf = {https://arxiv.org/pdf/1904.04090.pdf} }
@article{JGL-tp2020, publisher = {Auburn University}, journal = {Topology Proceedings}, author = {Goubault{-}Larrecq, Jean}, title = {$\Pi^0_2$ Subsets of Domain-Complete Spaces and Countably Correlated Spaces}, volume = {58}, pages = {13-22}, year = 2020, note = {E-published on March 24, 2020.}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-tp2020.pdf} }
@inproceedings{FHK-msr2019, address = {Angers, France}, month = nov, futureseries = {Journal Europ{\'e}en des Syst{\`e}mes Automatis{\'e}s}, publisher = {HAL}, editor = {Beno{\^i}t Delahaye and S{\'e}bastien Lahaye and Mehdi Lhommeau}, acronym = {{MSR}'19}, booktitle = {{A}ctes du 12{\`e}me {C}olloque sur la {M}od{\'e}lisation des {S}yst{\`e}mes {R}{\'e}actifs ({MSR}'19)}, author = {Alain Finkel and Serge Haddad and Igor Khmelnitsky}, title = {{R{\'e}ification des acc{\'e}l{\'e}rations pour la construction de Karp et Miller}}, year = 2019, pdf = {https://hal.archives-ouvertes.fr/hal-02431913/file/MSR19_paper_17.pdf}, url = {https://hal.archives-ouvertes.fr/hal-02431913} }
@inproceedings{KDHKSY-tacas2020, address = {Dublin, Ireland}, month = apr, volume = {12078}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Armin Biere and David Parker}, acronym = {{TACAS}'20}, booktitle = {{P}roceedings of the 26th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'20)}, author = {Juraj Kolc{\'a}k and J{\'e}r{'e}my Dubut and Ichiro Hasuo and Shin-Ya Katsumata and David Sprunger and Akihisa Yamada}, title = {Relational Differential Dynamic Logic}, pages = {191--208}, doi = {10.1007/978-3-030-45190-5_11}, year = 2020, url = {https://doi.org/10.1007/978-3-030-45190-5_11} }
@inproceedings{AGKR-tacas2020, address = {Dublin, Ireland}, month = apr, volume = {12078}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Armin Biere and David Parker}, acronym = {{TACAS}'20}, booktitle = {{P}roceedings of the 26th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'20)}, author = {Akshay, S. and Gastin, Paul and Krishna, Shankara Narayanan and Roychoudhary, Sparsa}, title = {Revisiting Underapproximate Reachability for Multipushdown Systems}, pages = {387--404}, doi = {10.1007/978-3-030-45190-5_21}, year = 2020, pdf = {https://arxiv.org/pdf/2002.05950.pdf}, url = {https://link.springer.com/chapter/10.1007/978-3-030-45190-5_21}, longurl = {https://arxiv.org/abs/2002.05950} }
@inproceedings{Mansutti-fossacs20, address = {Dublin, Ireland}, month = apr, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Barbara K{\"o}nig and Jean Goubault-Larrecq}, acronym = {{FoSSaCS}'20}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'20)}, author = {Alessio Mansutti}, title = {An auxiliary logic on trees: on the {T}ower-hardness of logics featuring reachability and submodel reasoning}, pages = {462--481}, doi = {10.1007/978-3-030-45231-5_24}, year = 2020 }
@inproceedings{FHK-fossacs2020, address = {Dublin, Ireland}, month = apr, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Barbara K{\"o}nig and Jean Goubault-Larrecq}, acronym = {{FoSSaCS}'20}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'20)}, author = {Alain Finkel and Serge Haddad and Igor Khmelnitsky}, title = {Minimal coverability tree construction made complete and efficient}, pages = {237--256}, doi = {10.1007/978-3-030-45231-5_13}, year = 2020 }
@inproceedings{BBLS-fossacs2020, address = {Dublin, Ireland}, month = apr, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Barbara K{\"o}nig and Jean Goubault-Larrecq}, acronym = {{FoSSaCS}'20}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'20)}, author = {B{\'e}atrice B{\'e}rard and Benedikt Bollig and Mathieu Lehaut and Nathalie Sznajder}, title = {Parameterized Synthesis for Fragments of First-Order Logic over Data Words}, pages = {97--118}, doi = {10.1007/978-3-030-45231-5_6}, year = 2020 }
@inproceedings{BD-stacs2020, address = {Montpellier, France}, month = mar, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {Bl{\"a}ser, Markus and Paul, Christophe}, acronym = {{STACS}'20}, booktitle = {{P}roceedings of the 37th {A}nnual {S}ymposium on {T}heoretical {A}spects of {C}omputer {S}cience ({STACS}'20)}, author = {Berwanger, Dietmar and Doyen, Laurent}, title = {Observation and Distinction. Representing Information in Infinite Games}, pages = {48:1--48:17}, doi = {10.4230/LIPIcs.STACS.2020.48}, year = 2020 }
This file was generated by bibtex2html 1.98.